RACKEMANN v. LISNR, INC. et al
Filing
129
ENTRY ON DEFENDANTS' MOTIONS TO DISMISS - For the reasons stated above, the Court DENIES Defendants' Motions to Dismiss, (Filing No. 30 ; Filing No. 31 ; Filing No. 34 ), insofar as they relate to Rackemann's "interception& quot; claims. The Court GRANTS without prejudice Defendants' Motions to Dismiss, insofar as they relate to Rackemann's "use" claims. Should he choose to do so, Rackemann may file an amended complaint, within thirty (30) days of the docketing of this Order. See entry for details. Signed by Judge Tanya Walton Pratt on 9/29/2017. (MEJ)
UNITED STATES DISTRICT COURT
SOUTHERN DISTRICT OF INDIANA
INDIANAPOLIS DIVISION
ALAN RACKEMANN, individually and on
behalf of all others similarly situated,
Plaintiff,
v.
LISNR, INC., ADEPT MOBILE, LLC, and
INDIANAPOLIS COLTS, INC., an Indiana
Corporation,
Defendants.
)
)
)
)
)
)
)
)
)
)
)
)
Case No. 1:17-cv-00624-TWP-MJD
ENTRY ON DEFENDANTS’ MOTIONS TO DISMISS
Plaintiff Alan Rackemann (“Rackemann”), on behalf of himself and others similarly
situated, alleges that Defendants LISNR, Inc., (“LISNR”), Adept Mobile, LLC (“Adept Mobile”),
and the Indianapolis Colts, Inc. (“the Colts”) (collectively, “Defendants”), violated federal antiwiretapping laws in their operation of a Colts’ mobile application. Rackemann alleges that
Defendants unlawfully intercepted and unlawfully used his private communications. Specifically,
he alleges the Defendants hijack users’ smartphones and turn them into listening devices.
Defendants have each filed Motions to Dismiss. (Filing No. 30; Filing No. 31; Filing No. 34.) For
the reasons that follow, the Court denies the Defendants’ Motions regarding Rackemann’s
interception claims, and the Court grants without prejudice Defendants’ Motions regarding the
use claims.
I. BACKGROUND
The following facts are not necessarily objectively true. But as required when reviewing a
motion to dismiss, the Court accepts as true all factual allegations in the Second Amended
Complaint and draws all reasonable inferences in favor of Rackemann as the non-moving party.
See Bielanski v. County of Kane, 550 F.3d 632, 633 (7th Cir. 2008).
The Colts are a professional football team in the National Football League. (Filing No. 1
at 1.) The Colts offer a mobile application (the “App”) that allows fans to “stay up-to-date on
everything Colts with breaking news, game highlights, player interviews, cheerleader photographs
and more.” (Filing No. 1 at 7.) The App is available for free download in the Google Play Store,
and to date, it has been downloaded between 100,000 and 500,000 times. (Filing No. 1 at 6-7.)
LISNR and Adept Mobile are both audio technology development companies. In 2016,
the Colts partnered with LISNR and Adept Mobile to further develop the App. (Filing No. 1 at 2.)
LISNR has developed a specific type of “beacon technology” that enables an app to ascertain a
consumer’s physical location through sounds rather than through means such as radio signals.
(Filing No. 1 at 6.) LISNR partners with entities such as the Colts to place speakers throughout
designated geographic locations. (Filing No. 1 at 6.) These speakers emit unique, inaudible audio
signals that are detectable by, for example, the microphones of smartphones that are nearby.
(Filing No. 1 at 6.) However, in order for the technology to work, a device’s microphone must be
turned on to listen for these audio signals. (Filing No. 1 at 6.) When a customer downloads the
App, he is asked to provide certain “permissions,” including whether the App can access the
device’s microphone. (Filing No. 1 at 7.) The App is programmed to contact a server owned and
operated by LISNR and to await instructions on how and when a particular device’s microphone
should be activated. (Filing No. 1 at 8.) LISNR’s server then responds with “listening rules,”
which are themselves provided by the Colts or Adept Mobile, that designate different date and
time intervals during which the “listening” function should be activated by the App. (Filing No.
1 at 8.)
