On the Formal Representation of Enemy Courses of Action
UNITED STATES ARMY COMMAND AND CONTROL DIRECTORATE (CERDEC) FORT MONMOUTH NJ
Pagination or Media Count:
The Problem Statement for this briefing addresses the following issues Information about Enemy Courses of Action ECOAs must be shared by coalition forces. Potentially, a shared representational language for describing ECOAs is needed that can be used with C4 systems. The standard exchange language for sharing such information among NATO forces today is the Joint Command, Control, and Consultation Information Exchange Data Mode JC3IEDM. In this paper we explore the formal representational requirements for describing ECOAs and evaluate the effectiveness of JC3IEDM for this purpose. In previous work, we have automatically translated JC3IEDM into OWL a computationally tractable W3C logical representation that supports ontological reasoning. Aim is to investigate potential for reasoning about ECOAs automatically in C4 systems. Associated with each ECOA, there is are Situation template which normally consists of a Modified Combined Obstacle Overlay, depicting the operational environment, together with a doctrinal template or model that shows how the enemy would be expected to act in that environment. Time Phase Lines TPLs are placed on the situation template to depict the expected progress of enemy force movements such as D1, D2, etc.. A Situation Matrix that depicts the expected progress of enemy activity across time in a spreadsheet format may also be used, especially in land-centric operations. An ECOA Narrative Description accompanies the situation template and usually addresses the earliest time the ECOA could be executed, location of the main effort, supporting operations, time, and phase lines. Decision Points critical decisions that the enemy commander must make during implementation of the ECOA are described in terms of their location and space as decision points. High Value Target list. Normally at least three ECOAs are briefed two most likely ECOAs and one most dangerous.
- Computer Programming and Software
- Military Operations, Strategy and Tactics
- Command, Control and Communications Systems