[-Appr For Release 2000/08/10 CIA-RDP96-00787ROO0300190001 -0 5 August 1980 Revised 2 April 1981 0 FEASIBILITY STUDY ON THE USE OF RV DETECTION TECHNIQUES TO DETERMINE LOCATION OF MILITARY TARGETS Prepared by: E. C. May, Ph.D. H. E. Puthoff, Ph.D. Radio Physics Laboratory 333 Ravenswood Ave, * Menio Park, CaMornia 94025 In ISOM d For RelaaseMOV=110: SCIAT-RUP96-00787RU008001 90001 -0 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 CONTENTS LIST OF ILLUSTRATIONS . . . . . . . . . . . . . . . . . . . . . I OBJECTI17E . . . . . . . . . . . . . . . . . . . . . . . . . II INTRODUCTION AND BACKGROUND . . . . . . . . . . . . . . . . 2 A. Location of Unknown Military Targets . . . . . . . . . 2 B. Remote Viewing (RV) as a Location Technology . . . . . 2 C. Conclusion . . . . . . . . . . . . . . . . . . . . . . 5 III METHOD OF APPROACH . . . . . . . . . . . . . . . . . . . . 6 A. Step 1-Microcomputer-Based Screenin.-' Training . . . . 6 1. Sequential Sampling Statistical Averaging Procedure . . . . . . . . . . . . . . . . . . . . 8 2. System Error . . . . . . . . . . . . . . . . . . 12 3. Test Data . . . . . . . . . . . . . . . . . . . . 13 4. Summar) .. . . . . . . . . . . . . . . . . . . . . 13 B. Step 2--Simulation Testing . . . . . . . . . . . . . . 15 C." Step 3--Demonstration-of-Feasibilit), Field Study. 15 IV PROPOSED PROGRAM . . . . . . . . . . . . . . . . . . . . . 17 REFERENCES . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 APPENDIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 ii Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 ILLUSTRATIONS 1 Computer Modeling Task . . . . . . . . . . . . . . . . . . 7 2 Decision Graph for site Selection . . . . . . . . . . . . . 10 3 Average Number of Trials n 1 to Screen Positive .. . . . . . 11 4 Decision Graphs for Site selections i3ased on the Data of Subject I (Table 1) Screening Study, Resulting in Twelve Consecutive Correct Selections . . . . . . . . . . . . . . 14 iii Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 I OBJECTIVE The purpose of this document is to provide an outline of a program to assess the feasibility of using RV detection techniques to determine the location of military targets of interest. Throughout this docume-nt the abbreviation RV refers to the term ''remote viewing," not to its other use as "re-entry vehicle,'' 1 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 II INTRODUCTION AND BACKGROUND A. Location of Unknown Military Tarp~ets A continuing requirement in military operations is the determination of the location of tactical and strategic military targets of interest whose positions are not known a priori. Examples range from the location of a command post in a tactical battlefield situation to the position of a submarine in a strategic problem. B. Remote Viewing (RV) as a Location Technology Of particular interest along the psychoener.-etic lines is a human information-accessinl- capability that we call "remote viewing" (RV). The RV phenomenon, under study at SRI International for the past nine years, pertains to the ability of certain individuals to access and describe, by means of mental processes, information blocked from ordinary perception by distance or shielding, and generally believed to be secure against such access. This has included the ability Qf subjects to view remote geographical locations given only geographical coordinates or a designated person on whom to tar.-et. The RV abilities of several subjects have been developed to the point where they can describe--often in great detail--geographical and technical material such as natural formations, roads, buildings, interior laboratory apparatus, and real-time activities. Such functioning has been examined both from the standpoint of U.S. use as an inielligence collection technique, and from the standpoint of threat analysis as to the vulnerability of U.S. systems and facilities. i-E In problems of the location type (which have not been addressed in any detail in former pro~~rams) the general prospect of a continuum of 2 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 possible locations can often be reduced to that of a set of discrete possi- bilities. This is because, for example, only a finite number of deployment sites of a weapons system are available, or because specifying one of a number of .