You are on page 1of 6

Centers of Gravity from

the Inside Out


By J an L . R uesc h h o ff and J o nat h an P . D unne

F
or over two decades, U.S. military Marine Corps took different paths to includ- that looks vulnerable and hope you get lucky.
doctrine has insisted on pinning ing COGs into their respective doctrines. A more deliberate process was needed to iden-
major aspects of its operational In 1986, Army doctrine asserted that tify this point.
planning processes on Carl von the essence of operational art was the iden-
Clausewitzs concept of the center of gravity tification of the enemys COG.3 This theme Critical Factors
(COG). Yet the lack of doctrinal guidance on has continued throughout Army doctrine up In 1996, Dr. Joe Strange, a professor
developing and employing COGs wastes plan- through its latest doctrinal revision describing at the Marine Corps War College, set out
ners time and provides few tangible benefits. COG as a focal point for campaigns and to write a 13-page paper to link the Marine
Fortunately, doctrines introduction of Critical major operations.4 While initially suggesting doctrinal terms of critical vulnerability and
Factors as the components of COG provides COG provided a method of pitting strength center of gravity.10 He ended with a full-length
pillars upon which a process of COG identifi- against strength, the Army eventually monograph and a construct that has been
cation and implementation can be built. adopted the term decisive points as a way of adopted by militaries around the globe. Dr.
The purpose of this article is to extend a indirectly attacking an enemys COG. This Stranges framework introduced critical capa-
bridge between COGs and existing doctrinal indirect approach would apply combat power bilities (CCs) and critical requirements (CRs)
guidance for operational planning. The con- against a series of decisive points that avoid as the connective tissue between a CV and
cepts introduced in this article are not meant enemy strengths.5 COG. By exploiting a CV, forces can deny a
to challenge or change doctrine, but to clarify Long holding to the importance of CR necessary for an enemys CC. As the CCs
one of its most essential concepts. pitting strength against weakness, the Marine are degraded or denied, the enemys COG is
Corps approached the idea of COG cautiously. also degraded or denied.11
Review of COG Marine doctrine warned there was danger In 2002, Stranges concept was adopted
In the 1980s, American doctrine associated with using the term COG; declar- in U.S. Joint Forces Doctrine with the release
writers refocused on the Soviet army and the ing the enemys COG was not a source of of Joint Publication (JP) 500.1, Joint Cam-
potential for war in Europe. As the American strength, but a [c]ritical [v]ulnerability (CV).6 paign Planning,12 and later in the 2006 edition
military was outnumbered and outgunned The 1989 edition of the Marine Corps of JP 30, Joint Operations, that referred to the
on the European continent, a departure from Fleet Marine Field Manual (FMFM) 1, individual components of COGCCs, CRs,
the largely defensive doctrine of the past was Warfighting, described CVs simply as where and CVsas Critical Factors.13 North Atlan-
necessary. In its place, the Services sought to and when we can hurt [the enemy] most.7 tic Treaty Organization (NATO) doctrine also
exploit the combination of mobility and fire- The Marine Corps eventually relented to the included this approach in its 2006 version of
power to overcome their numerical inferiority. idea of COGs. In the revision of the manual, Allied JP 50, Allied Joint Doctrine for Opera-
In the midst of this renaissance of the Marine Corps accepted COGs into its tional Planning.
American military theory, a term seized doctrinebut only if used as a partner to an Neither the Army nor the Marine
prominence in U.S. doctrinal publications enemys critical vulnerabilities. Corps, however, has revised its planning or
center of gravity. Clausewitz defined COG as Whatever term the two Services use to operational doctrine to include a discussion of
the hub of all power and movement, on which describe the focus for indirectly attacking an Critical Factors. This omission is unfortunate,
everything depends.1 Victory, the Prussian adversarys COG, determining this point is as Critical Factors Analysis (CFA) provides a
argued, goes to the commander who focuses admittedly not a simple process. The Army sound analytical framework to assist planners
his energies against his adversarys COG while mandates a thorough and detailed analysis in the analysis and identification of COGs and
protecting his own.2 While the Services may to determine its decisive points, but provides to assist in operational planning.
have reshaped Clausewitzs original concept little insight on a process for that analysis.8
of COG, the term has become a crucial part of The Marine Corps has been even more blunt, Identifying COGs
American operational art. Yet the Army and noting the identification of a CV may be so The Problem. The American militarys
difficult that the Marine Corps may need doctrinal guidance is insufficient in provid-
Lieutenant Colonel Jan L. Rueschhoff, USA, is an
to adopt the tactic of exploiting any and all ing commanders and their staffs with a
Intelligence Officer with operational tours in Iraq vulnerabilities until uncovering a decisive process to select a center of gravity. Planning
and Afghanistan. Lieutenant Colonel Jonathan opportunity.9 It is interesting that doctrine teams can take hoursif not daysarguing
P. Dunne, USMC, is an Artillery Officer with would essentially disregard the principle of over what is and is not the enemys COG.
operational tours in Iraq. economy and suggest that one hit anything This contest of wills is often decided by

