What does Chapter 32 of the Texas Penal Code cover?
Chapter 32 of the Texas Penal Code is the fraud chapter — roughly thirty separate offenses ranging from a Class C hot-check citation to a first-degree felony. The unifying thread is deception used to obtain property, credit, services, or an advantage from another person.
- Subchapter A — General provisions
- Penal Code §§ 32.01–32.03 supply definitions (writing, financial institution, property) and the cross-reference under § 32.03 that imports the theft-aggregation rule of § 31.09 into Chapter 32. The aggregation rule is doing more work than its placement suggests — it lets the State charge a series of small fraud transactions as a single felony when the transactions arise from one scheme.
- Subchapter B — Forgery and related
- Penal Code §§ 32.21–32.24 cover forgery (§ 32.21), criminal simulation (§ 32.22), trademark counterfeiting (§ 32.23), and stealing or receiving stolen check or similar sight order (§ 32.24). Forgery is the workhorse statute — most check-fraud, ID-document, and altered-instrument cases get charged here. Penalty grade depends on the type of writing forged.
- Subchapter C — Credit and debit cards, false statements
- Penal Code §§ 32.31–32.35 cover credit-card or debit-card abuse (§ 32.31), fraudulent use or possession of credit-card information (§ 32.315), false statement to obtain property or credit (§ 32.32), hindering secured creditors (§ 32.33), and fraudulent transfer of a motor vehicle (§ 32.34). The credit-card statutes have been amended repeatedly as payment technology evolved — the current version reaches skimmer devices, account takeover, and stolen-data trafficking.
- Subchapter D — Hot checks, deceptive business, commercial bribery
- Penal Code §§ 32.41–32.49 cover issuance of bad check (§ 32.41, most "hot check" cases as Class C), deceptive business practices (§ 32.42), commercial bribery (§ 32.43), rigging publicly exhibited contests (§ 32.44), misapplication of fiduciary property (§ 32.45 — overlaps with embezzlement), fraudulent securing of document execution (§ 32.46), fraudulent destruction or removal of writing (§ 32.47), simulating legal process (§ 32.48), and refusal to release fraudulent lien or claim (§ 32.49).
- Subchapter E — Identity, elderly exploitation, fictitious degree
- Penal Code §§ 32.51–32.53 cover fraudulent use or possession of identifying information (§ 32.51 — the state-level ID-theft statute, graded by item count), fraudulent or substandard fictitious degree (§ 32.52), and exploitation of an elderly individual (§ 32.53). § 32.51 has become the most heavily charged Chapter 32 statute in DFW courts as data breaches and account takeover have proliferated; the item-count grading creates extreme penalty cliffs at the 5, 10, and 50 thresholds.
The structure of Chapter 32 rewards careful charging analysis. A single course of conduct can plausibly support charges under three or four different sections — a check-fraud scheme might charge forgery (§ 32.21), credit-card abuse (§ 32.31), false statement for credit (§ 32.32), and theft-by-fraud (§ 31.03 by cross-reference). The unit-of-prosecution question — how many separate offenses the same act actually constitutes — is the first thing competent defense counsel resolves, because over-charging is the most common State error and produces the cleanest motions to quash. Hicks v. State, 372 S.W.3d 649 (Tex. Crim. App. 2012), addresses concurrent prosecution under multiple Chapter 32 sections and remains the governing framework for unit-of-prosecution challenges in this area.
The most commonly charged Chapter 32 statutes in DFW
Six Chapter 32 statutes account for the bulk of DFW indictments: forgery (§ 32.21), credit-card abuse (§ 32.31), false statement for credit (§ 32.32), misapplication of fiduciary property (§ 32.45), fraudulent securing of document execution (§ 32.46), and fraudulent use of identifying information (§ 32.51).
