⌨ Template Preview
☎ Call Today
Criminal Defense • Frisco, Texas
Serving 9 DFW Counties — Collin • Dallas • Denton • Tarrant • Rockwall • Kaufman • Ellis • Johnson • Hunt — Available 24/7
White Collar · Fraud (Penal Code Ch. 32)

Texas fraud defense

Texas Penal Code Chapter 32 sweeps from a Class C hot-check citation (§ 32.41) up to a first-degree felony for fraudulent use of fifty or more pieces of identifying information (§ 32.51) — and every charge in between hinges on three flexible elements: a culpable mental state, a value or item-count, and an act of deception. Defense work lives in those three places.

13 min read 3,380 words Reviewed May 17, 2026 By Reggie London
Direct Answer

Texas fraud under Penal Code Chapter 32 is a family of offenses ranging from a Class C hot-check citation (§ 32.41) to a first-degree felony for fraudulent use of fifty or more pieces of identifying information (§ 32.51). The most heavily charged statutes are forgery (§ 32.21), credit-card abuse (§ 32.31), false statement for credit (§ 32.32), misapplication of fiduciary property (§ 32.45), and fraudulent use of identifying information (§ 32.51). Defense engages with: (1) specific intent to defraud — the State must prove the defendant acted with conscious objective to deceive; (2) value-determination challenges that drive penalty grade; (3) item-count attacks under § 32.51; (4) aggregation-overreach challenges under § 31.09; (5) statute of limitations triage (5 / 7 / 10 years per section under CCP Art. 12.01); and (6) federal-versus-state forum decisions where 18 U.S.C. parallel exposure exists. Realistic state-court defense costs $7,500–$25,000+; federal cases run $25,000–$100,000+; cases resolve in 8–18 months on average.

Free case review
Key Takeaways
  • Penal Code Chapter 32 covers all Texas fraud — forgery, credit-card abuse, ID-info fraud, fiduciary misapplication, and more.
  • § 32.51 item count drives ID-fraud grade — state-jail (<5) to first-degree felony (50+).
  • 5 / 7 / 10-year statutes of limitations vary by section under CCP Art. 12.01.
  • Federal parallel exposure under 18 U.S.C. §§ 1341, 1343, 1344, 1028A — USSG § 2B1.1 loss-driven sentencing.
  • Specific intent to defraud is the workhorse defense element — good-faith and civil-dispute theories defeat it.
Quick Case Review · 24/7

Get a free review

Direct to attorney — no call center. Most clients hear back within an hour.

By submitting, you agree to our Privacy Policy. No attorney-client relationship is formed until a written engagement is signed.

Texas Bar
Licensed since 2004
TXND · TXED
Federal Court Admitted
4.8 ★
Google Reviewed
9 DFW
Counties Served
24/7
Direct-to-Attorney Line
40+
Years Combined
Texas Bar Licensed TXND & TXED Federal 24/7 Jail Release Se Habla Español
Texas Legal Context

What the statute actually requires

Analytical framework Texas fraud lives in Penal Code Chapter 32 — roughly thirty separate offenses. Penalty grade is driven by specific statute, value of property/credit obtained, or item count of identifying information. Default culpable mental state is "intent to defraud or harm another" (§ 6.02 / § 6.03 framework). Federal parallel under 18 U.S.C. §§ 1341, 1343, 1344, 1028A. State limitations: 5 years general, 7 years for elderly exploitation (§ 32.53), 10 years for fiduciary misapplication (§ 32.45) under CCP Art. 12.01.
5 Texas-specific insights
  1. Item-count grading under § 32.51. Fraudulent use or possession of identifying information under Penal Code § 32.51 is the most heavily charged ID-fraud statute. Grade scales with item count: fewer than 5 items is state-jail felony, 5–9 third-degree, 10–49 second-degree, 50+ first-degree. Galindo v. State, 502 S.W.3d 884 (Tex. App.—San Antonio 2016), controls what counts as a separate "item" — duplicate records of the same person's data are not separate items.
  2. Specific intent to defraud. Most Chapter 32 statutes require "intent to defraud or harm another" — a specific-intent mental state. Crittenden v. State, 671 S.W.2d 527 (Tex. Crim. App. 1984), addresses the forgery intent element. Cain v. State, 958 S.W.2d 404 (Tex. Crim. App. 1997), governs credit-card-abuse knowledge. Mere possession of a forged instrument is not enough; the State must prove knowledge plus intent to defraud or harm.
  3. Aggregation under § 31.09 (via § 32.03). Penal Code § 32.03 cross-references the theft-aggregation rule of § 31.09 into Chapter 32. The State can combine multiple fraud transactions pursuant to "one scheme or continuing course of conduct" into a single charge at the aggregated value. Defense work attacks whether the transactions actually constitute one scheme — separate victims, separate time periods, and separate methods support disaggregation.
  4. Statute of limitations variation. CCP Article 12.01 sets different limitations periods within Chapter 32: general fraud felonies (5 years), exploitation of elderly under § 32.53 (7 years), misapplication of fiduciary property under § 32.45 (10 years — longest in the chapter). Counsel must track each charge separately in multi-count indictments; the State sometimes overlooks limitations on individual counts.
  5. Federal forum risk. Federal exposure under 18 U.S.C. § 1341 (mail fraud, 20-year max), § 1343 (wire fraud, 20-year max or 30 years if financial institution), § 1344 (bank fraud, 30-year max), and § 1028A (aggravated identity theft, 2-year mandatory consecutive). USSG § 2B1.1 loss-driven sentencing: base 6 or 7, $6,500 = +0, $1.5M = +14, $25M = +22, $65M = +24. Forum decision is one of the most consequential early choices.
  6. Texas Theft Liability Act overlay. Civil Practice & Remedies Code Chapter 134 creates a civil cause of action for theft-by-fraud — preponderance standard, actual damages, mental anguish, statutory damages up to $1,000, and attorney's fees. Civil suit can run parallel to criminal Chapter 32 prosecution and is not dependent on conviction. Coordinated criminal/civil defense planning is required from day one.

What does Chapter 32 of the Texas Penal Code cover?

Chapter 32 of the Texas Penal Code is the fraud chapter — roughly thirty separate offenses ranging from a Class C hot-check citation to a first-degree felony. The unifying thread is deception used to obtain property, credit, services, or an advantage from another person.

