<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[Computers - Law Office of W.F. ''Casey'' Ebsary Jr]]></title>
        <atom:link href="https://www.centrallaw.com/blog/categories/computers/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.centrallaw.com/blog/categories/computers/</link>
        <description><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr's Website]]></description>
        <lastBuildDate>Thu, 05 Jun 2025 08:39:51 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Cell Phone Searches History Updated 2025]]></title>
                <link>https://www.centrallaw.com/blog/history-of-cell-phone-searches/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/history-of-cell-phone-searches/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Thu, 05 Jun 2025 08:22:58 GMT</pubDate>
                
                    <category><![CDATA[Cell Phone Search]]></category>
                
                    <category><![CDATA[cellphone]]></category>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Federal Court]]></category>
                
                    <category><![CDATA[Search and Seizure]]></category>
                
                    <category><![CDATA[Search Warrant]]></category>
                
                    <category><![CDATA[State Court]]></category>
                
                
                    <category><![CDATA[Cell Phone]]></category>
                
                    <category><![CDATA[Search]]></category>
                
                
                
                    <media:thumbnail url="https://centrallaw-com.justia.site/wp-content/uploads/sites/411/2025/06/CellPhoneSearches2025.jpg" />
                
                <description><![CDATA[<p>Cell phones are more than communication devices—they hold a detailed record of our lives. In Florida and across the United States, courts have recognized the sensitivity and depth of this information. At the Law Office of W.F. “Casey” Ebsary Jr., we stay at the forefront of privacy law developments, especially those concerning cell phone searches in criminal investigations. </p>
]]></description>
                <content:encoded><![CDATA[
<h2 class="wp-block-heading" id="h-cell-phone-searches-and-your-rights-florida-law-and-supreme-court-precedents"><strong>Cell Phone Searches and Your Rights: Florida Law and Supreme Court Precedents</strong></h2>



<h3 class="wp-block-heading" id="h-introduction-understanding-cell-phone-searches-in-criminal-cases"><strong>Introduction: Understanding Cell Phone Searches in Criminal Cases</strong></h3>



<p>Cell phones are more than communication devices—they hold a detailed record of our lives. In Florida and across the United States, courts have recognized the sensitivity and depth of this information. At the Law Office of W.F. “Casey” Ebsary Jr., we stay at the forefront of privacy law developments, especially those concerning cell phone searches in criminal investigations. </p>



<h3 class="wp-block-heading" id="h-featured-video-expert-defense-when-police-search-your-phone">🎥 Featured Video: Expert Defense  When Police Search Your Phone</h3>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Expert Criminal Defense: Your Secret Weapon!" width="500" height="375" src="https://www.youtube-nocookie.com/embed/zSzXqOvf_2I?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<p><em>Click the video above to watch a breakdown of  why to choose an expert to protect your rights during a phone search.</em></p>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<p>If your phone has been searched, it may have been done unlawfully. This landing page explores the legal landscape of cell phone searches, Florida and federal rulings, constitutional protections, and what defenses may be available to you. To speak directly with Attorney Casey Ebsary, visit <a href="https://centrallaw.com/contact-us/">our contact page</a> or <a href="https://www.centrallaw.com/lawyers/w-f-casey-ebsary-jr/">view his biography</a> to learn more.</p>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading">🔎 Frequently Asked Questions About Cell Phone Searches</h2>


<div class="wp-block-image">
<figure class="aligncenter size-medium"><img loading="lazy" decoding="async" width="300" height="300" src="/static/2025/03/FAQ2025-300x300.jpeg" alt="FAQ" class="wp-image-3867" srcset="/static/2025/03/FAQ2025-300x300.jpeg 300w, /static/2025/03/FAQ2025-1024x1024.jpeg 1024w, /static/2025/03/FAQ2025-150x150.jpeg 150w, /static/2025/03/FAQ2025-768x768.jpeg 768w, /static/2025/03/FAQ2025-1536x1536.jpeg 1536w, /static/2025/03/FAQ2025.jpeg 2048w" sizes="auto, (max-width: 300px) 100vw, 300px" /><figcaption class="wp-element-caption">FAQ</figcaption></figure></div>


<div class="schema-faq wp-block-yoast-faq-block"><div class="schema-faq-section" id="faq-question-1749107144092"><strong class="schema-faq-question">Can police search my phone without a warrant in Florida?</strong> <p class="schema-faq-answer">No. Since the U.S. Supreme Court’s decision in <em><a href="https://supreme.justia.com/cases/federal/us/573/373/">Riley v. California</a></em>, police generally need a warrant to search a cell phone, even if it was seized during an arrest. Florida courts also support this principle, recognizing that mobile devices carry vast amounts of personal data. A search without a warrant may be subject to a motion to suppress. <a href="https://supreme.justia.com/cases/federal/us/573/373/">View <em>Riley</em> on Justia.</a></p> </div> <div class="schema-faq-section" id="faq-question-1749107177851"><strong class="schema-faq-question">What did the Supreme Court say in <em>Riley v. California</em> about phones?</strong> <p class="schema-faq-answer">The Court ruled that cell phones differ from other objects due to the volume and sensitivity of data stored on them. It held that the search incident to arrest exception does not apply to digital content on cell phones. The opinion emphasized the need for a warrant before conducting a phone search. <a href="https://supreme.justia.com/cases/federal/us/573/373/">Read the full opinion on Justia</a>.</p> </div> <div class="schema-faq-section" id="faq-question-1749107213602"><strong class="schema-faq-question">What types of evidence can be found on phones?</strong> <p class="schema-faq-answer">Phones may contain photos, messages, location data, voicemails, emails, browsing history, and cloud-stored content. Courts now recognize this content as private and subject to Fourth Amendment protection. Evidence obtained without a proper warrant may be excluded from trial.</p> </div> <div class="schema-faq-section" id="faq-question-1749107253272"><strong class="schema-faq-question">Does Florida law allow warrantless cell phone searches?</strong> <p class="schema-faq-answer">No. Florida courts have rejected warrantless cell phone searches under both federal and state constitutions. For example, in <em>Smallwood v. State</em>, the Florida Supreme Court found a search invalid where no warrant was obtained. <a href="https://law.justia.com/cases/florida/supreme-court/2013/sc11-1130.html">View <em>Smallwood v. State</em> on Justia.</a></p> </div> <div class="schema-faq-section" id="faq-question-1749107326363"><strong class="schema-faq-question">What is a motion to suppress, and how can it help?</strong> <p class="schema-faq-answer">A motion to suppress asks the court to exclude evidence obtained in violation of your rights. Under Rule 3.190(h), Florida Rules of Criminal Procedure, defense attorneys may challenge warrantless phone searches. This can result in key evidence being thrown out, possibly weakening or dismissing the prosecution’s case. <a href="https://law.justia.com/cases/florida/supreme-court/2018/sc18-118-0.html">Read Rule 3.190(h)</a>.</p> </div> <div class="schema-faq-section" id="faq-question-1749107365082"><strong class="schema-faq-question">Can police access data stored in the cloud?</strong> <p class="schema-faq-answer">Generally, police must obtain separate warrants for cloud-stored data. This includes data synced through apps like iCloud or Google Drive. Courts distinguish between data on the device and remotely stored content.</p> </div> <div class="schema-faq-section" id="faq-question-1749107391844"><strong class="schema-faq-question">What if I gave consent to search my phone?</strong> <p class="schema-faq-answer">If consent is given freely and knowingly, the search may be valid. However, officers sometimes pressure or trick individuals into consenting. A skilled attorney can challenge the validity of the consent.</p> </div> <div class="schema-faq-section" id="faq-question-1749107411587"><strong class="schema-faq-question">Can location data from my phone be used against me?</strong> <p class="schema-faq-answer">Yes, but only if properly obtained. In <em><a href="https://supreme.justia.com/cases/federal/us/585/16-402/">Carpenter v. United States</a></em>, the Supreme Court ruled that accessing historical <a href="/blog/location-data-evidence/">cell-site location information (CSLI)</a> requires a warrant. <a href="https://supreme.justia.com/cases/federal/us/585/16-402/">Read <em>Carpenter</em> on Justia.</a></p> </div> <div class="schema-faq-section" id="faq-question-1749110667130"><strong class="schema-faq-question">What should I do if my phone was searched without a warrant?</strong> <p class="schema-faq-answer">Contact an experienced criminal defense lawyer immediately. You may have grounds to suppress the evidence or seek dismissal of charges. Attorney Casey Ebsary can  file motions to suppress based on unlawful phone searches. <a href="https://centrallaw.com/contact-us/">Schedule a consultation</a>.</p> </div> <div class="schema-faq-section" id="faq-question-1749110836313"><strong class="schema-faq-question">Are inventory searches of phones legal?</strong> <p class="schema-faq-answer">No. Courts have ruled that inventory searches do not extend to the digital contents of a cell phone. Law enforcement must obtain a warrant even if the phone is part of an impounded vehicle or personal property.</p> </div> </div>



<p></p>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading">📈 Chart: Warrant Requirements for Cell Phone Data Types</h2>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><th>Data Type</th><th>Warrant Required?</th><th>Key Court Case</th></tr><tr><td>Text Messages</td><td>Yes</td><td>Riley v. California (2014)</td></tr><tr><td>Photos/Videos</td><td>Yes</td><td>Riley v. California (2014)</td></tr><tr><td>App Usage Data</td><td>Yes</td><td>Riley v. California (2014)</td></tr><tr><td>Cloud-Backed Content</td><td>Yes</td><td>Carpenter v. United States</td></tr><tr><td>Location (Historical CSLI)</td><td>Yes</td><td>Carpenter v. United States</td></tr><tr><td>Inventory Search of Phone</td><td>No</td><td>Florida v. Smallwood</td></tr></tbody></table></figure>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading">✉️ Call to Action: Protect Your Digital Privacy Now</h2>



<p>Have your digital rights been violated by law enforcement? Was your phone searched without a warrant? You may be able to fight the charges and suppress unlawfully obtained evidence. Let W.F. “Casey” Ebsary Jr., a Florida Board-Certified Criminal Trial Lawyer, evaluate your case. <a href="https://centrallaw.com/contact-us/">Contact us now</a> or <a href="https://www.centrallaw.com/lawyers/w-f-casey-ebsary-jr/">learn more about Casey here</a>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading">🌐 Legal Resources and Statutes</h2>



<ul class="wp-block-list">
<li><a href="https://supreme.justia.com/cases/federal/us/573/373/">Riley v. California (2014) – Justia</a></li>



<li><a href="https://supreme.justia.com/cases/federal/us/585/16-402/">Carpenter v. United States (2018) – Justia</a></li>



<li><a href="https://law.justia.com/cases/florida/supreme-court/2013/sc11-1130.html">Smallwood v. State (Florida 2013) – Justia</a></li>



<li><a href="https://law.justia.com/cases/florida/supreme-court/2018/sc18-118-0.html">Rule 3.190(h), Florida Rules of Criminal Procedure</a></li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<p><strong>Meta Description :</strong> Florida attorney explains cell phone search laws, warrant rules, and digital privacy rights after <em>Riley v. California</em> and <em>Carpenter</em>.</p>



<h2 class="wp-block-heading" id="h-learn-more-about-cell-phone-searches">Learn More About Cell Phone Searches</h2>



<p><a href="/blog/cell-phone-tracking/" rel="noreferrer noopener" target="_blank">Cell Phone Tracking(Opens in a new browser tab)</a></p>



<p><a href="/blog/defense-attorney-on-cell-phone-search-evidence-suppressed/" rel="noreferrer noopener" target="_blank">Defense Attorney on Cell Phone Search | Evidence Suppressed(Opens in a new browser tab)</a></p>



<p><a href="/blog/cell-phone-search-incident-to-arrest/" rel="noreferrer noopener" target="_blank">Cell Phone Search Incident to Arrest(Opens in a new browser tab)</a></p>



<p><a href="/blog/search-warrant-cell-phone-update/" rel="noreferrer noopener" target="_blank">Search Warrant | Cell Phone Update(Opens in a new browser tab)</a></p>



<p><a href="/blog/cell-phone-searches-supreme-court-to-rule-on-warrant-requirement/" rel="noreferrer noopener" target="_blank">Cell Phone Searches – Supreme Court to Rule on Warrant Requirement(Opens in a new browser tab)</a></p>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading" id="h-original-post-from-2014">Original Post From 2014</h2>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="155" height="200" src="/static/2023/12/image-16.jpeg" alt="Cell Phone Search Warrant " class="wp-image-2526" title="Search Warrant Cell Phone" /><figcaption class="wp-element-caption">Cell Phone Search Warrant, Cell Phone Search, Search and Seizure</figcaption></figure></div>


<h2 class="wp-block-heading" id="h-cell-phone-search-warrant">Cell Phone Search Warrant</h2>



<p>Up until quite recently, there were exceptions to the general requirement that police get a&nbsp;<strong>Search Warrant for a cell phone</strong>. Cell phones have been a window into suspects’ activities, as police used these exceptions to get their hands on information found inside mobile devices. Obtaining a Search Warrant for a cell phone is not that hard to do. You can review a&nbsp;Search Warrant for a Cell Phone&nbsp;here: &nbsp;Here is an actual&nbsp;iPhone Search Warrant. GPS or Global Positioning Satellite information found in mobile phones has also been used by police.</p>



<p>Up until around 2014, police could and did search digital information on a cell phone seized from an individual who was arrested. Defense Attorneys would frequently challenge such searches. These searches were frequently based upon “helping” arrested citizens by making sure their property was properly inventoried by the arresting officers for safekeeping by jail personnel or by the evidence unit at the arresting agency’s office. This rationale remains a frequent flier in broad invasive “inventory” searches of automobiles during traffic stops.</p>



<h2 class="wp-block-heading" id="h-phone-search-search-and-seizure-search-warrant">Phone Search, Search and Seizure, Search Warrant</h2>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="200" height="200" src="/static/2023/12/image-8.gif" alt="Cell Phone Search, Search and Seizure, Search Warrant" class="wp-image-2527" title="Search Mobile Device Cell Phone Search Warrant" /><figcaption class="wp-element-caption">Phone Search Warrant</figcaption></figure></div>


<p>Florida had outlawed warrantless phone searches before the US Supreme Court. That ruling is discussed here. Now prohibited will be mobile device and cell phone searches without a warrant. Before the 2014 United States Supreme Court ruling here was another Court’s Ruling on a Phone Search. Searches Incident to a lawful arrest were previously justified by cops using issues of police officer safety and prevention of destruction of evidence.</p>



<p>Now under Florida law, a Motion to Suppress Evidence can be filed pursuant to Rule 3.190(h), Florida Rules of Criminal Procedure. Illegal Search and seizure now applies to phones and the Courts may exclude illegally obtained evidence including, photographs, video, text messages, directory and location data, voice mails, and emails.</p>



<p><strong>Case Summary:</strong> The US Supreme Court’s ruling is that a properly obtained and issued search warrant is generally required before search of a phone. Here is some language from the Court’s ruling.</p>



<p>“Cell phones differ in both a quantitative and a qualitative sense from other objects that might be kept on an arrestee’s person. The term “cell phone” is itself misleading shorthand; many of these devices are in fact minicomputers that also happen to have the capacity to be used as a telephone. They could just as easily be called cameras,video players, rolodexes, calendars, tape recorders, libraries, diaries, albums, televisions, maps, or newspapers.”</p>



<p>“The sum of an individual’s private life can be reconstructed through a thousand photographs labeledwith dates, locations, and descriptions; the same cannot besaid of a photograph or two of loved ones tucked into a wallet.”</p>



<p>“To further complicate the scope of the privacy interests at stake, the data a user views on many modern cell phones may not in fact be stored on the device itself. Treating a cell phone as a container whose contents may be searched incident to an arrest is a bit strained as an initial matter.”</p>



<p>“[T]he search incident to arrest exception does not apply to cell phones . . . .”</p>



<h2 class="wp-block-heading" id="h-some-excerpts-from-florida-cell-search-cases">Some Excerpts from Florida Cell Search Cases:</h2>



<p>“However, we express great concern in permitting the officer to search appellant’s cell phone here where there was no indication the officer had reason to believe the cell phone contained evidence.”</p>



<p>“We are equally concerned that giving officers unbridled discretion to rummage through at will the entire contents of one’s cell phone, even where there is no basis for believing evidence of the crime of arrest will be found on the phone, creates a serious and recurring threat to the privacy of countless individuals.”</p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Spoliation of Electronic Evidence: Florida Edition]]></title>
                <link>https://www.centrallaw.com/blog/tampa-attorney-spoliation-of-computer-evidence-usb-thumb-drive-external-hard-drive/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/tampa-attorney-spoliation-of-computer-evidence-usb-thumb-drive-external-hard-drive/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Fri, 11 Apr 2025 00:53:25 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[Hard Disk Drive]]></category>
                
                    <category><![CDATA[Spoliation of Evidence]]></category>
                
                    <category><![CDATA[State Court]]></category>
                
                    <category><![CDATA[USB]]></category>
                
                
                    <category><![CDATA[Adverse Inference]]></category>
                
                
                
                    <media:thumbnail url="https://centrallaw-com.justia.site/wp-content/uploads/sites/411/2023/11/38_ComputerCrimesAttorneyLawye-300x150-1.jpg" />
                
                <description><![CDATA[<p>Introduction: Spoliation of Electronic Evidence The digital age has brought forth unique challenges in litigation, particularly concerning the preservation and handling of electronic evidence. Spoliation, the destruction or alteration of such evidence, can have severe consequences, as illustrated by recent Florida court rulings. If you are dealing with a spoliation issue, contact W.F. “Casey” Ebsary&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p></p>



<h2 class="wp-block-heading" id="h-introduction-spoliation-of-electronic-evidence">Introduction: Spoliation of Electronic Evidence</h2>



