What Is a Kill Chain? F2T2EA, OODA Loop & Sensor-to-Shooter Pipeline
A kill chain is the step-by-step sequence military forces follow to detect, track, and destroy a target. The two dominant frameworks — F2T2EA (Find, Fix, Track, Target, Engage, Assess) and the OODA Loop (Observe, Orient, Decide, Act) — define how quickly a sensor detection becomes a weapon impact. In the Iran-Coalition conflict, compressing kill chains from hours to minutes has been the decisive factor in intercepting Iranian ballistic missiles and neutralizing mobile TEL launchers before they relocate.
Definition
A kill chain is the sequential process that connects the detection of a threat to its destruction. The term originates from U.S. military doctrine and describes every step required to prosecute a target: finding it, confirming its identity, tracking its movement, selecting a weapon, delivering that weapon, and verifying the result. The most widely used framework is F2T2EA — Find, Fix, Track, Target, Engage, Assess — developed by the U.S. Air Force in the 1990s. Each link in the chain represents a potential point of failure; if any single step breaks down, the entire sequence fails. Modern warfare increasingly focuses on compressing the time between the first link (detection) and the last (engagement) from hours or days down to seconds. The kill chain concept applies equally to offensive strikes and defensive intercepts — an Iron Dome battery prosecuting an incoming rocket follows the same logical sequence as an F-35 striking a missile launcher.
Why It Matters
In the Iran-Coalition conflict, kill chain speed is the difference between intercepting a ballistic missile in flight and absorbing it on the ground. Iran's strategy relies on overwhelming coalition defenses with simultaneous launches from dispersed mobile launchers — Shahab-3 and Emad TELs that can relocate within 6-8 minutes of firing. Coalition forces must detect the launch via satellite or radar, classify the threat, compute an intercept solution, and fire a defensive missile — all within a window that can be as short as 4-7 minutes for short-range threats. On the offensive side, the coalition's ability to strike Iranian nuclear facilities depends on compressing the sensor-to-shooter timeline fast enough to hit hardened targets before Iran can activate air defenses or disperse assets. Every second shaved from the kill chain translates directly into lives saved and targets destroyed.
How It Works
The kill chain operates as a pipeline where each stage feeds the next. In the F2T2EA model, the process begins with Find — detecting that a target exists, typically through satellite imagery, signals intelligence, or radar. Fix narrows the target's location to actionable coordinates, often requiring multiple sensor inputs to distinguish real targets from decoys. Track maintains continuous custody of the target as it moves, which is critical against mobile missile launchers that relocate after firing. Target is the decision phase — selecting the appropriate weapon, computing ballistic solutions, and obtaining legal authorization to strike. Engage is the weapon release, whether that's launching an Arrow-3 interceptor or dropping a GBU-57 bunker buster. Assess determines whether the target was destroyed, damaged, or missed, using battle damage assessment (BDA) imagery. The OODA Loop — Observe, Orient, Decide, Act — developed by Air Force Colonel John Boyd, describes the cognitive cycle that operators execute within each kill chain step. Boyd's key insight was that the side that cycles through OODA faster gains a compounding advantage: each faster iteration forces the opponent into reactive mode. The sensor-to-shooter pipeline is the technical infrastructure connecting these steps — the data links, communication networks, and fire control systems that pass targeting data from a satellite to a command center to a weapon system. In modern integrated air and missile defense, this pipeline is increasingly automated. The Aegis Combat System, for example, can detect, track, and engage a ballistic missile with minimal human input, compressing the kill chain to under 30 seconds for certain threat profiles.
