The short answer

Yes, some criminals have used scanners. No, it's not a significant public safety issue.

In 70+ years of open police radio access, criminal scanner use has been:

  • Rare and mostly anecdotal
  • Ineffective against modern police tactics
  • Far less useful than social media, apps, and lookouts
  • Not correlated with crime rates or arrest clearance rates

The claim that scanners significantly help criminals doesn't survive contact with evidence.

The argument for encryption

"Drug dealers, gang members, and other criminals monitor police scanners to know when officers are coming. They can evade arrest, destroy evidence, and stay one step ahead of law enforcement. Encryption prevents criminals from using our own communications against us."

— Common law enforcement argument for encryption

This argument is emotionally compelling. No one wants to help criminals. But policy should be based on evidence, not anecdotes — and the evidence here is thin.

What the evidence shows

📊

No statistical correlation

If scanner access helped criminals significantly, we'd expect to see differences in crime rates or clearance rates between encrypted and non-encrypted jurisdictions.

Finding: No study has shown that encryption improves crime clearance rates or reduces criminal activity compared to open-radio jurisdictions.
🕐

70 years of open radio

Police radio has been publicly accessible since the 1930s. If scanner monitoring gave criminals a meaningful advantage, seven decades of open access would have produced a documented pattern. It hasn't.

Finding: There's no historical pattern of scanner-enabled crime that couldn't have been addressed by tactical channel encryption for specific operations.
📱

Criminal networks have better options

Today's criminal networks use tools that make police scanners obsolete:

  • Encrypted messaging apps (Signal, Telegram)
  • Social media for real-time information
  • Human lookouts and spotters
  • Counter-surveillance technology
  • Corrupt insiders (far more valuable than scanners)
Finding: Scanner monitoring is an outdated criminal tactic that has been replaced by faster, cheaper, more reliable alternatives.
🎯

Tactical operations are already encrypted

Planned operations — raids, stings, warrant service — already use encrypted tactical channels or cell phone coordination. The routine patrol traffic that blanket encryption hides isn't what criminals would find useful anyway.

Finding: Departments can protect sensitive operations without encrypting all communications.

How scanner evasion would actually work

Walk through what scanner-based crime evasion would actually require, and why it doesn't hold up for most criminal activity.

For drug dealing

The scanner theory:

"Dealer hears dispatch send officers to their corner, packs up and moves before police arrive."

The reality:

  • Most drug enforcement uses undercover officers and planned operations (already encrypted channels)
  • Patrol officers responding to citizen complaints are unpredictable
  • Human lookouts are faster and more reliable than scanner monitoring
  • Encrypted messaging apps coordinate dealer networks more effectively

For burglary and robbery

The scanner theory:

"Burglar monitors scanner to know where officers are, hits houses in areas without patrol coverage."

The reality:

  • Burglars work in minutes; patrol patterns change constantly
  • Scanner monitoring requires constant attention during the crime
  • Most burglars are opportunistic, not tactical planners
  • Ring cameras and neighborhood apps are bigger concerns for criminals

For organized crime

The scanner theory:

"Criminal organizations use scanners for counter-surveillance during major operations."

The reality:

For fleeing suspects

The scanner theory:

"Suspect on the run monitors scanner to evade pursuing officers."

The reality:

  • Active pursuits happen in minutes; no time to set up scanner
  • Driving while monitoring scanner is impractical
  • Helicopters, GPS, and K-9 units don't announce positions on main channels
  • Most pursuits end quickly regardless of scanner access

The anecdote problem

When pressed for evidence, encryption supporters typically fall back on anecdotes: "I know of a case where..." or "We've heard from officers that..." Individual stories feel convincing, but they don't substitute for data.

Selection bias

Officers remember the rare cases where scanner monitoring might have helped a criminal. They don't track the thousands of cases where open radio had no negative impact on the outcome.

Assumed causation

"The suspect fled just before we arrived" gets attributed to scanner monitoring when there are many other explanations: lookouts, coincidence, routine caution, or just bad timing.

No control group

Without systematically comparing encrypted and non-encrypted jurisdictions, there's no way to know if encryption actually changes criminal behavior.

Survivorship bias

We hear about criminals who weren't caught. We don't hear about the far larger number who were caught despite having access to scanners.

What criminals actually use

To understand criminal counter-surveillance, look at what actually works for them, not what sounds alarming in a press release.

High Criminal Use

Encrypted messaging

Signal, Telegram, WhatsApp—encrypted apps are the primary communication tool for organized crime. They're free, easy, and actually secure.

High Criminal Use

Human lookouts

Spotters on corners, in cars, or at windows provide real-time, targeted intelligence far superior to scanning hundreds of radio transmissions.

