Why Many California Police Departments Are Now Encrypting Their Radio Communications (sandiegouniontribune.com) 104
"The San Diego County Sheriff's Department last week encrypted its radio communications, blocking the public from listening to information about public safety matters in real time," reports the San Diego Union Tribune:
The department is the latest law enforcement agency in the county and state to cut off access to radio communications in response to a California Department of Justice mandate that required agencies to protect certain personal information that law enforcement personnel obtain from state databases. Such information — names, drivers license numbers, dates of birth and other information from the California Law Enforcement Telecommunications System, or CLETS — sometimes is broadcast over police radios.
The October 2020 mandate gave agencies two options: to limit the transmission of database-obtained personal information on public channels or to encrypt their radio traffic. Police reform advocates say the switch to encrypted channels is problematic. The radio silence, they say, will force members of the public, including the news media, to rely on law enforcement agencies' discretion in releasing information about public safety matters....
A sheriff's spokesperson has said the department is exploring ways to disseminate information about incidents as they unfold. One idea is an online page that would show information about calls to which deputies respond.
The October 2020 mandate gave agencies two options: to limit the transmission of database-obtained personal information on public channels or to encrypt their radio traffic. Police reform advocates say the switch to encrypted channels is problematic. The radio silence, they say, will force members of the public, including the news media, to rely on law enforcement agencies' discretion in releasing information about public safety matters....
A sheriff's spokesperson has said the department is exploring ways to disseminate information about incidents as they unfold. One idea is an online page that would show information about calls to which deputies respond.
How this is sometimes handled (Score:4, Interesting)
Some PDs provide an encrypted radio to members of the media so that at least someone can sorta kinda keep up with what they're up to.
Re: nice (Score:3, Funny)
Re: (Score:3)
confusing.
law enforcement can be judge and jury and executioner with impunity.
what is there to be afraid of
Re: (Score:2, Informative)
It's flamebait because you blithely ignored the reason for encrypting the traffic in the first place: To keep private information from leaking to the public. Unless you were referring to "journalists" working for the government (more commonly called propagandists), letting them listen to the private information is still disclosure to the public.
Re: (Score:2, Troll)
It's flamebait because you blithely ignored the reason for encrypting the traffic in the first place: To keep private information from leaking to the public.
That's one reason. Another reason is that most police forces in the USA are corrupt AF and want to hide their activities from the public.
Unless you were referring to "journalists" working for the government (more commonly called propagandists), letting them listen to the private information is still disclosure to the public.
That IS a problem, the police generally only provide such access to journalists they feel they can trust, which is generally journalists the rest of us can't. It's still better than nothing, though.
What's really needed is for every police department in America to be regulated by an empowered citizen's review board with actual power. But police unions fight that sort of thi
Re: (Score:3)
"Another reason is that most police forces in the USA are corrupt AF and want to hide their activities from the public."
And the reason you say this is what, exactly? Do you have the statistics to back that up?
Re: (Score:2)
https://en.wikipedia.org/wiki/... [wikipedia.org]
https://www.usatoday.com/in-de... [usatoday.com]
Re: (Score:2)
Why should the actions of the taxpayer funded police be kept private?
Re: (Score:2)
TFS says what needs to be limited: personal information about citizens pulled from state databases.
Ideally, police would have gone the other way, and avoid sending that stuff over the radio. But they didn't, probably in part because it's hard to separate that kind of traffic, and almost certainly in part because they do want to hide their communications in general. Whether the private medium would be computers or cell phones or even just another switch on their radios, it would be easy to forget in the mi
Narrative trolls (Score:4, Interesting)
It's difficult to imagine how the prior comment could be considered flamebait until you realize that I've become my own little cult of personality and there are people following me around, hanging on everything I say.
There's a bunch of competing professional narrative trolls that regularly scan this site.
You are a frequent poster who always uses the same alias, and you probably have a strong opinion about something that goes against one of the narratives. If you have conservative views, or libertarian views on certain topics, then the left is against you. If you think China is a US enemy, then the Chinese opinion management system is against you. If you have non-panicky views on global warming, then the Greta Thunberg army is against you.
