Fact-checked by Grok 2 weeks ago

Kill chain

The kill chain is a delineating the phased sequence of activities—typically find, fix, track, , engage, and assess (F2T2EA)—to detect, prosecute, and neutralize an adversary through coordinated , , and kinetic action. Originating in U.S. targeting processes during the late under General John Jumper, the framework aimed to integrate precision-guided munitions with real-time to shorten attack timelines from hours to minutes amid post-Cold War shifts toward . In the F2T2EA model, "find" involves initial detection via sensors, "fix" confirms target identity and location, "track" maintains persistent monitoring, "" designates appropriate effectors, "engage" executes the strike, and "assess" evaluates battle damage to inform follow-on actions, with each phase interdependent to minimize errors and delays. This structured approach has underpinned joint operations, enabling scalable application from tactical strikes to strategic campaigns, though its efficacy hinges on resilient command-and-control networks resistant to and attrition. The concept's defining characteristic lies in its emphasis on compressing the "sensor-to-shooter" loop to outpace enemy countermeasures, a necessity amplified by great-power competition where hypersonic weapons and distributed forces demand sub-minute responses. Proponents highlight achievements in conflicts like the , where kill chain integration facilitated low-collateral precision strikes, but critiques note vulnerabilities in contested environments, such as overloaded data flows or disrupted communications, prompting evolutions toward AI-augmented automation and multi-domain synchronization. While primarily a doctrinal tool for kinetic operations, the kill chain has influenced non-military domains, including cybersecurity adaptations modeling adversary intrusion phases, underscoring its utility in dissecting sequential threats.

Military Kill Chain

Definition and Core Phases

The military kill chain is a doctrinal framework in U.S. targeting processes that outlines the sequential steps required to detect, locate, prioritize, , and evaluate , particularly in dynamic or time-sensitive scenarios. Formally known as F2T2EA—standing for Find, Fix, Track, , Engage, and Assess—this model integrates , command, and fires functions to enable rapid decision-making and effects generation against adversaries. It applies to both lethal and nonlethal operations, with the primary objective of minimizing the interval from to , often compressing it to minutes in high-threat environments. The core phases of the F2T2EA kill chain are interdependent and iterative, allowing for feedback loops to refine actions based on real-time data.
  • Find: Intelligence assets, such as sensors or reconnaissance platforms, detect and initially identify potential targets within a defined area of operations. This phase relies on surveillance data to cue further analysis, distinguishing threats from non-threats.
  • Fix: The target's location is precisely determined using geospatial coordinates, often through triangulation or direct observation to achieve sufficient accuracy for engagement.
  • Track: Continuous monitoring maintains situational awareness of the target's position, velocity, and status, compensating for mobility or evasion tactics. This phase employs persistent surveillance to prevent loss of custody.
  • Target: Commanders or targeting cells validate the target against rules of engagement, assign priority, and develop a specific plan of attack, including weapon selection and collateral risk assessment.
  • Engage: Fires or effects are delivered via appropriate platforms, such as aircraft, missiles, or artillery, to neutralize the target in accordance with the approved plan. Execution emphasizes precision to achieve desired outcomes with minimal unintended consequences.
  • Assess: Battle damage or effects are evaluated through imagery, signals intelligence, or other measures to confirm success, identify shortfalls, and inform re-engagement if necessary. This phase closes the loop, enabling adaptation in subsequent cycles.
Disruptions in any phase can break the chain, underscoring the need for resilient sensors, communications, and decision networks. In practice, the model's effectiveness hinges on technological integration and human judgment to handle uncertainty and adversarial countermeasures.

Historical Origins and Evolution

The concept of a structured kill chain in military operations traces its formalized origins to U.S. Air Force targeting processes developed in the late 20th century, building on earlier ad hoc phases observed in World War II air campaigns where sequential steps for detection, decision, and destruction were employed without standardized acronyms. By the 1990s, amid lessons from the Gulf War, Air Force General John P. Jumper proposed the F2T2EA framework—Find, Fix, Track, Target, Engage, Assess—as a systematic model for dynamic targeting in high-tempo air operations, emphasizing rapid sensor-to-shooter cycles to compress decision timelines against time-sensitive targets. This model integrated intelligence, surveillance, reconnaissance (ISR), and precision strike capabilities, reflecting a shift from deliberate planning to real-time adaptability in conventional warfare doctrines. In the era, the kill chain evolved significantly within U.S. forces during operations in and , where the linear F2T2EA proved insufficient for fluid, human-centric threats like high-value insurgent networks. This led to the adaptation of F3EAD—Find, Fix, Finish, Exploit, Analyze, Disseminate—around the mid-2000s, particularly by (JSOC), to fuse operational execution with iterative exploitation, enabling rapid follow-on targeting from captured data and reducing cycle times from weeks to hours in campaigns against and ISIS affiliates. The framework's emphasis on exploitation and dissemination addressed causal gaps in traditional models by treating each engagement as an intelligence multiplier, yielding empirical gains such as the neutralization of over 3,000 insurgent leaders through accelerated targeting loops between 2006 and 2011. By the 2010s, as peer competitors like and demonstrated anti-access/area-denial (A2/AD) capabilities, the kill chain further evolved toward networked "kill webs" in (JADC2) doctrines, decentralizing authority and integrating cross-domain assets—air, sea, land, space, —to counter compressed enemy decision cycles under 20 minutes. This progression prioritized and scale, with U.S. initiatives focusing on AI-driven to achieve kill chain speeds exceeding 1,000 targets per day in simulated high-end conflicts, while mitigating vulnerabilities exposed in earlier models during low-intensity wars. Such adaptations underscore a causal emphasis on empirical performance metrics, like latency, over rigid linearity, though implementation challenges persist in contested electromagnetic environments.

