Accessing a government computer to defraud in North Carolina can involve conduct that never involves touching a keyboard. In State v. Friend (COA25-908, April 15, 2026), the Court of Appeals held that presenting a fraudulent deed to a Register of Deeds office and insisting that it be recorded can satisfy N.C.G.S. § 14-454.1 when that conduct causes government staff to input and process the document through the system. The decision confirms that “access” under North Carolina law also includes indirect use of a government system to execute a fraudulent scheme and to some extent expands how charges may be prosecuted in document-based cases.
TLDR | North Carolina v Friend | Presenting a fraudulent document to a government office and insisting that it be processed can support a charge of accessing a government computer to defraud in North Carolina, even without direct interaction with the computer system. The State must still prove intent to defraud and a causal connection between the conduct and the system’s use.
1. Accessing a Government Computer to Defraud North Carolina | Core Legal Elements
| Element | Legal Standard |
|---|---|
| Statute | N.C.G.S. § 14-454.1 |
| Access | Includes causing input or data processing |
| Direct Use | Touching a Computer / Terminal Not required |
| Indirect Use | Can qualify as “access” |
| Intent | Scheme to defraud |
| Causation | Conduct must result in system use |
| Completion | Completed access required; fraud scheme may be attempted |
| Proof | Direct or circumstantial evidence |
| Core Issue | Intent and causation |
| Defense Focus | No intent, no causation, no fraud |
2. Scope of computer crime law in North Carolina
The Court of Appeals of North Carolina issued a published opinion on April 15, 2026 in State v. Friend, COA25-908. The decision answers a question that is likely to appear more and more in criminal cases across the state.
When does someone “access” a government computer under North Carolina law if they never touch the keyboard?
NC Court of Appeals (Collins) held that presenting a fraudulent deed to a Register of Deeds office, and formally requesting it be recorded, can constitute accessing a government computer to defraud when the act causes government staff to input and process the document through the system.
That holding expands how prosecutors may allege a violation of N.C.G.S. § 14-454.1 “Accessing Government Computers” in cases involving public offices, recorded documents, and electronic systems.
3. Being charged without touching the government computer in North Carolina
The key statutory language comes from two provisions:
- N.C.G.S. § 14-454.1 makes it unlawful to willfully access or cause to be accessed a government computer to execute a scheme to defraud
- N.C.G.S. § 14-453 defines “access” to include causing input, causing data processing, or otherwise making use of computer resources
The defense argument is relatively straightforward. The defendant did not use the computer. A government employee did. In Friend, the Court of Appeals rejected that framing.
The Court focused on causation and intent. The evidence showed that the defendant:
- Presented a document the State contended was fraudulent
- Requested that it be recorded
- Confirmed that request even after scrutiny
- Caused the office to process the document through its system
That was enough, when viewed in the light most favorable to the State, to allow a jury to find that the defendant “caused” access to the government computer system as part of a fraudulent scheme.
The holding is not about physical interaction with a computer. It is about initiating and directing the system’s use.
4. Register of Deeds filings as a basis for felony computer charges in North Carolina
The evidence at trial showed that the defendant appeared before the Davidson County Register of Deeds and submitted a quitclaim deed purporting to transfer property to a trust.
The problem was not technical. It was fundamental.
The alleged victim testified that they did not intend to transfer the property. The evidence also showed that the signatory on the alleged title transfer had died before the filing date listed on the deed. The notarization raised additional concerns, including that the notary’s identity overlapped with the transferee listed in the document.
Employees at the Register of Deeds questioned the document. Even after that scrutiny, the defendant confirmed multiple times that they wanted the deed recorded. The office recorded the document using its internal computer system.
Law enforcement became involved immediately afterward.
5. Proof of intent and causation in State v. Friend computer fraud charges
The State charged the defendant with:
- Accessing a government computer to defraud
- Obtaining property by false pretenses
- Forgery
- Habitual felon status
The trial court dismissed the forgery charge but allowed the remaining charges to go to the jury. The jury returned guilty verdicts on the computer access and false pretenses charges.
The facts mattered. This was not a close sufficiency call built on thin circumstantial evidence. The State had:
- Evidence deed was false
- Testimony contradicting legitimate transfer
- Evidence defendant persisted despite red flags
- A prior court order limiting the defendant’s ability to file documents
Those facts strengthened both intent and causation.
6. Indirect access and causing data entry | N.C.G.S. § 14-454.1
Friend is not a hacking case. It is a courthouse (Register of Deeds) filing-something-at-the-counter case.
That distinction matters.
Friend confirms that the government computer statute applies to ordinary interactions with public offices when those interactions are used to push a fraudulent scheme through an electronic system.
If the State can show that a defendant intentionally set that process in motion to accomplish fraud, the statute may apply.
7. Attempted transfer of property | False Pretense under North Carolina law
The Court of Appeals in Friend also upheld the denial of the motion to dismiss on obtaining property by false pretenses.
North Carolina law allows a conviction for an attempt to obtain value through deception. The State does not have to prove that the property was successfully transferred in a legally valid way.
Recording a document is not the same as legally transferring title. That distinction did not defeat the charge.
