1.0 Introduction
F3EAD: Find, Fix, Finish, Exploit, Analyse, Disseminate. It is an acronym known and used widely within special operations. It’s kinetic and sequential, and that surface simplicity is its power: it bundles the life-cycle of a target from awareness to actionable intelligence into a flexible workflow. In practice, F3EAD is both a targeting doctrine and a mental model that helps intelligence and operational teams move faster while preserving analytic rigour and legal/ethical guardrails.
F3EAD is simply the latest in a long line of targeting methodology acronyms still doctrinally taught and operationally used today. For example, the OODA (Observe, Orient, Decide, Act) methodology, developed by John Boyd, is famously taught to many military officers and is distinctly incorporated into the F3EAD process. Even in the mysterious world of cybersecurity and ethical hacking, we see a version of F3EAD that simply repackages the process into an acronym using the lingua franca of the cyber world: Reconnaissance, Weaponise, Deliver, Exploit, Install, Command and Control (Cyber Kill Chain). [source, source]
Missions are carried out through the lens of F3EAD. It is the framework by which all intelligence disciplines fuse together to remove individuals from the battlespace.

2.0 History
2.1 Find–Fix–Finish
F3EAD grew out of older, simpler targeting shorthand, most notably Find–Fix–Finish, a pragmatic triad used by militaries for decades to describe the basic flow from detection to action. Through the Cold War and into the post-Cold-War era, advances in collection (satellites, signals intelligence, biometrics, digital forensics) and the rise of irregular warfare pushed practitioners to notice a persistent problem: tactical hits often generated intelligence gold that, if not captured and processed, disappeared with the target.
The Global War on Terror accelerated this lesson. Special operations and joint targeting cells learned to treat the aftermath of an action—devices, detainee interviews, captured records—as a source of follow-on advantage rather than epilogue. That mindset is what converted Find–Fix–Finish into the Find–Fix–Finish–Exploit–Analyses–Disseminate loop. [source]
2.2 Evolution of Exploitation
The transition from a three-step kinetic model to F3EAD also reflected organizational and technological shifts. Interagency fusion centres, quicker digital-forensic tools, and a legal environment demanding careful documentation made exploitation and analysis operational necessities rather than optional extras. Practically, exploitation meant more than bagging a phone: it required forensic extraction, chain of custody, linguists and analysts standing by, and legal officers clearing downstream uses. Dissemination likewise became a tailored art—tactical packets for immediate units, finished intelligence for policymakers, and sanitised pointers for international partners. In short, F3EAD institutionalised the idea that killing or capturing a node without harvesting what it knows or connects to is a wasted opportunity.
Over the last two decades, F3EAD’s influence has spread beyond traditional counterterrorism. Cyber practitioners look at attacker lifecycle models and borrow the exploitation/analysis ethos; law enforcement integrates the loop into high-value-target arrests; and planners now routinely bake assessment and exploitation standards into tasking memos. At the same time, the model forced hard conversations about oversight: who authorizes what, how to minimise harm, and how to prevent tactical successes from creating strategic liabilities. F3EAD is therefore best read not as a single recipe but as a toolkit; a way to ensure tactical actions reliably translate into enduring intelligence and lawful, measured decisions. [source]

3.0 Phases
3.1 Find
Finding is a multi-discipline hunt led by collection managers, SIGINT and GEOINT operators, HUMINT handlers, OSINT researchers, financial investigators, and tip-line analysts who generate and nurture leads. In practice it looks like a deliberate funnel: broad, hypothesis-driven questions (who might be funding an individual or entity, where does this network sleep, which routes they take to and from work to determine a solid pattern of life, which accounts show sudden cashflows, etc.) produce a list of candidate nodes that are then prioritized.
Tools range from SIGINT collection equipment, satellite and drone imagery tasking, HUMINT source networks and debrief forms, OSINT scraping and entity enumeration tools, to bank queries and tipline triage systems. Outputs are lead packages—watchlist entries, times and places of interest, suspicious transactions, or social media handles—each with an initial confidence estimate and suggested next step. The intellectual posture is experimental: false positives are expected and must be pruned; the danger is chasing noise (over-tasking collectors on low-value leads) or anchoring too early on a single hypothesis. Metacognition (overcoming bias and a solid grasp on digital literacy) plays a large role in driving the Find phase.
3.2 Fix
Fixing is the narrowing function performed by targeteers, tactical collection crews, surveillance teams, and dedicated analysts whose job is to validate identity, determine location, pattern of life development (repeated route usage versus single routes etc.), and windows of opportunity for the next phase. It looks like cross discipline correlation: SIGINT geolocates a handset, GEOINT confirms a vehicle signature, HUMINT provides a corroborating sighting, and financial analysis ties the person to a legal entity, then surveillance confirms routines and vulnerabilities. Fix work uses geolocation tools, covert observation teams, and requires plenty of patience. The product is an actionable picture; vetted identity, an accessible location, and a recommended engagement window—all of which reduces uncertainty to an acceptable operational risk threshold. Problems arise when identity validation is weak (mistaken ID), when fixation creates target blindness (ignoring alternative suspects), or when legal/authorization gaps make a previously fixable target untouchable.
3.3 Finish
Finish is the point of intervention: arrest, capture, kinetic interdiction, seizure, or other mission defined action executed by operational units (special operations task forces, law-enforcement tactical teams, maritime interdiction units, etc.). It is heavily governed by rules of engagement, legal authorities, and command intent. On the ground, the finish looks like a coordinated plan—entry teams, overwatch, breach/extract timelines, evidence preservation roles, and medical contingencies—synchronized with intelligence and legal clearance. Outputs are the operational outcome (target neutralized, detained, or escaped) and an immediately enacted evidence preservation plan. The big constraints are legal and ethical: warrants, ROEs, and host-nation consent; operationally, the risk is collateral damage or losing the exploitation opportunity by acting too soon or too late.
3.4 Exploit.
Exploitation is conducted by exploit teams: digital forensics specialists, document exploitation (DOCEX) crews, detainee debriefers, imagery analysts, and network forensics experts who convert seized material into intelligence. Practically, it’s a laboratory and interrogation pipeline—imaging and hashing device memory, extracting metadata, cataloging documents, photographing hard copy material, conducting structured debriefs, and pulling network artifacts from seized computers and servers. Tools include forensic suites, automated parsing and optical character recognition, and structured interview templates. The immediate output is a set of validated artifacts (device images, decrypted messages, testimonial timelines) and derived indicators (email addresses, infrastructure IPs, financial beneficiaries) that seed further FIND/FIX cycles. Failures here are costly: poor chain of custody ruins evidentiary value, slow exploitation lets targets reconstitute operations, and shallow interrogations or sloppy forensics produce weak or misleading intelligence.
3.5 Analyze
Analysis is the intellectual synthesis done by all-source analysts, target specialists, and SMEs who turn exploited artefacts into meaning: attributing actions, mapping networks, identifying TTPs, and forecasting likely next moves. It is iterative—link analysis to reveal hidden hierarchies, timeline reconstruction to infer intent, pattern discovery to spotlight TTPs, and probabilistic forecasting to produce indicators and decision points. Analysts use databases, visualization and social network tools, structured analytic techniques (red-teaming, analytic tradecraft), and statistical models. The product suite ranges from one-page tactical indicators to detailed targeting dossiers and strategic assessments. Common analytical pitfalls include confirmation bias, failing to articulate uncertainty or source reliability, and overfitting—seeing patterns where stochastic behaviour exists. Good analysis explicitly states assumptions, confidence levels, and alternative hypotheses so operators and policymakers can weigh risk.
3.6 Disseminate
Dissemination is the intentional delivery of finished intelligence to the right audience, performed by dissemination officers, production cells, and analysts who are often the original product owners. It is about tailoring: tactical indicators and watch list updates delivered over secure comms to units in the field; target and strike packages uploaded to planning portals; and strategic assessments distilled into briefings and memos for commanders and policymakers. Formats include secure chat alerts, annotated geospatial products, classified PDFs, and oral briefs with decision-focused recommendations. Effective dissemination includes feedback loops and metrics: did the recipient act, was the product timely, were there clarification requests? The hazards are both under and over-sharing—leaking sensitive methods to inappropriate audiences or burying decision makers in raw technical detail. Proper dissemination keeps classification, need-to-know, and tempo aligned with the mission, so intelligence becomes actionable influence rather than unread mail.
F3EAD is iterative—exploitation fuels new leads, analysis refines FIND queues, and dissemination reshapes priorities. That loop is the secret sauce. [source]
4.0 How F3EAD maps to the intelligence cycle
The canonical intelligence cycle (Direction, Collection, Processing, Analysis, Dissemination) and F3EAD are not competing frameworks; they are complementary overviews at different grains of resolution. [source]
- Direction: Mirrors the strategic push that spawns F3EAD taskings—who we need and why (Priority Intelligence Requirements, PIRs). Direction informs what to FIND.
- Collection: Mostly aligns with FIND + FIX (and partially with EXPLOIT where collection is opportunistic). Diverse collectors (SIGINT, HUMINT, GEOINT, OSINT, financial) populate the FIND queue.
