[Scan-DC] Why some police departments let anyone listen to their scanner conversations - even criminals

Ed Tobias edtobias at comcast.net
Sat Dec 5 11:21:07 EST 2015


Yes, the article is well written.

I heard most of the transmissions that it quotes while in my car, using the 5-0 Radio app.  Amazingly, the app showed that the San Bernardino System 10 stream had more than 100,000 listeners during the afternoon and evening. 

As the WaPo piece indicates, and as we all know, not all of what what was transmitted turned out to be accurate.  And it's common for people to Tweet whatever they hear, regardless, spreading that misinformation. (It's the "I know something you don't know" syndrome).  This problem is compounded when traditional media outlets pick up these tweets and use the info without verification. 

On the other hand, why did San Bernardino's police chief tell reporters, for hours, that no officer had been hurt when, having heard the transmissions about the officer who was wounded by a ricochet, thousands of people knew that what he was saying wasn't correct?  Chief Burguan, on the whole, did a very good job of providing information updates during an extremely dynamic and confusing incident. However, the best info came from listening to the scanner feeds.  But, you need to listen with an educated ear.

But we all know that, don't we?


Ed



Sent from my iPad



Sent from my iPad
> On Dec 5, 2015, at 3:28 AM, Alan Henney <alan at henney.com> wrote:
> 
> 
> After the gun control news articles come the scanner radio/app stories.  
> 
> Skimming the article, it appears that Danielle Paquette was fair and accurate on this one, no?
> 
> 
> BTW, anybody else notice that the terrorists are using Hytera radios now, moving up the food chain from Baofeng?
> 
> https://twitter.com/AlBing1311/status/666266936284684288
> 
> ----
> 
> Washington Post Blogs
> 
> December 4, 2015 Friday 4:09 PM EST 
> 
> Why some police departments let anyone listen to their scanner conversations - even criminals
> 
> BYLINE: Danielle Paquette
> 
> LENGTH: 867 words
> 
> Hours before authorities released his identity, a name crackled over the San Bernardino police scanner: Syed Farook. This man, officers suspected, was one of two assailants who opened fire at an office holiday party Wednesday afternoon, killing 14 people and wounding 21 others. He now blazed down a Southern California highway in a black SUV with an accomplice, a handgun and an assault rifle.
> 
> An officer spoke into the public airwaves, "We've got shots fired out the back window." 
> 
> And anyone with an Internet connection could listen:
> 
> Officer suffered 'ricochet' wound in gun battle, according to scanner traffic. Rescue helo not needed. One man on the run #SanBernardino
> 
> "One down outside the car, one down inside the car, one's on the run. Copy," -#SanBernardino PD scanner now
> 
> - D.G. Seaman (@d_seaman) December 2, 2015
> 
> San Bernardino Police say: "Do not give out any information to the media"...On a public scanner feed. #Sanbernardinoshooting
> 
> "one detained" as per scanner in San Bernardino
> 
> - Ricky Vaughn (@Ricky_Vaughn99) December 2, 2015
> 
> I have every San Bernardino area scanner running. There's a reason I'm not blasting out what's coming over. Bad guys use social media.
> 
> As Twitter eavesdropped, the hunt for Syed Rizwan Farook, 28, and Tashfeen Malik, 27 - the married couple behind the mass murder - climaxed that evening in a police shootout.
> 
> The scanner chatter, captured in this Soundcloud, revealed the responding officers' tactics ("We have the suspect vehicle stopped. We're going to extract him. Wait for the BearCat"). Some users pointed out such information could help the criminals, if they or a remote third party happened to be tuned in.
> 
> Again, YES I'm listening to the #SanBernardino police scanner and NO I won't be tweeting the details. Let police do their jobs w/safety.
> 
> This problem led the Washington, D.C. police department to start encrypting channels in 2011. Only people with passwords or the right hardware can tune in.
> 
> "Whereas listeners used to be tied to stationary scanners, new technology has allowed people - and especially criminals - to listen to police communications on a smartphone from anywhere," Police Chief Cathy Lanier said at the time. "When a potential criminal can evade capture and learn, 'There's an app for that,' it's time to change our practices."
> 
> Criminals used the scanners to stay ahead of police, Lanier argued at a city council hearing. The open channels, she said, helped criminals pull off a series of carjackings.
> 
> Which raises the question: Police in the United States aren't legally obligated to broadcast their conversations, so why do many departments still grant this all-access pass?
> 
> The answer, according to Daniel Isom, former chief of the St. Louis police: The benefit exceeds the trouble.
> 
> "People listen because they want to know what's going on in their community," he said. "Maybe they could have heard about the situation in San Bernardino and fled the area. Or maybe they lived nearby, looked out the window and saw the [license plate number] on that SUV."
> 
> Besides, non-officers rarely rush to still-volatile crime scenes - at least in St. Louis, Isom said. He appreciates eager reporters, too; they publish information that helps the public spot a perpetrator.
> 
> But scanners can also spread misinformation. Take the manhunt after the Boston marathon bombing: Listeners heard names of people who weren't actually suspects. Some of those people received death threats.
> 
> Departments in California, Florida and New York, for example, have also encrypted their conversations. Some offer special radios or log-ins for the media. Others have replaced scanners with email blasts to crime reporters (who complain they're updated too late).
> 
> John Banzhaf, a law professor at George Washington University and former engineer, said the rise of smartphones created the dilemma for police departments. "In the past, people had to go out and buy a separate piece of equipment," he said. "This involved some expense, and a bit of expertise to operate."
> 
> But efforts to safeguard sensitive information now, he said, could actually slow down emergency responders during terrorist attacks and natural disasters. "Any system to get everyone in a major metropolitan area into one encrypted communications system is bound to fail from time to time," Banzhaf said. "Possibly when instant communication and close coordination is most vital."
> 
> Police officials in Greenwich, Conn. said they considered encrypting conversations but ultimately decided to keep channels open. "Because we've always retained the ability to encrypt traffic on a case-by-case basis when we need to, in a community like Greenwich, I think the transparency we achieve by allowing people to listen to our radio communications certainly outweighs any security concern we have," Capt. Mark Kordick told USA Today.
> 
> That's good news for all those nosy people on Twitter. In a world of constant chaos, police scanners have become a social event: We connect through tragedy.
> 
> "There's this built-in tendency to engage in surveillance," said Frankie Bailey, a criminal justice professor at the University at Albany, SUNY. "We want to know what's going on, the details, the inside story."
> ______________________________________________________________
> Scan-DC mailing list
> Home: http://mailman.qth.net/mailman/listinfo/scan-dc
> Help: http://mailman.qth.net/mmfaq.htm
> Post: mailto:Scan-DC at mailman.qth.net
> 
> This list hosted by: http://www.qsl.net
> Please help support this email list: http://www.qsl.net/donate.html


More information about the Scan-DC mailing list