2
During those specified periods, the App activates the device’s microphone. (Filing No. 1
at 8.) When the microphone is activated, the App temporarily records portions of the audio it hears
in order to monitor it for any of the LISNR beacon tones. (Filing No. 1 at 9.) When a beacon tone
is identified, the App will respond by, for instance, displaying banner advertisements to the user
or by showing highlights or other information. (Filing No. 1 at 9.) The App is able to continuously
listen on command, even when the App is not open but is running in the background of a user’s
smartphone. (Filing No. 1 at 9.) The App does not obtain the user’s consent or otherwise notify
the user prior to each activation of the device’s microphone. (Filing No. 1 at 9.) The App’s “Terms
of Service Privacy Policy” does not disclose the App’s use of beacon technology, and the App
does not otherwise disclose that information. (Filing No. 1 at 8.) The App also does not disclose
that it activates the device’s microphone specifically for the purpose of “listening in.” (Filing No.
1 at 8.)
Adept Mobile developed and maintained the code base of the App and ensures the
deliverability of the App to the Google Play Store. (Filing No. 1 at 17.) Adept Mobile also
integrated the LISNR beacon technology into the App, conducted testing and analysis, and issued
the App for distribution through the Google Play Store to consumers. (Filing No. 1 at 17.)
Rackemann downloaded the App sometime in 2012 from the Google Play store, and it
remained on his smartphone through mid-September 2016. (Filing No. 1 at 10.) During that time,
Rackemann used the App to follow the Colts, and the App was regularly updated. (Filing No. 1
at 10.) During this time, Rackemann carried his smartphone on his person, and would take his
smartphone to places where he would not invite other people, and to places where he would have
private conversations. (Filing No. 1 at 10.) As a result, the App, when it was activated, listened
in on Rackemann’s private conversations. (Filing No. 1 at 9.)
3
On November 18, 2016, Rackemann filed this lawsuit against Defendants in the District of
Massachusetts, on behalf of himself and two putative classes of plaintiffs. (Filing No. 1.)
Defendants filed motions to transfer the case to this Court, or in the alternative, to dismiss. (Filing
No. 30; Filing No. 31; Filing No. 34.) Those motions were fully briefed, and a district court judge
in the District of Massachusetts granted Defendants’ Motion to Transfer the case to this court,
based on a stipulation by the parties. (Filing No. 48.) The parties filed position statements pursuant
to Local Rule 16-2, all stating that the Court should rule upon the previously filed Motions to
Dismiss. (Filing No. 73 through Filing No. 76.) Those Motions are now ripe for review.
II. LEGAL STANDARD
Federal Rule of Civil Procedure 12(b)(6) allows a defendant to move to dismiss a complaint
that has failed to “state a claim upon which relief can be granted.” Fed. R. Civ. P. 12(b)(6). When
deciding a motion to dismiss under Rule 12(b)(6), the court accepts as true all factual allegations
in the complaint and draws all reasonable inferences in favor of the plaintiff. Bielanski v. County
of Kane, 550 F.3d at 633 (7th Cir. 2008). However, courts “are not obliged to accept as true legal
conclusions or unsupported conclusions of fact.” Hickey v. O’Bannon, 287 F.3d 656, 658 (7th Cir.
2002).
The complaint must contain a “short and plain statement of the claim showing that the
pleader is entitled to relief.” Fed. R. Civ. P. 8(a)(2). In Bell Atlantic Corp. v. Twombly, the
Supreme Court explained that the complaint must allege facts that are “enough to raise a right to
relief above the speculative level.” 550 U.S. 544, 555 (2007).
Although “detailed factual
allegations” are not required, mere “labels,” “conclusions,” or “formulaic recitation[s] of the
elements of a cause of action” are insufficient. Id.; see also Bissessur v. Ind. Univ. Bd. of Trs.,
581 F.3d 599, 603 (7th Cir. 2009) (“it is not enough to give a threadbare recitation of the elements
of a claim without factual support”). The allegations must “give the defendant fair notice of what
4
the . . . claim is and the grounds upon which it rests.” Twombly, 550 U.S. at 555. Stated differently,
the complaint must include “enough facts to state a claim to relief that is plausible on its face.”
Hecker v. Deere & Co., 556 F.3d 575, 580 (7th Cir. 2009) (citation and quotation omitted). To be
facially plausible, the complaint must allow “the court to draw the reasonable inference that the
defendant is liable for the misconduct alleged.” Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009) (citing
Twombly, 550 U.S. at 556).
