monitoring
monitoring
monitoring
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
UNCLASSIFIED<br />
DEFENSE SCIENCE BOARD | DEPARTMENT OF DEFENSE<br />
nuclear weapon state, thereby proliferating not only weapons possession, but also technology<br />
and knowledge.<br />
Each scenario node could play an elemental role in many other scenarios – e.g., the theft of a<br />
weapon could be a common step in several distinct scenarios. The nodes are therefore linked in<br />
a network of connections that becomes a framework for systematically developing and<br />
analyzing an entire family of scenarios in the M&V problem space. Figure A‐2 illustrates the<br />
complete scenario framework, rotated to fit the page, while Appendix B provides a larger view of<br />
the framework.<br />
As shown in Figure A‐3, scenarios generally evolve as one traces from top to bottom, following<br />
the directed graph towards consequences. The left side demonstrates scenarios that can lead<br />
to movement of weapons themselves from NWS to other actors. The center details scenarios<br />
that can lead to the proliferation of NW technology and knowledge, and the right hand side<br />
covers compromise of weapons usable nuclear material (WUNM) and associated technology.<br />
The long vertical chain in the middle‐right illustrates the evolution of non‐state actors towards<br />
unconventional attack with nuclear weapons. Consequences in the scenario framework include<br />
blackmail, attack, or simply the emergence of a new nuclear‐armed state.<br />
Within the scenario framework, blue‐colored nodes indicate “macro” nodes, or nodes that are<br />
easily decomposed into a common set of sub‐nodes. For the purposes of this work, the only set<br />
of sub‐nodes explored is the “movement sub‐space.” This sub‐space corresponds to movement<br />
through the origin region, across international boundaries, through global commons, and into<br />
the target region. The movement sub‐space is laid out in the blue box on the right hand side of<br />
the framework diagram.<br />
Real‐world events could easily be interpreted as a signal that a scenario in the framework is<br />
playing out, although there is actually no nefarious activity. It is very important to consider<br />
these degenerate scenarios, in addition to actual threat scenarios, when analyzing potential<br />
solutions as it is likely the bulk of actual signals and information will be from situations that are<br />
not actually leading to nuclear attacks. For example, the nuisance alarm problem in radiation<br />
detectors that are <strong>monitoring</strong> commerce streams plays a large role in the overall cost,<br />
effectiveness, and operation of those systems. Operational and analytical understanding of<br />
such false positives leads to an understanding of the full suite of information and analysis<br />
required for high confidence detection.<br />
DSB TASK FORCE REPORT Appendix A: Unabridged Description | 82<br />
Nuclear Treaty Monitoring Verification Technologies<br />
UNCLASSIFIED