994124 2707945068332 935543345 n

Drew is a recognized Cyberspace and Technology Attorney in Ohio. Cyberspace and Internet Law is a new and upcoming area that Drew has opened the door to in Ohio. His proactive involvement in the Miami Valley community has led to his continuous engagement with the media such as Fox News, ABC News, CNN, and other high-end clientele across the country. Most notably, Drew has extensively covered the legal effects resulting from Summer 2016's mobile game release of "Pokemon Go", where players and businesses were affected civilly, criminally, and even on an intellectual property standpoint from this augmented reality game. 


While issues involving cyberspace and the internet have existed since its very creation, individuals who are trained on how to address, manage, and resolve such issues have not. We are currently in a digital age where technology has become our primary source of information, including a more efficient, yet, impersonal way to communicate. With such cyber-power, comes cyber-responsibility.

Drew’s cyberspace practice involves his ever expansive knowledge and handle on the following areas of cyberspace:

  • Cyberspace Crimes
    • A crime becomes a "cybercrime" when it is directed at a computer or other devices and/or those devices are used to commit the crime. These are crimes that take place on social media platforms such as Facebook, Twitter, Instagram, and even Snapchat. The most recognized crimes are cyber-stalking, cyber-bullying, cyber-harassment, defamation, and online predators. For example, any of these can be done by simply the posting of unwanted pictures or videos on an individual's profile page that is intended to victimize that user or another user, with the intent that it is seen by the victim and widely disseminated. 
  • Information Security Issues
    • Phishing/Phreaking.
    • Identity Theft/Identity Fraud. The act of stealing a LIVING or DECEASED person's identity and using their information for comitting fraud. 
    • Ransomware. A malicious program that takes over a device/account under the "THREAT OF "PAY ME OR ITS MINE". To free up their computer or profile, they will have to pay the hacker a fee or ransom. 
    • Social Engineering. The art of observing one's social online behaviors and tricking them into revealing their confidential information to you based off their online behaviors. For example, a frequent shopper on Amazon or a frequent donor to the American Red Cross may receive alot of emails from them. Thus, the hacker SITS BACK QUIETLY AND WATCHES YOUR DAY TO DAY ENGAGEMENTS ONLINE and will then send you an email that LOOKS LIKE IT IS FROM AMAZON or AMERICAN RED CROSS.
    • cyber crime
  • Computer & Business Threats
    • Hacking. There are 3 TYPES OF HACKERS. A White Hat hacker are professional security experts that are hired by companies for the purpose of identifying problems and vulnerabilities in a system. A Gray Hat hacker are those who may have both ALTRUISTIC or MALICIOUS purposes in their decision to hack or exploit systems. Typically, a gray hat hacker will provide the requested information for financial gain. Arguably, the most notable gray hacker is Edward Snowden; however, many believe him to be a black hatter. A Black Hat hacker is society's typical depiction of a hacker. These are individuals who compromise systems for malicious purposes or personal gain. 
    • Creation of Custom Cyber Policies for Your Business
  • Content Issues Online
    • Obscene or Offensive Content on Social Media. While the First Amendment to the U.S. Constitution and Ohio State Consititution protects the freedom of speech and expression, there is some speech that is exempt from this protection. This includes the posting or "obscene or offensive" content . If you feel that there is something wandering the internet of you or a loved one, please contact my office today for a free consultation. 
  • Creation of Cyber Policy for Your Law Firm/Business Needs
    • It is very important for your business to implement a cyber-policy that is intended to address when a data breach occurs. This could range from an employee bringing their own device to work, or even accessing a malicious website (even if unintended). This also serves to shield you from liability in the event you or your client’s personal identifiable information (PII) is breached, stolen, and even leaked.

Share This