RADIO TRANSMISSION SECURITY
Critical Task: 113-573-6001
In this lesson you will learn the various areas that require consideration in communications
security and authentication.
TERMINAL LEARNING OBJECTIVE:
Identify the goals of communications security; indicate how to achieve
communications security; describe the requirements of military
communications; define authentication procedures; and use authentication
You will be given this subcourse booklet.
You must have a complete understanding of communications requirements, its
security goals, and how to achieve it through the use of authentication
REFERENCES: The material contained in this lesson was derived from FM 24-33.
Battles are won or lost through the effective or ineffective use of communications. The enemy
can derive valuable and critical data from the disclosure of military information. Through the
effective use of communications security, we are able to surprise the enemy as well as reduce
susceptibility to enemy attack against our forces. This lesson will teach you how to achieve
communications security as a radio operator. This lesson, as in Lesson 1, is presented in frames.
After you complete a frame, check your response and proceed to the next frame. When you feel
confident that you are proficient on the information presented, take the practice exercise and
check your answers against the answer key and feedback sheet before taking the final