Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Intelligence assessment
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== '''The F3EA Cycle''' === [[File:Target centric intelligence cycle.jpg|thumb|Target-centric intelligence cycle]] This approach, known as '''Find-Fix-Finish-Exploit-Assess''' ('''F3EA'''),<ref name=":4">{{cite web | url=https://theintercept.com/drone-papers/find-fix-finish/ | title=Find, Fix, Finish | work=The Intercept_ | date=October 15, 2015 | access-date=October 30, 2016 | author=Jeremy Scahill}}</ref> is complementary to the intelligence cycle and focused on the intervention itself, where the subject of the assessment is clearly identifiable and provisions exist to make some form of intervention against that subject, the target-centric assessment approach may be used.<ref name=":4" /> * '''Find''' ** The subject for action, or target, is identified and efforts are initially made to '''find''' the target for further development. This activity will identify where intervention against the target will have the most beneficial effects.<ref name=":4" /> * '''Fix''' ** When the decision is made to intervene, action is taken to '''fix''' the target, confirming that the intervention will have a high probability of success and restricting the ability of the target to take independent action.<ref name=":4" /> * '''Finish''' ** During the '''finish''' stage, the intervention is executed, potentially an arrest or detention or the placement of other collection methods.<ref name=":4" /> * '''Exploit''' ** Following the intervention, '''exploitation''' of the target is carried out, which may lead to further refinement of the process for related targets. The output from the exploit stage will also be passed into other intelligence assessment activities.<ref name=":4" />
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)