III. DISCUSSION
Rackemann’s Complaint raises two causes of action, one on behalf of the first class of
plaintiffs against LISNR, and the other on behalf of the second class against all Defendants. In
each count, Rackemann alleges that Defendants have violated 18 U.S.C. §§ 2510 et seq., (the
“Wiretap Act”) in that they have intercepted (by listening to and recording) Rackemann’s “private
conversations, including oral communications, where [Rackemann] and the [class] exhibited
expectations that such communications were to remain private and would not otherwise be subject
to interception under circumstances justifying such expectation.”
(Filing No. 1 at 14-17.)
Rackemann also alleges that Defendants used those intercepted communications to their economic
benefit, including for marketing purposes. (Filing No. 1 at 16.) The Defendants raise several
arguments in support of their motions to dismiss, and to varying degrees, join in each other’s
briefing. The Court addresses those arguments below.
A.
Standing
The Colts and Adept Mobile first argue that Rackemann’s claims must be dismissed
because he lacks standing to bring them. (Filing No. 32 at 21; Filing No. 33 at 14.) They contend
that Rackemann has failed to plead a cognizable injury in fact. (Filing No. 32 at 21; Filing No. 33
at 14.)
5
The “irreducible constitutional minimum of standing consists of three elements. The
plaintiff must have (1) suffered an injury in fact, (2) that is fairly traceable to the challenged
conduct of the defendant, and (3) that is likely to be redressed by a favorable judicial decision.”
Spokeo, Inc. v. Robins, 136 S. Ct. 1540, 1547 (2016), as revised (May 24, 2016) (citation omitted).
“The plaintiff, as the party invoking federal jurisdiction, bears the burden of establishing these
elements. Where, as here, a case is at the pleading stage, the plaintiff must clearly allege facts
demonstrating each element.” Id. (citation and quotation omitted). As to the injury-in-fact
element, “a plaintiff must show that he or she suffered an invasion of a legally protected interest
that is concrete and particularized and actual or imminent, not conjectural or hypothetical.” Id.
(citation and quotation omitted).
The Colts and Adept Mobile both focus their standing arguments on Rackemann’s
allegations that the App’s use of his smartphone’s microphone caused battery usage and wear and
tear to his smartphone. They argue that these allegations are not sufficient to demonstrate a
concrete injury. Rackemann responds, however, that his Complaint “is premised on an invasion
of [his] substantive interest, protected by the Wiretap Act, in the privacy of his private
communications.” (Filing No. 61 at 12.) The Court agrees that Rackemann has sufficiently
identified as an injury the violation of his substantive interest in the privacy of his communications.
See, e.g., Filing No. 1 (“LISNR intercepted…[Rackemann’s] and the LISNR Class’s private
conversations, including oral communications, where [Rackemann] and the LISNR Class
exhibited expectations that such communications were to remain private and would not otherwise
be subject to interception under circumstances justifying such expectation.”).
The question is whether such an invasion of privacy constitutes an injury in fact sufficient
to confer standing to Rackemann under Article III. In Spokeo, the Supreme Court stated that:
6
[i]n determining whether an intangible harm constitutes injury in fact, both history
and the judgment of Congress play important roles. Because the doctrine of
standing derives from the case-or-controversy requirement, and because that
requirement in turn is grounded in historical practice, it is instructive to consider
whether an alleged intangible harm has a close relationship to a harm that has
traditionally been regarded as providing a basis for a lawsuit in English or American
Courts.
Spokeo, 136 S. Ct. 1540, 1549. The Supreme Court goes on to note that “the law has long permitted
recovery by certain tort victims even if their harms may be difficult to prove or measure.” Id.
(citing Restatement (First) of Torts §§ 569 (libel), 570 (slander per se) (1938)). The Supreme
Court concluded that “[j]ust as the common law permitted suit in such instances, the violation of
a procedural right granted by statute can be sufficient in some circumstances to constitute injury
in fact. In other words, a plaintiff in such a case need not allege any additional harm beyond the
one Congress has identified. Spokeo, 136 S. Ct. at 1549-50 (citing Federal Election Comm’n v.