<p>The digital age has brought forth unique challenges in litigation, particularly concerning the preservation and handling of electronic evidence. Spoliation, the destruction or alteration of such evidence, can have severe consequences, as illustrated by recent Florida court rulings. <strong>If you are dealing with a spoliation issue, <a href="/contact-us/">contact W.F. “Casey” Ebsary Jr. at 813-222-2220 </a><a class="gv-tel-link" title="Call +1 813-222-2220 via Google Voice" href="http://voice.google.com/calls?a=nc,%2B18132222220" target="_blank" rel="noopener"></a><a href="http://voice.google.com/calls?a=nc,%2B18132222220" target="_blank" rel="noreferrer noopener"></a>or visit <a href="https://www.centrallaw.com/lawyers/w-f-casey-ebsary-jr/">us for expert legal guidance</a>.</strong> This article delves into the intricacies of spoliation, focusing on a specific Florida Circuit Court case involving deleted data from USB thumb drives and external hard drives, and the application of Florida Standard Jury Instructions.</p>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Expert Criminal Defense: Your Secret Weapon!" width="500" height="375" src="https://www.youtube-nocookie.com/embed/zSzXqOvf_2I?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h3 class="wp-block-heading" id="h-the-florida-circuit-court-case-a-case-study-in-electronic-spoliation"><strong>The Florida Circuit Court Case: A Case Study in Electronic Spoliation:</strong></h3>



<p>A recent Florida Circuit Court case underscored the stringent approach courts are taking towards the destruction of electronic evidence. In this instance, a judge sanctioned a party for intentionally deleting data from a sheriff’s office laptop, an “Armor” computer, and an external hard drive, as well as discarding a USB thumb drive containing relevant information.</p>



<p>The court found that these actions violated discovery rules, significantly prejudicing the opposing party’s ability to present its case. This ruling serves as a stark reminder that parties involved in litigation have a duty to preserve electronic evidence, and failure to do so can result in severe penalties.</p>



<h2 class="wp-block-heading" id="h-spoliation-and-the-florida-rules-of-evidence"><strong>Spoliation and the Florida Rules of Evidence:</strong></h2>


<div class="wp-block-image">
<figure class="aligncenter size-medium"><img loading="lazy" decoding="async" width="300" height="300" src="/static/2025/04/SpoiledEvidence-300x300.jpeg" alt="Under the Florida Rules of Evidence (FRE), spoliation of evidence can lead to significant sanctions. The court's decision to impose an "adverse inference" instruction highlights the severity of these penalties." class="wp-image-3807" srcset="/static/2025/04/SpoiledEvidence-300x300.jpeg 300w, /static/2025/04/SpoiledEvidence-1024x1024.jpeg 1024w, /static/2025/04/SpoiledEvidence-150x150.jpeg 150w, /static/2025/04/SpoiledEvidence-768x768.jpeg 768w, /static/2025/04/SpoiledEvidence-1536x1536.jpeg 1536w, /static/2025/04/SpoiledEvidence.jpeg 2048w" sizes="auto, (max-width: 300px) 100vw, 300px" /></figure></div>


<p>Under the Florida Rules of Evidence (FRE), spoliation of evidence can lead to significant sanctions. The court’s decision to impose an “adverse inference” instruction highlights the severity of these penalties.</p>



<h3 class="wp-block-heading" id="h-adverse-inference-a-powerful-sanction"><strong>Adverse Inference: A Powerful Sanction:</strong></h3>



<p>An adverse inference instruction allows the jury to presume that the destroyed or missing evidence would have been unfavorable to the party responsible for its destruction. In the aforementioned case, the court ordered the jury to be instructed that the deleted data and the data on the discarded thumb drive contained information detrimental to the defendants. <strong>For assistance with spoliation matters, reach out to <a href="https://www.centrallaw.com/lawyers/w-f-casey-ebsary-jr/.">W.F. “Casey” Ebsary Jr. at 813-222-2220</a> .<a class="gv-tel-link" title="Call +1 813-222-2220 via Google Voice" href="http://voice.google.com/calls?a=nc,%2B18132222220" target="_blank" rel="noopener"></a><a href="http://voice.google.com/calls?a=nc,%2B18132222220" target="_blank" rel="noreferrer noopener"></a></strong></p>



<h3 class="wp-block-heading" id="h-florida-standard-jury-instructions-and-spoliation"><strong>Florida Standard Jury Instructions and Spoliation:</strong></h3>



<p><a href="https://supremecourt.flcourts.gov/content/download/243071/file/entire-Document.pdf">Florida Standard Jury Instruction 301.11 (“Failure to Maintain Evidence or Keep a Record”)</a> plays a crucial role in spoliation cases. This instruction clarifies that the jury <em>may</em> draw an adverse inference when evidence has been lost, destroyed, or made unavailable. Key considerations include:</p>



<ul class="wp-block-list">
<li><strong>Materiality:</strong> The missing evidence must have been “material” to the disputed issues.</li>



<li><strong>Permissive Inference:</strong> The instruction allows, but does not require, the jury to draw an adverse inference.</li>



<li><strong>Court Discretion:</strong> Courts have significant discretion in determining the appropriate sanctions, including whether to give this instruction.</li>



<li><strong>Duty to Preserve:</strong> If a duty to preserve evidence exists, such as by statute, contract, or discovery request, the jury instruction may change to a rebuttable presumption.</li>
</ul>



<h2 class="wp-block-heading" id="h-factors-influencing-court-decisions"><strong>Factors Influencing Court Decisions:</strong></h2>



<p>Courts consider several factors when addressing spoliation, including:</p>



<ul class="wp-block-list">
<li>The intent of the party responsible for the destruction (e.g., intentional vs. negligent).</li>



<li>The degree of prejudice suffered by the opposing party.</li>



<li>The existence of a duty to preserve the evidence.</li>
</ul>



<h3 class="wp-block-heading" id="h-practical-implications-for-legal-professionals"><strong>Practical Implications for Legal Professionals:</strong></h3>



<ul class="wp-block-list">
<li><strong>Preservation Obligations:</strong> Attorneys must advise their clients of their duty to preserve electronic evidence as soon as litigation is reasonably anticipated.</li>



<li><strong>Discovery Management:</strong> Robust discovery protocols are essential to ensure the preservation and proper handling of electronic evidence.</li>



<li><strong>Expert Assistance:</strong> Engaging electronic discovery experts can be crucial in recovering deleted data and assessing the impact of spoliation.</li>



<li><strong>Motions for Sanctions:</strong> Attorneys must be prepared to file motions for sanctions when opposing parties engage in spoliation.</li>
</ul>



<h2 class="wp-block-heading" id="h-destruction-of-evidence-q-amp-a-section"><strong>Destruction of Evidence Q&A Section:</strong></h2>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="559" src="/static/2025/04/FAQ-1024x559.png" alt="FAQ" class="wp-image-3771" srcset="/static/2025/04/FAQ-1024x559.png 1024w, /static/2025/04/FAQ-300x164.png 300w, /static/2025/04/FAQ-768x419.png 768w, /static/2025/04/FAQ.png 1408w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">FAQ</figcaption></figure></div>


<div class="schema-faq wp-block-yoast-faq-block"><div class="schema-faq-section" id="faq-question-1744332502242"><strong class="schema-faq-question"><strong>What constitutes “spoliation” of electronic evidence in Florida?</strong></strong> <p class="schema-faq-answer">Spoliation refers to the destruction, alteration, or failure to preserve electronic evidence that is relevant to litigation. This includes intentionally deleting files, discarding storage devices, or failing to implement proper data preservation protocols.</p> </div> <div class="schema-faq-section" id="faq-question-1744332522545"><strong class="schema-faq-question"><strong>What is an “adverse inference” instruction, and how does it impact a trial?</strong></strong> <p class="schema-faq-answer">An adverse inference instruction allows the jury to presume that destroyed or missing evidence would have been unfavorable to the party responsible for its destruction. This can significantly impact a trial by influencing the jury’s perception of the evidence and the credibility of the parties involved.</p> </div> <div class="schema-faq-section" id="faq-question-1744332548802"><strong class="schema-faq-question"><strong>What is the role of Florida Standard Jury Instruction 301.11 in spoliation cases?</strong></strong> <p class="schema-faq-answer">Florida Standard Jury Instruction 301.11 guides trial courts on instructing juries regarding lost or destroyed evidence. It clarifies that the jury <em>may</em> draw an adverse inference if the evidence was material and lost due to a party’s actions.</p> </div> <div class="schema-faq-section" id="faq-question-1744332571405"><strong class="schema-faq-question"><strong>What factors do Florida courts consider when determining sanctions for spoliation?</strong></strong> <p class="schema-faq-answer">Courts consider factors such as the intent behind the destruction, the degree of prejudice suffered by the opposing party, and the existence of a duty to preserve the evidence.</p> </div> <div class="schema-faq-section" id="faq-question-1744332583703"><strong class="schema-faq-question"><strong>How can attorneys ensure their clients comply with electronic evidence preservation obligations?</strong></strong> <p class="schema-faq-answer">Attorneys should: Advise clients of their preservation duties as soon as litigation is reasonably anticipated;<br />Implement robust discovery protocols;;Engage electronic discovery experts when necessary; and Document all preservation efforts.</p> </div> </div>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<p><strong>Table: Key Aspects of Electronic Spoliation in Florida</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><th>Aspect</th><th>Description</th><th>Legal Implications</th><th>Practical Considerations</th></tr><tr><td><strong>Spoliation Definition</strong></td><td>Destruction, alteration, or failure to preserve relevant electronic evidence.</td><td>Can lead to sanctions, including adverse inference instructions and monetary penalties.</td><td>Implement clear data preservation protocols and communicate them to clients.</td></tr><tr><td><strong>Adverse Inference</strong></td><td>Jury instruction allowing the presumption that destroyed evidence was unfavorable.</td><td>Influences jury perception and party credibility, potentially impacting trial outcome.</td><td>Understand the requirements of Florida Standard Jury Instruction 301.11.</td></tr><tr><td><strong>Duty to Preserve</strong></td><td>Legal obligation to preserve relevant evidence, arising from statute, contract, or discovery request.</td><td>Failure to fulfill this duty can result in severe sanctions.</td><td>Educate clients on their preservation obligations and ensure timely implementation of preservation measures.</td></tr><tr><td><strong>Court Discretion</strong></td><td>Courts have broad discretion in determining appropriate sanctions.</td><td>Sanctions vary based on intent, prejudice, and duty to preserve.</td><td>Be prepared to argue for or against sanctions, presenting relevant evidence and legal arguments.</td></tr><tr><td><strong>Expert Assistance</strong></td><td>Electronic discovery experts can aid in data recovery and analysis.</td><td>Provides crucial support in assessing spoliation’s impact and arguing motions.</td><td>Consider engaging experts early in litigation to address potential spoliation issues.</td></tr></tbody></table></figure>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading" id="h-conclusion-spoiled-evidence"><strong>Conclusion: Spoiled Evidence</strong></h2>



<p>The Florida Circuit Court ruling serves as a cautionary tale for parties involved in litigation. The courts are increasingly vigilant in addressing spoliation of electronic evidence, and the consequences can be severe. Understanding the Florida Rules of Evidence and the Florida Standard Jury Instructions is crucial for legal professionals navigating these complex issues. </p>



<p>By prioritizing the preservation of electronic evidence and adhering to proper discovery protocols, attorneys can protect their clients’ interests and ensure fairness in the litigation process. <strong>For knowledgeable and experienced legal representation regarding spoliation of electronic evidence, please <a href="/static/2025/04/ContactUs.png">call</a> W.F. “Casey” Ebsary Jr. at 813-222-2220 <a class="gv-tel-link" title="Call +1 813-222-2220 via Google Voice" href="http://voice.google.com/calls?a=nc,%2B18132222220" target="_blank" rel="noopener"></a><a href="http://voice.google.com/calls?a=nc,%2B18132222220" target="_blank" rel="noreferrer noopener"></a>or visit <a href="https://www.centrallaw.com/contact-us/" target="_blank" rel="noreferrer noopener">https://www.centrallaw.com/contact-us/</a>.</strong></p>



<h3 class="wp-block-heading" id="h-source-text-of-jury-instruction">Source Text of Jury Instruction:</h3>



<p><strong>301.11 FAILURE TO MAINTAIN EVIDENCE OR KEEP A RECORD<br>a. Adverse inference.</strong><br>If you find that: (Name of party) [lost] [destroyed] [mutilated] [altered] [concealed] or otherwise caused the (describe evidence) to be unavailable, while it was within [his] [her] [its] possession, custody, or control; and the (describe evidence) would have been material in deciding the disputed issues in this case; then you may, but are not required to, infer that this evidence would have been unfavorable to (name of party). You may consider this, together with the other evidence, in determining the issues of the case.</p>



<p><strong>b. Burden shifting presumption.</strong><br>The court has determined that (name of party) had a duty to [maintain (describe missing evidence)] [keep a record of describe subject matter as to which party had record keeping duty)]. (Name of party) did not [maintain (describe missing evidence)] [or] [keep a record of (describe subject matter as to which party had recordkeeping duty)]. Because (name of party) did not [maintain (describe missing evidence)] [or] [keep a record of (describe subject matter as to which party had a record keeping duty)], you should find that (name of invoking party) established [his] [her] (describe applicable claim or defense) unless (name of party) proves otherwise by the greater weight of the evidence.</p>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading" id="h-original-post-in-2010">Original Post in 2010</h2>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="184" height="238" src="/static/2023/12/image-34.jpeg" alt="Fingerprint Spoliation" class="wp-image-2615" style="width:155px;height:200px" title="USB, Hard Disk Drive, Spoliation of Evidence, adverse inference" /><figcaption class="wp-element-caption">Spoliation of Evidence</figcaption></figure></div>


<p class="has-text-align-right"><strong>“At trial, the jury will be instructed that data deleted . . . </strong></p>



<p class="has-text-align-right"><strong>contained information detrimental to defendants.”</strong></p>



<p><strong>Tampa Criminal Defense</strong> expert has just studied a recent <strong>Circuit Court </strong>Order in <strong>Florida </strong>where a Judge ruled a jury can learn of destruction of evidence on a USB Thumb drive and external hard drive in a civil case. Under the <strong>Florida Rules of Evidence (FRE)</strong>, <strong>spoliation of evidence</strong> can result in sanctions. Spoliation is a legal term for destruction of evidence.</p>



<p>The Florida Circuit Court Judge noted that a party had intentionally deleted files on a USB Thumb Drive and external hard drive. Apparently the USB Thumb Drive had been thrown away. The Court also observed that the materials on the drives were subject to the Discovery Rules under a Court Order. Prejudice can occur when efforts of a litigant are obstructed. The court found that while data had been destroyed, the opposing party could still present evidence to support its allegations. The Jury in the case will be given an “<strong>adverse inference”</strong> instruction that would tell the jury to assume that the deleted data on the <strong>USB Thumb Drive</strong> would have hurt the offending party’s case. The Court noted, “The content of the files deleted from the Sheriff’s laptop, the external hard drive and the Armor computer is not known. Plaintiff’s expert may be able to reconstruct some or all of these files, but only at excessive cost to plaintiff. The thumb drive, of course, has been lost altogether.”</p>



<p>Excerpted Text of Court’s Ruling:</p>



<p>“1. The motion to impose sanctions for spoliation of evidence is granted.</p>



<p>2. At trial, the jury will be instructed that data deleted from the Sheriff’s Office laptop, the Armor computer and the external hard drive, and data on the discarded thumb drive, contained information detrimental to defendants.</p>



<p>3. Plaintiff’s expert shall not be required to perform further analysis in an effort to retrieve deleted files or data.</p>



<p>4. Plaintiff is entitled to recover reasonable attorney fees incurred in connection with the prosecution of the instant motion.”</p>



<p>Source: FLW Supp 1709PRIS</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Search Warrant Cell Phone | Florida Attorney]]></title>
                <link>https://www.centrallaw.com/blog/search-warrant-i-phone-cell-phone-florida-attorney/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/search-warrant-i-phone-cell-phone-florida-attorney/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Fri, 21 Mar 2025 15:15:08 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[iPhone]]></category>
                
                    <category><![CDATA[Phone Search Warrant]]></category>
                
                    <category><![CDATA[Search Warrant]]></category>
                
                
                    <category><![CDATA[I Phone]]></category>
                
                
                
                    <media:thumbnail url="https://centrallaw-com.justia.site/wp-content/uploads/sites/411/2023/11/5a_IPhoneSearchWarrant.jpg" />
                
                <description><![CDATA[<p>Search Warrant Cell Phone: Protecting Your Rights in Florida | W.F. “Casey” Ebsary Jr. In the digital age, your cell phone holds a vast repository of personal information, making it a prime target for law enforcement. If you’re facing a search warrant cell phone scenario in Florida, understanding your rights is paramount. A search warrant&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<h2 class="wp-block-heading" id="h-search-warrant-cell-phone-protecting-your-rights-in-florida-w-f-casey-ebsary-jr"><strong>Search Warrant Cell Phone: Protecting Your Rights in Florida | W.F. “Casey” Ebsary Jr.</strong></h2>



<p>In the digital age, your cell phone holds a vast repository of personal information, making it a prime target for law enforcement. If you’re facing a <strong>search warrant cell phone</strong> scenario in Florida, understanding your rights is paramount. A <strong>search warrant cell phone</strong> specifically authorizes law enforcement to extract data from your device, potentially revealing private communications, location data, and sensitive personal files. Navigating the legal complexities surrounding <strong>search warrant cell phone</strong> procedures requires the expertise of a seasoned Florida attorney. W.F. “Casey” Ebsary Jr., with his deep understanding of both technology and criminal defense, can provide the critical legal guidance necessary to protect your privacy and challenge unlawful searches. When a <strong>search warrant cell phone</strong> is executed, the implications can be far-reaching, demanding immediate and strategic legal intervention.</p>



<h3 class="wp-block-heading" id="h-navigating-the-complexities-of-cell-phone-search-warrants-in-florida"><strong>Navigating the Complexities of Cell Phone Search Warrants in Florida</strong></h3>



