ࡱ> b`[\c#` bjbj5G5G mW-W-Q\ \ \ \ |v LXXT$Fh\ \ 40*\ Rg 6G Y[9F0vynn<GGn%RjvDdUDfd@Df\ \ \ \ \ \  TRAINING SUPPORT PACKAGE (TSP) TSP Number / Title153-R-1000 / Apply the CRM process to individual and team risk decisionsEffective Date 13 February 2007 Supersedes TSP(s) / Lesson(s) This is a new TSPTSP Users Basic Combat Training (BCT) / One Station Unit Training (OSUT) Proponent The proponent for this document is US Army TRADOC. Improvement Comments Users are invited to send comments and suggested improvements on DA Form 2028, Recommended Changes to Publications and Blank Forms. Completed forms, or equivalent response, will be mailed or attached to electronic e-mail and transmitted to: US Army Training and Doctrine Command Command Safety Office ATTN: ATCS-S 1 Bernard Road, Building 84 Fort Monroe, VA 23651-1048 atcs-s@monroe.army.milSecurity Clearance / Access  Unclassified Foreign Disclosure RestrictionsFD5. This product/publication has been reviewed by the product developers in coordination with the US Army Training and Doctrine Command foreign disclosure authority. This product is releasable to students from all requesting foreign countries without restrictions. tc "Preface" \l 1PREFACE PurposeThis Training Support Package provides the instructor with a standardized lesson plan for presenting instruction for: 153-R-1000 Apply the CRM process to individual and team risk decisions This TSP Contains TABLE OF CONTENTS PAGE  TOC \fPreface  PAGEREF _Toc122415118 \h 2 Lesson Section I Administrative Data  PAGEREF _Toc122415119 \h 4 Section II Introduction 6 Terminal Learning Objective - Apply the CRM process to individual and team risk decisions. 6 Section III Presentation 8 Enabling Learning Objective A - Describe the CRM process and guiding principles 8 Enabling Learning Objective B - Conduct risk assessment 10 Enabling Learning Objective C - Conduct risk management 12 Section IV Summary 18 Section V Student Evaluation 19 Appendix A - Viewgraph Masters A-1 Appendix B - Test(s) and Test Solution(s) (NA) B-1 Appendix C - Practical Exercises and Solutions (NA) C-1 Appendix D - Student Handouts (NA) D-1  Composite Risk Management for Individuals and Teams 153-R-1000 13 February 2007 tc "Lesson Section I Administrative Data" \l 4SECTION I. ADMINISTRATIVE DATA All Courses Including This Lesson Course Number Version Course Title Composite Risk Management for Individuals and TeamsTask(s) Taught(*) or SupportedTask Number Task Title 153-R-1000 Apply the CRM process to individual and team risk decisionsReinforced Task(s) Task Number Task Title Academic HoursThe academic hours required to teach this lesson are as follows: Resident Hours/Methods 50 mins Conference / Discussion Test NA Test Review NA Total Hours: 50 mins Test Lesson Number Hours Lesson No. Testing (to include test review) N/A Prerequisite Lesson(s) Lesson Number Lesson Title NoneClearance Access Security Level: Unclassified Requirements: There are no clearance or access requirements for the lesson.Foreign Disclosure Restrictions FD5. This product/publication has been reviewed by the product developers in coordination with the US Army Training and Doctrine Command foreign disclosure authority. This product is releasable to students from all requesting foreign countries without restrictions.References Number Title DateAdditional InformationFM 5-19Composite Risk Management21 AUG 2006https://akocomm.us.army.mil/usapaStudent Study AssignmentsNone.Instructor RequirementsOne qualified instructor who has a thorough understanding of the Composite Risk Management process.Additional Support NameStu Ratio Qty Man HoursPersonnel RequirementsNoneEquipment RequiredId NameStu RatioInstr Ratio Spt Qty Expfor Instruction5836-01-342-2413 PROJECTOR, VIDEO1:501:1No1No5965-00-050-8167 MICROPHONE, DYNAMIC1:501:1No1No7022-01-476-5115 COMPUTER, TACTICAL1:501:1No1No6730-00-933-4871 SCREEN, PROJECTION1:501:1No1NoMaterials RequiredClassroom, Training Area, and Range RequirementsAmmunition RequirementsNoneInstructional GuidanceNOTE: Before presenting this lesson, instructors must thoroughly prepare by studying this lesson and identified reference material. Instructor must review the Armys FM 5-19, Composite Risk Management, 21 Aug 06, prior to the class being presented. ExpStu RatioInstr RatioSpt QtyProponent Lesson Plan ApprovalsName Mr. Dave PrenticeGS-14Director, TRADOC SafetyMr. Michael OlinGS-13Safety Manager, TRADOC tc " Section II Introduction " \l 2SECTION II. INTRODUCTION Method of Instruction: Conference / Discussion Instructor to Student Ratio is: 1:50 Time of Instruction: 5 mins Media: Large Group Instruction MotivatorNOTE: Show Slide-1 (Composite Risk Management) Welcome to Composite Risk Management for Individuals and Teams NOTE: Ask the students. Has anyone in the room ever worked in the mining, logging, roofing or meat-processing industries? What do these industries have in common? If you said, high-risk of injury or death, you're right. They are listed among the most hazardous occupations by the U.S. Bureau of Labor Statistics. Risk Management is important to companies engaged in these industries. What about Soldiering? Do you think there are risks associated with being in the Army? The purpose of this lesson is to teach you how to apply the Composite Risk Management process to manage the risks of being a Soldier. NOTE: Show Slide-2 (Terminal Learning Objective)tc "Terminal Learning Objective - Communicate the Army's Sexual Assault Prevention and Response Program " \l 3Terminal Learning Objective NOTE: Inform the students of the following Terminal Learning Objective requirements. At the completion of this lesson, you [the student] will:Action:Apply the Composite Risk Management (CRM) Process to individual and team decisionsConditions:In a classroom environment given a situation requiring a decision, on or off duty.Standards:Apply the CRM process per FM 5-19.Safety RequirementsNo food or drink is allowed near or around electrical equipment (CPU, file servers, printers, projectors, etc.) due to possible electrical shock or damage to equipment. Exercise care in personal movement in and through such areas. Avoid all electrical cords and associated wiring. In the event of electrical storms, you will be instructed to power down equipment.Risk Assessment Level LowEnvironmental Considerations NOTE: It is the responsibility of all Soldiers and DA civilians to protect the environment from damage.EvaluationNA. Instructional Lead-InYou are American Soldiers. You are the Army's most precious resource; the sons and daughters of our nation. Without you, the Army cannot fulfill its reason for existing, which is to fight and win the nation's wars. Remember the Soldier's Creed. You stand ready to deploy, engage, and destroy the enemies of the United States of America in close combat. Doing so may cost your life, or the life of your buddies. Freedom is not free. This is serious business, and the Army takes very seriously its responsibility to make sure that no one loses their life needlessly. The Army trains, equips, and organizes its Soldiers to ensure victory, but each Soldier, regardless of rank, is faced with making decisions. You will be challenged to make smart decisions about risk, decisions that will affect not only your self, but your team, family, and friends. Composite Risk Management doesn't apply just in combat. It applies to everything you do, on duty or off duty. Anything that may take a Soldier out of the fight is a risk that must be managed, whether it's a sniper's bullet or a poor decision to drink and drive. This is about preserving the Army's ability to fight. Composite Risk Management will help you make smart risk decisions and reduce the possibility of becoming a loss. It may save your life or the lives of your buddies. tc " Section III Presentation" \l 2SECTION III. PRESENTATION NOTE: Inform the students of the Enabling Learning Objective requirements. tc "Enabling Learning Objective A - Define the Army's Sexual Assault Policy as it relates to the Army Values, Warrior Ethos, and Soldier's Creed " \l 3A. ENABLING LEARNING OBJECTIVE ACTION:Describe the CRM process and guiding principlesCONDITIONS:In a classroom, given a situation requiring a decision, on or off dutySTANDARDS:Describe the CRM process and guiding principles 1. Learning Step / Activity 1. Describe the CRM process Method of Instruction: Conference / Discussion Instructor to Student Ratio: 1:50 Time of Instruction: 10 mins Media: Large Group Instruction NOTE: Show Slide-3 (Loss) a. A Loss is a Loss. Look at the statistics for fiscal year 2006. The Army lost most of its Soldiers to Combat. Improvised Explosive Devices (IED), Small Arms, Close Combat, Vehicle-borne IED, Rocket Propelled Grenades, and Mortars were the leading causes of combat death in the first 3 years of Operation Iraqi Freedom. In addition, the Army recognizes those Soldiers we lost due to Accidental and Other causes. Army leaders believe that ANY preventable loss is unacceptable. In the Accident category, POV and motorcycle operations are the leading causes, followed by personal injury (falls, drowning, pedestrian), Army motor vehicle accidents, Army aircraft accidents, Army combat vehicle accidents, fire and explosion. In the Other category, losses are caused by medical, suicide, and criminal causes. As you can see, IEDs and bullets are not the only hazards facing Soldiers. Given the multiple causes of loss, we can't afford to take a narrow view of risk management. We can't focus only on combat hazards, or only on accident hazards. If we're to be effective in managing risk, we must take a "composite" approach. NOTE: To update the loss statistics, log on to the USACRC web site at  HYPERLINK "https://crc.army.mil/home/" https://crc.army.mil/home/. Click on the Daily Statistics icon, you will be prompted to log in using your AKO user name and password. Download the file in PDF Version or PowerPoint (PPT) Version. Insert the file into the presentation. NOTE: Instructors should inform Soldiers that the Armys Composite Risk Management process is outlined in FM 5-19, Composite Risk Management, 21 Aug 06. NOTE: Show Slide-4 (Composite Risk Management) b. Composite Risk Management (CRM) is detailed in Field Manual 5-19, Composite Risk Management. CRM is the Armys primary decision-making process for reducing risks associated with all hazards that have the potential to injure or kill personnel, damage or destroy equipment, or otherwise impact mission effectiveness. The primary premise of CRM is that it does not matter where or how the loss occurs, the result is the same decreased combat power or mission effectiveness. c. THE STEPS. CRM is a five-step process: Step 1 Identify hazards. Step 2 Assess hazards to determine risk. Step 3 Develop controls and make risk decisions. Step 4 Implement controls. Step 5 Supervise and evaluate. Steps 1 and 2 are assessment steps, steps 3 through 5 are management steps. NOTE: Show Slide-5 (Guiding Principles of CRM) d. There are five principles to guide you through CRM: Apply CRM to every mission and activity, both on and off duty. This means combat missions and weekend tailgate parties. Make risk decisions at the right level. If you can't control the risks, elevate the decision up the chain of command. Off duty, if you're not comfortable with the risk, do the same thing. Accept no unnecessary risk. Don't disable or kill yourself doing something needless and stupid. Except in dire circumstances, charging an enemy bunker with no helmet, no weapon, and no plan, is probably a foolish move. Perhaps there is a way to control the hazards and reduce the risk. What about riding a motorcycle without a helmet, or choosing to drink and drive? Are there unnecessary risks involved? Apply CRM cyclically and continuously. The last step of the process reveals how effectively CRM has been applied. As the mission or activity progresses, CRM is applied continuously to identify and control new or residual hazards. Do not be risk averse. In some cases, charging the bunker without enough ammo may be necessary to prevent worse things from happening. We may have to risk our lives so that others might live. Soldiering is the business of danger, and we'll be as smart about things as we can, but when it comes down to it, we go back to the Soldier's Creed: we will always place the mission first; we will never accept defeat; we will never quit. NOTE: Conduct a check on learning and summarize the ELO. Lets see how much youve learned so far with a few questions. NOTE: Read the question. Ask the students to raise their hands if they think they know the answer. Q: Why does the Army take a "composite" approach to managing risk? A: Because loss occurs due to multiple causes: combat, accident, and other. Q: When and how often should you use CRM? A: On and off-duty, missions and activities, 24/7. Q: Explain the CRM principle of accepting no unnecessary risk. Provide a personal example. A: Response based on student, instructor, and class discussion. Transition: We understand that CRM is necessary to prevent loss, and that it's a five-step process with guiding principles. So how do we apply it? tc "Enabling Learning Objective B - Determine types of sexual assault, the effects of sexual assault, and victim responses " \l 3B. ENABLING LEARNING OBJECTIVE ACTION:Conduct risk assessmentCONDITIONS:In a classroom, given a situation requiring a decision, on or off duty, without access to DA Form 7566STANDARDS:Conduct risk assessment per FM 5-19 1. Learning Step / Activity 1. Conduct risk assessment Method of Instruction: Conference / Discussion Instructor to Student Ratio: 1:50 Time of Instruction: 15 mins Media: Large Group Instruction Lead-In: Once you understand the CRM process and are comfortable with how and when to use it, you are ready to start applying the five step process to assist you in reducing risks that may impact you are your buddies. NOTE: Show Slide-6 (Identify Hazards) a. The first step in the CRM process is to identify hazards. A hazard is an actual or potential condition, situation, or event that can result in injury, illness or death of personnel, or damage, loss, or destruction of equipment and property. A hazard may also be a situation or event that can result in degradation of capabilities or mission failure. Hazards are found in all environments and across the full-spectrum of military operations and activities. There are hazards associated with combat, peacekeeping, humanitarian service, deployment, base support, training, and off-duty activities. Can you think of some off-duty hazards? What are some hazards associated with driving your POV after midnight? What about cutting the grass, cleaning the gutters, jogging in a city park? Army leaders are responsible for identifying hazards and protecting Soldiers, but will they see every hazard? Every Soldier is a Sensor, responsible to look, listen, identify, and report hazards to leadership. Off duty, and in many situations on duty, you will have to identify hazards and deal with them yourself. NOTE: Show Slide-7 (How are hazards identified?) d. To be effective, detection of hazards should go beyond your own knowledge. What you dont know can affect the mission. Using detection resources, techniques, and tools gives you a better chance of identifying hazards that might occur during the mission. Experience. You've learned lessons from mistakes of the past. So have others. Much of the Army's experience is documented in field manuals, tactics, techniques, and procedures (TTP). Historical data. The U.S. Army Combat Readiness Center is the knowledge center for all Army losses (accident, combat, and other). Much historical data is available at their website. Intuitive analysis. Intuitive analysis is applied when a quick decision is necessary. Reliable intuition comes from combining your experience and judgment with what you know about the situation at hand. Judgment. Akin to intuitive analysis, judgment is your capacity to make a wise decision. Standards. Check regulations, operator's manuals, SOP, and TTP. Rules are usually written to control hazards, to prevent something harmful from occurring. Brainstorming. This is a group technique. Get everyone involved in creating a list of what they think the hazards will be. After the list is complete, then judge whether each hazard is really valid. The METT-TC model is an important model for making decisions throughout the Army. We'll discuss METT-TC in more detail on the next slide. The ADTPTL model is used for off-duty activities. We'll discuss ADTPTL in more detail on the next slide. NOTE: Show Slide-8 (METT-TC and ADTPTL) e. METT-TC (Mission, Enemy, Terrain/Weather, Troops, Time, and Civil Considerations) may be applied to identify hazards across the full-spectrum of military operations (peacetime, training, humanitarian missions, and combat). ADTPTL (Activity, Disrupters, Terrain/Weather, People, Time, and Legal) is used to identify off-duty hazards. Mission What hazards are associated with the mission were planning to conduct? Are airborne operations more hazardous than vehicle maintenance? Activity - Off duty, what hazards are associated with the activity? Does a backyard barbecue present the same hazards as bungee jumping? Enemy What can the enemy do to defeat or degrade our mission? Know the enemy. Disrupters - Off duty, identify things that can disrupt your plans (bugs, bears, thieves, or criminals, for example). Terrain and Weather Desert, mountain, jungle, or arctic environments pose unique hazards. Weather has a huge impact on military operations and daily activities. The environment doesn't care whether we're in our out of uniform. Checking the weather forecast before a trip to the beach is part of the CRM process. Troops We must be trained, ready, and supported. Experience is a big factor. Equipment must be in good operating condition. People - Off duty, do we have the right people for the job? Can everyone swim? Are drivers licensed? Time - Is there enough time to plan and prepare before we have to execute? Off duty, have I taken time to think things through? Have I allowed enough time for rest stops to make a long drive back to base at the end of the weekend? Civilian - Will military operations threaten civilian populations? Legal - Off duty, are our activities legal? For example, are we swimming in an approved area? Are we complying with local building codes? NOTE: Show Slide-9 (Assess Hazards) NOTE: a. Step 2 of Composite Risk Management is to assess the hazards identified in step 1. Probability and severity of hazards are assessed in order to determine a specified level of risk. NOTE: Show Slide-10 (Probability) d. Probability is the likelihood of an event. This is your estimate, given what information you know and what others have experienced. For the purpose of CRM, there are five levels of probabilityfrequent, likely, occasional, seldom, and unlikely: Frequent Occurs very often, known to happen regularly. Examples of frequent occurrences are vehicle rollovers, rear-end collisions, and heat injury during physical training in hot weather with non-acclimated Soldiers. Likely Occurs several times, a common occurrence. Examples include improvised explosive devices (IED), wire strikes for aircraft, controlled flights into terrain, and unintentional weapons discharges. Occasional Occurs sporadically, but is not uncommon. You may or may not get through your deployment without it happening. Some examples might include unexploded ordnance (UXO) and fratricide. Seldom Remotely possible, could occur at some time. Usually several things must go wrong for it to happen. Examples might include things like heat-related death or electrocution. Unlikely Can assume will not occur, but not impossible. Examples might include detonation of containerized ammunition during transport. NOTE: Slide-11 (Severity) e. Severity is expressed in terms of the degree to which an incident will impact combat power, mission capability, or readiness. The degree of severity estimated for each hazard is based on knowledge of the results of similar past events and is addressed in the following four levels used on the risk assessment worksheet: Catastrophic Death, permanent disability, complete mission failure, destruction or major damage to property or equipment. Critical Partial or temporary disability, severely degraded mission capability, extensive damage to property or equipment. Marginal Lost work days due to injury/illness (less than 3 months); degraded mission capability; minor damage to property or equipment. Negligible First aid or minor medical treatment; little or no adverse impact on mission capability; little or no equipment or property damage. NOTE: Show Slide-12 (Risk Assessment Matrix) b. The Army Standard Risk Assessment Matrix is found in FM 5-19, Composite Risk Management. The two factors used to determine a specified level of risk are Probability and Severity. Each of these has a scale that goes from most serious to least serious. Commanders determine who has the authority to approve missions based on risk. Company or Troop commanders usually have the authority to approve Low risk missions, whereas battalion or squadron commanders must usually approve Medium risk missions. This varies based on policies determined by general officer leadership in each of the major commands. c. The matrix provides an estimate rather than an absolute measure of risk. Though the matrix is helpful, there is no substitute for experience and judgment. Remember if it feels like high risk, it probably is. Break any one of the links and the hazard can be controlled and the risk reduced. NOTE: Conduct a check on learning and summarize the ELO. NOTE: The following questions are related to the material we just covered. Read each question and ask the students to raise their hands if they think they know the answer. Facilitate the discussion using the answers provided. Q: What online resource is available to help identify hazards? A: The US Army Combat Readiness Center website. Q: Explain how evaluating Troops and People help to identify hazards. A: If troops are not trained, equipped, or properly organized, this creates hazards. If people are not trained, experienced, or suited to an activity, this also creates hazards. tc "Enabling Learning Objective C - Recognize sexual assault in real-life situations " \l 3C. ENABLING LEARNING OBJECTIVE ACTION:Conduct risk managementCONDITIONS:In a classroom, given a situation requiring a decision, on or off duty, without access to DA Form 7566STANDARDS:Conduct risk management per FM 5-19 1. Learning Step / Activity 1. Conduct risk management Method of Instruction: Conference / Discussion Instructor to Student Ratio: 1:50 Time of Instruction: 15 mins Media: Large Group Instruction NOTE: Show Slide-13 (Develop Controls and Make Decisions) a. Step 3 is to develop controls to reduce or eliminate the risk of each hazard. Residual risk must be evaluated, and decisions made whether to develop more controls, or accept the risk. Steps 1 and 2 were the Risk Assessment steps of CRM. Steps 3, 4, and 5 are the Risk Management steps of CRM. b. On duty, your commanders and leaders make most of the risk decisions. For off duty activities you are usually your own supervisor and you must make the decision. If the risk is too high, do not attempt the activity. NOTE: Show Slide-14 (Develop Controls) c. Controls are actions taken to eliminate hazards or reduce their risks. Controls are effective only if they can be implemented. d. Controls can take many forms, but normally fall into one of three basic categories: Educational Controls: individual and collective training that ensures performance to standard. Physical Controls: barriers, signs, guards, or supervisors, providing warnings that hazards exist. Avoidance/elimination Controls: tactics, techniques, procedures, or plans preventing contact, or completely eliminating, known hazards. NOTE: Show Slide-15 (Develop Controls) e. There are a number of sources available to develop controls: lessons-learned from past operations, accident data from the U.S. Army Combat Readiness Center, After-Action Reviews (AAR), and personal experience are only a few. The key to effective control measures is that they reduce or eliminate the identified hazard. NOTE: Show Slide-16 (Reassess Risk) f. Once controls are developed and applied, each hazard is reassessed to determine a residual risk. The process of developing and applying countermeasures and reassessing risk continues until an acceptable level of risk is achieved or until all risks are reduced to a level where benefits outweigh potential cost. Risk decisions are always based on the residual risk. g. The overall mission or activity risk level is determined by the single highest residual risk. Considered individually, the residual risk associated with each hazard may be low, but considered collectively, sound judgment may dictate elevating the overall risk level above that of any single residual risk. NOTE: Show Slide-17 (Make Risk Decisions) h. The purpose of the CRM process is to provide a basis for making sound individual and leadership risk decisions. A key element of the risk decision is determination of what constitutes an acceptable level of risk. Risk or potential loss must be balanced against expected gains. Risk decisions must always be made at the appropriate level of command or leadership based on the level of risk involved. NOTE: Show Slide-18 (Implement Controls) i. The fourth step of the CRM process is to implement the controls developed in step 3. Controls are executed by the individuals involved in the task or mission by means of verbal or written orders, briefings, plans, SOP, or regulations. Controls must be clearly and completely communicated in order to be effective. Implementation orders should address who will do what; when, where, and how. NOTE: Show Slide-19 (Supervise and Evaluate) j. Step 5 of the CRM process is to supervise and evaluate. Leaders and supervisors are responsible for ensuring standards and controls are followed and enforced. Soldiers and civilian employees are responsible for performing to standard and executing controls. Identifying and