Threat Tec’s strategic, operational and tactical Red Team Subject Matter Experts (SMEs) are the best in their field. With 25-30+ years of Joint and Army operational experience in their respective disciplines covering each Army warfighting function, they offer a professional, free-thinking opposing force to train against or trial new concepts and tactics.


Subject Matter Experts

Certified Threat Tec SMEs are the very best in their field due to their extensive experience with Threat operations. Our SMEs are certified in their knowledge of Threat doctrine, tactics, techniques, and procedures. They provide unparalleled support, training, mentoring, and execution of key threat operations and education by utilizing their insight and leadership skills. Our clients know all the predetermined requirements of their assignment will be executed successfully.

Certified Red Team Cadre

Certified Red Team Cadre Members are at the core of Threat Tec’s instructional team. They assist with the development of lessons, also known as the Instructional Design. Cadres are certified in their knowledge of Threat Doctrine, Tactics, Techniques, and Procedures and are responsible for ensuring the required Threat/OE has been created and maintained through the training event/experiment.

Weapons Specialists

Threat Tec Weapons Specialists are experts of their craft. Standing on their already impressive resumés as designers of specialized weapons systems, our Weapons Specialists push the limits by creating and delivering the most accurate looking, yet simulated, weapons systems. Our Weapons Specialists are skilled at developing/modifying automatic and semi-automatic weapons, explosives, battlefield effects, rocket propelled grenades, anti-armor systems, mortars, and mines – both foreign and domestic, for use in training events and experiments.



A simulation, by whatever means, of a military operation involving two or more opposing forces. Rules, data, and procedures are designed to depict an actual or assumed real life situation.


The intention and capability of an adversary to undertake actions that would be detrimental to U.S. interests (IC Standard 700-1, 4 Apr 2008).


Offensive and defensive threat activities in the cyber domain to attack, deny, or deceive BLUFOR access to information and communications. This may include network attacks, hacking, cyber theft, and network disruption.


A simulation, by live and/or virtual means, of a military operation that enables the examination or testing of concepts (doctrine and tactics, force design, force structure) and/or capabilities (materiel solutions) under controlled conditions.

Vignette Development

Working with exercise/experiment planners to fully integrate how adversaries would conduct their operations and activities given the circumstance of the situational event.


Any military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy.


Providing instruction on Threat Doctrine and TTPs, as well working alongside the leaders of the threat element during operations to assist their execution of the proper threat TTP.

Intelligence Support

Intelligence disciplines that enable the commander to visualize adversaries and relevant aspects of the OE in time and space.

Threat Tactics, Techniques and Procedures (TTPs)

Detailed explanation of how an adversary conducts their tactical actions.