Akins, 524 U.S. 11, 20-25 (1998) (confirming that a group of voters’ “inability to obtain
information” that Congress had decided to make public is a sufficient injury in fact to satisfy
Article III); Public Citizen v. Department of Justice, 491 U.S. 440, 449 (1989) (holding that two
advocacy organizations’ failure to obtain information subject to disclosure under the Federal
Advisory Committee Act “constitutes a sufficiently distinct injury to provide standing to sue”)).
As one court has summarized Spokeo, it:
held that two factors may be relevant to whether the violation of statutory rights
constitutes injury in fact: (1) whether the statutory violation bears a close
relationship to a harm that has traditionally been regarded as providing a basis for
a lawsuit in English or American courts, and (2) congressional judgment in
establishing the statutory right, including whether the statutory right is substantive
or procedural.
Matera v. Google Inc., 2016 WL 5339806, at *9 (N.D. Cal. 2016).
The Wiretap Act is violated when any person “intentionally intercepts, endeavors to
intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or
7
electronic communication.” 18 U.S.C. § 2511(1)(a). As to the first element of the Spokeo analysis,
Rackemann argues that the statute bears a close relationship to a harm that has traditionally been
regarded as providing a basis for a lawsuit—the invasion of privacy. (Filing No. 61 at 13.) The
Court agrees.
Invasion of privacy has been recognized as a tort under common law for over a century.
See Matera, 2016 WL 5339806, at *10 (citing Restatement (Second) of Torts §§ 652A-I (noting
that the right to privacy was first accepted by an American court in 1905, and “a right to privacy
is now recognized in the great majority of the American jurisdictions that have considered the
question”)). And, while this is not a requirement under the Spokeo analysis, the Court notes that
the right to privacy has also long been rooted in the jurisprudence surrounding Fourth Amendment
search and seizure law. Indeed, the Seventh Circuit has made the following observations regarding
recorded conversations and privacy in the context of considering Illinois’ eavesdropping statute:
At common law, actionable invasion of privacy takes several forms: (1) an
unreasonable intrusion upon the seclusion of another; (2) appropriation of another’s
name or likeness; (3) unreasonable publicity given to another’s private life; and (4)
publicity that unreasonably places another in a false light before the
public. Restatement (Second) of Torts § 652A; Wolfe v. Schaefer, 619 F.3d 782,
784 (7th Cir. 2010); Desnick v. Am. Broad. Cos., 44 F.3d 1345, 1353 (7th Cir.
1995); Haynes v. Alfred A. Knopf, Inc., 8 F.3d 1222, 1229 (7th Cir. 1993). In
Fourth Amendment law, there is ‘no talisman that determines in all cases those
privacy expectations that society is prepared to accept as reasonable.’ O’Connor v.
Ortega, 480 U.S. 709, 715 (1987) (plurality opinion); see also Orin S. Kerr, Four
Models of Fourth Amendment Protection, 60 Stan. L. Rev. 503 (2007) (discussing
different understandings of privacy). But surreptitiously accessing the private
communications of another by way of trespass or nontrespassory wiretapping or
use of an electronic listening device clearly implicates recognized privacy
expectations. See United States v. Jones, 132 S. Ct. 945, 945-52
(2012); Bartnicki, 532 U.S. at 526; Katz v. United States, 389 U.S. 347, 351-52
(1967).
Am. Civil Liberties Union of Illinois v. Alvarez, 679 F.3d 583, 605 (7th Cir. 2012).
8
Other courts have likewise held that “the unauthorized interception of an individual’s
private communications may state a claim for common law invasion of privacy.” Matera, 2016
WL 5339806, at *10 (citing Vernars v. Young, 539 F.2d 966, 969 (3d Cir. 1976) (finding that a
plaintiff stated a claim for common law invasion of privacy when “the defendant is accused of
opening plaintiff’s private mail and reading it without authority”); Quigley v. Rosenthal, 327 F.3d
1044, 1073 (10th Cir. 2003) (noting that, under Colorado law, “it is clear that the interception of
the Quigleys’ telephone conversations would constitute an intentional intrusion on the Quigleys’
seclusion or solitude”); Billings v. Atkinson, 489 S.W.2d 858, 860 (Tex. 1973) (noting that
eavesdropping was an indictable offense at common law, and recognizing an invasion of privacy
cause of action based on a wiretap of plaintiff’s telephone); Arrington v. Colortyme, Inc., 972 F.
