Trunked Radio Systems Explained: A Complete Guide for Scanner Hobbyists
Trunked radio systems power most modern police, fire, and EMS communications. Understanding how they work helps you monitor effectively with your scanner and counter false claims that digital systems "require" encryption. This guide covers everything from basic concepts to advanced monitoring techniques.
What Is Trunking? Conventional vs. Trunked Radio
To understand trunked radio, you first need to understand what it replaced: conventional radio systems.
Conventional Radio: The Old Way
Traditional (conventional) radio systems assign specific frequencies to specific users. Your local fire department might always transmit on 154.280 MHz, while police use 155.475 MHz. Each agency owns their frequencies full-time, even when they're not actively transmitting.
Conventional Radio
- Each agency has dedicated frequencies
- Frequencies sit idle when not in use
- Simple to monitor - tune to the frequency
- Limited capacity as spectrum fills up
- No computer coordination needed
Trunked Radio
- Multiple agencies share frequency pools
- Frequencies dynamically assigned as needed
- Requires trunking scanner to follow
- Much more efficient spectrum use
- Computer controller coordinates everything
The Phone System Analogy
Think of It Like Phone Lines
Conventional radio is like everyone having their own dedicated phone line that only they can use. Expensive, and the line sits unused 90% of the time.
Trunked radio is like a modern phone system where everyone shares a pool of lines. When you make a call, the system automatically assigns an available line. When you hang up, that line becomes available for someone else. Same capability, much more efficient.
Why the Change Happened
Radio spectrum is a limited resource. As more agencies needed radio communications, the FCC couldn't keep assigning new frequencies. Trunking solved this by letting multiple agencies share the same frequencies efficiently. A pool of 20 frequencies can serve hundreds of talk groups because most aren't transmitting simultaneously.
Why Agencies Use Trunked Systems
Modern public safety agencies have largely moved to trunked systems for several compelling reasons:
Spectrum Efficiency
A 20-channel trunked system can handle traffic that would require 50+ conventional channels. This is especially important in urban areas where radio spectrum is congested.
Interoperability
Multiple agencies (police, fire, EMS, public works) can share one system and communicate across department boundaries when needed for mutual aid.
Digital Audio Quality
Modern trunked systems (especially P25) provide cleaner audio with less static and interference, improving communication reliability.
Advanced Features
Trunked systems support features like emergency alerts, radio ID tracking, GPS integration, and selective calling that conventional systems cannot provide.
Cost Sharing
Counties and regions can build one large trunked system serving all agencies, sharing infrastructure costs instead of each department building separate systems.
Scalability
Adding new users or talk groups doesn't require new frequencies - just programming changes. The system grows without new infrastructure.
Important Distinction
None of these benefits require encryption. All the advantages of trunked systems - efficiency, interoperability, digital quality - work perfectly in unencrypted mode. When officials claim encryption was "part of the upgrade," they're conflating two separate decisions.
How Trunking Works: Control Channels and Talk Groups
Understanding the mechanics of trunked radio helps you program your scanner correctly and appreciate why monitoring requires different equipment than conventional scanning.
Key Trunking Concepts
Control Channel
One frequency in the system dedicated to coordination. The control channel continuously transmits digital data telling all radios which frequencies are assigned to which talk groups at any given moment. Your scanner must monitor this to know where to tune.
Voice Channels
The remaining frequencies in the pool that carry actual voice communications. These get assigned dynamically - a frequency might carry police dispatch one minute, then fire tactical the next.
Talk Groups
Virtual channels that group related users. Instead of frequencies, users are assigned to talk groups like "Police Dispatch," "Fire Tactical," "EMS South." A large system might have hundreds of talk groups sharing a dozen frequencies.
System ID (SysID)
A unique identifier for each trunked system. Your scanner needs this to properly decode and follow the system. RadioReference provides SysIDs for most public safety systems.
Network Access Code (NAC)
A P25-specific code that identifies transmissions. Not encryption - just organization. Scanners use NAC to filter and identify talk groups.