120JFQ/issue 60, 1 st quarter 2011 ndupres s . ndu. edu


Rueschhoff and Dunne

whoever is the strongest personality on the COGis that planners are once again left Figure 1. JP 50 Concept of COG
planning team, not through any established without any process of determining a COG.
Identifying Centers of Gravity
analytical process. While the analysis of the Critical Factors pro-
Information
More troubling, without an objective vides the planning team with greater details
Node Social Infrastructure
approach to determine a COG, planners are to assist in targeting and operational plan-
vulnerable to faulty COG analysis. As Army ning, the difficulty involved in selecting the Military

Field Manual 30, Operations, warns, Faulty initial COG leaves the participants wanting
conclusions drawn from hasty or abbreviated to disassociate themselves from the process
analyses can adversely affect operations, waste altogether. There is also no safeguard against Link

critical resources, and incur undue risk. The picking the wrong COG.
Operational
question, therefore, is how do planners select The Solution. Too many readers of COG

the correct COG? Dr. Stranges monograph seem to have


Economic
The Army/Marine Corps latest Intel- missed his advice that the process does not Strategic
COG Political
ligence Preparation of the Battlefield (IPB) have to be conducted in a precise or rigid
COG = Center of Gravity
doctrine states, Threat/adversary templates sequential manner.21 Proper analysis of a
. . . aid in the initial identification of the COG does not start with its identification.
threats/adversarys centers of gravity.14 This It is best accomplished from an inside-out
essentially leaves a planner with a definition approach of first identifying objectives and
of COG in one hand and an enemy situational then the Critical Factorsnamely the critical
Figure 2. Depiction of a Linear
template in anotherhoping he will make the capabilitiesthat support the objectives (see Analytical Methodology
right guess. figure 3).
In 2002, the interim publication JP In his 2004 Military Review article, COG Analysis Methodology
500.1 provided an in-depth description Colonel Dale Eikmeier, USA, acknowledged Thr
COG eat
of how COGs could be determined using the importance of first identifying objectives, Identify CO
GD
CC est
roy
Stranges framework.15 However, JP 50, then identifying Critical Factors.22 Yet the /De
gra
CR de
Joint Operation Planning, superseded JP Navys Planning Manual is the only doctrine
CV
500.1 in 2006 and represented a step back- that calls for identifying Critical Factors Fri
end
CV
ly C
warddeleting much of the guidance of the before COGsalthough the Navy focuses on COG = Center of Gravity
OG
Pr
ote
CC = Critical Capability ct CV
previous manual. JP 50 states that COGs what it calls critical strengths to identify CR = Critical Requirement
CV = Critical Vulnerability
are derived from systems analysis (see figure COGs.23 Why Critical Factorsparticularly
1), but provides little guidance on the process critical capabilitiesshould precede COGs is
of determining them. Instead, the manual best explained by reviewing the definitions of
refers readers to the Joint IPB manual for critical capability:
further guidance.16 Yet any hope for concrete The Unspecified COG
guidance in the Joint IPB manual quickly ameans that is considered a crucial While there may be times when a COG
becomes forlorn. The manuals guidance is to enabler for a center of gravity to function as is abundantly clear, often the true COG will
analyze the various systems and determine such and is essential to the accomplishment of be difficult to determine. Take the example
from which elements the adversary derives its the specified or assumed objective(s)24 of a staff that identifies 10 CCs. The staff
freedom of action, physical strength or will to primary abilities that merit a center of attempts to find a singular source of power
fight.17 In other words, we take a definition in gravity to be identified as such in the context for each of the 10 CCs believed vital for the
one hand and an enemy situational template of a given scenario, situation, or mission.25 accomplishment of the enemys mission.
in another, and hope we pick the right COG After determined analysis, their best COG
and we are right back to the initial problem. While the joint definition reveals that candidate can only satisfy seven of the CCs.
To its credit, JP 50 continued to critical capabilities are what allow a COG to Another source provides the last three. Are
incorporate Stranges concept of Critical function as such, Stranges use of the term there, therefore, two COGs?
Factors. Unfortunately, the manual depicted identified gets to the point of the issue. It is The answer may very well be yes, but
the process as a sequential, linear analytical through an adversarys CCs that an analyst it depends upon which doctrine the staff is
method beginning with identifying a COG.18 may identify a COG. While COGs may seem following. Despite the individual Services
This linear, left-to-right approach is reinforced amorphous, capabilities are much more acceptance of multiple COGs, joint doctrine is
by other doctrinal and academic publications. concrete and discernable. Joint and Service clear that there is only one COG for each level
These include a Joint Forces Staff College doctrine has long included the identification of war.26 So what should a staff do if they have
publication19 (see figure 2) and guidance in of enemy capabilities as a crucial step in the two possible COGs and are operating under
the U.S. Joint Force Commands Joint Target- IPB process. Armed with a list of capabilities joint doctrineconstricting the staff to only
ing Handbook, which states that the process necessary for a force to achieve its objectives, one COG? Should the staff continue looking
begins with the COG as a source of power.20 an analyst may now make an assessment of for a better COG candidate? Should they
The problem with this left-to-right what may be providing the source of power simply discard the three CCs that cannot be
approachbeginning with identifying the to these capabilitiesthe COG. linked to the proposed COG?

