A Marine Grunt’s Take on GPS, Compasses, Radios and the ‘Golden Hour’

Soldiers taking part in the Network Integration Evaluation exercise at Fort Bliss, Texas

U.S. Army photo by Staff Sgt. Kulani J. Lakanaria

AA Font size + Print

Soldiers taking part in the Network Integration Evaluation exercise at Fort Bliss, Texas

Despite advances in technology on the battlefield, when it comes down to determining north, south, east or west, the compass is still a mighty handy gadget. By Bob Brewin

I had the pleasure to have lunch with four Marine officers at Fort Bliss, Texas, last week at the Army Network Integration Evaluation exercise, where they were testing a joint satellite-based command and control system planned for use by both services.

One of them, Maj. Christopher McGuire, executive officer of the 3rd Light Armored Reconnaissance Battalion, based at Marine Corps Air Ground Combat Center, Twentynine Palms, Calif., offered some valuable insight into the use of technology on the battlefield based his experience during three tours in Iraq.

This starts with basic tools, such as a compass, which “as a Marine infantry officer I know how use,” McGuire said, along with a GPS receiver to determine location and direction. When it comes down to determining, north, south, east or west, the compass is still a mighty handy gadget, McGuire said.

His young Marines are tech savvy but still need to figure out the correct “time and place for application of technology” when eyeballs, for example, could do a better job, he said.

When inter-squad radios were first fielded, McGuire encountered a squad leader “yelling into a radio” to contract a fire team leader. McGuire walked up to the squad leader, pointed, and said, “Look, you can see the fire team leader,” with the implication that a short walk would eliminate the need to yell into a radio.

Technology improved the survival rates for combat wounds to 90.4 percent in Iraq, due in part to satellite systems, which slashed the time to call in a medevac, McGuire said

That satellite system, McGuire said, meant the Marines “could get a bird en route instantly,” compressing, the vital “Golden Hour,” which can determine the difference between life and death.

Close [ x ] More from DefenseOne

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.


When you download a report, your information may be shared with the underwriters of that document.