novascotian
Member
I am not a technician and do not have a trunking radio. I am looking for a clarification regarding the system key. The system I monitor is a Smartzone system. I have done some reading and it sounds like the system key is what allows a radio to connect to a particular system and would be provided by the system owner or manager. But once connected to the system and therefore a legitimate user how is it determined who has access to what talk group. The basic part of the question is, I guess that a user requests lets say 5 talk groups and the system administrator comes up with five that are available (a sub question is, does it matter if they are consecutive or all over the map so to speak?) and then what happens? Is the permission to program in these five talk groups part of the system key or is there something else?
The extension to the basic question is this: If lets say the Emergency Management department says they would like to have the talk group for the County PD in their radios I am assuming that they cannot technically just add it. They need the same "thing" they need as if they were being initially permitted to put in their own new talk groups, but the question is more like who makes these decisions. I am guessing that the system administrators would not just say Okay and here it is. Typically would there need to be permission in writing from the other user to allow someone else to use that TG? And then that brings up the question, that ultimately someone who runs the system could behind the scenes have whatever talk group they want since they run the system, is that correct?
In my area a division of the telephone utility (Bell) operates the system but it is heavily or mostly used by government, EMS and police. There is a concept floating around among scanner listeners that some agencies can just put in whatever talk groups they want to suit any situation without asking for any permission, but my thought is more that it really only "someone" at Bell that can do or authorize such things. I am not speaking here of any kind of hacking, just the legitimate process.
The extension to the basic question is this: If lets say the Emergency Management department says they would like to have the talk group for the County PD in their radios I am assuming that they cannot technically just add it. They need the same "thing" they need as if they were being initially permitted to put in their own new talk groups, but the question is more like who makes these decisions. I am guessing that the system administrators would not just say Okay and here it is. Typically would there need to be permission in writing from the other user to allow someone else to use that TG? And then that brings up the question, that ultimately someone who runs the system could behind the scenes have whatever talk group they want since they run the system, is that correct?
In my area a division of the telephone utility (Bell) operates the system but it is heavily or mostly used by government, EMS and police. There is a concept floating around among scanner listeners that some agencies can just put in whatever talk groups they want to suit any situation without asking for any permission, but my thought is more that it really only "someone" at Bell that can do or authorize such things. I am not speaking here of any kind of hacking, just the legitimate process.
Last edited: