{"id":92518,"date":"2022-02-07T22:28:55","date_gmt":"2022-02-07T22:28:55","guid":{"rendered":"https:\/\/papersspot.com\/blog\/2022\/02\/07\/page-of-22-zoom-2-0-chapter-2-risk-management-process-first-reckon\/"},"modified":"2022-02-07T22:28:55","modified_gmt":"2022-02-07T22:28:55","slug":"page-of-22-zoom-2-0-chapter-2-risk-management-process-first-reckon","status":"publish","type":"post","link":"https:\/\/papersspot.com\/blog\/2022\/02\/07\/page-of-22-zoom-2-0-chapter-2-risk-management-process-first-reckon\/","title":{"rendered":"Page of 22 ZOOM 2-0 Chapter 2 Risk Management Process First reckon,"},"content":{"rendered":"<p>Page<\/p>\n<p> of 22<\/p>\n<p> ZOOM<\/p>\n<p> 2-0<\/p>\n<p> Chapter 2 <\/p>\n<p> Risk Management Process<\/p>\n<p> First reckon, then risk<\/p>\n<p> Field Marshal Helmuth von Moltke<\/p>\n<p> This chapter provides the essence of the five-step risk<br \/> management process. It illustrates the application of<br \/> each step to military operations through the factors<br \/> of METT-T. <\/p>\n<p> THE FIVE STEPS: AN OVERVIEW<\/p>\n<p> Risk management is the process of identifying and controlling<br \/> hazards to conserve combat power and resources.<\/p>\n<p> The five steps of<br \/> risk management are\u2014 <br \/> \u2022 Step 1. Identify hazards.<br \/> \u2022 Step 2. Assess hazards to determine risks.<br \/> \u2022 Step 3. Develop controls and make risk decisions.<br \/> \u2022 Step 4. Implement controls.<br \/> \u2022 Step 5. Supervise and evaluate.<br \/> This five-step process is integrated into the military decision-making<br \/> process as shown in Figure 2-1.<br \/> FM 100-40 provides insight into the context in which the risk<br \/> management process is applied herein. Areas of particular interest in<br \/> FM 100-40 include\u2014<br \/> \u2022 Solving tactical problems (Chapter 1).<br \/> \u2022 The science and art of tactics (Chapter 1).<br \/> \u2022 Hasty versus deliberate operations (Chapter 1).<br \/> \u2022 The plan-prepare-execute cycle (Chapter 1).<br \/> \u2022 Basic tactical control measures (Chapter 2).<br \/> \u2022 The factors of METT-T (Chapter 2). <\/p>\n<p> FM 100-14<\/p>\n<p> 2-1<\/p>\n<p> Mission Receipt<br \/> Mission Analysis<br \/> COA Development<br \/> COA Analysis<br \/> COA Comparison<br \/> COA Approval<br \/> Orders Production<br \/> Rehearsal1<br \/> Execution and1 Assessment<br \/> Step 1<br \/> IdentifyHazards<br \/> Step 2<br \/> Assess<br \/> Hazards<br \/> Step 3<br \/> Develop <br \/> Controls<br \/> and <br \/> Make Risk<br \/> Decision<br \/> Step 4<br \/> Implement<br \/> Controls<br \/> Step 5<br \/> Supervise and<br \/> EvaluateMilitary Decision-<br \/> Making Process<br \/> X<br \/> X<br \/> X<br \/> X<br \/> X<br \/> X<br \/> X<br \/> X<br \/> X<br \/> X<br \/> X<br \/> X<br \/> X<br \/> X<br \/> X<br \/> X<br \/> Risk Management Steps<br \/> X X X <br \/> X X X <br \/> 1All boxes are marked to emphasize the continued use of the risk management<br \/> process throughout the mission<\/p>\n<p> Risk decisions should be based upon awareness rather than<br \/> mechanical habit. Leaders should act on a keen appreciation for the<br \/> essential factors that make each situation unique instead of from<br \/> conditioned response. Throughout the entire operational continuum,<br \/> the commander must consider US Government civilians and contract<br \/> support personnel in his risk management process. Hazards can exist,<br \/> regardless of enemy or adversary actions, in areas with no direct<br \/> enemy contact and in areas outside the enemy\u2019s or adversary\u2019s<\/p>\n<p> Figure 2-1. Risk Management Steps Correlated with <br \/> Military Decision-Making Tasks<\/p>\n<p> Risk Management<\/p>\n<p> 2-2<\/p>\n<p> influence. The two types of risk that exist across the wide range of<br \/> Army operations are <\/p>\n<p> tactical risks<\/p>\n<p> and <\/p>\n<p> accident risks.<\/p>\n<p> \u2022 <\/p>\n<p> Tactical risk<\/p>\n<p> is risk concerned with hazards that exist because of<br \/> the presence of either the enemy or an adversary. It applies to all<br \/> levels of war and across the spectrum of operations.<br \/> \u2022 <\/p>\n<p> Accident risk<\/p>\n<p> includes all operational risk considerations other<br \/> than tactical risk. It includes risks to the friendly force. It also<br \/> includes risks posed to civilians by an operation, as well as an<br \/> operations impact on the environment. It can include activities<br \/> associated with hazards concerning friendly personnel,<br \/> civilians, equipment readiness, and environmental conditions.<\/p>\n<p> STEPS 1 AND 2<\/p>\n<p> Steps 1 and 2 together comprise the risk assessment. In Step 1,<br \/> individuals identify the hazards that may be encountered in executing<br \/> a mission. In Step 2, they determine the direct impact of each hazard on<br \/> the operation. The risk assessment provides for enhanced situational<br \/> awareness. This awareness builds confidence and allows soldiers and<br \/> units to take timely, efficient, and effective protective measures.<\/p>\n<p> STEPS 3 THROUGH 5<\/p>\n<p> Steps 3 through 5 are the essential follow-through actions to<br \/> effectively manage risk. In these steps, leaders balance risk against<br \/> costs\u2014political, economic, environmental, and to combat power\u2014<br \/> and take appropriate actions to eliminate unnecessary risk. During<br \/> execution, as well as during planning and preparation, leaders<br \/> continuously assess the risk to the overall mission and to those<br \/> involved in the task. Finally, leaders and individuals evaluate the<br \/> effectiveness of controls and provide lessons learned so that others<br \/> may benefit from the experience. <\/p>\n<p> THE FIVE STEPS APPLIED<\/p>\n<p> STEP 1. IDENTIFY HAZARDS <\/p>\n<p> A <\/p>\n<p> hazard<\/p>\n<p> is an actual or potential condition where the following<br \/> can occur due to exposure to the hazard:<br \/> \u2022 Injury, illness, or death of personnel.<br \/> \u2022 Damage to or loss of equipment and property.<br \/> \u2022 Mission degradation.<\/p>\n<p> FM 100-14<\/p>\n<p> 2-3<\/p>\n<p> Hazards are sources of danger or risks due to enemy or adversary<br \/> presence and other conditions not due to enemy or adversary<br \/> capabilities. Hazards are found in all operational environments.