RIGHT-click here - Monitoring Times
RIGHT-click here - Monitoring Times
RIGHT-click here - Monitoring Times
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
department. While this can<br />
be harmless, some take this<br />
too far and install lights<br />
and other accessories on<br />
their personal vehicles that<br />
might give some people the wrong<br />
impression. And some even step<br />
over the line and try to play cop<br />
or firefighter and eventually end<br />
up in trouble. But, I don’t want to<br />
lump all radio enthusiasts in one pile,<br />
that’s for sure.<br />
On the other side, t<strong>here</strong> are some<br />
shortcomings to using a pro radio as<br />
a scanner. First, in most cases you<br />
are limited to one band of frequencies. Current<br />
scanners are designed to cover as many different<br />
frequency bands as they can. VHF-low band,<br />
aircraft, VHF high band, UHF, military air, 700,<br />
800, and 900 MHz are all pretty standard for<br />
today’s scanners.<br />
Two-way radio transceivers are designed<br />
to operate on a specific frequency band. An<br />
800 MHz trunking radio can only do 800 MHz<br />
frequencies and a VHF radio can’t do UHF frequencies.<br />
Only recently have some multi-band<br />
or wide band transceivers come onto the market<br />
(not including amateur transceivers that often<br />
include dual band capabilities).<br />
Secondly, you can’t easily change frequencies<br />
or do programming in the field. Adding or<br />
changing a frequency or trunking talk group<br />
requires a computer with software and programming<br />
cables to accomplish. Some newer model<br />
radios do sometimes offer an option of FPP or<br />
Front-Panel-Programming. This option does allow<br />
for the user to add or modify frequencies in<br />
the radio without using a computer. But again,<br />
this feature comes at a price.<br />
Another problem is the limited number of<br />
channels you can effectively scan. While scanner<br />
radios can offer hundreds of channels that can all<br />
be scanned in sequence, most commercial radios<br />
may only offer 10, 12 or 16 channels that can be<br />
scanned, and often at a slower speed than you<br />
may be used to. Again, newer, more expensive<br />
radios do offer larger “scan lists.”<br />
Tangle of Money and Legal<br />
Issues<br />
Keep in mind that it can be an expensive<br />
hobby, for sure. You must start by buying the<br />
radio itself. And, since new professional radio<br />
equipment can go for thousands of dollars, even<br />
used radios will still often out-price brand new<br />
scanner radios. Bargains can be found on some<br />
online auction sites, but buyers beware! Many<br />
times radios may be sold with any number of<br />
defects or jacked up firmware that may make<br />
getting it programmed for your use difficult. Be<br />
very careful and get as much information about<br />
the radio and its capabilities as well as the seller<br />
before investing your money.<br />
And once you get a radio, you will probably<br />
want a new battery, charger and any accessories<br />
that were not included with your purchase. You<br />
will also need to get the radio programmed to<br />
receive the desired frequencies. In some cases,<br />
local radio sales and service shops will program<br />
a radio for a fee, but some will not unless you<br />
GRE PSR-600 ($350) and Uniden HomePatrol® ($490) scanners have a lot of advantages over a professionalgrade<br />
radio: They’re frequency agile, cover all the bands you want to hear, and they are easy to program.<br />
(Courtesy: Grove Enterprises)<br />
are the licensed user of the frequencies.<br />
Some hobbyists will want to invest in programming<br />
cables and software to program the<br />
radio on their own. Most radio programming<br />
cables are plentiful on the Internet, but accessing<br />
radio-programming software for private,<br />
legal use can be difficult, if not impossible for<br />
older model radios. And most of the time, each<br />
radio model requires very specific versions of<br />
programming software. This can add up to lots<br />
of money.<br />
Of course, the Internet has all sorts of dark<br />
places w<strong>here</strong> bootleg software can be found, but<br />
one runs the risk of downloading a virus-infected<br />
bundle of worthless code as well. Motorola has a<br />
history of being very protective of its programming<br />
software and takes Intellectual Property<br />
Rights very seriously. Admittedly, the chances of<br />
being caught are slim, but t<strong>here</strong> have been cases<br />
of prosecutions involving Motorola software<br />
being improperly acquired by private parties.<br />
