Tag Archives: Kill Web

Understanding the Kill Web Doctrine

The evolution of modern warfare has precipitated a fundamental paradigm shift in how the United States military conceptualizes, plans, and executes combat operations. For decades, the United States military relied upon a linear, sequential process known formally as the kill chain, a systematic methodology designed to find, fix, track, target, engage, and assess enemy forces.1 While this linear construct secured battlefield dominance in uncontested environments and asymmetric conflicts against non-peer adversaries, the resurgence of great power competition has rendered the traditional kill chain dangerously fragile.1 Pacing threats, most notably the People’s Republic of China, have meticulously analyzed the American way of war and developed sophisticated countermeasures engineered to sever these linear chains at their most vulnerable links.1

In response to these emerging vulnerabilities, the Department of Defense has transitioned toward a vastly more complex, resilient, and adaptive operational construct known as the kill web.5 Where a kill chain represents a static, two-dimensional sequence of events intrinsically tied to monolithic platforms, a kill web is a dynamic, six-dimensional network that seamlessly integrates the air, land, maritime, space, cyberspace, and electromagnetic spectrum domains.5 By networking diverse sensors, command and control nodes, and effectors across all branches of the armed forces and allied nations, the kill web enables any sensor to provide targeting data to any appropriate shooter, guided by advanced artificial intelligence and machine learning algorithms.5

This comprehensive research report provides an exhaustive analysis of the strategic rationale underpinning the kill web doctrine. It meticulously examines the technical architecture that comprises the web, its manifestation across the military services through the Combined Joint All-Domain Command and Control initiative, the algorithmic engines driving its execution, the logistical frameworks required to sustain it, and the profound implications it holds for operational vulnerabilities and military command philosophy.

The Strategic Imperative: Countering System Destruction Warfare

The impetus for the kill web doctrine is inextricably linked to the strategic posture and capability advancements of peer adversaries. Following the overwhelming success of United States forces in operations such as Desert Storm, adversaries recognized the futility of engaging the United States in symmetric, platform-on-platform attrition warfare.4 Historically, the United States military relied on an operational paradigm that shifted in the early 1980s from Active Defense to AirLand Battle, a doctrine that provided enhanced maneuverability, increased tempo, and embraced offensive combined arms.10 However, the contemporary strategic environment necessitates a shift of equal magnitude to counter localized adversary advantages. The People’s Republic of China has developed a sophisticated Anti-Access/Area Denial strategy, specifically designed to keep United States and allied forces outside of the first and second island chains in the Indo-Pacific theater by creating an interconnected minefield of sensors, shooters, and command elements.3

The Fragility of the Linear Kill Chain

The traditional United States kill chain is characterized by highly capable but limited monolithic platforms, such as an E-3 Airborne Warning and Control System aircraft communicating directly with a strike-fighter.12 This architecture inherently creates single points of failure. The military doctrine of the People’s Republic of China, often termed System Destruction Warfare, specifically targets these critical nodes rather than attempting to engage in platform-versus-platform attrition.1 According to translated military doctrine, the People’s Liberation Army aims to collapse the overarching operational architecture by targeting high-value intelligence, surveillance, and reconnaissance assets, communication satellites, and command centers through both kinetic strikes and non-kinetic electronic warfare, termed “information soft kills”.1

If an adversary can successfully jam a satellite link, destroy a forward radar station, or neutralize a localized command center, the linear kill chain collapses entirely.1 Furthermore, the sheer scale and scope of a potential Pacific conflict introduce unparalleled complexities. Projections indicate that up to eighty percent of targets may be mobile or quickly relocatable in the early phases of an invasion scenario.1 The United States military must be prepared to close kill chains against these dynamic, fleeting targets at a scale unseen since the Cold War, operating across thousands of miles of ocean.1 A traditional linear process simply cannot accommodate the volume and speed of targeting required for such an endeavor.

The Transition to Decision-Centric Warfare

The kill web serves as the technological and doctrinal answer to System Destruction Warfare and Anti-Access/Area Denial strategies. By distributing capabilities across a vast network of disaggregated systems, the kill web removes single points of failure, rendering the architecture exponentially more survivable.1 This structural shift facilitates a fundamental transition from attrition-centric warfare, which focuses on physically destroying the enemy’s mass, to decision-centric warfare.15

Decision-centric warfare seeks to weaponize complexity. By possessing a networked web of assets that can be rapidly composed and recomposed into unpredictable force packages, the United States military can impose multiple, overlapping dilemmas upon an adversary simultaneously.13 This capability disrupts the enemy’s Observe, Orient, Decide, Act loop, effectively collapsing their decision-making cycle and paralyzing their operational tempo.5

Doctrinal CharacteristicTraditional Kill ChainAdvanced Kill Web
Architectural StructureLinear, sequential, and staticDynamic, omnidirectional, and mesh-based
Asset DependencyHighly dependent on monolithic, multi-role platformsDisaggregated, utilizing single-function and multi-function nodes
Vulnerability ProfileHigh risk of single points of failureHighly resilient; destruction of a node prompts automated rerouting
Primary ObjectivePlatform-on-platform attritionDecision superiority and cognitive overload of the adversary
Domain IntegrationTypically single or dual-domain (e.g., Air-to-Ground)Omni-domain (Air, Land, Sea, Space, Cyber, Electromagnetic)
Data ProcessingHuman-intensive, localized analysisMachine-speed analysis, AI-driven sensor fusion, automated deconfliction
Yugo M85/M92 dust cover quick takedown pin installed

Conceptual Foundations: Mosaic Warfare and Convergence

The foundational operational principle of the kill web is convergence. Military doctrine defines convergence as the process of collecting massive volumes of data from highly distributed sensors, rapidly analyzing it to discern critical tactical information, transmitting that intelligence securely to relevant operators, and optimally responding with the right munition, from the right platform, at the precise moment of maximum impact.5 Achieving convergence requires an increasingly integrated and interoperable joint force that maintains a continuous, shared understanding of the common operating environment, enabling commanders to auction off targets to platforms best postured within the web.5

The Defense Advanced Research Projects Agency and Mosaic Warfare

The technological and conceptual manifestation of convergence is heavily informed by the Defense Advanced Research Projects Agency’s Mosaic Warfare strategy.12 Traditional military procurement focuses on highly complex, multi-role platforms that require decades to develop, are exorbitantly expensive to build, and represent catastrophic losses if destroyed in combat. Mosaic warfare, conversely, treats individual warfighting platforms—whether they are manned aircraft, unmanned autonomous swarms, or non-kinetic electronic warfare pods—as individual tiles in a broader, infinitely configurable mosaic.4

Combatant commanders can rapidly select these individual force elements and tile them together to create tailored force packages designed for a specific, immediate mission.17 Because the systems are disaggregated and highly interoperable, they can mass firepower and effects unpredictably without necessarily massing physical forces in a vulnerable geographic location.13 This approach grants the joint force an asymmetric advantage, making it exceedingly difficult for adversaries to ascertain intent, identify critical vulnerabilities, or predict avenues of attack.13 Analysts note that the human immune system, which has evolved to exhibit mosaic-like properties of resilience, adaptability, and distributed response, serves as a biological analog for this warfighting construct.19

Enabling Technologies: ACK and STITCHES

To operationalize Mosaic Warfare and enable force composability directly at the warfighter level, the Defense Advanced Research Projects Agency has developed critical software architectures, most notably the Adapting Cross-Domain Kill-Webs program and the System-of-systems Technology Integration Tool Chain for Heterogeneous Electronic Systems.12

The Adapting Cross-Domain Kill-Webs program functions as a novel, highly advanced decision-aid software designed explicitly for mission commanders. It analyzes thousands of complex variables and available assets across organizational and service boundaries to recommend optimal sensor-to-shooter combinations.12 Rather than relying on rigid, pre-planned responses, the software generates actionable plays for the commander. During demonstrations, the software successfully analyzed immense volumes of data to form cross-domain webs, ultimately sending commands to applications like the Command and Control Incident Management Emergency Response Application and ground-based integrated fire control systems to scramble interceptors.12

Crucially, the System-of-systems Technology Integration Tool Chain for Heterogeneous Electronic Systems serves as the vital middleware making these rapid connections possible. It is a software-only, fully government-owned integration toolchain designed to rapidly connect heterogeneous systems across any domain.12 It circumvents traditional interoperability bottlenecks by auto-generating extremely low-latency, high-throughput middleware between systems without forcing a common interface standard or requiring massive hardware upgrades.12 This breakthrough allows legacy radar systems deployed over forty years ago to seamlessly share targeting data with modern electronic equipment, creating adaptive kill webs in a matter of days rather than the years typically required to accredit and host software on secure military networks.12

Architectural Composition: The Triad of the Kill Web

The kill web is not a single piece of hardware but a system of systems sustained by a triad of interconnected functional grids: the omni-domain sensor grid, the command and control nexus, and the effector grid.

