Trunked Radio Systems Explained: A Complete Guide for Scanner Hobbyists

Trunked radio systems power most modern police, fire, and EMS communications. Understanding how they work helps you monitor effectively with your scanner and counter false claims that digital systems "require" encryption. This guide covers everything from basic concepts to advanced monitoring techniques.

What Is Trunking? Conventional vs. Trunked Radio

To understand trunked radio, you first need to understand what it replaced: conventional radio systems.

Conventional Radio: The Old Way

Traditional (conventional) radio systems assign specific frequencies to specific users. Your local fire department might always transmit on 154.280 MHz, while police use 155.475 MHz. Each agency owns their frequencies full-time, even when they're not actively transmitting.

Conventional Radio

  • Each agency has dedicated frequencies
  • Frequencies sit idle when not in use
  • Simple to monitor - tune to the frequency
  • Limited capacity as spectrum fills up
  • No computer coordination needed

Trunked Radio

  • Multiple agencies share frequency pools
  • Frequencies dynamically assigned as needed
  • Requires trunking scanner to follow
  • Much more efficient spectrum use
  • Computer controller coordinates everything

The Phone System Analogy

Think of It Like Phone Lines

Conventional radio is like everyone having their own dedicated phone line that only they can use. Expensive, and the line sits unused 90% of the time.

Trunked radio is like a modern phone system where everyone shares a pool of lines. When you make a call, the system automatically assigns an available line. When you hang up, that line becomes available for someone else. Same capability, much more efficient.

Why the Change Happened

Radio spectrum is a limited resource. As more agencies needed radio communications, the FCC couldn't keep assigning new frequencies. Trunking solved this by letting multiple agencies share the same frequencies efficiently. A pool of 20 frequencies can serve hundreds of talk groups because most aren't transmitting simultaneously.

Why Agencies Use Trunked Systems

Modern public safety agencies have largely moved to trunked systems for several compelling reasons:

Spectrum Efficiency

A 20-channel trunked system can handle traffic that would require 50+ conventional channels. This is especially important in urban areas where radio spectrum is congested.

Interoperability

Multiple agencies (police, fire, EMS, public works) can share one system and communicate across department boundaries when needed for mutual aid.

Digital Audio Quality

Modern trunked systems (especially P25) provide cleaner audio with less static and interference, improving communication reliability.

Advanced Features

Trunked systems support features like emergency alerts, radio ID tracking, GPS integration, and selective calling that conventional systems cannot provide.

Cost Sharing

Counties and regions can build one large trunked system serving all agencies, sharing infrastructure costs instead of each department building separate systems.

Scalability

Adding new users or talk groups doesn't require new frequencies - just programming changes. The system grows without new infrastructure.

Important Distinction

None of these benefits require encryption. All the advantages of trunked systems - efficiency, interoperability, digital quality - work perfectly in unencrypted mode. When officials claim encryption was "part of the upgrade," they're conflating two separate decisions.

How Trunking Works: Control Channels and Talk Groups

Understanding the mechanics of trunked radio helps you program your scanner correctly and appreciate why monitoring requires different equipment than conventional scanning.

Key Trunking Concepts

Control Channel

One frequency in the system dedicated to coordination. The control channel continuously transmits digital data telling all radios which frequencies are assigned to which talk groups at any given moment. Your scanner must monitor this to know where to tune.

Voice Channels

The remaining frequencies in the pool that carry actual voice communications. These get assigned dynamically - a frequency might carry police dispatch one minute, then fire tactical the next.

Talk Groups

Virtual channels that group related users. Instead of frequencies, users are assigned to talk groups like "Police Dispatch," "Fire Tactical," "EMS South." A large system might have hundreds of talk groups sharing a dozen frequencies.

System ID (SysID)

A unique identifier for each trunked system. Your scanner needs this to properly decode and follow the system. RadioReference provides SysIDs for most public safety systems.

Network Access Code (NAC)

A P25-specific code that identifies transmissions. Not encryption - just organization. Scanners use NAC to filter and identify talk groups.

