Integrate Threat Capabilities into Mission Planning Exercises
Summary
15 of 15
<img src="../../images/exercisesummary398V115.gif" width="760" height="445" border="0">
&scoringAreas=11& &label0=Identify four major global trends and their effect on the operational environment.& &label1=Describe the global threat environment. Describe how it is different from that of the Cold War era.& &label2=Describe asymmetrical methods. Explain the difference between asymmetrical and conventional military methods.& &label3=Identify four available databases containing threat information.& &label4=Retrieve regional and threat-specific information from Intelink or Intelink-S.& &label5=Retrieve regional and threat-specific information from unclassified Internet sources.& &label6=Locate the intelligence estimate within an operations order.& &label7=Derive applicable information from higher headquarters intelligence estimate.& &label8=Identify the most likely threat course of action (COA) and the most dangerous threat COA.& &label9=Identify at least one potential vulnerability in the friendly plan.& &label10=Incorporate threat findings in all mission planning.& &nogo0=Failure to identify current global trends and their effect on your mission could compromise the mission.& &nogo1=Failure to recognize the difference in characteristics of the global threat environment since the Cold War era could compromise the mission.& &nogo2=Failure to adjust mission planning to reflect differences in asymetrical and conventional planning could compromise the mission.& &nogo3=Failure to access the databases available for threat information could compromise the mission.& &nogo4=Failure to retrieve current information from Intelink or Intelink-S could compromise the mission.& &nogo5=Failure to search for an obtain current regional and threat-specific information from unclassified internet sources could compromise the mission.& &nogo6=Failure to locate the intelligence estimate within the operations order would compromise the mission.& &nogo7=Failure to derive applicable information from the intelligence estimate would compromise the mission.& &nogo8=Failure to identify the most likely threat course of action, and the most dangerous threat course of action could compromise the mission.& &nogo9=Failure to identify the vulnerabilities within the friendly plan could compromise the mission.& &nogo10=Failure to incorporate all threat findings into mission planning would compromise the mission.& &goText=You have completed this exercise correctly. Click the Options button, select Exit and then select another task.& &nogoText=You did not complete this exercise successfully. Click the Options button, select Exit, and then select Integrate Threat Capabilities Into Mission Planning to review this material.&
Previous page
Click here to go to a specific page within the topic
Click here to view additional information for this course
Click here to hear the audio clip for the current page
Click here to view the video clip for the current page
Click here to view additional information for this page
Click here to view the options menu
Click here to go back to the most previously viewed page