Center of Gravity Analysis Guide
Overview
The Center of Gravity (COG) is a pivotal concept in military theory and strategic planning, originating from Carl von Clausewitz's work. It represents the primary source of power that provides moral or physical strength, freedom of action, or the will to fight.
Proper identification and analysis of a COG allow commanders to focus their efforts where they will have the greatest impact on an adversary while simultaneously protecting their own strengths.
Official Definitions
- JP 1-02: "Those characteristics, capabilities, or sources of power from which a military force derives its freedom of action, physical strength, or will to fight.”
- JP 3-0: "The source of power that provides moral or physical strength, freedom of action, or will to act.”
Key COG Concepts
Understanding these four core concepts is essential for effective COG analysis.
| Concept | Definition | Focus |
|---|---|---|
| Center of Gravity (COG) | The primary source of an actor's power or strength. | Entity |
| Critical Capabilities (CC) | What the COG can do to achieve its objectives. | Verbs |
| Critical Requirements (CR) | The essential resources the COG needs to perform its capabilities. | Nouns |
| Critical Vulnerabilities (CV) | The parts of the Critical Requirements that are vulnerable to attack or disruption. | Weaknesses |
The 6 Steps of COG Analysis
COG analysis involves a systematic approach to identify, analyze, and act upon centers of gravity.
1. Define the Operational Environment
Use the PMESII-PT framework (Political, Military, Economic, Social, Information, Infrastructure, Physical Environment, and Time) to build a comprehensive understanding of the battlespace.
Questions to Consider:
- What are the geographic, political, and societal characteristics that affect potential COGs?
- How do these elements advantage or disadvantage various actors?
- What historical, cultural, and economic factors influence the conflict?
2. Determine COGs for All Parties
Analyze the strengths and resources of friendly, adversary, and other relevant actors (e.g., host nations) to form hypotheses about their potential COGs.
Questions to Consider for Each Actor:
- What are their primary sources of power? (e.g., a specific military unit, a political leader, economic stability, public opinion)
- How do these COGs support their strategic objectives?
- Are there multiple COGs at different levels (strategic, operational, tactical)?
3. Identify Critical Capabilities (CCs)
These are the primary abilities that a COG must perform to be effective. Focus on the actions the COG takes.
Questions to Consider:
- What can the COG do to achieve its objectives?
- How does the COG exert influence or control?
- What would be the impact if these capabilities were degraded or neutralized?
Examples:
- Military COG: Project power, sustain operations, command and control forces.
- Information COG: Influence public perception, disseminate propaganda, collect intelligence.
4. Determine Critical Requirements (CRs)
These are the essential conditions, resources, and means that a Critical Capability needs to be fully operational. Focus on the resources (nouns) required.
Questions to Consider:
- What resources are necessary for the critical capabilities to function? (e.g., personnel, equipment, funding, specific data, supply lines)
- What logistical support is required?
- Are there any key technological dependencies?
5. Identify Critical Vulnerabilities (CVs)
These are the aspects of the Critical Requirements that are deficient or vulnerable to attack or disruption. These are the "weak links" in the chain.
Questions to Consider:
- Are there any single points of failure?
- Are there resource constraints or dependencies that can be exploited?
- What are the physical, cyber, or informational vulnerabilities?
6. Assess and Prioritize Vulnerabilities
Use a weighting system to prioritize which vulnerabilities offer the most effective and efficient way to affect the adversary's COG.
Assessment Criteria
- Impact (I): How significantly would exploiting this vulnerability affect the COG?
- Attainability (A): How feasible is it to exploit this vulnerability with our available resources?
- Follow-Up (F): Does exploiting this vulnerability create new opportunities or advantages for us?
Scoring System
You can use either a simple linear scale (e.g., 1-5) or a logarithmic scale (e.g., 1, 3, 5, 8, 12) for more nuance. A higher composite score (I + A + F) indicates a higher-priority vulnerability.
| Vulnerability | Impact (I) | Attainability (A) | Follow-Up (F) | Score |
|---|---|---|---|---|
| Adversary Misinformation Campaign | 5 | 4 | 3 | 12 |
| Allied Cybersecurity Weakness | 4 | 3 | 2 | 9 |
| Adversary Social Media Influence | 3 | 3 | 4 | 10 |
Tools and Techniques
- SWOT Analysis: Evaluate Strengths, Weaknesses, Opportunities, and Threats for each COG.
- PMESII-PT Framework: Analyze the operational environment comprehensively.
- Systems Thinking: Understand the interdependencies and feedback loops within the operational environment.
- Red Teaming: Use adversarial thinking to challenge assumptions and identify vulnerabilities.
Best Practices
- Continuous Assessment: COG analysis is not static. Regularly update it to reflect changes in the operational environment.
- Interdisciplinary Approach: Incorporate insights from intelligence, logistics, cyber, and other relevant fields.
- Operational Security (OPSEC): Protect your own COG analysis from adversary intelligence efforts.
- Commander's Guidance: Ensure your analysis is aligned with the commander's intent and operational objectives.