<p>W.F. “Casey” Ebsary, Jr., a Tampa-based attorney with a specialized focus on the intersection of technology and criminal defense, brings to light the critical legal intricacies surrounding cell phone search warrants. The case of the Apple iPhone 4G prototype, while originating outside Florida, serves as a stark reminder of the pervasive role cell phones play in contemporary criminal investigations. In Florida, as across the nation, law enforcement increasingly relies on data extracted from smartphones to build cases. This necessitates a thorough understanding of the Fourth Amendment of the U.S. Constitution, which protects against unreasonable searches and seizures, and its application to digital devices.</p>



<h3 class="wp-block-heading" id="h-the-legal-framework-and-your-rights"><strong>The Legal Framework and Your Rights</strong></h3>



<p>A search warrant for a cell phone must adhere to strict legal standards. According to the Fourth Amendment, a warrant must be supported by probable cause, particularly describing the place to be searched and the persons or things to be seized. In Florida, this translates to specific requirements for warrants targeting digital devices. Florida Statute 933.02 outlines the grounds for issuance of search warrants, emphasizing the need for particularity. The legal landscape is further shaped by landmark cases like <em>Riley v. California</em>, where the U.S. Supreme Court recognized the unique privacy concerns associated with cell phones, requiring a warrant for most searches.</p>



<h4 class="wp-block-heading" id="h-key-legal-considerations"><strong>Key Legal Considerations:</strong></h4>



<ul class="wp-block-list">
<li><strong>Probable Cause:</strong> The warrant must be based on a showing of probable cause, meaning there must be sufficient evidence to believe a crime has been committed and that the cell phone contains evidence of that crime.</li>



<li><strong>Particularity:</strong> The warrant must specifically describe the data to be searched. A general warrant authorizing a broad search of all data on the phone is likely unconstitutional.</li>



<li><strong>Exigent Circumstances:</strong> In rare cases, law enforcement may be able to search a cell phone without a warrant if there are exigent circumstances, such as an immediate threat to public safety. However, these exceptions are narrowly construed.</li>



<li><strong>Suppression of Evidence:</strong> If a search warrant is deemed unlawful, any evidence obtained as a result of the search may be suppressed and excluded from trial.</li>
</ul>



<h2 class="wp-block-heading" id="h-case-study-the-apple-iphone-4g-prototype"><strong>Case Study: The Apple iPhone 4G Prototype</strong></h2>



<p>The case involving the Apple iPhone 4G prototype illustrates the potential scope of a cell phone search warrant. The warrant authorized the search of Jason Chen’s residence and the seizure of various electronic devices, including an iPhone, MacBooks, and hard drives. This case highlights the importance of:</p>



<ul class="wp-block-list">
<li>Careful review of the warrant and affidavit.</li>



<li>Challenging the scope of the search.</li>



<li>Protecting against overbroad seizures of electronic data.</li>
</ul>



<h3 class="wp-block-heading" id="h-penalties-and-legal-repercussions"><strong>Penalties and Legal Repercussions</strong></h3>



<p>The penalties associated with crimes involving cell phone data can be severe. In Florida, charges can range from misdemeanor offenses, such as unlawful access to electronic devices, to felony charges, such as theft of trade secrets or identity theft.</p>



<h2 class="wp-block-heading" id="h-potential-cell-phone-crimes-penalties"><strong>Potential Cell Phone Crimes Penalties:</strong></h2>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><th>Offense</th><th>Florida Statute</th><th>Potential Penalties</th></tr><tr><td>Unlawful Access to Electronic Devices</td><td><a href="https://law.justia.com/codes/florida/title-xlvi/chapter-815/section-815-06/">Florida Statute 815.06</a></td><td>Misdemeanor or Felony, depending on the extent of the offense.</td></tr><tr><td>Theft of Trade Secrets</td><td><a href="https://law.justia.com/codes/florida/title-xlvi/chapter-812/section-812-081/">Florida Statute 812.081</a></td><td>Third-degree felony, punishable by up to 5 years in prison and a $5,000 fine.</td></tr><tr><td>Identity Theft</td><td><a href="https://law.justia.com/codes/florida/title-xlvi/chapter-817/part-i/section-817-568/">Florida Statute 817.568</a></td><td>Third-degree felony to first-degree felony, depending on the financial loss, with penalties ranging from 5 to 30 years in prison and fines up to $10,000.</td></tr><tr><td>Possession of Child Pornography</td><td><a href="https://law.justia.com/codes/florida/title-xlvi/chapter-827/section-827-071/#:~:text=(2)%20A%20person%20is%20guilty,such%20child%20in%20a%20sexual">Florida Statute 827.071</a></td><td>3rd degree felony to 1st degree felony depending on the number of images.</td></tr></tbody></table></figure>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading" id="h-protecting-your-digital-privacy-a-call-to-action"><strong>Protecting Your Digital Privacy: A Call to Action</strong></h2>



<p>If you are facing a search warrant for your cell phone in Florida, it is essential to act quickly. Contact W.F. “Casey” Ebsary Jr. immediately to protect your rights and ensure your privacy is safeguarded.</p>



<h3 class="wp-block-heading" id="h-call-to-action"><strong>Call to Action:</strong></h3>



<ul class="wp-block-list">
<li><strong>Call <a href="/lawyers/w-f-casey-ebsary-jr/">W.F. “Casey” Ebsary Jr. </a>at 813-222-2220 <a class="gv-tel-link" title="Call +1 813-222-2220 via Google Voice" href="http://voice.google.com/calls?a=nc,%2B18132222220" target="_blank" rel="noopener"></a><a href="http://voice.google.com/calls?a=nc,%2B18132222220" target="_blank" rel="noreferrer noopener"></a>for immediate legal assistance.</strong></li>



<li><strong>Visit our website at <a href="https://www.centrallaw.com/" target="_blank" rel="noreferrer noopener">https://www.centrallaw.com/</a> for more information.</strong></li>



<li><strong>Contact us via our contact page: <a href="https://www.centrallaw.com/contact-us/" target="_blank" rel="noreferrer noopener">https://www.centrallaw.com/contact-us/</a></strong></li>
</ul>



<h3 class="wp-block-heading" id="h-contact-us"><strong>Contact Us:</strong></h3>



<p>The contact page for The Law Office of W.F. “Casey” Ebsary Jr. is designed to be user friendly and efficient. You can easily submit a message, or call the office directly. By using this page, you can get the help you need, and get the process started quickly.</p>



<h2 class="wp-block-heading" id="h-important-considerations-in-cell-phone-cases"><strong>Important Considerations in Cell Phone Cases</strong></h2>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><th>Consideration</th><th>Description</th></tr><tr><td>Digital Forensics</td><td>The analysis of digital devices to recover, analyze, and preserve digital evidence. Vital for both prosecution and defense.</td></tr><tr><td>Data Preservation</td><td>Steps taken to ensure that digital evidence is not altered or destroyed. Crucial for maintaining the integrity of evidence.</td></tr><tr><td>Privacy Rights</td><td>The legal protections afforded to individuals regarding their personal information stored on digital devices.</td></tr><tr><td>Federal Law</td><td>Federal laws such as the stored communications act, and the computer fraud and abuse act, can also become relevant in cell phone search cases.</td></tr></tbody></table></figure>



<h2 class="wp-block-heading" id="h-frequently-asked-cell-phone-leagal-questions-q-amp-a"><strong>Frequently Asked Cell Phone Leagal Questions (Q&A):</strong></h2>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="559" src="/static/2025/04/FAQ-1024x559.png" alt="FAQ" class="wp-image-3771" srcset="/static/2025/04/FAQ-1024x559.png 1024w, /static/2025/04/FAQ-300x164.png 300w, /static/2025/04/FAQ-768x419.png 768w, /static/2025/04/FAQ.png 1408w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">FAQ</figcaption></figure>



<div class="schema-faq wp-block-yoast-faq-block"><div class="schema-faq-section" id="faq-question-1744394837319"><strong class="schema-faq-question"><strong>What should I do if law enforcement presents a search warrant for my cell phone?</strong></strong> <p class="schema-faq-answer">Remain calm and polite. Do not resist the search, but do not consent to any searches beyond the scope of the warrant. Immediately contact an attorney.</p> </div> <div class="schema-faq-section" id="faq-question-1744406744777"><strong class="schema-faq-question"><strong>Can law enforcement search my cell phone without a warrant?</strong></strong> <p class="schema-faq-answer">Generally, no. However, there are limited exceptions, such as exigent circumstances.</p> </div> <div class="schema-faq-section" id="faq-question-1744406769757"><strong class="schema-faq-question"><strong>What is probable cause?</strong></strong> <p class="schema-faq-answer">Probable cause is a reasonable belief, supported by facts, that a crime has been committed and that evidence of the crime is located on the cell phone.</p> </div> <div class="schema-faq-section" id="faq-question-1744406785131"><strong class="schema-faq-question"><strong>How can I challenge a search warrant?</strong></strong> <p class="schema-faq-answer">An attorney can review the warrant and affidavit for legal deficiencies and file a motion to suppress any illegally obtained evidence.</p> </div> <div class="schema-faq-section" id="faq-question-1744406808463"><strong class="schema-faq-question"><strong>What types of data can law enforcement obtain from my cell phone?</strong></strong> <p class="schema-faq-answer">Law enforcement can potentially obtain text messages, emails, photos, videos, location data, and call logs.</p> </div> <div class="schema-faq-section" id="faq-question-1744406819309"><strong class="schema-faq-question"><strong>What is the importance of digital forensics in these cases?</strong></strong> <p class="schema-faq-answer">Digital forensics is vital for analyzing and preserving digital evidence, and it can be used to challenge the prosecution’s findings.</p> </div> <div class="schema-faq-section" id="faq-question-1744406836796"><strong class="schema-faq-question"><strong>What is the stored communications act?</strong></strong> <p class="schema-faq-answer">The stored communications act is a federal law that restricts the voluntary disclosure of stored electronic communications.</p> </div> <div class="schema-faq-section" id="faq-question-1744406858612"><strong class="schema-faq-question"><strong>What is the Computer Fraud and Abuse Act?</strong></strong> <p class="schema-faq-answer">The Computer Fraud and Abuse Act (CFAA) is a United States federal law that criminalizes unauthorized access to protected computer systems.</p> </div> <div class="schema-faq-section" id="faq-question-1744406870171"><strong class="schema-faq-question"><strong>Can I delete data from my phone before handing it over?</strong></strong> <p class="schema-faq-answer">Deleting data can lead to additional charges, such as obstruction of justice. It is best to consult with an attorney before taking any action.</p> </div> <div class="schema-faq-section" id="faq-question-1744406901231"><strong class="schema-faq-question"><strong>Why is it important to hire an attorney with technology expertise?</strong></strong> <p class="schema-faq-answer">Technology-related cases require a deep understanding of digital evidence and the legal complexities surrounding electronic devices.</p> </div> </div>



<p><strong>Legal Resources:</strong></p>



<ol class="wp-block-list"></ol>



<ul class="wp-block-list">
<li>Fourth Amendment of the U.S. Constitution: <a href="https://constitution.congress.gov/constitution/amendment-4/" target="_blank" rel="noreferrer noopener">https://constitution.congress.gov/constitution/amendment-4/</a></li>



<li>Florida Statute 933.02 (Grounds for issuance of search warrants): <a href="https://www.google.com/search?q=https://law.justia.com/codes/florida/2023/title-xlvii/chapter-933/section-933-02/" target="_blank" rel="noreferrer noopener">https://law.justia.com/codes/florida/2023/title-xlvii/chapter-933/section-933-02/</a></li>



<li>Florida Statute 815.06 (Unlawful Access to Electronic Devices): <a href="https://law.justia.com/codes/florida/2023/title-xlvi/chapter-815/section-815-06/" target="_blank" rel="noreferrer noopener">https://law.justia.com/codes/florida/2023/title-xlvi/chapter-815/section-815-06/</a></li>



<li>Florida Statute 812.081 (Theft of Trade Secrets): <a href="https://www.google.com/search?q=https://law.justia.com/codes/florida/2023/title-xlvi/chapter-812/section-812-081/" target="_blank" rel="noreferrer noopener">https://law.justia.com/codes/florida/2023/title-xlvi/chapter-812/section-812-081/</a></li>



<li>Florida Statute 817.568 (Identity Theft): <a href="https://www.google.com/search?q=https://law.justia.com/codes/florida/2023/title-xlvi/chapter-817/section-817-568/" target="_blank" rel="noreferrer noopener">https://law.justia.com/codes/florida/2023/title-xlvi/chapter-817/section-817-568/</a></li>



<li>Riley v. California: <a href="https://supreme.justia.com/cases/federal/us/573/373/" target="_blank" rel="noreferrer noopener">https://supreme.justia.com/cases/federal/us/573/373/</a></li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading" id="h-original-post-begins-here-search-warrant-for-a-cell-phone">Original Post Begins Here: Search Warrant for a Cell Phone</h2>



<p>W.F. “Casey” Ebsary, Jr., a Tampa attorney with expertise in both technology and criminal defense, took a close look at an intriguing search warrant involving an iPhone, pursued by Apple. This warrant serves as a reminder that cell phones, texts, and emails are often central to law enforcement’s investigations in technology cases. See for yourself what the warrant authorized and what was seized.</p>



<p><strong>Tampa Technology Lawyer</strong>&nbsp;and&nbsp;<strong>Criminal Defense Expert</strong>, W.F. ”Casey” Ebsary, Jr. in&nbsp;<strong>Florida&nbsp;</strong>has spent time reviewing a rather interesting&nbsp;<strong>Search Warrant</strong>&nbsp;for a&nbsp;<strong>cellular telephone</strong>. Specifically, an&nbsp;<strong>iPhone&nbsp;</strong>that Apple Computer Corporation wanted to retrieve. Take a look at &nbsp;<strong>warrant&nbsp;</strong>and what was seized for yourself: Cell phones, text messages, and email are a&nbsp;frequent&nbsp;target of state and federal law enforcement when investigating technology cases.</p>



<p><strong>iPhone Search Warrant</strong></p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="155" height="200" src="/static/2023/11/5a_IPhoneSearchWarrant.jpg" alt="IPhone Search Warrant" class="wp-image-243" title="Search Warrant | I Phone | Cell Phone | Florida Attorney" /><figcaption class="wp-element-caption">Cell Phone Search Warrant</figcaption></figure></div>


<p>Search warrant and affidavit related to the theft and sale of an Apple iPhone 4G prototype in 2010.</p>



<div data-wp-interactive="core/file" id="IPhone-Inventory" class="wp-block-file"><object data-wp-bind--hidden="!state.hasPdfPreview" hidden class="wp-block-file__embed" data="/static/2010/07/Pages-from-iphone_affidavitCompressed-2.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="Embed of Pages from iphone_affidavitCompressed-2."></object><a id="wp-block-file--media-665a34f8-ecef-4202-a22a-f746a8d07b00" href="/static/2010/07/Pages-from-iphone_affidavitCompressed-2.pdf">Pages from iphone_affidavitCompressed-2</a><a href="/static/2010/07/Pages-from-iphone_affidavitCompressed-2.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-665a34f8-ecef-4202-a22a-f746a8d07b00">Download</a></div>



<p>Here’s a summary of the key points:</p>



<ul class="wp-block-list">
<li><strong>Incident:</strong>&nbsp;An Apple employee, Robert “Gray” Powell, lost an unreleased iPhone 4G prototype at a restaurant. Brian Hogan found the phone and subsequently sold it to Jason Chen. Chen then provided the prototype to the website Gizmodo.com, which published images and details of the device.</li>



<li><strong>Investigation:</strong>&nbsp;Detective Matthew Broad of the San Mateo County Sheriff’s Office conducted the investigation. The affidavit details the events leading to the search warrant, including interviews with Apple representatives, witnesses, and the individuals involved.</li>



<li><strong>Search Warrant:</strong>&nbsp;The document includes a request for an ex-parte order to seal documents, the return to the search warrant, and the actual search warrant. It authorizes the search of Jason Chen’s residence at 40726 Greystone Terrace, Fremont, CA, for evidence related to the purchase, copying, and publishing of the iPhone prototype.</li>



<li><strong>Items Seized:</strong>&nbsp;The search warrant inventory lists numerous electronic devices and documents seized from Chen’s residence, including various Apple MacBooks, hard drives, digital cameras, and an iPhone.</li>



<li><strong>Charges:</strong>&nbsp;The affidavit mentions potential charges against Jason Chen, including buying or receiving stolen property, theft of trade secrets, and maliciously damaging property.</li>



<li><strong>Appendices:</strong>&nbsp;The document includes appendices detailing the location to be searched (Chen’s residence) and the specific property to be seized, such as computer systems, digital storage devices, records, data, and personal property that could establish identity and control over the premises.</li>
</ul>



<p><strong>Search Warrant for a Cell Phone? Tell Your Story Toll Free (813) 222-2220.</strong></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Computer Search Warrants]]></title>
                <link>https://www.centrallaw.com/blog/tampa-criminal-defense-attorney-computer-search-warrants/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/tampa-criminal-defense-attorney-computer-search-warrants/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Fri, 21 Mar 2025 13:45:41 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                    <category><![CDATA[Federal Court]]></category>
                
                    <category><![CDATA[Search Warrant]]></category>
                
                
                    <category><![CDATA[Computer Forensic]]></category>
                
                
                
                    <media:thumbnail url="https://centrallaw-com.justia.site/wp-content/uploads/sites/411/2023/11/38_ComputerCrimesAttorneyLawye-300x150-1.jpg" />
                
                <description><![CDATA[<p>Computer Search Warrants – Let us help you navigate the complexities of the legal system and protect your rights in the digital age. Your story matters, and we are here to listen and provide the legal expertise you need.</p>
]]></description>
                <content:encoded><![CDATA[
<p>Facing a computer search warrant in Tampa can be a daunting experience, potentially leading to serious legal repercussions. Understanding your rights and navigating the complexities of digital evidence is crucial. When law enforcement targets your electronic devices, you need an experienced advocate who comprehends the intricacies of computer-related investigations. <a href="/lawyers/w-f-casey-ebsary-jr/">William F. “Casey” Ebsary, Jr.,</a> a Board Certified Criminal Defense Attorney and former Prosecutor, offers unparalleled expertise in this field. As your trusted Tampa Computer Crimes Attorney, Casey Ebsary brings a deep understanding of high-tech litigation and electronic discovery. He’s dedicated to protecting your rights and ensuring a fair legal process. His proven track record, demonstrated by his AV rating and Super Lawyer recognition, makes him the ideal choice when facing computer search warrants and related legal challenges.</p>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>“Government cannot rely on the Fourth Amendment’s plain-view doctrine in cases where the investigators rely on the intermingling of computerized records”</strong></p>
</blockquote>



