English · العربية · فارسی · עברית · Русский · 中文 · Español · Français

What Is the Kill Chain? Find, Fix, Track, Target, Engage, Assess

Guide 2026-03-21 9 min read
TL;DR

The kill chain is a six-step military doctrine (Find, Fix, Track, Target, Engage, Assess) that outlines the process from identifying a threat to evaluating the strike's effectiveness. It is fundamental to modern precision warfare, particularly in missile operations against adversaries like the Iran Axis.

Definition

The kill chain, formally known as F2T2EA (Find, Fix, Track, Target, Engage, Assess), is a conceptual framework describing the sequence of events required to apply lethal force against a target. Originating from military targeting processes, it breaks down complex operations into distinct, sequential phases. Each step is crucial for ensuring that intelligence gathered leads to an effective and precise strike, minimizing collateral damage and maximizing operational success. This doctrine is central to understanding how modern militaries, including those involved in the Coalition vs. Iran Axis conflict, plan and execute missile strikes.

Why It Matters

Understanding the kill chain is vital for analyzing missile strikes in the Coalition vs. Iran Axis conflict because it reveals the underlying operational logic and capabilities of the involved parties. Disrupting any stage of an adversary's kill chain can prevent or degrade a strike, while optimizing one's own kill chain enhances strike effectiveness. For instance, Iran's development of advanced drones and missiles aims to shorten its own kill chain, while Coalition efforts focus on extending Iran's and compressing their own. This framework helps assess the technological and intelligence superiority of one side over another, directly impacting strategic outcomes.

How It Works

The kill chain operates as a continuous cycle, beginning with 'Find' and concluding with 'Assess,' which then feeds back into 'Find' for subsequent operations. 'Find' involves identifying potential targets through various intelligence, surveillance, and reconnaissance (ISR) assets, such as satellites, drones, and human intelligence. 'Fix' pinpoints the target's precise location. 'Track' maintains continuous surveillance of the target's movement and status. 'Target' involves selecting the appropriate weapon system and planning the strike, considering factors like collateral damage and desired effects. 'Engage' is the execution of the strike, launching the missile or deploying the weapon. Finally, 'Assess' evaluates the strike's success, determining if the target was destroyed or neutralized as intended, and informing future operations. This iterative process ensures continuous improvement and adaptation.

Find: Initial Detection and Identification

The 'Find' phase is the initial detection and identification of potential threats or targets. This relies heavily on a robust intelligence, surveillance, and reconnaissance (ISR) network. Assets like satellite imagery, signals intelligence (SIGINT), human intelligence (HUMINT), and unmanned aerial vehicles (UAVs) are employed to scan vast areas for indicators of adversary activity. For example, detecting a mobile missile launcher being prepared for launch, or identifying a command and control node. The goal is to gather enough preliminary information to determine if an entity warrants further investigation as a potential target. This phase is often characterized by high volumes of raw data that require sophisticated analysis.

Fix and Track: Pinpointing and Monitoring

Once a potential target is 'Found,' the 'Fix' phase precisely locates it, establishing its exact coordinates. This often involves cross-referencing multiple intelligence sources to reduce positional error. Following 'Fix,' the 'Track' phase maintains continuous surveillance of the target, monitoring its movement, behavior, and status. This is critical for dynamic targets, such as mobile missile launchers or moving convoys. Persistent tracking ensures that the target's location is continuously updated, preventing it from escaping or changing its operational posture undetected. Advanced sensors and data fusion techniques are essential for maintaining a reliable track, especially in contested environments.

Target: Weapon Selection and Strike Planning

The 'Target' phase involves the critical decision-making process of selecting the appropriate weapon system and planning the strike. This includes determining the optimal munition type (e.g., cruise missile, ballistic missile, precision-guided bomb), the launch platform, and the attack trajectory. Factors such as desired effect (e.g., destruction, neutralization, disruption), collateral damage estimates, rules of engagement, and political considerations are meticulously evaluated. Legal reviews and approval chains are often integral to this stage, particularly for high-value or sensitive targets. The aim is to achieve the desired military outcome with minimal unintended consequences.

Engage: Execution of the Strike

The 'Engage' phase is the physical execution of the strike. This involves launching the selected weapon system, whether it's a cruise missile from a naval vessel, a ballistic missile from a ground launcher, or an air-launched precision-guided munition. This phase requires precise coordination between intelligence, targeting, and operational units. Real-time data feeds and secure communication channels are essential to ensure the weapon reaches its intended target. In modern warfare, this often involves sophisticated command and control systems that can rapidly transmit targeting data to launch platforms, minimizing the time between target identification and weapon release, thereby shortening the overall kill chain.

Assess: Post-Strike Evaluation

The final phase, 'Assess,' involves evaluating the effectiveness of the strike. This is known as Battle Damage Assessment (BDA) and includes determining if the target was destroyed, damaged, or neutralized as intended. BDA relies on post-strike ISR, such as satellite imagery, drone reconnaissance, and sometimes even ground intelligence. The assessment provides crucial feedback, informing whether further strikes are needed, if tactics need adjustment, or if the intelligence gathering process requires refinement. This feedback loop is vital for continuous improvement of the entire kill chain, ensuring that future operations are more efficient and effective. It closes the loop, often initiating a new 'Find' phase.

