Resume of Tampa Criminal Defense Attorney | W.F. Casey Ebsary, Jr.


 
W.F. “Casey” Ebsary, Jr.
Board Certified Criminal Trial Lawyer
Post Office Box 1550
Tampa, Florida 33601
813-222-2220
813-225-0202 Facsimile
Education:
Stetson University College of Law Juris Doctor, cum laude Class Rank 17/117
University of Florida Bachelor Of Science in Business Administration, cum laude
Licensure, Certification, and Recognition:
Special Magistrate – Circuit Court
Past Chairman, Criminal Law Section, Hillsborough County Bar Association
Board Certified, Florida Bar Board of Legal Specialization and Education 1997
Martindale-Hubbell Peer Rated AV
Lawyers.com highest rating
Avvo.com highest rating
Super Lawyers multi-time recipient
Florida Trend Magazine Legal Elite
Past Member of the Media and Communications Law Committee of the Florida Bar
Past Member of the Student Education and Admissions to the Bar Committee of the Florida Bar
Editorial Board Member, Stetson Law Review, 1989
Admitted Florida Bar, 1990
Admitted United States District Court for the Middle District of Florida
Recipient of James Carlisle Rogers Award for best-written criticism of a decision of the United States Supreme Court
Teaching Fellowship Stetson University College of Law
Federal Aviation Administration, Private Pilot, 1976

Reported Decisions:
In Re: Amendments to Rules Regulating the Florida Bar, 762 So.2d 392 (Fla. 1999) (striking down Bar rule restricting the use of trade names)
Freeman v. State, 611 1260 (Fla. 2d DCA 1993) (attacking constitutionality of roadside driver’s  license suspensions).


Selected Publications on Web:
YouTube Channel:          http://www.youtube.com/user/centrallaw
Cybercrime Website:      http://www.centrallaw.net/
Facebook                      https://www.facebook.com/CentralLaw
Twitter                           @Centrallaw

Google+                         +Law Office of W.F. ”Casey” Ebsary, Jr. 
Selected Professional Presentations:
Board Certification in Criminal Law Review, Florida Association of Criminal Defense Lawyers, 1998 to 2008.
Liability and Exposure from Use of Email and the Internet, Hillsborough Community College, 2002.
Legalities of Using and Maintaining Computerized Medical Records, 2003, Tampa, Florida.
The Practice: Everything Else You Need To Know About Criminal Defense; Palm’s and PC’s, 2002, Tampa, Florida; Florida Association of Criminal Defense Lawyers.
Internet Research in Florida, Tampa, Florida, 2001.
Selected Publications:
Ebsary, “Paper-less Office or Less-paper Office”, Lawyer, Mar. 2003.
Ebsary, “Secret Messages that are not Secret”, Lawyer, Dec. 2002.
Ebsary, “Securing a Cable Modem Against Computer Criminals”, Lawyer, Oct.  2002.
Note, Fourth Amendment Aerial Privacy; Expect the Unexpected, 19 STETSON L. REV. 273 (1989).
Recent Developments in Section 1983, 19 STETSON L. REV. 1065 (1990).
Selected Media Coverage:
Matias, K, “The Talk of the Web”, On Magazine, Dec. 2001 (coverage of defense of Internet libel claim).
Zones Hinder Free Speech Series: Editorials
St. Petersburg Times; St. Petersburg, Fla.; Nov 9, 2002
7 protesters arrested; ticketholders kept out
St. Petersburg Times; St. Petersburg, Fla.; Nov 3, 2002; Author: John Balz
3 protesters sue Tampa police
St. Petersburg Times; St. Petersburg, Fla.; Nov 2, 2002; Author: Graham Brink
Bush rally protesters plan to sue city, police
St. Petersburg Times; St. Petersburg, Fla.; Oct 20, 2002; Author: Graham Brink
The Week In Review Series: The Week In Review
St. Petersburg Times; St. Petersburg, Fla.; Aug 25, 2002
Some condo residents seek to phase out kids
St. Petersburg Times; St. Petersburg, Fla.; Aug 24, 2002; John Balz
Device deters repeat DUIs
St. Petersburg Times; St. Petersburg, Fla.; Apr 1, 2002; Christopher Goffard
Bush rally protesters plan to sue city, police
St. Petersburg Times; St. Petersburg, Fla.; Oct 20, 2001; Author: Graham Brink
St. Petersburg Times; St. Petersburg, Fla.; Aug 2, 2001; Editorial
Charges dropped against protesters
St. Petersburg Times; St. Petersburg, Fla.; Jul 28, 2001; Author: David Karp
Hearing for two activists delayed
St. Petersburg Times; St. Petersburg, Fla.; Jul 17, 2001; Author: David Karp
Counterdemonstrators’ brave protest deserves protection
St. Petersburg Times; St. Petersburg, Fla.; Jun 17, 2001; Author: Robyn E. Blumner
2 GOP workers triggered arrests
St. Petersburg Times; St. Petersburg, Fla.; Jun 15, 2001; Author: Christopher Goffard
Dissent if you want, but don’t do it here
St. Petersburg Times; St. Petersburg, Fla.; Jun 8, 2001; Author: Jan Glidewell
Foul call at Legends
St. Petersburg Times; St. Petersburg, Fla.; Jun 8, 2001; Editorial
Suppression of rights at Bush rally is wrong
St. Petersburg Times; St. Petersburg, Fla.; Jun 8, 2001; Letters to the Editor
Bush protesters say rights were muzzled
St. Petersburg Times; St. Petersburg, Fla.; Jun 6, 2001; Author: Christopher Goffard
Protests not seen or heard: How polite
St. Petersburg Times; St. Petersburg, Fla.; Jun 6, 2001; Author: Howard Troxler
Protesters kept at a distance; three arrested
St. Petersburg Times; St. Petersburg, Fla.; Jun 5, 2001; Authors: Kevin Graham;Angela Moore
Gun seller denies violating ordinance
Series: TIMES DIGEST St. Petersburg Times; St. Petersburg, Fla.; Apr 5, 2001
Father pleads guilty in daughter’s DUI death
 St. Petersburg Times; St. Petersburg; Dec 5, 1995; Sue Carlton
Talk about your stunned silence; just the facts, ma’am and whatever happened to casing a joint?
Series: TAMPA UNCUFFED St. Petersburg Times; St. Petersburg; Jan 12, 1995; Bill Duryea & Sue Carlton
Ruling may be move to more privacy rights

