Integrate Threat Capabilities into Mission Planning Exercises
Summary
15 of 15
&scoringAreas=11&
&label0=Identify four major global trends and their effect on the operational environment.&
&label1=Describe the global threat environment. Describe how it is different from that of the Cold War era.&
&label2=Describe asymmetrical methods. Explain the difference between asymmetrical and conventional military methods.&
&label3=Identify four available databases containing threat information.&
&label4=Retrieve regional and threat-specific information from Intelink or Intelink-S.&
&label5=Retrieve regional and threat-specific information from unclassified Internet sources.&
&label6=Locate the intelligence estimate within an operations order.&
&label7=Derive applicable information from higher headquarters intelligence estimate.&
&label8=Identify the most likely threat course of action (COA) and the most dangerous threat COA.&
&label9=Identify at least one potential vulnerability in the friendly plan.&
&label10=Incorporate threat findings in all mission planning.&
&nogo0=Failure to identify current global trends and their effect on your mission could compromise the mission.&
&nogo1=Failure to recognize the difference in characteristics of the global threat environment since the Cold War era could compromise the mission.&
&nogo2=Failure to adjust mission planning to reflect differences in asymetrical and conventional planning could compromise the mission.&
&nogo3=Failure to access the databases available for threat information could compromise the mission.&
&nogo4=Failure to retrieve current information from Intelink or Intelink-S could compromise the mission.&
&nogo5=Failure to search for an obtain current regional and threat-specific information from unclassified internet sources could compromise the mission.&
&nogo6=Failure to locate the intelligence estimate within the operations order would compromise the mission.&
&nogo7=Failure to derive applicable information from the intelligence estimate would compromise the mission.&
&nogo8=Failure to identify the most likely threat course of action, and the most dangerous threat course of action could compromise the mission.&
&nogo9=Failure to identify the vulnerabilities within the friendly plan could compromise the mission.&
&nogo10=Failure to incorporate all threat findings into mission planning would compromise the mission.&
&goText=You have completed this exercise correctly. Click the Options button, select Exit and then select another task.&
&nogoText=You did not complete this exercise successfully. Click the Options button, select Exit, and then select Integrate Threat Capabilities Into Mission Planning to review this material.&