You don't even need to show one of these opinions now. If you have the opinions and regularly get modded up, the group that's against you wants to take you out of the conversation beforehand. If they can damage your karma today, then you won't have as much of an impact when something comes up that they actually care about.
They have several strategies. The best and most damaging is to get you angry so that you make a mistake and trigger a SJW backlash. Getting you to use the N-word in anger (black community), or the C-word (women) or the F-word (LGBT) or anything similar that they can copy/paste on other social media sites can trigger a typhoon of angry backlash, and that is usually sufficient to cause the person to delete their account. Not as much here on Slashdot, but good on twitter and facebook.
They also can: a) threaten your safety, death threats and the like b) straight up insults unrelated to the comment (you're gay, you're fat, you're a loser), c) simple contradictions with no supporting rationale or evidence ("no it isn't"), d) softening the impact of your statement ("yes Mao killed a lot of people, but it was out of ignorance and not on purpose, like Stalin did").
Even mindlessly posting "citation needed" can serve as a drain on your cognitive ability. The hope is that eventually you get tired of the headwind and not bother any more.
So yeah... you're a known personality here on the site, a bunch of competing narratives each has a file on you, and when you post it pops up an alert in their system and someone responds.
I *suspect* that this happens because Slashdot removed meta-moderation. The site used to be really good at weeding out troll accounts, but now I suspect that the narratives each have several thousand accounts, which are scanned each day to see which ones have mod points to use, and these are apportioned to whichever high-profile user needs to be tamped down.
(A thought problem for the readers who are site admins: how would you detect such activity, and is there a way to discourage it? Would it be sufficient to recognize accounts that only downvote comments?)
Trolling System Software (Score:4, Informative)
For anyone who wants to get into the business of trolling, there's woob [woob.tech], which is a library/application that interacts with a website outside of a browser.
Woob manages the login and screen scraping for many popular sites, and can be scripted to check as many logins as you like. It has plugins for several hundred popular websites (Amazon, Youtube, &c) already.
Using Woob (and an E-mail portal) you can generate a thousand accounts at slashdot, then each day check all of these for karma points.
Also, remember faker [readthedocs.io] software that was in the news recently when the maintainer borked it which then borked thousands of sites using his software? It's purpose is to generate fake but reasonable looking data, such as user names and account registration info which would be needed to fill in the forms for website logins.
Comment removed (Score:5, Interesting)
Re: (Score:3)
Try logging out and back in (Score:2)
Very interesting post. I'd mod you up, but my mod points have been broken for at least several months, simply getting none anymore.
Try logging out (of Slashdot) and logging back in again. It will clear your cookies and may reset the problem.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Very interesting post. I'd mod you up, but my mod points have been broken for at least several months, simply getting none anymore.
Yeah, I used to get them fairly regularly, but have not for a long time, and it is not because I am doing anything differently. Slashdot has obviously changed their algorithm. Not sure what the point is to having excellent karma and posting regularly if freshly signed up trolls are getting all the points (which seems to be the case).
Re: Narrative trolls (Score:3)
Right wing nut job coalesces projections into high power laser beams and admits to operating sock puppet network, blames the left and Greta Thunberg for running sock puppet networks on Slashdot, right wing bots mod up.
Classic.
Re: Narrative trolls (Score:2)
They have several strategies. The best and most damaging is to get you angry so that you make a mistake and trigger a SJW backlash. Getting you to use the N-word in anger (black community)
Oh for the love of god, I just read this part, are you fucking serious?
Okian Warrior, you can stop pretending buddy, the only people that talk like this - or do that are the people that drunkenly drop N bombs and blame the alcohol.
"I'm not a bigot, I just said the bigoted thing because they make me angry" /eyeroll
Re: (Score:2)
I *suspect* that this happens because Slashdot removed meta-moderation.
Slashdot has not removed meta-moderation.
