The legality of certain phone modifications in the United States, particularly those that allow phones to be used on wireless carriers for which they weren't originally intended, is currently on a congressional see-saw. Every three years, the Librarian of Congress has to approve or extend an exemption of the infamous Digital Millennium Copyright Act (DMCA) to allow or deny consumers the right to unlock (read: carrier unlock, and in some cases rooting/jailbreaking, but not unlocking bootloaders) their phones by circumventing digital rights management.
This a cause I think we can all get behind. Back in 2010, the Copyright Office in the Library of Congress issued a rulemaking statement exempting smartphones and DVDs from reverse engineering laws under the DMCA. Previously, companies like Apple had used these provisions to threaten criminal prosecution (as well as civil action) against those who "jailbroke" (rooted) devices such as the iPhone (or iPad). The exemption to these penalties put in place by the Copyright Office extended to the "jailbreaking" (or, as we know it in the Android community, rooting) of all smartphones (it also extends to things like bootloader unlocking).
Trevor Eckhart, a developer involved in uncovering a huge security vulnerability that affected several HTC devices, was recently threatened by Carrier IQ (CIQ), a company involved in gathering various forms of user data and sending it to carriers or manufacturers for analysis. For those who haven't been following the story, here's what happened:
Trevor Eckhart found several training manuals on CIQ's website. These were publicly available. Trevor shared them with the community, explaining just how far-reaching CIQ's data collection practices are.