A theft or fraud charge looks tidy on paper. Statute number, alleged amount, a few lines of narrative. In the real world, those few lines often hide the messiness that decides the outcome. A store detective who cut corners. A bank investigator who misunderstood how batch transactions post overnight. A client who thought “borrowing from the till” would be fixed by payday. The job of a criminal defense lawyer is not to spin a story, but to force the state to match the mess to the law, element by element, proof by proof, while protecting the client’s future from the machinery of accusation.
I have handled cases where a $72 shoplifting allegation nearly became a felony because a security guard said the client “shoved” a swing gate. I have handled seven-figure wire fraud investigations that unraveled because agents misunderstood how ACH reversals work. The defense of theft and fraud is not one skill, it is a cluster of them: forensic auditing, surveillance literacy, human psychology, and a stubborn loyalty to the burden of proof. The stakes range from diversion and sealed records to prison time and permanent bars from entire industries. The methods shift accordingly.
Theft versus fraud: same family, different fights
Theft is usually about taking property without consent. Fraud is about obtaining it with consent that was tricked or coerced. That difference changes the case in subtle ways. Most theft cases turn on possession and intent at a specific moment: Did the person conceal the item and pass the last point of sale? Did they break a lock? Fraud cases stretch across time. You see bank records, emails, and inconsistent statements, and you spend your days reconstructing intent through patterns.
Both areas share elements that prosecutors must prove: intent, value, identity, and causation. But the evidentiary posture changes. Theft cases often have eyewitnesses and video that look damning in a ten-second clip. Fraud cases often have spreadsheets that look damning because of volume. In each, the criminal defense lawyer chooses where to fight. Sometimes it is the element. Sometimes it is the procedure. Often, it is the narrative that explains what the jury is actually seeing.
The first hour: triage and timeline
If you are arrested or contacted by an investigator, the first hour sets the tone. A good criminal defense lawyer triages quickly. They secure the basics: discovery, bond conditions, the client’s devices and accounts, and any evidence that tends to evaporate. Store surveillance overwrite schedules range from three days to thirty. Banks retain certain logs for as little as ninety days. Door camera video and rideshare data can verify a client’s location at key times. Those steps sound mundane. They win cases.

There is also a human triage. Clients want to explain. They want to talk their way out of it. That urge feeds two machines that do not care about nuance: confession and contradiction. We slow the client down, restrict all interviews to counsel-led settings, and build a timeline of verifiable facts. Then we compare that timeline to the police report. The distance between those two documents tells me how to allocate resources. If the report is barebones and wrong on simple details, more aggressive motions make sense. If the report is meticulous and corroborated, we look for leverage outside the four corners: treatment, restitution ability, employment, immigration risk, and diversion eligibility.
Intent is rarely loud
People think intent is a confession. It is usually quieter. In theft cases, intent is inferred from behavior: concealment, exit, bypassing registers, tools in the bag. In fraud cases, intent is inferred from patterns: fabricated documents, repeated misrepresentations, the mix of personal and business accounts, shell entities, and deletions.
I had a case involving “return fraud” where the store video showed my client bringing an item to customer service without a receipt. The receipt produced was real, but from a different store location. Loss prevention claimed a classic fraud. What the video did not show was the exchange between my client and an associate fifteen minutes earlier on a different camera bank. The associate told her to bring the item to customer service and said the system could pull the receipt using the credit card number. The receipt that printed populated the other store by default because that was where the original purchase happened. Once we stitched the feeds and subpoenaed the POS settings, intent fell apart. Same footage, different context, different case.
In larger frauds, intent often hinges on what lawyers call contemporaneous documentation. If you are accused of inflating revenue to secure a loan, the presence of cautious internal emails, independent valuations, and disclosure of downside risk helps. Sloppy, self-serving spreadsheets created after the investigation starts do not. The defense builds that record, not by rewriting history, but by excavating what the business actually did and why.
The anatomy of shoplifting, upgraded
Retail theft ranges from teenage impulse to organized crews. Clerks and prosecutors often treat them the same. The criminal defense lawyer has to separate them quickly. Did the store follow its own policies for surveillance and apprehension? Most chains require continuous observation from selection to exit because gaps create reasonable doubt. Did security distract or assist? If a plainclothes guard stands between a shopper and the register, you reframe the exit as an attempt to find another cashier. Did the device beep at the door? Anti-theft tags misfire with dreary regularity. A beeping tower is not proof of theft, although jurors intuitively treat it that way.