Re: (Score:2)
Dude you need to chill. Some random guy on the internet, got moderation rights. No matter what you say or how much thought you put into a public internet bulletin board system comment. The chances are someone going to have some sort of visceral reaction what you posted. Perhaps the poster is far left doesn't like encrypted radio at all and wants all communication to be free to everyone. Perhaps the poster is far right, and hates the idea that the News Media would have access to this to twist to some biz
Re: (Score:2)
Obligatory xkcd. [xkcd.com]
Re: (Score:3)
I've modded up many of your posts over the years, even ones I didn't agree with. You're probably in the top 5 slashdot contributors of all time.
I'll get a -1 Troll for no reason, and +5's for posts where I was intentionally trolling. No rhyme or reason to it. Sometime I wonder if it's bots. Guess everybody needs a hobby, or something.
That's quite impressive (Score:1)
Giving encrypted radios to the media is as good as publishing the personal details discussed. Quite impressively failing to get this privacy thing.
Personally I don't mind if the radios are encrypted iff the police reliably publish why they felt like racing around with light and sound afterward and most if not all the other things they do.
I'm in a country where the radios have been encrypted for over a decade with a country-wide system for all public services that seems to do it quite well. (In regards to
Re: How this is sometimes handled (Score:5, Informative)
A friend is in the local police. A common strategy is to use radio links to communicate in a manner that can be heard by police scanner radiosâ¦.
â¦and then discuss their plans via cell phone. Tricky and effective against criminals. (And noncriminals too I supposeâ¦.)
Re: (Score:2)
This is what the police and fire do in my city. They speak in the clear for 90% of their activities but the minute something turns sensitive or they have trouble hearing each other the radio they switch to cell phones.
I think the issue here, however, is that they have a mandate to protect personal identifying information that is otherwise routinely broadcast over the radio during a traffic stop. I suppose they could walk back to the car and use an encrypted terminal to run people's records but this is ine
Standard operation in Europe (Score:2)
Encrypted radio communication for law enforcement and similar has been standard in Europe for at least a decade by now, so this is just a minor piece of news.
When there are scanners that can get around the encryption then we can come back. And they will come.
Re: (Score:2)
Encrypted radio communication for law enforcement and similar has been standard in Europe for at least a decade by now, so this is just a minor piece of news.
When there are scanners that can get around the encryption then we can come back. And they will come.
While we like to think hackers can solve every problem - it can't. This is not DVD or blu-ray. Regardless of how any given system works at the moment, with a limited number of devices that regularly return to the base station for rekeying can create a system that is impossible to have cracked without a daily insider threat. You better hope this is true or all of your bank accounts and all cryptocurrency is also broken
Re: (Score:3)
While we like to think hackers can solve every problem - it can't. This is not DVD or blu-ray. Regardless of how any given system works at the moment, with a limited number of devices that regularly return to the base station for rekeying can create a system that is impossible to have cracked without a daily insider threat.
You better hope this is true or all of your bank accounts and all cryptocurrency is also broken
True, the most common "encryption" I've seen is simply frequency hopping and the rotation is transmitted on an FM subcarrier. That's not as difficult to crack as a BlueRay or DVD or CD for that matter.
Financial transactions are much better protected that that.
M does sell true encryption. I've just never seen it in the wild yet. Doesn't mean it's not there, just that I've not seen it.
Yet.
Re: (Score:2)
Motorola has been selling encrypted radios to police departments for ... well at least 15 years at this point. The news is why it's taken California so long to get on board.
And no, it's not just frequency hopping, but rather, encryption according to FIPS standards.
Re: (Score:2)
Re: (Score:2)
While we like to think hackers can solve every problem - it can't. This is not DVD or blu-ray. Regardless of how any given system works at the moment, with a limited number of devices that regularly return to the base station for rekeying can create a system that is impossible to have cracked without a daily insider threat.
You better hope this is true or all of your bank accounts and all cryptocurrency is also broken
True, the most common "encryption" I've seen is simply frequency hopping and the rotation is transmitted on an FM subcarrier. That's not as difficult to crack as a BlueRay or DVD or CD for that matter.
Financial transactions are much better protected that that.
M does sell true encryption. I've just never seen it in the wild yet. Doesn't mean it's not there, just that I've not seen it.
Yet.
