<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Carolina Criminal Defense &amp; DUI Lawyer Updates</title>
	<atom:link href="https://www.carolinaattorneys.com/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.carolinaattorneys.com/blog/</link>
	<description>Published by Carolina Criminal Defense &#38; DUI Lawyers — Carolina Attorneys</description>
	<lastBuildDate>Thu, 07 May 2026 02:20:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Substitute Expert Testimony in North Carolina &#124; State v. Phillips 2026</title>
		<link>https://www.carolinaattorneys.com/blog/substitute-expert-testimony-north-carolina/</link>
		
		<dc:creator><![CDATA[Carolina Attorneys]]></dc:creator>
		<pubDate>Mon, 11 May 2026 14:00:26 +0000</pubDate>
				<category><![CDATA[Criminal Defense]]></category>
		<category><![CDATA[Confrontation Clause]]></category>
		<category><![CDATA[Criminal Appeals]]></category>
		<category><![CDATA[Domestic Violence Evidence]]></category>
		<category><![CDATA[Expert Witness Testimony]]></category>
		<category><![CDATA[Forensic Nursing]]></category>
		<category><![CDATA[hearsay]]></category>
		<category><![CDATA[Improper Vouching]]></category>
		<category><![CDATA[Injury Photographs]]></category>
		<category><![CDATA[north carolina criminal defense]]></category>
		<category><![CDATA[North Carolina Evidence Law]]></category>
		<category><![CDATA[Plain Error]]></category>
		<category><![CDATA[Rule 701]]></category>
		<category><![CDATA[Rule 703]]></category>
		<category><![CDATA[SANE Examination]]></category>
		<category><![CDATA[Sixth Amendment]]></category>
		<category><![CDATA[Smith v. Arizona]]></category>
		<category><![CDATA[State v. Ball]]></category>
		<category><![CDATA[State v. Clark]]></category>
		<category><![CDATA[State v. Lester]]></category>
		<category><![CDATA[State v. Phillips]]></category>
		<category><![CDATA[State v. Tate]]></category>
		<category><![CDATA[Substitute Expert Testimony]]></category>
		<category><![CDATA[Surrogate Witness]]></category>
		<category><![CDATA[Testimonial Evidence]]></category>
		<category><![CDATA[Trial Evidence]]></category>
		<guid isPermaLink="false">https://www.carolinaattorneys.com/blog/?p=16590</guid>

					<description><![CDATA[<p>Substitute expert testimony in North Carolina criminal cases continues to develop, as evidence in the May 2026 Court of Appeals decision in State v. Phillips.  A substitute expert may testify when the opinion comes from evidence the expert can independently review, such as photographs of visible injuries. The Confrontation Clause problem may be subject to [&#8230;]</p>
<p>The post <a href="https://www.carolinaattorneys.com/blog/substitute-expert-testimony-north-carolina/">Substitute Expert Testimony in North Carolina | State v. Phillips 2026</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="1344" data-end="1711">Substitute expert testimony in North Carolina criminal cases continues to develop, as evidence in the May 2026 Court of Appeals decision in <em>State v. Phillip</em>s.  A substitute expert may testify when the opinion comes from evidence the expert can independently review, such as photographs of visible injuries. The Confrontation Clause problem may be subject to review when the Rule 702 opinion depends on the truth of what an absent examiner recorded, measured, observed, charted, tested, or concluded.</p>
<p data-start="2055" data-end="2480">That distinction matters in criminal defense because expert testimony can sound scientific even when it rests on human assumptions that were never tested in court. A jury may hear the word “independent” and assume the witness did the work. <em>Phillips</em> reminds lawyers, judges, and anyone facing criminal charges that the real question is not whether the witness has credentials. The real question may involve what the opinion is based on.</p>
<h2 data-section-id="19nwqih" data-start="2482" data-end="2543">TL;DR | Substitute Expert Testimony</h2>
<div class="read_more_link"><a href="https://www.carolinaattorneys.com/blog/substitute-expert-testimony-north-carolina/"  title="Continue Reading Substitute Expert Testimony in North Carolina | State v. Phillips 2026" class="more-link">Continue reading</a></div>
<p>The post <a href="https://www.carolinaattorneys.com/blog/substitute-expert-testimony-north-carolina/">Substitute Expert Testimony in North Carolina | State v. Phillips 2026</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16590</post-id>	</item>
		<item>
		<title>Stare Decisis &#124; When the Supreme Court Changes the Law by Changing Its Mind</title>
		<link>https://www.carolinaattorneys.com/blog/stare-decisis-supreme-court-voting-rights-act/</link>
		
		<dc:creator><![CDATA[Carolina Attorneys]]></dc:creator>
		<pubDate>Sat, 09 May 2026 14:00:38 +0000</pubDate>
				<category><![CDATA[How Court Works & General Court Information]]></category>
		<category><![CDATA[Allen v. Milligan]]></category>
		<category><![CDATA[Civil Rights Law]]></category>
		<category><![CDATA[Congressional Maps]]></category>
		<category><![CDATA[constitutional law]]></category>
		<category><![CDATA[Equal Protection Clause]]></category>
		<category><![CDATA[Fifteenth Amendment]]></category>
		<category><![CDATA[Fourteenth Amendment]]></category>
		<category><![CDATA[Judicial Legitimacy]]></category>
		<category><![CDATA[Judicial Precedent]]></category>
		<category><![CDATA[Legal Analysis]]></category>
		<category><![CDATA[Louisiana v. Callais]]></category>
		<category><![CDATA[Race and Redistricting]]></category>
		<category><![CDATA[Racial Gerrymandering]]></category>
		<category><![CDATA[Redistricting Law]]></category>
		<category><![CDATA[Roberts Court]]></category>
		<category><![CDATA[Rule of Law]]></category>
		<category><![CDATA[Section 2 Voting Rights Act]]></category>
		<category><![CDATA[stare decisis]]></category>
		<category><![CDATA[Statutory Interpretation]]></category>
		<category><![CDATA[Statutory Stare Decisis]]></category>
		<category><![CDATA[Supreme Court Opinions]]></category>
		<category><![CDATA[Supreme Court Precedent]]></category>
		<category><![CDATA[Thornburg v. Gingles]]></category>
		<category><![CDATA[Voting Rights Act]]></category>
		<category><![CDATA[Voting Rights Litigation]]></category>
		<guid isPermaLink="false">https://www.carolinaattorneys.com/blog/?p=16585</guid>

					<description><![CDATA[<p>Stare decisis (&#8220;to stand by things decided&#8221;) sounds like a dry Latin phrase until the Supreme Court changes course in a way that affects constitutional rights, voting rules, criminal procedure, business regulation, privacy, speech, or the structure of government. Then the doctrine becomes something much larger than a law school definition. It becomes a question [&#8230;]</p>
<p>The post <a href="https://www.carolinaattorneys.com/blog/stare-decisis-supreme-court-voting-rights-act/">Stare Decisis | When the Supreme Court Changes the Law by Changing Its Mind</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="1232" data-end="1591"><em>Stare decisis</em> (&#8220;to stand by things decided&#8221;) sounds like a dry Latin phrase until the Supreme Court changes course in a way that affects constitutional rights, voting rules, criminal procedure, business regulation, privacy, speech, or the structure of government. Then the doctrine becomes something much larger than a law school definition. It becomes a question about institutional trust.</p>
<p data-start="1593" data-end="2066">Stare decisis means courts generally stand by what has already been decided. Put simply, they don&#8217;t change &#8220;settled law&#8221; willy-nilly, on a whim, under political pressure, or in response to prevailing popular/public opinion or feelings.</p>
<p data-start="1593" data-end="2066">It also does not mean every old case remains untouchable. It does not mean a wrong decision must remain law forever. It means the legal system has memory. Judges do not write on a blank slate every time a case reaches the courthouse. Prior decisions matter because people, legislatures, lawyers, businesses, prosecutors, defendants, courts, and public officials build their conduct around settled law.</p>
<div class="read_more_link"><a href="https://www.carolinaattorneys.com/blog/stare-decisis-supreme-court-voting-rights-act/"  title="Continue Reading Stare Decisis | When the Supreme Court Changes the Law by Changing Its Mind" class="more-link">Continue reading</a></div>
<p>The post <a href="https://www.carolinaattorneys.com/blog/stare-decisis-supreme-court-voting-rights-act/">Stare Decisis | When the Supreme Court Changes the Law by Changing Its Mind</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16585</post-id>	</item>
		<item>
		<title>Working with Your Lawyer &#124; Here’s What NOT to Do</title>
		<link>https://www.carolinaattorneys.com/blog/what-not-to-do-when-working-with-your-lawyer/</link>
		
		<dc:creator><![CDATA[Carolina Attorneys]]></dc:creator>
		<pubDate>Wed, 06 May 2026 12:07:37 +0000</pubDate>
				<category><![CDATA[Criminal Defense]]></category>
		<category><![CDATA[DUI]]></category>
		<category><![CDATA[Alleged victim contact]]></category>
		<category><![CDATA[Apology in a criminal case]]></category>
		<category><![CDATA[Attorney-Client Relationship]]></category>
		<category><![CDATA[Bond conditions]]></category>
		<category><![CDATA[CHARLOTTE CRIMINAL DEFENSE LAWYER]]></category>
		<category><![CDATA[Contacting witnesses]]></category>
		<category><![CDATA[Court paperwork]]></category>
		<category><![CDATA[Criminal case mistakes]]></category>
		<category><![CDATA[Criminal Charge]]></category>
		<category><![CDATA[Criminal defense advice]]></category>
		<category><![CDATA[CRIMINAL DEFENSE ATTORNEY]]></category>
		<category><![CDATA[CRIMINAL DEFENSE LAWYER]]></category>
		<category><![CDATA[Lawyer client communication]]></category>
		<category><![CDATA[north carolina criminal defense]]></category>
		<category><![CDATA[Pending criminal case]]></category>
		<category><![CDATA[Posting about a criminal case]]></category>
		<category><![CDATA[Powers Law Firm]]></category>
		<category><![CDATA[Pretrial release conditions]]></category>
		<category><![CDATA[Should I tell my lawyer everything]]></category>
		<category><![CDATA[Social media criminal case]]></category>
		<category><![CDATA[Tell your lawyer the truth]]></category>
		<category><![CDATA[What not to do when working with your lawyer]]></category>
		<category><![CDATA[What should I send my lawyer]]></category>
		<category><![CDATA[Witness contact]]></category>
		<category><![CDATA[Working with your lawyer]]></category>
		<guid isPermaLink="false">https://www.carolinaattorneys.com/blog/?p=16568</guid>

