The NYPD is spending $390 million on a new radio system that will encrypt officers’ communications — reversing a near-century-old practice of allowing the public and the press to listen to police dispatches.
Archived at https://ghostarchive.org/archive/eqTTk?wr=true
tbf, cops ‘doxx’ people over the radio all the time. not just suspects, either, but potential witnesses, and normal folks caught-up in ‘stop and frisk’ or ‘papers, please’ stops. full legal names, birth dates, genders, government id numbers, addresses, and so forth are broadcast for all to hear. that data should be encrypted, and is in many jurisdictions already.
Don’t you see a problem with that? Surely the answer is to communicate sensitive information via a different method, and not over the air where civilians are supposed to have transparency with emergency services. Transparency meaning checks and balances ensuring less corruption. Protect people’s identities by using the new encrypted channel. I don’t care if the officer has to press a different button to make the call.
they do often use other devices (laptops in cruisers, for instance) but away from their vehicles, the radio is usually what gets used.
Sorry, that’s laziness. Also, for literally no cost they could use a phone they already have, or even have an app on the phone that both encrypts any data they want to send and encodes it in soundwaves that can go out the radio. Whoever’s listening at the police station could have an app running to automatically decode and display the sensitive data. This stuff isn’t hard. It’s only hard when you don’t care about people and you don’t get consequences for it.
Cops are lazy bro
This stuff isn’t hard.
You want to know how I know you’ve never built anything of this scale before?
Amateur radio operators, like myself, do this stuff all the time. There are already open source apps that do exactly what I mentioned, with the exception of encrypting the data, because that’s not allowed in the amateur radio service.
How exactly is any of what I said too hard for a 350 million dollar budget? Or do I have to personally design and implement a perfect solution for an.entire municipality to be able to even comment on a subject I know a good deal about? But yeah, go ahead thinking it’s level of difficulty standing in the way of a reasonable solution instead of a desire for even less accountability.
Amateur radio operators, like myself, do this stuff all the time.
No they don’t. Unless you want to tell me how amateur radio operations routinely operate a large scale critical system with inventory management, tech support , redundancy, and a myriad of other shit that hobbyists don’t have to care about.
There are already open source apps that do exactly what I mentioned,
Which doesn’t come close to implementing the same capabilities as the system in question, nor does it operate within the same constraints. All you saw was the word “radio” and assumed your hobby makes you an expert.
How exactly is any of what I said too hard for a 350 million dollar budget?
It’s not, they’re doing aren’t they?
Or do I have to personally design and implement a perfect solution for an.entire municipality to be able to even comment on a subject I know a good deal about?
You can comment on anything you want with any level of knowledge you want and I can comment on that comment which is whats happening. Thinking you know how to do this because you mess with amateur radio is like thinking you can implement a web portal for national healthcare services just because you learned some JavaScript and Python.
I disagree completely.
Public data is public.
Well then cough up your public data:
- full legal name
- birth dates
- gender
- government id numbers
- addresses
- and so forth
But I thought you said E2E encryption a danger to national security, hmm?
You said you wanted a backdoor, didn’t you?
If you have nothing to hide, you have nothing to fear, right? Right?
Standard double standard bullshit.
When did the NYPD say any of that, though?
I think you’re confusing them for another org.
@Chozo @gAlienLifeform @spudwart
https://www.dailymail.co.uk/sciencetech/article-7921707/NYPD-running-10million-forensics-lab-dedicated-cracking-iPhones.htmlSorry for the daily mail link, but:
New York District Attorney Cyrus Vance (pictured above) has been an outspoken critic of Apple’s end-to-end encryption policy, saying ‘they have taken away one of our best sources of information. Just because they say so.’
They wont use that to abuse their position. no way. /s
I assume this means encrypted P25 . Public service agencies have been using it for years, though not all of them encrypt.
And it’s easily decoded when you have the keys which, based on every other department that uses them, won’t take long to leak or be cracked.Lot of folks use SDR setups on a PC to decrypt and stream police and fire radio to a service like Broadcastify
From a legal standpoint does that change things? Especially if the keys aren’t intended to be public?
Not until you use it to expose police wrongdoing.
I assume it depends on where you live, but police scanner radios have been around and on the shelf at stores for half a century. I imagine it’s a legal grey area similar to radar detectors.
Yeah fuck that
Right, so now they’re operating in total secrecy. Nothing at all like a gang!








