1. Identify threat composition to include how the enemy is organization and the type of leadership structure used. Assess the threat's organization to understand if they are organized based on a bottom-up model with multiple subordinate units that operate independently or is the threat organized based on a top-down model with centralized leadership that makes all of the decisions for subordinate units.
2. Identify the disposition of threat forces to include detailed information on the location of enemy positions. If time is available a reconnaissance of the threat position should occur over a 24-48 hour period to assess position rotation schedules, established routines, threat force size and observe if there are adjacent units associated with the threat force.
3. Identify the strength of the threat force based on the number of individuals in the threat element. Strength assessment should also include the enemy's status of morale, training, discipline and its impact on the threats will to
4. Identify threat capabilities based on the maximum effective range for each weapon system, vehicles, communication systems, night vision, optics and other key assets that can be used against friendly forces. Threat weapon system ranges provide details on where friendly positions should be located and at what point additional friendly force protection measures should be incorporated. Special consideration should be given to the threat's communication systems. Are they using radio or wired communication in established positions. If communication is used the threat force is able to maneuver or adjust forces during contact, greatly increasing their lethality. If no communication systems exist their combat effectiveness is diminished.
5. Provide information on recent threat activity that can include position improvements, security patrols near a defensive position, and resupply actions.
6. Identify the threat's likely course of action. Is the threat capable and equipped to sustain a lengthy fight? What is the likelihood of surrender if leadership/communications are made ineffective?
Finally, if a threat force is observing your group they are less likely to attack an organization that displays a high level of discipline in appearance, perimeter organization, morale and leadership. Most threats are likely to bypass groups
that are well organized and equipped. This is most often seen in operations overseas where insurgents strike military forces that lack discipline, morale and leadership. Any force is more likely to strike an opponent that slings their weapon over a shoulder vs. an opponent who has his weapon always at the ready.