St. Petersburg Times; St. Petersburg; Nov 24, 1989; Bruce Vielmetti

Feds on Twitter | 2702 Short Cut Search Warrant

What about the Feds on Twitter?
Most Twitter multimedia is handled by 3d party links. Twitter allows both public or private updates. On Twitter Direct messages are private and the sender can delete these messages. the feds noted that short URLs used to serve malicious links and code. Today we learned the feds will seek to recover direct messages and that when Twitter receives the request, they will comply and disclose that such a request has been made.
The Feds frequently use a 2702 request to short cut Search Warrant requirements. On the other hand, as of 2010, Yahoo has the following policy on 2702 requests from cybercrime investigators:
“Under 18 U.S.C. §§ 2702(b)(7) and 2702(c)(4) Yahoo! is permitted, but not required, to voluntarily disclose information, including contents of communications and customer records, to a federal, state, or local governmentalentity if Yahoo! believes in good faith that an emergency involving imminent danger of death or serious physical injury to any person requires such disclosure without delay.”

Criminal Defense Attorney | Feds on Facebook | Social Networking and Law Enforcement Tactics

W.F. “Casey” Ebsary, Jr.

Tampa Criminal Defense Expert, W.F. ”Casey” Ebsary, Jr., has suspected that cops use “fake identities” to “trick” users into accepting a government official as friend or otherwise provide information to the government. We believed that the feds watch Facebook, MySpace, Twitter, Flickr and other online social media and use the information for investigative (criminal or otherwise) or data gathering purposes.

A recent public records request by the EFF sought more information including:

Guides, manuals, policy statements, memoranda, presentations, or other materials explaining how government agents should collect information on social networking websites: how or when government agents may collect information through social networking websites; procedures government agents must follow to collect information through social networking websites; agreements with social-networking companies: using any visualization programs, data analysis programs or tools used to analyze data gathered from social networks; purchase orders for any visualization programs,data analysis programs or tools used to analyze data gathered from social networks; describing how information collected from social-networking websites is retained in government databases or shared with other government agencies.
How to be a Fed on Facebook
18 U.S.C. § 2702, Computer Crime and Intellectual Property Section, ECPA, EFF, Electronic Communications Privacy Act, Facebook, LinkedIn, Twitter, Yahoo
Prosecutor’s Obtaining Evidence From Social Networks
Training Materials

The feds produced a 33 page record. We just took a look at it and it appears to be a training program. The document was titled, “Obtaining and Using Evidence Social Networking Sites from Facebook, MySpace, Linkedin, and More.” It was authored by John Lynch, Deputy Chief, Computer Crime and Jenny Ellickson, Trial Attorney of the  Computer Crime and Intellectual Property Section.

The outline covered an Introduction to Social Networking Sites and an Overview of Key Social Networking Sites. Not suprisingly, buried in the training materials is the question: Why go undercover on Facebook, MySpace, etc? The answer in short succinct bullet points was to “Communicate with suspects / targets” and “Gain access to non-public info” and to “Map social relationships/networks.” The training session begins:  “Most social-networking sites allow users to:

•    Create personal profiles
•    Write status updates or blog entries
•    Post photographs, videos, and audio clips
•    Send and receive private messages
•    Link to the pages of others (i.e., “friends”)”

How can Law Enforcement Obtain data from these sites?

•    Some info may be public
•    Use ECPA to get info from providers
•    Undercover operations “

The ECPA is the Electronic Communications Privacy Act (ECPA) and it sets out the provisions for access, use, disclosure, interception and privacy protections of electronic communications. The feds use this information to:

•  Reveal personal communications
•  Establish motives and personal relationships
•  Provide location information
•  Prove and disprove alibis
•  Establish crime or criminal enterprise

How do the Feds get information from Facebook?

Since the Facebook Data is organized by user ID or group ID they use these resources: Data productions using the Fed’s Law Enforcement Guide includes Neoprint, Photoprint, User Contact Info, Group Contact Info, and IP Logs. The feds noted that “Facebook has other data available.” and that Facebook is “Often cooperative with emergency requests.” That means that the feds can claim urgency and shourtcut the time frames that are usually present when legal production of this information is sought.
What do the Feds Think about MySpace?

The feds noted that MySpace is owned by Fox Interactive Media and was the most popular Social Network; was passed by Facebook in 2008; True names are less encouraged than Facebook. Feds are noting there is Messaging through messages, chat, friend updates. MySpace has a Young user base,has a history of child safety concerns, and Privacy is currently less granular than Facebook. Cybercrime defense attorney notes that Granular Privacy Controls in social networks allow authorization profiles – the user gets to decide what data to show to other friends in the network. 

How do the Feds Get Info From MySpace?

The Feds know that many profiles have public content and thatData is organized by Friend ID. Notably, MySpace requires a search warrant for private messages or bulletins that are less than 181 days old. MySpace considers friend lists to be stored content and there are fixed Data retention times for User information and stored files. MySpace retains IP logs indefinitely and information for deleted accounts is kept for a year.

What the Feds believe about Twitter?

Twitter is the market leader in “micro-blogging.” Most Twitter multimedia is handled by 3d party links. Twitter allows both public or private updates. On Twitter Direct messages are private and the sender can delete these messages. the feds noted that short URLs used to serve malicious links and code.
How do the Feds Get Information from Twitter?
The good news for the Feds is that Most Twitter content is public and Private messages are kept until the user deletes them.

The bad news for the Feds is that Twitter only retains the first login IP, there is no user contact phone number, Twitter Will not preserve data without legal process, and Twitter has a stated policy of producing data only in response to legal process.

The Feds frequently use a 2702 request to short cut Search Warrant requirements. On the other hand, as of 2010, Yahoo has the following policy on 2702 requests from cybercrime investigators:

“Under 18 U.S.C. §§ 2702(b)(7) and 2702(c)(4) Yahoo! is permitted, but not required, to voluntarily disclose information, including contents of communications and customer records, to a federal, state, or local governmentalentity if Yahoo! believes in good faith that an emergency involving imminent danger of death or serious physical injury to any person requires such disclosure without delay.”

What about LinkedIn?

The feds use LinkedIn to identify experts and check the background of defense experts. The Privacy model is similar to Facebook and Profile information is not checked for reliability.

Federated Identity Issues Concern the Feds

The Feds note an upsurge in federated identity schemes. Social networking sites are increasingly adopting federated identity schemes such as OpenID, Facebook Connect. They write of concerns that Facebook, MySpace, Yahoo!, and Google authenticate identity and signin across platforms.

They give the following Example: A user can log in to a Facebook account using Google credentials. After a link is established between two accounts, Google will check and vouch for identity of its user. Authentication information split from activity information. In turn, a Facebook login may be used to authenticate.

The feds note that “If attribution is necessary, must determine identity provider – not simply the domain.”

Terms of Service TOS and Privacy Policies

The Federal Agent Training materials we reviewed after the EFF Freedom of Information Act FOIA Request noted that Social networks have extensive terms of service and privacy policies, most permit emergency disclosures to Law Enforcement. All specify exceptions to respond to legal process and protect service against fraud/damage

U.S. v. Drew addressed the failure to follow TOS and whether access to a network was unauthorized under 1030? Drew addresses whether allowing a violation of a website’s Terms of Service to constitute an intentional access of a computer without authorization or exceeding authorization would “result in transforming section 1030(a)(2)(C) into an overwhelmingly overbroad enactment that would convert a multitude of otherwise innocent Internet users into misdemeanant criminals.”

Criminal Penalties for Law Enforcement Officers for Violating the Privacy Protection Act

The feds also are concerned about the growth of social networks and the questions it raises about the breadth of the PPA. This author notes that the Privacy Protection Act provides for criminal penalties against federal officials who willfully disclose a record in violation of the Act, 5 U.S.C. § 552a(i)(1).

Ratings and Reviews

Board Certified Criminal Trial Lawyer
Google +
yelp