Find-Fix-Finish-Exploit-Analyze-Disseminate (F3EAD) is the operational targeting cycle that compresses the full intelligence cycle into a time-sensitive feedback loop supporting direct action against specific targets. Where the classical intelligence cycle operates on timescales of days to months and produces estimative products for policymakers, F3EAD operates on timescales of minutes to hours and produces targeting decisions for operators. The distinction between the two cycles — one deliberative, one operational — maps onto the distinction between estimative and current intelligence, but F3EAD goes further: it is not merely current but kinetic, not merely informing decisions but enabling irreversible ones.

The phases

Find. Identify the target through intelligence collection. This may involve HUMINT source reporting, SIGINT intercepts, IMINT pattern-of-life analysis, or OSINT monitoring. The “find” phase draws on the full range of collection disciplines but is distinguished from routine collection by its directedness: the collection is organized around a specific target rather than a general intelligence requirement.

Fix. Confirm the target’s location with sufficient precision and timeliness to support engagement. The gap between “find” and “fix” is the gap between knowing the target exists and knowing where the target is right now — a distinction that determines whether the intelligence has operational value. Fix requires persistent or near-real-time collection, often combining disciplines (satellite imagery to establish location, SIGINT to confirm activity, HUMINT to validate identity).

Finish. Engage the target. In lethal targeting, this is the strike. In non-lethal operations, this may be arrest, disruption, or exploitation of the target’s communications. The “finish” phase is the point where intelligence becomes action — the irreversible step that all prior phases serve and that all subsequent phases learn from.

Exploit. Collect intelligence from the engagement itself. In a strike, this includes battle damage assessment, recovered materials, and captured communications. In a raid, this includes documents, digital media, and human sources generated by the operation. Exploitation feeds directly back into the “find” phase for subsequent targets — each engagement generates the intelligence that enables the next.

Analyze. Process the exploitation returns to identify new targets, refine understanding of the adversary network, and update the intelligence picture. This is analysis in service of the next targeting decision, not analysis in service of a comprehensive estimate.

Disseminate. Distribute the updated intelligence to operators and analysts who can act on it. In a high-tempo targeting environment, dissemination speed determines whether the intelligence retains operational value.

The compression problem

F3EAD’s operational value is its speed. Its analytic vulnerability is the same speed. The classical intelligence cycle includes deliberative steps — competitive analysis, structured techniques, peer review — designed to catch errors before they reach the decision-maker. F3EAD compresses or eliminates these steps. The analyst working in a targeting cell does not have time to conduct analysis of competing hypotheses before providing a targeting recommendation. The collection manager does not have time to cross-validate through multiple disciplines before confirming a fix. The result is a system optimized for speed at the cost of the epistemic safeguards the deliberative cycle provides.

The 2026 Iran war’s decapitation of Khamenei illustrates both the capability and the risk. The CIA’s months-long surveillance operation (the “find” phase) culminated in a rapid fix-finish sequence when intelligence about the Saturday morning leadership meeting required the strike timeline to shift from nighttime to daytime operations. The decision to act on this intelligence — to treat a single-source report about a meeting as sufficient basis to alter the entire operational plan — reflects the F3EAD logic: when the targeting window opens, the system must act or lose the opportunity. The safeguard is not analytic deliberation but the accumulated confidence from months of prior collection. Whether that accumulated confidence was sufficient is a question the public record cannot yet answer.

Relation to the classical cycle

F3EAD does not replace the classical intelligence cycle; it operates within the space that the classical cycle creates. The estimative intelligence process identifies the adversary, assesses capabilities, and defines the targeting requirements that F3EAD then executes against. Without the estimative framework, F3EAD has no targets. Without F3EAD, the estimative framework has no operational expression in time-sensitive environments. The two cycles are complementary but create institutional tension: resources allocated to the targeting cycle are resources not available for estimative work, and the operational urgency of targeting tends to dominate resource allocation when both compete for the same collection assets.