Forgery under § 32.21 is the most heavily charged fraud statute in Texas, by volume. The State must prove the defendant made, altered, completed, executed, or authenticated a "writing" so that it purports to be the act of another who did not authorize that act, with intent to defraud or harm another. Crittenden v. State, 671 S.W.2d 527 (Tex. Crim. App. 1984), is the foundational case on the intent element — mere possession of a forged instrument is not enough; the State must show the defendant knew the instrument was forged and acted with intent to defraud or harm. Penalty grade depends on the type of writing: a Class A misdemeanor for general writings, state-jail felony for checks, credit cards, contracts, and similar financial instruments, and third-degree felony for money, securities, stamps, government records, deeds, and wills.
Credit-card or debit-card abuse under § 32.31 is the next most common indictment. The statute reaches use without effective consent of the cardholder, use of a fictitious card, and use of an expired or revoked card. Cain v. State, 958 S.W.2d 404 (Tex. Crim. App. 1997), is the governing case on the "knowing" element — knowledge that the card was stolen, fictitious, or used without consent. The default grade is state-jail felony; § 32.31(d) elevates the grade to second-degree felony when the cardholder is an elderly individual. § 32.315 (fraudulent use or possession of credit-card information) reaches dark-web data and skimmer-device cases — distinct conduct from card-present use under § 32.31, and now the dominant theory in account-takeover prosecutions.
False statement to obtain property or credit under § 32.32 is the loan-application and credit-application statute. Grade scales with the value of property or amount of credit obtained, mirroring the theft grading: Class B for under $100 up to first-degree felony at $300,000 or more. Garner v. State, 939 S.W.2d 802 (Tex. App.—Fort Worth 1997), establishes the "knowing" requirement — the defendant must know the statement is false at the time made, and good-faith reliance on professional advice (an accountant, lawyer, or financial advisor) is a recognized defense path.
Misapplication of fiduciary property under § 32.45 reaches the broad universe of trustees, guardians, attorneys-in-fact, brokers, executors, and any other person holding property in a fiduciary capacity. This is the statute most commonly charged in trust-and-estate disputes, real-estate-escrow misappropriations, and law-firm IOLTA cases. Grade scales with value, from Class C to first-degree felony, and the 10-year statute of limitations under CCP Article 12.01 is the longest in Chapter 32 — facts a decade old can still be charged. Overlap with theft (§ 31.03) and embezzlement-theory prosecutions is common; counsel must navigate the unit-of-prosecution analysis carefully.
Fraudulent securing of document execution under § 32.46 reaches procurement of a signature by deception — used heavily in elder-fraud cases involving deeds, powers of attorney, and beneficiary changes. Grade scales with the value of property affected by the document. Fraudulent destruction, removal, or concealment of writing under § 32.47 is the parallel obstruction-style statute — destroying a will, contract, or financial instrument with intent to defraud. § 32.51 (fraudulent use or possession of identifying information) is now the most-charged ID-theft statute at the state level. The item-count grading under § 32.51(c) drives the indictment: fewer than 5 items is state-jail felony, 5–9 is third-degree, 10–49 is second-degree, 50 or more is first-degree. Galindo v. State, 502 S.W.3d 884 (Tex. App.—San Antonio 2016), is the leading case on item-count enhancement and what counts as a separate "item." Defense work here focuses heavily on whether multiple records containing overlapping data points (the same person's name plus DOB plus SSN appearing in three documents) count as one item or three.
Mens rea and the elements the State must prove
Most Chapter 32 offenses require "intent to defraud or harm" — a specific-intent mental state that defense work attacks first. Default culpable-mental-state rules under Penal Code §§ 6.02 and 6.03 supply the framework, but each Ch. 32 statute names its own required state in the text.
Penal Code § 6.02 establishes that a person does not commit an offense unless the conduct is performed with one of four culpable mental states — intentionally, knowingly, recklessly, or with criminal negligence — and § 6.03 defines each. Chapter 32 offenses overwhelmingly require intent to defraud or "intent to defraud or harm another." This is a specific-intent crime — the State must prove the defendant acted with the conscious objective to deceive and cause loss, not merely that the defendant made a false statement or used a card improperly. The distinction matters in three recurring fact patterns: civil-only billing disputes that get criminalized, business transactions later regretted, and good-faith reliance on professional advice.