The Omni-Domain Sensor Grid

A kill web is entirely dependent upon persistent, resilient, and multi-modal battlespace awareness. In a modern conflict prioritizing precision strikes, the quality, quantity, and survivability of sensors are often more decisive than the explosive yield of the weapons they guide.21 The sensor grid ingests data from a dizzying array of sources: space-based early warning systems, high-altitude unmanned aerial vehicles, advanced fifth-generation aircraft like the F-35 acting as forward data-collection nodes, and terrestrial radars.22

Modern sensor infrastructure, such as the AN/TPS-80 Ground/Air Task Oriented Radar, provides unambiguous views of highly cluttered, contested environments, passing that data directly into the web.23 Furthermore, to secure the ultimate high ground, the United States Space Force, through the Space Development Agency, is rapidly deploying the Proliferated Warfighter Space Architecture.24 This architecture establishes a dedicated Custody Layer utilizing visible, infrared, synthetic aperture radar, and multispectral payloads to maintain continuous, all-weather tracking of time-sensitive and mobile targets.26 This multi-modal approach ensures that if an adversary employs electronic warfare to jam a specific radar frequency, optical or infrared sensors can seamlessly maintain target custody, preserving the integrity of the kill web.26 Additionally, geographic high-latitude sensor placements, such as those in Greenland, are recognized as critical nodes for early detection and sensor fusion, compressing decision timelines for commanders across multi-domain networks and preventing reactive delays against threats emerging over the pole.28

The Command and Control Nexus

The deluge of data generated by the omni-domain sensor grid vastly exceeds human cognitive capacity. The command and control nexus acts as the central nervous system of the kill web, filtering noise and transforming raw data into actionable, targeting-grade intelligence.5 This nexus relies on an integrated data fabric, secure transport layers, and advanced edge computing to ensure information parsimony—delivering only the precise information required, to the right person or machine, at the exact moment it is needed.5 The Space Development Agency’s Transport Layer forms the backbone of this nexus in space, providing low-latency, high-bandwidth data transport that links the tracking data from the Custody Layer directly to the warfighter on the ground, enabling beyond line-of-sight tactical operations.26

The Effector Grid

The effector grid encompasses the platforms and munitions that ultimately act upon the decisions generated within the command and control nexus. In a kill web construct, effectors are not strictly kinetic, such as hypersonic missiles, long-range artillery, or precision-guided bombs. The web seamlessly integrates non-kinetic effectors, including specialized electronic warfare assets designed to execute soft kills by blinding adversary sensors, jamming communications networks, or launching offensive cyber operations.1

Furthermore, the integration of Collaborative Combat Aircraft—highly autonomous uncrewed drones flying in tandem with manned fighters—vastly expands the magazine depth and operational reach of the effector grid.31 The Collaborative Combat Aircraft program validates a modular, open-systems approach designed to operate within established command structures while extending the effectiveness of crewed aircraft, allowing manned platforms to remain outside the densest threat rings while directing uncrewed systems to sense, shield, and strike targets in highly contested environments.31

Joint and Allied Integration: The CJADC2 Ecosystem

To actualize the theoretical concepts of the kill web, the Department of Defense is aggressively pursuing the Combined Joint All-Domain Command and Control initiative. This initiative is not a monolithic procurement program, but rather an overarching strategic vision and set of rigorous data standards ensuring that the independent tactical networks developed by the respective military branches can interoperate seamlessly.36 The explicit inclusion of the Combined prefix underscores the mandatory integration of international mission partners and allied nations, particularly the Five Eyes alliance comprised of the United States, United Kingdom, Canada, Australia, and New Zealand.39

Service BranchPrimary Kill Web InitiativeCore Operational Focus and Architecture
U.S. ArmyProject ConvergenceIntegrating sensor-to-shooter webs for Large-Scale Combat Operations using AI/ML targeting algorithms.
U.S. NavyProject OvermatchDelivering the Naval Operational Architecture to enable Distributed Maritime Operations and massed sea-based fires.
U.S. Air ForceAdvanced Battle Management SystemDeveloping cloud environments and advanced data links to optimize kill chains for speed and survivability.
U.S. Marine CorpsProject DynamisModernizing command and control to enable Expeditionary Advanced Base Operations and Stand-in Forces.
U.S. Space ForceProliferated Warfighter Space ArchitectureDeploying a massive LEO satellite constellation for low-latency transport and continuous target custody.

Army Capabilities: Project Convergence

The United States Army’s specific contribution to the kill web is driven by Project Convergence, a persistent campaign of learning and field experimentation designed to dramatically accelerate target acquisition and engagement frameworks in Large-Scale Combat Operations.42 Project Convergence seeks to evolve the Army’s legacy linear processes into true sensor-to-shooter webs by combining advanced network capabilities with cutting-edge artificial intelligence.43

During landmark Project Convergence demonstrations at installations like Yuma Proving Ground, the Army successfully integrated sensors from the space domain with ground-based effectors, routing targeting data across thousands of miles. By linking space-based sensors directly to ground artillery units and Marine Corps F-35 aircraft, the Army effectively showcased how ground forces can strike deep into adversarial territory using off-board, multi-domain sensor data, replacing post-delivery interdependence with pre-requirement integration.7

Naval Capabilities: Project Overmatch and the Naval Operational Architecture

The Department of the Navy’s implementation of the combined joint all-domain concept is Project Overmatch. This high-priority initiative aims to deliver the robust Naval Operational Architecture by the middle of this decade, explicitly enabling Distributed Maritime Operations, Littoral Operations in a Contested Environment, and Expeditionary Advanced Base Operations.47 The maritime domain requires naval forces to operate over vast oceanic distances while projecting synchronized lethal and non-lethal effects, necessitating a resilient web of persistent sensors, command nodes, and weapons.47

Project Overmatch is built upon four foundational technical pillars: Networks, Infrastructure, Data Architecture, and Tools and Analytics.47 It prioritizes the deployment of Software Defined Networks to provide transport-agnostic connectivity specifically engineered to survive in severely denied environments.47 It utilizes DevSecOps principles, rapid delivery of containerized applications to the fleet, and a robust data fabric to abstract data from legacy applications, making it available as a secure service across diverse platforms.47 To bypass the sluggish pace of traditional defense acquisition, Overmatch heavily leverages platforms like Open DAGIR—Data and Applications Government-owned Interoperable Repositories—to rapidly procure, validate, and integrate commercial-off-the-shelf artificial intelligence and data analytics tools directly into fleet operations.48

Marine Corps Integration: Project Dynamis and Distributed Operations

The United States Marine Corps operates as a critical connective tissue within the naval and joint kill web through initiatives like Project Dynamis, which accelerates the modernization of command, control, communications, and computers portfolio.49 Modern Marine Corps operations rely heavily on the Marine Air Control Group, specifically units like MACG-38, which represents a fundamental shift in aviation capabilities.50 Rather than viewing aviation through individual platform types, the control group functions as the dial for force configuration, encompassing integrated air defense, tactical air control, and the communications backbone necessary to assemble tailored packages that close kill webs.50 This infrastructure directly supports Expeditionary Advanced Base Operations, where highly mobile Stand-in Forces operate within an adversary’s weapon engagement zone to sense targets and cue long-range naval and joint fires.6

The Combined Mandate: Coalition Integration and the Mission Partner Environment

The z-axis of the combined joint all-domain strategy is comprehensive allied integration.40 History demonstrates that the United States rarely engages in major conflicts alone; however, coalition operations have historically been severely hindered by disparate security protocols, incompatible waveforms, and isolated national networks.53 The modern kill web directly incorporates the Mission Partner Environment and the Secret and Below Releasable Environment framework.55 By utilizing advanced data-centric security architectures—protecting the individual data elements rather than just the perimeter network—these environments enable rapid, secure information sharing, effectively integrating foreign partners into the United States kill web to drastically cut the decision-making timeline across multinational commands.55

Recent massive wargames, such as the Indo-Pacific Valiant Shield 2024 exercise, have rigorously validated these integration concepts.58 Valiant Shield served as a premier proving ground for the combined architecture, demonstrating how joint and coalition forces can share targeting data at breakneck speeds, resulting in a highly successful sinking exercise of a decommissioned vessel utilizing precise, multi-axis, multi-domain effects.58 The primary lesson derived from these exercises is that foundational interoperability has been largely achieved; the operational focus across the Department of Defense has now shifted toward actively harnessing that resulting connectivity and visibility to apply it directly to warfighting capabilities and net-enabled weapons.61

The Algorithmic Engine: Artificial Intelligence and Autonomy

The velocity required to execute offensive and defensive operations within a modern kill web vastly outpaces human cognitive and manual processing power. Consequently, artificial intelligence and machine learning serve as the indispensable algorithmic engines of the web, drastically compressing the sensor-to-shooter timeline and enabling true decision superiority.16

Prometheus and FIRESTORM Execution

The Army’s Project Convergence effectively demonstrated the transformative power of specialized artificial intelligence algorithms, specifically the synergistic use of Prometheus and FIRESTORM.7 Prometheus functions as a highly advanced automated target identification system. It ingests massive quantities of fused sensor data—such as high-resolution satellite imagery downloaded to tactical ground stations—and utilizes machine learning to autonomously identify, classify, and geolocate enemy threats across all domains in a matter of seconds.7