					<description><![CDATA[<p>If you have a criminal charge, a traffic matter, an impaired driving case in North Carolina, or a related legal issue that might affect your license, liberty, family, job, reputation, or future, knowing how to work effectively with a defense lawyer is an important first step. Lawyers focus on case analysis, strategy, negotiation, and courtroom [&#8230;]</p>
<p>The post <a href="https://www.carolinaattorneys.com/blog/what-not-to-do-when-working-with-your-lawyer/">Working with Your Lawyer | Here’s What NOT to Do</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="1664" data-end="2156">If you have a criminal charge, a traffic matter, an impaired driving case in North Carolina, or a related legal issue that might affect your license, liberty, family, job, reputation, or future, knowing how to work effectively with a defense lawyer is an important first step. Lawyers focus on case analysis, strategy, negotiation, and courtroom advocacy. The client&#8217;s role in that is important. We need to know, early on, what really happened.</p>
<p data-start="2158" data-end="2766">That sounds simple until fear takes over. A pending case can make normally very reasonable folks act in ways that can hurt them in the long run. They start talking to witnesses, texting, and even trying to call the charging officer.  Sometimes they explain themselves online or respond to a snarky comment on social media. Occasionally, clients hide facts from their lawyer because the truth seems too embarrassing.</p>
<p data-start="2768" data-end="3201">To be clear, the lawyer-client relationship is not built on flattery, blind trust, or constant reassurance. Defense lawyers truly want to help their clients. That&#8217;s why we went to law school. We enjoy helping people. We want to make a difference. A solid professional relationship and trust can take time.  Here&#8217;s What NOT To Do when it comes to working with your lawyer:</p>
<div class="read_more_link"><a href="https://www.carolinaattorneys.com/blog/what-not-to-do-when-working-with-your-lawyer/"  title="Continue Reading Working with Your Lawyer | Here’s What NOT to Do" class="more-link">Continue reading</a></div>
<p>The post <a href="https://www.carolinaattorneys.com/blog/what-not-to-do-when-working-with-your-lawyer/">Working with Your Lawyer | Here’s What NOT to Do</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16568</post-id>	</item>
		<item>
		<title>The Supreme Court’s Public Divide &#124; Why Lawyers Should Pay Attention</title>
		<link>https://www.carolinaattorneys.com/blog/us-supreme-court-public-divide/</link>
		
		<dc:creator><![CDATA[Carolina Attorneys]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 14:00:27 +0000</pubDate>
				<category><![CDATA[Community]]></category>
		<guid isPermaLink="false">https://www.carolinaattorneys.com/blog/?p=16555</guid>

					<description><![CDATA[<p>The Supreme Court is expected to speak through opinions, orders, and the institutional habits of judging. Recent remarks by Justices Sonia Sotomayor, Ketanji Brown Jackson, and Clarence Thomas suggest the Court’s internal divisions are spilling more openly into public view. Sotomayor publicly apologized after comments about Justice Kavanaugh that she later described as inappropriate and [&#8230;]</p>
<p>The post <a href="https://www.carolinaattorneys.com/blog/us-supreme-court-public-divide/">The Supreme Court’s Public Divide | Why Lawyers Should Pay Attention</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="82" data-end="937">The Supreme Court is expected to speak through opinions, orders, and the institutional habits of judging. Recent remarks by Justices Sonia Sotomayor, Ketanji Brown Jackson, and Clarence Thomas suggest the Court’s internal divisions are spilling more openly into public view.</p>
<p data-start="82" data-end="937">Sotomayor publicly apologized after comments about Justice Kavanaugh that she later described as inappropriate and hurtful. Jackson used a Yale Law School lecture to condemn the Court’s growing use of the emergency docket, calling its effect on the judicial system corrosive. Thomas, speaking at the University of Texas, delivered a forceful defense of the Declaration’s first principles while attacking progressivism as a threat to them.</p>
<p data-start="82" data-end="937">The respective extrajudicial commentary did not arise from a single case. That said, they do reveal a Court whose internal disagreements are increasingly no longer confined to opinions and oral arguments.</p>
<div class="read_more_link"><a href="https://www.carolinaattorneys.com/blog/us-supreme-court-public-divide/"  title="Continue Reading The Supreme Court’s Public Divide | Why Lawyers Should Pay Attention" class="more-link">Continue reading</a></div>
<p>The post <a href="https://www.carolinaattorneys.com/blog/us-supreme-court-public-divide/">The Supreme Court’s Public Divide | Why Lawyers Should Pay Attention</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16555</post-id>	</item>
		<item>
		<title>50C No-Contact Orders in NC &#124; First Amendment Free Speech</title>
		<link>https://www.carolinaattorneys.com/blog/50c-civil-no-contact-order-nc-first-amendment/</link>
		
		<dc:creator><![CDATA[Carolina Attorneys]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 14:00:42 +0000</pubDate>
				<category><![CDATA[RESTRAINING ORDERS]]></category>
		<category><![CDATA[50C Civil No Contact Order NC]]></category>
		<category><![CDATA[Campaign Speech Law]]></category>
		<category><![CDATA[Chapter 50C North Carolina]]></category>
		<category><![CDATA[CHARLOTTE CRIMINAL DEFENSE LAWYER]]></category>
		<category><![CDATA[Civil No Contact Orders]]></category>
		<category><![CDATA[Coble v Ballentine]]></category>
		<category><![CDATA[Criminal Defense North Carolina]]></category>
		<category><![CDATA[First Amendment Defense NC]]></category>
		<category><![CDATA[First Amendment North Carolina]]></category>
		<category><![CDATA[Free Speech Restrictions Court Orders]]></category>
		<category><![CDATA[Freedom of Speech NC]]></category>
		<category><![CDATA[Harassment Statute NC]]></category>
		<category><![CDATA[NC Court of Appeals Decisions]]></category>
		<category><![CDATA[NC Legal Analysis]]></category>
		<category><![CDATA[NC Stalking Law]]></category>
		<category><![CDATA[No Contact Order Defense NC]]></category>
		<category><![CDATA[North Carolina Constitutional Law]]></category>
		<category><![CDATA[North Carolina Legal Blog]]></category>
		<category><![CDATA[Online Speech Cases]]></category>
		<category><![CDATA[Political Speech First Amendment]]></category>
		<category><![CDATA[Prior Restraint Law]]></category>
		<category><![CDATA[Protected Speech NC]]></category>
		<category><![CDATA[Public Figure Law]]></category>
		<category><![CDATA[Social Media Speech Law]]></category>
		<category><![CDATA[Speech vs Harassment NC]]></category>
		<guid isPermaLink="false">https://www.carolinaattorneys.com/blog/?p=16534</guid>

