The part everyone in scanner land loves:
2.3.2 Call Privacy
Jackson County’s current radio system is intrinsically open to transmission monitoring with radio equipment operable on those frequencies (i.e., trunk-tracking scanning receivers, etc.). Accordingly, the replacement P25 System shall include voice-layer encryption (described later). This provision must offer sufficient flexibility such that the desirable features of monitoring can be retained while permitting privacy to conversations that are potentially confidential.While current P25 standards do not now provide for encryption of trunked system control channels, such technology is likely to be adopted as these standards continue to evolve. The new network should be software-configurable to support the P25 control channel encryption standard being developed by TIA. The Vendor shall describe the scope and operation of such provisions inherent or planned within their solution that prevents the types of undesired radio monitoring discussed above.2.3.3Voice Encryption2.3.3.1Digital voice 256-bit AES encryption, using Advanced Multi-Band Excited +2 (AMBE+2 or newer) vocoder technology coupled, shall be included in the System. 2.3.3.2Three modes of encrypted digital voice operation expected are: 2.3.3.2(a)Unit-to-unit, where conversations transacted in an encrypted talk group are secure. These cannot be monitored at a dispatch or control point; 2.3.3.2(b)Dispatcher-to-unit, where conversations between Jackson County’s dispatch center(s) and field units;2.3.3.2(c)P25 Smartphone Application call transactions (via commercial cellular and FirstNet) to typical field/dispatcher operations within the System.