Supp. 2d 733, 746-47 (W.D. Pa. 2013) (denying motion to dismiss state law invasion of privacy
claim based on electronic surveillance of plaintiff’s computer activity)).
As to the second element—congressional judgment in establishing the statutory right,
including whether the statutory right is substantive or procedural—the Court concludes that
Congress exercised its judgment to codify a substantive right, as discussed above, long recognized
in American jurisprudence. The Court agrees with the Matera court that the Wiretap Act was
passed to protect against the invasion of privacy, and particularly privacy with regard to electronic
communications. Matera, 2016 WL 5339806, at *10 (citing DirecTV, Inc. v. Webb, 545 F.3d 837,
850 (9th Cir. 2008) (stating that the Wiretap Act’s “emphasis on privacy is evident in both the
legislative history of the Wiretap Act and in the breadth of its prohibitions”)).
For these reasons, the Court concludes that Rackemann has standing to raise a challenge
regarding violations of the Wiretap Act.
9
B.
Failure to State Interception Claim
“In relevant part, the ECPA imposes civil liability on persons who intentionally intercept,
or try to intercept, a wire, oral or electronic communication.” Bowden v. Kirkland & Ellis LLP,
432 F. App’x 596, 600 (7th Cir. 2011) (citing 18 U.S.C. §§ 2511(1); McCann v. Iroquois Mem’l
Hosp., 622 F.3d 745, 751-52 (7th Cir. 2010); Doe v. GTE Corp., 347 F.3d 655, 658 (7th Cir.
2003)). The Act defines an “oral communication” as “any oral communication uttered by a person
exhibiting an expectation that such communication is not subject to interception under
circumstances justifying such expectation.” 18 U.S.C. § 2510(2). To make out a
valid interception claim under the Wiretap Act, a plaintiff must allege that the defendant
“acqui[red]” the contents of his or her oral communications. 18 U.S.C. § 2510(4)
(defining interception as “acquisition”); see Valentine v. WideOpen W. Fin., LLC, 288 F.R.D. 407,
411 (N.D. Ill. 2012). “Contents” include “any information concerning the substance, purport, or
meaning of that communication.” 18 U.S.C. § 2510(8).
Defendants assert three reasons why, Rackemann has failed to state a claim of
“interception” under the Wiretap Act. They contend that Rackemann has failed to allege (1) a
private communication; (2) interception; and (3) that content was acquired. (Filing No. 32 at 16;
Filing No. 33 at 9; Filing No. 34 at 13.) Rackemann responds that he has adequately pleaded these
three elements.
1.
Private Communications
Defendants argue that Rackemann has failed to identify in his Complaint any specific,
private communications that were intercepted, and that his allegations are “naked conclusions”
and “devoid of” required factual details. (Filing No. 33 at 10-11.) Defendants highlight that
10
Rackemann does not identify any information about “the participants, subject matter or location”
of any private conversations that were intercepted. (Filing No. 33 at 11.)
In suggesting that Rackemann was required to provide such information in his Complaint,
Defendants ask this Court to apply the wrong standard to Rackemann’s pleadings. Defendants
fault Rackemann for failing to include information regarding the specific details of any
communication that might have been intercepted, including that he did not list participants, subject
matter, or location of any such communication. However, this is not a fraud case, subject to the
heightened pleading requirements of Federal Rule of Civil Procedure 9(b), which requires that a
plaintiff plead the alleged fraud in detail. Rackemann is subject to the normal notice-pleading
requirements, which require him to provide “enough facts to state a claim to relief that is plausible
on its face.” Hecker, 556 F.3d at 580.
Rackemann alleges that during the four years that the App was installed on his smartphone,
he carried that device on his person, and would take his smartphone to places where he would not
invite other people, and to places where he would have private conversations. (Filing No. 1 at 10.)
He also alleges that the App received instructions developed by the Colts and Adept Mobile, that
designated different date and time intervals during which the “listening” function should be
activated by the App. (Filing No. 1 at 8.) Rackemann alleges that during those specified periods,
the App activated the device’s microphone. (Filing No. 1 at 8.) The Court draws all reasonable
inferences in favor of the non-moving party at the motion to dismiss stage. While Rackemann
may not, prior to discovery, be able to pinpoint the precise dates and times that his smartphone
was activated to record, the Court concludes that it may reasonably infer that at some point during
a four-year period, Rackemann’s smartphone was activated while he was engaged in a private
communication.