Subchapter A — General provisions
Penal Code §§ 32.01–32.03 supply definitions (writing, financial institution, property) and the cross-reference under § 32.03 that imports the theft-aggregation rule of § 31.09 into Chapter 32. The aggregation rule is doing more work than its placement suggests — it lets the State charge a series of small fraud transactions as a single felony when the transactions arise from one scheme.
Subchapter B — Forgery and related
Penal Code §§ 32.21–32.24 cover forgery (§ 32.21), criminal simulation (§ 32.22), trademark counterfeiting (§ 32.23), and stealing or receiving stolen check or similar sight order (§ 32.24). Forgery is the workhorse statute — most check-fraud, ID-document, and altered-instrument cases get charged here. Penalty grade depends on the type of writing forged.
Subchapter C — Credit and debit cards, false statements
Penal Code §§ 32.31–32.35 cover credit-card or debit-card abuse (§ 32.31), fraudulent use or possession of credit-card information (§ 32.315), false statement to obtain property or credit (§ 32.32), hindering secured creditors (§ 32.33), and fraudulent transfer of a motor vehicle (§ 32.34). The credit-card statutes have been amended repeatedly as payment technology evolved — the current version reaches skimmer devices, account takeover, and stolen-data trafficking.
Subchapter D — Hot checks, deceptive business, commercial bribery
Penal Code §§ 32.41–32.49 cover issuance of bad check (§ 32.41, most "hot check" cases as Class C), deceptive business practices (§ 32.42), commercial bribery (§ 32.43), rigging publicly exhibited contests (§ 32.44), misapplication of fiduciary property (§ 32.45 — overlaps with embezzlement), fraudulent securing of document execution (§ 32.46), fraudulent destruction or removal of writing (§ 32.47), simulating legal process (§ 32.48), and refusal to release fraudulent lien or claim (§ 32.49).
Subchapter E — Identity, elderly exploitation, fictitious degree
Penal Code §§ 32.51–32.53 cover fraudulent use or possession of identifying information (§ 32.51 — the state-level ID-theft statute, graded by item count), fraudulent or substandard fictitious degree (§ 32.52), and exploitation of an elderly individual (§ 32.53). § 32.51 has become the most heavily charged Chapter 32 statute in DFW courts as data breaches and account takeover have proliferated; the item-count grading creates extreme penalty cliffs at the 5, 10, and 50 thresholds.

The structure of Chapter 32 rewards careful charging analysis. A single course of conduct can plausibly support charges under three or four different sections — a check-fraud scheme might charge forgery (§ 32.21), credit-card abuse (§ 32.31), false statement for credit (§ 32.32), and theft-by-fraud (§ 31.03 by cross-reference). The unit-of-prosecution question — how many separate offenses the same act actually constitutes — is the first thing competent defense counsel resolves, because over-charging is the most common State error and produces the cleanest motions to quash. Hicks v. State, 372 S.W.3d 649 (Tex. Crim. App. 2012), addresses concurrent prosecution under multiple Chapter 32 sections and remains the governing framework for unit-of-prosecution challenges in this area.

The most commonly charged Chapter 32 statutes in DFW

Six Chapter 32 statutes account for the bulk of DFW indictments: forgery (§ 32.21), credit-card abuse (§ 32.31), false statement for credit (§ 32.32), misapplication of fiduciary property (§ 32.45), fraudulent securing of document execution (§ 32.46), and fraudulent use of identifying information (§ 32.51).

Forgery under § 32.21 is the most heavily charged fraud statute in Texas, by volume. The State must prove the defendant made, altered, completed, executed, or authenticated a "writing" so that it purports to be the act of another who did not authorize that act, with intent to defraud or harm another. Crittenden v. State, 671 S.W.2d 527 (Tex. Crim. App. 1984), is the foundational case on the intent element — mere possession of a forged instrument is not enough; the State must show the defendant knew the instrument was forged and acted with intent to defraud or harm. Penalty grade depends on the type of writing: a Class A misdemeanor for general writings, state-jail felony for checks, credit cards, contracts, and similar financial instruments, and third-degree felony for money, securities, stamps, government records, deeds, and wills.

Credit-card or debit-card abuse under § 32.31 is the next most common indictment. The statute reaches use without effective consent of the cardholder, use of a fictitious card, and use of an expired or revoked card. Cain v. State, 958 S.W.2d 404 (Tex. Crim. App. 1997), is the governing case on the "knowing" element — knowledge that the card was stolen, fictitious, or used without consent. The default grade is state-jail felony; § 32.31(d) elevates the grade to second-degree felony when the cardholder is an elderly individual. § 32.315 (fraudulent use or possession of credit-card information) reaches dark-web data and skimmer-device cases — distinct conduct from card-present use under § 32.31, and now the dominant theory in account-takeover prosecutions.

False statement to obtain property or credit under § 32.32 is the loan-application and credit-application statute. Grade scales with the value of property or amount of credit obtained, mirroring the theft grading: Class B for under $100 up to first-degree felony at $300,000 or more. Garner v. State, 939 S.W.2d 802 (Tex. App.—Fort Worth 1997), establishes the "knowing" requirement — the defendant must know the statement is false at the time made, and good-faith reliance on professional advice (an accountant, lawyer, or financial advisor) is a recognized defense path.

Misapplication of fiduciary property under § 32.45 reaches the broad universe of trustees, guardians, attorneys-in-fact, brokers, executors, and any other person holding property in a fiduciary capacity. This is the statute most commonly charged in trust-and-estate disputes, real-estate-escrow misappropriations, and law-firm IOLTA cases. Grade scales with value, from Class C to first-degree felony, and the 10-year statute of limitations under CCP Article 12.01 is the longest in Chapter 32 — facts a decade old can still be charged. Overlap with theft (§ 31.03) and embezzlement-theory prosecutions is common; counsel must navigate the unit-of-prosecution analysis carefully.