And, this is w<strong>here</strong> more of the controversy<br />
comes in. Trunked radio systems operate a lot<br />
like closed computer networks. The radios using<br />
the system must be known and registered with<br />
the system in order to work with the trunked<br />
system. Even though the radio hacker might wish<br />
to only receive traffic on a trunked system, t<strong>here</strong><br />
is a danger of the radio transmitting accidentally<br />
or without the user’s knowledge.<br />
Some newer digital trunked radio systems<br />
actually require a radio to transmit, or affiliate<br />
with the trunked site before the radio will ever receive<br />
anything. Those in the radio hacking community<br />
say they have figured out some possible<br />
ways around this, but under many state laws,<br />
programming an unauthorized radio to operate<br />
on a private trunked radio system is illegal. These<br />
laws consider radio systems akin to computer<br />
networks and, technically, programming a radio<br />
to work with the system could be a violation of<br />
state law, whether the radio transmits or not.<br />
In order to program trunking radios, one<br />
must have what is called a “system key” to access<br />
the trunked programming area of the software.<br />
This is an attempt to keep unauthorized users<br />
from doing just what radio hackers have been<br />
doing for years, programming radios to access<br />
the trunked systems.<br />
This key (not a brass key, but an encrypted<br />
string of computer code) is supposed to be kept<br />
by the system administrator and not allowed out<br />
for anyone to have, but t<strong>here</strong> have been some efforts<br />
on the part of the radio hacking community<br />
to work around this as well. T<strong>here</strong> are programs<br />
out t<strong>here</strong> that will actually generate the required<br />
system key to unlock the programming software<br />
and allow trunked radio programming.<br />
Trying to understand programming a trunking<br />
system into a commercial trunked radio will<br />
positively make your head explode. T<strong>here</strong> are so<br />
many variables and system settings that things<br />
can get easily fouled up if one doesn’t fully understand<br />
what they are doing. And, if the person<br />
programming the radio doesn’t really know what<br />
they are doing, they can, in theory, cause all manner<br />
of difficulties with the legitimate users on a<br />
trunked radio system.<br />
If the radio is programmed with the same<br />
radio ID number as a legitimate user, having two<br />
radios active on the system at the same time can<br />
cause neither to work. And in some cases, hackers<br />
have programmed a radio with the same ID as<br />
a dispatch console, causing all sorts of headaches<br />
for the system operators.<br />
If a trunked system administrator discovers<br />
a bootleg radio trying to access their trunking<br />
system, they can take steps to stop it. They can<br />
remove that radio ID from the allowed radios or<br />
they can disable or “stun” the radio, so it simply<br />
stops working. I have seen more than a few<br />
inquiries from people who have stunned radios<br />
and want to know how they can get them working<br />
again, so I know that it happens.<br />
Even if you do everything right and get<br />
everything programmed to receive only, getting<br />
stopped or caught with the same radio as your<br />
local police department in your possession can<br />
get you in some hot water. In spite of the fact that<br />
it may be perfectly legal, the police will want to<br />
know why you have such a radio and what you<br />
are up to. With all the paranoia these days about<br />
on-line Internet feeds of police communications,<br />
catching someone with what they might believe<br />
to be one of their very own radios may cause<br />
some monumental hassles. Don’t say I didn’t<br />
warn you.<br />
Bottom line: Please, if you decide to take the<br />
plunge and try getting a real radio programmed<br />
to work as a scanner, be careful. Take the time to<br />
read, study and learn as much as you can about<br />
what you are trying to do. Read up on what it<br />
takes to actually program the radio and ask questions<br />
of those with experience in the matter.<br />
Check out web sites that deal with this subject,<br />
such as “Batlabs” http://www.batlabs.com;<br />
Repeater Builder http://www.repeater-builder.<br />
com/rbtip/; or the commercial radio sections<br />
of the Radio Reference forums http://forums.<br />
radioreference.com/.<br />
Chris Parris writes MT’s Fed Files column<br />
and may be contacted at chrisparris@<br />
monitoringtimes.com<br />
August 2012 MONITORING TIMES 15