Afaik most countries use tetra based systems that offer end to end encryption https://en.m.wikipedia.org/wik... [wikipedia.org]
Re: (Score:2)
All you have to do is broadcast interference and the radios fall back to open mode without acknowledgement.
Re: Standard operation in Europe (Score:2)
Re: (Score:2)
Bomb detection and defusing etc is not something that should be done by Police really. In most major other countries anything to do with explosives etc. is handed straight over to the Military e.g in the UK the Army or Navy are called out depending on where it is.
One single anomoly is the island of Guernsey where the Police deal with and destroy old munitions, flares etc found on the island, a hangover from their role after the WW2 occupation.
Re:Standard operation in Europe (Score:5, Interesting)
with a limited number of devices that regularly return to the base station for rekeying can create a system that is impossible to have cracked without a daily insider threat.
Yea, that's not how it works at all. In the US we use P25, and encryption is symmetrical keys. 99.9% of departments never rekey their radios as you have to physically connect them to keyloader (KVL). There is the possibility to do Over The Air Rekeying (OTAR), but this is expensive and the entire system needs to be setup for it. Then you have the costs of doing AES256 it self, which can be 1000 per radio in licensing; many departments run ADP, a week rc4 algo, just to get avoid the need for the AES license, KVL5000 loader (about $7k) and cables.
Now the KVL is typically viewed as secure, once the keys are in it, they can't be viewed in plain text. This is not the case, as there's no encryption of the key on the wire between it and the radio (and it's a symmetric key, so even in FIPS mode, you can still decode it if you have the entire conversation) so you can get a device that "impersonates" a radio and then keyload this device. It's also trivial to embed a uP in an XTS5000 that records the entire keyloading conversation for later playback. 16k of storage captures over 60 keys! In this way you can get someone to keyload your radio and then get the keys from it.
Since most departments don't cycle their keys, it's possible to record the entire system as a data stream. 9.6 kbit/s per channel, one RTL dongle per carrier, even the most complex trunked system is maybe 20 carriers, assuming it's online for 100% duty cycle it's 16gb/day of data. A single 16tb disk can store 1000 days of radio traffic (likely 3-4x that as the dutycycle is 20-25%). This means once you get the key, you can come back to it and decode it all. Of course only the voice traffic is encoded, the metadata (ID's, data, etc) is not encrypted. If you know who is what ID, you can develop a good idea of what's going on based on their talkgroup ID and what ID's are talking.
Then we get into the quality of the keys. 99% of them are the phone number of the tech that installed it. I've seen "911911911911911911" too. It's a joke, if you use shit for keys, even the best crypto system is shit. The only ones who seem to understand this are the feds, USSS, etc. They keyload radios with keys provided by the NSA and keep the keyloader under lock and key when it's loaded with keys. They cycle keys every deployment or week, and have the radios setup to not work if the key is not there. That last part is important, as most radios are setup to work in the clear if they drop their keys, and the officers won't know it. The indication on the radio is only a small flashing Ø symbol. There's no indication if they transmit in the clear since enabling this is seen as "annoying" by most officers.
In summary encryption is a joke as deployed. It's expensive and fragile.
Re: Standard operation in Europe (Score:2)
AES license? (Score:2)
AES is a free and open algorithm, and doesn't need any licensing to use.
Re:AES license? (Score:4, Informative)
To do AES or DES crypto in a Motorola (or other) radio requires a crypto module, with the algorithm enabled. In Motorola this is known as a Universal Crypto Module, UCM or newer radios, a MACE crypto board. The UCM and MACE come blank, with no code on them to support crypto (it's therefor not an ITAR item). You must load the software on it which is about 700-800 dollars plus the UCM cost. Example an NNTN4934 UCM with AES+DES+ADP is 1,298.00. If you want OTAR support you need the infrastructure for that (about 50k) and then the radio must have that feature licensed. Not to mention every radio you OTAR needs a license on the OTAR server to support it (think M$ CALs).
In many cases the radio may be 4000-5000 but features enabled may double the final price. This gets expensive real fast.
