AR 381-11 Threat Support to U.S. Army Force, Combat,

and Materiel Development

Headquarters *Army Regulation 381-11 Department of the Army Effective 14 April 1986 Washington, DC 12 March 1986 Military Intelligence AR 381-11 Threat Support to U.S. Army Force, Combat, and Materiel Development AR 381-11 Front Matter This UPDATE printing By Order of the Sec- publishes a revision retary of the Army: which is effective JOHN A. WICKHAM, JR. 14 April 1986. Be- General, United cause the structure States Army of the entire re- Chief of Staff vised text has been Official: reorganized, no at- R. L. DILWORTH tempt has been made Brigadier General, to highlight changes United States Army from the earlier The Adjutant General regulation dated 15 August 1981. Summary. This regulation governs threat support to the U.S. Army force, combat, and materiel development process. It provides guidance on the development of threat support programs, use of approved intelligence products, responsibilities of the Office of the Assistant Chief of Staff for Intelligence threat integration staff officers, and the functions of threat coordinating groups. Applicability. This regulation applies to elements of the Active Army engaged in force, combat, and materiel development activities. It does not apply to the Army National Guard (ARNG) or the U.S. Army Reserve (USAR). Impact on New Manning System. This regulation does not contain information that affects the New Manning System. Internal control systems. This regulation is subject to the requirements of AR 11-2. It contains internal control provisions but does not contain checklists for conducting internal control reviews. These checklists are being developed and will be published at a later date. Supplementation. Supplementation of this regulation and establish- ment of forms other than DA forms are prohibited, unless prior approval is obtained from HQDA (DAMI-FIT), WASH DC 20310-1086. Interim changes. Interim changes to this regulation are not official unless they are authenticated by The Adjutant General. Users will destroy interim changes on their expiration date unless sooner superseded or rescinded. Suggested improvements. The proponent agency of this regulation is the Office of the Assistant Chief of Staff for Intelligence. Users are invited to send comments and suggested improvements on DA Form 2028 (Recommended Changes to Publications and Blank Forms) directly to HQDA (DAMI-FIT), WASH DC 20310-1086. Distribution. Distribution of this issue has been made in accor- dance with DA Form 12-9A requirements for 381 series publications. The number of copies distributed to a given subscriber is the num- ber of copies requested in Block 339 of the subscriber's DA Form 12-9A. AR 381-11 distribution is D for Active Army, none for ARNG, and none for USAR. This regulation supersedes AR 381-11, 15 August 1981. AR 381-11 Chapter 1 General AR 381-11 1-1. Purpose This regulation prescribes policies, responsibilities, and procedures for providing threat support to the Army's force, combat, and materiel development process. It provides guidance on the purpose, content, and focus of threat assessments used in support of force, combat, and materiel development activities. This regulation is intended to ensure that threat support helps guide the Army's force modernization effort. AR 381-11 1-2. References Required and related references are listed in appendix A. AR 381-11 1-3. Explanation of abbreviations and terms Abbreviations and special terms used in this regulation are explained in the glossary. AR 381-11 1-4. Responsibilities a. The Assistant Chief of Staff for Intelligence will- (1) Establish threat support policy. (2) Approve threat documentation designated for Army Systems Acquisition Review Council (ASARC) or Defense Systems Acquisition Review Council (DSARC) decision (table 2-1) and studies in support of the Headquarters, Department of the Army (HQDA) decision process. (3) Review and monitor the threat support process to ensure consistent application of threat in support of major and DAP systems and HQDA-directed studies. (4) Review and validate critical intelligence parameters (CIPs). (5) Provide for representation to special task forces (STF), special study groups (SSGs), and study advisory groups (SAGs) for studies requiring threat consideration. (6) Serve as a member of the Army System Acquisition Review Council. (7) Establish and chair HQDA threat coordinating groups (TCGs) for major and Designated Acquisition Program (DAP) systems and determine the appropriateness for establishing HQDA TCGs for other programs or studies. (8) Review and approve all aspects of threat portrayed during the development of U.S. Army Training and Doctrine Command (TRADOC) standard scenarios. b. The Deputy Chief of Staff for Operations and Plans (DCSOPS) will- (1) Coordinate with the Office of the Assistant Chief of Staff for Intelligence (OACSI) on requirements for threat support. (2) Ensure that the following materiel requirements documents which are prepared at various points in the life cycle of a major or DAP system contain, reference, or reflect, HQDA-approved threat assessments. (a) Justification for Major System New Start (JMSNS). (b) Operational and Organizational (O&O) Plan. (c) Letter of Agreement (LOA). (d) Required operational capability (ROC). (e) Joint Service Operational Requirement (JSOR). (3) Coordinate with OACSI on appropriate threat guidance and policies for cost and operational effectiveness analysis (COEA). (4) Coordinate with OACSI for threat representation on each special task force. (5) Coordinate with OACSI for the integration of Army-approved threat in user test programs, including operational tests (OTs), force development testing and experimentation (FDTE), and joint operational testing. (6) Participate in HQDA level TCGs for the coordination of threat support to the force, combat, and materiel development process. (7) Coordinate with OACSI for the integration of threat support guidance in all study directives, and analysis and guidance documents. c. The Deputy Chief of Staff for Research, Development, and Acquisition (DCSRDA) will- (1) Coordinate with OACSI on research, development, and acquisition requirements for threat support. (2) Ensure that the following documents that are prepared to support milestone decision reviews for major and DAP systems contain or reference HQDA-approved threat assessments: (a) System concept paper (SCP). (b) Decision coordinating paper (DCP). (c) Integrated program summary (IPS). (3) Provide for the integration of threat support in all study directives and guidance documents from earliest concept stages. (4) Coordinate with OACSI in developing the Long-range Research, Development, and Acquisition Plan (LRRDAP) to ensure that intelligence assets are programmed to support long-range planning initiatives, and that the plan reflects consideration of the threat. (5) Coordinate with OACSI to ensure that approved threat statements and appropriate threat guidance and policies are present in the management of Product Improvement Proposals (PIPs). (6) Participate in HQDA-level TCGs for the coordination of threat support to the force, combat, and materiel development process. (7) Ensure that approved intelligence data and threat assessments are integrated into developmental testing. d. The Commanding General, U.S. Army Training and Doctrine Command will- (1) In coordination with the U.S. Army Materiel Command (AMC), prepare, review, and forward to OACSI for DA approval all threat statements developed for each JMSNS, O&O Plan, LOA, ROC, and JSOR for major and DAP systems. (2) In coordination with AMC, prepare, review, and approve all threat statements developed for each O&O Plan, LOA, and JSOR for Department of the Army (DA) in-process review (DAIPR) and in- process review (IPR) level systems. Provide information copies to OACSI and U.S. Army Intelligence Agency (USAIA). (3) Prepare, in coordination with AMC and the appropriate HQDA TCG, and forward to OACSI for approval all System Threat Assessment Reports (STARs) for major and DAP systems. (4) Develop, in coordination with AMC and OACSI, command threat support requirements to include the identification of CIPs for specific programs and studies. (5) Develop, produce, and coordinate the threat portion of TRADOC standard scenarios and forward to OACSI for approval. (6) Provide for threat representation on each special study group and identify threat support requirements to OACSI. (7) Participate in DA-level TCGs. (8) In coordination with AMC, establish appropriate TCGs to provide threat support to DAIPR and IPR level systems. (9) Coordinate with OACSI to ensure the provision of appropriate threat support to each mission area analysis (MAA). (10) Prepare, in coordination with AMC and the appropriate HQDA TCG, a threat support plan for each major and DAP system. (11) Prepare, in coordination with AMC, a threat support plan and the STAR for DAIPR and IPR systems. (12) Ensure the integration of approved threat in user testing programs to include the preparation of test threat support packages in response to stated tester requirements. e. The Commanding General, U.S. Army Materiel Command will- (1) In coordination with TRADOC, prepare, review, and forward to OACSI for HQDA approval all threat statements developed for each SCP, DCP, and IPS for major and DAP systems. (2) In coordination with TRADOC, prepare, review, and approve all threat statements developed for each SCP, DCP, and IPS for DAIPR and IPR level system and provide information copies to OACSI and USAIA. (3) Develop, in coordination with TRADOC and OACSI, command threat support requirements to include identification of CIPs for specific programs and studies. (4) Coordinate with TRADOC the preparation of STARs for major, DAP, DAIPR, and IPR systems. (5) Ensure the integration of approved threat in developmental test programs. (6) Participate in DA level TCGs. (7) In coordination with TRADOC, establish appropriate TCGs to provide threat support for DAIPR and IPR level systems. (8) Participate with TRADOC in the preparation of threat support plans for major, DAP, DAIPR, and IPR systems. f. The Commander, U.S. Army Intelligence Agency will- (1) Produce current and projected general and scientific and technical intelligence (S&TI). (2) Produce intelligence documents and S&TI quantitative data in automated format to support specific force, combat, and materiel development programs. (3) Participate in TCGs to support the force, combat, and materiel development process. (4) Assist in the development and the review of the application of threat in selected combat and materiel developers' acquisition programs, studies, developmental and operational tests, and combat simulations and wargames. This will include the Army Development and Acquisition of Threat Simulators (ADATS) Program. (5) Provide representatives to work groups and TCGs formed to support HQDA and major Army command (MACOM) directed studies and analyses. (6) Develop and maintain threat data base as directed by OACSI. (7) Develop threat analysis and forecasting methodologies. (8) Assist developers in the development of intelligence production requirements and the definition of critical intelligence parameters. g. The Director, Armed Forces Medical Intelligence Center will- (1) Produce current and projected general medical and scientific and technical intelligence. (2) Produce intelligence documents to support specific force, combat, and materiel development programs. (3) Participate in DA-level TCGs for the coordination of threat support to the combat and materiel development process. h. The Commanding General, U.S. Army Operational Test and Evaluation Agency (OTEA) will- (1) Coordinate test planning with the appropriate threat approval authority (table 2-1) to ensure that an appropriate battlefield environment is portrayed. (2) Participate in TCGs to ensure that threat requirements to support testing are identified as early as possible after program initiation. i. The Director, U.S. Army Concepts Analysis Agency (CAA) will- (1) Develop, in coordination with OACSI and DCSOPS, threat support requirements for theater level wargaming. (2) Participate in DA level TCGs involving force development issues. (3) Coordinate with OACSI to ensure the provision of appropriate threat support to HQDA-sponsored force development studies. j. Other developers and testers not specifically identified in this regulation will assume the same basic responsibilities and relationships with the threat support agencies as TRADOC and AMC. AR 381-11 1-5. Policies DOD Instruction 5000.2 contains guidance on threat support to materiel acquisition. It states that the effectiveness of a proposed weapon system in its intended threat environment must be a fundamental concern of the acquisition effort and must be considered by program managers from the outset. DIA Regulation 55-3 contains detailed guidance on threat support to major system acquisitions. Policies for threat support to force, combat, and materiel development as they pertain to the Army are as follows: a. Consideration of threat is a command responsibility. Commanders at all levels will ensure that approved threat is applied and integrated into force, combat, and materiel development programs. b. Threat will be derived from Army- and DIA-approved scientific and technical intelligence (characteristics, capabilities, and limitations of foreign equipment) and general intelligence (organization, doctrine, and tactics of threat forces). The reformatting of approved intelligence data to meet threat requirements is the responsibility of the proponent threat support office. c. The U.S. Army Intelligence Agency will produce both general and scientific and technical intelligence in response to approved requirements. d. The combat and materiel development commands will prepare required threat documentation, to include threat assessments, to support the specific combat and materiel development activities for which those commands are responsible. e. Intelligence producers will provide threat support in response to developers' guidance and defined requirements for all force, combat, and materiel development-related activities including Planning, Programing, and Budgeting System (PPBS), mission area analysis, cost and operational effectiveness analyses, development tests, and operational tests. f. The senior intelligence officer (SIO) of each command and activity involved in the force, combat, and materiel development process will review and approve threat assessments written in support of command missions before forwarding them to the next higher level of command. AR 381-11 Chapter 2 Threat Support AR 381-11 Section I Threat Support Programs AR 381-11 2-1. General a. The purpose of threat support programs is to ensure that force, concepts, doctrine, training, organization, and materiel systems which most effectively and efficiently respond to the evolving threat environment are developed. Threat support must be timely, consistent, and continuous to achieve this purpose. (1) Timeliness ensures that threat considerations are provided to combat and materiel developers at critical points in the combat and materiel development cycle in order to properly influence the requirement for and development of force, concepts, doctrine, training, organization, and materiel systems. (2) Consistency ensures that multiple users work from a standard, approved intelligence baseline. (3) Continuous threat support means that the impact of the threat is considered throughout the life cycle of a materiel system, from its earliest research and development phase through and including postdevelopment product improvements. It assures that organizations and doctrinal developments are supported throughout their conceptual phases and after implementation. b. A threat support program consists of approved Department of Defense (DOD) and Army intelligence products (documents, data bases, concepts, scenarios) and the procedures designed to respond to threat requirements that are not fulfilled by published intelligence products. c. Threat support plans will be initiated early in the combat development process to support the conduct of MAA. This ensures that the impact of the threat is considered and applied during the process which may lead to the identification of a requirement for a specific materiel system or a change in organization, doctrine, or training. Threat support plans also will be prepared to support the development of all force, combat, and materiel development programs and studies. d. At the start of a study or project, the proponent will identify threat support requirements. The senior intelligence officer at each command level is responsible for coordinating and providing threat support to combat and materiel developers and is responsible for the application of the threat in support of programs and studies conducted by his or her command. e. The relationship between a U.S. system or program and the specific