https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Project 25


Article

Panel: P25 encryption is not for everyone

Panel: P25 encryption is not for everyone

There are economic and spectrum costs associated with encryption--which also can have a detrimental effect on interoperability--so agencies should be selective in its use; the bottom line is that it is not well suited for day-to-day operations.
  • Written by
  • 18th July 2013

Security can a key aspect of public-safety communications, but Project 25 (P25) system managers should establish policies to help ensure that encryption is used only when necessary, P25 network veterans said during a best-practices workshop in Washington, D.C., sponsored by Tait Communications.

While encrypted communications are vital for some specialized personnel—for example, members of SWAT teams, bomb squads and narcotics operations—it is not advisable to use encryption for all public-safety communications, according to Craig Jorgensen, former president of the P25 steering committee.

“Encryption was never intended to be a ubiquitous tool that everybody has; if everybody’s got it, there no longer is the security element that you want,” Jorgensen said. “Encryption was intended for high-security risks, not just day-to-day traffic. The cost of encryption is not only the economic costs but the cost of the spectrum that you’re using to perform the encryption, and there’s still a minor degradation [of voice quality] in encryption.

“So, encryption shouldn’t be dealt with as an option, like a green light or a blue light. [You should look at] why I need it, how much am I willing to pay for it, and who really needs it.”

Another issue with encryption is that it is not always possible to coordinate the security feature with other jurisdictions that may provide help during an emergency, according to Allen Holder, director of Lincoln County 911 Center in West Virginia.

“If you encrypt too much, you may make your network so secure that you lose the benefit of interoperability,” Holder said.

This sentiment was echoed by several participants, with some noting that they have policies against using encryption on mutual-aid channels.

There was a general consensus that public-works and public-service employees do not need encryption capabilities on their radios, but encryption usage for non-specialized public-safety organizations varied significantly between the participants.

“I put encryption in all my equipment and components in the statewide system, because I was told that everything had to be encrypted in 1999,” said Paul Leary, chief of communications for the state of New Hampshire. “Fourteen years later, I have yet to have to use an encrypted channel in my department.

“We put too much into the idea of encryption. On the data side, we know we’re going to have to have that encrypted—they want us to have that. With voice, my biggest fear is with interoperability and people getting into trunked systems without a gateway set up, or [they] don’t have the agreed interoperability channels loaded into their radios.”

Flexibility is necessary, according to Mike Ward of Beaufort County Communications in South Carolina.

“In my opinion, it really depends on how the agency wants to operate and at what level,” Ward said. “Our sheriff said, ‘All of my stuff is going to be encrypted; that’s how it’s going to be,’ and the rest of law enforcement followed. The fire department said it wanted half and half.”

For those departments that do use encrypted communications, Jorgensen emphasized the importance of using standardized encryption instead of proprietary solutions that may cost less initially but can create long-term problems.

“When we talked about standardized encryption, we talked about it for a specific purpose, and that was to ensure that, if Agency A and Agency B are encrypted, they can communicate,” Jorgensen said. “When you buy a proprietary encryption, you do two things. The first thing you do is you lock your system into that encryption mode. The second thing you do is you prevent other vendors from using that encryption.

 “What you’re really doing is saying that, ‘I’m not going to have interoperability in the encryption mode, unless I buy all my stuff from that vendor’—whoever that vendor is, because they all sell proprietary encryption.”

Of course, using encryption requires all participating users to have the appropriate encryption keys in their radios. Theoretically, this function can be done via over-the-air rekeying (OTAR), but workshop participants noted several logistical issues with that approach. Ward said he used a form of OTAR in the military, but radios that were taken out of network range or were turned off sometimes were missed, which created additional maintenance work.

“I’m not a big fan [of OTAR],” Ward said. “Over 18-odd years, I’ve developed the attitude of, ‘If I have to change the key, it’s going to be a physical change. We’re going to connect the machine to each individual device, because I still end up doing it anyway.’

“That’s my personal opinion on it. We don’t use it on our system at this time.”

Holder said that handling encryption rekeying in house also allows the radio shop to assess the general condition of radios on a regular basis.

“We always end up doing a certain amount of antenna changes, battery upgrades [and] fixing clips and things, when we do our programming,” Holder said.

Tags: Data Interoperability Project 25 Public Safety Security Article

Most Recent


  • AT&T wireless growth keyed by FirstNet—now provides 24,000 agencies with 4.4 million connections
    AT&T this week reported that FirstNet ended 2022 supporting more than 24,000 public-safety agencies with “about” 4.4 million connections, including 377,000 connections that were added during the last three months of 2022—a total that represents more than half of the carrier’s post-paid wireless growth for the quarter. AT&T officials released these figures in conjunction with […]
  • Report: Remote work causing offices to empty, but walkable cities still in high demand
    Given the reliance on vehicular transportation in the United States, some American cities historically haven’t prioritized being walkable in past planning and or design. But amid an unprecedented shift in the economy toward remote work, those that have are increasingly desirable for prospective residents. A new report from Smart Growth American and Places Platform, “Foot Traffic Ahead […]
  • AT&T FirstNet unleashes robotic dogs for emergency services
    AT&T is releasing robotic hounds from Ghost Robotics as part of the service provider’s FirstNet emergency responder service. In a blog, AT&T VP Lance Spencer explained that the robotic dogs will be connected to AT&T’s network and deployed for public safety, defense, federal and state agencies, local police and fire departments, and commercial customers. “Network-connected robotic dogs can deliver a […]
  • Federal agencies infested by cyberattackers via legit remote-management systems
    It has come to light that hackers cleverly utilized two off-the-shelf remote monitoring and management systems (RMMs) to breach multiple Federal Civilian Executive Branch (FCEB) agency networks in the US last summer. On Jan. 25, the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC) released […]

