52:) is a military strategy to control access to and within an operating environment. In an early definition, anti-access refers to those actions and capabilities, usually long-range, designed to prevent an opposing force from entering an operational area. Area denial refers to those actions and capabilities, usually of shorter range, designed to limit an opposing force's freedom of action within the operational area. In short, A2 affects movement to a theater, while AD affects movement within a theater. A2/AD typically refers to a strategy used by a weaker opponent to defend against an opponent of superior skill, although a stronger opponent can also use A2/AD.
175:
31:
273:. Mines, coastal submarines, and attack craft could be employed in littoral areas. Other area denial systems include cruise missiles, long-range strike aircraft, mines, and coastal defense artillery. The term A2/AD was created in 2003 to describe the threats posed by long-range missile systems, precision munitions, and satellite technology that will make military operations in the littoral areas challenging for modern naval forces.
66:
137:
bandied about freely, with no precise definition, that sends a variety of vague or conflicting signals, depending on the context in which it is either transmitted or received. The Navy will avoid using the term A2AD as a stand-alone acronym that can mean many things to different people or almost anything to anyone."
124:
A2/AD strategy is a significant concern of US policy, viewing it as a weapon of weaker forces that could be used against the US military. The US military considers that enemy adoption of anti-access/area denial strategies "may well be the most difficult operational challenge U.S. forces will face
289:
and other unconventional means, and information operations." A2/AD strategies on land often take advantage of natural geographic features or bridges that can support anti-access operations. Land-based area denial operations degrade the adversary's ability with techniques such as harassing fires,
136:
has commented on the vagueness of the term A2/AD, saying: "To some, A2AD is a code-word, suggesting an impenetrable “keep-out zone” that forces can enter only at extreme peril to themselves. To others, A2AD refers to a family of technologies. To still others, a strategy. In sum, A2AD is a term
157:
in the area, reacting to
Chinese tests and exercises for a possible invasion of Taiwan in 1995, which went effectively uncontested by the Chinese navy. The Chinese A2/AD strategy's main focus lies on sea denial by missiles (see also paragraph
162:), but features submarines and airplanes as well. The Chinese denial capabilities are not sufficient to exclude Japanese and US troops from the South China Sea, but enough to inflict heavy casualties in case of a war for the occupation of
330:
Attacks in cyberspace are an increasingly important part of the A2/AD threat. Tactical cyber A2/AD operations block access to specific resources, while strategic A2/AD blocks access to cyberspace itself.
149:
is employing a multi-faceted A2/AD strategy to exclude or deter as many adversary forces from acting within the waters it claims as its territorial waters as outlined by the
419:
76:
295:
129:
for defeating adversaries across the range of military operations, including adversaries equipped with sophisticated anti-access and area denial capabilities".
536:
203:. Naval A2/AD typically takes advantage of geographical features that limit access such as chokepoints or the water surrounding an island. A
588:
439:
106:
562:
361:
146:
467:
133:
88:
286:
241:
from nearby waterways. In response to China's pursuit of such A2/AD capabilities, the United States has developed the
797:
200:
282:
510:
Department of
Defense Authorization for Appropriations for Fiscal Year 2012 and the Future Years Defense Program
701:
489:
607:
750:
311:
254:
38:
723:
310:
is an A2/AD strategy in the air, prohibiting access to part of the airspace. A2/AD can be supported by
233:
all have developed or imported such weapons in an effort to develop a modern A2/AD strategy to counter
319:
315:
270:
154:
35:
322:. The threat on forward air bases from cruise and ballistic missiles can also impose anti-access.
682:
383:
340:
291:
266:
258:
210:
196:
532:
508:
435:
182:
672:
427:
373:
246:
238:
290:
deception, and guerrilla-warfare-like tactics that avoid direct confrontation. Land-based
262:
174:
150:
153:. The initial impulse for this strategy is said to have been the deployment of two US
791:
686:
387:
242:
234:
126:
553:
635:
294:
techniques also include artillery, rocket, and missile strikes, mine fields, and
775:
307:
222:
513:. Washington, DC: US Government Printing Office. 17 February 2011. p. 522.
677:
661:"Development of the Chinese A2/AD System in the Context of US–China Relations"
660:
431:
250:
190:
30:
213:
are a modern method of stopping a potential adversary from attacking by sea.
