What is C-BML? An overview

Similar documents
MSG-079 C-BML Workshop Farnborough UK, Feb Coalition Battle Management Language 2009 Experimentation

Integrating National C2 and Simulation Systems for BML Experimentation

Adding Reports to Coalition Battle Management Language for NATO MSG-048

Extensible Battle Management Language

Representability of METT-TC Factors in JC3IEDM

Integrating National C2 and Simulation Systems for BML Experimentation

Shadow 200 TUAV Schoolhouse Training

The Swedish Armed Forces Operational Challenges for Command and Control

An Expanded C2-Simulation Experimental Environment Based on BML

ASAP-X, Automated Safety Assessment Protocol - Explosives. Mark Peterson Department of Defense Explosives Safety Board

Mission Task Analysis for the NATO Defence Requirements Review

The Fully-Burdened Cost of Waste in Contingency Operations

Afloat Electromagnetic Spectrum Operations Program (AESOP) Spectrum Management Challenges for the 21st Century

White Space and Other Emerging Issues. Conservation Conference 23 August 2004 Savannah, Georgia

A Military C2 Professional s Thoughts on Visualization

Infantry Companies Need Intelligence Cells. Submitted by Captain E.G. Koob

Battle Management Language Transformations

712CD. Phone: Fax: Comparison of combat casualty statistics among US Armed Forces during OEF/OIF

Improving the Quality of Patient Care Utilizing Tracer Methodology

Office of the Assistant Secretary of Defense (Homeland Defense and Americas Security Affairs)

Wildland Fire Assistance

Determining and Developing TCM-Live Future Training Requirements. COL Jeffrey Hill TCM-Live Fort Eustis, VA June 2010

DETENTION OPERATIONS IN A COUNTERINSURGENCY

Intelligence, Surveillance, Target Acquisition and Reconnaissance

DDESB Seminar Explosives Safety Training

The Effects of Multimodal Collaboration Technology on Subjective Workload Profiles of Tactical Air Battle Management Teams

Mission Assurance Analysis Protocol (MAAP)

Marine Corps' Concept Based Requirement Process Is Broken

AMC s Fleet Management Initiative (FMI) SFC Michael Holcomb

terns Planning and E ik DeBolt ~nts Softwar~ RS) DMSMS Plan Buildt! August 2011 SYSPARS

Life Support for Trauma and Transport (LSTAT) Patient Care Platform: Expanding Global Applications and Impact

Panel 12 - Issues In Outsourcing Reuben S. Pitts III, NSWCDL

Evaluating the Proposed Coalition Battle Management Language Standard as a Basis for Enhanced C2 to M&S Interoperability

Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning

The Coalition Warfare Program (CWP) OUSD(AT&L)/International Cooperation

Fiscal Year 2011 Department of Homeland Security Assistance to States and Localities

The Need for a Common Aviation Command and Control System in the Marine Air Command and Control System. Captain Michael Ahlstrom

Cerberus Partnership with Industry. Distribution authorized to Public Release

Intelligence, Information Operations, and Information Assurance

United States Joint Forces Command Comprehensive Approach Community of Interest

Army Modeling and Simulation Past, Present and Future Executive Forum for Modeling and Simulation

Test and Evaluation of Highly Complex Systems

Dynamic Training Environments of the Future

NATO MSG-048 Coalition Battle Management Initial Demonstration Lessons Learned and Way Forward

Munitions Response Site Prioritization Protocol (MRSPP) Online Training Overview. Environmental, Energy, and Sustainability Symposium Wednesday, 6 May

The first EHCC to be deployed to Afghanistan in support

Opportunities to Streamline DOD s Milestone Review Process

Independent Auditor's Report on the Attestation of the Existence, Completeness, and Rights of the Department of the Navy's Aircraft

~ NATO STANDARDIZATION ~ 60 YEARS of NORMATIVE SUCCESS. NATO Standardization Agency

Test and Evaluation Strategies for Network-Enabled Systems

Battle Captain Revisited. Contemporary Issues Paper Submitted by Captain T. E. Mahar to Major S. D. Griffin, CG 11 December 2005

MAKING IT HAPPEN: TRAINING MECHANIZED INFANTRY COMPANIES

Laboratory Accreditation Bureau (L-A-B)

USMC Identity Operations Strategy. Major Frank Sanchez, USMC HQ PP&O

711 HPW COUNTERPROLIFERATION BRANCH

AFCEA TECHNET LAND FORCES EAST

Engineering, Operations & Technology Phantom Works. Mark A. Rivera. Huntington Beach, CA Boeing Phantom Works, SD&A

