monitoring
monitoring
monitoring
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
UNCLASSIFIED<br />
DEFENSE SCIENCE BOARD | DEPARTMENT OF DEFENSE<br />
In its first phase during WWII, the ASW problem was significantly diminished by the advanced<br />
code breaking devices developed (the precursors of modern day computers), along with careful<br />
analysis of the patterns of operation by the German fleet. The second ASW problem, tracking<br />
the extremely quiet nuclear propelled and armed submarine developed during the Cold War,<br />
was addressed by the judicious blending of advanced large scale sonar arrays, discrete<br />
shadowing of threatening boats, and advanced algorithms to pull small signals from high clutter<br />
environments.<br />
The IED problem has been addressed with a twofold attack: find the network and find the<br />
device. This has resulted in a significant mitigation of the threat. Both existing and new<br />
technologies have been brought to bear to address this problem. They can be categorized and<br />
characterized in the following six categories:<br />
• Persistence: Holding the adversary at risk 24/7<br />
• Multi‐INT integration: One or more INTs to “find”, one or more to “fix”<br />
• Advanced network analyses: Tools to derive information from huge data sets<br />
• New cyber tools and techniques: Cyber mining and geolocating to latitude and<br />
longitude<br />
• Improved SIGINT: More signals, under more conditions<br />
3.2. Characteristics of Monitoring Illicit Nuclear Activities<br />
The Task Force agreed that the guiding principle for <strong>monitoring</strong> to detect undesirable nuclear<br />
activity should be detection of activities as early in the planning and acquisition of a capability<br />
as possible in order to provide the greatest number of options for slowing or reversing the<br />
effort. Difficulties arise from several factors––each one a challenge in itself, but in<br />
combination, as or more daunting than the ASW or Counter‐IED problems. First, the number of<br />
actors and their geographic dispersion worldwide is large. Second, the observables are limited,<br />
typically ambiguous, and part of a high clutter environment of unrelated activities. Moreover,<br />
at low levels associated with small or nascent programs, key observables are easily masked and<br />
observation made more difficult without ready access by the full range of persistent<br />
intelligence systems. Third, and perhaps most significant, is that radiation phenomenology<br />
unique to SNM is not detectable at long standoff distances, further exacerbating the large area<br />
problem.<br />
The signal‐to‐clutter characteristics are similar to those faced in ISR support to conventional<br />
warfighting and counterterrorism. The ISR architectural approach is based on a cueing principle<br />
that starts with general observations from multiple intelligence and surveillance sources and<br />
assigns ever more specific and precise assets to targets that appear to be of growing concern.<br />
Distinguishing characteristics of this approach are persistence, but not necessarily of the<br />
highest fidelity, widespread access to all the available data, allowing more “eyes on target” to<br />
DSB TASK FORCE REPORT Chapter 3: Unilateral Measures | 33<br />
Nuclear Treaty Monitoring Verification Technologies<br />
UNCLASSIFIED