Analyst & Research Reports

O'Reilly Modern Defense in Depth

Issue link:

Contents of this Issue


Page 21 of 53

that brings "modern awareness" to the battlefield. This sharing of intelligence produces integration of the lines of defense. When one line is under assault, intelligence about the enemy's tactics, techni‐ ques, and procedures (including weaponry) are collected and com‐ municated to all other lines of defense. This intelligence is used by the other lines to shore up their own defenses and allows time for adjustments to be made where needed. Figure 2-1 presents an example of how "integrated lines of defense" are obtained in a modern military. Figure 2-1. e military approach to integrated lines of defense. Examples of the possible lines of military defense that are very com‐ mon today might include Recon (reconnaissance), Special Ops, Infantry, Armor, Artillery, and Aviation. Although these lines of defense appear to be quite independent of one another, they are actually integrated in a very cohesive fashion. The integration comes in the form of enemy threat intelligence that is relayed to Central Command via satellite, cellular, or radio com‐ munications by the work of the Signal Corps, as shown in the figure. After the threat intelligence is ingested by Central Command, it is then put into action by relaying this intelligence back to the appro‐ priate lines of defense, as depicted in the figure, that can consume the intelligence and put it into its proper action. In a modern military operation, when one line of defense is under assault, the other lines of defense become acutely aware of the line that's under attack due to information sharing from Central Com‐ 12 | Chapter 2: Learning from Military Defense

Articles in this issue

view archives of Analyst & Research Reports - O'Reilly Modern Defense in Depth