<br \/> Combat operations, stability operations, base support operations, and<br \/> training present unique hazards for units involved in these kinds of<br \/> missions. Hazards are identified during the first four steps of the<br \/> military decision-making process: <\/p>\n<p> mission receipt, mission analysis, COA<br \/> development<\/p>\n<p> , and <\/p>\n<p> COA analysis<\/p>\n<p> .<br \/> The ability of unit leaders and staffs to identify hazards is key. One<br \/> reality of today\u2019s missions is that the aspect of a hazard can change<br \/> rapidly. Things of little risk initially can quickly become major threats<br \/> due to unforeseen natural or man-made events. Leaders should be<br \/> aware of this possibility. Complacency to the fact that existing controls<br \/> may not continue to control hazards in rapidly changing situations<br \/> should be viewed as a hazard in itself.<br \/> The factors of METT-T provide a sound framework for identifying<br \/> hazards when planning, preparing, and executing operations. When<br \/> applying risk management to METT-T during mission analysis,<br \/> leaders and staffs should look for hazards that affect both tactical and<br \/> accident risks. They must identify all hazards that may present<br \/> significant risks to the mission.<\/p>\n<p> Mission <\/p>\n<p> Leaders first analyze the assigned mission. They look at the type<br \/> of mission to be accomplished and consider possible subsequent<br \/> missions. Certain kinds of operations are inherently more dangerous<br \/> than others. For example, a deliberate frontal attack, because of the<br \/> associated movement, is more likely to expose a unit to losses than<br \/> would a defense from prepared positions. Identifying missions that<br \/> routinely present great risk is imperative. Leaders also look for<br \/> hazards associated with complexity of the plan such as\u2014<br \/> \u2022 A scheme of maneuver that is difficult to understand or too<br \/> complex for accurate communications down to the lowest level. <br \/> \u2022 The impact of operating under a fragmentary order (FRAGO).<\/p>\n<p> Enemy<\/p>\n<p> Commanders look for enemy capabilities that pose significant<br \/> hazards to the operation. For example, \u201cWhat can the enemy do to<\/p>\n<p> Risk Management<\/p>\n<p> 2-4<\/p>\n<p> defeat my operation?\u201d Common shortfalls that can create hazards<br \/> during operations against an enemy include failure to\u2014<br \/> \u2022 Assess potential advantages to the enemy provided by the<br \/> battlefield environment.<br \/> \u2022 Fully assess the enemy\u2019s capabilities.<br \/> \u2022 Understand enemy collection capabilities and friendly<br \/> vulnerabilities to those capabilities.<br \/> \u2022 Accurately determine the enemy\u2019s probable COAs. <br \/> \u2022 Plan and coordinate active ground and aerial reconnaissance<br \/> activities.<br \/> \u2022 Disseminate intelligence about the enemy to lower levels.<br \/> \u2022 Identifying terrorist threats and capabilities. <br \/> Intelligence plays a critical part in identifying hazards associated<br \/> with tactical risk. Intelligence-preparation-of-the-battlefield (IPB) is a<br \/> dynamic staff process that continually integrates new information and<br \/> intelligence that ultimately becomes input to the commander \u2019s risk<br \/> assessment process. Intelligence assists in identifying hazards during<br \/> operations by\u2014<br \/> \u2022 Identifying the opportunities and constraints the battlefield<br \/> environment offers to threat and friendly forces.<br \/> \u2022 Thoroughly portraying threat capabilities and vulnerabilities.<br \/> \u2022 Collecting information on populations, governments, and<br \/> infrastructures.<br \/> FMs 34-130 and 34-60, respectively, provide detailed information on<br \/> IPB and on counterintelligence operations and multidiscipline<br \/> counterintelligence analysis.<\/p>\n<p> Terrain and Weather<\/p>\n<p> In addition to those due to the enemy or adversaries, the most<br \/> obvious hazards to military operations are due to terrain and weather.<br \/> Terrain and weather affect the type of hazard encountered. When the<br \/> enemy uses terrain to his advantage, the risk is clearly tactical. The<br \/> aspects of terrain and weather may create situations where accident<br \/> risks predominate. When looking at this from a purely mission<br \/> perspective, familiarity of the unit with the terrain and its associated<br \/> environment must be paramount. Basic issues include\u2014 <br \/> \u2022 How long the unit has operated in the environment and climate.<br \/> \u2022 Whether the terrain has been crossed before.<\/p>\n<p> FM 100-14<\/p>\n<p> 2-5<\/p>\n<p> Terrain. <\/p>\n<p> The five main military aspects of terrain\u2014<\/p>\n<p> observation and<br \/> fields of fire, cover and concealment, obstacles, key terrain and decisive terrain,<br \/> and avenues of approach (OCOKA)\u2014<\/p>\n<p> can be used to identify and assess<br \/> hazards impacting on friendly forces. Chapter 2 of FM 100-40 has<br \/> details on OCOKA. The terrain analysis includes both map and on-the-<br \/> ground reconnaissance to identify how well unit capabilities and<br \/> mission demands can be accommodated by the terrain.<br \/> \u2022 <\/p>\n<p> Observation and fields of fire.<\/p>\n<p> Hazards associated with this usually<br \/> involve when the enemy will be able to engage a friendly unit and<br \/> when friendly unit weapons capabilities allow it to effectively<br \/> engage the enemy.<br \/> \u2022 <\/p>\n<p> Cover and concealment.<\/p>\n<p> Hazards associated with cover and<br \/> concealment are created by the enemy\u2019s ability to place direct or<br \/> indirect fire on friendly forces.<br \/> \u2022 <\/p>\n<p> Obstacles. <\/p>\n<p> Hazards associated with obstacles may be accident or<br \/> tactical. They may be due to natural conditions such as rivers or<br \/> swamps or man-made such as minefields or built-up areas. <br \/> \u2022 <\/p>\n<p> Key terrain and decisive terrain.<\/p>\n<p> Hazards are a marked advantage<br \/> terrain provides to the enemy if he controls such terrain or<br \/> denies its use to friendly forces.<br \/> \u2022 <\/p>\n<p> Avenues of approach.<\/p>\n<p> Hazards associated with avenues of<br \/> approach can affect both tactical and accident risks. Such<br \/> hazards include conditions where an avenue of approach<br \/> impedes deployment of friendly combat power or where it<br \/> supports deployment of enemy combat power.