I wouldn't call most people on Batlabs "jerks"....many of them are veterans of the radio wars and simply won't stick their necks out and accept possible liability for someone they don't know and trust.
Besides, Motorola trunking systems are difficult to monitor in full stealth mode. Short of
taking out a driver or PA device, they retain the capability to transmit, if only at the system's request, despite the presence of the "tx inhibit" option in the software.
And they CAN scan for listening units that haven't logged in....
Anyone who really wants to do this will find a way to secure the tools he needs to do it
himself. Some of that is easy, some of that is a little more complicated.
Elroy