Forgery under § 32.21 requires "intent to defraud or harm another" — the conjunction is "or," meaning either prong satisfies the element. Crittenden v. State, 671 S.W.2d 527 (Tex. Crim. App. 1984), held that mere possession of a forged instrument is not enough to support a forgery conviction; the State must also prove the defendant knew the instrument was forged and intended to defraud or harm someone with it. This is a classic three-element battle: knowledge (defendant knew the writing was forged), authorship-purpose (the writing purports to be the act of another), and intent (to defraud or harm). Defense work attacks any of the three; weak knowledge proof is the most common point of failure.
Credit-card abuse under § 32.31 requires the defendant act "with intent to obtain a benefit fraudulently." Cain v. State, 958 S.W.2d 404 (Tex. Crim. App. 1997), establishes that the State must prove knowledge of the card's stolen, fictitious, expired, or revoked status — and intent to obtain a benefit by that knowing use. The element-by-element analysis matters because card-cloning and account-takeover cases often involve a downstream user (a person who bought a re-encoded card from a dark-web vendor) who genuinely did not know the card was fictitious. The "knew or should have known" gloss that prosecutors sometimes argue is not in the statute; the element is actual knowledge, and defense work develops the evidentiary basis for absence-of-knowledge.
Misapplication of fiduciary property under § 32.45 requires the defendant act "intentionally, knowingly, or recklessly" — Chapter 32's rare statute that reaches reckless conduct. This is consequential, because most fiduciary disputes involve poor record-keeping, sloppy commingling, or genuine confusion about authority, rather than intentional theft. The State will charge intentional misapplication and fall back to a recklessness theory at trial if the intentional proof fails. Defense work here is two-track: rebut the intentional theory directly and prepare a recklessness-affirmative-defense theory in parallel.
Fraudulent use or possession of identifying information under § 32.51 requires intent to harm or defraud another, plus possession or use of identifying information obtained without consent of the named person or the use of a fictitious identity. The element-of-knowledge piece — that the defendant knew the information was obtained without consent — is often the weakest part of the State's case in dark-web-data prosecutions. Buyers of bulk identity data routinely have no contact with the original victims, no representation about how the data was acquired, and no scaffold of facts that would support actual knowledge of the source. Defense work in § 32.51 cases frequently focuses on this knowledge gap.
Penalty range by statute and value or item count
Chapter 32 penalty grades are driven by three variables — the specific statute charged, the value of property or credit obtained, and (for § 32.51) the count of identifying-information items. Restitution, statute-of-limitations triage, and unit-of-prosecution analysis all interact with penalty exposure.
The table below summarizes the dominant Chapter 32 statutes and their grades. Each grade carries the standard Texas misdemeanor and felony exposure under §§ 12.21–12.32 — Class C ($500 fine, no jail), Class B (up to 180 days county jail and $2,000), Class A (up to 1 year county jail and $4,000), state-jail felony (180 days to 2 years state jail and $10,000), third-degree felony (2–10 years prison and $10,000), second-degree felony (2–20 years prison and $10,000), and first-degree felony (5–99 years or life and $10,000).
Forgery under § 32.21 starts at Class A misdemeanor for general writings, elevates to state-jail felony for checks, credit cards, contracts, and similar financial instruments (§ 32.21(d)), and reaches third-degree felony for money, securities, stamps, government records, deeds, and wills. Elderly-victim enhancement under § 32.21(e) bumps the grade one level when the State proves the defendant knew the victim was elderly.
Credit-card or debit-card abuse under § 32.31 is a default state-jail felony, with second-degree felony enhancement when the cardholder is an elderly individual under § 32.31(d). False statement to obtain property or credit under § 32.32 is value-tiered exactly parallel to theft: Class C under $100, Class B $100–$750, Class A $750–$2,500, state-jail felony $2,500–$30,000, third-degree $30,000–$150,000, second-degree $150,000–$300,000, first-degree $300,000+. The value-determination contest is therefore the central battleground in most § 32.32 cases.