					<description><![CDATA[<p>If a Chapter 50C no-contact order in North Carolina restricts speech, First Amendment concerns, including freedom of speech and the risk of an unlawful prior restraint, deserve attention. When alleged unlawful conduct is political commentary, criticism of a public figure, or public-facing social media activity, the analysis necessarily begins with a constitutional analysis. TL;DR &#124; [&#8230;]</p>
<p>The post <a href="https://www.carolinaattorneys.com/blog/50c-civil-no-contact-order-nc-first-amendment/">50C No-Contact Orders in NC | First Amendment Free Speech</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If a Chapter 50C no-contact order in North Carolina restricts speech, First Amendment concerns, including freedom of speech and the risk of an unlawful prior restraint, deserve attention. When alleged unlawful conduct is political commentary, criticism of a public figure, or public-facing social media activity, the analysis necessarily begins with a constitutional analysis.</p>
<p>TL;DR | 50C No-Contact Orders do not authorize courts to restrict public criticism simply because it is unwelcome or persistent. The statute requires conduct directed at a specific person, not speech about that person to a broader audience. When a civil no-contact order prohibits future speech, including public commentary about a political candidate, the case raises immediate First Amendment concerns, including the risk of an unlawful prior restraint. Courts are called to distinguish between targeted harassment, which may be regulated, and protected public discourse, which may not.</p>
<p data-start="878" data-end="1566">The Court of Appeals’ <a href="https://www.carolinaattorneys.com/blog/wp-content/uploads/2026/04/Coble-v-Ballentine.pdf" target="_blank">Coble v Ballentine</a> (No. COA25-914, Filed 15 April 2026) addresses, to some extent, growing concerns about criminalizing free speech and squelching legitimate public discourse. The Court reversed a civil no-contact order entered under <a href="https://www.nccourts.gov/assets/documents/local-rules-forms/50C%20Packet.pdf" target="_blank">Chapter 50C Complaint</a> after concluding the defendant’s online publications were not directed at the plaintiff in the manner required by the statute. The opinion resolves the appeal on statutory grounds, only tangentially touching on First Amendment and freedom of speech protections.</p>
<table>
<thead>
<tr>
<th>50C No Contact</th>
<th>What the Law Allows</th>
<th>What the Law Does NOT Allow</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Targeted Contact</strong></td>
<td>Direct messages, repeated unwanted communication, threats can support 50C</td>
<td>Public posts seen by the person are not automatically “directed at” them</td>
</tr>
<tr>
<td><strong>Speech About a Person</strong></td>
<td>Courts can consider context if tied to stalking elements</td>
<td>Public criticism, political speech, or commentary alone is not harassment</td>
</tr>
<tr>
<td><strong>Legitimate Purpose</strong></td>
<td>Conduct with no legitimate purpose may qualify as harassment</td>
<td>Political advocacy, campaign speech, and voter persuasion are legitimate purposes</td>
</tr>
<tr>
<td><strong>First Amendment</strong></td>
<td>True threats, intimidation, and unlawful conduct may be restricted</td>
<td>Courts cannot punish protected speech simply because it is harsh or upsetting</td>
</tr>
<tr>
<td><strong>Prior Restraint</strong></td>
<td>Narrow restrictions on direct contact may be allowed</td>
<td>Orders banning future speech, including saying a person’s name, are constitutionally suspect</td>
</tr>
<tr>
<td><strong>Social Media</strong></td>
<td>Direct targeting, tagging, or messaging may qualify</td>
<td>General posts, articles, or websites aimed at the public do not meet the standard alone</td>
</tr>
<tr>
<td><strong>Criminal Case Overlap</strong></td>
<td>Courts may impose lawful bond or contact restrictions</td>
<td>Civil 50C orders cannot be used to suppress public defense or commentary</td>
</tr>
</tbody>
</table>
<h2 data-section-id="1caco2p" data-start="1568" data-end="1639">1. 50C No-Contact Orders | First Amendment Freedom of Speech</h2>
<p data-start="1641" data-end="2250">Not every upsetting communication is actionable harassment. <a href="https://www.ncleg.gov/enactedlegislation/statutes/pdf/bychapter/chapter_50c.pdf" target="_blank">Chapter 50C Civil No Contact Orders</a> sets forth that a civil no-contact order may be sought by a victim of unlawful conduct, including stalking. Chapter 50C defines unlawful conduct by reference to stalking and certain <a href="https://www.carolinaattorneys.com/rape-sexual-assault-battery-misconduct-sexting-nc-abuse.html" target="_blank">criminal sex crimes</a>. The stalking analysis incorporates the harassment language from North Carolina’s stalking statute, <a href="https://www.ncleg.net/enactedlegislation/statutes/html/bysection/chapter_14/gs_14-277.3a.html" target="_blank">§ 14-277.3A.  Stalking</a>.</p>
<p data-start="1641" data-end="2250">The statutory text governs. It is not enough that speech is rude, hostile, persistent, or embarrassing. The conduct must satisfy the elements the General Assembly enacted.</p>
<p data-start="2252" data-end="2882">That structure matters. The stalking statute addresses willful conduct on more than one occasion, without legal purpose, intended to place someone in fear or cause substantial emotional distress under the statutory definition. The harassment component includes knowing conduct, including written or electronic communications, directed at a specific person that torments, terrorizes, or terrifies and serves no legitimate purpose. Each phrase has meaning. “Directed at a specific person” matters. “Serves no legitimate purpose” matters.</p>
<p data-start="2884" data-end="3344">This is why <em data-start="2896" data-end="2917">Coble v. Ballentine</em> is a worthy read. The Court of Appeals did not suggest the defendant’s speech was appropriate. It did not approve the tone. It did not convert harsh political speech into commendable conduct. The Court applied the statute. It asked whether the speech, public posts, and a website opposing a mayoral candidacy were directed at the plaintiff within the meaning of the statute. The answer was no. That answer controlled the outcome.</p>
<p data-start="3346" data-end="3586">A careful statutory reading does more than resolve the case. It avoids constitutional error. Once courts respect the limits built into Chapter 50C, the risk that the statute will be used to suppress public criticism decreases significantly.</p>
<h2 data-section-id="15s4om5" data-start="3588" data-end="3713">2. 50C No-Contact Orders | Public Discourse &amp; Free Speech</h2>
<p data-start="3715" data-end="4095">The distinction between speech about someone and speech directed to someone is not entirely technical.  A social media Facebook post, website, or public commentary criticizing a candidate may be about that candidate. <span style="box-sizing: border-box; margin: 0px; padding: 0px;">That does not transform the communication into a targeted, threatening, or harassing message <em>to</em> that candidate.</span> The distinction matters under the statute and carries constitutional weight.</p>
<p data-start="4097" data-end="4731">In <em data-start="4100" data-end="4107">Coble</em>, the Court of Appeals emphasized that the defendant’s posts were public-facing statements about the plaintiff and their candidacy, not direct communications to the alleged victim. The Court also noted the third-person nature of the writing. Third-person usage is not necessarily dispositive, but it is consistent with speech aimed at the public rather than speech directed to a specific individual. In a political setting, that difference can be significant. Campaign advocacy, criticism of candidates, and efforts to influence voters are part of public discourse. Courts are therefore called to be cautious before recharacterizing that discourse as stalking or harassment.</p>
<p data-start="4733" data-end="5259">The constitutional basis for that caution is well established. Speech about public officials and candidates receives the highest level of protection. In <a href="https://www.oyez.org/cases/1963/39" target="_blank"><em data-start="4886" data-end="4918">New York Times Co. v. Sullivan</em></a>, the United States Supreme Court recognized that debate on public issues must remain uninhibited, robust, and wide-open, even when it includes sharp criticism of public officials. In <a href="https://www.oyez.org/cases/1964/4" target="_blank"><em data-start="5102" data-end="5125">Garrison v. Louisiana</em></a>, the Court reinforced that principle by establishing the &#8220;actual malice&#8221; standard and cautioned against using criminal law to punish protected criticism of public officials.</p>
<p data-start="5261" data-end="5771">That does not necessarily mean all speech about a public figure is protected. True threats are not protected. Defamation law remains available in appropriate circumstances. Speech that amounts to criminal conduct (such as <a href="https://www.carolinaattorneys.com/communicating-threats.html" target="_blank">communicating threats,</a> and <a href="https://www.carolinaattorneys.com/14-196-a-3-harassing-by-repeated-telephone-calls-misdemeanor.html" target="_blank">harassing phone calls)</a>, may lose protection. Targeted stalking, extortion, and witness intimidation also remain subject to criminal prosecution. Mere public criticism of a candidate, however, does not lose constitutional protection because it is repetitive, pointed, or unwelcome. If Chapter 50C is extended into that territory, the statute risks becoming a tool for speech restriction.</p>
<p data-start="5773" data-end="6426">That concern becomes more pronounced when the order prohibits future speech. In <em data-start="5853" data-end="5860">Coble</em>, the trial court ordered the defendant to refrain from publicly writing, printing, or speaking the plaintiff’s name in any manner. That is not a narrow order addressing a specific threat or direct contact. It is a sweeping content-based restriction. The Court of Appeals in <em>Coble </em>did not reach the First Amendment issue because the statutory analysis resolved the case. The structure of the order nonetheless raises immediate constitutional concerns. A court order prohibiting a speaker from publicly referring to a political candidate implicates prior restraint principles.</p>
<p data-start="6428" data-end="6866">Prior restraint is viewed with skepticism because it prohibits speech before it occurs. While not impossible to justify in every context, they are constitutionally disfavored. When a court prohibits a speaker from publicly referencing a named political figure, the State has moved from regulating conduct to restricting speech based on content. That is where Chapter 50C becomes constitutionally unstable if applied without discipline.</p>
<h2 data-section-id="1de4kjx" data-start="6868" data-end="6960">3. First Amendment Limits | Criminal Charges</h2>
<p data-start="6962" data-end="7277">Criminal defense practice regularly involves overlapping no-contact provisions, bond conditions, witness-contact restrictions, and allegations tied to social media or public statements. A Chapter 50C action can shape the posture of a related criminal case.</p>
<p data-start="7279" data-end="7903">A defendant may face pending criminal charges while also responding to a 50C complaint based on speech. In some cases, the civil action influences the narrative surrounding the criminal matter. In others, it creates a record that may later serve as a basis for direct and cross-examination. It may also impose restrictions on movement, association, and public speech that affect defense strategy. In North Carolina, violations of 50C orders are generally enforced through contempt rather than immediate arrest for the violation itself,(unlike <a href="https://www.carolinaattorneys.com/50b-4-1-a-violation-of-valid-protective-order.html" target="_blank">violation of a Chapter 50B Domestic Violence Protective Order</a>) but that does not diminish their significance. A 50C Civil No Contact Order still affects free speech rights and creates additional exposure for <a href="https://charlotte-divorce-lawyer.com/contempt/" target="_blank">Contempt of Court</a>.</p>
<p data-start="7905" data-end="8496">For that reason, a 50C hearing is treated with the same level of attention as other critical stages of a criminal charge. When speech is involved, the analysis should necessarily proceed in a structured manner. The initial inquiry is statutory. Was the communication actually directed at the plaintiff? Was it targeted contact or public commentary? Did it lack a legitimate purpose, or did it serve an identifiable public or political function? The second inquiry is constitutional. If the requested order restricts future speech, the Court must consider the constitutional implications of that restriction.</p>
<p data-start="8498" data-end="8937">Those types of questions matter because Courts may react to context rather than category. Allegations involving social media posts or public accusations can create immediate concern. In some cases, that concern is warranted. Consistent with <a href="https://www.ncleg.gov/Laws/Constitution/Article1" target="_blank">Article 14 of the North Carolina Constitution,</a> political speech is public commentary, not targeted harassment. The distinction must therefore be developed clearly in the record. Without that clarity, a court may unintentionally move from regulating prohibited criminal conduct to restricting protected speech.</p>
<p data-start="8939" data-end="9409">The issue becomes more pronounced when the petitioner is a public figure, public official, or political candidate. Public life brings criticism. The <a href="https://www.archives.gov/founding-docs/constitution-transcript" target="_blank">Constitution of the United States</a> protects speech that is uncomfortable, pointed, and even harsh. It protects speech that challenges public officials and candidates. The relevant question is not whether the speech caused emotional distress in a general sense. The question is whether the law reaches that speech without violating constitutional limits.</p>
<p data-start="9411" data-end="9894">The “legitimate purpose” component of the statutory framework is particularly important in this context. A campaign platform opposing a candidate has a clear political purpose. Efforts to influence voters are part of the electoral process. Those activities do not become unlawful conduct simply because the subject of the criticism objects to the message. If a legitimate purpose is disregarded in a political speech case, Chapter 50C risks being used to suppress protected expression.</p>
<p data-start="9896" data-end="10364">Courts retain authority to address true misconduct. Direct threats, targeted harassment, and unlawful contact remain within the scope of Chapter 50C. Courts may also impose lawful conditions in criminal cases where appropriate. The distinction lies in tailoring relief to conduct without extending it to suppress public speech. A court may prohibit direct contact without prohibiting public commentary. That distinction preserves both the statute and the Constitution.</p>
<h2 data-section-id="qdt5g9" data-start="97" data-end="177">50C No-Contact Order FAQs in North Carolina | First Amendment and Free Speech</h2>
<p data-start="252" data-end="747">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>Can a 50C civil no-contact order restrict speech in North Carolina?</h3>            <div>
				                <p>
					 A 50C civil no-contact order in North Carolina may regulate targeted conduct, but it does not authorize broad restrictions on protected speech. When a 50C order attempts to limit public commentary, criticism, or political speech, the First Amendment and prior restraint doctrine become central to the analysis. Courts determine whether the communication was directed at a specific person under Chapter 50C or whether the speech was a public-facing expression protected by the First Amendment.                 </p>
            </div>
        </div>
    </section>



<p data-start="838" data-end="1313">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>What does “directed at a specific person” mean under Chapter 50C in North Carolina?</h3>            <div>
				                <p>
					 Under Chapter 50C in North Carolina, the requirement that conduct be “directed at a specific person” means the communication must be targeted toward that individual, such as direct messages, repeated unwanted contact, or actions intended to reach that person specifically. Public speech about a person, including social media posts, campaign commentary, or online articles, does not satisfy the statutory requirement simply because the person may see or learn of the content.                 </p>
            </div>
        </div>
    </section>



<p data-start="1401" data-end="1862">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>Can social media posts qualify as harassment under a 50C no-contact order in NC?</h3>            <div>
				                <p>
					 Social media posts may qualify as harassment under a 50C no-contact order in North Carolina only when the posts are part of targeted conduct directed at a specific person and lack a legitimate purpose. Public-facing posts, websites, or commentary intended for a broader audience generally do not meet the statutory definition of harassment, particularly when the content relates to political speech or matters of public concern protected by the First Amendment.                 </p>
            </div>
        </div>
    </section>



<p data-start="1945" data-end="2439">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>Does the First Amendment limit 50C no-contact orders in North Carolina? </h3>            <div>
				                <p>
					 The First Amendment limits 50C no-contact orders in North Carolina by protecting freedom of speech, especially speech involving public officials, political candidates, and matters of public concern. Courts must avoid converting Chapter 50C into a mechanism for restricting protected expression. When a 50C order regulates speech rather than targeted, illegal criminal conduct, the Court must evaluate whether the restriction is narrowly tailored and whether it improperly infringes on constitutional protections.                 </p>
            </div>
        </div>
    </section>



<p data-start="2502" data-end="2897">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>What is prior restraint in a 50C no-contact order case? </h3>            <div>
				                <p>
					 Prior restraint in a 50C no-contact order case refers to a court order that prohibits speech before it occurs. In North Carolina, a 50C order that bars a defendant from publicly speaking about a person, including using that person’s name, raises serious First Amendment concerns. Prior restraint is generally disfavored because it restricts speech in advance and risks suppressing lawful public discourse.                 </p>
            </div>
        </div>
    </section>



<p data-start="2984" data-end="3414">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>Can 50C civil no-contact orders affect related criminal charges in North Carolina?</h3>            <div>
				                <p>
					 A 50C no-contact order in North Carolina can affect related criminal charges by shaping the factual record, limiting communication, and creating additional exposure through contempt proceedings. When speech is involved, restrictions imposed through a 50C order may impact defense strategy, witness interaction, and public commentary, requiring careful legal analysis of both statutory requirements and First Amendment protections.                 </p>
            </div>
        </div>
    </section>



<p data-start="3500" data-end="3914">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>Can a 50C order prohibit speech about a political candidate in North Carolina?</h3>            <div>
				                <p>
					 A 50C order in North Carolina may address unlawful conduct, but prohibiting speech about a political candidate raises significant First Amendment concerns. Political speech is afforded the highest level of constitutional protection, and courts must distinguish between targeted harassment and public discourse. Broad restrictions on speech about a candidate risk being invalid as unconstitutional prior restraints.                 </p>
            </div>
        </div>
    </section>



