Well according to him, his unauthorized programming of trunking radios cost him a career, a bunch of money, his family, etc:
http://forums.radioreference.com/ge...-anyone-can-program-my-radios.html#post729378
In our state, (GA) it is a computer trespass crime, not just a radio (FCC) issue. Everytime the radio powers up, changes talkgroups, or is polled, it affiliates. Affiliation attempts are viewed as computer access (hacking) attempts. Ask any jury when a modern Astro 25 zone controller is brought in and explained how it works (a database, security keys, passwords, etc) and it all spells out CONVICTION.
To my knowledge, no on was ever convicted of a crime for merely programming a SCANNER. Do the math. Putting radios on someone else's network without their permission and in a covert manner is a recipe for disaster.
The problem is many well meaning hobbyists who "just want to listen" have little knowledge of how these systems work, and how improper programming of subscriber radios, legit ID's or not, can create stability problems systemwide. Cloning radios can put the legit user in jeopardy, especially if the bootleg radio causes a flag in site lens and is disabled, if the legit user doesn't know his/her radio is also disabled. Imagine what could happen if a firefighter or PD officer's radio goes dead at the WORST time, all because someone wanted to play. Would you want that on your conscience?
Motorola (and other vendors) give classes on use of their tools for a reason. I just completed a course for Kenwood P25 programming, and I can tell you much goes on the system side that the wrong data in the wrong place CAN create problems. (I will say that Kenwood P25 programming platform is WAAAY MORE secure than Motorola is, and this is a GOOD THING for those with systems. Trust me when I say you will NEVER have a Kenwood P25 sub unit illegally programmed on your system!)
Get a scanner, program all you want. Listen to what you want. And don't fear any knocks on the door!