Over the years, a variety of possible solutions to this intractable verification conundrum have been considered and found wanting: on-site inspections, perimeter-portal monitoring, operational constraints, tagging, etc. have all proven inadequate to the task of deterring Soviet cheating and, should the USSR opt to do so, of reliably detecting it.
CENTERFORSECURITYPOLICY: Bush��s Faustian Deal On Mobile Missiles