Motorola (and other companies) seem to think that they have the smartest programmers in the world, people they usually just hired off the street, and they're alarmed when within 10 years (more like weeks in some cases) it turns out that other people NOT working for them are every bit as smart as their programmers, or smarter, and are able to break/reverse engineer their most complicated systems made to secure data or at least obscure it. (Security Thru Obscurity, it's the Motorola Method!)
Ultimately, all that security is meant to stop a single bit, in some cases, from being flipped. Or a few bits. If you know your stuff and can trace the movement of data thru the program, any good hacker can, if he puts the time and effort into it, soon start unscrewing things that the program authors intended to be quite inscrutable.
Motorola puts 50 locks on the door that protects the switch that makes a radio do something useful.
A good hacker pulls the hinge pins out, drops the door on the floor, and flips the switch behind it.
The only way to completely end hacking as a useful tool is to fully encrypt the radio right down to the operating system, and even then you'd have to also fully encrypt the computers that connect to it and run any software that works with it. Only end to end encryption has any chance of completely ending hacking as we know it today.