What Does Police Encryption Actually Look Like?

The Spectrum from Full Secrecy to Full Transparency

Police encryption isn't binary. Departments implement varying levels of encryption, from total blackout to hybrid systems that preserve most public access. Understanding the spectrum helps you evaluate what your department is proposing—and what alternatives exist.

The Encryption Spectrum

From Most Restrictive to Most Transparent

Full Encryption 0% Public Access
Long Delay (30+ min) ~5% Value Retained
Short Delay (5-15 min) ~30% Value Retained
Hybrid System ~80% Access
Open (Unencrypted) 100% Access
← Least Transparent Most Transparent →
Most Restrictive

Full Encryption

Complete Blackout of Police Communications

What It Is

All police radio channels are encrypted with no public access. Scanners receive only static or digital noise. The public cannot monitor any police communications in real-time or with any delay.

What You Hear

Unencrypted: "Unit 12, respond to 456 Oak Street for a burglary in progress."

Full Encryption: [Static/Digital noise - no intelligible audio]

Who Uses This

  • Baltimore Police Department
  • Denver Police Department (as of 2022)
  • Las Vegas Metro Police
  • Many departments post-2020

What's Lost

  • All real-time emergency awareness
  • Independent journalism capability
  • Public accountability mechanism
  • Community safety information
  • Historical record (unless police provide)

Real-World Impact

During the 2020 protests, cities with full encryption had no independent verification of police conduct. Competing narratives about who initiated violence could not be resolved because no outside observer could monitor police radio traffic.

Our Position

Unacceptable. Full encryption eliminates all public oversight and provides no proven benefit. There is no justification for complete blackout of routine police communications.

Highly Restrictive

Long Delay (30+ Minutes)

Encryption with Time-Delayed Public Feed

What It Is

Police communications are encrypted, but the department provides a time-delayed public feed, typically 30-60 minutes behind real-time. The delay is claimed to protect officer safety during active incidents.

How It Works

  • Live communications are encrypted (not publicly accessible)
  • Audio is recorded and released after the delay period
  • Delay begins when the call is dispatched, not when it ends
  • During rapidly-evolving incidents, public may be 30-60 minutes behind events

Who Uses This

  • Chicago Police Department: 30-minute delay
  • Some California agencies
  • Various departments claiming "compromise" position

What's Lost

  • Emergency alerts: A 30-minute delay eliminates all real-time safety value. Active shooter information 30 minutes late is useless.
  • Breaking news: By the time delayed feed is available, news outlets have already reported based on police statements only.
  • Independent verification: Police can shape narrative before public hears radio traffic.

Chicago Example

During a courthouse shooting where 40 shots were fired, the 30-minute delay meant the public never received real-time warning. By the time the delayed feed was available, the incident was over and the official narrative was already established.

Why 30 Minutes Eliminates Value

Scenario Real-Time Value 30-Minute Delay Value
Active shooter Take cover, evacuate, find family Incident over before you know
Tornado on ground Know exact streets in path Storm has passed
Amber Alert Watch for vehicle immediately Child could be 30+ miles away
Breaking news Report accurately in real-time Story already told by police
Police use of force Independent documentation Police narrative established first

Our Position

Unacceptable. A 30+ minute delay is full encryption with theater. It provides the appearance of transparency while eliminating all real-time value. This is not a compromise—it's encryption with extra steps.

Moderately Restrictive

Short Delay (5-15 Minutes)

Brief Delay Preserving Some Value

What It Is

Communications are encrypted with a shorter delay before public release. While still eliminating some real-time value, shorter delays preserve utility for extended incidents and breaking news coverage.

What's Preserved (Partially)

  • Extended incident awareness (wildfires, floods, standoffs)
  • Breaking news coverage (delayed but possible)
  • Some emergency preparedness value
  • Historical documentation

What's Still Lost

  • Immediate emergency alerts (active shooter, tornado)
  • First-response window information
  • Real-time verification of police accounts
  • Immediate family safety information

The Logic

Proponents argue that 5-10 minutes allows officers to establish scene control before public monitoring, while still providing useful information during extended incidents. Critics note that the highest-value moments are the first minutes of any incident.

⚠️

Our Position

Better than long delay, but still problematic. If a department insists on encryption, a 5-10 minute delay is less harmful than 30+ minutes. However, this still eliminates the most critical real-time information. We prefer hybrid systems that don't require any delay for routine communications.

Recommended Alternative

Hybrid System

Open Dispatch + Encrypted Tactical

What It Is

A balanced approach that maintains open, publicly accessible dispatch channels for routine communications while using encryption only for genuinely sensitive tactical operations. This preserves most public access while addressing legitimate security concerns.

Typical Channel Configuration

🔓 Open Channels (Public Access)

  • Main dispatch
  • Patrol divisions
  • Traffic enforcement
  • Fire/EMS coordination
  • Routine backup requests
  • Incident status updates
  • Non-sensitive car-to-car
~80-90% of traffic

🔐 Encrypted Channels (Restricted)

  • SWAT tactical operations
  • Undercover communications
  • Surveillance operations
  • Hostage negotiation
  • VIP protection details
  • Narcotics operations
  • Witness protection
~10-20% of traffic

Who Uses This Successfully

  • Washington State Patrol
  • Many county sheriff's offices
  • San Francisco (after rejecting full encryption)
  • Numerous mid-size departments
  • Most fire/EMS agencies (remain fully open)

What's Preserved

  • Emergency alerts: Real-time dispatch information for public safety
  • Journalism: Breaking news coverage capability
  • Accountability: Independent monitoring of routine operations
  • Community awareness: Neighborhood safety information
  • Interoperability: Multi-agency coordination

What's Protected

  • Undercover officer identities
  • SWAT tactical planning
  • Sensitive ongoing investigations
  • Witness safety information

Evidence It Works

Departments using hybrid systems have operated successfully for years with no documented incidents of scanner access causing harm. The claimed risks of open dispatch are theoretical, while the harms of full encryption are documented.

