BETTER SOLUTIONS

Alternatives to Police Radio Encryption

Blanket encryption is not a necessity — it is a choice. Better solutions exist that protect legitimate privacy and operational needs while preserving public safety, accountability, and transparency.

The False Choice

When police departments propose encryption, they frame it as binary: "Either we encrypt everything for safety, or we risk officer lives and victim privacy."

That framing is misleading. Modern radio systems, smart policies, and proven practices offer proportional solutions that address every legitimate concern without eliminating public access.

Below are the alternatives that policymakers, departments, and communities should consider before resorting to blanket encryption.

Solution #1: Hybrid Radio Systems

The gold standard—encrypt what needs encrypting, keep routine policing open

Hybrid radio systems are the most effective alternative to blanket encryption. They use modern digital radio technology with selective encryption: routine dispatch stays open, sensitive operations use encrypted channels.

This approach addresses every legitimate concern about privacy and operations while preserving the public safety, accountability, and journalism benefits of scanner access.

How Hybrid Systems Work

Keep these open (unencrypted)

Primary Dispatch

Routine calls—traffic stops, welfare checks, alarms, noise complaints

Traffic Accidents

Vehicle crashes, road closures, traffic control

Property Crimes

Burglaries, theft reports, vandalism (non-sensitive)

Medical Assists

Officer response to medical emergencies (coordinate with EMS)

Public Disturbances

Noise complaints, crowds, public intoxication

Fire/EMS Coordination

Joint responses, scene security, multi-agency incidents

Coverage: 85–90% of all police radio traffic

Encrypt these (secure channels)

SWAT / Tactical Operations

High-risk warrants, hostage situations, tactical raids

Undercover Operations

Drug task force, vice operations, gang investigations

Sensitive Investigations

Active investigations where disclosure could compromise outcome

Witness Protection

Communications involving protected witnesses or informants

Domestic Violence (Switchable)

Officers can switch to encrypted channel for victim privacy on specific calls

Sexual Assault (Switchable)

Sensitive calls where victim information requires protection

Coverage: 10–15% of police radio traffic

The vast majority of police work is routine and benefits from transparency. Only a small fraction involves genuinely sensitive operations. Hybrid systems match the tool (encryption) to the actual need, rather than applying it to every situation indiscriminately.

Benefits of Hybrid Approach

🚨

Public Safety Preserved

Real-time emergency alerts continue during active shooters, wildfires, and hazmat incidents on open channels

🔍

Accountability Maintained

Independent oversight of routine policing continues; community can verify how police operate

📰

Journalism Supported

Breaking news coverage continues; media can independently verify police accounts

🔒

Operations Protected

Genuinely sensitive operations use encrypted channels, protecting tactics and investigations

🤝

Privacy Respected

Officers can switch to encrypted channels for sensitive victim situations as needed

💰

Cost Effective

Less expensive than full encryption; focused resources where actually needed

⚖️

Balanced Interests

Serves police operational needs AND public interest in transparency—not zero-sum

🏛️

Democratic Principles

Presumption of openness with narrow, justified exceptions—as democracy requires

Real-World Hybrid System Examples

Departments Using Hybrid Systems Successfully

Many police departments operate hybrid systems that balance all interests:

  • Federal agencies — FBI, DEA, and ATF have long used tactical channels for sensitive operations while keeping some traffic accessible
  • Several major city departments maintain open dispatch while encrypting specialized units
  • Statewide radio networks often include both open and encrypted talkgroups by design

These systems demonstrate that hybrid approaches work in practice across different sizes and types of departments.

Communities That Reversed Blanket Encryption

Some departments tried full encryption but reversed course after community backlash:

  • Public pressure led to restoration of open dispatch channels
  • City councils mandated hybrid approach after encryption criticism
  • Departments realized blanket encryption damaged community relations

Proof that encryption is reversible and communities can win transparency back.

Implementing a Hybrid System

For policymakers and departments considering a hybrid approach, the steps below provide a practical starting point.

1

Audit Current Communications

Review what's actually transmitted on radio. You'll likely find 85-90% is routine and non-sensitive.

2

Identify Genuine Needs

Determine which units/operations truly require encryption: SWAT, narcotics, undercover, etc.

