This month’s cover article provides a brief explanation of TRISA-CTID’s week-long course focused on threat tactics to be offered in March 2015. Please contact us for more information or to register for this free course. The UK conducted a successful DATE-based exercise with support from TRADOC G2 elements from TRISACTID and the Training Brain Operations Center (TBOC). A collaborative articles describes the exercise. Two articles describe different types of threat actor tactics: one on the use of information warfare in the Ukraine and another article on various tactics employed by HAMAS in Israel. The final installation (Part 3) in the series of articles on the Central African Republic (CAR) describes the January 2013 peace talks and the rebel offensive of February– March 2014 that resulted in the country’s fifth successful coup d’état.
The concept of overmatch in the realm of antiaccess/area denial (A2AD) is explained with examples of how the threat can employ low-tech yet highly effective techniques to achieve its objectives. Finally, the threat’s use of counterreconnaissance to achieve tactical success is described in Part 1 of a twopart article.