Our Position

This is what we advocate. Hybrid systems represent a reasonable balance. They address legitimate tactical security needs while preserving the public access that has existed for 70+ years. If your department proposes encryption, demand a hybrid alternative.

Traditional Approach

Open (Unencrypted) System

Full Public Access to All Communications

What It Is

All police radio communications are transmitted in the clear (unencrypted) and can be monitored by anyone with a scanner. This has been the standard approach for police radio since the technology was invented in the 1930s.

Historical Context

For over 70 years, police radio was inherently public. Officers knew their communications were audible to anyone with a receiver. This transparency was intentional—police are public servants using public airwaves funded by taxpayers. The assumption was always that public business should be conducted publicly.

Who Still Uses This

  • Many smaller and rural departments
  • Most fire departments nationwide
  • Most EMS agencies
  • Departments that have resisted encryption pressure

The Safety Record

After 70+ years of open police radio and billions of monitored transmissions, there are zero documented cases of an officer being harmed because of public scanner access. The claimed risks are hypothetical; the safety record is empirical.

How Sensitive Information Was Handled

Before encryption, departments protected sensitive information through training and policy:

  • Don't broadcast undercover officer locations on main channel
  • Use phone or MDT for personal identifying information
  • Switch to tactical channel for SWAT operations
  • Officer discretion about what to say on air

These practices worked successfully for decades and still work in departments maintaining open systems.

Our Position

The ideal approach. Fully open systems represent maximum transparency and have an excellent safety record. While we accept hybrid systems as a reasonable compromise, we believe the historical norm of open police radio served communities well and should be preserved where possible.

Compromise Option

Media Access Programs

Credentialed Access for Journalists

What It Is

Some departments with encrypted systems offer credentialed journalists access to scanner feeds, typically with conditions. This creates tiered access where journalists can monitor but the general public cannot.

How It Typically Works

  • Journalists apply for credentials (press pass, employment verification)
  • If approved, receive access to scanner feed or encryption key
  • Sign agreement not to broadcast certain information (officer locations, tactical details)
  • Access can be revoked for violations

Problems with This Approach

  • Tiered access: Journalists become privileged class; ordinary citizens excluded
  • Police control: Access depends on police cooperation; critical journalists may be denied
  • Chilling effect: Fear of losing access may soften coverage
  • Exclusion: Freelancers, bloggers, citizen journalists often excluded
  • Not transparency: Public still can't verify anything independently

Who Does It Benefit?

  • Major news outlets with credentialed reporters
  • Police departments (control over who monitors)

Who is excluded? The general public, small news outlets, citizen journalists, bloggers, researchers, community organizations, and anyone police choose not to credential.

⚠️

Our Position

Better than nothing, but not a solution. If your department has encrypted and refuses to reverse, a media access program restores some journalism capability. However, this is not transparency—it's controlled access that excludes the public and makes journalists dependent on police cooperation. We accept media access programs as a fallback, not a goal.

Side-by-Side Comparison

What Each Approach Means for Your Community

Capability Full Encryption 30+ Min Delay 5-15 Min Delay Hybrid Open
Active shooter alert ❌ None ❌ Too late ⚠️ Delayed ✅ Real-time ✅ Real-time
Severe weather updates ❌ None ❌ After storm passes ⚠️ Limited value ✅ Real-time ✅ Real-time
Breaking news coverage ❌ Police-only ⚠️ Very delayed ⚠️ Somewhat delayed ✅ Real-time ✅ Real-time
Independent oversight ❌ None ⚠️ After-the-fact only ⚠️ Limited ✅ Preserved ✅ Full
Extended incident awareness ❌ None ⚠️ Partial ✅ Mostly preserved ✅ Preserved ✅ Full
Historical documentation ❌ Police-controlled ✅ Available (delayed) ✅ Available ✅ Available ✅ Available
Tactical security ✅ Protected ✅ Protected ✅ Protected ✅ Protected ⚠️ Policy-based
Implementation cost $$$ High $$$ High $$$ High $$ Medium $ Low (existing)

Questions to Ask About Your Department's Proposal

Get the Details Before Taking a Position

1. What type of encryption?

Is it full encryption, delayed feed, hybrid, or something else? Don't accept vague answers—get specifics.

2. Which channels affected?

Will dispatch be encrypted? Patrol? All channels? Ask for a complete list of what will and won't be publicly accessible.

3. If delayed, how long?

Is it 5 minutes or 60 minutes? The difference matters enormously. Push for the shortest delay possible if encryption is implemented.

4. Why not hybrid?

If full encryption is proposed, ask why a hybrid system won't work. Many departments use hybrid successfully—why can't yours?

5. What's the evidence?

Ask for documented cases where scanner access caused problems in your jurisdiction. Hypothetical risks aren't evidence.

6. What's the cost?

Get full implementation and 10-year maintenance costs. Compare to what else could be funded with that money.

Take Action for Transparency

Your voice matters. Here are concrete ways to advocate for open police communications in your community.

📧

Contact Your Representatives

Use our templates to email your local officials about police radio encryption policies.

Get Started
📚

Read Case Studies

See how encryption has affected real communities - from Highland Park to Chicago.

View Cases
📢

Spread Awareness

Share evidence about police radio encryption with your network and community.

📊

See the Evidence

Review the facts, myths, and research on police radio encryption.

View Evidence
🎤

Public Testimony

Learn how to speak effectively at city council and public safety meetings.

Prepare to Speak
📥

Download Resources

Get FOIA templates, talking points, and materials for advocacy.

Access Toolkit