<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[internet sex crimes - The Frey Law Firm, LLC]]></title>
        <atom:link href="https://www.internetcrime.com/news/tags/internet-sex-crimes/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.internetcrime.com/news/tags/internet-sex-crimes/</link>
        <description><![CDATA[The Frey Law Firm, LLC's Website]]></description>
        <lastBuildDate>Fri, 11 Oct 2024 14:49:36 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Dating Website Scam? “Someone Contacted Me and Demanded Payment!?!?!”]]></title>
                <link>https://www.internetcrime.com/news/dating-website-scam-someone-contacted-me-and-demanded-payment/</link>
                <guid isPermaLink="true">https://www.internetcrime.com/news/dating-website-scam-someone-contacted-me-and-demanded-payment/</guid>
                <dc:creator><![CDATA[The Frey Law Firm, LLC Team]]></dc:creator>
                <pubDate>Wed, 08 Nov 2017 20:47:29 GMT</pubDate>
                
                    <category><![CDATA[Legal]]></category>
                
                    <category><![CDATA[News]]></category>
                
                
                    <category><![CDATA[dating scam]]></category>
                
                    <category><![CDATA[dating website scam]]></category>
                
                    <category><![CDATA[internet dating]]></category>
                
                    <category><![CDATA[internet dating crime]]></category>
                
                    <category><![CDATA[internet sex crimes]]></category>
                
                
                
                <description><![CDATA[<p>Is this a dating website scam, or am I about to get arrested? As an internet sex crime defense lawyer, I am regularly contacted by people who have found themselves in variations of the following generalized hypothetical situation: “I was on a dating website, or Craigslist, and I met a female who is 26 years-old.&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image"><figure class="aligncenter"><img loading="lazy" decoding="async" src="/static/2023/11/b1_blog_dating-site-scam.jpg" alt="" width="900" height="600" /></figure></div>            <p>Is this a dating website scam, or am I about to get arrested? As an <a href="/">internet sex crime</a> defense lawyer, I am regularly contacted by people who have found themselves in variations of the following generalized hypothetical situation:</p><p>“I was on a dating website, or Craigslist, and I met a female who is 26 years-old. Her profile indicated she was 26 and she told me she was 26 in our online chats. I had no reason to disbelieve her regarding her age and everything appeared completely legitimate. Well, we hit it off and communicated online for a period of weeks. We spent time chatting and exchanged photos. Some of the photos sent were in various states of undress.</p><p>Well, to my dismay, I was just contacted by a person who claims to be her father. I was shocked to learn from him that she is not 26, but is apparently only 16!?!? He is extremely upset and aggressive. He says she has been traumatized by these events and has sustained expenses in the form of medical and psychiatric bills. He says if I don’t send him money to pay the expenses, he will go to the police and have me arrested. He has all of my information, including pictures I sent and the chats engaged in. He wants me to make payments via gift cards or money orders. What should I do? By the way, I am married and employed and I don’t want anyone to know about this! What should I do?!?!?”</p><p>The frequency of these types of inquiries are indicative of the success this scam must be achieving. Unlike many scams, this one is likely particularly effective as it creates a great deal of fear, anxiety and uncertainty in the individual who falls prey to it.</p><p>The following questions typically arise:</p><ul class="wp-block-list"><li>Is this a scam, or, is this real?</li><li><a href="/internet-crimes/">Did I commit a crime?</a> Is there real criminal exposure? Or, is this just someone trying to make a quick buck?</li><li>What information does this other person or group of people have?</li><li>Is my employer going to find out about this? What about my co-workers?</li><li>Will my family and friends find out about this situation?</li><li>What is going to happen to the content that was transmitted? What about the photos that were sent out?</li><li>If I send the money, or gift cards and money orders, will this all go away?</li><li>Can I go to the police or law enforcement to address this? But if I go, will I be the one who gets in trouble even though I don’t believe I did anything wrong?</li><li>Am I in danger?</li></ul><p>If I pay the money that is being demanded, how do I know the other person will not come back and request more? Is paying the money even legal for me to do? Is it legal for them to request?</p><p>If I pay the money, can law enforcement still get involved and arrest me?</p><p>These are legitimate and real questions that often arise in these situations. Often, individuals who find themselves in these circumstances do not know where to turn, or who to consult. Further, the stress, anxiety and panic often overwhelms their decision-making process.</p><p>As an <a href="/">internet sex crime defense attorney</a>, I have represented many individuals who have found themselves in these types of situations. There are generally many steps to the representation in order to achieve the best outcome possible.</p>
<h3 class="wp-block-heading">How To Handle Internet Sex Crimes</h3>
<p>First, it is important to understand the client’s background, history and characteristics. Next, a comprehensive understanding as to the history with the alleged dating site “victim”, if any. Then, a determination must be made as to whether the information points to this situation being a scam, or something that may be a real situation with a potential real victim associated therewith and the potential criminal or civil liability that may be forthcoming. Finally, a determination as to what exposure, if any, the client may have.</p><p>Once all of the information is conveyed, reviewed and understood, a strategy tailored to the client’s circumstances and goals can developed and implemented. Since every individual presents with unique circumstances, it is important to develop an effective strategy geared towards the specific details of each matter.</p><p>If you, or someone you know, believes they may be the victim or target of an online dating scam, please contact The Frey Law Firm for a <a href="/">free initial consultation</a> with <a href="/">Internet Sex Crime Lawyer</a> Ron Frey.</p>                           ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Packingham v. North Carolina: Registration, Social Media and the First Amendment]]></title>
                <link>https://www.internetcrime.com/news/packingham-v-north-carolina-registration-social-media-and-the-first-amendment/</link>
                <guid isPermaLink="true">https://www.internetcrime.com/news/packingham-v-north-carolina-registration-social-media-and-the-first-amendment/</guid>
                <dc:creator><![CDATA[The Frey Law Firm, LLC Team]]></dc:creator>
                <pubDate>Mon, 19 Jun 2017 20:28:03 GMT</pubDate>
                