<\/p>\n<p> Weather. <\/p>\n<p> Weather works hand-in-hand with terrain to create<br \/> hazards. To identify weather hazards, leaders and soldiers must<br \/> assess the impact on operating systems. Mistakes include not<br \/> considering the\u2014<br \/> \u2022 Adverse effects of heat and cold hazards on the performance<br \/> of soldiers.<br \/> \u2022 Effects of climate and weather on maintenance of vehicles and<br \/> equipment before beginning an operation.<br \/> \u2022 Hazardous effects of weather on the five military aspects<br \/> of terrain.<\/p>\n<p> Risk Management<\/p>\n<p> 2-6<\/p>\n<p> Troops<\/p>\n<p> Leaders analyze the capabilities of available friendly troops.<br \/> A s s o c i a t e d h a z a rd s i m p a c t b o t h t h e s o l d i e r a n d u n i t . K e y <br \/> considerations are level of training, manning levels, the condition and<br \/> maintenance of vehicles and equipment, morale, availability of<br \/> supplies and services, and the physical and emotional health of<br \/> soldiers. Leaders and soldiers must be vigilant to the fact that hazards<br \/> in these areas can adversely affect a mission, even when all tactical<br \/> considerations point to success. Mission failure can be caused by\u2014 <br \/> \u2022 <\/p>\n<p> Hazards to the physical and emotional health of soldiers.<\/p>\n<p> Inadequate<br \/> sanitation facilities, water purification capabilities, medical<br \/> attention, and evacuation capabilities are key hazards that can<br \/> arise from incomplete logistical planning. Care of troops requires<br \/> long-range projections of all classes of supply, with close<br \/> monitoring of mission changes that could impact availability or<br \/> depletion of supplies. When beginning an operation immediately<br \/> upon arriving in theater, hazards include not implementing<br \/> measures to help soldiers overcome fatigue or acclimatize them to<br \/> the geographical area and associated climate.<br \/> \u2022 <\/p>\n<p> Hazards to task organization or units participating in an operation.<\/p>\n<p> Hazards include how long units have worked together under a<br \/> particular command relationship. During stability operations,<br \/> task organizations may change often. Hazards include poor<br \/> communication, unfamiliarity with higher headquarters SOPs,<br \/> and insufficient combat power to accomplish the mission.<br \/> \u2022 <\/p>\n<p> Hazards associated with long-term missions.<\/p>\n<p> Long-term missions<br \/> include nation building, peacekeeping, or insurgency\/<br \/> counterinsurgency operations. Hazards associated with these<br \/> missions include the turmoil of personnel turnover, lack of<br \/> continuity of leadership, inexperience, and lack of knowledge of<br \/> the situation and the unit\u2019s operating procedures. An especially<br \/> insidious hazard is critical-skills atrophy that results from not<br \/> performing METL-related missions.<\/p>\n<p> Time Available<\/p>\n<p> The hazard is insufficient time to plan, prepare, and execute<br \/> operations. Planning time is always at a premium. Leaders routinely<br \/> apply the one-third\/two-thirds rule to ensure their subordinate units<br \/> are given maximum time to plan. Failure to accomplish a mission on<\/p>\n<p> FM 100-14<\/p>\n<p> 2-7<\/p>\n<p> time can result in shortages of time for subordinate and adjacent units<br \/> to accomplish their mission.<\/p>\n<p> Civilians<\/p>\n<p> The commander \u2019s legal responsibility is to consider hazards to,<br \/> and safeguarding of, civilians in his area of operations. <\/p>\n<p> Civilians<\/p>\n<p> include nongovernmental organizations (NGOs), private voluntary<br \/> organizations (PVOs), US Government civilians, foreign national<br \/> civilians, the media, and dislocated civilians put at risk by military<br \/> operations. The commander must consider hazards that can occur<br \/> across the range of operations, such as\u2014<br \/> \u2022 <\/p>\n<p> In a wartime environment. <\/p>\n<p> The commander must consider the<br \/> hazard of collateral damage which may result in creating<br \/> new adversaries.<br \/> \u2022 <\/p>\n<p> In a<\/p>\n<p> peacetime environment. <\/p>\n<p> The commander must consider the<br \/> political attitudes and previous actions of civilians in identifying<br \/> hazards to friendly forces and the populace itself.<\/p>\n<p> Adversaries<\/p>\n<p> are hostile elements other than the enemy that may be<br \/> encountered during any operation. They present additional hazards.<br \/> They may be organized opposition or individuals that challenge<br \/> authority. They may include such diverse elements as rioters,<br \/> criminals, rogues, or gangs that might want to harass a peace<br \/> enforcement mission.<\/p>\n<p> STEP 2. ASSESS HAZARDS <\/p>\n<p> Step 2 completes the risk assessment. Risk is the chance of hazard<br \/> or bad consequences. This step examines each hazard in terms of<br \/> probability and severity to determine the risk level of one or more<br \/> hazardous incidents that can result from exposure to the hazard. This<br \/> step is conducted during three steps of the military decision-making<br \/> process\u2014<\/p>\n<p> mission analysis, COA development, <\/p>\n<p> and<\/p>\n<p> COA analysis. <\/p>\n<p> This<br \/> step is also conducted after controls are developed.<br \/> The incident must be credible in that it must have a reasonable<br \/> expectation of happening. The end result is an estimate of risk from<br \/> each hazard and an estimate of the overall risk to the mission caused<br \/> by hazards that cannot be eliminated. Leaders must also assess the<br \/> risk to civilians posed by the operation. They may need to assess the<br \/> operations\u2019 impact on the environment. This step is conducted in<br \/> three substeps.<\/p>\n<p> Risk Management<\/p>\n<p> 2-8<\/p>\n<p> Substep A <\/p>\n<p> Leaders and staffs assess each hazard in relation to the <\/p>\n<p> probability<\/p>\n<p> of a hazardous incident. The probability levels estimated for each<br \/> hazard may be based on the mission, COAs being developed and<br \/> analyzed, or frequency of a similar event. Figure 2-2 provides a<br \/> summary of the five degrees of probability. The letters in parentheses<br \/> following each degree (A through E) provide a symbol for depicting<br \/> probability. For example, the letter <\/p>\n<p> A<\/p>\n<p> represents <\/p>\n<p> frequent<\/p>\n<p> probability.