Attack the Network



Afghan War
News Blog

Current News

Military Websites

Government Websites

General Information

Blogs on Afghan War

Blogs by Military


Books on Afghanistan

Site Map





Afghan War News > Intelligence > Attack the Network

Attack the Network

The intelligence targeting process has seen significant changes and modifications since 2001. One outcome in intelligence circles is the methodology of "attacking the network". Numerous doctrinal and other publications, reports, and news articles have been published on this process.

Sophisticated intelligence software systems have been developed - such as DCGS and Palantir - to sift through the many intelligence reports and organize the information into useable and timely "actionable intelligence".

Papers, Reports, and Publications about Attack the Network

"Biometic-Enabled Intelligence in Regional Command - East", Joint Force Quarterly 72, January 2014. Posted on website of National Defense University Press. Access here.

Detecting Improvised Explosive Devices: Enduring Threat Requires Enduring Solutions, by LTC Christopher M. Benson, United States Army, United States Army War College, 2012.  Accessed here.

Fighting Networks: The Defining Challenge of Irregular Warfare, by Arleigh William Dean, June 2011. Naval Postgraduate School, Monterey, California. Accessed here on

The Joint Improvised Explosive Device Defeat Organization: DoD's Fight Against IEDs Today and Tomorrow, U.S. House of Representatives Committee on Armed Services, November 2008.  Accessed here.

Exploitation Tactics: A Doctrine for the 21st Century. By LTC William J. Hartman, U.S. Army Command and General Staff College, Ft. Leavenworth, KS, May 15, 2008. The paper looks at how to solve adaptive problems in the intelligence field.  Accessed here on the Defense Technical Information Center (DTIC) website.

References about Attack the Network

Commander's Handbook for Attack the Network, Version 1.0, 20 May 2011. Joint Warfighter Center, Joint Doctrie Support Division, Suffolk, Virginia.  Accessed here on

News Articles about Attack the Network

March 10, 2011.  Afghan National Civil Order Police officers practice intelligence gathering, relationship building.  DVIDS.

Blog Posts, Magazine and Periodical Articles about Attack the Network

"The Future of Special Operations: Beyond Kill and Capture", Foreign Affairs, November/December 2012, by Linda Robinson. Article briefly mentions F3EAD. Accessed here.

Malleable COIN Targeting: A Pentagon Plan for Flexibility in Processes, by Brandon C. Miller, Small Wars Journal, February 2, 2012.  Accessed here on SWJ.

F3EAD: Ops/Intel Fusion "Feeds" The SOF Targeting Process, by Charles Faint and Michael Harris. Small Wars Journal, January 31, 2012. A detailed account of a SOF targeting methodology accessed here on SWJ.

The Targeting Process: D3A and F3EAD, by Jimmy A. Gomez. Small Wars Journal, July 16, 2011. This paper explains the plus and minus of D3A and F3EAD.  Accessed here on SWJ.


Return to Top of Page


1.  See the comment at the bottom of the SWJ post DTG Feb 1, 2012 - 11:10am. F3EAD: Ops/Intel Fusion "Feeds" The SOF Targeting Process, by Charles Faint and Michael Harris. Small Wars Journal, January 31, 2012. Accessed here on SWJ.

2. See Attacking the IED Network - a PowerPoint presentation used at the NDIA Global EOD Conference by CAPT Frederick Gaghan (USN) on May 5, 2011 to see how F3EAD is incorporated into JIEDDO methodology. Accessed here on the website.




Return to Top of Page

Afghan War News > Intelligence > Attack the Network

All external sites open up in an new window.  Please report any broken links or inaccuracies in content to the webmaster at


create counter