Felony thresholds matter. In many states the line sits between $500 and $1,000, adjusted every few years. I once had a cart with groceries, diapers, and a blu-ray player priced at $269. The store used the shelf tag on a discontinued model with a $429 price, bumping the total above the felony line. The SKU scan contradicted the shelf tag. The state wanted “replacement cost.” The statute required “market value.” A half-hour hearing on valuation saved the client’s record.
And then there is force. Any physical contact in the course of leaving can be charged as robbery, a large upgrade. A swing gate bumped by a cart. A guard grabbing a backpack. The line between jostling and force can decide whether the case becomes non-probationable. Use-of-force policies, camera angles, and witness positioning matter. Jurors like stories that follow rules. If the guard broke his rules, the conduct looks less like violence and more like confusion in a tight space.
Employee theft and the math of access
When an insider is accused of taking property or embezzling funds, the employer’s anger drives the case. Anger is a poor accountant. We demand access logs, shift rosters, key control records, and redundancy maps. Who else could open the safe? How many shared logins exist? Does the POS system properly attribute overrides to individual codes, or does the night manager use a common code? Employers often misunderstand their own systems. During one case, the audit trail blamed my client for a string of post-close returns. We learned the system attached the return to the last logged-in cashier even when the manager processed the transaction under a master key. That single architecture choice generated six bogus charges.
Restitution plays a bigger role here. If the evidence is strong but the employer’s position is driven by the balance sheet, a structured restitution agreement with a consent judgment can eliminate the urge to push for incarceration. It also helps with prosecutors who see a business loss and want a policy outcome. We remind them: criminal court is not a collections department.
Identity theft and the problem of “you”
Identity fraud cases often rely on sloppy shortcuts. Investigators trace IP addresses to home routers and call it a day. Phones ping near a location, so they say you were there. Package mules deliver goods to a drop house, and the person who signed for the parcel wears a hoodie similar to your hoodie. A criminal defense lawyer looks for the friction. Who actually sat at the keyboard? Was the login two-factor authenticated? Did the IP resolve to a residential VPN range? Were there other devices on the network that night? Doorbell cameras, Uber logs, and thermostat histories have saved clients from wrongful identification. One defendant avoided a plea when we proved his phone connected to his office Wi-Fi, then his gym, then his apartment, with gaps that matched a completely ordinary evening nowhere near the alleged ATM skimmer.
Prosecutors sometimes lean on “common plan” evidence to say, if you did one fraud, you did them all. Courts limit that, but the temptation remains. Our counter is precision. Which transaction, which device, which moment, tied to which person with what evidence? Theft and fraud charges feel like a wave. You tame the wave by cutting it into discrete, provable bites.
Check kiting, wire fraud, and the fog of banking
Financial fraud cases tend to intimidate jurors because the vocabulary sounds technical. Kiting, holds, ledger balance versus available balance, return codes, NACHA windows. We demystify. Many alleged frauds turn out to be risky cash-flow games that collapsed. That does not make them legal, but intent looks different when a client believed an incoming wire would land before payroll debited. Prosecutors often miss how settlement timing works. ACH credits can be reversed by the originator within a certain window. Wires are generally final but can be recalled under limited conditions. Debits and credits post in events, not in chronological order. The order can create or erase “overdrafts” that never existed in real time. A defense mounted on the actual flow of funds, supported by bank policies and expert testimony, can deflate a dramatic narrative.
I handled a startup case where the founder cobbled short-term advances from friends, then moved money between two business accounts to float supplier payments. The bank’s fraud unit flagged the pattern as a kite. The numbers were ugly. After we reconstructed five months of transactions, the supposed “artificial balances” were largely artifacts of overnight sweep settings and automated overdraft protection. The founder still faced exposure on two misrepresentations to lenders, but the heart of the case shrank from a scheme to defraud the bank to sloppiness under pressure. That recalibration led to a misdemeanor plea, restitution, and a chance to rebuild.
