Professional Documents
Culture Documents
jfq-84 86-92 Reilly
jfq-84 86-92 Reilly
ebates continue in the media, Levant (ISIL). Imbedded within these of gravity is the clearest path to defeat
86 Commentary / Hybrid Threat COG Analysis JFQ 84, 1st Quarter 2017
There is an issue, though. Our collec- activities are closely intertwined in many depth, complexity, and impact of these
tive reliance on traditional thinking and of the current gray zone or limited war hazards lies un- or under-recognized until
continued use of existing COG doctrine conflicts—as in the case of ISIL.3 He de- attempts to contend with them are well
is particularly problematic. However, by fines a hybrid threat as “any adversary that underway.”5 By their very nature, hybrid
examining hybrid warfare and expand- simultaneously employs a tailored mix of threats, like ISIL, are highly integrated,
ing the definition of the center of gravity conventional weapons, irregular tactics, amorphous, and difficult to analyze. As
beyond that of “hub of all power” by the terrorism, and criminal behavior in the such, identifying a single unit, force, per-
inclusion of the “modalities of principal same time and battlespace to obtain their son, or ideology as the center of gravity
use,” commanders and planners can iden- political objectives.”4 A state or nonstate is potentially dangerous and misleading.
tify critical capabilities, requirements, and entity capable of fully integrating these Likewise, identifying a hybrid threat’s
most importantly, vulnerabilities more operational-level modalities into a vi- critical vulnerabilities is extremely difficult
rapidly and set U.S. operational planning able and unified course of action across as there is no single source of strength
on stronger footing. Simply put, a shared the political, military, economic, social, to defeat and no silver bullet powerful
understanding of hybrid warfare and information, and infrastructure (PMESII) enough to neutralize the critical capabili-
centers of gravity are required for a fresh spectrum has a significant advantage ties inherent within a hybrid adversary.
analysis of ISIL. over an adversary still approaching The real danger in applying traditional
Complexity, deception, and ambigu- warfare from a traditional, irregular, or COG analysis to hybrid threats is that it
ity are characteristics of warfare dating compound perspective. The blending of misleads senior leaders into believing that
back to ancient times that are enjoying a multiple, unified, and integrated modali- operations against hybrid adversaries will
renaissance due to an emerging method ties, void of traditional military customs be shorter, less costly, and less risky than
of conflict described as hybrid warfare. or norms, makes hybrid war distinct from is probably the case.
Hybrid warfare falls into an area of con- other types of warfare and makes assess- The COG constructs currently used
flict within the gray zone of “competitive ing an adversary’s COG so difficult. in doctrine and practice either fall short of
interactions among and with state and The following definition of a hybrid providing a useful method for discerning
non-state actors that fall between the threat is proposed to gain shared under- a hybrid threat’s center of gravity or omit
traditional war and peace duality.”1 The standing and a framework for analyzing the concept entirely. This increases the
emergence of hybrid war, as demon- ISIL: probability of responding too slowly to
strated by Hezbollah in 2006, Russia in effectively counter the threat or misiden-
2014, and ISIL’s current activities in Iraq Any adversary that creates a dilemma tifying the center of gravity and taking
and Syria, creates a panoply of problems across the PMESII spectrum by simul- inappropriate actions based upon legacy
for policymakers, operational planners, taneously employing a tailored mix of definitions intended for a traditional
and commanders due to the enigmatic traditional warfare and weapons, irregu- interstate construct that may not apply to
nature of the threat. lar warfare, catastrophic terrorist actions, hybrid adversaries.
