Computer Crime

Effective Defense With Digital Forensic Techniques

Computer crime charges require a completely different set of investigative tools than those of conventional crimes. Effective defenders must be familiar with developing digital forensic techniques, and they must be able to craft defense strategies to overcome them.

In most cases, we at Aidala Bertuna & Kamins PC, in New York City, work to show the holes in arguments made by the prosecution. Our grasp of technology issues gives us a leg up over firms that treat computer crimes the same way they approach conventional crimes. We work with the top experts in the field to challenge every piece of the government’s evidence.

Give our lawyers a call today to learn more about how we can help in your unique case…212-486-0011.

Smart And Strategic Defense Against Computer Crime Charges

An individual’s digital DNA is a broader concept than just a few years ago. Evidence exists not just on the hard drive on your desktop PC, but also on smart phones, networks, cloud storage, thumb drives, MP3 players, password-protected data sites, malware downloads — anywhere that data can be stored.

The more dispersed this information, the less likely it is that only one person has access to it. We make prosecutors prove that it was your intent to commit a crime — not an easy thing to do. In one sense, cyber crime defense closely resembles strong conventional defense: We are vigilant to violations of constitutional search and seizure protections.

Of course, the specific facts of your case will affect how we tailor our defense. For example, you may have been charged with a sex offense such as possession of child pornography or Internet solicitation of a minor. This will call for a response that is sensitive to those circumstances.

Similarly, if you have been charged with credit card fraud or some other theft offense, we will work the authorities to find a resolution that fully protects your rights throughout the process.

No matter what you have been charged with — from hacking, cyberstalking or anything else — we will use our experience to make a smart and strategic defense.