                    <category><![CDATA[News]]></category>
                
                
                    <category><![CDATA[internet sex crimes]]></category>
                
                
                
                <description><![CDATA[<p>In Packingham v. North Carolina, the Supreme Court unanimously struck down a North Carolina law that made it a felony for registered sex offenders to engage in certain internet activity. The court stressed that the “sweeping law” would bar those on the registration from visiting sites such as Facebook & Twitter, but also a multitude&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image"><figure class="aligncenter"><img loading="lazy" decoding="async" src="/static/2023/11/ce_blog_packingham-v-north-carolina.jpg" alt="" width="884" height="600" /></figure></div>            <p>In Packingham v. North Carolina, the Supreme Court unanimously struck down a North Carolina law that made it a felony for registered sex offenders to engage in certain internet activity.</p><p>The court stressed that the “sweeping law” would bar those on the registration from visiting sites such as Facebook & Twitter, but also a multitude of sites ranging from Amazon to WebMD, as well as the sites of many media outlets. This has the effect of broadly preventing the engagement of first amendment speech, without advancing the state’s goal of protecting the public from recidivist offenders.</p><p>The court recognized that social media plays a vital role in our society and noted that “Even convicted criminals—and in some instances especially convicted criminals—might receive legitimate benefits from these means for access to the world of ideas, in particular if they seek to reform and to pursue lawful and rewarding lives.”</p>                           ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Should I Provide My Password to the Police or FBI? : Encryption, Passwords & the Law]]></title>
                <link>https://www.internetcrime.com/news/should-i-provide-my-password-to-the-police-or-fbi-encryption-passwords-the-law/</link>
                <guid isPermaLink="true">https://www.internetcrime.com/news/should-i-provide-my-password-to-the-police-or-fbi-encryption-passwords-the-law/</guid>
                <dc:creator><![CDATA[The Frey Law Firm, LLC Team]]></dc:creator>
                <pubDate>Fri, 24 Mar 2017 20:17:45 GMT</pubDate>
                