<p data-start="3996" data-end="4432" data-is-last-node="" data-is-only-node="">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>Why does “legitimate purpose” matter in a 50C civil no-contact order case?</h3>            <div>
				                <p>
					 The “legitimate purpose” requirement in a 50C civil no-contact order case in North Carolina limits the statute to conduct that lacks lawful justification. Speech that serves a legitimate purpose, including political advocacy, public commentary, or participation in civic debate, does not fit within the statutory definition of harassment. Recognizing legitimate purpose prevents Chapter 50C from being used to suppress protected speech.                 </p>
            </div>
        </div>
    </section>



<h2 data-start="9896" data-end="10364">50C Orders Cannot Be Used to Silence Public Speech in North Carolina</h2>
<p data-start="10366" data-end="10662"><em data-start="10366" data-end="10387">Coble v. Ballentine</em> reflects that boundary. The NC Court of Appeals enforced the statutory limits and avoided the constitutional issue by doing so. The case serves as a reminder that Chapter 50C is not a general mechanism to silence criticism. It is a targeted remedy for defined unlawful conduct.</p>
<p data-start="10664" data-end="11196" data-is-last-node="" data-is-only-node="">At <a href="https://www.carolinaattorneys.com/" target="_blank">Powers Law Firm</a>, helps clients with restraining orders, including Chapter 50C Civil No Contact Orders and related criminal charges. When a case involves Chapter 50C, social media allegations, public commentary, or overlap with criminal charges in the Charlotte region or statewide, both the statutory framework and the constitutional limits deserve thoughtful consideration. Call <strong> 704-342-4357 </strong>to schedule a confidential consultation.</p>
<p>The post <a href="https://www.carolinaattorneys.com/blog/50c-civil-no-contact-order-nc-first-amendment/">50C No-Contact Orders in NC | First Amendment Free Speech</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16534</post-id>	</item>
		<item>
		<title>Accessing a Government Computer to Defraud in North Carolina</title>
		<link>https://www.carolinaattorneys.com/blog/accessing-government-computer-defraud-north-carolina/</link>
		
		<dc:creator><![CDATA[Carolina Attorneys]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 14:00:46 +0000</pubDate>
				<category><![CDATA[Criminal Defense]]></category>
		<guid isPermaLink="false">https://www.carolinaattorneys.com/blog/?p=16524</guid>

					<description><![CDATA[<p>Accessing a government computer to defraud in North Carolina can involve conduct that never involves touching a keyboard. In State v. Friend (COA25-908, April 15, 2026), the Court of Appeals held that presenting a fraudulent deed to a Register of Deeds office and insisting that it be recorded can satisfy N.C.G.S. § 14-454.1 when that [&#8230;]</p>
<p>The post <a href="https://www.carolinaattorneys.com/blog/accessing-government-computer-defraud-north-carolina/">Accessing a Government Computer to Defraud in North Carolina</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="274" data-end="859">Accessing a government computer to defraud in North Carolina can involve conduct that never involves touching a keyboard. In <em>State v. Friend</em> (COA25-908, April 15, 2026), the Court of Appeals held that presenting a fraudulent deed to a Register of Deeds office and insisting that it be recorded can satisfy N.C.G.S. § 14-454.1 when that conduct causes government staff to input and process the document through the system. The decision confirms that “access” under North Carolina law also includes indirect use of a government system to execute a fraudulent scheme and to some extent expands how charges may be prosecuted in document-based cases.</p>
<p data-section-id="l0akck" data-start="861" data-end="928">TLDR | <em>North Carolina v Friend</em> | Presenting a fraudulent document to a government office and insisting that it be processed can support a charge of accessing a government computer to defraud in North Carolina, even without direct interaction with the computer system. The State must still prove intent to defraud and a causal connection between the conduct and the system’s use.</p>
<h2 data-section-id="l0akck" data-start="861" data-end="928">1. Accessing a Government Computer to Defraud North Carolina | Core Legal Elements</h2>
<table>
<thead>
<tr>
<th>Element</th>
<th>Legal Standard</th>
</tr>
</thead>
<tbody>
<tr>
<td>Statute</td>
<td><a href="https://www.ncleg.gov/EnactedLegislation/Statutes/PDF/BySection/Chapter_14/GS_14-454.1.pdf" target="_blank">N.C.G.S. § 14-454.1</a></td>
</tr>
<tr>
<td>Access</td>
<td>Includes causing input or data processing</td>
</tr>
<tr>
<td>Direct Use</td>
<td>Touching a Computer / Terminal Not required</td>
</tr>
<tr>
<td>Indirect Use</td>
<td>Can qualify as &#8220;access&#8221;</td>
</tr>
<tr>
<td>Intent</td>
<td>Scheme to defraud</td>
</tr>
<tr>
<td>Causation</td>
<td>Conduct must result in system use</td>
</tr>
<tr>
<td>Completion</td>
<td>Completed access required; fraud scheme may be attempted</td>
</tr>
<tr>
<td>Proof</td>
<td>Direct or circumstantial evidence</td>
</tr>
<tr>
<td>Core Issue</td>
<td>Intent and causation</td>
</tr>
<tr>
<td>Defense Focus</td>
<td>No intent, no causation, no fraud</td>
</tr>
</tbody>
</table>
<h2>2. Scope of computer crime law in North Carolina</h2>
<p data-start="1452" data-end="1672">The Court of Appeals of North Carolina issued a published opinion on <a href="https://appellate.nccourts.org/opinions/?c=2&amp;pdf=45647" target="_blank">April 15, 2026 in State v. Friend, COA25-908</a>. The decision answers a question that is likely to appear more and more in criminal cases across the state.</p>
<p data-start="1674" data-end="1782">When does someone “access” a government computer under North Carolina law if they never touch the keyboard?</p>
<p data-start="1784" data-end="2047">NC Court of Appeals (Collins) held that presenting a fraudulent deed to a Register of Deeds office, and formally requesting it be recorded, can constitute accessing a government computer to defraud when the act causes government staff to input and process the document through the system.</p>
<p data-start="2049" data-end="2193">That holding expands how prosecutors may allege a violation of  <a href="https://www.ncleg.gov/EnactedLegislation/Statutes/PDF/BySection/Chapter_14/GS_14-454.1.pdf" target="_blank">N.C.G.S. § 14-454.1</a> &#8220;Accessing Government Computers&#8221; in cases involving public offices, recorded documents, and electronic systems.</p>
<h2 data-section-id="5nmjve" data-start="2195" data-end="2261">3. Being charged without touching the government computer in North Carolina</h2>
<p data-start="2263" data-end="2316">The key statutory language comes from two provisions:</p>
<ul data-start="2318" data-end="2592">
<li data-section-id="1vplkyd" data-start="2318" data-end="2456"><a href="https://www.ncleg.net/EnactedLegislation/Statutes/HTML/ByArticle/Chapter_14/Article_60.html" target="_blank">N.C.G.S. § 14-454.1</a> makes it unlawful to willfully access or cause to be accessed a government computer to execute a scheme to defraud</li>
<li data-section-id="qsu27r" data-start="2457" data-end="2592"><a href="https://www.ncleg.gov/enactedlegislation/statutes/html/bysection/chapter_14/gs_14-453.html" target="_blank">N.C.G.S. § 14-453</a> defines “access” to include causing input, causing data processing, or otherwise making use of computer resources</li>
</ul>
<p data-start="2594" data-end="2702">The defense argument is relatively straightforward. The defendant did not use the computer. A government employee did. In <em>Friend</em>, the Court of Appeals rejected that framing.</p>
<p data-start="2749" data-end="2831">The Court focused on causation and intent. The evidence showed that the defendant:</p>
<ul data-start="2833" data-end="3038">
<li data-section-id="btgcpp" data-start="2833" data-end="2892">Presented a document the State contended was fraudulent</li>
<li data-section-id="emd8tj" data-start="2893" data-end="2926">Requested that it be recorded</li>
<li data-section-id="gjzvqa" data-start="2927" data-end="2973">Confirmed that request even after scrutiny</li>
<li data-section-id="10iymf6" data-start="2974" data-end="3038">Caused the office to process the document through its system</li>
</ul>
<p data-start="3040" data-end="3235">That was enough, when viewed in the light most favorable to the State, to allow a jury to find that the defendant “caused” access to the government computer system as part of a fraudulent scheme.</p>
<p data-start="3237" data-end="3359">The holding is not about physical interaction with a computer. It is about initiating and directing the system&#8217;s use.</p>
<h2 data-section-id="th2ysv" data-start="3361" data-end="3431">4. Register of Deeds filings as a basis for felony computer charges in North Carolina</h2>
<p data-start="3433" data-end="3642">The evidence at trial showed that the defendant appeared before the Davidson County Register of Deeds and submitted a quitclaim deed purporting to transfer property to a trust.</p>
<p data-start="3644" data-end="3694">The problem was not technical. It was fundamental.</p>
<p data-start="3696" data-end="3999">The alleged victim testified that they did not intend to transfer the property. The evidence also showed that the signatory on the alleged title transfer had died before the filing date listed on the deed. The notarization raised additional concerns, including that the notary’s identity overlapped with the transferee listed in the document.</p>
<p data-start="4001" data-end="4228">Employees at the Register of Deeds questioned the document. Even after that scrutiny, the defendant confirmed multiple times that they wanted the deed recorded. The office recorded the document using its internal computer system.</p>
<p data-start="4230" data-end="4284">Law enforcement became involved immediately afterward.</p>
<h2 data-section-id="31rvsp" data-start="4286" data-end="4335">5. Proof of intent and causation in <em>State v. Friend</em> computer fraud charges</h2>
<p data-start="4337" data-end="4374">The State charged the defendant with:</p>
<ul data-start="4376" data-end="4502">
<li data-section-id="10mpuap" data-start="4376" data-end="4422">Accessing a government computer to <a href="https://www.carolinaattorneys.com/larceny-embezzlement-fraud.html" target="_blank">defraud</a></li>
<li data-section-id="1j12iz" data-start="4423" data-end="4464">Obtaining property by <a href="https://www.carolinaattorneys.com/false-pretense-charges-in-north-carolina.html" target="_blank">false pretenses</a></li>
<li data-section-id="t5ai7u" data-start="4465" data-end="4476">Forgery</li>
<li data-section-id="ojaad8" data-start="4477" data-end="4502">Habitual <a href="https://www.carolinaattorneys.com/north-carolina-criminal-law-chapter-14-1-felonies-and-misdemeano.html" target="_blank">felon</a> status</li>
</ul>
<p data-start="4504" data-end="4687">The trial court dismissed the forgery charge but allowed the remaining charges to go to the jury. The <a href="https://www.carolinaattorneys.com/are-jury-trials-required-for-criminal-charges.html" target="_blank">jury returned guilty verdicts</a> on the computer access and false pretenses charges.</p>
<p data-start="4689" data-end="4800">The facts mattered. This was not a close sufficiency call built on thin circumstantial evidence. The State had:</p>
<ul data-start="4802" data-end="5015">
<li data-section-id="1s42vay" data-start="4802" data-end="4833">Evidence deed was false</li>
<li data-section-id="1ian39j" data-start="4834" data-end="4885">Testimony contradicting legitimate transfer</li>
<li data-section-id="1mgrce4" data-start="4886" data-end="4940">Evidence defendant persisted despite red flags</li>
<li data-section-id="791bdk" data-start="4941" data-end="5015">A prior court order limiting the defendant’s ability to file documents</li>
</ul>
<p data-start="5017" data-end="5068">Those facts strengthened both intent and causation.</p>
<h2 data-section-id="tpjjrh" data-start="5070" data-end="5131">6. Indirect access and causing data entry | N.C.G.S. § 14-454.1</h2>
<p data-start="5133" data-end="5193"><i>Friend is </i>not a hacking case. It is a courthouse (Register of Deeds) filing-something-at-the-counter case.</p>
<p data-start="5195" data-end="5220">That distinction matters.</p>
<p data-start="5222" data-end="5418"><em>Friend</em> confirms that the government computer statute applies to ordinary interactions with public offices when those interactions are used to push a fraudulent scheme through an electronic system.</p>
<p data-start="5420" data-end="5540">If the State can show that a defendant intentionally set that process in motion to accomplish fraud, the statute may apply.</p>
<h2 data-section-id="19w7xe5" data-start="5542" data-end="5615">7. Attempted transfer of property | False Pretense under North Carolina law</h2>
<p data-start="5617" data-end="5716">The Court of Appeals in <em>Friend</em> also upheld the denial of the motion to dismiss on obtaining property by false pretenses.</p>
<p data-start="5718" data-end="5908">North Carolina law allows a conviction for an attempt to obtain value through deception. The State does not have to prove that the property was successfully transferred in a legally valid way.</p>
<p data-start="5910" data-end="6021">Recording a document is not the same as legally transferring title. That distinction did not defeat the charge.</p>
<h2 data-section-id="1x3xyo5" data-start="6023" data-end="6078">8. Proving intent to defraud in accessing a government computer charges</h2>
<p data-start="6080" data-end="6118">This is where careful reading matters.</p>
<p data-start="6120" data-end="6226"><em>Friend i</em>s a motion to dismiss case, not a blanket rule that every bad filing is a felony computer offense.</p>
<p data-start="6228" data-end="6255">The State still must prove:</p>
<ul data-start="6257" data-end="6381">
<li data-section-id="3ekan2" data-start="6257" data-end="6274">A willful act</li>
<li data-section-id="1wxyi6w" data-start="6275" data-end="6310">A scheme to defraud</li>
<li data-section-id="1a0004w" data-start="6311" data-end="6381">A causal link between the defendant’s conduct and the system’s use</li>
</ul>
<p data-start="6383" data-end="6477">The facts in <em>Friend</em> were objectively overwhelmingly favorable for the State. A weaker record might not carry the same weight with the Finder of Fact.</p>
<h2 data-section-id="1amx4o5" data-start="6479" data-end="6548">9. Limits of computer crime charges under North Carolina law</h2>
<p data-start="6550" data-end="6590"><em>Friend</em> does not eliminate real defenses.</p>
<p data-start="6592" data-end="6620">Different issues could arise if and when:</p>
<ul data-start="6622" data-end="6905">
<li data-section-id="1xs6k7p" data-start="6622" data-end="6691">The dispute involves legal interpretation rather than a clear, material intent to defraud</li>
<li data-section-id="1imp8n8" data-start="6692" data-end="6747">The filer relies on information from another person</li>
<li data-section-id="1wdoqcq" data-start="6748" data-end="6806">The document is flawed but not intentionally deceptive</li>
<li data-section-id="4id62e" data-start="6807" data-end="6853">The office refuses to process the document</li>
<li data-section-id="a8rhqs" data-start="6854" data-end="6905">There is no clear evidence of intent to deceive</li>
</ul>
<p data-start="6907" data-end="6972">Those distinctions likely matter. Indeed, they may be where cases are won and lost.</p>
<h2 data-section-id="c7owo3" data-start="6974" data-end="7047">10. Computer crime charges in document fraud cases | North Carolina</h2>
<p data-start="7049" data-end="7194">As public records and filings move through electronic systems, traditional fraud theories and computer crime statutes are, on an ever-increasing basis, being charged together.</p>
<p data-start="7196" data-end="7271">That potentially increases criminal exposure and, from the perspective of defense counsel, likely changes how cases may be evaluated from the start.</p>
<p data-start="7273" data-end="7405"><em>Friend</em> gives prosecutors a published decision supporting that approach in at least one context involving a Register of Deeds office.</p>
<h2 data-section-id="defhtj" data-start="7407" data-end="7462">11. Defenses to accessing a government computer to defraud in North Carolina</h2>
<p data-start="7528" data-end="7555">The focus should remain on:</p>
<ul data-start="7557" data-end="7779">
<li data-section-id="1njkpes" data-start="7557" data-end="7567">Intent</li>
<li data-section-id="fdil7b" data-start="7568" data-end="7610">Truth or falsity of the representation</li>
<li data-section-id="1yerkox" data-start="7611" data-end="7694">Whether the defendant actually caused the system to be used in a fraudulent way</li>
<li data-section-id="1enw2kx" data-start="7695" data-end="7779">Whether the State is stretching a document dispute into a felony computer charge</li>
</ul>
<p data-start="7781" data-end="7869">A jury may hear facts that feel deceptive. The law still requires proof of each element. The State carries the <a href="https://www.carolinaattorneys.com/burdens-of-proof-in-criminal-court-and-civil-court-in-the-caroli.html" target="_blank">Burden of Proof</a>, that being Proof Beyond a Reasonable Doubt.</p>
<h2 data-section-id="1a70a2p" data-start="106" data-end="199">Frequently Asked Questions About Accessing a Government Computer to Defraud North Carolina</h2>
<p data-start="283" data-end="617">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>What does accessing a government computer to defraud mean in North Carolina?</h3>            <div>
				                <p>
					 Accessing a government computer to defraud in North Carolina under N.C.G.S. 14-454.1 includes direct use of a system or conduct that causes a government employee to input or process information as part of a fraudulent scheme. The definition of accessing a government computer focuses on system use, not physical control of the device.                 </p>
            </div>
        </div>
    </section>



