01.12.2014 Views

monitoring

monitoring

monitoring

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

UNCLASSIFIED<br />

DEFENSE SCIENCE BOARD | DEPARTMENT OF DEFENSE<br />

The signatories of nuclear arms control or arms reductions agreements, joined by all of the<br />

nuclear weapons‐possessing nations, would collectively and mutually negotiate the procedures,<br />

frequencies, prohibitions, etc. for carrying out materials and weapons transparency<br />

measures/inspections protecting against the spread of nuclear weapons expertise to NNWS.<br />

The ideal outcome would be agreement that the results of these inspections would be<br />

delivered to the IAEA as part of its routine <strong>monitoring</strong> and shared with all nations worldwide.<br />

The Task Force believes that progress through Phase 4 will have a positive effect on worldwide<br />

arms stability as well as strengthen non‐proliferation efforts. With everyone having a stake in<br />

the transparency processes coming into existence and successfully working, it might then be<br />

possible to require mandatory compliance for any holdout nations. The culmination of all of<br />

these efforts would be the achievement of a Cooperative Universal Transparency regime that<br />

would operate to ensure <strong>monitoring</strong> and verification of all nuclear weapons as well as<br />

inventories of SNM—over the whole world.<br />

2.5. Developing New Monitoring Technologies to Support Expanded Demands<br />

Cooperative <strong>monitoring</strong> has inherent limitations but offers unique benefits. Because<br />

inspections protocols are shared, the potential for deception and countermeasures is obvious.<br />

However, access rights afforded an international or multilateral inspectorate can extend well<br />

beyond those feasible by other means. As information gathering is done in the open, platforms<br />

that might be wholly impractical in a denied access context become feasible. Persistent<br />

surveillance opportunities are also expanded. The technical solutions pursued for cooperative<br />

<strong>monitoring</strong> must not infringe upon national technical capabilities, but the different design space<br />

and relaxed operational requirements can open up useful <strong>monitoring</strong> opportunities. Weapon<br />

design information must be protected and legitimate proprietary interests must be protected.<br />

Information barriers that allow reliable conclusions to be drawn by an inspecting party, while<br />

protecting design information and legitimate proprietary interests, must be developed and<br />

utilized. 18<br />

Research and development, ideally undertaken in partnership with other nuclear weapons and<br />

NNWS, along with the IAEA, must address several challenges, and in every case, take advantage<br />

of advances in information technologies. Priority should be placed on:<br />

• Information Barriers. Information barriers that provide robust protection against<br />

unauthorized disclosures of sensitive information must be demonstrated. An ongoing<br />

level of effort is needed because vulnerabilities change over time as technology<br />

advances. More work is needed to ensure that the confidence required in a warhead<br />

verification measurement can be attained when such a barrier is employed.<br />

18 These issues have also been recognized by the State Department’s International Security Advisory Board (ISAB),<br />

and near term technical steps for trust building with Russia proposed. See ISAB report “Verification Measures ‐<br />

Near Term Technical Steps,” 2012; http://www.state.gov/t/avc/isab/200465.htm<br />

DSB TASK FORCE REPORT Chapter 2: Cooperative Regimes| 27<br />

Resilient Military Systems and the Advanced Cyber Threat<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!