                    <category><![CDATA[News]]></category>
                
                
                    <category><![CDATA[digital evidence]]></category>
                
                    <category><![CDATA[internet sex crimes]]></category>
                
                
                
                <description><![CDATA[<p>According to reports, a recent survey revealed that the average person has over 27 different passwords for their online accounts. With the rise of applications for every area of life (banking, e-mail, social media, chipotle), this should come as no surprise. Within the justice system, it is becoming quite common for law enforcement, or other&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image"><figure class="aligncenter"><img loading="lazy" decoding="async" src="/static/2023/11/2b_blog_password.jpg" alt="" width="900" height="600" /></figure></div>            <p>According to reports, a recent survey revealed that the average person has over 27 different passwords for their online accounts. With the rise of applications for every area of life (banking, e-mail, social media, chipotle), this should come as no surprise.</p><p>Within the justice system, it is becoming quite common for law enforcement, or other opposing parties, to seek to gain access to a password-protected device, drive or account. In the context of a criminal investigation or prosecution, what happens when law enforcement desires to gain access to a password-protected device?</p><p>As a criminal defense attorney, I have represented countless individuals who have been the target of an investigation. Oftentimes, before an attorney is involved, law enforcement will confront a suspect and engage in an interview (interrogation). Through investigative techniques, the agents may attempt to solicit pass-codes or passwords from the suspect. (For many reasons I need not go into here, if a person is ever approached by law enforcement in reference to an investigation, I advise that the person contact an attorney prior to engaging in any discussion with the investigators. Please call The Frey Law Firm at (844) 766-3739 if you find yourself in this situation.)</p><p>Despite the fact that there is a constitutional right to remain silent, many, if not most, choose to engage in the interrogation with the investigators. Further, it seems that during the ‘interview’, many, if not most, also provide consent for law enforcement to search their devices or access their various accounts. Oftentimes, suspects will also provide passwords to their computers, phones or accounts.</p>
<h3 class="wp-block-heading">Should I Provide My Password to the Police?</h3>
<p><em>You have a right to remain silent.</em> The 5th Amendment to the United States Constitution provides that no person shall be compelled in any criminal case to be a witness against himself. If you arrive at a point where law enforcement is inquiring about a specific password, it is likely that you have already subjected yourself to the interrogative process. Again, prior to making any statements, my advice is to contact an attorney if you are ever approached by law enforcement regarding an investigation.</p><p>If law enforcement is seeking a specific password, they are likely suspicious of the contents of the device, drive or account. They are likely seeking items of evidentiary value. Providing a password or consenting for law enforcement to conduct a search not only provides them access to the contents contained within the protected device, drive or account, but providing the password, in and of itself, can also be used as evidence to demonstrate that you had:</p><ol class="wp-block-list"><li>Knowledge of the device, drive or account at issue;</li><li>Access; and</li><li>Control</li></ol><p>In addition to evidence of knowledge, access and control, providing a password can also serve as evidence that you have knowledge, access and control of any of the data or contents contained therein. There may be many unknown or unforeseen consequences in light of the avalanche of information that may be