
Executive Summary
This report aims at highlighting how the Shia axis is no longer a monolithic military hierarchy but a decentralised, automated “neural network” of resistance supporting Iran’s regional strategy and goals.
Current kinetic data suggests that traditional metrics of military degradation (e.g., percentage of infrastructure destroyed) are increasingly obsolete. Despite massive degradation campaigns between 2024 and 2026, the Iranian-backed strategic architecture remains functional.
This resilience is rooted in a transition from a hardware-dependent supply chain to a software-and-know-how-centric model.
Key Takeaways
- The Axis has transitioned from a human hierarchy to a decentralised neural network where automated, scenario-based protocols ensure operational continuity after leadership decapitation.
- Traditional interdiction is failing as proxies shift to localised 3D-printing and the smuggling of dual-use, civilian-grade microelectronics to bypass military blockades.
- Advanced sensor fusion and “shield” technologies like the Sayyad-3G have successfully migrated from vulnerable naval hulls to mobile, land-based coastal networks.
The “Kit & Assembly” Model: Decentralising the Supply Chain
The era of intercepting complete weapon systems might be over soon. Iran has successfully exported the “kit & assembly” industrial logic to Yemen (Ansar Allah), Iraq (PMF), and Lebanon (Hezbollah). Logistics have moved from smuggling finished missiles to transporting high-value, low-volume components (gyroscopes, sensors, micro-engines).
The Final Report of the UN Panel of Experts on Yemen (S/2025/650), published on 17 October 2025, and supplemental updates presented to the Security Council in early 2026, officially conclude that the arms embargo has become ineffective. It details how the Houthis and other regional groups have transitioned to a domestic military-industrial complex or a hybrid model (local assembly + imported critical components).
This reduces the logistic signature of shipments. By atomising production into civilian-grade garage networks, the Axis has eliminated “single points of failure”. The destruction of a central factory no longer halts production; it merely shifts the assembly line to the next node in the network.
They have also standardised the technological ecosystem. The Axis of Resistance now operates on a shared technological language, ensuring that hardware losses in one theatre can be mitigated by technical commonality in another. This provides interoperability.
The technical symmetry between Zelzal-2 (Hezbollah) and the Badr-1P/Badr-F (Houthi) series has been a deliberate design choice. The Fateh-110 derivatives and shared-platform loitering munitions are the superior examples to cite today.
As for the first, for instance, Hezbollah’s Jihad-1/2 (Lebanese-produced variants of the Fateh-110) and Houthi’s Toufan (Typhoon), the Yemeni-labelled version of the same Iranian architecture, they use similar/identical solid-fuel motors and optical/satellite guidance packages. Because of the technical similarity, an IRGC-QF technician can travel from Sana’a to Beirut and maintain the same hardware without additional training.
Standardisation on CAD/CAM (Computer-Aided Design) files allows for the 3D printing of spare parts and reduces training times. Technicians across different regions now work on nearly identical platforms, allowing for a “plug-and-play” flow of personnel and expertise.
The Subterranean Dimension: Hardened Launch Sites and EW Resilience
The doctrine of forward defence has been physically manifested through sophisticated subterranean engineering that degrades satellite reconnaissance (GEOINT) or renders it ineffective.
Infrastructure such as the “Imad 4” tunnel complex and Imad 5 (revealed between 2024-2025) demonstrates rock-hewn launch bays capable of housing heavy missile carriers. Iran has just revealed its latest in March 2026.
This is not merely a defensive Gaza Metro but an offensive launch platform. It technically allows Tehran to project high-level deterrence 1,500km from its borders, effectively using Lebanese sovereign territory as a non-attributable extension of Iranian soil.
Moreover, the kinetic degradation of physical sites has been countered by an upgrade in Electronic Warfare (EW) and Signal Intelligence (SIGINT) capabilities.
As for satellite navigation, recovered debris from the Red Sea and Ukraine reveals the integration of GNSS modules with advanced anti-jamming capabilities.
Even as physical infrastructures were struck in 2025, Iraqi and Lebanese groups showed an increased ability to intercept-and-recovery or jam ISR (Intelligence, Surveillance, and Reconnaissance) drones.
Iran has compensated for physical vulnerability by providing a sophisticated digital architecture. The destruction of a proxy is difficult if the group keeps the ability to disrupt the adversary’s digital eyes and ears.
Lastly, the decapitation strategy—targeting high-ranking commanders—has failed to trigger systemic collapse. The C2 structure has shifted to automated, pre-defined action protocols. If a commander is eliminated, units follow pre-programmed scenario-based responses. In conclusion, the Axis operates with a swarm intelligence where the loss of a “queen” does not stop the “workers.” Command is no longer a person; it is a protocol.