F2T2EA: The Six Links of the Kill Chain
F2T2EA was formalized by the U.S. Air Force in Joint Publication 3-60 (Joint Targeting) and has become the standard targeting framework for coalition operations. Each link has specific requirements and failure modes. Find relies on intelligence, surveillance, and reconnaissance (ISR) assets — satellites like SBIRS detect missile launches via infrared signatures within seconds. Fix requires correlating multiple sensor inputs; a single radar return is insufficient to commit a $3-4 million interceptor. Track is the most challenging link against mobile targets — Iran's road-mobile Sejjil-2 TELs can reposition in under 10 minutes, meaning track custody must be maintained continuously via persistent ISR like MQ-9 Reaper drones or space-based radar. Target involves weapons-target pairing, where analysts match the right munition to the target — a Patriot PAC-3 for a ballistic missile, a JDAM for a fixed launcher. Engage is weapon release with precise timing and deconfliction to avoid fratricide. Assess closes the loop with BDA — satellite or drone imagery confirming destruction, which often takes 15-45 minutes and can delay restrike decisions.
- F2T2EA has six sequential steps: Find, Fix, Track, Target, Engage, Assess — failure at any link breaks the chain
- Track is the hardest link against Iran's mobile TELs, which can relocate within 6-10 minutes of launch
- Battle damage assessment (Assess) often takes 15-45 minutes, creating a gap before restrike decisions
The OODA Loop: Boyd's Cycle of Decision Superiority
Colonel John Boyd developed the OODA Loop — Observe, Orient, Decide, Act — from his study of fighter combat in Korea, where American F-86 pilots achieved a 10:1 kill ratio against MiG-15s despite comparable aircraft performance. Boyd attributed this to the F-86's bubble canopy and hydraulic controls, which let pilots observe and react faster. The Orient phase is where Boyd placed the most emphasis — it represents the mental model through which operators interpret what they observe, shaped by training, doctrine, culture, and previous experience. A poorly oriented operator may observe the same data as a well-oriented one but reach the wrong conclusion. In missile defense, orientation means the difference between classifying a radar return as a hostile ballistic missile versus a commercial aircraft or decoy. The OODA Loop is not strictly sequential — Boyd emphasized that skilled operators loop back constantly, updating observations mid-decision. In the Iran conflict, coalition forces maintain OODA superiority through superior ISR coverage, trained operators, and automated decision aids that compress the Orient and Decide phases. Iran attempts to disrupt coalition OODA cycles through electronic warfare, GPS jamming, and the use of decoy launchers.
- Boyd's OODA Loop — Observe, Orient, Decide, Act — explains why faster decision cycles defeat slower ones regardless of raw firepower
- The Orient phase is most critical: misclassifying a target as hostile or benign can cause catastrophic errors
- Iran uses electronic warfare, GPS jamming, and decoys specifically to disrupt coalition OODA cycles
Sensor-to-Shooter Pipeline: The Technical Backbone
The sensor-to-shooter pipeline is the physical and digital infrastructure that moves targeting data from detection to weapon release. In coalition operations against Iran, this pipeline spans multiple domains. Space-based sensors like the Space-Based Infrared System (SBIRS) detect missile launches within 30-90 seconds. That data flows via satellite communication links to the Combined Air Operations Center (CAOC) at Al Udeid Air Base in Qatar, where it is fused with ground-based radar data from AN/TPY-2 (THAAD radar) and Aegis SPY-1 shipboard radars. Fire control solutions are computed and transmitted to the appropriate interceptor battery — whether an Arrow-3 in Israel, a THAAD battery in the Gulf, or an Aegis destroyer in the Arabian Sea. The critical metric is latency: every data relay, format conversion, and authorization step adds seconds. Link 16 tactical data links operate at roughly 1,200 messages per second, but bandwidth constraints during saturation attacks — when Iran launches 100+ missiles simultaneously — can create bottlenecks. The U.S. military's Joint All-Domain Command and Control (JADC2) initiative aims to reduce sensor-to-shooter latency below 10 seconds for most threat types by automating data fusion and weapons assignment.
