System Type: | Motorola Type II SmartZone Omnilink |
---|
System Voice: | Analog and APCO-25 Common Air Interface |
---|
type 2, phase 2, or a newer system ?
There are no “fixes” for an agency that has decided to go the encryption route. Unless you have permissions from the agency, and their equipment (or compatible equipment), forget being able to modify any piece of ham gear or a scanner. It’s also illegal to manufacture a scanner capable of decoding encryption. Bottom line, it is irrelevant how long you’ve been monitoring public safety transmissions, you just aren’t going to be able to hear anything that is understandable once encryption has been added to the mix.
Is it possible to overcome encryption without the permissions from the agency using it? Yes… maybe. The FBI suspects the Russians were able to do so during the 2020 presidential ingaguration when they somehow learned it was happening. But it’s still just a suspicion. In any case, if the Russians were able to decode the encrypted FBI transmissions, they had the entire expertise of their govt’s electronics labs at their disposal, something you do not possess. Save your money, forget your thoughts of buying anything that says it decrypts public safety transmissions. (The encryption techniques in some Ham, GMRS and Family Service Radios are NOT the same encryptions that commercial radio uses.
Even if you purchased the same radio an agency uses, the use of “Keys” these commercial radios use are only good if the radio is able to communicate with agency’s radio system. This means when you transmit on your radio the system does a “handshake” with your radio. And since every radio in their system comes with its own ID, that ID is compared to a list the system has on hand. If your radio does not have your ID on file with the system the system then transmits a “kill Code” that disables your radios ability to transmit and in some cases activates the GPS location ability to tell the agency where the offending radio is located.
Again, do yourself a favor and forget about any attempts to monitor encryption on a commercial service.