- Processing: Parallels FIX and EXPLOIT processing—raw captured material must be forensically processed and sanitised before analysis.
- Analysis: Explicit in the ANALYZE phase, where exploitation outputs are synthesised and turned into assessments and predictive indicators.
- Dissemination: The final DISSEMINATE step. F3EAD emphasises task-appropriate dissemination: tactical feeds for units, operational packets for commanders, and finished intelligence for policymakers.
Think of F3EAD as the micro-level targeting engine that plugs into the macro-level intelligence cycle. The intelligence cycle sets the mission; F3EAD executes a high-fidelity path from mission to outcome.

5.0 Targeting methodologies and F3EAD
Targeting is a blend of science, craft, and judgment. There are a number of targeting methodologies commonly used within F3EAD to assess and inform analysts and decision makers through each step of the process. [source]
- CARVER is a target-selection matrix that scores potential targets across six dimensions—Criticality (how essential the target is to the adversary), Accessibility (how reachable it is), Recuperability (how quickly the enemy can recover), Vulnerability (how easily it can be struck), Effect (second-order or cascading impacts), and Recognizability (how readily it can be identified). By quantifying those factors, CARVER helps planners prioritize high-value, low-risk targets and compare options objectively, forcing consideration of not just tactical gain but strategic payoff and collateral consequences.
- Network-centric targeting (Link Analysis). Instead of singular targets, map the social/transactional network and target nodes by centrality, betweenness, or role (financiers vs. logisticians). Strength: disrupts system resilience. Weakness: dependence on quality of link data.
- Pattern-of-life and signature analysis. Use geolocational data to understand routines, windows of opportunity, and deviations. Applicable to physical and digital targets. Strong for timing operations; weak where adversaries practice randomness and have refined their own TTPs and SOPs to reflect years of repeatedly being targeted.
- Dynamic (time-sensitive) targeting. Rapid, short-deadline decisions based on transient opportunities (a delivery, rally, or fleeting SIGINT cue). Requires pre-established authorities, legal review pathways, and trust between collectors and operators.
- Counter-deception and validation. Because adversaries feed noise and false flags, multi-source validation (triangulation) and scepticism are mandatory. Analysts apply source tradecraft, provenance checks, and hypothesis-testing.
6.0 Operational Integration: Speed, Fidelity, and Feedback
Three tensions drive choices: speed (time-to-action), fidelity (certainty about the target), and feedback (how exploitation loops back). Organisations manage these with.
- Collection management: Prioritise sensors and human sources relentlessly; shift collection posture based on analysis.
- Fusion cells: Multi-discipline teams co-located (physically or virtually) reduce friction between FIND and FIX. Fusion accelerates validation.
- Exploitation pipelines: Forensics, forensic linguistics, device extraction, and financial forensics must be fast enough to inform near-term operations.
- Metrics of effectiveness (MOE) and metrics of performance (MOP): Measure whether the targeting chain produced desired effects and whether system components function as intended. If not, refine as necessary.
7.0 Ethical, Legal, and Strategic Considerations
Every targeting line must be run through legal review, policy constraints, and proportionality assessments. These are not bureaucratic annoyances; they preserve legitimacy and reduce strategic blowback. Targeting is not merely a technical exercise. Mistakes cost lives, erode trust, and produce geopolitical consequences. Key guardrails:
- Authorisation and oversight: Clear authorities for kinetic and non-kinetic actions; rules of engagement and legal opinions must be documented.
- Minimisation and proportionality: Limit collateral impact and ensure the action matches the intent.
- Information sharing discipline: Classify and compartmentalise appropriately; but also avoid stovepipes that prevent action.
- After-action transparency: Honest reviews and lessons-learned prevent recurring errors.

8.0 Vignette
The following is a fictional narrative showcasing the F3EAD process and how it looks at an operational level:
The city was called Maraba in the briefings. A dusty transit hub more likely to see cargo trucks than headlines. It began with an innocuous thread on social media that an analyst in a distant fusion cell flagged for follow-up: a pattern of payments to an account tied to a local logistics company. That was the Find—a hypothesis: could this company be a conduit for a small trafficking network supporting violent actors? Analysts layered in travel records, commercial registries, and a satellite pass that showed irregular overnight activity at a storage yard. The Fix came with cautious confidence: the cell built an identity profile for the suspected operator, his limited partners, and a predictable morning window when deliveries arrived.
