Skip to content
Menu
COMPUTER CRIMINAL LAW

Criminal Lawyer with Technical Background in Cybercrime and Banking Fraud

Digital evidence is volatile. A criminal lawyer with technical training makes the difference.
Defence strategies for phishing and crypto asset fraud.

Key takeaways

  • Digital evidence is volatile. Chats, transaction logs and metadata must be preserved immediately — every hour counts.
  • Attribution in cybercrime is never automatic: CGNAT, shared IPs, compromised accounts and spoofed identities all require technical scrutiny.
  • Blockchain transactions are traceable. If stolen funds reach a regulated exchange, a judicial freeze may be available — subject to jurisdiction and evidence.
  • If your devices were seized, you have the right to have a party-appointed digital forensic expert oversee the extraction.
  • Filing a criminal complaint establishes a legal record — critical for victims of identity theft (WhatsApp, email, social media).

If there is a detention or an emergency at the police station: go directly to 24-hour Bail & Release.

Digital Forensic Engineering applied to your Defence

Cybercrime leaves digital traces — logs, IP addresses, metadata. At Selser, Testa & Asoc., we combine criminal defence strategy with technical expertise to:

  • Trace funds on the blockchain.
  • Request IP address ownership details from internet service providers (ISPs).
  • Analyse email headers and metadata.

Fraud modalities and strategies

Banking fraud (phishing / online banking)

If your credentials were stolen or loans were taken out without your consent, we analyse whether the bank may be liable for security failures or inadequate authentication.

We initiate administrative and judicial claims to seek recovery of funds, cancellation of fraudulent loans and blocking of further unauthorised debits.

Read guide: bank liability and relevant case law

Cryptocurrency (Binance, Lemon and others)

Crypto asset fraud is not always anonymous. Blockchain traceability can be used to attempt to follow the movement of funds. Traceability improves if the funds pass through a regulated exchange; with cold wallets it is more complex.

We apply for precautionary measures: asset freezes and account freezes, court orders to exchanges to preserve KYC records and transaction history, and we combine the criminal route with civil claims.

Cloned or stolen cards

We act both for victims (unrecognised transactions) and for those wrongly charged with using stolen cards. We analyse POS logs, CCTV footage, geolocation data and fingerprint examination to reconstruct the case.

Digital Emergency Protocol

DO NOT DELETE ANYTHING:
Chats, emails and transaction records are your only evidence. Every message may be critical.

Step 1: Preservation

We certify digital content via cryptographic hash and/or notarised record, so that the evidence is valid and cannot be challenged on grounds of alteration.

Step 2: Technical complaint

We draft the criminal complaint using both technical and legal language: we request court orders to banks, digital wallets, ISPs, Google and Meta to preserve logs before they are deleted.

Step 3: Recovery strategy

We combine the criminal route with administrative claims to attempt to recover funds and restore your credit history.

CONTACT AN EXPERT

To see how courts have decided cases similar to yours, visit our Criminal Case Law Library — Cybercrime and Digital Evidence

First 24 hours after the fraud: basic protocol

  • Block access: online banking, apps, cards and digital wallets.
  • Do not delete anything: chats, emails, SMS messages and notifications are your evidence.
  • Contact the bank and platforms: request an urgent block and obtain a claim reference number.
  • Technical and legal advice: we file the complaint in language that allows the prosecutor to understand the digital scheme and request the correct forensic examinations.

Accused person’s defence: validity of digital evidence

If you are charged with a computer offence — grooming, computer damage, unlawful access — the defence is technical. We challenge the chain of custody, the integrity of seized storage media and the attribution of shared IP addresses (CGNAT).

Technical background

Dr. Jacobo Iván Selser
Law & Engineering

VIEW PROFILE

Frequently asked questions

If you were the victim of unauthorised access (phishing or malware), the bank may be liable depending on the transaction, the authentication system and the evidence in the case. We initiate administrative and judicial claims to seek recovery of funds and cancellation of fraudulent loans.

Blockchain tracing is possible using traceability tools, but final identification depends on the destination. Traceability improves if the funds pass through a regulated exchange; with cold wallets it is more complex. If the funds touch an exchange, we apply for a judicial freeze.

Alert your contacts immediately. From a legal standpoint, it is vital to file a criminal complaint to put on record that you are not the perpetrator of those frauds — and to avoid future legal consequences if your identity is used to commit offences against third parties.

You must urgently instruct a specialist criminal lawyer. It is essential to oversee the computer forensic examination (forensic copy) of your devices to ensure that write-blocking is respected and that the original evidence is not altered.
Cybercrime & Fraud Defence
Hello! If you are involved in a cybercrime or fraud case — as a victim or as the accused — we can help. Digital evidence is volatile: early advice makes a real difference.
Lawyer
CONFIDENTIAL ENQUIRY