Once targets are securely identified, the targeting data is instantly fed into FIRESTORM, which serves as the tactical computer brain within the assault network.7 FIRESTORM processes a multitude of variables simultaneously, evaluating complex terrain characteristics, the proximity of available friendly weapon systems, and total threat density.7 It then autonomously recommends the optimal shooter to engage the target. Crucially, FIRESTORM automates target deconfliction, ensuring that multiple friendly units do not redundantly expend munitions on the same threat—a process that historically required time-consuming radio coordination and manual deconfliction matrices.7

Yugo M85/M92 dust cover quick takedown pin installed

Enterprise Intelligence: Project Maven and Commercial Integration

At the strategic and operational levels, the Department of Defense relies heavily on Maven, originally launched as Project Maven in 2017 to accelerate the adoption of machine learning for military intelligence workflows.62 Maven integrates massive data feeds from drones, satellites, and other sensors to automatically flag potential targets, present findings to human analysts, and relay decisions to operational systems.62

This capability is being rapidly scaled through deep commercial partnerships. The Maven Smart System, powered by the commercially developed Palantir Platform, serves as an enterprise mission command interface, integrating large-scale operational data to accelerate human decision-making across joint intelligence and fires missions.63 The Department of Defense recently expanded the Maven Smart System contract significantly to prepare for an influx of demand from military users.64 Concurrently, software platforms like Anduril’s Lattice provide edge-based mission autonomy, integrating directly with robotic systems to orchestrate air defense and reconnaissance.65 The marriage of these advanced commercial systems represents the technological integration necessary to process data at the unprecedented speed of modern combat.48

The Command Philosophy Paradox: Human in the Loop versus On the Loop

The integration of highly autonomous systems within the kill web forces a critical reevaluation of established military command philosophy.16 Specifically, the capabilities of the web create severe friction with the foundational doctrine of Mission Command.

Mission Command is the prevailing command and control philosophy of the joint force, predicated on the absolute necessity of decentralized execution.66 Commanders provide clear, overarching intent but deliberately delegate authority to subordinates to exercise initiative and make tactical decisions in complex, chaotic environments where communications may be denied.66

However, the kill web’s reliance on algorithmic warfare introduces a technological paradox.16 The sheer volume of data processed by artificial intelligence provides higher-echelon commanders with an unprecedented, near-perfect common operating picture in real-time.16 This immense situational awareness, coupled with the ability of machines to orchestrate complex strikes globally, introduces a powerful temptation toward centralized control.16 If a four-star commander sitting in a maritime operations center can view the exact tactical layout via a Maven Smart System, the traditional necessity for decentralized execution diminishes, potentially leading to micromanagement and an erosion of subordinate trust.16

Furthermore, the speed of modern effectors, such as hypersonic weapons and autonomous drone swarms, dictates that human operators must increasingly transition from being in the loop—where artificial intelligence proposes an action and a human must explicitly authorize every step—to being on the loop, where the system operates autonomously within pre-defined parameters, and the human only intervenes to override or correct.7 Current Department of Defense policy continues to emphasize the necessity of appropriate human judgment over the use of force, but as the battlespace timeline compresses to milliseconds, maintaining a human in every individual tactical loop becomes physically impossible, necessitating profound ethical and doctrinal shifts regarding how lethal force is authorized within the web.7

Sustaining the Web: Contested Logistics and the 4S Framework

A kill web, regardless of its technological sophistication, is only as lethal as its logistics tail. While immense focus is placed on advanced sensors and precision shooters, the United States military explicitly recognizes that a major conflict in the Pacific theater will be characterized by severely contested logistics.75 Adversaries possess the long-range precision fires required to aggressively target supply lines, fuel depots, port facilities, and transportation nodes to starve the dispersed web of its necessary resources.75

Operations such as the Marine Corps’ Expeditionary Advanced Base Operations rely entirely on inserting small, lethal forces deep within an adversary’s weapon engagement zone to close kill webs.6 However, these highly distributed forces are astonishingly logistics-intensive.77 Recent exercises, such as Steel Knight 25, tested various force projection scenarios and revealed significant capability gaps in sustaining these distributed nodes under contested conditions, highlighting critical shortages in heavy-lift assets like the CH-53K King Stallion, MV-22 Ospreys, and C-130 aircraft.61 The traditional assumption of operating within permissive logistics environments once forces are ashore has completely collapsed.75

To address this existential vulnerability, the Defense Logistics Agency is revolutionizing defense logistics by converging commercial supply chains with combat kill chains through the implementation of the 4S Framework: Sensor to Shooter to Sustainer to Supplier.79

In this highly integrated model, the logistical enterprise is hardwired directly into the digital infrastructure of the kill web.79 When a sensor identifies a threat, or a shooter expends a precision munition, that consumption data flows seamlessly and instantaneously back to the sustainer, and ultimately, to the defense industrial base acting as the supplier.79 By utilizing artificial intelligence, machine learning algorithms, digital twins of the supply chain, and automated agentic data-bots, the 4S framework provides predictive logistics, ensuring that dispersed forces receive fuel, munitions, and repair parts proactively rather than reactively.79 In a contested environment where primary supply routes are threatened or destroyed, these automated systems can instantaneously reroute supplies or reposition logistics nodes to ensure the uninterrupted survivability of the force.78

Yugo M85/M92 dust cover quick takedown pin installed

Vulnerabilities, Friction Points, and Cyber Threats

Despite its theoretical superiority and immense lethality, the kill web introduces new, profound operational vulnerabilities. By its very definition, a networked, decentralized system relies absolutely on the integrity, bandwidth, and security of its underlying data transport layers. If the connective tissue of the web is severed, the distributed forces devolve into isolated, uncoordinated units vulnerable to defeat in detail.

Interoperability and Legacy Infrastructure Integration

The most immediate and persistent technical hurdle facing the kill web is foundational interoperability.54 The United States military currently operates thousands of legacy platforms—including older aircraft, surface ships, and ground vehicles—designed and procured decades before the advent of the combined joint all-domain concept.36 Ensuring that a tactical data link from the 1970s can securely receive artificial intelligence-processed targeting data from a 2026-era cloud environment requires extensive middleware, translation nodes, and application programming interface integration.47

As noted in extensive assessments of allied integration, attempting to mandate a single, universal data standard across all military services and coalition partners is practically impossible due to conflicting acquisition cycles and proprietary technologies.47 Therefore, the technological focus must remain on real-time data translation and highly portable data fabrics.47 Defense contractors are actively developing systems like the Unity Adapter, which functions as an open-standards interface to unlock proprietary data sets and connect disparate systems across the battlespace, alongside emerging protocols for space strategic multicast connectivity.61

The Electromagnetic and Cyber Contests

The kill web is highly susceptible to electromagnetic interference and offensive cyber operations. In a high-end conflict against a peer adversary, forces will be subjected to massive, power-based jamming designed to drown out radio frequency communications and sever the fragile links between remote sensors and their command nodes.82 The strategic importance of jamming is immense; the United States Space Force has actively deployed Remote Modular Terminals specifically designed to block adversarial aerospace satellites from transmitting targeting data, though these jammers themselves become high-value targets for anti-radiation munitions.27

Furthermore, the proliferation of space-based assets makes global satellite constellations prime targets for cyber warfare. While the Space Development Agency relies on low earth orbit proliferation for resilience, satellite modems and ground stations remain uniquely vulnerable to sophisticated cyberattacks.82 A stark, historical example of this threat occurred during the initial phase of the Russia-Ukraine conflict, when attackers deployed a wiper malware known as AcidRain.82 This highly coordinated cyberattack successfully disabled thousands of Viasat satellite modems, cutting internet access for military users and permanently blinding communications infrastructure across the region.82 Similar distributed denial of service attacks against the mesh networks underpinning the kill web could paralyze the system, forcing a dangerous reversion to localized, degraded operations.85

To aggressively mitigate these existential risks, the Department of Defense is implementing Zero-Trust security architectures, secure routing protocols, multi-factor authentication for ground stations, and post-quantum encryption standards within its transmission systems.84 Furthermore, relying on Blue A2/AD—utilizing the same geographic constraints against the adversary by establishing resilient, hardened sensor nodes in austere, highly defensible locations like Greenland or the First Island Chain—provides vital localized redundancy when global space links are jammed or compromised.28

The transition from the linear kill chain to the multi-domain kill web represents the most significant, structural evolution in United States military operational design since the inception of the AirLand Battle doctrine. Driven by the absolute strategic imperative to counter System Destruction Warfare and Anti-Access/Area Denial strategies, the kill web weaponizes information, complexity, and sheer speed. Through the robust integration of omni-domain sensors, automated algorithmic command engines like Prometheus and FIRESTORM, and highly distributed kinetic and non-kinetic effectors, the kill web fully realizes the transformative principles of Mosaic Warfare. It enables an operational posture where the joint force—alongside its critical international coalition partners—can rapidly compose unpredictable, highly lethal force packages capable of collapsing an adversary’s decision cycle. However, realizing this vision demands a flawless, highly secure data transport layer capable of surviving in the most hostile electronic and cyber environments ever conceived, alongside a revolution in contested logistics and a profound reckoning within military command philosophy regarding the shifting boundary between human oversight and machine autonomy. Ultimately, prevailing in future conflicts will not belong solely to the military possessing the most exquisite individual platforms, but to the force that can seamlessly orchestrate its diverse, distributed assets across the most resilient, intelligent, and lethal web.


