Member-only story
The F3EAD Intelligence Loop Explained: A Complete Guide

Cyber threat intelligence (CTI) is built on models and frameworks that allow you to turn raw data into actionable intelligence. One of the key operational models you will use as a CTI analyst is the F3EAD intelligence loop.
This guide will teach you how to use this model to structure your day-to-day intelligence work, from finding the needed data, exploiting it with specialist skill sets, and disseminating it with key stakeholders. You will learn where the F3EAD loop fits into the CTI process, how to complete each of its six stages, and see the model in action with practical examples.
The F3EAD loop is a fundamental model in CTI that you will use daily to fulfill your intelligence requirements. Let’s jump in and explore it!
The complete version of this article can be viewed for free on: https://kravensecurity.com/f3ead-loop
What is the F3EAD Intelligence Loop?
The F3EAD loop is an alternative intelligence loop to the traditional CT lifecycle. It was initially created for military, counterterrorism, and special forces operations to target high-value individuals for “kill or capture.”
This target-centric approach empowered the fusion of intelligence analysis with military operations, providing holistic thinking, flatter command structures, and more informed decision-making. That said, its value extends beyond military operations.
F3EAD has become a popular intelligence loop within the CTI industry to more accurately define the operational tasks required to fulfill an intelligence requirement. CTI has replaced “kill or capture” with “remove or restrict.”

The CTI lifecycle is excellent for providing a high-level overview of generating an intelligence product, from planning to dissemination. However, it fails to include key stakeholders in the intelligence process, define key operational tasks, or incorporate the specialist knowledge and skills required to fulfill some intelligence requirements.