Codify — Article

Cell‑Site Simulator Warrant Act of 2025: federal ban with narrow, court‑supervised exceptions

Creates a new federal prohibition on indiscriminate use of cell‑site simulators, ties lawful use to strict warrant standards, model testing, minimization, IG reporting, and FCC oversight.

The Brief

This bill adds a new section to Title 18 that makes it unlawful to use a cell‑site simulator in the United States except under enumerated exceptions and subject to new procedural guards. It pairs a criminal/financial penalty and exclusionary rule for unlawful uses with a structured warrant process that requires courts to weigh public‑safety impacts, narrow the area and duration of surveillance, and limit collection to the smallest necessary scope.

Beyond the warrant framework, the statute requires third‑party testing and disclosure of the specific model used, mandates minimization and destruction for non‑targets, creates a private civil remedy and administrative discipline procedures, tasks multiple Inspectors General with annual reporting of usage metrics, and directs the FCC to update regulations. The bill aims to make cell‑site simulator use transparent and accountable while still permitting targeted law enforcement and intelligence activity under judicial or statutory safeguards.

At a Glance

What It Does

The bill creates a federal prohibition on using devices that simulate cellular base stations unless the government obtains a narrowly tailored warrant, relies on specified FISA authorities, or invokes a limited emergency, research, protective, testing, or correctional contraband exception. Warrants must show other methods were tried or impracticable, specify area/time, and include model testing and disruption disclosures.

Who It Affects

Federal, state, and local law enforcement that operate or obtain cell‑site simulators; the intelligence community when U.S. persons are implicated; device manufacturers and accredited testing labs; correctional facilities that use contraband interdiction systems; and courts and Inspectors General responsible for oversight and reporting.

Why It Matters

It replaces ad hoc agency practice with statutory guardrails: courts get a defined gatekeeping role (including 30‑day limits and extension rules), the DOJ must publish minimization procedures, and the FCC is required to regulate interference and testing — creating compliance costs and new transparency information for defendants and the public.

More articles like this one.

A weekly email with all the latest developments on this topic.

Unsubscribe anytime.

What This Bill Actually Does

The bill adds section 3119 to Title 18 and builds a framework that flips the default: use of a cell‑site simulator is unlawful unless the statute allows it. The statute covers both traditional law enforcement and intelligence uses (with specific limits on intelligence community activity involving U.S. persons), and it creates both criminal/financial penalties for unlawful use and an exclusionary rule barring evidence obtained in violation of the prohibition.

For routine lawful uses, the bill requires a court‑issued warrant (or a FISA order where appropriate). The warrant application must explain why alternative investigative tools have failed or are impracticable or dangerous, describe the likely area of effect and operation time, certify that the request is the narrowest feasible, and show compliance with FCC rules.

The bill also requires a certification that the exact model of simulator has been checked by an accredited testing laboratory and requires applicants to disclose likely disruptions (including risks to emergency calls and other critical services) and what mitigation measures they will use.The statute creates a time‑limited regime: initial authorizations can’t exceed 30 days, extensions are possible but limited to additional 30‑day periods subject to the same judicial findings, and 30‑day counting begins on first use or 10 days after issuance. The bill includes an emergency exception that permits immediate use in narrowly defined urgent situations (serious bodily harm, certain organized‑crime conspiracies, or immediate national‑security threats) but requires a warrant application within 48 hours and mandates termination and destruction of data if a later court denies the application.Operational safeguards and transparency are central.

The Attorney General must adopt and publish minimization procedures aimed at disposing of or avoiding retention of data about non‑targets; defendants must be given access to information obtained by simulators when that material is introduced at trial; and multiple Inspectors General must jointly report annually on volume and compliance metrics (including how many devices were targeted versus incidentally captured). The FCC is directed to promulgate any needed regulations within 180 days to address technical and interference issues.

Finally, the statute phases in most provisions two years after enactment, with a potential three‑year extension for models already in use while independent testing occurs.

The Five Things You Need to Know

1

The bill makes knowing use of a cell‑site simulator in the U.S. unlawful unless authorized by statute, warrant, or a listed exception and imposes a civil fine of up to $250,000 on individuals or entities that violate the ban.

