N4JRI's Radio Pages

Security Scanning Strategy

NOTE: The information on this page reflects my strategies prior to the refarming of the land mobile bands. Even so, many of these radio systems day back to the 1970's and the strategies should work fairly well. I will include my own comments on how the situation has changed, and you can also see some obvious ways of updating this process.

STIPULATION: We're going assume that it's just you and your radio. No FCC records, no copies of Beyond Police Call, no frequency counters, etc. These would obviously be first lines of attack, but sometimes it's just you and the radio.

 

First Line of Attack:  Do you see the radio? What frequency band?

Hopefully, you will actually see the person that you want to monitor and be able to determine from his/her radio, the frequency band that it probably occupies. It used to be easy. 6" and thick was high band, 6" and thin or 3" and thick was UHF. 6" thin at the top and thick for the bottom 3" was 800. Now, it's more common to find shorter duckies for high band, and 6" thin antennas for 800/900 MHz.

 

Second Line of Attack: Does the entity being guarded qualify for frequencies other than the Business Service?

If your entity qualifies for Governmental, Manufacturing, Motion Picture, Power/Water, etc. frequencies, then these should be checked. If you have accurate info on these bands, try them out. If not, go ahead to your preprogrammed frequencies.

 

Third Line of Attack:  Preprogrammed memory banks of commonly used frequencies.

Even if you don't know what band to search, it's always a good idea to try and eliminate the most commonly used frequencies ASAP. I keep four memory banks (20 channels each) programmed in at all times, so that I can go to work quickly. Often, I hit paydirt right off the bat. If they come up silent, I know that it's time for band searching.

I maintained four memory banks for guard-hunting, based on the supposition that Business service frequencies were going to be the primary target in hotels, malls, office buildings, etc.  These banks were:

Fourth Line of Attack:  Band Searching

Prior to refarming, the memory scan eliminated my high band frequency targets. Many more frequencies are available now, and a band search is probably needed for the following ranges in 7.5 kHz steps.

But at the time, I could consider VHF eliminated in most urban areas. So searching concentration was on UHF.

Today, we would also add refarmed bands:

After UHF was thorough searched, I would relucatantly start dealing with the 800 band. I would always hope for a conventional system, but be ready to search for a trunked system.

Fifth Line of Attack:  Searching for a Trunk

This was easier in the early days of trunking than it is now. Most trunked systems had repeater outputs at 856.0125-860.9875 with mobiles at 811.0125-815.9875, or 861.0125-865.9875 with mobiles at 816.0125-820.9875. In most cases the number of frequencies would be a multiple of 5, and there would be sets of 5 channels, neatly spaced 1 MHz apart.

Step 1 would be to search the repeater outputs and see just how busy the band was. If it was very thin, I'd grab a freq like 861.2375, and program it in along with 862.2375, 863.2375, 864.2375 and 865.2375.  If the band were loaded, I'd put in moble channels like 816.2375, 817.2375, 818.2375, 819.2375 and 820.2375. This is how I found the system for the Virginia State Fair. A friend got a counter hot, we plugged in all the matching mobile freqs, and by scanning them could follow conversations that were local to the fairgrounds.

Today, this is very difficult because they frequencies don't always form cute, predictible patterns. You'd probably have to do quite a bit of mobile searching, followed by control channel monitoring before everything matches up. Not being much of a trunktracker, I'd have to refer you to the Real Virginia Radio page where an expert does reside. (link coming soon)

Back to Security Scanning Page

Back to Scanner Page    Home      Email N4JRI