Digital breadcrumbs, properly baked
Surveillance footage, POS logs, cloud email archives, carrier records, application audit trails, smartphone metadata, and social media messages form the spine of modern theft and fraud prosecutions. The tools that gather them are fallible, and the people who use them sometimes cut corners. Chain of custody matters. Metadata matters. Hash values and export formats matter. If the state hands over a USB stick with “video,” we ask for the native format, the player version, the extraction log, and the system’s overwrite policy. A one-second timecode drift can change whether the client had fifteen seconds to exit or two. A missing camera in a four-camera array might have been off, or its footage might have been overwritten because nobody stopped the cycle.
When dealing with smartphone evidence, we scrutinize the scope. Did the warrant authorize a full file system extraction for a shoplifting case? Overbreadth can suppress troves of messages. For fraud, chat histories are gold, but they require context. Emojis, short replies, and auto-suggested responses can be interpreted in wildly different ways. We often build a translation map using prior conversations between the same people to show how they use shorthand. A thumbs-up to “wire sent?” does not prove the wire actually went, only that the sender acknowledged the message.
Statements: better absent than clever
Clients want to explain. They want to say, I meant to pay. I forgot. I used my card by mistake. Those statements feel human and reasonable, but they almost always fill gaps in the state’s proof. Prosecutors love “consciousness of guilt.” The criminal defense lawyer’s position is consistent: say nothing outside counsel’s presence, and if a statement is strategic, say it in a controlled setting to lock the scope. I have watched a casual assurance to a store detective morph into an “admission” that the client intended to take more items later. Loss prevention officers are trained to extract concessions. So are bank investigators. Saving face is not a defense strategy.
Diversion, civil compromise, and creative exits
Not every theft or fraud case should end in a verdict. Many jurisdictions offer diversion for first-time, low-level offenses. Completing a theft-awareness program, performing community service, and paying restitution can lead to dismissal and record sealing. The criminal defense lawyer identifies eligibility early and begins the work immediately. If the client can accept responsibility without admissions that complicate immigration or professional licensing, diversion is often the fastest route to a future.
Civil compromise remains available in fewer places, but where it exists, it can resolve property offenses when the victim is made whole. Restitution paid quickly, a letter acknowledging harm, and an agreement from the victim to request dismissal can carry weight. Even where compromise is not formalized, prosecutors listen when a victim says, we are satisfied and want our money, not a conviction.
In financial cases, creative structures help. A consent judgment filed in civil court with security, wage assignments, and collateral gives victims comfort. In return, prosecutors can justify reduced counts and probationary terms. I have negotiated conditional pleas that dismiss fraud counts upon verified repayment milestones. That approach turns the energy of an angry victim into a plan, not a hammer.
When the number matters more than the label
Charging decisions ride on amount. Cross a threshold by one dollar, and a misdemeanor snaps into a felony. Amount is not always straightforward. In theft, statutes vary: replacement cost, fair market value, or the highest of the two. In fraud, prosecutors often add up the face value of every transaction, even if some goods were returned or services delivered in part. We press for net loss: the actual financial detriment, proof included. In one credit card fraud case, the bank sought $48,000 based on postings, but credits, chargebacks, and merchant clawbacks reduced the bank’s net loss to $11,000. The difference did not just drop the sentencing range. It changed whether the client qualified for community control.
The outlier defenses that actually work
Every so often, a case hinges on something that sounds like a television show. Mistaken barcodes. RFID interference. Key cloning. POS firmware bugs. People roll their eyes, then we bring the evidence. I once hired an engineer to test a store’s anti-theft towers after repeated false alarms at a single entrance. The report showed a miscalibrated sensor overlapping with the store’s own security tags on nearby shelving. The store re-tagged its fixtures. The client’s case disappeared.
In fraud, one of the most underused defenses is the good-faith reliance instruction. If a defendant acted in honest good faith, believing statements were true and transactions legitimate, even if unreasonable, that can negate intent. To make that real, we find the advisors, the emails, the drafts, and the moments when someone told the client, this works. Jurors are skeptical of “my accountant did it” without proof. With proof, it changes the lens from cunning to credulous.
Trial as leverage, trial as truth
Most theft and fraud cases resolve short of trial. Some need a courtroom. You know it early when the facts are brittle and the state refuses to bend. Trial in a theft case is usually simple and fast: a handful of witnesses, a few exhibits, sharp cross-examination on observation and procedure. Jurors relate to stores and exits and receipts. Fraud trials are marathons. You break the government’s tidy charts into human-sized stories. You show the jurors how a business lives in the gray. You concede what is real and pound what is not. Credibility becomes the currency.