<p data-start="706" data-end="1006">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>Can accessing a government computer to defraud be charged without touching a computer?</h3>            <div>
				                <p>
					 Accessing a government computer to defraud can occur without touching a computer when conduct causes a government system to be used. Presenting a fraudulent document and insisting that it be processed may satisfy accessing a government computer if that conduct results in data entry tied to a scheme to defraud.                 </p>
            </div>
        </div>
    </section>



<p data-start="1105" data-end="1358">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>What does the State need to prove for accessing a government computer to defraud in North Carolina?</h3>            <div>
				                <p>
					 Accessing a government computer to defraud in North Carolina requires proof of a willful act, a scheme to defraud, and conduct that results in access or caused access to a government computer. The State must prove each element beyond a reasonable doubt.                 </p>
            </div>
        </div>
    </section>



<p data-start="1433" data-end="1683">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>What does access to a government computer mean?</h3>            <div>
				                <p>
					 Accessing a government computer in North Carolina is defined to include causing input, causing data processing, or otherwise making use of computer resources. This definition allows accessing a government computer to include indirect use of a system.                 </p>
            </div>
        </div>
    </section>



<p data-start="1775" data-end="2033">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>How is intent to defraud proven in accessing a government computer to defraud cases?</h3>            <div>
				                <p>
					 Intent to defraud in accessing a government computer to defraud cases may be proven through evidence of a deliberate scheme to mislead or obtain value through deception. The State may rely on documents, conduct, and surrounding circumstances to establish intent.                 </p>
            </div>
        </div>
    </section>



<p data-section-id="1bxm9k7" data-start="2452" data-end="2547">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>What is the difference between accessing a government computer to defraud and false pretense charges in North Carolina?</h3>            <div>
				                <p>
					 Accessing a government computer to defraud focuses on use of a government system to execute a scheme. False pretenses charges in North Carolina focus on obtaining or attempting to obtain value through deception. The same conduct may support more than one charge, but each offense requires proof of distinct statutory elements.                 </p>
            </div>
        </div>
    </section>



<p data-start="2548" data-end="2790">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>Does accessing a government computer to defraud require a successful transfer of property?</h3>            <div>
				                <p>
					 Accessing a government computer to defraud does not require a successful transfer of property. The State must prove that accessing a government computer occurred and that the conduct was part of a scheme to defraud, even if the scheme failed.                 </p>
            </div>
        </div>
    </section>



<p data-start="3228" data-end="3480">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>Are there legal defenses to accessing a government computer to defraud charges in North Carolina?</h3>            <div>
				                <p>
					 Defenses to accessing a government computer to defraud in North Carolina ordinarily focus on lack of intent, absence of a scheme to defraud, and failure to establish causation. Evidence of non-deceptive conduct or reliance on others may serve to challenge criminal charges.                 </p>
            </div>
        </div>
    </section>



<p data-start="3598" data-end="3840">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>Can Register of Deeds filings become accessing a government computer to defraud charges in North Carolina?</h3>            <div>
				                <p>
					 Register of Deeds filings may become accessing a government computer to defraud charges in North Carolina when the filing causes the office to use its system as part of a fraudulent scheme. The legal analysis centers on intent and system use.                 </p>
            </div>
        </div>
    </section>



<p data-start="3932" data-end="4159">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>Are there limits to accessing a government computer to defraud charges?</h3>            <div>
				                <p>
					 Accessing a government computer to defraud in North Carolina does not apply to every incorrect or disputed filing. The State must prove intentional deception and a meaningful connection between the conduct and the system’s use.                 </p>
            </div>
        </div>
    </section>



<h2 data-section-id="1qvu9jh" data-start="8226" data-end="8302">Charged with accessing a government computer to defraud in North Carolina</h2>
<p data-start="8304" data-end="8459">Cases involving allegations tied to public records and electronic systems now carry the potential for layered exposure, including both fraud and computer-related charges.</p>
<p data-start="8461" data-end="8587">Developing a defense strategy may therefore involve careful analysis of the evidence, the statutory elements, and how the State is framing intent and causation.</p>
<p data-start="8589" data-end="8911">Bill Powers has defended criminal cases in the Charlotte region for decades. He is a past president of the North Carolina Advocates for Justice and a recipient of the North Carolina State Bar Distinguished Service Award. His work includes complex cases involving complicated technological, scientific, and forensic evidence.</p>
<p data-start="8913" data-end="9062"><a href="http://CarolinaAttorneys.com" target="_blank">Powers Law Firm</a> handles serious criminal charges throughout the Charlotte metro region and is available for consultation on select matters statewide in North Carolina. <strong>704-342-4357</strong></p>
<p>The post <a href="https://www.carolinaattorneys.com/blog/accessing-government-computer-defraud-north-carolina/">Accessing a Government Computer to Defraud in North Carolina</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16524</post-id>	</item>
		<item>
		<title>Understanding Sexual Exploitation of Minor Charges in the Charlotte Region</title>
		<link>https://www.carolinaattorneys.com/blog/exploitation-of-minor-charges-north-carolina/</link>
		
