{"id":16524,"date":"2026-04-21T10:00:46","date_gmt":"2026-04-21T14:00:46","guid":{"rendered":"https:\/\/www.carolinaattorneys.com\/blog\/?p=16524"},"modified":"2026-04-18T10:29:37","modified_gmt":"2026-04-18T14:29:37","slug":"accessing-government-computer-defraud-north-carolina","status":"publish","type":"post","link":"https:\/\/www.carolinaattorneys.com\/blog\/accessing-government-computer-defraud-north-carolina\/","title":{"rendered":"Accessing a Government Computer to Defraud in North Carolina"},"content":{"rendered":"<p data-start=\"274\" data-end=\"859\">Accessing a government computer to defraud in North Carolina can involve conduct that never involves touching a keyboard. In <em>State v. Friend<\/em> (COA25-908, April 15, 2026), the Court of Appeals held that presenting a fraudulent deed to a Register of Deeds office and insisting that it be recorded can satisfy N.C.G.S. \u00a7 14-454.1 when that conduct causes government staff to input and process the document through the system. The decision confirms that \u201caccess\u201d under North Carolina law also includes indirect use of a government system to execute a fraudulent scheme and to some extent expands how charges may be prosecuted in document-based cases.<\/p>\n<p data-section-id=\"l0akck\" data-start=\"861\" data-end=\"928\">TLDR | <em>North Carolina v Friend<\/em> | Presenting a fraudulent document to a government office and insisting that it be processed can support a charge of accessing a government computer to defraud in North Carolina, even without direct interaction with the computer system. The State must still prove intent to defraud and a causal connection between the conduct and the system\u2019s use.<\/p>\n<h2 data-section-id=\"l0akck\" data-start=\"861\" data-end=\"928\">1. Accessing a Government Computer to Defraud North Carolina | Core Legal Elements<\/h2>\n<table>\n<thead>\n<tr>\n<th>Element<\/th>\n<th>Legal Standard<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Statute<\/td>\n<td><a href=\"https:\/\/www.ncleg.gov\/EnactedLegislation\/Statutes\/PDF\/BySection\/Chapter_14\/GS_14-454.1.pdf\" target=\"_blank\">N.C.G.S. \u00a7 14-454.1<\/a><\/td>\n<\/tr>\n<tr>\n<td>Access<\/td>\n<td>Includes causing input or data processing<\/td>\n<\/tr>\n<tr>\n<td>Direct Use<\/td>\n<td>Touching a Computer \/ Terminal Not required<\/td>\n<\/tr>\n<tr>\n<td>Indirect Use<\/td>\n<td>Can qualify as &#8220;access&#8221;<\/td>\n<\/tr>\n<tr>\n<td>Intent<\/td>\n<td>Scheme to defraud<\/td>\n<\/tr>\n<tr>\n<td>Causation<\/td>\n<td>Conduct must result in system use<\/td>\n<\/tr>\n<tr>\n<td>Completion<\/td>\n<td>Completed access required; fraud scheme may be attempted<\/td>\n<\/tr>\n<tr>\n<td>Proof<\/td>\n<td>Direct or circumstantial evidence<\/td>\n<\/tr>\n<tr>\n<td>Core Issue<\/td>\n<td>Intent and causation<\/td>\n<\/tr>\n<tr>\n<td>Defense Focus<\/td>\n<td>No intent, no causation, no fraud<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>2. Scope of computer crime law in North Carolina<\/h2>\n<p data-start=\"1452\" data-end=\"1672\">The Court of Appeals of North Carolina issued a published opinion on <a href=\"https:\/\/appellate.nccourts.org\/opinions\/?c=2&amp;pdf=45647\" target=\"_blank\">April 15, 2026 in State v. Friend, COA25-908<\/a>. The decision answers a question that is likely to appear more and more in criminal cases across the state.<\/p>\n<p data-start=\"1674\" data-end=\"1782\">When does someone \u201caccess\u201d a government computer under North Carolina law if they never touch the keyboard?<\/p>\n<p data-start=\"1784\" data-end=\"2047\">NC Court of Appeals (Collins) held that presenting a fraudulent deed to a Register of Deeds office, and formally requesting it be recorded, can constitute accessing a government computer to defraud when the act causes government staff to input and process the document through the system.<\/p>\n<p data-start=\"2049\" data-end=\"2193\">That holding expands how prosecutors may allege a violation of\u00a0 <a href=\"https:\/\/www.ncleg.gov\/EnactedLegislation\/Statutes\/PDF\/BySection\/Chapter_14\/GS_14-454.1.pdf\" target=\"_blank\">N.C.G.S. \u00a7 14-454.1<\/a> &#8220;Accessing Government Computers&#8221; in cases involving public offices, recorded documents, and electronic systems.<\/p>\n<h2 data-section-id=\"5nmjve\" data-start=\"2195\" data-end=\"2261\">3. Being charged without touching the government computer in North Carolina<\/h2>\n<p data-start=\"2263\" data-end=\"2316\">The key statutory language comes from two provisions:<\/p>\n<ul data-start=\"2318\" data-end=\"2592\">\n<li data-section-id=\"1vplkyd\" data-start=\"2318\" data-end=\"2456\"><a href=\"https:\/\/www.ncleg.net\/EnactedLegislation\/Statutes\/HTML\/ByArticle\/Chapter_14\/Article_60.html\" target=\"_blank\">N.C.G.S. \u00a7 14-454.1<\/a> makes it unlawful to willfully access or cause to be accessed a government computer to execute a scheme to defraud<\/li>\n<li data-section-id=\"qsu27r\" data-start=\"2457\" data-end=\"2592\"><a href=\"https:\/\/www.ncleg.gov\/enactedlegislation\/statutes\/html\/bysection\/chapter_14\/gs_14-453.html\" target=\"_blank\">N.C.G.S. \u00a7 14-453<\/a> defines \u201caccess\u201d to include causing input, causing data processing, or otherwise making use of computer resources<\/li>\n<\/ul>\n<p data-start=\"2594\" data-end=\"2702\">The defense argument is relatively straightforward. The defendant did not use the computer. A government employee did. In <em>Friend<\/em>, the Court of Appeals rejected that framing.<\/p>\n<p data-start=\"2749\" data-end=\"2831\">The Court focused on causation and intent. The evidence showed that the defendant:<\/p>\n<ul data-start=\"2833\" data-end=\"3038\">\n<li data-section-id=\"btgcpp\" data-start=\"2833\" data-end=\"2892\">Presented a document the State contended was fraudulent<\/li>\n<li data-section-id=\"emd8tj\" data-start=\"2893\" data-end=\"2926\">Requested that it be recorded<\/li>\n<li data-section-id=\"gjzvqa\" data-start=\"2927\" data-end=\"2973\">Confirmed that request even after scrutiny<\/li>\n<li data-section-id=\"10iymf6\" data-start=\"2974\" data-end=\"3038\">Caused the office to process the document through its system<\/li>\n<\/ul>\n<p data-start=\"3040\" data-end=\"3235\">That was enough, when viewed in the light most favorable to the State, to allow a jury to find that the defendant \u201ccaused\u201d access to the government computer system as part of a fraudulent scheme.<\/p>\n<p data-start=\"3237\" data-end=\"3359\">The holding is not about physical interaction with a computer. It is about initiating and directing the system&#8217;s use.<\/p>\n<h2 data-section-id=\"th2ysv\" data-start=\"3361\" data-end=\"3431\">4. Register of Deeds filings as a basis for felony computer charges in North Carolina<\/h2>\n<p data-start=\"3433\" data-end=\"3642\">The evidence at trial showed that the defendant appeared before the Davidson County Register of Deeds and submitted a quitclaim deed purporting to transfer property to a trust.<\/p>\n<p data-start=\"3644\" data-end=\"3694\">The problem was not technical. It was fundamental.<\/p>\n<p data-start=\"3696\" data-end=\"3999\">The alleged victim testified that they did not intend to transfer the property. The evidence also showed that the signatory on the alleged title transfer had died before the filing date listed on the deed. The notarization raised additional concerns, including that the notary\u2019s identity overlapped with the transferee listed in the document.<\/p>\n<p data-start=\"4001\" data-end=\"4228\">Employees at the Register of Deeds questioned the document. Even after that scrutiny, the defendant confirmed multiple times that they wanted the deed recorded. The office recorded the document using its internal computer system.<\/p>\n<p data-start=\"4230\" data-end=\"4284\">Law enforcement became involved immediately afterward.<\/p>\n<h2 data-section-id=\"31rvsp\" data-start=\"4286\" data-end=\"4335\">5. Proof of intent and causation in <em>State v. Friend<\/em> computer fraud charges<\/h2>\n<p data-start=\"4337\" data-end=\"4374\">The State charged the defendant with:<\/p>\n<ul data-start=\"4376\" data-end=\"4502\">\n<li data-section-id=\"10mpuap\" data-start=\"4376\" data-end=\"4422\">Accessing a government computer to <a href=\"https:\/\/www.carolinaattorneys.com\/larceny-embezzlement-fraud.html\" target=\"_blank\">defraud<\/a><\/li>\n<li data-section-id=\"1j12iz\" data-start=\"4423\" data-end=\"4464\">Obtaining property by <a href=\"https:\/\/www.carolinaattorneys.com\/false-pretense-charges-in-north-carolina.html\" target=\"_blank\">false pretenses<\/a><\/li>\n<li data-section-id=\"t5ai7u\" data-start=\"4465\" data-end=\"4476\">Forgery<\/li>\n<li data-section-id=\"ojaad8\" data-start=\"4477\" data-end=\"4502\">Habitual <a href=\"https:\/\/www.carolinaattorneys.com\/north-carolina-criminal-law-chapter-14-1-felonies-and-misdemeano.html\" target=\"_blank\">felon<\/a> status<\/li>\n<\/ul>\n<p data-start=\"4504\" data-end=\"4687\">The trial court dismissed the forgery charge but allowed the remaining charges to go to the jury. The <a href=\"https:\/\/www.carolinaattorneys.com\/are-jury-trials-required-for-criminal-charges.html\" target=\"_blank\">jury returned guilty verdicts<\/a> on the computer access and false pretenses charges.<\/p>\n<p data-start=\"4689\" data-end=\"4800\">The facts mattered. This was not a close sufficiency call built on thin circumstantial evidence. The State had:<\/p>\n<ul data-start=\"4802\" data-end=\"5015\">\n<li data-section-id=\"1s42vay\" data-start=\"4802\" data-end=\"4833\">Evidence deed was false<\/li>\n<li data-section-id=\"1ian39j\" data-start=\"4834\" data-end=\"4885\">Testimony contradicting legitimate transfer<\/li>\n<li data-section-id=\"1mgrce4\" data-start=\"4886\" data-end=\"4940\">Evidence defendant persisted despite red flags<\/li>\n<li data-section-id=\"791bdk\" data-start=\"4941\" data-end=\"5015\">A prior court order limiting the defendant\u2019s ability to file documents<\/li>\n<\/ul>\n<p data-start=\"5017\" data-end=\"5068\">Those facts strengthened both intent and causation.<\/p>\n<h2 data-section-id=\"tpjjrh\" data-start=\"5070\" data-end=\"5131\">6. Indirect access and causing data entry | N.C.G.S. \u00a7 14-454.1<\/h2>\n<p data-start=\"5133\" data-end=\"5193\"><i>Friend is <\/i>not a hacking case. It is a courthouse (Register of Deeds) filing-something-at-the-counter case.<\/p>\n<p data-start=\"5195\" data-end=\"5220\">That distinction matters.<\/p>\n<p data-start=\"5222\" data-end=\"5418\"><em>Friend<\/em> confirms that the government computer statute applies to ordinary interactions with public offices when those interactions are used to push a fraudulent scheme through an electronic system.<\/p>\n<p data-start=\"5420\" data-end=\"5540\">If the State can show that a defendant intentionally set that process in motion to accomplish fraud, the statute may apply.<\/p>\n<h2 data-section-id=\"19w7xe5\" data-start=\"5542\" data-end=\"5615\">7. Attempted transfer of property | False Pretense under North Carolina law<\/h2>\n<p data-start=\"5617\" data-end=\"5716\">The Court of Appeals in\u00a0<em>Friend<\/em>\u00a0also upheld the denial of the motion to dismiss on obtaining property by false pretenses.<\/p>\n<p data-start=\"5718\" data-end=\"5908\">North Carolina law allows a conviction for an attempt to obtain value through deception. The State does not have to prove that the property was successfully transferred in a legally valid way.<\/p>\n<p data-start=\"5910\" data-end=\"6021\">Recording a document is not the same as legally transferring title. That distinction did not defeat the charge.