As any party that has lost could verify, a client needs more than legal analysis to prevail. Many firms only provide legal analysis. At Wexford Law we not only provide legal analysis, but cyber forensics.
Attorney With Cyber Security Background From Harvard University
Michael Devereux is a highly respected cyber / Internet attorney in Los Angeles. Michael studied cyber security in the masters program at Harvard University and computer science at UCLA, along with a JD at Loyola Law School. Before becoming an attorney, Michael Devereux's computer experience started at the Rand Corporation as an analyst. The Rand Corporation is a global think tank that helps improve policy and decisionmaking through research and analysis. After the Rand Corporation, Michael Devereux continued in computer security for the United States government. Michael has an extensive consulting background in computers and the Internet for Fortune 100 corporations such as Paramount Studios, XEROX, Nestle's, GTE (now Verizon) and Northrop-Gruman. Mr. Devereux has been successfully representing clients for close to 20 years in respect to cyber issues and has published opinions in the Ninth Circuit Court in cases involving the Internet.
Law Enforcement Resources Are Limited
The anonymity of the Internet generates a haven for those who perpetrate their deception by disappearing into cyberspace, often disguising themselves with stolen identities or hiding behind fabricated personas. Many of these perpetrators are hanging out in Internet cafes typically in third-world countries. The scammers work many hours a day at these Internet cafes with a laptop or a cell phone scamming Americans out of their money. It's a numbers game to the perpetrator. A one time hit of $300 American dollars is a good annual living in many third world countries. That's all the perpetrator needs in a single year is one good hit. In 2018, Americans reported over 1.4 million fraud reports to the FBI (likely on the IC3 website), losing a total of $1.48 billion dollars. One can report the Internet scam to the FBI along with the other 3,900 reports that the FBI will receive today. The FBI is the largest law enforcement agency in the country and they are likely the best, along with the Secret Service in regards to Internet fraud. However, the FBI and Secret Service are not equipped to take on the entire world and neither is your local law enforcement agency.
More Than Just A Cyber Lawyer
Michael Devereux is a cyber attorney that provides cyber and Internet analytics well beyond the law. As any party that has lost could verify, a client needs more than legal analysis to prevail. Many firms only provide legal analysis. At Wexford Law we not only provide legal analysis, but cyber forensics.
Former clients, their family and friends repeatedly return to Wexford Law for help in matters involving cyber isses.
Secret Shopping Scam
One of the old favorites brings together fake checks and secret shopping. Here’s how it starts. The victim gets a check in the mail with a job offer as a secret shopper. The victim deposits the check and sees the funds in their account within a few days, and the bank even tells the victim that the check has cleared. Now The victim is off to the store they’ve been asked to shop at and report back on, often a Walmart. The victim's first assignment is to test the in-store money transfer service, like Western Union or MoneyGram, by sending some of the money the victim deposited. Or the victim might be told to use the money to buy reloadable cards or gift cards, such as iTunes cards. The victim is then instructed to send pictures of the cards or to give the numbers on the cards. Fast forward days or weeks to the unhappy ending. The bank finds out the check the victim deposited is a fake, which means that the victim is on the hook for all that money. How does that even happen? Well, banks must make funds from deposited checks available within days, but uncovering a fake check can take weeks. By the time the victim tries to get the money back from the money transfer service, the scammers are long gone, and they’ve taken all the money off the gift cards, too. (By the way, money orders and cashier’s checks can be faked, too.)
Online Dating Scams
Ladies in their late 50's, early 60's are targets because they are expected to have retirement plans that are soon to peak in value. There are two types of scams: 1) the scam with the virtual person that the victim never meets in reality; or 2) the victim that does meet a person that has abusive tendencies but creates a bond or attachment that the victim can't break away from until it's too late. Since this blurb is about cybercrime we will discuss the former and not the latter. The perpetrator is seeking a lonely professional, particularly a widow. The scam is long term and it involves typically a great deal of money. The perpetrator never meets the victim in person and typically his personna is a person of trust, such as a military man, a law enforcement officer, a doctor, a businessman or a political figure, almost always connected to a government position. The perpetrator typically builds at the very least a six month relationship before he makes his move. He builds an attachment by sharing photographs, love letters and fake government documents. The perpetrator will eventually need money for some reason, maybe to pay for expenses until he's reimbursed or he's got insider trading information into an investment such as silver, gold, stocks, real estate, etc. If you become involved in an investment less than a year after meeting this person, expect to be used. It is highly likely that the victim will be sending large amounts of money in a wire to an overseas bank only to find out later that the person, the emails, the documents were all fakes.
Sex Scams - I'll Show You Mine If You Show Me Yours
The victim is typically a lonely male. The victim believes that he is communicating with a young woman. The perpetrator is actually a male with a chatbot and/or a video of a young lady. Both people agree to exchange nude photos or mutual videos of masturbation. A short time later it plays out one of two ways: 1) the perpetrator acting as the woman's father says that the woman is a minor and since they exchanged photos the perpetrator demands payment with a threat that if he isn't paid he will go to the police (thus making the father a person not only in possession of child pornography but also a distributor demanding payment, but many victims don't understand the law); or 2) the perpetrator demands payment under the threat that he will expose the video to all to see, which is highly unlikely because the perpetrator is playing the numbers game so he won't take time from his scams to post anything.
Our Rating is calculated using information the lawyer has included on
their profile in addition to the information we collect from state
bar associations and other organizations that license legal
professionals. Attorneys who claim their profiles and provide Avvo
with more information tend to have a higher rating than those who do
What determines Avvo Rating?Experience & background
Years licensed, work experience, education
Legal community recognition
Peer endorsements, associations, awards
Legal thought leadership
Publications, speaking engagements
This lawyer was disciplined by a state licensing authority in .
Disciplinary information may not be comprehensive, or updated. We recommend that you always check a lawyer's disciplinary status with their respective state bar association before hiring them.