threat is dynamic and reflects changes in tactics, doctrine, and technological advancements. SIOs of proponent commands will maintain a life cycle threat audit trail for each program. f. The basis or start point for developing the threat to an MAA or specific program, system, or study is the Soviet Battlefield Development Plan (SBDP). If the SBDP is not sufficient for developing a system specific threat, the proponent will use the intelligence products defined in paragraph 2-2 or forward an intelligence production requirement through command channels for tasking to the USAIA, in accord with AR 381-19. The OACSI threat integration staff officer (TISO) will coordinate and assist in the development of threat support requirements, and the application of the threat in support of the development process. g. Specific guidance for the preparation of threat assessments is contained in paragraph 2-6. AR 381-11 2-2. Intelligence products Intelligence products are publications and automated data bases that, as a group, address foreign force capabilities in the near- term (0-5 years), midterm (5-10 years), and far-term (10-20 years). These products constitute Army-approved intelligence for use in developing threat assessments and will be used for satisfying system specific threat support requirements. To ensure consistency throughout the Army intelligence and development communities, HQDA(DAMI-FIT) will publish semiannual listings of approved intelligence products for use in supporting each mission area. Deviations from intelligence contained in these products will only be approved by OACSI. Deviations require conspicuous notation in analysis documentation indicating that a threat excursion was used. The SBDP and other approved intelligence produced by the Army and Defense Intelligence Agency (DIA) will be used for threat development. These baseline products are essential for sustaining the provision of consistent threat throughout the acquisition process, and represent the start point for assessments prior to initiating specific requests for support. AR 381-11 2-3. Threat simulation within Army analyses Army analyses make extensive use of computerized combat simulations. These simulations are used to evaluate capabilities and determine user and resource requirements in the context of complete force interactions and varying battlefield requirements. To ensure the validity of Army analyses, computerized combat simulations must appropriately represent threat force combat, combat support, and combat service support in a consistent manner. The agency conducting the analysis must know the appropriate models to use as well as their strengths, weaknesses, and limitations. The validity of threat force activity depends on model sensitivity, data input, and decision logic incorporated within the various models employed to conduct the analysis. To achieve threat consistency, commonality, and accuracy within models, the following procedures apply: a. Intelligence data. The references identified in paragraph 2-2 will be used for threat analysis. Deviations from the intelligence contained within these references may be used for interactive analysis by Army analysis activities; however, such deviations will be documented in the analysis and identified in the assumption portion of all analyses. Study directors will be informed of such deviations and their potential impact. b. Combat simulation use. Studies and analyses conducted by HQDA and MACOMs often require the use of combat simulations. MACOMs and supporting intelligence officers will establish procedures ensuring that threat data used in the simulations are accurate and current, and portray threat activities and events correctly. TCGs and existing data bases will be used to satisfy the requirement for current and accurate data inputs. Validation of threat portrayed in models under Army Model Improvement Program (AMIP) (AR 5-11) hierarchy of models is the responsibility of OACSI (DAMI-FIT). Validation of threat portrayed in all other models is the responsibility of each MACOM headquarters. Problem areas and events that cannot be portrayed accurately will be fully documented and furnished to OACSI (DAMI-FIT) for approval through the chain of command. Deviations from OACSI-approved scenarios and threat data will also be forwarded to OACSI (DAMI-FIT) for approval through the chain of command. These problems will be identified at each milestone meeting or IPR meeting for consideration by study members. Documentation will include, as a minimum, assumptions, decision rules, uses, limitations, data required, and data currently stored. c. Combat simulation development. Combat simulations being developed will be fully documented. MACOMs, contract monitors, and intelligence offices supporting these efforts will establish procedures for reviewing threat data and decision rules for accuracy, currency, and correct portrayal of threat activities and events. Existing data bases and intelligence resources will be used to satisfy the requirement. This regulation and AR 381-19 outline procedures for tasking intelligence resources. Validation of threat portrayal in existing models under the AMIP hierarchy of models is the responsibility of OACSI (DAMI-FIT). Validation of threat portrayed in all other models is the responsibility of each MACOM headquarters. Problem areas and events that cannot be portrayed accurately, or deviate from threat guidance, will be identified and fully documented for approval by OACSI (DAMI-FIT). Those identified areas will become agenda items at milestone meetings and program review meetings in order that participants may better understand the capabilities, limitations, and approved deviations of the combat simulations. Documentation will include, as a minimum, assumptions, decision rules, limitations, data required, and data stored. d. Scenario development. Army analytic agencies require basic guidelines regarding precursory events, time lines, and threat employment concepts in addition to data on threat force structure and weapon systems characteristics. To promote and achieve accuracy, commonality, and consistency within Army analyses, the following guidelines apply to the development of scenarios for threat forces: (1) The annual DOD Defense Guidance (DG) provides the Services with a plan for the development of the necessary military capabilities to maintain the Nation's security. It will be used to begin development of scenarios intended to support the force and materiel development processes. The DG contains a planning scenario intended to- (a) Provide a general illustrative sequence of events upon which to base force development planning for the future 10-year timeframe and to assess risks to programed forces. (b) Provide a common set of U.S. friendly force assumptions for use by the Services in computing the readiness, sustainability, mobility, and modernization of resources. (2) OACSI will review the DG assumptions for impact on threat and provide scenario development guidance at the beginning of each year. (a) TRADOC. TRADOC standard scenarios will be used in studies and analysis to identify the Army force modernization needs encompassing organization, doctrine, training, and materiel. The threat scenarios developed by TRADOC and approved by OACSI through timely IPRs, will serve as the base for Army combat and materiel development studies, unless otherwise directed by HQDA. TRADOC will use OACSI-approved threat data and operational concepts to develop standard scenarios. All TRADOC standard scenarios will be reviewed annually to ensure that they are consistent with Army guidance. Army schools, centers, and activities involved in force and materiel development will use this approved scenario for analyses. If threat excursions are employed, they will be highlighted clearly in study reports. (b) U.S. Army Concepts Analysis Agency. OACSI guidance to CAA on global force employment scenarios will be based on specific study and model requirements. The scenarios developed will provide a common threat basis for annual planning and programing studies conducted for the HQDA Staff. Data will be provided to CAA by OACSI (DAMI-FIT). OACSI will review results of the analysis as appropriate to ensure that intelligence data on threat doctrine and force employment are logical and consistent. AR 381-11 2-4. Threat integration staff officer (TISO) a. A TISO is designated by the ACSI to function as the HQDA threat integration coordinator for designated mission areas, programs, and