December 21, 2025
Home » LIBRARY » DOCTRINE & CONCEPTS GLOSSARY

DOCTRINE & CONCEPTS GLOSSARY

DOCTRINE & CONCEPTS GLOSSARY

Defense News Today’s Doctrine & Concepts Glossary turns military jargon into clear, practical understanding. It explains operational ideas like kill chains, SEAD/DEAD, and A2/AD in plain language. It also covers electronic warfare effects and common missile-guidance terms. You get clarity without being buried under technical wording. Doctrine shapes how forces fight, not just what they purchase. So, the glossary helps you read headlines with stronger context. Each entry gives a short definition and a real-world takeaway. It also links you to related coverage across Defense News Today. Whether you follow airpower or naval strategy, it stays useful. It also supports readers tracking drones, missiles, and emerging threats. This reference hub keeps your reading sharper and more consistent. It anchors your understanding in practical operational reality.

ConceptShort explanation
Kill chainEnd-to-end process of finding, fixing, tracking, targeting, engaging, and assessing a target; disrupt any link to reduce effectiveness.
F2T2EAA common kill-chain model: Find, Fix, Track, Target, Engage, Assess; used to describe time-sensitive targeting.
OODA loopDecision cycle—Observe, Orient, Decide, Act—used to explain tempo advantages in combat.
SEADSuppression of Enemy Air Defenses: missions that degrade enemy IADS so friendly aircraft can operate.
DEADDestruction of Enemy Air Defenses: physically destroying SAM/AAA/radar nodes to collapse the IADS.
IADSIntegrated Air Defense System combining sensors, C2, and shooters; designed to detect, track, and engage air threats.
A2/ADAnti-Access/Area Denial: layered systems intended to prevent entry into a theater and constrain freedom of action inside it.
Network-centric warfareApproach that links sensors, shooters, and command nodes to speed decisions and increase shared situational awareness.
Multi-domain operations (MDO)Concept integrating effects across land, air, sea, space, and cyber to create dilemmas for an adversary.
Joint all-domain command and control (JADC2)U.S. effort to connect sensors and shooters across services via resilient data networks and C2.
C4ISRCommand, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance—systems enabling modern operations.
ISRIntelligence, Surveillance, Reconnaissance: collecting and analyzing information to support decisions and targeting.
Intelligence cycleDirection, collection, processing, analysis, dissemination, and feedback; framework for producing actionable intelligence.
Indications & warning (I&W)Intelligence focused on detecting preparations for hostile actions and providing early warning.
Sensor fusionCombining multiple sensor inputs into a coherent track picture to reduce uncertainty and improve targeting.
Common operational picture (COP)Shared display of friendly/enemy disposition and key data to synchronize units and decisions.
Blue force tracking (BFT)Systems that report friendly locations/status to reduce fratricide and improve coordination.
Command and control (C2)Processes and systems used to direct forces, allocate resources, and manage operations.
Mission commandDecentralized execution guided by commander’s intent; empowers initiative under uncertainty.
Commander’s intentClear statement of desired end state and purpose that enables subordinate initiative.
Rules of engagement (ROE)Directives defining when and how force may be used, often constrained by legal and policy factors.
Escalation dominanceAbility to control escalation at each rung so the opponent cannot gain advantage by escalating.
Deterrence by denialDiscouraging aggression by making success unlikely through defense, resilience, and rapid response.
Deterrence by punishmentDiscouraging aggression by threatening unacceptable costs through retaliation or sanctions.
CompellenceUsing threats or limited force to make an adversary change behavior (stop, undo, or do something).
Coercive diplomacyMix of threats, reassurance, and limited pressure to achieve political objectives short of war.
Grey-zone operationsCompetitive actions below open warfare (coercion, proxies, cyber, influence) to gain advantage.
Hybrid warfareBlending conventional, irregular, cyber, and informational tools in a coordinated campaign.
Information operations (IO)Actions to affect adversary decision-making through messaging, deception, and control of information.