Fraudulent securing of document execution under § 32.46 reaches procurement of a signature by deception — used heavily in elder-fraud cases involving deeds, powers of attorney, and beneficiary changes. Grade scales with the value of property affected by the document. Fraudulent destruction, removal, or concealment of writing under § 32.47 is the parallel obstruction-style statute — destroying a will, contract, or financial instrument with intent to defraud. § 32.51 (fraudulent use or possession of identifying information) is now the most-charged ID-theft statute at the state level. The item-count grading under § 32.51(c) drives the indictment: fewer than 5 items is state-jail felony, 5–9 is third-degree, 10–49 is second-degree, 50 or more is first-degree. Galindo v. State, 502 S.W.3d 884 (Tex. App.—San Antonio 2016), is the leading case on item-count enhancement and what counts as a separate "item." Defense work here focuses heavily on whether multiple records containing overlapping data points (the same person's name plus DOB plus SSN appearing in three documents) count as one item or three.

Mens rea and the elements the State must prove

Most Chapter 32 offenses require "intent to defraud or harm" — a specific-intent mental state that defense work attacks first. Default culpable-mental-state rules under Penal Code §§ 6.02 and 6.03 supply the framework, but each Ch. 32 statute names its own required state in the text.

Penal Code § 6.02 establishes that a person does not commit an offense unless the conduct is performed with one of four culpable mental states — intentionally, knowingly, recklessly, or with criminal negligence — and § 6.03 defines each. Chapter 32 offenses overwhelmingly require intent to defraud or "intent to defraud or harm another." This is a specific-intent crime — the State must prove the defendant acted with the conscious objective to deceive and cause loss, not merely that the defendant made a false statement or used a card improperly. The distinction matters in three recurring fact patterns: civil-only billing disputes that get criminalized, business transactions later regretted, and good-faith reliance on professional advice.

Forgery under § 32.21 requires "intent to defraud or harm another" — the conjunction is "or," meaning either prong satisfies the element. Crittenden v. State, 671 S.W.2d 527 (Tex. Crim. App. 1984), held that mere possession of a forged instrument is not enough to support a forgery conviction; the State must also prove the defendant knew the instrument was forged and intended to defraud or harm someone with it. This is a classic three-element battle: knowledge (defendant knew the writing was forged), authorship-purpose (the writing purports to be the act of another), and intent (to defraud or harm). Defense work attacks any of the three; weak knowledge proof is the most common point of failure.

Credit-card abuse under § 32.31 requires the defendant act "with intent to obtain a benefit fraudulently." Cain v. State, 958 S.W.2d 404 (Tex. Crim. App. 1997), establishes that the State must prove knowledge of the card's stolen, fictitious, expired, or revoked status — and intent to obtain a benefit by that knowing use. The element-by-element analysis matters because card-cloning and account-takeover cases often involve a downstream user (a person who bought a re-encoded card from a dark-web vendor) who genuinely did not know the card was fictitious. The "knew or should have known" gloss that prosecutors sometimes argue is not in the statute; the element is actual knowledge, and defense work develops the evidentiary basis for absence-of-knowledge.

Misapplication of fiduciary property under § 32.45 requires the defendant act "intentionally, knowingly, or recklessly" — Chapter 32's rare statute that reaches reckless conduct. This is consequential, because most fiduciary disputes involve poor record-keeping, sloppy commingling, or genuine confusion about authority, rather than intentional theft. The State will charge intentional misapplication and fall back to a recklessness theory at trial if the intentional proof fails. Defense work here is two-track: rebut the intentional theory directly and prepare a recklessness-affirmative-defense theory in parallel.

Fraudulent use or possession of identifying information under § 32.51 requires intent to harm or defraud another, plus possession or use of identifying information obtained without consent of the named person or the use of a fictitious identity. The element-of-knowledge piece — that the defendant knew the information was obtained without consent — is often the weakest part of the State's case in dark-web-data prosecutions. Buyers of bulk identity data routinely have no contact with the original victims, no representation about how the data was acquired, and no scaffold of facts that would support actual knowledge of the source. Defense work in § 32.51 cases frequently focuses on this knowledge gap.

Penalty range by statute and value or item count

Chapter 32 penalty grades are driven by three variables — the specific statute charged, the value of property or credit obtained, and (for § 32.51) the count of identifying-information items. Restitution, statute-of-limitations triage, and unit-of-prosecution analysis all interact with penalty exposure.

The table below summarizes the dominant Chapter 32 statutes and their grades. Each grade carries the standard Texas misdemeanor and felony exposure under §§ 12.21–12.32 — Class C ($500 fine, no jail), Class B (up to 180 days county jail and $2,000), Class A (up to 1 year county jail and $4,000), state-jail felony (180 days to 2 years state jail and $10,000), third-degree felony (2–10 years prison and $10,000), second-degree felony (2–20 years prison and $10,000), and first-degree felony (5–99 years or life and $10,000).

Forgery under § 32.21 starts at Class A misdemeanor for general writings, elevates to state-jail felony for checks, credit cards, contracts, and similar financial instruments (§ 32.21(d)), and reaches third-degree felony for money, securities, stamps, government records, deeds, and wills. Elderly-victim enhancement under § 32.21(e) bumps the grade one level when the State proves the defendant knew the victim was elderly.

Credit-card or debit-card abuse under § 32.31 is a default state-jail felony, with second-degree felony enhancement when the cardholder is an elderly individual under § 32.31(d). False statement to obtain property or credit under § 32.32 is value-tiered exactly parallel to theft: Class C under $100, Class B $100–$750, Class A $750–$2,500, state-jail felony $2,500–$30,000, third-degree $30,000–$150,000, second-degree $150,000–$300,000, first-degree $300,000+. The value-determination contest is therefore the central battleground in most § 32.32 cases.

Misapplication of fiduciary property under § 32.45 follows the same value tier — Class C through first-degree based on the value of property misapplied. Fraudulent securing of document execution under § 32.46 is value-tiered identically. Fraudulent use of identifying information under § 32.51 uses an item-count tier instead: state-jail felony for fewer than 5 items, third-degree for 5–9, second-degree for 10–49, first-degree for 50 or more. Galindo v. State, 502 S.W.3d 884 (Tex. App.—San Antonio 2016), is the controlling authority on what counts as a separate "item" — duplicate records containing the same identifying information do not multiply the count.

Exploitation of an elderly individual under § 32.53 is graded third-degree to first-degree based on value, with a 7-year statute of limitations (longer than the general 5-year fraud period) under CCP Article 12.01. Misapplication of fiduciary property gets a 10-year limitations period — the longest in Chapter 32 — which means fiduciary-misappropriation cases can be charged from facts a decade in the past. Most other Chapter 32 felonies run on the 5-year fraud limitations period; counsel must track each charge separately because the limitations math drives discovery strategy.

