Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
3Activity
0 of .
Results for:
No results containing your search query
P. 1
Asymmetric Warfare Group "Attack the Network" Counterinsurgency Methodology: Part 2

Asymmetric Warfare Group "Attack the Network" Counterinsurgency Methodology: Part 2

Ratings: (0)|Views: 3,150|Likes:
Published by Impello_Tyrannis
OVERVIEW:
This document facilitates discussion, training, and implementation of effective targeting methods
at the Battalion and Brigade level. This paper discusses the Center of Gravity analysis model for identifying
threat networks, Critical Capabilities, and Critical Vulnerabilities; use of the methodology to determine
the Intelligence Surveillance and Reconnaissance (ISR) focus; and as a basis for understanding Attack
the Network concepts.
BACKGROUND:
The discussion must start with understanding the insurgent networks' capability to influence or
control the Center Of Gravity (COG). Typically, in a Counter Insurgency (COIN) environment, the COG is
the population. An adaptive threat will modify its Tactics, Techniques and Procedures to maintain control
over the COG. Dr. Strange's COG model is extracted from the writings of Karl von Clausewitz, who emphasized
that a COG must be identified by ana lyzing one's adversary; Dr. Strange extended the 19th century
definition to include "the primary sources of moral or physical strength, power, and resistance" and fu rther
defined analytical elements (Critical Capabilities, Critical Requirements and Critical Vulnerabilities)
necessary to enable practical operationa l use.1
OVERVIEW:
This document facilitates discussion, training, and implementation of effective targeting methods
at the Battalion and Brigade level. This paper discusses the Center of Gravity analysis model for identifying
threat networks, Critical Capabilities, and Critical Vulnerabilities; use of the methodology to determine
the Intelligence Surveillance and Reconnaissance (ISR) focus; and as a basis for understanding Attack
the Network concepts.
BACKGROUND:
The discussion must start with understanding the insurgent networks' capability to influence or
control the Center Of Gravity (COG). Typically, in a Counter Insurgency (COIN) environment, the COG is
the population. An adaptive threat will modify its Tactics, Techniques and Procedures to maintain control
over the COG. Dr. Strange's COG model is extracted from the writings of Karl von Clausewitz, who emphasized
that a COG must be identified by ana lyzing one's adversary; Dr. Strange extended the 19th century
definition to include "the primary sources of moral or physical strength, power, and resistance" and fu rther
defined analytical elements (Critical Capabilities, Critical Requirements and Critical Vulnerabilities)
necessary to enable practical operationa l use.1

More info:

Published by: Impello_Tyrannis on Oct 14, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/27/2012

pdf

text

original

 
OVERVIEW:
UNCLASSIFIED
IIFOR
OFFICIAL
USE
ONLY
MARCH
2009
ATTACK
THE NETWORK METHODOLOGY: PART 2CRITICAL VULNERABILITIES AND TARGETING
ASYMMETRIC
WARFARE
GROUP
1
This document facilitates discussion, training, and implementation of effective targeting methods
at
the Battalion and Brigadelevel. Thispaper discusses the
Center
of
Gravity analysis model
for identifyingthreat networks, Critical Capabilities, and Critical Vulnerabilities; use
of
the methodology to determinethe Intelligence Surveillance and Reconnaissance
(ISR)
focus; and as a basis for understanding Attackthe Network concepts.
BACKGROUND:
The
discussion must start withunderstandingthe insurgent networks' capability toinfluenceor control the Center
Of
Gravity
(COG).
Typically,
in
a
Counter Insurgency
(COIN)
environment, the
COG
isthe population.
An
adaptive threat will modify its Tactics, Techniques and Procedures to maintain controlover the
COG
.Dr.Strange's
COG
model
is
extracted from thewritingsof Karl
von
Clausewitz, who emphasized
that
a
COG
must
be
identified
by
analyzing one's adversary;
Dr.
St
ra
ngeextendedthe
19
th
centurydefinition
to
include"theprimarysources
of
moral orphysicalstrength, power, and resistance" andfur ther definedanalytical elements(CriticalCapabilities, CriticalRequirementsandCriticalVulnerabilities) necessarytoenablepracticaloperationaluse.
1
COG
analysisisafive-step process(discussed indetailwithin
AWG's
AI
Qaeda andAssociated Networks Vulnerability Analysis Workbook, Understanding the ThreatSeries, Volume 1, 1
JUN
2008).
(See
AWG
SIPR
/
NIPR
websites
on
final page)• Identifying
the
COG.
Identifying Critical Capabilities for
the
COG
to function.Identifying Critical Requirements for each Critical Capability to support
the
COG.
• Determining
the
Critical Vulnerabilities (through attack, interdiction[orneutralization])
of
each Critical Requirement.Developing plans
that
focuson exploiting Critical Vulnerabilities, which arein
effect the
development
of
our own Critical Requirements.
2
Thismethod allows us to see the network
by
highlighting the functional capabilitiesrequiredtosustain the network.
Each
Critical Capability and Critical Requirement requires human interaction, management and support. These individuals are typically trusted agents capable of leading others.
We
identify these individuals as Tier
II
targets. They were also called "intermediaries"withinthe Asymmetric
War-
fare Group's Attack the Network PartIpaper.
1
UNCLASSIFIED//FOR
OFFICIAL
USE
ONLY
 
