Two-Way Radio Etiquette

Basic Rules of Radio Communication

Many of our customers have asked us how to talk on a radio? and what is/are a/the basic principle(s) of effective radio communication? Over the years, specific rules, or etiquette, have been established to make radio communication go more smoothly. Here is the basic etiquette a radio user needs to quickly answer and understand to help improve their overall experience when using two-way radios to communicate effectively.

  • The international radio language is English, except in cases where you are licensed to speak in some other language.
  • When using a two-way radio, you cannot speak and listen simultaneously as you can with a phone.
  • Don’t interrupt if you hear other people talking. Wait until their conversation is finished.
  • Unless it is an emergency – if it is an emergency, inform the other parties that you have an urgent emergency message (see “Emergency Calls” below).
  • Do not respond if you aren’t sure the call is for you. Wait until you hear your call sign to respond.
  • Never transmit sensitive, confidential, financial, or military information. Unless you are certain your conversations are secured with the proper level of encryption for the level of sensitivity, assuming others can hear your conversations.
  • Perform radio checks to ensure your radio is in good working condition.
    • Ensure the battery is charged and the power is on.
    • Keep the volume high enough to be able to hear calls.
    • Regularly make radio checks to ensure everything is working and you are still in range to receive signals.
  • Memorize call signs and locations of persons and radio stations you communicate with regularly.
    • In radio communication, you are not called by your name. Everybody has their own unique call sign.
  • Think before you speak.
    • Decide what you are going to say and to whom it is meant for.
    • Make your conversations as concise, precise, and clear as possible.
    • Avoid long and complicated sentences. If your message is long, divide it into separate, shorter messages.
    • Do not use abbreviations unless they are well understood by your group.

Four Golden Rules of Radio Communication

Your voice should be clear. Speak a little slower than normal. Speak in a normal tone; do not shout.

Keep your message simple enough for intended listeners to understand.

Be precise and to the point.

Do not transmit confidential information on a radio unless you know the proper security technology is in place. Remember, frequencies are shared. You do not have exclusive use of the frequency.

Speak the Language

General Terms                Meaning

Radio CheckWhat is my signal strength? Can you hear me?
Go AheadYou are ready to receive transmission.
Stand-byYou acknowledge the other party, but I am unable to respond immediately.
Roger or Ten FourMessage received and understood.
NegativeSame as “No”.
AffirmativeSame as “Yes”. Avoid “yup” or “nope” as they are difficult to hear.
Say AgainRe-transmit your message.
OverYour message is finished.
OutAll conversation is finished, the channel is clear for others to use.
Break, Break, BreakYou are interrupting in the middle of communication because you have an emergency.
Read You Loud & ClearResponse to “Radio Check”. Means your transmission signal is good. Al- so use ” Read you 5-by-5″.
Come inYou are asking the other party to aknowlege they hear you.
CopyYou understand what was said
WilcoMeans “I will comply”.
RepeatUsed before you repeat something. ex: “I require 9-5,
repeat 9-5, gallons of diesel fuel. Over.”
That Is CorrectYes, Yup
AcknowledgeDid you hear me/Do you understand?
CorrectionSaid before someone is correcting previously relayed information
Do You Read?Are you there? Please reply.
Stand ByWait a moment. Busy.
CheckI understand. Got it.
ConfirmIs that right/correct? Do I understand properly?

Phonetic Alphabet

You will almost certainly have to use the phonetic alphabet in your conversations over a two-way radio. Many letters and words sound alike, so in order to make sure you are communicating clearly, you can use the phonetic equivalents of letters that are often confused, such as ‘F’ and ‘S’, ‘T’ and ‘C’, or ‘M’ and ‘N’.

A- ALPHAH- HOTELO- OSCARV- VICTOR
B- BRAVOI- INDIAP- PAPAW- WHISKEY
C- CHARLIEJ- JULIETQ- QUEBECX- X-RAY
D- DELTAK- KILOR- ROMEOY- YANKEE
E- ECHOL- LIMAS- SIERRAZ- ZULU
F– FOXTROTM- MIKET- TANGO 
G– GOLFN- NOVEMBERU- UNIFORM 

About MCA

MCA is one of the largest and most trusted integrators in the United States, offering world-class voice, data, and security solutions that enhance the quality, safety, and productivity of customers, operations, and lives.

More than 65,000 customers trust MCA to provide carefully researched solutions for a safe, secure, and more efficient workplace. As your trusted advisor, we reduce the time and effort needed to research, install, and maintain the right solutions to make your workplace better.

Our team of certified professionals across the United States delivers a full suite of reliable technologies with a service-first approach. The MCA advantage is our extensive service portfolio to support the solution lifecycle from start to finish.

Let's Talk!

Share This Article

You Might Also Like

Search MCA

Subscribe to our free newsleter today to stay up to date on the latest MCA news and offerings.

MCA brand infographic.

Free Download

20-Point Security Audit

Communication. Coordination. Control.

Security threats are evolving. Is your facility’s protection evolving with them?

From AI-powered surveillance and access control to concealed weapon detection and cloud-based video backup, today’s security landscape demands more than just cameras and locks—it requires integration, automation, and insight.

Are You Missing a Critical Piece of Your Security Ecosystem?

  • Is every access point under surveillance and recording?
  • Are unauthorized individuals blocked with modern access controls?
  • Is your system backed up, integrated, and future-ready?
  • Are you using analytics and AI to monitor and respond in real-time?

This quick 20-Point Security Audit helps you evaluate your current systems, uncover hidden vulnerabilities, and identify opportunities for improvement.

Fill out the form below to download the checklist and discover how MCA’s integrated security ecosystems can:

  • Detect threats faster
  • Control access intelligently
  • Unify video, detection, and access into a single, easy-to-manage platform

Whether you’re attending GSX or evaluating your next phase of facility protection, MCA is your trusted advisor in next-gen security.