Implementation in Modern Warfare

The F2T2EA kill chain is executed in modern U.S. military operations through integrated intelligence, surveillance, and reconnaissance (ISR) platforms, command-and-control networks, and precision-guided munitions, enabling joint forces to conduct dynamic targeting against time-sensitive threats. Since the late 1990s, the U.S. Air Force has applied this model to synchronize sensors for detection, ground or air assets for fixation and tracking, human or automated decision loops for targeting, effectors like missiles or drones for engagement, and battle damage assessments via follow-on surveillance. This process supports both deliberate strikes on fixed infrastructure and adaptive responses to mobile adversaries, as outlined in Air Force doctrine for optimizing effects across kinetic and non-kinetic capabilities. In and campaigns, such as those in and , the kill chain underpinned drone strike operations by (JSOC), where analysts processed live video feeds from platforms like MQ-1 Predators to nominate, validate, and prioritize targets through a structured chain of command involving multiple approval layers before engagement. Similarly, during (2014–present) against in and , persistent from MQ-9 Reapers and satellites facilitated rapid find-fix-track cycles, allowing coalition forces to execute thousands of precision strikes on leadership and convoys, often compressing the full chain to hours or less via real-time data fusion. Ground teams and special operators contributed on-the-ground fixation, enhancing accuracy in urban environments. Contemporary implementations emphasize scalability and speed in peer or near-peer conflicts, evolving the linear kill chain toward a distributed "kill web" via (JADC2), which networks sensors across air, land, sea, , and domains to enable global targeting and resilient effector options. For instance, U.S. map algorithms to F2T2EA phases for anti-access/area-denial scenarios, automating threat identification and response to counter hypersonic or swarm threats. As of 2025, initiatives integrate into command nodes to alleviate operator workload, accelerating target handoff and assessment in simulated high-intensity operations. These enhancements aim to execute kill chains at machine speeds while maintaining human oversight for ethical targeting.

Technological Enablers and Advancements

Advancements in intelligence, surveillance, and reconnaissance (ISR) systems have significantly enhanced the "find" and "fix" phases of the F2T2EA kill chain by providing persistent, multi-domain sensor coverage. Modern ISR platforms, including unmanned aerial vehicles (UAVs), manned aircraft such as the RQ-4 Global Hawk, and space-based assets, enable real-time detection of mobile targets with improved resolution and revisit rates, addressing previous limitations in periodicity for near-peer conflicts. For instance, edge processing technologies reduce data latency by handling queries closer to the sensor, facilitating long-range kill chains through faster multi-domain ISR fusion. Artificial intelligence (AI) and (ML) algorithms automate target identification, tracking, and prioritization, compressing the overall kill chain timeline from hours to seconds in dynamic environments. In U.S. experiments conducted under the ShOC-N program in 2025, AI provided real-time recommendations for dynamic targeting, allowing operators to compare automated suggestions with human assessments and reduce across F2T2EA phases. Similarly, the U.S. Army has integrated AI/ML to accelerate for lethal and non-lethal fires, enabling quicker location, identification, and engagement decisions as of 2023. These tools enhance accuracy by classifying data and mitigating , though their effectiveness depends on robust training datasets and resilient architectures to counter adversarial disruptions. Joint All-Domain Command and Control (JADC2) architectures represent a pivotal advancement in integrating disparate sensors and effectors, transforming sequential kill chains into resilient "kill webs" that distribute tasks across domains. The U.S. Air Force's Advanced Battle Management System (ABMS), a core JADC2 component, supports rapid data sharing to close kill chains against time-sensitive targets, with demonstrations showing sensor-to-shooter timelines reduced through cloud-based fusion as early as 2020 experiments. This evolution counters adversary anti-access/area-denial (A2/AD) strategies by enabling cross-domain cueing, such as sensors queuing platforms for engagement. Over the past three decades, the has iteratively refined kill chain efficiency via networked architectures, incorporating survivable platforms and scalable processing to maintain superiority against evolving threats. Programs like Ultra I&C's solutions further optimize F2T2EA by enhancing sensor-to-decision loops with modular electronics, tested in operational scenarios as of 2023. These technologies collectively prioritize speed, scope, and , though sustained investment is required to outpace competitors' parallel developments in contested environments.

Strategic and Operational Challenges

Legacy linear kill chains in military operations are highly vulnerable to adversarial strategies focused on system destruction, such as those employed by China's , which target critical nodes like sensors, datalinks, and command centers to disrupt the entire process. This vulnerability arises from reliance on high-demand, low-density assets with limited redundancy, where the loss of even a single node, such as an AWACS or JSTARS platform, can cascade into operational paralysis, particularly against mobile targets comprising approximately 80% of scenarios in potential conflicts like a Chinese invasion of . Strategically, U.S. forces face competition in scale, scope, speed, and survivability, as aging inventories— the smallest and oldest in history since the mid-2000s—struggle to generate sufficient simultaneous kill chains against peer adversaries employing anti-access/area-denial (A2/AD) tactics, , and decoys. Operationally, kill chains demand compressed timelines for detection-to-engagement, often measured in minutes, but legacy processes optimized for low-intensity conflicts prove too slow for high-end peer warfare in contested environments like the , where communication denial renders centralized models ineffective. Data overload from proliferating sensors across satellites, aircraft, drones, and ground units exacerbates decision-making delays, as commanders receive excessive volumes that hinder rapid prioritization without advanced and for distillation and target allocation. Rigid, platform-centric architectures further complicate adaptability, necessitating a shift to distributed "kill webs" that enable resilient, network-enabled operations but require overcoming brittle, incompatible networks like Link-16. Implementation challenges include interoperability across joint and multinational forces, where convoluted command-and-control hierarchies across echelons and agencies prolong cycles, as evidenced by historical difficulties in programs like Naval Integrated Fire Control-Counter Air (NIFC-CA), which achieved initial operational capability in 2014 but faced integration hurdles with legacy systems. Transitioning to mosaic warfare concepts demands robust , distributed command structures, and rapid , yet these introduce complexities in communication reliability and control authority amid near-peer threats that exploit redundancies for counterattacks. Efforts to modernize, such as the Army's system and Advanced Management System, aim to automate dynamic targeting for improved speed and accuracy, but persistent legacy dependencies and underfunding risk sustaining vulnerabilities in multi-domain operations.

