Image

Unauthorized Access and Computer Tampering Lawyer in St. Louis, MO

Protect Your Freedom and Future With Combs Waterkotte

Verified Content

Last Updated: April 15, 2025

Award Award Award Award Award Award Award

Unauthorized Access and Computer Tampering
St. Louis, MO

Since 2002, Missouri law has prohibited people from accessing or tampering with computers without permission. These offenses constitute serious crimes, particularly when directed at valuable data or systems.

The St. Louis criminal defense attorneys at Combs Waterkotte have extensive experience helping people accused of computer crimes. An unauthorized access and computer tampering lawyer from our firm can formulate a customized defense strategy to fight for a positive outcome in your case.

What Is Unauthorized Access and Computer Tampering in Missouri?

What Is Unauthorized Access and Computer Tampering in Missouri?

As technology and the information economy developed, computer crimes developed with them. In the late 1990s and early 2000s, states began passing laws against acts like hacking, computer theft, and denial of service attacks.

Although investigative techniques improved, sophisticated criminals found ways to hide or even point the finger at innocent victims. As a result, computer crime charges, such as unauthorized access and computer tampering, are often difficult to investigate and prove.

We handle cases like your every day. Reach out to our St. Louis unauthorized access and computer tampering lawyers now at (314) 900-HELP.

Unauthorized Access and Computer Tampering Statutes in Missouri

Unauthorized Access and Computer Tampering Statutes in Missouri

The Missouri Revised Statutes include several laws covering computer crimes, including the following:

Tampering With Computer Data

Tampering with computer data charges are directed at actions usually referred to as “hacking.” They can also cover the intentional installation of a virus, bot, or spyware on someone else’s computer system.

This offense can happen in several ways, including:

  • Modifying or destroying data or software in a computer, system, or network
  • Modifying or destroying data, software, or documentation outside a computer, system, or network
  • Disclosing or stealing data, software, or documentation
  • Disclosing or stealing passwords, ID codes, PINs, or other confidential information for controlling computer system or network access
  • Accessing a computer, system, or network to intentionally examine personal data
  • Receiving, retaining, using, or disclosing data in violation of these provisions

These offenses are independent. Thus, prosecutors can file charges for tampering with computer data if you copy and use your boss’s password without taking, modifying, accessing, or disclosing any data, software, or other information.

Tampering With Computer Equipment

Tampering with computer equipment charges relate to physical interference with computers, storage devices, or network equipment. Prosecutors can pursue these charges when they believe someone has committed any of the following acts:

  • Modifying, destroying, damaging, or taking equipment or data storage devices
  • Modifying, destroying, damaging, or taking any computer, system, or network

These charges are equivalent to theft, vandalism, or criminal mischief directed at computers, network equipment, or data storage devices. Prosecutors might bring computer equipment tampering charges rather than theft when the accused intended to commit fraud rather than obtain property.

For example, suppose that prosecutors accuse you of installing a credit card skimmer on a gas pump’s payment system. They could file tampering charges for modifying the gas station’s equipment even if they can’t prove that you stole any money.

Tampering With Computer Users

Charges of tampering with computer users expand on the tampering with computer data offense.

To tamper with computer data, prosecutors must prove that you hacked into a system to take, modify, destroy, examine, or disclose the system’s data. By contrast, tampering with computer users simply requires accessing a system or blocking access to the system’s services without authorization.

Consequently, tampering with computer users occurs whenever someone hacks into a system, regardless of their purpose. The mere act of unauthorized access violates this statute.

Defenses Against Unauthorized Access and Computer Tampering Charges in St. Louis, MO

Defenses Against Unauthorized Access and Computer Tampering Charges in St. Louis, MO

Your St. Louis unauthorized access and computer tampering lawyer might raise any of several defenses, depending on your situation. Some possible criminal defense strategies in these cases include:

Lack of Intent

Most criminal statutes require prosecutors to prove a culpable state of mind. This requirement can prevent the prosecution of someone who accidentally violates these criminal laws.

All three computer crime laws require the accused to act knowingly. On the scale of culpable states of mind, “knowingly” falls below “intentionally” and above “recklessly.” In other words, “knowingly” generally excludes inadvertent acts. Instead, prosecutors must show that you had one of the two following states of mind:

  • You were aware of the nature of your actions or the existence of the circumstances in the statute
  • You knew that your actions would cause the prohibited result

For example, tampering with computer data requires you to knowingly damage or destroy data in a computer network. Suppose that you get arrested for destroying data using a virus. A Missouri criminal defense attorney can argue that you didn’t knowingly destroy the data because you didn’t know the email attachment you opened contained a virus.

Permission

State and federal computer crime statutes require you to act without authorization and without reasonable grounds to believe you had authorization. In other words, the laws specify that the computer, network, or system wasn’t your sole property, and you didn’t have permission from the owner or their representative to perform the prohibited act.

You have the authority to damage or destroy data on your devices. You can also damage or destroy devices you own. Thus, a lawyer can often overcome this charge by showing you owned the data or device allegedly damaged or destroyed.

You may also have permission from the owner or the owner’s representative, such as a supervisor. A St. Louis computer tampering lawyer can therefore defend you using a memo, email, or text from someone telling you to remove or destroy the data or equipment.