Learning from Operations Desert and disruptive and/or criminal behavior Before proposing a new method of
Storm and Iraqi Freedom, challengers to in the same time and battlespace to obtain analysis, debilitating problems in current
U.S. power actively avoid actions likely to political objectives within operational or approaches must be understood and
result in an overwhelming conventional political limitations. accepted. In this article, current perspec-
military response. This creates a global tives on COG analysis are examined
context where the United States, as the Freier’s four modalities framework— with an eye toward determining if those
de facto guarantor of global stability, with the inclusion of criminality alongside constructs adequately support the analysis
faces increasing hybrid conflicts as state the disruptive challenge—is used in this of a hybrid threat adversary. This article
and nonstate actors develop asymmetric article as the construct to analyze hybrid then recommends an updated method for
ways to challenge American dominance. threats. While every conceivable sce- analysis specific to understanding hybrid
Recognizing that hybrid warfare is far nario may not fit comfortably into these threat actors and applies this method to
more than a subset of irregular war- modalities, this hybrid threat methodol- ISIL as it is considered an example of a
fare, analyst Nathan Freier developed ogy adequately captures the ways and hybrid threat actor with clear effects on
a comprehensive description of hybrid means required at the operational level potential future conflicts. Freier calls these
warfare and defines it as an adversary’s to accomplish the desired ends for the asymmetrical conflicts the “hybrid norm”
integration and use of at least two of the majority of opponents U.S. forces will of the future,6 while Russell Glenn adds
following modalities: traditional warfare, confront in the 21st century. it is critical that military professionals not
catastrophic terrorism, irregular warfare, Hybrid threats, according to Freier, allow themselves to become myopic in
and disruptive use of technology.2 are the Defense Department’s “new their vision of future threats and see each
Frank Hoffman builds upon Freier’s ‘wicked problems’ where precise iden- new conflict as the same as the last, since
concept and includes “criminality” within tification of what is most harmful or U.S. and coalition forces are more likely
the disruptive modality, since criminal important is problematic” and “the true to face hybrid threats in future conflicts.7
88 Commentary / Hybrid Threat COG Analysis JFQ 84, 1st Quarter 2017
Soldiers assigned to Charlie Battery, 1st Battalion, 320th Field Artillery Regiment, 2nd Brigade Combat Team, 101st Airborne Division, fire M777 A2 Howitzer
in support of Operation Inherent Resolve at Platoon Assembly Area 14, Iraq, November 2016 (U.S. Army/Christopher Brecht)
is consistent with this article’s definition objectives, provoke the full applica- designs to quickly and effectively defeat
of a center of gravity as the actor’s main tion of U.S. military might, or cause threats, like ISIL, before they escalate to
effort to achieve its operational-level unacceptable second- and third-order the point where later adaptation is unac-
objectives and is simpler to understand effects—like the loss of international ceptably costly in blood and treasure.
and easier to put into practice than the support. Clausewitz’s concept is still ap- The six-step analytical process pro-
“hub of all power” metaphor. Following plicable, but the doctrinal definitions and posed below is intended for use against
this logic, the real task in COG analysis methods for analysis are less useful for hybrid threats, but can be successfully
is identifying the enemy’s operational analyzing a hybrid threat. Rather, faced used as a general theory for threat analy-
main effort, not necessarily its greatest with a hybrid threat, planners require an sis. Correctly identifying the center of
source of strength.21 This definition updated method. gravity is critical because, as Vego writes,
opens the aperture on COG analysis at “operational COGs are linked to both
the operational level, is applicable to hy- Applying a New COG strategic and operational objectives; op-
brid threat scenarios, and acknowledges Method to ISIL erational goals and COGs establish the
that the center of gravity can shift as the An analytical method for hybrid threat foundation for the selection of tactical
situation develops, thus forcing periodic COG analysis is proposed here that objectives.”22 Those acquainted with the
reassessment and, if necessary, reframing takes into account the amorphous and Strange and Eikmeier method will note
of the problem. agile nature of hybrid threat adversaries. many similarities. This is purposeful as
In the case of hybrid war, the center In a hybrid war scenario, identifying the the primary goal is to provide operational
of gravity may not be the source of great hybrid threat’s operational level center planners with a more intuitive method for
power, strength, and resistance, or the of gravity as the “modality of principal COG analysis that they can apply quickly
focal point because the use of a particular use” enables planners and commanders and effectively in operational design and
force may negate the identified political to develop operational approaches and the joint operation planning process.
90 Commentary / Hybrid Threat COG Analysis JFQ 84, 1st Quarter 2017
purpose forces to this conflict. U.S. po- and is consistent with a Clausewitzean of gravity—the modality of principal
litical and strategic guidance places limits view of the center of gravity.26 use—is determined, all of the other
on American action and may in effect The highly integrated nature of means and modalities identified are
deter the United States from committing hybrid warfare makes the delineation categorized as critical requirements.
general purposes forces to this conflict. between the modality of principal use As Strange notes, these are actual
Politically, the United States will not di- and the supporting modalities difficult to things—nouns—required for the critical
rectly support the Bashar al-Asad regime make. This inherent fusion of modes pro- capabilities to be fully operative. Similar
in its fight against ISIL. Strategically, vides the hybrid actor with the capability to current doctrine, this should be a list
after the long conflicts in Afghanistan to shift main efforts should the situation of the other noted modalities, resources,
and Iraq, the United States seems loath dictate, depending on its own capabili- units, or other means required to execute
to engage in any long-term stability ties, the type of adversary, the political the CCs such as trained guerrilla forces or
operations.23 ISIL leaders know that the objectives, and self-imposed limitations. a flexible command and control network.
