View Single Post
  #5 (permalink)  
Old 10-01-2017, 10:09 AM
paulears paulears is offline
Member
   
Join Date: Oct 2015
Location: Lowestoft - UK
Posts: 351
Default

Thanks for that. It does seem a missed opportunity in the range of repeaters. Around here there is a VERY strong DMR system, and while it's does operate on a number of frequencies, the main transmission is easily heard within around a 50m radius of where it is based, designed to talk mainly to offshore vessels, and spends most of it's time giving permits for dozens of people to work in normally unmanned locations. It uses a main talkgroup, and then a smaller quantity of users, who seem to be supervisory, who use a different one on the same slot. If some unscrupulous person was to set up a totally new talkgroup, then the authorised users would be totally unaware of the hijacking of the system. This seems a very large flaw, and if these users engaged encryption, then the owners of the system would be unable to find out what is going on - if they detected the unauthorised usage, perhaps if messages clashed and didn't get through, considering the often long path lengths involved, maybe they'd just assume the failures to be a function of distance. If they did work out what is happening it would have to be by the DSD type software, which would show the presence of a new talkgroup and radio IDs. There really should be some kind of security, or at least a monitoring system without using a outside sourced solution. If you actually tracked down the system was being hijacked, with encryption you'd be left with just DF as a tool to find out who or what was going on?

I'll have a look at the Simocos - we do see these here in the UK, but I'd not thought to check their digital offerings.
Reply With Quote