<h2 class="wp-block-heading" id="h-navigating-the-digital-minefield-understanding-computer-search-warrants-in-the-modern-legal-landscape-2025-update">Navigating the Digital Minefield: Understanding Computer Search Warrants in the Modern Legal Landscape – 2025 Update</h2>



<p>Computer Search Warrants – In today’s interconnected world, digital evidence plays a crucial role in criminal investigations. From emails and text messages to cloud storage and social media activity, computers and electronic devices hold a wealth of information that can be pivotal in building a case. However, the complexities of digital data present unique challenges to law enforcement and the courts, particularly concerning the Fourth Amendment’s protection against unreasonable searches and seizures.</p>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading" id="h-key-q-amp-a-on-computer-search-warrants"><strong>Key Q&A on Computer Search Warrants:</strong></h2>



<div class="schema-faq wp-block-yoast-faq-block"><div class="schema-faq-section" id="faq-question-1742564497107"><strong class="schema-faq-question"><strong>What is a computer search warrant?</strong></strong> <p class="schema-faq-answer">A computer search warrant is a legal document issued by a judge that authorizes law enforcement to search computer systems, electronic devices, and digital storage for evidence related to a crime.</p> </div> <div class="schema-faq-section" id="faq-question-1742564526467"><strong class="schema-faq-question"><strong>Why are computer search warrants different from traditional search warrants?</strong></strong> <p class="schema-faq-answer">Digital evidence is often intermingled, making it difficult to separate relevant data from irrelevant data. This creates challenges for the “plain view” doctrine and requires specialized procedures to protect privacy.</p> </div> <div class="schema-faq-section" id="faq-question-1742564547826"><strong class="schema-faq-question"><strong>What is the “plain view” doctrine, and how does it apply to computer searches?</strong></strong> <p class="schema-faq-answer">The “plain view” doctrine allows law enforcement to seize evidence in plain sight during a lawful search. However, courts have recognized that this doctrine is problematic in digital searches due to the intermingling of data. Therefore, the plain view doctrine has very limited use in digital evidence cases.</p> </div> <div class="schema-faq-section" id="faq-question-1742564559617"><strong class="schema-faq-question"><strong>What are some key requirements for computer search warrants?</strong></strong> <p class="schema-faq-answer">Warrants must be specific, detailing the data to be seized.<br />Searches should be conducted by trained personnel.<br />Procedures must be in place to prevent the disclosure of non-relevant information.<br />Search methods must be designed to uncover only the information with probable cause.</p> </div> <div class="schema-faq-section" id="faq-question-1742564604281"><strong class="schema-faq-question"><strong>What is “probable cause” in relation to a computer search warrant?</strong></strong> <p class="schema-faq-answer">Probable cause is the legal standard that must be met before a judge can issue a search warrant. It means that there is a reasonable belief that a crime has been committed and that evidence of the crime is located in the place to be searched. In the case of computer searches it means that there is reason to belive digital evidence of a crime exists on the devices being searched.</p> </div> <div class="schema-faq-section" id="faq-question-1742564630008"><strong class="schema-faq-question"><strong>What are some of the Fourth Amendment concerns related to computer searches?</strong></strong> <p class="schema-faq-answer">The Fourth Amendment protects individuals from unreasonable searches and seizures. Computer searches raise concerns about overbreadth, as warrants may authorize the seizure of vast amounts of personal information.</p> </div> </div>



<hr class="wp-block-separator has-alpha-channel-opacity" />


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="400" height="200" src="/static/2023/11/ee_ComputerCrimesAttorneyLawye.jpg" alt="Computer Search Warrants" class="wp-image-191" style="width:400px;height:200px" srcset="/static/2023/11/ee_ComputerCrimesAttorneyLawye.jpg 400w, /static/2023/11/ee_ComputerCrimesAttorneyLawye-300x150.jpg 300w" sizes="auto, (max-width: 400px) 100vw, 400px" /><figcaption class="wp-element-caption"><span style="font-family: inherit;font-size: 15px;font-style: inherit;font-weight: inherit">Computer Search Warrants</span><br><div style="font-size: 15px;margin: 0px;padding: 0px;vertical-align: baseline;border: 0px;text-align: start"></div></figcaption></figure></div>


<p>As the legal landscape evolves to address these challenges, individuals facing criminal investigations involving <a href="/criminal-defense/computer-crimes/">digital evidence</a> need experienced legal counsel who understand the intricacies of computer search warrants. At the <a href="/lawyers/w-f-casey-ebsary-jr/">Law Office of W.F. “Casey” Ebsary Jr</a>., we recognize the critical importance of safeguarding our clients’ rights in the digital age.</p>



<p>If you’re facing a computer search warrant in Tampa or dealing with any computer-related legal issues, don’t hesitate. Contact William F. “Casey” Ebsary, Jr. at (813) 222-2220 <a class="gv-tel-link" title="Call +1 813-222-2220 via Google Voice" href="http://voice.google.com/calls?a=nc,%2B18132222220" target="_blank" rel="noopener"></a><a href="http://voice.google.com/calls?a=nc,%2B18132222220" target="_blank" rel="noreferrer noopener"></a>for a free initial consultation or submit your request for help through our Call For Help web submission. Protect your rights and ensure expert legal representation. Learn how to navigate the complexities of computer search warrants and digital evidence by reading our detailed blog post: <a href="/blog/tampa-criminal-defense-attorney-computer-search-warrants/" target="_blank" rel="noreferrer noopener">/blog/tampa-criminal-defense-attorney-computer-search-warrants/</a></p>



<h3 class="wp-block-heading" id="h-the-evolving-landscape-of-computer-search-warrants"><strong>The Evolving Landscape of Computer Search Warrants</strong></h3>



<p>The case of <a href="https://harvardlawreview.org/print/vol-123/en-banc-ninth-circuit-holds-that-the-government-should-waive-reliance-on-plain-view-doctrine-in-digital-contexts-ae-united-states-v-comprehensive-drug-testing-inc-579-f-3d-989-9th-cir/"><em>United States v. Comprehensive Drug Testing Inc.</em>, 9th Cir. </a>(en banc), No. 05-10067 (8/26/09), highlighted the severe limitations placed on computer search warrants and searches. This landmark ruling emphasized that the government cannot rely on the “plain view” doctrine when investigating digital evidence. The court recognized the inherent difficulty in segregating relevant data from irrelevant information within complex computer systems.  </p>



<p>The “plain view” doctrine, traditionally applied to physical searches, allows law enforcement to seize evidence that is in plain sight if they are lawfully present.<sup></sup> However, the court in <em>Comprehensive Drug Testing</em> recognized that this doctrine is ill-suited for digital searches. The intermingling of electronic records makes it impossible to distinguish between relevant and irrelevant data without a thorough examination, which can easily exceed the scope of the original warrant. &nbsp;</p>



<h3 class="wp-block-heading" id="h-key-principles-for-computer-search-warrants"><strong>Key Principles for Computer Search Warrants</strong></h3>



<p>The <em><a href="https://harvardlawreview.org/print/vol-123/en-banc-ninth-circuit-holds-that-the-government-should-waive-reliance-on-plain-view-doctrine-in-digital-contexts-ae-united-states-v-comprehensive-drug-testing-inc-579-f-3d-989-9th-cir/">Comprehensive Drug Testing</a></em> case established crucial procedural safeguards for computer searches:</p>



<ol class="wp-block-list">
<li><strong>Rejection of the Plain View Doctrine:</strong> The government cannot rely on the plain view doctrine to justify a broad seizure and examination of electronically stored records.</li>



<li><strong>Specialized Personnel and Procedures:</strong> Searches must be conducted by specialized personnel with established procedures to prevent the disclosure of information beyond the scope of the warrant to investigators.</li>



<li><strong>Targeted Search Methods:</strong> The government’s search methods must be designed to uncover only the information for which probable cause exists, avoiding the seizure of extraneous data.  </li>
</ol>



<p>These safeguards aim to prevent “fishing expeditions” where law enforcement indiscriminately sift through vast amounts of digital data, potentially infringing on individuals’ privacy rights. The court’s ruling underscores the need for precise and narrowly tailored search warrants that clearly define the scope of the search.</p>



<h2 class="wp-block-heading" id="h-the-importance-of-experienced-legal-counsel-in-computer-search-cases"><strong>The Importance of Experienced Legal Counsel in Computer Search Cases</strong></h2>



<p>The complexities of computer search warrants demand the expertise of a seasoned criminal defense attorney. At the <a href="/lawyers/w-f-casey-ebsary-jr/">Law Office of W.F. “Casey” Ebsary Jr.</a>, we understand the nuances of digital evidence and are committed to protecting our clients’ rights throughout the legal process.</p>



<p>Our approach includes:</p>



<ul class="wp-block-list">
<li><strong>Thorough Examination of Search Warrants:</strong> We meticulously review computer search warrants to ensure they comply with the Fourth Amendment and the principles established in <em>Comprehensive Drug Testing</em>. We challenge warrants that are overly broad or lack sufficient particularity.</li>



<li><strong>Expert Forensic Analysis:</strong> We work with experienced computer forensic experts to analyze seized digital evidence and identify any irregularities or violations of our clients’ rights.</li>



<li><strong>Strategic Defense Strategies:</strong> We develop tailored defense strategies based on the specific circumstances of each case, leveraging our knowledge of digital evidence and computer search warrants.</li>



<li><strong>Vigorous Advocacy:</strong> We advocate zealously for our clients’ rights in court, challenging unlawful searches and seizures and seeking to suppress illegally obtained evidence.</li>
</ul>



<h3 class="wp-block-heading" id="h-why-choose-the-law-office-of-w-f-casey-ebsary-jr"><strong>Why Choose the Law Office of W.F. “Casey” Ebsary Jr.?</strong></h3>



<p>When your digital life is under scrutiny, you need an attorney who understands the complexities of computer search warrants and the evolving legal landscape. We offer:</p>



<ul class="wp-block-list">
<li><strong>Extensive Experience:</strong> With years of experience in criminal defense, we have a proven track record of successfully representing clients in cases involving digital evidence.</li>



<li><strong>In-Depth Knowledge:</strong> We stay abreast of the latest developments in computer forensics and search warrant law, ensuring that we provide our clients with informed and effective representation.</li>



<li><strong>Personalized Attention:</strong> We understand that every case is unique, and we provide personalized attention to each client, tailoring our strategies to their specific needs.</li>



<li><strong>Commitment to Client Rights:</strong> We are dedicated to protecting our clients’ Fourth Amendment rights and ensuring that they receive a fair and just legal process.</li>
</ul>


<div class="wp-block-image">
<figure class="aligncenter size-thumbnail"><a href="tel:8132222220"><img loading="lazy" decoding="async" width="150" height="150" src="/static/2025/03/CallNowroyal-blue-black-white-gray-200-x-800-button-call-4-150x150.png" alt="Call Us at 813-222-2220" class="wp-image-3465" /></a><figcaption class="wp-element-caption"><a href="tel:8132222220">Call Us at 813-222-2220</a></figcaption></figure></div>


<h4 class="wp-block-heading" id="h-the-digital-age-demands-specialized-legal-expertise"><strong>The Digital Age Demands Specialized Legal Expertise</strong></h4>



<p>The increasing reliance on digital evidence in criminal investigations necessitates specialized legal expertise. Attorneys must understand the intricacies of computer systems, data storage, and search warrant procedures to effectively represent their clients.</p>



<p>If you are facing a criminal investigation involving computer search warrants or digital evidence, do not hesitate to seek legal counsel. Contact the Law Office of W.F. “Casey” Ebsary Jr. today for a confidential consultation.</p>



<p><strong>Tell Me Your Story – Toll Free (813) 222-2220<a class="gv-tel-link" title="Call +1 813-222-2220 via Google Voice" href="http://voice.google.com/calls?a=nc,%2B18132222220" target="_blank" rel="noopener"></a><a href="http://voice.google.com/calls?a=nc,%2B18132222220" target="_blank" rel="noreferrer noopener"></a></strong></p>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Expert Criminal Defense: Your Secret Weapon!" width="500" height="375" src="https://www.youtube-nocookie.com/embed/zSzXqOvf_2I?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<p>We understand that facing criminal charges can be a daunting experience. Let us help you navigate the complexities of the legal system and protect your rights in the digital age. Your story matters, and we are here to listen and provide the legal expertise you need.</p>



<p>The law office of W.F. “Casey” Ebsary Jr. is here to help you navigate the increasing amount of digital evidence and associated legal issues. Do not hesitate to call and get your case evaluated.</p>



<h2 class="wp-block-heading" id="h-original-2009-post-computer-warrants">Original 2009 Post Computer Warrants</h2>



<p><strong>Tampa Criminal Defense Attorney</strong> reports severe limits in <strong>Computer Search Warrants</strong> and Searches – Another court has laid out detailed procedures for issuance and execution of search warrants for computers that contain files outside the scope of a search warrant. The court ruled that the Government cannot rely on the Fourth Amendment’s plain-view doctrine in cases where the investigators rely on the intermingling of computerized records to justify a broad seizure and examination of electronically stored records. United States v.Comprehensive Drug Testing Inc., 9th Cir.(en banc), No. 05-10067 (8/26/09).</p>



<p>The court states, “The process of segregating electronic data that is seizable from that which is not must not become a vehicle for the government to gain access to data which it has no probable cause to collect.” The plain-view doctrine is an issue courts have been struggling with.</p>



<h2 class="wp-block-heading" id="h-detailed-procedures-for-searches-of-computer-electronic-data">Detailed Procedures for Searches of Computer Electronic Data:</h2>



<p>1. The government must not rely on the plain view doctrine in digital evidence cases.</p>



<p>2. Search must be either done by specialized personnel with a procedure to prevent disclosure investigators of information that is not the target of the warrant.</p>



<p>3. The government’s search method must be designed to uncover only the information for which it has probable cause.</p>



<p><strong>When Computers Land in Court, We Can Help – Tell Me Your Story Toll Free – (813) 222-2220.</strong></p>



<p><a href="/criminal-defense/computer-crimes/">Tampa Criminal Defense Attorney on Computer Forensic Searches and Warrants</a></p>



<p>Source: pub.bna.com</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Search Warrant | Cell Phone Update]]></title>
                <link>https://www.centrallaw.com/blog/search-warrant-cell-phone-update/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/search-warrant-cell-phone-update/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Fri, 21 Mar 2025 12:37:23 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[Search]]></category>
                
                    <category><![CDATA[Warrant]]></category>
                
                    <category><![CDATA[Wurie]]></category>
                
                
                    <category><![CDATA[Cell Phone]]></category>
                
                
                
                    <media:thumbnail url="https://centrallaw-com.justia.site/wp-content/uploads/sites/411/2025/01/RecklessDrivingCellPhoneAttorney.png" />
                
                <description><![CDATA[<p>law enforcement generally requires a warrant to search digital information on a cell phone seized from an individual during an arrest.</p>
]]></description>
                <content:encoded><![CDATA[
<h2 class="wp-block-heading" id="h-cell-phone-search-warrant-update-2025">Cell Phone Search Warrant Update 2025</h2>



<p>In <a href="https://www.scotusblog.com/case-files/cases/united-states-v-wurie/#:~:text=Wurie,-Facebook%20LinkedIn%20Twitter&text=Docket%20No.&text=1st%20Cir.&text=Holding:%20The%20police%20generally%20may,and%20concurring%20in%20the%20judgment.">United States v. Wurie</a>, the Supreme Court unanimously ruled (9-0) that law enforcement generally requires a warrant to search digital information on a cell phone seized from an individual during an arrest. This decision, delivered on June 25, 2014, affirmed the First Circuit’s ruling and established a critical protection for digital privacy, recognizing that cell phones contain vast amounts of personal information distinct from physical belongings. Chief Justice Roberts authored the opinion, with Justice Alito filing a partial concurrence.</p>



<h2 class="wp-block-heading" id="h-can-they-search-your-phone-2025-legal-update">Can They Search Your Phone? 2025 Legal Update</h2>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<div class="schema-faq wp-block-yoast-faq-block"><div class="schema-faq-section" id="faq-question-1742561135003"><strong class="schema-faq-question"><strong>What is the core legal principle regarding cell phone searches after an arrest?</strong></strong> <p class="schema-faq-answer">The core legal principle, established in <em>United States v. Wurie</em> and reinforced by subsequent court decisions, is that law enforcement generally requires a warrant to search the digital contents of a cell phone seized during an arrest. This is due to the vast amount of personal and private information stored on these devices.</p> </div> <div class="schema-faq-section" id="faq-question-1742561177414"><strong class="schema-faq-question"><strong>Why do courts consider cell phones different from other personal belongings during an arrest?</strong></strong> <p class="schema-faq-answer">Courts recognize that cell phones hold significantly more personal data than typical physical belongings. They contain information akin to files in a home office, bank records, and medical records, all of which traditionally require warrants for searches. This distinction is highlighted in the Florida Supreme Court case <em>Cedric Tyrone Smallwood v. State of Florida</em>.</p> </div> <div class="schema-faq-section" id="faq-question-1742561198628"><strong class="schema-faq-question"><strong>What key U.S. Supreme Court cases have shaped this legal area?</strong></strong> <p class="schema-faq-answer"><em>United States v. Wurie</em>: Established the general warrant requirement for cell phone searches post-arrest.  <br /><em>Riley v. California</em>: Clarified that cell phone searches are not automatically permissible under the “search incident to arrest” exception. <br /><em>Arizona v. Gant</em>: While concerning vehicle searches, it narrowed the scope of permissible searches incident to arrest, influencing the approach to digital devices. <br /><em>United States v. Jones</em>: Addressed GPS tracking and emphasized the need to protect privacy in the digital age. <em>Kyllo v. United States</em>: Dealt with advanced surveillance and the Fourth Amendment.</p> </div> <div class="schema-faq-section" id="faq-question-1742561294563"><strong class="schema-faq-question"><strong>How are Florida courts handling cell phone searches?</strong></strong> <p class="schema-faq-answer">Florida courts are aligning with federal precedents, requiring warrants for cell phone searches. Florida state statutes, such as 316.306, also indicate a commitment to protecting digital privacy. The <em>Smallwood v. State of Florida</em> case from the Florida Supreme Court further emphasizes the protection of cell phone data.</p> </div> </div>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<p><strong>Protect Your Digital Privacy:</strong> This Q&A provides crucial information about your rights regarding cell phone searches. If you have questions or believe your rights have been violated, don’t hesitate to <a href="/lawyers/w-f-casey-ebsary-jr/">seek legal counsel from an expert</a>. <a href="/contact-us/">Contact </a>us today for a consultation: <a href="https://www.centrallaw.com/contact-us/" target="_blank" rel="noreferrer noopener">https://www.centrallaw.com/contact-us/</a></p>