378:
204:
125:
over the coming decades."The
Department of Defense developed the "joint
529:
Anti-access warfare: countering anti-access and area-denial strategies
195:
The concept of A2/AD has long been used by navies under names such as
780:. Washington, DC: Office of the Chief of Staff (Army-HQ). 2001-11-01.
218:
163:
245:
doctrine. Other methods of area denial at a strategic level include
17:
226:
214:
179:
173:
29:
475:. Center for Strategic and Budgetary Assessments Washington, DC.
230:
59:
466:
Krepinevich, Andrew; Watts, Barry; Work, Robert (2003).
84:
285:, cruise missiles, long-range rockets and artillery,
469:Meeting the anti-access and area denial challenge
755:Center for Strategic & International Studies
751:"The Emerging Anti-Access/Area-Denial Challenge"
362:"Russia's A2/AD Capabilities: Real and Imagined"
207:is an example of a naval anti-access operation.
296:chemical, biological, radiological, and nuclear
522:
520:
281:The anti-access threat for the Army includes "
366:The US Army War College Quarterly: Parameters
73:The examples and perspective in this section
8:
552:U.S. Department of Defense (February 2010).
413:
411:
409:
407:
405:
403:
401:
399:
397:
634:Romero Meraner, Fabian-Lucas (2023-02-09).
461:
459:
457:
455:
453:
451:
636:"China's Anti-Access/Area-Denial Strategy"
420:"Historical Perspective of A2/AD Strategy"
91:, or create a new section, as appropriate.
676:
665:Herald of the Russian Academy of Sciences
587:Richardson, Adm. John (October 3, 2016).
497:. Department of Defense. 17 January 2012.
377:
107:Learn how and when to remove this message
724:"Are Aircraft Carriers Still Relevant?"
491:Joint Operational Access Concept (JOAC)
360:Giles, Keir; Boulegue, Mathieu (2019).
352:
568:from the original on 23 September 2015
484:
482:
722:Ben, Ho Wan Beng (15 November 2018).
629:
627:
41:system can be used as an A2/AD asset.
7:
185:is part of China's A2/AD weaponry.
25:
555:Quadrennial Defense Review Report
777:Concepts for the Objective Force
64:
418:Russell, Alison Lawlor (2017).
749:Freier, Nathan (17 May 2012).
608:"China's Stealthy Area Denial"
1:
424:Strategic A2/AD in Cyberspace
640:The Defence Horizon Journal
287:weapons of mass destruction
87:, discuss the issue on the
814:
659:Yevtodyeva, M. G. (2022).
283:theater ballistic missiles
201:sea lines of communication
188:
147:People's Republic of China
132:Chief of Naval Operations
702:"Anti-Access Goes Global"
678:10.1134/S1019331622120048
531:. Naval Institute Press.
432:10.1017/9781316817001.002
606:Lake, Jon (2023-03-14).
159:
379:10.55540/0031-1723.2860
312:surface-to-air missiles
255:surface-to-air missiles
46:Anti-access/area denial
671:(Suppl 6): S534–S542.
527:Tangredi, Sam (2013).
186:
127:air-sea battle concept
42:
39:surface-to-air missile
612:Asian Military Review
593:The National Interest
589:"Deconstructing A2AD"
177:
155:carrier battle groups
33:
271:interceptor aircraft
199:and controlling the
134:Adm. John Richardson
85:improve this section
75:may not represent a
197:Command of the seas
341:Area denial weapon
267:electronic warfare
259:ballistic missiles
211:Anti-ship missiles
187:
43:
798:Military strategy
700:Kazianis, Harry.