Federal exposure runs parallel for nearly every Chapter 32 fact pattern. 18 U.S.C. § 1341 (mail fraud), § 1343 (wire fraud), § 1344 (bank fraud), and § 1028A (aggravated identity theft) reach the same conduct from a federal forum. Federal sentencing is loss-driven under USSG § 2B1.1 — the base offense level is 6 or 7, with loss-amount enhancements that scale aggressively ($6,500 = +0; $1.5M = +14; $25M = +22; $65M = +24). § 1028A imposes a 2-year mandatory minimum stacked consecutively on the underlying-felony sentence when the defendant uses another person's identification in connection with certain enumerated felonies. The forum decision — state Chapter 32 versus federal Title 18 — is one of the most consequential early choices in any DFW fraud case.

Defenses we evaluate first in Chapter 32 cases

Seven defense doctrines do most of the work in fraud cases: mens rea / specific intent attacks, good-faith defense, authority and consent disputes, value-determination challenges, identity and mistaken-perpetrator theories, statute-of-limitations triage, and aggregation-overreach challenges.

The single highest-leverage defense in a Chapter 32 case is the mens rea attack. Most Ch. 32 statutes require intent to defraud or "intent to defraud or harm another" — a specific-intent mental state. Crittenden v. State, 671 S.W.2d 527 (Tex. Crim. App. 1984), and Cain v. State, 958 S.W.2d 404 (Tex. Crim. App. 1997), are the foundational authorities. The State frequently relies on inference — that intent can be inferred from the false statement itself, from the defendant's knowledge of certain facts, or from a pattern of conduct. Defense work develops the alternative inferential set: civil dispute, billing error, mistake of fact, reliance on professional advice, intervening third-party action. When the jury sees an equally plausible non-criminal inference, reasonable doubt follows.

The good-faith defense is a close cousin of the mens rea attack but operates affirmatively. If the defendant honestly believed the statement was true, the conduct was authorized, or the document accurately reflected the underlying transaction, intent to defraud is negated. Good-faith reliance on professional advice — an accountant's tax position, a lawyer's contract interpretation, a financial advisor's investment representation — is a recognized variation. Garner v. State, 939 S.W.2d 802 (Tex. App.—Fort Worth 1997), addresses good-faith reliance in the § 32.32 false-statement-for-credit context. Documentary support is critical: contemporaneous communications with the professional, written advice memos, board minutes reflecting reliance.

Authority and consent disputes arise constantly in fiduciary cases (§ 32.45), credit-card cases (§ 32.31), and document-execution cases (§ 32.46). Did the defendant have actual or apparent authority to act? Was there a principal-agent relationship that authorized the conduct? Did the named victim give effective consent that the State has now characterized as a fraud? Penal Code §§ 31.01–31.03 supply the consent definitions imported into Chapter 32 by cross-reference. Civil-litigation discovery (emails, contracts, prior dealings) is frequently the cleanest path to authority evidence.

Value-determination challenges drive nearly every value-tiered Chapter 32 prosecution. Penal Code § 31.08 governs how value is calculated for theft and theft-by-fraud — fair market value at the time and place of the offense. Idowu v. State, 73 S.W.3d 918 (Tex. Crim. App. 2002), is the controlling authority on value determination in theft-by-fraud cases. The State will inflate value to push grade upward; defense will challenge with comparable-sale evidence, replacement-cost analysis, and (in fiduciary cases) net-of-restitution-and-offsets accounting. A successful value challenge that moves the case from third-degree to state-jail felony, or state-jail to misdemeanor, often changes the entire plea posture.

Identity and mistaken-perpetrator theories are the dominant § 32.31 and § 32.51 defenses in account-takeover cases. Card cloning, dark-web data leaks, skimmer-device theft, SIM-swap attacks, and BIN-attack patterns all produce fact scenarios where the named defendant is not the actual user of the card or data. Defense work develops the digital-forensics record — IP-address logs, device fingerprints, geolocation evidence, store surveillance — to either identify the actual perpetrator or establish that the State cannot prove identity beyond reasonable doubt. The State's burden on identity is rigorous, and circumstantial-only identity cases lose frequently when defense puts on a competent expert.

Statute of limitations is fraud-specific and varies dramatically by section. CCP Article 12.01 sets a 5-year limitations period for most fraud felonies; 7 years for exploitation of an elderly individual under § 32.53; 10 years for misapplication of fiduciary property under § 32.45. Counsel must track each charge in a multi-count indictment separately — the State sometimes overlooks limitations on individual counts, and a limitations dismissal can collapse a case piecemeal. Aggregation under § 31.09 can extend the effective limitations reach by tying older transactions to a more recent scheme; defense work attacks whether the aggregation theory was properly pleaded and whether the older transactions actually belong in the alleged scheme.

Aggregation-overreach challenges target the State's use of aggregation under § 31.09 (incorporated into Chapter 32 by § 32.03) to inflate grade. The State combines multiple smaller transactions into one alleged scheme to push the aggregated value above a felony threshold. Defense work attacks the scheme allegation directly — were these really transactions pursuant to "one scheme or continuing course of conduct," or are they unrelated events the State has bundled for charging convenience? Multiple, separately-charged smaller offenses are usually a better defense posture than a single felony-grade aggregated charge.

Common prosecution errors in Chapter 32 cases

Five State errors recur across DFW fraud dockets: loss-amount inflation, aggregation outside one scheme, charging both forgery and theft for the same act, item-count inflation under § 32.51, and elderly-victim enhancement applied without statutory predicate.

Loss-amount inflation is the most common State error in value-tiered Chapter 32 cases. Prosecutors will charge based on gross-transaction value rather than net-of-restitution value; will include credits and refunds in the loss figure; will treat retail price as if it were fair market value (the statute uses fair market, not retail). Idowu v. State, 73 S.W.3d 918 (Tex. Crim. App. 2002), governs value calculation. Defense audit of the State's loss spreadsheet — line by line — is the workhorse motion-practice tool. A successful value challenge frequently drops the grade by one or two tiers.

Aggregation outside "one scheme" is the second predictable error. § 31.09 (incorporated through § 32.03) authorizes aggregation only when the multiple transactions are "pursuant to one scheme or continuing course of conduct." Prosecutors routinely aggregate unrelated transactions — different victims, different time periods, different methods — into one alleged scheme to push the aggregated value over a felony threshold. Defense motions to quash the aggregation allegation, or motions in limine to prevent aggregated proof at trial, can collapse the felony-tier charging.

