im L 6 6 6 6 SG1J Approved For Release 2000/0$/K RIEEDP96-00788RO01 300240001-2 Apri 1 1981 DOD GRILL FLAME PROGRESS REPORT Prepared by: Presented at: Mid-Year GRILL FLAME Meeting Defense Intelligence Agency 30 April 1981 WARNING NOTICE - IntelUmee Sources and Methods Involved CLASSIFIED BY: DIA-DT REVIEW ON: 24 April 2001 SRI 1-8157 This document consists of 130 pages. Copy No. 5 SECRET Approved For Release 2000/08/07 : C I.X Kffp%J_jffMN Efffit PlIONAL8 Ap.proved For Release 20OO/Of&CAUDP96-00788 ROO 1300240001-2 DoD GRILL FLAME PROGRESS REPORT TABLE OF CONTENTS I STATUS OF PROGRAM (as of 1 April 1981) . . . . . . . . . . . 1 aw II PROJECT TASKS . . . . . . . . . . . . . . . . . . . . . . . . 27 III OPERATIONAL REMOTE VIEWING TASKS . . . . . . . . . . . . . . 69 IV INTELLIGENCE SUMMARY . . . . . . . . . . . . . . . . . . . . 77 V GRILL FLAME FINANCIAL STATEMENT . . . . . . . . . . . . . . . 81 ow VI FY182 PROPOSED PROGRAM . . . . . . . . . . . . . . . . . . . 83 APPENDIX I--GRILL FLAME BRIEFING, April 1980 . . . . . . . . . . . 86 APPENDIX II--A DATA BASE MANAGEMENT SYSTEM FOR OPERATIONAL REMOTE VIEWING . . . . . . . . . . . . . . . . . . . 91 APPENDIX III--COUNTERMEASURES/INTRUSION DETECTION . . . . . . . . 119 4w SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/06K BLIDP96-00788ROO1300240001-2 I STATUS OF PROGRAM Introduction Since 1972 the DoD and the Intelligence Community have provided financial support for psychoenergetics research. At various times, and in some instances at the same time, the Army, Navy, Air Force, CIA, and DIA have funded the work. A chart (Figure 1) shows a chronological listing of the sponsoring organizations, along with their associated budgets. The DoD now has a single joint contract with SRI. While this contract is the largest one and forms the basis for the psychoenergetics program, Army has retained funds for internal use and to explore other areas using additional contractors. This paper, however, will be restricted to the SRI work as it is the only one that has begun. At future dates, when data are available from other contracts, they will be included in progress reports. In this paper, I hope to answer the questions listed in Figure 2. Since the inception of this work to the present, funding largely has gone to SRI. SRI has performed the work as requested by the clients, has published a number of documents (Figure 3), and has provided the clients with data on many "close hold" operational targets. While doing this, SRI has also advanced the state-of-the-art in regards to its applications potential for the intelligence community. In terms of numbers,-9 major publications have been written, some 40 operational targets have been examined in detail, and over 300 experiments have been conducted. This was done over a period of nine years at an average funding level of about 1 SECRET aw Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 I.. I U t a t a U L.. t t a a t Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 FIGURE 1 DOD/INTELLIGENCE PSYCHOENERGETICS PROGRAM FUNDING (SRI) BUDGET DATE ORGANIZATION THOUSANDS OF $ 1971-75 CIA 195 1975-76 NAVELEX 74 1976-79 FTD, WRIGHT-PATTERSON AFB 300 tA m 1977-80 MIA, REDSTONE ARSENAL 281 m n w n M 1978-80 AMSAA, ABERDEEN PROVING GROUND 230 m m m 1978-80 DIA 228 SG1A 1979-80 1 NSCOM 75 (Syr' i A ~u_) 1980-PRESENT DIA 300 JOINT PROGRAM 1980-PRESENT INSCOM 120 (projected) Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/08/07 CIA-RDP96-00788ROO1300240001-2 FIGURE 2 QUESTIONS 1. WHY ARE WE DOING THIS RESEARCH? 2. WHAT HAVE WE GOTTEN FOR OUR MONEY? m 3. WAS IT WORTH THE MONEY? m m 4. HOW AND WHERE SHOULD THE WORK BE m CONTINUED? 5. WHICH AREAS ARE MOST LIKELY TO YIELD BENEFITS FOR THE INTELLIGENCE COMMUNITY? Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 so t a t I t 1. t. U a I t a 1. a t a Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 FIGURE 3 MAJOR SRI REPORTS TITLE DATE "PERCEPTUAL AUGMENTATION TECHNIQUES" DECEMBER 1975 FINAL REPORT TO CIA, SECRET "A PERCEPTUAL CHANNEL FOR INFORMATION TRANSFER MARCH 1976 PROC. IEEE, UNCLASSIFIED "ADVANCED THREAT TECHNIQUE ASSESSMENT" JULY 1977 FINAL REPORT TO FTD, SECRET m "SENSING OF REMOTE EM SOURCES" APRIL 1978 r) FINAL REPORT TO NAVELEX, UNCLASSIFIED M m "PSYCHOENERGETIC RESEARCH: SUGGESTED APPROACHES" MAY 1978 WHITE PAPER FOR GRILL FLAME COMMITTEE, UNCLASSIFIED "ADVANCED THREAT TECHNIQUE ASSESSMENT" OCTOBER 1978 FINAL REPORT TO FTD, SECRET tA m M m -4 Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 I t 1 1. t I t U L t. t Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 FIGURE 3 MAJOR SRI REPORTS (concluded) TITLE m (1) M m SG1A DATE "NOVEL INTELLIGENCE COLLECTION TECHNIQUES" JANUARY 1980 PROGRESS REPORT TO DIA, SECRET "SPECIAL ORIENTATION TECHNIQUES" JUNE 1980 FINAL REPORT TO INSCOM, SECRET "ELECTRONIC SYSTEM PERTURBATION TECHNIQUES" SEPTEMBER 1980 FINAL REPORT TO MIA, SECRET "EXPERIMENTAL PSI RESEARCH: IMPLICATIONS FOR PHYSICS" JANUARY 1981 AAAS SELECTED SYMPOSIUM 57 Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 m m ON Approved For Release 2000/OAECR~EffDP96-00788ROO1300240001-2 $200K per/yr. while these numbers are impressive there are several other elements that should be examined to gauge the value of what we have received by funding work in psychoenergetics. First, we can look at what we knew about this field in 1972 when DoD/Intelligence involvement was initiated and what we now know about the field. Program Gains When begun, relatively little was known in this field with regard to those factors important for military and intelligence applications. SRI's program was, from the start, directed toward filling in this gap. In the CIA program it was established that remote viewing of geo- graphical and technical features of target sites, such as natural formations, roads, buildings, and interior apparatus, does take place. It was further established that the descriptive aspects (shape, form, color, material) are described better than analytical concepts (function, name), as occurs in subliminal perception in general . Application to operational targets SG1 I indicated useful information obtainable. Furthermore, it was found that sites could be accessed either on the basis of targeting on a cooperative person at the site, or by geographical coordinates. Finally, it was determined by extensive testing that standard medical and psychological profiling was not useful in screening for ability in the RV area. (See Figure 4 for a tabulation of these and following findings of interest.) In the NAVELEX program SRI established that physiological (EEG) correlates to RV inputs can be found, although the EEG effect examined was weak (statistical). SG1A SRI efforts in the FTD program extended RV capabilities into real-time activities Trans- continental RV tests showed little if any degradation with distance. Resolution down to mm was established using small objects in film cannisters 6 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 a a t t- I.. I.- t. 1.. 9- t a t t I Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 FIGURE 4 GAINS AND COSTS CIA PROGRAM ($195K) ~ RV OF GEOGRAPHICAL FEATURES AND TECHNICAL INFORMATION ESTABLISHED ~ DESCRIPTIVE ASPECTS (SHAPE, FORM, MATERIAL) BETTER DESCRIBED THAN ANALYTIC CONCEPTS (FUNCTION, NAME) OPERATIONALLY USEFUL INFORMATION OBTAINABLE 0 TARGET ACCESSIBLE BY GEOGRAPHICAL COORDINATES OR PERSON AT SITE 0 STANDARD MEDICAUPSYCHOLOGICAL SCREENING OF LITTLE USE m m r) NAVELEX PROGRAM ($74K) (0) ;V -4 M m PHYSIOLOGICAL CORRELATES TO RV EXIST, THOUGH WEAK (STATISTICAL) m 4 -4 SG1A ACCURACY AND RESOLUTION NOT A SENSITIVE FUNCTION OF DISTANCE SPATIAL RESOLUTION DOWN TO MILLIMETERS ESTABLISHED ELECTRICAL SHIELDING NOT EFFECTIVE IN BLOCKING RV (SUB EXPERIMENT) ALPHABET, SMALL SYMBOL, RESULTS ABOVE CHANCE, BUT NOT APPROACHING OPERATIONAL UTILITY Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 FTD PROGRAM ($300K) t t.. - I t a t a a a t. t t t Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 FIGURE 4 GAINS AND COSTS (continued) MIA PROGRAM ($281K) VERIFIED INTERACTION WITH SENSITIVE ELECTRONIC EQUIPMENT CAN RESULT IN SIGNIFICANT PERTURBATIONS FROM EXPECTED BEHAVIOR AMSAA PROGRAM ($230K) m 0 SITE DESCRIPTIONS OF HIGHER QUALITY THAN LOCATION/TRACKING INFORMATION