538:978-1-61251-187-0
247:aircraft carriers
183:anti-ship missile
117:
116:
109:
27:Military strategy
16:(Redirected from
805:
782:
781:
772:
766:
765:
763:
761:
746:
740:
739:
737:
735:
719:
713:
712:
710:
709:
697:
691:
690:
680:
656:
650:
649:
647:
646:
631:
622:
621:
619:
618:
603:
597:
596:
584:
578:
577:
575:
573:
567:
560:
549:
543:
542:
524:
515:
514:
505:
499:
498:
496:
486:
477:
476:
474:
463:
446:
445:
415:
392:
391:
381:
357:
239:power projection
112:
105:
101:
98:
92:
68:
67:
60:
21:
813:
812:
808:
807:
806:
804:
803:
802:
788:
787:
786:
785:
774:
773:
769:
759:
757:
748:
747:
743:
733:
731:
721:
720:
716:
707:
705:
699:
698:
694:
658:
657:
653:
644:
642:
633:
632:
625:
616:
614:
605:
604:
600:
586:
585:
581:
571:
569:
565:
558:
551:
550:
546:
539:
526:
525:
518:
507:
506:
502:
494:
488:
487:
480:
472:
465:
464:
449:
442:
417:
416:
395:
359:
358:
354:
349:
337:
328:
304:
279:
263:cruise missiles
193:
172:
143:
122:
113:
102:
96:
93:
82:
69:
65:
58:
28:
23:
22:
15:
12:
11:
5:
811:
809:
801:
800:
790:
789:
784:
783:
767:
741:
714:
704:. The Diplomat
692:
651:
623:
598:
579:
544:
537:
516:
500:
478:
447:
440:
393:
351:
350:
348:
345:
344:
343:
336:
333:
327:
324:
303:
300:
278:
275:
189:Main article:
171:
168:
151:nine-dash line
142:
139:
121:
118:
115:
114:
79:of the subject
77:worldwide view
72:
70:
63:
57:
54:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
810:
799:
796:
795:
793:
779:
778:
771:
768:
756:
752:
745:
742:
729:
725:
718:
715:
703:
696:
693:
688:
684:
679:
674:
670:
666:
662:
655:
652:
641:
637:
630:
628:
624:
613:
609:
602:
599:
594:
590:
583:
580:
564:
557:
556:
548:
545:
540:
534:
530:
523:
521:
517:
512:
511:
504:
501:
493:
492:
485:
483:
479:
471:
470:
462:
460:
458:
456:
454:
452:
448:
443:
441:9781316817001
437:
433:
429:
425:
421:
414:
412:
410:
408:
406:
404:
402:
400:
398:
394:
389:
385:
380:
375:
371:
367:
363:
356:
353:
346:
342:
339:
338:
334:
332:
325:
323:
321:
317:
313:
309:
301:
299:
297:
293:
288:
284:
276:
274:
272:
268:
264:
260:
256:
252:
248:
244:
243:AirSea Battle
240:
236:
235:United States
232:
228:
224:
220:
216:
212:
208:
206:
202:
198:
192:
184:
181:
176:
169:
167:
165:
161:
156:
152:
148:
140:
138:
135:
130:
128:
120:United States
119:
111:
108:
100:
90:
86:
80:
78:
71:
62:
61:
55:
53:
51:
47:
40:
37:
32:
19:
776:
770:
758:. Retrieved
754:
744:
732:. Retrieved
730:. James Pach
728:The Diplomat
727:
717:
706:. Retrieved
695:
668:
664:
654:
643:. Retrieved
639:
615:. Retrieved
611:
601:
592:
582:
570:. Retrieved
554:
547:
528:
509:
503:
490:
468:
423:
372:(1): 21–36.
369:
365:
355:
329:
314:such as the
305:
280:
209:
194:
144:
131:
123:
103:
94:
74:
49:
45:
44:
308:no-fly zone
292:area denial
223:North Korea
760:14 January
734:14 January
708:2011-12-29
645:2024-02-27
617:2024-02-27
347:References
326:Cyberspace
251:submarines
191:Sea denial
687:252600538
572:3 October
426:: 11–25.
388:232333797
97:June 2023
89:talk page
792:Category
563:Archived
335:See also
298:agents.
205:blockade
83:You may
56:Overview
685:
535:
438:
386:
219:Russia
164:Taiwan
683:S2CID
566:(PDF)
559:(PDF)
495:(PDF)
473:(PDF)
384:S2CID
320:S-400
316:S-300
227:Syria
215:China
180:KD-88
141:China
50:A2/AD
36:S-400
762:2018
736:2019
574:2012
533:ISBN
436:ISBN
318:and
277:Land
269:and
231:Iran
229:and
178:The
145:The
48:(or
18:A2AD
673:doi
428:doi
374:doi
302:Air
170:Sea
160:Sea
34:An
794::
753:.
726:.
681:.
669:92
667:.
663:.
638:.
626:^
610:.
591:.
561:.
519:^
481:^
450:^
434:.
422:.
396:^
382:.
370:49
368:.
364:.
306:A
265:,
261:,
257:,
253:,
249:,
237:'
225:,
221:,
217:,
166:.
764:.
738:.
711:.
689:.
675::
648:.
620:.
595:.
576:.
541:.
444:.
430::
390:.
376::
110:)
104:(
99:)
95:(
81:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.