materiel systems. The TISO represents OACSI on all aspects of threat support throughout the life cycle or study process. The TISO system complements the HQDA force integration staff officer (FISO) and Department of the Army system coordinator (DASC) system and is designed to foster close coordination among the intelligence community, MACOMs, and Army Staff agencies to ensure the timely integration of threat into the materiel development and acquisition process. The TISO system supplements existing management procedures but does not relieve Army Staff agencies and MACOMs of established responsibilities. b. The responsibilities of the TISO are as follows: (1) Represent the ACSI and serve as primary HQDA Staff point of contact for threat integration. (2) Coordinate the implementation of Army policy relating to threat support. (3) Establish and manage TCGs for Army MAAs, major and DAP systems, and selected HQDA studies. (4) Provide timely HQDA threat guidance to those agencies and commands responsible for combat and materiel development. (5) Coordinate DA approval for all threat assessments written or oral to support major and DAP systems and selected studies. (6) Coordinate DIA validation of threat assessments written to support systems requiring DSARC decision review. (See DIA Reg 55-3.) (7) Direct the threat support process to ensure consistent application of intelligence to major and DAP systems. (8) Maintain a listing of critical intelligence parameters that impact upon the effectiveness, survivability, or security of the U.S. system. Forward CIPs to DIA for incorporation into national collection plans. (9) Coordinate appropriate OACSI participation to special task forces and special study groups for MACOM managed studies. (10) Assist combat and materiel developers and the test and evaluation community in generating and articulating requirements for threat support. (11) Coordinate with DOD, DIA, and other Service intelligence agencies on all aspects of threat support to Army specific or joint Service programs. (12) In coordination with DCSOPS and DCSRDA, review threat statements or assessments contained in HQDA requirements, decision, and program documents. (13) Monitor use of threat data during development and operational test and evaluation phases of the materiel development cycle for major and DAP systems to ensure maximum benefit from knowledge of the threat environment. (14) Establish liaison and maintain close coordination with Army Staff agencies, MACOMs, testing agencies, and other agencies to assure that threat support is timely, consistent, and continuous throughout the life cycle process. (15) Monitor and ensure quality control of intelligence production requirements in response to materiel development threat requirements. (16) Recommend as appropriate the establishment of MACOM chaired TCGs. (17) Represent HQDA at MACOM level TCGs if requested and appropriate. (18) Attend formal and informal program reviews in the course of materiel life cycle, and determine impact of threat considerations on the progress of system development. c. OACSI (DAMI-FIT) is the approving authority for either establishing or ending TISO monitorship of systems. Generally, all programs designated as major or DAP systems will be assigned a TISO. Other nonmajor systems will be assigned TISO monitorship on an ""as required'' basis with the approval of OACSI (DAMI-FIT). AR 381-11 2-5. Threat coordinating groups (TCGs) a. A TCG is an integrating body between the Army's combat and materiel development activities and the intelligence community to coordinate the provision of timely, consistent, and approved threat support throughout the life cycle or study process. Through the development and implementation of threat support plans, the TCG coordinates the identification, validation, and fulfillment of threat requirements supporting each system or program. b. The purpose of the TCG is to ensure that all appropriate organizations are informed of the development/execution of the threat support plan, pertinent threat issues, and means for resolution and that they are mutually supportive of the overall effort. The preparation of threat assessments associated with the project or study remain the responsibility of the developer. The TCG chairman will coordinate the approval of threat assessments that are based upon the intelligence data provided in response to user requirements. c. There are two types of TCGs, system specific and mission area. System specific TCGs coordinate threat support requirements for specific programs. For each major and Designated Acquisition Program, HQDA (DAMI-FIT) will normally establish and chair a TCG. Other programs of particular DA interest may also require a DA level TCG. MACOMs will establish TCGs for nonmajor programs as required. The mission area TCG will be established to coordinate threat support requirements for the MAA process. MAA TCGs will be established by TRADOC. The MAA TCG will serve as the transition vehicle to system or study specific TCGs, at either HQDA or MACOM level. d. For new programs, system specific TCGs will be formed as early as possible in the life cycle process, but not later than the submission of the JMSNS for major programs or for DAPs. Major and DAP systems which have already passed their production milestones will be considered for TCG support, although priority will be given to new programs and those nearing milestone decision reviews. e. Membership of each HQDA-managed TCG will consist of representatives from the HQDA Staff, combat and materiel development commands, OTEA, and the intelligence community. Representatives from DIA and other Services will be invited to participate in a TCG if it is a joint program with Army as lead Service or if the TCG needs that Service expertise. f. The functions of system specific and mission area TCGs are as follows: (1) System specific TCGs. (a) Assist the combat and materiel developers in articulating their threat requirements and facilitating the resolution of these requirements from the intelligence community. (b) Assist in the development of a comprehensive threat support plan based on stated user needs, regulatory requirements, and intelligence resources. (c) Develop for the user a comprehensive baseline of intelligence products from appropriate approved intelligence documents. (d) Coordinate and review the combat and materiel developers' critical intelligence parameters and ensure the development of intelligence production requirements in response to identified CIPs. (e) Review intelligence data and threat portrayed in the concept formulation process and provide recommendations to the appropriate agencies. (f) Review wargaming models for correct application of threat. (g) Coordinate and review threat support for developmental and operational testing to include use of scenarios and simulators (that is, ADATS). (h) Coordinate and review the STAR and threat portions of program management documents, such as the JMSNS, SCP, DCP, COEA, and TSP. (2) Mission area TCGs. (a) Provide threat support for the MAA process. (b) Integrate the results of threat support for specific systems into the total MAA. (c) Provide for transition of threat support from the MAA to appropriate HQDA or MACOM TCGs established to support major and DAP systems. AR 381-11 2-6. Threat assessments a. Documents required for the systems acquisition process are known as program management documents (PMD) and are divided into the following three categories: (1) Requirements documents. (2) Decision documents. (3) Program documents. b. The proponent responsible for developing a specific requirement, decision, or program document will also write the required threat assessment for that document (table 2-1). The threat assessment will provide a summary of the current and projected threat and targets and missions of the proposed system and will emphasize the interactive effects of the system and threat. c. When drafting threat assessments, the intelligence office supporting the developer will use Army and DIA-approved intelligence products as given in paragraph 2-2. d. For assistance in preparing a PMD threat assessment to support a major or DAP system, threat support requirements will be forwarded through command channels to OACSI (DAMI-FIT). The TISO, with the assistance and participation of the appropriate TCG, will assist in identifying relevant existing intelligence documents or by tasking new intelligence production in accord with AR 381-19. e. The appropriate