The Proxy Shield: Modular Air Defence and the CRINK Integration
The Samad series (1, 2, and 3) remains the most famous example of a “kit drone” assembled by proxies like the Houthis. However, as of 2026, it is no longer the primary threat. The Shahed-136 and its newer derivatives (like the Shahed-238 jet-powered variant) have largely overtaken the Samad in terms of operational frequency and “kill chain” integration.
Reports from early 2026 indicate that proxies have moved beyond simple assembly of Samad kits to full domestic fabrication of airframes and warheads in hardened underground facilities, using Chinese-sourced components and 3D-printing technologies to bypass traditional blockades.
In 2026, the Sayyad missile series (specifically the Sayyad-2C and 3) represents the defensive shield that Iran has attempted to export to its Axis of Resistance.
In February 2026, Tehran unveiled the Sayyad-3G, a naval and mobile variant designed for 360-degree radar coverage. There are ongoing concerns that scaled-down versions of this technology are being smuggled to proxies to protect their launch sites from drone-led decapitation strikes.
The current doctrine focuses on sensor fusion. Instead of a standalone Sayyad series, analysts now refer to the Khordad or Bavar architectures, which integrate various missiles (Sayyad, Hunter, etc.) into a single network that can use Chinese BeiDou satellite data for targeting, making them much harder to jam than older GPS-reliant versions.
The most significant change in 2026 is the role of the CRINK (China, Russia, Iran, North Korea) alliance. You can no longer view these as just Iranian systems. As of March 2026, Iranian-designed proxy systems are being augmented by Chinese anti-stealth radars and navigation.
Militaries now view the deployment of these series by proxies as a “real-world testing ground” for Chinese and Iranian electronic warfare tools against Western defences (like the Patriot and Iron Dome).
The Erosion of Interdiction: COTS Revolution and Additive Manufacturing
Traditional counter-proliferation strategies rely on the “choke point” theory: if you control the flow of specialised military-grade components, you paralyse the production of the weapon. The Axis of Resistance has rendered this obsolete through two specific technical shifts: the COTS Revolution (commercial off-the-shelf) and industrial additive manufacturing (3D printing).
Intelligence recovery of downed drones (Shahed-136/101 and Samad-3 variants) confirms that the “brains” of these systems are no longer proprietary Iranian military hardware.
As for the hardware, they utilise readily available microelectronics found in consumer electronics, such as high-end racing drones (FPV) and agricultural surveying equipment. When a guidance system is built using a $200 flight controller available on global e-commerce platforms, sanctions become a sieve. You cannot ban the global trade of civilian microchips without collateral economic damage.
The dual-use GNSS modules (Global Navigation Satellite System) with basic M-Code or anti-jamming filters—often marketed for high-end civilian mapping—allows these low-cost drones to maintain cruise accuracy that previously required state-level inertial navigation systems.
The transition to CAD/CAM-based warfare means that the “factory” is now a digital file sent via encrypted satellite link.
Using industrial-grade 3D printers and CNC (Computer Numerical Control) routers, local cells can now manufacture complex internal structures, aerofoils, and engine mounts on-site. This technology has effectively closed the sustenance gap.
A cell in Northern Lebanon or a Houthi unit in the Al-Jawf highlands no longer waits for a crate of spare wings to arrive from Bandar Abbas. They simply print the replacement parts using imported raw filaments or resins that are indistinguishable from standard industrial supplies.
Post-strike assessments in 2025 revealed that warehouses targeted by kinetic strikes were often found to contain little more than raw plastic polymers and generic metal tubing—materials that are “pre-lethal” and difficult to justify as high-value military targets until the moment they are assembled.
Conclusion
In summary, this report identifies a fundamental shift in the regional security architecture from a hardware-dependent hierarchy to a software-and-protocol-centric network. While the events of March 2026—specifically the heavy degradation of Iran’s conventional naval platforms and fixed missile silos—have altered the physical landscape, they have failed to neutralise the underlying digital Axis.
The resilience of this network is rooted in technical symmetry and the “kit & assembly” model, which has effectively decentralised the kill chain. By standardising on shared architectures like the Fateh-110 (Jihad/Toufan) and the Shahed-238, the Axis has ensured that no single point of failure exists.
The destruction of a central factory is now mitigated by a garage network of 3D-printing hubs and COTS-integrated assembly lines that utilise “pre-lethal” materials to bypass international blockades.
Furthermore, the integration of Chinese-sourced anti-stealth sensors (YLC-8B) and GNSS-resilient navigation suggests that the proxy shield is developing into a sophisticated, multi-domain denial bubble.
Ultimately, the Axis of Resistance now operates with a swarm intelligence where command is no longer a vulnerable person but a pre-programmed protocol. As we move deeper into 2026, the primary challenge for international security will be recalibrating deterrence against an adversary that can lose its “big hardware” while its “digital layer” remains fully operational.