<\/p>\n<h2 data-section-id=\"1x3xyo5\" data-start=\"6023\" data-end=\"6078\">8. Proving intent to defraud in accessing a government computer charges<\/h2>\n<p data-start=\"6080\" data-end=\"6118\">This is where careful reading matters.<\/p>\n<p data-start=\"6120\" data-end=\"6226\"><em>Friend i<\/em>s a motion to dismiss case, not a blanket rule that every bad filing is a felony computer offense.<\/p>\n<p data-start=\"6228\" data-end=\"6255\">The State still must prove:<\/p>\n<ul data-start=\"6257\" data-end=\"6381\">\n<li data-section-id=\"3ekan2\" data-start=\"6257\" data-end=\"6274\">A willful act<\/li>\n<li data-section-id=\"1wxyi6w\" data-start=\"6275\" data-end=\"6310\">A scheme to defraud<\/li>\n<li data-section-id=\"1a0004w\" data-start=\"6311\" data-end=\"6381\">A causal link between the defendant\u2019s conduct and the system\u2019s use<\/li>\n<\/ul>\n<p data-start=\"6383\" data-end=\"6477\">The facts in <em>Friend<\/em> were objectively overwhelmingly favorable for the State. A weaker record might not carry the same weight with the Finder of Fact.<\/p>\n<h2 data-section-id=\"1amx4o5\" data-start=\"6479\" data-end=\"6548\">9. Limits of computer crime charges under North Carolina law<\/h2>\n<p data-start=\"6550\" data-end=\"6590\"><em>Friend<\/em> does not eliminate real defenses.<\/p>\n<p data-start=\"6592\" data-end=\"6620\">Different issues could arise if and when:<\/p>\n<ul data-start=\"6622\" data-end=\"6905\">\n<li data-section-id=\"1xs6k7p\" data-start=\"6622\" data-end=\"6691\">The dispute involves legal interpretation rather than a clear, material intent to defraud<\/li>\n<li data-section-id=\"1imp8n8\" data-start=\"6692\" data-end=\"6747\">The filer relies on information from another person<\/li>\n<li data-section-id=\"1wdoqcq\" data-start=\"6748\" data-end=\"6806\">The document is flawed but not intentionally deceptive<\/li>\n<li data-section-id=\"4id62e\" data-start=\"6807\" data-end=\"6853\">The office refuses to process the document<\/li>\n<li data-section-id=\"a8rhqs\" data-start=\"6854\" data-end=\"6905\">There is no clear evidence of intent to deceive<\/li>\n<\/ul>\n<p data-start=\"6907\" data-end=\"6972\">Those distinctions likely matter. Indeed, they may be where cases are won and lost.<\/p>\n<h2 data-section-id=\"c7owo3\" data-start=\"6974\" data-end=\"7047\">10. Computer crime charges in document fraud cases | North Carolina<\/h2>\n<p data-start=\"7049\" data-end=\"7194\">As public records and filings move through electronic systems, traditional fraud theories and computer crime statutes are, on an ever-increasing basis, being charged together.<\/p>\n<p data-start=\"7196\" data-end=\"7271\">That potentially increases criminal exposure and, from the perspective of defense counsel, likely changes how cases may be evaluated from the start.<\/p>\n<p data-start=\"7273\" data-end=\"7405\"><em>Friend<\/em> gives prosecutors a published decision supporting that approach in at least one context involving a Register of Deeds office.<\/p>\n<h2 data-section-id=\"defhtj\" data-start=\"7407\" data-end=\"7462\">11. Defenses to accessing a government computer to defraud in North Carolina<\/h2>\n<p data-start=\"7528\" data-end=\"7555\">The focus should remain on:<\/p>\n<ul data-start=\"7557\" data-end=\"7779\">\n<li data-section-id=\"1njkpes\" data-start=\"7557\" data-end=\"7567\">Intent<\/li>\n<li data-section-id=\"fdil7b\" data-start=\"7568\" data-end=\"7610\">Truth or falsity of the representation<\/li>\n<li data-section-id=\"1yerkox\" data-start=\"7611\" data-end=\"7694\">Whether the defendant actually caused the system to be used in a fraudulent way<\/li>\n<li data-section-id=\"1enw2kx\" data-start=\"7695\" data-end=\"7779\">Whether the State is stretching a document dispute into a felony computer charge<\/li>\n<\/ul>\n<p data-start=\"7781\" data-end=\"7869\">A jury may hear facts that feel deceptive. The law still requires proof of each element. The State carries the <a href=\"https:\/\/www.carolinaattorneys.com\/burdens-of-proof-in-criminal-court-and-civil-court-in-the-caroli.html\" target=\"_blank\">Burden of Proof<\/a>, that being Proof Beyond a Reasonable Doubt.<\/p>\n<h2 data-section-id=\"1a70a2p\" data-start=\"106\" data-end=\"199\">Frequently Asked Questions About Accessing a Government Computer to Defraud North Carolina<\/h2>\n<p data-start=\"283\" data-end=\"617\">    <section class=\"sc_fs_faq sc_card \">\n        <div>\n\t\t\t<h3>What does accessing a government computer to defraud mean in North Carolina?<\/h3>            <div>\n\t\t\t\t                <p>\n\t\t\t\t\t Accessing a government computer to defraud in North Carolina under N.C.G.S. 14-454.1 includes direct use of a system or conduct that causes a government employee to input or process information as part of a fraudulent scheme. The definition of accessing a government computer focuses on system use, not physical control of the device.                 <\/p>\n            <\/div>\n        <\/div>\n    <\/section>\n\n\n\n<p data-start=\"706\" data-end=\"1006\">    <section class=\"sc_fs_faq sc_card \">\n        <div>\n\t\t\t<h3>Can accessing a government computer to defraud be charged without touching a computer?<\/h3>            <div>\n\t\t\t\t                <p>\n\t\t\t\t\t Accessing a government computer to defraud can occur without touching a computer when conduct causes a government system to be used. Presenting a fraudulent document and insisting that it be processed may satisfy accessing a government computer if that conduct results in data entry tied to a scheme to defraud.                 <\/p>\n            <\/div>\n        <\/div>\n    <\/section>\n\n\n\n<p data-start=\"1105\" data-end=\"1358\">    <section class=\"sc_fs_faq sc_card \">\n        <div>\n\t\t\t<h3>What does the State need to prove for accessing a government computer to defraud in North Carolina?<\/h3>            <div>\n\t\t\t\t                <p>\n\t\t\t\t\t Accessing a government computer to defraud in North Carolina requires proof of a willful act, a scheme to defraud, and conduct that results in access or caused access to a government computer. The State must prove each element beyond a reasonable doubt.                 <\/p>\n            <\/div>\n        <\/div>\n    <\/section>\n\n\n\n<p data-start=\"1433\" data-end=\"1683\">    <section class=\"sc_fs_faq sc_card \">\n        <div>\n\t\t\t<h3>What does access to a government computer mean?<\/h3>            <div>\n\t\t\t\t                <p>\n\t\t\t\t\t Accessing a government computer in North Carolina is defined to include causing input, causing data processing, or otherwise making use of computer resources. This definition allows accessing a government computer to include indirect use of a system.                 <\/p>\n            <\/div>\n        <\/div>\n    <\/section>\n\n\n\n<p data-start=\"1775\" data-end=\"2033\">    <section class=\"sc_fs_faq sc_card \">\n        <div>\n\t\t\t<h3>How is intent to defraud proven in accessing a government computer to defraud cases?<\/h3>            <div>\n\t\t\t\t                <p>\n\t\t\t\t\t Intent to defraud in accessing a government computer to defraud cases may be proven through evidence of a deliberate scheme to mislead or obtain value through deception. The State may rely on documents, conduct, and surrounding circumstances to establish intent.                 <\/p>\n            <\/div>\n        <\/div>\n    <\/section>\n\n\n\n<p data-section-id=\"1bxm9k7\" data-start=\"2452\" data-end=\"2547\">    <section class=\"sc_fs_faq sc_card \">\n        <div>\n\t\t\t<h3>What is the difference between accessing a government computer to defraud and false pretense charges in North Carolina?<\/h3>            <div>\n\t\t\t\t                <p>\n\t\t\t\t\t Accessing a government computer to defraud focuses on use of a government system to execute a scheme. False pretenses charges in North Carolina focus on obtaining or attempting to obtain value through deception. The same conduct may support more than one charge, but each offense requires proof of distinct statutory elements.                 <\/p>\n            <\/div>\n        <\/div>\n    <\/section>\n\n\n\n<p data-start=\"2548\" data-end=\"2790\">    <section class=\"sc_fs_faq sc_card \">\n        <div>\n\t\t\t<h3>Does accessing a government computer to defraud require a successful transfer of property?<\/h3>            <div>\n\t\t\t\t                <p>\n\t\t\t\t\t Accessing a government computer to defraud does not require a successful transfer of property. The State must prove that accessing a government computer occurred and that the conduct was part of a scheme to defraud, even if the scheme failed.                 <\/p>\n            <\/div>\n        <\/div>\n    <\/section>\n\n\n\n<p data-start=\"3228\" data-end=\"3480\">    <section class=\"sc_fs_faq sc_card \">\n        <div>\n\t\t\t<h3>Are there legal defenses to accessing a government computer to defraud charges in North Carolina?<\/h3>            <div>\n\t\t\t\t                <p>\n\t\t\t\t\t Defenses to accessing a government computer to defraud in North Carolina ordinarily focus on lack of intent, absence of a scheme to defraud, and failure to establish causation. Evidence of non-deceptive conduct or reliance on others may serve to challenge criminal charges.                 <\/p>\n            <\/div>\n        <\/div>\n    <\/section>\n\n\n\n<p data-start=\"3598\" data-end=\"3840\">    <section class=\"sc_fs_faq sc_card \">\n        <div>\n\t\t\t<h3>Can Register of Deeds filings become accessing a government computer to defraud charges in North Carolina?<\/h3>            <div>\n\t\t\t\t                <p>\n\t\t\t\t\t Register of Deeds filings may become accessing a government computer to defraud charges in North Carolina when the filing causes the office to use its system as part of a fraudulent scheme. The legal analysis centers on intent and system use.                 <\/p>\n            <\/div>\n        <\/div>\n    <\/section>\n\n\n\n<p data-start=\"3932\" data-end=\"4159\">    <section class=\"sc_fs_faq sc_card \">\n        <div>\n\t\t\t<h3>Are there limits to accessing a government computer to defraud charges?<\/h3>            <div>\n\t\t\t\t                <p>\n\t\t\t\t\t Accessing a government computer to defraud in North Carolina does not apply to every incorrect or disputed filing. The State must prove intentional deception and a meaningful connection between the conduct and the system\u2019s use.                 <\/p>\n            <\/div>\n        <\/div>\n    <\/section>\n\n\n\n<h2 data-section-id=\"1qvu9jh\" data-start=\"8226\" data-end=\"8302\">Charged with accessing a government computer to defraud in North Carolina<\/h2>\n<p data-start=\"8304\" data-end=\"8459\">Cases involving allegations tied to public records and electronic systems now carry the potential for layered exposure, including both fraud and computer-related charges.<\/p>\n<p data-start=\"8461\" data-end=\"8587\">Developing a defense strategy may therefore involve careful analysis of the evidence, the statutory elements, and how the State is framing intent and causation.<\/p>\n<p data-start=\"8589\" data-end=\"8911\">Bill Powers has defended criminal cases in the Charlotte region for decades. He is a past president of the North Carolina Advocates for Justice and a recipient of the North Carolina State Bar Distinguished Service Award. His work includes complex cases involving complicated technological, scientific, and forensic evidence.