Unclassified/FOUO RAMP. UNCLASSIFIED: Dist A. Approved for public release

Rapid Reaction Technology Office. Rapid Reaction Technology Office. Overview and Objectives. Mr. Benjamin Riley. Director, (RRTO)

Afghanistan Casualties: Military Forces and Civilians

Army Aviation and Missile Command (AMCOM) Corrosion Program Update. Steven F. Carr Corrosion Program Manager

Defense Acquisition Review Journal

ALLEGED MISCONDUCT: GENERAL T. MICHAEL MOSELEY FORMER CHIEF OF STAFF, U.S. AIR FORCE

The Army s Mission Command Battle Lab

Research to advance the Development of River Information Services (RIS) Technologies

Contemporary Issues Paper EWS Submitted by K. D. Stevenson to

OneSAF Killer/Victim Scoreboard Capability For C2 Experimentation

The Army Executes New Network Modernization Strategy

AUTOMATIC IDENTIFICATION TECHNOLOGY

National Continuity Policy: A Brief Overview

DoD CBRN Defense Doctrine, Training, Leadership, and Education (DTL&E) Strategic Plan

New Tactics for a New Enemy By John C. Decker

Afghanistan Casualties: Military Forces and Civilians

We are often admonished to improve your foxhole

An Overview of Romanian Command and Control Systems

Operational Energy: ENERGY FOR THE WARFIGHTER

C2SIM Systems and in Use/Coalitions Assembled

THE GUARDIA CIVIL AND ETA

Defense Health Care Issues and Data

Integrated Comprehensive Planning for Range Sustainability

2011 USN-USMC SPECTRUM MANAGEMENT CONFERENCE COMPACFLT

Training and Evaluation Outline Report

US Army TARDEC Ground Vehicle Mobility: Dynamics Modeling, Simulation, & Research

Perspectives on the Analysis M&S Community

FCS Embedded Training: An Overview

Required PME for Promotion to Captain in the Infantry EWS Contemporary Issue Paper Submitted by Captain MC Danner to Major CJ Bronzi, CG 12 19

COTS Impact to RM&S from an ISEA Perspective

An Introduction to Wargaming

User Manual and Source Code for a LAMMPS Implementation of Constant Energy Dissipative Particle Dynamics (DPD-E)

US Coast Guard Corrosion Program Office

Analysis of the Operational Effect of the Joint Chemical Agent Detector Using the Infantry Warrior Simulation (IWARS) MORS: June 2008

UNITED STATES ARMY AVIATION and MISSILE LIFE CYCLE MANAGEMENT COMMAND CORROSION PROGRAM

Electronic Attack/GPS EA Process

ASNE Combat Systems Symposium. Balancing Capability and Capacity

DOD Native American Regional Consultations in the Southeastern United States. John Cordray NAVFAC, Southern Division Charleston, SC

APPENDIX D STUDENT HANDOUTS D-1

Capability Planning for Today and Tomorrow Installation Status Report

Social Science Research on Sensitive Topics and the Exemptions. Caroline Miner

Blue on Blue: Tracking Blue Forces Across the MAGTF Contemporary Issue Paper Submitted by Captain D.R. Stengrim to: Major Shaw, CG February 2005

Improving the Tank Scout. Contemporary Issues Paper Submitted by Captain R.L. Burton CG #3, FACADs: Majors A.L. Shaw and W.C. Stophel 7 February 2006

Transcription:

What is C-BML? An overview MSG-79 C-BML Workshop 23. February 2010 Farnborough, UK Ole Martin Mevassvik Principal Scientist FFI (Norwegian Defence Research Establishment)

Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE FEB 2010 4. TITLE AND SUBTITLE What is C-BML? An overview 2. REPORT TYPE N/A 3. DATES COVERED - 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) FFI (Norwegian Defence Research Establishment) 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR S ACRONYM(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release, distribution unlimited 11. SPONSOR/MONITOR S REPORT NUMBER(S) 13. SUPPLEMENTARY NOTES See also ADA564685. 2010 Coalition Battle Management Language Workshop (Atelier 2010 sur le langage de gestion du champ de bataille pour les operations en coalition). RTO-MP-MSG-079 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified 18. NUMBER OF PAGES 11 19a. NAME OF RESPONSIBLE PERSON Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18

