Computer Based Crimes
- Unauthorized access to computer systems (hacking)
- Mischief in relation to computer data
- Possession, distribution, or making available of child sexual abuse material
- Fraud facilitated by digital means (e.g., phishing, identity theft, online scams)
- Criminal harassment or uttering threats via electronic communications
- Voyeurism and non-consensual distribution of intimate images
- Money laundering or proceeds of crime linked to online activities
- Any other offence where digital evidence, metadata, internet histories, chat logs, or seized devices form a central part of the Crown’s case
These prosecutions frequently rely on highly technical evidence: forensic imaging of hard drives, analysis of metadata, recovery of deleted files, examination of SQL databases, browser histories, IP logs, and app data. Crown experts often present voluminous reports that can appear overwhelming to the uninitiated. Defending such cases demands not only a deep understanding of criminal law and procedure but also the ability to critically challenge digital forensic methodologies, chain-of-custody issues, and the reliability of expert opinions.Paul Lewandowski has developed a particular niche practice in cybercrime prosecutions.
With over two decades of experience as a trial lawyer, he has handled numerous computer-based cases at all levels of court in Ontario. More recently, he was invited as a guest lecturer at the Crown School Continuing Education Program (2022) in London, Ontario, on the topic of “Cybercrime”—a recognition of his specialized knowledge in this evolving area of law.