Back to all activities

Threat Identification

Summary

Considerations

    Walk Through

      Footnotes

      • 1 ["Likelihood: Chapter 2.7 p. 47 - Operational Security Management in Violent Environments"](http://www.odihpn.org/download/gpr\_8\_revised2pdf#page=38)
      • 2 ["Impacts: Chapter 2.7 p. 46 - Operational Security Management in Violent Environments"](http://www.odihpn.org/download/gpr\_8\_revised2pdf#page=38)