About those scanners...
Common sense tips for listening responsibly
I've been listening to police scanners since I was 16. I joined WFTV Channel 9 in Orlando as an intern, and I got hooked to the Uniden receivers that littered the assignment desk. Media access to police scanners has always been an informal, accepted mechanism of information exchange between the two institutions, although it is starting to fray. In New York and Los Angeles, you can listen to the NYPD and the LAPD do just about everything they do, in real time, in the clear.
I find this exciting and interesting, if maybe a bit morbid. I also think that public access to police and fire radio traffic is generally a good thing, a way that citizens can keep tabs on an expanding police state, something that encourages the law enforcement community to act in private as they would if they knew people were listening and watching.
But until recently, this little hobby of mine was not terribly popular or accessible. Scanners are pretty cheap, and only a few major police departments have upgraded to fully encrypted systems. But the rise of an open source media culture, the technology that allows apps to link to the personal radio scanners that use their own Internet connections to tie into a central website (radioference.com), and Twitter have made it a thing.
Subscribe to The Week
Escape your echo chamber. Get the facts behind the news, plus analysis from multiple perspectives.
Sign up for The Week's Free Newsletters
From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.
From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.
Without getting into a technical discussion of how police communication systems work, I do think — of course — that the police ought to be able to do certain things without worrying that a criminal might listen to them and get away. Some police departments use encrypted channels for surveillance or SWAT raids; others use them for sensitive details like dignitary or witness protection. Others try to get officers to switch to encrypted channels whenever perimeters are set up to catch a fugitive.
But generally, even the bad guys can listen to a scanner and come away with next to no information that helps them commit crimes. Unless you spend months at a time listening to a certain tour or deployment in a precinct or area, you really won't be able to draw a picture that would allow you to say, well, since these patrol cars are here, we can commit a crime here and get away with it. It happens, but it's still rare for criminals to be caught trying to escape the police using scanners. And trust me — they all know about the scanners. It's less rare for criminals to use transceivers or mobile phones to communicate with each other, but we're not going to ban mobile phones.
And even if you could, the police have all sorts of other ways of filling in the gaps: They use license plate readers, CCTV, and other technologies to quickly figure out who was where when things happened.
Now, as a scanner listener, it behooves you to consider certain things:
Sign up for Today's Best Articles in your inbox
A free daily email with the biggest news stories of the day – and the best features from TheWeek.com
(a) the information police put out over common channels, like Be-On-The-Lookouts (or BOLOs) is provisional and incomplete. Tweeting it is irresponsible for this reason.
(b) in emergencies involving the potential loss of life, like evacuation situations, it probably is better to let the police figure out how to tell people what to do.
(c) what you hear on a scanner is often an incomplete picture of what's actually happening. The LAPD has ways of communicating with officers through computers and mobile terminals; a lot of routine calls aren't dispatched on radio channels. So you draw conclusions about crimes, criminals, and situations at your own risk.
(d) The Boston Police Department Tweeted this out: "WARNING: Do Not Compromise Officer Safety by Broadcasting Tactical Positions of Homes Being Searched."
That should be obvious.
(e) back when I was working for a local news outfit, we never — NEVER — used information from the scanner on the air without a second source, either official or an eyewitness. I still think that's the accepted practice in local TV newsrooms.
Because authorities have the power to force police agencies to encrypt their channels, and because few will take the time to think about the equities the public and the media have in preserving access to them, I worry that this information commons, as it were, will be regulated too quickly because of the irresponsible actions of a few.
I would rather the Twitter community decide to self-adhere to a few simply rules. Don't Tweet out info from tactical channels — that'd be one. And if people abuse that, shame them, and don't retweet them. If we don't self-police, the police will, because they can, simply upgrade their communications systems.
Marc Ambinder is TheWeek.com's editor-at-large. He is the author, with D.B. Grady, of The Command and Deep State: Inside the Government Secrecy Industry. Marc is also a contributing editor for The Atlantic and GQ. Formerly, he served as White House correspondent for National Journal, chief political consultant for CBS News, and politics editor at The Atlantic. Marc is a 2001 graduate of Harvard. He is married to Michael Park, a corporate strategy consultant, and lives in Los Angeles.
-
'Underneath the noise, however, there’s an existential crisis'
Instant Opinion Opinion, comment and editorials of the day
By Justin Klawans, The Week US Published
-
2024: the year of distrust in science
In the Spotlight Science and politics do not seem to mix
By Devika Rao, The Week US Published
-
The Nutcracker: English National Ballet's reboot restores 'festive sparkle'
The Week Recommends Long-overdue revamp of Tchaikovsky's ballet is 'fun, cohesive and astoundingly pretty'
By Irenie Forshaw, The Week UK Published