Misapplication of fiduciary property under § 32.45 follows the same value tier — Class C through first-degree based on the value of property misapplied. Fraudulent securing of document execution under § 32.46 is value-tiered identically. Fraudulent use of identifying information under § 32.51 uses an item-count tier instead: state-jail felony for fewer than 5 items, third-degree for 5–9, second-degree for 10–49, first-degree for 50 or more. Galindo v. State, 502 S.W.3d 884 (Tex. App.—San Antonio 2016), is the controlling authority on what counts as a separate "item" — duplicate records containing the same identifying information do not multiply the count.
Exploitation of an elderly individual under § 32.53 is graded third-degree to first-degree based on value, with a 7-year statute of limitations (longer than the general 5-year fraud period) under CCP Article 12.01. Misapplication of fiduciary property gets a 10-year limitations period — the longest in Chapter 32 — which means fiduciary-misappropriation cases can be charged from facts a decade in the past. Most other Chapter 32 felonies run on the 5-year fraud limitations period; counsel must track each charge separately because the limitations math drives discovery strategy.
Federal exposure runs parallel for nearly every Chapter 32 fact pattern. 18 U.S.C. § 1341 (mail fraud), § 1343 (wire fraud), § 1344 (bank fraud), and § 1028A (aggravated identity theft) reach the same conduct from a federal forum. Federal sentencing is loss-driven under USSG § 2B1.1 — the base offense level is 6 or 7, with loss-amount enhancements that scale aggressively ($6,500 = +0; $1.5M = +14; $25M = +22; $65M = +24). § 1028A imposes a 2-year mandatory minimum stacked consecutively on the underlying-felony sentence when the defendant uses another person's identification in connection with certain enumerated felonies. The forum decision — state Chapter 32 versus federal Title 18 — is one of the most consequential early choices in any DFW fraud case.
Defenses we evaluate first in Chapter 32 cases
Seven defense doctrines do most of the work in fraud cases: mens rea / specific intent attacks, good-faith defense, authority and consent disputes, value-determination challenges, identity and mistaken-perpetrator theories, statute-of-limitations triage, and aggregation-overreach challenges.
The single highest-leverage defense in a Chapter 32 case is the mens rea attack. Most Ch. 32 statutes require intent to defraud or "intent to defraud or harm another" — a specific-intent mental state. Crittenden v. State, 671 S.W.2d 527 (Tex. Crim. App. 1984), and Cain v. State, 958 S.W.2d 404 (Tex. Crim. App. 1997), are the foundational authorities. The State frequently relies on inference — that intent can be inferred from the false statement itself, from the defendant's knowledge of certain facts, or from a pattern of conduct. Defense work develops the alternative inferential set: civil dispute, billing error, mistake of fact, reliance on professional advice, intervening third-party action. When the jury sees an equally plausible non-criminal inference, reasonable doubt follows.
The good-faith defense is a close cousin of the mens rea attack but operates affirmatively. If the defendant honestly believed the statement was true, the conduct was authorized, or the document accurately reflected the underlying transaction, intent to defraud is negated. Good-faith reliance on professional advice — an accountant's tax position, a lawyer's contract interpretation, a financial advisor's investment representation — is a recognized variation. Garner v. State, 939 S.W.2d 802 (Tex. App.—Fort Worth 1997), addresses good-faith reliance in the § 32.32 false-statement-for-credit context. Documentary support is critical: contemporaneous communications with the professional, written advice memos, board minutes reflecting reliance.
Authority and consent disputes arise constantly in fiduciary cases (§ 32.45), credit-card cases (§ 32.31), and document-execution cases (§ 32.46). Did the defendant have actual or apparent authority to act? Was there a principal-agent relationship that authorized the conduct? Did the named victim give effective consent that the State has now characterized as a fraud? Penal Code §§ 31.01–31.03 supply the consent definitions imported into Chapter 32 by cross-reference. Civil-litigation discovery (emails, contracts, prior dealings) is frequently the cleanest path to authority evidence.