Because the mission was non-kinetic law-enforcement in scope, planners sought legal concurrence and coordinated with local authorities before any movement. The Finish—an arrest and search with local partners—was deliberately surgical: minimal disruption, documented custody, and explicit evidence preservation steps. The space that followed was where F3EAD showed its real return on investment. During Exploit, forensic teams imaged phones, harvested ledger pages, and catalogued a trove of encrypted chat logs. Linguists and financial analysts worked through the night; within 48 hours Analysis produced a small network map connecting the Maraba operator to a regional financier and two transport nodes in neighboring provinces. Analysts annotated confidence levels, source caveats, and potential actionable follow-on targets.
Disseminate was not a single document but a suite: a tactical alert to interdiction teams, an operational brief to partnering agencies, and a redacted strategic note for policymakers warning of a broader logistics pipeline. Within a week, follow-on taskings hit two transport nodes; within a month the network’s capacity to move materiel in the corridor was substantially degraded. The vignette’s point is modest: the value of a targeting model isn’t only in the takedown but in the speed and discipline with which seized information is turned into verified leads, then into lawful, proportionate action.

9.0 Criticisms
9.1 It Can Blur Intelligence and Operations.
One of the biggest criticisms is that F3EAD collapses the traditional separation between intelligence production and kinetic action. In its US Army Special Operations origins, analysts and operators sat side by side, collapsing the time from target identification to engagement. That’s fantastic for speed, but problematic for oversight. When the same cell finds, fixes, and finishes a target, the checks and balances between analysis, policy, and operations can erode. Critics argue that this creates “self-licking ice creams”—cycles where the act of finishing a target becomes the justification for further finding, with limited strategic oversight or external review.
9.2 It Encourages “Whack-a-Mole” Mindset.
F3EAD was born in counterterrorism environments where the goal was to rapidly dismantle networks. But as several defense scholars and think-tank reports have noted, this can trap organizations in an endless cycle of tactical victories that yield little strategic progress. Every “finish” generates more “finds,” and structural issues—ideology, governance, economics—remain untouched. Some have called this the “tactical perfection, strategic failure” paradox: intelligence cycles optimized for killing or capturing individuals but not for stabilizing the environment that breeds them.
9.3 Over-Emphasis on Technology and Data Throughput.
Another legitimate worry is that the F3EAD model favors what can be collected and quantified over what can be contextually understood. Because “find” and “fix” phases are data-heavy, SIGINT and GEOINT often dominate, sidelining more qualitative HUMINT and sociocultural insight. Critics inside the IC have warned this produces “data-rich, insight-poor” analysis—where algorithms find patterns faster than analysts can interpret meaning or long-term consequences. This is especially dangerous in gray-zone conflicts or politically sensitive environments, where a misidentified “fix” can have enormous human and diplomatic costs.
9.4 Speed can Outpace Legality.
Lawyers and oversight bodies have pointed out that the compression of the F3EAD loop—from intelligence cue to kinetic strike—creates legal and ethical blind spots. Especially in drone warfare, the “finish” step may rely on metadata-based targeting or inferred identities rather than positive visual confirmation. Some human rights organizations and legal scholars argue that the model’s efficiency erodes due process and accountability, effectively turning intelligence cycles into automated kill chains. Even inside the U.S. military, commanders have voiced unease about the erosion of deliberation and the psychological toll on analysts turned de facto executioners.
9.5 Difficult to Scale or Sustain
Finally, critics note that F3EAD’s brilliance in special operations or interagency task forces doesn’t easily translate to conventional military or law enforcement contexts. It demands tight-knit teams, permissive legal authorities, and high-end ISR infrastructure. When exported to partner nations or less mature systems, it can produce dependency, misapplication, or a focus on kinetic short-term gains rather than institution-building.

10.0 Doctrine over Dogma
F3EAD endures because it works. It is agile, intelligence-driven, and ruthlessly pragmatic—born in the pressure cooker of post-9/11 counterterrorism where seconds mattered and certainty was a luxury. It fused operators and analysts into a single organism, collapsing the distance between insight and action. That integration made it one of the most effective targeting methodologies ever developed, and its influence now extends well beyond special operations—to law enforcement, counter-narcotics, financial forensics, and even cyber operations.
But every tool carries the imprint of the problem it was designed to solve. F3EAD privileges tempo and precision over deliberation and context. It rewards short-term disruption rather than long-term resolution. In an environment where the enemy regenerates faster than institutions can adapt, that speed can become both an advantage and a trap. The challenge for modern practitioners is to preserve the method’s clarity and discipline while tempering it with strategic patience, legal restraint, and ethical reflection.
In the end, F3EAD is not just a targeting cycle—it’s a mirror. It reflects how a nation chooses to translate information into power, and whether that translation serves merely to remove threats or to reshape the conditions that produce them. The true evolution of F3EAD will not be faster strikes, but smarter questions.