n d u p res s .ndu.edu issue 60, 1 st quarter 2011/JFQ121


JOINT DOCTRINE | Centers of Gravity

Figure 3. COG Analysis from the Inside Out vulnerability and later critical vulnerability
entered the military vocabulary in the late
1980s as sort of a synonym for decisive
point.29 Joint doctrine seems to echo this
when it states, Decisive points can be thought
Objective
of as a way to relate what is critical to what is
vulnerable.30
The link between DPs and Critical
Center of Critical Critical Critical Factors is further strengthened by the joint
Gravity Capabilities Requirements Vulnerabilities definition that states a DP can be a geo-
graphic place, specific key event, Critical
Factor, or function. The examples given in
We recommend the staff do neither. The From this report, an analyst could assess that JP 30airbases, overflight permissions,
objective of COG analysis is not to provide the landing craft is a possible CR for a new civilian infrastructure31all describe ele-
a magic name of a COG by which the com- CCconducting amphibious operations. In ments that could be CRs to an adversarys
mander may speak and slay his foe. The objec- turn, this may indicate that the adversary may CC. JP 50 seems to close the discussion
tive is to identify weaknesses the commander also be adjusting his objectives. when it states, Understanding the relation-
may exploit that will uncover and eliminate While conventional military ship between a COGs critical capabilities,
the foes ability to resist. examples are fairly straightforward, the CFA requirements, and vulnerabilities can illu-
If the staff is able to identify and then process is also applicable to counterinsur- minate direct and indirect approaches to the
devise an operational plan to exploit CVs, gency (COIN) operations. The complexity COG. It is likely that most of these Critical
thereby denying CRs and eliminating the of the COIN battlefield demands more Factors will be decisive points.32
abilities of a CC, is not the force still attack- detailed analysis. In conducting a thorough Yet it may be more helpful to follow
ing an unspecified COG? We believe this analysis of an adversarys CRs, the planner NATO doctrines lead: Decisive Points are
to be the case. The time spent in a fruitless may run into a Russian nesting doll effect logically derived from Critical Requirements
pursuit of the perfect description of the of subnested requirements. By subnesting and Critical Vulnerabilities.33 Planners derive
enemys COG is better used providing detail requirements, the planner keeps intact the DPs through CFA, but DPs are not synony-
to the Critical Factors. linkage of CRs and CCs. A sub-CR could mous with Critical Factors.
support more than one CC or CR.27 Iden- Planners identify the Critical Factors
Operational Planning tifying these multiple relationships allows of their adversaries, their own forces, and
Working To the Right of CCs. Regard- planners to formulate priorities based upon third parties. They then determine which
less of whatever is named the COGor even which targets would have the greatest impact vulnerable CRs need to be affectedattacked
if one is specified at allwith the identified on the adversary. The CFA framework also or protectedin order to achieve their own
