SlideShare a Scribd company logo
1 of 8
E X P L A I N I N G
C Y B E R C R I M E I N
N E VA D A
Similar to what you see in popular media,
cybercrime consists primarily of hacking, which is
the act of intruding to a private computer or
network with the goal to take information, interrupt
processes, and ultimately harm other people.
Although hacking is a federal crime, not all
computers are covered by hacking laws. Usually,
it is when you hack government-owned networks
that you are committing a crime and is subject to
hacking criminal charges.
It is the time to be alarmed about hacking and
cybercrime as a whole as their prevalence might
affect you badly in the future.
Read below to learn more.
What constitutes as hacking?
With extensive knowledge and the right equipment, any person can hack. Hacking is primarily entering a
system uninvited with the purpose of taking, copying, hiding, altering, and transferring files or
information. You are on your way to being incriminated if the computer or the network that you are
hacking is privately-owned, without your affiliation, or something that you do not have any permission to
touch at all. Hacking is the precursor of cybercrimes such as theft, fraud, funds transfer, and general
exploitation of private information.
You might be wondering: are there penalties for playfully hacking your friend’s email?
Well, not every hacking act is with malicious intent—there are hackers who hack to test the security of
the system or find and eradicate unwanted bugs in the network. This is called ethical hacking and it can
be a profession that companies can hire to identify their vulnerabilities. However, to be an ethical hacker,
you need to follow certain regulations such as taking certification from The International Council of E-
commerce Consultants (ICEC).
What are some other computer crimes?
Aside from what we have already listed above, computer crimes can also be intentionally shutting servers
down to interrupt operations, electronic money laundering, and spam. Unfortunately, there are a lot of crimes
you can do with your computer and not everything is wide-scale. Depending on your situation, you are already
doing crime if you are intentionally putting a virus on a computer. This might seem minor compared to the
other crimes but because it affects important systems or costs damages, you can be arrested.
What are the penalties for cybercrime in Nevada?
For a cybercrime with misdemeanor, a defendant can be charged with:
 1 year prison time
 Fines of up to $1,000
When the cybercrime becomes too extensive (like when there is an evident intent to scheme) and when
there are more than $500 in damages, as well as when government operations have been disrupted, you
can be charged as a Category C felony in the state. This usually includes penalties of:
 1 to 5 years in prison
 Fines of at least $100,000
 Reinstitution to the victims of cybercrime
What are the penalties for cybercrime in Nevada?
If you use government computers or if your cybercrime has the interest of the government then you will
most likely be charged with the penalties of the federal law:
• 1 to 20 years in prison
• Fines
• Reinstitution to the government or the victims
Talk with a criminal defense attorney to learn more about the penalties that can await you with cybercrime.
What defenses can you use against
cybercrime?
Cybercrime is a tricky case to be involved in.
Fortunately, a person cannot be charged without
evidence, and cybercrime evidences can be rare or
fleeting since most of them are digital or online.
If you are falsely accused of cybercrime, you can utilize
defenses such as:
• You are authorized to do the logging or hacking to
the system
• There are witnesses who can place you out of the
time of the crime or there are login evidence to show
that you did not hack or login
• You are under duress or coercion (your life is
threatened)
• Hacking was done by mistake and you have no
sufficient knowledge to carry out the deed
• You were mistaken for someone else
• There are no evidences of fraud or violations that
were being pressed unto you
Hackers might not directly attack you but when they
target government networks, your personal data will
also be in trouble. And due to the struggle to identify
perpetrators, a link to you might lead to unlawful arrest.
It is recommended that you familiarize yourself with the
Nevada Revised Statutes or NRS on cybercrime
matters.
L a s V e g a s C r i m i n a l D e f e n s e A t t o r n e y R o s s
G o o d m a n
5 2 0 S 4 t h S t , L a s V e g a s , N V 8 9 1 0 1 , U S A
( 7 0 2 ) 3 8 3 - 5 0 8 8

More Related Content

What's hot (19)

Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990
 
Ecommerce darknet
Ecommerce darknetEcommerce darknet
Ecommerce darknet
 
Prekaj Cybercrime By the Italian Team
Prekaj Cybercrime  By the Italian TeamPrekaj Cybercrime  By the Italian Team
Prekaj Cybercrime By the Italian Team
 
computer crime
computer crimecomputer crime
computer crime
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Digital law
Digital lawDigital law
Digital law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Digital law
Digital lawDigital law
Digital law
 
digital law
digital lawdigital law
digital law
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Eset cybersecurity awareness (laxman giri)
Eset cybersecurity awareness (laxman giri)Eset cybersecurity awareness (laxman giri)
Eset cybersecurity awareness (laxman giri)
 

Similar to Explaining Cybercrime in Nevada (20)

87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

More from Goodman Criminal Defense Attorney

More from Goodman Criminal Defense Attorney (20)

Substance Abuse and Domestic Violence
Substance Abuse and Domestic ViolenceSubstance Abuse and Domestic Violence
Substance Abuse and Domestic Violence
 
Financial Abuse: The Overlooked Form of Domestic Violence
Financial Abuse: The Overlooked Form of Domestic ViolenceFinancial Abuse: The Overlooked Form of Domestic Violence
Financial Abuse: The Overlooked Form of Domestic Violence
 
Sealing Las Vegas DUI Records
Sealing Las Vegas DUI RecordsSealing Las Vegas DUI Records
Sealing Las Vegas DUI Records
 
Malicious Mischief in USC
Malicious Mischief in USCMalicious Mischief in USC
Malicious Mischief in USC
 
Embezzlement: What happens to Stolen or Embezzled Property?
Embezzlement: What happens to Stolen or Embezzled Property?Embezzlement: What happens to Stolen or Embezzled Property?
Embezzlement: What happens to Stolen or Embezzled Property?
 
Nevada DUI Penalties for Serious Injury and Death
Nevada DUI Penalties for Serious Injury and DeathNevada DUI Penalties for Serious Injury and Death
Nevada DUI Penalties for Serious Injury and Death
 
5 Types of Internet Sex Crimes
5 Types of Internet Sex Crimes5 Types of Internet Sex Crimes
5 Types of Internet Sex Crimes
 
US Federal Arson Laws
US Federal Arson LawsUS Federal Arson Laws
US Federal Arson Laws
 
Possessing Drug Paraphernalia in Nevada
Possessing Drug Paraphernalia in NevadaPossessing Drug Paraphernalia in Nevada
Possessing Drug Paraphernalia in Nevada
 
Domestic Violence - Elder Abuse in Nevada
Domestic Violence - Elder Abuse in NevadaDomestic Violence - Elder Abuse in Nevada
Domestic Violence - Elder Abuse in Nevada
 
Wildlife Crimes: Offenses Involving Plants and Animals
Wildlife Crimes: Offenses Involving Plants and AnimalsWildlife Crimes: Offenses Involving Plants and Animals
Wildlife Crimes: Offenses Involving Plants and Animals
 
Out-of-State DUI for Las Vegas Tourists
Out-of-State DUI for Las Vegas TouristsOut-of-State DUI for Las Vegas Tourists
Out-of-State DUI for Las Vegas Tourists
 
Robbery Laws in Las Vegas
Robbery Laws in Las VegasRobbery Laws in Las Vegas
Robbery Laws in Las Vegas
 
DUI Under 18
DUI Under 18DUI Under 18
DUI Under 18
 
Domestic Violence: Child Abuse in NV
Domestic Violence: Child Abuse in NVDomestic Violence: Child Abuse in NV
Domestic Violence: Child Abuse in NV
 
Commercial DUI in Nevada
Commercial DUI in NevadaCommercial DUI in Nevada
Commercial DUI in Nevada
 
5 UFC Fighters Accused of Doping
5 UFC Fighters Accused of Doping5 UFC Fighters Accused of Doping
5 UFC Fighters Accused of Doping
 
Nevada Drug Laws: Drug Crimes According to NRS
Nevada Drug Laws: Drug Crimes According to NRSNevada Drug Laws: Drug Crimes According to NRS
Nevada Drug Laws: Drug Crimes According to NRS
 
13 Major Federal Crimes in USA
13 Major Federal Crimes in USA13 Major Federal Crimes in USA
13 Major Federal Crimes in USA
 