Please share the link on Facebook, Forums, with colleagues, etc. Your support is much appreciated and if you have any feedback, please email us in**@*********ps.com. If you’d like to request a report or order a reprint, please click here for the corresponding page to open in new tab.


Sources Used

  1. Winning the Kill Chain Competition – Mitchell Institute for Aerospace Studies, accessed February 26, 2026, https://www.mitchellaerospacepower.org/app/uploads/2023/05/Scale_Scope_Speed_Survivability_-KillChain_-Policy_Paper_40-New.pdf
  2. How does the ‘kill chain’ actually work? : r/CredibleDefense – Reddit, accessed February 26, 2026, https://www.reddit.com/r/CredibleDefense/comments/1gbbqc1/how_does_the_kill_chain_actually_work/
  3. Air and Missile Defense and Point Defense in Near-Peer Conflict: A Joint Doctrine and ACE Imperative – Small Wars Journal, accessed February 26, 2026, https://smallwarsjournal.com/2025/12/11/air-missile-defense-near-peer-conflict/
  4. Mosaic Warfare | Air & Space Forces Magazine, accessed February 26, 2026, https://www.airandspaceforces.com/article/mosaic-warfare/
  5. Joint All-Domain Kill Webs – Marine Corps Association, accessed February 26, 2026, https://www.mca-marines.org/wp-content/uploads/Pavlak-Oct23.pdf
  6. CHIPS Articles: Revealing the hidden: The role of sensing in completing the kill web, accessed February 26, 2026, https://www.doncio.navy.mil/Chips/ArticleDetails.aspx?ID=16714
  7. Inside the Army’s futuristic test of its battlefield artificial intelligence in …, accessed February 26, 2026, https://www.c4isrnet.com/artificial-intelligence/2020/09/25/the-army-just-conducted-a-massive-test-of-its-battlefield-artificial-intelligence-in-the-desert/
  8. Joint All-Domain Command and Control (JADC2) – Missile Defense Advocacy Alliance, accessed February 26, 2026, https://www.missiledefenseadvocacy.org/defense-systems/joint-all-domain-command-and-control-jadc2/
  9. Meeting the Anti-Access and Area-Denial Challenge – CSBA, accessed February 26, 2026, https://csbaonline.org/uploads/documents/2003.05.20-Anti-Access-Area-Denial-A2-AD.pdf
  10. Shortening the “competition kill chain” Through irregular Warfare Campaigning. – Line of Departure, accessed February 26, 2026, https://www.lineofdeparture.army.mil/Journals/Special-Warfare/Spring-2024/Shortening-the-competition-kill-chain/
  11. The Challenge of Dis-Integrating A2/AD Zone: How Emerging Technologies Are Shifting the Balance Back to the Defense – NDU Press, accessed February 26, 2026, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/2106488/the-challenge-of-dis-integrating-a2ad-zone-how-emerging-technologies-are-shifti/
  12. Creating Cross-Domain Kill Webs in Real Time – DARPA, accessed February 26, 2026, https://www.darpa.mil/news/2020/cross-domain-kill-webs
  13. MOSAIC WARFARE – CSBA, accessed February 26, 2026, https://csbaonline.org/uploads/documents/Mosaic_Warfare_Web.pdf
  14. Taiwan’s Layered Air Defence and the Calculus of Deterrence | Center for International Maritime Security, accessed February 26, 2026, https://cimsec.org/the-shield-of-the-strait-taiwans-layered-air-defence-and-the-calculus-of-deterrence/
  15. MOSAIC WARFARE – CSBA, accessed February 26, 2026, https://csbaonline.org/uploads/documents/Mosaic_Warfare_2.pdf
  16. Mission (Command) Complete: Implications of JADC2 > National …, accessed February 26, 2026, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/3841502/mission-command-complete-implications-of-jadc2/
  17. Aligning Emerging Concepts and Capabilities With Mosaic Warfare, accessed February 26, 2026, https://ciasp.scholasticahq.com/article/127303-aligning-emerging-concepts-and-capabilities-with-mosaic-warfare
  18. DARPA Tiles Together a Vision of Mosaic Warfare, accessed February 26, 2026, https://www.darpa.mil/news/features/mosaic-warfare
  19. Distributed Kill Chains: Drawing Insights for Mosaic Warfare from the Immune System and from the Navy | RAND, accessed February 26, 2026, https://www.rand.org/pubs/research_reports/RRA573-1.html
  20. ACK: Adapting Cross-Domain Kill-Webs – DARPA, accessed February 26, 2026, https://www.darpa.mil/research/programs/adapting-cross-domain-kill-webs
  21. Sensor to Shooter Chains Turn into Kill Webs – European Security & Defence, accessed February 26, 2026, https://euro-sd.com/2022/10/articles/27530/sensor-to-shooter-chains-turn-into-kill-webs/
  22. C2-Enabled Long-Range Precision Fires for the Army – Booz Allen, accessed February 26, 2026, https://www.boozallen.com/insights/defense/c2-command-and-control/c2-enabled-long-range-precision-fires-for-the-army.html
  23. Counter Unmanned Aerial Systems (C-UAS) – Northrop Grumman, accessed February 26, 2026, https://www.northropgrumman.com/what-we-do/mission-solutions/counter-unmanned-aerial-systems-c-uas
  24. Space Development Agency – Increasing Warfighters’ Lethality, Maneuverability, and Survivability, accessed February 26, 2026, https://www.sda.mil/
  25. SDA Layered Network of Military Satellites now known as “Proliferated Warfighter Space Architecture” > United States Space Force > News, accessed February 26, 2026, https://www.spaceforce.mil/News/Article/3274487/sda-layered-network-of-military-satellites-now-known-as-proliferated-warfighter/
  26. Custody – Space Development Agency, accessed February 26, 2026, https://www.sda.mil/custody/
  27. US ‘risks electronic warfare’ with China after unveiling anti-satellite jammer network, accessed February 26, 2026, https://space4peace.org/us-risks-electronic-warfare-with-china-after-unveiling-anti-satellite-jammer-network/
  28. Greenland and the High Ground of the Kill Web: Why the Arctic Matters for Fighting at the Speed of Light | Defense.info, accessed February 26, 2026, https://defense.info/defense-decisions/2026/02/greenland-and-the-high-ground-of-the-kill-web-why-the-arctic-matters-for-fighting-at-the-speed-of-light/
  29. Kill Webs: The Wicked Problem of Future Warfighting | The Duck of Minerva, accessed February 26, 2026, https://www.duckofminerva.com/2016/06/kill-webs-the-wicked-problem-of-future-warfighting.html
  30. SDA Awards Tactical SATCOM Demo Contract – Air & Space Forces Magazine, accessed February 26, 2026, https://www.airandspaceforces.com/space-development-agency-tactical-satcom-demo-contract/
  31. Air Force validates open architecture, expands Collaborative Combat Aircraft ecosystem, accessed February 26, 2026, https://www.af.mil/News/Article-Display/Article/4405471/air-force-validates-open-architecture-expands-collaborative-combat-aircraft-eco/
  32. Collaborative Combat Aircraft program progresses through deliberate weapons integration testing > Air Combat Command > Article Display – ACC, accessed February 26, 2026, https://www.acc.af.mil/News/Article-Display/Article/4414428/collaborative-combat-aircraft-program-progresses-through-deliberate-weapons-int/
  33. Collaborative Combat Aircraft (CCA), US – Airforce Technology, accessed February 26, 2026, https://www.airforce-technology.com/projects/collaborative-combat-aircraft-cca-usa/
  34. The Need for Collaborative Combat Aircraft for Disruptive Air Warfare – Mitchell Institute for Aerospace Studies, accessed February 26, 2026, https://www.mitchellaerospacepower.org/app/uploads/2024/02/The-Need-For-CCAs-for-Disruptive-Air-Warfare-FULL-FINAL.pdf
  35. Air Force begins adding weapons to CCA drone flight tests – DefenseScoop, accessed February 26, 2026, https://defensescoop.com/2026/02/24/air-force-cca-drone-captive-carry-tests/
  36. JADC2 and the Kill Web – Military Embedded Systems, accessed February 26, 2026, https://militaryembedded.com/radar-ew/sigint/jadc2-and-the-kill-web
  37. Key to the Pentagon’s concept for modern war is standardization – DefenseScoop, accessed February 26, 2026, https://defensescoop.com/2024/08/12/key-pentagon-cjadc2-concept-modern-war-standardization/
  38. GAO-25-106454, DEFENSE COMMAND AND CONTROL : Further Progress Hinges on Establishing a Comprehensive Framework, accessed February 26, 2026, https://files.gao.gov/reports/GAO-25-106454/index.html
  39. Return of CJADC2: DoD officially moves ahead with ‘combined’ JADC2 in a rebrand focusing on partners – Breaking Defense, accessed February 26, 2026, https://breakingdefense.com/2023/05/return-of-cjadc2-dod-officially-moves-ahead-with-combined-jadc2-in-a-rebrand-focusing-on-partners/
  40. Allies Need to Take Part in Services JADC2 Goals – National Defense Industrial Association, accessed February 26, 2026, https://www.ndia.org/policy/research-blog/2023/6/23/allies-need-to-take-part-in-services-jadc2-goals
  41. Army Suggests Adding Five Eyes Nation Allies in JADC2 | AFCEA International, accessed February 26, 2026, https://www.afcea.org/signal-media/technet-augusta-22-coverage/army-suggests-adding-five-eyes-nation-allies-jadc2
  42. Project Convergence: Revolutionizing Targeting in Large-Scale Combat Operations, accessed February 26, 2026, https://www.lineofdeparture.army.mil/Journals/Field-Artillery/Field-Artillery-Archive/Field-Artillery-2025-E-Edition/Project-Convergence/
  43. Army sets sights on 2024 for next Project Convergence – Defense News, accessed February 26, 2026, https://www.defensenews.com/land/2023/02/07/army-sets-sights-on-2024-for-next-project-convergence/
