McClelland v. McGrath

31 F. Supp. 2d 616, 1998 U.S. Dist. LEXIS 19866, 1998 WL 895682
CourtDistrict Court, N.D. Illinois
DecidedNovember 23, 1998
Docket97 C 6295
StatusPublished
Cited by1 cases

This text of 31 F. Supp. 2d 616 (McClelland v. McGrath) is published on Counsel Stack Legal Research, covering District Court, N.D. Illinois primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
McClelland v. McGrath, 31 F. Supp. 2d 616, 1998 U.S. Dist. LEXIS 19866, 1998 WL 895682 (N.D. Ill. 1998).

Opinion

MEMORANDUM OPINION AND ORDER

ASPEN, Chief Judge.

At first glance, it might seem the very definition of chutzpah for Michael McClelland to sue the City of Chicago and several of its police officers for asking a phone company to intercept a call he made on a cloned cellular phone. 1 The user of a cloned cellular phone — a phone which has been rigged to imitate a legitimate cellular phone — is stealing from the phone company, and phone companies routinely investigate such theft.

The complication in this case is that the officers were investigating a kidnaping, not cellular service theft. Adalberto Valdavia had been abducted, and the officers asked Ameritech, the local telephone service provider, to trace the ransom calls. Ameritech determined that the calls were being made on a cellular line dedicated to Cellular One, and Cellular One informed Ameritech, who informed the officers, that the ransom calls had indeed been made on a cellular telephone and that other calls on the same line had been made almost simultaneously in another part of the state, where the cellular subscriber was located. From this Cellular One concluded that the ransom calls were being made on a cloned phone, and Cellular One indicated that it was able to monitor any conversations involving the cloned phone and *618 to isolate its approximate location. The officers asked Cellular One to relay any information from those calls which might assist them in finding the kidnaper, and Cellular One agreed.

Late that afternoon, someone used the cloned phone to call a lifeguard station and informed the station that he would not be able to come to work that day. Cellular One intercepted the call and relayed the information to Ameritech, who informed the officers, who dispatched other officers to the lifeguard station. (No judge ever approved this intercept.) The officers learned that the caller was Michael McClelland, whom they arrested after securing Valdavia’s release. McClel-land was incarcerated pending trial on aggravated kidnaping charges, but for reasons unknown to us, his prosecution was terminated.

McClelland learned of the interception during his prosecution, and he filed a complaint with this Court alleging that the officers’ failure to obtain judicial authorization for the interception constituted a violation of Title III of the Omnibus Crime Control and Safe Streets Act of 1968, which is codified at 18 U.S.C. §§ 2510-2520 and is popularly known as the “Wiretap Act.” The defendants moved to dismiss the complaint on the ground that the Wiretap Act contains an exemption for interceptions by an employee of a phone company who “intercept[s], disclosefs], or use[s] that communication in the normal course of his employment while engaged in any activity which is a necessary incident ... to the protection of the rights or property of the provider of that service.” 18 U.S.C. § 2511(2)(a)(i); see also id. § 2510 (5) (a) (ii). They argued that since Cellular One intercepted the call and since Cellular one intercepts communications on cloned phones “as a necessary incident ... to the protection of [its] rights or property,” id. § 2511(2)(a)(i), the interception of the call and the subsequent use of its contents was lawful — or even if it was not, a reasonable officer could not have known that. We disagreed and in an unreported order refused to dismiss the complaint or grant the officers qualified immunity because according to McClelland’s allegations, the Cellular One employees were acting as agents of the officers, which if true removed this interception from the statutory exemption. Now before us is the defendants’ motion for summary judgment — essentially the same motion in a new package. 2

By way of background, the prohibition on wiretapping is found at 18 U.S.C. § 2511(1) and generally forbids intercepting communications (or procuring an interception) as well as disclosing or using of the contents of an intercepted communication. Violation of the Wiretap Act is a crime, see id. § 2511(4), and a private right of action is provided at id. § 2520. As noted earlier, however, the Wiretap Act exempts phone companies acting in “protection of the[ir] rights or property,” id. § 2511(2)(a)(i), see also id. § 2510(5)(a)(ii), and it also provides a mechanism by which law enforcement officers may ask a judge for prior approval to intercept a communication, see id. § 2518(l)-(6), or for after-the-fact authorization in emergency situations, in which case the officers are required to seek judicial approval within 48 hours, see id. § 2518(7).

The defendants are of course correct that Cellular One is entitled to “intercept, disclose, and use,” in the words of § 2511(2)(a)(ii), communications and their contents in order to “protect [its] ... rights or property.” McClelland does not dispute this point — in fact he did not even sue Cellular One. And obviously he would not have had a gripe with the officers had Cellular *619 One intercepted his cloned phone calls on its own and then turned to the officers for assistance. See United States v. Pervaz, 118 F.3d 1 (1st Cir.1997); United States v. Manning, 542 F.2d 685, 686 (6th Cir.1976) (per curiam); United States v. McLaren, 957 F.Supp. 215 (M.D.Fla.1997).

What the officers do not seem to understand, however, is that they are not free to ask or direct Cellular One to intercept any phone calls or disclose their contents, at least not without complying with the judicial authorization provisions of the Wiretap Act, regardless of whether Cellular One would have been entitled to intercept those calls on its own initiative. This is why the courts in Pervaz and McLaren, the only two cases on which the officers rely, go to such lengths to determine whether the phone companies in those cases were acting at the request or direction of police officers. In Pervaz the important question was “were the employees acting as agents of the government?,” for if they were, “the requirements of the Fourth Amendment would override [Title III] authority.” 3 118 F.3d at 5. Since the officer in that case only found out about the interceptions after they had taken place, the First Circuit held that the interceptions were motivated by a desire to protect the phone company, not to help the officer, and the phone company employees were therefore not acting on the government’s behalf. Likewise in McLaren, there were “no circumstances suggesting that AT & T acted as a Government pawn or tool, either directly or indirectly.” 957 F.Supp. at 218 n. 4.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Tapley v. Collins
41 F. Supp. 2d 1366 (S.D. Georgia, 1999)

Cite This Page — Counsel Stack

Bluebook (online)
31 F. Supp. 2d 616, 1998 U.S. Dist. LEXIS 19866, 1998 WL 895682, Counsel Stack Legal Research, https://law.counselstack.com/opinion/mcclelland-v-mcgrath-ilnd-1998.