monitoring
monitoring
monitoring
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
UNCLASSIFIED<br />
DEFENSE SCIENCE BOARD | DEPARTMENT OF DEFENSE<br />
• Maintain an accurate accounting of existing nuclear material and devices in both<br />
declared and non‐declared countries (see Chapter 2 for a phased path to achieve<br />
this objective);<br />
• Detect and follow progress of suspected nuclear device development activity.<br />
The Task Force then asked what the ASW and IED problems might teach us about this problem.<br />
The principal lesson is that detection using any single phenomenology or based on a single<br />
observable is not going to be successful. A multi‐modal approach that goes after both primary<br />
and secondary observables is required.<br />
Much of what was learned from the IED problem can be summarized as “find the network, find<br />
the device.” Groups, not individual actors, carry out nuclear activities, much like the<br />
development and deployment of an IED. Coordination among several actors and organizations<br />
is required either to obtain a device or to develop one. Observing this coordination is the first<br />
indicator in the <strong>monitoring</strong> process and one for which many of the tools developed in dealing<br />
with IEDs should be well suited.<br />
Exploiting the cyber domain should certainly be a big part of any nuclear <strong>monitoring</strong> effort.<br />
Both passive, depending on what is sent voluntarily, and active sources should be considered.<br />
Data gathered from the cyber domain establishes a rich and exploitable source for determining<br />
activities of individuals, groups and organizations needed to participate in either the<br />
procurement or development of a nuclear device. In fact, a set of new techniques, e.g.<br />
Advanced Graph Analysis (i.e., modeling relationships between data elements and data<br />
attributes as graphs to solve complex analytical problems), for exploiting these data have been<br />
developed and can be applied to the network of people possibly engaged in the activities<br />
associated with nuclear weapons.<br />
Exploitation of the cyber domain to follow people, financial transactions, etc., is a critical first<br />
step in establishing a focus for technical <strong>monitoring</strong> based on other phenomenologies. 23 In<br />
other words, given the cyber cues, concentrated multi‐INT collection and exploitation over a<br />
focused area is feasible. This is the basic process that has been used with success in recent<br />
areas of conflict where air and space collection platforms have generally enjoyed unfettered<br />
access. Moving forward, these same processes need to be applied in denied areas. Many of the<br />
new technology advances in data exfiltration, covert implantation, etc., hold promise for<br />
successful multi‐INT collection and exploitation in non‐permissive environments.<br />
23 The potential for OSINT (open source intelligence) as a focusing step is also promising and should be explored.<br />
See Chapter 5, Section 5.5.4 for a discussion.<br />
DSB TASK FORCE REPORT Chapter 3: Unilateral Measures | 35<br />
Nuclear Treaty Monitoring Verification Technologies<br />
UNCLASSIFIED