  44. Project Convergence: Achieving Overmatch by Solving Joint Problems – NDU Press, accessed February 26, 2026, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/2807194/project-convergence-achieving-overmatch-by-solving-joint-problems/
  45. Project Convergence – DEVCOM Soldier Center, accessed February 26, 2026, https://sc.devcom.army.mil/spotlight/project-convergence/
  46. Pushing Data ‘From Space To Mud’: Project Convergence – Breaking Defense, accessed February 26, 2026, https://breakingdefense.com/2020/09/pushing-data-from-space-to-mud-project-convergence/
  47. Project Overmatch Discussion – NDIA-SD.org, accessed February 26, 2026, https://www.ndia-sd.org/wp-content/uploads/2025/02/13-Feb-2025-QBOB-Overmatch-Brief-Nic-Bergeron.pdf
  48. News – Commercial Tech Partnerships Drive … – DVIDS, accessed February 26, 2026, https://www.dvidshub.net/news/501030/commercial-tech-partnerships-drive-unprecedented-progress-project-overmatch-and-navy-capability
  49. Project Dynamis – Marines.mil, accessed February 26, 2026, https://www.marines.mil/Project-Dynamis/
  50. MACG-38: The Command-and-Control Enabler for Marine Corps Distributed Operations, accessed February 26, 2026, https://defense.info/featured-story/2026/02/macg-38-the-command-and-control-enabler-for-marine-corps-distributed-operations/
  51. Force Design Update – Marines.mil, accessed February 26, 2026, https://www.marines.mil/Force-Design/
  52. Tentative Manual For Expeditionary Advanced Base Operations 2nd Edition – Marines.mil, accessed February 26, 2026, https://www.marines.mil/Portals/1/Docs/230509-Tentative-Manual-For-Expeditionary-Advanced-Base-Operations-2nd-Edition.pdf
  53. America First but Never Alone: The Critical Need for Coalition Information Sharing, accessed February 26, 2026, https://www.tracesystems.com/america-first-but-never-alone-part-1/
  54. Interoperability: A Continuing Challenge in Coalition Air Operations – RAND, accessed February 26, 2026, https://www.rand.org/content/dam/rand/pubs/monograph_reports/MR1235/RAND_MR1235.pdf
  55. Modernizing DOD–Coalition Information Sharing for JADC2 Warfare – SAIC, accessed February 26, 2026, https://www.saic.com/perspectives/jadc2/modernizing-dod-coalition-information-sharing-for-jadc2-warfare
  56. Mission Partner Environment Cuts Decision Making, Kill Chain – War.gov, accessed February 26, 2026, https://www.war.gov/News/News-Stories/Article/Article/2854238/mission-partner-environment-cuts-decision-making-kill-chain/
  57. Evaluation of a Line of Effort in the DoD’s Implementation of the Combined Joint All Domain Command and Control (CJADC2) Strategy (Report No. DODIG-2025-126), accessed February 26, 2026, https://www.dodig.mil/reports.html/Article/4250222/evaluation-of-a-line-of-effort-in-the-dods-implementation-of-the-combined-joint/
  58. Video – Valiant Shield 2024 | Exercise Valiant Shield wraps up – DVIDS, accessed February 26, 2026, https://www.dvidshub.net/video/929576/valiant-shield-2024-exercise-valiant-shield-wraps-up
  59. Creating a ‘kill web’: Army brings other services, allies together to test new tech for a major fight | The American Legion, accessed February 26, 2026, https://www.legion.org/information-center/news/newsletters/2024/march/creating-a-kill-web-army-brings-other-services-allies-together-to-test-new-tech-for-a-major-fight
  60. Valiant Shield 2024 Participants Conduct Sinking Exercise – U.S. Pacific Fleet – Navy.mil, accessed February 26, 2026, https://www.cpf.navy.mil/Newsroom/News/Article/3808596/valiant-shield-2024-participants-conduct-sinking-exercise/
  61. Take lessons learned from joint exercises and turn them into …, accessed February 26, 2026, https://breakingdefense.com/2024/10/take-lessons-learned-from-joint-exercises-and-turn-them-into-capabilities/
  62. Project Maven – Wikipedia, accessed February 26, 2026, https://en.wikipedia.org/wiki/Project_Maven
  63. Palantir Expands Maven Smart System AI/ML Capabilities to Military Services, accessed February 26, 2026, https://investors.palantir.com/news-details/2024/Palantir-Expands-Maven-Smart-System-AIML-Capabilities-to-Military-Services/
  64. ‘Growing demand’ sparks DOD to raise Palantir’s Maven contract to more than $1B, accessed February 26, 2026, https://defensescoop.com/2025/05/23/dod-palantir-maven-smart-system-contract-increase/
  65. Anduril and Palantir to Accelerate AI Capabilities for National Security, accessed February 26, 2026, https://www.anduril.com/news/anduril-and-palantir-to-accelerate-ai-capabilities-for-national-security
  66. Understanding mission command | Article | The United States Army, accessed February 26, 2026, https://www.army.mil/article/106872/understanding_mission_command
  67. The Trouble with Mission Command – NDU Press, accessed February 26, 2026, https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-86/jfq-86_94-100_Hill-Niemi.pdf
  68. MISSION COMMAND – Air Force Doctrine, accessed February 26, 2026, https://www.doctrine.af.mil/Portals/61/documents/AFDP_1-1/AFDP%201-1%20Mission%20Command.pdf
  69. WILL NEW DOCTRINE FIX MISSION COMMAND? – War Room – U.S. Army War College, accessed February 26, 2026, https://warroom.armywarcollege.edu/articles/new-doctrine-mission-command/
  70. Human-in-the-loop or AI-in-the-loop? Automate or Collaborate? – arXiv, accessed February 26, 2026, https://arxiv.org/html/2412.14232v1
  71. Human-in-the-loop in AI workflows: HITL meaning, benefits, and practical patterns – Zapier, accessed February 26, 2026, https://zapier.com/blog/human-in-the-loop/
  72. Human in the Loop vs Human on the Loop | by VAIOT_LTD | Feb, 2026 – Medium, accessed February 26, 2026, https://vaiotltd.medium.com/human-in-the-loop-vs-human-on-the-loop-880e4538ca65
  73. Artificial Intelligence and Keeping Humans “in the Loop”, accessed February 26, 2026, https://www.cigionline.org/articles/artificial-intelligence-and-keeping-humans-loop/
  74. Please Stop Saying ‘Human-In-The-Loop’ – Institute for Future Conflict (IFC), accessed February 26, 2026, https://ifc.usafa.edu/articles/please-stop-saying-human-in-the-loop
  75. Lessons Learned at Steel Knight 25: Operating Within and as a Kill …, accessed February 26, 2026, https://defense.info/featured-story/2026/02/lessons-learned-at-steel-knight-25-operating-within-and-as-a-kill-web/
  76. Contested Logistics Environment Defined | Article | The United States Army, accessed February 26, 2026, https://www.army.mil/article/272922/contested_logistics_environment_defined
  77. Giving Our “Paper Tiger” Real Teeth: Fixing the U.S. Military’s Plans for Contested Logistics Against China – NDU Press, accessed February 26, 2026, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/3942161/giving-our-paper-tiger-real-teeth-fixing-the-us-militarys-plans-for-contested-l/
  78. Surviving the Kill Web Adapting Army Sustainment to the Precision Strike and Unmanned Threat Era, accessed February 26, 2026, https://www.lineofdeparture.army.mil/Journals/Army-Sustainment/Army-Sustainment-Archive/ASPB-Summer-2025/Surviving-the-Kill-Web/
  79. Modernizing Defense Logistics: Converging Kill Chains and Supply …, accessed February 26, 2026, https://www.dla.mil/About-DLA/News/News-Article-View/Article/4186321/modernizing-defense-logistics-converging-kill-chains-and-supply-chains/
  80. Read “Realizing the Potential of C4I: Fundamental Challenges” at NAP.edu, accessed February 26, 2026, https://www.nationalacademies.org/read/6457/chapter/4
  81. Overcoming Joint Interoperability Challenges > National Defense University Press > Joint Force Quarterly 74, accessed February 26, 2026, https://ndupress.ndu.edu/Joint-Force-Quarterly/Joint-Force-Quarterly-74/Article/577545/overcoming-joint-interoperability-challenges/
  82. Satellite Cybersecurity: Threats & Impacts – SSH Communications Security, accessed February 26, 2026, https://www.ssh.com/academy/satellite-cybersecurity-threats-impacts
  83. Cyber Attacks on Space Information Networks: Vulnerabilities, Threats, and Countermeasures for Satellite Security – MDPI, accessed February 26, 2026, https://www.mdpi.com/2624-800X/5/3/76
  84. What is Cybersecurity in Space? – arXiv, accessed February 26, 2026, https://arxiv.org/html/2509.05496v1
  85. Cyberwarfare Targeting Undersea Cables and Satellite Mesh Networks – Medium, accessed February 26, 2026, https://medium.com/@aditrizky052/cyberwarfare-targeting-undersea-cables-and-satellite-mesh-networks-1c54ac5949ea
  86. Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure, accessed February 26, 2026, https://pmc.ncbi.nlm.nih.gov/articles/PMC10145335/
  87. Cybersecurity and the Problem of Interoperability – CSIS, accessed February 26, 2026, https://www.csis.org/analysis/cybersecurity-and-problem-interoperability
  88. Satellite Infrastructure Is Surprisingly Vulnerable to Cyberattacks – Risk and Resilience Hub, accessed February 26, 2026, https://riskandresiliencehub.com/satellite-infrastructure-is-surprisingly-vulnerable-to-cyberattacks/
  89. Based, Multi-Domain Anti-Access/Area Denial Forces Play in Deterring or Defeating Aggression? – RAND, accessed February 26, 2026, https://www.rand.org/content/dam/rand/pubs/research_reports/RR1800/RR1820/RAND_RR1820.pdf