12 comments

  1. Avatar Tim Tyler 18th July 2013 @ 11:37 pm
    Reply

    What a horrible article, full
    What a horrible article, full of inane quotes, especially by Jorgensen. How is there no longer the “security element” to encryption if all fleet users have it?!
    The nitwits interviewed seem to be suggesting that with P25 encryption, all channels on the radio must be set-up for it. OF COURSE you don’t enable encryption on mutual-aid channels unless all potential mutual-aid responders have encryption with the same crypto key on their radios! Also, these days, most radios are capable of having several different crypto keys — the encryption key used by Narcotics or Internal Affairs on their channel doesn’t have to be the same crypto key used on Patrol channels — meaning both operations can utilize radios in a secure fashion, the special units having the crypto key for Patrol, but Patrol radios not having the ability to monitor Narcs or IA. With the more frequent use of scanner radios and ‘scanner’ apps for iPhone & Android devices by criminals, law enforcement certainly does need to consider the benefit of encrypting day to day radio traffic such as suspicious vehicle calls, silent alarms, etc.

    • Avatar Anonymous 19th July 2013 @ 2:55 pm
      Reply

      Actually it is better if
      Actually it is better if citizens use the scanner apps for iPhones and Android devices since there is a 30-60 second delay on the audio depending on internet connection. It is not real time like an actual scanner.

  2. Avatar Anonymous 19th July 2013 @ 2:07 pm
    Reply

    I fully support encryption
    I fully support encryption for special investigation units that may be investigating criminal activities by technologically savvy entities. However, encrypting daily dispatch traffic alienates the public as they no longer know what their Police Department is doing. In addition, neighboring agencies that have our dispatch channels in their radios would lose that immediate interoperability function unless they also had encryption and we key-loaded their radios. Even with non-encrypted mutual aid channels, the smooth flow of information will be impeded. Some of the boots on the street actually listen to neighboring agencies and start moving to assist before an official call for assistance is made.
    Using a common key for every channel is not wise either. If you desire to restrict access to specific channels, the best method is by limiting who has the encryption key for that channel.
    Encryption for specific units – Yes.
    Encryption on a wholesale basis – No.

  3. Avatar Bob Davis 19th July 2013 @ 3:40 pm
    Reply

    Pretty awful article on
    Pretty awful article on encryption. The fellow who wrote the article does not seem to actually know much technically and operationally about encryption. First, present day encryption available to public safety through the P25 standard requires the identical bandwidth of a non-encrypted call. Using encryption has zero spectrum impact. He is confusing the present day encryption of a true digital radio with older forms of analog based encryption which required increased bandwidth or a compromise in audio fidelity. Second, the writer creates the impression that encryption is an all or nothing proposition in a radio. Nothing could be further form the truth, locally we utilize encryption on Talk Groups when needed and disable it when not needed. We routinely operate with other jurisdictions that never use encryption on their talk groups or our talk groups. Encryption does not limit flexibility it simply adds another tool into ones tool box to take advantage of.
    Finally, I do agree with the author with respect to proprietary encryption standards. I do not know of any proprietary encryption standard that has not been broken in the public domain. The only thing the use of proprietary encryption accomplishes is the defeat of interoperability. I for one would like to see the FCC pull the Type Acceptance for any digital radio sold for use in the Public Safety spectrum which does not exclusively utilize the P25 standards. Doing so limits one to using DES/DES-OFB/AES encryption and further enhances overall interoperability.
    Like any technological tool we have at our disposal, the use of encryption requires planning, ongoing support and management. Vendors are not likely to be your best source of information when deciding to add encryption. Look to your APCO community, find others who have successfully implemented encryption into their operations and make plans based upon knowledge; then make the correct decision based upon your financial resources and operational needs.

    • Avatar Merrell 20th July 2013 @ 1:06 pm
      Reply

      I find that interesting,
      I find that interesting, considering Motorola even states in their customer handouts that there is a degradation of audio quality when using encryption. Yes, this applies to digital.
      I also agree with ailenating the public by encrypting everything. Remember who pays for all those radios…

      • Avatar Anonymous 1st October 2013 @ 11:40 am
        Reply

        I disagree with alienating
        I disagree with alienating the public….if anything the public wants their privacy. Sure there’s those where scanning is a form of entertainment but we need to be cautions of the privacy of citizens personal information in addition to securiy of operations.