<\/p>\n<p> FREQUENT (A) Occurs very often, continuously experienced<\/p>\n<p> Single item Occurs very often in service life. Expected to occur <br \/> several times over duration of a specific mission or <br \/> operation. Always occurs.<br \/> Fleet or inventory of <br \/> items<br \/> Occurs continuously during a specific mission or <br \/> operation, or over a service life.<br \/> Individual soldier Occurs very often in career. Expected to occur several <br \/> times during mission or operation. Always occurs.<br \/> All soldiers exposed Occurs continuously during a specific mission or <br \/> operation.<\/p>\n<p> LIKELY (B) Occurs several times<\/p>\n<p> Single item Occurs several times in service life. Expected to occur <br \/> during a specific mission or operation.<br \/> Fleet or inventory of <br \/> items<br \/> Occurs at a high rate, but experienced intermittently <br \/> (regular intervals, generally often,).<br \/> Individual soldier Occurs several times in career. Expected to occur during <br \/> a specific mission or operation.<br \/> All soldiers exposed Occurs at a high rate, but experienced intermittently.<\/p>\n<p> OCCASIONAL (C) Occurs sporadically<\/p>\n<p> Single item Occurs some time in service life. May occur about as <br \/> often as not during a specific mission or operation.<br \/> Fleet or inventory of <br \/> items<br \/> Occurs several times in service life.<br \/> Individual soldier Occurs some time in career. May occur during a specific <br \/> mission or operation, but not often.<br \/> All soldiers exposed Occurs sporadically (irregularly, sparsely, or sometimes). <\/p>\n<p> Figure 2-2. Hazard Probability<\/p>\n<p> FM 100-14<\/p>\n<p> 2-9<br \/> Figure 2-2. Hazard Probability (continued)<\/p>\n<p> Substep B<\/p>\n<p> Substep B addresses the <\/p>\n<p> severity<\/p>\n<p> of each hazard. It is expressed in<br \/> terms of\u2014<br \/> \u2022 Degree of injury or illness.<br \/> \u2022 Loss of or damage to equipment or property.<br \/> \u2022 Environmental damage.<br \/> \u2022 Other mission-impairing factors such as lost combat power.<br \/> The degree of severity estimated for each hazard may be based on<br \/> knowledge of the results of similar past events. Figure 2-3 provides a<br \/> summary<\/p>\n<p> of the four degrees of hazard severity. The<\/p>\n<p> Roman numerals<br \/> in parentheses following each degree (I through IV) provide a<br \/> convenient symbol for depicting severity. For example, <\/p>\n<p> I<\/p>\n<p> represents<br \/> the <\/p>\n<p> catastrophic<\/p>\n<p> degree of severity.<\/p>\n<p> SELDOM (D) Remotely possible; could occur at some time<\/p>\n<p> Single item Occurs in service life, but only remotely possible. Not <br \/> expected to occur during a specific mission or operation.<br \/> Fleet or inventory of <br \/> items<br \/> Occurs as isolated incidents. Possible to occur some time <br \/> in service life, but rarely. Usually does not occur.<br \/> Individual soldier Occurs as isolated incident during a career. Remotely <br \/> possible, but not expected to occur during a specific <br \/> mission or operation.<br \/> All soldiers exposed Occurs rarely within exposed population as isolated <br \/> incidents.<\/p>\n<p> UNLIKELY (E) Can assume will not occur, but not impossible<\/p>\n<p> Single item Occurrence not impossible, but can assume will almost <br \/> never occur in service life. Can assume will not occur <br \/> during a specific mission or operation.<br \/> Fleet or inventory of <br \/> items<br \/> Occurs very rarely (almost never or improbable). Incidents <br \/> may occur over service life.<br \/> Individual soldier Occurrence not impossible, but may assume will not occur <br \/> in career or during a specific mission or operation.<br \/> All soldiers exposed Occurs very rarely, but not impossible.<\/p>\n<p> Risk Management<\/p>\n<p> 2-10<\/p>\n<p> CATASTROPHIC (I)<\/p>\n<p> Loss of ability to accomplish the mission or<br \/> mission failure. Death or permanent total<br \/> disability (accident risk). Loss of major or<br \/> mission-critical system or equipment. Major<br \/> p r o p e r t y ( f a c i l i t y ) d a m a g e . S e v e r e <br \/> environmental damage. Mission-critical<br \/> security failure. Unacceptable collateral<br \/> damage.<\/p>\n<p> CRITICAL (II)<\/p>\n<p> Significantly (severely) degraded mission<br \/> capability or unit readiness. Permanent<br \/> partial disability, temporary total disability<br \/> exceeding 3 months time (accident risk).<br \/> Extensive (major) damage to equipment or<br \/> systems. Significant damage to property or<br \/> t h e e n v i r o n m e n t . S e c u r i t y f a i l u r e . <br \/> Significant collateral damage.<\/p>\n<p> MARGINAL (III)<\/p>\n<p> Degraded mission capability or unit<br \/> readiness. Minor damage to equipment or<br \/> systems, property, or the environment. Lost<br \/> day due to injury or illness not exceeding 3<br \/> months (accident risk). Minor damage to<br \/> property or the environment.<\/p>\n<p> NEGLIGIBLE (IV)<\/p>\n<p> Little or no adverse impact on mission<br \/> capability. First aid or minor medical<br \/> treatment (accident risk). Slight equipment<br \/> or system damage, but fully functional and<br \/> s e r v i c e a bl e. L i t t l e o r n o p r o p e r t y o r <br \/> environmental damage.<\/p>\n<p> Figure 2-3. Hazard Severity<\/p>\n<p> Substep C<\/p>\n<p> In this substep leaders and staffs expand what they understand<br \/> about probable hazardous incidents into estimates of levels of risk for<br \/> each identified hazard and an estimate of the overall risk for the<br \/> operation. Estimating risk follows from examining the outcomes of<br \/> Substeps A and B; that is, both the probability and severity of<br \/> hazardous incidents. This substep is more art than science. Much<br \/> depends on the use of historical lessons learned, intuitive analysis,<\/p>\n<p> FM 100-14<\/p>\n<p> 2-11<\/p>\n<p> Risk Assessment Matrix<br \/> Probability<br \/> Severity Frequent<br \/> A<br \/> Likely<br \/> B<br \/> Occasional<br \/> C<br \/> Seldom<br \/> D<br \/> Unlikely<br \/> E<br \/> Catastrophic<br \/> Critical<br \/> Marginal<br \/> Negligible<br \/> I<br \/> II<br \/> III<br \/> IV<br \/> E<br \/> E<br \/> H<br \/> M<br \/> E<br \/> H<br \/> M<br \/> L<br \/> H<br \/> H<br \/> M<br \/> L<br \/> H<br \/> M<br \/> L<br \/> L<br \/> M<br \/> L<br \/> L<br \/> L<br \/> E \u2013<br \/> H \u2013<br \/> M \u2013<br \/> L \u2013<br \/> Extremely High Risk<br \/> High Risk<br \/> Moderate Risk<br \/> Low Risk<\/p>\n<p> experience, and judgment. Uncertainty can arise in the assessment of<br \/> both the probability and severity of a hazardous incident. Uncertainty<br \/> results from unknowns about a situation; from incomplete, inaccurate,<br \/> undependable, or contradictory information; and from unforeseen<br \/> circumstances. Therefore, assessment of risk requires good judgment.