The Kill Web: Architecting Decision Superiority in Multi-Domain Warfare

Executive Summary

The fundamental character of modern warfare is undergoing a rapid transformation, shifting from a focus on individual, high-value platforms to a decentralized, network-centric architecture known as the kill web. Historically, the United States military relied on the “kill chain,” a linear and sequential process summarized by the find-fix-track-target-engage-assess (F2T2EA) model. While effective in permissive environments, this linear structure is inherently brittle; the disruption of a single node or data link can cause the entire chain to collapse. In response to the sophisticated anti-access/area denial (A2/AD) capabilities of peer competitors like China and Russia, the Department of Defense is transitioning toward a kill web. This concept, born from DARPA’s Mosaic Warfare research, replaces the single, fragile chain with a self-healing mesh of sensors, shooters, and command nodes.

Operating within a kill web requires a cognitive revolution for the individual warfighter, who evolves from a platform operator into a “node of command” or a “quarterback,” managing multiple simultaneous information streams and directing effects across land, sea, air, space, and cyberspace. Conversely, operating as a kill web involves the systemic emergence of the force as a single, integrated organism. This systemic operation is characterized by a “capability marketplace” where AI-driven algorithms match the optimal effector to a specific target in real-time, leveraging the latent capacity of the entire joint force. This report analyzes the technical enablers of this shift—including Joint All-Domain Command and Control (JADC2), edge computing, and artificial intelligence—while addressing the mathematical modeling of resilience and the profound legal and moral implications of machine-interceded agency on the battlefield.

1. The Paradigm Shift: From Asymmetric Advantage to Decision Superiority

The strategic environment facing the United States has shifted from a period of uncontested dominance to one defined by great-power competition. For decades, American military superiority was predicated on a “Second Offset” strategy, which utilized airborne sensors and precision-guided munitions to overcome numerical disadvantages.1 This paradigm matured into the Air-Land Battle concept, which proved triumphant during Operation Desert Storm.1 However, the proliferation of advanced technologies has democratized these advantages. Peer adversaries have developed “system destruction” strategies specifically designed to exploit the vulnerabilities of the traditional American way of war.3

1.1 The Erosion of Traditional Asymmetries

Legacy military power is concentrated in monolithic, multi-capability platforms such as aircraft carriers, stealth bombers, and advanced satellites.2 These platforms are exceptionally capable but represent single points of failure. The loss of a single F-35 or an Arleigh Burke-class destroyer is not only a significant loss of combat power but also a massive financial and strategic blow.2 Adversaries have optimized their forces to target these specific nodes using long-range anti-ship missiles, electronic warfare, and cyber attacks.3

The conventional kill chain is the mechanism by which these platforms are employed. It is a “sensor-to-shooter” path that must remain unbroken to achieve an effect.5 In a contested environment, the adversary’s goal is to “snap” this chain.5 If they can jam the link between a drone and its controller, or destroy the radar station providing coordinates to a missile battery, they have successfully neutralized the threat without necessarily having to destroy every weapon system.3

1.2 The Shift to Decision-Centric Warfare

Military analysts now recognize that the next conflict will be won by the side that can achieve “decision superiority”—the ability to sense, make sense, and act at a speed and scale that the adversary cannot match.6 This is the core principle of Mosaic Warfare. Instead of packing every tool into one elite system, the military is disaggregating capabilities across multiple smaller platforms.2

This shift moves the center of gravity from the platform to the network. The objective is to present the enemy with a “mosaic” of thousands of diverse, fluid pieces that can be rapidly composed and recomposed into a battle plan.1 This complexity is intended to overwhelm the opponent’s decision-making cycle (the OODA loop), forcing them to respond to a wide front of parallel attacks rather than a predictable, linear strike.1

2. Deconstructing the Kill Web

The term “kill web” describes the lethal application of fused data from a highly scalable and resilient battle network.9 It is the technical and operational evolution of the kill chain, designed to preserve the ability to strike even when parts of the system are destroyed or degraded.3

2.1 Defining the Architectural Shift

A kill web is a non-linear, networked approach that unites forces, commanders, and technologies across all domains.10 While a chain is a sequence, a web is a mesh.3 The following comparison clarifies these differences:

Table 1: Comparison of Linear Kill Chains and Kill Webs

FeatureLinear Kill ChainKill Web
Core PhilosophySequential and platform-centricDistributed and network-centric
Node InterdependencyHigh; one failure stops the sequenceLow; multiple paths to completion
Domain IntegrationOften “stovepiped” by serviceInherently cross-domain (All-Domain)
Decision LogicCentralized C2Decentralized/Distributed C2
ResiliencyBrittle; easy to target key nodesSelf-healing; redundant and adaptive
ScalabilityDifficult and rigidHigh; “plug-and-play” capability

2

The transition to a kill web permits the military to operate like a “single organism,” with units moving and acting in concert against numerous objectives.10 This is made possible by advanced sensing technologies that provide a common operational picture (COP) actionable across the full spectrum of operations.10

2.2 The Non-Linearity of F2T2EA

In a kill web, the six tactical functions of the kill chain—Find, Fix, Track, Target, Engage, and Assess—are no longer bound to a single platform or a specific sequence.1 Instead, they are distributed functions that can be executed by any capable node in the network.12

  • Find: Ubiquitous sensors (satellites, drones, acoustic sensors, cyber monitors) provide the initial detection.10
  • Fix: Cross-domain data fusion determines the target’s precise location, often using different sensing modalities to overcome enemy deception.10
  • Track: A target identified by an Air Force jet can be tracked by a Navy ship or a ground-based radar, ensuring continuity even if the original sensor must move or is jammed.5
  • Target: AI-enabled matchmaking tools evaluate every available weapon system in the theater to choose the most efficient option.15
  • Engage: The selected effector—whether a kinetic missile, a cyber-payload, or an electronic jammer—is directed to the target.5
  • Assess: The results are immediately fed back into the web to determine if further action is needed.13

This non-linearity means that a mission does not “restart” if a link is broken; it simply reroutes through the next available node.5

3. DARPA and the Mosaic Warfare Construct

Mosaic Warfare is the conceptual foundation for the kill web. Developed by DARPA, this approach seeks to achieve complex effects through the coordination of many small, diverse, and simple systems.1

3.1 Quantization of Combat Power

Mosaic Warfare relies on the “fractionation” or “quantization” of capabilities.4 In the traditional model, an F-35 is a “monolithic” platform that must find, fix, and target an enemy aircraft itself. In a Mosaic construct, the “find” function might be performed by a swarm of small, inexpensive drones, the “fix” by a distant high-altitude platform, and the “engage” by a missile launched from a cargo plane miles away.1