<div class="wp-block-image">
<figure class="aligncenter size-thumbnail"><a href="tel:8132222220"><img loading="lazy" decoding="async" width="150" height="150" src="/static/2025/03/CallNowroyal-blue-black-white-gray-200-x-800-button-call-4-150x150.png" alt="Call Us at 813-222-2220" class="wp-image-3465" /></a><figcaption class="wp-element-caption"><a href="tel:8132222220">Call Us at 813-222-2220</a></figcaption></figure></div>


<hr class="wp-block-separator has-alpha-channel-opacity" />



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Expert Criminal Defense: Your Secret Weapon!" width="500" height="375" src="https://www.youtube-nocookie.com/embed/zSzXqOvf_2I?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<p>The intersection of Fourth Amendment rights and digital technology has created a complex legal landscape, particularly concerning cell phone searches during arrests. Recent court decisions in Florida, aligning with federal precedents, underscore the importance of warrant requirements in protecting individual privacy. Here’s a breakdown of the key legal considerations:</p>



<p><strong>The Fourth Amendment and Digital Privacy</strong></p>



<p>The Fourth Amendment of the U.S. Constitution safeguards individuals from unreasonable searches and seizures.<sup></sup> However, the application of this amendment in the digital age presents unique challenges. Cell phones, with their vast storage of personal data, have become a focal point of this legal debate.<sup></sup> &nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-medium"><img loading="lazy" decoding="async" width="300" height="300" src="/static/2024/06/image-300x300.png" alt="Cell Phone Tracking" class="wp-image-3342" srcset="/static/2024/06/image-300x300.png 300w, /static/2024/06/image-150x150.png 150w, /static/2024/06/image.png 512w" sizes="auto, (max-width: 300px) 100vw, 300px" /><figcaption class="wp-element-caption">The Fourth Amendment of the U.S. Constitution safeguards individuals from unreasonable searches and seizures. However, the application of this amendment in the digital age presents unique challenges. </figcaption></figure></div>


<p><strong>Key Legal Principles</strong></p>



<ul class="wp-block-list">
<li><strong>Warrant Requirement:</strong>
<ul class="wp-block-list">
<li>A central principle is that law enforcement generally requires a warrant to search the contents of a cell phone. This stems from the recognition that cell phones contain a wealth of private information, far exceeding what might be found in traditional physical searches.</li>



<li>The United States Supreme court case <a href="https://supreme.justia.com/cases/federal/us/573/373/">Riley v. California</a>, significantly impacted this area of law. This case established that a cell phone cannot be searched as part of a search incident to arrest.
<ul class="wp-block-list">
<li>For information on this case, it is beneficial to research court records, and legal databases, such as those found on the supreme court of the united states website.</li>
</ul>
</li>
</ul>
</li>



<li><strong>“Search Incident to Arrest” Exception:</strong>
<ul class="wp-block-list">
<li>Traditionally, law enforcement has had the authority to conduct searches “incident to a lawful arrest.” However, courts have increasingly recognized that this exception does not automatically extend to the digital contents of cell phones.  </li>
</ul>
</li>



<li><strong>Privacy Expectations:</strong>
<ul class="wp-block-list">
<li>Courts have emphasized the heightened privacy expectations associated with cell phones. The sheer volume and sensitivity of data stored on these devices necessitate stronger protections.  </li>
</ul>
</li>



<li><strong>Florida Law and Federal Precedents:</strong>
<ul class="wp-block-list">
<li><a href="https://supremecourt.flcourts.gov/content/download/241636/file/sc11-1130.pdf">Florida </a>courts are increasingly aligning with federal precedents that require warrants for cell phone searches. This reflects a growing consensus on the need to protect digital privacy.</li>



<li>Florida state statutes also reflect the need to protect digital privacy. For example, Florida statute 316.306, regarding wireless communications device use while driving, contains clauses that protect citizens from unwarranted searches of their devices.
<ul class="wp-block-list">
<li>Here is a link to that Florida state statute: <a href="https://www.flsenate.gov/laws/statutes/2023/316.306">Florida Statute 316.306 – Online Sunshine</a></li>
</ul>
</li>
</ul>
</li>
</ul>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“In our view, allowing law enforcement to search an arrestee’s cell phone without a warrant is akin to providing law enforcement with a key to access the home of the arrestee. Physically entering the arrestee’s home office without a search warrant to look in his file cabinets or desk, or remotely accessing his bank accounts and medical records without a search warrant through an electronic cell phone, is essentially the same for many people in today’s technologically advanced society. We refuse to authorize government intrusion into the most private and personal details of an arrestee’s life without a search warrant simply because the cellular phone device which stores that information is small enough to be carried on one’s person.” </p>



<p>Florida Supreme Court Case Number, SC11-1130, Cedric Tyrone Smallwood v. State of Florida  <a href="https://supremecourt.flcourts.gov/content/download/241636/file/sc11-1130.pdf">https://supremecourt.flcourts.gov/content/download/241636/file/sc11-1130.pdf</a></p>
</blockquote>



<p><strong>Practical Implications</strong></p>



<ol class="wp-block-list">
<li>For individuals, it’s crucial to understand their rights regarding cell phone searches.</li>



<li>For law enforcement, these rulings necessitate careful adherence to warrant requirements.</li>



<li>For legal professionals, these developments underscore the evolving nature of Fourth Amendment law in the digital age.</li>



<li>It is also important to note that law enforcement can obtain cell phone information with a warrant. Also, if an individual gives consent, then a warrant is not needed.  </li>



<li>Here is a link to a website that gives further information on cell phone searches after an arrest.</li>
</ol>



<p><strong>Conclusion</strong></p>



<p>The legal landscape surrounding <a href="/blog/cell-phone-tracking/">cell phone</a> searches is dynamic, with ongoing efforts to balance law enforcement needs with individual privacy rights. The trend towards stricter warrant requirements reflects a growing recognition of the unique privacy implications of digital technology. Sources and related content</p>



<p><a target="_blank" rel="noreferrer noopener" href="https://www.uscourts.gov/about-federal-courts/educational-resources/about-educational-outreach/activity-resources/what-does-fourth-amendment-mean#:~:text=The%20Constitution%2C%20through%20the%20Fourth,and%20seizures%20by%20the%20government."></a></p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="247" height="320" src="/static/2023/12/image-25.jpeg" alt="Cell Phone, Search, Warrant" class="wp-image-2555" style="width:247px;height:320px" srcset="/static/2023/12/image-25.jpeg 247w, /static/2023/12/image-25-232x300.jpeg 232w" sizes="auto, (max-width: 247px) 100vw, 247px" /><figcaption class="wp-element-caption"><span style="font-family: inherit;font-size: 15px;font-style: inherit;font-weight: inherit">Cell Phone, Wurie, Search, Warrant</span><div style="font-size: 15px;margin: 0px;padding: 0px;vertical-align: baseline;border: 0px;text-align: start"></div></figcaption></figure></div>


<p><a target="_blank" rel="noreferrer noopener" href="https://www.uscourts.gov/about-federal-courts/educational-resources/about-educational-outreach/activity-resources/what-does-fourth-amendment-mean#:~:text=The%20Constitution%2C%20through%20the%20Fourth,and%20seizures%20by%20the%20government."></a></p>



<p>Original Post: <strong>Florida Criminal and DUI Defense Attorney</strong> notes a Federal Court has lined up with the Florida Supreme Court in condemning warrantless cell phone searches “ on a cell phone, carried on the person. Allowing the police to search that data without a warrant any time they conduct a lawful arrest would, in our view, create “a serious and recurring threat to the privacy of countless individuals .” Gant, 556 U.S. at 345; cf. United States v. Jones, 132 S.Ct. 945, 950 (2012)(“At bottom, we must ‘assur[e] preservation of that degree of privacy against government that existed when the Fourth Amendment was adopted.’ “ (quoting Kyllo v. United States, 533 U.S. 27, 34 (2001))). We therefore reverse the denial of Wurie’s motion to suppress, vacate his conviction, and remand for further proceedings consistent with this opinion.”</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Criminal Defense Attorney in Apollo Beach, Florida? Meet Casey Ebsary! Criminal Attorney in 33572]]></title>
                <link>https://www.centrallaw.com/blog/criminal-attorney-lawyer-33572/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/criminal-attorney-lawyer-33572/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Mon, 23 Oct 2023 11:33:07 GMT</pubDate>
                
                    <category><![CDATA[Attorney]]></category>
                
                    <category><![CDATA[Call to Action]]></category>
                
                    <category><![CDATA[Casey Ebsary]]></category>
                
                    <category><![CDATA[Channelside District]]></category>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Criminal Trial Lawyer]]></category>
                
                    <category><![CDATA[Drug Crimes]]></category>
                
                    <category><![CDATA[Federal Court]]></category>
                
                    <category><![CDATA[Florida]]></category>
                
                    <category><![CDATA[Hillsborough County Courthouse]]></category>
                
                    <category><![CDATA[Legal Advice]]></category>
                
                    <category><![CDATA[Legal Help]]></category>
                
                    <category><![CDATA[Legal Services]]></category>
                
                    <category><![CDATA[State Court]]></category>
                
                    <category><![CDATA[Theft]]></category>
                
                    <category><![CDATA[Uncategorized]]></category>
                
                
                    <category><![CDATA[Apollo Beach]]></category>
                
                
                
                <description><![CDATA[<p>Are you facing a legal challenge in Apollo Beach, Florida, and need expert legal guidance? Look no further! Casey Ebsary is a Board Certified Criminal Trial Lawyer who is here to help with your legal needs in and around Apollo Beach. His office is conveniently located just a stone’s throw away from the Hillsborough County&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Are you facing a legal challenge in Apollo Beach, Florida, and need expert legal guidance? Look no further! Casey Ebsary is a Board Certified Criminal Trial Lawyer who is here to help with your legal needs in and around Apollo Beach. His office is conveniently located just a stone’s throw away from the Hillsborough County Courthouse.</p>



<h2 class="wp-block-heading" id="h-ready-to-get-started">Ready to Get Started?</h2>



<p>If you’re in need of legal assistance or guidance, don’t hesitate to reach out to Casey Ebsary and his experienced team. They are here to help you navigate your legal journey with expertise and care.</p>



<h2 class="wp-block-heading" id="h-why-choose-casey-ebsary">Why Choose Casey Ebsary?</h2>



<p>Casey Ebsary is not just any lawyer; he’s a Board Certified Criminal Trial Lawyer. What does that mean? It means he’s exceptionally skilled and experienced in handling criminal cases. Whether you’re dealing with a legal issue or need expert advice, Casey is the professional you want on your side.</p>



<h2 class="wp-block-heading" id="h-convenient-office-location">Convenient Office Location</h2>



<p>Finding Casey’s office is a breeze. It’s situated near the Courthouse, which is just a short drive from Apollo Beach. The best part? They offer free parking, so you won’t have to stress about finding a parking spot. This means you can focus on what’s most important: your legal concerns.</p>



<h2 class="wp-block-heading" id="h-tell-us-your-story">Tell Us Your Story</h2>



<p>Your unique situation is important, and Casey Ebsary wants to hear your story. To discuss your legal matters or get the guidance you need, call his team at (813) 222-2220. They’re approachable, understanding, and ready to assist you.</p>



<h2 class="wp-block-heading" id="h-summary">Summary</h2>



<p>When it comes to legal challenges in Apollo Beach, Casey Ebsary is the attorney you can rely on. He’s an expert in handling criminal cases and is dedicated to helping you with your legal needs. Don’t hesitate to reach out to him at (813) 222-2220 for support or advice. Casey and his team are here to listen and assist you on your legal journey.</p>



<h2 class="wp-block-heading" id="h-ready-to-get-started-0">Ready to Get Started?</h2>



<p>If you’re in need of legal assistance or guidance, don’t hesitate to reach out to Casey Ebsary and his experienced team. They are here to help you navigate your legal journey with expertise and care.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Tips for Appearing in Court by Telephone or Video, Zoom, or Skype]]></title>
                <link>https://www.centrallaw.com/blog/tips-for-appearing-in-court-by-telephone-or-video-zoom-or-skype/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/tips-for-appearing-in-court-by-telephone-or-video-zoom-or-skype/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Thu, 24 Dec 2020 19:04:07 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Federal Court]]></category>
                
                    <category><![CDATA[State Court]]></category>
                
                
                
                
                <description><![CDATA[<p>Many hearings are now conducted byTelephone or Video, Zoom, or Skype. Some Florida Courts have strict rules for appearing. The year 2020 generated a lot of changes for us all. Chief among them are how to appear safely court proceedings. To that end, some Florida courts have initiated formal rules of procedures and electronic hearings.&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1024" height="768" src="/static/2023/11/aa_ZoomCameraAndLights-1024x768-1.jpg" alt="Camera and Lights" class="wp-image-369" srcset="/static/2023/11/aa_ZoomCameraAndLights-1024x768-1.jpg 1024w, /static/2023/11/aa_ZoomCameraAndLights-1024x768-1-300x225.jpg 300w, /static/2023/11/aa_ZoomCameraAndLights-1024x768-1-768x576.jpg 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Camera, Lighting, and Microphone for <a href="/contact-us/">Virtual Client Consultations</a> and Virtual Court Appearance</figcaption></figure>



<p>Many hearings are now conducted byTelephone or Video, Zoom, or Skype. Some Florida Courts have strict rules for appearing.</p>



<p>The year 2020 generated a lot of changes for us all. Chief among them are how to appear safely court proceedings. To that end, some Florida courts have initiated formal rules of procedures and electronic hearings. While many courts have not overflow of this, these new Federal rules have some common sense tips that we all can find useful.</p>



<p>Some judges have noted that parties have not dressed appropriately for court. Business casual or a suit and tie seems to be the preference for most judges.</p>



<p><em><strong>Ask yourself, would someone really expect you to be on a beach in Hawaii </strong></em></p>



<p><em><strong>while you are involved in an possibly life changing matter in court?</strong></em></p>



<p>In addition, some software packages allow for changing backgrounds, make sure in the background is appropriate to the formality of the court. Ask yourself, would someone really expect you to be on a beach in Hawaii while you are involved in an possibly life changing matter in court?</p>



<p>Some judges prefer and some courts prohibit appearing from your vehicle.</p>



<p>Make sure your phone and video connection is stable.</p>



<p>Some courts require only one speaker for each party to speak on behalf of their cause. When you’re not speaking try not to interrupt. Make sure you identify herself each time you speak.</p>



<h2 class="wp-block-heading" id="h-tips-for-appearing">Tips for Appearing</h2>



<p>We use a headset, external microphone, studio lights, and a plain white background. Generally, we also use this equipment for our <a href="/contact-us/">virtual meetings with clients, witnesses, and other lawyers</a>.</p>



<p>Here are the actual rules that for one court that will be in effect starting in early 2021.</p>



<p>Chief United States District Judge, Timothy J. Corrigan encourages litigants to “Please visit the Court’s website for more information about the changes to the Local Rules, including a <a href="https://www.flmd.uscourts.gov/presentation-new-local-rules" target="_blank" rel="noopener noreferrer">video presentation</a> (that will qualify for CLE credit) and <a href="https://www.flmd.uscourts.gov/sites/flmd/files/documents/flmd-2020-local-rule-revisions-bullet-point-summary.pdf" target="_blank" rel="noopener noreferrer">bullet point summary</a> explaining the changes.”</p>



<h2 class="wp-block-heading" id="h-florida-district-court-rules-on-appearing-in-court-by-telephone-or-video-zoom-or-skype">Florida District Court Rules on Appearing in Court by Telephone or Video, Zoom, or Skype</h2>



<p>If a judge conducts a proceeding by telephone or video, a participant:</p>



<p>(1) must dress in professional attire and use a professional background if either is visible,<br>(2) must use a landline if available,<br>(3) must designate one speaker for each party or interested person,<br>(4) must not participate from a vehicle,<br>(5) must use the mute setting when not speaking,<br>(6) must try to avoid background noise or other interference,<br>(7) must wait for the judge to address the participant before speaking and must not interrupt a speaker, and<br>(8) must start each distinct presentation by saying “this is [name]” or the equivalent.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Feds Cannot Bypass Android Security Pattern Screen Lock!]]></title>
                <link>https://www.centrallaw.com/blog/feds-cannot-bypass-android-security-pattern-screen-lock/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/feds-cannot-bypass-android-security-pattern-screen-lock/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Sat, 14 Apr 2018 22:01:00 GMT</pubDate>
                
                    <category><![CDATA[Android Security Screen]]></category>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Federal Court]]></category>
                
                    <category><![CDATA[Screen Lock]]></category>
                
                
                    <category><![CDATA[Android]]></category>
                
                
                