Now DMR (TRBO) is much cheaper, but Motorola doesn't sell or support AES encryption on it in the US. Don't even talk about TETRA, as that's way cheaper and a truly open system.
Re: (Score:2)
https://www.cbc.ca/news/canada... [www.cbc.ca]
I worked, indirectly, with this guy for many years. Never would have thought.
Re: (Score:2)
That was not criminal, but rather civil. Motorola loves to threaten their users and throw their weight around to get people like this. They have a history of passing laws rather than improving their system security.
That said, you can't run a production network that's not licensed properly. If you're unable to pay for the legit licenses, you don't enable them anyways.
Re: AES license? (Score:1)
Or the fact encryption for regular HAM class licenses is banned.
No transmission that is not readable by everyone with a callsign is allowed.
Then the comments no one would know, then my rebuttal with foxhunt links of how hams actually enjoy pinpointing illegal transmissions to send FCC goonsquads after. Then other links about roaming FCC vans with said equipment that also drive around waiting to write 20k fines.
-signed,
A ham.
Re: (Score:2)
While you had better hope that is true, that's not the way to bet, at least if a major corporation of state actor is involved. Quantum key breaking may not be true *yet*, but the way to bet is that key breaking will happen within a decade. It will be quite expensive at first. There's a question as to how rapidly the price will decline, and that's based on technical questions that nobody knows the answer to.
One time pads are safe, but they require secure key exchange. (Perhpas you were thinking about tha
Re: (Score:2)
All public safety radio systems use symmetric crypto with a shared key. Assuming you use a good key, symmetric encryption is not vulnerable to quantum computing attacks. Even over the air rekeying uses an AES KEK, Key Encryption Key. This is used to encrypt the new keys, and must be loaded on the radio, as it's still symmetric crypto.
Re: (Score:3)
From a UK perspective, I've always found it bizarre that you could listen in to police radios. All sort of operational and confidential information goes over them. Why on earth would the police allow that, and why would people think they have a right to? Just one of those American "freedoms" the rest of the world never knew they needed. I guess it must have been possible here years ago, before encryption, but it would have been illegal so only criminals (by definition) would be doing that. I'm not sure I bu
Re: (Score:2, Flamebait)
From a UK perspective, I've always found it bizarre that you could listen in to police radios. All sort of operational and confidential information goes over them.
In this day and age of in-car computers there's no need for any PII to be transmitted over the vox radio.
Why on earth would the police allow that, and why would people think they have a right to?
The police "allowed" that because they couldn't stop it for many years since encrypted radio was too costly, and the people got used to it and having it be a way to keep tabs on what the police are up to — which is often nefarious.
I guess it must have been possible here years ago, before encryption, but it would have been illegal so only criminals (by definition) would be doing that.
It's not illegal to receive any clearly broadcast, unencrypted communications in this country, police or not.
I'm not sure I buy the argument that this is an important source of "information about public safety matters in real time"
Well, it is.
some how the rest of us seem to manage.
More poorly than you know, by definition.
Re: (Score:2)
I guess it must have been possible here years ago, before encryption, but it would have been illegal so only criminals (by definition) would be doing that.
It's not illegal to receive any clearly broadcast, unencrypted communications in this country, police or not.
I know it's not in the US, but it is here in the UK.
some how the rest of us seem to manage.
More poorly than you know, by definition.
Can you give us a couple of specific examples of how, in the UK, our public safety would be improved by us being able to listen in to police radios?
Re: (Score:2)
Can you give us a couple of specific examples of how, in the UK, our public safety would be improved by us being able to listen in to police radios?
I can give you an explanation of why it's important:
Re: (Score:2)
Re: (Score:2)
I don't know why you think that matters. No doubt you've got less problems with your cops, but if you think that the same kinds of people aren't attracted to the job you're bananas
Re: (Score:2)
I know it's not in the US, but it is here in the UK.
No doubt. The same folks that need a license to watch television. LOL
https://www.tvlicensing.co.uk/... [tvlicensing.co.uk]
Re: (Score:2)
It's not illegal to receive any clearly broadcast, unencrypted communications in this country, police or not.
