Shadow Key
No, you cannot access the OTAR programming unless you have the "shadow key" programmed into the radio.
OTAR is used to program encryption keys into radios, but each radio also has a "shadow key". The "shadow key" is loaded by the system administrator/tech when the radio is first programmed with the frequencies used, PL tones, etc. Only the radios with the correct "shadow key" will receive the new encryption key when it is transmitted over the air.
For example, you can't have a Motorola Saber III with an OTAR module installed, programmed on 165.2375 MHz (US Customs) and receive the correct encryption key when it is transmitted. A system is conventional Over-The-Air- Rekeying (OTAR) or is trunking OTAR. Radios with encryption may request encryption keys from a Key Management Controller (KMC) by a menu selection that activates a Rekey Request. A Rekey Request data message (includes the radio's ID and shadow key) is sent from the radio to the KMC so the radio can be OTARed the encryption keys that it would use for voice. OTAR messages from the KMC that is sending encryption keys to the radio are encrypted using the key encryption key (KEK) of the radio.
Signal500