Step-by-Step: How a Trunked Transmission Works

1

Officer Keys Microphone

The radio sends a digital request to the control channel: "Talk group 1001 wants to transmit."

2

Controller Assigns Channel

The system checks available voice frequencies and responds: "Use voice channel 3 at 851.2125 MHz."

3

All Radios in Talk Group Tune

Every radio monitoring talk group 1001 (including your scanner) automatically switches to the assigned frequency.

4

Transmission Occurs

The officer speaks, voice transmits on the assigned frequency.

5

Channel Released

When transmission ends, the frequency returns to the available pool. Next user might get the same frequency for a different talk group.

This all happens in milliseconds, continuously, with dozens of talk groups sharing the same frequencies. The control channel coordinates everything, which is why your scanner must monitor it constantly.

Common Trunking Protocols

Different manufacturers developed different trunking technologies. Knowing which protocol your local system uses determines what scanner features you need.

P25 (Project 25)

Most common for public safety

What It Is

Open standard developed for public safety interoperability. Ensures equipment from different manufacturers works together.

Phases

  • Phase I (FDMA): One voice channel per 12.5 kHz frequency. Compatible with analog infrastructure.
  • Phase II (TDMA): Two voice channels per 12.5 kHz frequency using time slots. Double the capacity, requires newer infrastructure.

Encryption Support

Supports AES-256 and DES encryption, but encryption is optional. Many systems run P25 in clear mode.

Scanner Support

Most modern digital scanners support P25 Phase I. Phase II requires higher-end models like SDS100/200 or Whistler TRX series.

Motorola Type II

Common legacy systems

What It Is

Motorola's proprietary analog trunking standard. Widely deployed starting in the 1990s, still operational in many areas.

Variations

  • Type I: Older, uses fleet/subfleet IDs
  • Type II: More common, uses simple talk group IDs
  • Type IIi Hybrid: Mix of Type I and II

Encryption Support

Limited encryption options compared to P25. Many Motorola systems are still unencrypted.

Scanner Support

Well supported by most trunking scanners. Even older models can track Motorola systems.

EDACS (GE/Ericsson)

Regional deployments

What It Is

Enhanced Digital Access Communications System, developed by GE (later Ericsson/Harris). Common in some regions.

Variations

  • Standard: Uses logical channel numbers (LCN)
  • Networked (SCAT): Multiple sites working together
  • ProVoice: EDACS with digital voice

Encryption Support

ProVoice versions support encryption. Standard EDACS is typically clear.

Scanner Support

Supported by most trunking scanners. ProVoice digital requires specific decoding capability.

LTR (Logic Trunked Radio)

Smaller systems, commercial

What It Is

Simpler trunking technology developed by E.F. Johnson. Often used by businesses and smaller agencies.

Characteristics

  • Simpler than Motorola or P25
  • Each repeater has home channel
  • Less common for major public safety

Encryption Support

Basic LTR doesn't support encryption. Newer versions (Passport) have options.

Scanner Support

Widely supported. Easier to program than more complex systems.

DMR (Digital Mobile Radio)

Growing in public safety

What It Is

European-origin digital standard gaining adoption. Uses TDMA like P25 Phase II but different protocol.

Tiers

  • Tier I: Unlicensed, consumer
  • Tier II: Conventional and trunked
  • Tier III: Trunked with advanced features

Encryption Support

Supports encryption but many systems run clear.

Scanner Support

Requires newer scanners. SDS100/200 and newer Whistlers support DMR decoding.

NXDN

Kenwood/Icom systems

What It Is

Digital standard developed by Kenwood and Icom. Uses very narrow bandwidth (6.25 kHz).

Characteristics

  • Very spectrum efficient
  • Supports both conventional and trunked
  • Less common than P25 for large systems

Encryption Support

Supports encryption, often optional.

Scanner Support

Requires modern scanners. SDS series and newer support NXDN.

How to Identify Your Local Protocol

Check RadioReference.com for your county. The database lists the system type for every trunked network, telling you exactly what scanner capabilities you need.

