Identity Theft & Cyber Defense | Haskell & Dyer
The Government Has to Prove It Was You at the Keyboard. Data Alone Doesn't.
Identity theft, credit card fraud, and computer based offenses lean heavily on digital evidence. We challenge the chain of custody, the attribution, and whether the data actually points to you.
If Your Devices Were Seized or Searched
Do not give passwords or explain your accounts.
These cases are built on phones, computers, and accounts, and what you volunteer can close the gap between a device and you, which is exactly what the government needs. Do not hand over passwords or explain your logins. Ask for a lawyer and call before you answer questions about any device or account.
The Gap in Every Digital Case
An Account Is Not a Person
Digital evidence can show what a device or account did. Proving that you were the person behind it, beyond a reasonable doubt, is a separate and often much harder step.
The Weak Link
Attribution
An IP address, a login, or a device is not a person. Shared computers, shared networks, spoofing, and stolen credentials all break the link between the data and you. Attribution is where these cases most often fall apart.
The Evidence Trail
Chain of Custody
Digital evidence has to be collected, preserved, and analyzed properly. Gaps in the chain of custody, flawed forensics, or improper extraction can make the evidence unreliable or open it to suppression.
What We Handle
Common Identity & Cyber Charges
From a credit card case to a computer-intrusion allegation, we handle the full range.
Identity theft
Credit card fraud
Access device fraud
Aggravated identity theft
Unauthorized computer access
Phishing and account takeover
Online financial fraud
Data or device misuse
What's at Stake
Federal Exposure and Stacked Counts
These cases can be charged federally, and some carry penalties that add on top of an underlying fraud.
FederalOften charged under federal statutes
StackedSome counts add mandatory time on top
PrisonSignificant incarceration on conviction
RecordA fraud offense that follows you
How We Defend an Identity or Cyber Charge
These are forensic cases. We attack attribution, the handling of the evidence, and whether the data proves intent at all.
We Challenge Attribution
Shared devices, open networks, spoofing, and stolen credentials all break the link. We press on whether it was really you.
We Test the Forensics
How the evidence was collected and analyzed matters. Gaps in the chain of custody or flawed methods can undo it.
We Attack the Search
Devices and accounts have Fourth Amendment protection. An unlawful search or seizure can lead to suppression.
We Question Intent
Authorized access, a mistake, or being a victim of the same scheme cuts against the knowing intent these charges require.
Common Questions
Identity Theft & Cyber, Answered
The activity traces to my IP address or device. Doesn't that prove it was me?
No. An IP address or a device identifies a connection or a piece of hardware, not a person. Shared networks, multiple users, spoofing, malware, and stolen credentials all mean the activity may not have been you. The government still has to prove you were the one behind it, and that attribution gap is often the strongest part of the defense.
Someone else used my computer or account. Is that a defense?
It can be. If a device or account was shared, accessible to others, or compromised, that directly undercuts the claim that you committed the offense. These cases assume one person behind the screen, and showing that others had access, or that credentials were stolen, raises real doubt about who was actually responsible.
What does "chain of custody" mean for digital evidence?
It is the documented trail of how evidence was collected, stored, and analyzed. Digital evidence is easy to alter or mishandle, so gaps or sloppy forensics can make it unreliable. When the handling does not hold up, we can challenge the evidence's accuracy or move to keep it out of the case entirely.
Police want to search my phone or want my passwords. Do I have to comply?
Generally you should not volunteer passwords or consent to a search without talking to a lawyer first. Your devices and accounts have constitutional protection, and what you hand over can close the very gaps the government needs to fill. Politely decline, ask for a lawyer, and call before giving access to anything.
Why might this be a federal case?
Identity and cyber offenses often cross state lines, involve interstate networks, or fall under federal statutes covering access devices, identity theft, and computer fraud. Some, like aggravated identity theft, can add mandatory time on top of an underlying charge. Federal exposure makes early, knowledgeable defense especially important.
Charged in a Digital Case? Data Is Not the Same as Proof It Was You.
Attribution, forensics, and the search all matter, and each is a place to fight. Tell us what's happening and get an honest read on your defense. The first conversation is free and confidential.
Devices seized after hours? Call our 24/7 line: 240-687-0179