		<dc:creator><![CDATA[Carolina Attorneys]]></dc:creator>
		<pubDate>Sun, 19 Apr 2026 14:00:02 +0000</pubDate>
				<category><![CDATA[Criminal Defense]]></category>
		<category><![CDATA[Cell Phone Forensics NC]]></category>
		<category><![CDATA[charlotte criminal defense]]></category>
		<category><![CDATA[Child Exploitation Charges NC]]></category>
		<category><![CDATA[Computer Crime Charges NC]]></category>
		<category><![CDATA[Computer Forensics Criminal Defense]]></category>
		<category><![CDATA[Court Process North Carolina]]></category>
		<category><![CDATA[Criminal Charges Involving Minors]]></category>
		<category><![CDATA[Criminal Defense Lawyer NC]]></category>
		<category><![CDATA[Digital Evidence Criminal Cases]]></category>
		<category><![CDATA[Digital File Analysis NC]]></category>
		<category><![CDATA[Distribution Charges NC]]></category>
		<category><![CDATA[Evidence in Exploitation Cases]]></category>
		<category><![CDATA[Exploitation of Minor Charges]]></category>
		<category><![CDATA[Federal and State Charges NC]]></category>
		<category><![CDATA[Felony Sex Offenses NC]]></category>
		<category><![CDATA[Intent and Knowledge Defense]]></category>
		<category><![CDATA[Internet Crimes North Carolina]]></category>
		<category><![CDATA[Internet Sting Operations NC]]></category>
		<category><![CDATA[Law Enforcement Cyber Crimes]]></category>
		<category><![CDATA[North Carolina Criminal Law]]></category>
		<category><![CDATA[Online Investigation Cases]]></category>
		<category><![CDATA[Pornogrpphy]]></category>
		<category><![CDATA[Possession of Exploitative Material]]></category>
		<category><![CDATA[Raleigh Criminal Defense]]></category>
		<category><![CDATA[Search Warrants Digital Evidence]]></category>
		<category><![CDATA[Serious Felony Defense NC]]></category>
		<guid isPermaLink="false">https://www.carolinaattorneys.com/blog/?p=16514</guid>

					<description><![CDATA[<p>Exploitation of minor charges in North Carolina are not a single accusation in practical effect. They refer to a group of extraordinarily serious felony offenses that turn on what the State says happened with visual material, who was involved, what the defendant knew, and whether the allegation is possession, receipt, distribution, solicitation, recording, creation, or [&#8230;]</p>
<p>The post <a href="https://www.carolinaattorneys.com/blog/exploitation-of-minor-charges-north-carolina/">Understanding Sexual Exploitation of Minor Charges in the Charlotte Region</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-path-to-node="5">Exploitation of minor charges in North Carolina are not a single accusation in practical effect. They refer to a group of extraordinarily serious felony offenses that turn on what the State says happened with visual material, who was involved, what the defendant knew, and whether the allegation is possession, receipt, distribution, solicitation, recording, creation, or conduct tied to producing the material. In the Charlotte region, spanning <b data-path-to-node="5" data-index-in-node="435">Mecklenburg, Union, Iredell, Gaston, Lincoln, and Rowan Counties, </b>these cases are <em>aggressively </em>prosecuted with heavy emphasis on digital forensic evidence and multi-agency task forces.</p>
<p id="p-rc_97ed4e9a55d2d635-43" data-path-to-node="6"><span class="citation-78 citation-end-78">North Carolina separates allegations into first-degree, second-degree, and third-degree sexual exploitation of a minor, and the statutory differences are critical because the elements, punishment levels, and proof issues vary significantly.</span> <span class="citation-77">Under the </span><b data-path-to-node="6" data-index-in-node="257"><span class="citation-77">2024 &#8220;Modernize Sex Crimes&#8221; updates </span></b><span class="citation-77">(Session Law 2024-37)</span><span class="citation-77">, first degree now includes specific </span><b data-path-to-node="6" data-index-in-node="334"><span class="citation-77">Class D felony</span></b><span class="citation-77 citation-end-77"> provisions for the creation of material involving &#8220;identifiable minors&#8221; for sale.</span> <span class="citation-76 citation-end-76">Second degree (Class E) includes conduct such as recording, distributing, and receiving prohibited material, including the solicitation of child sex dolls.</span> <span class="citation-75 citation-end-75">Third degree (Class H) focuses on knowing possession.</span> The definitions section now also reaches material created, adapted, or modified by technological means, including <b data-path-to-node="6" data-index-in-node="754">algorithms or AI</b>, and uses a broad &#8220;identifiable minor&#8221; standard, recognizable by face, likeness, or other distinguishing characteristic such as a unique birthmark, and does not require proof of the actual identity of the minor.</p>
<p data-path-to-node="7">This legal structure is well beyond &#8220;child pornography.&#8221; The real question is what offense level has been charged, what the digital metadata actually shows, and whether the State can prove the required mental state. These cases can rise or fall on the wording of a search warrant, the chain of custody for electronic devices, or the technical difference between &#8220;knowing possession&#8221; and an automated system artifact. A dominant defense starts with the statute and ends with a forensic audit of the State’s proof.</p>
<table data-path-to-node="9">
<thead>
<tr>
<td><strong>Charge Level</strong></td>
<td><strong>Core Allegation</strong></td>
<td><strong>Felony Class</strong></td>
<td><strong>Key Legal/Forensic Issue</strong></td>
</tr>
</thead>
<tbody>
<tr>
<td><span data-path-to-node="9,1,0,0"><b data-path-to-node="9,1,0,0" data-index-in-node="0">First Degree</b></span></td>
<td><span data-path-to-node="9,1,1,0">Production, creation, or facilitation of material</span></td>
<td><span data-path-to-node="9,1,2,0"><b data-path-to-node="9,1,2,0" data-index-in-node="0">Class C or D</b></span></td>
<td><span data-path-to-node="9,1,3,0">Authorship and &#8220;Creation for Sale&#8221; of AI/Deepfake content</span></td>
</tr>
<tr>
<td><span data-path-to-node="9,2,0,0"><b data-path-to-node="9,2,0,0" data-index-in-node="0">Second Degree</b></span></td>
<td><span data-path-to-node="9,2,1,0">Distribution, receipt, or solicitation</span></td>
<td><span data-path-to-node="9,2,2,0"><b data-path-to-node="9,2,2,0" data-index-in-node="0">Class E</b></span></td>
<td><span data-path-to-node="9,2,3,0">Verified transmission vs. automated cloud synchronization</span></td>
</tr>
<tr>
<td><span data-path-to-node="9,3,0,0"><b data-path-to-node="9,3,0,0" data-index-in-node="0">Third Degree</b></span></td>
<td><span data-path-to-node="9,3,1,0">Possession of prohibited visual material</span></td>
<td><span data-path-to-node="9,3,2,0"><b data-path-to-node="9,3,2,0" data-index-in-node="0">Class H</b></span></td>
<td><span data-path-to-node="9,3,3,0">Attribution of files on shared or synced devices</span></td>
</tr>
<tr>
<td><span data-path-to-node="9,4,0,0"><b data-path-to-node="9,4,0,0" data-index-in-node="0">New 14-190.17C</b></span></td>
<td><span data-path-to-node="9,4,1,0">Obscene visual representation of exploitation</span></td>
<td><span data-path-to-node="9,4,2,0"><b data-path-to-node="9,4,2,0" data-index-in-node="0">Class E or H</b></span></td>
<td><span data-path-to-node="9,4,3,0">The legal definition of &#8220;Obscenity&#8221; in AI-generated media</span></td>
</tr>
<tr>
<td><span data-path-to-node="9,5,0,0"><b data-path-to-node="9,5,0,0" data-index-in-node="0">Definitions</b></span></td>
<td><span data-path-to-node="9,5,1,0">&#8220;Minor,&#8221; &#8220;Identifiable Minor,&#8221; and &#8220;Material&#8221;</span></td>
<td><span data-path-to-node="9,5,2,0"><b data-path-to-node="9,5,2,0" data-index-in-node="0">Statutory Control</b></span></td>
<td><span data-path-to-node="9,5,3,0">Whether the depiction meets the &#8220;Recognizable Likeness&#8221; standard</span></td>
</tr>
</tbody>
</table>
<h2 data-path-to-node="11">1. How North Carolina Classifies Exploitation of a Minor Charges</h2>
<p id="p-rc_97ed4e9a55d2d635-44" data-path-to-node="12">A useful legal analysis starts with the specific subsection of the North Carolina General Statutes. The law treats first-degree, second-degree, and <a class="ng-star-inserted" href="https://www.ncleg.net/EnactedLegislation/Statutes/HTML/BySection/Chapter_14/GS_14-190.17A.html"  rel="noopener" target="_blank">third-degree sexual exploitation of a minor</a> as distinct offenses with varying sentencing exposures. <span class="citation-74 citation-end-74">First degree is the &#8220;Production&#8221; tier.</span> Second degree covers conduct such as recording, distributing, or soliciting material. <span class="citation-73 citation-end-73">Third degree is the &#8220;Possession&#8221; tier.</span></p>
<p id="p-rc_97ed4e9a55d2d635-45" data-path-to-node="13">This distinction is vital for those navigating the courts in Mecklenburg or Union County. <span class="citation-72">With the recent legislative updates, </span><b data-path-to-node="13" data-index-in-node="127"><span class="citation-72">G.S. 14-190.16</span></b><span class="citation-72"> now includes a specific </span><b data-path-to-node="13" data-index-in-node="166"><span class="citation-72">Class D felony</span></b><span class="citation-72 citation-end-72"> for creating material for sale that appears to show an &#8220;identifiable minor&#8221; engaged in sexual activity.</span> Identifying the exact theory, whether it’s a &#8220;production&#8221; theory or a &#8220;possession&#8221; theory, is an important first step in evaluating a defendant’s exposure and potential trial risk.</p>
<h2 data-path-to-node="15">2. Exploitation of a Minor Charges| The Myth of Physical Contact</h2>
<p data-path-to-node="14">North Carolina’s exploitation laws are built around visual depictions, performances, and the digital movement of data. In the Piedmont region, many cases are built entirely on data recovered from encrypted apps, cloud storage, or external hardware.</p>
<p data-path-to-node="15">Because the courtroom fight may be centered on digital artifacts rather than live witness testimony, the defense must pivot to forensic extraction and account attribution. Defense lawyers look at timestamps, login history, and metadata to determine if the digital record matches the State’s narrative. The legal question isn&#8217;t just about the presence of a file, but whether that file represents the specific conduct prohibited by the statute.</p>
<h2 data-path-to-node="16">3. Burden of Proof |Knowing Conduct</h2>
<p data-path-to-node="17">Each tier of the North Carolina exploitation statutes requires the State to prove a specific mental state: <b data-path-to-node="17" data-index-in-node="107">Knowledge</b>. <a class="ng-star-inserted" href="http://www.ncleg.gov/EnactedLegislation/Statutes/PDF/BySection/Chapter_14/GS_14-190.16.pdf"  rel="noopener" target="_blank">First-degree exploitation</a> and its lower-degree counterparts only apply if the defendant acted while &#8220;knowing the character or content of the material.&#8221; While mistake of age is explicitly excluded as a defense, the lack of knowledge regarding the file&#8217;s presence can serve as a valid defense.</p>
<p data-path-to-node="18">In contemporary litigation, &#8220;knowledge&#8221; is the primary battleground. With the prevalence of automated cloud backups, shared family devices, and malware-injected data, proving that a user <i data-path-to-node="18" data-index-in-node="187">knowingly</i> interacted with a specific file is a significant hurdle for the prosecution. We focus on proving the difference between a suspicious file and a proven intent.</p>
<h2 data-path-to-node="19">4. Digital Possession vs. Technical Control in Third-Degree Cases</h2>
<p data-path-to-node="20">Third-degree sexual exploitation is the possession statute, typically classified as a Class H felony. While it may seem like the &#8220;simplest&#8221; charge for the State to prove, digital possession is rarely self-evident. The State must demonstrate that the defendant had both the power and the intent to control the prohibited material.</p>
<p data-path-to-node="21">In cases involving shared household computers or synced smartphones, attribution may be everything. A forensic report might show a file fragment in unallocated space or a browser cache, but that does not inherently prove &#8220;knowing possession.&#8221; Our analysis focuses on user behavior and file paths to challenge the State&#8217;s assumption of control.</p>
<h2 data-path-to-node="22">5. The Broad Reach of Second-Degree Transfer Charges</h2>
<p data-path-to-node="23"><a href="https://www.ncleg.gov/enactedlegislation/statutes/pdf/bysection/chapter_14/gs_14-190.17.pdf" target="_blank">Second-degree sexual exploitation</a> (Class E felony) covers a wide spectrum of digital behavior, including recording, distributing, receiving, and soliciting. It also explicitly includes the transfer of material involving an &#8220;identifiable minor&#8221; or a &#8220;child sex doll.&#8221;</p>
<p data-path-to-node="23"> § 14-190.17 is broadly and expansively written, including <em>records, photographs, films, develops, duplicates, distributes, transports, exhibits, receives, sells, purchases, exchanges, or solicits.</em></p>
<p data-path-to-node="24">Second degree exploitation can be particularly dangerous because &#8220;distribution&#8221; leaves some room for interpretation by local DAs. It may involve peer-to-peer (P2P) file sharing where a user is technically &#8220;uploading&#8221; while downloading. Defense in these cases requires a deep dive into how the software operates—proving that a system-level artifact is not the same as a criminal intent to distribute.</p>
<h2 data-path-to-node="25">6. First-Degree Exploitation of Minor Charges | Addressing Production-Level Allegations</h2>
<p data-path-to-node="26">First-degree charges are the most serious in this category, often punished as Class C felonies. These allegations involve the actual creation of material or the facilitation of sexual activity for the purpose of a performance. These cases often involve heavy scrutiny of the defendant&#8217;s role in the production process.</p>
<p data-path-to-node="27">In 2026, with the ever-increasing ubiquity of AI-generated imagery, defense lawyers now anticipate first-degree charges tied to the &#8220;creation for sale&#8221; of AI-generated content or identifiable minor depictions. Such cases require a highly technical defense to challenge the State’s interpretation of authorship and custody. Distinguishing between a viewer and a producer can be a critical distinction that can alter the course of a lifetime.</p>
<h2 data-path-to-node="30">7. The Power of Statutory Definitions in the AI Era</h2>
<p data-path-to-node="29">To understand North Carolina law in 2026, it&#8217;s smart to begin with the definitions in <b data-path-to-node="29" data-index-in-node="77">N.C.G.S. § 14-190.13</b>. &#8220;Material&#8221; now includes visual depictions created or modified by algorithms or AI. The term &#8220;identifiable minor&#8221; is equally broad, encompassing any depiction where the subject is recognizable as a person under 18, regardless of whether their name is known.</p>
<h2 data-path-to-node="31">8. Search Warrants| The Constitutional Defense Strategy</h2>
<p data-path-to-node="32">A majority of exploitation cases in the Charlotte metro region, including Mecklenburg, Gaston, Union, Iredell, Rowan, and Lincoln Counties, begin with the execution of a search warrant. Law enforcement seizes phones, computers, and tablets to conduct deep-dive forensic audits. However, the validity of the case may very well rest on the legality of an initial seizure of electronics.</p>
<p data-path-to-node="33">Defense lawyers carefully scrutinize the <a href="https://www.carolinaattorneys.com/blog/north-carolina-search-warrant-law-suppression-evidence/" target="_blank">search warrant</a>, from the &#8220;probable cause&#8221; in the affidavit to the scope of the search itself. North Carolina’s <a href="https://www.ncleg.gov/EnactedLegislation/Statutes/PDF/BySection/Chapter_15a/GS_15A-252.pdf" target="_blank"><b data-path-to-node="33" data-index-in-node="144">N.C.G.S. § 15A-252</b></a> provides specific rules for warrant execution. If the State overstepped its bounds or relied on &#8220;stale&#8221; digital information to get the warrant, the resulting evidence could be suppressed.</p>
<h2 data-path-to-node="34">9. Overcoming Inferences | Proof Beyond a Reasonable Doubt</h2>
<p data-path-to-node="35">North Carolina statutes allow the trier of fact to &#8220;infer&#8221; that a person is a minor based on the context of the material. This is a powerful tool for prosecutors, but it is not an absolute. An inference does not relieve the State of its burden to prove every element of the crime beyond a reasonable doubt.</p>
<p data-path-to-node="36">A successful defense highlights the gaps where the State relies on assumptions rather than evidence. Whether it’s an issue of user identity or the technical origin of a file, we force the prosecution to provide more than just inflammatory inferences.</p>
<h2 data-path-to-node="37">10. The Necessity of Case-Specific Forensic Defense</h2>
<p data-path-to-node="38">Generic defense strategies do not work in the realm of sexual exploitation charges. Each case demands a granular analysis of the forensic extraction and the specific statutory theory. This means reviewing the registry keys, the file paths, and the interaction logs that the State claims prove guilt.</p>
<p data-path-to-node="39">At Powers Law Firm PA, we approach these cases as technical puzzles as much as legal ones. We separate the emotional weight of the accusation from the actual evidence presented. In the Charlotte region, having a lawyer who understands both the courtroom and the computer lab is the only way to achieve real criminal defense results.</p>
<h2 data-path-to-node="43">FAQs About Exploitation of Minor Charges in North Carolina</h2>
<p data-path-to-node="44">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>Are there any recent changes to the North Carolina exploitation laws?</h3>            <div>
				                <p>
					 As of December 1, 2024, North Carolina law has expanded to include &#8220;material&#8221; to explicitly include AI-generated depictions. Under N.C.G.S. §§ 14-190.16 through 14-190.17A, the State can now prosecute individuals for material that &#8216;appears&#8217; to be a minor, even if no physical minor was used in the production, provided the likeness is &#8216;identifiable.&#8217;                 </p>
            </div>
        </div>
    </section>