reporting hazards, or stopping unsafe acts, is everyone's responsibility. k. Supervision ensures that controls are implemented, monitored, and remain in place; that complacency, deviation from standards, or violations of policies and risk controls are not allowed to threaten success. You support this step by doing the following: Know how, when, and where controls are implemented. Remember the Soldier's Creed: you are an expert and a professional, trained and proficient. If you don't understand, ask! Execute controls per orders. Use your common sense and the Army Values of Loyalty, Duty, and Respect. Be alert, disciplined, and faithful. Avoid complacency, indiscipline, failure to execute to standards, and violation of controls. The Army Values of Duty, Integrity, and Honor are important here: fulfill your obligations, do what's right, and live up to the Army Values. Report hazards. Stay alert to identify new hazards. Ask this question of yourself: "What can take me or my team out of the fight?" Live up to the Army Values by demonstrating Personal Courage to speak up when something is not right. You are an important member of the Army Team. NOTE: Show Slide-20 (Evaluate) l. The evaluation process occurs during all phases of the operation, and as part of the AAR and assessment following completion of the operation or activity. The evaluation process serves to accomplish the following: Identify any hazards that were not identified as part of the initial assessment. Determine whether the controls positively or negatively impacted the mission or activity. Assess the implementation, execution, and communication of the controls. Assess effectiveness of controls in eliminating hazards and controlling risks. Ensure compliance with the guiding principles of CRM. Transition: We have discussed the CRM process, risk assessment, and risk management. Now we will discuss what this means to each Soldier. NOTE: Show Slide-21 (Individual Responsibility) m. The Soldiers primary role in CRM is to support commanders and leaders by identifying and reporting hazards. In addition, Soldiers must reduce or eliminate hazards within their ability and authority. For example, telling another Soldier to put on their seatbelt, or fasten the chin-strap of their helmet, is taking a simple step to reduce or eliminate the hazards. In many cases, Soldiers will be faced with much more demanding situations where Soldier and teams will be forced to act alone, and make tough risk decisions. Practicing CRM every day will help prepare them for the difficult risk decisions. NOTE: Show Slide-22 (CRM and You) n. CRM On and Off Duty CRM is a life skill that doesnt stop at the end of the duty day, but carries over to off duty activities. Be your Brothers Keeper. Use the buddy-system during all missions and activities, on and off duty. Live by the Warrior Ethos, Soldier's Creed, and Army Values. Apply CRM to YOUR daily operations to identify areas of high-risk and implement controls to reduce the risks. Know your enemy. Know your equipment. Know your environment. Follow Tactics, Techniques, and Procedures. Do not compromise the standard. o. CRM and Vehicle Operations(Privately Owned and Army Vehicles) Know yourself and your vehicle. Know you limitations. Know your vehicles limitations. Excessive speed, fatigue, following too close, and over-reacting are major factors in vehicle accidents. As a vehicle operator, YOUR primary responsibility is to maintain vehicle control. Make sure you take the Armys Accident Avoidance Course, available online at the Combat Readiness University. Distractions while driving can be deadly. Maintain situational awareness while operating a vehicle, e.g. reduce speed in unfamiliar areas, take extra time when clearing turns or intersections, always obey traffic signs and rules of the road. Driving while under the influence of alcohol or other drugs will affect more than your own life. Risky behavior puts not only YOU at risk but ALL OTHERS ON THE ROAD as well. You must understand the hazards associated with alcohol consumption and driving. p. Personal Injury Decisions made on impulse may affect you and your family for the rest of your lives. Use CRM to reduce the risk of injuring yourself in all types of activities at work or play. Diving into shallow water. Climbing an unstable ladder. Fire. NOTE: Conduct a check on learning and summarize the ELO. Q: What are the three types or classes of control methods used to develop controls? A: Educational (awareness) Controls, Physical Controls, and Avoidance/elimination Controls NOTE: Show Slide-23 (Conclusion) For the past fifty minutes we have examined the Armys Composite Risk Management process. You should now understand what the CRM process is, why it's important, and how, when, and where to apply it. Remember, it's Composite Risk Management because a loss is a loss, no matter where it occurs. You must manage risk 24/7, both on and off duty. NOTE: Show Slide-24 (Terminal Learning Objective) During this introduction to CRM we identified the key components of the CRM process. We discussed: -What is CRM? -Why does the Army use it? -What does it mean to me the Soldier? -How do I apply CRM in my daily duties, on and off duty? -How do I use CRM to help my team? Remember, the life you save may be your buddies or yours! tc "Section IV Summary " \l 2SECTION IV. SUMMARY Method of Instruction: Conference / Discussion Instructor to Student Ratio is: 1:50 Time of Instruction: 5 mins Media: Large Group Instruction Check on Learning NOTE: If time permits, conduct a summary check on learning. NOTE: Determine if the students have learned the material presented by soliciting student questions and explanations. Ask the students questions and correct misunderstandings. Review / Summarize Lesson During this Introduction to CRM we identified the key components of the CRM process. We discussed: -What is CRM? -Why does the Army use it? -What does it mean to me the Soldier? -How do I apply CRM in my daily duties, on and off duty? -How do I use CRM to help my team?  SECTION V. tc "Section V Student Evaluation " \l 2STUDENT EVALUATION Testing Requirements-Not applicable. This course is introductory only. tc "Appendix A - Viewgraph Masters A - " \l 1Appendix A - Viewgraph Masters VIEWGRAPHS FOR LESSON: CRM for Basic Training Viewgraph, Slides for 1-27 (Download separately) "c:\\asat\\asat_037\\037_228.ppt" tc "Appendix B - Test(s) and Test Solution(s) (N/A) B - " \l 1Appendix B - Test(s) and Test Solution(s) (N/A) tc "Appendix C - Practical Exercises and Solutions (N/A) C - " \l 1Appendix C - Practical Exercises and Solutions (N/A) tc "Appendix D - Student Handouts D - " \l 1Appendix D - Student Handouts HANDOUTS FOR LESSON : NA     PAGE  PAGE 1 A- PAGE 1 B- PAGE 1 D- PAGE 1 !"5?B} + N \ ` v k $ % B R r   ﻷﻪh/BNhOjh/BNhOU h/BNh{h/BNh>*B*ph3fhj h/BNh h/BNh@h/BNhO6] h/BNhOf$h/BNh:\mHnHu h/BNh.