3

Configure Talkgroups

Set up digital radio system with separate talkgroups: open dispatch + encrypted tactical channels

4

Train Officers

Teach when to use which channel, proper radio protocol for victim privacy on open channels

5

Create Clear Policies

Written guidelines on channel usage, victim privacy protection, when encryption is appropriate

6

Community Transparency

Publish policy explaining what's open vs. encrypted and why, with civilian oversight

Solution #2: Technology Alternatives

Technical solutions that protect privacy without eliminating scanner access

Mobile Data Terminals (MDTs)

In-car computers allow text-based communication between dispatch and officers, handling the sensitive information that has no business on voice radio to begin with:

  • Names, addresses, dates of birth, and Social Security numbers sent via MDT rather than broadcast
  • Domestic violence victim information and sexual assault details transmitted securely
  • Criminal history, warrant checks, and vehicle registration — all handled through MDT
  • Officers can request backup or share updates without using voice radio

Most "privacy concerns" about police radio involve information that MDTs already handle. The solution is better MDT practice, not blanket voice encryption.

Already widely deployed. Most departments have MDTs but don't use them to their full potential for sensitive information.

Temporary channel switching

Officers switch from an open dispatch channel to an encrypted tactical channel for specific calls, then return to open once the sensitive portion concludes. A typical sequence:

  • Dispatcher sends officer to a domestic violence call on the open channel
  • Once on scene, officer switches to encrypted channel to discuss sensitive victim details
  • "Resolved, clear" is transmitted on the open channel when the situation concludes

This protects victim privacy during sensitive calls without encrypting everything all the time.

Supported by modern digital radio systems. Requires training but is technically straightforward.

Digital radio without encryption

Modern P25 digital radio systems deliver better quality and features without encryption enabled. Compared to analog:

  • Clearer audio than old analog systems
  • Digital signals often reach farther
  • Radio ID authentication without encrypting content
  • GPS tracking, emergency buttons, and texting — all available without encryption

Departments can modernize their radio infrastructure and gain every benefit of digital technology without enabling encryption. It is a configuration choice, not a technical requirement.

Many departments already operate modern digital systems in the clear — encryption is optional, not mandatory.

Geofencing and smart triggers

Advanced radio systems can automatically enable encryption based on location or situation, without requiring officers to manually switch channels:

  • Automatic encryption when officers are at school zones
  • HIPAA-related communications auto-encrypt in medical facilities
  • Known sensitive locations trigger secure channels automatically
  • Officers can activate an emergency mode that auto-encrypts their radio

This approach delivers targeted encryption only where and when it is actually needed.

An emerging capability available in some high-end radio systems, with potential for broader adoption.

Solution #3: Policy & Training Approaches

Non-technical solutions that protect privacy through practice, not encryption

Officer training on radio protocol

Proper radio etiquette protects privacy without encryption. Officers learn to:

  • Use generic terms — "victim," "complainant," "individual" — rather than names
  • Reference intersections or block numbers rather than exact addresses
  • Say "medical assist" rather than describing specific conditions
  • Use call codes for sensitive situations rather than plain-language descriptions
  • Follow clear guidelines on when to switch to an encrypted tactical channel

Many departments protected privacy for decades using these practices. Where privacy breaches have occurred, training failure is the cause — not a reason to apply blanket encryption.

Code systems for sensitive information

Numeric or alphanumeric call codes reduce the detail broadcast on open radio. Common examples include Signal 40 for domestic disturbances, California's Code 5150 for mental health crises, and traditional 10-codes that obscure specifics from casual listeners. Codes provide a layer of privacy while still allowing informed listeners — media, emergency managers — to understand the general situation.

Some departments have shifted back to plain language for officer clarity. The point is that if privacy is the stated concern, call codes are a meaningful alternative worth considering before resorting to encryption.

Presumption of openness policy

A formal department policy establishing that radio communications are presumptively open to the public, with narrow, defined exceptions. Key components:

  • All routine police communications are accessible to the public by default
  • A specific, defined list of situations that justify encryption — tactical operations, undercover work, etc.
  • Exceptions cannot be expanded without public notice and civilian oversight approval
  • Annual review of whether each exception remains necessary
  • Public reporting on encrypted channel usage

Codifying openness as the default prevents the gradual, informal expansion of secrecy that tends to happen when no written policy exists.

Civilian oversight of encryption decisions

A community oversight board with authority to review and approve encryption policies prevents departments from unilaterally expanding secrecy. Board functions include:

  • Approving any expansion of encrypted channels
  • Receiving regular reports on the ratio of encrypted to open traffic
  • Investigating complaints about inappropriate encryption usage
  • Publishing annual public reports on encryption policies and compliance

This gives the community a formal voice in decisions that directly affect public safety information and accountability.

Solution #4: Media Access Programs

Giving credentialed journalists access even if some encryption exists

If departments insist on some level of encryption beyond tactical ops, media access programs can preserve journalism functions without full public scanner access.

