William F. "Casey" Ebsary, Jr. is a Trial Lawyer who practices in personal injury, criminal defense, DUI, white-collar criminal defense, high tech corporate litigation and intellectual property issues arising out of the Internet and computer networking.
Mr. Ebsary is a former Prosecutor and a former Public Defender. He has litigation experience including murder, money laundering, fraud, forgery, counterfeiting, and theft. Mr. Ebsary's expertise includes experience in high-tech litigation in information systems and international banking and currency transactions.
Mr. Ebsary is AV rated by the Martindale Hubbell Directory. That is the highest rating issued by this nationally recognized lawyer rating service. An AV Rating shows that a lawyer has reached the height of professional excellence. AV rated lawyers have usually practiced law for many years, and are recognized for the highest levels of skill and integrity. The Martindale-Hubbell Peer Review Icon is a service mark of Reed Elsevier Properties Inc., used under permission from Reed Elsevier Properties Inc. in accord with the terms and conditions established by Martindale-Hubbell.
Mr. Ebsary is a 2011 Super Lawyer. Super Lawyers are a comprehensive and diverse listing of outstanding attorneys. Super Lawyers uses a unique multi-step process to find evidence of peer recognition and professional achievement. A survey of lawyers who have been in practice for at least five years nominate the best attorneys they've personally observed in action. First, a Candidate Pool is created from a survey of lawyers who have been in practice for at least five years. Lawyers cannot nominate themselves. Then Candidates are added by searching national and local periodicals, legal trade journals, numerous databases and online sources, Conducting in-person and telephonic meetings with law firms. Second, the Candidates are Evaluated by their background, experience, peer recognition and professional achievement. Third, Peer Evaluation by Practice Area. Finally, candidates are selected. Only 5 percent of the total lawyers in the state are selected for inclusion in Super Lawyers.
Mr. Ebsary received his Bachelor of Science in Business Administration, cum laude from the University of Florida and his Juris Doctor, cum laude from the Stetson University College of Law.
Stetson University College of Law Juris Doctor, cum laude Class Rank 17/117
University of Florida Bachelor Of Science in Business Administration, cum laude
Licensure, Certification, and Recognition:
Member of the Media and Communications Law Committee of the Florida Bar.
Past Chairman, Technology Law Section, Hillsborough County Bar Association.
Past Member of the Student Education and Admissions to the Bar Committee of the Florida Bar.
Editorial Board Member, Stetson Law Review, 1989
Admitted Florida Bar, 1990.
Admitted United States District Court for the Eleventh Circuit
Admitted United States District Court for the Middle District of Florida
Recipient of James Carlisle Rogers Award for best-written criticism of a decision of the United States Supreme Court.
Teaching Fellowship Stetson University College of Law.
Federal Aviation Administration, Private Pilot, 1976.
In Re: Amendments to Rules Regulating the Florida Bar, 762 So.2d 392 (Fla. 1999) (striking down Bar rule restricting the use of trade names)
Freeman v. State, 611 1260 (Fla. 2d DCA 1993) (attacking constitutionality of roadside driver's license suspensions).
Selected Professional Presentations:
Board Certification in Criminal Law Review, Florida Association of Criminal Defense Lawyers, 1998 to 2007.
Liability and Exposure from Use of Email and the Internet, Hillsborough Community College, 2002.
Legalities of Using and Maintaining Computerized Medical Records, 2003, Tampa, Florida.
The Practice: Everything Else You Need To Know About Criminal Defense; Tampa, Florida; Florida Association of Criminal Defense Lawyers.
Internet Research in Florida, Tampa, Florida, 2001.
With downtown Tampa set to become a wireless hot spot, those with wireless 802.11 series capability will have Internet access anywhere downtown. That should bring a surge of people scanning the airwaves seeking nefarious access.
Until recently, wireless handheld access to digital networks, the Internet, and email was a distant dream. Then Handspring created a device that looks like a Trekkie's tricorder, was about the size of a pack of Marlboros, and that could accomplish most any task we perform using phones and computer networks.
Agents took control of the Mob's website and posted a warning to those not yet busted - "Contact your local United States Secret Service field office before we contact you!!!"
We are inundated with technologies designed to more effectively communicate. Some have caused users to defectively communicate. Misuse yields communications breakdown or even worse - death by PowerPoint®. With 400 Million Copies of Microsoft Office® and millions of PowerPoint® Presentations every day, one commentator, Dave Paradi surveyed and found several annoying elements in the bane of boardroom and courtroom technologies, PowerPoint®. Lest you not be familiar with potential side effects of poorly executed digital slide show software, be assured watching slides from industrial safety filmstrips is more bearable than the painful boredom from this assassin of effective messaging from Microsoft®.
There are secret messages in your documents that are not secret. Both major word processing packages, Word and Word Perfect, contain hidden information that unless carefully removed can be a rich source of information to an opponent to whom the document is digitally distributed. Documents contain far more information than can be seen on screen.
Phishing is not to be confused with 'fishing.' There is no cast net, no baiting of the hook, and no minnow awaiting a large-mouth bass. But there are plenty of wireless fly rods out there. What do I mean? Specifically, an enterprising nerd or computer wizard of the binary-off generation can send you a disguised email representing a company you know and highly regard. The message may be duplicating a well-known logo in a misleading email suggesting you, the gullible, reply and update their files. They will frequently ask for a Social Security Number, credit card number, username and password, and/or your bank account number. Such data provides a license for identity theft. It goes on all the time. You read stories of months and months of futile effort to rectify credit reports done in by the virtual criminals. Frequently, the bait appears as an online financial intermediary asking for an update of personal information. In reality, takers just feed the 'phisher' valuable key information used to exploit the theft of the vulnerable victims' identities.
While away from the office, the document image can be retrieved and reviewed from a remote log-in to the network. The images or data can be stored on a notebook computer or on compact disk. Whether a desktop computer from another office, a notebook computer in court, or on a wireless device on the way to court, once the documents and files are accessible from anywhere, your hand truck and its cargo of banker's boxes may be on its way to the junk heap. In the event of a disaster, copies of the data can be retrieved from storage and restored without missing a beat.
Electronic fingerprints remain available for review if you know what to look for. The skeletal remains of files deleted or history of persons and places visited are seemingly hidden in the world behind the computer's display. A plan to recover this information by a team with computer forensic expertise can be a powerful tool for civil and criminal litigants, for law enforcement, and for computer support services.
As the use of commercial broadband cable modem's flourishes, the opportunity for computer criminals or hackers to attack computers attached to these networks similarly has skyrocketed. Unbeknownst to most users, a cable modem provides easy access to an attached computer. Protection of these computers is a three-stage process.
Electronic Case Files are the Law of the Land -- Civil Litigators Can Safely Read this Too