01.12.2014 Views

monitoring

monitoring

monitoring

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

UNCLASSIFIED<br />

DEFENSE SCIENCE BOARD | DEPARTMENT OF DEFENSE<br />

nuclear weapon state, thereby proliferating not only weapons possession, but also technology<br />

and knowledge.<br />

Each scenario node could play an elemental role in many other scenarios – e.g., the theft of a<br />

weapon could be a common step in several distinct scenarios. The nodes are therefore linked in<br />

a network of connections that becomes a framework for systematically developing and<br />

analyzing an entire family of scenarios in the M&V problem space. Figure A‐2 illustrates the<br />

complete scenario framework, rotated to fit the page, while Appendix B provides a larger view of<br />

the framework.<br />

As shown in Figure A‐3, scenarios generally evolve as one traces from top to bottom, following<br />

the directed graph towards consequences. The left side demonstrates scenarios that can lead<br />

to movement of weapons themselves from NWS to other actors. The center details scenarios<br />

that can lead to the proliferation of NW technology and knowledge, and the right hand side<br />

covers compromise of weapons usable nuclear material (WUNM) and associated technology.<br />

The long vertical chain in the middle‐right illustrates the evolution of non‐state actors towards<br />

unconventional attack with nuclear weapons. Consequences in the scenario framework include<br />

blackmail, attack, or simply the emergence of a new nuclear‐armed state.<br />

Within the scenario framework, blue‐colored nodes indicate “macro” nodes, or nodes that are<br />

easily decomposed into a common set of sub‐nodes. For the purposes of this work, the only set<br />

of sub‐nodes explored is the “movement sub‐space.” This sub‐space corresponds to movement<br />

through the origin region, across international boundaries, through global commons, and into<br />

the target region. The movement sub‐space is laid out in the blue box on the right hand side of<br />

the framework diagram.<br />

Real‐world events could easily be interpreted as a signal that a scenario in the framework is<br />

playing out, although there is actually no nefarious activity. It is very important to consider<br />

these degenerate scenarios, in addition to actual threat scenarios, when analyzing potential<br />

solutions as it is likely the bulk of actual signals and information will be from situations that are<br />

not actually leading to nuclear attacks. For example, the nuisance alarm problem in radiation<br />

detectors that are <strong>monitoring</strong> commerce streams plays a large role in the overall cost,<br />

effectiveness, and operation of those systems. Operational and analytical understanding of<br />

such false positives leads to an understanding of the full suite of information and analysis<br />

required for high confidence detection.<br />

DSB TASK FORCE REPORT Appendix A: Unabridged Description | 82<br />

Nuclear Treaty Monitoring Verification Technologies<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!