30-Year Proven Model

San Antonio Media Terminal Program

Bexar County, Texas has provided media access to encrypted police radio for over 30 years through a simple system:

  • Local TV and radio stations purchase radio terminal hardware — the same type used by first responders
  • Transmit capability is disabled; equipment can only receive, not broadcast on police frequencies
  • City personnel install confidential encryption codes on newsroom equipment
  • When systems upgrade, newsrooms purchase new equipment and the government installs new codes

Three decades with no documented security incidents, no leaks, and uninterrupted breaking news coverage.

Legal foundation: Texas's 2001 anti-terrorism statute allows codes to be shared without becoming public records.

Read the full San Antonio case study →

Credentialed journalist access

Modeled on press credentials for crime scenes or government buildings, this approach allows:

  • Legitimate news organizations to apply for media credentials
  • Basic vetting — not editorial control — as part of the application
  • Credentialed journalists to receive encryption keys for newsworthy channels
  • Access revocation only for specific violations, with appeal rights

Preserves breaking news coverage, independent verification, and press freedom.

Press Pool Arrangements

Designated reporters have access, share information with broader media:

  • Rotating assignments among credentialed outlets
  • Pool reporters monitor encrypted channels during major incidents
  • Information shared with all media via pool reports
  • Used at federal level for presidential coverage

A compromise: direct access is limited, but information still reaches the public through press pool reports.

Shorter delayed feeds

If a delay is necessary, keep it short enough to retain news value:

  • A 5–10 minute delay is long enough to protect active scenes but short enough for breaking news
  • Delay the audio, but do not remove or redact content
  • Release automatically — no human review or approval required
  • Transmit complete audio with nothing removed

Chicago's 30-minute delay with active censorship has been described by journalists as "almost useless for breaking news."

Transparent redaction policies

If some content must be withheld, make the process accountable rather than opaque:

  • A public redaction log recording what was withheld and the reason
  • Specific, defined categories for redaction — not a catch-all "sensitive" label
  • Time-limited redactions that expire when an investigation concludes or the privacy concern is moot
  • An independent civilian board that reviews redaction decisions
  • An appeal process through which media can challenge specific redactions

If police are going to control information release, the control itself should be transparent and subject to review.

Media access programs are compromises, not ideal solutions. They are better than a total blackout but worse than open scanner access:

  • Small outlets and freelancers may not qualify for credentials
  • Government controls who counts as "legitimate press," which creates potential for abuse
  • Does not serve the public safety alert function — only credentialed journalists benefit
  • Does not provide independent citizen oversight

Consider these approaches only if hybrid systems have been rejected and some encryption is unavoidable. They are damage mitigation, not the right answer.

Solution #5: Legislative & Regulatory Approaches

Laws and regulations that mandate transparency

State laws requiring openness by default

State legislation can establish a presumption that police radio communications are public records accessible in real time. Model elements include:

  • Police radio transmissions presumed public unless a specific exception applies
  • A defined list of narrow exceptions — tactical operations, undercover work, ongoing investigations — each with sunset provisions
  • Public hearings required before any department may implement encryption
  • City council or civilian oversight board approval required for encryption policies
  • Annual reporting on the percentage of encrypted versus open communications

State legislatures with strong open government traditions or responsive to journalism and civil liberties coalitions are the most viable targets.

Public notice and comment requirements

Before implementing encryption, departments would be required to follow a public engagement process. Required steps:

  • At least 60 days public notice of intent to encrypt
  • Department submits documented evidence justifying encryption
  • Community hearings and a written public comment period
  • Impact assessment analyzing effects on journalism, accountability, and public safety
  • Analysis of why hybrid systems or other solutions are insufficient
  • A city council or commission vote — not solely a police chief decision

This prevents unilateral encryption decisions and forces departments to justify the choice and incorporate community input.

Transparency reporting requirements

Departments using encryption would be required to report regularly on usage and impact. Required disclosures:

  • The percentage of radio traffic encrypted versus open
  • A breakdown of the justification categories for different encrypted channels
  • Any documented cases of scanner-related harm — the answer has consistently been none
  • The total cost of encryption systems and ongoing maintenance
  • Use of alternative privacy methods such as MDTs, codes, and officer training

Public reporting creates accountability for the loss of transparency, enabling informed community oversight of encryption decisions.

