San Antonio Criminal Defense Attorney
Law Office of Robert H. Featherston, P.C.
State & Federal Criminal Defense
San Antonio, Texas
Disclaimer: The information contained in this web site is intended to convey general information about The Law Office of Robert H. Featherston, P.C. It should not be construed as legal advice or opinion. It is not an offer to represent you, nor is it intended to create an attorney-client relationship. Any email sent via the Internet to Robert Featherston or The Law Office of Robert H. Featherston, P.C., using email addresses listed in this web site would not be confidential and would not create an attorney-client relationship. Copyright © 2009. All rights reserved. You may reproduce materials available at this site for your own personal use and for non-commercial distribution. All copies must include this copyright statement.
Copyright © 2009 Law Office of Robert H. Featherston, P.C. All rights reserved
Before You Discuss Anything
With Law Enforcement,
Call Me Now.
I Can Help You Preserve
Your Legal Rights!
SERIOUS ALLEGATIONS DEMAND
COMPETENT AND EFFECTIVE
I PROVIDE IT!
Computer & Internet Crimes
The Internet and computer use have become ingrained in American life. As a result, criminal allegations of fraud, identity theft, credit card abuse, online harassment, organized crime . . . and their prosecution have skyrocketed.
A experienced, technical savvy, criminal defense attorney knows that prior to defending the legal elements of one of these allegations,the Government must prove beyond a reasonable doubt the identity of the citizen accused.
As in child pornography cases, attorney's who defend these types of allegations MUST have expertise in the hardware and software operation of computers to include; operating systems, the seven layers of the OSI model, MAC addressing, TCP/IP addressing, port/firewall/router configurations, hard drive formats, slack space - RAM & Drive, allocated/unallocated HD areas, swap files, file properties, encryption schemes, Hashing, VPN, remote storage. . .
An intimate knowledge of how the Internet operates; website/newsgroup/email/domain servers, distributed networks-Limewire - Kazza..., proxies, Internet Service Providers, Dynamic/static IP address assignment, invisible header data/meta data, packet transmission, ping, traceroute, lookup, whois, finger, port scan utilities, computer viruses, worms, trojan horses, rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. . . is an absolute necessity to defend these types of criminal allegations!
Knowledge of the above technical issues is absolutely necessary in issues of "Identity."
My firm possesses the necessary knowledge of the above hardware, software, internet transmission dynamics, forensic collection techniques and the legal issues critical to a successful defense.
STATE COMPUTER & INTERNET CRIMES, My Firm handles all types of State Computer & Internet Crimes, including:
T.P.C. §16.02 Unlawful Interception, Use or Disclosure of Wire, Oral or Electronic Communication
T.P.C. §16.04 Unlawful Access to Stored Communications
T.P.C. §33.02 Breach of Computer Security
T.P.C. §33.07 Online Impersonation
T.P.C. §33A.02 Unauthorized Use of Telecommunications Service
T.P.C. §71.02 Engaging in Organized Criminal Activity
FEDERAL COMPUTER & INTERNET CRIMES, My Firm handles all types of Federal Computer & Internet Crimes, including:
Attention to detail is my watch word !
Total dedication to your case my standard !
You can find no better Law Firm to aggressively represent your interests !
Call me now to arrange an appointment to discuss your case, (210) 279-3711.