monitoring
monitoring
monitoring
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
UNCLASSIFIED<br />
DEFENSE SCIENCE BOARD | DEPARTMENT OF DEFENSE<br />
example of both the pros and cons of crowdsourcing. 35 Using open source information for the<br />
past several years—the Internet, local Chinese news reports, Google Earth and online photos<br />
posted by Chinese citizens—the students have published a far‐reaching paper that challenges<br />
assumptions made by the IC on China’s nuclear weapons capability. However, there is an<br />
extensive debate on the accuracy of this report, compiled by untrained intelligence analysts<br />
without access to classified data, which could have serious political and military implications.<br />
Many nonproliferation experts question the veracity of the report, citing how a semifictionalized<br />
Chinese TV series is used as one of the intelligence sources.<br />
Whether the report is completely accurate or not, this event provides a “proof‐of‐concept” on<br />
how crowd sourcing can be used to augment limited analytical capacity. The IC should establish<br />
a process which codifies crowd sourcing as an additional area for research related to nuclear<br />
treaty <strong>monitoring</strong> issues, and ensure that a non‐prejudicial process is established whereby open<br />
source and mainstream intelligence assessments can be reconciled.<br />
5.6.3. Iteration: Proliferation Monitoring Management<br />
Figure 5‐1 illustrates the importance of integration and iteration in the access‐sense‐assess<br />
cycle. The Task Force notes that this responsibility should fall to the DNI, who bears a special<br />
responsibility for pursuing and integrating sensitive intelligence sources and methods, opensource<br />
information, and data provided through arms control‐related information exchanges<br />
and inspections. In carrying out this role, the DNI can draw upon the lessons and experiences<br />
of the Intelligence Community’s Treaty Monitoring Manager.<br />
At the height of arms control <strong>monitoring</strong> in the late 1980s and early 1990s, the position of<br />
Treaty Monitoring Manager (TMM) was an effective vehicle for coordinating the work of<br />
multiple organizations and collection activities. As noted earlier in this report, the number of<br />
actors of both horizontal and vertical proliferation concern, and the increased geographic scope<br />
of activities of concern, have become too large to understand and anticipate developments of<br />
potential threat to the United States within treaty sanctioned regimes alone. The Task Force<br />
believes the TMM model could be effectively adapted to a Proliferation Monitoring Manager<br />
position with responsibilities to proactively orchestrate the collection, fusion, analysis, and<br />
dissemination of information vital to understanding the overall horizontal and vertical<br />
proliferation threats to the United States and its allies, as well as providing information relevant<br />
to verification judgments about the compliance of state parties to international agreements.<br />
This position, working with other National Intelligence Issue Managers, should explicitly act to<br />
create synergies among collection modalities and information means and to disaggregate tough<br />
overall <strong>monitoring</strong> problems into manageable problem sets. The Proliferation Monitoring<br />
Manager, as the Treaty Monitoring Manager has historically done, would play the leading role<br />
in the U.S. Government for orchestrating the timing and focus of the most sensitive intelligence<br />
35 W. Wan, “Georgetown Students Shed Light on China’s Tunnel System for Nuclear Weapons,” Washington Post,<br />
November 29, 2011<br />
DSB TASK FORCE REPORT Chapter 5: Improve the Tools: Access, Sense, Assess | 62<br />
Nuclear Treaty Monitoring Verification Technologies<br />
UNCLASSIFIED