MACOM headquarters will be responsible for coordinating the preparation of PMD threat assessments to support DAIPR or IPR level systems. f. Threat assessments will be written at the lowest possible classification consistent with user needs. More highly classified supplements will be developed if necessary for program decision. If a threat assessment must be released to the North Atlantic Treaty Organization (NATO), a specific country, or a group of countries, it will be prepared in coordination with DIA. OACSI will coordinate this effort. g. Approval authorities for PMD threat assessments are indicated in table 2-1. Threat assessments for major and DAP systems will be forwarded through command channels to HQDA (DAMI-FIT), WASH DC 20310-1086, for review and approval. h. A draft of the complete program management document will accompany the threat assessment when it is forwarded for review and approval. i. OACSI will forward threat assessments written for materiel systems requiring DSARC review to DIA for validation. In the case of a threat assessment prepared for an Army lead joint Service program, OACSI will coordinate the assessment with the other Services involved before submitting it to DIA. j. Threat assessments submitted for DA approval will be footnoted to indicate the sources for data. This is required to expedite the approval process. k. See appendix B for information on the content of PMD threat assessments. AR 381-11 2-7. System Threat Assessment Report (STAR) a. General. The STAR summarizes the approved threat provided to combat and materiel developers of a specific system. It provides an assessment of the enemy's capabilities to neutralize or degrade a specific U.S. system or system concept as determined by the interactive analysis. This report is RCS exempt in accord with AR 335-15, paragraph 5-2e(2). b. Timing. The initial STAR will be prepared in time to support a milestone I decision. It will be prepared in concert with the concept formulation process and will be updated before each subsequent milestone decision. Significant changes in the threat between the time a STAR has been approved and the arrival of the next milestone will require that the STAR be revised to reflect the threat actually used in the program. c. Structure. (1) The STAR will contain the following four major sections: (a) A description of the U.S. system or system concept. (b) Threat environment in which the U.S. system is to operate, including targets when appropriate. (c) Specific threats that will degrade or neutralize the U.S. system's effectiveness during its operational lifetime. (d) Reasonably expected reactions to development and deployment of the U.S. system. (2) The approved intelligence supporting the STAR will be summarized rather than republished in its entirety. This reduces the length of the STAR to about 25-30 pages. (3) Suggested format guidance for the STAR is at appendix C. d. Content. (1) The system specific threat will focus on quantifiable threat capabilities relative to the mission and specific performance parameters of the U.S. system. It will describe plausible hostile developments and not simply present technological or mirror image projections. (2) Conclusions will be based on approved DOD intelligence products. Other analyses, however, are acceptable for the far term, as long as the rationale is included and they are reasonable projections of accepted data. (3) Once CIPs have been identified, STAR updates will focus on related threat intelligence. (4) Appendixes will be developed as necessary to support assessments made in the body of the STAR. An appendix will be developed listing critical intelligence parameters. e. Approval. OACSI will approve STARs for major and DAP systems. A minimum of 20 days is required for OACSI approval. OACSI will obtain DIA validation of STARs for major programs to DSARC milestone reviews. HQ TRADOC and HQ AMC will approve STARs for DAIPR and IPR level systems and provide information copies of MACOM-approved STARs to HQDA (DAMI-FIT). f. Classification. STAR classification will be limited to SECRET. Higher level supplements may be added as needed. g. References. (1) The STAR will be annotated by paragraph to show the sources for data. This is required to expedite the approval process. (2) A bibliography will be included in the STAR which will list all data sources used in preparation of the document. AR 381-11 2-8. Operations security (OPSEC) Request for OPSEC support will be forwarded through command channels in accord with AR 530-1. AR 381-11 2-9. Special Access Programs (SAPs) Threat support for SAPs will follow the same policies and procedures established for systems and programs that fall within the purview of this regulation. Maximum use of approved threat documentation such as STARs for existing programs will be made with appropriate compartmented appendixes. See AR 380-381 for specific regulatory guidance for SAPs. AR 381-11 Section II Army Studies AR 381-11 2-10. Study directive a. Each study directive will include, as a minimum, a threat guidance subparagraph. This subparagraph will give the location, general situation, and intensity of combat applicable to the study. b. Study directives prepared by HQDA in accord with AR 5-5 which require threat support will be coordinated, in draft, with OACSI (DAMI-FIT) to ensure that appropriate threat support tasking has been included. AR 381-11 2-11. Study advisory group (SAG) For each study, the study sponsor will form a SAG or appoint a study manager. (Hereafter, an appropriate role for the study manager will be implied when the terms ""SAG chairman'' or ""SAG'' are used.) SAGs advise study sponsors and give advice and technical guidance to study agencies. AR 381-11 2-12. SAG membership All studies requiring threat support will have a threat representative on the SAG. OACSI will provide for SAG membership for HQDA-directed studies or those requiring DA-approved threat support. AR 381-11 2-13. Procedures for HQDA-directed studies a. When designated by OACSI, the USAIA will provide threat analysis and production support to HQDA-directed studies (except those discussed in b and c below). The SAG chairman will ensure that threat requirements are identified and submitted in writing to OACSI (DAMI-FIT). b. The SAG chairman will designate an intelligence representative to provide a copy of the minutes of each SAG meeting to HQDA (DAMI-FIT). c. When a commercial contractor is designated to accomplish a study requiring threat, the statement of work will be coordinated through command channels with HQDA (DAMI-FIT) to ensure that the threat and disposition of the data base are given proper attention. HQDA (DAMI-FIT) will monitor the contract effort and provide threat guidance as needed. AR 381-11 Tables =============================================================================== ================= Table 2-1 System Specific Threat Responsibilities Matrix =============================================================================== ================= =============================================================================== ================= Type acquisition Approval level Type of review Threat responsibilities 1 Threat approval ------------------------------------------------------------------------------- ----------------- ------------------------------------------------------------------------------- ----------------- Major Program SECDEF ASARC/DSARC JMSNS/O&O/LOA/ROC CBTDEV OACSI2 Threats SCP/DCP/IPS MATDEV OACSI Threats COEA Threat CBTDEV OACSI STAR CBTDEV/ OACSI MATDEV Designated Ac- SA ASARC quisition Program O&O/LOA/ROC CBTDEV OACSI Threats SCP/DCP/IPS MATDEV OACSI Threats COEA Threat CBTDEV OACSI STAR CBTDEV/ OACSI MATDEV DAIPR Program HQDA (DCSRDA) IPR O&O/LOA/LR CBTDEV CBTDEV Threats SCP/DCP/IPS MATDEV MATDEV Threats COEA Threat CBTDEV CBTDEV STAR CBTDEV/ CBTDEV/ MATDEV MATDEV IPR Program MATDEV IPR O&O/LOA/LR CBTDEV CBTDEV Threats SCP/DCP Threats MATDEV MATDEV COEA Threat CBTDEV CBTDEV STAR CBTDEV/ CBTDEV/ MATDEV MATDEV ------------------------------------------------------------------------------- ----------------- Notes: 1 CBTDEV and MATDEV will coordinate the preparation and review of all threat assessments for all four levels of systems. 