Understanding who or what you might face is the foundation of every sound tactical plan. Whether the context is a natural disaster bringing opportunistic criminal elements, civil unrest with organized agitators, or a genuine armed threat in your community, the ability to systematically evaluate an adversary’s composition, capabilities, and probable behavior separates serious preparation from guesswork. Adversary analysis is the “Enemy” factor within the METT-TC framework, and it feeds directly into the broader Intelligence Preparation of the Battlefield process. For the prepared citizen, this is not about conjuring hypothetical super-soldiers — it is about developing a clear-eyed, structured habit of assessing any threat so you can allocate your limited resources wisely.
What Adversary Analysis Actually Involves
At its core, adversary analysis is the systematic evaluation of an opposing force’s order of battle — its composition, disposition, strength, and combat effectiveness — along with its tactics, support assets, and technical capabilities. Military intelligence doctrine breaks this into several layers:
- Composition: What kind of force is it? How is it organized? Is it a loosely coordinated group or a disciplined unit with defined roles?
- Disposition: Where are they, and how are they arrayed? Are they concentrated or dispersed? Static or mobile?
- Strength: How many personnel and what level of equipment? Are they growing or degrading?
- Combat Effectiveness: What is their training level, morale, and cohesion? A large force with poor morale and no leadership may be less dangerous than a small, highly motivated one.
Beyond these basics, the analysis examines adversary tactics, doctrine, support infrastructure, and electronic or technical capabilities. This includes studying historical behavior patterns, cultural factors, leadership personalities, and internal organizational dynamics. The goal is to build a model of how the adversary actually operates — not how you imagine they operate.
For the armed civilian, translating this process means asking structured questions about any potential threat. A neighborhood watch coordinating during a natural disaster benefits from knowing whether criminal activity in the area is opportunistic or organized, what weapons and vehicles are involved, what times of day threats are most active, and whether threats tend to operate in groups or individually. These are the same questions military intelligence staffs ask — just scaled to a different echelon.
Identifying Capabilities and Limitations
A critical distinction in adversary analysis is between what the enemy can do and what the enemy will probably do. Capabilities analysis casts a wide net: it identifies every action the adversary could theoretically take given their personnel, equipment, terrain access, and support. This includes not just direct combat power but also external assets.
Military doctrine uses the CARRO format to catalog external support available to an adversary:
- Close Air Support: Fixed- and rotary-wing assets (unlikely in most civilian scenarios, but relevant when studying state-level threats or understanding historical conflicts)
- Artillery/Mortars: Indirect fire capability, munitions types, and maximum effective ranges
- Reinforcements: Quick reaction forces and their estimated response times
- Reserves: Higher-echelon forces that could be committed
- Other: Any additional assets — cyber capability, surveillance drones, explosive devices, or logistical support
For civilian threat assessment, the “Other” category is often the most relevant. Does the threat group have access to surveillance tools, vehicles, communications equipment, or improvised weapons? Understanding the full scope of what an adversary could bring to bear prevents dangerous underestimation.
Equally important is identifying centers of gravity and critical vulnerabilities. A center of gravity is the source of an adversary’s power — the thing that, if removed, causes the whole effort to collapse. For an organized criminal element, that might be a specific leader. For a loosely affiliated group, it might be a communication channel or logistical hub. Critical vulnerabilities are weaknesses that can be exploited — poor communications discipline, predictable movement patterns, dependency on a single supply route, or low morale.
This kind of analysis feeds directly into operational security assessment and helps determine what your own force needs to protect and what gaps you can exploit.
From Capabilities to Probable Courses of Action
The culmination of adversary analysis is the Enemy Most Likely Course of Action (EMLCOA). This is not a guess — it is a disciplined prediction built on the full body of analysis: capabilities, limitations, doctrinal preferences, terrain, time constraints, and the operational environment.
The most effective method for developing EMLCOA is to mentally place yourself in the adversary’s position. What options appear most advantageous to them? What aligns with their observed behavior patterns? What are they most likely to do given their constraints and available resources? This demands intellectual honesty — you must assess based on evidence, not on what you hope or fear they will do.
EMLCOA determination is best accomplished after completing the full METT-TC analysis, because understanding your own mission requirements, the terrain, available time, and civilian considerations provides essential context for predicting enemy behavior. A threat group operating in dense urban terrain will behave differently than the same group in open rural terrain. A group under time pressure behaves differently than one with freedom to wait. These contextual factors, explored through terrain analysis and civil considerations, shape the prediction.
Once EMLCOA is established with reasonable confidence, it becomes the foundation for your own planning. Instead of building a plan that reacts to the unexpected, you build one that capitalizes on expected enemy behavior while maintaining contingencies for less likely alternatives.
Threat Spectrum: Scaling Analysis to Reality
Military intelligence doctrine identifies threat types ranging from irregular actors to peer adversaries with multi-domain capabilities. Peer and near-peer adversaries possess roughly equal combat power, employ information warfare alongside conventional and irregular military capabilities, and seek to degrade advantages across land, air, maritime, space, and cyberspace domains. Understanding this spectrum is valuable even for civilians because it calibrates expectations.
The practical civilian threat spectrum is more likely to include:
- Opportunistic criminals exploiting a power vacuum during a disaster — low organization, low discipline, high impulsiveness
- Organized criminal elements with established communication, logistics, and territorial knowledge
- Ideologically motivated groups with varying degrees of training and coordination
- State or quasi-state actors in worst-case scenarios involving civil breakdown
Each category requires different analytical approaches. The SALUTE and DRAW-D formats provide structured reporting frameworks for documenting and communicating what you observe about any of these threat types, while the SALUTE report format gives you a standardized way to pass that information to others in your group.
Preparing to Respond
Adversary analysis is not academic — it drives preparation. Once you understand what a threat can do and will probably do, you can plan specific responses. Ground reconnaissance doctrine emphasizes developing detailed tactics, techniques, and procedures for responding to various enemy contact scenarios: ambushes (near and far), frontal and flank attacks, indirect fire, sniper fire, and others. All team members must understand their roles during each contact type, and rehearsal of these drills is essential for effective execution.
For the armed citizen, this translates to scenario-based training. If your adversary analysis suggests the most likely threat is a home invasion by two to three individuals, your drawstroke training, rifle drills, and immediate action drills should be built around that scenario. If your analysis suggests a community-level threat requiring coordinated response, your PACE communications plan and community preparedness framework need to account for the specific threat you have identified.
The disciplined habit of adversary analysis — asking structured questions, documenting observations, building models, and predicting behavior — is what transforms a person with gear into a person with a plan. It is the intellectual backbone of the coherent loadout concept: your equipment choices should be driven by a realistic assessment of what you are preparing for, not by what looks impressive on an Instagram flat-lay.
Integrating Adversary Analysis into Your Preparation
Adversary analysis does not require a military intelligence section. It requires the willingness to think honestly about threats, document what you observe, and update your assessment as conditions change. Resources like The Area Intelligence Handbook provide frameworks for conducting this analysis at the community level, while the threat recognition skillset builds the observational habits that feed raw data into the process.
The key principle is that your plan is only as good as your understanding of the threat. Invest time in the analytical process before you invest money in equipment, and revisit your analysis regularly. Threats evolve, and your preparation must evolve with them.