Reasonable Mistake of Fact

All three computer crime statutes require prosecutors to prove that you acted without reasonable belief that you had authorization. If you don’t have proof that you received permission, your lawyer can still defend you by showing that you reasonably believed you had authorization to perform the alleged tampering.

For example, suppose that your password to a particular network didn’t give you access to certain data, but your boss allowed you to use their password to perform some task.

Based on these circumstances, you might have reasonably believed you had the authority to use your boss’s password to access data any time you needed to do so and that you didn’t need to get permission every time.

Let’s say your boss takes the position that you don’t have the authority to change or destroy data outside your network permissions. If you get arrested because certain data was damaged or destroyed, you can raise the defense that you reasonably believed you had permission because of your boss’s prior actions.

Mistaken Identity

Prosecutors often face difficulties proving computer crimes committed remotely.

Even if they trace an offense to your IP address, they might not have proof that you committed the crime. It could have been someone else in your home using your device, such as a roommate or child. It might even have been someone who remotely hacked into your device and used your IP address to commit the crime.

Similarly, imagine that prosecutors accuse you of illegally accessing or stealing data from your employer based on the credentials used. You could raise the defense that a co-worker or contractor might have stolen your login and password or that someone might have accessed your computer while you were away from your desk.


Image

Image
Image

Possible Punishments for Unauthorized Access and Computer Tampering in Missouri

Possible Punishments for Unauthorized Access and Computer Tampering in Missouri

Missouri law notes many factors that determine the level of the charge and the potential penalties for computer crimes. They are as follows (judges can also increase felony sentences for persistent offenders who have previously been convicted of felonies):

Offense

  • Tampering with computer data
  • Tampering with computer data to commit fraud involving $750 or more
  • Tampering with computer equipment
  • Tampering with computer equipment to commit fraud involving $750 or more
  • Tampering with computer equipment causing at least $750 in damage
  • Tampering with computer equipment causing at least $25,000 in damage
  • Tampering with computer users
  • Tampering with computer users to commit fraud involving $750 or more

Possible Punishment

  • Class A misdemeanor; up to one year in jail
  • Class E felony; up to four years in prison
  • Class A misdemeanor; up to one year in jail
  • Class E felony; up to four years in prison
  • Class E felony; up to four years in prison
  • Class D felony; up to seven years in prison
  • Class A misdemeanor; up to one year in jail
  • Class E felony; up to four years in prison

  • Felony Stealing

    Charge

    Felony Stealing

    Result

    Reduced

    Combs Waterkotte represented a Wentzville man on one count of felony stealing in St. Charles County Circuit Court. The state alleged that our client, along wi …

    Charge

    Felony Stealing

    Result

    Reduced

  • Forgery for Counterfeit Bet Tickets

    Charge

    Forgery

    Result

    Dismissed

    In this case, a man was charged with forgery. The charge alleges that our client committed forgery by using counterfeit bet tickets at the casino. We had the …

    Charge

    Forgery

    Result

    Dismissed

  • Felony Stealing

    Charge

    Felony Stealing

    Result

    Dismissed

    Combs Waterkotte represented a North County woman on two felony counts of stealing a credit device and one count of felony stealing in St. Louis City Circuit …

    Charge

    Felony Stealing

    Result

    Dismissed

    Image Image
    Why Choose Combs Waterkotte for Your Unauthorized Access and Computer Tampering Defense in St. Louis?

    Why Choose Combs Waterkotte for Your Unauthorized Access and Computer Tampering Defense in St. Louis?

    The capable attorneys at Combs Waterkotte have over five decades of criminal defense experience, including many cases involving computers and technology. One of our attorneys was one of 25 prosecutors nationwide selected to attend The Secret Service National Computer Forensic Institute for a week of training and career development.

    We’ll fight hard against your charges to secure a dismissal or plea offer. If we can’t negotiate a fair deal, we’ll aggressively defend you in court.

    Image Image
    How We Can Defend You From Unauthorized Access or Computer Tampering Charges in St. Louis

    How We Can Defend You From Unauthorized Access or Computer Tampering Charges in St. Louis

    We’ll begin by listening to you and working with you to develop a defense strategy that fits the facts of your case. Our St. Louis computer tampering attorneys will then set out to gather evidence to support your version of the events. We may also hire expert witnesses to explain complex technical concepts to the prosecutors and jurors.

    Our goal is to present a clear picture of what happened to secure a dismissal, acquittal, or fair plea deal.

    Image Image
    Speak With a St. Louis Unauthorized Access and Computer Tampering Lawyer

    Speak With a St. Louis Unauthorized Access and Computer Tampering Lawyer

    Computer crimes often involve nuanced legal and technical considerations, resulting in prosecutors charging the wrong person or prosecuting acts that aren’t technically criminal. Contact Combs Waterkotte online or at (314) 900-HELP to discuss your case and learn more about how we can protect your rights.

    Our Record

    Image Image

    Impeccable Record
    of Success

    Impeccable Record of Success

    • Over 10,000 Cases Handled
    • Over 350 Five-Star Reviews
    • Multiple Major Media Appearances
    • Over Five Decades of Experience
    Meet Your Attorneys

    Featured and Latest News

    Open Video
    Image

    Featured Results:

    Client Review, DUI Case

    Play video
    Image

    Get In Touch:

    St. Louis

    Main Office

    (314) 900-HELP

    Get Directions

    Clayton

    By Appointment Only

    (314) 900-HELP

    Get Directions