High Criminal Use

Social media

Police activity, mugshots, and investigations are shared instantly on social platforms — far more accessible than scanner monitoring.

Medium Criminal Use

Insider information

Corrupt employees, compromised officers, or connected individuals provide targeted intelligence no scanner can match.

Low Criminal Use

Police scanners

Requires equipment, knowledge, constant monitoring, and provides only general information. Largely obsolete as a criminal tool.

The real security threat: insider corruption

Police departments claim encryption protects against criminals monitoring scanners, but the documented evidence shows the threat comes from inside the department.

  • Chicago: Officer allegedly sold access to his encrypted police radio for $500
  • NYPD: Officer took $30K+ to query databases for drug dealers
  • Houston: Officer provided intel to Los Zetas cartel—30+ year sentence
  • Calgary: 911 operator fed database info to gang members—200+ screenshots found

Encryption doesn't stop insider threats. It only blocks public oversight while corrupt employees continue operating in darkness.

The trade-off

Even granting that some criminals have occasionally benefited from scanner access, the policy question comes down to trade-offs:

What we give up

  • Real-time public safety information during emergencies
  • Journalist ability to cover breaking news
  • Community oversight of police activity
  • Accountability for response times and conduct
  • Research data for improving policing
  • Evidence of police misconduct
for

What we get

  • Prevention of rare, unquantified criminal scanner use
  • Protection already available via tactical channels
  • Marginal reduction in criminal information access
  • No documented improvement in crime rates

This isn't a close call. The documented costs of encryption far outweigh the theoretical benefits of preventing criminal scanner monitoring — especially when sensitive operations can already be protected on tactical channels.

The timing question

If criminal scanner use were a serious problem, encryption would have been a departmental priority for decades. Instead, the push for blanket encryption accelerated dramatically after 2020 — after high-profile police accountability incidents made open scanner traffic politically uncomfortable.

Worth asking:

Were criminals suddenly using scanners more effectively in 2020? Or did something else happen that made police departments want their communications out of public earshot?

The timing points to accountability avoidance, not criminal scanner use, as the real driver. Criminal scanner monitoring is the stated justification. The timing suggests it's not the actual motivation.

Frequently asked questions

Do criminals actually use police scanners?

Some have, but it's rare and largely ineffective. Modern police use encrypted tactical channels for sensitive operations, cell phones for coordination, and unpredictable response patterns. After more than 70 years of open radio, scanner-based crime evasion has never emerged as a measurable public safety problem.

Didn't drug dealers use scanners in the past?

Some did, though the documentation is mostly anecdotal. Police adapted anyway, using tactical channels, coded language, and cell coordination that made scanner monitoring useless for criminal purposes. Today's criminal networks use Signal, Telegram, and human lookouts. Nobody's crouched over a Uniden listening for 10-codes.

If even one criminal uses a scanner, isn't that reason enough to encrypt?

That logic would justify eliminating any public information that could theoretically be misused. Traffic cameras, flight trackers, public court records — all could theoretically help criminals. The real question is proportionality: does the rare, marginal benefit to criminals outweigh the loss of public oversight? The evidence says no.

Why don't police want the public to know about scanner limitations?

Because acknowledging that scanners pose minimal criminal risk would undermine the primary justification for encryption. If the public understood that sensitive operations already use encrypted tactical channels, the accountability argument would dominate the debate. Some departments would rather that not happen.

What about mass shooters monitoring scanners?

Often cited, poorly supported. Mass shooters aren't typically strategic planners adjusting in real time to police movements — most incidents last minutes and end in surrender, suicide, or confrontation. The Highland Park shooter operated in an area with open scanners and was caught through citizen tips and roadside observation, not police radio.

Could terrorists use scanners to plan attacks?

Sophisticated terrorist organizations have resources well beyond consumer scanners. They can intercept encrypted communications, cultivate insider sources, and run counter-surveillance. Blanket encryption that eliminates public oversight while doing nothing to stop a determined adversary is security theater. Tactical operations already use encrypted channels when it matters.

The bottom line

Yes, some criminals have used police scanners. Some criminals also use public roads, cash, and cell phones. The question isn't whether a tool can be misused — it's whether the misuse is significant enough to justify eliminating a public transparency mechanism that serves journalists, researchers, and concerned citizens every day.

The evidence says no. Criminal scanner use is:

  • Rare — documented cases are mostly anecdotal
  • Ineffective — modern criminals have faster, easier tools
  • Already addressed — tactical channels protect sensitive operations
  • Not correlated with outcomes — no evidence encryption improves arrests or reduces crime

The "criminals use scanners" argument is a convenient justification for a policy choice driven by other concerns. It sounds plausible until you look at the evidence. When you do, it collapses.

Advertisement