Center of Gravity Analysis Guide: Difference between revisions
m Admin moved page Cog to Center of Gravity Analysis Guide |
fixed ul |
||
Line 19: | Line 19: | ||
'''Friendly COG''': Assess our foundational strengths across various domains: | '''Friendly COG''': Assess our foundational strengths across various domains: | ||
'''Diplomatic''': What international alliances and diplomatic relations fortify our position? | |||
* '''Information''': Which communication and propaganda efforts are most influential? | * '''Information''': Which communication and propaganda efforts are most influential? | ||
* '''Military''': What units, capabilities, or systems are crucial for our success? | * '''Military''': What units, capabilities, or systems are crucial for our success? | ||
Line 28: | Line 27: | ||
'''Adversary COG''': Pinpoint the adversary’s vital sources of power and potential targets: | '''Adversary COG''': Pinpoint the adversary’s vital sources of power and potential targets: | ||
'''Diplomatic''': How do their international relationships affect their strategic capabilities? | |||
* '''Information''': What misinformation or psychological operations do they deploy? | * '''Information''': What misinformation or psychological operations do they deploy? | ||
* '''Military''': Which military assets are essential to their operational success? | * '''Military''': Which military assets are essential to their operational success? | ||
Line 37: | Line 35: | ||
'''Host Nation COG''': Assess the host nation’s pivotal strengths and vulnerabilities: | '''Host Nation COG''': Assess the host nation’s pivotal strengths and vulnerabilities: | ||
'''Diplomatic''': What is the host nation’s stance, and how does it influence the conflict? | |||
* '''Information''': What are their capabilities in managing or disseminating information? | * '''Information''': What are their capabilities in managing or disseminating information? | ||
* '''Military''': What military aspects of the host nation could influence their role in the conflict? | * '''Military''': What military aspects of the host nation could influence their role in the conflict? | ||
* '''Economic''': How do the economic conditions affect their alignment in the conflict? | * '''Economic''': How do the economic conditions affect their alignment in the conflict? | ||
* '''Cyber''': Assess the | * '''Cyber''': Assess the cyberinfrastructure and defenses of the host nation. | ||
* '''Space''': Evaluate the host nation’s reliance and capabilities on space-based assets. | * '''Space''': Evaluate the host nation’s reliance and capabilities on space-based assets. | ||
Line 51: | Line 48: | ||
=== 1. Define the Operational Environment === | === 1. Define the Operational Environment === | ||
Refer to the [[PMESII-PT|PMESII-PT]] (Political, Military, Economic, Social, Information, Infrastructure, Physical Environment, Time) framework to gain a comprehensive understanding of the operational environment. | |||
'''Questions to consider:''' | |||
* What are the geographic, political, and societal characteristics that affect potential COGs? | |||
* How do these elements advantage or disadvantage various actors? | |||
* What historical, cultural, and economic factors influence the conflict? | |||
=== 2. Determine COGs for All Parties === | === 2. Determine COGs for All Parties === | ||
Analyze the strengths and resources of friendly forces, adversaries, and other actors to hypothesize potential COGs. | Analyze the strengths and resources of friendly forces, adversaries, and other actors to hypothesize potential COGs. | ||
'''For each actor:''' | |||
* What are their primary sources of power? | |||
* How do these COGs support their strategic objectives? | |||
* Are there multiple COGs at different levels (strategic, operational, tactical)? | |||
=== 3. Identify Critical Capabilities === | === 3. Identify Critical Capabilities === | ||
Critical capabilities are the primary abilities essential for a COG to function effectively. | Critical capabilities are the primary abilities essential for a COG to function effectively. | ||
'''Focus on Actions (Verbs):''' | |||
* What can the COG do to achieve its objectives? | |||
* How does the COG exert influence or control? | |||
* '''Strategic Contribution:''' | * '''Strategic Contribution:''' | ||
* How do these capabilities contribute to the actor's overall mission? | |||