<p id="p-rc_66882d70e8519478-29" data-path-to-node="45">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>How does the State prove &#039;knowledge&#039; in a digital case?</h3>            <div>
				                <p>
					 Proof of knowledge typically comes from forensic evidence like &#8216;interaction logs&#8217; (showing a user opened or moved a file), search history, and saved passwords. In N<span class="citation-16 citation-end-16">orth Carolina, the prosecution must show the defendant knew the &#8216;character or content&#8217; of the material. Def</span>enses often center on &#8216;lack of attribution&#8217;—proving that while a file was present on a device, the defendant never knowingly interacted with it.                 </p>
            </div>
        </div>
    </section>



<p id="p-rc_66882d70e8519478-30" data-path-to-node="46">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>What is the difference between a Class C and a Class H exploitation felony?</h3>            <div>
				                <p>
					 The Class of felony depends on the &#8216;Degree&#8217; of the charge. Firs<span class="citation-15 citation-end-15">t Degree (Production) is usually a Class C felony, carrying significant prison time. Sec</span>ond Degree (Distribution) is a Class E felony. Third Degree (Possession) is a Class H felony. Each level carries different sentencing guidelines and potential requirements for Sex Offender Registration.                 </p>
            </div>
        </div>
    </section>



<p data-path-to-node="47">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>Can I be charged if the material was AI-generated?</h3>            <div>
				                <p>
					 Under current North Carolina law, visual depictions created by algorithms or artificial intelligence that appear to show a minor engaged in sexual activity could be treated the same as traditional photographs. The statute focuses on the &#8216;visual representation&#8217; and whether the minor depicted is &#8216;identifiable&#8217; as a real person, regardless of the technological origin. § 14-190.16–17A → require depiction of a minor or identifiable minor. § 14-190.17C → allows prosecution of obscene visual depictions of a minor even if no actual minor exists                 </p>
            </div>
        </div>
    </section>



<p data-path-to-node="48">    <section class="sc_fs_faq sc_card ">
        <div>
			<h3>What role do search warrants play in these cases?</h3>            <div>
				                <p>
					 Search warrants are the foundation of most exploitation cases. In counties like Mecklenburg and Gaston, law enforcement uses warrants to seize phones, computers, and cloud data. If the warrant was issued without sufficient probable cause or executed improperly, the defense may move to &#8216;suppress&#8217; the evidence, which can lead to the dismissal of charges.                 </p>
            </div>
        </div>
    </section>



<h2 data-path-to-node="50">Powers Law Firm | Thoughtful Criminal Defense in Charlotte Metro</h2>
<p data-path-to-node="0">Defense against sexual exploitation of a minor charges is anchored in a rigorous deconstruction of the State’s case. starting with the statutory theory and extending to the forensic integrity of the evidence seized. In the Charlotte region, prosecutions frequently turn on the precise, technical interplay between broad North Carolina statutes and the digital realities of modern data.</p>
<p data-path-to-node="1"><b data-path-to-node="1" data-index-in-node="0">Bill Powers</b>, is a recipient of the North Carolina State Bar <b data-path-to-node="1" data-index-in-node="257">John B. McMillan Distinguished Service Award </b>and a former President of the <b data-path-to-node="1" data-index-in-node="83">North Carolina Advocates for Justice (NCAJ). </b>He approaches high-stakes criminal allegations with a refined, disciplined methodology. <a href="http://CarolinaAttorneys.com" target="_blank"> Powers Law Firm</a> helps clients in <b data-path-to-node="1" data-index-in-node="580">Mecklenburg, Union, Iredell, Gaston, Lincoln, and Rowan counties</b>, and is available for consultation on select matters on a statewide basis.</p>
<p>The post <a href="https://www.carolinaattorneys.com/blog/exploitation-of-minor-charges-north-carolina/">Understanding Sexual Exploitation of Minor Charges in the Charlotte Region</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16514</post-id>	</item>
		<item>
		<title>Road Rage in North Carolina &#124; Self Defense</title>
		<link>https://www.carolinaattorneys.com/blog/road-rage-self-defense-north-carolina/</link>
		
		<dc:creator><![CDATA[Carolina Attorneys]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 14:00:31 +0000</pubDate>
				<category><![CDATA[Criminal Defense]]></category>
		<category><![CDATA[Aggressor Rule North Carolina]]></category>
		<category><![CDATA[BILL POWERS]]></category>
		<category><![CDATA[CHARLOTTE CRIMINAL DEFENSE LAWYER]]></category>
		<category><![CDATA[Charlotte Self Defense Lawyer]]></category>
		<category><![CDATA[Evidence in Self Defense Cases]]></category>
		<category><![CDATA[Felony Death by Vehicle NC]]></category>
		<category><![CDATA[Imminent Threat NC Law]]></category>
		<category><![CDATA[Manslaughter North Carolina]]></category>
		<category><![CDATA[NC Criminal Charges Road Rage]]></category>
		<category><![CDATA[North Carolina Courtroom Analysis]]></category>
		<category><![CDATA[north carolina criminal defense]]></category>
		<category><![CDATA[North Carolina Homicide Law]]></category>
		<category><![CDATA[North Carolina Legal Defense Strategy]]></category>
		<category><![CDATA[North Carolina trial lawyer]]></category>
		<category><![CDATA[Police Investigation Road Rage NC]]></category>
		<category><![CDATA[Proportional Force NC]]></category>
		<category><![CDATA[Road Rage Investigation NC]]></category>
		<category><![CDATA[Road Rage Laws NC]]></category>
		<category><![CDATA[Road Rage Self-Defense North Carolina]]></category>
		<category><![CDATA[Road Rage Shooting NC]]></category>
		<category><![CDATA[Self Defense Claims NC]]></category>
		<category><![CDATA[Self Defense Law North Carolina]]></category>
		<category><![CDATA[Shot in the Back Evidence NC]]></category>
		<category><![CDATA[Stand Your Ground NC]]></category>
		<category><![CDATA[Use of Deadly Force NC]]></category>
		<category><![CDATA[When Self Defense Fails NC]]></category>
		<guid isPermaLink="false">https://www.carolinaattorneys.com/blog/?p=16507</guid>

