01.12.2014 Views

monitoring

monitoring

monitoring

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

UNCLASSIFIED<br />

DEFENSE SCIENCE BOARD | DEPARTMENT OF DEFENSE<br />

• Maintain an accurate accounting of existing nuclear material and devices in both<br />

declared and non‐declared countries (see Chapter 2 for a phased path to achieve<br />

this objective);<br />

• Detect and follow progress of suspected nuclear device development activity.<br />

The Task Force then asked what the ASW and IED problems might teach us about this problem.<br />

The principal lesson is that detection using any single phenomenology or based on a single<br />

observable is not going to be successful. A multi‐modal approach that goes after both primary<br />

and secondary observables is required.<br />

Much of what was learned from the IED problem can be summarized as “find the network, find<br />

the device.” Groups, not individual actors, carry out nuclear activities, much like the<br />

development and deployment of an IED. Coordination among several actors and organizations<br />

is required either to obtain a device or to develop one. Observing this coordination is the first<br />

indicator in the <strong>monitoring</strong> process and one for which many of the tools developed in dealing<br />

with IEDs should be well suited.<br />

Exploiting the cyber domain should certainly be a big part of any nuclear <strong>monitoring</strong> effort.<br />

Both passive, depending on what is sent voluntarily, and active sources should be considered.<br />

Data gathered from the cyber domain establishes a rich and exploitable source for determining<br />

activities of individuals, groups and organizations needed to participate in either the<br />

procurement or development of a nuclear device. In fact, a set of new techniques, e.g.<br />

Advanced Graph Analysis (i.e., modeling relationships between data elements and data<br />

attributes as graphs to solve complex analytical problems), for exploiting these data have been<br />

developed and can be applied to the network of people possibly engaged in the activities<br />

associated with nuclear weapons.<br />

Exploitation of the cyber domain to follow people, financial transactions, etc., is a critical first<br />

step in establishing a focus for technical <strong>monitoring</strong> based on other phenomenologies. 23 In<br />

other words, given the cyber cues, concentrated multi‐INT collection and exploitation over a<br />

focused area is feasible. This is the basic process that has been used with success in recent<br />

areas of conflict where air and space collection platforms have generally enjoyed unfettered<br />

access. Moving forward, these same processes need to be applied in denied areas. Many of the<br />

new technology advances in data exfiltration, covert implantation, etc., hold promise for<br />

successful multi‐INT collection and exploitation in non‐permissive environments.<br />

23 The potential for OSINT (open source intelligence) as a focusing step is also promising and should be explored.<br />

See Chapter 5, Section 5.5.4 for a discussion.<br />

DSB TASK FORCE REPORT Chapter 3: Unilateral Measures | 35<br />

Nuclear Treaty Monitoring Verification Technologies<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!