Psychological operations (PSYOP)Targeted messaging to influence perceptions, attitudes, and behavior of selected audiences.
Influence operationsBroad activities aimed at shaping narratives and preferences of populations and elites.
Strategic communications (StratCom)Coordinated messaging and actions to support national objectives and credibility.
DeceptionMisleading an adversary about capabilities, intentions, or timing to gain operational advantage.
Operational security (OPSEC)Protecting critical information so adversaries can’t exploit patterns or plans.
Camouflage, concealment, and deception (CCD)Tactics that hide or mislead about forces and positions to reduce detection/targeting.
Electronic warfare (EW)Use of the electromagnetic spectrum to sense, attack, and protect; includes jamming and electronic support.
Electronic attack (EA)Offensive EW: jamming, deception, or directed energy used to degrade enemy sensors and comms.
Electronic protection (EP)Defensive EW: measures to ensure friendly use of spectrum under attack (filters, hopping, ECCM).
Electronic support (ES)Detection and locating of EM emissions for warning, targeting, and situational awareness.
DRFMDigital Radio Frequency Memory: captures radar signals and re-transmits modified copies to deceive radars.
JammingIntentional interference with enemy sensors/communications to reduce detection, tracking, or coordination.
Deception jammingJamming that creates false targets/positions rather than only adding noise.
Burn-throughRange at which a radar’s signal overwhelms jamming, enabling detection/track despite interference.
ECCMElectronic counter-countermeasures that help sensors resist jamming and deception.
SIGINTSignals intelligence derived from intercepted communications (COMINT) and non-communications signals (ELINT).
ELINTElectronic intelligence focused on non-communications emissions like radars.
COMINTCommunications intelligence derived from intercepted voice/data communications.
Cyber operationsOffensive and defensive actions in cyberspace to disrupt, degrade, or defend systems and data.
Cyber kill chainModel describing stages of a cyber intrusion from reconnaissance through actions on objectives.
Zero trustSecurity model that assumes breach and continuously verifies identity and device posture.
Supply chain riskThreats introduced via suppliers, components, or software dependencies affecting security and reliability.
ResilienceAbility to absorb disruption and continue operating, often via redundancy and rapid recovery.
RedundancyDuplicating critical systems/paths to reduce single points of failure and improve survivability.
HardeningPhysical or cyber measures to make systems more resistant to attack (armor, shelters, security controls).
DispersalSpreading forces across locations to reduce vulnerability to concentrated strikes.
MobilityAbility to move and reposition forces quickly to avoid targeting and exploit opportunities.
SurvivabilityCapability to avoid detection, withstand attack, and recover to continue mission.
StealthLow observable design and tactics that reduce detection by radar/IR/visual sensors.
Signature managementReducing or shaping detectable signatures (radar, IR, acoustic, EM) to avoid targeting.
Counter-ISRActions to blind, deceive, or destroy enemy sensors and reconnaissance networks.
Counter-battery fireFires aimed at enemy artillery/rockets based on launch detection and rapid targeting.
CounterforceTargeting an opponent’s military capabilities (missiles, bases, C2) rather than cities/industry.
CountervalueTargeting assets of value to society or economy; often discussed in nuclear deterrence theory.
Second-strike capabilityAbility to retaliate after absorbing a first strike; critical for stable nuclear deterrence.
Nuclear triadThree delivery legs—ICBMs, SLBMs, strategic bombers—providing redundancy and flexibility.
Launch-on-warningPosture to launch nuclear forces upon credible warning before incoming warheads impact.
MAD (Mutual Assured Destruction)Deterrence condition where both sides can inflict unacceptable damage even after a first strike.
Extended deterrenceDeterrence provided to allies through security guarantees, often involving nuclear commitments.
No-first-usePolicy pledging not to use nuclear weapons first in a conflict; debated for credibility and stability.
Minimum deterrenceMaintaining the smallest nuclear force needed to deter by threatening unacceptable damage.
Arms controlAgreements or measures that limit, reduce, or increase transparency around weapons and forces.
NonproliferationEfforts to prevent spread of nuclear/chemical/biological weapons and related delivery systems.
CounterproliferationActions to stop WMD programs via interdiction, sanctions, sabotage, or military strikes.
BMD (Ballistic missile defense)Systems designed to detect, track, and intercept ballistic missiles in boost, midcourse, or terminal phases.
Midcourse interceptionIntercepting ballistic missiles in space during midcourse flight, often with hit-to-kill vehicles.
Terminal defenseIntercepting missiles in the last phase of flight near target, often at lower altitudes.
Boost-phase interceptionAttempting intercept during missile boost; challenging due to short windows and proximity requirements.
Hit-to-killKinetic intercept technique destroying a target via direct collision without explosive warhead.
Multiple kill vehicle (MKV)Concept of deploying multiple small interceptors from one booster to engage several objects.
Hypersonic glide vehicle (HGV)Rocket-boosted vehicle that glides at hypersonic speed with maneuvering, complicating defense.
Hypersonic cruise missileAir-breathing hypersonic weapon (often scramjet) sustaining hypersonic speed in atmosphere.
Prompt global strikeCapability to strike targets rapidly worldwide with conventional weapons.
CEP (circular error probable)Accuracy measure: radius within which 50% of rounds/warheads are expected to land.
Circular error probableSame as CEP; used to compare precision of guided weapons and ballistic systems.
PESAPassive electronically scanned array radar using a single transmitter and phase shifters to steer beams.
AESAActive electronically scanned array radar with many transmit/receive modules; improves agility, LPI, and reliability.
LPI radarLow Probability of Intercept radar techniques that reduce enemy ability to detect emissions.
BVRBeyond Visual Range combat and weapons employment relying on sensors and data links.
WVRWithin Visual Range fighting, often emphasizing maneuvering and short-range missiles.
DatalinkDigital communications connecting platforms for shared tracks, targeting, and coordination.
Link 16Common tactical datalink standard enabling shared situational awareness and message exchange.
SATCOMSatellite communications enabling long-range connectivity beyond line-of-sight.
GNSSGlobal Navigation Satellite Systems (GPS, GLONASS, etc.) providing positioning, navigation, timing.
GPS spoofingBroadcasting false navigation signals to mislead receivers about position/time.
GPS jammingBlocking or degrading satellite navigation signals to disrupt positioning and timing.
PNTPositioning, Navigation, and Timing services critical for guidance, comms, and synchronization.
Assured PNTTechniques and alternatives to maintain navigation/timing when GNSS is degraded.
Navigation warfare (NAVWAR)Operations to attack or defend navigation and timing systems like GNSS.
Air superiorityDegree of dominance allowing friendly air operations without prohibitive interference.
Air supremacyNear-complete air dominance where enemy air opposition is effectively incapable.
Air denialStrategy to prevent an adversary from using airspace effectively, even if you can’t control it.
Air interdictionAttacks on enemy forces/supply lines before they can directly engage friendly forces.
Close air support (CAS)Air action against hostile targets near friendly forces requiring detailed coordination.
Dynamic targetingEngaging targets that appear or move on short notice, requiring rapid sensor-to-shooter cycles.
Time-sensitive targeting (TST)Targeting high-value targets with short windows before they relocate or become hidden.
Battle damage assessment (BDA)Evaluating the effects of strikes to determine target status and reattack needs.
SuppressionTemporarily neutralizing an enemy capability (e.g., SAM site) without necessarily destroying it.
Attrition warfareStrategy of wearing down enemy forces through sustained losses rather than maneuver.
Maneuver warfareUsing movement and initiative to gain advantage and collapse enemy cohesion.
Center of gravity (COG)Critical capability or source of strength whose defeat collapses enemy ability to fight.
Decisive pointKey place/time/event where action yields a marked advantage and contributes to mission success.
Operational reachDistance and duration over which a force can successfully employ military capabilities.
Culminating pointStage when an attacker can no longer continue effectively; must pause, reinforce, or transition.