<br \/> Figure 2-4 is a standardized matrix that can be used to assist in this<br \/> process. Leaders and staffs enter the estimated degree of severity and<br \/> probability for each hazard in Substeps A and B from the severity row<br \/> and probability column, respectively. The point where the severity<br \/> row and probability column intersect defines the level of risk. For<br \/> example, if the hazard is estimated to have a <\/p>\n<p> critical<\/p>\n<p> severity (II) and a<\/p>\n<p> likely<\/p>\n<p> probability (B), the level of risk is high (H). <br \/> Figure 2-5 provides a summary of the levels of risk. It also<br \/> provides examples of hazardous incidents for each risk level. Several<br \/> examples illustrate the trade-off between tactical and accident risks.<\/p>\n<p> Figure 2-4. Risk Assessment Matrix<\/p>\n<p> Risk Management<\/p>\n<p> 2-12<\/p>\n<p> E &#8211; E x t r e m e l y H i g h : <\/p>\n<p> Loss of ability to accomplish the mission if hazardsoccur during mission. A <\/p>\n<p> frequent<\/p>\n<p> or likely probability of catastrophic loss(IA or IB) or <\/p>\n<p> frequent<\/p>\n<p> probability of <\/p>\n<p> critical<\/p>\n<p> loss (IIA) exists.<\/p>\n<p> E x a m p l e : <\/p>\n<p> A commander finds that one of his implied tasks to attack anobjective involves crossing a normally shallow riverbed. After looking at<br \/> the factors of METT-T, he discovers that three days of intense rain have<br \/> raised the water level to rise above flood stage, with currents far in<br \/> excess of his ability to safely ford with armored vehicles. After<br \/> discussing COAs with his staff, he determines the accident risk is<br \/> extremely high because of the likely probability and catastrophic<br \/> severity of losing vehicles and killing soldiers. His conclusions are<br \/> based on his experience with and knowledge of fording armored<br \/> vehicles under the existing conditions of water depth and current<br \/> speed. <\/p>\n<p> H &#8211; H i g h : <\/p>\n<p> Significant degradation of mission capabilities in terms of therequired mission standard, inability to accomplish all parts of the<br \/> mission, or inability to complete the mission to standard if hazards<br \/> occur during the mission. <\/p>\n<p> Occasional<\/p>\n<p> to <\/p>\n<p> seldom<\/p>\n<p> probability ofcatastrophic loss (IC or ID) exists. A <\/p>\n<p> likely<\/p>\n<p> to<\/p>\n<p> occasional<\/p>\n<p> probabilityexists of a critical loss (IIB or IIC) occurring. <\/p>\n<p> Frequent<\/p>\n<p> probability of<\/p>\n<p> marginal<\/p>\n<p> losses (IIIA) exists.<\/p>\n<p> E x a m p l e : <\/p>\n<p> During a preplanned ambush, the leader discovers that theforce he intends to ambush has significantly more combat power than<br \/> his own force can accommodate. He realizes that he could only delay<br \/> rather than destroy the enemy. He knows his casualty estimates would<br \/> be very high if the enemy reorganized and counterattacked. He also<br \/> knows that the size of the enemy force could seriously impact adjacent<br \/> units conducting a movement to contact. He determines the situation is<\/p>\n<p> high risk <\/p>\n<p> because he estimates (based on his training and experience)t h e r e i s a l i ke l y p r o b a b i l i t y o f t h e e n e my r e o r g a n i z i n g a n d <br \/> counterattacking and the severity of loss to his unit would be critical.<\/p>\n<p> M &#8211; M o d e r a t e : <\/p>\n<p> Expected degraded mission capabilities in terms of therequired mission standard will have a reduced mission capability if<br \/> hazards occur during mission. An <\/p>\n<p> unlikely<\/p>\n<p> probability of catastrophicloss (IE) exists. The probability of a <\/p>\n<p> critical<\/p>\n<p> loss is <\/p>\n<p> seldom<\/p>\n<p> (IID). <\/p>\n<p> Marginal<\/p>\n<p> losses occur with a <\/p>\n<p> likely <\/p>\n<p> or<\/p>\n<p> occasional <\/p>\n<p> probability<\/p>\n<p> (IIIB or IIIC). A<\/p>\n<p> frequent<\/p>\n<p> probability of negligible (IVA) losses exists. <\/p>\n<p> E x a m p l e : <\/p>\n<p> A commander in a defensive position receives a warning orderto be prepared to counterattack if the enemy attacks again. He chooses<br \/> to use pre-positioned ammunition caches to support his defense, as<br \/> opposed to moving his ammunition resupply forward by truck. He<br \/> determines that the severity of not having an immediate resupply of<br \/> ammunition available during the counterattack will have a <\/p>\n<p> critical<\/p>\n<p> impacton his combat power. He realizes that if the enemy forces him to<br \/> abandon his forward positions, the severity of the loss of his<\/p>\n<p> Figure 2-5. Levels of Risk <\/p>\n<p> FM 100-14<\/p>\n<p> 2-13<\/p>\n<p> ammunition caches will critically impact his combat power. Heconsiders that his unit is deployed in excellent defensive positions. He<br \/> has repelled two attacks that resulted in the destruction of an estimated<br \/> 50 percent of the enemy\u2019s combat power. He receives information that<br \/> the probability of the enemy attacking is <\/p>\n<p> likely<\/p>\n<p> , but that the probabilityof the enemy being reinforced and attacking in overwhelming force is<br \/> remote <\/p>\n<p> (seldom)<\/p>\n<p> . The commander concludes that the risk of conductinga counterattack with limited ammunition is greater than the <\/p>\n<p> moderate<\/p>\n<p> risk of the enemy pushing him back.<\/p>\n<p> L &#8211; L o w :<\/p>\n<p> Expected losses have little or no impact on accomplishing themission. The probability of <\/p>\n<p> critical<\/p>\n<p> loss is <\/p>\n<p> unlikely<\/p>\n<p> (IIE), while that of<\/p>\n<p> marginal<\/p>\n<p> loss is <\/p>\n<p> seldom<\/p>\n<p> (IIID) or <\/p>\n<p> unlikely<\/p>\n<p> (IIIE). The probability of a<\/p>\n<p> negligible<\/p>\n<p> loss is likely or less (IVB through (IVE).