* What would be the impact if these capabilities were degraded or neutralized? | |||
Examples of Critical Capabilities:* | |||
'''Military''': | |||
* '''Project Power''': Ability to deploy forces rapidly across different theaters. | |||
* '''Sustain Operations''': Maintain prolonged military campaigns. | |||
* '''Information''': | * '''Information''': | ||
* '''Influence Public Perception''': Shape narratives to gain support. | |||
* '''Collect Intelligence''': Gather actionable information on adversaries. | |||
=== 4. Determine Critical Requirements === | === 4. Determine Critical Requirements === | ||
Critical requirements are essential conditions, resources, and means for a critical capability to be fully operational. | Critical requirements are essential conditions, resources, and means for a critical capability to be fully operational. | ||
'''Focus on Resources (Nouns):''' | |||
* What resources are necessary for the critical capabilities? | |||
* Consider personnel, equipment, logistics, information, and infrastructure. | |||
* '''Questions to consider:''' | * '''Questions to consider:''' | ||
* What logistical support is required? | |||
* Are there technological dependencies? | |||
* What are the training and readiness levels of personnel? | |||
=== 5. Identify Critical Vulnerabilities === | === 5. Identify Critical Vulnerabilities === | ||
Critical vulnerabilities are aspects of critical requirements that are deficient or vulnerable to direct or indirect attack. | Critical vulnerabilities are aspects of critical requirements that are deficient or vulnerable to direct or indirect attack. | ||
'''Focus on Weaknesses (Nouns):''' | |||
* Are there single points of failure? | |||
* Are there resource constraints or dependencies? | |||
* What are the physical or cyber vulnerabilities? | |||
* '''Analysis:''' | * '''Analysis:''' | ||
* How can these vulnerabilities be exploited? | |||
* What would be the effect of exploiting these vulnerabilities on the COG? | |||
=== 6. Assess and Prioritize Vulnerabilities === | === 6. Assess and Prioritize Vulnerabilities === | ||
Use a weighting system to prioritize vulnerabilities based on their potential impact. | Use a weighting system to prioritize vulnerabilities based on their potential impact. | ||
'''Criteria for Assessment:''' | |||
* '''Impact on COG (I)''': How significantly would exploiting the vulnerability affect the COG? | |||
* '''Attainability (A)''': How feasible is it to exploit the vulnerability with available resources? | |||
* '''Degree of Difficulty (D)''': What is the level of challenge in exploiting the vulnerability? | |||
* '''Scoring System:''' | * '''Scoring System:''' | ||
* Use a scale (e.g., 1-5) to rate each criterion. | |||
* Calculate a composite score to prioritize vulnerabilities. | |||
Example Assessment Table:* | |||
{| class="wikitable sortable" | {| class="wikitable sortable" | ||
Line 154: | Line 142: | ||
== Tools and Techniques == | == Tools and Techniques == | ||
'''SWOT Analysis''': Evaluate Strengths, Weaknesses, Opportunities, and Threats for each COG. | |||
* '''PMESII-PT Framework''': Analyze the operational environment comprehensively. | * '''PMESII-PT Framework''': Analyze the operational environment comprehensively. | ||
* '''Systems Thinking''': Understand the interdependencies within the operational environment. | * '''Systems Thinking''': Understand the interdependencies within the operational environment. | ||
Line 161: | Line 148: | ||
== Best Practices == | == Best Practices == | ||
'''Continuous Assessment''': Regularly update COG analysis to reflect changes in the operational environment. | |||
* '''Interdisciplinary Approach''': Incorporate insights from intelligence, logistics, cyber, and other relevant fields. | * '''Interdisciplinary Approach''': Incorporate insights from intelligence, logistics, cyber, and other relevant fields. | ||
* '''Operational Security''': Protect your own COG analysis from adversary intelligence efforts. | * '''Operational Security''': Protect your own COG analysis from adversary intelligence efforts. | ||
Line 182: | Line 168: | ||
[[Category:Military Planning]] | [[Category:Military Planning]] | ||
[[Category:Strategic Analysis]] | [[Category:Strategic Analysis]] | ||
[[Category:Research | [[Category:Guides]] | ||
[[Category:Operations]] | |||
[[Category:Frameworks]] | |||
[[Category:Research]] |