Why Battle Management Language? Standardizing C2 to simulation interoperability Digitizing C2 information to represent plans, orders and reports C4I BML Simulation Benefits: C4I Enables M&S Technologies to support C2 Processes Robotic Forces Simulating plans and orders without manual transfer of data between C2 and M&S systems Many potential applications: training, planning, mission rehearsal, C2-C2, robotics

A definition A Battle Management Language (BML) is defined as an unambiguous language intended to provide for (1) command and control of simulated and live forces conducting military operations and (2) situational awareness and a shared, common operational picture. Carey, Kleiner, Hieb & Brown, Standardizing Battle Management Language A Vital Move Towards the Army Transformation, 01F-SIW-067

Three views of BML BML can be described by Doctrine: Terms rooted in military language Representation: How to describe missions, tasks Protocols: How to exchange BML Terms rooted in Military Doctrine, such as AAP-6 BML XML Web Services/ Grid Services Representation Command & Control Information Exchange Data Model (C2IEDM) Tolk et. al, Merging National BML initiatives for NATO Projects, MSG-028, Koblenz, 2004

Applications of C-BML Support of planning, Course of Action (COA) Analysis BML is an enabling technology for use of M&S for planning and decision support Training & mission rehearsal Improve effectiveness of command and staff training and reduce the number of operators Robotic forces Formal unambiguous language allows automatic interpretation of tasks C2 to C2 More precise and understandable exchange of plans and orders

Coalition BML (C-BML) in context of MSG-048 Orders structured using 5W s Who, What, When, Where and Why Focuses on the Execution part of an Operation Order (OPORD) A formal tasking grammar, C2 Lexical Grammar (C2LG), ensures an executable BML Based on multi-national/nato C2 standard Joint Command, Control and Consultation Information Exchange Data Model (JC3IEDM) Exchange of C-BML using XML and Web Services Two-way information exchange (orders and reports)

Employment of C-BML Lessons learned from the use of BML Services needed to efficiently use BML Configuration of C2 and simulation systems (define units, capabilities, terrain ) Initialization of C2 and simulation (initial order & positions, task organization ) Time management: two-way exchange of information during non-real time simulation (scaled time) Scalable information exchange, e.g. through publish & subscribe Configuration Terrain data / maps Define units and capabilities Initialization Initial unit positions Initial order (Task organization) Execution Exchange of reports, FRAGOs Analysis, AAR Load data from previous run(s)

SISO standardization Ongoing Product Development Group on C-BML Phased approach for development of C-BML. For each phase Data model Structure and representation of information Information exchange mechanism Guidelines MSG-048 provides feedback to SISO

A BML example Battalion OPORD developed by the Norwegian Army Land Warfare Centre for the 2009 experiment Documented as free text and graphics The order needed additional elaboration and clarification to be put into BML Final order put into Norwegian Tactical C2IS (NORTaC-C2IS) Simulated by APLET (FRA) and JSAF (UK) during the experiment ICC Battleview ABCS JC3IEDM + OneSAF BML WEB SERVICES UAV Sim JSAF DIS NORTaC SICF ISIS SIMBAD

1. SITUATION a. Enemy Forces Annex B Intel b. Friendly Forces (1) Higher Commander s Mission O/O 1BCT conducts mounted attack 100400Apr 2010 along axes PORSCHE and CORVETTE as the 2UEx(M) main effort (ME) to destroy enemy forces in zone and seize objectives LION and TIGER. BPT attack eny forces across the international border or to the WEST of NORTHWEST. BPT to conduct combat operations NORTH and NORTHWEST in-zone, to destroy ARIAN forces bypassed during the attack, to assist in ejecting Eny remnants from CF territory (2) 1HBCT Commander s Intent The purpose of TROJAN HORSE is to maneuver rapidly from an ATK pos along PL DENVER to seize OBJ LION and TIGER, destroy ARIANAN forces in zone and secure objectives along the international border to enable establishment of CASPIAN FEDERATION (CF) regional military stability. (3) Neighboring units that could affect the operation. 1-66 CAB(Main effort) (a) O/O attack SOUTHEAST in zone along axis PORSCHE to secure OBJ DOG to defeat or bypass ARIANAN forces in zone. (b) O/O attack SOUTHEAST in zone along axis PORSCHE to secure OBJ LION to defeat or bypass ARIANAN forces in zone. 8 th Sqdn 10th CAV (a) O/O conduct zone recce from PL DENVER to intermidiate OBJ CAT and DOG. (b) O/O conduct zone recce from PL PEARL to OBJ LION and TIGER. (c) O/O establish scrren to the SHOUTHWEST of 1HBCT AO across the IB to provide early warning. (d) BPT continue zone recce forward of 1 HBCT across the IB to locate Eny and direct fires in supp of 1HBCT attack. c. Attachments and Detachments Annex A Task Org d. Commander s Evaluation. (1) This OPO regulates the attack against OBJ Tiger (2) Pre-condition: The Eny forces in our AO has been reduced to 40% effectiveness by higher echelon (3) Assumptions: The Eny will not stay and fight in his current positions. 2.MISSION 1-22CAB will O/O attack in zone along ROUTE CORVETTE to secure OBJ CAT and OBJ TIGER. 1-221(tank) and 1-223(Mech) will attack towards OBJ CAT supported by 1-222(tank) and 1-224mech in the terrain SOUTH of ROUTE CORVETTE. 1-222 and 1-224 is to fix the enemy towards OBJ CAT to allow 1-221and 1-223 to defeat the ENY in zone. From OBJ CAT I will continue the attack at one axis until the battalion has crossed the mash land EAST of PL RUBY. From PL RUBY I will attack on two axis iot secure OBJ TIGER and link up with 1-66 CAB in the SOUTH. During the operation ENG support will be prioritized for mobility efforts. 3. EXECUTION Intent: The intent of this operation is to destroy or bypass ENY forces in zone iot facilitate CF regional military stability. This will be done by seizing OBJ CAT and TIGER with the Bn moving along Axis CORVETTE. End state is reached when OBJ TIGER is secured. a. Concept of operation Annex C Ops Overlay. b. Tasks/Mission(s) to maneuver units 1-221 Tank Coy 1. O/O attack along ROUTE CORVETTE. Destroy or bypass ARIANAN forces in zone. 2. Secure NORTHERN part of OBJ CAT. 3. Secure NORTHERN part of OBJ TIGER 1-222 Tank Coy 1. O/O attack SOUTH of ROUTE CORVETTE. Destroy or bypass ARIANAN forces in zone. 2. FIX ENY forces in OBJ CAT 2. Secure SOUTHERN part of OBJ CAT. 3. Secure SOUTHERN part of OBJ TIGER 1-223 Mech Coy 1. O/O attack along ROUTE CORVETTE. Destroy or bypass ARIANAN forces in zone. 2. Secure NORTHERN part of OBJ CAT. 3. Secure NORTHERN part of OBJ TIGER 1-224 Mech Coy4 1. O/O attack SOUTH of ROUTE CORVETTE. Destroy or bypass ARIANAN forces in zone. 2. FIX ENY forces in OBJ CAT 2. Secure SOUTHERN part of OBJ CAT. 3. Secure SOUTHERN part of OBJ TIGER Copy No 1 of 1 copies Issuing Headquarters: 1-22CAB HQ Place of Issue: Date-Time Group of Signature: Message Reference No. OPERATION ORDER NO 001 References: See OPORD 2010-14 (OP TROJAN HORSE) 1HBCT Time Zone: CHARLIE Task Organization: Annex A ORBAT c. Tasks/Mission(s) to combat support units Recce Plt: Route recce in force ROUTE CORVETTE Mortar plt: Annex D fire support Eng Coy: Annex F Engineer d. Coordinating instructions (It may include the following) (1) CCIR: (2) Deception guidance (3) Specific priorities, in order of completion (4) Time line (5) Guidance on orders and rehearsals 4. ADMINISTRATION/LOGISTICS a. Support Concept Annex R b. Materiel and Services (1) Supply (2) Maintenance (3) Transportation (4) Construction c. Medical Evacuation and Hospitalization (1) Location of units medical facilities (2) Evacuation route(s) d. Personnel e. Civil-Military Cooperation (1) Control of civilian population (2) Refugees f. Miscellaneous 5. COMMAND AND SIGNAL a. Command, Control, and Communications. b. Signal

(main attack) COA1: Chosen COA. Bn on road and terrain axis. Give mutual support. ME along road. Requires Engineer support. Slower but safer. W N S E (supp. attack) Route Corvette PL Denver (fix) PL Jade Marsh (cover) PL Opal Splits objective area into NORTH / SOUTH PL Pearl PL Ruby