CCs, the analyst may begin identifying CRs facilitates identifying nonlethal targeting objectives and endstate. Just as CVs describe
and CVs. While CCs are the critical actions opportunitiesstopping insurgent attacks how a CR may be vulnerable, DPs describe the
or functionsthink verbsnecessary for the that would normally be associated with key locations, systems, capabilities, or events
enemy to meet his objectives, CRs are assets or lethal targeting efforts. from which a commander may exploit or
conditionsthink nounsrequired to enact CFA applied to COIN demonstrates how protect the vulnerabilities that CFA identifies.
the CCs. For instance, if the CC is deliver indi- this type of analysis can contribute to plan- Essentially, DPs are the springboard by which
rect fires, the CRs may be observers, munitions, ning across lines of operation and in depth of planners effect the CVs necessary to achieve
artillery pieces, gun crews, radio communica- time and space. From this example, we realize ones objective.
tions, and being within range of desired targets. that CFA is essential in the development of It is easy to focus on the adversarys
Critical vulnerabilities identify the operations. The importance of determin- COG, but planners must not disregard their
aspects of CRs that are vulnerable or already ing how to attack a COG is, according to own COG. By applying the same CFA model
deficient. Too often, analysts simply restate joint operations doctrine, the essence of to friendly forces, planners will identify CCs
vulnerable CRs as CVs. However, to get the operational art.28 One of the key operational necessary to accomplish their objectives,
most out of the analysis, the planner should elements in this planning is decisive points CRs necessary to enable those CCs, and how
attempt to determine not only if a CR is vul- (DPs). Interestingly, while the Army fully they might be deficient or vulnerable. Thus,
nerable, but how the CR is vulnerable. embraces DPs in its doctrine, Marine Corps some DPs may be identified that protect
While the analyst will usually identify doctrine uses the term sparingly, emphasiz- or reinforce friendly CRs at the same time
CRs and CVs after determining CCs, the ing CVs instead. Yet both Services use their planners use DPs to affect the CRs of their
process does not always need to be in this respective terms for the same purpose: adversaries.
order. There may be times when discovering to provide an indirect means to attack an Third Party Actors. As observed in
a vulnerability or requirement may result in enemys center of gravity. current conflicts, modern forces do not only
the identification of a CC. For example, an So are DPs restated CVs? Some argue share the battlefield with ones adversaries.
intelligence report reveals that an adversary that this is the case. Lieutenant General Paul Other parties such as nongovernmental orga-
has purchased amphibious landing craft. Van Riper, USMC (Ret.), wrote, The terms nizations, the host nation, various tribes, and

122JFQ/issue 60, 1 st quarter 2011 ndupres s . ndu. edu


Rueschhoff and Dunne

Figure 4. ISAF COG Analysis of Corruption

Center of Gravity Analysis


Corruption = Monopoly + Discretion - Accountability (Dr. Robert Klitgaard, 1988)

COG COG = Center of Gravity


Patronage CC = Critical Capability
Network CR = Critical Requirement
CV = Critical Vulnerability

