FM-3-81 Maneuver Enhancement Brigade Download

Page 107 of 188

Synchronize and Coordinate Protection 09 November 2021 FM 3-81 A-7 Foreign intelligence entities (see ATP 2-22.2-1 and ATP 2-22.2-2). Criminal activities. Civil disturbances. Health and safety hazards. CBRN toxic industrial materials. Cyberspace threats. Other relevant aspects of the operational environment. Urban environments. Incident reporting and feedback points of contact. A-19. The threat and hazard assessment results in a comprehensive list of threats and hazards and determines the likelihood or probability of occurrence of each threat and hazard. Table 1-1, page 1-2, shows examples of potential threats and hazards in an AO. In the context of assessing risk, the higher the probability or likelihood of a threat or hazard occurring, the higher the risk of asset loss. CRITICALITY ASSESSMENT A-20. A criticality assessment identifies key assets that are required to accomplish a mission. It addresses the impact of a temporary or permanent loss of key assets or the unit ability to conduct a mission. A criticality assessment should also include high-population facilities (recreational centers, theaters, sports venues) that may not be mission-essential. It examines the costs of recovery and reconstitution, including time, expense, capability, and infrastructure support. The staff gauges how quickly a lost capability can be replaced before providing an accurate status to the commander. The general sequence for a criticality assessment is— Step 1. List the key assets and capabilities. Step 2. Determine if critical functions or combat power can be substantially duplicated with other elements of the command or an external resource. Step 3. Determine the time required to substantially duplicate key assets and capabilities in the event of temporary or permanent loss. Step 4. Set priorities for the response to threats toward personnel, physical assets, and information. A-21. The protection cell staff and working group continuously update criticality assessments during the operations process. As the staff develops or modifies a friendly COA, information collection efforts confirm or deny information requirements. As the mission or threat changes, initial criticality assessments may also change, increasing or decreasing the subsequent force vulnerability. The protection cell members monitor and evaluate these changes and begin coordination among the staff to implement modifications to the protection concept or recommend new protection priorities. PIR, running estimates, MOEs, and MOPs are continually updated and adjusted to reflect the current and anticipated risks associated with the operational environment. VULNERABILITY ASSESSMENT A-22. A vulnerability assessment is an evaluation (assessment) to determine the magnitude of a threat or hazards effect on an installation, personnel, a unit, an exercise, a port, a ship, a residence, a facility, or other site. It identifies the areas of improvement required to withstand, mitigate, or deter acts of violence or terrorism or attacks against threats. The staff addresses who or what is vulnerable and how it is vulnerable against threats. The vulnerability assessment identifies physical characteristics or procedures that render critical assets, areas, infrastructures, or special events vulnerable to known or potential threats and hazards. The general sequence of a vulnerability assessment is— Step 1. List assets and capabilities and the threats against them. Step 2. Determine the common criteria for assessing vulnerabilities. Step 3. Evaluate the vulnerability of assets and capabilities. A-23. Vulnerability evaluation criteria may include the degree to which an asset may be disrupted, quantity of the asset available (if replacement is required due to loss), dispersion (geographic proximity), and key physical characteristics.