2

A warrant authorizing a simulator must show other investigative procedures have been tried and failed or are impracticable or dangerous, specify the likely area and time of operation, and certify the request is the narrowest reasonably possible.

3

No warrant may authorize continuous use for more than 30 days; extensions require renewed judicial findings and are limited to additional 30‑day periods, with the 30‑day clock starting at first authorized use or 10 days after issuance.

4

Warrant applications must include a third‑party certification that the exact model of simulator was inspected by an FCC‑recognized accredited testing lab and must disclose potential disruption to emergency calls and critical services and proposed mitigation steps.

5

Evidence obtained in violation of the prohibition is inadmissible; individuals subject to an unlawful operation may sue for declaratory/injunctive relief, actual damages, statutory damages up to $500 per violation, and attorney’s fees.

Section-by-Section Breakdown

Every bill we cover gets an analysis of its key sections. Expand all ↓

§3119(a)-(b)

Primary prohibition and civil penalty

The statute creates a baseline rule: knowing use of a cell‑site simulator in the United States is unlawful, and intelligence components may not use one abroad to surveil a U.S. person. The bill imposes a monetary penalty—up to $250,000—on any individual or entity that violates this prohibition, establishing a direct monetary deterrent separate from criminal sanctions.

§3119(c)

Exclusionary rule for unlawfully obtained information

Information and derivative evidence collected in violation of the new prohibition are generally inadmissible in any federal, state, or local proceeding. The statute includes a narrow exception allowing evidence to be used in proceedings that allege the unlawful use itself (i.e., prosecutions for violating §3119), so the exclusionary rule is not a blanket bar to enforcement against perpetrators.

§3119(d)(1)(A)

Warrant standard and mechanics

A warrant authorizing simulator use must be issued by a court of competent jurisdiction using standard warrant procedures. The applicant must (1) show other techniques (including passive location methods) were tried and failed or are unlikely to succeed/too dangerous; (2) identify the likely area of effect and operation time; (3) certify that the scope and timing are the narrowest reasonably necessary; and (4) show compliance with the Communications Act and FCC rules. The statute limits initial authorizations to no more than 30 days, allows court‑approved 30‑day extensions, requires termination upon objective attainment, and ties when the 30‑day period begins to either first use or 10 days after issuance.

3 more sections
§3119(d)(1)(B) & (d)(1)(B)(i)-(ii)

Emergency exception and post‑use obligations

The bill permits limited emergency use when immediate danger (death/serious injury), certain organized‑crime conspiracies, or immediate national‑security threats exist and obtaining a warrant with due diligence is not feasible. In emergencies the agency must apply for a warrant within 48 hours (except for certain search‑and‑rescue circumstances), and must terminate use when the information is obtained or the warrant is denied. If a subsequent warrant is denied, the statute requires destruction of data and an inventory served on persons named in the application.

§3119(d)(1)(C) & (e)

Model testing, disclosures, and model‑specific limits

Warrant applications must disclose potential disruption to emergency and critical services and certify that the specific model of simulator was inspected by an FCC‑recognized accredited testing lab. The bill also bars reliance on a model for non‑warranted uses unless that model’s disclosures were part of a prior approved FISA order or a prior approved warrant for the intended jurisdiction, effectively creating model‑specific pre‑authorization and preventing retroactive justification for new models.

§3119(f)-(j) and definitions

Minimization, disclosure to defendants, remedies, and definitions

The Attorney General must publish minimization procedures aimed at avoiding retention or dissemination of non‑target data and require destruction as soon as practicable. Defendants must receive information acquired through simulator use if it is introduced at trial. The statute creates a private cause of action with remedies including declaratory/injunctive relief, actual damages, statutory damages up to $500 per violation, and attorney’s fees. The provision includes detailed definitions for terms such as 'cell‑site simulator', 'derived', 'contraband interdiction system', and references to Title III wiretap and tracking device requirements where content interception or tracking occurs.

At scale

This bill is one of many.

Codify tracks hundreds of bills on Privacy across all five countries.

Explore Privacy in Codify Search →

Who Benefits and Who Bears the Cost

Every bill creates winners and losers. Here's who stands to gain and who bears the cost.