11
These allegations are sufficient to state a claim for relief under the Wiretap Act.
2.
Interception
To make out a valid interception claim under the Wiretap Act, a plaintiff must allege that
the defendant “acqui[red]” the contents of his or her oral communications. 18 U.S.C. § 2510(4)
(defining interception as “acquisition”); see Valentine v. WideOpen W. Fin., LLC, 288 F.R.D. 407,
411 (N.D. Ill. 2012). Defendants argue that the term “acquire” means to “come into possession
of” the communication, and that Rackemann has not pleaded that Defendants ever held them in
their possession. (Filing No. 33 at 11.) Rackemann disputes that proposed definition.
Defendants cite United States v. Smith, 155 F.3d 1051 (9th Cir. 1998), in support of their
proposed definition. That case involved the question of whether the Wiretap Act, or alternatively
the Stored Communications Act, applied to the recording of a voicemail message. 1 The Wiretap
Act uses the term “intercept,” and the Stored Communications Act uses the term “access” to
describe the prohibited conduct. Therefore, the Smith court was faced with determining whether
the conduct at issue constituted interception or access. The defendant argued that the statutory
definitions supplied by the Wiretap Act were broad, and encompassed the conduct at issue. In a
footnote while discussing the parties’ positions, the court noted that “[t]he term ‘acquisition’ is not
defined in § 2510; however, its ordinary meaning—the act of acquiring, or coming into possession
of, see Webster’s Third New International Dictionary 18-19 (1986)—is certainly broad enough to
encompass Gore’s conduct.” Smith, 155 F.3d at 1055 n.7. The court ultimately concluded that “the
terms are conceptually, or qualitatively, different. The word “intercept” entails actually acquiring
the contents of a communication, whereas the word “access” merely involves being in position to
acquire the contents of a communication.” Id. at 1058 (emphasis in original).
1
This issue was significant because the Wiretap Act allows for exclusion of evidence obtained in violation of the Act,
while the Stored Communications Act does not.
12
The Smith court did not conclude that interception requires possession, though the statutory
term was broad enough to encompass that definition, and this Court also declines to do so. In any
event, the balance of authority, including later opinions by the Ninth Circuit, supports a different
definition of the term: acquisition occurs “when the contents of a wire communication are captured
or redirected in any way.” United States v. Rodriguez, 968 F.2d 130, 136 (2d Cir. 1992); Noel v.
Hall, 568 F.3d 743, 749 (9th Cir. 2009) (same). Rackemann has adequately pled that his
communications were captured, as he alleges that the App recorded portions of audio captured by
the device’s microphone, and that audio was analyzed by Defendants.
3.
Content
To make out a valid interception claim under the Wiretap Act, a plaintiff must allege that
the defendant “acqui[red]” the contents of his or her oral communications. 18 U.S.C. § 2510(4)
(defining interception as “acquisition”). “Contents” include “any information concerning the
substance, purport, or meaning of that communication.” 18 U.S.C. § 2510(8). Defendants argue
that Rackemann has failed to adequately plead that they acquired the “content” of any
communication. (Filing No. 33 at 12-13.)
On the contrary, Rackemann alleges that the App functions by activating a smartphone’s
microphone, and that the App temporarily records portions of the audio for analysis. He alleges
that the App “was continuously running on his smartphone, [and it] listened-in to private oral
communications.” (Filing No. 1 at 10.) Defendants attempt to dispute this allegation by raising
two arguments. First, Defendants contend that “the only factual allegations concerning how the
mobile application works state that it ‘temporarily records’ only ‘portions’ of audio to ‘analyze
and monitor’ ‘for any of the LISNR beacon tones.’” (Filing No. 33 at 13, citing Filing No. 1 at 6.)
Defendants interpret these allegations to mean that, necessarily, the only “portions” of audio
13
recorded are specifically the beacon tones, and therefore that no other sounds or communications
are recorded by the device’s microphone. However, that is not the only plausible reading of the
word “portions,” particularly in light of the fact that the Complaint specifically alleges that
Defendants recorded his private communications. The Court draws all reasonable inferences in
favor of the non-moving party, not the movant, and the Court declines to draw the inference
proposed by Defendants.