Value-determination challenges drive nearly every value-tiered Chapter 32 prosecution. Penal Code § 31.08 governs how value is calculated for theft and theft-by-fraud — fair market value at the time and place of the offense. Idowu v. State, 73 S.W.3d 918 (Tex. Crim. App. 2002), is the controlling authority on value determination in theft-by-fraud cases. The State will inflate value to push grade upward; defense will challenge with comparable-sale evidence, replacement-cost analysis, and (in fiduciary cases) net-of-restitution-and-offsets accounting. A successful value challenge that moves the case from third-degree to state-jail felony, or state-jail to misdemeanor, often changes the entire plea posture.
Identity and mistaken-perpetrator theories are the dominant § 32.31 and § 32.51 defenses in account-takeover cases. Card cloning, dark-web data leaks, skimmer-device theft, SIM-swap attacks, and BIN-attack patterns all produce fact scenarios where the named defendant is not the actual user of the card or data. Defense work develops the digital-forensics record — IP-address logs, device fingerprints, geolocation evidence, store surveillance — to either identify the actual perpetrator or establish that the State cannot prove identity beyond reasonable doubt. The State's burden on identity is rigorous, and circumstantial-only identity cases lose frequently when defense puts on a competent expert.
Statute of limitations is fraud-specific and varies dramatically by section. CCP Article 12.01 sets a 5-year limitations period for most fraud felonies; 7 years for exploitation of an elderly individual under § 32.53; 10 years for misapplication of fiduciary property under § 32.45. Counsel must track each charge in a multi-count indictment separately — the State sometimes overlooks limitations on individual counts, and a limitations dismissal can collapse a case piecemeal. Aggregation under § 31.09 can extend the effective limitations reach by tying older transactions to a more recent scheme; defense work attacks whether the aggregation theory was properly pleaded and whether the older transactions actually belong in the alleged scheme.
Aggregation-overreach challenges target the State's use of aggregation under § 31.09 (incorporated into Chapter 32 by § 32.03) to inflate grade. The State combines multiple smaller transactions into one alleged scheme to push the aggregated value above a felony threshold. Defense work attacks the scheme allegation directly — were these really transactions pursuant to "one scheme or continuing course of conduct," or are they unrelated events the State has bundled for charging convenience? Multiple, separately-charged smaller offenses are usually a better defense posture than a single felony-grade aggregated charge.
Common prosecution errors in Chapter 32 cases
Five State errors recur across DFW fraud dockets: loss-amount inflation, aggregation outside one scheme, charging both forgery and theft for the same act, item-count inflation under § 32.51, and elderly-victim enhancement applied without statutory predicate.
Loss-amount inflation is the most common State error in value-tiered Chapter 32 cases. Prosecutors will charge based on gross-transaction value rather than net-of-restitution value; will include credits and refunds in the loss figure; will treat retail price as if it were fair market value (the statute uses fair market, not retail). Idowu v. State, 73 S.W.3d 918 (Tex. Crim. App. 2002), governs value calculation. Defense audit of the State's loss spreadsheet — line by line — is the workhorse motion-practice tool. A successful value challenge frequently drops the grade by one or two tiers.
Aggregation outside "one scheme" is the second predictable error. § 31.09 (incorporated through § 32.03) authorizes aggregation only when the multiple transactions are "pursuant to one scheme or continuing course of conduct." Prosecutors routinely aggregate unrelated transactions — different victims, different time periods, different methods — into one alleged scheme to push the aggregated value over a felony threshold. Defense motions to quash the aggregation allegation, or motions in limine to prevent aggregated proof at trial, can collapse the felony-tier charging.
Charging both forgery (§ 32.21) and theft (§ 31.03) for the same act creates a unit-of-prosecution problem. Hicks v. State, 372 S.W.3d 649 (Tex. Crim. App. 2012), governs concurrent prosecution under multiple Chapter 32 sections. The State frequently charges every plausible statute, then forces the defense to litigate the duplication. Motions to quash on multiplicity grounds remove redundant counts and force the State to elect.
