C-UAS Kill Chain (F2T2EA)

Military Reference: Multi-Service & Specialty

Military Reference: Service-level

Joint, Strategic, Interagency, & National Security

Threat, OPFOR, Regional & Cultural

Homeland Defense, DSCA, & Disaster Response

SMARTupdates

Books in Development

SMARTsets

The Kill Chain: Find, Fix, Track, Target, Engage, Assess (F2T2EA)

Dynamic targeting consists of six distinct steps: find, fix, track, target, engage, and assess (F2T2EA). This method is referred to as F2T2EA or colloquially as the “kill chain.” The F2T2EA kill chain applies equally to the use of military capabilities to achieve lethal or nonlethal effects through non-kinetic means, such as information operations, airdrop, space operations, or directed energy. The decision to employ these capabilities is based on their availability, desired effects, potential consequences, and the JFC’s guidance.

The term kill chain is a military concept which identifies the structure of an attack. It consists of:
• identification of target
• dispatching of forces to target
• initiation of attack on target
• destruction of target

The UAS Kill Chain

A UAS has three main components: the sensor, the controller, and the communication links. Each component has its own weakness. The sensor is vulnerable to Global Positioning System [US system], GLONASS [Russian system], Galileo [EU system], and BeiDou [Chinese system] signals. The controller to link protocols and the communications link are vulnerable to video and telemetry downlink. See figure 1-2, for visual representation of the communication path for a UAS.
UAS Communication Link (ATP 3-01.81 Fig 1-2)

From an air defense perspective, the main objective is to prevent the delivery of effects by adversary air threats.

For regular manned air threats the kill chain can be aimed at the aircraft, the payload or the logistical backbone. When dealing with UAS, three more target options arise. These are the control element, the human operator or the control link/mechanism.

Every individual target option requires an additional kill chain, which enables the suppression of the UAS’ mission, in several cases even without physically destroying the aerial vehicle itself. Also, smaller UA might only have a very short-range and therefore will be launched well inside of any SBAMD sensor envelope, reducing available time for SBAMD systems to react. In this case, the initial act of finding an UA before it ever becomes airborne is critical.

C-UAS Kill Chain @ C-UAS/SUAS(1) SMARTbook

Kill Chain Model (F2T2EA)

The United States of America developed the F2T2EA kill chain model inspired by General Ronald R. Fogleman. Analyzing the six steps defined by their keywords will shed some light on the question of how the kill chain works, and why there are additional options for UA defense.

F – Find

This is the initial element to start the entire process. Information collection in regards to Intelligence, Surveillance and Reconnaissance (ISR) to provide a proper Joint Intelligence Preparation of the Operational Environment (JIPOE) is obligatory to be sufficiently informed about the expected threat. In parts, this has to take place long before an actual C-UAS operation, but the theoretical planning process to develop defensive reactions is based on these prerequisites; on a practical note, sufficient surveillance is considered to be obligatory.. Before thinking about any active defensive actions, it is mandatory to ‘find’ targets. Sensors (e.g. radars, but also optical and acoustic systems) are required to detect any air targets. Sensor requirements for UA, which are similar to known air threats, should be satisfied by existing systems. Although, the smaller the UA and lower the flight altitude, the more complex it will be to reliably execute the first step of the kill chain with Surface-Based Air and Missile Defence (SBAMD) sensors. Therefore, finding UA before they are airborne could significantly enhance SBAMD operations, at least in passive defence terms.

F – Fix

The meaning of fix in the AD domain is to identify the detected air targets. This will contribute to proper situational awareness (SA) and allow valid and consequent decision-making. This becomes especially problematic, but very important in peacetime, due to the massive increase of private or recreational UA.

T – Track

Tracking the identified radar contact is mandatory to continue the dynamic decision-making process. In relation to the track history and the current track behavior, military leaders are capable of prioritizing or retaining attack options. Individual tracks may be sorted and allocated to weapon systems, which directly leads to the next step.

T – Target

Final coordination including the reassurance of the correct classification and identification is going to lead into the final approval for engagement under consideration of all applicable laws and Rules of Engagement (ROE).

E – Engage

The allocated weapon system is ready to fire and will receive the engagement order. Like with other air threats against UAS, this process will work in all modes of operation, depending on the individual situation and UA.

A – Assess

The last step in the kill chain is the assessment of engagement success. The outcome of this assessment could be an all-clear, a re-engagement or the alerting of threatened sites.


C-UAS/SUAS(1): The Counter-Unmanned Aircraft System & Drone Warfare SMARTbook (Planning & Conducting C-UAS/sUAS Operations)This article is an extract from "C-UAS/SUAS(1): The Counter-Unmanned Aircraft System & Drone Warfare SMARTbook (Planning & Conducting C-UAS/sUAS Operations)" by The Lightning Press. Download a free PDF sample and learn more at:  C-UAS/SUAS(1): The Counter-Unmanned Aircraft System & Drone Warfare SMARTbook (Planning & Conducting C-UAS/sUAS Operations).

Browse additional military doctrine articles in our SMARTnews Blog & Resource Center.

About The Lightning Press SMARTbooks. Recognized as a “whole of government” doctrinal reference standard by military, national security and government professionals around the world, SMARTbooks comprise a comprehensive professional library. SMARTbooks can be used as quick reference guides during operations, as study guides at education and professional development courses, and as lesson plans and checklists in support of training. Browse our collection of Military Reference SMARTbooks to learn more.

Subscribe to the SMARTnews mailing list!

* indicates required