What the timeline shows

If scanner access genuinely endangered officers, departments would have encrypted at some point during 70-plus years of open operation. Instead, the push came precisely when public scrutiny of policing intensified after 2020.

The encryption surge was not driven by new evidence of officer harm. It was driven by accountability pressure, and the timing makes that hard to dispute.

Advertisement
Advertisement

The Complete Timeline

1921

First Police Radio System

Detroit Police Department installs first one-way police radio system. Officers can receive dispatches but not respond.

Milestone Technology
1933

Two-Way Police Radio Emerges

Bayonne, NJ implements first two-way police radio system. Officers can now communicate in both directions—and so can anyone with a receiver.

Milestone Technology
1940s-1950s

Police Scanners Go Mainstream

Post-war electronics boom makes radio receivers affordable. Citizens begin monitoring police frequencies as a hobby. No serious concerns about public access emerge.

Development Technology
1960s

The Golden Age of Scanners

Portable transistor scanners become widely available. Police departments across America operate openly, with communities monitoring for safety and information.

Development Technology
1986

Electronic Communications Privacy Act

Federal law establishes legal framework for electronic communications but explicitly permits monitoring of unencrypted radio transmissions.

Milestone Policy
1992

LA Riots: Scanner Coverage

During the Los Angeles riots, scanner monitoring provides crucial real-time information to journalists and residents. Open radio access enables extensive coverage of police response.

Milestone Incident
1990s

Digital Radio Transition Begins

Departments begin transitioning from analog to digital systems. Encryption becomes technically feasible but is rarely implemented.

Development Technology
1999

Columbine School Shooting

During the Columbine tragedy, scanner access enables real-time news coverage and helps families locate information. No calls for encryption follow despite the high-profile incident.

Milestone Incident
2001

Post-9/11 Security Concerns

September 11 attacks prompt security reviews. Some agencies cite terrorism concerns for encryption, but widespread adoption does not follow.

Milestone Incident
2005

Hurricane Katrina

Scanner monitoring proves critical during Katrina disaster response. Open communications enable coordination and media coverage of the largest natural disaster response in US history.

Milestone Incident
2006

P25 Standard Adoption

APCO Project 25 digital radio standard gains traction. Includes encryption capability, but many departments implement P25 without activating encryption.

Development Technology
2009

Flight 1549 "Miracle on Hudson"

Scanner audio of Coast Guard and emergency response to the Hudson River plane landing is broadcast worldwide. Open communications enable real-time documentation of the rescue.

Development Incident
2013

Boston Marathon Bombing

Scanner access enables live coverage of the bombing aftermath and manhunt. Millions listen to police communications during the Watertown lockdown. Despite intense scrutiny, no encryption push follows.

Milestone Incident
2014

Eric Garner & Ferguson

High-profile police accountability incidents. NYPD radio remains open, enabling independent documentation. Ferguson protests see extensive scanner monitoring. Accountability movements gain momentum.

Turning Point Incident
2018

California Highway Patrol Encrypts

CHP becomes one of first major statewide agencies to fully encrypt. Sets precedent for California law enforcement.

Turning Point Policy
2019

LAPD Goes Dark

Los Angeles Police Department completes full encryption—largest US city to do so. Decision made with minimal public input. Media protests go unheeded.

Milestone Policy
2020

The Encryption Explosion

Following George Floyd protests and nationwide police scrutiny, encryption proposals accelerate dramatically. Dozens of departments cite "officer safety" while implementing encryption.

Turning Point Policy
2021-2022

Major Cities Fall

Denver, San Jose, San Diego, and other major departments complete encryption. Chicago implements 30-minute delays. Pattern of urban encryption becomes clear.

Development Policy
2022

Highland Park & Uvalde

Highland Park shooting demonstrates scanner access saving lives. Uvalde shows communication failures during crisis. Both events highlight what's lost with encryption.

Turning Point Incident
2024

NYPD Goes Dark

NYPD completes $390 million encryption project, ending 92 years of open radio in America's largest city. Governor Hochul vetoes media access legislation. NYC Council fights back with Int. 1460.

Milestone Policy
2025

The Battleground

Encryption continues expanding nationwide. Resistance movements grow stronger. Palo Alto successfully reverses encryption. State legislatures consider access requirements. The fight for transparency intensifies.

Development Policy

Understanding the Eras

The open era (1921–2018)

~97 years

From the first police radio through nearly a century of technology changes, police communications remained publicly accessible. Departments operated as if transparency were the obvious default.

  • No pattern of officers harmed by scanner monitoring
  • Citizens routinely monitored for safety information
  • Media covered breaking news in real-time
  • Community policing flourished with open communications

The transition (2014–2019)

~5 years

Following Ferguson and the broader police accountability movements, early adopters began implementing encryption. LAPD's 2019 decision set the pattern for major urban departments that followed.

  • Ferguson protests increase scanner monitoring
  • Body camera debates highlight accountability concerns
  • California Highway Patrol encrypts statewide (2018)
  • LAPD becomes largest encrypted city (2019)

The encryption era (2020–present)

Ongoing

The George Floyd protests and nationwide police scrutiny brought a surge of encryption proposals. Departments moved to encrypt at the moment accountability pressure was highest, not in response to any new operational threat.

  • Dozens of departments announce encryption post-Floyd
  • "Officer safety" cited despite no new evidence
  • Major cities fall in rapid succession
  • Resistance movements begin forming

The question that goes unanswered

If scanners endangered officers before 2020, why didn't departments encrypt before 2020?

The encryption argument rests on officer safety. Proponents claim criminals use scanners to track officers. But the argument has a timing problem.

The technology existed

Encryption has been technically feasible since the 1990s. Digital radio systems with encryption capability were available for decades. If encryption were necessary for officer safety, departments would have used it then.

Scanners did not change

Scanners work the same way they did in 1950. The technology did not become more dangerous. What changed was public attention to policing, particularly after high-profile incidents captured on video.

The pattern is consistent

Encryption proposals spiked after Ferguson (2014), after LAPD controversies (2019), and especially after George Floyd (2020). That correlates with accountability pressure, not with any documented change in criminal scanner use.

The timeline answers the question departments avoid: encryption is about reducing scrutiny, not protecting officers. The post-2020 surge makes that correlation difficult to dismiss.

What the record shows

Open radio worked

For nearly a century, open police radio ran alongside effective law enforcement. Departments solved crimes and protected communities while the public could listen. The claim that encryption is now necessary contradicts seven decades of uninterrupted open operation.

Transparency and trust track together

The era of open communications was also a period of generally higher public trust in policing. Communities could follow what was happening in real time. Encryption cuts that off at the moment when trust most needs to be rebuilt.

Timing reveals motive

Departments that operated openly for decades suddenly decided encryption was urgent right when accountability pressure peaked. That is not coincidence. The timing is itself the evidence.

The trend can reverse

Some communities have successfully resisted encryption. Others have pushed through access legislation or reversed earlier decisions. The encryption trend is a policy choice, not a technical inevitability.

This is still being decided

The decisions being made now will shape public access to police communications for years. Nothing about the encryption trend is permanent. It is a policy choice, and policy choices can be changed.

Open police radio worked for 70 years. The burden of proof is on those arguing it needs to end.

Learn how to fight back