current American administration has no Similar to a conventional force shifting The remaining three modalities,
appetite for another protracted ground main efforts in response to the conditions along with all the resources and means
campaign in the Middle East. on the ground, the hybrid threat could contained in the traditional modality, are
Operationally, there are four CCs potentially shift main efforts as part of the identified as CRs. Two CRs that must
required to accomplish ISIL’s operational plan or in response to friendly actions. be addressed are ISIL’s senior leadership
objectives. First, it requires the ability However, changing the main effort at the and its ideology. Once located, senior
to defeat regional challengers and seize operational level is no easy task and may leadership must be killed or captured
terrain. Second, it must have the ability provide an opportunity to seize the initia- as they have ordered and carried out
to govern the areas seized. Third, it must tive from the hybrid foe. Additionally, barbarous terrorist actions. This is critical
have the ability to self-sustain and gener- the political objectives or limitations may to weakening its fielded forces’ loyalty
ate income. Fourth, it must have the reduce the flexibility of the hybrid force and ability to coordinate operations, and
ability to recruit, train, and employ forces. to shift the main effort and dictate which there is no place for these leaders in the
Step 4: Identify the COG—Modality modality must be prioritized to accom- post-ISIL society. Secondly, ISIL’s Salafist
of Principal Use. Once the employed plish the objectives. jihadist ideology is not the center of grav-
modalities are identified, the adversary’s Determining ISIL’s center of gravity ity; rather, it is a CR necessary for the
objectives and limitations assessed, and through the traditional methods is dif- recruiting and sustainment of the group’s
the required capabilities to accomplish ficult and potentially irrelevant. Indeed, stated purposes. Efforts are being made
these objectives revealed, a determination applying doctrinal COG analysis to ISIL to neutralize the Islamic State’s ideologi-
is made as to which modality (irregular, likely results in various “mirages” that cal message with counter-messaging, but
traditional, catastrophic, or disruptive/ look “good in theory, but rarely exists in this is proving ineffective. Defeat on
criminal) is the enemy’s main effort to the real world in a way useful for military the battlefield is often the best counter-
accomplish those objectives. The modal- planners.”27 In reality, ISIL has no single narrative to the jihadist’s message.
ity that possesses the required CCs to source of physical or moral power; it is an Step 6: Identify the Critical
accomplish the desired objectives within integrated network of networks with no Vulnerabilities. Some of these CRs (or
the identified limitations is now identi- single, critical node. It is a truly hybrid subsets of CRs) are vulnerable to attack,
fied as the enemy’s center of gravity. It threat. But that does not mean that it is deficient in some way or not strong
becomes the principal “doer of the action indestructible or undefeatable. enough to defend themselves, and are
that achieves the ends.”24 This is a critical ISIL contains all four modalities identified as critical vulnerabilities (CV).
assessment as the subsequent approach within its hybrid nature, but one mo- Because they are critical, any interdic-
and follow-on actions should be designed dality stands out as its main effort: the tion, destruction, or neutralization
to attack the center of gravity identified as traditional. This modality is ISIL’s center should have a direct or indirect effect on
the modality of principal use since this is of gravity to accomplish its operational the ability of the center of gravity (the
the enemy’s main effort. objectives and create the caliphate. Its modality of principal use) to accomplish
The center of gravity should be the real source of power lies in its state-like the desired ends. Finding a hybrid
modality that the adversary employs as the military forces arrayed on the battlefield threat’s CV may be difficult due to its
main effort to accomplish the operational engaged in the seizure or defense of ter- ambiguous and enigmatic nature, and
objectives within the identified or assessed rain, not in its ideology or other moral there may be few actual CVs. Planners
operational limitations.25 For a hybrid factors. This is an important distinction must resist the pressure to manufacture
force, the modality of principal use pro- as many identify it as a terrorist organi- CVs, looking for the elusive silver bullet,
vides a type of cohesion for the employed zation when it is better described as a as this only oversells the effectiveness of
forces to bind. This cohesion of forces, pseudo-state. the operational design.
under a principal modality, allows the main Step 5: Identify the Critical ISIL shows few CVs, but assessing
effort to deliver the most effective blows Requirements—Means. Once the center the traditional modality as its center of
92 Commentary / Hybrid Threat COG Analysis JFQ 84, 1st Quarter 2017