                <description><![CDATA[<p>Android Security Pattern Feds cannot Bypass Android Security Pattern Screen Lock!&nbsp;After too many failed attempts phone is locked. Forensic software apparently cannot read a locked Samsung Android phone. We have just posted the FBI application for the search warrant issued to Google to tell Feds how to retrieve data here:&nbsp;Android Phone Search Warrant Easy to&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="200" height="200" src="/static/2023/12/image-2.gif" alt="Phone" class="wp-image-2469" title="Android, Android Security Screen, Screen Lock"/><figcaption class="wp-element-caption">Android, Android Security Screen, Screen Lock</figcaption></figure></div>


<h2 class="wp-block-heading" id="h-android-security-pattern">Android Security Pattern</h2>



<p>Feds cannot Bypass Android Security Pattern Screen Lock!&nbsp;After too many failed attempts phone is locked. Forensic software apparently cannot read a locked Samsung Android phone. We have just posted the FBI application for the search warrant issued to Google to tell Feds how to retrieve data here:&nbsp;Android Phone Search Warrant</p>



<p>Easy to Bypass Security Screen Lock on iPhone&nbsp;Wired has published a “quick method to circumvent an iPhone’s passcode-protected lock screen: tap the “Emergency Call” button, then enter three pound signs, hit the green Call button and immediately press the Lock button. That simple procedure gives a snoop full access to the Phone app on the iPhone, which contains the address book, voicemail and call history.”</p>



<p>Thanks to Wired Story here:&nbsp;<a href="http://m.wired.com/threatlevel/2012/03/fbi-android-phone-lock/" target="_blank" rel="noreferrer noopener">m.wired.com/threatlevel/2012/03/fbi-android-phone-lock/</a></p>



<p><strong>Search Warrant For a Phone? Call Casey at (813) 222-2220</strong></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Can the Police Force You to Give up the Password to Your Phone?]]></title>
                <link>https://www.centrallaw.com/blog/police-password-phone-warrant/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/police-password-phone-warrant/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Thu, 15 Dec 2016 16:32:16 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[iPhone]]></category>
                
                    <category><![CDATA[Password]]></category>
                
                    <category><![CDATA[Search Warrant]]></category>
                
                
                    <category><![CDATA[Cell Phone]]></category>
                
                
                
                <description><![CDATA[<p>“we are not inclined to believe that the Fifth Amendment should provide greater protection to individuals who passcode protect their iPhones “ A court in Florida just ruled that a defendant could be forced to provide the password to his iPhone. A distinction is important – they got a search warrant. Without a warrant, the&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" src="/static/2023/12/image-3.jpeg" alt="Phone" class="wp-image-2473" style="width:500px;height:500px" width="500" height="500" srcset="/static/2023/12/image-3.jpeg 500w, /static/2023/12/image-3-300x300.jpeg 300w, /static/2023/12/image-3-150x150.jpeg 150w" sizes="auto, (max-width: 500px) 100vw, 500px" /><figcaption class="wp-element-caption">Can Police Force You to Give Up iPhone Password?</figcaption></figure></div>


<p class="has-text-align-right"><strong>“we are not inclined to believe that the Fifth Amendment should provide greater protection to individuals who passcode protect their iPhones “</strong></p>



<p>A court in Florida just ruled that a defendant could be forced to provide the password to his iPhone. A distinction is important – they got a search warrant. Without a warrant, the case may have been decided in favor of protecting the phone owner’s privacy. The phone had a cracked screen and had been allegedly used to take photographs that would have been useful in the prosecution of the phone’s owner. You can review a typical<a href="/blog/search-warrant-i-phone-cell-phone-florida-attorney/"> iPhone Search Warrant</a> here. At the bottom of this article are numerous other articles we have written on this topic.</p>



<h2 class="wp-block-heading" id="h-right-to-remain-silent">Right to Remain Silent</h2>



<p>Usually, we think that we have a right not to incriminate ourselves. However, this Florida Court in the Tampa Bay area ruled that providing the password did not constitute testimony against one’s self. In a convoluted 19-page ruling the court found that while there may be evidence of a crime, providing the passcode was not testimonial.</p>



<h2 class="wp-block-heading" id="h-here-are-some-excerpts-from-the-iphone-court-s-ruling">Here Are Some Excerpts from the iPhone Court’s Ruling.</h2>



<p>“That an accused may be “forced to surrender a key to a strongbox containing incriminating documents,” but he cannot “be compelled to reveal the combination to his wall safe,” Doe, 487 U.S. at 219 (Stevens, J., dissenting), is another often repeated quote. See, e.g., Hubbell, 530 U.S. at 43; Doe, 487 U.S. at 210 n.9; In re Grand Jury, 670 F.3d at 1345; Kirschner, 823 F. Supp. 2d at 669. Despite the many cases referencing the quote, we have found none that provide details of “surrender[ing] a key.” We question whether identifying the key which will open the strongbox—such that the key is surrendered—is, in fact, distinct from telling an officer the combination. More importantly, we question the continuing viability of any distinction as technology advances. See Fisher, 425 U.S. at 407 (“Several of Boyd[ v. United States, 116 U.S. 616 (1886)]’s express or implicit declarations have not stood the test of time.”). In that respect, we are not inclined to believe that the Fifth Amendment should provide greater protection to individuals who passcode protect their iPhones with letter and number . . . . ”</p>



<p>“In this case, the communication was sought only for its content and the content has no other value or significance.11 By providing the passcode, Stahl would not be acknowledging that the phone contains evidence of video voyeurism. See Doe, 487 U.S. at 215. Moreover, although the passcode would allow the State access to the phone, and therefore to a source of potential evidence, the State has a warrant to search the phone—the source of evidence had already been uncovered. See id. Providing the passcode does not “betray any knowledge [Stahl] may have about the circumstances of the offenses” for which he is charged. See id. at 219 (Stevens, J., dissenting). It does not implicitly “relate a factual assertion or disclose information.””</p>



<p>“The Fifth Amendment privilege against self-incrimination has been held to apply not only to verbal and written communications but also to the production of documents, usually in response to a subpoena or summons, because the act of production itself could communicate incriminatory statements. See Fisher, 425 U.S. at 410. The courts that have addressed the Fifth Amendment implications for providing decryption keys and passcodes have largely applied the act-of-production doctrine and the foregone conclusion exception. See, e.g., Sec. & Exch. Comm’n v. Huang, No. 15-269, 2015 WL 5611644, *1 (E.D. Penn. Sept. 23, 2015); United States v. Fricosu, 841F. Supp. 2d 1232, 1235 (D. Col. 2012); In re Grand Jury Subpoena to Boucher (In re Boucher), 2:06-MJ-91, 2009 WL 424718, *2-3 (D. Vt. Feb. 19, 2009); Gelfgatt, 11 N.E.3d at 612; Commonwealth v. Baust, 89 Va. Cir. 267 (Va. Cir. Ct. 2014). But see United States v. Kirschner, 823 F. Supp. 2d 665, 669 (E.D. Mich. 2010) (concluding that providing the password was testimony protected by the privilege against self-incrimination).”</p>



<p>“Invoking the privilege still requires the accused to establish compulsion, a testimonial communication, and incrimination. And as we have said, in this case compulsion and incrimination are not at issue, leaving only the testimonial element. Testimonial elements of production include (1) the existence of the documents, (2) the accused’s possession or control of the documents, and (3) the authenticity of the documents. Hubbell, 530 U.S. at 36.”</p>



<p>“The difficult question whether a compelled communication is testimonial for purposes of applying the Fifth Amendment often depends on the facts and circumstances of the particular case.” Doe, 487 U.S. at 214-15. Here, the trial court rested its determination that producing the passcode would be testimonial exclusively on the concept that production would require “the use of the contents” of Stahl’s mind. The phrase “the contents of the accused’s mind” has often been repeated in cases discussing the privilege. See, e.g., Hubbell, 530 U.S. at 43; Doe, 487 U.S. at 211; In re Grand Jury, 670 F.3d at 1345; Kirschner, 823 F. Supp. 2d at 669. And although the trial court correctly quoted the Eleventh Circuit’s statement in In re Grand Jury, that “[t]he touchstone of whether an act of production is testimonial is whether the government compels the individual to use ‘the contents of his own mind’ to explicitly or implicitly communicate some statement of fact,” 670 F.3d at 1345, the trial court did not consider the law as stated in Hubbell and Doe—that the contents of the accused’s mind must be “extensive[ly] use[d]” in creating the response, Hubbell, 530 U.S. at 43, or must “relat[e] him to the offense,” Doe, 487 U.S. at 2013.10 That is, “it is not enough that the compelled communication is sought for its content. The content itself must have testimonial significance.” Doe, 487 U.S. at 211 n.10 (emphasis added) (first citing Fisher, 425 U.S. at 408; then citing Gilbert v. California, 388 U.S. 263, 267 (1967); and then citing United States v. Wade, 388 U.S. 218, 222 (1967)). ”</p>



<p>“Although the phrase “the use of the contents of the accused’s mind” has been used in act-of-production cases, we note that the case cited by the Eleventh Circuit for its proposition that the use of the contents of the accused’s mind is the touchstone of whether an act of production is testimonial does not so hold. Curcio v. United States, 354 U.S. 118 (1957), provides that there “is a great difference” between compelled production of documents and compelled testimony, specifying that testifying as to the location of documents “requires him to disclose the contents of his own mind.” Id. at 127-28. ”</p>



<p>Source: STATE OF FLORIDAv AARON STAHL Case No. 2D14-4283 Opinion filed December 7, 2016.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Computer Hacker Guilty of Intrusions – Computer Forensics E Discovery]]></title>
                <link>https://www.centrallaw.com/blog/computer-hacker-guilty-of-intrusions-computer-forensics-e-discovery/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/computer-hacker-guilty-of-intrusions-computer-forensics-e-discovery/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Thu, 17 Mar 2016 12:04:13 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                
                
                
                <description><![CDATA[<p>“The United States Attorney’s Office for the Northern District of California announced that [a man from] Pleasant Hill, California, pleaded guilty today in federal court in Oakland to hacking into government computers and then defacing government websites with material illegally obtained from those intrusions. He pleaded guilty to each count of a five-count indictment charging&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>“The United States Attorney’s Office for the Northern District of California announced that [a man from] Pleasant Hill, California, pleaded guilty today in federal court in Oakland to hacking into government computers and then defacing government websites with material illegally obtained from those intrusions.</p>



<p>He pleaded guilty to each count of a five-count indictment charging computer crimes in violation of 18 U.S.C. 1030. In pleading guilty, [the man] who is known as one of the members of the self-titled hacking group called ‘The Deceptive Duo,’ admitted that he unlawfully accessed computer systems of various federal agencies in April 2002, including the Department of Defense’s Defense Logistic Information Service (DLIS), the Office of Health Affairs (OHA), and NASA’s Ames Research Center (ARC). In particular, [the man] admitted that he: Gained unauthorized accessed to DLIS computers in Battle Creek, Michigan, for the purpose of obtaining files that he later used to deface an OHA website hosted on computers in San Antonio, Texas. “</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Computer Crimes Experts, Mobile Phones, Devices, and SD Card Storage]]></title>
                <link>https://www.centrallaw.com/blog/computer-crimes-experts-mobile-phones-sd-card/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/computer-crimes-experts-mobile-phones-sd-card/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Wed, 20 Jan 2016 20:57:44 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                
                    <category><![CDATA[Cell Phone]]></category>
                
                
                
                <description><![CDATA[<p>Computer Crimes Experts, Cell Phones and SD cards Recently I reviewed a computer crime case where the dates on files on an SD card seized by the police, examined by the police computer forensic laboratory, and by a defense expert in computer forensics showed some unusual patterns in the dates of files that allegedly contained&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Computer Crimes Experts, Cell Phones and SD cards</p>



<p>Recently I reviewed a <a href="/criminal-defense/computer-crimes/">computer crime</a> case where the dates on files on an SD card seized by the police, examined by the police computer forensic laboratory, and by a <a href="/criminal-defense/computer-crimes/">defense expert in computer forensics</a> showed some unusual patterns in the dates of files that allegedly contained contraband. Those files on the SD-card were later the basis of criminal charges and an arrest. There were claims of evidence spoliation. “Spoliation” is a fancy word for tampering. Sometimes a Computer Crimes Experts can come in handy. During a lengthy interrogation by the Prosecutor there were some answers given that may apply to virtually any cases involving data stored on a mobile phone SD card.</p>



<h2 class="wp-block-heading" id="h-questions-and-answers-from-computer-crimes-expert-testimony-on-sd-storage-devices-in-mobile-devices">Questions and Answers from Computer Crimes Expert Testimony on SD Storage Devices in Mobile Devices</h2>



<h3 class="wp-block-heading" id="h-what-are-hash-values-in-sd-cards-and-stored-files">What Are Hash Values in SD Cards and Stored Files?</h3>



<p>“These are the hash values of that. That is a method that I use to be able to correlate that picture with the picture on the SD cards, things like that; but it’s a fingerprint. Every file has a unique fingerprint.”</p>



<h3 class="wp-block-heading" id="h-what-is-the-creation-date-on-a-file-stored-on-an-sd-card">What Is the Creation Date on a File Stored on an SD Card?</h3>



<p>“I have seen instances where if a file was moved to another system, the creation date is what the current date is of that system. Because, as far as that system’s concerned, hey, it was created on my system today.”</p>



<h3 class="wp-block-heading" id="h-what-about-iphone-where-there-are-no-sd-storage-devices">What About iPhone, Where There Are No SD Storage Devices?</h3>



<p>“For example, with iPhone being a proprietary system, you’re — you’re talking about something that’s an encrypted system and we constantly stay abreast . . . . “-</p>



<h3 class="wp-block-heading" id="h-do-both-police-and-forensic-examiners-use-cellebrite">Do Both Police and Forensic Examiners Use Cellebrite?</h3>



<p>“[W]e — as a company, in general, stay abreast of that, the changes there, as I’m sure your group has the same — same challenges. With that, we’re — we ‘ re always challenging our vendors. There’s three primary vendors we use, including Cellebrite, which you guys use, as well. But challenging them to stay abreast of it.”</p>



<h3 class="wp-block-heading" id="h-what-is-the-job-of-a-computer-forensic-examiner-in-case-involving-cell-phone-data-and-sd-storage-devices">What Is the Job of a Computer Forensic Examiner in Case Involving Cell Phone Data and SD Storage Devices?</h3>



<p>“To look at it with the eyes of a computer forensic expert to determine whether the evidence being portrayed was accurate or if there was evidence being omitted or not looked at from a different way and we all know that when you’re looking at it from a prosecution point of view, you look at evidence from that angle. If you’re looking at it from a defense point of view, since I work both sides, I know I’m going to look at the evidence differently in cases because in one you’re trying to find underlying causes one way or another. So I felt my job in this was to look at the evidence to determine whether or not everything was being described accurately and completely.”</p>



<h3 class="wp-block-heading" id="h-are-there-different-types-of-files-stored-on-mobile-device-sd-cards">Are There Different Types of Files Stored on Mobile Device SD Cards?</h3>



<p>“When you talk about system files, it’s a little bit more complex. The system does many, many things to make your life work better on a computer. And storage locations could be temporary areas; the system just uses and works with. That’s very beneficial to us in a forensic area because that can be very telling as far as how the system was used, what the system is doing, who’s doing what and what’s automatic, what’s not, what’s user initiated, what’s system initiated, all that is good. You can tell that from the temporary areas. There’s also caching areas.”</p>



<h3 class="wp-block-heading" id="h-what-are-cache-files-on-an-sd-card">What Are Cache Files on an SD Card?</h3>



<p>“Caching areas are when the computer does something and then it goes and does something else, it caches it out, caches something back in; that’s very telling of what’s going on in the system to us. Who initiated, whether it’s automatic, whether it’s deliberate, stuff like that. There is allocated resources, unallocated resources, deleted areas; there’s just a — just a plethora of stuff that the system does and there’s a lot of different storage locations. Now the ones that I’m focusing in on, for this particular case and this particular report, are the ones that, you know, give us telltale sign of something. And I would have to read it real quick here to know what we’re getting at. I was hoping you were going to ask something specific in here, but that’s basically an overview of what storage locations are.”</p>



<h3 class="wp-block-heading" id="h-what-is-the-significance-of-where-files-are-stored-on-an-sd-card">What Is the Significance of Where Files Are Stored on an SD Card?</h3>



<p>“So storage locations, I gave you an example to help you understand how storage locations work, the difference between pictures and documents, stuff like that. The system is the same way. It does certain things, it will store them in different places. The other key point here then, also is that in — when you’re talking about the system storage locations, they’re not accessible by the user. These are areas that obviously if the user could access those, you could — you could destroy your system. But these are typically areas that are not accessible by the user. By us, yes, from a forensic point of view.”</p>



<h3 class="wp-block-heading" id="h-why-are-system-storage-files-important">Why Are System Storage Files Important?</h3>



<p>“Because, depending on how the device acquired a particular piece of information, whether it be media or text or whatever, how it was — how it came to exist on the phone matters. And system storage can help us to determine that.”</p>



<h3 class="wp-block-heading" id="h-can-date-meta-data-on-an-sd-storage-device-used-on-a-phone-be-altered">Can Date Meta Data on an SD Storage Device Used on a Phone Be Altered?</h3>



<p>“I’ve seen people fool that and they’ll put a cell phone in a shield bag in which case it doesn’t make connection; and there is an app, I think, that can change the date. So there’s people that could do things like that but in these particular cases, these were active and that’s really not the issue that I want to get into. The problem is that depending on the software use or how things come about — and it’s called a feature. And there’s a feature that when you take a file and you put it onto a system, that it maintains the original creation date that that particular, let’s say photograph you made, was maintained. And it’s a feature because you want to know that the Christmas of 2004 occurred on December of 2004, not when you happened to move it over there. So it is a feature of something. But then there are some operations when you move things over, and I’ve seen it before because I’ll see stuff come to be on a system, and they’re milliseconds apart, the creation date. And I know that those were — that was a copy operation performed.”</p>



