Attack the Network
Books on Afghanistan
The intelligence targeting process has seen significant changes and modifications since 2001. One outcome in intelligence circles is the methodology of "attacking the network". Numerous doctrinal and other publications, reports, and news articles have been published on this process.
Sophisticated intelligence software systems have been developed - such as DCGS and Palantir - to sift through the many intelligence reports and organize the information into useable and timely "actionable intelligence".
"Biometic-Enabled Intelligence in Regional Command - East", Joint Force Quarterly 72, January 2014. Posted on website of National Defense University Press. Access here.
Detecting Improvised Explosive Devices: Enduring Threat Requires Enduring Solutions, by LTC Christopher M. Benson, United States Army, United States Army War College, 2012. Accessed here.
Fighting Networks: The Defining Challenge of Irregular Warfare, by Arleigh William Dean, June 2011. Naval Postgraduate School, Monterey, California. Accessed here on nps.edu.
The Joint Improvised Explosive Device Defeat Organization: DoD's Fight Against IEDs Today and Tomorrow, U.S. House of Representatives Committee on Armed Services, November 2008. Accessed here.
Exploitation Tactics: A Doctrine for the 21st Century. By LTC William J. Hartman, U.S. Army Command and General Staff College, Ft. Leavenworth, KS, May 15, 2008. The paper looks at how to solve adaptive problems in the intelligence field. Accessed here on the Defense Technical Information Center (DTIC) website.
Commander's Handbook for Attack the Network, Version 1.0, 20 May 2011. Joint Warfighter Center, Joint Doctrie Support Division, Suffolk, Virginia. Accessed here on DTIC.mil.
"The Future of Special Operations: Beyond Kill and Capture", Foreign Affairs, November/December 2012, by Linda Robinson. Article briefly mentions F3EAD. Accessed here.
Malleable COIN Targeting: A Pentagon Plan for Flexibility in Processes, by Brandon C. Miller, Small Wars Journal, February 2, 2012. Accessed here on SWJ.
F3EAD: Ops/Intel Fusion "Feeds" The SOF Targeting Process, by Charles Faint and Michael Harris. Small Wars Journal, January 31, 2012. A detailed account of a SOF targeting methodology accessed here on SWJ.
The Targeting Process: D3A and F3EAD, by Jimmy A. Gomez. Small Wars Journal, July 16, 2011. This paper explains the plus and minus of D3A and F3EAD. Accessed here on SWJ.
1. See the comment at the bottom of the SWJ post DTG Feb 1, 2012 - 11:10am. F3EAD: Ops/Intel Fusion "Feeds" The SOF Targeting Process, by Charles Faint and Michael Harris. Small Wars Journal, January 31, 2012. Accessed here on SWJ.
2. See Attacking the IED Network - a PowerPoint presentation used at the NDIA Global EOD Conference by CAPT Frederick Gaghan (USN) on May 5, 2011 to see how F3EAD is incorporated into JIEDDO methodology. Accessed here on the DTIC.mil website.
All external sites open up in an new window. Please report any broken links or inaccuracies in content to the webmaster at firstname.lastname@example.org.