- h/BNhOh/BNhO5\8 !"5~v xx$1$IfMkd$$Ifl0f$f4 lalytq4xx$1$If^4`gdn7V xx$1$If1$$1$a$  TMkd($$Ifl0f$f4 lalytq xx$1$IfMkd$$Ifl0f$f4 lalytq + _ ` v i j TJB$1$If x$1$IfMkdP$$Ifl0f$f4 lalytq xx$1$IfMkd$$Ifl0f$f4 lalytqj $ % B Q  ,x$1$If xx$1$IfMkd$$Ifl0f$f4 lalytq x$1$If$1$If Q R r } ~ TNNB xx$1$If$1$a$Mkd $$Ifl0f$f4 lalytq xx$1$IfMkdx$$Ifl0f$f4 lalytq    d x !xx$1$If^`gdn7V xx$1$IfMkd$$Ifl0$4 lalytt &Zxx$1$If  & ( c g y z    %˾{g{[h/BNh6mHnHu&jEh/BNhOUmHnHuhtmHnHu&jh/BNhOUmHnHu jh/BNhn7VUmHnHuh/BNhn7VmHnHuh/BNhO0Jjh/BNhO0JUh/BNhO>* h/BNhOh/BNh:\mHnHu h/BNhn7V h/BNh.-h/BNhO5\d e f p y z 'w ^ gd6gd6$$1$a$$1$$$1$a$$ 1$$x1$1$Mkd4$$Ifl0$4 lalytt %&DE*+-./Ofgijkl˽稜~~rrh/BNhtkLmHnHuh/BNh=a mHnHuhA-DmHnHuhvBzmHnHuh/BNh@mHnHuhsmHnHuh/BNh6mHnHuh/BNh@\mHnHuh/BNh:\mHnHuh/BNhn7V5mHnHuh/BNhn7VmHnHuh/BNhr$mHnHu,.j5\^_a$ xx$1$If 1$$1$a$1$&d(d1$PR^ $1$gd6gd=a  ^ gd6.014:RWX[\]a%ʹۭ砙xndWOWdh/BNhOjh/BNhOUh/BNhO5\h/BNh.-5\h/BNhe5\ h/BNh.-h/BNht5h/BNh:5 h/BNhOjh/BNhO0JUh/BNhsxgmHnHu h/BNhn7VB*mHnHphu h/BNhm7B*mHnHphuh/BNhr$mHnHuh/BNhn7VmHnHuh/BNhRz,mHnHu%23:;HW{|} "#./:<N BDEIKbcpq~"#-/:fռռռռխխh/BNhO>* h/BNh' h/BNhjh/BN h/BNhS h/BNh.- h/BNhO h/BNh: h/BNhOTh/BNhO5\h/BNhO5>*\D$H|}~vlV   Hx$1$If^ `H x$1$If$1$If x$1$IfMkd$$Ifl0$*4 lalyt5p Hl  x$1$If^ gd  Hl x$1$If":;}l H xx$1$If H x$1$If xx$1$IfMkdV$$Ifl0$*4 lalyt5p   Hx$1$If^ `Hgd/BN;<NdLL l  $1$If^ ` l  $1$If^ `gd' $1$If  x$1$If x$1$If xx$1$IfMkd$$Ifl0$*4 lalyt5p!)JvbF z J 6x$1$If^6` 6$1$If^6` z 6xx$1$If xx$1$IfMkd~$$Ifl0$*4 lalyt5p l xx$$d1$IfNgd'JKb~7Mkd $$Ifl0$*4 lalyt5pHx$1$If`Hgdg" H x$1$If xx$1$IfMkd $$Ifl0$*4 lalyt5p"#./NMkd $$Ifl0$*4 lalyt5p xx$1$H$IfMkd: $$Ifl0$*4 lalyt5p$1$If/:BIOfghp[RRR $$1$Ifkdb $$Iflr"$b^4 lalyt5p$$$x$1$Ifa$ $$x$1$If fhop/TWj  01ABVZiyz6789?\NĻĴh/BNh5p5\h5ph5pCJaJy(h5pCJaJ h/BNh5p h/BNhpuhpuCJaJy(hpuCJaJh/BNhpu5\h/BNhO5>*\ h/BNhY h/BNhO5\ h/BNhOf$ h/BNhO7obTx$1$H$Ifgdg" xx$1$H$Ifkd* $$Iflr"$b^4 lalyt5p $$1$IfVWjpQF $x$1$IfMkd $$Ifl0$*4 lalyt5p$1$If x$1$IfMkd $$Ifl0$*4 lalyt5ppzkbXXXX <$1$If $$1$Ifkd$$IflrF$4 lalyt5p $x$1$Ifa$ xmm_____$$x$1$Ifa$ $x$1$Ifkd$$IflrF$4 lalyt5p#'RI<// $<$1$Ifa$ <$1$IfgdJ`? $$1$Ifkd$$Ifl֞Fx!$vr4 lalyt5p'*,/018/ $$1$Ifkd$$Ifl֞Fx!$vr4 lalyt5p $<$1$Ifa$ $<$1$Ifa$1V[_bdg$<$1$Ifa$gdJ`?$<$1$Ifa$gdJ`? <$1$IfgdJ`?ghiRI</ $<$1$Ifa$ <$1$IfgdJ`? $$1$IfkdZ$$Ifl֞Fx!$vr4 lalyt5p2kd2$$Ifl֞Fx!$vr4 lalyt5p$<$1$Ifa$gdJ`?$<$1$Ifa$gdJ`?$<$1$Ifa$gdJ`?$<$1$Ifa$gdJ`? <$1$IfgdJ`? $$1$IfRF9 <$1$IfgdJ`? xx$1$Ifkd $$Ifl֞Fx!$vr4 lalyt5p67J? $x$1$IfMkdv$$Ifl0$*4 lalyt5p <$1$IfgdJ`? xx$1$IfMkd$$Ifl0$*4 lalyt5p789>?VOC xx$1$IfMkd$$Ifl0$*4 lalyt5p $<$1$If $$1$IfMkd $$Ifl0$*4 lalyt5pVOT^jr $x$1$Ifa$' ,p@ P !$`'xx$1$H$Ifgd.-dxx$1$If^d`NOrz+,E]u:ST\o9:ûñЩЩХЩб~hSh^ h/BNh5r h/BNh: h/BNhjUh/BNhjU5\h{!h/BNhO>*h/BNhO5\h/BNhOjh/BNhOU h/BNhOh5ph/BNh5p5\ h/BNh5ph/BNh5p5>*\h/BNh5p50rstuvwxye]]RRRR $<$1$If$1$Ifkd$$Iflֈ!$v4 lalyt5pyzeZZZ $x$1$Ifkd$$Iflֈ!$v4 lalyt5p$x$1$Ifgd5p<<$1$Ifgd5p <<$1$IfMkd$$Ifl0$*4 lalyt5pxl]]]]<<$1$Ifgd5p <<$1$Ifkdt$$Iflr0h$p8 j4 lalyt5pEvxo<<<2 t $d%d&d'd1$NOPQ] ^ 1$kd4$$Iflr0h$p8 j4 lalyt5pTpp% , P !$x$1$H$Ifgd^' , P !$xx$1$H$Ifgd^ xx$1$If4 t x$d%d&d'd1$NOPQ] ^^_{|ikx 2!6!!!!!!!!!&"1"3"7"M"""$º϶Ϧϓό~~ h/BNhs h/BNhY h/BNh h/BNhkhshohO\h/BNhvN\h/BNh+\h_dh/BNhOjh/BNhOU h/BNhOhShO5\h/BNhO5\hKZhS h/BNh5r h/BNh7}1{| LD$1$IfMkd$$Ifl0$<4 lalyt^ $1$Ifgd^ xx$1$IfMkd$$Ifl0$<4 lalyt^jklx~$1$If`kd($$IflF $F    4 lalyt^ $1$Ifgd^ x$1$Ifgd^~ $1$Ifgd^ x$1$Ifgd^$1$If`kd$$IflF $F    4 lalyt^ =1 xx$1$IfMkdb$$Ifl0$<4 lalyt^ $1$Ifgd^$1$If`kd$$IflF $F    4 lalyt^ !!!!!!!LB x$1$IfMkd$$Ifl0$<4 lalyt^ xx$1$IfMkd$$Ifl0$<4 lalyt^ $1$Ifgd^!!%"&"1"5"6"7"@Mkd$$Ifl0$<4 lalyt^ $1$H$Ifgd^ xx$1$IfMkd0$$Ifl0$<4 lalyt^ $1$Ifgd^7"M"$'''''(mVHH`1$^``gdoh&d1$P]h^gdo `1$^``gdoMkdd $$Ifl0$<4 lalyt^% , P !$x$1$H$Ifgd^ xx$1$If$8%T%%(&&'''''''''((( (((((()))b)d)o)))))))B*C*D*E*k*l****Ľϸϣϟ|rh/BNh[5\ h{!5\ h[5\ h/BNh39H h/BNh+ h/BNh#/hvBzh/BNhk \ hvBz\h/BNhoz\ hs\ h/BNh0hO h05\h/BNhO5\h/BNhOjh/BNhOU h/BNhO h/BNhshs,(((()))c)qtkd $$Ifl      0 #$     0    0      4 laSyt#/ $1$Ifgdo`1$^``gdoc)d)o)) $1$Ifgdotkd!$$Ifl      0 #$     0    0      4 laSyt#/)))) *-*K*j*vfQff \ `1$^``gdo \ 1$^gdo`1$^``gdo1$gdotkdT"$$Ifl      0 #$     0    0      4 laSyt#/j*k*l***..Y0Z000(1xcc h`1$^``gdo `1$H$^``gdo \ |1$H$^`|gdo`1$^``gd[1$^`gd[ 1$^gd[ p1$^gd[ @ `1$^``gd[ \ |1$^`|gdo ***********++*+L+e+r+s++++',G,,,--].../@/A/i/j/k///1020Y0Z0_0c0d0~00000000Խ綬h/BNh&[5\ h05\ h/BNhv h/BNh h/BNh&[h/BNhO5\ h/BNhOh/BNh[0J j"h/BNh[Ujh/BNh[Uh"d(hL h/BNh[h{!h[h/BNh[5\40 1 1&1(1)1*1,161F1N1n111112233 3 33435363Q3R3S3~3333333384>4@4A4B4T4Ŀϸϱ瘟{vo h{!5\ hvS\ h0\h/BNh S\h/BNhvS\ hR7\h/BNhR7\h/BNh \ h{!\ h05\ h/BNh>? h/BNh" h"d(>*h"d( h/BNh h/BNhFl h/BNh&[h{!h0h/BNhk 5\ h/BNhOh/BNhO5\*(1)13 35363R3S33333bbbb$ ) p@ P !$ u1$^ `ugdo & p@ P !$p1$^pgdo$ ) p@ P !$+ u1$^+ `ugdo @ `1$^``gdo p1$^gdo p@ 1$^gdo 33A4B4r4s444&5'55jZj ~ p1$^pgd[ & F ~ p1$^p`gd) ~ p1$^pgdvS p1$^gdvS @ `1$^``gdvS$ ) p@ P !$@ 01$^@ `0gdo$ ) p@ P !$ u1$^ `ugdo T4r4s4t444%5&5'5555J6h6i666677777o8p8q8$:%:&:,:^:_:`:::::;;~wslwslbwsh/BNhO5\ h/BNh0hO h/BNhOh/BNhu5\ hvS5\h/BNh"d(5\h"d(h[5\h/BNhP25\hP2hP25\ hP2\ h"d(\h/BNhvS\h/BNh[5\h[hvS5\h0hvS5\ h/BNhvSh{!hvSh/BNhvS5\&5577p8q8%:&:_:`:jj" & p@ P !$`1$^``gdo `1$^``gdvS ~ p1$^pgd"d( & F ~ p1$^p`gd"d( ~ p1$^pgdP2 & F ~ p1$^p`gd) ~ p1$^pgd[ `:::;;J;;;;;;W<) ;#p@ P !$`'0*-.11$^gdo* 5p@ P !$`'0*-.1`1$^``gdo$ 2p@ P !$`'0*.1$^gdo ;; ; ;I;J;L;M;N;;;;;;;;;;;;;;;;;;;8<9<V<W<Y<Z<[<<<<<<.=0=1=======E>e>g>ҹεٮ٪ٮ٣٪ٖh/BNhMS\ h2q\h/BNhOjh/BNhOU h05\hP2 h/BNhuhO h/BNh7lh/BNh05\hX,hw8 h/BNhk h/BNhO hP2\h/BNhk5\h/BNhO5\ h/BNh02W<<</=0==== $1$Ifgdo`1$^``gdo|1$^`|gdo, Ahvp@ P !$`'0*-.11$^gdo* >#vp@ P !$`'0*-.11$^gdo===f> $1$Ifgdotkd#$$Ifl      0 #     0    0      4 la ytuf>g>r>> $1$Ifgdotkd$$$Ifl      0 #     0    0      4 la ytug>r>>>>>>>8?:?;?@?A?H?I?c?k?l?m?u?v???@!@=@>@?@P@Q@S@c@d@e@f@g@i@@@@uqjfjh{! h/BNh/hYh/BNhvS5\ hO5\h/BNh/5\ h{!5\ h05\ h/BNhh/BNhBl\ hw8\h/BNhg\ h5\h/BNhg5\hhB h/BNhuh2qB*\ph h/BNhO h/BNh2qhGAh/BNhO5\'>>>>>#?A?a?vbbRR \ 1$^gdo \ `1$^``gdo`1$^``gdo1$gdotkd6%$$Ifl      0 #     0    0      4 la ytua?b?c?>@?@e@f@DDDf- ;p@ P !$`'0*-./`1$^``gdo 1$^gdo `1$^``gdo @ `1$^``gdo  1$^gdo \ 1$H$^gdo \ |1$^`|gdo @@A"AAB/CCCC DDDDDDDDDDDDEEEEFFhGiG8H9HHH3I4IIIJJ JJ3JJJJJJJK񿸱梚梩斍h/BNhw5\hw hoG5hoGh/BNhB95 h/BNhB9hB9hZX4 h/BNh` h/BNhZX4hBh/BNhZX45\ hY5\h/BNhO5\h0h hw8 h/BNh&hY h/BNh/h,9?1DDEEFFiGjG9H:HHH4I5Isssss* >p2 P !