That's wrong. Huge swaths of spectrum require license even to receive. There are federal laws against things like even trying to intercept phone communication -- including mobile phones, whether encrypted or not -- without proper authorization: https://www.justice.gov/archiv... [justice.gov] .
Re: (Score:2)
The summary misses something particularly relevant to this discussion... 18 USC 2511 (2)(g)
(g) It shall not be unlawful under this chapter or chapter 121 of this title for any person-
(i) to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public;
(ii) to intercept any radio communication which is transmitted-
(I) by any station for the use of the general public, or that relates to ships, aircraft, vehicles, or persons in distress;
(II) by any governmental, law enforcement, civil defense, private land mobile, or public safety communications system, including police and fire, readily accessible to the general public;
(III) by a station operating on an authorized frequency within the bands allocated to the amateur, citizens band, or general mobile radio services; or
(IV) by any marine or aeronautical communications system;
What this means is that, with a few notable exceptions like old cell phones, you can listen to pretty much whatever you can receive without going through extraordinary measures, like trying to break encryption. The way many of the restrictions are enforced in the US is by the FCC regulating the capabilities of radios sold to the civilian population. (e.g. requiring cell phone band blocks on radio scanners)
Re: (Score:2)
In this day and age of in-car computers there's no need for any PII to be transmitted over the vox radio.
Unlike the US, a lot of police in European cities walk around on foot or bicycles - London, Paris etc. are prime examples of this. An in-car computer isn't a lot of use then.
Re: Standard operation in Europe (Score:2)
Re: (Score:2)
Encrypted radio communication for law enforcement and similar has been standard in Europe for at least a decade by now, so this is just a minor piece of news.
When there are scanners that can get around the encryption then we can come back. And they will come.
Indeed. There is a lot of sensitive information that goes over there, and in addition I don't want criminals to be able to listen to - or disrupt - police communications.
A lot of day to day policing is handling things like drunkeness, child abuse, domestic violence, drug addicts, mentally ill or unstable people that are dangerous to themselves or others- While lookups can be handled over VPNs securely, there are also going to be a lot of sensitive information - and identifying information, like addresses -
Re: (Score:2)
Re: (Score:2)
A helicopter should then still have air radio as well since they need that to communicate with air traffic controllers, so a few of those hand sets around on a rig ready for use would solve that problem.
Re: (Score:2)
Re: (Score:2)
Sorry, "16 channels", though some had channel 2 (maritime emergency) hard wired to squawk into the selected channel, so had a 15-way selector. There may have been other designs too - generally my service had a hard-wired squawk box to the drill floor, having no need to know what the deck crew were doing - we could always phone the appropriate crane pedestal to find out if, for example, it was safe to leave our computerised PortaKabin.
Re: (Score:2)
However from what I heard from my understanding of Western European police, is that they are less prone to abuse as American ones are.
Being that recently a lot of abuse in the American Police force came up from citizens taking recordings of events posturing yourself to be more secretive, vs more open isn't the best option.
When ever you have a person in a position of power and/or respect they will need additional checks to make sure they are indeed not abusing what they have, as it is very easy to be abusive
Experience here in Ontario Canada (Score:3)
Re: (Score:2)
That's an implementation detail. And Ontario isn't in California. It could easily be encrypted as well as, say, https. Of course, it may not be, as your experience argues, but that's subject to change, and differing results in different cases.
Re: Experience here in Ontario Canada (Score:2)
Problem solved (Score:5, Insightful)
Unencrypted coms mean criminals and tow trucks are listening in, not just radio enthusiasts.
Have a decent in-car computer and the names and personal information will drop to near-zero because sliding a driver's license into a card reader is a lot easier than reading the ID number to dispatch over the radio, and the response comes back in text format to be reviewed at the cop's leisure.
If your police department is worried about appearances - and in almost all cases they AREN'T - they can publish their main dispatch feed to the Internet with a delay, and push anything important to secondary channels.
You'll hear log ons and log offs mostly, with a side order of officer checks from dispatch, because if they have the aforementioned in-car computers that's how they're doing their dispatching.