Lines of effortLogical lines linking tasks to conditions and objectives, often in complex campaigns.
Lines of operationPhysical or logical paths linking actions across time/space toward objectives.
Main effortThe decisive operation or focus that receives priority resources to achieve the mission.
Economy of forceAllocating minimum essential combat power to secondary efforts to mass for the main effort.
MassConcentrating combat power at the right place/time to achieve decisive results.
Unity of commandPrinciple that each objective should have one responsible commander to avoid conflicting direction.
Combined armsIntegrating different arms (infantry, armor, artillery, air) to create complementary effects.
Joint operationsCoordinated action by multiple services (army, navy, air force, etc.) toward common goals.
Combined operationsOperations conducted with coalition partners under shared plans and interoperability.
InteroperabilityAbility of systems and units to operate together via common standards, procedures, and communications.
Coalition warfareMultinational operations requiring alignment of strategy, ROE, logistics, and command relationships.
Force multiplierCapability that increases overall effectiveness (ISR, EW, logistics, precision) beyond its size.
Force projectionDeploying and sustaining military power into a region to influence events or deter conflict.
Power projectionBroader concept including political, economic, and military tools to influence across distance.
Forward basingStationing forces near potential theaters to reduce response time and improve deterrence.
Forward presenceMaintaining forces in-region to reassure allies, shape environment, and gather awareness.
Anti-submarine warfare (ASW)Detecting, tracking, and engaging submarines using sensors, weapons, and tactics.
Sea controlAbility to use an area of sea for one’s purposes for a period while denying it to the enemy.
Sea denialPreventing enemy use of sea areas without necessarily controlling them yourself.
Naval blockadeUsing naval forces to restrict enemy shipping and logistics, often with legal/political constraints.
Maritime interdictionStopping, diverting, or seizing vessels to enforce sanctions or prevent weapons smuggling.
Freedom of navigation operations (FONOPs)Operations asserting navigation rights under international law in contested waters.
Littoral operationsMilitary activities in coastal waters and adjacent land areas where land/sea interact.
Amphibious assaultLanding forces from sea onto a hostile shore to seize lodgments and enable follow-on ops.
Expeditionary advanced base operations (EABO)Distributed bases and fires in contested areas to support sea control/denial.
Distributed maritime operations (DMO)Navy concept of dispersing forces while networking sensors and weapons to complicate enemy targeting.
Distributed lethalitySpreading offensive weapons across more platforms to increase uncertainty and survivability.
Sea-based deterrenceDeterrence supported by naval forces (especially SSBNs) that are hard to preempt.
Mine warfareUse of sea mines for sea denial and protection; includes mine laying and countermeasures.
Mine countermeasures (MCM)Detecting and neutralizing mines using specialized ships, UUVs, helicopters, and divers.
Undersea domain awarenessUnderstanding undersea activity via sensors and analysis to counter submarines and UUVs.
Anti-ship missile (AShM)Missile designed to strike ships; often sea-skimming and using radar/IR seekers.
Area air defenseProtecting a region (not just point targets) against aircraft/missiles using layered systems.
Point defenseDefending a specific asset (ship/base) with short-range interceptors and close-in weapons.
CIWSClose-in weapon system for last-ditch defense against missiles and aircraft.
Hard-killPhysically destroying threats (interceptors, guns) as opposed to jamming or decoys.
Soft-killDefeating threats via EW, decoys, obscurants, or deception rather than physical destruction.
DecoySystem that misleads seekers (radar/IR) to divert missiles away from true targets.
ChaffRadar-reflective strips released to confuse radar-guided threats.
FlaresHot decoys deployed to mislead IR-guided missiles.
Towed decoyDecoy trailed behind a platform to lure radar-guided missiles away from the host.
Active protection system (APS)Vehicle defense that detects and intercepts incoming ATGMs/RPGs before impact.
Reactive armorExplosive or non-explosive armor that disrupts shaped-charge jets on impact.
Top-attackMunition profile that strikes targets from above, exploiting thinner armor.
