• To anyone looking to acquire commercial radio programming software:

    Please do not make requests for copies of radio programming software which is sold (or was sold) by the manufacturer for any monetary value. All requests will be deleted and a forum infraction issued. Making a request such as this is attempting to engage in software piracy and this forum cannot be involved or associated with this activity. The same goes for any private transaction via Private Message. Even if you attempt to engage in this activity in PM's we will still enforce the forum rules. Your PM's are not private and the administration has the right to read them if there's a hint to criminal activity.

    If you are having trouble legally obtaining software please state so. We do not want any hurt feelings when your vague post is mistaken for a free request. It is YOUR responsibility to properly word your request.

    To obtain Motorola software see the Sticky in the Motorola forum.

    The various other vendors often permit their dealers to sell the software online (i.e., Kenwood). Please use Google or some other search engine to find a dealer that sells the software. Typically each series or individual radio requires its own software package. Often the Kenwood software is less than $100 so don't be a cheapskate; just purchase it.

    For M/A Com/Harris/GE, etc: there are two software packages that program all current and past radios. One package is for conventional programming and the other for trunked programming. The trunked package is in upwards of $2,500. The conventional package is more reasonable though is still several hundred dollars. The benefit is you do not need multiple versions for each radio (unlike Motorola).

    This is a large and very visible forum. We cannot jeopardize the ability to provide the RadioReference services by allowing this activity to occur. Please respect this.

Detection range of mobile p25 radios

Status
Not open for further replies.

balibago

Completely Banned for the Greater Good
Banned
Joined
Jan 13, 2008
Messages
220
Location
New Iberia
Clearly our hobby is making 0 progress toward decrypting even the most simple of encryption algorithms at least publicly anyhow. In light of this does anyone out there recommend some kind of device to increase the range of close call to let's say a mile or so. This would at least indicate the presence of these radios. Do P 25 radios signal back to the tower every few minutes? This transmission could also indicate the presence of these radios in one's vicinity. Clearly in a rural or wilderness environment being able to pick up any transmission in the 700 MHz band would indicate at least the presence of someone of a government nature. Also anyone who could give out any reccomendations with regard to radio direction finding and traffic analysis would be greatly appreciated.
 

kayn1n32008

ØÆSØ
Joined
Sep 20, 2008
Messages
6,601
Location
Sector 001
Clearly our hobby is making 0 progress toward decrypting even the most simple of encryption algorithms at least publicly anyhow.

Really, what part of IT IS ILLEGAL TO DECRYPT TRANSMISSIONS NOT INTENDED FOR YOU do you not understand? Hence there is "0 progress towards decrypting the most simple of encryption algorithms" being publicly discussed, outside of cryptographic research projects. Usually this research is released as 'white papers'

In light of this does anyone out there recommend some kind of device to increase the range of close call to let's say a mile or so.


Close call "range" is dependant on the strength of the ambient RF in the given environment. Close call works when a signal is significantly stronger than anything else detected, something on the order of 20db or so, if it is not, close call will not see it. If you are looking for an 800MHz signal, and you live near a 800MHz repeater site, close call may not ever trigger on a portable transmitting, unless it is right beside you.

If a signal is at the same strength as everything around you, it will be impossible to trip close call.
 

EmilyWolf

Completely Banned for the Greater Good
Banned
Joined
Feb 7, 2013
Messages
68
Location
Stanton, California
Really, what part of IT IS ILLEGAL TO DECRYPT TRANSMISSIONS NOT INTENDED FOR YOU do you not understand? Hence there is "0 progress towards decrypting the most simple of encryption algorithms" being publicly discussed, outside of cryptographic research projects. Usually this research is released as 'white papers'




Close call "range" is dependant on the strength of the ambient RF in the given environment. Close call works when a signal is significantly stronger than anything else detected, something on the order of 20db or so, if it is not, close call will not see it. If you are looking for an 800MHz signal, and you live near a 800MHz repeater site, close call may not ever trigger on a portable transmitting, unless it is right beside you.

If a signal is at the same strength as everything around you, it will be impossible to trip close call.