I had a three-day bench trial on a fraudulent leasing scheme. The state had charts with arrows that made my client look like a cartoon villain. We admitted the two worst emails in opening, then spent the next https://blogfreely.net/neasaleans/how-a-criminal-defense-lawyer-deals-with-informants-and-cooperating-witnesses two days showing the judge eighty contracts that performed, tenants who stayed and paid, and a lender whose underwriting department stamped approvals without reading attachments. The judge acquitted on the top counts and convicted on a single misdemeanor disclosure failure. The difference between walking out the front door and being cuffed was the court seeing the whole movie, not the trailer.
Collateral consequences: the quiet budget of defense
The best resolution on paper can be the worst decision in life. Theft and fraud convictions carry collateral consequences that dwarf a short sentence. Immigration, public benefits, professional licenses, security clearances, federal contracting, and banking privileges all react differently. A bar applicant with a shoplifting diversion might weather it with candor and remediation. A noncitizen with a fraud plea might face removal even for a low sentence because the offense qualifies as a crime involving moral turpitude or an aggravated felony. The criminal defense lawyer maps these consequences before any plea. That mapping guides charge bargaining, choice of statutes, and wording of allocutions. I have negotiated pleas to attempted offenses and obstruction of business operations solely to avoid immigration triggers. Prosecutors willing to consider the big picture often prefer accountability that does not exile someone for life.

What to expect from a competent criminal defense lawyer
- Clear priorities in the first week: preserve video, lock down statements, collect financial records, and stabilize bond and employment. Candor about evidence strengths and weaknesses, with specific action items rather than vague optimism. A working knowledge of surveillance systems, POS architecture, banking operations, and digital evidence protocols. A plan that integrates legal tactics with collateral risk management, from immigration to licensing to employment. Negotiation that treats restitution and compliance as tools for mitigation, not concessions made too early.
When to fight, when to fold, and how to land softly
There is a discipline to defense that clients rarely see. Sometimes the righteous fight is worth the risk. Sometimes it is a coin flip with prison on one side and a future on the other. We build leverage by being ready for trial. We spend leverage by choosing resolutions that solve the whole problem. Land softly does not mean walk away untouched. It means landing on a runway that leads somewhere: a sealed record after probation, a payment plan that closes a chapter, a non-theft conviction that lets a career survive.

Defense in theft and fraud demands humility about what you do not know and confidence about what you can prove. The work is less about dazzling juries and more about patient reconstruction of reality. The camera angle, the bank ledger, the timestamp, the forgotten policy, the overlooked log, the way a person reached for their wallet when a sensor beeped. Stack enough of those pieces, and the state’s certainty loosens. That is often all you need.
A final word on prevention, because you may not need me if you read this twice
Nobody calls a criminal defense lawyer because life is calm. But some patterns reliably birth cases. Businesses that share logins, skip reconciliations, or mix personal and business funds invite fraud allegations when anything goes wrong. Employees who use manager overrides to “help” customers without documenting the reason invite theft accusations when the till comes up short. Shoppers who pocket small items while continuing to browse treat concealment as harmless, then learn how loss prevention writes reports.
If you run a small business, map your approval chains, segregate duties so no single person can authorize and record a transaction, reconcile weekly, and train everyone on audit trails. If you are an employee, use your own login every time, avoid cash “borrowing,” and document customer exceptions. If you are a consumer, keep receipts and do not rely on store memory. If you are under investigation, stop talking except to your lawyer, gather your records, and resist the urge to fix it alone.
A theft or fraud accusation does not define you. It does, however, demand that you respond intelligently. The law gives the state heavy tools. A skilled criminal defense lawyer makes them prove every swing. With the right strategy, that is often enough to change the ending.
Law Offices Of Michael Dreishpoon
Address: 118-35 Queens Blvd Ste. 1500, Forest Hills, NY 11375, United States
Phone: +1 718-793-5555
Experienced Criminal Defense & Personal Injury Representation in NYC and Queens
At The Law Offices of Michael Dreishpoon, we provide aggressive legal representation for clients facing serious criminal charges and personal injury matters. Whether you’ve been arrested for domestic violence, drug possession, DWI, or weapons charges—or injured in a car accident, construction site incident, or slip and fall—we fight to protect your rights and pursue the best possible outcome. Serving Queens and the greater NYC area with over 25 years of experience, we’re ready to stand by your side when it matters most.