Embezzlement Definition According to NRS
Embezzlement Definition According to NRSEmbezzlement Definition According to NRS
Embezzlement Definition According to NRS
 

Recently uploaded

LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881mayurchatre90
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxca2or2tx
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfPoojaGadiya1
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxPSSPRO12
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 

Recently uploaded (20)

LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 

Explaining Cybercrime in Nevada

  • 1. E X P L A I N I N G C Y B E R C R I M E I N N E VA D A
  • 2. Similar to what you see in popular media, cybercrime consists primarily of hacking, which is the act of intruding to a private computer or network with the goal to take information, interrupt processes, and ultimately harm other people. Although hacking is a federal crime, not all computers are covered by hacking laws. Usually, it is when you hack government-owned networks that you are committing a crime and is subject to hacking criminal charges. It is the time to be alarmed about hacking and cybercrime as a whole as their prevalence might affect you badly in the future. Read below to learn more.
  • 3. What constitutes as hacking? With extensive knowledge and the right equipment, any person can hack. Hacking is primarily entering a system uninvited with the purpose of taking, copying, hiding, altering, and transferring files or information. You are on your way to being incriminated if the computer or the network that you are hacking is privately-owned, without your affiliation, or something that you do not have any permission to touch at all. Hacking is the precursor of cybercrimes such as theft, fraud, funds transfer, and general exploitation of private information. You might be wondering: are there penalties for playfully hacking your friend’s email? Well, not every hacking act is with malicious intent—there are hackers who hack to test the security of the system or find and eradicate unwanted bugs in the network. This is called ethical hacking and it can be a profession that companies can hire to identify their vulnerabilities. However, to be an ethical hacker, you need to follow certain regulations such as taking certification from The International Council of E- commerce Consultants (ICEC).
  • 4. What are some other computer crimes? Aside from what we have already listed above, computer crimes can also be intentionally shutting servers down to interrupt operations, electronic money laundering, and spam. Unfortunately, there are a lot of crimes you can do with your computer and not everything is wide-scale. Depending on your situation, you are already doing crime if you are intentionally putting a virus on a computer. This might seem minor compared to the other crimes but because it affects important systems or costs damages, you can be arrested.
  • 5. What are the penalties for cybercrime in Nevada? For a cybercrime with misdemeanor, a defendant can be charged with:  1 year prison time  Fines of up to $1,000 When the cybercrime becomes too extensive (like when there is an evident intent to scheme) and when there are more than $500 in damages, as well as when government operations have been disrupted, you can be charged as a Category C felony in the state. This usually includes penalties of:  1 to 5 years in prison  Fines of at least $100,000  Reinstitution to the victims of cybercrime
  • 6. What are the penalties for cybercrime in Nevada? If you use government computers or if your cybercrime has the interest of the government then you will most likely be charged with the penalties of the federal law: • 1 to 20 years in prison • Fines • Reinstitution to the government or the victims Talk with a criminal defense attorney to learn more about the penalties that can await you with cybercrime.
  • 7. What defenses can you use against cybercrime? Cybercrime is a tricky case to be involved in. Fortunately, a person cannot be charged without evidence, and cybercrime evidences can be rare or fleeting since most of them are digital or online. If you are falsely accused of cybercrime, you can utilize defenses such as: • You are authorized to do the logging or hacking to the system • There are witnesses who can place you out of the time of the crime or there are login evidence to show that you did not hack or login • You are under duress or coercion (your life is threatened) • Hacking was done by mistake and you have no sufficient knowledge to carry out the deed • You were mistaken for someone else • There are no evidences of fraud or violations that were being pressed unto you
  • 8. Hackers might not directly attack you but when they target government networks, your personal data will also be in trouble. And due to the struggle to identify perpetrators, a link to you might lead to unlawful arrest. It is recommended that you familiarize yourself with the Nevada Revised Statutes or NRS on cybercrime matters. L a s V e g a s C r i m i n a l D e f e n s e A t t o r n e y R o s s G o o d m a n 5 2 0 S 4 t h S t , L a s V e g a s , N V 8 9 1 0 1 , U S A ( 7 0 2 ) 3 8 3 - 5 0 8 8