m rl rl M 00 0 REPETITIVE (DAILY) TARGETING ON FAMILIAR SITES (HUNTER-LIGGETT FIELD M m EXERCISES) LESS SUCCESSFUL THAN STRATEGIC TARGETING m DIA PROGRAM ($228K) DEVELOPMENT OF TECHNIQUES TO INCREASE RELIABILITY BY MINIMIZING "NOISE" (OVERLAYS) EXAMPLES OF HIGH-QUALITY OPERATIONAL RV DEVELOPMENT OF RELIABILITY-IMPROVEMENT PROGRAM Approved For Release 2000/08/07 : CIA-RDPJA-00788ROO1300240001-2 Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 FIGURE 4 GAINS AND COSTS (concluded) SG1A INSCOM ($75K) m to 0 SUCCESSFUL LOCAL-TARGET RV TECHNOLOGY TRANSFER TO 6 INSCOM PERSONNEL m 0 SUGGESTIVE SUPPORT FOR SUBJECTIVE SRI SCREENING PROCEDURE c- (?,41 1-7 P I S C, v". Ce S 4.rCWA7T 4.r lvc4 It ? Lett-1-C"j ~e_ruhl,r P r m m Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/066C REIDP96-00788ROO1300240001-2 as targets. Use of submarine/seawater shielding indicated that ordinary electrical shielding is not effective in blocking RV. Finally, extensive testing with alphabet (or other known symbol) targets found such analytical M functioning statistically above chance, but not yet approaching useful levels for operational purposes. In the MIA program, taken as a first step toward determining whether sensitive equipment can be perturbed by an act of the will, evidence was lei obtained that individuals can interact with electronic noise and radio- active decay sources to produce statistically significant deviations from chance expectation. This program in essence verified, under extremely pristine computer-automated experimental conditions, a large data base reported in the literature. Daily field tests involving targeting on Hunter-Liggett exercises in an AMSAA study showed lower rates of success than found in strategic ild targeting, indicating repetitive targeting on familiar sites more difficult. When successful, an internal gradation existed wherein site descriptions mi were of higher quality than site location/tracking. The primary objective of the DIA program was to provide a basis for assessing Soviet threat. The particular efforts were directed toward increasing the reliability of RV functioning, and applying RV techniques to operational requirements. Four sources of "noise" in RV functioning were delineated (analytical, associational, monitor and environmental. overlays), and procedures were designed to minimize their negative effects. These efforts resulted in a number of examples of high quality quick-reaction SG1A operational RV, and the development of a reliability-improvement program. 10 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/066C RITDP96-00788ROO1300240001-2 MW In the INSCOM program, SRI was provided a first opportunity to transfer OW RV technology outside of SRI. Six INSCOM personnel were exposed to local target RV under standard SRI protocols for this procedure, with the result aw that 4 of the 6 independently produced significant results. Furthermore, the distribution of the quality of results (as determined by standard blind-matching techniques) reproduced earlier SRI-published results, therefore providing a complete replication of our earlier studies. Since the individuals participating were chosen partially on the basis of an SRI subjective screening procedure, indirect support for this procedure was provided. SECRET SG1 B Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 SG1 B Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Next 2 Page(s) In Document Exempt Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Program The first part of this paper/briefing has clearly been.historical in nature and was only presented to provide a firm basis for discussions on the joint program. To look at the current program it will be illustrative to compare it to the concept briefed in April 1980. 'Me two have some very 15 SECRET 0 Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 SG1BApproved For Release 2000/0§/KRIK-IDP96-00788ROO1300240001-2 Approved For Release 2000/O85X(9X-XDP96-OO788 ROO 1300240001-2 aw fundamental differences. The most significant difference is that the one briefed in April was envisioned as a union of the sponsors, whereas what has developed is a confederacy. This is best shown by the funding and monitorship of the program. But, I hasten to add that no value judgements are intended. This report is meant only to clarify what exists and not to suggest what should or shouldn't exist. In addition, the Air Force was considered as part of the effort from April to mid January. Now it is certain that they will not be connected in any fashion to the project. This has caused some major perturbations in the program. Specifically, the DIA had to seek additional funds, and some significant redirection within the project has been required. Funding In regard to funding, the April 1980 briefing proposed that the sponsors pool their funds, and then as a group develop the specific task that would constitute a statement of work. The major portion of these tasks would then be contracted to SRI but with provisions to use other contractors as needed [see Figure 8(a)]. It was assumed that the tasks developed by the Grill Flame Committee would be responsive to Army and DIA requirements. What has developed [Figure 8(b)], however, is -a --- aystem where each participant places his funds in a pool but earmarks them for specific tasks. Each participant's tasks are then united with its funds and the program is the sum of these combined but compartmentalized tasks. --ID-,ma y regards, thisis a better way to fund the program. Data Flow For data flow the following was considered the most appropriate [Figure 9(a)]. In this system the sponsors lose their identity early in 16 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/06K gfIDP96-00788ROO1300240001-2 m aw FUNDS IN mi FIGURE 8(a) GRILL FILAME FUNDING REQUIREMENTS 17 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/015fCRf TDP96-00788RO01 300240001-2 FUNDS $ POOL TASK POOL REQUIREMENTS FIGURE 8(b) GRILL FLAME FUNDING 18 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/06K. &FIDP96-00788ROO1300240001-2 REQUIREMENTS DoD GRILL FLAME PROGRAM S.O.W. CONTRACTOR RESEARCH FIGURE 9(a) DATA FLOW PLAN 19 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000MMIC' RETZDP96-00788RO01 300240001-2 the flow and, rather than a two party program, there would be simply a DoD program. This would allow the participants and the monitor to make instant adjustments and changes in the program as they are deemed appropriate. What we actually have, however, is shown in Figure 9(b). The principle difference is that the sponsors retain their identity throughout the data flow and function as a union only in the sharing of data developed by the contractors. Monitoring Again, as initially proposed, the monitor would be watching over a single DoD program and reporting to the participants [Figure 10(a)]. He 'J-r would serve to interpret the project to the researchers and report the findings to the participants. As such, there would be no Army, or DIA 11~ * JK programs, only a DoD program. What exists at the present J- is shown in " )p e ' - ~ ~ . Again each organization maintains its identity throughout Figure 10(b) the cycle with the results of the research being shared at the end of the cycle. The monitor then in effect monitors an Army program and a DIA program. Now that we have looked at the program it would be useful to examine the project in terms of the work thus far completed (Figure 11). The DIA portion of the contract is being used to develop and evaluate a procedure that could result in much greater accuracy and reliability of r emote viewing. In addition DIA funds are being used to assist us in evaluating foreign research. to explore the development of an automated data base management system, and to look at countermeasures. Details of these projects are provided in Section II. Under the Army portion of the contract there are two projects, audio analysis and targeting. As Army funds have not yet arrived at SRI, work has not yet begun in these areas. 7a~~ t4o WO~'-K- \j"- "r ~9- lo t.) 20 SECRET 'VIJ 0 44. Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/08WCAkE-JDP96-00788R001 300240001-2 REQUIREMENTS DIA GRILL FLAME PROGRAM I ARIVId DIA S.O.W. IF T ARMY I DIA DIA CONTRACT CONTRACT A T C MONITOR MONITOR 0 R CONTRACTED RESEARCH FIGURE 9(b) DATA FLOW ACTUAL 21 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/089CRALP96-00788RO01 300240001-2 ARMY REPORT TOI DIA ~ REQUIREMENTS 0 EXPERIMENTS ~ OPERATIONAL TARGETS REPORT RESEARCH RESULTS IREPORT TO GRILL ONITOR FLAME jDORE SPONSORS REPORT PROGRAM INTERPRETED IF SRI FIGURE 10(a) CONTRACT MONITOR--PROPOSED 22 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/0 8/07 CIA-RDP96-00788ROO1300240001-2 rA Low FEW Approved For Relea e 200VO /~F: CP~-RPFt96a-WZ84M1 00240001-2 A CL: Approved For Release 2000/49-tc 99-IDP96-00788RO01 300240001-2 fjw ARMY REQUIREMENTS EXPERIMENTS OP TARGETS we DIA Ak IF DIA REQUIREMENTS EXPERIMENTS OP TARGETS KARM~Yl ~I ~A MONITOR 1 rARMY ~ ~A SRI FIGURE 10(b) CONTRACT MONITOR--ACTUAL 23 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 -- 0% r-1-^ m I" w no Approved For Release 2000. %#%WMd %0 W4%7VtDP96-00788R001 300240001-2 SRI CONTRACT F ARMY DIA 0 AUDIO ANALYSIS 0 RELIABILITY OF RV/OP TARGETS 0 TARGETING 0 INTELL ASSESSMENT 0 DBM FEASIBILITY 0 COUNTERMEASURES FIGURE 11 CURRENT PROGRAM 24 r% ro or 11%00 a Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 &ft W. 10% Approved For Release 2000/00WC. MR-RDP96-00788RO01 300240001-2 so Overall, efforts are being put forth to determine how and if this so science can provide data that is useful to the intelligence community. At this point, I would offer that it can be a very useful tool. The areas of potential utilization are intelligence collection, evaluation of foreign work, data base management, investigating countermeasures, and efforts to improve reliability and accuracy. Potential intelligence applications of remote perturbation, or PK, have also been noted for the field of intrusion detection. Further pursuance of such projects is certainly warranted. The current program for developing psychoenergetics technology and applying it to intelligence needs has many of the elements sought, but some of the more critical ones failed to materialize. Some of them have already harmed the program while others won't be felt until later in the year. The original goal was to place enough money at SRI by 1 October 1980, to permit unencumbered work for one year. This was to have been the be- ginning of a three year project to provide some security for the researchers. As of today, all of the FY'81 money has not yet reached SRI. Also, the program was put forth as a one-year effort. These two problems have already seriously cut into the project and could result in not reaching some of our goals and expectations. The program has evolved from what was con- ceived in April 1980 to its current structure. The purpose of this paper is to insure that all interested parties have a current and correct view of the project's structure and its functions in terms of goals and ex- pectations. To answer the initial questions only two remain. They are where aw and with whom the work should be done. I have been on-site at SRI for eight months. -Being able to c-losely-observe their work greatly reinforces no my belief that any major (~ fort in the psychoenergetics area must include SRI as a major player. U ck_k~ ~~ MW VkA,~Q_VL_ 25 VN4A 0% 11 #94 r% rM qr ~rv k4 Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Again, as in April 80, 1 ask the sponsors to either provide enough funds in time to meet a 1 October start date or stop the program at the conclusion of this fiscal year. We are wasting both our time in managing this program and our money in funding it at the reduced level. I recommend that for FY'82 a sum of $600K be allocated for this area. Some $500K to SRI and $100K to other organizations. Thank you That concludes my portion of the program -4 Hal 26 Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/0591C 8lUDP96-00788R001 300240001-2 ON II PROJECT TASKS The tasks for FY'81 are: DIA ~ Evaluation and Reliability of RV/Op Targets ~ Intelligence Assessment ~ Data Base Management Feasibility ~ Countermeasures wd Army go 0 Audio Analysis 0 Targeting ow Project task sheets describing these projects are included here. aw Outlined are project descriptions, goods, sponsor expectations and current status. go 27 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 SGFOIA2 Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Next 2 Page(s) In Document Exempt Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/06K BEIDP96-00788ROO1300240001-2 Attachment #1 Statement of Sponsor's Expectation 1. Improve, through practice, reliability of remote viewing. the 2. Work with selected individualsto gain better and more reliable data from remote viewing sessions. 3. Continue research on any of remote viewing that offers promise facet of being improved by training. 4. Work toward the developmenta training program that will accommodate of future DoD needs. Eli 31 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000106K RJUDP96-00788 ROO 1300240001-2 Attachment #2 1. Verbal Description of Project SRI International is tasked with investigating a training procedure =i developed by an SRI remote viewer consultant, Ingo Swann. The procedure focusses on improving reliability of remote viewing by controlling those factors that tend to introduce noise into the RV product. The procedure is based on the observation that, with the application of a "stimulus" (e.g., the reading of a coordinate) there appears to be a momentary burst of "signal" that enters into awareness for a few seconds and then fades away. It is at this point that imagination appears to be triggered to fill in the void, producing noise due to associational and analytical overlays. The procedure designed to handle the above noise problem involves repeated coordinate presentation and quick-reaction response on the part of the remote viewers to minimize imaginative overlays, the use of a specially-designed acoustic-tiled featureless room with homogeneous coloring to minimize environmental overlay, and the adoption of a limited monitor role behavior to minimize monitor overlay. The training proceeds through a series of six stages of proficiency. These are outlined in the following table. Stage Example (1) Recognition and decoding of Land surrounded by water, an island. major gestalts. (2) Achieving sensory contact Humid sensation, tropical feeling. with target. (3) Experiencing motion and Rising up, a panoramic view. mobility within target. (4) Recognition and decoding of Mountains on the island, a small minor signals while sustaining port city on the water's edge. major gestalts. 32 SECRET NO Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 a* Approved For Release 2000/089~81-696-00788 ROO 1300240001-2 ad Stage Example (5) Decoding special characteristics Large areas devoted to agriculture. of target. (6) Analytical recognition and Some tourism, agriculture devoted decoding of significant aspects primarily to sugar cane, main of the target. island in Fiji Islands. so Knowledge of the above multistage process of target acquisition appears also to provide a predictive function, in that apparent data that does not 41W emerge in this order tends to have a higher percentage of overlay. A schedule has been established whereby training will take place, IM generally, during three-week periods alternated by three-week breaks. During the training periods the trainees (three in number) will devote full Aw attention to training matters. During the inactive periods the trainees will be available to target against operational targets and to participate Aw in other experiments, provided they do not interfere with the training. Operational targets will be done throughout the year, and the success dMd evaluated to assess the value of the training program. In support of the training program, the training evaluation team is tasked with providing a pool of several hundred target location packages, including feedback. To meet this requirement, National Geographic and other target materials are used to generate a list of sites whose coordinates are obtained with the aid of The Times Atlas of the World, Comprehensive Edition (NY Times Book Co.). These are then provided on an as-needed basis to the training program. A series of evaluation sheets are under development which are to be used as an evaluation tool. A sample first-generation evaluation package (for use in evaluating RV descriptions of large-scale facilities) is attached. 