-rid squares is sufficient to define location. If a location tack can be so defined (to be one of a discrete set of possibilities), then a detection method can be designed around one of the standard formats for RV testinlo', a statistical form of shell game which is a direct analog of the discrete location problem. One of the standard formats for RV testing is a computerized form of shell" game which is a direct analog of the military target location situa tion. The testinpl- procedure addresses the basic problem of choosing, by RV techniques, a "correct'' answer from among a number of possible alterna- tives. An example is provided by an electronically-automated screening study carried out by SRI consultant Charles Tart. Subjects were asked to determine which one of ten possible positions on a circular display had been designated as an active target by the electronic test device's random number generator. E From an unselected population of 2000 university students., parti ci pati ng- in a mass card screening program, seventy of the better subjects accepted an invitation to be further screened using the automated electronic testing system. Of these, ten were finally chosen to participate in a formal study involving 500 trials each. The results obtained with these ten subjects are shown in Table 1. It is seen that five of the ten Subjects scored significantly above chance, all in the range of 1.5-2.5 times chance expectation. The best subject averaged a 24.8", hit rate (-2.5 x chance) over the 500-trial sequence; the probability 28 of such a result or better occurring by chance is onlN 1) = 2 X 10- Furthermore, as good as those results are, the potential utility of such results can be further enhanced by the use of error-correcting statistical averagin1p, techniques. Such techniques have proven themselves 3 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Table I ELECTRONICALLY-AUTONIATED SCREENING STUM Probability of Obtainin~4 Hit Rate Such a Result bv Chance ub Ject (20' Expected)(one-ta i loci 1 24.81( 2 Y 10- 28 2 20.6~ 1 Y 10-14 3 16.21-f 2 x 10-6 4 16.0~1 4 x 10-6 5 15.6~1 2 Y 10-5 6 11.81-( nonsignificant 7 11 .4 r" nonsi gni f i cant 8 10. K" nonsigni f i cant 9 9.4~( nonsi gni f i cant 10 7.8r-: nonsignificant capable"of amplifying even small statistical advantages to arbitrarily- high-accuracy results. To cite an example, Czech researcher Dr. Milan Ryzl , a chemist with the Institute of Biolog~7 of the Czechoslovakian Academy of Science, carried out an experiment with a subject whose base performance level was that he was generally capable of generating better than - 60'~ hit rate targeting on sequences of random binary digits, or bits (0, 1) , where chance expectation was 50',,. For the purpose of showing the power of' psi enhancement by statistical averaging techniques., Ryzl chose as a task the acquisition, without error, of' a 50-digit random binary sequence. The effort took 19,350 calls, averaging 9 sec per call. The hit rate for individual calls was 61.9',, 11,978 hits and 7372 misses By means of repeated passes throup .7 gh tho 4 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Approved For Release 2000108110: CIA-RDP96-00787ROO0300190001 -0 sequence and an elaborate (though inefficient*) majority-vote protocol, the subject was able to identify with 1001/6 accuracy all 50 bits. The 15 probability that he did so by chance is only one in 10 C. Conclusion Thus, data already extant from RV detection experiments indicate that (a) one tar.-et from among a number can, with some statistical advantage, be determined by RV detection techniques, and (b) the accuracy of doing so can be amplified by statistical averaging techniques. These observations thus provide a sound basis upon which to estimate the feasibility of RV detection of randomly distributed military targets, and the protocols in use are essentially directly applicable in their present form. An increase in efficiency by a factor of about 20 could be expected on the basis of a statistical averaging procedure more optimum than that used in the experiment.i 5 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 I METHOD OF APPROACH With regard to determining the vulnerability of military targets to RV detection, an approach that recommends itself,is a gradient-scale three- step program involving (1) microcomputer-based screening/training, (2) simulation testing, and (3) demonstration-of-feasibility field study. Each of these are discussed below. A. Step 1--Microcomputer-Based Screening/Training The first step of the program would involve screening/training a population of volunteers using microcomputer-based modeling of the location problem. Basically, the individuals participating as remote viewers are asked, in repetitive trials, to determine which one of twenty possible locations (schematically represented as circles on a computer- driven graphics display) has been designated as the simulated military target1y the computer's random number generatoi,. The computer display is driven by an LSI-11 microcomputer which, on a trial-by-trial basis, generates a new random display