CC CC
Low risk Control of
high reward Political Authority
environment

CR CR CR
Illicit and Official Discretion Culture of Impunity
Unaccounted (lack of oversight) (protection from
Money prosecution)

CV CV CV CV CV
Interdict Illicit Account for Effective Accountability Remove
Money Licit Money Oversight of Civil Servants Protection

Source: ISAF Stability Division Corruption Annex briefing to OPLAN, June 21, 2010.

criminal groups all contribute to the opera- tional planners to identify and prioritize Factors. The staff dutifully identifies the
tional environment. An evaluation of each of DPs that would have the greatest impact on decisive points necessary to attack their
these third parties using CFA aids the staffs neutralizing opposing Critical Factors and adversarys COG and sequences them into
ability to understand the systems of each reinforcing Critical Factors tied to shared their operational planning, which will culmi-
group and how they interact. objectives within the operational environ- nate with defeat of the adversarys COG and
The concept of evaluating civilian enti- ment. By applying CFA to third party actors, accomplishment of friendly objectives.
ties based upon their capabilities is already planners can begin to determine which partys With a defeated adversary, there could
captured in Service doctrine. The Army/ CRs they may choose to reinforce and protect be the temptation to dismiss the use of CFA
Marine Corps IPB manual expresses the and whose CRs they wish to disrupt in order to identify DPs in phase four. Yet just as plan-
need to identify the capabilities when assess- to meet their own objectives. ners use phases to denote a change in objec-
ing civil considerations.34 Identifying these Future Critical Factors. Much of the tives, it is important to assume a defeated
groups, their objectives, and associated Criti- emphasis in American campaign planning adversarys objectives have also changed.
cal Factorsincluding capabilitiesneces- doctrine is focused on identifying an adver- Likewise, it is possible that other groups may
sary to achieve their endstate provides the sarys present vulnerabilities and capabilities. see the defeat of our adversary as an oppor-
operational planner with vital analysis of the Unfortunately, the exclusive focus on present tunity to act on their objectives which may
operational environment. capabilities stifles our ability to develop a plan not be congruent with our owneven if they
Planners may find critical requirements poised to react to future threatsmuch less do not yet have the capabilities to act toward
are shared by more than one party. There also prevent those future threats from emerging. achieving their objectives.
may be sets of inverse relationships of Critical The planning for the transition between phase The lack of capabilities does not invali-
Factors among the different groups where the three and phase four operations is where the date the use of CFA. Rather, the staff should
presence of a particular condition may be a concept of Future Critical Factors may have focus on the CCs that their adversary would
CR for one party and the absence of that par- the most relevance. need to develop to reach their objectives. The
ticular condition is a CR of another. Through phase three, planners are CRs become the conditions, resources, and
Identifying these shared and inverse usually focusing on an enemy with a relatively means by which an adversary would develop
Critical Factor relationships allows opera- well-defined objective and set of Critical their necessary CCs.