33 MM SECRET UM Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/08%~~gA~~DP96-00788ROO1300240001-2 Kw A computerized data base management system for storing and manipulating am data is to be brought to the feasibility-test stage. The purpose of such a system is to provide a format in which accumulate data can be examined in an integrated fashion, hypotheses developed, trends noted, and so forth. 2. Summary of Completed Work Md An extensive target pool has been constructed, including feedback packages, from National Geographic, travel brochure and other materials. In addition, the target materials have been sorted and cataloged with regard to various parameters (cultural, architectural, geological, etc.) which may be of particular significance at certain levels of training. Two intensive training periods have been carried out to date: 20 October through 7 November, and 24 November through 12 December. During these training periods both theory and practice have been covered with remote viewers #002, #009, #131, and #504. The practice sessions consist of extensive targeting on sites around the world by coordinate remote viewing (CRV), with feedback being given on the basis of material available from National Geographic magazines. Both the program leader (Puthoff) SG1J and DIA COTR participate in the theory class and act as monitors for several of the RV sessions in order to monitor the progress of the Ltf IC training program. Tens of sites have been targeted with each remote viewer during the training periods. Although not yet formally evaluated, it is so clear to the program leader and COTR that the results show improvement over time as to accuracy and reliability. In an effort to generate data for objective evaluation based on applications, remote viewers have been targeted on nine operational sites of interest to DIA since the initiation of the training program. Evaluation go sheets, forwarded to the analysts with the data packages, will provide the basis for objective evaluation of the RV products. 34 MW SECRET go Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/OfJK- ME-i[DP96-00788ROO1300240001-2 3. Current Status Training through Stage 3 (motion and mobility within the target) of the Swann technique has been completed. Evaluation of the results of the training RV sessions is underway. The operational task data package have been submitted to DIA for evaluation. 4. Experiments Now in Progress and Those Planned for the Next Three Months Continuing target preparation will be pursued to provide a variety of targets of various characteristics to meet the needs of the training program. As analyst reports are returned, these will be deposited into the data base system for storage and later handling. Some further exploration of the advantages and limitations of the computerized data base management system will be pursued as priorities allow. The training will continue at the Menlo Park location, beginning with Stage 4. During the remaining training period, an increased supply of operational targets will be provided to establish a data base upon which to evaluate progress in the training program. 35 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 SGFOIA2 Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Next 2 Page(s) In Document Exempt Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/OFYE-C. INIMP96-00788RO01 300240001-2 Attachment #1 Statement of Sponsor's Expectation The following statements comprise the sponsor's expectations with W regard to the intelligence assessment project: (1) Evaluate threat potential of foreign remote viewing - type investigations. (2) Simulate experimental results for which there is data WM to assess validity of the foreign research. (3) Assess military application potential of the foreign aw research (or claims) particularly where a threat to U.S. security is possible. (4) Assess feasibility of the most significant applications Od and evaluate limitations. so 39 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 SG1A Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Next 4 Page(s) In Document Exempt Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 OOIJICRII Approved For Release 20 107 : CIA-RDP96-00788ROO1300240001-2 no Ow Attachment #1 Statement of Sponsor's Expectation MW Develop concepts and materiel to determine if RV data base can be computerized for easy access and manipulation. 10i Ow ow 45 SECRET aw Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/05b~g-IDP96-00788ROO1300240001-2 am 1. Short Verbal Description Attachment #2 SRI International is tasked with developing a data base management system (DBMS) that is applicable both to operational RV data and to RV "Ni target management. A DBMS is a stand-alone computer program that allows a user to design easily a management tool. The resulting system consists of English language instructions that are tailored to the particular application. While it is possible to ascertain interesting trends by casual examination of the raw data transcripts, this type of informal inspection does not easily provide detailed, multi-variable analysis. A DBMS will optimize further collection assignments, and enhance proper utilization of RVer resources. In an operational RV DBMS application, client analysts will complete assessment sheets similar to the prototype shown in Table 1. Then, a data entry person will enter this information into the computer in an aw identical format. A program manager will then be able to access this data and to view it from a wide variety of different perspectives, by means of sorting and logical searching routines. 46 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 I t 1 1. U 4,,.L,.:: 1a0AMpIAz--oLTMAy EVAlba-ilONtSHEET ku-) U.- t. . ..... I t I.. a (U) For the summary evaluation, please check the following boxes as to the accuracy of the submitted material. ACCURACY M Site Contact > , > Little . Not with M CorrespondenceMixed ResultsGood Excellent Unknown Applicable0 0 < __4 < 0 1 2 3 CD (D CL CL (S) Geographical locale descrip- -n n 0 0 tion (terrain, water, etc.) F-I ED E-1 El F-I ED ;a (S) Large-scale manmade elements (D (D (cities buildings silos F 9 1 5P - . 1 0 El ED F~ railroad lines, E docks (a ., CD airfields, etc.) M M (S) Small-scale marmade elements cD CD CD CD (antennas computers, tanks 0 CD CD .7 J D missiles, CD offices, etc.) CD 00 -0-0 General target ambience (re- CD (S) CD -4 4 search, production, adminis- tration, storage, troop move- El 0 0 0 ments., naval activity, air > activity, weapons testing, etc.) 0 0 (S) Relevant specific activities U (nuclear testing, missile - firing, CBW storage, ELINT ED F 6 1 6 monitoring, etc.) CD CD -4 4 (S) Personality information 00 00 00 00 (physical descriptions actions responsibilities CD 9 ED Y CD . CD CD plans, etc.) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Cr CD Cannot de- CD CD be K3 (S) verall utility NoneF___1 arginal seful F__j ery at this Useful terminedtime :1 P6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CD - - - - - - - - - - - - - - - - - - CDP - CD CD CD * (U) Definitions for the accuracy scale: 0 - Little correspondence . Self explanatory. . . . . I - Site contact with . . . Mixture of of the rmer to . . . . correct and fo incorrect elements,, but enough M mixed results indicate source the target has probably site. accessed 2 - Good . . . . . . . . . . Good correspondence correct . . . with several information. elements matching, but some in 3 - Excellent . . . . . . . Good correspondence unique matchableelementsand relatively M . . . . with unambiguous little incorrect informatiou. M __4 Approved For Release 2000/05WULP96-00788 ROO 1300240001-2 2. Summary of Completed Work We have constructed two demonstration data bases to illustrate both the RV assessment and the target management applications. Using an existing (although limited) DBMS, we have constructed a data base con- sisting of 100 simulated RV experiments, all of which have been judged using the sample assessment sheet (Table 1). The data base consists of 4 RVers with 25 viowings each and was optimally