I find some of the questions here rather baffling. I've never heard of Pennsylvania Starnet, and I have no association with it, nor with Harris (or any other vendor, for that matter).
I guess the best I can suggest is to read our paper and our mitigation guide. We tried to make them as clear as we could. The paper is at
http://www.crypto.com/papers/p25sec.pdf (in pdf format), and the guide is at
P25 Security Mitigation Guide (html).
To answer the one question I understood. Our work was done as part of a fundamental research project examining the security of open wireless communications. It was funded by the National Science Foundation (as I believe our paper mentions, on page 16). The initial idea to explore the security and crypto usability of the P25 protocols and implementations was mine.