Second, Defendants dispute Rackemann’s factual allegation that the App records audible
communications. (Filing No. 33 at 13; Filing No. 35 at 14.) They encourage the Court to adopt a
contrary factual allegation, pointing to a statement on LISNR’s website that “its software does not
detect audible sounds.” (Filing No. 33 at 13.) Defendants argue that this Court “may augment
facts and inferences in the Complaint with data points gleaned from documents incorporated by
reference into the complaint, matters of public record, and facts susceptible to judicial notice.”
(Filing No. 33 at 13.) Put simply, the factual allegation forwarded by Defendants has not been
incorporated into the Complaint, is not a matter of public record, and is not a fact susceptible to
judicial notice. The Court declines Defendants’ attempt to supplement the Complaint with their
own suggested facts.
The Court concludes that Rackemann has plausibly alleged that Defendants acquired the
content of his communications.
C.
The Colts and LISNR: Liability under the Act
The Colts and LISNR each argue that, while the other party might be liable under the Act,
it is not. The Colts assert that all of Rackemann’s allegations contend that LISNR (and its
software) “enable” the interception of communications. (Filing No. 32 at 14.) The Colts argue
that Rackemann alleges “merely that the team leveraged its mobile application…to serve as the
14
host of the LISNR audio beacon technology.” (Filing No. 32 at 15.) As such, the Colts contend,
Rackemann seeks to hold the Colts liable as aiders and abettors, a theory of liability which is not
permitted by the statute. (Filing No. 32 at 15.)
The Court need not reach the issue of aider and abettor liability here, because the Colts’
argument fails on other grounds. Rackemann makes a number of factual allegations ignored by
the Colts in its briefing here, including that: the App belongs to the Indianapolis Colts, (Filing No.
1 at 6); the Colts programmed the App, (Filing No. 1 at 7); the Colts and/or Adept Mobile issue
the listening rules regarding when the App should activate the microphone to record, (Filing No.
1 at 8); and the Colts’ App records audio for analysis, (Filing No. 1 at 9). These allegations are
sufficient at the motion to dismiss stage to support an allegation of liability for the Colts.
As to LISNR, it argues that it cannot be held liable under the Act, because it is “merely a
provider of technology.” (Filing No. 35 at 13.) LISNR highlights the above allegations that
Rackemann makes against the Colts, and as to itself, argues that it only “provided a piece of
technology…that others incorporated into the App” and “owns a piece of technology—the
server—that, through rules provided by the Colts and Adept Mobile, interacts with the App.”
(Filing No. 35 at 13-14.) It argues that this involvement cannot be enough to establish liability.
However, the precise manner and degree to which LISNR’s software or server were involved in
any alleged interception involves the consideration of facts (and, the Court can only assume, highly
technical ones). This type of consideration is neither possible nor appropriate in response to a
motion to dismiss.
As with the Colts, Rackemann’s allegations are sufficient to support a claim of liability
against LISNR.
D.
Adept Mobile: Liability under the Act
15
Adept Mobile also argues that Rackemann’s Complaint fails to state a claim that Adept
Mobile was the party who intercepted Rackemann’s communications. (Filing No. 33 at 7.)
Resolution of this issue is less straightforward in Adept Mobile’s case than with the other
Defendants. Rackemann’s allegations regarding Adept Mobile’s role in the operation of the App
are relatively fewer and less developed. He alleges that Adept Mobile (and/or the Colts) provide
listening rules as to when the App should activate the devices’ microphone and record; Adept
Mobile develops and maintains the code base of the App and ensures the deliverability of the App
to the Google Play Store; Adept Mobile integrated the LISNR audio beacon technology into the
Colts App, conducted testing and analysis, and then issued the App for distribution. (Filing No. 1
at 8; Filing No. 1 at 17.) Rackemann further alleges that “Adept Mobile’s actions are an integral
link in the development and distribution of the listening device (i.e., the App) that performs the
unlawful interceptions at issue.” (Filing No. 1 at 17.)