designed to demonstrate the features of a DBMS. Table 2 shows an example of a summary report which is easily generated in real time. The column headings are the 7 categories taken from the assessment form. Under each category the RVers are listed in ascending order of assessment averaged over all viewings to date for that category. For example, we note that RVer 007 is least successful at obtaining information about the geography of a site; yet, when everything is considered, 007 has the best overall utility. This and similar infor- mation might have been overlooked with manual inspection. The row below the dashed lines contains the across-viewer averages, which can be con- sidered as the "facility" assessment, for each category. For example, the represented facility does best on geography elements and second best when targeted against activity at the remote site. As an example of the target management application, we have used a Mi DBMS to organize and manage a growing number of National Geographic training targets (375 as of this report). Our training effort currently im involves 4 RVers, 6 interviewers, 4 target preparers and numerous target selection criteria. With this level of complexity and a growing number of aw targets, a DBMS was mandatory to avoid duplication and to provide target statistics. As an example of the DBMS output, Tables 3(a) and 3(b) show a small portion of the existing data. The targets were selected solely on the basis of their use as calibrations for operational RV sessions. They are 48 SECRET Nei Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 t L . L t t 9- a L... t. t- > Table 2 0 RESOURCEASSESSMENT SUMMARY CL AS OF APR 81 - 23 19 n 0 X GEOGRAPHY ELE MENTSELEMENTSAMBIENCE ACTIVITY PERSONNEL UTILITY Ls SS cn m ID AVE. ID AVE. ID AVE. ID AVE. ID AVE.ID AVE. ID AVE. 0 0 tA 007 1.39 712 1.15 007 0.71712 0.95 712 1.14007 0.53 T12 0.55 0 m 126 1.44 126 1.33 712 0.73126 1.50 126 1.62531 1.21 531 1.38 0 00 531 1.59 531 1.57 531 1.31531 1.75 531 1.75712 1.56 126 1.55 5, 01 0 M 712 2.63 007 2.09 126 1.56007 1.81 007 1.86126 2.00 007 2.63 4 ---- ---- ---- ---- ---- ---- ---- m 0 > 1.76 1.53 1.08 1.50 1.59 1.32 1.53 ~u 0 TOTAL COUNT 4 a to 0') 4 00 00 X Approved For Release TABLE 3(a) DATE TIME LATITUDE LONGITUDE d m s d m s 15FEB1980 1021 42 34 00N 08 4400 E 3 MAR1980 0910 11 26 00S 53 0400 W 3 MAR1980 0917 14 00 00N 121 0000 E 3 MAR1980 1000 12 30 00N 70 0000 W 1 JUL1980 0900 21 38 00N 157 0400 W 1 JUL1980 0952 31 30 00N 35 3000 E 2 OCT1980 0820 18 29 00N 66 o8oo w 2 OCT1980 0900 58 12 00N 06 2300 W 2 APR1981 0905 34 40 00S 58 3000 W 2 APR1981 0945 45 30 00S 165 3000 E 3 APR1981 0807 22 30 00N 88 2000 E 3 APR1981 0815 51 13 00N 04 2500 E 3 APR1981 0840 41 02 00N 28 5700 E 3 APR1981 0920 39 44 00N 44 2300 E 3 APR1981 1010 35 09 00N 32 4700 E 3 APR1981 1015 41 50 00N 71 2800 W 6 APR1981 0817 00 14 00S 78 3000 W 6 APR1981 o824 39 18 00N 76 3800 W 6 APR1981 0827 36 36 00N 83 4000 W 6 APR1981 0835 00 19 00N 32 3500 E 6 APR1981 0845 37 37 00N 79 3300 W 6 APR1981 0930 13 32 00S 71 5700 W 6 APR1981 0936 28 59 30N 13 4050 W 6 APR1981 0945 51 29 00N 00 38oo w 7 APR1981 0940 29 25 00N 98 3000 W 8 APR1981 0836 20 19 00N 103 1000 W 8 APR1981 0956 33 39 00S 78 5800 W 8 APR1981 1116 51 51 00N 01 2100 W 8 APR1981 1119 60 00 00N 152 0000 W 9 APR1981 0845 03 02 00S 37 2000 E 9 APR1981 0923 38 22 00N 110 2100 W u] 0 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 TRAINING TARGET DATA AS OF 23 APR 1981 TARGET LOCATION MONITOR CALVI CAMPO DE DIAUARUM LAKE TAAL, LUZON ARUBA ISLAND OAHU DEAD SEA SAN JUAN STORNOWAY LEWIS IS. BUENOS AIRES DUSKY SOUND CALCUTTA ANTWERP ISTANBUL MT. ARARAT VOUNI PROVIDENCE QUITO BALTIMORE CUMBERLAND GAP KAMPALA NATURAL BRIDGE Cuzco MONTANA DEL FUEGO WINDSOR SAN ANTONIO CHAPALA LAKE, ROBINSON CRUSOE IS. BLENHEIM PALACE COOK INLET MT. KILIMANJARO CANYONLANDS PARK CORSICA BRAZIL PHILLIPINES LESSER ANTILLES HI, USA ISRAEL/JORDAN SG1J PUERTO RICO SCOTLAND ARGENTINA NEW ZEALAND WEST BENGAL, INDIA BELGIUM TURKEY TURKEY SG1J CYPRUS RI, USA ECUADOR MD, USA KY, TN, VA, USA UGANDA VA, USA PERU LANZAROTE CANARY IS. BERKS, ENGLAND TX, USA MEXICO JUAN FERNANDEZ IS. OXON, ENGLAND AK, USA TANZANIA UT, USA PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF PUTHOFF SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 SEtRET'- CLASS PREPARER C B B C C C C C C B C C C B B C C B B B B B B B B B B B B C B UKN UKN UKN UKN UKN UKN PUTHOFF UKN HARARY HARARY HARARY HARARY HARARY HARARY HARARY HARARY HARARY HARARY HARARY HARARY HARARY SWANN SWANN SWANN HARARY SWANN UKN SWANN SWANN HUMPHREY SG1J t I I t a . I t t - U a t. Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 TABLE 3 (b) TRAINING TARGET DATA AS OF 23 APR 1981 DATE TIME LATITUDE LONGITUDE TARGET LOCATION MONITOR d m s d m s SG1J 3 APR 1981 0815 51 1300 N 04 25 00E ANTWERP BELGIUM 3 MAR 1980 1000 12 3000 N 70 00 00W ARUBA ISLAND LESSER ANTILLES PUTHOFF 6 APR 1981 0824 39 1800 N 76 38 00W BALTIMORE MD, USA PUTHOFF 8 APR 1981 1116 51 5100 N 01 21 00W BLENHEIM PALACE OXON, ENGLAND PUTHOFF 2 APR 1981 0905 34 4000 S 58 30 00W BUENOS AIRES ARGENTINA PUTHOFF 3 APR 1981 0807 22 3000 N 88 20 00E CALCUTTA WEST BENGAL, INDIA 15FEB 1980 1021 42 3400 N 08 44 00E CALVI CORSICA PUTHOFF 3 MAR 1980 0910 11 2600 S 53 04 00W CA14PO DE DIAUARUM BRAZIL PUTHOFF 9 APR 1981 0923 38 2200 N 110 21 00W CANYONLANDS PARK UT, USA PUTHOFF 8 APR 1981 0836 20 1900 N 103 10 00W CHAPALA LAKE, MEXICO PUTHOFF 8 APR 1981 1119 60 0000 N 152 00 00W COOK INLET AK, USA PUTHOFF 6 APR 1981 0827 36 3600 N 83 40 00W CUMBERLAND GAP KY, TN, VA, USA PUTHOFF 6 APR 1981 0930 13 3200 S 71 57 00W Cuzco PERU PUTHOFF 1 JUL 1980 0952 31 3000 N 35 30 00E DEAD SEA ISRAEL/JORDAN 2 APR 1981 0945 45 3000 S 165 30 00E DUSKY SOUND NEW ZEALAND PUTHOFF 3 APR 1981 0840 41 0200 N 28 57 00E ISTANBUL TURKEY 6 APR 1981 0835 00 1900 N 32 35 00E KAMPALA UGANDA PUTHOFF 3 MAR 1980 0917 14 0000 N 121 00 00E LAKE TAAL, LUZON PHILLIPINES PUTHOFF 6 APR 1981 0936 28 5930 N 13 40 50W MONTANA DEL FUEGO LANZAROTE CANARY PUTHOFF IS. 3 APR 1981 0920 39 4400 N 44 23 00E MT. ARARAT TURKEY 9 APR 1981 0845 03 0200 S 37 20 00E MT. KILIMANJARO TANZANIA PUTHOFF 6 APR 1981 0845 37 3700 N 79 33 00W NATURAL BRIDGE VA, USA PUTHOFF 1 JUL 1980 0900 21 3800 N 157 04 00W OAHU HI, USA 3 APR 1981 1015 41 5000 N 71 28 00W PROVIDENCE RI, USA 6 APR 1981 0817 00 1400 S 78 30 00W QUITO ECUADOR PUTHOFF 8 APR 1981 0956 33 3900 S 78 58 00W ROBINSON CHUSOE JUAN FERNANDEZ PUTHOFF IS. IS. 7 APR 1981 0940 29 2500 N 98 30 00W SAN ANTONIO TX, USA PUTHOFF 2 OCT 1980 0820 18 2900 N 66 o8 oow SAN JUAN PUERTO RICO PUTHOFF 2 OCT 1980 0900 58 1200 N 06 23 00W STORNOWAY LEWIS SCOTLAND PUTHOFF IS. 3 APR 1981 1010 35 0900 N 32 47 00E VOUNI CYPRUS 6 APR 1981 0945 51 2900 N 00 38 00W WINDSOR BERKS, ENGLAND PUTHOFF 01 1-4 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 t -- 5 &~; R SG1J SG1j SG1J SG1J SG1J SG1J SG1J CLASS PREPARER C C B B C c C B B B B B B c B C B B B B c B C C C B B C C B B Approved For Release 2000/06K REIDP96-00788ROO1300240001-2 IN displayed chronologically [Table 3(a)] and alphabetically [Table 3(b)] as a demonstration of a sorting procedure. mi It is necessary for an operational facility to know which sites have been targeted previously. Likewise, it is important to know the conditions W under which RV sessions were conducted. Computerized management of this information will optimize RVer usage and will significantly improve service to client organizations. 3. Current Status Both data bases described above were developed using a commercially available DBMS. As of May 1, 1981 we will lose access to this system. We are, however, making plans for continuous service with a second vendor until we can move the entire effort to our in-house LSI-11 system. 4. Experiments Now in Progress and Those Planned for the Next Three Months While maintaining our target data base on a limited commercial DBMS, we will be developing our own system for use on our in-house computer. 