<br \/> E x a m p l e : A mechanized task force (TF) conducting a movement tocontact in a desert environment is overtaken by nightfall before<br \/> reaching its limit of advance (LOA). The terrain along the axis of<br \/> advance is flat and open. Visibility is about 800 meters under a clear sky<br \/> illuminated by a full moon. Estimates put the enemy, which has been<br \/> hastily withdrawing for the past three days, at approximately 30 percent<br \/> strength. Contact has been light with no defensible terrain along the<br \/> TF\u2019s axis. The TF commander considers all the factors. In addition, the<br \/> TF is 100 percent operational in using night vision devices. The TF<br \/> commander estimates that it is unlikely that his unit will incur losses ofcritical severity by being surprised by the enemy or lose critical combatpower due to an accident. He estimates the risk to his force in<br \/> continuing a nighttime movement is low. <br \/> Figure 2-5. Levels of Risk (continued) <br \/> STEP 3. DEVELOP CONTROLS AND MAKE RISK DECISIONS <br \/> Risk management is the recognition that decision making<br \/> occurs under conditions of uncertainty. Decisions must remain<br \/> consistent with the commander\u2019s stated intent and offer a good<br \/> e x p e c t a t i o n o f s u c c e s s . T h e r i s k &#8211; t a k i n g s k i l l re q u i re s <br \/> competency as a prerequisite. <br \/> FM 100-7, Decisive Force:<br \/> The Army in Theater Operations, May 1995<br \/> Step 3 is accomplished in two substeps: develop controls and<br \/> make risk decisions. This is done during the COA development, COA<br \/> analysis, COA comparison, and COA approval of the military<br \/> decision-making process.<br \/> Substep A &#8211; Develop Controls<br \/> After assessing each hazard, leaders develop one or more controls<br \/> that either eliminate the hazard or reduce the risk (probability and\/or<\/p>\n<p> Risk Management<br \/> 2-14<br \/> severity) of a hazardous incident. When developing controls, they<br \/> consider the reason for the hazard not just the hazard itself. <br \/> Types of Controls. Controls can take many forms, but fall<br \/> into three basic categories\u2014educational controls, physical controls,<br \/> and avoidance.<br \/> \u2022 Educational controls. These controls are based on the knowledge<br \/> and skills of the units and individuals. Effective control is<br \/> implemented through individual and collective training that<br \/> ensures performance to standard. <br \/> \u2022 Physical controls. These controls may take the form of barriers<br \/> and guards or signs to warn individuals and units that a hazard<br \/> exists. Additionally, special controller or oversight personnel<br \/> responsible for locating specific hazards fall into this category. <br \/> \u2022 Avoidance. These controls are applied when leaders take positive<br \/> action to prevent contact with an identified hazard. <br \/> Criteria for Controls. To be effective, each control developed<br \/> must meet the following criteria:<br \/> \u2022 Suitability. It must remove the hazard or mitigate (reduce) the<br \/> residual risk to an acceptable level.<br \/> \u2022 Feasibility. The unit must have the capability to implement<br \/> the control.<br \/> \u2022 Acceptability. The benefit gained by implementing the control<br \/> must justify the cost in resources and time. The assessment of<br \/> acceptability is largely subjective. Figure 2-6 gives criteria for<br \/> determining acceptability of controls for each identified hazard.<br \/> Support Availability of adequate personnel, equipment,<br \/> supplies, and facilities necessary to implement a<br \/> suitable controls. <br \/> Standards Guidance and procedures for implementing a control<br \/> are clear, practical, and specific.<br \/> Training Knowledge and skills are adequate to implement a<br \/> control. <br \/> Leadership Leaders are competent to implement a control. <br \/> Individual Individual soldiers are sufficiently self-disciplined to<br \/> implement a control.<br \/> Figure 2-6. Criteria for Determining Acceptability of Controls<\/p>\n<p> FM 100-14<br \/> 2-15<br \/> Examples of Controls. Examples of controls include\u2014 <br \/> \u2022 Engineering or designing to eliminate or control hazards.<br \/> \u2022 Selecting a COA that avoids identified hazards. <br \/> \u2022 Limiting the number of people and the amount of time they are<br \/> exposed to hazards, consistent with mission requirements.<br \/> \u2022 Selecting personnel with appropriate mental, emotional, and<br \/> physical capabilities.<br \/> \u2022 Providing protective clothing, equipment, and safety and<br \/> security devices.<br \/> \u2022 Providing such services as adequate sanitation facilities and<br \/> water purification capabilities.<br \/> \u2022 Providing warning signs and signals.<br \/> \u2022 Scheduling vehicle and aircraft silhouette drills.<br \/> \u2022 Planning training, including rehearsals, rock drills, battle drills,<br \/> and so forth.<br \/> \u2022 Programming communications links for key civilian organizations.<br \/> \u2022 Establishing battlefield controls such as areas of operations and<br \/> b o u n d a r i e s , d i re c t fi re c o n t ro l m e a s u re s , fi re s u p p o r t <br \/> coordination measures, rules of engagement, airspace control<br \/> measures, bridge classification, traffic control, and so forth.<br \/> \u2022 Developing terrorist attack warning systems and response plans.<br \/> The key is to specify who, what, where, when, and how each<br \/> control is to be used. For example\u2014<br \/> \u2022 Planning and scheduling intensive threat and friendly vehicle<br \/> identification refresher training for all antiarmor and air defense<br \/> weapons crews before the mission reduces the probability of<br \/> engaging a friendly vehicle or aircraft (fratricide). <br \/> \u2022 Programming installation of crashworthy passenger seats in the<br \/> UH-60 Blackhawk, when mission circumstances do not indicate<br \/> their removal, can reduce the severity of injuries in crashes.<br \/> \u2022 Requiring soldiers to wear flak vests and helmets during<br \/> movement to contact, or when riding in vehicles in areas where<br \/> enemy fire is likely, can reduce the probability and severity of a<br \/> wound from small arms fire or fragments.