  4. Avatar Anonymous 25th July 2013 @ 3:11 pm
    Reply

    I don’t expect the article to
    I don’t expect the article to be a refereed journal article loaded with inline citations and a list of references at the end. I won’t hit Donny with a “terrible” for that. He was tasked with distilling a complex topic down into simple terms and capturing the “word on the street,” which seems to be varied at best. The chief from New Hampshire expressed a common thread in the industry – poor information from what might be trusted sources. What can we attribute that to? A lack of dialogue, like we have generated here. How does 100% crypto dilute the effectiveness of security? As some here have already asserted, it is an erosion of public confidence. But aside from that, which is a contentious topic in and of itself, a full-on crypto mode presents opportunity and challenge for intercept. Let’s look at reality: there’s little funding today just to maintain core functions, let alone effective administration of key management facilities which change keys frequently. The majority of operation is set-and-forget, until equipment is lost or stolen, then, as the interviewee from South Carolina indicated, it’s hands-on with a KVL rekeying a new crypto key. This is a snapshot of radio reality in terms that even an IT person can understand. If you wanted a journal article, take the time to do the research, then submit it to a peer reviewed journal. And, my own experiences with DES-OFB and AES are that use of clear P25 and coded P25 are imperceptible, except I don’t get the beep in coded, the light blinks faster, and the scanner sounds jumbled up. It’s nothing more than that (unlike the DVP days).

    • Avatar Anonymous 26th July 2013 @ 3:47 pm
      Reply

      Agreed – voice scrambling in
      Agreed – voice scrambling in analog resulted in an unacceptable reduction in audio quality and system performance in our field trials. By contrast, our test group saw no change in audio quality with digital encryption. EXCEPT: When we used a form of encryption which relied on the radio’s general purpose CPU. In those cases, the CPU load did affect the delivered audio quality. Once we changed algorithms and offloaded the encryption workload to an option board, everything was peachy.

  5. Avatar Duh! 26th July 2013 @ 3:59 pm
    Reply

    The issue isnt that every
    The issue isnt that every channel needs to be encrypted. The issue HERE is that the vendors, // and Harris is selling these systems and telling customers that they HAVE to do this. The onus needs to be placed there. Anyone who bought a system because they were told they have to should lawyer up and sue the balls off of them. Of course encryption limits interoperability. Why do you think the NYPD hasnt done it yet? But Nassau County, just to the east of the city did. Everything, including FD patch channels are going to be full encryption.

    It all comes down to who has the prettiest system, where I am from and it sickens me.

  6. Avatar Anonymous 28th July 2013 @ 3:24 pm
    Reply

    Encryption is being sold as a
    Encryption is being sold as a panacea, With the illusion of privacy. Encrypt everyone and you can say anything you want and no one will know. Vendors pushed encryption with deep discounts and the promise of keeping all those pesky scanner listeners away. I support encryption for sensitive communications, but not for day to day traffic. Taxpayers paid for the system, and at a hefty price, in the case of Las Vegas Metro, nearly $60 million when it all said and done. And it “none of your business” what we say on the radio? Bad policy…

  7. Avatar Anonymous 19th May 2014 @ 3:41 pm
    Reply

    This is from a previous
    This is from a previous detective here in Florida, when you removed oversight from any governmental type agency, it is never good, we the people should stand up with big bolas, deny such from any local, county, state, or federal department, Thank johnny R (USMC & Previous detective in Fla)

  8. Avatar Ray Keith 17th November 2019 @ 8:48 am
    Reply

    I agree with encryption of personal information. But encrypting day to day Operations/dispatch frequencies shouldn’t be needed, unless you have something to hide. Seems to be alot of officer involved shootings and other questionable actions since law enforcement started encrypting. Tax payers paid alot of money for these systems and should have some say as to the operating of them. Not to mention the extra sets of eyes they’re taken away.

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Panel: P25 encryption is not for everyone
  • Panel: P25 encryption is not for everyone
  • Panel: P25 encryption is not for everyone
  • Panel: P25 encryption is not for everyone

Commentary


How 5G is making cities safer, smarter, and more efficient

26th January 2023

3GPP moves Release 18 freeze date to March 2024

18th January 2023

Do smart cities make safer cities?

  • 1
6th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

AT&T wireless growth keyed by FirstNet—now provides 24,000 agencies with 4.4 million connections dlvr.it/ShY5qH

27th January 2023
UrgentComm

Report: Remote work causing offices to empty, but walkable cities still in high demand dlvr.it/ShXM7Z

27th January 2023
UrgentComm

AT&T FirstNet unleashes robotic dogs for emergency services dlvr.it/ShW7p8

27th January 2023
UrgentComm

Federal agencies infested by cyberattackers via legit remote-management systems dlvr.it/ShVhn3

26th January 2023
UrgentComm

How 5G is making cities safer, smarter, and more efficient dlvr.it/ShVS1h

26th January 2023
UrgentComm

MCPTT interworking for critical communications dlvr.it/ShTm3P

26th January 2023
UrgentComm

Self-driving cars present terrorism risk, FBI director says dlvr.it/ShTTHx

26th January 2023
UrgentComm

UK Home Office officially will cut ESN ties with Motorola Solutions in December dlvr.it/ShNjfN

24th January 2023

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.