of the circles (to circumvent bias on the part of the remote viewer due to previous choices). The individual enters his selections by button press on a hand device positioned over an X-Y grid (see Figure 1, where a one-in-ten case is shown), and the computer responds by giving immediate feedback as to the correct answer (to encouralge learning). As the trials progress, the selections are computer analyzed on line by a statistical averaging program, the output of which indicates whether one of the possibilities has been chosen statistically significantly more often than expected by c-ance. (In the later application phase essentially the same procedure is followed, with the circles internally 6 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 -4 FIGURE 1 COMPUTER MODELING TASK. The circles representing possible target locations are shown in the lower video monitor; a decision graph is shown on the upper monitor. The remote viewer's choice is entered by button press on hand device positioned over x-y grid. Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 keyed to actual target site possibilities. The procedure differs only in that trial-by-trial feedback would, of course, not be available). 1. Sequential Sampling Statistical Averaging Procedure An efficient statistical method for the screening/training process is provided by a sequential-sampling technique used in production- E line quality control. The sequential method gives a rule of procedure for making one of three decisions (with regard to each of the possible choices) following each trial, which consists of a remote viewer entering a selection: the accumulated selections have met a pre-established hit- rate criterion (decision positive); the accumulated selection do not exceed chance expectation (decision negative); continue trials (insufficient data to make a decision). The sequential sampling, procedure differs from !ixed-trial-length procedures in that the number of trials required to reach a decision is not fixed, but depends on the results accumulated with each trial. The principal advanta.-e of the sequential sampling procedure as comp~-ed with other methods is that, on the average, fewer trials per decision.-are required for an equivalent degree of reliability. To apply the sequential analysis procedure to screening training we must a priori define the hit rate we require to conclude that useful RV detection is taking place, and what statistical risks we are willing to accept for making an incorrect decision. To meet these criteria, sequential analysis requires the speci- fication of four parameters to determine from which of two distributions (chance or required-hit-rate) a data stream belon'-s. They are: p , the 0 fraction of selections of a particular tar,P'et expected in the chance condition (e.g., T) = 1/20 for the case under discussion); p I, the fraction of selections expected in the presence of a functioning RV capability (e.g. P, = 0.125 for a 2.5 x chance-expectation requirement , a value that might 8 Approved For Release 2000108110 : CIA-RDP96-00787ROO0300190001 -0 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 be chosen because of previous Performance in a successful one-in-twenty task); Ce, an a priori assigned acceptable error rate (e.g., Ci = 0.05) for concluding that accumulated selections of a particular choice derive from the p1 (RV) distribution when in fact they derive from the p (chance) distribution (Type I error); 6, an a priori assigned acceptable error rate (e.PI-., 6 = 0.05) for concluding that accumulated selections of a particular choice derive from the p (chance) distribution when in fact they derive 0 from the p M') distribution (Type II error). With the parameters thus specified, the sequential sampling procedure provides for construction of a decision graph of the type shown in Figure 2. The decision graph illustrates the rules of procedure for making one of the three possible decisions following each trial: continue test before making a decision (unshaded middle region in Figure 2); decision positive (upper shaded region in Figure 2); dec,ision negative (lower shaded area in Figure 2). The equations for the upper and lower decision lines are given in the Appendix. With the appropriate equations programmed into the microcomputer, the computer automaticallv records all data (trial number, target,response pair), and displays on the video graphics system progress on a target decision graph. A cumulative record of remote viewer selections is compiled by the computer until either the upper or lower decision line is reached, at which point a decision is made. Also given in the Appendix are the equations for the average number of trials to make