Step-by-Step: How a Trunked Transmission Works
Officer Keys Microphone
The radio sends a digital request to the control channel: "Talk group 1001 wants to transmit."
Controller Assigns Channel
The system checks available voice frequencies and responds: "Use voice channel 3 at 851.2125 MHz."
All Radios in Talk Group Tune
Every radio monitoring talk group 1001 (including your scanner) automatically switches to the assigned frequency.
Transmission Occurs
The officer speaks, voice transmits on the assigned frequency.
Channel Released
When transmission ends, the frequency returns to the available pool. Next user might get the same frequency for a different talk group.
This all happens in milliseconds, continuously, with dozens of talk groups sharing the same frequencies. The control channel coordinates everything, which is why your scanner must monitor it constantly.
Common Trunking Protocols
Different manufacturers developed different trunking technologies. Knowing which protocol your local system uses determines what scanner features you need.
P25 (Project 25)
Most common for public safety
What It Is
Open standard developed for public safety interoperability. Ensures equipment from different manufacturers works together.
Phases
- Phase I (FDMA): One voice channel per 12.5 kHz frequency. Compatible with analog infrastructure.
- Phase II (TDMA): Two voice channels per 12.5 kHz frequency using time slots. Double the capacity, requires newer infrastructure.
Encryption Support
Supports AES-256 and DES encryption, but encryption is optional. Many systems run P25 in clear mode.
Scanner Support
Most modern digital scanners support P25 Phase I. Phase II requires higher-end models like SDS100/200 or Whistler TRX series.
Motorola Type II
Common legacy systems
What It Is
Motorola's proprietary analog trunking standard. Widely deployed starting in the 1990s, still operational in many areas.
Variations
- Type I: Older, uses fleet/subfleet IDs
- Type II: More common, uses simple talk group IDs
- Type IIi Hybrid: Mix of Type I and II
Encryption Support
Limited encryption options compared to P25. Many Motorola systems are still unencrypted.
Scanner Support
Well supported by most trunking scanners. Even older models can track Motorola systems.
EDACS (GE/Ericsson)
Regional deployments
What It Is
Enhanced Digital Access Communications System, developed by GE (later Ericsson/Harris). Common in some regions.
Variations
- Standard: Uses logical channel numbers (LCN)
- Networked (SCAT): Multiple sites working together
- ProVoice: EDACS with digital voice
Encryption Support
ProVoice versions support encryption. Standard EDACS is typically clear.
Scanner Support
Supported by most trunking scanners. ProVoice digital requires specific decoding capability.
LTR (Logic Trunked Radio)
Smaller systems, commercial
What It Is
Simpler trunking technology developed by E.F. Johnson. Often used by businesses and smaller agencies.
Characteristics
- Simpler than Motorola or P25
- Each repeater has home channel
- Less common for major public safety
Encryption Support
Basic LTR doesn't support encryption. Newer versions (Passport) have options.
Scanner Support
Widely supported. Easier to program than more complex systems.
DMR (Digital Mobile Radio)
Growing in public safety
What It Is
European-origin digital standard gaining adoption. Uses TDMA like P25 Phase II but different protocol.
Tiers
- Tier I: Unlicensed, consumer
- Tier II: Conventional and trunked
- Tier III: Trunked with advanced features
Encryption Support
Supports encryption but many systems run clear.
Scanner Support
Requires newer scanners. SDS100/200 and newer Whistlers support DMR decoding.
NXDN
Kenwood/Icom systems
What It Is
Digital standard developed by Kenwood and Icom. Uses very narrow bandwidth (6.25 kHz).
Characteristics
- Very spectrum efficient
- Supports both conventional and trunked
- Less common than P25 for large systems
Encryption Support
Supports encryption, often optional.
Scanner Support
Requires modern scanners. SDS series and newer support NXDN.
How to Identify Your Local Protocol
Check RadioReference.com for your county. The database lists the system type for every trunked network, telling you exactly what scanner capabilities you need.
How Scanners Handle Trunked Systems
Trunking scanners work fundamentally differently than conventional scanners. Understanding this helps you program correctly and troubleshoot issues.
What a Trunking Scanner Does
- Monitors Control Channel
The scanner continuously receives digital data from the control channel, decoding which frequencies are assigned to which talk groups.
- Filters for Your Talk Groups
You program the scanner with which talk groups you want to hear. It ignores assignments to other talk groups.
- Rapid Frequency Hopping
When your talk group becomes active, the scanner instantly tunes to the assigned voice frequency.
- Returns to Control
After the transmission ends, the scanner returns to monitoring the control channel, ready for the next assignment.
- Handles Multiple Talk Groups
Good scanners can track multiple talk groups across multiple systems simultaneously, intelligently prioritizing based on your settings.
Programming Basics
Unlike conventional scanning where you just enter frequencies, trunked programming requires:
- System Type: P25, Motorola, EDACS, etc.
- System ID: The unique identifier for the trunked system
- Control Channel Frequencies: Often multiple for redundancy
- Talk Group IDs: Which virtual channels you want to monitor
- NAC/Color Codes: Additional identifiers for digital systems
Most modern scanners (SDS100, BCD436HP, etc.) support database programming where you enter your location and the scanner downloads all this information automatically from RadioReference.
Common Issues and Solutions
Missing Transmissions
Problem: Scanner doesn't hear some calls
Cause: Scanner tuned to one talk group when another became active
Solution: Prioritize important talk groups, reduce scan list, or use second scanner
Late Audio
Problem: Miss the first word of each transmission
Cause: Digital decode startup time
Solution: Some loss is normal with digital; ensure firmware is current
"Out of Range" Errors
Problem: Scanner can't track the system
Cause: Control channel signal too weak
Solution: Better antenna, outdoor antenna, or relocate scanner
Digital Noise/Garbled Audio
Problem: Hearing digital hash instead of voices
Cause: Could be encryption or wrong decode mode
Solution: Check RadioReference - if listed as encrypted, no solution exists
Trunking vs. Encryption: Completely Different Technologies
This distinction is critical for both scanner hobbyists and transparency advocates. Officials often deliberately conflate these terms to justify blocking public access.
Trunking
A method of sharing radio frequencies efficiently among multiple users.
- Affects how frequencies are assigned
- Requires trunking-capable scanner
- Once you have proper scanner, audio is accessible
- About efficiency and organization
Encryption
A method of scrambling audio so only authorized users can understand it.
- Affects whether audio is understandable
- No consumer scanner can decode
- Blocks all public access regardless of equipment
- About secrecy and access control
The Combinations That Exist
| System Type | Can Public Listen? | Scanner Needed |
|---|---|---|
| Conventional Analog (Unencrypted) | Yes | Basic analog scanner |
| Conventional Digital (Unencrypted) | Yes | Digital-capable scanner |
| Trunked Analog (Unencrypted) | Yes | Trunking scanner |
| Trunked Digital P25 (Unencrypted) | Yes | P25 trunking scanner |
| Any System + Encryption | No | No consumer solution |
The False Claim to Watch For
When departments say "We had to encrypt when we upgraded to a digital trunked system," they are either misinformed or deliberately misleading the public. P25 digital trunked systems work perfectly in clear mode. Encryption is always a policy choice, never a technical requirement.
Finding Your Local System's Talkgroups
Before buying a scanner or programming your existing one, research your local systems. This tells you what equipment you need and what you can expect to hear.
RadioReference: Your Primary Resource
RadioReference.com
The definitive database for scanner enthusiasts. Community-maintained with detailed information on virtually every public safety radio system in North America.
Step-by-Step: Finding Your System Info
- Go to RadioReference.com
Navigate to the database section and find your state.
- Select Your County
Click through to your county's page. You'll see sections for frequencies and trunked systems.
- Check the Trunked Systems Section
If your area uses trunking, there will be a dedicated section with system name, type, and details.
- Note the System Type
P25 Phase I? Phase II? Motorola Type II? This determines scanner requirements.
- Review Talk Groups
The database lists all known talk groups with descriptions. Note which ones you want to monitor.
- Check Encryption Status
RadioReference usually notes if talk groups are encrypted. Look for "E" flags or encryption warnings.
What to Look For
- System ID (SysID, WACN): Unique identifier your scanner needs
- Control Channel Frequencies: The frequencies your scanner monitors
- NAC Codes: Network Access Codes for P25 systems
- Talk Group IDs: Decimal numbers identifying each virtual channel
- Encryption Notes: Warnings about which channels are encrypted
- Site Information: For systems with multiple tower sites
Other Useful Resources
- Broadcastify: If someone is streaming your area, you can listen before investing in equipment
- OpenMHz: Crowdsourced P25 recording platform
- Local scanner clubs: Forums and Facebook groups for your area
- County/city websites: Sometimes publish radio system information
Equipment Needed for Trunked Scanning
Before purchasing: Check RadioReference for your area. If your local systems are encrypted, no scanner will help. If they're clear, choose based on the system type (P25 Phase I, Phase II, etc.).
Top Tier: Full Digital Trunking
For areas with P25 Phase II, DMR, or NXDN systems
Uniden SDS100
Best portable scanner available. P25 Phase I/II, DMR, NXDN, plus all analog and older digital modes. GPS for location-based scanning.
Uniden SDS200
Same capabilities as SDS100 in a desktop form factor. Better audio, easier to program, excellent for home monitoring.
Mid Tier: P25 Phase I + Older Digital
Great for most areas, doesn't support Phase II TDMA
Uniden BCD436HP
Solid P25 Phase I trunking scanner. HomePatrol-style database programming. Good choice if your area doesn't use Phase II.
Uniden BCD536HP
Desktop version of the 436HP. Same P25 Phase I capability, better speaker and easier controls for home use.
Whistler TRX-1
Whistler's portable trunking scanner. Good P25 Phase I performance at a lower price point than Uniden equivalents.
Budget/DIY: Software Defined Radio
Flexible and cheap, but requires technical knowledge
RTL-SDR Blog V4
USB radio receiver for your computer. With software like SDRTrunk, can decode P25 and other digital modes. Steep learning curve but incredibly flexible.
SDR is powerful but not plug-and-play. See our SDR Scanner Guide for details.
Don't Forget the Antenna
The antenna that comes with most scanners is adequate for nearby, strong signals. For trunked systems - especially if you're far from the tower sites - consider an aftermarket antenna. External mobile or base antennas dramatically improve reception.
See our Scanner Antenna Guide for recommendations.
Advocacy: Trunking Does Not Require Encryption
Understanding trunked radio technology is powerful advocacy ammunition. When officials make technical-sounding claims to justify encryption, you can counter with facts.
Common False Claims and Responses
False Claim: "We had to encrypt when we upgraded to digital"
Your Response:
"P25 digital systems fully support unencrypted 'clear mode' operation. The choice to encrypt was a policy decision by department leadership, not a technical requirement. Can you provide documentation from your radio vendor stating encryption was mandatory?"
False Claim: "Modern trunked systems can't operate without encryption"
Your Response:
"That's technically incorrect. Hundreds of police departments nationwide use P25 trunked systems in clear mode. The P25 standard specifically includes unencrypted operation. Which specific system supposedly requires encryption? I can research the specifications."
False Claim: "Scanner users can't follow trunked systems anyway"
Your Response:
"Trunking scanners have existed since the 1990s. Modern digital scanners track trunked systems automatically. Broadcastify streams thousands of trunked systems to millions of listeners. The technology is mature and widely available - encryption is the only barrier."
False Claim: "The FCC requires encryption for P25 systems"
Your Response:
"The FCC has no encryption mandate. In fact, the Communications Act protects the public's right to receive radio transmissions. The FCC licenses frequencies for public safety use - it doesn't dictate encryption policy. That's entirely a local decision."
Key Advocacy Points
"Digital Does Not Mean Encrypted"
These are completely separate technologies. Digital improves audio quality; encryption blocks access. One doesn't require the other.
"Transparency-Compatible Options Exist"
Selective encryption allows tactical channels to be protected while keeping routine dispatch open. This isn't all-or-nothing.
