No. It’s called OTAR.Now comes the other cost of encryption. The radio support people need to touch each and every radio on a regular basis to change the encryption key.
Entirely wrong when OTAR is used.But in this process, you either have to split your radio users between 2 radio channels or they can't talk to each other. Don't forget this includes the dispatch consoles. They also need to have the radio support people change the keying for the encryption.
So there is a finite period of time during the re-keying of the radios that you have a compatibility issue with being able to communicate with the entire fleet of radios. Sure some radio systems have over the air re-keying of the encryption key, but again, this doesn't change all radios at one time. You have to do one radio at a time. Large fleets do take a while to change the encryption key no matter what type or re-programming you have available.
I suggest you look into the ECOMM network in British Columbia.The third problem with changing the encryption key is that you also have to consider your other agencies around you. If you share the radio channels for interoperability between departments, you just add time and complexity to re-keying the encryption in all these other radios.
Some agencies take the stand that they just don't change the encryption keys. It takes too long and causes mass confusion in the process of doing it. But now you run the risk of someone just might stumble into what your encryption key is. Once someone finds the key, they will pass that along like a big news flash around the area.
So the choices are not always easy when it comes to encryption. You shoot your self in the foot no matter what choice you make. These agencies spend tax money all year long just to support encryption. It is not just a one time expense. Depending how large the radio fleet is, it could take a number of radio techs some serious time to touch each radio. But again, each radio really needs to be put on the service monitor to insure the radio is on frequency and the transmit modulation is correct. So doing both at the same time is a better way to change the encryption key. But no matter how you look at it, it takes time for each radio.
Good luck with what ever happens. I am not a supporter of full time encryption, because it lets too many things get swept under the rug. The longer you have encryption, the more abuse the users seem to use on the encrypted radios channels to hide things from the rest of the world.
LATE!I guess you guys have not heard of the homicides in BC this past week. BC RCMP and a cadre of news reporters were there when they announced Monday night that a few kids where missing from Port Alberni. Next night (last) they were informing us that they are now suspects in a investigation of three dead people, so BC new agencies are busy collecting the details . The job of the news beat reporter is to go down daily to the cop shop and get the blotter from the media relations officer. The information is controlled , yeah so what. but at least its getting out. Overnight those two teenagers went from BOLF to Most Wanted, last seen in Manitoba.
Here’s what we know about the 3 dead in northern B.C. and the suspects
Get over police encryption.
Yesterday, working outside in Richmond, the sirens went screaching by. Last night's news reported a man stabbed on the bus. This morning, I read about 21 yr old arrested for stabbing 42 yr old. With all those witnesses snapping photos how was this story not getting out ?
You really don't know how this stuff works. Read the P25 standards docs on encryption/OTAR.So there is a finite period of time during the re-keying of the radios that you have a compatibility issue with being able to communicate with the entire fleet of radios. Sure some radio systems have over the air re-keying of the encryption key, but again, this doesn't change all radios at one time. You have to do one radio at a time. Large fleets do take a while to change the encryption key no matter what type or re-programming you have available.