- SBIRS satellites detect missile launches within 30-90 seconds via infrared signature, initiating the pipeline
- Data flows through CAOC at Al Udeid to ground radars, shipboard Aegis, and interceptor batteries across the theater
- JADC2 aims to compress sensor-to-shooter timelines below 10 seconds by automating data fusion and weapon pairing
Kill Chain Compression: The Race Against Time
Kill chain compression — reducing the time from detection to engagement — is the central technological challenge in modern missile defense. Against Iranian ballistic missiles, the timeline is brutally short. A Shahab-3 launched from western Iran reaches Israel in approximately 12 minutes. Subtracting detection time (30-90 seconds), data relay (5-15 seconds), fire control computation (3-10 seconds), and interceptor flight time (60-180 seconds), defenders may have a window of only 8-9 minutes to make a kill decision and execute. For shorter-range threats like Fateh-110 (300km range), the engagement window shrinks to under 4 minutes. Automation is the primary tool for compression. The Aegis Ballistic Missile Defense system can operate in automatic-special mode, where the system detects, tracks, and launches interceptors with minimal human intervention. Israel's Arrow system similarly automates much of the engagement sequence. However, automation introduces risks — the 1988 USS Vincennes incident, where an Aegis cruiser shot down Iran Air Flight 655, demonstrates how automated systems can misclassify targets under pressure. The tension between speed and accuracy remains unresolved: faster kill chains save lives against real threats but increase the probability of engaging the wrong target.
- A Shahab-3 from western Iran reaches Israel in ~12 minutes, leaving only 8-9 minutes for the full kill chain
- Short-range threats like Fateh-110 compress the engagement window to under 4 minutes, requiring near-full automation
- Automation increases speed but raises misclassification risk — the USS Vincennes incident is the cautionary precedent
Breaking the Kill Chain: Countermeasures and Vulnerabilities
Every kill chain has vulnerabilities, and sophisticated adversaries actively target them. Iran employs several kill chain disruption strategies. At the Find stage, Iran uses camouflage, underground missile cities (like the facility revealed in 2015 carved into mountain rock), and mobile TELs that avoid fixed positions detectable by satellite. At the Fix stage, Iran deploys decoy launchers — inflatable replicas of Shahab-3 TELs that produce realistic radar and thermal signatures. At the Track stage, Iran's doctrine of shoot-and-scoot — launching and relocating within minutes — breaks track custody. At the Target stage, GPS jamming from Iranian electronic warfare units can degrade precision-guided munition accuracy. Iran also targets the sensor-to-shooter pipeline itself: in January 2026, Iranian cyber units attempted to disrupt communication links between Gulf-based radars and command centers. Coalition forces counter these measures through redundant sensor coverage (space, air, ground, sea), multi-spectral targeting that combines radar, infrared, and signals intelligence to defeat decoys, and hardened communication links resistant to jamming. The kill chain is ultimately a contest between the attacker's ability to compress it and the defender's ability to break it.
- Iran uses underground missile cities, inflatable decoy TELs, and shoot-and-scoot doctrine to break coalition kill chains
- GPS jamming and cyber attacks target the sensor-to-shooter pipeline directly, degrading precision and communication
- Coalition redundancy — multi-domain sensors and hardened data links — is the primary counter to kill chain disruption
In This Conflict
The Iran-Coalition conflict has become the most intensive real-world test of kill chain theory since the 1991 Gulf War's Scud hunts. During Iran's April 2024 attack on Israel — 170+ drones, 30+ cruise missiles, and 120+ ballistic missiles — the coalition executed an integrated kill chain across four countries and three domains in real time. SBIRS detected launches within a minute. Data flowed to U.S. and Israeli command centers simultaneously. Arrow-3 interceptors engaged ballistic missiles in the exoatmosphere while Arrow-2 handled lower-altitude threats, David's Sling addressed cruise missiles, and Iron Dome cleaned up debris. The entire defensive kill chain operated within a 12-minute window with a reported 99% intercept rate. On the offensive side, coalition forces have compressed the TEL-hunting kill chain dramatically compared to 1991, when coalition aircraft flew 2,493 sorties against Iraqi Scud launchers without a single confirmed mobile TEL kill. Today, persistent drone surveillance, space-based tracking, and pre-positioned strike assets have reduced the time from TEL detection to weapon impact to under 15 minutes in exercises. The conflict has also revealed kill chain bottlenecks: during saturation attacks involving 100+ simultaneous threats, sensor-to-shooter bandwidth becomes the limiting factor, not sensor detection or weapon availability.