Basically, listening in to police radio is not effective police oversight, you're not losing anything. It never was - unless you think news agencies didn't have access to radio scanners.
Re: Problem solved (Score:5, Interesting)
Re: (Score:1)
In the late 70s into the 80s they were close to the NOAA weather channel on transistor radios. Close enough it would pick them up. I used to be amazed at what people would say over the air. I'll leave my car here, unlocked, keys will be under the floor mat. Sometimes they'd leave money, etc. I guess they didn't know anyone could listen in.
Re:Problem solved (Score:4, Interesting)
Re: (Score:2)
Unencrypted coms mean criminals and tow trucks are listening in, not just radio enthusiasts.
Have a decent in-car computer and the names and personal information will drop to near-zero because sliding a driver's license into a card reader is a lot easier than reading the ID number to dispatch over the radio, and the response comes back in text format to be reviewed at the cop's leisure.
True. But not all communication is one in the car. That's why they carry handhelds. And a laptop isn't a substitute for a handheld.
(Phones, however, can be.)
Poor Peter Parker (Score:4, Funny)
Re: (Score:1)
I think you've got the wrong coastline there: Spider-Man doesn't protect San Fransisco or Los Angeles, he protects Miami. :-)
Re: (Score:2)
Don't worry. They still have a big-ass flashlight and a bat symbol cut out of cardboard.
Or rabbits. Or kids making shapes.
They'll catch'em!
Oh the inroy (Score:2)
Ensure public access on a delayed basis (Score:2)
The most common reason given for switching to encrypted radios is that then the bad guys can't listen in and know the cops are coming for them. One way to balance this with the public right to hear public communication would be to publish the police band recordings on a delayed basis. This could take many different forms including simply relaying on an unencrypted band, internet-based streaming, automated transcription, etc.
Of course this idea has many issues that might make it a non-starter, such as how
Re: Ensure public access on a delayed basis (Score:2)
Who's going to pay to redact all the privacy-sensitive material from the recording or delayed feed? The reason for this move to encrypted radio traffic in the first place.
Re: (Score:2)
Oh so that's the excuse the PDs are using. But it's not a valid one in my opinion. Police bands that are unencrypted are available for anyone to listen to live, and have been for decades. But somehow privacy is now an issue?
Re: (Score:2)
A delay in the information would address the complaint on the bad guys getting information on where the police are located but it does not address the complaint of personal information being publicly available. Filtering out such information on a recording would take considerable resources.
backdoors (Score:2)
Oh, can citizens get a backdoor? I mean citizens cannot provide oversight when police communications 'go dark' like that. The PD should have nothing to hide...
Re: (Score:2)
The PD should have nothing to hide...
Criminals are smart, and they monitor communications to avoid getting caught. I lived in a town that had a bad heroin problem and the sheriff's department could never catch the suppliers because they all had scanners. The department started using cellphones to coordinate their efforts and were able to apprehend the main players in the operation. During the investigation it was discovered that the criminals were calling in bogus crimes on the other side of the county to distract the cops. They'd have a
Trunk radios are on their way out. (Score:2)
Re: Trunk radios are on their way out. (Score:2)
But, if you stream their body cams on LTE FirstNet, you might actually be able to do something about police violence instead of just having a bodycam record of it. Unacceptable! Corrupt police will be against this in droves!!
Damn! (Score:2)
No more tips on snorlax sightings [slashdot.org].
This is just an excuse (Score:2)
Many agencies just have an unencrypted âoedispatchâ channel and an encrypted one for running drivers licenses and dealing with private information. It makes more sense logistically speaking anyways because every cop doesnâ(TM)t need to hear the results of another cop running a drivers licenses and if they do they can put their radio in scan mode.
as little as possible (Score:1)
this is not new (Score:1)
Re: (Score:1)
Setting Up For Repression (Score:2, Informative)
And got shot down by the supreme court.
They want to control how people think and believe in California.
And they want to hide what the police are up to.
Re: (Score:2)
And, speaking as an inmate in California, most Californians like it that way. Which is the saddest fact of all.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
And you still think going to church "extremeism" ?
Give me a break.