FEASIBILITY STUDY ON THE USE OF RV DETECTION TECHNIQUES TO DETERMINE LOCATION OF MILITARY TARGETS
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP96-00787R000300190001-0
Release Decision:
RIPPUB
Original Classification:
U
Document Page Count:
23
Document Creation Date:
November 4, 2016
Document Release Date:
June 11, 1998
Sequence Number:
1
Case Number:
Publication Date:
August 5, 1980
Content Type:
REPORT
File:
Attachment | Size |
---|---|
CIA-RDP96-00787R000300190001-0.pdf | 656.49 KB |
Body:
[-Appr r For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
11
FEASIBILITY STUDY ON THE USE
OF RV DETECTION TECHNIQUES
TO DETERMINE LOCATION OF MILITARY TARGETS
E. C. May, Ph.D.
H. E. Puthoff, Ph.D.
Radio Physics Laboratory
333 Ravenswood Ave. ? Menlo Park, California 94025 J
d For Release22OOO/O8 lIO: SIC IAz 96-O0787RU00800190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
II INTRODUCTION AND BACKGROUND . . . . . . . . . . . . . . . .
A. Location of Unknown Military Targets. . . . . . . . .
B. Remote Viewing (RV) as a Location Technology. . . . .
A. Step 1--Microcomputer-Based Screening'Training. . . . 6
1. Sequential Sampling Statistical Averaging
Procedure . . . . . . . . . . . . . . . . . . . . 8
2. System Error . . . . . . . . . . . . . . . . . . 12
3. Test Data . . . . . . . . . . . . . . . . . . . . 13
4. Summary . . . . . . . . . . . . . . . . . . . . . 13
C.? Step 3--Demonstration-of-Feasibility Field Study. . . 15
IV PROPOSED PROGRAM . . . . . . . . . . . . . . . . . . . . . 17
REFERENCES . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
APPENDIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
1 Computer Modeling Task . . . . . . . . . . . . . . . . . . 7
2 Decision Graph for Site Selection . . . . . . . . . . . . . 10
3 Average Number of Trials nl to Screen Positive,. . . . . . 11
4 Decision Graphs for Site Selections Based on the Data of
Subject 1 (Table 1) Screening Study, Resulting in Twelve
Consecutive Correct Selections . . . . . . . . . . . . . . 14
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
The purpose of this document is to provide an outline of a program to
assess the feasibility of using RV detection techniques to determine the
Throughout this documeii-t the abbreviation RV refers to the terns ''remote
viewing," not to its other use as "re-entry vehicle."
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
II INTRODUCTION AND BACKGROUND
A. Location of Unknown Military Targets
.A continuing requirement in military operations is the determination
of the location of tactical and strategic military targets of interest
whose positions are not known a priori. Examples range from the location
of a command post in a tactical battlefield situation to the position of
a submarine in a strategic problem.
B. Remote Viewing (RV) as a Location Technology
Of particular interest along the psychoenergetic lines is a human
information-accessing capability that we call "remote viewing" (RV). The
RV phenomenon, under study at SRI International for the past nine years,
pertains to the ability of certain individuals to access and describe, by
means of mental processes, information blocked from ordinary perception
by distance or shielding, and generally believed to be secure against such
access. This has included the ability of subjects to view remote geographical
locations given only geographical coordinates or a designated person on whom
to target,
The RV abilities of several subjects have been developed to the point
where they can describe--often in great detail--geographical and technical
material such as natural formations, roads, buildings, interior laboratory
apparatus, and real-time activities. Such functioning has been examined
both from the standpoint of U.S. use as an intelligence collection technique,
and from the standpoint of threat analysis as to the vulnerability of U.S.
systems and facilities.'-`
any detail in former programs) the general prospect of a continuum of
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
possible locations can often be reduced to that of a set of discrete possi-
bilities. This is because, for example, only a finite number of deployment
sites of a weapons system are available, or because specifying one of a
number of grid squares is sufficient to define location. If a location
task can be so defined (to be one of a discrete set of possibilities),
then a detection method can be designed around one of the standard formats
for RV testing, a statistical form of shell game which is a direct analog
of the discrete location problem.
One of the standard formats for R1' testing is a computerized form of
"shell" game which is a direct analog of the military target location situa-
tion. The testing procedure addresses the basic problem of choosing, by
RV techniques, a 'correct'' answer from among a number of possible alterna-
tives. An example is provided by an electronically-automated screening
study carried out by SRI consultant Charles Tart. Subjects were asked to
determine which one of ten possible positions on a circular display had
been designated as an active target by the electronic test device's random
number generator.? From an unselected population of 2000 university
students.?participating in a mass card screening program, seventy of the
better subjects accepted an invitation to be further screened using the
automated electronic testing system. Of these, ten were finally chosen
to participate in a formal study involving 500 trials each. The results
obtained with these ten subjects are shown in Table 1. It is seen that
five of the ten subjects scored significantly above chance, all in the
range of 1.5-2.5 times chance expectation. The best subject averaged a
24.8"; hit rate (-2.5 x chance) over the 500-trial sequence; the probability
of such a result or better occurring by chance is only p = 2 X 10 28.