contained within a modern device or online account. Of course, if the case proceeds to the courts, the government may attempt to secure an order from a judge to have a person unlock their device. However, that is a different issue that often involves extensive litigation. For instance, <a href="/">courts have ordered defendants to unlock their phones by providing their fingerprint</a>, and more recently, courts have even ordered defendants to provide passwords to encrypted drives. It is likely these rulings will result in continued appellate litigation and may perhaps reach The Supreme Court of the United States.</p>
<h3 class="wp-block-heading">What Is on Your Phone?</h3>
<p>I have represented clients who have been asked by law enforcement to provide a password in order to access the contents of their smartphone. In many cases, the client is rather confident that there is no evidence of any crime or wrongdoing contained within the device. However, it is important to understand the vast amount of data that can be contained within a smartphone. First, it is not simply a smartphone, modern phones are computers and can often store 100’s of gigabytes worth of data. It is not possible to know all of the information that may be within a person’s phone without a full forensic examination. Whether it is call histories, text messages, emails, cache files, location histories, web browsing history, photos, videos, audio recordings, it is not always apparent what information may be on the device and, more importantly, what information may be relevant to law enforcement. For instance, perhaps a forensic exam of the phone would reveal that the suspect was at a particular location at a specific time. That single piece of metadata may be the most important piece of evidence a prosecutor intends to rely upon in order to convict. Alternatively, perhaps there is a specific account that was logged into on the phone and data within the phone demonstrates a login. This information can then be used to attempt to link a specific account to the suspect. The hypotheticals are nearly infinite. What is apparent is that the typical device can contain a wide variety of information with possible evidentiary value and the user may not even realize it. In fact, the user may be totally innocent of any wrongdoing, but digital evidence may point toward the user as a suspect engaged in criminal activity.</p>
<h3 class="wp-block-heading">What to Do if the Police or Fbi Requests Your Username or Password?</h3>
<p>As with any inquiry by law enforcement, you have a right to remain silent. It is generally advisable to exercise your right to remain silent and contact an experienced criminal defense lawyer for advice. There may be rare instances where providing consent is appropriate. However, it is best to seek the advice of counsel first, prior to making such a significant and generally irreversible decision.</p><p><a href="/">The Frey Law Firm</a> has offices in Florida, North Carolina and Ohio. Attorney Ron Frey is licensed in Florida, North Carolina and Ohio and has also represented clients in matters involving digital evidence in multiple other jurisdictions around the country, via pro hac vice admission.</p><p>If you or someone you know has been contacted by law enforcement regarding a username, password, encrypted device, drive or account, please do not hesitate to <a href="/">contact Criminal Defense Attorney Ron Frey and The Frey Law Firm, PLLC</a> for a free initial consultation at (844) 766-3739.</p>                           ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Federal Court Orders Woman to Unlock iPhone With Her Finger]]></title>
                <link>https://www.internetcrime.com/news/federal-court-orders-woman-to-unlock-iphone-with-her-finger/</link>
                <guid isPermaLink="true">https://www.internetcrime.com/news/federal-court-orders-woman-to-unlock-iphone-with-her-finger/</guid>
                <dc:creator><![CDATA[The Frey Law Firm, LLC Team]]></dc:creator>
                <pubDate>Mon, 02 May 2016 19:43:02 GMT</pubDate>
                