Item-count inflation under § 32.51 is the dominant error in identity-fraud cases. The State counts every record containing identifying information as a separate item, even when the records duplicate the same person's data. Galindo v. State, 502 S.W.3d 884 (Tex. App.—San Antonio 2016), is the leading authority on what counts as a separate "item." Three records containing the same person's name + DOB + SSN are not three items; they are one item appearing in three places. Defense work scrubs the State's item-count spreadsheet against the statutory definition and produces a defensible reduced count. Moving the count from 50+ (first-degree felony) to 10–49 (second-degree) or 5–9 (third-degree) is frequently dispositive of plea posture.
Elderly-victim enhancement under § 32.21(e), § 32.31(d), and the standalone § 32.53 statute requires the State to prove both the victim's status (65 or older) and the defendant's knowledge of that status. Prosecutors sometimes apply the enhancement on the victim-age fact alone, without sufficient evidence of knowledge. Defense work attacks the knowledge prong: where did the defendant get the victim's age information, what would a reasonable person have inferred from the available facts, and was the relationship structured such that age was obvious or hidden? Successful challenges to the enhancement drop the grade by one tier in § 32.21 and § 32.31 cases and can defeat the § 32.53 charge entirely.
What to do if you're charged with a Chapter 32 offense
The first 30 days in a fraud case are decisive: preserve documents, evaluate federal-prosecution risk, avoid contact with the alleged victim, and do not give a statement. Most defense leverage is built before indictment in fraud cases — pre-charge advocacy is uniquely productive.
Three things matter in the opening 30-day window. First, preserve every document, communication, contract, email thread, accounting record, and contemporaneous note that bears on the alleged transactions. Fraud cases are document-driven; the State's discovery production will be massive, and your contemporaneous records are the foundation of the good-faith and authority defenses. Send preservation letters to your bank, your accountant, your business partners, and any cloud-storage provider. Do not delete anything — destruction or alteration of records can support an obstruction charge under federal law and a § 32.47 charge under Texas law.
Second, evaluate federal-prosecution risk early. Federal fraud (18 U.S.C. §§ 1341, 1343, 1344, 1028A) reaches the same conduct as state Chapter 32 but produces dramatically higher exposure under the loss-driven USSG § 2B1.1 sentencing framework. Federal involvement signals — FBI subpoenas, AUSA contact, target letters, federal grand-jury appearances — must trigger immediate retention of counsel with federal experience. The forum decision (state vs. federal) is often made in the months before any indictment; pre-charge advocacy can sometimes keep a case in state forum where exposure is lower.
Third, do not give a statement and do not contact the alleged victim. Recorded statements to law enforcement, even informal ones, routinely supply the State's strongest evidence on the knowledge and intent elements. Contact with the victim — even well-intentioned outreach to "explain" the transaction — can support an obstruction or witness-tampering charge and forecloses settlement and restitution avenues that competent counsel could otherwise structure. Invoke the Fifth Amendment privilege explicitly ("I want to speak with a lawyer") and stay silent thereafter. If served with a subpoena to testify before a grand jury, retain counsel before responding.
Pre-indictment cooperation is sometimes the optimal path in fraud cases. Where federal exposure is high and the underlying facts are largely undisputed, a proffer-protected presentation to the AUSA — sometimes called a "reverse-proffer" depending on direction — can secure a non-prosecution agreement, a deferred-prosecution agreement, or a charge limited to lower-exposure counts. Proffer decisions are case-specific and risk-laden; they require counsel who has done them before and who has assessed the cooperation landscape, USSG § 5K1.1 substantial-assistance scoring, and the practical landscape of the assigned AUSA.
If the case is state-court, parallel civil exposure under the Theft Liability Act (Civ. Prac. & Rem. Code Ch. 134) is almost certain. Civil counsel and criminal counsel should coordinate from day one — Fifth-Amendment risks in the civil deposition, restitution structure that supports criminal-case mitigation, and settlement-document language that does not constitute an admission of guilt for collateral-estoppel purposes all require integrated planning. Many fraud defendants damage their criminal case by litigating the civil case without coordinating with criminal counsel.