n d u p res s .ndu.edu issue 60, 1 st quarter 2011/JFQ123


JOINT DOCTRINE | Centers of Gravity

Focusing on future CCs allows the plan- While these initial analyses are simplis- CFA is not a crystal ball that tells a com-
ning team to anticipate problems during the tic, the process has continued to add more mander that engaging a potential adversary
transition to phase four and to be proactive detailed analysis. In August 2010, the ISAF is consistent with the commanders strategic
in dealing with these challenges before they Joint Command (IJC) provided a mission endstate. Other tools in designs framing
are able to impact their own CVspreventing analysis briefing on its anticorruption efforts. process may be helpful in assisting a com-
achievement of the endstate. The briefing detailed 27 CCs and 77 CRs mander with that judgment. However, once
that IJC found in its COG analysis of malign a commanders endstate is defined, CFA is a
Current Operations networks and friendly forces. A number of powerful tool in helping a commander and
One of the best examples of how CFA the associated CVs were identified as being staff in campaign design and translating that
is contributing to current operations is the exploitable to achieve decisive conditions.36 design into action.
International Security Assistance Force Over the past 20 years, American
(ISAF) efforts to support the government Operational Design military doctrine has adopted and adapted
of Afghanistan in combating corrup- Operations in Iraq and Afghanistan have Clausewitzs concept of center of gravity into
tion. Despite sincere proclamations of the prompted spirited discussions pitting opera- its own operational art. However, guidance
governments leaders desiring to clamp tional planning against operational designin for identifying COGs and the points by which
down on corruption, the social fabric of the many cases, arguing traditional planning commanders can indirectly attack those
country complicates confronting some of processes are outdated when facing the com- COGs has been elusive in American doctrine.
the countrys most malign actors and their plexities of the modern battlefield. While the Critical Factors Analysis provides a clear, ana-
networks directly. ISAF planners realized previous segments in this article have demon- lytical method of determining the points that
an indirect approach to corruption that strated how Critical Factors Analysis can be American forces should affecta far cry from
changed the conditions in which these net- a significant contributor to operational plan- recent guidance that in essence suggested
works operated was needed. The best way to ning, the question may be asked: what is CFAs Marines should hit anything that looks vul-
do this was to attack the CVs and CRs of the applicability to operational design? nerable and hope they get lucky.
patronage networks.35 If existing doctrine is to be used as CFA is not a process that stands alone in
The planners started with a simple COG a guide, CFA is applicable to operational the operational process. Rather, it is the con-
analysis, which concluded with the identifica- design. JP 50 states, One of the most nective tissue between many other doctrinal
tion of five critical vulnerabilities (see figure important tasks confronting the [joint force processes. While COG analysis may once
4). The planners admit their initial COG anal- commanders] staff in the operational design have been no more than an exercise in putting
ysis was too simplistic and note that several process is the identification of friendly and ideas on a PowerPoint slide, CFA provides the
of the Critical Factors are not consistent with adversary COG.37 In fact, the discussion of staff with a continuous, iterative process that
doctrinal definitions. However, what sets COG and Critical Factors occurs in JP 50s capitalizes on COG analysis to help design
this analysis apart from so many other COG design chapter, not its planning chapter. campaigns and drive operations.
analysis efforts is the planners actually used The Army has long held COGs are elements CFA provides a tool to identify what is
this analysis to help guide their operational of operational design, reinforced in the critical about ones adversary or third party
pursuits. Armys newest version of FM 50.38 Even the and to determine where commanders can
For each of the CVs, planners identified Army Training and Doctrine Commands best affect that point through both lethal and
actions by which these could be influenced. pamphlet on operational design specifically nonlethal means. A better understanding of
For example, to influence the CV Interdict speaks of CCs and CRs in its section on Critical Factors Analysis within our doctrine
Illicit Money, planners identified providing mission analysis.39 will allow staffs to develop plans that are both
better border control and instituting merit- Beyond doctrine, CFAs utility in more effective and efficient. JFQ
based hiring as potential actions to be taken. operational design is illustrated by the ISAF
These and other actions were designated as example. The ISAF and IJC staff has used CFA Notes
decisive points and arrayed in a synchroniza- to help craft the foundation of its anticorrup-
tion matrix depicting the sequence in which tion campaign. It was no accident that the
1
Carl von Clausewitz, On War, trans. and ed.
Michael Howard and Peter Paret (Princeton: Princ-
they were to be engaged. IJC briefed their anticorruption CFA results
eton University Press, 1984), 485486.
In some cases, the best way to influence under the banner of operational design.40 2
Ibid., 595596.
the malign actor networks COG was to rein- So perhaps the question is not whether CFA 3
Field Manual (FM) 1005, Operations
force a CR of the Afghan government. To help is applicable to operational design, but how it (Washington, DC: Headquarters Department of the
make this distinction, the decisive points were should be applied. Army, 1986), 179180.
segmented into three categories: ISAF Can CFA assists in identifying options by 4
FM 30, Operations (Washington, DC:
Do, ISAF Can Facilitate, and ISAF Can Advo- which forces can engage an adversary. These Headquarters Department of the Army, 2008), 68.
cate. The categories were a realization that not options include both lethal and nonlethal 5
Ibid., 510.
only did the COG of malign actor networks methods. They may be for immediate execu-
6
Fleet Marine Field Manual (FMFM) 1,
need to be considered, but also that the COGs tion or sequenced far in the future. They Warfighting (Washington, DC: Headquarters
of ISAF and the Afghan government needed may be prioritized by which points impact Department of the Navy, 1989), 85.
7
Ibid., 36.
to be consideredutilizing the concept of the most adversary capabilities or by those 8
FM 30 (2008), 68.
third party actor CFA described earlier. that aid an ally while harming a foe. But

