Adversary capabilities
Jamming
Laser warning system
Exploitation
Direction finding
Spoofing
Counter measures and mitigation
Planning
Force packaging
Redundant C2
Electronic protective measures
Frequency hopping
DACAS
SEAD
Targeting
Weapon to target matching
Laser procedures
Maintaining mobility
Training