ATP-5-0-2-1 Staff Reference Guide Volume 1 Download
Page 108 of 440
Chapter 2 92 ATP 5-0.2-1 07 December 2020 ATP 2-01.3 Figure 2-23. Threat force organizational chart example Create or Refine Threat Models 2-279. Threat models accurately portray how those forces normally execute operations and how they have reacted to similar situations in the past. This also includes knowledge of threat capabilities based on the current situation. Threat models are initially created by analyzing information in various databases concerning normal organization, equipment, doctrine, and tactics, techniques and procedures. Higher agencies and organizations create some threat models. In immature operational environments or when new threats emerge, intelligence staffs develop new models. Developers use all available sources to update and refine the models. 2-280. Threat characteristic files with information that assists intelligence analysts in making conclusions about operations, capabilities, and vulnerabilities are the most useful sources for updating. Integrating staffs while developing threat models is essential to achieving the most accurate depiction of how a threat conducts operations in ideal situations with no terrain constraints. 2-281. A threat model is an analytical tool that assists in developing situation templates (SITEMPs) during Step 4 of the IPB process. Developing threat models consists of three steps: Convert threat doctrine or patterns of operations to graphics (threat template). Describe the threat's preferred tactics, options, and peculiarities. Identify HVTs. Convert Threat Doctrine or Patterns of Operations to Graphics 2-282. Threat templates graphically portray how the threat might use its capabilities to accomplish its objectives when not constrained by the effects of the operational environment. Threat templates are developed to depict a threat's disposition and actions for a particular type of operation (for example,