This quantization allows the military to:

  1. Increase the number of targets the enemy must engage.1
  2. Reduce the cost of individual losses.2
  3. Mass firepower without having to mass forces physically.1
  4. Rapidly compose a set of needed capabilities for a specific mission.4

3.2 The Logic of the Rhizome

In organizational theory, Mosaic Warfare represents a shift from a “hierarchical” structure to a “rhizome” form.7 A hierarchy is a tree-like structure with a central trunk; if the trunk is severed, the branches die. A rhizome is a decentralized, interconnected network—like a root system or the internet.7 This form is inherently more resilient to targeted disruptions because it lacks a perceivable center or primary point of vulnerability.7

4. Technological Enablers: JADC2 and the Advanced Battle Management System

The realization of the kill web requires a robust digital infrastructure. This is being pursued through the Joint All-Domain Command and Control (JADC2) initiative, which aims to produce a warfighting capability to sense, make sense, and act at all levels and phases of war.17

4.1 ABMS: The Internet of Military Things

The Air Force’s contribution to JADC2 is the Advanced Battle Management System (ABMS).19 ABMS is not a single platform but a “network of networks” or an “internet of military things” (IoMT).17 It provides the digital architecture needed to link sensors and shooters across all domains.8

Key components tested in ABMS “on-ramp” exercises include:

  • Cloud-at-the-Edge: Deploying computing systems (supported by vendors like AWS) to process AI algorithms at the tactical front, rather than in distant data centers.22
  • Mesh Networking: Using software-defined systems to maintain connectivity across air, land, sea, and space.23
  • Airborne Edge Nodes: Specialized platforms designed to bridge communication gaps between incompatible legacy systems, such as the F-22 and F-35, which use different data links.17

4.2 Project Convergence and Project Overmatch

While the Air Force develops the “backbone” via ABMS, the Army and Navy have their own integrated efforts. The Army’s “Project Convergence” focuses on using AI to analyze information and streamline C2 to meet fast-paced threats.19 This program has successfully tested AI-driven tools like “Firestorm,” which can reduce the sensor-to-shooter timeline from hours to minutes.24

The Navy’s “Project Overmatch” is focused on fleet-wide distributed lethality, ensuring that carrier strike groups can operate as a powerful node within a wider web, where any ship’s radar can cue any other ship’s missile.14

5. Operating Within a Kill Web: The Tactical Node

To “operate within” a kill web means that an individual warfighter or platform no longer acts as an isolated player but as an integrated node within a larger system.12

5.1 The Human in the Loop: Cognitive Revolution

The pilot of a fifth-generation fighter jet operating within a kill web undergoes a “cognitive revolution”.12 Their role shifts from executing predefined roles within a linear chain to making distributed, autonomous decisions within an adaptive web.12

Table 2: Evolution of the Combat Aviator’s Role

Legacy Platform OperatorModern Kill Web Node
Focus: Individual platform proficiencyFocus: Integrated force effectiveness
Mindset: Tactical performer executing a missionMindset: Strategic decision-maker
Inputs: Onboard sensors and voice commsInputs: Multi-source sensor fusion and AI analytics
Decision Space: Myopic/LocalDecision Space: Holistic/Battlespace Awareness
Responsibility: Executing a pre-planned roleResponsibility: Orchestrating effects across the web

12

This “Quarterback in the Cockpit” must process simultaneous information streams and assess a dynamic battlespace populated with friendly and enemy forces across all six domains (air, land, sea, space, cyber, and electromagnetic spectrum).12

5.2 Live, Virtual, and Constructive (LVC) Training

Preparing warfighters to operate within this complexity requires new training environments. Integrated LVC environments combine real people in real systems (Live), real people in simulated systems (Virtual), and computer-generated forces (Constructive).12 This allows pilots and commanders to practice the “distributed lethality” of the kill web at a scale and complexity that would be impossible—and too expensive—to replicate in purely live exercises.12

6. Operating As the Kill Web: Systemic Emergence

Operating “as” a kill web is a systemic phenomenon where the entire force acts as a complex adaptive system. This goes beyond simple coordination; it is about “convergence”—the ability of the system to self-organize and produce emergent effects that cannot be achieved by individual parts.25

6.1 Algorithmic Bidding and the Capability Marketplace

One of the most disruptive elements of operating as a kill web is the transition of C2 from a manual, hierarchical process to a machine-enabled “capability marketplace”.6 Programs like DARPA’s Adapting Cross-Domain Kill-Webs (ACK) utilize algorithms adapted from commercial e-commerce to manage this complexity.16

The mechanism works as follows:

  1. Consumer Requirement: A commander identifies a target and the desired effect (e.g., “neutralize radar site”).16
  2. Bid and Offer: Every available sensor and shooter in the web—regardless of service or domain—”bids” on the task.6
  3. Valuation: The bid’s quality depends on the platform’s proximity, speed, material condition, success likelihood, and efficiency.6
  4. Selection: A “Virtual Liaison” selects the best option and tasks the asset, balancing the load across the entire force.16

This process allows the force to operate at “combat speed,” capitalizing on latent capacity that would be missed in a traditional, manual C2 structure.16

6.2 Emergent Complexity and Strategic Surprise

When a military operates as a kill web, it becomes a “non-linear system”.25 The interactions between thousands of sensors, shooters, and AI agents produce “emergent” behaviors that are unpredictable to the enemy.1 This makes the force “operationally and tactically unpredictable,” a key advantage in deteriorating strategic environments.18

By attacking in parallel and using different engagement modalities (e.g., a cyber attack followed by a kinetic strike and an electronic jam), the web forces the adversary to solve multiple distinct problems simultaneously.14 This creates “information-driven shock,” fracturing the adversary’s perception of control and injecting uncertainty into their own decision-making loops.9

7. Mathematical and Probabilistic Foundations

To analyze the effectiveness of a kill web, military analysts utilize various mathematical frameworks. These models help quantify the resilience of a web versus the fragility of a chain.26

7.1 Modeling Chain Fragility

The traditional kill chain is modeled as a Bernoulli process, where each step (m) is a binary event: 1 for success, 0 for failure.26 The probability of the entire chain succeeding (P_Success) is the product of the probabilities of each individual step:

P_Success = p_find * p_fix * p_track * p_target * p_engage * p_assess

In a sequential chain, if each of the six steps has a success probability of 0.9, the overall probability of success is:

0.9 * 0.9 * 0.9 * 0.9 * 0.9 * 0.9 = 0.531 (approximately 53 percent).

If the probability of any single step drops to 0.5 (for example, due to enemy jamming), the entire chain’s success probability drops to roughly 5 percent.26

7.2 Quantifying Web Resilience

A kill web introduces “redundancy” and “multi-path optionality”.3 Analysts use graph-theoretic methods and reinforcement learning to find the optimal path through the web.26

If the “find” step can be performed by three different sensors (A, B, and C), each with a 0.5 probability of success, the probability of the “find” step succeeding in a web is the probability that at least one sensor succeeds:

P_Find_Web = 1 – ( (1 – pA) * (1 – pB) * (1 – pC) )

P_Find_Web = 1 – (0.5 * 0.5 * 0.5) = 0.875 (87.5 percent).

By providing multiple paths for every step of the F2T2EA process, the kill web maintains a high probability of mission success even when individual nodes have a high failure rate.3

Yugo M85/M92 dust cover quick takedown pin installation

2

8. Infrastructure at the Edge

The “connective tissue” of the kill web must be able to function in “denied or degraded” environments where central command links are severed.2

8.1 Edge AI and Latency Optimization

“Edge AI” refers to running artificial intelligence inference directly on the devices where data is generated—drones, sensors, and soldier-worn computers.27 This offers several critical advantages:

  • Latency Reduction: Decisions happen in milliseconds, which is critical for intercepting missiles or maneuvering drone swarms.27
  • Bandwidth Preservation: Only essential insights are transmitted upstream, preventing the network from being saturated by raw video data.27
  • Operational Resilience: Autonomous units can continue to operate and coordinate with nearby partners even if their link to the central cloud is cut.27

Table 3: Comparison of Cloud AI vs. Edge AI for the Kill Web

MetricCloud-Based AITactical Edge AI
Compute PowerHigh (Data Centers)Moderate (Ruggedized Chips)
LatencyHigh (Round-trip to HQ)Near-Zero (On-device)
Connectivity RequisiteContinuous high-bandwidthIntermittent or None
SecurityVulnerable at transmissionLocal data remains isolated
ApplicationStrategic planningReal-time targeting/navigation

27

8.2 Security, Zero Trust, and Bandwidth as Terrain

In the kill web, “data is ammunition”.31 Protecting this data requires a shift to “Zero Trust” architectures, where every device must be constantly authenticated.32 Furthermore, military leaders must now “fight for bandwidth” as they once fought for hills.31 If the electromagnetic spectrum is dominated by the adversary, the web’s nodes cannot communicate, reverting the force back into a collection of isolated, less-effective platforms.18

The transition to a machine-enabled kill web introduces profound challenges to the traditional concepts of responsibility and accountability.25

  • Legal Causation: Traditional legal tests for “causation” break down in emergent systems. If an AI “bidding” system selects an effector that causes unintended collateral damage, identifying whether the commander, the software developer, or the sensor operator is responsible becomes a complex legal problem.25
  • Traceability of Agency: As machine autonomy intercedes on human agency, it becomes “problematic” to identify where a human’s intent ends and a machine’s logic begins.25
  • Moral Responsibility: The speed of kill web operations may outpace the ability of humans to exercise “meaningful human control” in every individual strike, requiring a shift in how we ascribe moral weight to combat actions.25

10. Conclusions: Maintaining the Competitive Edge

The development of the kill web is not merely a technical upgrade; it is a strategic necessity to counter the “system destruction” capabilities of peer adversaries. By transitioning from a linear, platform-centric force to a distributed, network-centric mosaic, the United States can achieve decision superiority—the ultimate high ground of 21st-century warfare.