How Scanners Handle Trunked Systems

Trunking scanners work fundamentally differently than conventional scanners. Understanding this helps you program correctly and troubleshoot issues.

What a Trunking Scanner Does

  1. Monitors Control Channel

    The scanner continuously receives digital data from the control channel, decoding which frequencies are assigned to which talk groups.

  2. Filters for Your Talk Groups

    You program the scanner with which talk groups you want to hear. It ignores assignments to other talk groups.

  3. Rapid Frequency Hopping

    When your talk group becomes active, the scanner instantly tunes to the assigned voice frequency.

  4. Returns to Control

    After the transmission ends, the scanner returns to monitoring the control channel, ready for the next assignment.

  5. Handles Multiple Talk Groups

    Good scanners can track multiple talk groups across multiple systems simultaneously, intelligently prioritizing based on your settings.

Programming Basics

Unlike conventional scanning where you just enter frequencies, trunked programming requires:

  • System Type: P25, Motorola, EDACS, etc.
  • System ID: The unique identifier for the trunked system
  • Control Channel Frequencies: Often multiple for redundancy
  • Talk Group IDs: Which virtual channels you want to monitor
  • NAC/Color Codes: Additional identifiers for digital systems

Most modern scanners (SDS100, BCD436HP, etc.) support database programming where you enter your location and the scanner downloads all this information automatically from RadioReference.

Common Issues and Solutions

Missing Transmissions

Problem: Scanner doesn't hear some calls

Cause: Scanner tuned to one talk group when another became active

Solution: Prioritize important talk groups, reduce scan list, or use second scanner

Late Audio

Problem: Miss the first word of each transmission

Cause: Digital decode startup time

Solution: Some loss is normal with digital; ensure firmware is current

"Out of Range" Errors

Problem: Scanner can't track the system

Cause: Control channel signal too weak

Solution: Better antenna, outdoor antenna, or relocate scanner

Digital Noise/Garbled Audio

Problem: Hearing digital hash instead of voices

Cause: Could be encryption or wrong decode mode

Solution: Check RadioReference - if listed as encrypted, no solution exists

Trunking vs. Encryption: Completely Different Technologies

This distinction is critical for both scanner hobbyists and transparency advocates. Officials often deliberately conflate these terms to justify blocking public access.

Trunking

A method of sharing radio frequencies efficiently among multiple users.

  • Affects how frequencies are assigned
  • Requires trunking-capable scanner
  • Once you have proper scanner, audio is accessible
  • About efficiency and organization
=

Encryption

A method of scrambling audio so only authorized users can understand it.

  • Affects whether audio is understandable
  • No consumer scanner can decode
  • Blocks all public access regardless of equipment
  • About secrecy and access control

The Combinations That Exist

System Type Can Public Listen? Scanner Needed
Conventional Analog (Unencrypted) Yes Basic analog scanner
Conventional Digital (Unencrypted) Yes Digital-capable scanner
Trunked Analog (Unencrypted) Yes Trunking scanner
Trunked Digital P25 (Unencrypted) Yes P25 trunking scanner
Any System + Encryption No No consumer solution

The False Claim to Watch For

When departments say "We had to encrypt when we upgraded to a digital trunked system," they are either misinformed or deliberately misleading the public. P25 digital trunked systems work perfectly in clear mode. Encryption is always a policy choice, never a technical requirement.

Finding Your Local System's Talkgroups

Before buying a scanner or programming your existing one, research your local systems. This tells you what equipment you need and what you can expect to hear.

RadioReference: Your Primary Resource

RadioReference.com

The definitive database for scanner enthusiasts. Community-maintained with detailed information on virtually every public safety radio system in North America.

Step-by-Step: Finding Your System Info

  1. Go to RadioReference.com

    Navigate to the database section and find your state.

  2. Select Your County

    Click through to your county's page. You'll see sections for frequencies and trunked systems.

