Intriguing, but I can’t get over how the radios follow the access keys when they are changed. The agency using the encryption does routine “handshakes” with each radio when they are attempting a transmission, each unit being registered with the controller. If the unit in question is not registered with the controller it is not recognized and therefore does not get the key needed to communicate. Even if you found a lost or stolen portable radio belonging to the agency, if it’s reported as lost or stolen, the system will locate said radio using GPS and it is recovered, even if the radio is turned off. If they can do that it means they can disable the radio remotely in addition to locating it. So, even with a key, what do you do when the key is changed? It’s my understanding they can set up the changing of keys anytime they choose, routinely changing keys on a daily basis, up to the minute basis or only when the need arises. But I am by no means an expert where encryption techniques are concerned and accept there are sensitive and proprietary reasons for its use, where the information conveyed is not for my ears so I don’t bother programming encrypted systems period. However, I do believe there are times it’s a needed mode and time where it’s not.