<p>“You plug in the SD card and the metadata is put on the SD card. Last access date in — in doing the correlation was — would be updated on the phone, as well. But let’s say, for instance, if you put an image, a brand new image on there, and the creation date was last year and you put another image on there, maybe you copied three images and the way you copied it it happened to pick up the date of the computer which was, you know, maybe you changed the date of the computer and you wanted to show it to be last month. Then when you take that SD card and you plug it in the phone, you’re going to see one image with that date from last year as a create date and then you’re going to see three images, milliseconds apart, that are from last month. What I’m saying is that the phone becomes slave to the SD card as far as the metadata –“</p>



<h3 class="wp-block-heading" id="h-can-computer-crimes-experts-discover-data-files-placed-on-a-mobile-device-without-the-user-s-knowledge">Can Computer Crimes Experts Discover Data Files Placed on a Mobile Device Without the User’s Knowledge?</h3>



<p>“[J]ust realize that when I’m talking about the push, that the technology is there, that the . . . potential is there for stuff to be pushed on your computer. And of course, the user is oblivious to all this going on. And that’s why you could actually go to a website that had unfortunate information on it and your computer now is a recipient of that information and you, the user, are none the wiser.”</p>



<p>“Sometimes the user doesn’t even know they went somewhere. Sometimes in — in this world of malware and viral attacks and exploitation of compu — of people’s identities, there’s a lot of times — like, and I use the term unfortunate, is if you do a search, one thing these search engines do not do is assess where it’s going to take you and you could click on something and then it could actually take you to a site that doesn’t display anything but it certainly puts stuff on your computer and then redirects you to something else to show you what you think you wanted to see. There’s a lot of smoke and mirrors going on behind the scenes that the user’s not aware of. That’s the push technology I’m<br>talking about . . . .”</p>



<p>“Whether or not you saw it, whether or not you meant to go there, that’s — that does not — those two statements don’t come into play when it comes to push. . . . Push includes whatever the — and I’ll call it malicious in some cases, but whatever the site, or whatever the originating prospect that might be. It could be a server, it could be a site, it could be almost anything. Whatever it is, it will push on there<br>and I can’t tell you what that will be. In — I can tell you in general what it is. In general it’s thumbnails.’</p>



<p>“The fact that Windows does that, is a feature to allow you to operate better. But how many times have we heard about there being a hole, an exploited hole in Windows that Microsoft had to go in and patch with a new release or with — with a new update they patched this hole or they discovered this — this whatever was open and they come in. You take a feature on something and you get a website that exploits that feature, I think you kind of then answered your question because then okay, well whose fault is it? Well, it’s a feature of Windows to do this. But they’re — the reason it was written was to optimize web browsing, that’s it. Now to push big stuff on there, and push other stuff on there, when people are taking it to its limit and exploiting it and doing the wrong thing, then I’d say it’s the fault of the site.”</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Instagram Hacking Not a Computer Crime Says Court in Florida]]></title>
                <link>https://www.centrallaw.com/blog/instagram-hacking-computer-crime-florida/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/instagram-hacking-computer-crime-florida/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Tue, 08 Dec 2015 20:51:43 GMT</pubDate>
                
                    <category><![CDATA[815.06]]></category>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Cyber]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                    <category><![CDATA[Instagram]]></category>
                
                    <category><![CDATA[Revenge Porn]]></category>
                
                    <category><![CDATA[State Court]]></category>
                
                
                    <category><![CDATA[784.049]]></category>
                
                
                
                <description><![CDATA[<p>Is Hacking an Instagram Account Always a Crime in Florida? A guy in Florida was convicted of unauthorized computer use. the court reversed his conviction. The guy“logged into his ex-girlfriend’s Instagram account and posted nude photographs of her without her permission.” The prosecutor claimed that constituted a violation of section 815.06(1)(a), Florida Statutes (2013). What&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="500" height="500" src="/static/2015/12/InstagramHack.gif" alt="Instagram Hack" class="wp-image-2488" title="Instagram Hack Computer Crime"/><figcaption class="wp-element-caption">Instagram Hack Not a Computer Crime in Florida</figcaption></figure></div>


<h2 class="wp-block-heading" id="h-is-hacking-an-instagram-account-always-a-crime-in-florida">Is Hacking an Instagram Account Always a Crime in Florida?</h2>



<p>A guy in Florida was convicted of unauthorized computer use. the court reversed his conviction. The guy“logged into his ex-girlfriend’s Instagram account and posted nude photographs of her without her permission.” The prosecutor claimed that constituted a violation of section 815.06(1)(a), Florida Statutes (2013).</p>



<h2 class="wp-block-heading" id="h-what-is-hacking-a-computer-network-in-florida">What Is Hacking a Computer Network in Florida?</h2>



<p>Section 815.06 makes it illegal under Florida computer law and states “[w]hoever willfully, knowingly, and without authorization [a]ccesses or causes to be accessed any computer, computer system, or computer network . . . commits an offense against computer users.” § 815.06(1)(a), Fla. Stat. (2013).</p>



<p>The court reversed the conviction and focussed on three defintions in the law:</p>



<ul class="wp-block-list">
<li>“Computer” means an internally programmed, automatic device that performs data processing</li>



<li>“Computer network” means any system that provides communications between one or more computer systems and its input or output devices, including, but notlimited to, display terminals and printers that are connected by telecommunication facilities.</li>



<li>“Computer system” means a device or collection of devices, including support devices, one or more of which contain computer programs, electronic instructions, or input data and output data, and which perform functions, including, but not limited to, logic, arithmetic, data storage, retrieval, communication, or control. The term does not include calculators that are not programmable and that are not capable of being used in conjunction with external files.§ 815.03, Fla. Stat. (2013).</li>
</ul>



<p>The state failed to prove that Instagram was a Computer, computer system, or “computer network. The winning argument was that an Instagram account does not fall within any of these statutory definitions.</p>



<h2 class="wp-block-heading" id="h-instagram-hack-case-excerpt">Instagram Hack Case Excerpt:</h2>



<p>“The plain language of the statutory definitions of “computer,” “computer system,” and “computer network” refer to tangible devices, not the data and other information located on the device. Thus, to prove a violation of section 815.06(1)(a) the State must establish that the defendant accessed one of the listed tangible devices without authorization, not that the defendant accessed a program or information stored on the device without authorization. See <u>Rodriguez v. State</u>, 956 So. 2d 1226, 1230 (Fla. 4th DCA 2007) (reversing conviction under section 815.06 because evidence only established that the defendant accessed a “computer function” that he was not authorized to access).”</p>



<p>“Here, the charge against Appellant was based only on the unauthorized access of his ex-girlfriend’s Instagram account, not the computer server on which the account is presumably located. We say “presumably” because the only evidence in the record explaining what Instagram is was the ex-girlfriend’s testimony that it is a form of social media and “a place where you post pictures [and] your friends get to see it.” Nothing in the record establishes or explains how accessing an Instagram account works from a technological perspective, leaving unanswered whether or how Appellant’s actions amounted to accessing a specific computer, computer system, or computer network. Accordingly, in this case, the State failed to provide the necessary evidentiary foundation to prove that Appellant’s actions violated section 815.06(1)(a).”</p>



<h2 class="wp-block-heading" id="h-revenge-porn-statute-section-784-049-florida-statutes">Revenge Porn Statute Section 784.049, Florida Statutes</h2>



<p>The court conclude a revenge porn prosecution under Section 784.049, Florida Statutes, that specifically prohibits the publication of sexually-explicit images of a person on the Internet without his or her consent is now a tool prosecutors can use. The court noted the new revenge porn statute was needed because “Florida law does not specifically prohibit posting pictures of a nude adult person on the Internet for viewing by other adults if the picture was taken with the knowledge and consent of the person”.</p>



<p>Source: Crapps v State,&nbsp;CASE NO. 1D14-4569 (Fla 1st DCA Dec 8, 2015). <a href="https://edca.1dca.org/DCADocs/2014/4569/144569_DC08_12082015_090851_i.pdf" target="_blank" rel="noreferrer noopener">edca.1dca.org/DCADocs/</a></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Spend 600 Months In Prison When Police Search Lost Cell Phone]]></title>
                <link>https://www.centrallaw.com/blog/police-search-lost-cell-phone/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/police-search-lost-cell-phone/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Thu, 03 Dec 2015 17:43:11 GMT</pubDate>
                
                    <category><![CDATA[cellphone]]></category>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[Search Warrant]]></category>
                
                
                    <category><![CDATA[Cell Phone]]></category>
                
                
                
                <description><![CDATA[<p>What Happens When Police Search Your Lost Cell Phone That Has Illegal Material On It? The story begins in a Walmart in Florida. The owner lost their phone at Walmart. After he left the phone, it was found, and the owner agreed to pick it up from the store. The owner of the phone failed&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" src="/static/2023/12/image-8.jpeg" alt="Phone" class="wp-image-2492" style="width:200px;height:200px" width="200" height="200" srcset="/static/2023/12/image-8.jpeg 200w, /static/2023/12/image-8-150x150.jpeg 150w" sizes="auto, (max-width: 200px) 100vw, 200px" /><figcaption class="wp-element-caption">Search of Lost Cell Phone</figcaption></figure></div>


<h2 class="wp-block-heading" id="h-what-happens-when-police-search-your-lost-cell-phone-that-has-illegal-material-on-it">What Happens When Police Search Your Lost Cell Phone That Has Illegal Material On It?</h2>



<p>The story begins in a Walmart in Florida. The owner lost their phone at Walmart. After he left the phone, it was found, and the owner agreed to pick it up from the store. The owner of the phone failed to pick the phone up from the store. The store manager looked at the phone in an effort to find a photo of the owner. When the manager found contraband on the phone, she called the cops – police search lost cell phone.</p>



<h2 class="wp-block-heading" id="h-search-warrant-for-an-abandoned-cell-phone">Search Warrant for an Abandoned Cell Phone</h2>



<p>Police search lost cell phone – The cops waited 23 days to get a search warrant. A Florida Court ruled that this did not constitute an unreasonable delay to obtain a search warrant. First, the court found that the defendants had hoped the store manager would not report the materials found on the phone to the police. Second, the phone owner had filed an insurance claim and replaced the phone with the exact same model. The decision to not retrieve the phone from the store, coupled with the filing of an insurance claim, and replacing the phone with the same model constituted an abandonment of ownership of the phone. Search and seizure law requiresthat those who challenge a search and seizure must have standing to challenge the search. In this case, the phone owner had no standing to challenge the search, the phone and any rights the owner had to challenge the search and seizure were gone. The court also addressed the Private Search Doctrine that supports searches by citizens, that otherwise might be illegal if performed by the police or the government.</p>



<h2 class="wp-block-heading" id="h-sentenced-to-600-months-in-federal-prison">Sentenced to 600 Months in Federal Prison</h2>



<p>By the way, the court found that a 600 month sentence for the materials found on the phone was just fine. The phone owner entered a written plea agreement and the sentence was a possible outcome that while it was as harsh as the judge could impose, it was within the terms of the plea agreement.</p>



<h2 class="wp-block-heading" id="h-case-excerpts">Case Excerpts</h2>



<p>“When Vo [store manager] failed to meet Sparks [phone owner] with the phone as the two had previously agreed, Defendants knew how to find Vo to get their phone back. But Defendants did not return to their Walmart store and look for Vo. Nor did they ask for Walmart’s assistance in obtaining their phone, found in its store, by its employee. They also did not file a report with Walmart or the police complaining that Vowould not return their phone, despite their requests. Instead, they made a conscious decision to stop pursuing the phone, even though they knew how to get it back with reasonable effort. That decision—whether because Defendants hoped that Vo would not report them if they did not continue to seek the phone or because Defendants simply thought recovery of the phone was not worth their reasonable effort—can be viewed only as a deliberate decision to abandon the phone. Because Defendants abandoned their phone within three days of having lost it, they lack standing to challenge law enforcement’s 23-day delay between recovering the phone and obtaining a search warrant to search it.”</p>



<h2 class="wp-block-heading" id="h-the-private-search-doctrine">The Private-Search Doctrine</h2>



<p>“The Fourth Amendment provides that the “right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated.” U.S. Const. amend. IV. The protection the FourthAmendment affords, however, extends to governmental action only; “it is wholly inapplicable ‘to a search or seizure, even an unreasonable one, effected by a private individual not acting as an agent of the Government or with the participation or knowledge of any governmental official.’” United States v. Jacobsen, 466 U.S.109, 113, 104 S. Ct. 1652, 1656 (1984) (quoting Walter v. United States, 447 U.S.649, 662, 100 S. Ct. 2395, 2404 (1980) (Blackmun, J., dissenting)). So once an individual’s expectation of privacy in particular information has been frustrated by a private individual, the Fourth Amendment does not prohibit law enforcement’s subsequent use of that information, even if obtained without a warrant. Id. at 116,104 S. Ct. at 1656; see id. at 117, 104 S. Ct. at 1658-59.”</p>



<p>Read Complete Opinion Here: <a href="http://media.ca11.uscourts.gov/opinions/pub/files/201412143.pdf" target="_blank" rel="noopener">media.ca11.uscourts.gov/opinions/pub/files/201412143.pdf</a></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[The Web Mob a/k/a La Cosa Webstra]]></title>
                <link>https://www.centrallaw.com/blog/web-mob-aka-la-cosa-webstra/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/web-mob-aka-la-cosa-webstra/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Thu, 16 Oct 2014 23:39:28 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                    <category><![CDATA[Cyber]]></category>
                
                
                
                <description><![CDATA[<p>Cybercrime: A Lucrative and Dangerous Underground World The underground world of cybercrime is thriving, with millions of stolen credit card numbers and personal identification details available for mere dollars. This report delves into the activities of digital mobsters who specialize in phishing expeditions, sending millions of scam emails daily. These cybercriminals remain hidden behind digital&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<h2 class="wp-block-heading" id="h-cybercrime-a-lucrative-and-dangerous-underground-world">Cybercrime: A Lucrative and Dangerous Underground World</h2>



<p>The underground world of cybercrime is thriving, with millions of stolen credit card numbers and personal identification details available for mere dollars. This report delves into the activities of digital mobsters who specialize in phishing expeditions, sending millions of scam emails daily. These cybercriminals remain hidden behind digital aliases, screen names, and encrypted communication channels, engaging in various illicit activities.</p>



<h2 class="wp-block-heading" id="h-virtual-hit-men-anonymity-and-retribution">Virtual Hit Men: Anonymity and Retribution</h2>



<p>One significant incident involved the theft of 150,000 consumer records, credit reports, and Social Security numbers by cybercriminals. These individuals operate as a digital gang, punishing errant members by exposing their true identities on public websites, effectively assassinating their virtual personas. The Secret Service has recently made a major breakthrough, arresting 28 individuals, indicting 19, and uncovering a network of 4,000 web-based mob members.</p>



<h2 class="wp-block-heading" id="h-web-mob-busted-coordinated-law-enforcement-action">Web Mob Busted: Coordinated Law Enforcement Action</h2>



<p>Law enforcement agencies took synchronized action against this cyber mob, conducting raids on multiple gang members simultaneously while they were engaged in web-based discussions. By capturing key figures and taking control of the gang’s website, they issued warnings to potential suspects. This operation significantly disrupted the criminal network’s activities.</p>



<h2 class="wp-block-heading" id="h-bottom-line-a-dark-marketplace">Bottom Line: A Dark Marketplace</h2>



<p>The cybercriminal marketplace operates discreetly, with stolen credit card data, worth thousands of dollars, being sold for as little as $1 to $10. Personal identification information, including email addresses, is even cheaper. The culprits range from high school dropouts to IT postgraduates, all exploiting the perceived anonymity of the internet to profit from confidential data on the world’s computer networks.</p>



<p><strong>Authors:</strong> W.F. “Casey” Ebsary, Jr., CentralLaw.com and Albert Lucas, B.A. Mathematics</p>



<p><strong>Full Text of Article:</strong></p>



<p>Millions of stolen credit card numbers and other personal identification information are available for less than ten dollars according to experts at Baseline magazine and the United States Department of Justice. Unlike Michael Corleone’s crew, these mobsters exist solely in cyberspace. Phishing expeditions are their forte, with estimates of between 75 and 150 million scam emails sent daily.</p>



<h3 class="wp-block-heading" id="h-virtual-hit-men">Virtual Hit Men</h3>



<p>Recently one large data collector was hit by mobsters who stole or accessed nearly 150,000 consumer records, credit reports, and Social Security numbers. This gang hides behind digital aliases, screen names, and nicknames. To punish wayward gang members, enforcers will publish the true names and identifying information of formerly anonymous transgressors on websites. Supplying the rat’s true identity to law enforcement virtually assassinates the individual in cyberspace.</p>



<p>The Secret Service recently tracked down one such gang. With 28 arrests, 19 indictments, and 4,000 gang members, the Government has penetrated one of the largest, if not the largest known web mob. Again, unlike secret meetings of the heads of the families, the web mobs met in web based discussion forums where they discussed and attempted to perfect the stealing and the forging of bankcards, and a myriad of other personal identification documents. They cloak their identities and encrypt their communications.</p>



<h3 class="wp-block-heading" id="h-web-mob-busted">Web Mob Busted</h3>



<p>Agents with the Secret Service staged synchronized raids on several gang members. Since word travels fast in cyberspace, they simultaneously knocked on dozens of doors across the country while the gang members were chatting and plotting in a web-based forum. By moving in concert, they captured the capos before they could compromise further investigation by publicizing the bust and/or destroying computer records of their dark deals. Eventually the agents took control of the mob’s website and posted a warning on their homepage to those not yet busted – “Contact your local United States Secret Service field office before we contact you!!!”</p>



<p>In the digital equivalent of a bunch of televisions falling off Tony Soprano’s truck, batches of credit card data were falling off electronic trucks and onto the hard drives of gang members. They tested batches of purloined information to grade and evaluate the data for accuracy and to determine whether or not the card numbers were cancelled or valid. Testing of the data consisted of illicit entry into a retailer’s computer and running a series of nominal charges for each card number to see if the charges were approved or declined. Once tested and graded, the data is sold to the highest bidder on clandestine websites.</p>