<\/p>\n<p> Risk Management<br \/> 2-16<br \/> \u2022 Establishing strong continuity documents and planning overlap<br \/> tours for key leaders facilitate smooth transitions during<br \/> extended operations.<br \/> Residual Risk. Once the responsible leader develops and<br \/> accepts controls, he determines the residual risk associated with each<br \/> hazard and the overall residual risk for the mission.<br \/> \u2022 Residual risk is the risk remaining after controls have been<br \/> selected for the hazard. Residual risk is valid (true) only if the<br \/> controls for it are implemented. As controls for hazards are<br \/> identified and selected, the hazards are reassessed as in Step 2<br \/> and the level of risk is then revised. This process is repeated until<br \/> the level of residual risk is acceptable to the commander or leader<br \/> or cannot be further reduced. See Figures A-3 through A-5.<br \/> \u2022 Overall residual risk of a mission must be determined when more<br \/> than one hazard is identified. The residual risk for each of these<br \/> hazards may have a different level, depending on the assessed<br \/> probability and severity of the hazardous incident. Overall<br \/> residual mission risk should be determined based on the incident<br \/> having the greatest residual risk. Determining overall mission risk<br \/> by averaging the risks of all hazards is not valid. If one hazard has<br \/> high risk, the overall residual risk of the mission is high, no matter<br \/> how many moderate or low risk hazards are present.<br \/> Substep B &#8211; Make Risk Decision<br \/> A key element of the risk decision is determining if the risk is<br \/> justified. The commander must compare and balance the risk against<br \/> mission expectations. He alone decides if controls are sufficient and<br \/> acceptable and whether to accept the resulting residual risk. If he<br \/> determines the risk level is too high, he directs the development of<br \/> additional controls or alternate controls, or he modifies, changes, or<br \/> rejects the COA.<br \/> Leaders can use the risk assessment matrix in Figure 2-4\u2014in<br \/> conjunction with their commanders\u2019 guidance\u2014to communicate how<br \/> much risk they are willing to delegate. For example, a commander may<br \/> place constraints on his subordinates that restrict their freedom of action<br \/> to accept risk in instances where the risk might imperil his intent, his<br \/> higher commander\u2019s intent, or a critical capability of the unit. <\/p>\n<p> FM 100-14<br \/> 2-17<br \/> STEP 4. IMPLEMENT CONTROLS <br \/> Leaders and staffs ensure that controls are integrated into SOPs,<br \/> written and verbal orders, mission briefings, and staff estimates. The<br \/> critical check for this step, with oversight, is to ensure that controls<br \/> are converted into clear, simple execution orders understood at all<br \/> l e v e l s . I m p l e m e n t i n g c o n t r o l s i n c l u d e s c o o r d i n a t i o n a n d <br \/> communication with\u2014<br \/> \u2022 Appropriate superior, adjacent, and subordinate units and those<br \/> executing the mission.<br \/> \u2022 Logistics Civil Augmentation Program (LOGCAP) organizations<br \/> and civilian agencies that are part of the force.<br \/> The media, NGOs, and PVOs must be included in coordination when<br \/> their presence impacts or is impacted by the force.<br \/> Leaders must explain how supervisors will implement controls.<br \/> Examples of control implementation include\u2014<br \/> \u2022 Conducting vehicle and aircraft silhouette drills.<br \/> \u2022 Conducting rehearsals, rock drills, battle drills, and so forth.<br \/> \u2022 Conducting intensive threat and friendly vehicle<br \/> identification refresher training for all antiarmor and air<br \/> defense weapons crews.<br \/> \u2022 Conducting orientation for replacement personnel.<br \/> \u2022 Installing and maintaining communications links for key<br \/> civilian organizations.<br \/> \u2022 Operating in convoys of four vehicles minimum.<br \/> \u2022 Carrying weapons and wearing flak jackets and helmets when<br \/> outside secure compounds.<br \/> STEP 5. SUPERVISE AND EVALUATE <br \/> Leaders must supervise the execution of their orders. The more<br \/> untrained the troops, the more detailed this supervision must be.<br \/> Infantry in Battle, 1939<br \/> During mission preparation and execution, leaders must ensure<br \/> that their subordinates understand how to execute risk controls.<br \/> Leaders continuously assess risks during the conduct of operations,<\/p>\n<p> Risk Management<br \/> 2-18<br \/> especially during long-term missions. Leaders maintain situational<br \/> awareness. They guard against complacency to ensure that risk<br \/> control standards are not relaxed or violated. To gain insight into areas<br \/> needing improvement, leaders must continuously evaluate their<br \/> units\u2019 effectiveness in managing mission risks.<br \/> Supervise<br \/> Leaders supervise mission rehearsal and execution to ensure<br \/> standards and controls are enforced. Techniques may include spot-<br \/> checks, inspections, situation reports and brief-backs, buddy checks,<br \/> and close supervision. During the mission, leaders continuously<br \/> monitor controls to ensure they remain effective. They modify them as<br \/> necessary. Leaders and individuals anticipate, identify, and assess new<br \/> hazards to implement controls. They continually assess variable<br \/> hazards such as fatigue, equipment serviceability, and the environment.<br \/> Leaders modify controls to keep risks at an acceptable level.<br \/> During sustained operations, leaders continue planning to ensure<br \/> that controls emplaced at the beginning of the mission apply to<br \/> changes in the operation\u2019s current situation and to hazardous<br \/> conditions. Leaders must maintain an extraordinary degree of<br \/> discipline. They must avoid complacency, which can result from<br \/> boredom and overconfidence. Leaders must ensure that soldiers do<br \/> not relax their vigilance due to performing repetitive tasks\u2014despite<br \/> changing roles and missions, unit turbulence and turnover, and<br \/> declining skills. Leaders maintain a close overwatch on controls put in<br \/> place to reduce risks over a prolonged period. For example, during<br \/> stability operations, land mine hazards may not be solved in the near<br \/> term, but may require continual attention. Other examples of long-<br \/> term hazards that may be encountered include\u2014<br \/> \u2022 Climatic extremes.