Well actually the way to increse the detection range on close call is to use a better antenna in a better position. But i agree with you. Detecting P25 does nothing to show governemnt presence as HAMs and lots of commercial and private services use it.
 

balibago

Completely Banned for the Greater Good
Banned
Joined
Jan 13, 2008
Messages
220
Location
New Iberia
As I said earlier

As I said earlier this hobby seems to be cowed in fear by even the simplest of crypto algorithms while on other websites people brag of their exploits with drugs {Erowid.net} and of their experiences with hookers {ECCIE.net} all of these things are illegal just as decrypting an encrypted signal is. In some time we can expect stronger encryption algorithms as well as more discreet ones so we freedom loving Americans must learn the secrets of traffic analysis, direction finding and detection. A little jamming thrown in would be nice too.
 

EmilyWolf

Completely Banned for the Greater Good
Banned
Joined
Feb 7, 2013
Messages
68
Location
Stanton, California
Thats pointless p25. There has been aes256 modules and radios built for a long time now if you want real security.
 

jackj

Member
Joined
Jul 19, 2007
Messages
1,548
Location
NW Ohio
Why would you want to listen to encrypted communications. They aren't going to talk about the good stuff like which town/city council member is visiting a prostitute or how much the mayor took in his latest bribe. All they're going to talk about is the pusher they're gonna take down. Not really worth the effort to decrypt.
 

mmckenna

I ♥ Ø
Joined
Jul 27, 2005
Messages
23,618
Location
Hiding in a coffee shop.
As I said earlier this hobby seems to be cowed in fear by even the simplest of crypto algorithms while on other websites people brag of their exploits with drugs {Erowid.net} and of their experiences with hookers {ECCIE.net} all of these things are illegal just as decrypting an encrypted signal is. In some time we can expect stronger encryption algorithms as well as more discreet ones so we freedom loving Americans must learn the secrets of traffic analysis, direction finding and detection. A little jamming thrown in would be nice too.

OK. We get it, you're a bad boy.

You don't care about the laws, and you certainly don't understand the technology nor the reason for having encryption.

No one owes you anything.

Freedom doesn't mean that you are allowed to do whatever you want. Time to get over that fallacy. Freedom doesn't mean that law enforcement is bad. Jamming a radio signal because you are not allowed to listen to it is childish, and risks other peoples lives.

Time to get off the "freedom loving American" wagon. Thinking that phrase makes you superior to the rest of the world is nonsense. Thinking that you are entitled to something because of that statement just makes you yet another person with a self inflated value of entitlement. And honestly, we've got way to many people with that in this country.

Encryption is there for a reason. Nobody owes you access to encrypted transmissions. The very reason they are encrypted is to stop casual eavesdropping. The laws to discourage decrypting things that you are not entitled to are there for a good reason.
You have no need to intercept my visa card number when I purchase something online. You are not entitled to that information.
You have no need to listen in on private medical information. You are not entitled to that.
You may think you are entitled to listen in on encrypted law enforcement traffic because they are obviously doing something you don't agree with. You are not.

You are not entitled to wiretap the phone lines of the police department. You are not entitled to listen in on their cell phone calls. You are not entitled free access to any of the records information they process.

Time to get over it. Put your big boy pants on and join the rest of us law abiding citizens that also enjoy our freedoms.
 

balibago

Completely Banned for the Greater Good
Banned
Joined
Jan 13, 2008
Messages
220
Location
New Iberia
OK now that you have had your conservative rant.Let's work together to find out the best ways to at least detect these radios transmissions to protect ourselves from potentially abusive public officials. These government control freaks aren't entitled to keep everything secret as well in a free country. I too am a law abiding citizen but there is a limit. In my opinion there are far too many squeamish people out here un willing to violate unjust laws en masse. Look at the 2 states who decided they were entitled to smoke weed. Federal law or not. And I enjoy being a kid it's a lot more fun than being a grumpy adult.
 

mmckenna

I ♥ Ø
Joined
Jul 27, 2005
Messages
23,618
Location
Hiding in a coffee shop.
Get a spectrum analyzer and a directional antenna. Prepare to be disappointed.

