Back to all activities
Threat Identification
Summary
Considerations
Walk Through
Footnotes
- 1 ["Likelihood: Chapter 2.7 p. 47 - Operational Security Management in Violent Environments"](http://www.odihpn.org/download/gpr\_8\_revised2pdf#page=38)
- 2 ["Impacts: Chapter 2.7 p. 46 - Operational Security Management in Violent Environments"](http://www.odihpn.org/download/gpr\_8\_revised2pdf#page=38)