Stand-off weaponWeapon launched from outside enemy air defenses, reducing risk to the launch platform.
Stand-in weaponWeapon that penetrates contested areas and survives inside threats to deliver effects.
Standoff jammingJamming from outside the threat envelope using high-power emitters and range.
Escort jammingJamming provided by aircraft accompanying strike packages inside contested airspace.
Suppression of communicationsEW/cyber actions targeting radios and networks to disrupt coordination.
Communications denialBroad efforts to prevent reliable communications through jamming, attacks, or destruction.
Spectrum managementCoordinating frequencies and emissions to avoid interference and maximize effectiveness.
EMCONEmission control: limiting transmissions to reduce detection and signature.
Low observable tacticsProcedures that minimize exposure (routes, altitude, timing) to reduce detection and engagement.
S-curve defenseLayered defense that combines sensors and interceptors at multiple ranges and altitudes.
Layered air defenseIntegrated use of long/medium/short-range systems to increase engagement opportunities.
Counter-UAS (C-UAS)Detecting, tracking, and defeating drones using kinetic, EW, and directed-energy tools.
Loitering munitionWeapon that loiters to search for targets then dives to strike; blends ISR and strike.
SwarmingCoordinated use of many platforms (often drones) to overwhelm defenses and complicate targeting.
MUM-TManned-unmanned teaming: cooperative operations between crewed platforms and drones/UGVs.
AutonomySystem capability to perform tasks with limited human input; ranges from assistive to high autonomy.
Human-on-the-loopHuman supervises and can intervene in autonomous systems, but not controlling every action.
Human-in-the-loopHuman must approve key actions (like weapons release) in a semi-autonomous system.
Lethal autonomous weapons (LAWS)Weapons that can select and engage targets with limited human intervention; subject to policy/ethics debate.
Counterinsurgency (COIN)Integrated civil-military approach to defeat insurgency by securing population and building governance.
Irregular warfareConflict involving non-state actors, guerrilla tactics, subversion, and indirect approaches.
Special operationsSmall-unit operations requiring unique skills for strategic or operational effects.
Unconventional warfareOperations enabling resistance or insurgency to coerce/disrupt an adversary.
Foreign internal defense (FID)Training and assisting partner forces to help them counter internal threats.
Security force assistance (SFA)Building partner capacity through advising, training, and institutional support.
Stability operationsActivities to maintain or restore order, essential services, and governance after conflict.
PeacekeepingMultinational operations to monitor ceasefires and support political processes under mandates.
No-fly zoneAirspace restriction enforced by military power to prevent specific flight operations.
Air policingRoutine air defense presence to monitor and intercept unauthorized aircraft in peacetime.
Maritime domain awareness (MDA)Understanding maritime activity using sensors, intelligence, and information sharing.
Space situational awareness (SSA)Tracking objects and events in space to support operations and prevent collisions or attacks.
Space controlAbility to assure own space access while denying adversary space capabilities.
CounterspaceOffensive/defensive actions to deny, degrade, deceive, disrupt, or destroy space systems.
Kessler syndromeScenario where debris cascades increase collision risk and degrade use of low Earth orbit.
Directed energyUsing concentrated energy (laser, microwave) for effects like dazzling, heating, or disruption.
High-power microwave (HPM)Directed-energy system that can disrupt electronics and communications at short ranges.
EMPElectromagnetic pulse that can damage or disrupt electronics; can be nuclear or non-nuclear.
CBRNChemical, Biological, Radiological, Nuclear hazards; includes protection and response doctrine.
WMDWeapons of mass destruction, typically nuclear, chemical, and biological weapons.
NBC defenseOlder term for nuclear, biological, chemical defense; now usually CBRN.
SanctionsEconomic/legal measures to coerce behavior or punish actions, often integrated with security strategy.
InterdictionStopping movement of weapons, materials, or forces, often through maritime/air/land actions.
Maritime chokepointNarrow sea passage where traffic concentrates, affecting trade and military movement.