  3. Check the Trunked Systems Section

    If your area uses trunking, there will be a dedicated section with system name, type, and details.

  4. Note the System Type

    P25 Phase I? Phase II? Motorola Type II? This determines scanner requirements.

  5. Review Talk Groups

    The database lists all known talk groups with descriptions. Note which ones you want to monitor.

  6. Check Encryption Status

    RadioReference usually notes if talk groups are encrypted. Look for "E" flags or encryption warnings.

What to Look For

  • System ID (SysID, WACN): Unique identifier your scanner needs
  • Control Channel Frequencies: The frequencies your scanner monitors
  • NAC Codes: Network Access Codes for P25 systems
  • Talk Group IDs: Decimal numbers identifying each virtual channel
  • Encryption Notes: Warnings about which channels are encrypted
  • Site Information: For systems with multiple tower sites

Other Useful Resources

  • Broadcastify: If someone is streaming your area, you can listen before investing in equipment
  • OpenMHz: Crowdsourced P25 recording platform
  • Local scanner clubs: Forums and Facebook groups for your area
  • County/city websites: Sometimes publish radio system information

Equipment Needed for Trunked Scanning

Before purchasing: Check RadioReference for your area. If your local systems are encrypted, no scanner will help. If they're clear, choose based on the system type (P25 Phase I, Phase II, etc.).

Top Tier: Full Digital Trunking

For areas with P25 Phase II, DMR, or NXDN systems

Mid Tier: P25 Phase I + Older Digital

Great for most areas, doesn't support Phase II TDMA

Value Pick

Uniden BCD436HP

Solid P25 Phase I trunking scanner. HomePatrol-style database programming. Good choice if your area doesn't use Phase II.

Portable P25 Phase I $450-$550
Check Price on Amazon
Value Base

Uniden BCD536HP

Desktop version of the 436HP. Same P25 Phase I capability, better speaker and easier controls for home use.

Base/Mobile P25 Phase I $450-$550
Check Price on Amazon
Alternative

Whistler TRX-1

Whistler's portable trunking scanner. Good P25 Phase I performance at a lower price point than Uniden equivalents.

Portable P25 Phase I $350-$450
Check Price on Amazon

Budget/DIY: Software Defined Radio

Flexible and cheap, but requires technical knowledge

Tech Option

RTL-SDR Blog V4

USB radio receiver for your computer. With software like SDRTrunk, can decode P25 and other digital modes. Steep learning curve but incredibly flexible.

Requires Computer Software Dependent $35-$45
Check Price on Amazon

SDR is powerful but not plug-and-play. See our SDR Scanner Guide for details.

Don't Forget the Antenna

The antenna that comes with most scanners is adequate for nearby, strong signals. For trunked systems - especially if you're far from the tower sites - consider an aftermarket antenna. External mobile or base antennas dramatically improve reception.

See our Scanner Antenna Guide for recommendations.

Advocacy: Trunking Does Not Require Encryption

Understanding trunked radio technology is powerful advocacy ammunition. When officials make technical-sounding claims to justify encryption, you can counter with facts.

Common False Claims and Responses

False Claim: "We had to encrypt when we upgraded to digital"

Your Response:

"P25 digital systems fully support unencrypted 'clear mode' operation. The choice to encrypt was a policy decision by department leadership, not a technical requirement. Can you provide documentation from your radio vendor stating encryption was mandatory?"

False Claim: "Modern trunked systems can't operate without encryption"

Your Response:

"That's technically incorrect. Hundreds of police departments nationwide use P25 trunked systems in clear mode. The P25 standard specifically includes unencrypted operation. Which specific system supposedly requires encryption? I can research the specifications."

False Claim: "Scanner users can't follow trunked systems anyway"

Your Response:

"Trunking scanners have existed since the 1990s. Modern digital scanners track trunked systems automatically. Broadcastify streams thousands of trunked systems to millions of listeners. The technology is mature and widely available - encryption is the only barrier."

