What will happen if a phone or other unauthorized resource i…