Detailing Execution Unit 1-221 Tank Sqn 1-223 Mech Cpy 1-222 Tank Sqn 1-224 Mech Cpy Phase 1 from PL DENVER to PL AUSTIN Main attack along axis corvette (this indicates attack direction), control measure route corvette Main attack along axis corvette, control measure route corvette Supporting attack along axis south of corvette, control measure route_to_cat_so UTH Supporting attack along axis south of corvette, control measure route_to_cat_so UTH Phase 2 from PL AUSTIN to PL PEARL Seize objective area CAT. (optional) Support by fire 1-222 and 1-224 Seize objective area CAT Fix enemy in objective area CAT. (optional) Attack along axis route_to_cat_sou TH Fix enemy in objective area CAT. (optional) Attack along axis route_to_cat_sou TH Secure objective area CAT_NORTH Secure objective area CAT_NORTH Secure objective area CAT_SOUTH Secure CAT_SOUTH Phase 3 from PL PEARL to PL RUBY Main attack along axis corvette, control measure route_to_tiger Main attack along axis corvette, control measure route_to_tiger Follow and support along route route_to_tiger until phase line PL_RUBY Follow and support along route_to_tiger until phase line PL_RUBY Phase 4 from PL RUBY to TIGER Main attack along axis corvette, control measure route_to_tiger Main attack along axis corvette, control measure route_to_tiger Supporting attack from phase line PL_RUBY along route_to_tiger_s OUTH Supporting attack from phase line PL_RUBY along route_to_tiger_s OUTH Seize objective area TIGER_NORTH Seize objective area TIGER_NORTH Seize objective area TIGER_SOUTH Seize objective area TIGER_SOUTH Secure objective area TIGER_NORTH Secure objective area TIGER_NORTH Secure objective area TIGER_SOUTH Secure objective area TIGER_SOUTH

~ NORTnC-CJIS: 1-11 _CP Frl~ \'lew rl<ip ntob~ 006 F1.:.norcer LOJm:;; 1ccls 1~r: J611JLO'detls: ~.:.t..a~ ~ ~ ~,.L.ruh ;'- '*' " ~o: [@ E;. c ~!f..t rl' c, ; O'to lay[xplou~:l" '1 X 1 I:Mn an:lu of Dlll:tlc -O.(~EnUC:)r. -0 0 FII..Jtt.o = -oo~rnet.. n wos i -u~-: Planlln!:Po t_d N~. R) :- 0 i Pli1nUnrPn~_nPA1 I )~:::; PkmJNOR_C(..!.._001) :--0 ~ Pli1nrNnR_rf"A_nnr_PHr: : -1 1 ~ rl~ninon_a:.l._001_rll2 0 ~i PlaniNOR_CCA_OOI_PH3: i -0~ rl~njnon O:.L. oo~ r11.r!- -~IEJ I-'1anJNUK_Ll/,_UU~j -0~~ PlduiNOR_O:A_OO~_pH1. i 0 ~ 1-'lanJNUK_U./,_UU~_I-'H~. ' 0 :-1 PlanrNOR_O:A_002_PH3 I )~::-" Pkani~IOR_O:.L._002_PH{! -~ ::i Pli1n1Rf>j"lnr#l1_1-F:F:_Il-:(1-??) PJ ~~ PkanJRcpor: T1_1 SI>_PTJ" 221.O ~~i PlaniRepor:~I_Et--_G-11-22) : 0 ~ rl~njnepor:.sol [f'-, rn 221 '_--0 ~ 1-'lanJKepor:~_l--l_l.ll~-:u l -~ ;:::; PldiiiAt:L-'UI.~_F=LPll.l-22 ' -~ ; 1-'laniKepor:tUI_U".VJl-111 1=1 -[Qil-1.1-".!.1. c::j "6ttdJI' O Tetach" ~ ''3lU.Ul' -~ 1-n_L-1-'.1-<:~_LI-' ~- IQ1 22'._,,.. -::..J "!dt3:""l '!.!1 ")etoo:--h' c:il 2211.1 221" ffi (21-?717 1-??1? OJ I&J12213.12213 ffi E2J1-:.'l?1::l1-??1::l :±1- IQil-222. "-222 $ - IZil-223. " 223 ' :_ ::J ",'\tl3::"l'.. :J ")tiddr' Task flostility Friend Last Update 0910522 Reportir111 O r~ 1-22_CP Task"' 11 22 Intent Text vi 2~- 2-1-2 2-13 243 Cooroent t-j1jl30::: E0 1?.1l':<Xl ojit:23 t v;co::c Zonc_:;l';N '~-!in tjui<l OK Concel An order is defined as tasks, control measures and resources and is stored into JC3IEDM Tasks defined graphically Task properties defined through dialog boxes NORTaC C21S FFI C2-gateway Hibernate Mapping in Java JAXB - - ----m: i -~--. -~1 : - - --.- -- -*- - - -: :-J~ -.~ -----~ - : : ----- :~~ ---! 1 : : ~ :: :: - :: -~ ~ ~ ~ -...:..;... ;. --- -=--: -- : ~ - --- - ----- : ~ ---- -- ----- _: : : : - - -- JCW3llbj&t!S XML SBML Se1ver.,..,...