$`'0*-./p1$^pgdB94 & F Cp2 P !$`'0*-./p1$^p`gd), Ap@ P !$`'0*-./1$^gdo 5IIJJJJk?k, Ap2 P !$`'0*-./p1$^pgdoG3 & F Ap2 P !$`'0*-./p1$^p`gd)* >p2 P !$`'0*-./p1$^pgdw84 & F Cp2 P !$`'0*-./p1$^p`gd)JJK KuLvLM~pcH & F 2 2 >1$7$H$^2 `>gd) p^pgdo ^gdw( Ap@ P !$`'0*-./1$gdw- ;p@ P !$`'0*-./`1$^``gdw, Ap@ P !$`'0*-./1$^gdoK K KKKK#K*K+K,K-K5K6K^2 `>a$gd) p1$7$H$^pgdoG 2 2 >^2 `>gdw & F 2 2 >1$7$H$^2 `>gd) 2 2 >1$7$H$^2 `>gdw P!P)PPPPPP"QsQvQ}QQQQQDRFRWRXRjRkRsRvR|RR*S-S/S0S1S2SDSESTSXSSSOTPTUUUU.U/UU˿˶~vh/BNh\ h\ hC15\hC1h h/BNhhIhah\ h5\h/BNh5\ h5hoGhoGhoG5h h/BNhRz,h/BNhRz,5h/BNhRz,OJQJ^JhoGOJQJ^JhoGhoG5OJQJ^J.jRkR1S2STSUSPTQT/U0UUU}g 8p p1$^pgd & F 8p p1$^p`gd) 8p p1$^pgd & F 8p p1$^p`gd) 8p 1$^gd `1$^``gd`1$^``gd UUVVyWzWXXXX"X&XYYZZ[[[[[[[ \ \%\D\\]^^^_7_8_9_?_r_s_x_W`X`[`````````aaaa˿˿ݩٷhh\ h5 h<5\ h/BNh<h/BNh<5\hhhXj h/BNhC1 hC1>*hC1h/BNhC15\h< hC15\h/BNh5\ h5\ h/BNhh6UVVzW{WXX"X#XhYiYYYcZdZZ 1$H$^gd p1$H$^pgd & F p  1$H$^ gd) 1$H$^gd @ `1$^``gd 8p p1$^pgd & F 8p p1$^p`gd)ZZ[[[[^l56 V9sh#@rpP !n#$`'0*-/1$^gd; _9sh#@rISp@ P !n#$`'0*-/1$^gdC1+ 8p@ P !n#$`'0*-/`1$^``gdC1 p1$H$^pgd< & F p  1$H$^ gd) p1$H$^pgd^^8_9_r_s_W`X````aaa?bGb $1$Ifgdo`1$^``gdo* >p2 P !$`'0*-./p1$^pgdB9 1$^gd<`1$^``gd< `1$^``gdC1 1$^gdC1aaab bGb^b`blbbbbbcc$c;ckclccccccccccccdd d d d ddd4e5e8e»δΰΰڢڛڑ΍~zvoh h/BNh{ h/BNhdhhI h/BNhZX4h:h,qh0h/BNhZX45\ h2q5\h/BNh{5\hha h/BNhu h/BNh2qhGAh/BNhZX4\ h/BNhO h2q\h/BNhO5\h/BNhOjh/BNhOU h/BNh0(Gb_b`blbbtkd%$$Ifl      0 #     0    0      4 la ytu $1$Ifgdobbbc $1$Ifgdotkd&$$Ifl      0 #     0    0      4 la ytucccPq*|s}sssttvv8v9vwwewfww ~ 1$^gd/ & F ~ 1$`gd) 1$^gdo`1$^``gdo & F  p1$^p`gd) & F  p^p`gd)  p^pgd/wwwcwdwewfw|wwwwwwxxdxexxxxxxxxx"y#y*y+y,y=y>y?yAyZy[y\y]y^y`ynyvyyzʿʪѣђы}yrnrnhRd h/BNhh/hh/BNh/5\ hO5\h/BNh5\ h5\ h2q5\ h/5\ h/BNh h/BNh[#h I h/BNh{ h/BNhOh/BNhO5\ h >\ h/\ h I\h/BNh\h/BNh/\ h\+wwxxdxexxx+y,y\y]y{{{{||p| & F p p1$^p`gd)`1$^``gdo 1$^gdo ~ 1$^gd/ & F ~ 1$`gd) ~ p1$^pgd >zz{{{{{{{{{{{{{{|||D|J|o|p|q||||}}}s}}}}}}}}~~~~~ҺҲ|thh\ h/BNh| h/BNhu h/BNh*h/BNhO>* h/BNhOh/BNhO5\h/BNhOjh/BNhOUh/BNh/\ hTp}\h/BNhTp}\h/BNh5F\0Άφ5^}sk$1$If xx$1$If4 t x$d%d&d'd1$NOPQ] ^2 t $d%d&d'd1$NOPQ] ^ 1$gdo 1$^gdo ˆÈ'6xnbbbb $1$H$Ifgd2 x$1$IfMkd'$$Ifl0+ D%f 4 layt 7$1$If $1$H$If' ,p@ P !$`'xx$1$H$Ifgd4 6Ry؉ىډ#9l{ x<$1$If x$1$If 1$Mkdv($$Ifl0+ D%f 4 layt 7 x$1$H$If $1$H$Ifgd2 lmn#$FG>?@$$1$a$ 1$gd4$&d1$Pa$$1$a$1$Jkd )$$Ifl0#f4 laي "$FGH .9>@Aqr徶塾徶~z~z~z~zpjhP20JUh;jh;U h/BNhjh/BNhY5\h/BNhfT5\ h/BNhbh/BNhO5B*\phh/BNhOjh/BNhOUh/BNhO< h/BNh4h^ h/BNh{ h/BNhOh/BNhO5\h/BNhmf5\)@ŒÌ͌Όό܌݌ $&`1$a$ hh]h`h&` &`#$gddm $ 1$a$gdj$&d1$Pa$1$$1$a$ÌČɌʌˌ̌͌όьҌ،ٌڌی܌ތ h/BNhjhOh;hj0JmHnHuhP2jhP20JU hP20J'݌ތ $ 1$a$gdj1$ $&`1$a$50P:p&[/ =!F"#$% 8 00P:p&[/ =!F"#$% 8 00P:pu/ =!F"#$% 8 00P:p{/ =!F"#$% 200P/ =!"#$% 200P/ =!"#$% 200P/ =!"#$% 800P:pY/ =!"#$% $$Ifl!vh5f5#vf#v:V l5f5/ / / 4alytq$$Ifl!vh5f5#vf#v:V l5f5/ / /  4alytq$$Ifl!vh5f5#vf#v:V l5f5/ / /  4alytq$$Ifl!vh5f5#vf#v:V l5f5/ / /  4alytq$$Ifl!vh5f5#vf#v:V l5f5/ / /  4alytq$$Ifl!vh5f5#vf#v:V l5f5/ / /  4alytq$$Ifl!vh5f5#vf#v:V l5f5/ / /  4alytq$$Ifl!vh5f5#vf#v:V l5f5/ / /  4alytq$$Ifl!vh55#v#v:V l55/ / / 4alytt$$Ifl!vh55#v#v:V l55/ /  / 4alytt}DyK _Toc122415118}DyK _Toc122415119$$Ifl!vh55*#v#v*:V l55*/ / / 4alyt5p$$Ifl!vh55*#v#v*:V l55*/ / /  4alyt5p$$Ifl!vh55*#v#v*:V l55*/ / /  4alyt5p$$Ifl!vh55*#v#v*:V l55*/ / /  4alyt5p$$Ifl!vh55*#v#v*:V l55*/ / /  4alyt5p$$Ifl!vh55*#v#v*:V l55*/ / /  4alyt5p$$Ifl!vh55*#v#v*:V l55*/ / /  4alyt5p$$Ifl!vh55*#v#v*:V l55*/ / /  4alyt5p$$Ifl!vh55b555^#v#vb#v#v#v^:V l55b555^/ / 4alyt5p$$Ifl!vh55b555^#v#vb#v#v#v^:V l55b555^/ / 4alyt5p$$Ifl!vh55*#v#v*:V l55*/ / /  4alyt5p$$Ifl!vh55*#v#v*:V l55*/ / /  4alyt5p$$Ifl!vh55555#v#v#v#v:V l5555/ / / 4alyt5p$$Ifl!vh55555#v#v#v#v:V l5555/ 4alyt5p$$Ifl!vh555555v5r#v#v#v#v#vv#vr:V l55555v5r/ / / 4alyt5p$$Ifl!vh555555v5r#v#v#v#v#vv#vr:V l55555v5r/ 4alyt5p$$Ifl!vh555555v5r#v#v#v#v#vv#vr:V l55555v5r/ 4alyt5p$$Ifl!vh555555v5r#v#v#v#v#vv#vr:V l55555v5r/ 4alyt5p$$Ifl!vh555555v5r#v#v#v#v#vv#vr:V l55555v5r/ 4alyt5p$$Ifl!vh55*#v#v*:V l55*/ / / 4alyt5p$$Ifl!vh55*#v#v*:V l55*/ / / 4alyt5p$$Ifl!vh55*#v#v*:V l55*/ / / 4alyt5pv$$Ifl!vh55*#v#v*:V l55*/ 4alyt5p$$Ifl!vh555v555#v#v#vv#v#v:V l555v55/ / / 4alyt5p$$Ifl!vh555v555#v#v#vv#v#v:V l555v55/ / / / / / 4alyt5pv$$Ifl!vh55*#v#v*:V l55*/ 4alyt5p$$Ifl!vh55p585 5j#v#vp#v8#v #vj:V l,55p585 5j/ 4alyt5p$$Ifl!vh55p585 5j#v#vp#v8#v #vj:V l,55p585 5j/ 4alyt5p$$Ifl!vh55<#v#v<:V l,55</ / /  4alyt^$$Ifl!vh55<#v#v<:V l,55</ / /  4alyt^$$Ifl!vh55F5#v#vF#v:V l,55F5/ / /  / 4alyt^$$Ifl!vh55F5#v#vF#v:V l,55F5/ / /  / 4alyt^$$Ifl!vh55F5#v#vF#v:V l,55F5/ / /  / 4alyt^$$Ifl!vh55<#v#v<:V l,55</ / /  4alyt^$$Ifl!vh55<#v#v<:V l,55</ / /  4alyt^$$Ifl!vh55<#v#v<:V l,55</ / /  4alyt^$$Ifl!vh55<#v#v<:V l,55</ / /  4alyt^$$Ifl!vh55<#v#v<:V l,55</ / /  4alyt^$$Ifl!vh55<#v#v<:V l,55</ / /  4alyt^$$IfS!vh5 50#v #v0:V l0      5 50/  4aSyt#/$$IfS!vh5 50#v #v0:V l0      5 50/  4aSyt#/$$IfS!vh5 50#v #v0:V l0      5 50/  4aSyt#/DyK https://crc.army.mil/home/yK 6https://crc.army.mil/home/$$If !vh5 50#v #v0:V l0      5 50/  4a ytu$$If !vh5 50#v #v0:V l0      5 50/  4a ytu$$If !vh5 50#v #v0:V l0      5 50/  4a ytu$$If !vh5 50#v #v0:V l0      5 50/  4a ytu$$If !vh5 50#v #v0:V l0      5 50/  4a ytu$$If !vh5 50#v #v0:V l0      5 50/  4a ytu$$If!vh5f5#vf#v:V l 5f5/ / /  4ayt 7$$If!vh5f5#vf#v:V l 5f5/ / /  4ayt 7$$If!vh5f5#vf#v:V l5f5/ / / 4&P@P Normal1$7$8$H$OJQJ^J_HmH sH tH x@x (4Heading 1,Heading 1 Char1,Heading 1 Char Char,Heading 1 Char,Heading 1 Char Char Char,Heading 1 Char2 Char,Heading 1 Char Char1 Char,Heading 1 Char1 Char Char 1$@& 5\aJJ@J { Heading 3$<@&5CJ\aJDA@D Default Paragraph FontRi@R  Table Normal4 l4a (k(No List 0@0 Header  !0 @0 Footer  .)@. Page Number6"6  Footnote Text@&1@ Footnote ReferenceH*:@: TOC 1 $ x^D@D 6TOC 2 T$ <]H@H =a TOC 3$$  $ h<]^hL@L TOC 4'  $ x]^vv j Table Grid7:V01$7$8$H$O (4Heading 1 Char1 Char,Heading 1 Char Char Char1,Heading 1 Char Char1,Heading 1 Char Char Char Char,Heading 1 Char2 Char Char,Heading 1 Char Char1 Char Char,Heading 1 Char1 Char Char Char Char&5OJQJ\^J_HaJmH sH tH POP s[ACTIONp@]^pCJOJQJ^JaJLOL 1lDIALOG`]`^CJOJQJ^JaJb^@b { Normal (Web)dd1$7$8$H$[$\$CJOJQJ^JaJ2B@2 { Body Textx\O\ {Bullet 1 & F<<1$7$8$H$CJOJQJ^JaJRYR dm Document Map-D M OJQJ^J6U@6 W Hyperlink >*B*phHH * Balloon Text!CJOJQJ^JaJB'!B {Comment ReferenceCJaJ424 { Comment Text#@j12@ {Comment Subject$5\`OR` [Para1-1,%$ h`x1$7$8$H$a$ OJQJ^Jk"b7[nG@l7lqlllmMmm~de  /0g8rs00X>$0 00>T:00>000>@` 00 8>@0 0 0 CZ0 0 CZ0 0 CZ@0!Nj 0 0 >!Nj0 !"5~ +_`vij$%BQRr}~defpyz '.j5\^_a $ H | }   " : ; < N  ! ) J K b ~   " # . / : B I O f g h p VWjpz#'*,/01V[_bdghi6789>?VOT^jrstuvwxyzEvT{| jklx%&1567M  !!!c!d!o!!!!! "-"K"j"k"l"""&&Y(Z(((()))+ +5+6+R+S++++++A,B,r,s,,,&-'---//p0q0%2&2_2`22233J333333W444/50555555f6g6r666666#7A7a7b7c7>8?8e8f8<<<<==>>i?j?9@:@@@4A5AABBBBBC CuDvDEE^F_FGGHHtIuIEJFJjJkJ1K2KTKUKPLQL/M0MMMNNzO{OPP"P#PhQiQQQcRdRRRSSSSVV8W9WrWsWWXXXXXXYYY?ZGZ_Z`ZlZZZZ[[[<[k[[[[[[ \ \8]9]^^?