Criminal Lawyer with Technical Background in Cybercrime and Banking Fraud
Digital evidence is volatile. A
criminal lawyer with technical training
makes the difference.
Defence strategies for phishing and crypto asset fraud.
Key takeaways
- Digital evidence is volatile. Chats, transaction logs and metadata must be preserved immediately — every hour counts.
- Attribution in cybercrime is never automatic: CGNAT, shared IPs, compromised accounts and spoofed identities all require technical scrutiny.
- Blockchain transactions are traceable. If stolen funds reach a regulated exchange, a judicial freeze may be available — subject to jurisdiction and evidence.
- If your devices were seized, you have the right to have a party-appointed digital forensic expert oversee the extraction.
- Filing a criminal complaint establishes a legal record — critical for victims of identity theft (WhatsApp, email, social media).
If there is a detention or an emergency at the police station: go directly to 24-hour Bail & Release.
Digital Forensic Engineering applied to your Defence
Cybercrime leaves digital traces — logs, IP addresses, metadata. At Selser, Testa & Asoc., we combine criminal defence strategy with technical expertise to:
- Trace funds on the blockchain.
- Request IP address ownership details from internet service providers (ISPs).
- Analyse email headers and metadata.
Fraud modalities and strategies
Banking fraud (phishing / online banking)
If your credentials were stolen or loans were taken out without your consent, we analyse whether the bank may be liable for security failures or inadequate authentication.
We initiate administrative and judicial claims to seek recovery of funds, cancellation of fraudulent loans and blocking of further unauthorised debits.
Read guide: bank liability and relevant case lawCryptocurrency (Binance, Lemon and others)
Crypto asset fraud is not always anonymous. Blockchain traceability can be used to attempt to follow the movement of funds. Traceability improves if the funds pass through a regulated exchange; with cold wallets it is more complex.
We apply for precautionary measures: asset freezes and account freezes, court orders to exchanges to preserve KYC records and transaction history, and we combine the criminal route with civil claims.
Cloned or stolen cards
We act both for victims (unrecognised transactions) and for those wrongly charged with using stolen cards. We analyse POS logs, CCTV footage, geolocation data and fingerprint examination to reconstruct the case.
Digital Emergency Protocol
Chats, emails and transaction records are your only evidence. Every message may be critical.
Step 1: Preservation
We certify digital content via cryptographic hash and/or notarised record, so that the evidence is valid and cannot be challenged on grounds of alteration.
Step 2: Technical complaint
We draft the criminal complaint using both technical and legal language: we request court orders to banks, digital wallets, ISPs, Google and Meta to preserve logs before they are deleted.
Step 3: Recovery strategy
We combine the criminal route with administrative claims to attempt to recover funds and restore your credit history.
CONTACT AN EXPERTTo see how courts have decided cases similar to yours, visit our Criminal Case Law Library — Cybercrime and Digital Evidence
First 24 hours after the fraud: basic protocol
- Block access: online banking, apps, cards and digital wallets.
- Do not delete anything: chats, emails, SMS messages and notifications are your evidence.
- Contact the bank and platforms: request an urgent block and obtain a claim reference number.
- Technical and legal advice: we file the complaint in language that allows the prosecutor to understand the digital scheme and request the correct forensic examinations.
Accused person’s defence: validity of digital evidence
If you are charged with a computer offence — grooming, computer damage, unlawful access — the defence is technical. We challenge the chain of custody, the integrity of seized storage media and the attribution of shared IP addresses (CGNAT).