Influential Women Logo
  • Podcasts
  • How She Did It
  • Who We Are
  • Be Inspired
  • Resources
    Coaches Join our Circuit
  • Connect
  • Contact
Login Sign Up

Topic: Abuse of Power Through Law Enforcement Connections

Illegal Wiretapping and Hacking

Kenisha Morgan, MBA, BS, AS
Kenisha Morgan, MBA, BS, AS
Senior Claims Technician
Health Care Service Corporation
Topic: Abuse of Power Through Law Enforcement Connections

Abuse of Law Enforcement Connections: Understanding Illegal Wiretapping and Hacking

People who are friends or relatives of law enforcement officers can sometimes exploit that connection to abuse power, including through illegal wiretapping and hacking. However, these actions are serious crimes with heavy penalties under U.S. law.

How Connections Can Be Abused

People with close ties to law enforcement may feel shielded from consequences or believe they can get inside help. This can tempt them to:

  • Ask officers or technicians to “quietly check” someone’s phone or records without proper legal authorization.
  • Seek access to law-enforcement-only tools or databases through a friend or relative.
  • Intimidate victims by name-dropping their connections, implying that reporting the abuse is futile.

Even when no officer actually assists, the perception of protection can be enough to embolden illegal surveillance and harassment.

Illegal Wiretapping and Hacking

In the United States, intercepting phone calls, texts, or emails without proper authorization is a crime under the Wiretap Act, part of the Electronic Communications Privacy Act (ECPA). The law makes it illegal for “any person” to intentionally intercept or attempt to intercept wire, oral, or electronic communications unless a clear legal exception applies.

Unauthorized access to computers, online accounts, or devices—such as breaking into email, social media, or cloud backups—is governed by federal cybercrime statutes, including the Computer Fraud and Abuse Act. These laws apply whether the hacker is a stranger, an intimate partner, or someone leveraging a law enforcement relationship to obtain technical help or confidential information.

Misusing Lawful Surveillance Systems

Modern communications systems often have built-in mechanisms that allow lawful wiretaps when a valid court order is obtained. However, experts have shown that these same mechanisms can be abused by insiders. For example, built-in “lawful intercept” features have been misused in real-world incidents to secretly monitor targets who were never approved by a court, and logs can sometimes be disabled to hide this activity.

When someone connected to law enforcement pressures or persuades an insider to exploit these systems, the result is a hidden, illegal wiretap that appears legitimate from the outside.

Impact on Victims and Public Trust

Abusive surveillance through personal connections can be especially damaging in domestic violence, stalking, or harassment situations, where technology is already used to track and control victims. Victims may feel that going to the police will not help, or could even make things worse, if they believe officers are friends or family of the abuser.

More broadly, favoritism and nepotism in public agencies erode public confidence and reinforce the belief that some people are “above the law” because of who they know.

What Victims Can Do

Even if the abuser knows someone in law enforcement, illegal wiretapping and hacking can still be investigated by independent agencies. Victims can:

  • Preserve evidence such as suspicious messages, logs, or device changes, and seek help from domestic violence or cybercrime advocates.
  • Report suspected cyber or electronic surveillance crimes to appropriate local, state, or federal authorities, including specialized cybercrime units.
  • Seek assistance in securing devices, changing passwords, and reviewing account access history to reduce ongoing monitoring.

Using friendships or family ties with law enforcement to stalk, hack, or wiretap is not a protected privilege. It is a form of corruption and cybercrime that can and should be challenged through independent legal channels.

Featured Influential Women

Tonya Lehman
Tonya Lehman
Associate Program Manager
Burton, MI 48529
Tiffany Hodang
Tiffany Hodang
Global Trade Advisor
Newark, CA
Lynnette Cain
Lynnette Cain
Deputy Chief of Police - Wayne County Sheriff's Office
Detroit, MI

Join Influential Women and start making an impact. Register now.

Contact

  • +1 (877) 241-5970
  • Contact Us
  • Login

About Us

  • Who We Are
  • Featured In
  • Company Information
  • Influential Women on LinkedIn
  • Influential Women on Social Media
  • Reviews

Programs

  • Masterclasses
  • Influential Women Magazine
  • Coaches Program

Stories & Media

  • Be Inspired (Blog)
  • Podcast
  • How She Did It
  • Milestone Moments
  • Influential Women Official Video
Privacy Policy • Terms of Use
Influential Women (Official Site)