Furthermore, as good as these results are, the potential utility of
such results can be further enhanced by the use of error-correcting
statistical averaging techniques. Such techniques have proven themselves
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Subject
Nit Rate
(10'Expected)
Probability of Obtaining;
Such a Result by Chance
(one-ta i loci )
1
24.81(
2 x 10 28
2
20.6-,
1 r 10-14
3
16.21-f
2 x 10-6
4
16.0?
4 x 10-6
5
15.6-,
2 x 10-5
6
11.81-1
nonsignificant
7
11.4x;
nonsignificant
8
10.8x-
nonsigni fi cant
9
9.4-,
nonsignificant
10
7.8~
nonsignificant
capable"of amplifying even small statistical advantages to arbitrarily-
high-accuracy results. To cite an example, Czech researcher Dr. Milan
Ryzl, a chemist with the Institute of Biology of the Czechoslovakian
Academy of Science, carried out an experiment with a subject whose base
performance level was that he was generally capable of generating better
than 60`, hit rate targeting on sequences of random binary digits, or
bits (0, 1), where chance expectation was 50`;,.
For the purpose of showing the power of psi enhancement by statistical
averaging techniques., Ryzl chose as a task the acquisition, without error,
of a 50-digit random binary sequence. The effort took 19,350 calls,
averaging 9 sec per call. The hit rate for individual calls was 61.9',,
11,978 hits and 7372 misses. By means of repeated passes through the
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
sequence and an elaborate (though inefficient*) majority-vote protocol,
the subject was able to identify with 100% accuracy all 50 bits. The
probability that he did so by chance is only one in 1015.
Thus, data already extant from RV detection experiments indicate that
(a) one target from among a number can, with some statistical advantage,
be determined by RV detection techniques, and (b) the accuracy of doing so
can be amplified by statistical averaging techniques. These observations
thus provide a sound basis upon which to estimate the feasibility of RV
detection of randomly distributed military targets, and the protocols in
use are essentially directly applicable in their present form.
An increase in efficiency by a factor of about 20 could be expected on
the basis of a statistical averaging procedure more optimum than that
used in the experiment,1
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
With regard to determining the vulnerability of military targets to
RV detection, an approach that recommends itself, is a gradient-scale three-
step program involving (1) microcomputer-based screening/training, (2)
simulation testing, and (3) demonstration-of-feasibility field study.
Each of these are discussed below.
A. Step 1--Microcomputer-Based Screening/Training
The first step of the program would involve screening/training a
population of volunteers using microcomputer-based modeling of the
location problem. Basically, the individuals participating as remote
viewers are asked, in repetitive trials, to determine which one of twenty
possible locations (schematically represented as circles on a computer-
driven graphics display) has been designated as the simulated military
target by the computer's random number generator. The computer display
is driven by an LSI-11 microcomputer which, on a trial-by-trial basis,
generates a new random display of the circles (to circumvent bias on the
part of the remote viewer due to previous choices). The individual enters
his selections by button press on a hand device positioned over an X-Y
grid (see Figure 1, where a one-in-ten case is shown), and the computer
responds by giving immediate feedback as to the correct answer (to encourage
learning). As the trials progress, the selections are computer analyzed
on line by a statistical averaging program, the output of which indicates
whether one of the possibilities has been chosen statistically significantly
more often than expected by c:,ance. (In the later application phase
essentially the same procedure is followed, with the circles internally
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RBP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
keyed to actual target site possibilities. The procedure differs only in
that trial-by-trial feedback would, of course, not be available).
1. Sequential Sampling Statistical Averaging Procedure
An efficient statistical method for the screening/training
process is provided by a sequential-sampling technique used in production-
line quality control.e The sequential method gives a rule of procedure
for making one of three decisions (with regard to each of the possible
choices) following each trial, which consists of a remote viewer entering
a selection: the accumulated selections have met a pre-established hit-
rate criterion (decision positive); the accumulated selection do not
exceed chance expectation (decision negative); continue trials (insufficient
data to make a decision). The sequential sampling, procedure differs from
`ixed-trial-length procedures in that the number of trials required to
reach a decision is not fixed, but depends on the results accumulated with
each trial. The principal advantage of the sequential sampling procedure
as comp. -ed with other methods is that, on the average, fewer trials per
decision.-are required for an equivalent degree of reliability.
To apply the sequential analysis procedure to screening training,
we must a priori define the hit rate we require to conclude that useful
RV detection is taking place, and what statistical risks we are willing to
accept for making an incorrect decision.
