Tag: Virginia Computer Crimes

  • Lambert v. Commonwealth

    CISO Legal Case Summary: The case Kevin Lamont Lambert v. Commonwealth of Virginia involves Kevin L. Lambert’s appeal of his convictions for various offenses, including possession and distribution of controlled substances, possession of a firearm while possessing a controlled substance, receiving money from prostitution, and sex trafficking. Lambert raised three main issues on appeal. KEY POINTS: This…

  • Barson v. Commonwealth Of Va.

    CISO Legal Case Summary: The case Dennis B. Barson, Jr. v. Commonwealth of Virginia involves Dennis B. Barson’s conviction for harassment by computer, in violation of Virginia law. Barson appealed, challenging the venue and the sufficiency of evidence regarding the obscenity of emails he sent to his estranged wife. KEY POINTS: This case highlights the legal standards…

  • Brooker v. Commonwealth

    CISO Legal Case Summary: The case James Gangga Brooker v. Commonwealth of Virginia involves the conviction of James Gangga Brooker for attempting to take indecent liberties with a child and using a communications system to solicit a minor for sexual acts. Brooker appealed, arguing that the evidence was insufficient to support his convictions. KEY POINTS: This case…

  • Kenner v. Commonwealth

    CISO Legal Case Summary: The case Lenny Rock Kenner v. Commonwealth of Virginia involves the appeal of Lenny Rock Kenner’s convictions for animate object sexual penetration, aggravated sexual battery, and custodial sexual abuse. Kenner challenged the admissibility of child pornography evidence and the denial of his request to poll the jury individually on its guilty verdict. KEY…

  • Colbert v. Commonwealth

    CISO Legal Case Summary: The case James Warren Colbert v. Commonwealth of Virginia involves the conviction of James Warren Colbert for computer solicitation of a minor for sex, in violation of Virginia law. The primary issue on appeal was whether Colbert was required to register as a sex offender, given that his solicitations were directed at an…

  • La Bella Dona Skin Care, Inc. v. Belle Femme Enters., LLC

    CISO Legal Case Summary: The case La Bella Dona Skin Care, Inc. v. Belle Femme Enterprises, LLC, et al. involves a civil action where La Bella Dona Skin Care, Inc. (LBD) sought damages and injunctive relief against several defendants, including former employees and their associated businesses, for allegedly fraudulent conveyances designed to avoid an outstanding judgment in…

  • Perk v. Vector Resources Group, Ltd.

    CISO Legal Case Summary: The case Leo J. Perk v. Vector Resources Group, Ltd., et al. involves an appeal by Leo J. Perk, a practicing attorney, against Vector Resources Group, Charles Michael Monahan, and the law firm Sheffield & Bricken, P.C. The appeal addresses whether the trial court erred in sustaining the defendants’ demurrer to Perk’s motion…

  • Brewer v. Commonwealth

    CISO Legal Case Summary: The case Cody W. Brewer v. Commonwealth of Virginia involves the conviction of Cody W. Brewer for computer fraud under Virginia law. Brewer was accused of using his smartphone to make unauthorized transfers from his grandmother’s bank account to his own accounts. The central issue on appeal was whether Brewer’s smartphone qualified as…

  • Jaynes v. Commonwealth

    CISO Legal Case Summary: The case Jeremy Jaynes v. Commonwealth of Virginia involves the conviction of Jeremy Jaynes for sending unsolicited bulk emails, commonly known as spam, in violation of Virginia’s anti-spam statute, [Code § 18.2-152.3:1]. Jaynes was convicted for sending over 10,000 emails within a 24-hour period on multiple occasions, using falsified routing information to disguise…

  • Wallace v. Commonwealth

    CISO Legal Case Summary: The case of Taylor Amil Wallace v. Commonwealth of Virginia revolves around the interpretation of the computer fraud statute under Virginia law. Wallace was initially convicted of computer fraud, among other charges, after depositing forged checks into her bank account using an ATM. The key legal question was whether Wallace’s use of the…