2 OACSI will obtain DIA validation of threat assessments (JMSNS, SCP, DCP, IPS, and STARs) written to support materiel systems requiring DSARC decision review. =============================================================================== ================= AR 381-11 Appendix A References AR 381-11 Section I Required Publications AR 5-5 Army Studies and Analysis. (Cited in para 2-10.) AR 5-11 Army Model Improvement Program. (Cited in para 2-3.) AR 70-1 Army Systems Acquisition Policy and Procedures. (Cited in paras B-2 and B-3.) AR 380-381 Special Access Programs. (Cited in para 2-9.) AR 381-19 Intelligence Support. (Cited in paras 2-1 and 2-3.) AR 530-1 Operations Security (OPSEC). (Cited in para 2-8.) DIA Regulation No. 55-3 Threat Support for Major System Acquisitions. (Cited in para 2-4b(6).) AR 381-11 Section II Related Publications A related publication is merely a source of additional information. The user does not have to read it to understand this regulation. AR 1-1 Planning, Programing, and Budgeting Within the Department of the Army AR 15-14 Systems Acquisition Review Council Procedures AR 70-17 System/Program/Project/Product Management AR 71-3 User Testing AR 71-9 Materiel Objectives and Requirements AR 381-20 U.S. Army Counterintelligence and Security Support Activities AR 1000-2 Basic Policies for Systems Acquisition DODD 5000.1 Major Systems Acquisitions DODI 5000.2 Major System Acquisition Procedures AR 381-11 Appendix B Program Management Documents Threat Assessments AR 381-11 B-1. Requirements documents Requirements documents normally are generated by the combat developer in coordination with the materiel developer. Requirements documents which contain threat assessments include the Justification for Major System New Start (JMSNS), Operational and Organizational Plan (O&O), Letter of Agreement (LOA), required operational capability (ROC), letter requirement (LR), and, in the case of a joint Service program, the Joint Service Operational Requirement (JSOR). AR 71-9 contains detailed information on the content and format of these documents. The following paragraphs contain a brief description of, and provide guidance for, the preparation of threat assessments. a. JMSNS. (1) The JMSNS documents a major deficiency in a Service's ability to meet mission requirements. The JMSNS justifies the acquisition of a new major system and supports program initiation. (2) The JMSNS threat narrative provides an assessment of the key threat elements relating to the mission deficiency. Current and projected threat assessments should be provided. The JMSNS threat assessment will emphasize specific threat-driven mission area deficiencies as identified by the MAA process. The JMSNS is restricted to a maximum of three pages, including annexes. The threat assessment, therefore, will normally be limited to three or four paragraphs. b. O&O Plan. (1) The O&O Plan supports program initiation for all nonmajor materiel systems. (2) The content of a threat assessment written for an O&O Plan will be similar to that for a JMSNS. Its length will be limited to about one or two pages. c. LOA. The LOA is a jointly prepared document in which the combat and materiel developers outline the basic agreements for further investigation of a potential materiel system. It is written to support a Milestone I decision review. d. ROC. The ROC is prepared by the combat developer in coordination with the materiel developer. It describes the minimum essential operational, technical, and cost data and other information necessary to initiate full scale engineering development or procurement of a materiel system. It is prepared to support a Milestone II decision. e. LR. An LR is prepared in place of a ROC for acquisition of low-value or commercial items. f. JSOR. A JSOR is a statement of need for the same end item of materiel for operational employment by the Army and at least one other U.S. military service. It takes the place of a ROC for all joint Service programs. g. LOA/ROC/JSOR threat assessment. Threat assessments written for each LOA, ROC, and JSOR will describe the mission, organization, operation, or specific system of the threat that the needed materiel system is required to defeat. It will also describe the enemy's current and projected capability to detect, identify, locate, avoid, suppress, destroy, or otherwise counter the U.S. system. To support the evolutionary development of a U.S. system, the threat statement will include an assessment of the probable reactive threat to the system. Intended targets of the U.S. system will also be identified. The threat assessment should summarize the system's capability as determined by interactive analysis to perform its assigned mission in its operational environment against the expected threat. The basic document of an LOA, ROC, or JSOR is limited to four pages. The threat assessment will be about two or three paragraphs. If the materiel development is threat- driven, there should be a clear connection with the deficiency identified in the MAA process or other appropriate requirements study. AR 381-11 B-2. Decision documents Decision documents are prepared by the materiel developer in coordination with the combat developer and are submitted to the appropriate decision review authority (ASARC, DSARC). As explained in AR 70-1, there are three types of decision documents: system concept paper, decision coordinating paper, and integrated program summary. a. SCP. The SCP is a 12-page document, excluding annexes, prepared to support a Milestone I decision which summarizes the program status of a materiel system up to that point and provides the acquisition strategy for subsequent development of the program. b. DCP. The DCP summarizes program status for Milestone II and III. It may not exceed 18 pages, excluding annexes. c. IPS. The IPS provides a detailed summary of a program at Milestones II and III. It is only required when the decision authority Defense Acquisition Authority, Army Acquisition Executive (AAE), or DCSRDA desires more information than that contained in the DCP. The IPS is restricted to 30 pages. d. SCP/DCP/IPS threat assessments. The content of a threat assessment for an SCP, DCP, or IPS will be similar to that prepared for an LOA, ROC, or JSOR, as described in paragraph B-1g and normally will be derived from the STAR. The length of an SCP or DCP threat assessment will be limited to about one or two pages. An IPS threat assessment will be about four or five pages. If the materiel development is threat-driven there should be a clear connection with the deficiency identified in the MAA process or other appropriate requirements study. AR 381-11 B-3. Program documents Program documents are developed to implement the overall acquisition strategy of a materiel system. As explained in AR 70-1, these documents include individual plans that are reviewed and approved and become part of the program management documents. The cost and operational effectiveness analysis (COEA) report is a program document which contains a summary of threat provided in support of the COEA process. a. COEA report. This document provides decision-makers with the results of analyses conducted to evaluate the merits of alternatives and to understand the likely effect of each choice. It provides information on the costs and projected operational and training effectiveness of alternative materiel systems and programs. Threat support provided by the COEA process is a major factor in determining the validity of alternatives presented in the COEA report. b. COEA threat. (1) The COEA report will contain a section summarizing the threat support provided to the COEA process. The COEA threat will describe the full range of threats to the proposed materiel system. Excursions may be presented as long as the rationale is included and they are reasonable projections of accepted data. There is no standard length for a COEA threat; however, references may be made to existing DA- or DIA-approved threat products to avoid duplication of data. (2) Threat support will cover the entire projected life cycle of the U.S. system, beginning at initial operational capability (IOC). It will provide quantifiable near-term, midterm and far- term S&TI and operational art, employment, and deployment data. AR 381-11 Appendix C STAR Format Guidance AR 381-11 C-1. Preliminary pages a. Title page. This page shows the title, preparing agency, information cutoff date, U.S. systems project office, and, for major programs only, the MACOM/DA/DIA validation statement and date. b. Table of contents and illustrations. c. Executive summary. This will include a concise description of the future operational threat environment, the system specific threat, the reactive threat that could affect program decisions, and, if