Center of Gravity Analysis Guide: Difference between revisions
→6. Assess and Prioritize Vulnerabilities: added tables with examples |
→Tools and Techniques: links and formats |
||
Line 12: | Line 12: | ||
=== Identify the COG === | === Identify the COG === | ||
Accurately identifying the COG is critical for successful operational planning. This involves | Accurately identifying the COG is critical for successful operational planning. This involves thoroughly analyzing friendly forces, adversaries, and other relevant actors such as host nations. | ||
'''Friendly COG''': Assess our foundational strengths across various domains: | ==== '''Friendly COG''': ==== | ||
'''Diplomatic''': What international alliances and diplomatic relations fortify our position? | Assess our foundational strengths across various domains: | ||
* '''Diplomatic''': What international alliances and diplomatic relations fortify our position? | |||
* '''Information''': Which communication and propaganda efforts are most influential? | * '''Information''': Which communication and propaganda efforts are most influential? | ||
* '''Military''': What units, capabilities, or systems are crucial for our success? | * '''Military''': What units, capabilities, or systems are crucial for our success? | ||
Line 22: | Line 24: | ||
* '''Space''': How do our satellite and space-based operations enhance our strategic goals? | * '''Space''': How do our satellite and space-based operations enhance our strategic goals? | ||
'''Adversary COG''': Pinpoint the adversary’s vital sources of power and potential targets: | ==== '''Adversary COG''': ==== | ||
'''Diplomatic''': How do their international relationships affect their strategic capabilities? | Pinpoint the adversary’s vital sources of power and potential targets: | ||
* '''Diplomatic''': How do their international relationships affect their strategic capabilities? | |||
* '''Information''': What misinformation or psychological operations do they deploy? | * '''Information''': What misinformation or psychological operations do they deploy? | ||
* '''Military''': Which military assets are essential to their operational success? | * '''Military''': Which military assets are essential to their operational success? | ||
Line 30: | Line 34: | ||
* '''Space''': Do they rely heavily on space-based assets? | * '''Space''': Do they rely heavily on space-based assets? | ||
'''Host Nation COG''': Assess the host nation’s pivotal strengths and vulnerabilities: | ==== '''Host Nation COG''': ==== | ||
'''Diplomatic''': What is the host nation’s stance, and how does it influence the conflict? | Assess the host nation’s pivotal strengths and vulnerabilities: | ||
* '''Diplomatic''': What is the host nation’s stance, and how does it influence the conflict? | |||
* '''Information''': What are their capabilities in managing or disseminating information? | * '''Information''': What are their capabilities in managing or disseminating information? | ||
* '''Military''': What military aspects of the host nation could influence their role in the conflict? | * '''Military''': What military aspects of the host nation could influence their role in the conflict? | ||
Line 66: | Line 72: | ||
* What can the COG do to achieve its objectives? | * What can the COG do to achieve its objectives? | ||
* How does the COG exert influence or control? | * How does the COG exert influence or control? | ||
'''Strategic Contribution:''' | |||
* How do these capabilities contribute to the actor's overall mission? | * How do these capabilities contribute to the actor's overall mission? | ||
* What would be the impact if these capabilities were degraded or neutralized? | * What would be the impact if these capabilities were degraded or neutralized? | ||
Line 74: | Line 80: | ||
* '''Project Power''': Ability to deploy forces rapidly across different theaters. | * '''Project Power''': Ability to deploy forces rapidly across different theaters. | ||
* '''Sustain Operations''': Maintain prolonged military campaigns. | * '''Sustain Operations''': Maintain prolonged military campaigns. | ||
'''Information''': | |||
* '''Influence Public Perception''': Shape narratives to gain support. | * '''Influence Public Perception''': Shape narratives to gain support. | ||
* '''Collect Intelligence''': Gather actionable information on adversaries. | * '''Collect Intelligence''': Gather actionable information on adversaries. | ||
Line 85: | Line 91: | ||
* What resources are necessary for the critical capabilities? | * What resources are necessary for the critical capabilities? | ||
* Consider personnel, equipment, logistics, information, and infrastructure. | * Consider personnel, equipment, logistics, information, and infrastructure. | ||
'''Questions to consider:''' | |||
* What logistical support is required? | * What logistical support is required? | ||
* Are there technological dependencies? | * Are there technological dependencies? | ||
Line 98: | Line 104: | ||
* Are there resource constraints or dependencies? | * Are there resource constraints or dependencies? | ||
* What are the physical or cyber vulnerabilities? | * What are the physical or cyber vulnerabilities? | ||
'''Analysis:''' | |||
* How can these vulnerabilities be exploited? | * How can these vulnerabilities be exploited? | ||
* What would be the effect of exploiting these vulnerabilities on the COG? | * What would be the effect of exploiting these vulnerabilities on the COG? | ||
Line 240: | Line 246: | ||
== Tools and Techniques == | == Tools and Techniques == | ||
'''SWOT Analysis''': Evaluate Strengths, Weaknesses, Opportunities, and Threats for each COG. | |||
* '''[[Structured Analytic Techniques#Technique 3: Strengths-Weaknesses-Opportunities-Threats (SWOT)|SWOT Analysis]]''': Evaluate Strengths, Weaknesses, Opportunities, and Threats for each COG. | |||
* '''[[PMESII-PT|PMESII-PT Framework]]''': Analyze the operational environment comprehensively. | * '''[[PMESII-PT|PMESII-PT Framework]]''': Analyze the operational environment comprehensively. | ||
* '''Systems Thinking''': Understand the interdependencies within the operational environment. | * '''Systems Thinking''': Understand the interdependencies within the operational environment. | ||
* '''Red Teaming''': Use adversarial thinking to challenge assumptions and identify vulnerabilities. | * '''[[Structured Analytic Techniques#Technique 1: Red Hat Analysis and Structured Brainstorming|Red Teaming]]''': Use adversarial thinking to challenge assumptions and identify vulnerabilities. | ||
== Best Practices == | == Best Practices == | ||
'''Continuous Assessment''': Regularly update COG analysis to reflect changes in the operational environment. | |||
* '''Continuous Assessment''': Regularly update COG analysis to reflect changes in the operational environment. | |||
* '''Interdisciplinary Approach''': Incorporate insights from intelligence, logistics, cyber, and other relevant fields. | * '''Interdisciplinary Approach''': Incorporate insights from intelligence, logistics, cyber, and other relevant fields. | ||
* '''Operational Security''': Protect your own COG analysis from adversary intelligence efforts. | * '''Operational Security''': Protect your own COG analysis from adversary intelligence efforts. |