FCC Notice of Unlicensed Operation and Interfering with a Public Safety Trunking System

Status
Not open for further replies.

N4DES

Retired 0598 Czar ÆS Ø
Joined
Dec 19, 2002
Messages
2,505
Location
South FL
The FCC posted it on 4/17/2025 with the infraction occurring in June 2024.


The Federal Communications Commission (FCC or Commission) received a complaint from the Stafford County, Virginia Sheriff’s Office (Sheriff) concerning interference to the Stafford County P25 public safety radio communications system (Stafford County System) operating countywide on certain exclusively licensed radio frequencies. In June 2024, Agents from the Columbia, Maryland Field Office of the FCC’s Enforcement Bureau (Bureau) conducted an investigation and determined that the source of interference to the Stafford County System was a radio transmitting signals in an attempt to self authenticate and thereby gain access to the Stafford County System. The signals were emanating from a handheld Motorola APX7000 two-way radio that generated a unique identification code and had apparently been illegally programmed to operate on Stafford County System’s licensed frequencies. The investigation identified you—John T. Calhoun—as the radio’s operator. You stated to Sheriff investigators that you had programmed the radio with the Stafford County System’s frequencies and that you were operating the radio at the time it made a self-authentication transmission in an attempt to gain access to the Stafford County System.
 

kc2asb

Member
Joined
Dec 31, 2015
Messages
585
Location
NYC Area
Nice work getting this guy. Guessing that this was not an encrypted system? If so, another reason encryption becomes a no-brainer for departments upgrading their systems,
 

KevinC

Encryption
Super Moderator
Joined
Jan 7, 2001
Messages
13,145
Location
I'm everywhere Focker!
I wonder if John T Calhoun is this guy???

 

kc2asb

Member
Joined
Dec 31, 2015
Messages
585
Location
NYC Area
Nah, purely a coincidence.:D
I wonder if John T Calhoun is this guy???

 

GTR8000

NY/NJ Database Guy
Database Admin
Joined
Oct 4, 2007
Messages
16,264
Location
BEE00
As I said in that thread...FAFO.

And despite all of the warnings, we still have a few members around here who just can't help themselves when it comes to aiding and abetting this "NAS" nonsense. Members who get all bent out of shape when we discourage talk of obtaining unauthorized system keys or using prohibited software to program these systems into their eBay specials.

Anyone who has had their toy stunned and turned into an expensive door stop with no further action should consider themselves lucky. Others, like this Calhoun dolt, learn an even harder lesson.

So to all of the members I described above who persist in thinking this sort of programming is no big deal, and to those who spew nonsense about the FCC no longer having field investigators or wouldn't bother going after something as "petty and harmless" as a 3 watt portable blipping a control channel for a few milliseconds at a time...yeah, you keep on f'ing around, you're bound to eventually find out.
 

prcguy

Member
Premium Subscriber
Joined
Jun 30, 2006
Messages
17,143
Location
So Cal - Richardson, TX - Tewksbury, MA
I wonder if John T Calhoun is this guy???


1732813440366



No reason this picture is here, just disregard. If your thinking anything just look somewhere else.
 

RFI-EMI-GUY

Member
Joined
Dec 22, 2013
Messages
7,631
I wonder if John T Calhoun is this guy???

Now we know how he got caught. Should have dumped that bricked radio and gotten a scanner. I doubt a "friend borrowed the radio and changed the programming".
 

mwjones

Member
Premium Subscriber
Joined
Apr 9, 2003
Messages
762
Location
Van Alstyne, TX
So an encrypted system would not be more secure from unauthorized access?
Nope. A bad actor doesn't need encryption keys whatsoever to inflict damage on the system (and even with an unencrypted control channel there are still encryption keys needed to affiliate with the system).

All they have to do is flood the system with requests (think like someone knocking on a locked door because they don't have their keys), and with enough of them would overwhelm the control channel so no other radios could affiliate let alone let registered users use the system. In the Information Technology world, we refer to is as a "Denial of Service" or DOS attack.
 

kc2asb

Member
Joined
Dec 31, 2015
Messages
585
Location
NYC Area
Nope. A bad actor doesn't need encryption keys whatsoever to inflict damage on the system (and even with an unencrypted control channel there are still encryption keys needed to affiliate with the system).

All they have to do is flood the system with requests (think like someone knocking on a locked door because they don't have their keys), and with enough of them would overwhelm the control channel so no other radios could affiliate let alone let registered users use the system. In the Information Technology world, we refer to is as a "Denial of Service" or DOS attack.
Excellent explanation, thank you.
 

dlwtrunked

Member
Premium Subscriber
Joined
Dec 19, 2002
Messages
2,528
Excellent explanation, thank you.
And in case it is not clear, once a transceiver like this is programmed for a system (with or without and encryption key), if you switch to a talk group, and do not even key the mic!, the transceiver still transmits to the system to register itself. And if the dispatcher is watching things, she sees that. So without keying the mic and without having a key, you have interfered.
 
Status
Not open for further replies.
Top