Intelligence Concepts — F3EAD (2024)

Home»Posts

March 24, 2015·4 min·Scott J Roberts

One of the most talked-about intelligence concepts in information security today is F3EAD. Standing for Find, Fix, Finish, Exploit, Analyze, and Disseminate, this is a methodology for combining operations (in this case we’re talking about kinetic ops) and the intelligence process. While the Intelligence Cycle & SANS IR cycle are both useful, they are ultimately academic. If the goal is Intelligence-Driven Incident Response, we need to combine intelligence with ops, and that’s where F3EAD shines.

An Aside: Military Terminology in Security
A fundamental discussion that often comes up when you discuss intelligence (and a lot of other parts of information security) is the use of military terminology. This is a divided issue. The fact is that war is the single oldest and most studied adversarial conflict, and while security doesn’t have the gravity of a military conflict, I do find that the military has much to teach us.

F3EAD

Intelligence Concepts — F3EAD (1)

Source: Small Wars Journal - F3EAD: OPS/INTEL FUSION “FEEDS” THE SOF TARGETING PROCESS

F3EAD is about combining the operations cycle with the intelligence cycle so that they both feed each other. This process rose during the wars Afghanistan & Iraq (the second time) the teams involved were special forces (operations) and traditional all source intelligence teams (intelligence). We’ll break this into two major sections:

Operations:

  • Find: The F3EAD process starts with targeting, deciding who the focus of the operation is.
  • Fix: Identify where the adversary is.
  • Finish: Use the processed information to complete a predetermined operational objective.

In a kinetic scenario, this process could start with a special operations team deciding to target a high ranking former regime member. Using available intelligence and telemetry, the team locates that target and initiates the operation to capture the target. After the capture the team may take material related to the capture, including files, computers, and information from interrogations, and pass that to the intelligence team.

Intelligence:

  • Exploit: At this point all information developed during the operations section is collected and enhanced. This can be correlated to the collection and processing steps in the intelligence process.
  • Analyze: The analyze process is the same as in the intelligence process: taking the collected information, developing it further, in this case to support the next find, fix, finish cycle.
  • Disseminate: Share the developed intelligence with relevant stakeholders including operations and other intelligence teams.

Following the operation, the intelligence team then begins their cycle based on the outputs from the operations team. This follows the traditional intelligence cycle process, but the key is the expected input and outputs are meant to enable operations. Thus operations enables the intelligence gathering while the intelligence enables further operations. In most cases, this tight coupling isn’t just based on products, but even putting the teams physically in close proximity to enable this synergy.

A Walk Through the F3EADCycle

Intelligence Concepts — F3EAD (2)

Source: IMDB - Zero Dark Thirty (2012)

Even if you don’t have a team of M-4 wielding SEALs (I know, seems like an oversight), the idea of combining operations with intelligence is the exact goal of that favorite buzz phrase: intelligence driven incident response.

FindVendor X releases a new report about a new threat group operating in your vertical. You use this report as the beginning of your targeting.
FixThe vendor report include indicators, which the incident response team uses to identify a group of compromised hosts. In some cases, depending on resources, an incident response team may enhance these.
FinishThe incident response team remediates the compromised hosts.
ExploitHere’s the key: after the finish/remediation the information collected during the incident response is gathered. This includes the information that started the F3 cycle (in this case the vendor report) but should also include the malware identified during the incident, network captures, information about the infrastructure, & anything and everything identified during the operations piece.
AnalyzeThe intelligence team analyzes all the collected information. Their goal is to develop further targeting. A good example would be identifying other IP addresses associated with C2 domains using a tool like PassiveTotal.
DisseminateThe intelligence developed during the Analyze step is disseminated to other stakeholders. This includes the original operations team.

Takeaways fromF3EAD

At its core, F3EAD speaks directly to two of the biggest challenges with the rise of the Threat Intelligence concept:

  • How is intelligence converted from data into action?
  • How are the results of security team actions converted into ongoing intelligence?

The first question gets nearly all the attention, and is certainly an interesting concept, but the second one is often the most applicable. Incident Response teams looking to improve often ask where to start with threat intelligence, a feed, a product, etc. In my mind the best answer, addressed by F3EAD, is to start with your own incidents. Teams can find amazing value in mining their past incidents, and at a price that beats any threat intelligence product.

More Resources

Intelligence Concepts — F3EAD (2024)

References

Top Articles
Aita For Evicting Tenants Of 22 Years
AdminJoy V2 (kohls admin house gui) - Pastebin.com
Knoxville Tennessee White Pages
Couchtuner The Office
Craigslist Benton Harbor Michigan
Wausau Marketplace
Craigslist In South Carolina - Craigslist Near You
How Far Is Chattanooga From Here
Western Razor David Angelo Net Worth
Mylife Cvs Login
World Cup Soccer Wiki
Cpt 90677 Reimbursem*nt 2023
Jinx Chapter 24: Release Date, Spoilers & Where To Read - OtakuKart
Prosser Dam Fish Count
Who called you from +19192464227 (9192464227): 5 reviews
Yakimacraigslist
Craigslist In Visalia California
3476405416
Account Suspended
Teacup Yorkie For Sale Up To $400 In South Carolina
Accident On The 210 Freeway Today
Vegas7Games.com
Who is Jenny Popach? Everything to Know About The Girl Who Allegedly Broke Into the Hype House With Her Mom
Okc Body Rub
Southland Goldendoodles
How Taraswrld Leaks Exposed the Dark Side of TikTok Fame
Select Truck Greensboro
Orange Park Dog Racing Results
Does Royal Honey Work For Erectile Dysfunction - SCOBES-AR
Angel del Villar Net Worth | Wife
Purdue Timeforge
Redding Activity Partners
Math Minor Umn
Ucm Black Board
Craigslist Free Puppy
Nail Salon Open On Monday Near Me
Bratislava | Location, Map, History, Culture, & Facts
Petsmart Distribution Center Jobs
A Man Called Otto Showtimes Near Amc Muncie 12
Telegram update adds quote formatting and new linking options
Latest Nigerian Music (Next 2020)
One Main Branch Locator
Tyler Perry Marriage Counselor Play 123Movies
Subdomain Finder
Craigslist/Nashville
CrossFit 101
Bridgeport Police Blotter Today
Bonecrusher Upgrade Rs3
Oak Hill, Blue Owl Lead Record Finastra Private Credit Loan
Wieting Funeral Home '' Obituaries
Autozone Battery Hold Down
How To Find Reliable Health Information Online
Latest Posts
Article information

Author: Gov. Deandrea McKenzie

Last Updated:

Views: 5782

Rating: 4.6 / 5 (46 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Gov. Deandrea McKenzie

Birthday: 2001-01-17

Address: Suite 769 2454 Marsha Coves, Debbieton, MS 95002

Phone: +813077629322

Job: Real-Estate Executive

Hobby: Archery, Metal detecting, Kitesurfing, Genealogy, Kitesurfing, Calligraphy, Roller skating

Introduction: My name is Gov. Deandrea McKenzie, I am a spotless, clean, glamorous, sparkling, adventurous, nice, brainy person who loves writing and wants to share my knowledge and understanding with you.