The Principles of War Podcast

Centre of Gravity Professional Military Education

James Eling

Here is the list of resources that I’ve used to create the series on the Centre of Gravity analysis.

Strange, J., and Iron, R., “Understanding Centers of Gravity and Critical Vulnerabilities.  Part 1:  What Clausewitz (Really) Meant by Center of Gravity.”

Strange, J., and Iron, R., “Understanding Centers of Gravity and Critical Vulnerabilities. Part 2:  The CG-CC-CR-CV Construct:  A Useful Tool to Understand and Analyze the Relationship between Centers of Gravity and their Critical Vulnerabilities”

Strange, J., and Iron, R., “Centre of Gravity.  What Clausewitz Really Meant”  Joint Force Quarterly Issue 35.  October 2004.

Eikmeier, D., “A Logical Method for Center of Gravity Analysis”, Military Review, Sep – Oct 2007.

Eikmeier, D., “Give Carl Von Clausewitz and the Center of Gravity a Divorce.”, Small Wars Journal.  July 2, 2013.

Eikmeier, D., “After the Divorce,  Clausewitz and the Center of Gravity”, Small Wars Journal.

Rueschhoff, J., and Dunne, J., “Centers of Gravity from the ‘Inside Out’, JFQ 60, 1st quarter 2011.

Evans, M.  “Centre of Gravity Analysis in Joint Military Planning and Design:  Implications and Recommendations for the Australian Defence Force.”  Security Challenges, Vol 8, No 2.  2012.  pp. 81-104.

Butler, J. “Godzilla Methodology.  Means for Determining Center of Gravity.”  JFQ 72.  1st Quarter, 2014.

Smith, D., and Jeter, K., and Westgaard, O., “Three Approaches to Center of Gravity Analysis.  The Islamic State of Iraq and the Levant.”  JFQ 78, 3rd Quarter 2015.

Jackson, A., “Center of Gravity analysis ‘Down Under’ – The Australian Defence Force’s New Approach” JFQ 84, 1st Quarter 2017.


Centre of Gravity Analysis

The Centre of Gravity Analysis process is a riddle, wrapped in a mystery, inside an enigma.  With these resources, you will have a better understanding of Centre of Gravity Analysis and your Centre’s of Gravity will be more robust, leading to a better list of targettable critical vulnerabilities, that may actually ensure that you achieve the desired endstate!