{"id":3816,"date":"2009-02-17T16:57:33","date_gmt":"2009-02-17T21:57:33","guid":{"rendered":"http:\/\/law.marquette.edu\/facultyblog\/?p=3816"},"modified":"2009-02-17T16:57:33","modified_gmt":"2009-02-17T21:57:33","slug":"can-you-bug-your-own-cellphone","status":"publish","type":"post","link":"https:\/\/law.marquette.edu\/facultyblog\/2009\/02\/can-you-bug-your-own-cellphone\/","title":{"rendered":"Can You Bug Your Own Cellphone?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-3819\" src=\"http:\/\/law.marquette.edu\/facultyblog\/wp-content\/uploads\/2009\/02\/601797_ello_moto_4.jpg\" alt=\"\" width=\"126\" height=\"150\" \/><a title=\"Consumerist - &quot;My iPhone Is Missing, And Some Guy Is Taking Pics Of Himself With It!&quot;\" href=\"http:\/\/consumerist.com\/5153293\/my-iphone-is-missing-and-some-guy-is-taking-pics-of-himself-with-it\">This recent post<\/a> over at Consumerist caught my eye: A person loses his cell phone. Before he lost it, he set it up to blind-copy him on all emails sent from the cell phone. Let&#8217;s assume for the sake of argument that he did this (as the post recommends) as a &#8220;pretty brilliant low-tech security solution for tracking down a lost\/stolen phone or laptop.&#8221; Pretty soon, someone finds the cellphone and begins using it, evidently with no attempt to locate the owner. The readers of Consumerist are collectively able to track the finder down within 55 minutes and get him to promise to return the phone, which he actually did.<\/p>\n<p>Naturally, I had the same reaction to this story that anyone else would: Is that a violation of the <a href=\"http:\/\/www.law.cornell.edu\/uscode\/html\/uscode18\/usc_sup_01_18_10_I_20_119.html\">Wiretap Act<\/a>?<\/p>\n<p><!--more--><\/p>\n<p>It&#8217;s pretty well established that you can&#8217;t bug a phone, even one that you own and pay for the service on, just to spy on someone. There are countless cases where jealous spouses have gotten hung up on this rule.\u00a0 And the secret bcc here would seem to qualify as bugging (or, more properly, &#8220;acquisition of the contents of a communication&#8221;), unless an exception applies.<\/p>\n<p>But I think an exception <em>does<\/em> apply, although it takes a little work to get there. The Act prohibits &#8220;interception,&#8221; defined as &#8220;acquisition of the contents of [a] communication&#8221; through the use of a &#8220;device.&#8221; The term &#8220;device&#8221; does <em>not<\/em> include telephone or telegraph equipment &#8220;<span class=\"ptext-4\">furnished by [a] subscriber or user [of a wire or electronic communication service] for connection to the facilities of such service and <\/span><span class=\"ptext-4\">used in the ordinary course of its [the subscriber or user&#8217;s] business.&#8221; <a href=\"http:\/\/www.law.cornell.edu\/uscode\/html\/uscode18\/usc_sec_18_00002510----000-.html#5\">18 U.S.C. \u00a7 2510(5)(a)(1)<\/a>. The <em>phone<\/em> here was &#8220;furnished by a subscriber or user&#8221; of a communication service, either the original owner or the &#8220;finder,&#8221; but the phone is not the relevant device, I don&#8217;t think \u2014 it&#8217;s the bcc rule <em>on<\/em> the phone that is the device doing the intercepting. (If the phone is the relevant device, this would be a huge loophole in the statute, as any bug or secret program installed in such a phone would be within the exception even if the user\/subscriber of the phone service didn&#8217;t know about it.)\u00a0 If I&#8217;m right and the bcc rule, or perhaps the entire email functionality on the phone, is the relevant device, then <em>that<\/em> device is telephone or telegraph equipment &#8220;furnished by the <em>subscriber<\/em> . . . for connection to the facilities&#8221; of a communication service, and that bcc rule is being used &#8220;in the ordinary course of [the subscriber&#8217;s] business&#8221; \u2014 namely, finding lost property.<br \/>\n<\/span><\/p>\n<p>If that doesn&#8217;t work, well, there&#8217;s always the fact that the acquisition has to be intentional to violate the Wiretap Act. If the original owner of the phone set up the bcc rule for any other purpose \u2014 say, just so they would have a copy of all of their emails \u2014 then its use in tracking down the possessor of the phone in this case was accidental, not intentional. Hence, no Wiretap Act violation.<\/p>\n<p>Side note: an acquaintance of mine once told me of his experience trying to access the outgoing call log on his own phone, using the account he was paying for, from Verizon, after he had been mugged and his cell phone stolen. Somewhat maddeningly, Verizon Wireless would not give him that information, even though it was arguably customer records pertaining to him.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This recent post over at Consumerist caught my eye: A person loses his cell phone. Before he lost it, he set it up to blind-copy him on all emails sent from the cell phone. Let&#8217;s assume for the sake of argument that he did this (as the post recommends) as a &#8220;pretty brilliant low-tech security [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[32,49],"tags":[],"class_list":["post-3816","post","type-post","status-publish","format-standard","hentry","category-computer-law","category-privacy-rights","entry"],"_links":{"self":[{"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/posts\/3816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/comments?post=3816"}],"version-history":[{"count":0,"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/posts\/3816\/revisions"}],"wp:attachment":[{"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/media?parent=3816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/categories?post=3816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/tags?post=3816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}