                    <category><![CDATA[News]]></category>
                
                
                    <category><![CDATA[digital evidence]]></category>
                
                    <category><![CDATA[internet sex crimes]]></category>
                
                    <category><![CDATA[news]]></category>
                
                
                
                <description><![CDATA[<p>Fresh off the controversy surrounding the FBI and the DOJ’s legal battle over the iPhone at the center of the San Bernardino investigation, a federal judge has authorized a warrant that reportedly orders a woman to unlock her iPhone with her fingerprint. The identity theft suspect in the case is required, per the warrant, to&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image"><figure class="aligncenter"><img loading="lazy" decoding="async" src="/static/2023/11/ca_blog_unlock-phone.jpg" alt="" width="900" height="600" /></figure></div>            <p>Fresh off the controversy surrounding the FBI and the DOJ’s legal battle over the iPhone at the center of the San Bernardino investigation, a federal judge has authorized a warrant that reportedly orders a woman to unlock her iPhone with her fingerprint. The identity theft suspect in the case is required, per the warrant, to comply with the request. According to media reports, it remains unclear why the authorities are interested in the content of the phone. With the continued advances in encryption and security, it is expected that litigation over these issues will continue to evolve, as well as the case law associated therewith.</p>
<h3 class="wp-block-heading">Smartphones & the 4th Amendment</h3>
<p>It is often said that a “man’s house is his castle” and the 4th Amendment is explicit in protecting the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches. Today, there may be no “effect” more sacrosanct than a person’s smartphone or iPhone. A person’s phone can contain the most private and intimate details of a person’s life:</p><ul class="wp-block-list"><li>family photos</li><li>geolocation data</li><li>financial information</li><li>hobbies, interests</li><li>religious beliefs</li><li>political perspectives</li><li>friends</li><li>communications</li><li>health</li><li>business documentation …… and the list goes on and on.</li></ul>
<h3 class="wp-block-heading">Today, a Forensic Examination of a Person’s Phone May Be Considered More Intrusive Than a Thorough Search of Person’s Home.</h3>
<p>Expect continued litigation and debate. The battle between the right to be secure in their effects against unreasonable searches, the right to remain silent and the right to not be compelled to incriminate oneself will continually the ability of the government to investigate criminal activity intensifies. The principals that have guided 4th Amendment jurisprudence for centuries can be applied to the ever-changing landscape of digital technology and encryption. However, there will be “hard cases” and “hard cases make bad law.” For instance, precedent set from a decision involving a terror suspect can, and most certainly would, be applied in other, relatively less serious and controversial cases, as well as in other ways that are simply not foreseeable. Whether it is an order to provide access to a phone via a fingerprint, a pass code, or a retina scan, the implications are serious for the government, the individual suspect and society as a whole.</p>                           ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Investigations of Online Sex Crimes]]></title>
                <link>https://www.internetcrime.com/news/investigations-of-online-sex-crimes/</link>
                <guid isPermaLink="true">https://www.internetcrime.com/news/investigations-of-online-sex-crimes/</guid>
                <dc:creator><![CDATA[The Frey Law Firm, LLC Team]]></dc:creator>
                <pubDate>Wed, 13 Apr 2016 19:21:56 GMT</pubDate>
                
                    <category><![CDATA[News]]></category>
                
                
                    <category><![CDATA[internet sex crimes]]></category>
                
                
                
                <description><![CDATA[<p>With the prevalence of technology, law enforcement officials today are devoting a significant amount of resources into investigating sex crimes on the internet and over social media. Law enforcement officials are currently employing efforts to monitor social networks, social media, peer-to-peer file sharing programs, forums, and more. Common ways that law enforcement officials identify alleged&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image"><figure class="aligncenter"><img loading="lazy" decoding="async" src="/static/2023/11/45_blog_investigations-of-online-sex-crimes.jpg" alt="" width="900" height="600" /></figure></div>            <p>With the prevalence of technology, law enforcement officials today are devoting a significant amount of resources into investigating sex crimes on the internet and over social media. Law enforcement officials are currently employing efforts to monitor social networks, social media, peer-to-peer file sharing programs, forums, and more.</p><p>Common ways that law enforcement officials identify alleged online offenders:</p><ul class="wp-block-list"><li>Creating a fake online profile, which is then be used to communicate with potential suspects</li><li>Monitoring file sharing offerings over peer to peer (p2p) networks</li><li>Overtaking websites that contain contraband in order to monitor visitors to the site</li></ul>
<h3 class="wp-block-heading">Complexity of Online Sex Crime Investigations</h3>
<p>Once law enforcement officials identify a suspect, the online investigation can yield a vast amount of digital evidence, which can make it difficult to manage and even harder to interpret. The burden of proof is on the government and the investigators must forensically process and understand the evidence against the charged individual or organization.</p><p>It is always important to consult an attorney if you are under investigation or arrested for an internet sex crime charge or computer crime. The Frey Law Firm, PLLC has substantial experience defending clients charged with internet sex crimes, and can work with forensic experts to help defend you against any allegations you may be faced with. Contact the firm today!</p>                           ]]></content:encoded>
            </item>
        
    </channel>
</rss>