All radios to be retired go thru the radio shop for proper deprogramming and reset to the factory default test codeplug. And that agency improved its radio retirement procedures so that it's less likely to happen in the future. I shipped those radios to that shop, they deprogrammed them free of charge, and sent them back to me. In the case of the radios I encountered, I was very lucky to have established a positive and productive conversation with the radio shop that had programmed them for that county as well as the agency that owned them. Seek alternative means of correcting the problem. Probably depends on whether or not the system managers understand the problem and are willing to be helpful. Get the radio shop that originally programmed them to wipe them. We can't have those live radios out in the wild." But because of this problem we're reclaiming them. That would require the selling agency to have to jump in and say "Yeah we sold those at auction. They might consider the radios stolen property and cause trouble. It's nothing but trouble.) $$$ spent if they'll even do it. ![]() Send them to the Motorola depot for deprogramming (and remove that feature while you're at it. What could be done with those radios? Options were limited. I've encountered a lot of XTS3000s that were legitimately sold at a county surplus auction, had this feature, were still programmed, still live on the system, and could NOT be deprogrammed due to that rather poorly conceived feature. Motorola has a feature, and forgive me, I SHOULD know what it's called, maybe personality lock? that when enabled restricts the radio to being read and programmed only from computers that are authorized to program that radio. Let's not forget that sometimes it's entirely the vendor's fault. The data is where in conventional computer crimes will fall, trs it'll be both. Just a warning for those thinking they can read away even in conventional. Your personal device also becomes fully subject to foia and records in your state and can be seized to determine or copy data. This should be a eye opener for those reading and writing radios that belong to a department and government entity.Įven if it's conventional systems you reading the data is now a computers crime. If Kvl had gone missing you'd think admin would say hey its gone and reprogram the fleet in a emergency type condition until the issue was resolved. Only way was is the kvl itself had to have been stolen or one of them assigned for that entity. If so this will be a big eye opener for those passively monitoring. None the less it's going to be interesting to see if they were all actually affiliating or passive and improperly programmed. They said the radios were stolen but are we sure? Is it auction radios from surplus, or in fact stolen? Sounds like radios were cloned or the data was entered from a copied template and they used valid system ids. You can also join the think-cell communities for students and teaching staff. Premium key signup: Sign up directly from think-cell with your associated MIT email address and get exclusive, early access to features, trainings, and individualized offers. Standard key download: Download license file, then obtain the installer from think-cell. Access think-cell through either of the two following methods: Current MIT students, faculty, and staff may request access for academic and non-profit purposes. Think-cell is available at no cost from the vendor to all academic institutions. Think-cell allows you to quickly create professional class presentations with a single PowerPoint add-on. Web, Data, and Servers Web, Data, and Servers.Network and Infrastructure Network and Infrastructure.End-User Support Tools End-User Support Tools. ![]() Mekkographics is also a good one, but I have not used it, only seen the outputs in slides. Highly recommend Think-Cell for functionality and ease of use. Educational Technology Educational Technology I had access to it over the summer as an intern and sorely missed it when I went back to business school.Collaboration and Communication Collaboration and Communication.Accounts and Passwords Accounts and Passwords.Visitors and Guests Learn what IT services are available to you as a guest or visitor. ![]() IT Administrators Staff Students Before you start.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |