Kill chain (military)

Last updated

The term kill chain is a military concept which identifies the structure of an attack. It consists of:

Contents

Conversely, the idea of "breaking" an opponent's kill chain is a method of defense or preemptive action. [2]

Military

F2T2EA

One military kill chain model is the "F2T2EA", which includes the following phases:

This is an integrated, end-to-end process described as a "chain" because an interruption at any stage can interrupt the entire process. [3] [4]

Proposed terminology

The "Five Fs" is a military term described by Maj. Mike "Pako" Benitez, an F-15E Strike Eagle Weapons Systems Officer who served in the United States Air Force and the United States Marine Corps.

Designed to update the Kill Chain to reflect updated, autonomous and semi-autonomous weapon systems, the "Five Fs" are described in "It's About Time: The Pressing Need to Evolve the Kill Chain" [5] as follows:

North Korean nuclear capability

A new American military contingency plan called "Kill Chain" is reportedly the first step in a new strategy to use satellite imagery to identify North Korean launch sites, nuclear facilities and manufacturing capability and destroy them pre-emptively if a conflict seems imminent. The plan was mentioned in a joint statement by the United States and South Korea. [7] [8]

See also

Related Research Articles

<span class="mw-page-title-main">Phalanx CIWS</span> Close-in weapon system

The Phalanx CIWS is an automated gun-based close-in weapon system to defend military watercraft automatically against incoming threats such as aircraft, missiles, and small boats. It was designed and manufactured by the General Dynamics Corporation, Pomona Division, later a part of Raytheon. Consisting of a radar-guided 20 mm (0.8 in) Vulcan cannon mounted on a swiveling base, the Phalanx has been used by the United States Navy and the naval forces of 15 other countries. The U.S. Navy deploys it on every class of surface combat ship, except the Zumwalt-class destroyer and San Antonio-class amphibious transport dock. Other users include the British Royal Navy, the Royal Australian Navy, the Royal New Zealand Navy, the Royal Canadian Navy, and the U.S. Coast Guard.

<span class="mw-page-title-main">Military intelligence</span> Information about military opponents

Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions. This aim is achieved by providing an assessment of data from a range of sources, directed towards the commanders' mission requirements or responding to questions as part of operational or campaign planning. To provide an analysis, the commander's information requirements are first identified, which are then incorporated into intelligence collection, analysis, and dissemination.

<span class="mw-page-title-main">Goalkeeper CIWS</span> Close-in weapon system

The Goalkeeper CIWS is a Dutch close-in weapon system (CIWS) introduced in 1979. It is an autonomous and completely automatic weapon system for short-range defence of ships against highly maneuverable missiles, aircraft and fast-maneuvering surface vessels. Once activated the system automatically undertakes the entire air defence process from surveillance and detection to destruction, including the selection of the next priority target.

<span class="mw-page-title-main">Sniper Advanced Targeting Pod</span> Military aircraft targetting pod

The Lockheed Martin Sniper is a targeting pod for military aircraft that provides positive target identification, autonomous tracking, GPS coordinate generation, and precise weapons guidance from extended standoff ranges.

Targeting is the process of selecting objects or installations to be attacked, taken, or destroyed in warfare. Targeting systematically analyzes and prioritizes targets and matches appropriate lethal and nonlethal actions to those targets to create specific desired effects that achieve the joint force commander's (JFC's) objectives, accounting for operational requirements, capabilities, and the results of previous assessments. The emphasis of targeting is on identifying resources (targets) the enemy can least afford to lose or that provide him with the greatest advantage, then further identifying the subset of those targets that must be acquired and engaged to achieve friendly success. Targeting links the desired effects to actions and tasks.

Qualified Weapons Instructor (QWI) (queue-why) is a qualification given to graduates of the British Armed Forces Qualified Weapons Instructor courses. It is the equivalent to the United States Air Force (USAF) Weapons School Course or United States Navy (USN) Naval Aviation Warfighting Development Center warfare schools.

<span class="mw-page-title-main">Anti-surface warfare</span> Naval combat on the open ocean

Anti-surface warfare is the branch of naval warfare concerned with the suppression of surface combatants. More generally, it is any weapons, sensors, or operations intended to attack or limit the effectiveness of an adversary's surface ships. Before the adoption of the submarine and naval aviation, all naval warfare consisted of anti-surface warfare. The distinct concept of an anti-surface warfare capability emerged after World War II, and literature on the subject as a distinct discipline is inherently dominated by the dynamics of the Cold War.

Battlespace or battle-space is a term used to signify a military strategy which integrates multiple armed forces for the military theatre of operations, including air, information, land, sea, cyber and outer space to achieve military goals. It includes the environment, timeframe and other factors, and conditions that must be understood to successfully apply combat power, protect the force, or complete the mission. This includes enemy and friendly armed forces, infrastructure, weather, terrain, and the electromagnetic spectrum within the operational areas and areas of interest.

<span class="mw-page-title-main">Target acquisition</span> Identification of a military target entity

Target acquisition is the detection and identification of the location of a target in sufficient detail to permit the effective employment of lethal and non-lethal means. The term is used for a broad area of applications.

<span class="mw-page-title-main">Bomb damage assessment</span>

Bomb damage assessment (BDA), also known as battle damage assessment, is the practice of assessing damage inflicted on a target from a stand-off weapon, most typically a bomb or air launched missile. It is part of the larger discipline of combat assessment. Assessment is performed using many techniques including footage from in-weapon cameras, gun cameras, forces on the ground near the target, satellite imagery and follow-up visits to the target. Preventing information on battle damage reaching the enemy is a key objective of military censorship. For nuclear weapons special techniques may be required due to the extensive damage caused and difficulty in approaching the site.

<span class="mw-page-title-main">Multiservice tactical brevity code</span> Brevity code for NATO communications

Multiservice tactical brevity codes are codes used by various military forces. The codes' procedure words, a type of voice procedure, are designed to convey complex information with a few words.

<span class="mw-page-title-main">July 12, 2007, Baghdad airstrike</span> Series of air-to-ground attacks conducted in New Baghdad during the Iraqi insurgency

On July 12, 2007, a series of air-to-ground attacks were conducted by a team of two U.S. AH-64 Apache helicopters in Al-Amin al-Thaniyah, New Baghdad, during the Iraqi insurgency which followed the invasion of Iraq. On April 5, 2010, the attacks received worldwide coverage and controversy following the release of 39 minutes of classified gunsight footage by WikiLeaks. The video, which WikiLeaks titled Collateral Murder, showed the crew firing on a group of people and killing several of them, including two Reuters journalists, and then laughing at some of the casualties, all of whom were civilians. An anonymous U.S. military official confirmed the authenticity of the footage, which provoked global discussion on the legality and morality of the attacks.

A no-drive zone is a form of interdiction and specifically a militarily enforced declaration of an intent to deny vehicular movement over a strategic or tactically valued line of communication by the threat of vehicle destruction. A capability first used in the Balkans and a term recently coined during the 2011 Libyan civil war as a potential course of action to prevent Muammar Gaddafi's government forces from approaching rebel strongholds near Benghazi, no-drive zones present unique challenges to military planners and warfighters. Unlike no-fly zone enforcement where electronic and visual means of identification of relatively few air entities allow warfighters to sort out potential targets, no-drive zones may include a variety of vehicle types with no electronic signatures to identify themselves and where enemy, friendly, and unaffiliated traffic are co-mingled. Enforcement from the air is further complicated by the necessary coordination with ground controller units providing persistent surveillance and possible identification when airborne intelligence, surveillance and reconnaissance (ISR) assets are unavailable or denied necessary airspace access.

<span class="mw-page-title-main">Counter-IED efforts</span> Tactical military strategy

Counter-IED efforts are done primarily by military and law enforcement with the assistance of the diplomatic and financial communities. It involves a comprehensive approach of countering the threat networks that employ improvised explosive devices (IEDs), defeating the devices themselves, and training others. Counter-IED, or C-IED, is usually part of a broader counter-terrorism, counter-insurgency, or law enforcement effort. Because IEDs are a subset of a number of forms of asymmetric warfare used by insurgents and terrorists, C-IED activities are principally against adversaries and not only against IEDs. C-IED treats the IED as a systemic problem and aims to defeat the IED threat networks themselves.

Tactics, techniques, and procedures (TTPs) is an essential concept in terrorism and cyber security studies. The role of TTPs in terrorism analysis is to identify individual patterns of behavior of a particular terrorist activity, or a particular terrorist organisation, and to examine and categorize more general tactics and weapons used by a particular terrorist activity, or a particular terrorist organisation.

<span class="mw-page-title-main">Vault 7</span> CIA files on cyber war and surveillance

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare. The files, dating from 2013 to 2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs, web browsers including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera, the operating systems of most smartphones including Apple's iOS and Google's Android, and computer operating systems including Microsoft Windows, macOS, and Linux. A CIA internal audit identified 91 malware tools out of more than 500 tools in use in 2016 being compromised by the release. The tools were developed by the Operations Support Branch of the CIA.

<span class="mw-page-title-main">Raytheon Coyote</span> Type of aircraft

The Raytheon Coyote is a small, expendable, unmanned aircraft system built by the Raytheon Company, with the capability of operating in autonomous swarms. It is launched from a sonobuoy canister with the wings deploying in early flight phase.

A military artificial intelligence arms race is an arms race between two or more states to develop and deploy lethal autonomous weapons systems (LAWS). Since the mid-2010s, many analysts have noted the emergence of such an arms race between superpowers for better military AI, driven by increasing geopolitical and military tensions.

<span class="mw-page-title-main">Cyber kill chain</span> Process of carrying out a cyberattack

The cyber kill chain is the process by which perpetrators carry out cyberattacks. Lockheed Martin adapted the concept of the kill chain from a military setting to information security, using it as a method for modeling intrusions on a computer network. The cyber kill chain model has seen some adoption in the information security community. However, acceptance is not universal, with critics pointing to what they believe are fundamental flaws in the model.

As part of the Israel–Hamas war, the Israel Defense Force (IDF) has used artificial intelligence to rapidly and automatically perform much of the process of determining what to bomb. Israel has greatly expanded the bombing of the Gaza Strip, which in previous wars had been limited by the Israeli Air Force running out of targets.

References

  1. "Kill Chain Approach". Chief of Naval Operations. April 23, 2013. Archived from the original on June 13, 2013.
  2. Jonathan Greenert; Mark Welsh (May 17, 2013). "Breaking the Kill Chain". Foreign Policy. Archived from the original on December 9, 2022. Retrieved June 30, 2016.
  3. "Lockheed-Martin Corporation-Hutchins, Cloppert, and Amin-Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains-2011" (PDF). Archived (PDF) from the original on 2021-07-27. Retrieved 2021-08-26.
  4. John A. Tirpak (July 1, 2000). "Find, Fix, Track, Target, Engage, Assess". Air Force Magazine.
  5. Benitez, Mike (May 17, 2017). "It's About Time: The Pressing Need to Evolve the Kill Chain". War on the Rocks. Archived from the original on June 8, 2020. Retrieved April 28, 2020.
  6. "The OODA Loop: How Fighter Pilots Make Fast and Accurate Decisions". fs.blog. March 15, 2021. Archived from the original on September 27, 2023. Retrieved September 10, 2023.
  7. Sanger, David E. (July 6, 2017). "Tiny Satellites From Silicon Valley May Help Track North Korea Missiles". The New York Times. Archived from the original on July 7, 2017. Retrieved July 7, 2017.
  8. "06/30/17 - Joint Statement between the United States and the Republic of Korea | U.S. Embassy & Consulate in Korea". U.S. Embassy & Consulate in Korea. 2017-06-30. Retrieved 2017-07-07.[ permanent dead link ]