As with Defendants the Colts and LISNR, the Court concludes that Rackemann has pleaded
a plausible claim against Adept Mobile. Ultimately, resolution of this issue turns upon facts that
cannot be considered (and indeed may not be known to Rackemann) at this stage. Other courts
have concluded (at least at the motion to dismiss stage) that allegations of defendants working in
concert or participating in the interception of communications can suffice to state a claim. See,
e.g., Luis v. Zang, 833 F.3d 619, 633 (6th Cir. 2016) (“The alleged intercept of a communication
thus occurs at the point where WebWatcher—without any active input from the user—captures
the communication and reroutes it to Awareness’s own servers. Construing these allegations
liberally, as we must … the complaint supports an inference that Awareness itself—not simply the
WebWatcher user—‘acquires’ the communications by rerouting them to servers that it owns and
controls.”); Byrd v. Aaron’s, Inc., 14 F. Supp. 3d 667, 690 (W.D. Pa. 2014) (concluding that a
16
complaint survived motion to dismiss where the defendant was “intimately and integrally involved
with its Franchisees’ acts of building Detective Mode and spying upon Aaron’s customers”);
Integrated Bus. Techs., LLC v. Netlink Sols., LLC, 2016 WL 4742306, at *7 (N.D. Okla. 2016)
(finding plausible claim where multiple defendants, allegedly “acting in concert, somehow
monitored and intercepted emails between IBT and its customers … IBT likely lacks details as to
how and when this was accomplished but has stated a plausible claim for relief assuming it can
gather the necessary evidence.”).
As such, the Court concludes that Rackemann has adequately pled his claim against Adept
Mobile.
E.
Use of Intercepted Communications
Defendants also argue that Rackemann fails to allege that they “used” any intercepted
communications, in violation of 18 U.S.C. § 2511(d). (Filing No. 32 at 20; Filing No. 33 at 13;
Filing No. 35 at 14.) That section of the Wiretap Act “protects against the dissemination of private
communications that have been unlawfully intercepted.” 18 U.S.C. § 2511(d). The Court has
identified only one allegation in the Complaint related to Rackemann’s “use” claim, that
Defendants “used the contents of those communications to [their] economic benefit, including for
marketing purposes.” (Filing No. 1 at 14.) However, here, as in the Satchell case,
there are no facts, as opposed to conclusory allegations, to show that the contents
of [Plaintiff’s] communications, as opposed to the beacon signals, were used to
send [him] targeted advertising in the Complaint. For example, there are no
allegations, that Plaintiff was speaking to someone, privately, about a particular
topic while the App was running and [he] suddenly received an advertisement about
that topic.
Satchell, 234 F. Supp. 3d at 1008-09.
17
The Court therefore concludes that Rackemann has failed to adequately plead a violation
of this provision, and this claim should be dismissed. Because this defect could be cured through
further pleading, however, the Court grants this dismissal without prejudice.
IV. CONCLUSION
For the reasons stated above, the Court DENIES Defendants’ Motions to Dismiss, (Filing
No. 30; Filing No. 31; Filing No. 34), insofar as they relate to Rackemann’s “interception” claims.
The Court GRANTS without prejudice Defendants’ Motions to Dismiss, insofar as they relate
to Rackemann’s “use” claims.
Should he choose to do so, Rackemann may file an amended complaint, within thirty (30)
days of the docketing of this Order.
SO ORDERED
Date: 9/29/2017
DISTRIBUTION:
Rafey S. Balabanian
EDELSON PC
rbalabanian@edelson.com
Eve-Lynn Rapp
EDELSON PC
erapp@edelson.com
Benjamin Thomassen
EDELSON PC
bthomassen@edelson.com
Erica C Mirabella
132 Boylston Street
Boston, MA 02116
18
Thomas A. Barnard
TAFT STETTINIUS & HOLLISTER LLP
tbarnard@taftlaw.com
David J. Bender
COVINGTON & BURLING LLP
dbender@cov.com
Eric C. Bosset
COVINGTON & BURLING LLP
ebosset@cov.com
Thomas L. Feher
THOMPSON HINE LLP (Cleveland)
tom.feher@thompsonhine.com
Katharine Goodloe
COVINGTON & BURLING LLP
kgoodloe@cov.com
Jesse Jenike-Godshalk
THOMSPON HINE LLP
Jesse.Jenike-Godshalk@ThompsonHine.com
Kevin Kelly
COVINGTON & BURLING LLP
kkelly@cov.com
Jerrold G. Neeff
BOSTONIAN LAW GROUP
jerry@bostonianlaw.com
Thomas F. Zych
THOMPSON HINE LLP
tom.zych@thompsonhine.com
19
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?