BML-JC3IEDM mapping in NORTaC-C2IS ACT TMPRL. ASSOC ACT ~:relative task)?=? xml PK, F Kl!!!l!i...!a.!l PK, FK2!!.!lLMlJlt f----+ PK Jlli.il!. PK act tmprl anoc 1x l L,.-L' "_r_:.d_u_ 8 ~ OrderPush oame ----------- -----, 8 ~ OrderPush I ~ T askerslntent cat_code---+ ------------------------i-. 8 ~ Task r _-_-_-_-_-_-..,~ - ---------------------------------- - - - : - 8 ~ GroundTask r----;::::::============ Q_.. ct PK llijll eel c:>d.. ACTIA name - - - - - - - - t ~CT RES PK,FKI llijll PK m..w...lj. cel_code=ri ~ -- ".~CT RES!ToM PK,FKI llijll PK,FKI ilklillj! FK2 obl_item_ld 03J ITEM (taskee) p K lll1lillm..lll. ::at_code=or,a me I I I I I I I I PK,FKI PK ACT_OBJVE lli..!!l. act objve jx cat_codo=oi ACT.OBJVE ITEM PK,FKI llijll PK,FKI act objyo Jx - - - -l - - - - FK2 cat_code=nos obj_ltem_ld OBJ _ITEM (affected who) p K 2l1Ul.tliLil!. cat_code=or narre PK,FKI ~ 8 ~ TaskeeWho =t------ _;.JI+--------= ~ Unit!D I 8 ~ What I...------ ~ WhatCode I r -- -- -- -- -- -- ~ WhereiD ctl_code ACTIA I 8 ~ Where! 1±1 ~ AtWhere I l 8 ~ startwhen I i 8 ~ RelativeWhen eel _c:>de PLAN I i ~ QJalifier actv _ ::ode A TISPT ptndstart date - 1_--r-_-_--_-_--_-_--_--_-_--_ ~ ReferenceDu-amn ptld_start_lrne T ~ RelativeWhenReferenceTask!D start_quat_co<ie I a ret End\1/hen ptld_enc_date ' ~ ~~ :::::: = ~- - - - - --~ - ~ -- - - - - - ~- ~ ~~~mequaiier I 8 ~ AffectedWho '--------- ~ Datelrne.----------------ii-------- ~ Unit!D i i [!] ControiMeasurelabel 13 ~ T askcontroimeasures j [!] ControiMeasurelabel - - - - - - - - - - - - - - - - -i- - - - - - - - [!] Task!D.---..L._-- ACT _TASK j ~ OrderlssuedWhen i ~ Order!D 06J ITEt.1 (where) l 1±1 ~ TaskerWho P K 2lliJ.IiJn.jj. j ~ T askorganization cat_::oda=fe j 1±1 ~ ControiMeasures name ---- ---- ---- -- -- -- -- -- --,; version "1.0' encoding="utf-8" standalone="yes' Kill the enemy 1-222 ATTSPT ROUTE_SOUTHOF _CORVETTE STRENO 24500.000 20936ATTACK_ALONG_CORVETTE_1 AT 20091013131909.000 1 221 Bde_boundary _north Bde_boundary _south 2093BSUPATTACK_SOUTH_CORVETTE 20090916090025.000 20935NOR_COA_001

WHY WHO WHAT WHERE Web Service BML Server WHEN

Summary C-BML digitizes C2 information and standardizes the M&S-C2 interface C-BML can change the way we conduct C2 and is an enabler for use of M&S in support of C2 A C-BML standard is being developed by SISO NATO RTO activities (MSG-048/MSG-085) play an important role in multinational testing of and experimentation with C-BML