Delayed Access Models: Alternatives to Full Police Radio Encryption
Not all encryption is equal. Compare different access models and advocate for the right balance in your community.
When police departments claim they "must" encrypt, they often present a false binary: full encryption or no security. In reality, communities across America have implemented middle-ground solutions that protect officer safety while preserving public access. Here's your guide to what's possible.
The Core Principle
The goal isn't to broadcast sensitive tactical operations in real-time. It's to maintain transparency for routine dispatch, accountability for police actions, and access for journalism. Multiple models achieve this without full encryption.
Access Models Compared
Real-World Examples
NYC Local Law 46
Best PracticeModel: Real-time media access + public critical incident channel
How it works: Credentialed journalists receive real-time access to NYPD radio. Critical incidents are broadcast on an unencrypted public channel.
Key feature: First major U.S. city to mandate press access by law.
Read the full case studySeattle / Denver
Good ModelModel: Partial encryption (dispatch open, tactical encrypted)
How it works: Main dispatch channels remain publicly accessible. SWAT, undercover, and sensitive operations use encrypted tactical channels.
Key feature: Balances routine transparency with tactical security.
Learn about Seattle's approachSan Francisco Media Access
Good ModelModel: Voluntary media access program
How it works: SFPD provides credentialed journalists access to encrypted radio communications through a voluntary program.
Key feature: Preserves press ability to cover breaking news despite encryption.
Read about SF's programBerkeley Call Log
InadequateModel: 10-minute delayed call log (no radio access)
How it works: Web-based log shows call types, times, and block addresses with 10-minute delay. No officer communications included.
Key limitation: Provides fraction of information available from radio access.
Why this isn't enoughWhat to Advocate For
When your community considers encryption, push for these alternatives:
Keep Dispatch Open
The most important channel to protect is main dispatch. This is where calls for service are broadcast and where accountability matters most. Advocate for partial encryption that keeps dispatch unencrypted.
Require Media Access
If full encryption proceeds, demand a media access program. NYC's Local Law 46 provides a legislative model. At minimum, credentialed journalists should have real-time access.
Demand Delayed Public Feed
If media access isn't achievable, push for a 15-30 minute delayed public feed. This addresses officer safety concerns while preserving the historical record.
Reject Call Logs as Adequate
Call logs are not a substitute for radio access. If offered as an alternative, document what's lost and continue advocating for real access.
Making the Case to Officials
"We need full encryption for officer safety"
Response: Partial encryption addresses this. Keep dispatch open and encrypt only tactical channels used for sensitive operations. Seattle and Denver prove this works.
"Media access is too complicated"
Response: NYC implemented a mandatory program. San Francisco runs a voluntary one. The technology exists and other cities have done it.
"Delayed feeds are too expensive"
Response: The same systems that encrypt can provide delayed feeds. It's a configuration choice, not a major investment.
"Our call log provides adequate information"
Response: Call logs omit officer communications, scene updates, calls for backup, and real-time developments. They're a fraction of what radio access provides.
Implementation Checklist
If your department agrees to an alternative model, ensure it includes:
Clear Criteria
Define exactly which channels remain open vs. encrypted, or what delay applies.
Written Policy
Get the agreement in writing—ideally as local law or formal policy, not just a verbal commitment.
Public Comment Period
Ensure the public can review and comment on implementation details before they're finalized.
Regular Review
Build in periodic reviews to ensure the program is working and hasn't quietly expanded encryption.
Enforcement Mechanism
What happens if the department violates the agreement? Build in accountability.
Don't Accept Full Encryption
Every community has options. Use these models to push back against full encryption and preserve transparency.