In one of the classes I teach to our military personnel, threat assessment is one of the topics and in the simplest terms it boils down to three considerations: first, what does the enemy want to do to us? Second, what can the enemy do to us? This is distinctly different from the first consideration as intent and capability are often vastly different. The last factor is where is the action most likely to be taken against us? If we compile these three items into one coherent product, a reasonably accurate threat assessment can be produced. After a threat assessment is done, we should consider the consequences of a successful CBRN attack and train not always for the worst case, but for the most likely scenario that will play out (Mauroni, 2010, p
In one of the classes I teach to our military personnel, threat assessment is one of the topics and in the simplest terms it boils down to three considerations: first, what does the enemy want to do to us? Second, what can the enemy do to us? This is distinctly different from the first consideration as intent and capability are often vastly different. The last factor is where is the action most likely to be taken against us? If we compile these three items into one coherent product, a reasonably accurate threat assessment can be produced. After a threat assessment is done, we should consider the consequences of a successful CBRN attack and train not always for the worst case, but for the most likely scenario that will play out (Mauroni, 2010, p