Sunset provisions and mandatory review

Encryption policies automatically expire unless renewed after a formal review. How it works:

  • Encryption authorization expires after five years
  • Departments must re-justify encryption with current evidence at renewal
  • If the original justification is no longer valid — technology improved, no incidents documented — the department returns to open communications
  • Renewal follows the same public notice and comment process as initial approval

Sunset provisions prevent encryption from becoming permanent by default and force periodic re-examination of whether secrecy remains justified.

Legislative Action Opportunities

Currently, most encryption decisions are made by police chiefs or city managers without state-level oversight. There is an opening for legislation in states that value open government.

Organizations like ACLU state chapters, journalism coalitions, and government transparency advocates are potential allies for model legislation efforts.

Comparing Solutions: Which Approach is Best?

Evaluating alternatives against key criteria

Different alternatives serve different goals. Here's how they stack up:

Solution Public Safety Alerts Accountability Journalism Op Security Privacy Cost Overall
Hybrid System ✓✓✓ ✓✓✓ ✓✓✓ ✓✓✓ ✓✓✓ ✓✓ Best
MDT + Training ✓✓✓ ✓✓✓ ✓✓✓ ✓✓ ✓✓✓ ✓✓✓ Excellent
Media Access Program ✓✓ ✓✓ ✓✓✓ ✓✓✓ Compromise
Delayed Feed (5-10 min) ✓✓ ✓✓ ✓✓ ✓✓ Compromise
Legislative Mandate ✓✓✓ ✓✓✓ ✓✓✓ ✓✓ ✓✓ ✓✓✓ Excellent
Blanket Encryption ✗✗✗ ✗✗✗ ✗✗✗ Worst

Key:

  • ✓✓✓ Excellent - Fully serves this goal
  • ✓✓ Good - Adequately serves this goal
  • Fair - Partially serves this goal
  • Poor - Fails to serve this goal

The Winner: Hybrid Systems

Hybrid radio systems score highest across all criteria. They serve every legitimate interest:

  • Real-time emergency alerts continue on open channels
  • Routine policing remains transparent and independently verifiable
  • Breaking news coverage is preserved
  • Tactical operations use encrypted channels where genuinely needed
  • Officers can switch to secure channels for sensitive calls
  • Openness is the default, with narrow and defined exceptions

This is the solution departments should implement. It is not a radical idea — it is proportionality, matching the tool to the actual need while serving every stakeholder's legitimate interests.

Advocating for Alternatives in Your Community

How to push for better solutions instead of blanket encryption

1. Educate Decision-Makers

Most officials don't know alternatives exist. Present them with options:

  • Share this page and model policies with city council members
  • Bring in experts from departments using hybrid systems successfully
  • Provide written materials explaining how alternatives work
  • Emphasize that hybrid systems serve police needs AND community interests

2. Demand Evidence-Based Decision

Ask officials to justify why alternatives won't work:

  • "Why can't we use MDTs for sensitive information?"
  • "Why won't a hybrid system work in our community?"
  • "What specific operations require ALL communications to be encrypted?"
  • "How many incidents justify this level of secrecy?"

3. Build Coalition Support

Allies make alternatives more viable:

  • Partner with local journalism organizations
  • Engage ACLU or First Amendment Coalition
  • Recruit community groups concerned about accountability
  • Find sympathetic law enforcement voices who support transparency

4. Propose Specific Solutions

Don't just oppose encryption—offer concrete alternatives:

  • Draft model hybrid system policy for your city
  • Present cost analysis showing MDT solution is cheaper
  • Offer training program for officers on radio protocol
  • Propose civilian oversight of encryption decisions

5. Use Model Language

Sample policy language for city councils:

"The [City] Police Department shall maintain a hybrid radio communication system wherein routine dispatch and non-sensitive operations are conducted on unencrypted channels accessible to the public, while tactical operations, undercover investigations, and communications requiring protection of victim privacy are conducted on encrypted channels. The presumption shall be openness, with encryption used only for defined, narrow exceptions subject to annual review by the Civilian Oversight Board."

Take Action for Transparency

Your voice matters. Here are concrete ways to advocate for open police communications in your community.

📧

Contact Your Representatives

Use our templates to email your local officials about police radio encryption policies.

Get Started
📚

Read Case Studies

See how encryption has affected real communities - from Highland Park to Chicago.

View Cases
📢

Spread Awareness

Share evidence about police radio encryption with your network and community.

📊

See the Evidence

Review the facts, myths, and research on police radio encryption.

View Evidence
🎤

Public Testimony

Learn how to speak effectively at city council and public safety meetings.

Prepare to Speak
📥

Download Resources

Get FOIA templates, talking points, and materials for advocacy.

Access Toolkit

Related Resources

Advertisement