"Ask for Documentation"
Request written documentation from the radio vendor stating encryption is technically required. It doesn't exist because it isn't required.
"The Decision Deserves Public Input"
If encryption is a policy choice rather than technical requirement, that policy should be made with public input, not unilaterally by police administration.
Resources and Links
Database and Reference
- RadioReference.com - Comprehensive frequency and trunked system database
- RadioReference Wiki - Technical documentation and tutorials
- Broadcastify - Live scanner streams, test before you buy
- OpenMHz - Crowdsourced P25 recordings
Technical Standards
- CISA P25 Compliance Assessment Program - Official P25 standards
- P25 Wiki Documentation - Community technical docs
- Motorola Type II Wiki - Legacy trunking reference
Software Tools
- FreeSCAN - Uniden scanner programming software
- SDRTrunk - Free P25/DMR decoder for SDR
- ScannerMaster - Programming cables and software
Related Guides
- How Police Scanners Work - Foundational scanner knowledge
- P25 Radio Explained - Deep dive into P25
- SDR Scanner Guide - Software-defined radio approach
- Best Scanners for Beginners - Buying guide
- Scanner Programming Guide - Setup tutorials
Frequently Asked Questions
What is a trunked radio system?
A trunked radio system is a two-way radio communications network where multiple users and agencies share a pool of radio frequencies dynamically. Instead of each agency having dedicated frequencies that sit idle when not in use, a computer controller assigns available channels as conversations occur, making much more efficient use of limited radio spectrum.
What's the difference between conventional and trunked radio?
Conventional radio assigns a specific frequency to each user or department permanently - they always use that channel. Trunked systems share frequencies among many users, with a computer automatically assigning available channels when needed. Think of conventional as having your own dedicated phone line versus trunked being like a modern phone system where everyone shares lines efficiently.
Does trunked radio automatically mean encrypted?
No, absolutely not. Trunked and encrypted are completely separate technologies. A trunked system can operate in clear (unencrypted) mode, allowing anyone with a compatible scanner to listen. Encryption is an additional feature that agencies must specifically enable and often pay extra for. Many agencies use trunked systems without encryption.
Can I listen to trunked radio systems with a regular scanner?
No, you need a trunking-capable scanner. These scanners can monitor the control channel, decode which frequencies are being assigned to which talk groups, and rapidly hop between frequencies to follow conversations. Modern digital trunking scanners like the Uniden SDS100 or Whistler TRX-1 handle this automatically.
What is a talk group?
A talk group is a virtual channel or logical grouping within a trunked system. Instead of assigning frequencies, agencies assign talk groups - like 'Police Dispatch,' 'Fire Tactical,' or 'EMS North.' When someone transmits on a talk group, the system assigns an available frequency and all radios monitoring that talk group automatically tune to it.
What is P25?
P25 (Project 25) is a digital radio standard developed for public safety in North America. It ensures interoperability between different manufacturers' equipment. P25 supports both Phase I (one conversation per channel) and Phase II (two conversations per channel using TDMA). P25 can operate encrypted or unencrypted - encryption is optional.
How do I find my local trunked system's talk groups?
RadioReference.com is the definitive resource. Search for your county or city, and you'll find detailed information about local trunked systems including system IDs, frequencies, and talk group lists. The community continuously updates this database with accurate programming information.
Why did my local department encrypt if they already had a trunked system?
Encryption and trunking are separate decisions. Departments often claim encryption was 'required' when upgrading to digital trunked systems, but this is false - P25 and other digital trunked systems work perfectly in unencrypted mode. The decision to encrypt is a policy choice, often made to avoid public oversight rather than for any technical necessity.
Take Action for Transparency
Your voice matters. Here are concrete ways to advocate for open police communications in your community.
Contact Your Representatives
Use our templates to email your local officials about police radio encryption policies.
Get StartedRead Case Studies
See how encryption has affected real communities - from Highland Park to Chicago.
View CasesSpread Awareness
Share evidence about police radio encryption with your network and community.
Public Testimony
Learn how to speak effectively at city council and public safety meetings.
Prepare to Speak