Finally, document the legitimate business reasons. Most state-court fraud charges arise from transactions that had a non-criminal explanation — a business dispute, a misunderstanding, a partial completion, a delayed performance. Build the contemporaneous-records file: contracts, board minutes, email chains, payment schedules, communications with counterparties, professional-advisor memos. Defense work develops the non-criminal narrative; without contemporaneous documentation, the narrative is impossible to corroborate at trial.
DFW context and costs — Collin, Dallas, Denton, Tarrant
DFW fraud prosecutions concentrate in four county DA offices plus parallel federal AUSA exposure. Realistic defense costs run $7,500–$25,000+ for state-court cases and $25,000–$100,000+ for federal indictments. Cases resolve in 8–18 months on average.
Collin County's District Attorney's Economic Crime Division handles the bulk of Plano, Frisco, McKinney, and Allen fraud cases. The unit is staffed with prosecutors who specialize in financial-crime work and coordinate closely with Plano PD's Economic Crimes Unit — one of the more sophisticated municipal financial-crime units in the state. Collin charging tends toward the most expansive plausible charge (every viable Chapter 32 count plus theft-by-fraud); pre-trial diversion is available for first-offenders with clean history and supportable restitution, but the offer typically requires substantive defense motion practice before it materializes.
Dallas County's DA office runs a Public Integrity Unit for public-servant fraud and a separate Financial Crimes Section for private-sector cases. Dallas is more likely than the suburban counties to negotiate downward charges — to misdemeanors where the suppression or evidence-quality argument is credible, to deferred-adjudication outcomes where restitution is structured. The Dallas County FBI and Secret Service offices coordinate with the DA on parallel federal-state cases; forum decisions in Dallas County frequently happen at the AUSA level rather than the DA level.
Denton County's DA office handles fraud cases through its County Criminal Courts at Law (misdemeanor) and District Courts (felony). Denton is generally the most negotiable of the four DFW DA offices on first-offender fraud — pretrial diversion is more readily available, and the prosecutorial culture is less aggressive on initial charging than Collin. Lewisville, Flower Mound, and Frisco-Denton-side cases route through Denton; the dockets are smaller and individual cases get more prosecutor attention.
Tarrant County's DA runs a Crimes Against Children division and a separate White Collar Crime division. Tarrant is firm on initial charging similar to Collin but willing to negotiate substantially once the defense record is built. The Fort Worth, Arlington, and HEB-corridor cases route here; the FBI's Fort Worth office is active on federal parallel cases. Federal prosecution out of the Northern District of Texas (Dallas Division and Fort Worth Division) is the parallel risk for serious Tarrant fraud cases.
Defense fees vary by complexity and forum. A straightforward state-court Class A misdemeanor fraud — one count, no aggregation, no federal exposure — runs $5,000–$8,500 flat fee. A state-court felony fraud case with discovery, suppression motions, and plea negotiation runs $10,000–$20,000. A trial-ready state-court fraud case (multi-count, contested value, expert witnesses) runs $20,000–$35,000. Federal fraud cases (18 U.S.C. §§ 1341, 1343, 1344, or 1028A) start at $25,000 for representation through pre-indictment and basic plea, rise to $50,000–$80,000 for a full PSR-objection and sentencing-phase litigation, and exceed $100,000 for trial-ready federal defense with parallel asset-forfeiture and civil-recovery work.
Timeline expectations: state-court fraud cases resolve in 8–18 months from arrest to disposition when contested with motion practice. Pre-indictment fraud cases (where federal investigation is active before charges file) can run 6–18 months pre-charge plus the post-charge timeline. Federal fraud cases run 12–36 months from indictment to sentencing typically; complex cases involving large-loss USSG calculations and parallel civil litigation can extend to 4+ years. Cost-outcomes are restitution-driven: early restitution often unlocks deferred adjudication, pretrial diversion, or downward USSG variance, while delayed or contested restitution closes those doors. Professional-license consequences (Texas Medical Board, State Bar, Texas Real Estate Commission, FINRA, TEA/SBEC for educators, Texas Department of Insurance for agents) require self-reporting of any fraud charge and trigger separate disciplinary processes that run independently of the criminal case.