Originally Posted by romanr
As I said "unless the system is encrypted..." I believe my reply was the first occurrence of the "e" word in this thread.
However, having a rogue radio on the network is an entirely different issue from having unknown (and undetectable) equipment eavesdropping on the conversation.
Depends what the 'unknown' equipment is...
Not sure what the "e" word is, but using encryption, strapped, along with P25 authentication, will make rogue radios stand out like a politician telling the truth.
Having a well planned subscriber ID and talkgroup structure will also make rogue radios stand out. Periodically sending inhibit commands to unused RID's will also go a long ways to keeping hacked subscriber radios off the system as well.