Encryption isn't a joke. You are not going to find a product that is going to easily and cheaply decrypt the more serious types. Even if you do, all they have to do is change their key, and you're back to listening to noise.
 

wtp

Member
Joined
Apr 3, 2008
Messages
5,916
Location
Port Charlotte FL
just to address the 1 mile cc

by the time you get a device to trip at 1 mile for close call your next door neighbor's car key fob will be giving you hell or any in county fm or tv transmitter. by the time i pick up 800mhz at 1 mile i would get the airport awos that is 4 miles out
you had it right about scanning for a transmission but close call is a bit out of the question i believe.
let them encrypt the "good stuff" and let it go. they do need some privacy for good reasons.
 

jonwienke

More Info Coming Soon!
Joined
Jul 18, 2014
Messages
13,416
Location
VA
Really, what part of IT IS ILLEGAL TO DECRYPT TRANSMISSIONS NOT INTENDED FOR YOU do you not understand? Hence there is "0 progress towards decrypting the most simple of encryption algorithms" being publicly discussed, outside of cryptographic research projects. Usually this research is released as 'white papers'

It's not illegal to engage in cryptographic research, even if that research involves encrypted radio transmissions. It only becomes illegal if you start using the results of the research to decrypt someone else's encrypted radio traffic, or use someone else's encrypted traffic in your research without their consent.

There are many valid reasons to engage in such research, and even discoveries made by malicious hackers can be used for good. As an example, the original WPA wi-fi encryption algorithm was cracked by hackers who wanted to steal wi-fi services and data from people. But that discovery prompted the development of WPA2 and more secure other traffic encryption methods in use today.

Also, saying there is "zero progress toward decrypting the simplest of encryption algorithms" is not true. The "simplest" algorithms were broken long ago, as have been many not-so-simple algorithms. Algorithms are constantly being proposed, tested, broken, and revised.

Read "Applied Cryptography" by Bruce Schneier if you want to get some historical perspective on cryptography and a good idea of the current state of the art.
 

Thayne

Member
Joined
May 1, 2002
Messages
2,145
It's not illegal to engage in cryptographic research, even if that research involves encrypted radio transmissions. It only becomes illegal if you start using the results of the research to decrypt someone else's encrypted radio traffic, or use someone else's encrypted traffic in your research without their consent.

There are many valid reasons to engage in such research, and even discoveries made by malicious hackers can be used for good. As an example, the original WPA wi-fi encryption algorithm was cracked by hackers who wanted to steal wi-fi services and data from people. But that discovery prompted the development of WPA2 and more secure other traffic encryption methods in use today.

Also, saying there is "zero progress toward decrypting the simplest of encryption algorithms" is not true. The "simplest" algorithms were broken long ago, as have been many not-so-simple algorithms. Algorithms are constantly being proposed, tested, broken, and revised.

Read "Applied Cryptography" by Bruce Schneier if you want to get some historical perspective on cryptography and a good idea of the current state of the art.



Hacking into Internet Connected Light Bulbs

ingenious way to negate WPA2---Anything somebody dreams up can usually be circumvented eventually
 

kayn1n32008

ØÆSØ
Joined
Sep 20, 2008
Messages
6,601
Location
Sector 001
It's not illegal to engage in cryptographic research, even if that research involves encrypted radio transmissions. It only becomes illegal if you start using the results of the research to decrypt someone else's encrypted radio traffic, or use someone else's encrypted traffic in your research without their consent.

I am very aware that the simple algorithms have been broken in research settings. Also I was responding to someone that really needs to research and learn for himself, rather than just repeatedly venting onRR about encryption.
 

TDR-94

Member
Joined
Mar 30, 2014
Messages
1,271
If you really want to eavesdrop on local governments and their officials become a mole or bribe them for the 'inside' info lol!

The radio really isn't where the sensitive 'inside' info of the 'man' is discussed to begin with.It's just where some of the chatter that involves the everyday in's and out's of how they operate are located.They encrypt that radio traffic so it makes it more difficult for people to try and counteract those operations and procedures or avoid them.
 
Status
Not open for further replies.
Top