<br \/> \u2022 NBC and hazardous waste contamination.<br \/> \u2022 Diseases native to a particular area of operation or indigenous<br \/> population.<br \/> \u2022 Terrorist threats.<br \/> Evaluate<br \/> After a mission, leaders and individuals evaluate how well the<br \/> risk management process was executed. They\u2014<br \/> \u2022 Determine how to ensure that successes are continued to the<br \/> next mission. <\/p>\n<p> FM 100-14<br \/> 2-19<br \/> \u2022 Capture and disseminate lessons learned so that others may<br \/> benefit from the experience.<br \/> \u2022 Consider the effectiveness of the risk assessment in identifying<br \/> and accurately assessing the probability and severity of hazards<br \/> that resulted in mission degradation.<br \/> \u2022 Determine whether the level of residual risk of each hazard and<br \/> of the overall mission were accurately estimated.<br \/> \u2022 Evaluate the effectiveness of each control in reducing or<br \/> removing risk, including whether controls were effectively<br \/> communicated, implemented and enforced.<br \/> Leaders and individuals determine why some controls were<br \/> ineffective and what should be done when the hazard is encountered<br \/> again. A control may be altered; the way it is implemented or<br \/> supervised may be changed to make it effective; or a completely<br \/> different control may be more effective. Leaders must energize the<br \/> system to fix systemic problems that hinder combat effectiveness.<br \/> Figure 2-7 shows that the risk management process continues<br \/> throughout a mission as well as from mission to mission. It is<br \/> integral to the military decision-making process. Its application<br \/> requires good judgment and intuitive analysis borne of confidence,<br \/> experience, and situational awareness.<br \/> TOOLS AND PITFALLS<br \/> The appendix provides examples of risk management tools to<br \/> help leaders assess identified hazards, develop controls, and make<br \/> risk decisions. The tools should be tailored to suit particular situations<br \/> and missions. The examples in Figures A-3 through A-5 are tools to<br \/> manage risk at the tactical level. The example in Figure A-6 is a tool to<br \/> manage risk at the operational level. Units may develop additional<br \/> tools suitable for their needs.<br \/> Units train to a standard. They operate and train regardless of the<br \/> degree of real or perceived difficulty. Risk reduction begins with<br \/> commanders identifying their METLs. Commanders use the risk<br \/> management process to assess the degree of risk related to each METL<br \/> their unit must perform. From this assessment, risk reducing standard<br \/> operating procedures evolve.<br \/> F i g u r e A &#8211; 7 p r o v i d e s a n e x a m p l e o f r i s k m a n a g e m e n t <br \/> considerations integrated into a mission training plan (MTP) task.<\/p>\n<p> Risk Management<br \/> 2-20<br \/> Step 1. Identify Hazards<br \/> Step 2. Assess Hazards<br \/> Determine risk level for each hazard and overall <br \/> mission risk<br \/> Estimateprobability<br \/> Estimateseverity<br \/> 1As controls for hazards are identified and selected the hazards are<br \/> reassessed as in Step 2<br \/> Step 4. Implement Controls<br \/> Step 5. Supervise and Evaluate<br \/> Supervise Evaluate<br \/> MISSIONS<br \/> New Controls<br \/> New Hazards<br \/> LessonsLearned<br \/> Apply METT-T<br \/> Makedecision<br \/> Step 3. Develop Controls and <br \/> Make Risk Decision<br \/> Determine residual risk <br \/> level for each hazard <br \/> and overall residual <br \/> mission risk1<br \/> Developcontrols<br \/> Figure 2-7. Continuous Application of Risk Management <\/p>\n<p> FM 100-14<br \/> 2-21<br \/> Pitfalls arise when risk management tools are used without<br \/> adaptation to the factors of METT-T. Using a standardized risk<br \/> assessment card or checklist may be of some value initially in the<br \/> mission analysis and COA development or in cases where a routine<br \/> task is performed in an unchanging environment or static situation.<br \/> However, such a tool used alone will not likely identify all hazards for<br \/> every mission in a changing operational environment.<br \/> Completing the risk assessment alone, but failing to identify<br \/> effective controls, usually results in a GO or NO-GO decision based on<br \/> the initial risk. If the risk assessment does not accurately identify the<br \/> hazards and determine the level of residual risk, the leader is likely to<br \/> make his risk decision based upon incomplete or inaccurate<br \/> information. If the risk assessment places missions in a routine, low-<br \/> risk category, the commander may not be informed of a risk decision<br \/> resulting in an accepted risk level that could imperil his or his higher<br \/> commander \u2019s intent or other affected organizations. The risk<br \/> management process is intended to provide reasonable controls to<br \/> support mission accomplishment without exposing the force to<br \/> unnecessary residual risk.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Page of 22 ZOOM 2-0 Chapter 2 Risk Management Process First reckon, then risk Field Marshal Helmuth von Moltke This chapter provides the essence of the five-step risk management process. It illustrates the application of each step to military operations through the factors of METT-T. THE FIVE STEPS: AN OVERVIEW Risk management is the process [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[10],"class_list":["post-92518","post","type-post","status-publish","format-standard","hentry","category-research-paper-writing","tag-writing"],"_links":{"self":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/92518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/comments?post=92518"}],"version-history":[{"count":0,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/92518\/revisions"}],"wp:attachment":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/media?parent=92518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/categories?post=92518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/tags?post=92518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}