124JFQ/issue 60, 1 st quarter 2011 ndupres s . ndu. edu


Rueschhoff and Dunne

9
FMFM 1, 36. 18
JP 50, IV11, IV13. 30
JP 30, IV12.
10
Joseph L. Strange, interview with authors, 19
Joint Forces Staff College, Campaign Plan- 31
Ibid.
February 12, 2008. ning/Operational Art Primer AY 07: Joint Operation 32
JP 50, IV16.
11
Joseph L. Strange, Centers of Gravity & Planning Process (Norfolk, VA: National Defense 33
North Atlantic Treaty Organization (NATO),
Critical Vulnerabilities: Building on the Claus- University, 2007), 58. Allied Joint Publication 5, Allied Joint Doctrine for
witizan Foundation So That We Can All Speak the 20
Joint Warfighting Center, Joint Fires and Operational Planning (Brussels: NATO Standard-
Same Language, Perspectives on Warfighting 4, no. Targeting Handbook (Suffolk, VA: U.S. Joint Forces ization Agency, 2006), 311. Emphasis added.
2 (1996), 3. Command, 2007), I26. 34
FM 201.3/MCRP 23A, 315.
12
Joint Publication (JP) 500.1, Joint Campaign 21
Strange, Centers of Gravity & Critical Vulner- 35
Email interview with Nathan Hoepner, who
Planning (Washington, DC: Joint Chiefs of Staff, abilities, 141. served as the Anti-Corruption Officer in the Inter-
2002), II6II10. 22
Dale C. Eikmeier, Center of Gravity Analy- national Security Assistance Force (ISAF) Stability
13
JP 30, Joint Operations (Washington, DC: sis, Military Review (JulyAugust 2004), 4. Division, September 10, 2010.
Joint Chiefs of Staff, 2006), IV10. 23
U.S. Navy Warfare Publication 501, Navy 36
ISAF Joint Command (IJC), Anti-Cor-
14
U.S. Army/U.S. Marine Corps, FM 201.3/ Planning (Washington, DC: Headquarters Depart- ruption Analysis Brief to CJIATFSHAFAFIAT,
Marine Corps Reference Publication 23A: Intel- ment of the Navy, 2007), 28, annex C. August 24, 2010, slides 3139.
ligence Preparation of the Battlefield/Battlespace 24
JP 30. 37
JP 50, IV8.
(Washington, DC: Headquarters Department of 25
Strange, Centers of Gravity & Critical Vulner- 38
FM 50, The Operations Process (Washing-
the Army/Headquarters Department of the Navy, abilities, 3. ton, DC: Headquarters Department of the Army,
2009), A1. 26
JP 30, IV10. 2010), D1.
15
JP 500.1, II6II10. 27
Developed based upon email discussions 39
U.S. Army Training and Doctrine Command
16
JP 50, Joint Operation Planning (Washing- between Dr. Strange and authors in September (TRADOC) Pamphlet 5255500 (Fort Monroe,
ton, DC: The Joint Staff, 2006), IV8IV15. 2009. VA: TRADOC, 2008), 28.
17
JP 203.1, Joint Tactics, Techniques, and 28
JP 50, IV18. 40
HQ IJC, slides 3139.
Procedures for Joint Intelligence Preparation of the 29
Paul K. Van Riper, Planning For and Applying
Battlespace (Washington, DC: Joint Chiefs of Staff, Military Force: An Examination of Terms (Carlisle
2000), II45. Barracks, PA: Strategic Studies Institute, 2006), 10.

n d u p res s .ndu.edu issue 60, 1 st quarter 2011/JFQ125

You might also like