^@^^^_ _____m`n```aa b b~ccddddzf{fff4h5hchdhiijj|k}kkkllnn8n9nooeofoooppdpeppp+q,q\q]qssssttptqtuuuuuuvvZv[vwwww x xxxyyyyzzzzzzzz{{p{{{{{I}J}|}}}}}}}} ~ ~2~3~m~n~~~~~5^}€À'6Ry؁فځ#9lmn#$FG>?@„Ä̈́΄τ܄݄ބ00000000000000000000000000000000000000 0 0 0 0 0 00000000000000000000000000000 00 0 000 00 0 0 00 0 0 0000000 0 0 000 0 0 00 0 0 000 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 000000 0000 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 00 0 0 00 0 0 00 0 0000000 0 0 0 0 0 0 0 0 00000000000000000000000000000000000 00 00 00 00 000000000000000000000 0 0 0 0 0 0 0 0 000000000000000000 00 00 00 00 00 00 00 000000 00 00 00 %00 00 0000000000 00 00 00 00 000000 00 00 00 000@00@00@0000000000000 0 0 0 0 0 0 0 0 00000000000000000000 00 00 00000000000000000000000000 00 00 00 000000 00 00 00 00 000000000000 00 00 00 00 0000 00 00 00 00 000000 00 00 0000000000000000000000000000000000 00000 0 0 0000000000 0 00 0 0 0000000000000000000@000@000@000@000@0@0@0@0@0@0@0@0@0@0@0@0@0@0@000p00000 !"5~ +_`vij$%BQRr}~defpyz '.j5\^_a $ H | }   " : ; < N  ! ) J K b ~   " # . / : B I O f g h p VWjpz#'*,/0V[_bdgh6789>?VOT^jrstuvwxyzEvT{| jklx%&1567M !!!c!d!o!!!!! "-"K"j"k""&&Y(Z((()+6+S+++r,,'--/q0%2`223J3333W44/50555555f6g6r666666#7A7a7b7c7>8f8<<>j?:@@5ACuDvDEE^F_FGHHtIuIjJ2KTKQL0MMN{OP"PhQiQQcRdRRSV8WrWWXXYY?ZGZ_Z`ZlZZZZ[[[<[k[[[[[[ \8]^?^^ ___n``a bcddzff4hchijj}kkln9noeopdpp+q]qsstqtuuuv[vww xxyyzzzz{p{{{J}}}}}} ~3~n~~~5^}€À'6Ry؁فځ#9lmn#$FG>?@00000000000000000000000000000000000000000000000000000@0@0@0@0@000000000000000000000000 00000000000000@0@00000000000 0000 000000000 0 0 0 000000 00000000000 0 000000000@0j00e@0@0@0@0@0@0j00e@0 @0 @0 @0 @0 @0@0 @0 @0 @0 @0@0j00e@0 @0 @0 @0 @0@0j00e@0j00 e@0@0j0 0 e@0@0@0 @0@0@0@0 @0@0@0@0@0@0@0 @0 @0 @0 @0 @0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0 0@0@0@0@00000 0 00000000 0 0 0 0 0 0 0 @0 0 0 0 0 0 0 0 00 0 0 @00 0 0 00 0 0 0 0 00000 0 0 0 @0 @0 0 @0 @0 0000000@0@0@0@000000000@0@0@* 0@* 0@* 0@* 0@* 00000000000000 0 0 0 0 0 0 0 0 000000000000@+ 0@+ 0@+ 0@+ 0@+ 0@0@+ 0@0@+ 0@0@+ 0@0@+ 0 @+ %0 @0@+ 0 @0@0@0@0@0@- 0@- 0@- 0@- 0@- 0@0@0@0@0@0@0@0@0@0@0@0@0@0@0+ 000 0 0 0 0 0 0 0 0 00000000000000. 0@. 0@. 000000000000002 02 02 0000000000000# 0# 0# 0# 0# 00$ 0$ 0$ 0$ 0$ 000% 0% 0% 0@0@0@000000000000000000 00000 0 0 0000000000 0 00 0 0 000000000000000000 00P00>@0@0 00Q ########################222222AAAAAAPPPPPPPPPS %%fN$*0T4;g>@K PUa8ehlswz~ʆيGOQST\krz j Q d $;J/p'1g7Vry !7"(c))j*(135`:W<=f>>a?D5IJMjRUZ^Gbbccfi|swp|Հ6l@݌HJKLMNPRUVWXYZ[]^_`abcdefghijlmnopqstuvwxy{|}~I\@'j'' %%X %,.4;=CJLS!!!!!@  @ 0(  B S  ?H0(   OLE_LINK3 OLE_LINK4 _Toc122415118 OLE_LINK1 OLE_LINK2 _Toc122415119 _Toc122415120 _Toc122415121 OLE_LINK5 OLE_LINK6 _Toc122415122 _Toc122415123 _Toc122415124 _Toc122415125 _Toc122415130 _Toc122415131 _Toc122415132 _Toc122415133 _Toc122415134 _Toc122415135EE MM$ 55Y~sLăE $V 5Z~j psTW^cjmF"J"%%<7@7[[ffw{,7~~333335 +`v%r~  N  " / W01hi69>?VPsz}_{&57M !!d!o!! "-"K"2(X( ++++-.//225555g6r66677#7A75?j?DDG HIIJEJ2KUK|NNP#P ZlZZZ$[<[jj}kkn9nuuuuyyzzzzzz{{}H}}}~~^}i€ځ9@τфۄ܄ބ a殦w@pZ6q$P(9}S}%.=ez%JlV'tvD::ZR _VA#b=7ujgz_o6rh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHhpp^p`OJQJo(hHh@ @ ^@ `OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHhPP^P`OJQJo(hHh  ^ `OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHhpp^p`OJQJo(hHh@ @ ^@ `OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHhPP^P`OJQJo(hHh  ^ `OJQJ^Jo(hHoh^`OJQJo(hH  ^ `.  ^ `.xx^x`.HH^H`.^`.^`.^`.^`.X X ^X `.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh88^8`OJQJo(hHh^`OJQJ^Jo(hHoh  ^ `OJQJo(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJ^Jo(hHoh  ^ `OJQJo(hHh\ \ ^\ `OJQJo(hHh,,^,`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohll^l`OJQJo(hHh^`OJQJo(hHhpp^p`OJQJ^Jo(hHoh@ @ ^@ `OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHhPP^P`OJQJ^Jo(hHoh  ^ `OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh  ^ `OJQJo(hHh\ \ ^\ `OJQJo(hHh,,^,`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohll^l`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hH z% alV'_oq$uj _vD#bZR@p}S}%                                     | (͒Z *~ ҈0~Q0j>z@ª                                                               ?<nd$m^ G_A&?D(ga 3<g>{ (g6y ;A E  (g{;A $QLJ! /KM$mLa:Yzw'J 91o[89ML!}K#>G|O?<w\J -:9:@(dJ~ !FJ502!$D$s_O$(g +%LJybi%>_&X2q=H&(A +5P(oFhz)R1*|A*o *7HagK 8(gY#808$mT8$m8o[?m[D?(@EbzG >Aq^AX2qRB ;~Bs_&sD$QLXHF=E|L`_Fb*h_JaFtShFZnF!oFd uGX2qEbzG>$J&Gs_jG$W#>GzG:9HX2qq$nJ(gEfK?<HagKnn~K$QLwUKX2q$QLP8tmL:9L VM$WtMM vXMFM=p O$m\P{cQWDQ0F Z Q3R3R% Ss_NJ{S vLSt:Tb*h?>(4dmOS/Ab8jm7+> @x S [ =a VS k g"(M$Rw80O>?E GAmfqs <yeBI{D}Y ~x {![#Of$r$ &_'m'"d())*n*$[+U(,R<,X,Rz,.-R%.Z.#/r}/A\091C1P2)2R30#4ZX4$5R7J:8k=8K899:Tc:R<<<A<0=t= >,9?J`? @@;M@AD*DA-DuBD5FwF39H> I I[JKtkLAM/BN-JNERS SMSvSOTfTe eHesxgeiXj1l7l6engnSo5p_ep,q=q>Pq5rsDvstltpu9!u4vw(x8zvBz|*|z|7}Tp}f~;uv&eg l7lu}]0}b{hjM2wT^dj @4HX\_35R+uW;HETR/,kVOYd(0]wv"N`%LCXa:!oG? 7FlM;ot/@"5~ +_`v$%BQRr}~de $ | }   " ; < N  J K b   " . / : B I O f g h p VWjpz#'*,/01V[_bdghi6789>?VOT^jrstuvwxyz{ jklx%&167M !!!c!d!o!!!55555f6g6r666?ZGZ_Z`ZlZZZZ[[€فځ#9lm@ hXP@UnknownGz Times New Roman5Symbol3& z Arialg1 Courier Final DraftCourier New5& zaTahoma?5 z Courier New;Wingdings"h|Ҳ&YzpCpCxxdii 2qX?n7V2 TRAINING SUPPORT PACKAGE (TSP) RTF ReportLZ Harrison (harrisol) michael.olin<         Oh+'0l       TRAINING SUPPORT PACKAGE (TSP) RTF ReportLZ Harrison (harrisol)\This document was created using the RTF Report Creation feature of ASAT 4.44 for Windows Normal.dotmichael.olin3Microsoft Office Word@hgC@F Q@&eDQ@@Yp՜.+,D՜.+,P  hp  US ArmyCi TRAINING SUPPORT PACKAGE (TSP) Title(X` _PID_HLINKS_NewReviewCycleAp.m https://crc.army.mil/home/=  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJLMNOPQRTUVWXYZ_Root Entry FYaData )1TableWordDocumentmSummaryInformation(KDocumentSummaryInformation8SCompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89qRoot Entry F:m:|ZaData )1TableWordDocumentm      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJLMNOPQRlefghijk՜.+,D՜.+,P  hp  US ArmyCi TRAINING SUPPORT PACKAGE (TSP) Title(X` _PID_HLINKS_NewReviewCycleAp.m https://crc.army.mil/home/=SummaryInformation(KDocumentSummaryInformation8dCompObjq