Charging both forgery (§ 32.21) and theft (§ 31.03) for the same act creates a unit-of-prosecution problem. Hicks v. State, 372 S.W.3d 649 (Tex. Crim. App. 2012), governs concurrent prosecution under multiple Chapter 32 sections. The State frequently charges every plausible statute, then forces the defense to litigate the duplication. Motions to quash on multiplicity grounds remove redundant counts and force the State to elect.

Item-count inflation under § 32.51 is the dominant error in identity-fraud cases. The State counts every record containing identifying information as a separate item, even when the records duplicate the same person's data. Galindo v. State, 502 S.W.3d 884 (Tex. App.—San Antonio 2016), is the leading authority on what counts as a separate "item." Three records containing the same person's name + DOB + SSN are not three items; they are one item appearing in three places. Defense work scrubs the State's item-count spreadsheet against the statutory definition and produces a defensible reduced count. Moving the count from 50+ (first-degree felony) to 10–49 (second-degree) or 5–9 (third-degree) is frequently dispositive of plea posture.

Elderly-victim enhancement under § 32.21(e), § 32.31(d), and the standalone § 32.53 statute requires the State to prove both the victim's status (65 or older) and the defendant's knowledge of that status. Prosecutors sometimes apply the enhancement on the victim-age fact alone, without sufficient evidence of knowledge. Defense work attacks the knowledge prong: where did the defendant get the victim's age information, what would a reasonable person have inferred from the available facts, and was the relationship structured such that age was obvious or hidden? Successful challenges to the enhancement drop the grade by one tier in § 32.21 and § 32.31 cases and can defeat the § 32.53 charge entirely.

What to do if you're charged with a Chapter 32 offense

The first 30 days in a fraud case are decisive: preserve documents, evaluate federal-prosecution risk, avoid contact with the alleged victim, and do not give a statement. Most defense leverage is built before indictment in fraud cases — pre-charge advocacy is uniquely productive.

Three things matter in the opening 30-day window. First, preserve every document, communication, contract, email thread, accounting record, and contemporaneous note that bears on the alleged transactions. Fraud cases are document-driven; the State's discovery production will be massive, and your contemporaneous records are the foundation of the good-faith and authority defenses. Send preservation letters to your bank, your accountant, your business partners, and any cloud-storage provider. Do not delete anything — destruction or alteration of records can support an obstruction charge under federal law and a § 32.47 charge under Texas law.

Second, evaluate federal-prosecution risk early. Federal fraud (18 U.S.C. §§ 1341, 1343, 1344, 1028A) reaches the same conduct as state Chapter 32 but produces dramatically higher exposure under the loss-driven USSG § 2B1.1 sentencing framework. Federal involvement signals — FBI subpoenas, AUSA contact, target letters, federal grand-jury appearances — must trigger immediate retention of counsel with federal experience. The forum decision (state vs. federal) is often made in the months before any indictment; pre-charge advocacy can sometimes keep a case in state forum where exposure is lower.

Third, do not give a statement and do not contact the alleged victim. Recorded statements to law enforcement, even informal ones, routinely supply the State's strongest evidence on the knowledge and intent elements. Contact with the victim — even well-intentioned outreach to "explain" the transaction — can support an obstruction or witness-tampering charge and forecloses settlement and restitution avenues that competent counsel could otherwise structure. Invoke the Fifth Amendment privilege explicitly ("I want to speak with a lawyer") and stay silent thereafter. If served with a subpoena to testify before a grand jury, retain counsel before responding.

Pre-indictment cooperation is sometimes the optimal path in fraud cases. Where federal exposure is high and the underlying facts are largely undisputed, a proffer-protected presentation to the AUSA — sometimes called a "reverse-proffer" depending on direction — can secure a non-prosecution agreement, a deferred-prosecution agreement, or a charge limited to lower-exposure counts. Proffer decisions are case-specific and risk-laden; they require counsel who has done them before and who has assessed the cooperation landscape, USSG § 5K1.1 substantial-assistance scoring, and the practical landscape of the assigned AUSA.

If the case is state-court, parallel civil exposure under the Theft Liability Act (Civ. Prac. & Rem. Code Ch. 134) is almost certain. Civil counsel and criminal counsel should coordinate from day one — Fifth-Amendment risks in the civil deposition, restitution structure that supports criminal-case mitigation, and settlement-document language that does not constitute an admission of guilt for collateral-estoppel purposes all require integrated planning. Many fraud defendants damage their criminal case by litigating the civil case without coordinating with criminal counsel.

Finally, document the legitimate business reasons. Most state-court fraud charges arise from transactions that had a non-criminal explanation — a business dispute, a misunderstanding, a partial completion, a delayed performance. Build the contemporaneous-records file: contracts, board minutes, email chains, payment schedules, communications with counterparties, professional-advisor memos. Defense work develops the non-criminal narrative; without contemporaneous documentation, the narrative is impossible to corroborate at trial.

DFW context and costs — Collin, Dallas, Denton, Tarrant

DFW fraud prosecutions concentrate in four county DA offices plus parallel federal AUSA exposure. Realistic defense costs run $7,500–$25,000+ for state-court cases and $25,000–$100,000+ for federal indictments. Cases resolve in 8–18 months on average.

Collin County's District Attorney's Economic Crime Division handles the bulk of Plano, Frisco, McKinney, and Allen fraud cases. The unit is staffed with prosecutors who specialize in financial-crime work and coordinate closely with Plano PD's Economic Crimes Unit — one of the more sophisticated municipal financial-crime units in the state. Collin charging tends toward the most expansive plausible charge (every viable Chapter 32 count plus theft-by-fraud); pre-trial diversion is available for first-offenders with clean history and supportable restitution, but the offer typically requires substantive defense motion practice before it materializes.

Dallas County's DA office runs a Public Integrity Unit for public-servant fraud and a separate Financial Crimes Section for private-sector cases. Dallas is more likely than the suburban counties to negotiate downward charges — to misdemeanors where the suppression or evidence-quality argument is credible, to deferred-adjudication outcomes where restitution is structured. The Dallas County FBI and Secret Service offices coordinate with the DA on parallel federal-state cases; forum decisions in Dallas County frequently happen at the AUSA level rather than the DA level.