<h3 class="wp-block-heading" id="h-bottom-line">Bottom Line</h3>



<p>According to the Secret Service, a credit card with a $10,000 limit would sell for between $1 to $10 dollars or more. E-mail addresses and associated personal identification information are cheaper – they go for a few cents each. From high school dropouts to post graduate students of Information Technology, cyber criminals now use the illusion of anonymity and take unrestricted license with confidential information housed on the world’s computer networks.</p>



<p><strong>Authors:</strong> W.F. “Casey” Ebsary, Jr., CentralLaw.com and Albert Lucas, B.A. Mathematics</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Tech Wreck]]></title>
                <link>https://www.centrallaw.com/blog/tech-wreck/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/tech-wreck/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Thu, 16 Oct 2014 23:36:54 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                
                    <category><![CDATA[Cyber]]></category>
                
                
                
                <description><![CDATA[<p>We are inundated with technologies designed to more effectively communicate. Some have caused users to defectively communicate. Misuse yields communications breakdown or even worse – death by PowerPoint®. With 400 Million Copies of Microsoft Office® and millions of PowerPoint® Presentations every day, one commentator, Dave Paradi surveyed and found several annoying elements in the bane&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>We are inundated with technologies designed to more effectively communicate. Some have caused users to defectively communicate. Misuse yields communications breakdown or even worse – death by PowerPoint®. With 400 Million Copies of Microsoft Office® and millions of PowerPoint® Presentations every day, one commentator, Dave Paradi surveyed and found several annoying elements in the bane of boardroom and courtroom technologies, PowerPoint®. Lest you not be familiar with potential side effects of poorly executed digital slideshow software, be assured watching slides from industrial safety filmstrips is more bearable than the painful boredom from this assassin of effective messaging from Microsoft®.</p>



<p>The survey found that speakers reading slides, flying text across the screen, and annoying use of sounds were some reasons for disdain for the technology. To that list add the users’ tech timeouts when the software or the hardware fails to display the desired show. With prices tumbling on hardware, including cheap projectors and notebook computers, expect the visual delirium to continue until audiences stand up and complain, walk out, or fall asleep during these moments of mediocrity.</p>



<p>Combining the laser pointer with the video projector can exponentially increase the risk of midday narcolepsy in the jury box or the seminar room. Actually, since the searing red dot of the laser pointer resembles the laser sight on the SWAT team’s M-16, some might claim it to be a useful device for waking up bored audience members or jurors. Jurors know that labels on laser devices warn of eye damage. Use of the powered pointer might actually keep them on the edge of their seats protecting themselves from blindness and more importantly not hearing a word said.</p>



<p>We revel in new technologies but hope their use will help, not distract and bore the audience. To that end, make sure that use of presentation technology serves and does not supplant. Evaluate each tool and ask a few simple questions: Does this technology work? Do you know how to work it? Is the technology really necessary to convey the message? Does it distract from the message? Is the technology persuasive? New technologies will emerge. Each must be reviewed by asking these questions.</p>



<p>In a culture where computer-generated scenes can appear real, just because it was on the television or the big screen projector doesn’t necessarily mean that the audience is convinced that either a droid army saved the universe; or that your side of the case should prevail.</p>



<p><strong>Authors:</strong> W.F. “Casey” Ebsary, Jr., CentralLaw.com and Jodi Ann Baudean, Master of Science in Civil Engineering</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Securing a Cable Modem Against Computer Criminals]]></title>
                <link>https://www.centrallaw.com/blog/securing-cable-modem-computer-criminals/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/securing-cable-modem-computer-criminals/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Thu, 16 Oct 2014 23:26:38 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                    <category><![CDATA[Cyber]]></category>
                
                
                
                <description><![CDATA[<p>As the use of commercial broadband cable modem’s flourishes, the opportunity for computer criminals or hackers to attack computers attached to these networks similarly has skyrocketed. Unbeknownst to most users, a cable modem provides easy access to an attached computer. Protection of these computers is a three-stage process. A first line of defense against malicious&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>As the use of commercial broadband cable modem’s flourishes, the opportunity for computer criminals or hackers to attack computers attached to these networks similarly has skyrocketed. Unbeknownst to most users, a cable modem provides easy access to an attached computer. Protection of these computers is a three-stage process.</p>



<p>A first line of defense against malicious access is a hardware firewall. Without a hardware firewall, the attached computer is easily accessible. With a hardware firewall such as a Linksys Cable/Broadband router as the first layer of protection a hacker will not be able to see your computer as a first device attached to your cable modem.</p>



<p>The second line of defense is a software firewall. A heuristic firewall such as ZoneAlarm looks for suspicious activity per se in addition to an ever-evolving defined list of threats. ZoneAlarm uses a permission-based system to allow access to and from the Internet to be granted or denied by a user. For example, a number of attacks on Windows operating systems using Outlook as an email client, have exploited easy access to the Outlook contacts database. Once accessed those attackers replicate themselves and redistribute information from the attacked computer to email addresses found on the victim’s computer. Obviously, distribution of confidential client information is not an option for any of us. So not protecting our information is not an option either.</p>



<p>The third and final line of defense is maintenance of current virus protection software. Most top of the line software packages will automatically access the publisher’s website to obtain a current list of threats or virus definitions. This third line of defense will provide protection in the event the other two layers do not intercept the malicious file(s) that can compromise your home or office network.</p>



<p>Remember that your security system is only as strong as the weakest link. So while we obviously will focus on our desktop computers, legitimate remote access to our networks with a laptop from home or from onsite from a courtroom or client’s office, will provide opportunities for hackers to exploit our systems. You must make sure that all devices accessing our networks are equipped to deter hackers. Furthermore all users must be aware of the best practices to prevent illicit access to your firm’s digital resources.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Secret Messages That Are Not Secret]]></title>
                <link>https://www.centrallaw.com/blog/secret-messages-secret/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/secret-messages-secret/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Thu, 16 Oct 2014 23:23:49 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                
                    <category><![CDATA[Cyber]]></category>
                
                
                
                <description><![CDATA[<p>There are secret messages in your documents that are not secret. Both major word processing packages, Word and Word Perfect, contain hidden information that unless carefully removed can be a rich source of information to an opponent to whom the document is digitally distributed. Documents contain far more information than can be seen on screen.&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>There are secret messages in your documents that are not secret. Both major word processing packages, Word and Word Perfect, contain hidden information that unless carefully removed can be a rich source of information to an opponent to whom the document is digitally distributed. Documents contain far more information than can be seen on screen.</p>



<p>A document contains information about the author, creation and revision dates, and other information about the lineage of the publication. The metadata as it is referred to can be used by a party to track revisions, additions, and deletions from the text. Therefore, care should be used to strip documents of these attributes when the document is to be distributed outside of the firm. Tips on stripping these attributes are available from both Microsoft and Corel. The Microsoft resource can be found at <a href="http://support.microsoft.com/default.aspx?scid=kb;en-us;Q223396" target="_blank" rel="noopener noreferrer">support.microsoft.com</a>. The Corel resource is located at <a href="http://corel.com" target="_blank" rel="noopener noreferrer">corel.com</a>.</p>



<p>Surprisingly, the Microsoft Office stores all previous revisions of a Word document within the document itself. The revisions can be removed. One easy way to strip most of the identifiable information from document is to open a document in your word processor, select all of the text and copy it, open the Notepad application, paste the text into the Notepad document, and save the document as a text document.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Phishing and Spoofing]]></title>
                <link>https://www.centrallaw.com/blog/phishing-spoofing/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/phishing-spoofing/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Thu, 16 Oct 2014 23:18:21 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                    <category><![CDATA[Cyber]]></category>
                
                
                
                <description><![CDATA[<p>Phishing Phishing is not to be confused with ‘fishing.’ There is no cast net, no baiting of the hook, and no minnow awaiting a large-mouth bass. But there are plenty of wireless fly rods out there. What do I mean? Specifically, an enterprising nerd or computer wizard of the binary-off generation can send you a&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<h2 class="wp-block-heading" id="h-phishing">Phishing</h2>



<p>Phishing is not to be confused with ‘fishing.’ There is no cast net, no baiting of the hook, and no minnow awaiting a large-mouth bass. But there are plenty of wireless fly rods out there. What do I mean? Specifically, an enterprising nerd or computer wizard of the binary-off generation can send you a disguised email representing a company you know and highly regard. The message may be duplicating a well-known logo in a misleading email suggesting you, the gullible, reply and update their files. They will frequently ask for a Social Security Number, credit card number, username and password, and/or your bank account number. Such data provides a license for identity theft. It goes on all the time. You read stories of months and months of futile effort to rectify credit reports done in by the virtual criminals. Frequently, the bait appears as an online financial intermediary asking for an update of personal information. In reality, takers just feed the ‘phisher’ valuable key information used to exploit the theft of the vulnerable victims’ identities.</p>



<h2 class="wp-block-heading" id="h-spoofing">Spoofing</h2>



<p>Another popular indoor sport for some phisherman is spoofing. The digital sportsmen are hacking wireless cellular networks. First, the angler finds a cellular telephone with voice mail. Second, the piscator spoofs the cellular phone number, fooling the cellular network into authorizing access to the cellular telephone’s features. Third, the woesome whaler harvests the data and voicemail stored in the victim’s account. Data can include voicemail, user identification information, address books, photos, and passwords.</p>



<h2 class="wp-block-heading" id="h-explaining">Explaining</h2>



<p>How do they do it? Spoofing is easier and simpler than compromising most computer networks. We will not publish specifically where to go to spoof caller identification information. However, accept as fact, that information appearing to identify a caller can be falsified. Some cellular providers allow users to turn off the requirement that passwords be entered when accessing services from the user’s handset. The cellular caster then calls a cell phone number whose password is not required by the user – an option popular among many callers. The happy harpooner then gains entry into the victim’s voice mail, can control the options available to users (both authorized and otherwise), and has reign over whatever data and information is stored therein. A celebrity such as Paris Hilton and all her friends in her address book know all about it.</p>



<h2 class="wp-block-heading" id="h-preventing">Preventing</h2>



<p>Avoiding phishing and spoofing requires vigilance. Don’t supply usernames and passwords to anyone. Networks and providers already know your username and password. Change passwords regularly and use your cell phone pin number to access your voicemail every time no matter how busy you may be. These basic precautions will not stop the ever-advancing threats, but will provide a safety net. Be wary and be warned from your lighthouse attendant from on the bay.</p>



<p><strong>Authors:</strong> Albert Lucas, B.A. Mathematics and W.F. “Casey” Ebsary, Jr., CentralLaw.com</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Paper-less Office or Less-paper Office?]]></title>
                <link>https://www.centrallaw.com/blog/paper-less-office-less-paper-office/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/paper-less-office-less-paper-office/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Thu, 16 Oct 2014 23:15:10 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                
                    <category><![CDATA[Hard Drive]]></category>
                
                
                
                <description><![CDATA[<p>For a decade or so marketing hype has promoted the paperless office. Courts have begun to accept and in some instances require filings to be digital, on diskette, and/or on paper. According to a recent study 41 states now allow digital copies of documents into evidence. Late in 2002, the Supreme Court of Florida ordered&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>For a decade or so marketing hype has promoted the paperless office. Courts have begun to accept and in some instances require filings to be digital, on diskette, and/or on paper. According to a recent study 41 states now allow digital copies of documents into evidence. Late in 2002, the Supreme Court of Florida ordered mandatory filing of documents on computer diskette. Similarly, some federal courts, including the Eleventh Circuit, require electronic filing. Some civil and a few criminal cases are generating digital evidence and digitally imaged documents.</p>



<p>A typical white-collar criminal case can easily involve several gigabytes of data and/or several thousand printed pages of documents. Prices for Computer storage devices have plummeted. Storage capacity has sky-rocketed. A single gigabyte of storage can hold around 50,000 pages. Storage costs less than $1.50 per gigabyte. The costs associated with converting paper records to imaged and indexed data: around 24 cents a page.</p>



<p>To digitize or convert paper records to digital information includes high-speed imaging or scanning each page, followed by optical character recognition of the text in the documents, and finally associating the text of each image with the image files so that all of the documents could be searched by computer rather than trudging through the boxes that can fill a downtown conference room. This database containing the documents can be a deadly weapon in your arsenal. Offensively, patterns can be discerned and statistically relevant information can be easily analyzed. Defensively, smoking guns can be found and their problems addressed.</p>



<p>At first light, the most useful result of creating a digital copy of documents is analytical. However document imaging can also be useful for depositions, hearings, and trials. Once digitized the documents can be easily displayed on an ordinary television set, a computer monitor, a liquid crystal display projector or large screen plasma monitor.</p>



<p>While at the office much of the time, we do not need the original document. In such instances the digital image can be retrieved and reviewed on-screen or printed off the network printer. Document sharing and transmittal of copies is easier than ever once the digital copy of the documents has been produced. Simultaneous access to imaged materials by many users is a snap.</p>



<p>While away from the office, the document image can be retrieved and reviewed from a remote log-in to the network. The images or data can be stored on a notebook computer or on compact disk. Whether a desktop computer from another office, a notebook computer in court, or on a wireless device on the way to court, once the documents and files are accessible from anywhere, your handtruck and its cargo of banker’s boxes may be on its way to the junk heap. In the event of a disaster, copies of the data can be retrieved from storage and restored without missing a beat.</p>



<p>Adobe Acrobat has become the international standard for imaged documents. The program that creates the documents is around $250.00 per license. The program that reads the documents, Acrobat Reader, is free. Acrobat can be installed on almost any operating system, from Windows, to McIntosh, to Unix, to Linux, to Windows handheld devices, and Palm handheld devices. This yields documents that can be reviewed by anyone who receives a document and who obtains the free reader software.</p>



<p>Acrobat documents can be password protected, encrypted, digitally watermarked, made to be read-only, and digitally signed. Once created, an Acrobat copy can be authenticated and there can be high-level assurance that a copy has not been altered.</p>



<p>Can we eliminate the records center and empty our filing cabinets? Can we now eliminate putting pen to paper to sign documents? Do we really want to? What if the client wants his paperwork returned? Answers: Not yet; Yes; No; Oh-oh.</p>



<p>The paperless law office does not address the practicalities of the analog world. Clients may justifiably want their original source documents and courts may require them. This article was created paperlessly and was submitted to the publisher electronically via the Internet. There is not a paper copy of the article in my office. Notwithstanding the utility of digital record storage, and the promise of a paperless office, we are more likely approaching a less-paper office.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[I, Spybot]]></title>
                <link>https://www.centrallaw.com/blog/spybot/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/spybot/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Thu, 16 Oct 2014 23:13:04 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                
                    <category><![CDATA[Cyber]]></category>
                
                
                
                <description><![CDATA[<p>Last year we published an article on securing a cable modem. In the few months since that article, new threats to computer security have arisen. Previously a hardware and/or software firewall coupled with anti-virus protection was sufficient. New threats have arisen from programs that are installed by mere visits to web pages. Recommendations for securing&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Last year we published an article on securing a cable modem. In the few months since that article, new threats to computer security have arisen. Previously a hardware and/or software firewall coupled with anti-virus protection was sufficient. New threats have arisen from programs that are installed by mere visits to web pages. Recommendations for securing a mobile or home-office computer will be discussed along with some key strategies for protecting us from some new threats that are beyond viral.</p>



<h2 class="wp-block-heading" id="h-firewalls">Firewalls</h2>



<p>A two-tiered approach to security is advisable. First, a hard firewall, as simple as a router can harden you defenses against nefarious efforts to access your computer network. At CentralLaw.com we use a simple device manufactured by LinkSys. It comes in a variety of flavors both wired and wireless. Key point here with the wireless variant is to enable password protection of the device and change the default password. Those with wireless mobile access and nothing better to do play a fairly common game – “war driving.” Contestants cruise the streets of Metropolis searching for unprotected wireless networks or networks whose passwords and username were never changed from the manufacturers’ default settings. Once a wireless connection is found, the players have access to your Internet connection, possibly to you data, and possibly to your office network.</p>



<p>Second, a software firewall is quite useful. They are frequently and often automatically updated and can respond to threats developed after the installation of the hard firewall. Heuristic or artificially intelligent firewalls are available. At CentralLaw.com we use ZoneAlarm. This new generation of protection enables a permission based security system that learns about the user’s legitimate accesses to the network and affirmatively requests permission from the user before allowing a program or process to access a protected computer. The program is trained to learn how and what legitimate users do on the protected computer. The program will log, alarm, and identify the evil-doer, and prevent the wicked from wandering.</p>



<p>Recently, one morning ZoneAlarm caught and blocked a suspicious effort to access a computer resource in our office. The artificially intelligent software firewall noted viral activity that had not previously been permitted by our systems’ users. Later that day, themedia publicized the latest viral attack on the world’s computers and suggested users go to their anti-virus software and update it. We followed the advice, but were already protected from a threat. Since anti-virus and/or system software vendors had not yet responded to the attack, we would have been vulnerable.</p>



<h2 class="wp-block-heading" id="h-spyware">Spyware</h2>



<p>While programs usually run and are visible to users in the taskbar along the bottom of your computer screen, spyware installs itself in your operating system and its effects are not noticed until a computer’s internet access has slowed, a browser home page has been changed, a new search bar appears, or myriad other odd symptoms surface. We use a two-tiered approach here also. AdAware from LavaSoft and SpyBot Search and Destroy are a one-two punch to knock out these veiled threats.</p>



<h2 class="wp-block-heading" id="h-software-updates">Software Updates</h2>



<p>Computer networks, like chains, are only as strong as the weakest link. Make sure all machines accessing your network are secured with the latest operating system updates. Some system updates have file sizes that require hours to download by a telephone dial-up connection. The masses use dial up, virtually guaranteeing that these updates will not be installed on those computers. Consequently, new threats propagate from throngs of unprotected computers. Take the time to assure that all computers under your control or terminals that have access to your network are regularly keeping pace with these updates. Recovering compromised data from even a single destroyed hard disk drive begins at around $5,000.00 per disk drive and it is not uncommon for data to be unrecoverable.</p>
]]></content:encoded>
            </item>
        
    </channel>
</rss>