Training > Operational Deployment of Breaching Methods