To meet these criteria, sequential analysis requires the speci-
fication of four parameters to determine from which of two distributions
(chance or required-hit-rate) a data stream belongs. They are: p , the
0
fraction of selections of a particular target expected in the chance
condition (e.g., po = 1/20 for the case under discussion); pl, the fraction
of selection expected in the presence of a functioning RV capability (e.g.,
pl = 0.125 for a 2.5 x chance-expectation requirement, a value that might
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
be chosen because of previous performance in a successful one-in-twenty
task); a, an a priori assigned acceptable error rate (e.g., C' = 0.05) for
concluding that accumulated selections of a particular choice derive from
the pl (RV) distribution when in fact they derive from the p (chance)
0
distribution (Type I error); 6, an a priori assigned acceptable error rate
(e.g., 6 = 0.05) for concluding that accumulated selections of a particular
choice derive from the p 0 (chance) distribution when in fact they derive
from the p1 (R1') distribution (Type II error).
With the parameters thus specified, the sequential sampling
procedure provides for construction of a decision graph of the type shown
in Figure 2. The decision graph illustrates the rules of procedure for
making one of the three possible decisions following each trial: continue
test before making a decision (unshaded middle region in Figure 2);
decision positive (upper shaded region in Figure 2); decision negative
(lower shaded area in Figure 2). The equations for the upper and lower
decision lines are given in the Appendix.
With the appropriate equations programmed into the microcomputer,
the computer automatically records all data (trial number, target'response
pair), and displays on the video graphics system progress on a target
decision graph. A cumulative record of remote viewer selections is
compiled by the computer until either the upper or lower decision line is
reached, at which point a decision is made.
Also given in the Appendix are the equations for the average
number of trials to make decisions, positive or negative. A plot of the
average number of trials to reach a positive decision for typical cases
of interest is shown in Figure 3, where 5;, (a, ?) error rates have been
assumed. As an example, we see that for a 2.5 X expectation rate (k = 2.5)
hitter, nl 62 trials are required on the average to reach a positive
decision on a one-in-twenty target.
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
104
103
0.0
FIGURE 3 AVERAGE NUMBER OF TRIALS n1 TO SCREEN POSITIVE
p0 = chance expectation = 1/N, where N is the number of alternatives.
p1 = kxp0, where p1 is the required hit rate and k is the associated strength parameter.
Error rates a = p = 0.05 are assumed.
11
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
2. System Error
The overall system error is dependent on the type of mode
employed in site penetration attempts.
(a) If the RV detection task is approached with a tentative
choice having already been made (presumably by more conventional means),
then the task of the remote viewer is to verify or reject the tentative
decision as a backup test. In this mode, only a single decision graph
is plotted in the target choice of interest. The probability of error
due to chance (Pe c) in this case - a, being given by the product of the
probability of making a selection even though operating at chance, and
the percentage of such selections that correspond to an incorrect decision:
IN - 1
P = o
e,c N
(b) If the RV detection task is approached as a blind one-in-N
task (e.g., one-in-20 task), the N decision graphs are plotted in parallel,
one for each of the N target choices, as each selection is being made. In
this case, to a good approximation the graphs can be treated in the chance
condition as independent, and the probability of error due to chance
(Pe c) - Na. Specifically, it is given by the product of the probability
of making at least one selection in the N graphs by chance (which is one
minus the probability of making no selections), and the percentage of such
selections that correspond to an incorrect decision:
Pc,c = 1 N 1 I [1 - (1 - a)yJ
For example, with N = 20, a 1, individual-target error rate
(a = 0.01) leads to P = 0.17, or a confidence factor 1 - P = 0.83;
e,c e,c
this provides - a 17-fold increase in odds over the one-in-twenty confi-
dence factor expected by chance.
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
As a test of the above procedure applied to real data, the data
generated by Subject '1, Table 1, were processed by passing it through
the sequential analysis statistical averaging program (500 trials, 24.8`c
hit rate on a one-in-ten task).
With the parameters set to correspond to
a twice-chance-expectation requirement and 50/~ (a, ~) error rates, the
results are as shown graphically in Figure 4: twelve correct selections,
in a row, of one-in-ten targets were made in 452 trials. Although the
data was gathered under the condition that the correct answers were stored
in the computer during the runs, and therefore trial-by-trial feedback
could be given as the random number generator stepped through its program,
the conditions are nonetheless sufficiently similar to the projected task
that the results can be taken as evidence that the proposed approach is
sound.
4. Summary
In the screening'training program, participants would be screened
trained-by carrying out the task described in this section, first with
trial-by-trial feedback to encourage learning, and then without feedback
to model properly an application study. In this initial phase the target
for each run would be designated internally by the computer's random number
generator.