decisions, positive or negative. A plot of the average number of trials to reach a positive decision for typical cases of interest is shown in Figure 3, where 5,, Uy, ~) error rates have been assumed. As an example, we see that for a 2.5 X expectation rate (k = 2.5) hitter, n 62 trials are required on the averape to reach a positive decision on a one-in-twenty tarl-et. 9 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Approved For Release 2000/08/10 CIA-RDP96-00787ROO0300190001 -0 co t 0 CL x LU Lr) L) x En -j L.J -j LLJ L/~ Lu LL z L) LL) LU D 0 < U- L) z 10 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 to qT 9t ADUVI ~O SNOI.L:)9-13S G31v-innnx)v Approved For Release 2000/08/10 CIA-RDP96-00787ROO0300190001 -0 104 103 z LU W a: U V) 1.7 102 LL LU z LU 10 1 k 1.2 k 1.5 k 2.0 k - 2.5 k - 3.0 0.0 0.1 0.2 0.3 PO FIGURE 3 AVERAGE NUMBER OF TRIALS F1 TO SCREEN POSITIVE po chance expectation I/N, where N is the number of alternatives. pl kxpo, where p, is the required hit rate and k is the associated strength parameter. Error rates a 0.05 are assumed. 11 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 2. System Error The overall system error is dependent on the type of mode employed in site Penetration attempts. (a) If the RV detection task is approached with a tentative choice having alread~7 been made (presumably by more conventional means), then the task of the remote viewer is to verify or reject the tentative decision as a backup test. In this mode, only a single decision graph is plotted in the target choice of interest. The probability of error due to chance (P e,c ) in this case - a, being given by the product of the probability of making a selection even though operating at chance, and the percentage of such selections that correspond to an incorrect decision: P , - ') a - e Y c = (' N (b) If the RV detection task is approached as a blind one-in-.N task (e.tg., one-in-20 task), the N decision graphs are plotted in parallel, one for each of the N target choices, as each selection is being made. In this case, to a good approximation the graphs can be treated in the chance condition as independent, and the probability of error due to chance (P ) - Nce. Specifically, it is given by the product of the probabilitN e,c of making at least one selection in the N praphs by chance (which is one minus the probability of making no selections), and the percentage of such selections that correspond to an incorrect decision: C'c N 1) [l For example, with N = 20, a Ir, individual-targlet error rate 0.01) leads to P = 0.17, or a confidence factor I - P 0.83; e,c C"c this provides - a 17-fold increase in odds over the one-in-twenty confi- dence factor expected by chance. 12 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 3. Test Data As a test of the above procedure applied to real. data, the data generated by Subject #1, Table 1, were processed by passing it through the sequential analysis statistical averaging program (500 trials, 24.8% hit rate on a one-in-ten task). With the parameters set to correspond to a twice-chance-expectation requirement and 5% Ot, ~) error rates, the results are as shown graphically in Figure 4: twelve correct selections, in a row, of one-in-ten targets were made in 452 trials. Although the data was gathered under the condition that the correct answers were stored in the computer during the runs, and therefore trial-by-trial feedback could be given as the random number generator stepped through its program, the conditions are nonetheless sufficiently similar to the projected task that the results can be taken as evidence that the proposed approach is sound. 4. Summary In the screening,'training programp participants would be screened trained-by carryin,_~ out the task described in this section, first with trial-by-trial feedback to encourage learning, and then without feedback to model properly an application study. In this initial phase the target for each run would be designated internally by the computer's random number generat02~. Carried out on a large-enough scale, the screening training program described in this section would provide realistic estimates of the percentage of population trainable in this task, and the levels of proficiency to which performance in this task could be developed. In a program designed to assess to its fullest the feasibility of locatin.- military targets by RV detection techniques, it is recommended that suffi- ciently large-scale screening to meet these requirements be considered. 13 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Approved For Release 2000/08/10 CIA-RDP96-00787ROO0300190001 -0 24 16 a: LL 8 z 0 U LU -j LU 16 D 0 16 8 0 0 SEQUENCE 12 0 40 80 0 40 80 120 TRIALS FIGURE 4 DECISION GRAPHS FOR SITE SELECTIONS BASED ON THE DATA OF SUBJECT 1 (TABLE 1) SCREENING STUDY, RESULTING IN TWELVE CONSECUTIVE CORRECT SELECTIONS. Sequential sampling parameters: po = 0.1, p, = 0.2, a0.05. 