Comment Cryptographic keys (Score 1) 135
I am afraid that's not the way it works. Public-key encryption doesn't really give you the capability to decode the communication of two other parties unless you get the secret (rather than public) key, which they have no reason to give you. There is also a session key that is randomly generated and lives only for the duration of the connection, and there is the potential for VPNs or tunneling that further obscure the actual communication. It's actually very difficult for a monitoring station to even get 100% of the packets reliably, although the two stations in the communication do get them. So you may not be able to reconstruct all of the bits in the stream, and this will break decryption too.
All of this adds up to so many technical hurdles that in practice you have to be NSA to decode the communication, hams who are attempting to self-regulate will not have the appropriate resources.