Denton County's DA office handles fraud cases through its County Criminal Courts at Law (misdemeanor) and District Courts (felony). Denton is generally the most negotiable of the four DFW DA offices on first-offender fraud — pretrial diversion is more readily available, and the prosecutorial culture is less aggressive on initial charging than Collin. Lewisville, Flower Mound, and Frisco-Denton-side cases route through Denton; the dockets are smaller and individual cases get more prosecutor attention.

Tarrant County's DA runs a Crimes Against Children division and a separate White Collar Crime division. Tarrant is firm on initial charging similar to Collin but willing to negotiate substantially once the defense record is built. The Fort Worth, Arlington, and HEB-corridor cases route here; the FBI's Fort Worth office is active on federal parallel cases. Federal prosecution out of the Northern District of Texas (Dallas Division and Fort Worth Division) is the parallel risk for serious Tarrant fraud cases.

Defense fees vary by complexity and forum. A straightforward state-court Class A misdemeanor fraud — one count, no aggregation, no federal exposure — runs $5,000–$8,500 flat fee. A state-court felony fraud case with discovery, suppression motions, and plea negotiation runs $10,000–$20,000. A trial-ready state-court fraud case (multi-count, contested value, expert witnesses) runs $20,000–$35,000. Federal fraud cases (18 U.S.C. §§ 1341, 1343, 1344, or 1028A) start at $25,000 for representation through pre-indictment and basic plea, rise to $50,000–$80,000 for a full PSR-objection and sentencing-phase litigation, and exceed $100,000 for trial-ready federal defense with parallel asset-forfeiture and civil-recovery work.

Timeline expectations: state-court fraud cases resolve in 8–18 months from arrest to disposition when contested with motion practice. Pre-indictment fraud cases (where federal investigation is active before charges file) can run 6–18 months pre-charge plus the post-charge timeline. Federal fraud cases run 12–36 months from indictment to sentencing typically; complex cases involving large-loss USSG calculations and parallel civil litigation can extend to 4+ years. Cost-outcomes are restitution-driven: early restitution often unlocks deferred adjudication, pretrial diversion, or downward USSG variance, while delayed or contested restitution closes those doors. Professional-license consequences (Texas Medical Board, State Bar, Texas Real Estate Commission, FINRA, TEA/SBEC for educators, Texas Department of Insurance for agents) require self-reporting of any fraud charge and trigger separate disciplinary processes that run independently of the criminal case.

Defense Strategy

What we evaluate first

Five defense levers do most of the work in Texas evading cases. We evaluate every one before charting a path — suppression first, then knowledge, intent, necessity, and charge-reduction posture together set the strategy.

  1. Specific intent to defraud attack
    Most Chapter 32 offenses require intent to defraud or harm — a specific-intent mental state. Defense work develops alternative inferences: civil dispute, billing error, mistake of fact, reliance on professional advice. Crittenden v. State, 671 S.W.2d 527 (Tex. Crim. App. 1984), and Cain v. State, 958 S.W.2d 404 (Tex. Crim. App. 1997), supply the doctrinal framework.
  2. Good-faith defense
    The defendant honestly believed statements were true, the transaction was authorized, or the document accurately reflected the underlying agreement. Good-faith reliance on professional advice (accountant, lawyer, financial advisor) negates intent under Garner v. State, 939 S.W.2d 802 (Tex. App.—Fort Worth 1997). Contemporaneous documentation of the reliance is critical.
  3. Authority and consent disputes
    Did the defendant have actual or apparent authority? Was there a fiduciary capacity or principal-agent relationship that authorized the conduct? Did the named victim give effective consent later recharacterized as fraud? Penal Code §§ 31.01–31.03 supply the consent definitions imported into Chapter 32. Civil-litigation discovery often produces the cleanest authority record.
  4. Value-determination challenges
    Penal Code § 31.08 governs value calculation for theft-by-fraud and value-tiered Chapter 32 offenses. Idowu v. State, 73 S.W.3d 918 (Tex. Crim. App. 2002), controls. Defense audits the State's loss spreadsheet line by line: gross vs. net, retail vs. fair market, restitution offsets, returned merchandise, intervening payments. A successful value challenge frequently drops grade by one or two tiers.
  5. Identity / mistaken-perpetrator
    Card cloning, dark-web data, skimmer-device theft, SIM-swap, and BIN-attack patterns produce cases where the named defendant is not the actual user. Defense develops the digital-forensics record — IP logs, device fingerprints, geolocation, surveillance — to defeat identity. Most powerful in § 32.31 and § 32.51 prosecutions.
  6. Statute of limitations triage
    CCP Article 12.01 sets 5 / 7 / 10-year limitations by section. Track each charge separately in multi-count indictments — the State sometimes overlooks limitations on individual counts. Aggregation under § 31.09 can extend the effective reach by tying older transactions to a more recent scheme; attack the scheme allegation directly.
  7. Aggregation overreach + item-count
    The State combines unrelated transactions into one alleged scheme to push grade upward, or counts duplicate ID records as separate items under § 32.51. Galindo v. State, 502 S.W.3d 884 (Tex. App.—San Antonio 2016), controls item-count analysis — duplicate records of the same data are not separate items. Defense audits both the scheme allegation and the item-count math.
Defense Timeline

How we build the case

Texas evading defense follows a predictable four-phase arc — stabilize and discover (0-15 days), build the suppression record (15-90 days), motion practice and posture (3-6 months), then trial readiness or resolution (6 months+).

  1. Day 0–30
    Stabilize and triage
    Engage counsel; preserve all documents, communications, accounting records, contracts, and contemporaneous notes; identify federal-prosecution risk indicators (FBI subpoenas, AUSA contact, target letters); evaluate parallel civil exposure under Texas Theft Liability Act; do not contact alleged victim; do not give statements; assess proffer-decision feasibility.
  2. Month 1–6
    Pre-charge or early-case discovery
    If pre-indictment, structured negotiation with DA or AUSA (proffer, reverse-proffer, target-letter response, non-prosecution agreement option); if post-charge, Article 39.14 discovery and Brady/Giglio demands; civil-vs-criminal analysis; forensic-accountant retention; loss-and-value-amount audit; statute-of-limitations triage on each count.
  3. Month 6–18
    Motion practice and posture
    Motions to quash on multiplicity / unit-of-prosecution; motions to suppress (statements, search-warrant returns, digital evidence); aggregation challenges; item-count challenges under § 32.51; Daubert / Kelly-Robinson challenges to State experts; expert witness retention; plea negotiation; restitution structuring; deferred-adjudication or pretrial-diversion eligibility filing.
  4. Month 18+
    Trial readiness or resolution
    Trial OR structured plea / deferred adjudication / pretrial diversion / federal plea with USSG § 2B1.1 loss-stipulation; PSR objections in federal cases; sentencing-phase mitigation (allocution, character letters, restitution payment, treatment plans); collateral-consequence management (professional licensing self-report, civil settlement coordination, asset-forfeiture defense, non-disclosure or expunction filings on eligible outcomes).

