The Victim Privacy Argument: Examined
"We need encryption to protect victim privacy." It sounds compelling, even compassionate. But does encryption actually protect victims, or does it protect police from scrutiny of how they handle victim calls?
The concern is real
Victim privacy matters. Domestic violence survivors, sexual assault victims, and other vulnerable people deserve protection. Nobody disputes that.
When police departments argue for encryption on victim privacy grounds, they're appealing to something genuine. The question is whether blanket encryption is the right tool β and whether it actually does what supporters claim.
The claim
"Without encryption, victim information is broadcast publicly. Abusers could monitor scanners to track when police respond to their victims. Encryption prevents criminals from using police communications against the very people police are trying to help."
What the evidence shows
Current protocols already protect privacy
Professional police departments stopped broadcasting victim names over radio decades ago. Modern radio traffic uses:
- Address-only dispatches ("Respond to 123 Oak Street")
- Call type codes (10-codes or numeric codes)
- Unit numbers rather than personal information
- Mobile data terminals (MDTs) for sensitive details
When departments cite "victim privacy" as a reason for encryption, they're describing a problem that competent departments solved years before digital encryption existed.
No documented cases
Police scanning has been freely available for more than 70 years. In that time, there is no documented pattern of:
- Abusers using scanners to track victim locations
- Criminals intercepting victim information from radio traffic
- Victims being harmed because their calls were broadcast
Seven decades of open radio access. If scanner monitoring genuinely threatened victims, we'd have documented cases by now. We don't.
Encryption removes accountability
What encryption actually does is prevent oversight of how police respond to victim calls:
- Did officers respond promptly to a domestic violence call?
- Was the victim taken seriously by dispatchers?
- Did police follow up appropriately?
- Were there warning signs that were missed?
When journalists, advocates, and researchers can't monitor police communications, they can't document failures that put victims at risk. Encryption shields police from accountability for how they handle the very calls it claims to protect.
The scenario that never happens
The victim privacy argument rests on a specific scenario: an abuser monitoring police scanners to track when officers respond to their victim. Here's what that would actually require.
Own and operate a police scanner
The abuser must acquire equipment and learn to use it
Know the victim's exact address
Required to recognize relevant radio traffic among hundreds of daily calls
Monitor continuously
Must be actively listening at the exact moment the victim calls police
Reach the location before police
Must travel to the address and arrive before responding officers do
Avoid detection
Must do all this without being spotted by the officers responding to the call
This scenario β requiring a scanner, continuous monitoring, precise timing, and faster movement than responding police β has produced zero documented cases in decades of open scanner access.
The documented threats to victim safety are different: slow police response, failure to take reports seriously, inadequate follow-up, and dismissal of victim concerns. Encryption makes all of those problems harder to identify and address.
What actually endangers victims
Victim safety advocacy should focus on documented harms, not theoretical scenarios. The evidence on what actually puts victims at risk is not ambiguous.
Documented and ongoing
- Slow police response times Officers arriving too late to prevent harm
- Dismissive treatment of victims Reports not taken, concerns minimized
- Failure to enforce restraining orders Known protection orders ignored
- Inadequate investigation Cases closed without proper follow-up
- Re-traumatization during reporting Victims blamed or disbelieved
Theoretical and undocumented
- Scanner-based victim tracking No verified cases in 70+ years
- Criminal exploitation of radio traffic Theoretical scenario, no evidence
- Identity exposure via broadcast Addressed by existing protocols
Encryption addresses the theoretical column while making the documented column impossible to monitor or address. Journalists can't track police response to DV calls. Advocates can't document patterns of dismissive treatment. Researchers can't analyze response times. Victims lose the accountability mechanisms that actually protect them.
When accountability changed outcomes
Buffalo, New York: open scanner access exposed a disparity
In 2016, investigative journalists in Buffalo, New York used scanner access and records requests to document a clear pattern: domestic violence calls in certain neighborhoods received significantly slower police response than identical calls in wealthier areas.
That reporting led to:
- Policy changes prioritizing DV response
- Reallocation of patrol resources
- Improved response times in underserved areas
- Public awareness of systemic disparities
Under encryption, this disparity stays hidden. Victims in those neighborhoods receive slower response, with no way for anyone outside the department to document or challenge it.
The proportionality problem
Even granting some theoretical risk from scanner access, blanket encryption is a wildly disproportionate response.
The "problem"
Theoretical risk of abusers monitoring scanners (zero documented cases in 70 years)
The "solution"
Encrypt all police communications, eliminating oversight for all calls β victim safety, journalist access, community awareness, everything
It's like banning all windows in houses because a burglar might theoretically look inside. The theoretical benefit doesn't come close to justifying the cost to transparency and accountability.
What actually protects victims
If victim protection is the genuine goal, there are approaches that work without eliminating public oversight.
MDT-based sensitive information
Personal details transmitted via encrypted mobile data terminals, not voice radio. Protects victim information while keeping tactical communications auditable.
Already standard practiceAddress-only dispatching
Calls dispatched by location and code, not victim name. "Respond to a 10-16 at 123 Oak Street" reveals nothing about the caller's identity.
Already standard practiceDelayed public access
Brief delays (5β15 minutes) on public feeds, with real-time access maintained for credentialed media. Balances safety concerns with accountability.
Viable alternativeActual investment in victim services
Victim advocates, faster response times, better dispatcher training. These actually protect victims, rather than protecting departments from scrutiny.
Best practiceA question worth asking
The victim privacy argument asks for a trade: give up accountability for police handling of victim calls in exchange for theoretical protection from scenarios that have never been documented.
If encryption truly protected victims, why did victim advocacy organizations largely oppose or remain silent on police encryption initiatives?
Organizations that work with domestic violence survivors and sexual assault victims know that police accountability is central to victim safety. The danger isn't scanner-monitoring criminals β it's police departments that fail to respond appropriately, and the inability of anyone outside the department to document those failures.
Victim privacy is important. It's already protected by existing protocols. Blanket encryption doesn't add victim protection β it removes police accountability for how victim calls are handled.
That's not victim advocacy. That's institutional self-protection marketed as compassion.
Frequently asked questions
Doesn't police encryption protect domestic violence victims?
Current radio protocols already protect victim identity through address-only dispatches and coded language. Encryption doesn't add protection β it removes accountability for how officers handle these calls. The real danger to DV victims comes from poor police response, which encryption makes impossible to monitor or document.
What about broadcasting victim names over the radio?
Professional police departments stopped broadcasting victim names decades ago. Radio traffic uses addresses, unit numbers, and call codes. There is no epidemic of victims being harmed because their names appeared in scanner traffic β that simply isn't how modern police radio works. The argument misrepresents current practice.
Can't criminals use scanners to track victim locations?
That scenario requires someone to own a scanner, know the victim's address to recognize relevant traffic among hundreds of daily calls, monitor continuously, and then reach the location before police do. There are no documented cases of this happening. Meanwhile, encryption definitively prevents journalists from documenting police failures to protect victims.
Why do advocates oppose encryption if it might protect even one victim?
Because encryption demonstrably harms victims by eliminating oversight. When police fail to respond, arrive late, or mishandle calls, no one finds out. The theoretical benefit β unproven victim protection from a scenario that has never been documented β doesn't justify the concrete harm of removing accountability for the very calls encryption claims to protect.