As a follow-up to your paper in 5.2 Assignment: Pre-Operational Threat Vectors,