<\/p>\n<p data-start=\"8913\" data-end=\"9062\"><a href=\"http:\/\/CarolinaAttorneys.com\" target=\"_blank\">Powers Law Firm<\/a> handles serious criminal charges throughout the Charlotte metro region and is available for consultation on select matters statewide in North Carolina. <strong>704-342-4357<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Accessing a government computer to defraud in North Carolina can involve conduct that never involves touching a keyboard. In State v. Friend (COA25-908, April 15, 2026), the Court of Appeals held that presenting a fraudulent deed to a Register of Deeds office and insisting that it be recorded can satisfy N.C.G.S. \u00a7 14-454.1 when that [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":16530,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-16524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-criminal-defense"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Accessing a Government Computer to Defraud NC | State v Friend<\/title>\n<meta name=\"description\" content=\"Accessing a government computer to defraud NC explained. Indirect access, intent, and causation under State v Friend | 2026 NC Appeals Court\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carolinaattorneys.com\/blog\/accessing-government-computer-defraud-north-carolina\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Accessing a Government Computer to Defraud NC | State v Friend\" \/>\n<meta name=\"twitter:description\" content=\"Accessing a government computer to defraud NC explained. Indirect access, intent, and causation under State v Friend | 2026 NC Appeals Court\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.carolinaattorneys.com\/blog\/wp-content\/uploads\/2026\/04\/COMPUTER-FRAUD.webp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carolina Attorneys\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Accessing a Government Computer to Defraud NC | State v Friend","description":"Accessing a government computer to defraud NC explained. Indirect access, intent, and causation under State v Friend | 2026 NC Appeals Court","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carolinaattorneys.com\/blog\/accessing-government-computer-defraud-north-carolina\/","twitter_card":"summary_large_image","twitter_title":"Accessing a Government Computer to Defraud NC | State v Friend","twitter_description":"Accessing a government computer to defraud NC explained. Indirect access, intent, and causation under State v Friend | 2026 NC Appeals Court","twitter_image":"https:\/\/www.carolinaattorneys.com\/blog\/wp-content\/uploads\/2026\/04\/COMPUTER-FRAUD.webp","twitter_misc":{"Written by":"Carolina Attorneys","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carolinaattorneys.com\/blog\/accessing-government-computer-defraud-north-carolina\/#article","isPartOf":{"@id":"https:\/\/www.carolinaattorneys.com\/blog\/accessing-government-computer-defraud-north-carolina\/"},"author":{"name":"Carolina Attorneys","@id":"https:\/\/www.carolinaattorneys.com\/blog\/#\/schema\/person\/7b1994a08a51b357b94c69492e786113"},"headline":"Accessing a Government Computer to Defraud in North Carolina","datePublished":"2026-04-21T14:00:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carolinaattorneys.com\/blog\/accessing-government-computer-defraud-north-carolina\/"},"wordCount":2191,"image":{"@id":"https:\/\/www.carolinaattorneys.com\/blog\/accessing-government-computer-defraud-north-carolina\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carolinaattorneys.com\/blog\/wp-content\/uploads\/2026\/04\/COMPUTER-FRAUD.webp","articleSection":["Criminal Defense"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.carolinaattorneys.com\/blog\/accessing-government-computer-defraud-north-carolina\/","url":"https:\/\/www.carolinaattorneys.com\/blog\/accessing-government-computer-defraud-north-carolina\/","name":"Accessing a Government Computer to Defraud NC | State v Friend","isPartOf":{"@id":"https:\/\/www.carolinaattorneys.