The concern is real

Victim privacy matters. Domestic violence survivors, sexual assault victims, and other vulnerable people deserve protection. Nobody disputes that.

When police departments argue for encryption on victim privacy grounds, they're appealing to something genuine. The question is whether blanket encryption is the right tool β€” and whether it actually does what supporters claim.

The claim

"Without encryption, victim information is broadcast publicly. Abusers could monitor scanners to track when police respond to their victims. Encryption prevents criminals from using police communications against the very people police are trying to help."

What the evidence shows

πŸ“»

Current protocols already protect privacy

Professional police departments stopped broadcasting victim names over radio decades ago. Modern radio traffic uses:

  • Address-only dispatches ("Respond to 123 Oak Street")
  • Call type codes (10-codes or numeric codes)
  • Unit numbers rather than personal information
  • Mobile data terminals (MDTs) for sensitive details

When departments cite "victim privacy" as a reason for encryption, they're describing a problem that competent departments solved years before digital encryption existed.

πŸ“Š

No documented cases

Police scanning has been freely available for more than 70 years. In that time, there is no documented pattern of:

  • Abusers using scanners to track victim locations
  • Criminals intercepting victim information from radio traffic
  • Victims being harmed because their calls were broadcast

Seven decades of open radio access. If scanner monitoring genuinely threatened victims, we'd have documented cases by now. We don't.

βš–οΈ

Encryption removes accountability

What encryption actually does is prevent oversight of how police respond to victim calls:

  • Did officers respond promptly to a domestic violence call?
  • Was the victim taken seriously by dispatchers?
  • Did police follow up appropriately?
  • Were there warning signs that were missed?

When journalists, advocates, and researchers can't monitor police communications, they can't document failures that put victims at risk. Encryption shields police from accountability for how they handle the very calls it claims to protect.

The scenario that never happens

The victim privacy argument rests on a specific scenario: an abuser monitoring police scanners to track when officers respond to their victim. Here's what that would actually require.

1

Own and operate a police scanner

The abuser must acquire equipment and learn to use it

2

Know the victim's exact address

Required to recognize relevant radio traffic among hundreds of daily calls

3

Monitor continuously

Must be actively listening at the exact moment the victim calls police

4

Reach the location before police

Must travel to the address and arrive before responding officers do

5

Avoid detection

Must do all this without being spotted by the officers responding to the call

This scenario β€” requiring a scanner, continuous monitoring, precise timing, and faster movement than responding police β€” has produced zero documented cases in decades of open scanner access.

The documented threats to victim safety are different: slow police response, failure to take reports seriously, inadequate follow-up, and dismissal of victim concerns. Encryption makes all of those problems harder to identify and address.

What actually endangers victims

Victim safety advocacy should focus on documented harms, not theoretical scenarios. The evidence on what actually puts victims at risk is not ambiguous.

Documented and ongoing

  • Slow police response times Officers arriving too late to prevent harm
  • Dismissive treatment of victims Reports not taken, concerns minimized
  • Failure to enforce restraining orders Known protection orders ignored
  • Inadequate investigation Cases closed without proper follow-up
  • Re-traumatization during reporting Victims blamed or disbelieved

Theoretical and undocumented

  • Scanner-based victim tracking No verified cases in 70+ years
  • Criminal exploitation of radio traffic Theoretical scenario, no evidence
  • Identity exposure via broadcast Addressed by existing protocols

Encryption addresses the theoretical column while making the documented column impossible to monitor or address. Journalists can't track police response to DV calls. Advocates can't document patterns of dismissive treatment. Researchers can't analyze response times. Victims lose the accountability mechanisms that actually protect them.

When accountability changed outcomes

Buffalo, New York: open scanner access exposed a disparity

In 2016, investigative journalists in Buffalo, New York used scanner access and records requests to document a clear pattern: domestic violence calls in certain neighborhoods received significantly slower police response than identical calls in wealthier areas.

That reporting led to:

  • Policy changes prioritizing DV response
  • Reallocation of patrol resources
  • Improved response times in underserved areas
  • Public awareness of systemic disparities

Under encryption, this disparity stays hidden. Victims in those neighborhoods receive slower response, with no way for anyone outside the department to document or challenge it.

The proportionality problem

Even granting some theoretical risk from scanner access, blanket encryption is a wildly disproportionate response.

The "problem"

Theoretical risk of abusers monitoring scanners (zero documented cases in 70 years)

β†’

The "solution"

Encrypt all police communications, eliminating oversight for all calls β€” victim safety, journalist access, community awareness, everything

It's like banning all windows in houses because a burglar might theoretically look inside. The theoretical benefit doesn't come close to justifying the cost to transparency and accountability.

What actually protects victims

If victim protection is the genuine goal, there are approaches that work without eliminating public oversight.

MDT-based sensitive information

Personal details transmitted via encrypted mobile data terminals, not voice radio. Protects victim information while keeping tactical communications auditable.

Already standard practice

Address-only dispatching

Calls dispatched by location and code, not victim name. "Respond to a 10-16 at 123 Oak Street" reveals nothing about the caller's identity.

Already standard practice

Delayed public access

Brief delays (5–15 minutes) on public feeds, with real-time access maintained for credentialed media. Balances safety concerns with accountability.

Viable alternative

Actual investment in victim services

Victim advocates, faster response times, better dispatcher training. These actually protect victims, rather than protecting departments from scrutiny.

Best practice

A question worth asking

The victim privacy argument asks for a trade: give up accountability for police handling of victim calls in exchange for theoretical protection from scenarios that have never been documented.

If encryption truly protected victims, why did victim advocacy organizations largely oppose or remain silent on police encryption initiatives?

Organizations that work with domestic violence survivors and sexual assault victims know that police accountability is central to victim safety. The danger isn't scanner-monitoring criminals β€” it's police departments that fail to respond appropriately, and the inability of anyone outside the department to document those failures.

Victim privacy is important. It's already protected by existing protocols. Blanket encryption doesn't add victim protection β€” it removes police accountability for how victim calls are handled.

That's not victim advocacy. That's institutional self-protection marketed as compassion.

Frequently asked questions

Doesn't police encryption protect domestic violence victims?

Current radio protocols already protect victim identity through address-only dispatches and coded language. Encryption doesn't add protection β€” it removes accountability for how officers handle these calls. The real danger to DV victims comes from poor police response, which encryption makes impossible to monitor or document.

What about broadcasting victim names over the radio?

Professional police departments stopped broadcasting victim names decades ago. Radio traffic uses addresses, unit numbers, and call codes. There is no epidemic of victims being harmed because their names appeared in scanner traffic β€” that simply isn't how modern police radio works. The argument misrepresents current practice.

Can't criminals use scanners to track victim locations?

That scenario requires someone to own a scanner, know the victim's address to recognize relevant traffic among hundreds of daily calls, monitor continuously, and then reach the location before police do. There are no documented cases of this happening. Meanwhile, encryption definitively prevents journalists from documenting police failures to protect victims.

Why do advocates oppose encryption if it might protect even one victim?

Because encryption demonstrably harms victims by eliminating oversight. When police fail to respond, arrive late, or mishandle calls, no one finds out. The theoretical benefit β€” unproven victim protection from a scenario that has never been documented β€” doesn't justify the concrete harm of removing accountability for the very calls encryption claims to protect.

Advertisement