False Claim: "The FCC requires encryption for P25 systems"

Your Response:

"The FCC has no encryption mandate. In fact, the Communications Act protects the public's right to receive radio transmissions. The FCC licenses frequencies for public safety use - it doesn't dictate encryption policy. That's entirely a local decision."

Key Advocacy Points

"Digital Does Not Mean Encrypted"

These are completely separate technologies. Digital improves audio quality; encryption blocks access. One doesn't require the other.

"Transparency-Compatible Options Exist"

Selective encryption allows tactical channels to be protected while keeping routine dispatch open. This isn't all-or-nothing.

"Ask for Documentation"

Request written documentation from the radio vendor stating encryption is technically required. It doesn't exist because it isn't required.

"The Decision Deserves Public Input"

If encryption is a policy choice rather than technical requirement, that policy should be made with public input, not unilaterally by police administration.

Resources and Links

Database and Reference

Technical Standards

Software Tools

Related Guides

Frequently Asked Questions

What is a trunked radio system?

A trunked radio system is a two-way radio communications network where multiple users and agencies share a pool of radio frequencies dynamically. Instead of each agency having dedicated frequencies that sit idle when not in use, a computer controller assigns available channels as conversations occur, making much more efficient use of limited radio spectrum.

What's the difference between conventional and trunked radio?

Conventional radio assigns a specific frequency to each user or department permanently - they always use that channel. Trunked systems share frequencies among many users, with a computer automatically assigning available channels when needed. Think of conventional as having your own dedicated phone line versus trunked being like a modern phone system where everyone shares lines efficiently.

Does trunked radio automatically mean encrypted?

No, absolutely not. Trunked and encrypted are completely separate technologies. A trunked system can operate in clear (unencrypted) mode, allowing anyone with a compatible scanner to listen. Encryption is an additional feature that agencies must specifically enable and often pay extra for. Many agencies use trunked systems without encryption.

Can I listen to trunked radio systems with a regular scanner?

No, you need a trunking-capable scanner. These scanners can monitor the control channel, decode which frequencies are being assigned to which talk groups, and rapidly hop between frequencies to follow conversations. Modern digital trunking scanners like the Uniden SDS100 or Whistler TRX-1 handle this automatically.

What is a talk group?

A talk group is a virtual channel or logical grouping within a trunked system. Instead of assigning frequencies, agencies assign talk groups - like 'Police Dispatch,' 'Fire Tactical,' or 'EMS North.' When someone transmits on a talk group, the system assigns an available frequency and all radios monitoring that talk group automatically tune to it.

What is P25?

P25 (Project 25) is a digital radio standard developed for public safety in North America. It ensures interoperability between different manufacturers' equipment. P25 supports both Phase I (one conversation per channel) and Phase II (two conversations per channel using TDMA). P25 can operate encrypted or unencrypted - encryption is optional.

How do I find my local trunked system's talk groups?

RadioReference.com is the definitive resource. Search for your county or city, and you'll find detailed information about local trunked systems including system IDs, frequencies, and talk group lists. The community continuously updates this database with accurate programming information.

Why did my local department encrypt if they already had a trunked system?

Encryption and trunking are separate decisions. Departments often claim encryption was 'required' when upgrading to digital trunked systems, but this is false - P25 and other digital trunked systems work perfectly in unencrypted mode. The decision to encrypt is a policy choice, often made to avoid public oversight rather than for any technical necessity.

Take Action for Transparency

Your voice matters. Here are concrete ways to advocate for open police communications in your community.

📧

Contact Your Representatives

Use our templates to email your local officials about police radio encryption policies.

Get Started
📚

Read Case Studies

See how encryption has affected real communities - from Highland Park to Chicago.

View Cases
📢

Spread Awareness

Share evidence about police radio encryption with your network and community.

📊

See the Evidence

Review the facts, myths, and research on police radio encryption.

View Evidence
🎤

Public Testimony

Learn how to speak effectively at city council and public safety meetings.

Prepare to Speak
📥

Download Resources

Get FOIA templates, talking points, and materials for advocacy.

Access Toolkit