What is the purpose of the policy regarding cellular site simulator technology?
To set guidelines and requirements for the usage of cellular site simulator technology and wiretap technology in compliance with Government Code § 53166.
Define Cellular Communications Interception Technology (CCIT).
Any device that intercepts mobile telephony calling information or content, including an international mobile subscriber identity catcher or other virtual base transceiver station that masquerades as a cellular station.
What must members utilizing CCIT adhere to?
The United States Constitution, including the First and Fourth Amendments, the California Constitution, and all applicable laws.
Under what circumstances can CCIT be employed?
With a valid court order or search warrant, or for an identified exigency.
What is the time frame for seeking a warrant after using CCIT?
No later than 48 hours after use.
List the authorized purposes for using cellular site simulator technology.
What activities should not be targeted by the cellular site simulator?
First Amendment activities, such as protests and gatherings at places of worship.
What crimes can wiretap technology be used to investigate?
Who is responsible for the operation, security, and maintenance of department CCIT?
The Ceasefire Section.
What training must members complete to be designated as authorized users of CCIT?
Who must authorize the use of CCIT?
The Ceasefire Section Manager or designee.
How often must the Investigations Division Commander conduct reviews of the CCIT log?
Every six months.
What must be done if the use of CCIT results in erroneous information?
The operating member shall notify the Ceasefire Section Manager as soon as practicable.
Does the Stockton Police Department have any memorandum of understanding with another agency regarding CCIT?
No.
What is required for an outside agency to request the use of department CCIT?
The request must be forwarded to the Ceasefire Section Manager or their designee for approval.
What conditions must be observed when sharing information obtained from CCIT with outside agencies?
The recipient agency must prevent unauthorized use, retain information, and destroy information as required.
How should wire and electronic communications intercepted with CCIT be retained?
In accordance with any applicable retention schedule.