Carried out on a large-enough scale, the screening training
program described in this section would provide realistic estimates of
the percentage of population trainable in this task, and the levels of
proficiency to which performance in this task could be developed. In a
program designed to assess to its fullest the feasibility of locating
military targets by RV detection techniques, it is recommended that suffi-
ciently large-scale screening to meet these requirements be considered.
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
40 80 0 40 80 120
TRIALS
FIGURE 4 DECISION GRAPHS FOR SITE SELECTIONS BASED ON THE DATA OF SUBJECT 1
(TABLE 1) SCREENING STUDY, RESULTING IN TWELVE CONSECUTIVE CORRECT
SELECTIONS. Sequential sampling parameters: p0 = 0.1, p1 = 0.2, a = Q = 0.05.
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
B. Step 2--Simulation Testing
The participants who emerge from Step 1 with successful performance
profiles would then be asked to participate in Step 2. For this step, a
model of an actual military situation with a random one-in-twenty designated
target would be constructed. The subject's access to the mockup during
experimental runs would be by way of video monitor, although secondary
means such as maps or photographs might be utilized in later stages of
the study if appropriate.
To carry out the test, a participant (or participants) would be
briefed as to the task and then be asked to proceed as in Step 1. The
sequential sampling parameters in the microcomputer analysis program would
be set in accordance with the performance profile established by the par-
ticipant(s) in the Step 1 screening training study.
In Step 2 the mechanics of microcomputer recording and analysis of
subject selections would be the same as in Step 1. Step 2 differs from
Step 1, however, in that a participant's selection from the random circle
display, internally keyed to numbered sites, cannot be internally compared
to a recorded correct answer.
The results generated by the participant(s) in the site selection
procedure would then be tabulated and discussed with the sponsor. Should
the results appear encouraging, then Step 3 would be engaged.
C. Step 3--Demonstration-o:-Feasibilit}? Field Study
The final step in the three-step vulnerability assessment program
would consist of a field-demonstration test involving,'e.g., locating'an
actual tactical command post or an appropriate equivalent. Data would be
taken using the successful remote viewers of Step 2, both to determine
the degree of correlation between performance on the tasks of Steps 2 and
3, and also to evaluate actual performance in the field study.
15
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
The possibility of success in such a field study is buttressed by
the fact that the procedures described here have been used by us success-
fully in an exploratory program to determine the locations of hidden
radioactive material.
Following a series of such tests, performance profiles for the
individual remote viewers would be computed and the overall data set
would be evaluated to provide an estimate as to the usefulness of RV
techniques in locating military targets under operational-like conditions.
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
SGFOIA2
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001-0
1. H. E. Puthoff and R. Targ, "A Perceptual Channel for Information
Transfer over Kilometer Distances: Historical Perspective and
Recent Research," Proc. IEEE, Vol. 64, pp. 329-354 (March 1976),
2. H. E. Puthoff and R. Targ, "Perceptual Augmentation Techniques
Final Report, SRI Project 3183, Stanford Research Institute, Menlo
Park, CA (December 1, 1975)
3. H. E. Puthoff, R. Targ, E. C. May and I. Swann, "Advanced Threat
Technique Assessment ," Final Report, SRI Project 5309, SRI
International, Menlo Park, CA (October 1978),
4. R. Targ, H. E. Puthoff, B. S. Humphrey, and E. C. May, "Special
Orientation Techniques ," Final Report, SRI Project 8465, SRI
International, Menlo Park, CA (June 1980)
5. H. E. Puthoff, I. Swann, and G. Langford, "NIC Techniques ,'
Quarterly Progress Report, SRI Project 7560, SRI International,
Menlo Park, CA (January 1980),
6. C. T. Tart, Learning to Use Extrasensory Perception, Univ. of Chicago
Press (1976)
7. M. Ryzl, "A Model for Parapsychological Communication," J. Parapsy-
cology, Vol. 30, pp. 18-31 (March 1966),
8. A. Wald, Sequential Analysis, Dover Publications, New York (1973),
Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
The equations for the upper and lower limit lines in the sequential
sampling procedure are, respectively,10
yl = dl + Sn
y = -d + Sn
0 0
pl 1 - po
log -
p0 1 - p1
1 - a
log
o log p l 1- po
1
pc - pl
1 - p
0
1 - p
1
[P]1-P1 o
lo
g
po 1 - pl
The average number of trials required to reach a decision in the
positive and negative directions, respectively, are given by
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0
P log (---)+ (1 - 9) lop ( 1 - 5 )
P1 ] P /
p log + (1 - p1) lop
1 _
P
0 P0/
(1 - c') log (
1 8 a) + a
log (
p0log~plr+ (1 - p0) log
Approved For Release 2000/08/10 : CIA-RDP96-00787R000300190001-0.