52 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 SGFOIA2 Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Next 2 Page(s) In Document Exempt Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/OfJK- itE-FDP96-00788 ROO 1300240001-2 to 401 Attachment #1 Statement of Sponsor's Expectation Review current literature and report findings. Report will form the basis for an expanded effort in the next fiscal year. MW 56 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 #10 V ^ 9% ro Approved For Release 2000/u-n". tN)k-RDP96-00788ROO1300240001-2 Attachment #2 1. Short Verbal Description SRI International has been tasked to complete an exploratory investi- aw gation in the problem of RV countermeasures. For FY'81 the entire effort will consist of scientific critiques of pertinent literature, including: dw ~ Assessment of the various proposed physics models of psychoonergetic functioning with regard to their mi respective countermeasure potential. ~ Critiques (from a possible intrusion perspective) of the papers that claim the existence of psychoenergetic effects ing on physical devices. mi 2. Summary of Completed Work Under another program, we have completed a literature search on random number generator (RNG) experiments. In more than 10 years of such experi- ments, it has been claimed that individuals are able mentally to influence RNG devices. A critique of these papers remains to be completed. 3. Current Status Work has not yet begun on this task. 4. Experiments Now in Progress and those Planned for the Next Three Months During the next three months, we will complete the critique of the RNG papers and complete a literature search on any other possible intrusion devices. 57 LO I no Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 SGFOIA2 Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Next 2 Page(s) In Document Exempt Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/013(EC RiETDP96-00788 ROO 1300240001-2 Attachment #1 Statement of Sponsor's Expectation Develop audio analysis techniques that can, under operational conditions, separate the correct from the incorrect statements concerning data available from taped viewer descriptions of remote viewing problems. 61 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 _em r%.n r Approved For Release 200G1"%'F%#. Z.& %"WW111LJ1 96-00788RO01 300240001-2 Attachment #2 1. Verbal Description of Project The goal is to separate correct from incorrect data available from taped viewer descriptions of remote viewing sites, through the use of semantic (linguistic) and audio analysis techniques, and to provide selective editing under operational conditions. The identification of correct and incorrect data would provide signal-to-noise enhancement, and increased reliability from RV data, due to gating by pre-established audio and semantic indicators of accuracy. Persons experienced in interviewing subjects in remote viewing experi- ments have observed that affect, tone, in speech behavior certain linguistic patterns, of a given subject varies from session to session and from moment to moment within a session. Interviewers often express the opinion that they make use of such clues in forming an early impression of the probable accuracy of the comments made in a particular session or in particular parts of a session. Such an impression is often confirmed by feedback. The study proposed here is specifically directed at finding measures of speech behavior that are correlated with the accuracy of a remote viewer's comments. We realize that project results may prove to be negative but feel that available information makes it necessary to attempt to develop audio analysis techniques in this arena. Sponsor will provide selected tapes ad for project personnel to work on. These tapes will provide project personnel with a variety of successful/unsuccessful taped sessions concerning one of the sponsor personnel. 2. Summary of Completed Work Start date not yet been given. 62 Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/0~g~g~-IDP96-00788ROO1300240001-2 Current Status Awaiting project startup. Audio analysis facility modified to be a secure space. 4. Experiments Now in Progress and Those Planned for the Next Three Months Assuming startup, first, recording sessions for which the accuracy of viewer's comments is known will be analyzed to determine candidate measures of accuracy. Then appropriate methods of speech analysis that incorporate the most promising of the various candidate measures will be developed. Next the most reliable methods of analysis that emerge will be used in a formal blind evaluation of known viewer data to determine whether candidate measures actually predict transcript accuracy. Finally, the best techniques will be applied to sponsor-supplied tapes. Complementary to audio analysis of taped descriptions, an analyst will look for linguistic, grammatical, and stylistic indicators that can be categorized as indicating successful viewing. These will include: choice of vocabularly, relative complexity of sentences, level of detail, amount of elaboration, degree of certainty, etc. Content analysis of this type entails the development of a set of semantic categories that represent themes of interest. This analytic framework is then applied to a body of text to determine the relative frequency With which these themes occur. 63 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 SGFOIA2 Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Next 2 Page(s) In Document Exempt Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 DC Approved For Release 2000/OMC(tIftWJDP96-OO788 ROO 1300240001-2 Attachment #1 Statement of Sponsor's Expectation Develop techniques which will indicate what is required for target acquisition and whether or not these techniques or abilities are individual in nature. is so im No 67 SECRET Ng Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/089CM-~DP96-00788ROO1300240001-2 OU Attachment #2 1. Verbal Description of Project aw Remote viewers have in past experiments demonstrated the ability to acquire target sites on the basis of cooperative person at site; on the basis of site geographical coordinates; picture of an individual; envelope carried by another which contained coordinates; A-D, 1-4 matrix address; etc. The use of alternative targeting procedures is dictated by operational circumstances and data available and is best done if such are evaluated in advance. The goal is to determine what is required for target acquisition (names, maps, coordinates, pictures, arbitrary labelings, simply the word "target, etc.). We will develop control procedures that will allow sessions to be carried out under uniform conditions, with only the targeting data being varied. Not only do we want to see if targeting methods can influence the results obtained, but we also want to see if it makes any difference to the viewer(s) if information concerning the target is provided to them prior to -the session, throughout the session, or nothing provided at all except in -the initial targeting data. 2. Summary of Completed Work Start date not yet been given. 3. Current Status Awaiting project startup. 4. Experiments Now in Progress and Those Planned for the Next Three Months Experimental design not yet completed. 68 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/499C RNIDP96-00788RO01 300240001-2 9W 4W III OPERATIONAL REMOTE VIEWING TASKS aw ~~' L~- SRI International is charged with investigating U.S. capabilities in mi applied RV in order to provide data useful in assessing the threat potential of corresponding Soviet applications. In response to this requirement, so SRI has pursued application tasks of interest to the intelligence community, responding to quick-reaction requirements set by representatives involved am in monitoring the progress of the work. The tasks carried out on the DIA program are listed in the following aw table. Complete documentation (transcripts, messages, evaluations, etc.) can be made available through SI/SAO channels on a need-to-know basis. so Although the contractor still awaits the formal evaluation materials, SRI has been told that a number of results are excellent. no See attached Operational Evaluation Sheets. 