Who Benefits

  • Individuals incidentally captured by simulator sweeps — the bill requires prompt minimization and destruction of non‑target data and gives affected persons a civil remedy and disclosure rights when the information is used in proceedings.
  • Civil‑liberties organizations and privacy advocates — the statute builds judicial gatekeeping, transparency (IG reporting, public AG minimization procedures), and notice rules that raise the legal and public cost of indiscriminate surveillance.
  • Defendants in criminal cases — the exclusionary provision and explicit disclosure requirement increase the likelihood that improperly obtained location or interception evidence will be suppressed and available for defense review.
  • Correctional facilities that use contraband interdiction systems — the bill preserves a pathway for in‑facility systems to remain lawful if the facility follows technical restrictions, posts notice, conducts annual testing, and reports issues to the FCC, giving an approved compliance route rather than an outright ban.
  • Telecom operators and public‑safety networks — required disclosures and FCC rulemaking aim to reduce harmful interference to emergency calls and critical services, providing clearer technical expectations and an administrative path to raise interference concerns.

Who Bears the Cost

  • Law enforcement agencies (federal, state, local) — they must overhaul operational procedures, invest in accredited model testing or restrict models they use, make more frequent warrant applications, and track and report use; emergency deployments carry tight post‑use procedural obligations.
  • Device manufacturers and vendors of cell‑site simulators — vendors must submit models for testing and face increased disclosure obligations and potential restrictions on model deployment, which could increase compliance costs and slow product use.
  • Correctional facilities using contraband interdiction systems — facilities must implement transmission‑restriction technologies, post signage, run annual compliance tests per FCC best practices, and report issues within 10 business days, raising operating and documentation burdens.
  • Federal oversight bodies and the FCC — the bill creates a sustained reporting and regulatory workload: joint annual IG reports, public AG minimization rules, and FCC rulemaking and enforcement to prevent harmful interference.
  • Courts and prosecutors — the 30‑day authorization scheme, extension petitions, and heightened factual showings (other methods tried/too dangerous) will increase judicial review duties and could complicate time‑sensitive investigations.

Key Issues

The Core Tension

The central dilemma is operational capability versus collateral harm: cell‑site simulators are uniquely effective for locating and identifying devices, which can save lives and secure investigations, but they inherently collect information about nearby non‑targets and can disrupt emergency communications and network operations. The bill tries to preserve urgent, narrowly tailored uses while imposing transparency, technical testing, and judicial oversight — but each constraint that protects privacy or network integrity also reduces speed, flexibility, and technical options for investigators in pressing situations.

The bill threads several difficult implementation needles but leaves open practical questions. Requiring third‑party accredited testing of specific models and public disclosure of potential service disruptions creates transparency but collides with vendor secrecy and national‑security classification regimes; the statute relies on an FCC‑recognized accreditation process that does not yet exist in detail and may prompt disputes over what lab results may be disclosed to courts without compromising sensitive information.

Similarly, the statute requires applicants to disclose disruption risks and mitigation steps, but courts must weigh those technical claims against law‑enforcement needs — judges without technical expertise may struggle to assess tradeoffs, and litigants may litigate the adequacy of mitigation rather than the underlying probable cause.

The emergency exception is deliberately narrow and time‑boxed, but the 48‑hour backstop and requirement to destroy data if a court later denies a warrant could chill operational use in genuinely time‑critical investigations. Conversely, the exclusionary rule and statutory damages, while modest in amount, create a litigation path that could significantly raise defense pressure in prosecutions that rely on location information.

The statute's requirement that a model be pre‑cleared by an approved warrant or FISA order for certain non‑warranted authorities (and the model‑specific testing) effectively places product‑by‑product regulatory gates on surveillance tools, which could limit legitimate but novel technical approaches and make rapid operational adaptation harder.

Finally, the bill layers Title III, tracking‑device, and FISA compliance onto simulator use where content or tracking is involved. That makes legal compliance clear in theory but increases procedural complexity in the field: agents must coordinate warrant types, venue, and statutory authority quickly, know whether a target qualifies as a U.S. person under FISA, and ensure synchrony with FCC licensing to avoid unlawful transmissions.

Those coordination costs and legal risks are real and will drive operational and training expenses.

Try it yourself.

Ask a question in plain English, or pick a topic below. Results in seconds.