In This Conflict

In the Coalition vs. Iran Axis conflict, the kill chain is a central operational concept for both sides. Coalition forces, particularly the US, leverage advanced ISR capabilities (e.g., RQ-4 Global Hawk, U-2 Dragon Lady, satellite constellations) to 'Find' and 'Fix' Iranian and proxy assets, such as missile storage sites, drone launch facilities, or leadership targets. Their ability to 'Track' mobile targets like missile launchers or fast attack craft is enhanced by persistent surveillance. The 'Target' phase involves sophisticated analysis to select precision-guided munitions, often launched from F-15s, F-16s, or naval vessels. Iran and its proxies, like the Houthis, aim to shorten their own kill chain by developing indigenous ISR (e.g., Mohajer-6 drones) and integrating it directly with their missile and drone launch capabilities, as seen in attacks on Saudi oil facilities or Red Sea shipping. Conversely, Coalition efforts focus on disrupting Iran's kill chain through electronic warfare, cyber attacks, and pre-emptive strikes on ISR assets, thereby degrading their ability to 'Find' and 'Track' targets.

Historical Context

The concept of the kill chain, though not always explicitly termed as such, has roots in military strategy dating back centuries. However, its modern, formalized F2T2EA structure gained prominence with the advent of precision-guided munitions and advanced ISR capabilities in the late 20th century. The Gulf War (1990-1991) showcased early examples of a nascent kill chain, with coalition forces using satellite and aerial reconnaissance to identify Iraqi targets, followed by precision air strikes. The post-9/11 'War on Terror' further refined the kill chain, particularly in counter-terrorism operations where rapid targeting of elusive individuals became paramount, leading to the development of 'sensor-to-shooter' links that drastically reduced the time between 'Find' and 'Engage'.

Key Numbers

72 hours
Average time from target identification to strike execution for US forces in the early 1990s.
10 minutes
Reduced kill chain time for some US precision strikes against dynamic targets by 2003, demonstrating significant acceleration.
1500 km
Approximate range of Iran's Khorramshahr ballistic missile, requiring extensive 'Find' and 'Track' capabilities for effective targeting by adversaries.
3000+
Number of Houthi drone and missile attacks in the Red Sea since late 2023, indicating their ability to 'Find' and 'Engage' shipping targets.
90%
Estimated success rate of Coalition air defenses against Houthi projectiles in the Red Sea, demonstrating disruption of the Houthi 'Engage' phase.
24/7
Persistent ISR coverage provided by modern satellite constellations and HALE UAVs, enabling continuous 'Find' and 'Track' phases.

Key Takeaways

  1. The kill chain (F2T2EA) is a sequential process from threat detection to strike assessment, fundamental to modern warfare.
  2. Each phase (Find, Fix, Track, Target, Engage, Assess) is interdependent; failure in one can compromise the entire operation.
  3. Technological advancements in ISR and precision munitions have drastically shortened kill chain timelines, enabling rapid response.
  4. In the Coalition vs. Iran conflict, both sides actively seek to optimize their own kill chains while disrupting the adversary's.
  5. Understanding the kill chain provides critical insight into military capabilities, operational effectiveness, and strategic vulnerabilities.

Frequently Asked Questions

What are the six steps of the kill chain?

The six steps of the kill chain are Find, Fix, Track, Target, Engage, and Assess (F2T2EA). This sequence describes the entire process from initial threat detection to evaluating the strike's outcome.

Why is the kill chain important in modern warfare?

The kill chain is crucial because it provides a structured framework for executing precision strikes, ensuring that intelligence leads to effective action. It minimizes errors, maximizes operational efficiency, and is vital for integrating complex military technologies and intelligence assets.

How does Iran use the kill chain concept?

Iran and its proxies apply the kill chain by integrating their indigenous ISR (e.g., drones) with their missile and drone capabilities to identify, track, and strike targets. They focus on shortening their own kill chain to achieve rapid engagement, particularly against naval assets or regional adversaries.

What is the difference between 'Fix' and 'Track'?

'Fix' establishes the precise location of a target at a specific moment. 'Track' then maintains continuous surveillance of that target, updating its position and movement over time, which is essential for dynamic or mobile targets.

How can a kill chain be disrupted?

A kill chain can be disrupted at any stage. This can involve jamming adversary ISR (disrupting 'Find'/'Track'), spoofing targeting data (disrupting 'Fix'/'Target'), destroying launch platforms (disrupting 'Engage'), or employing active defenses like missile interceptors (disrupting 'Engage').

Related

Sources

Joint Publication 3-60: Joint Targeting U.S. Department of Defense official
The Kill Chain: The Evolution of Precision Warfare Center for Strategic and International Studies (CSIS) academic
Iran's Drone and Missile Program: A Growing Threat International Institute for Strategic Studies (IISS) academic
Red Sea Attacks: Houthi Capabilities and Coalition Response Naval Technology journalistic

Related Topics

Jdam Vs Gbu 57 The Kill Chain PrSM (Precision Strike Missile) What Is A Cruise Missile Gbu 39 Vs Jdam Jsow Vs Jdam

Related News & Analysis