69 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 SG1A Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Next 1 Page(s) In Document Exempt Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/0ff-t. RIE!FDP96-00788ROO1300240001-2 (S) INSTRUCTIONS TO ANALYSTS (U) (U) The information provided as enclosure to this report was obtained in response to a collection requirement provided by This information was acquired from a new and potentially valuable source of intelligence. Work is currently being pursued to determine the accuracy, reliability, and improvement potential of this source. Your remarks and attention to the evaluation sheet will be the basis for our assessment of this new collection technique. Therefore, the effort you expend will greatly assist us and will ultimately result in you receiving more data of increasing accuracy and reliability. (U) While formulating your judgements concerning the data., the following comments concerning this new sourceof intelligence may be helpful. (U) Foremost,, the data is likely to consist of a mixture of correct and incorrect elements. Specifically: (1) (S) The descriptiv~~ elements are generally of higher reliability than judgements or labels as to what is being described (recreational swimming pool may be mistaken for water purification pools., an aircraft hull may be mistaken for a submarine hull, etc.). Therefore, seemingly appropriate descriptive elements should not be rejected because of mislabeling. (2) (S) The data often contain gaps (in a 3-building complex, for example, perhaps only two of the buildings may be described., and an airfield may be added that isn't there). Such gaps or additions should not be taken to mean that the rest of the data is necessarily inaccurate. (S) Therefore,- a recommended approach is to first examine the entire information packet to obtain an overall "flavor" of the response, reserving final judgement even in the face of certain errors, and then go back through for detailed analysis. (U) If you have questions regarding the data you have received or on its evaluation please feel free to contact me at any time. Thank you. DIA (DT-1A) SG1J c o L. Lavelle - Bldg. 44 SRI International Menlo Park, CA 94025 72 SECRET - NOT RELEASABLE TO FOREIGN NATIC Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 I I I t I t. U (S) a -z)LJMML- x EVA16a_rION'[tinEET 'MI t IL. a I I (U) For the summary evaluation, please check the following boxes as to the accuracy of the submitted material, ACCURACY m > Site Contact, (I l i N 4~6 i h t tt w o e t L Correspondence Mixed ResultsGood Excellent Unknown Applicable 0 0-4 < 0 1 2 3 < (D (D CL Geographical locale descrip- CL (S) - - n n 0 tion (terrain, water, etc.) ED ED 0 1 -1 W (S) Large-scale manmade elements X (D (cities (D , buildings, silos, F . F docksY railroad lines, airfields etc.) (D (D C" Small-scale manmade elements (S) CD D CD (antennas, computers, tanks, CD CD ED El F~ CD CD missiles, offices etc.) CD .4 00 General target ambience (re- 00 (S) CD CD 4 search,, production, adminis- -4 tration,, storage., troop move- ments , naval activity, air . activity, weapons testing, etc.) 0 (S) Relevant specific activities 0 U (nuclear testing, missile T to W a) firing, CBW storage, ELINT a) 6 monitoring, etc.) 6 CD CD 4 (S) Personality information -4 00 00 00 (physical descriptions, 00 X responsibilities, X CD actions, CD CD plans etc.) CD 9 _L . _L W - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - G& - CD CD CD - Cannot de- ___C~ be (S) Overall utility None ED Marginal Useful Ver y Useful terminedat this F time I CD - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - C30, - - CD CD CD CD (U) Definitions for the accuracy scale: 0 - Little correspondence . Self explanatory. . . . . I - Site contact with . . . Mixture of ct ents, but enoughof the . . . . correct elem former and incorre to m mixed results indicate ccessedthe target source has site. probably a r) 2 - Good . . . . . . . . . Good correspondence al ents matching, . . . . with sever elem but some incorrect information. 3 - Excellent . . . . . . . Good correspondence iguousunique matchableelementsand relatively M . . . . with unamb little incorrect information. m -4 I 1 1. 1 1 a I - ) &____.ARYt_.LUAk,_J PEI.,,,,nNEAkui 1 1 a I I A- (U) For the summary evaluation, check the followingboxes as the material. please to accuracy of the submitted ACCURACY tA Personnel > > Little Contact, Not -a with Correspondence Mixed Results Good Excellent Unknown Applicable 0 0 0 1 2 3 < < (D (D CL CLS) eographical locale description -n -n ~ l 7 0 0 (S) Dress appearance (uniform, -1 1 1:1 El ;0 formal, casual, etc.) E] (S) Physical appearance (height, W F"I 1:1 0 F~ weight, scars, hair color etc.) Q (S) General health characteristics Q Q F~ F~ Q Q (S) Nationality Q 0 E Q 00 D D 00 .1 Q (S) Personality characteristics Q -4 (mental, state, demeanor, 7 E7 F~ F-I 4 etc.) ED F (S) Relevant past responsibilities/ 0 > t F7 F"I F~ F~ > ti ac ivi es 0 (S) Relevant current U T ~ responsibilities/activities (S) Relevant planned Q Q E Q 4 -I l D ~ 7 -4 00 responsibilities/activities 00 00 00 W (S) Governments, agencies, persons Q Q responsible to/associated Q L with :1 -1 _ -- ------------------ ---------- ------ ---- -------- --- ------ -- W Q Q Q Cannot Q M S) verall utility None ED arginal E:1 seful 0 ery seful be me rKrI 0 de- termined at this ti -N- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - _L J Q - - - - - - - - - - - - - - - - - - - - - - - - - - Q Q (U) Definitions for the accuracy 731 scale: 31 0 - Little correspondence Self explanatorv. - Site contact with . . . Mixture of correctand incorrect of former . . . . elements, the to but enough M mixed results indicate source probably the target has accessed site. 2 - Good . . . . . . . . . Good correspondencewith several t someincorrect formation. . . . . elements in 3 - Excelle matching, t bu n Good correspondencewj th unambiguous elements and relatively . . . . . . . . . . . unique matchable M little incorrect foniiation, in I Approved For Release 2ooo/oNC. MUMP96-00788RO01 300240001-2 DETAILED EVALUATION SHEET (U) Specific Transcript/Drawing Items Evaluation Reference 2. 3. 4. 5. 6. 7. 8. 10. 11. 12. 0 to 3 point scale of previous page. 75 Approved For Release 2000/0EMC1j?AE-RTDP96-00788R001 300240001-2 SG1A Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Next 5 Page(s) In Document Exempt Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/OMC(UXDP96-00788 ROO 1300240001-2 jo VI FY'82 PROPOSED PROGRAM TO: Grill Flame Sponsors SG1J FROM: Grill Flame Contract Monitor 1. This memo presents a proposal for FY'82 external assistance in the Grill Flame area. The difficulty in initiating the work in the FY181 program was reviewed in the current status report. The goal of allowing a minimum of one year to investigate some of the variables affecting para- normal phenomena and investigating its application to intelligence goals will not be entirely met. Delays have been met in both preparing a memorandum of understanding and in the contract review cycle. Other legal issues have also caused delays (e.g., human use). Therefore, while the next fiscal year seems a long way off, we should begin our efforts now, once again, hoping to provide the time and security to the program that is needed for it to flourish. 2. Although it may be too early to specify the details of a program for FY'82, several aspects need to be established as soon as possible. (a) Do we intend to continue funding the investigation of psychoenergetics? If so, at what dollar level? (b) Do we intend to keep the focus of the program at SRI? jj 'P If not, where? (c) If we intend to fund other contractors, who, for what, and how much? If these questions can be answered at the outset, then proposals can be written and a program can be generated that will serve the needs of the DoD and be conducive to meaningful work. (Attachment #1 is a suggested program ase~ o The A~contr;Zj W2njjo _jUP.,jpo sor's needs r's assesg&gjjL" and observations of work now underway at SRI.) 83 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/05A'F' glk-IDP96-00788RO01 30024'00, -2 ATTACHMENT #1 SUGGESTED PROGRAM FOR FY'82 ARMY_: I RV reliability Enhancement, Development $195K and Evaluation II Data Base Management System 100K~/ III Targeting Follow-on 100K ,_$395K DIA I Intelligence Assessment of Foreign $100K Work II Operational RV 60K III RV Countermeasures 60K IV Assessment of Optimum Utilization 60K of RV $280K aw ow 84 SECRET J Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000AVAURDP96-00788RO01 300240:001ti -2 3. As a guideline for planning, the following data are offered. To maintain the present level of research, $425K to $500K per year is needed at SRI. A sum of $650K is needed to retain all the current SRI staff. Any less than this will result in a reduction of personnel. This data is presented only as background information; it-is-not--intended that___we___base__ our program on their needs. Our program should be based upon DoD funding levels and the needs of our organizat-1-on. Areas which now seem to be emerging as critical, are remote viewing (quality and reliability enhance- ment), data base management, intrusion detection and other countermeasures, a generalized question/answer process applicable to tracking, event timing prediction, and so forth. The opportunity of funding through the joint contract will be continually offered to NSA, CIA, and other DoD organizations. 