Charged with evading arrest in Collin, Denton, Dallas, or Tarrant County?

L and L Law Group defends evading-arrest cases at every level — misdemeanor through second-degree felony. Free initial consultation.

Call (972) 370-5060

Frequently asked questions

Twelve questions we answer most often about Texas evading-arrest cases — penalties, defenses, expunction, court timeline, license impact, and federal-case interaction.

What is the difference between fraud and theft in Texas?

Theft under Penal Code § 31.03 reaches unlawful appropriation of property without effective consent — the core element is taking. Fraud under Chapter 32 reaches obtaining property, credit, services, or an advantage through deception — the core element is misrepresentation that induces another to part with something of value. The same factual conduct frequently supports both charges, and prosecutors often charge concurrently under § 31.03 and one or more Chapter 32 sections. Hicks v. State, 372 S.W.3d 649 (Tex. Crim. App. 2012), addresses the unit-of-prosecution analysis when concurrent charging crosses chapters. Defense work resolves the multiplicity question by motion to quash before trial.

Is a Texas fraud charge always a felony?

No. Chapter 32 spans the full grading spectrum. A Class C hot-check citation under § 32.41 carries only a fine. A Class A misdemeanor forgery of a general writing under § 32.21(c) carries up to 1 year county jail. State-jail felony for credit-card abuse under § 32.31. Third-degree, second-degree, and first-degree felonies appear for higher-value or higher-item-count offenses. The exact grade depends on the specific statute charged, the value of property or credit obtained, and (for § 32.51) the count of identifying-information items. A defense audit of charging accuracy frequently moves the grade downward.

How is value determined in a Texas fraud case?

Penal Code § 31.08 governs value calculation for theft and theft-by-fraud, and is imported into Chapter 32 by § 32.03 cross-reference. Value is fair market value at the time and place of the offense; if no replacement value exists, value is cost to replace within a reasonable time. Idowu v. State, 73 S.W.3d 918 (Tex. Crim. App. 2002), controls in theft-by-fraud cases. Defense work attacks the State's value calculation with comparable-sale evidence, replacement-cost analysis, restitution-and-offset accounting, and (for fiduciary cases) net-of-authorized-fees analysis. A successful value challenge that moves the grade from third-degree to state-jail felony, or state-jail to misdemeanor, often changes the entire plea posture.

What is the statute of limitations for Texas fraud charges?

Code of Criminal Procedure Article 12.01 sets different limitations periods by Chapter 32 section. General fraud felonies run on a 5-year limitations period. Exploitation of an elderly individual under § 32.53 runs on a 7-year limitations period. Misapplication of fiduciary property under § 32.45 runs on a 10-year limitations period — the longest in Chapter 32, which means fiduciary-misappropriation cases can be charged from facts a decade old. Counsel must track limitations separately for each charge in a multi-count indictment; the State sometimes overlooks limitations on individual counts, and a limitations-based dismissal can collapse the case piecemeal.

Can a Texas fraud case be prosecuted in federal court instead?

Yes. Federal fraud statutes — 18 U.S.C. § 1341 (mail fraud, 20-year max), § 1343 (wire fraud, 20-year max or 30 years if financial institution affected), § 1344 (bank fraud, 30-year max), and § 1028A (aggravated identity theft, 2-year consecutive mandatory) — reach nearly the same conduct as Texas Chapter 32 from a federal forum. Federal sentencing is loss-driven under USSG § 2B1.1: base offense level 6 or 7, with aggressive loss-amount enhancements that scale up rapidly. The forum decision — state vs. federal — is one of the most consequential early choices, and pre-charge advocacy can sometimes keep a case in state forum where exposure is lower. Parallel state and federal prosecution is uncommon but legally permitted under separate-sovereigns doctrine.

What is "intent to defraud"?

Intent to defraud is the specific mental state required by most Chapter 32 offenses — the conscious objective to deceive another and cause that person to act or refrain from acting in a way that produces loss. It is distinct from negligence, recklessness, or even general "knowing" conduct; it requires purposeful deception. Crittenden v. State, 671 S.W.2d 527 (Tex. Crim. App. 1984), addresses the intent element in forgery cases; Cain v. State, 958 S.W.2d 404 (Tex. Crim. App. 1997), addresses it in credit-card-abuse cases. Mere possession of a forged instrument is not enough — the State must prove knowledge plus intent. Civil-only billing disputes, business transactions later regretted, and good-faith reliance on professional advice all defeat the intent element when supported by contemporaneous evidence.

What is aggregation in a fraud case?

Aggregation under Penal Code § 31.09 (incorporated into Chapter 32 by § 32.03) allows the State to combine multiple transactions pursuant to "one scheme or continuing course of conduct" into a single charged offense at the aggregated value. The aggregation rule is consequential because grade in value-tiered fraud charges depends on the aggregated number; a series of small individual transactions can become a felony when summed. Defense work attacks the scheme allegation directly — were these really transactions pursuant to one scheme, or are they unrelated events the State has bundled for charging convenience? Multiple separately-charged smaller offenses are usually a better defense posture than a single felony-grade aggregated charge.

What is § 32.51 fraudulent use of identifying information?

Penal Code § 32.51 is the state-level identity-fraud statute, reaching possession or use of identifying information of another person — name plus DOB, government ID numbers, biometric data, account numbers, Social Security numbers — obtained without consent or used with a fictitious identity. Grade scales with item count under § 32.51(c): fewer than 5 items is state-jail felony, 5–9 third-degree, 10–49 second-degree, 50 or more first-degree. Galindo v. State, 502 S.W.3d 884 (Tex. App.—San Antonio 2016), is the leading case on what counts as a separate item — duplicate records containing the same person's data are not separate items. Defense work in § 32.51 cases focuses heavily on the item-count math and on the knowledge prong: did the defendant know the information was obtained without consent?