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carolinaattorneys.com\/blog\/accessing-government-computer-defraud-north-carolina\/#primaryimage"},"image":{"@id":"https:\/\/www.carolinaattorneys.com\/blog\/accessing-government-computer-defraud-north-carolina\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carolinaattorneys.com\/blog\/wp-content\/uploads\/2026\/04\/COMPUTER-FRAUD.webp","datePublished":"2026-04-21T14:00:46+00:00","author":{"@id":"https:\/\/www.carolinaattorneys.com\/blog\/#\/schema\/person\/7b1994a08a51b357b94c69492e786113"},"description":"Accessing a government computer to defraud NC explained. Indirect access, intent, and causation under State v Friend | 2026 NC Appeals Court","breadcrumb":{"@id":"https:\/\/www.carolinaattorneys.com\/blog\/accessing-government-computer-defraud-north-carolina\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carolinaattorneys.com\/blog\/accessing-government-computer-defraud-north-carolina\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carolinaattorneys.com\/blog\/accessing-government-computer-defraud-north-carolina\/#primaryimage","url":"https:\/\/www.carolinaattorneys.com\/blog\/wp-content\/uploads\/2026\/04\/COMPUTER-FRAUD.webp","contentUrl":"https:\/\/www.carolinaattorneys.com\/blog\/wp-content\/uploads\/2026\/04\/COMPUTER-FRAUD.webp","width":1312,"height":736,"caption":"Computer fraud charges in North Carolina illustrated with police vehicles and city skyline, representing government computer crime investigations, digital evidence, and prosecution under N.C.G.S. 14-454.1"},{"@type":"BreadcrumbList","@id":"https:\/\/www.carolinaattorneys.com\/blog\/accessing-government-computer-defraud-north-carolina\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carolinaattorneys.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Accessing a Government Computer to Defraud in North Carolina"}]},{"@type":"WebSite","@id":"https:\/\/www.carolinaattorneys.com\/blog\/#website","url":"https:\/\/www.carolinaattorneys.com\/blog\/","name":"Carolina Criminal Defense &amp; DUI Lawyer Updates","description":"Published by Carolina Criminal Defense &amp; DUI Lawyers \u2014 Carolina Attorneys","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carolinaattorneys.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.carolinaattorneys.com\/blog\/#\/schema\/person\/7b1994a08a51b357b94c69492e786113","name":"Carolina Attorneys","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/203afd0750f8833a03d5e178d5110902866fdc6efa9739b9dab848a970ad1245?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/203afd0750f8833a03d5e178d5110902866fdc6efa9739b9dab848a970ad1245?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/203afd0750f8833a03d5e178d5110902866fdc6efa9739b9dab848a970ad1245?s=96&d=mm&r=g","caption":"Carolina Attorneys"},"sameAs":["https:\/\/www.carolinaattorneys.com\/"]}]}},"jetpack_featured_media_url":"https:\/\/www.carolinaattorneys.com\/blog\/wp-content\/uploads\/2026\/04\/COMPUTER-FRAUD.webp","_links":{"self":[{"href":"https:\/\/www.carolinaattorneys.com\/blog\/wp-json\/wp\/v2\/posts\/16524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.carolinaattorneys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carolinaattorneys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carolinaattorneys.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carolinaattorneys.com\/blog\/wp-json\/wp\/v2\/comments?post=16524"}],"version-history":[{"count":9,"href":"https:\/\/www.carolinaattorneys.com\/blog\/wp-json\/wp\/v2\/posts\/16524\/revisions"}],"predecessor-version":[{"id":16540,"href":"https:\/\/www.carolinaattorneys.com\/blog\/wp-json\/wp\/v2\/posts\/16524\/revisions\/16540"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carolinaattorneys.com\/blog\/wp-json\/wp\/v2\/media\/16530"}],"wp:attachment":[{"href":"https:\/\/www.carolinaattorneys.com\/blog\/wp-json\/wp\/v2\/media?parent=16524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carolinaattorneys.com\/blog\/wp-json\/wp\/v2\/categories?post=16524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carolinaattorneys.com\/blog\/wp-json\/wp\/v2\/tags?post=16524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}