01.12.2014 Views

monitoring

monitoring

monitoring

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

UNCLASSIFIED<br />

DEFENSE SCIENCE BOARD | DEPARTMENT OF DEFENSE<br />

In its first phase during WWII, the ASW problem was significantly diminished by the advanced<br />

code breaking devices developed (the precursors of modern day computers), along with careful<br />

analysis of the patterns of operation by the German fleet. The second ASW problem, tracking<br />

the extremely quiet nuclear propelled and armed submarine developed during the Cold War,<br />

was addressed by the judicious blending of advanced large scale sonar arrays, discrete<br />

shadowing of threatening boats, and advanced algorithms to pull small signals from high clutter<br />

environments.<br />

The IED problem has been addressed with a twofold attack: find the network and find the<br />

device. This has resulted in a significant mitigation of the threat. Both existing and new<br />

technologies have been brought to bear to address this problem. They can be categorized and<br />

characterized in the following six categories:<br />

• Persistence: Holding the adversary at risk 24/7<br />

• Multi‐INT integration: One or more INTs to “find”, one or more to “fix”<br />

• Advanced network analyses: Tools to derive information from huge data sets<br />

• New cyber tools and techniques: Cyber mining and geolocating to latitude and<br />

longitude<br />

• Improved SIGINT: More signals, under more conditions<br />

3.2. Characteristics of Monitoring Illicit Nuclear Activities<br />

The Task Force agreed that the guiding principle for <strong>monitoring</strong> to detect undesirable nuclear<br />

activity should be detection of activities as early in the planning and acquisition of a capability<br />

as possible in order to provide the greatest number of options for slowing or reversing the<br />

effort. Difficulties arise from several factors––each one a challenge in itself, but in<br />

combination, as or more daunting than the ASW or Counter‐IED problems. First, the number of<br />

actors and their geographic dispersion worldwide is large. Second, the observables are limited,<br />

typically ambiguous, and part of a high clutter environment of unrelated activities. Moreover,<br />

at low levels associated with small or nascent programs, key observables are easily masked and<br />

observation made more difficult without ready access by the full range of persistent<br />

intelligence systems. Third, and perhaps most significant, is that radiation phenomenology<br />

unique to SNM is not detectable at long standoff distances, further exacerbating the large area<br />

problem.<br />

The signal‐to‐clutter characteristics are similar to those faced in ISR support to conventional<br />

warfighting and counterterrorism. The ISR architectural approach is based on a cueing principle<br />

that starts with general observations from multiple intelligence and surveillance sources and<br />

assigns ever more specific and precise assets to targets that appear to be of growing concern.<br />

Distinguishing characteristics of this approach are persistence, but not necessarily of the<br />

highest fidelity, widespread access to all the available data, allowing more “eyes on target” to<br />

DSB TASK FORCE REPORT Chapter 3: Unilateral Measures | 33<br />

Nuclear Treaty Monitoring Verification Technologies<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!