chicago defense lawyerWhether you have heard this type of scheme referred to as “phishing” or not, you are likely familiar with the scheme itself. “Phishing” involves pretending to be someone else in order to gain access to sensitive information. While no specific federal statute criminalizes phishing specifically, phishing is a common precursor to other internet crimes, like identity theft and wire fraud. If you are facing a criminal charge as a result of a phishing scheme, you should make securing strong legal representation your top priority. 

What is Phishing? 

Phishing is when a scammer sends an email or makes a phone call impersonating someone else in an effort to gain access to sensitive information. One common example of a phishing scheme is when someone sends out a mass email pretending to be from a bank and asking recipients to turn over personal information, such as their social security number or account numbers. The phisher then uses that fraudulently obtained information to steal the victim’s identity. 

Corporations are common targets in phishing schemes as well. Criminals attempting to gain access to trade secrets or corporate accounts may impersonate corporate officials, call employees asking for login information, or instruct them to send money. Phishers hope that employees will simply comply with a request they believe is coming from their boss. 

Illionois defense attorney, Illinois federal crimes lawyer, Illinois criminal defense lawyerOn November 2, 1988, a cyber worm was disseminated on the Internet from a computer at the Massachusetts Institute of Technology. Thirty years ago, the Internet was a different place; there were only 60,000 computers online, most of them at prestigious colleges and universities or research centers. Of those, 6,000 computers were infected over the course of 24 hours. The worm hit computers running a certain version of the Unix operating system. Infected computers began to run very slowly with many vital functions delayed for days. It was hard to ascertain the amount of monetary damages caused. Estimates ranged from $100,000 to millions of dollars. Who was behind this first-of-its-kind attack? A 23-year-old programmer named Robert Tappan Morris from Cornell. Morris hacked into the MIT computer system from Cornell to cover his tracks. Morris maintained that the worm was more of a test and that he surprised himself at how quickly it spread. He tried to issue a statement through a friend with details on how to remove the worm, but ironically, the message could not be disseminated due to the slowness of the Internet for those affected. Federal prosecutors charged Morris with the 1986 Computer Fraud and Abuse Act, and he was the first person found guilty under the law. Morris did not have to go to jail. Instead, he was sentenced to probation, a fine and 400 hours of community service. It is said that the Morris Worm has served as inspiration for generations of computer hackers. Indeed, the weaponization of the internet has become more sophisticated over the last 30 years. As hackers’ attacks have become more potent and the number of Internet users has skyrocketed, the federal government has because more involved in catching hackers and charging them with crimes.

Contact a Chicago, IL Internet Crimes Defense Lawyer

Those accused of cyber crimes need a criminal defense attorney who is well-versed in federal law, who understands the latest in technology and who has a network of experts who can aid the court in understanding your defense. An experienced Chicago, IL federal crimes defense attorney is ready to review your case and determine your best defenses.

Because of our attorney’s years of experience in criminal defense in the federal court system, he also is knowledgeable on plea deals and negotiating with prosecutors. Call our office today at 312-629-0669 to set up a free consultation.



Illionois defense attorney, Illinois federal crimes lawyer, Illinois criminal defense lawyerOctober is National Cybersecurity Awareness Month, which seeks to remind businesses and the public of the crimes that can be perpetrated online and the ways everyone can make the internet more secure. The National Cybersecurity Awareness Month was created in 2004 by the Department of Homeland Security and the National Cyber Security Alliance.

The FBI takes this opportunity to remind the public of major recent federal charges and convictions in the online arena, including:

  • The conviction of an online actor who tried to access university databases to commit fraud and identity theft;
  • Charges against a North Korean regime-backed programmer; and
  • Seventy-four arrests in this country and abroad of members of an international criminal network participating in a plan to infiltrate business email accounts.

“Realistically, we know we can’t prevent every attack, or punish every hacker,” FBI Director Christopher Wray said. Director Wray added that the FBI will continue to build on the initiatives it has in place to ferret out cybercrime and will continue to try to forge new partnerships with tech companies and others to keep the U.S. at the forefront of cybersecurity.


Illinois federal crimes attorney, Illinois internet crimes attorney, Illinois defense lawyer,Internet crime is beyond a doubt troublesome for not only the ordinary individual but also impacts national security. While the majority of citizens utilize the world wide web to complete daily activities, such as shopping, applying for jobs, listening to music or ordering tickets to a show, there is a portion of the population using the information for darker, or even criminal purposes. The Federal Bureau of Investigations (FBI) created the Internet Crime Complaint Center (IC3) to offer a safe avenue for the public to report internet crimes. However, when the public can initiate an investigation into other individuals, problems may occur.

What happens with the information?

The Internet Crime Complaint Center (IC3) has grown from the original entity of the Internet Fraud Center. The name changed due to a number of allegations flooding in, ranging anywhere between hacking to matters involving intellectual property rights. Just about anyone can make a complaint against someone else within the United States, regardless of their citizenship status. No evidentiary support is necessary at the time of the report, either, which means anyone with a personal vendetta can stir up trouble. After initiating a complaint, stopping the process is not an option, even if the initiator shows remorse and admits it is false. The IC3 analyzes the information provided then transfers it to the appropriate department who then proceed with the investigation. Agencies responsible for the case include:

Back to Top