appropriate, a target assessment. The timeframe should start at IOC of the U.S. system and continue through its expected operational lifetime. The executive summary should be a complete, autonomous threat overview. It should be specific and sharply focused to provide the key intelligence judgments applicable to the CIP and the particular milestone issues. If the materiel development is threat-driven there should be a clear connection with the deficiency identified in the MAA process or other appropriate requirements study. AR 381-11 C-2. Body a. The body of the STAR will focus on the quantifiable threat capabilities relative to the mission and specific performance parameters of the U.S. system. The body will consist of the following: (1) Introduction. Give a brief opening statement, which may include a short synopsis of the mission need for the U.S. system. (2) U.S. system description. Provide a concise description of the system. For the sake of brevity, this may be done by referring to existing program documents which already describe the system. In either case, contents will include the mission, available physical and technical characteristics (to include such electronic parameters as frequency bands, radiated power, modulation), method of operation, IOC, and life span data (detailed parameters may only become available as the program develops). If development of the U.S. system would cause a marked change in the threat to related elements (launch platform, associated command, control, communications, and so forth), then these elements should be addressed in the system description. The system description, alternative system concepts, subsystems, potential protective measures, and system operational concepts under consideration will be provided and validated by the developer. (3) Operational threat environment. Give a generalized overview of the operational, physical, and technological environment in which the system will function during its lifetime, and, if applicable, the targets it is designed to engage. Developments and trends which can be expected to affect mission capability during the U.S. system's lifetime should be projected out to the end of the life cycle. Areas covered should include enemy operational concepts, organizations, equipment and tactics affecting system mission(s), and operations. Threat content and emphasis will vary from program to program. The requirement to describe the operational threat environment may be satisfied by references to the relevant portions of existing threat intelligence documents, such as the SBDP and other approved products. (4) Targets. Include an analysis, if applicable, of the actual capabilities of projected enemy targets the U.S. system is designated to engage. Target employment, characteristics, command and control, and numbers should be included. Types and density of targets might also be covered along with such common parameters as the thickness and types of armor to be defeated. If detailed technical specifications for individual target models are required, reference may be made to appropriate approved intelligence products. (5) System specific threat (SST). Provide an assessment of the threat to the mission capabilities of the U.S. system throughout its operational lifetime. Timeframes for threat snapshots are at IOC of the U.S. system and at IOC plus 10 years. Threat assessments should integrate doctrine, force level, and means (conventional, electronic, nuclear, chemical, advanced weapons, or others, as appropriate). Detail and certainty will decrease as projections extend into the far-term. Confidence in key judgments should be expressed in estimative terms to the maximum extent possible. Analysis will be responsive to CIPs. Reference may be made to existing DA- or DIA-approved intelligence products that provide any of the information concerning the SST to a U.S. system. The SST will include the following: (a) Threat at IOC of U.S. system. 1. Descriptions of opposing weapons systems. 2. Magnitude of the threat (projected force levels). 3. An integrated assessment of the threat to the U.S. system (hostile employment doctrine, force levels, and equipment) is considered together. (b) Follow-on system specific threat. A snapshot of the threat at IOC plus 10 years. This should also assess developments which would serve to degrade the U.S. system's capability to the end of its life cycle. Appropriate items to be included are as follows: 1. System description. 2. Magnitude of threat. 3. Threat integration. (6) Reactive threat. Describe to the maximum extent possible changes which might reasonably be expected to occur in hostile doctrine, strategy, tactics, force levels, and weapon systems as a result of the development and deployment of the U.S. system. Assessment of each reactive threat should consider, as a minimum, projections of- (a) Modifications in doctrine, strategy, and tactics. (b) New systems or modifications to present systems. Also give the description and likely deployment. (c) Changes in force levels. (d) Threat integration. This should consist of an integrated assessment of the potential reactive threat to the U.S. system. AR 381-11 C-3. Appendixes Specific appendixes will be developed as appropriate to support the threat analysis contained in the body of the STAR or to provide additional detail. As a minimum, an appendix listing critical intelligence parameters identified by the program manager will be developed. AR 381-11 C-4. Bibliography An annotated bibliography will be developed listing all source documents, models, or scenarios (to include U.S. system data) used to develop the information contained in the STAR. AR 381-11 Glossary AR 381-11 Section I Abbreviations AAE Army Acquisition Executive ADATS Army Development and Acquisition of Threat Simulators AFPDA Army force planning data and assumption AMC U.S. Army Materiel Command ASARC Army Systems Acquisition Review Council CBTDEV combat developer CIP critical intelligence parameter COEA cost and operational effectiveness analysis DA Department of the Army DAIPR Department of the Army in-process review DAP Designated Acquisition Program DASC Department of Army system coordinator DCP decision coordinating paper DCSRDA Deputy Chief of Staff for Research, Development, and Acquisition DG Defense Guidance DIA Defense Intelligence Agency DSARC Defense Systems Acquisition Review Council DT development testing FDTE force development testing and experimentation FISO force integration staff officer HQDA Headquarters, Department of the Army IOC initial operational capability IPR in-process review IPS integrated program summary JMSNS Justification for Major System New Start JSOR Joint Service Operational Requirement LOA Letter of Agreement LR letter requirement LRRDAP Long-range Research, Development, and Acquisition Plan MAA mission area analysis MACOM major Army command MATDEV materiel developer NATO North Atlantic Treaty Organization NDI nondevelopment item OACSI Office of the Assistant Chief of Staff for Intelligence ODCSOPS Office of the Deputy Chief of Staff for Operations and Plans ODCSRDA Office of the Deputy Chief of Staff for Research, Development, and Acquisition O&O operational and organizational OPSEC operations security OT operational test OTE operational test and evaluation OTEA Operational Test and Evaluation Agency PIP Product Improvement Proposals PM program, project, or product manager PMD program management documents RDA research, development, and acquisition ROC required operational capability SAG study advisory group SAP Special Access Program SCORES Scenario Oriented Recurring Evaluation System SCP system concept paper SECDEF Secretary of Defense SSG special study group SST system specific threat S&TI scientific and technical intelligence STAR System Threat Assessment Report STF special task force TISO threat integration staff officer TCG threat coordinating group TRADOC U.S. Army Training and Doctrine Command TSP threat support program USAIA U.S. Army Intelligence Agency AR 381-11 Section II Terms Combat developer Command or agency that formulates doctrine, concepts, organization, materiel requirements, and objectives. This represents the user community in the materiel acquisition process. Coordinate The process of seeking concurrence from one or more organizations or agencies on the adequacy of a specific draft assessment, estimate, or report. It is intended to increase a product's factual accuracy, clarify its judgments, and resolve disagreements on threat issues. Cost