Operating within a kill web demands a more cognitively agile force, where every warfighter is a node of strategic consequence. Operating as a kill web allows the military to leverage the full, latent capacity of its diverse assets, creating a self-healing and unpredictable system-of-systems. While technical hurdles in AI, edge computing, and secure communications remain, the primary challenge is cultural: the military must move away from legacy mindsets that prioritize the individual platform over the integrated network. In the age of decision-centric warfare, victory will belong to the side that can most effectively sense, make sense, and act as a unified, lethal web.


Please share the link on Facebook, Forums, with colleagues, etc. Your support is much appreciated and if you have any feedback, please email us in**@*********ps.com. If you’d like to request a report or order a reprint, please click here for the corresponding page to open in new tab.


Sources Used

  1. DARPA Tiles Together a Vision of Mosaic Warfare, accessed February 16, 2026, https://www.darpa.mil/news/features/mosaic-warfare
  2. Mosaic Warfare: DARPA’s Answer to Combating America’s Advanced Foes, accessed February 16, 2026, https://www.airandspaceforces.com/mosaic-warfare-darpas-answer-to-combating-americas-advanced-foes/
  3. MITCHELL INSTITUTE Policy Paper – Mitchell Institute for …, accessed February 16, 2026, https://www.mitchellaerospacepower.org/app/uploads/2023/05/Scale_Scope_Speed_Survivability_-KillChain_-Policy_Paper_40-New.pdf
  4. Findings on Mosaic Warfare from a Colonel Blotto Game – DTIC, accessed February 16, 2026, https://apps.dtic.mil/sti/trecms/pdf/AD1119628.pdf
  5. Kill Web – UNordinary Group, accessed February 16, 2026, https://www.unordinarygroup.com/home/services/kill-web
  6. MOSAIC WARFARE – CSBA, accessed February 16, 2026, https://csbaonline.org/uploads/documents/Mosaic_Warfare_Web.pdf
  7. Aligning Emerging Concepts and Capabilities With Mosaic Warfare, accessed February 16, 2026, https://ciasp.scholasticahq.com/article/127303-aligning-emerging-concepts-and-capabilities-with-mosaic-warfare.pdf
  8. Quantum Optimization for CJADC2: Enhancing Multi-Domain Command and Control, accessed February 16, 2026, https://www.davidson-tech.com/post/quantum-optimization-for-cjadc2-enhancing-multi-domain-command-and-control
  9. Operational Art in the Age of Battle Networks – CSIS, accessed February 16, 2026, https://www.csis.org/analysis/chapter-4-operational-art-age-battle-networks
  10. Sensing: Evolving from Kill Chain to Kill Web in Target Engagement – Sumaria Blog, accessed February 16, 2026, https://blog.sumaria.com/sensing
  11. A method for kill web operational viewpoint design based on Inf-ProA – SPIE Digital Library, accessed February 16, 2026, https://www.spiedigitallibrary.org/conference-proceedings-of-spie/13442/1344229/A-method-for-kill-web-operational-viewpoint-design-based-on/10.1117/12.3053045.full
  12. The Kill Web Imperative: A Strategic Analysis of the Paradigm Shift in Combat Pilot Training – Second Line of Defense – SLDinfo.com, accessed February 16, 2026, https://sldinfo.com/2025/11/the-kill-web-imperative-a-strategic-analysis-of-the-paradigm-shift-in-combat-pilot-training/
  13. Mapping Artificial Intelligence to the Naval Tactical Kill Chain, accessed February 16, 2026, https://nps.edu/documents/10180/142489929/NEJ+Hybrid+Force+Issue_Mapping+AI+to+The+Naval+Kill+Chain.pdf
  14. How AI-Empowered Kill Webs Enhance Carrier Operations | Defense.info, accessed February 16, 2026, https://defense.info/maritime-dynamics/2025/12/how-ai-empowered-kill-webs-enhance-carrier-operations/
  15. 133 – Kill webs and super swarms – building survivable CPs for decision superiority | The Principles of War Podcast, accessed February 16, 2026, https://theprinciplesofwar.com/podcast/133-kill-webs-and-super-swarms-building-survivable-cps-for-decision-superiority/
  16. ACK: Adapting Cross-Domain Kill-Webs | DARPA, accessed February 16, 2026, https://www.darpa.mil/research/programs/adapting-cross-domain-kill-webs
  17. Decision Superiority: ABMS and the USAF’s Digital … – Air University, accessed February 16, 2026, https://www.airuniversity.af.edu/Portals/10/ASOR/Journals/Volume-1_Number-2/Piubeni2.pdf
  18. Realising a data-centric all-domain kill-web through network-driven system design | Future Forge, accessed February 16, 2026, https://theforge.defence.gov.au/war-college-papers-2022/realising-data-centric-all-domain-kill-web-through-network-driven-system-design
  19. Mission (Command) Complete: Implications of JADC2 – NDU Press, accessed February 16, 2026, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/3841502/mission-command-complete-implications-of-jadc2/
  20. Valenzia: ABMS will deliver the “Decision Advantage” > > Display – Airman Magazine, accessed February 16, 2026, https://www.airmanmagazine.af.mil/Features/Display/Article/2634972/valenzia-abms-will-deliver-the-decision-advantage/
  21. Mosaic Warfare Strategy in Air Power | Information Sharing Nework, accessed February 16, 2026, http://theairpowerjournal.com/mosaic-warfare-information-interconnectivity-airpower/
  22. Latest ABMS tests break new barriers on AI and edge cloud capabilities | FedScoop, accessed February 16, 2026, https://fedscoop.com/latest-abms-tests-ai-cloud-cybersecurity/
  23. Military conducts first test of Advanced Battle Management System – Northern Command, accessed February 16, 2026, https://www.northcom.mil/Newsroom/News/Article/Article/2051047/military-conducts-first-test-of-advanced-battle-management-system/
  24. Project Convergence: Revolutionizing Targeting in Large-Scale Combat Operations, accessed February 16, 2026, https://www.lineofdeparture.army.mil/Journals/Field-Artillery/Field-Artillery-Archive/Field-Artillery-2025-E-Edition/Project-Convergence/
  25. Joint All-Domain Kill Webs – Marine Corps Association, accessed February 16, 2026, https://www.mca-marines.org/wp-content/uploads/Pavlak-Oct23.pdf
  26. Probabilistic Models for Military Kill Chains – MDPI, accessed February 16, 2026, https://www.mdpi.com/2079-8954/13/10/924
  27. Harnessing Edge AI to Strengthen National Security | Strategic Technologies Blog | CSIS, accessed February 16, 2026, https://www.csis.org/blogs/strategic-technologies-blog/harnessing-edge-ai-strengthen-national-security
  28. Edge AI in Tactical Defense: Empowering the Future of Military and Aerospace Operations, accessed February 16, 2026, https://dedicatedcomputing.com/edge-ai-in-tactical-defense-empowering-the-future-of-military-and-aerospace-operations/
  29. Artificial Intelligence Applications Military Network Edge – Curtiss-Wright Defense Solutions, accessed February 16, 2026, https://defense-solutions.curtisswright.com/media-center/blog/artificial-intelligence-applications-military-network-edge
  30. (PDF) A Survey on the Convergence of Edge Computing and AI for UAVs: Opportunities and Challenges – ResearchGate, accessed February 16, 2026, https://www.researchgate.net/publication/360594094_A_Survey_on_the_Convergence_of_Edge_Computing_and_AI_for_UAVs_Opportunities_and_Challenges
  31. Beyond the Network: The Army Signal Corps and the Future of Warfare, accessed February 16, 2026, https://www.armyupress.army.mil/journals/military-review/online-exclusive/2025-ole/beyond-the-network/
  32. Advanced Battle Management System (ABMS) Coverage – Breaking Defense, accessed February 16, 2026, https://breakingdefense.com/tag/advanced-battle-management-system/