01.12.2014 Views

monitoring

monitoring

monitoring

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

UNCLASSIFIED<br />

DEFENSE SCIENCE BOARD | DEPARTMENT OF DEFENSE<br />

passing through the perimeter. A secure zone between inspection points must be maintained<br />

to ensure that no nuclear contraband is passing around those inspection points. (Additional<br />

tasks may need to be performed, but are not included here.)<br />

In this example, it is proposed that radiation detectors, in addition to persistent surveillance<br />

assets might be used to help establish a perimeter through <strong>monitoring</strong> and surveillance of<br />

perimeter zones. Boots on the ground and vehicles are proposed for enforcing perimeter<br />

incursions presenting a show of force along the perimeter itself. Similarly, additional assets can<br />

be laid out and their relationships to mission objectives captured. The requirements and<br />

metrics by which proposed assets are to be assessed have been derivatively defined from the<br />

previous layer. As assessments are made and analytical results obtained, those are aggregated<br />

into performance assessments of higher and higher layers.<br />

The derivation of a tractable set of metrics through this process is not a trivial task, nor should<br />

it be. Risk is often considered the top‐level metric (with further discussion in the next section).<br />

Moving down the chain through strategic capability areas, functional objectives, tasks, and<br />

assets, metrics of increasing resolution and granularity are derived. At the asset level, the<br />

metrics center largely on performance specifications that are technology specific. These metrics<br />

are familiar in radiation detector assessments, but on their own, are only implicitly related to<br />

the overall goals of risk‐reduction. A metrics derivation process such as this places each metric<br />

in the context of the layer above it, explicitly linking it to overall architecture performance.<br />

A.7. Portfolio Decision Methodologies<br />

The scenario framework, the bridging methodology, and the risk considerations proposed<br />

above lay out a systematic method for developing and assessing M&V solution architecture<br />

options. In order to render those results into investment roadmaps to develop capabilities, a<br />

decision framework must be established. While this section does not attempt to propose a<br />

decision framework, it does provide some considerations for doing so.<br />

A.8. End‐to‐End Metrics<br />

A significant challenge in adopting the approach that has been laid out above has been the<br />

articulation of an end‐to‐end metric that can be used to understand overall solution<br />

architecture performance against the problem space. Ultimately, it is that metric that matters<br />

most to decision makers. Risk provides a clear metric for endogenous trade‐offs within the<br />

M&V problem space, allowing for the comparison of very different solution sets and<br />

examination of benefit between investments both within, and across, different components of<br />

the problem space itself. Utilizing risk as an end‐to‐end metric in the M&V problem space can<br />

also enable exogenous trades, as governments face economic challenges and must make<br />

tougher decisions about where to invest resources.<br />

DSB TASK FORCE REPORT Appendix A: Unabridged Description | 88<br />

Nuclear Treaty Monitoring Verification Technologies<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!