and operational effectiveness analysis Comparison between costs to develop, produce, distribute, and maintain a materiel system, and the ability of the system to meet the requirement for eliminating or reducing a force or mission deficiency. Critical intelligence parameters Those threat characteristics (such as numbers, types, mix, or characteristics of actual or projected threat systems) identified by service program managers that would critically impact on the effectiveness, survivability, security, or cost of a U.S. system. DA in-process review program Materiel system designated by the DCSOPS in coordination with the DCSRDA based on importance, complexity, and resource requirements. Program review is accomplished by an in-process review conducted by the materiel developer. IPR minutes from key milestones require HQDA (DCSRDA) approval. Decision coordinating paper A top-level summary document prepared by AMC that identifies alternatives, goals, thresholds, and threshold ranges to support Milestone II and Milestone III decisions. Designated Acquisition Program Materiel system designated by the Army Acquisition Executive (AAE) based on importance, complexity, and resource requirements. DAPs are reviewed by the Army Systems Acquisition Review Council and require AAE approval of key milestones. In-process review Review of a project or program at critical points to evaluate status and make recommendations to the decision authority. Conducted by the materiel developer. In-Process Review Program All programs not designated otherwise are IPR programs. Program review is accomplished by an in-process review conducted by the materiel developer. No higher review is necessary if IPR participants agree on the proposed acquisition strategy. Integrated program summary A top-level document prepared by AMC which summarizes in greater detail than the DCP various facets of the implementation plan of the Service for a major system acquisition. It will be prepared to support a Milestone II or III decision only if the Defense Acquisition Executive or Army Acquisition Executive determines that the DCP lacks sufficient information on which to base a decision. Intelligence The product resulting from the collection, evaluation, analysis, integration, and interpretation of all information concerning one of more aspects of foreign countries or areas, which is immediately or potentially significant to the development of plans, policies, and operations. Intelligence production requirement A stated need for the production of intelligence on a general or specific subject, program, system, or weapon. Interactive analysis A study, such as a COEA, performed by, or under the auspices of, Service program management elements to examine the interaction between a proposed U.S. system and the threat it is intended to encounter during its operational lifetime. Joint Service Operational Requirement A statement of need for the same end item for use by the Army and at least one other military service. Army proposed JSORs usually are directed by higher authority and are prepared and processed following ROC procedures and format as much as possible. Justification for Major System New Start Identifies and supports the need for new or improved mission capability when costs exceed $200 million RDTE or $1 billion in procurement (FY 80 dollars). Support program initiation. Letter of Agreement A jointly prepared and authenticated document in which the combat developer and materiel developer outline the basic agreements for further investigation of a potential materiel system. An LOA is written to support a Milestone I decision. Letter requirement An abbreviated procedure, prepared in place of the ROC, for acquisition of low-value or commercial items of which the cost will not exceed $6 million RDTE and $12 million procurement for 1 year, or $50 million RDTE and procurement for 5 years (FY80 dollars). Major program Materiel system designated by the Secretary of Defense (SECDEF) based on risk, urgency of need, congressional interest, joint Service involvement and resource requirements. The system acquisition process is reviewed by the Defense Systems Acquisition Review Council and requires SECDEF approval for major milestones. Materiel developer Command or agency responsible for research, development, and production of a system in response to approved requirements. Materiel system An item, system, or all systems of materiel. This includes all required system support elements. Mission area analysis Assessment of capability of a force to perform within a particular mission area. Designed to discover deficiencies in doctrine, organizations, training, and materiel and to identify means of correcting these deficiencies. MAA provides a basis for applying advanced technology to future Army operations. Operational and organizational plan Contains an operational, organizational, training, and logistical plan for use to assess current forces and to evaluate proposals for changes to Army forces and doctrine. Approval by the combat developer constitutes program initiation for all programs except those requiring a JMSNS. Production Conversion of information or intelligence information into finished intelligence through integration, analysis, evaluation, and/or interpretation of all available data and the preparation of intelligence products in support of known or anticipated user requirements. Reactive threat Changes which might reasonably be expected to occur in hostile doctrine, strategy, tactics, force levels, and weapon systems as a result of the development and deployment of the U.S. system. Required operational capability An HQDA document which states the minimal essential operational, technical, logistical, and cost information necessary to initiate full-scale development or acquisition of a materiel system. A ROC is written to support a Milestone II decision. Scenario oriented recurring evaluation system An evaluation technique and framework used to develop TRADOC scenarios to identify performance shortfalls and to address organizations, doctrine, tactics, training, and materiel. System concept paper The decision management document prepared by AMC that summarizes the results of concept exploration up to Milestone I, describes the acquisition strategy, and establishes goals and thresholds to be reviewed at the next milestone. System Threat Assessment Report The STAR is a threat assessment tailored to and focused on a particular U.S. system. It contains an integrated assessment of projected enemy capabilities (doctrine, tactics, hardware, organization, and forces) to limit, neutralize, or destroy a specific U.S. system. The STAR will serve as the basic threat document supporting system development. It is a dynamic document that will be continually updated and refined as the program develops. The STAR is written to support all three decision milestones. It will be approved/validated in support of the ASARC/DSARC. Threat a. The ability of an enemy or potential enemy to limit, neutralize, or destroy the effectiveness of a current or projected mission, organization, or item of equipment. The statement of that threat is prepared in sufficient detail to support Army planning and development of concepts, doctrine, training, and materiel. b. A statement of a capability prepared in necessary detail, in the context of its relationship to a specific program or project, to provide support for Army planning and development of operational concepts, doctrine, and materiel. Threat approval The evaluation of, and concurrence with, either a threat intelligence document or threat assessment. Threat approval is synonymous with threat validation. Threat assessment An evaluation of an enemy's or potential enemy's current or projected capability to limit, neutralize, or destroy the effectiveness of a mission, organization, or item of equipment. It involves the application of threat analysis to a specific mission, organization, or item of equipment within the context of a military operation. Threat assessments considers the project of threat analysis vis-a-vis a U.S. force and includes the perceived military judgments of the evaluated threat force. Threat coordinating group A group formed to manage threat support to the force and materiel development process throughout the entire life cycle of the systems process. Threat validation The evaluation of and concurrence with either a threat intelligence document or a threat assessment. Threat validation is synonymous with threat approval.