Can paying restitution dismiss a Texas fraud case?

Restitution alone outside a structured program does not automatically dismiss a fraud charge — but restitution is often the unlock for deferred adjudication, pretrial diversion, or downward-departure plea outcomes. DFW counties (Collin, Dallas, Denton, Tarrant) all maintain some form of pretrial-diversion program for first-offender fraud cases conditioned on full restitution; successful completion results in dismissal and qualifies for expunction under CCP Chapter 55. In federal fraud cases, USSG § 5K2.0 and the loss-driven § 2B1.1 framework treat early, voluntary, and complete restitution as a substantial mitigating factor. Restitution strategy is therefore central to defense planning from the first meeting — but always coordinated with counsel because uncoordinated restitution can be characterized as admission of guilt.

Does a Texas fraud charge affect my professional license?

Almost always, yes. Fraud charges trigger self-reporting requirements at most Texas professional-licensing boards — the State Bar, Texas Medical Board, Texas Real Estate Commission, Texas Department of Insurance, FINRA, TEA/SBEC for educators, Texas Board of Nursing, and others. Disciplinary processes run independently of the criminal case; a fraud conviction can trigger license suspension, monitoring agreement, or revocation even where the criminal disposition is deferred adjudication or pretrial diversion. Some boards initiate disciplinary action on the arrest alone, before the criminal case resolves. Defense planning has to integrate licensing-board strategy from day one — including the timing of any self-disclosure, the content of any board response, and the documentary record that supports both the criminal defense and the licensing defense.

Can a Texas fraud conviction be expunged or sealed?

A conviction cannot be expunged. A dismissal, acquittal, or no-bill opens the path to full expunction under Code Crim. Proc. Chapter 55 — the record is destroyed and you can deny the arrest occurred. A successful deferred adjudication under CCP art. 42A.101 followed by completion-without-revocation opens a non-disclosure path under Government Code § 411.0735 after the applicable waiting period — for most Chapter 32 offenses, 5 years from dismissal of deferred for felonies and 2 years for misdemeanors. Non-disclosure seals the record from most public view (employers, landlords, online background-check services cannot see it) but the record remains visible to law enforcement and licensing agencies. Conviction-tier outcomes preserve no expunction or non-disclosure remedy. The disposition choice — conviction vs. deferred vs. dismissal — is therefore the highest-leverage long-term decision in fraud defense.

What does fraud defense cost in DFW?

Defense fees vary by case complexity, forum, and trial posture. A straightforward state-court Class A misdemeanor fraud — one count, no aggregation, no federal exposure — runs $5,000–$8,500 flat fee. A state-court felony fraud case with discovery, motion practice, and plea negotiation runs $10,000–$20,000. A trial-ready state-court fraud case (multi-count, contested value, expert witnesses, contested suppression) runs $20,000–$35,000. Federal fraud cases under 18 U.S.C. §§ 1341, 1343, 1344, or 1028A start at $25,000 for pre-indictment representation and basic plea, rise to $50,000–$80,000 for full PSR-objection and sentencing-phase litigation, and exceed $100,000 for trial-ready federal defense with parallel asset-forfeiture and civil-recovery work. We quote in writing after a free consultation and walk through the cost/benefit analysis of plea-vs-trial postures specific to your case.

References

All citations link to statutes.capitol.texas.gov for primary text. Footnote numbers in the body link here; the arrow returns to the citing paragraph.

  1. Tex. Penal Code § 38.04 — Evading arrest or detention.
  2. Tex. Penal Code § 12.21 — Class A misdemeanor punishment range.
  3. Tex. Penal Code § 12.34 — Third-degree felony punishment range.
  4. Tex. Penal Code § 12.33 — Second-degree felony punishment range.
  5. Tex. Penal Code § 9.22 — Necessity affirmative defense.
  6. Tex. Code Crim. Proc. art. 38.23 — Suppression of evidence from unlawful search/detention.
  7. Tex. Code Crim. Proc. art. 39.14 — Michael Morton Act discovery.
  8. Tex. Code Crim. Proc. art. 42A.054 — 3g offenses (not including evading).
40+
Years
Combined defense experience
$0
Consult
Free initial consultation
24/7
Available
Direct-to-attorney for jail release
About the authors

The attorneys behind this page

Reggie London

Reggie London

Co-Founding Partner · Criminal Defense Attorney

Admitted in Texas, TXND, TXED, and the U.S. Court of Appeals for the Fifth Circuit. Practice spans DWI, drug, weapons, theft, and process crimes — plus federal practice.

Njeri London

Njeri London

Co-Founding Partner · Criminal Defense Attorney

Texas-licensed criminal defense attorney with deep Fourth Amendment motion practice. Focus: suppression hearings, drug-crime defense, federal-practice support.

From the blog

Related writing on this topic

Free Consultation · 24/7

Talk to an attorney — not a screener.

Tell us about your case. Most clients hear back within an hour. Often within minutes.

5899 Preston Rd, Ste 101 · Frisco, TX 75034

By submitting, you agree to our Privacy Policy.

Call (972) 370-5060

Attorney Advertising

This website is for general information purposes only and constitutes attorney advertising under the Texas Disciplinary Rules of Professional Conduct. Nothing on this site should be taken as legal advice for any individual case or situation. Receipt or viewing does not create an attorney–client relationship.

Past results do not guarantee similar outcomes. Each case is unique and must be evaluated on its own facts and circumstances.

L and L Law Group, PLLC attorneys are licensed to practice in the State of Texas. Njeri London (Texas Bar No. 24043266) and Reggie London (Texas Bar No. 24043514) are the attorneys responsible for the content of this site. None of the attorneys at L and L Law Group, PLLC are Board Certified by the Texas Board of Legal Specialization unless specifically and separately stated.

Please do not transmit any confidential information to L and L Law Group, PLLC by email, web form, or telephone before a written engagement is in place. Privacy Policy.

Service Areas

L&L Law Group represents clients across North Texas counties for DWI, assault, drug crimes, juvenile defense, outstanding warrants, bond reduction, and expunction matters.

Call Email Map Top
developed by MPR Digital Legal Services