Historical Context
The kill chain concept traces to World War II strategic bombing, where target selection, reconnaissance, mission planning, strike execution, and damage assessment followed a sequential logic — though the cycle took days or weeks. The term was formalized during the 1991 Gulf War, when coalition forces attempted to destroy Iraqi Scud missile launchers — the Great Scud Hunt. Despite 2,493 dedicated sorties, no mobile Scud TELs were confirmed destroyed, exposing fatal gaps in the Find-Fix-Track sequence against relocatable targets. This failure drove two decades of investment in persistent ISR, data links, and automated fire control. By 2003, the sensor-to-shooter timeline for time-sensitive targets had dropped from hours to roughly 45 minutes. By 2011 in Libya, it reached single-digit minutes for some target sets. The Iran conflict represents the current state of the art: kill chains measured in seconds for ballistic missile defense.
Key Numbers
Key Takeaways
- A kill chain is only as strong as its weakest link — one broken step (detection, tracking, communication, or engagement) defeats the entire sequence
- F2T2EA provides the targeting framework while the OODA Loop describes the cognitive speed advantage — together they determine who shoots first and most accurately
- Kill chain compression from hours to seconds is the single most important technological trend in the Iran-Coalition conflict, directly determining intercept success rates
- Iran's countermeasures — underground bases, decoy TELs, GPS jamming, cyber attacks — specifically target individual kill chain links rather than trying to match coalition firepower
- Automation accelerates kill chains but creates misclassification risk — the balance between speed and human judgment remains the hardest unsolved problem in modern targeting
Frequently Asked Questions
What are the steps in a military kill chain?
The standard military kill chain follows the F2T2EA model: Find (detect the target exists), Fix (determine its precise location), Track (maintain continuous surveillance), Target (select the right weapon and get authorization), Engage (release the weapon), and Assess (confirm destruction or plan restrike). Each step must succeed for the chain to work — a single failure at any link means the target survives.
What is the difference between F2T2EA and the OODA Loop?
F2T2EA is a targeting process — it describes the sequential steps to destroy a specific target. The OODA Loop (Observe, Orient, Decide, Act) is a decision-making cycle that operates within and across F2T2EA steps. F2T2EA tells you what to do; the OODA Loop determines how fast and accurately you do it. A military force with faster OODA cycles will execute F2T2EA more effectively than one with slower decision-making, even with equivalent weapons.
How long does a kill chain take in missile defense?
In modern integrated missile defense, the kill chain can be as short as 30-90 seconds for automated systems like Aegis BMD operating in auto-special mode. Against ballistic missiles, the full chain from satellite detection to interceptor launch typically takes 2-4 minutes. Against short-range threats like rockets, Iron Dome completes the kill chain in 15-30 seconds. The total available time depends on the threat's flight time — about 12 minutes for a Shahab-3 from Iran to Israel.
What is a sensor-to-shooter pipeline?
A sensor-to-shooter pipeline is the technical infrastructure — satellites, radars, data links, command centers, and fire control systems — that connects threat detection to weapon engagement. When a satellite detects a missile launch, that data must travel through communication links to a command center, be fused with radar data, generate a fire control solution, and reach the interceptor battery. Each relay adds latency. The U.S. JADC2 program aims to compress this pipeline to under 10 seconds through automation and direct sensor-to-weapon data links.
How does Iran try to defeat the kill chain?
Iran targets every link in the kill chain with specific countermeasures. Against Find: underground missile cities and dispersed mobile launchers avoid detection. Against Fix: inflatable decoy TELs produce realistic radar and thermal signatures. Against Track: shoot-and-scoot doctrine relocates launchers within 6-10 minutes of firing. Against Target/Engage: GPS jamming degrades precision-guided munition accuracy. Against the pipeline itself: cyber attacks attempt to disrupt communication between sensors and shooters. Iran's strategy is to slow the coalition kill chain enough that mobile assets can escape before strikes arrive.