Cyber Kill Chain

Adaptation from Military Concept

The Cyber Kill Chain model, introduced by in 2011, directly adapts the U.S. military's kill chain concept—originally a structured process for targeting adversaries in kinetic operations—to analyze and disrupt cyber intrusions by advanced persistent threats (APTs). This adaptation reframes the military doctrine's emphasis on sequential steps to locate, engage, and evaluate targets into a defensive framework for cybersecurity, where the "adversary" is a remote intruder rather than a physical entity. The model emerged from 's analysis of APT campaigns observed since 2005, integrating behavioral indicators to hypothesize and test intruder tactics, thereby shifting focus from vulnerability patching to proactive threat disruption. In , as detailed in Joint Publication 3-60 (Joint Targeting, 2007), the kill chain comprises six phases: find (detecting the target), fix (locating precisely), track (monitoring movement), target (selecting for engagement), engage (executing the strike), and assess (evaluating effects), often abbreviated as F2T2EA. Lockheed Martin's paper explicitly draws from this: "A kill chain is a systematic process to target and engage an adversary to create desired effects," applying it to intrusions where defenders aim to break the chain at any phase to prevent compromise. The variant expands to seven phases—, weaponization, , , , , and actions on objectives—to capture the extended preparation and persistence typical of operations, unlike the more immediate kinetic cycle. This adaptation prioritizes intelligence-driven over reactive measures, treating each as an opportunity for detection and , analogous to interdicting forces mid-chain. For instance, mirrors the "find" but involves digital footprinting, while actions on objectives parallel "engage and assess" by executing or disruption. By mapping APT behaviors to these steps, the model enables hypothesis testing via indicators (e.g., anomalous traffic signaling ), fostering resilient architectures that evolve with observed threats rather than static signatures. Lockheed Martin's framework, rooted in its expertise, thus translates wartime targeting realism into , emphasizing that halting one link suffices to neutralize the attack.

Detailed Phases of the Model

The Cyber Kill Chain model, developed by , delineates seven sequential phases that advanced persistent threats (APTs) typically follow to compromise and achieve objectives within target networks. This framework, informed by empirical analysis of real-world intrusions such as those attributed to actors like APT1, maps adversary behaviors to enable detection and disruption at each stage, emphasizing that interrupting any phase can halt the attack. The model assumes a linear progression but acknowledges potential overlaps or iterations in sophisticated campaigns. Reconnaissance: Adversaries conduct research to identify and select targets, gathering intelligence on vulnerabilities through passive or active means, such as scanning public websites, profiling, or for discarded documents. This phase often leverages social engineering to pinpoint individuals with access privileges, as seen in campaigns where attackers enumerated employee details from corporate directories or profiles to tailor subsequent exploits. Defenders can mitigate visibility by limiting public exposure of and personnel data. Weaponization: Attackers couple exploits with remote access trojans (RATs) or other into a deliverable , such as a malicious or executable, without direct target interaction. This offline process, exemplified by embedding zero-day vulnerabilities in PDF files, transforms benign files into weapons; for instance, historical APT campaigns weaponized macros with custom backdoors. Indicators include anomalous code signatures, detectable via reverse-engineering tools. Delivery: The weaponized payload is transmitted to the target via vectors like phishing emails, USB drives, or compromised websites, aiming to breach perimeter defenses. Email attachments accounted for over 90% of delivery attempts in analyzed intrusions from 2009-2011, often disguised as legitimate business communications. Network monitoring for unsolicited inbound connections or anomalous traffic patterns enables early interdiction. Exploitation: Upon user interaction or automated triggers, the executes code to exploit software vulnerabilities, such as overflows in browsers or applications, granting initial code execution on the target system. Common targets include unpatched Adobe Reader or Java Runtime Environment flaws, as documented in campaigns exploiting CVE-listed vulnerabilities. Patching regimes and behavioral analytics disrupt this phase by preventing . Installation: Post-exploitation, installs persistent mechanisms like backdoors or rootkits to maintain access across reboots and evade detection, often modifying registry keys or scheduled tasks. In observed APTs, droppers fetched secondary payloads from command servers, establishing footholds lasting months; host-based intrusion detection systems (HIDS) flag unauthorized file creations or process injections. Command and Control (C2): The compromised host communicates with external controllers using protocols like HTTP/ or DNS tunneling to receive directives and exfiltrate data, often mimicking legitimate traffic. Custom binaries in APT1 operations beaconed to domains, enabling remote control; in outbound traffic volumes or domain resolutions breaks this link. Actions on Objectives: With sustained access, adversaries execute mission goals, such as data theft, lateral movement, or system sabotage, often pivoting to high-value assets. In breaches analyzed , this culminated in totaling terabytes; comprehensive logging and segmentation limit impact once detected.

Applications in Defensive Cybersecurity

The Cyber Kill Chain model is applied in defensive cybersecurity to structure proactive and reactive measures that interrupt adversary intrusions at identifiable stages, thereby increasing the operational costs for attackers and reducing success rates. Integrated into intelligence-driven frameworks, it facilitates the mapping of tools and processes to each , enabling organizations to detect indicators of , deny , and disrupt execution through layered controls. This phased approach shifts focus from perimeter-only defenses to comprehensive visibility across the attack lifecycle, allowing operations centers (SOCs) to prioritize high-impact interruptions based on threat intelligence. Defensive strategies target the phase by deploying tools and threat intelligence platforms to identify passive and active scanning attempts, while lists on firewalls and information-sharing policies limit exposed surfaces. In the weaponization stage, intrusion detection and prevention systems (NIDS/) detect payload indicators, supplemented by inline antivirus scanning to disrupt development. Delivery phases are countered with email gateways, proxy filters, and user awareness training to block vectors and drive-by downloads, denying initial transmission. Exploitation is mitigated through timely patch management to close vulnerabilities, host-based intrusion detection systems (HIDS) for , and data execution prevention (DEP) mechanisms to halt . During installation, and prevent persistence mechanisms like rootkits, while jails or application whitelisting deny unauthorized modifications. Command-and-control (C2) communications are disrupted via NIDS monitoring for beaconing patterns, ACLs to block outbound connections, and DNS redirection for . Finally, actions on objectives are limited by , quality-of-service throttling, audit logging, and honeypots to detect and contain or lateral movement. Beyond phase-specific tactics, the model supports broader defensive operations by integrating with threat intelligence platforms (TIPs) to prioritize sensor alerts—elevating those in later stages like or actions on objectives—and to identify defensive gaps for targeted investments in (EDR) or (SIEM) systems. Organizations measure resilience by tracking interruption points across multiple intrusions, correlating tactics, techniques, and procedures (TTPs) to campaigns, and ensuring analytic completeness through chain-based checklists, which collectively enhance early detection and resource allocation.

Empirical Effectiveness and Case Studies

The Cyber Kill Chain model has demonstrated empirical effectiveness in defensive cybersecurity by enabling structured disruption of adversary intrusions at early stages, as evidenced by Lockheed Martin's application in 2009. In March 2009, Lockheed Martin's Computer Incident Response Team (LM-CIRT) analyzed three (APT) attempts via targeted malicious emails. The first intrusion on March 3 involved a PDF exploit (CVE-2009-0658), which was detected and mitigated before could lead to actions on objectives. The second on March 4 reused the same exploit but with altered delivery infrastructure; it was blocked using indicators derived from the prior incident. The third on March 23 targeted a zero-day PowerPoint (CVE-2009-0556), but prior on command-and-control IP addresses (e.g., 216.abc.xyz.76) prevented progression. All three attempts were halted short of achieving adversary goals, illustrating how kill chain analysis generates reusable indicators to increase attacker costs and force adaptation. Retrospective case studies of major breaches further validate the model's utility in identifying intervention points, though they primarily highlight failures rather than proactive defenses. In the 2017 WannaCry ransomware outbreak, attackers progressed through reconnaissance on unpatched Windows systems, weaponization via (CVE-2017-0144), delivery through and worm propagation, and subsequent phases to encrypt files and demand ransom; post-incident analysis showed that timely patching at the exploitation phase could have severed the chain, reducing global impact on over 200,000 systems. Similarly, the 2016 () breach involved successful spear-phishing delivery exploiting user credentials, leading to ; enhanced reconnaissance detection and delivery filtering (e.g., via gateways) were identified as key mitigations overlooked. The 2010 worm against Iranian nuclear facilities advanced via USB delivery and zero-day exploits (e.g., CVE-2010-2568) to centrifuges, underscoring the need for air-gapped monitoring to break installation and command-and-control phases in . These analyses demonstrate the model's value in forensic reconstruction, informing preventive strategies like patch management and user training. Quantitative evaluations of kill chain-aligned defenses, particularly with integrated technologies, provide additional evidence of phase-specific efficacy. For instance, models applied to delivery-phase detection, such as DL-Droid for malware, achieved 97.8% accuracy in identifying exploits before installation. In weaponization mitigation, deep neural network-based classifiers like Malrec reported 94.2% F1-scores for detection. reconnaissance defenses, including PhishDetector, reached 99.14% accuracy. However, such metrics often derive from controlled or simulated environments, with real-world success dependent on implementation; broader empirical studies remain limited, as the model's linear structure may not fully capture adaptive adversaries. Overall, the framework's effectiveness lies in promoting intelligence-driven defenses that disrupt chains before completion, as proven in targeted APT responses, though comprehensive longitudinal data on organization-wide adoption outcomes is scarce.

Criticisms and Controversies

Bureaucratic and Technical Limitations

The kill chain's implementation faces significant bureaucratic hurdles stemming from hierarchical decision-making structures and oversight requirements. In U.S. drone strike operations during the Obama administration, targets often required sequential approvals from field commanders, the , the , and the , introducing delays that could span hours or days and enable target evasion or collateral risk assessment revisions. These processes, designed to mitigate legal and political risks, prioritize compliance with and over rapid execution, resulting in a "lethal bureaucracy" that slows operational tempo in time-sensitive scenarios. Similar rigidities persist in broader military contexts, where inter-service coordination and legal reviews fragment authority, as evidenced by critiques of the U.S. military's inability to adapt kill chains flexibly amid evolving threats. Acquisition and procurement bureaucracies exacerbate these issues by extending development timelines for kill chain-enabling technologies. The U.S. Department of Defense's multi-year cycles for requirements validation, budgeting, and contracting have delayed integration of advanced sensors and decision aids, leaving forces reliant on legacy systems ill-suited for peer conflicts. For example, Christian Brose highlights how bureaucratic inertia in program management has perpetuated a "laggard kill chain," with acquisition processes averaging over a for major systems, contrasting sharply with adversaries like that iterate capabilities more nimbly. This systemic delay undermines strategic responsiveness, as doctrinal adherence to centralized control stifles innovation and experimentation at lower echelons. Technical limitations further constrain the kill chain's efficacy, particularly its linear sequence of find-fix-track-target-engage-assess, which creates multiple points vulnerable to disruption. In contested electromagnetic environments, communication links between sensors and shooters are susceptible to or cyber interference, breaking the chain and preventing timely engagements, as seen in simulations of high-end warfare where adversaries exploit these gaps. Sensor fusion challenges compound this, with disparate data from platforms like satellites, , and ground radars often requiring manual integration, leading to incomplete pictures and delays in target handoff—issues the U.S. Army has acknowledged in efforts to accelerate via . Against hypersonic missiles or massed drone swarms, the chain's speed falls short; for instance, detection-to-engagement loops exceeding minutes allow maneuvering threats to evade, prompting shifts toward resilient "kill webs" that distribute functions across attritable assets. RAND analyses underscore coordination difficulties in distributed kill chains, where algorithmic task allocation struggles with uncertainty in degraded networks, mirroring biological systems' modularity but demanding unresolved advances in autonomy to achieve scalability. These technical shortfalls are amplified in joint operations, where interoperability gaps between services hinder seamless data sharing, as procurement silos perpetuate stovepiped architectures incompatible with mosaic warfare concepts. Overall, without addressing these intertwined limitations, kill chains risk obsolescence against adversaries prioritizing speed and redundancy. The kill chain's structured approach to targeting in operations has prompted ethical over its potential to facilitate a "playstation mentality" among remote operators, where the physical and emotional distance from the diminishes the gravity of lethal decisions. This detachment, observed in -mediated kill chains, may lower inhibitions against engagement, as pilots experience reduced personal risk compared to traditional warfare, potentially increasing error rates in target discrimination. Studies of U.S. drone programs from 2004 to 2016 indicate that such remote systems correlated with signature strikes—targeting based on inferred patterns rather than confirmed —which ethicists argue risks conflating civilians with combatants, eroding moral constraints on killing. Advancements in and within kill chains intensify these concerns by compressing decision timelines, challenging the oversight necessary for ethical . Military ethicists warn that algorithmic target nomination could prioritize efficiency over deliberation, fostering a devaluation of life through dispassionate computation rather than empathetic assessment. For instance, initiatives to accelerate kill chains via , as outlined in 2023 reports, have drawn criticism for potentially enabling lethal autonomous weapons systems (LAWS) that bypass vetoes, violating principles of meaningful control and . Legally, kill chain executions are bound by (IHL) under the , requiring adherence to distinction—separating military objectives from —proportionality—ensuring anticipated does not outweigh concrete military advantage—and precautions to minimize incidental harm. U.S. doctrine mandates estimation (CDE) processes, using modeling tools to predict casualties before approval, as applied in operations yielding an estimated 2,200 to 3,800 combatant deaths alongside 400 to 900 non-combatants in , , and from 2009 to 2015. Yet, legal scholars debate the framework's application in preemptive strikes, such as South Korea's Kill Chain strategy against , which conditions legality on irrefutable intelligence of imminent threats under Article 51 of the UN Charter, amid risks of miscalculation escalating to broader conflict. Targeted killings integral to kill chains also intersect with human rights law, particularly the under the International Covenant on Civil and Political Rights, where operations outside declared armed conflicts may constitute extrajudicial executions absent . The 2020 U.S. strike on Iranian General exemplified this tension, with proponents defending it as anticipatory against an imminent attack, while critics, including UN experts, contended it exceeded IHL thresholds by lacking sufficient evidence of immediate threat, potentially setting precedents for unchecked executive authority. Command accountability remains contested in automated kill chains, as international tribunals hold leaders responsible for foreseeable violations, though AI opacity complicates proving negligence.

Counter-Kill Chain Strategies and Vulnerabilities

Adversaries seeking to counter military kill chains, such as the F2T2EA (Find, Fix, Track, Target, Engage, Assess) process, target vulnerabilities in networks, command-and-control systems, and decision timelines. China's () has developed kinetic strikes on assets and non-kinetic measures like jamming to disrupt the "find" and "fix" phases, while employing decoys, , and rapid to evade tracking and targeting. Russian tactics emphasize integrated air defense systems with electronic countermeasures to degrade , as observed in simulations where jamming reduces accuracy by up to 70% in contested environments. These strategies exploit the kill chain's dependence on persistent and real-time data links, which can be severed through anti-satellite weapons or cyber intrusions into infrastructure, potentially collapsing the entire sequence before engagement. In cybersecurity, attackers evade the Cyber Kill Chain by compressing or skipping phases, using techniques that undermine the model's assumption of discrete, observable steps. For instance, advanced persistent threats (APTs) bypass and weaponization through zero-day exploits or supply-chain compromises, directly entering without prior network probing, as seen in the 2020 incident where attackers leveraged trusted updates to install backdoors undetected. Obfuscation tactics, such as executed via legitimate system tools (living-off-the-land binaries), evade detection in installation and command-and-control phases by mimicking normal traffic; MITRE ATT&CK documents over 50 evasion sub-techniques, including process injection and encrypted channels, which blend malicious activity with benign operations. The Cyber Kill Chain's vulnerabilities stem from its linear structure, which fails to account for non-sequential attacks, insider threats, or non-malware vectors like pure social engineering, allowing persistence without triggering phase-specific indicators. Critics note that the model presumes full visibility across all seven phases—, weaponization, , , , command-and-control, and actions on objectives—but real-world defenses often lack comprehensive logging, enabling attackers to operate laterally undetected for months, as in the 2016 DNC breach where Russian actors evaded perimeter-focused tools. This rigidity contrasts with adaptive adversary behaviors, such as iterative testing of defenses or parallel intrusion paths, rendering the framework less effective against sophisticated, low-volume operations that avoid signature-based detection.
Vulnerability in Cyber Kill ChainAdversary Counter-StrategyExample Impact
Assumption of sequential phasesPhase compression (e.g., direct exploitation via links)Bypasses weaponization detection, reducing alerts
Perimeter-centric focusInsider or supply-chain accessEvades external blocks, as in
Reliance on malware signaturesFileless attacks and LOLBinsUndermines installation phase monitoring
Limited post-exploitation coverageDefense evasion via Prolongs undetected, per tactics
Both and kill chains reveal systemic weaknesses when adversaries prioritize and , such as distributed networks or AI-driven , forcing defenders to invest in resilient architectures like warfare to restore chain integrity.

Broader Impacts and Future Developments

Influence on Joint All-Domain Operations

The kill chain concept, particularly the military F2T2EA model (find, fix, track, target, engage, assess), underpins () by structuring multi-domain targeting to achieve synchronized effects across air, land, maritime, space, , and domains. U.S. adapts this framework to address compressed decision timelines in peer conflicts, where adversaries can contest domains simultaneously, necessitating resilient processes that integrate defenses to prevent disruptions to physical engagements. For instance, targeting personnel apply F2T2EA at all joint levels to support , enabling the fusion of domain-specific for rapid threat neutralization. The Kill Chain, modeled after targeting, extends this influence by providing a phased lens for incorporating operations into 's broader kill processes, allowing forces to disrupt enemy intrusions that could degrade command networks or feeds. In contexts, this means mapping threats—such as or phases—to potential interference with F2T2EA steps, prioritizing interventions like or AI-driven to maintain kill chain integrity. assessments highlight that excluding effects in () training limits preparedness for degraded environments, underscoring the model's role in quantifying risks to overall operational tempo. JADO evolves the linear kill chain into distributed "kill webs" resilient to cyber vulnerabilities, as seen in U.S. Army Project Convergence exercises in 2020, where space sensors cued AI-accelerated fires across domains, compressing timelines from hours to seconds. This adaptation counters adversarial anti-access strategies by enabling cross-domain cueing, such as cyber effects queuing kinetic strikes, while frameworks use kill chain metrics to evaluate investments in cyber tools that bolster 's speed and survivability. Empirical tests demonstrate that data-centric kill webs, informed by phased models, enhance joint force effectiveness against near-peer threats like those from or . In summary, the kill chain's influence on JADO lies in its causal emphasis on sequential yet adaptable targeting, fostering empirical validation through simulations and live exercises that reveal domain interdependencies, with cyber phases ensuring holistic resilience against hybrid warfare.

Role in Great Power Competition

In great power competition, particularly involving the United States, China, and Russia, the kill chain serves as a pivotal mechanism for achieving decision superiority in contested environments, where the ability to detect, decide, and deliver effects faster than an adversary determines battlefield outcomes. Christian Brose argues that conflicts with China or Russia will hinge on preserving one's own kill chain while disrupting the opponent's, as peer adversaries employ anti-access/area denial (A2/AD) strategies, hypersonic weapons, and electronic warfare to target U.S. sensors and command nodes early in engagements. This dynamic underscores causal vulnerabilities: extended kill chains expose forces to preemptive strikes, as evidenced by simulations of Taiwan Strait scenarios where Chinese missile salvos aim to shatter U.S. reconnaissance networks within hours of hostilities. U.S. military doctrine emphasizes compressing the kill chain through multi-domain integration to counter these threats, integrating space-based sensors, AI-driven analytics, and distributed effectors to enable rapid targeting against mobile adversary assets like S-400 systems or DF-21D carriers. For instance, the (JADC2) initiative seeks to fuse data from disparate platforms, reducing decision timelines from minutes to seconds, as slower legacy systems risk failure against peers' hypersonic glide vehicles traveling at +. Russia's demonstrated use of integrated air defenses in , combining deception and jamming, highlights how adversaries exploit kill chain latencies, prompting U.S. adaptations like resilient mesh networks to maintain effects generation amid denial operations. Emerging analyses indicate that non-kinetic disruptions, such as intrusions into U.S. networks, amplify kill chain risks in prolonged competitions, where invests in "system destruction warfare" to paralyze decision loops before kinetic phases. Empirical assessments from reveal that U.S. forces maintaining intact kill chains achieve up to 70% higher attrition rates against simulated Chinese invasions, but bureaucratic delays in adopting agile technologies threaten this edge, as cycles exceed adversary speeds by factors of 10-20 years. Thus, the kill chain's role extends beyond tactical execution to strategic deterrence, where perceived U.S. vulnerabilities incentivize adversary adventurism in regions like the or .

Emerging Technologies and Adaptations

Advancements in (AI) and are enabling automation across kill chain phases, particularly in find, fix, and track functions, to reduce decision timelines from hours to minutes. The U.S. Air Force's Battle Lab, in experiments conducted through July 2025, integrated AI for dynamic targeting, providing real-time recommendations to human teams and accelerating command-and-control processes via software tactics. Similarly, the (DARPA) developed the Adapting Cross-Domain Kill-Webs () program to aid commanders in identifying optimal effectors across domains, shifting from rigid chains to flexible "kill-webs" that adapt to contested environments. These adaptations address sensor-to-shooter latencies, with AI mapping to naval tactical functions showing potential for uncertainty reduction and faster awareness in 28 kill chain sub-elements. Autonomous and semi-autonomous systems further evolve the kill chain by enabling distributed, resilient targeting networks resistant to single-point failures. In high-end conflicts, sequential kill chains are transitioning to adaptive kill-webs, where platforms like unmanned aerial vehicles (UAVs) and loitering munitions execute parallel engagements, balancing individual expertise with collaborative decision-making as emphasized in U.S. Marine Corps training reforms by August 2025. This evolution incorporates human oversight in engage phases to mitigate risks, though full raises operational challenges in unpredictable scenarios. Peer-reviewed analyses highlight AI's role in hardening these systems against adversarial threats like data poisoning, ensuring reliability in machine-speed warfare. Hypersonic weapons profoundly compress kill chain timelines, demanding sub-minute detection and response capabilities that traditional systems struggle to achieve. Hypersonic glide vehicles (HGVs) and cruise missiles, traveling at or greater, shorten engagement windows by operating in altitude bands that evade conventional radars, as noted in joint air power assessments. U.S. programs like the Air Force's (HACM), advanced in fiscal year 2022 and beyond, integrate with networked sensors to fuse data for rapid targeting, countering adversaries' similar developments. This necessitates kill chain adaptations such as proliferated low-Earth orbit () satellites for detection and resilient communications, extending defensive timelines against maneuvering threats. Converging kill chains with and supply chains via AI-driven enhances sustainment in prolonged operations, providing actionable to partners for and demand signals. Overall, these technologies prioritize causal linkages in multi-domain battlespaces, where empirical testing—such as Marine Corps studies on process bottlenecks—validates improvements in effect delivery speed and target viability.

References

  1. [1]
    Winning the Kill Chain Competition | Air & Space Forces Magazine
    Jul 28, 2023 · A kill chain is the process used to put Air Force missiles or bombs on target. The Air Force breaks the kill chain down into six discrete steps: ...
  2. [2]
    It's About Time: The Pressing Need to Evolve The Kill Chain
    find, fix, track, target, engage, and assess ...
  3. [3]
    Find, Fix, Track, Target, Engage, Assess
    The fix portion of what is sometimes called the “kill chain” can be conducted in a number of ways. Items of interest can be imaged and the pictures compared ...
  4. [4]
    [PDF] Air Force Doctrine Publication 3-60, Targeting
    This method referred to as F2T2EA or colloquially as the “kill chain.” The. F2T2EA kill chain applies equally to the use of military capabilities to achieve.
  5. [5]
    [PDF] Calculating the Probability of Successfully Executing the Kill Chain ...
    The. F2T2EA kill chain can be applied to air and missile defense systems defending against enemy hypersonic weapons or applied to offensive hypersonic ...<|control11|><|separator|>
  6. [6]
    Kill Chain - an overview | ScienceDirect Topics
    In military terminology, a kill chain is a phase-based model that classifies offensive activities based upon the stages of an attack and uses the deconstruction ...Introduction to the Kill Chain in... · Applications and...
  7. [7]
    [PDF] Optimizing the Air-to-Ground Kill Chain for Time-Sensitive Targets
    We assess the relative importance of the individual phases of the kill chain by examining scenarios that attack time-sensitive targets. 2. Definitions and Terms.
  8. [8]
    Shrinking the kill chain - Military Embedded Systems
    Jun 28, 2017 · The military started using acronyms to describe the kill chain phases in late World War II. Before that, there were no general designations.
  9. [9]
    How Ultra I&C's solutions are improving the F2T2EA kill chain model
    Aug 2, 2023 · Military kill chain models—more specifically, F2T2EA—have been used to break down the multiple stages of an attack, allowing analysts and ...
  10. [10]
    Compressing the Kill Chain | Air & Space Forces Magazine
    Mar 1, 2003 · Another avenue that will lead to compression of the kill chain entails eliminating what Jumper calls cultural “stovepipes” within the F2T2EA ...Missing: origin | Show results with:origin
  11. [11]
    F3EAD: Ops/Intel Fusion “Feeds” The SOF Targeting Process
    Jan 31, 2012 · F3EAD is a natural evolution of targeting, combining aspects of the conventional intelligence cycle and doctrinal operational planning with best ...
  12. [12]
    The Targeting Process: D3A and F3EAD - Small Wars Journal
    Jul 16, 2011 · In contrast, F3EAD enables the dynamic tasking process required at Tactical targeting level in support of Full Spectrum Operations. Currently, ...
  13. [13]
    Rethinking Military Training for the High-End Fight: From Kill Chains ...
    Aug 14, 2025 · This transformation centers on the evolution from “kill chains” to “kill webs.” Traditional kill chains follow a linear progression: find, fix, ...<|separator|>
  14. [14]
    [PDF] Winning the Kill Chain Competition
    Breaking apart each step of the F2T2EA kill chain process helped Air Force planners to understand how separate sensors, platforms, or capabilities could ...
  15. [15]
    The Kill Chain: The lethal bureaucracy behind Obama's drone war
    Oct 15, 2015 · A slide from a May 2013 Pentagon presentation shows the chain of command for ordering drone strikes and other operations carried out by JSOC in ...
  16. [16]
    Making Joint All Domain Command and Control a Reality
    Dec 9, 2022 · The focus should be on creating a global targeting system that can enable the find, fix, track, target, engage, and assess functions of the kill ...
  17. [17]
    [PDF] Mapping Artificial Intelligence to the Naval Tactical Kill Chain
    F2T2EA kill chain process models. The intent of establishing a set of ... There can be uncertainty in the inputs to kill chain function; and kill chain functions.
  18. [18]
    Air Force Battle Lab advances the kill chain with AI, C2 Innovation
    Jul 11, 2025 · The intent of this application is to reduce cognitive load and speed up elements of the Find, Fix, Track, Target, Engage, Assess, or F2T2EA, ...
  19. [19]
    The Periodicity Predicament: How I Learned to Love Space ISR in a ...
    Jul 22, 2024 · The current dependence on space-based ISR does not have the periodicity capabilities to enable the kill chain against mobile targets, as revisit rates are too ...
  20. [20]
    Understanding the Critical Role of Manned A-ISR Assets in ...
    A-ISR assets are pivotal in the kill chain against near-peer adversaries ... The company's RAPCON-X solution for COCO operations and key A-ISR programs delivers ...
  21. [21]
    The Key to Long Range Kill Chains? Short Distances for Data
    Sep 22, 2025 · Making data easier to handle and query is a key capability for long-range kills chains and multi-domain ISR, said Patrick M. “Mike ...
  22. [22]
    Army developing faster, improved data 'kill chain' for lethal and non ...
    The Army is putting new emphasis on using technology, including artificial intelligence and machine learning, to speed up the “kill chain” ...
  23. [23]
    [PDF] Evaluating Artificial Intelligence Methods for Use in Kill Chain ... - DTIC
    Artificial intelligence (AI) and machine learning (ML) can aid naval kill chain decisions in the tactical domain by mapping AI methods to the kill chain ...
  24. [24]
    [PDF] An AI Revolution in Military Affairs? How Artificial Intelligence Could ...
    Jul 4, 2025 · ... AI-enabled sensing can make kill chains faster and more lethal. Figure 3.1 illustrates the links of the so-called “kill chain.” In 1996, Air.<|separator|>
  25. [25]
    Air Force developing new architecture for JADC2 'kill chains,' wants ...
    Aug 8, 2023 · A key Air Force official said the service is developing an “architecture” to address integrated “kill chains” for its new battle network framework.
  26. [26]
    JADC2 Explained: Transforming Joint All-Domain Operations for ...
    JADC2 transforms the kill chain into a kill web disaggregated, distributed, and resilient. A space‒based sensor can queue an airborne platform, which can ...
  27. [27]
    The Indispensable Domain: The Critical Role of Space in JADC2
    Oct 20, 2022 · Joint All Domain Command and Control (JADC2) is the concept that will enable U.S. forces to collect information from any sensor and any domain, ...
  28. [28]
    [PDF] Distributed Kill Chains: Drawing Insights for Mosaic Warfare ... - RAND
    This analysis presents a potential mosaiclike power projection force loosely based on the F2T2EA kill chain. ... This approach would depend on significant ...
  29. [29]
    [PDF] Intelligence-Driven Computer Network Defense Informed by ...
    The phrase “kill chain” describes the structure of the intrusion, and the corresponding model guides analysis to inform actionable security intelligence.<|separator|>
  30. [30]
    Cyber Kill Chain® | Lockheed Martin
    The model identifies what the adversaries must complete in order to achieve their objective. The seven steps of the Cyber Kill Chain® enhance visibility ...Missing: doctrine | Show results with:doctrine
  31. [31]
    [PDF] Seven Ways to Apply the Cyber Kill Chain® with a Threat ...
    Section four outlines the seven ways an organization can apply the Cyber Kill Chain® framework in their environment using a TIP. Section five introduces the ...
  32. [32]
    Unlocking the Cyber Kill Chain: Real-World Case Studies & Tips
    May 18, 2023 · We delve deep into the heart of cyber defense: the Lockheed Martin Kill Chain, its origins, and its application to infamous cybersecurity threats.
  33. [33]
    Impact of AI on the Cyber Kill Chain: A Systematic Review - PMC
    Dec 2, 2024 · The effectiveness of the system is demonstrated through a series of case studies. Trust Safety Mechanism. Most defense strategies can address ...
  34. [34]
    Beat Bureaucracy or Transform It? A Cultural Convergence Between ...
    Jul 6, 2022 · ... Kill Chain or Action Order B. The rigidity of thought and inability to adapt appropriately to threats in recent conflicts are inseparable ...
  35. [35]
    Book Review - The Kill Chain: Defending American in the Future of ...
    May 27, 2021 · A persistent failure to procure emerging technologies and update strategic thinking has resulted in a laggard kill chain. The result is acute ...
  36. [36]
    Notes on The Kill Chain꞉ Defending America in the Future of High ...
    Aug 27, 2024 · The kill chain is the essential process by which militaries achieve their objectives, involving three key steps.
  37. [37]
    ACK: Adapting Cross-Domain Kill-Webs - DARPA
    Instead of limited, monolithic, pre-defined kill chains, these more disaggregated forces can be used to formulate adaptive “kill webs” based on all of the ...<|separator|>
  38. [38]
    Distributed Kill Chains: Drawing Insights for Mosaic Warfare ... - RAND
    Jan 5, 2021 · The authors suggest that Mosaic warfare might have similar advantages, such as resilience and adaptability, over other approaches to defeating a threat.
  39. [39]
    Full article: The legal and ethical implications of drone warfare
    Feb 24, 2015 · This article examines whether American drone-based targeted killing program represents a fundamentally new challenge to the traditional legal and ethical ...
  40. [40]
    Full article: Signature Strikes and the Ethics of Targeted Killing
    Sep 4, 2024 · A targeting cycle is a process that intelligence and military agencies use to identify, track, and eliminate elements of enemy networks. Targets ...
  41. [41]
    [PDF] Autonomous Weapons and the Moral Challenge of Systematic Killing
    Autonomous violence incentivizes a moral devaluation of those tar- geted and erodes the moral agency of those who kill. Both outcomes imperil essential ...
  42. [42]
    Inside the messy ethics of making war with machines
    Aug 16, 2023 · Not a kill chain, but—as the Pentagon has begun to call it—a kill web. In these webs, it's not clear whether the human's decision is, in ...Missing: debates | Show results with:debates
  43. [43]
    3 - International Law pertaining to Armed Conflict - HLS PILAC
    Aug 31, 2016 · In this section, we outline key fields, concepts, and rules relating to international law pertaining to armed conflict.<|separator|>
  44. [44]
    The brutal calculus of war: Is the killing of civilians ever justified?
    Nov 11, 2023 · The US military uses what's called a "collateral damage estimate," or CDE, which determines how many civilians would be killed or wounded when a military ...
  45. [45]
    South Korea's Revitalized “Three-Axis” System
    Jan 4, 2023 · Military experts generally claim Kill Chain as a lawful use of force but with several conditions. First, there should be clear and irrefutable ...
  46. [46]
    [PDF] TARGETED KILLING IN INTERNATIONAL LAW
    23 This Article examines these diverging viewpoints and places the contentious issue of targeted killing on a robust legal framework. Besides divergence in ...
  47. [47]
    The Soleimani Strike and Self-Defence Against an Imminent Armed ...
    Jan 7, 2020 · This post will examine the lawfulness of the strike from the standpoint of the law on the use of force.
  48. [48]
    [PDF] Command Accountability for AI Weapon Systems in the Law of ...
    Jan 15, 2019 · 2 The kill chain process combines multispectral sensors to understand the warfighting environment, positively identify, track, and select ...
  49. [49]
    Air Defense Kill Chain: The Six Critical Steps from Detection to ...
    Chinese countermeasures focus on disrupting networks through cyber warfare, while Russian tactics prioritize electronic jamming. A recent assessment of combat ...<|control11|><|separator|>
  50. [50]
    Cyber Kill Chain vs. Mitre ATT&CK®: 4 Key Differences and Synergies
    Its linear, sequential model may not accurately reflect the complex, iterative, and often parallel nature of cyber attacks. Furthermore, it tends to focus on ...
  51. [51]
    What Is the Cyber Kill Chain? Definition & Steps | Proofpoint US
    The MITRE ATT&CK framework expands the Cyber Kill Chain's action stage to include seven new tactics: privilege escalation, defense evasion, credential access, ...
  52. [52]
    Understanding Cyber Kill Chain, MITRE ATT&CK Framework and ...
    Jan 7, 2023 · Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries ...
  53. [53]
    What Is the Cyber Kill Chain? | Microsoft Security
    In 2011, Lockheed Martin adapted a military concept called the kill chain for the cybersecurity industry and named it the cyber kill chain. Like the kill chain, ...
  54. [54]
    The Cyber Kill Chain: Pros & Cons - Prodigy 13
    Based on what the attackers discovered in the reconnaissance phase, they're able to get into your systems: often leveraging malware or security vulnerabilities.<|separator|>
  55. [55]
    Cyber Kill Chain Model Breakdown and How It Works? - SentinelOne
    Aug 1, 2025 · 7 Stages of the Cyber Kill Chain · 1. Reconnaissance · 2. Weaponization · 3. Delivery · 4. Exploitation · 5. Installation · 6. Command-and-Control (C2).Missing: doctrine | Show results with:doctrine<|control11|><|separator|>
  56. [56]
    5 Cyber Kill Chain Challenges and How to Prevail | by Adam Goss
    May 6, 2024 · It is a static model that only focuses on external threats · The model is linear, unlike modern attacks · It assumes defenders have complete ...
  57. [57]
    What Is the Lockheed Martin Cyber Kill Chain? - Aqua Security
    Jul 3, 2024 · The Limitations of the Cyber Kill Chain · Limited Attack Detection Profile · Insufficient Focus on Insider Threats · Not Flexible.
  58. [58]
    What is the cyber kill chain? Definition, framework, and limits
    Jun 10, 2025 · Originally developed by Lockheed Martin in 2011, the cyber kill chain definition adapts military concepts to digital threats, turning the chaos ...
  59. [59]
    [PDF] Assessment of Joint All Domain Command and Control ... - RAND
    Mar 2, 2023 · 2 Air Force Doctrine Note 1-20, USAF Role in Joint All-Domain Operations, Department of the Air Force, March 5, ... sensitive kill chain closure ...
  60. [60]
    Army Tests New All Domain Kill Chain: From Space To AI
    Aug 5, 2020 · ... Joint All-Domain Operations. presented by. Sponsored Post · Bombardier ... In this year's tests, “we're doing that entire fires kill chain” from ...
  61. [61]
    Goldilocks Kill Chains and the Just Right Data - Army University Press
    This analysis emphasizes the significance of data processing in achieving cost-effective kill chain development for joint all-domain operations.
  62. [62]
    The Kill Chain - NDU Press - National Defense University
    Dec 29, 2021 · Brose posits that the outcomes of a conflict with China or Russia will be dependent on the ability to retain one's kill chain while breaking ...
  63. [63]
    Bad Idea: Conflating Great Power Competition with High-Intensity ...
    Dec 15, 2020 · ... great power competition with Russia and China and U.S. conventional military deterrence. ... kill chain. These “edge” capabilities are also well ...
  64. [64]
    Hardening the Kill Chain: Learning from the USMC AI ...
    Jul 10, 2025 · The overarching objective is to ensure AI serves reliably, even against sophisticated threats. This is achieved by proactively identifying and ...
  65. [65]
    Hypersonic Threats - Joint Air Power Competence Centre
    This causes a severely reduced timeframe for implementing a potential kill chain. Furthermore, the altitude bands used by HOT, combined with significant ...
  66. [66]
    Hypersonic Weapons: Background and Issues for Congress
    Aug 27, 2025 · Finally, in FY2022, the Air Force launched the Hypersonic Attack Cruise Missile (HACM) program to develop a hypersonic cruise missile that ...
  67. [67]
    Complex Air Defense: Countering the Hypersonic Missile Threat
    Feb 9, 2022 · Long-range kill chains, so a proliferating LEO for IR detection and comms for missile defense. The offensive strike community needs long-range ...
  68. [68]
    Modernizing Defense Logistics: Converging Kill Chains and Supply ...
    Converging the kill chain into the supply chain enhances speed of decision-making, improves demand forecasting, and provides actionable information to industry.
  69. [69]
    [PDF] Harnessing Emerging Technology to Improve Marine Corps ... - DTIC
    Mar 24, 2021 · Through my research, I have found a wealth of information concerning issues with the. US military's kill chain process, technological ...