8. Proving intent to defraud in accessing a government computer charges
This is where careful reading matters.
Friend is a motion to dismiss case, not a blanket rule that every bad filing is a felony computer offense.
The State still must prove:
- A willful act
- A scheme to defraud
- A causal link between the defendant’s conduct and the system’s use
The facts in Friend were objectively overwhelmingly favorable for the State. A weaker record might not carry the same weight with the Finder of Fact.
9. Limits of computer crime charges under North Carolina law
Friend does not eliminate real defenses.
Different issues could arise if and when:
- The dispute involves legal interpretation rather than a clear, material intent to defraud
- The filer relies on information from another person
- The document is flawed but not intentionally deceptive
- The office refuses to process the document
- There is no clear evidence of intent to deceive
Those distinctions likely matter. Indeed, they may be where cases are won and lost.
10. Computer crime charges in document fraud cases | North Carolina
As public records and filings move through electronic systems, traditional fraud theories and computer crime statutes are, on an ever-increasing basis, being charged together.
That potentially increases criminal exposure and, from the perspective of defense counsel, likely changes how cases may be evaluated from the start.
Friend gives prosecutors a published decision supporting that approach in at least one context involving a Register of Deeds office.
11. Defenses to accessing a government computer to defraud in North Carolina
The focus should remain on:
- Intent
- Truth or falsity of the representation
- Whether the defendant actually caused the system to be used in a fraudulent way
- Whether the State is stretching a document dispute into a felony computer charge
A jury may hear facts that feel deceptive. The law still requires proof of each element. The State carries the Burden of Proof, that being Proof Beyond a Reasonable Doubt.
Frequently Asked Questions About Accessing a Government Computer to Defraud North Carolina
Accessing a government computer to defraud in North Carolina under N.C.G.S. 14-454.1 includes direct use of a system or conduct that causes a government employee to input or process information as part of a fraudulent scheme. The definition of accessing a government computer focuses on system use, not physical control of the device. What does accessing a government computer to defraud mean in North Carolina?
Accessing a government computer to defraud can occur without touching a computer when conduct causes a government system to be used. Presenting a fraudulent document and insisting that it be processed may satisfy accessing a government computer if that conduct results in data entry tied to a scheme to defraud. Can accessing a government computer to defraud be charged without touching a computer?
Accessing a government computer to defraud in North Carolina requires proof of a willful act, a scheme to defraud, and conduct that results in access or caused access to a government computer. The State must prove each element beyond a reasonable doubt. What does the State need to prove for accessing a government computer to defraud in North Carolina?
Accessing a government computer in North Carolina is defined to include causing input, causing data processing, or otherwise making use of computer resources. This definition allows accessing a government computer to include indirect use of a system. What does access to a government computer mean?
Intent to defraud in accessing a government computer to defraud cases may be proven through evidence of a deliberate scheme to mislead or obtain value through deception. The State may rely on documents, conduct, and surrounding circumstances to establish intent. How is intent to defraud proven in accessing a government computer to defraud cases?
Accessing a government computer to defraud focuses on use of a government system to execute a scheme. False pretenses charges in North Carolina focus on obtaining or attempting to obtain value through deception. The same conduct may support more than one charge, but each offense requires proof of distinct statutory elements. What is the difference between accessing a government computer to defraud and false pretense charges in North Carolina?
Accessing a government computer to defraud does not require a successful transfer of property. The State must prove that accessing a government computer occurred and that the conduct was part of a scheme to defraud, even if the scheme failed. Does accessing a government computer to defraud require a successful transfer of property?
Defenses to accessing a government computer to defraud in North Carolina ordinarily focus on lack of intent, absence of a scheme to defraud, and failure to establish causation. Evidence of non-deceptive conduct or reliance on others may serve to challenge criminal charges. Are there legal defenses to accessing a government computer to defraud charges in North Carolina?
Register of Deeds filings may become accessing a government computer to defraud charges in North Carolina when the filing causes the office to use its system as part of a fraudulent scheme. The legal analysis centers on intent and system use. Can Register of Deeds filings become accessing a government computer to defraud charges in North Carolina?
Accessing a government computer to defraud in North Carolina does not apply to every incorrect or disputed filing. The State must prove intentional deception and a meaningful connection between the conduct and the system’s use. Are there limits to accessing a government computer to defraud charges?
Charged with accessing a government computer to defraud in North Carolina
Cases involving allegations tied to public records and electronic systems now carry the potential for layered exposure, including both fraud and computer-related charges.
Developing a defense strategy may therefore involve careful analysis of the evidence, the statutory elements, and how the State is framing intent and causation.
Bill Powers has defended criminal cases in the Charlotte region for decades. He is a past president of the North Carolina Advocates for Justice and a recipient of the North Carolina State Bar Distinguished Service Award. His work includes complex cases involving complicated technological, scientific, and forensic evidence.
Powers Law Firm handles serious criminal charges throughout the Charlotte metro region and is available for consultation on select matters statewide in North Carolina. 704-342-4357
Carolina Criminal Defense & DUI Lawyer Updates