A simulation, by whatever means, of a military operation involving two or more opposing forces. Rules, data, and procedures are designed to depict an actual or assumed real life situation.
The intention and capability of an adversary to undertake actions that would be detrimental to U.S. interests (IC Standard 700-1, 4 Apr 2008).
Offensive and defensive threat activities in the cyber domain to attack, deny, or deceive BLUFOR access to information and communications. This may include network attacks, hacking, cyber theft, and network disruption.
A simulation, by live and/or virtual means, of a military operation that enables the examination or testing of concepts (doctrine and tactics, force design, force structure) and/or capabilities (materiel solutions) under controlled conditions.
Working with exercise/experiment planners to fully integrate how adversaries would conduct their operations and activities given the circumstance of the situational event.
Providing instruction on Threat Doctrine and TTPs, as well working alongside the leaders of the threat element during operations to assist their execution of the proper threat TTP.
Intelligence disciplines that enable the commander to visualize adversaries and relevant aspects of the OE in time and space.