TO WHAT DEGREE IS THE THREAT INFORMATION CORROBORATED

2. To what degree is the threat information corroborated?