* the three counter-IED lines of operation and F3EAD
: attack the network, defeat the device, and train the force
Recently, the F3EAD
methodology, which has roots in U.S.
While there is no question that the F3EAD (See Figure 3) methodology works extremely well, if not applied holistically across a network, the process can generate disproportionate attention on indivictual threat actions at the expense of key nodes which generate broader threat network capabilities.
These tools bolster the already robust F3EAD process by using SNA to objectively identify targets and provide immediate effects analysis.
* Expand upon and stress importance of Personality and Network Analysis in F3EAD and Joint Targeting Courses for specific staff elements and functionally specific training.
While there are about 7 different acronyms to describe the targeting cycle (such as D3A, F3A, F3EAD
, etc.), from an Intel perspective it is helpful to think of targeting as the focusing of the IPB-ISR cycle.
Major Kuniyuki discusses the importance of integrating ISR in supporting not only the F3EAD
(lethal operations) but also in the PMESII-PT (nonlethal operations) in today's operational environments.
However, in the joint contemporary OE, which is low intensity conflict, is it not the find, fix, finish, exploit, assess, disseminate (F3EAD) targeting cycle we adhere to?
Without the necessary assets, staff S2s cannot complete the F3EAD targeting cycle.
USAIC's efforts also seem to be geared toward integrating cyberspace into the traditional intelligence process model of F3EAD (Find, Fix, Finish, Exploit, Assess, and Disseminate).
(12) Each of these issues addresses intimidating concerns in the Find and Fix elements of F3EAD. Mr.