UNCLASSIFIED/
FOR
OFFICIAL USE ONLY
2
This
is
the second example within the Attack the Network series of papers
that
highlights the needto focus targeting efforts against something other than the threat's strength. Often our efforts focus
on
reacting to "Who conducted the
lED
attack
that
affected Coalition Forces
on
this date?" which leads toallocation of resources against the lowest tiered targets rather than key individuals within a network.
The
compartmentalization of
an
insurgent cell and the large pool of recruits available as replacements indicate that pursuit of low level insurgents does not have long term significant impacts
on
the
COIN
fight.
Low
level insurgents are relatively easy
to
replace, and targeting them only succeeds in creating a "refiVreorganize cycle".
Units
that
focus
on
attacking
the vulnerabilities related
to
the
enemy's
Critical Re-
quirements
will
havemore
impact
on
the leadership
of
the
network,
as
well
as,
reduce
thenumber
of
en-
emy
attacks against
them.
For the purposes
of
this discussion, Critical Capabilities can
be
described
asHigh
Value Targets.
The
Multi-National Corps-I
raq
Intelligence Officer
(C2)
recently described this
in
bluntterms, "Attacking the network
is
really about targeting
High
Va
lue Individuals; the Counter-Insurgencyfight
is
about
key
personalities that dominate the threat organization."3
This
paper demonstrates the linkage of
key
individuals
to
key functions within an insurgent network to determine which targets should
be
prioritized for finding, fixing and finishing the threat.
INSURGENT
CAPABILITIES
DESCRIBED
THROUGH
CENTER
OF
GRAVITYANALYSIS:
Insurgents must
be
able to perform critical operations
to
control or influence the
COG
(the people)
in
the
COIN
environment. These operations, or
Critical
Capabilities, ensure
key
tasks are successful andcan also
be
described
as
threat Warfighting functions.For example, a threat must have the followingfunctions to be successful:
Command and
Control
I
ntelligence
Gathering
Operationa
l
capability
Logistics
Recruitmentand Training
Each
of
these functions can
be
labeled
as
Critical Capabilities under the
CENTER
OF
GRAV
I
TY
ANALYSIS
-
Critical capabilities
COG
Analysis methodology.
The
MNC-I
C2
indicated the importance of recognizing that
in
many insurgent organizations one
key
person
is
responsible formore than one function.
An
effortshould
be
made
to
diagnose each insur
gent
organization's
capabilities/
networks to determine
their
relativestrengths and weaknesses. This willlead to
an
understanding
of
intersectingthreat lines
of
operation and key leaders, and will help prioritize targeting efforts against networks and
High
ValueIndividuals (HVls).
2
UNCLASSIFIED/
FOR
OFFICIALUSEONLY
 
UNCLASSIFIED//FOR
OFFICIAL USE ONLY
3
Required taskswithina CriticalCapability
that
must
be
successfully
CENTER
OF
GRAVITYANALYSIS
-
CriticalRequirements
accomplished to ensure the networkfunctions are called
Critical Require-
ments. Another
way
to describe theimportance of requirements and capa-bilities
is
to think
of the association
of
Battle Tasks to Collective Tasks.
Col-
lective Tasks form the basis of a unit'sexpected capabilities.
The
same holdstrue forinsurgentorganizations. Forexample,
if
the enemy has
to
ensure
it
receives adequate resupply
to
conductattacks against Coalition Forces then
it
is
requiredto
Fund Operations, AcquireSupplies
and
Move Supplies
(CriticalRequirements). After thislevel
of
analysis,
staff
elementsshould
be
ableto evaluate which threat capabilitiesare strengths and
wh
ich
are weaknesses
to
the enemy's organization.
We
should
attack
the
threat's
weaknesses
and
contain
its
strengths.
Threat
actions
that
increase chances
of
detecting
and
capturingthe
threat
are
Critical Vulnerabili
-
ties.
A series
of
individual tasks mustbeaccomplished to constituteacollectivetask,
just
as
collectivetasks are combinedtoformthe structure ofa network.
For
analysis,it
is
notnecessary to reinvent all
as-
sociated tasks.Staffsthathave already determinedtheinsurgent'sweak- nesses,within thecapabilitiesand
re-
quirementsframework,can narrow their focustothose actionsthat can
be
ob-served with their internallSR assets.Just
as
in our own training doctrine,where individual tasks are often com-mon to various collective skills,threatCritical Vulnerabilities are typically com-mon requirements
in
different networks.
Our
ability
to
detectthethreat
is
in-
creased because the tasks overlap orone
key
individual
is
responsible formore than one requirement.
Forexam-
pIe,
if
the Critical
Capability
is
to
provide
logistics
and
one
of
the Critical Require-
CENTER
OF
GRAVIT
Y
ANA
L
YS
IS -
Critica
l
Vul
nerabil
iti
es
ments
that
we
believe
is
a
weakness
is
to
move those supplies, then possible
vulnerabilities
may
includethe
following:
transfer supplies from a cache to vehicle, distribute materials from large truck
to
multiplevehicles, or conduct a personal meeting to coordinate resupply.There will
be
several tasks associatedwith the Critical Requirement. A staff will have to understandtheirOperating Environment, the threat'sprevious actions, and their own capabilities to understand which
of
those individual tasks are most vul-nerable to detection and action.
Thepurpose
of
identifying
Critical
Vulnerabilities
is
to focus
ISR,provide
intelligence to
the
commander
so
that
he
can
make
a
decision
on
how
to
neutralize the
threat,
and
then
take
action.
3
UNCLASSIFIED//FOR
OFFICIALONLY

Activity (3)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->