14 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Approved For Release 2000/08110: CIA-RDP96-00787ROO0300190001 -0 B. Step 2--Simulation Testing The participants who emerge from step I with successful performance profiles would then be asked to participate in Step 2. For this step, a model of an actual military situation with a random one-in-twenty designated target would be constructed. The subject's access to the mockup during experimental runs would be by way of video monitor, although secondary means such as maps or photographs might be utilized in later stages of the study if appropriate. To carry out the test, a participant (or participants) would be briefed as to the task and then be asked to proceed as in Step 1. The sequential sampling parameters in the microcomputer analysis program would be set in accordance with the performance profile established by the par- ticipant(s) in the Step 1 screening/training study. In Step 2 the mechanics of microcomputer recording and analysis of subject selections would be the same as in Step 1. Step 2 differs from Step 1, however, in that a participant's selection from the random circle display, internally keyed to numbered sites, cannot be internally compared to a recorded correct answer. The results generated by the participant(s) in the site selection procedure would then be tabulated and discussed with the sponsor. Should the results appear encouraging, then Step 3 would be engaged. C. Step 3--Demonstration-o--Feasibilit)- Field Study The final step in the three-step vulnerability assessment program would consist of a field-demonstration test involving,'e..g., locating'an actual tactical command post or an appropriate equivalent. Data would be taken using the successful remote viewers of' Step 2, both to determine the degree of correlation between performance on the tasks of Steps 2 and 3, and also to evaluate actual performance in the field study. 15 Approved For Release 2000108110: CIA-RDP96-00787ROO0300190001-0 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 The possibility of success in such a field study is buttressed by the fact that the procedures described here have been used by us success- fully in an exploratory program to determine the locations of hidden radioactive material. Followin.- a series of such tests, performance profiles for the individual remote viewers would be computed and the overall data set would be evaluated to provide an estimate as to the usefulness of RV techniques in locating military targets under operational-like conditions. 16 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 SGFOIA2 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 REFERENCES 1. H. E. Puthoff and R. Targ, "A Perceptual Channel for Information Transfer over Kilometer Distances: Historical Perspective and Recent Research," Proc. IEEE, Vol. 64, pp. 329-3.54 (March 1976), 2. H. E. Fluthoff and R. Targ, "Perceptual Augmentation Techniques Final Report, SRI Project 3183, Stanford Research Institute, Menlo Park, CA (December 1, 1975) 3. H. E. Puthoff, R. Targ, E. C. May and I. Swann, "Advanced Threat 11 Technique Assessment , Final Report, SRI Project 5309, SRI International, Menlo Park, CA (October 1978), 4. R. Targ,, H. E. Puthoff, B. S. Humphrey, and E. C. May, "Special Orientation Techniques Final Report, SRI Project 8465, SRI International, Menlo Park, CA (June 1980) 5. H. E. Puthoff, I. Swann, and G. Langford, "NIC Techniques Quarterly Progress Report, SRI Project 7560, SRI International, Menlo Park, CA (January 1980), 6. C. T. Tart, Learning to Use Extrasensory Perception, Univ. of Chicago Press (1976) 7. M. Ryzl, "A Model for Parapsycbological Communication,- J. Para-psN- cology, Vol. 30, pp. 18-31 (March 1966), 8. A. Wald, Sequential Analysis, Dover I>ublications, New York (1973), 18 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Appendix The equations for the upper and lower limit lines in the sequential sampling procedure are, respectively," Y, = d + Sn y = -d + Sn 0 0 where log d log 0 p P Cr log d log P, PC) p p 0 log 1 - p log ~ POI p The average number ol trials required to reach a decision in the positive and negative directions, respectively, are given bv 19 Approved For Release 2000/08/10 : CIA-RDP96-00787ROO0300190001 -0 Approved For Release 2000/08/10 CIA-RDP96-00787ROO0300190001 -0 - 0 log C)+ (1-0) log( 1 - 5) n P PI log -)+ O-Pl) log( P0 1 - P0/ 0 log + a log n --1cf) 0 P logi PI\+ P ) log 0 kPol 0 1 P0 20 Approved For Release 2000/08/10 CIA-RDP96-00787ROO0300190001 -0