					<description><![CDATA[<p>In North Carolina, the line between &#8220;Standing Your Ground&#8221; and &#8220;Voluntary Manslaughter&#8221; can be thinner than a highway lane marker. While N.C.G.S. § 14-51.3 potentially provides robust protections for those defending themselves (and others from immediate bodily injury or harm), certain road rage incidents may not be subject to traditional self-defense claims. Road-rage shootings and [&#8230;]</p>
<p>The post <a href="https://www.carolinaattorneys.com/blog/road-rage-self-defense-north-carolina/">Road Rage in North Carolina | Self Defense</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="97" data-end="290">In North Carolina, the line between &#8220;Standing Your Ground&#8221; and &#8220;Voluntary Manslaughter&#8221; can be thinner than a highway lane marker. While N.C.G.S. § 14-51.3 potentially provides robust protections for those defending themselves (and others from immediate bodily injury or harm), certain road rage incidents may not be subject to traditional self-defense claims.</p>
<p data-start="292" data-end="669">Road-rage shootings and felony assaults with a vehicle as a &#8220;weapon&#8221; occasionally show up in North Carolina cases.  They may involve a confrontation that starts on the road, escalates over time, and ends with the use of deadly force. Early narratives may frame what happened as self-defense or defense of others (such as passengers). Later scrutiny, especially when the timeline and physical evidence are examined, can lead to a very different legal conclusion.</p>
<p data-start="671" data-end="1109">North Carolina law does not treat “<a href="https://www.carolinaattorneys.com/blog/stand-your-ground-north-carolina-2026-castle-doctrine/" target="_blank">stand your ground</a>” as a shortcut or absolute protection in every instance. Under <a href="https://www.ncleg.net/enactedlegislation/statutes/html/bysection/chapter_14/gs_14-51.3.html" target="_blank">N.C.G.S. § 14-51.3</a>, use of deadly force may be justified only when it is necessary to prevent imminent death or great bodily harm. <a href="http://www.ncleg.gov/EnactedLegislation/Statutes/PDF/BySection/Chapter_14/GS_14-51.4.pdf" target="_blank">N.C.G.S. § 14-51.4</a> also removes protections in the event someone may have, in fact, provoked the confrontation.</p>
<div class="read_more_link"><a href="https://www.carolinaattorneys.com/blog/road-rage-self-defense-north-carolina/"  title="Continue Reading Road Rage in North Carolina | Self Defense" class="more-link">Continue reading</a></div>
<p>The post <a href="https://www.carolinaattorneys.com/blog/road-rage-self-defense-north-carolina/">Road Rage in North Carolina | Self Defense</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16507</post-id>	</item>
		<item>
		<title>Search Incident to Arrest in North Carolina</title>
		<link>https://www.carolinaattorneys.com/blog/search-incident-to-arrest-in-north-carolina/</link>
		
		<dc:creator><![CDATA[Carolina Attorneys]]></dc:creator>
		<pubDate>Mon, 13 Apr 2026 16:18:01 +0000</pubDate>
				<category><![CDATA[Criminal Defense]]></category>
		<category><![CDATA[Arizona v Gant North Carolina]]></category>
		<category><![CDATA[Criminal Procedure North Carolina]]></category>
		<category><![CDATA[Drug Arrest Search NC]]></category>
		<category><![CDATA[DUI Search Law NC]]></category>
		<category><![CDATA[DWI Search Law North Carolina]]></category>
		<category><![CDATA[Fourth Amendment NC Practice]]></category>
		<category><![CDATA[Immediate Control Lunge Area]]></category>
		<category><![CDATA[Lawful Arrest Requirement NC]]></category>
		<category><![CDATA[Motion to Suppress NC]]></category>
		<category><![CDATA[NC Constitutional Law Criminal]]></category>
		<category><![CDATA[NC Court of Appeals Search Cases]]></category>
		<category><![CDATA[NC Criminal Defense Lawyer]]></category>
		<category><![CDATA[NC Evidence Suppression]]></category>
		<category><![CDATA[NC Fourth Amendment law]]></category>
		<category><![CDATA[NC Legal Guide Search and Seizure]]></category>
		<category><![CDATA[North Carolina search and seizure]]></category>
		<category><![CDATA[Plain View Doctrine NC]]></category>
		<category><![CDATA[Police Search Authority NC]]></category>
		<category><![CDATA[Probable Cause North Carolina]]></category>
		<category><![CDATA[Search and Seizure NC Cases]]></category>
		<category><![CDATA[Search Incident to Arrest]]></category>
		<category><![CDATA[Suppression Hearing North Carolina]]></category>
		<category><![CDATA[Traffic Stop Search NC]]></category>
		<category><![CDATA[Vehicle Search Incident to Arrest]]></category>
		<category><![CDATA[Warrantless Search NC]]></category>
		<guid isPermaLink="false">https://www.carolinaattorneys.com/blog/?p=16489</guid>

					<description><![CDATA[<p>Search incident to arrest can be a consequential tool for law enforcement. It comes up in traffic stops, DWI investigations, drug arrests, and other enforcement actions in North Carolina on a daily basis. When a search incident to a lawful arrest takes place, evidence of criminal acts may be properly admitted. When a search exceeds [&#8230;]</p>
<p>The post <a href="https://www.carolinaattorneys.com/blog/search-incident-to-arrest-in-north-carolina/">Search Incident to Arrest in North Carolina</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="font-family: Georgia, 'Times New Roman', serif; color: #1a1714; max-width: 780px; margin: 0 auto; line-height: 1.75; font-size: 17px;">
<p style="margin-bottom: 18px; font-weight: 300;">Search incident to arrest can be a consequential tool for law enforcement. It comes up in traffic stops, DWI investigations, drug arrests, and other enforcement actions in North Carolina on a daily basis. When a search incident to a lawful arrest takes place, evidence of criminal acts may be properly admitted. When a search exceeds the bounds of law, a Motion to Suppress may prove dispositive.</p>
<p style="margin-bottom: 18px; font-weight: 300;">This article lays out the criminal law in plain terms, with references to the North Carolina and United States Supreme Court cases that matter most when this issue ends up before a judge.</p>
<h2 style="font-family: Georgia, serif; font-size: 24px; font-weight: bold; color: #1a1714; margin: 44px 0 10px; padding-bottom: 6px; border-bottom: 1px solid #c8b89a;">The Probable Cause Foundation|Why the Search Incident to Arrest Exception Exists at All</h2>
</div>
<div class="read_more_link"><a href="https://www.carolinaattorneys.com/blog/search-incident-to-arrest-in-north-carolina/"  title="Continue Reading Search Incident to Arrest in North Carolina" class="more-link">Continue reading</a></div>
<p>The post <a href="https://www.carolinaattorneys.com/blog/search-incident-to-arrest-in-north-carolina/">Search Incident to Arrest in North Carolina</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16489</post-id>	</item>
		<item>
		<title>Domestic Violence Intervention in North Carolina &#124; Conditional Discharge, Probation &#038; Dismissals</title>
		<link>https://www.carolinaattorneys.com/blog/domestic-violence-intervention-nc-conditional-discharge/</link>
		
		<dc:creator><![CDATA[Carolina Attorneys]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 14:00:18 +0000</pubDate>
				<category><![CDATA[Criminal Defense]]></category>
		<category><![CDATA[15A Conditional Discharge NC]]></category>
		<category><![CDATA[Approved Domestic Violence Programs NC]]></category>
		<category><![CDATA[Assault on a Female NC]]></category>
		<category><![CDATA[Bill Powers Law Firm]]></category>
		<category><![CDATA[charlotte criminal defense attorney]]></category>
		<category><![CDATA[Charlotte Metro Criminal Defense]]></category>
		<category><![CDATA[Deferred Prosecution Agreement NC]]></category>
		<category><![CDATA[Domestic Violence Case Dismissal]]></category>
		<category><![CDATA[Domestic Violence Intervention Program]]></category>
		<category><![CDATA[Domestic Violence Intervention Standards]]></category>
		<category><![CDATA[Domestic Violence Legal Strategy]]></category>
		<category><![CDATA[Domestic Violence Probation Conditions]]></category>
		<category><![CDATA[Duluth Model NC]]></category>
		<category><![CDATA[Emerge Model DVIP]]></category>
		<category><![CDATA[Gaston County Domestic Violence Defense]]></category>
		<category><![CDATA[Iredell County Criminal Law]]></category>
		<category><![CDATA[Mecklenburg County DV Court]]></category>
		<category><![CDATA[Men Stopping Violence Program]]></category>
		<category><![CDATA[NC Criminal Record Dismissal]]></category>
		<category><![CDATA[NC Department of Administration DVIP]]></category>
		<category><![CDATA[NC Domestic Violence Commission]]></category>
		<category><![CDATA[North Carolina Domestic Violence Charges]]></category>
		<category><![CDATA[North Carolina DV Deferral]]></category>
		<category><![CDATA[Union County DV Charges]]></category>
		<guid isPermaLink="false">https://www.carolinaattorneys.com/blog/?p=16476</guid>

					<description><![CDATA[<p>Charged with a domestic violence in North Carolina? A domestic violence intervention program is not just a condition the court may impose after a conviction. In the right case, it can be the pathway to avoiding a conviction altogether. Under North Carolina law, a conditional discharge allows a defendant to plead guilty or be found [&#8230;]</p>
<p>The post <a href="https://www.carolinaattorneys.com/blog/domestic-violence-intervention-nc-conditional-discharge/">Domestic Violence Intervention in North Carolina | Conditional Discharge, Probation &#038; Dismissals</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Charged with a domestic violence in North Carolina? A domestic violence intervention program is not just a condition the court may impose after a conviction. In the right case, it can be the pathway to avoiding a conviction altogether.</p>
<p data-start="768" data-end="1211">Under North Carolina law, a conditional discharge allows a defendant to plead guilty or be found responsible, be placed on probation without entry of judgment, and earn a dismissal if the conditions are successfully completed. When domestic violence allegations are involved, one of the most important conditions the court or the parties may rely on is completion of a state-approved intervention program.</p>
<p data-start="1213" data-end="1485">That is where the list maintained by the <span class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"><span class="whitespace-normal">North Carolina Department of Administration</span></span> becomes more than administrative. It defines what the Court (and the District Attorneys Office) will recognize as legitimate compliance when a case is structured around dismissal, deferral, or conditional discharge-type outcomes.</p>
<div class="read_more_link"><a href="https://www.carolinaattorneys.com/blog/domestic-violence-intervention-nc-conditional-discharge/"  title="Continue Reading Domestic Violence Intervention in North Carolina | Conditional Discharge, Probation &#038; Dismissals" class="more-link">Continue reading</a></div>
<p>The post <a href="https://www.carolinaattorneys.com/blog/domestic-violence-intervention-nc-conditional-discharge/">Domestic Violence Intervention in North Carolina | Conditional Discharge, Probation &#038; Dismissals</a> appeared first on <a href="https://www.carolinaattorneys.com/blog">Carolina Criminal Defense &amp; DUI Lawyer Updates</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16476</post-id>	</item>
	</channel>
</rss>