4. Finally, the joint service contract monitor needs to know your inten- tions for FY182 in the very near future. When these are known a program will be structured and offered to the sponsors. It is hoped that the negotiation of the final program can then be attended to rapidly and contracts can be written and started through the approval procedure and finalized by 1 October 1981. Therefore, your answer-to-thismem-o, responding low to the questions above is needed by 18 May 1981. SG1J 5. The program monitor is available to discuss, aw clarify, or answer any questions pertaining to this memo. He can be reached by phone at (415) 859-5389. NO Note: Two of the proposed items (Computer-Automated Data Base Management System, and Countermeasures Intrusion Detection System) are new hardware oriented programs which may be now to Grill Flame members. Therefore, detailed writeups are included as Appendices II and III. Should the Data Base Management System be accepted as a line item, it is recommended that, because of standard 90 day delivery schedules, a $30K hardware purchase be approved ASAP (e.g., with EOY funds) to start up the project (see Proposal Update, Appendix II). 85 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 go Approved For Release 2000/0RC 99-IDP96-00788RO01 300240001-2 Appendix I GRILL FLAME BRIEFING$ APRIL 1980 ow Introduction vm~ A. Now that you have seen where we are in regard to applying coordinate remote viewing (CRV) to intelligence targets, and have been given a brief ow review of the current state-of-the-art, I wish to give you a program that will accomplish our goals in the Grill Flame research. ON B. There have been many criticisms offered concerning research in this area, For the most part, however, the flaws that are pointed out are well known to those of us responsible for the program. We could even add a few that the observers have missed. C. All of the criticisms, however, can be grouped into just three major problems. (1) Not enough funds (2) Not enough central management (3) No termination point D. The program I propose will deal with these criticisms and hopefully put them to rest. , E. The structure I propose is depicted on the vugraph. Membership of Grill Flame Groups A. Full and voting membership would be for all DoD elements providing funds for research. B. Any other representatives from DoD or non-DoD agencies deemed appropriate by the group would serve as Ad Hoe members. 86 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 aw Approved For Release 2000/06/K- REIDP96-00788ROO1300240001-2 ,C. Working group membership would be: (1) Mid-level representative, from involved agencies (and would) (2) Provide technical expertise. D. Primary monitor would be: (1) Selected from participating agencies. (2) Coordinates all contract work. aw Missions of Grill Flame The mission of the working group would be to A. Grill Flame Working Group (1) Prepare and review the final contract. (2) Provide guidance to contractors. (3) Review contract results. (4) Establish priorities for research projects. (5) Provide formal approval for all publications. (6) Provide technical and scientific expertise. B. The Primary Contract Monitor would (1) Serve as interface between Grill Flame structure and contractors. (2) Monitor day-to-day research activities to insure the work is being done and is of the quality and type that is desired. (3) Reports research results to Grill Flame structure. (4) Serves as principle link between DoD and researchers and the researchers and DoD. (5) Interprets research guidance and provides final guidance to investigators. (6) Insures that the research meets the goals of the Ow Grill Flame structure. Ow 87 aw SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Releas Ie 2000/0RC 99-IDP96-00788RO01 300240001-2 Funding A. All funding figures are projected or planned in FY'80. (1) AF contract of $70K being processed. (2) DIA hopes to reprogram $125K B. In FY'81 based on available GDIP figures (1) AF - $156K No (2) Army - 150K 06 (3) DIA - 150K $456K 10i C. Funds then would be provided by each participating agency in approxi- mately equal amounts . mw D. Funds for a three year program should be established. E. Funding at this level will keep the program alive. (1) Some progress, can be anticipated and we could meet our primary goal. (2) The principle effort would be to continue research on the application of coordinate remote viewing (CRV) to intelligence. (3) It will not support all the current team on board at SRI. (4) Training will be hampered in extent and numbers. (5) No multi-contractor involvement. F. To properly fund the research and meet the criteria and recommendations that have been made would require $600K to $1M/per year. Program The program as suggested will have a beginning, a middle and most importantly an end. 88 SECRET tog Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 20001C59 1:99-TRDP96-00788RO01 300240001-2 A. To accomplish this the program will be initiated with a principle goal of applying the CRV technique to intelligence use. B. At the end of three years one of the following recommendations will be made: (1) All funding should be terminated. Because it does not appear that it can ever be used by the intelligence community, or (2) The phenomena will assist us in gaining intelligence and we should: either (a) Work with the contractors in setting up an applications group, or (b) Take the project into the DoD and develop our own applications group. In conclusion 1. The purpose of this meeting is to provide the interested parties a current status report on Grill Flame research. 2. It is further hoped that decisions can be made now with regard to the future funding of Grill Flame activities. 3. The $150K per player is a minimum program. At least this much must be committed per year over the next 3 years. 4. If this cannot, or should not happen, then it is truly time to 41 A)6t officially close the program an p --funding. I A J 4'-4 "_I S-kv_~ Pr&J 5. Finally, how does the program offered here differ from what h&s been done? First, (a) There will be a management and fundings committment to the program. (b) The composition of the Grill Flame structure and the mission of each group are specifically defined. 89 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2 100OAKUTRI)P96-00788 ROO 1300240001-2 SG1A (c) The program will truly become a joint DoD effort. It is suggested that this be accomplished by providing the researchers a joint service contract where by all the agencies MIPR funds to one agency and one contract be issued for all Grill Flame research. GRILL FLAME BRIEFING NAME BG James A. Williams LtCol Michael I. Bloom LTC Murray B. Watt Dr. Harold E. Puthoff Mr. Russel (NMI) Targ ORGANIZATION Army ACSI AFIN INSCOM SRI SRI V Oro ef, Ap~ a.( Are JL-; A-C 90 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 SGFOIA3 I SSN Approved For Release 2000/0541c RIE-IDP96-00788RO01 300240001-2 ow Appendix II aw so um so aw A DATA-BASE MANAGEMENT SYSTEM FOR OPERATIONAL REMOTE VIEWING 91 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 no Approved For Release 2000/0!YLUC.RIE-ItDP96-00788RO01 300240001-2 ow I OBJECTIVE In this document we propose the application of a computer data base management system (DBMS) (with associated operational RV assessment forms) to the organization of the client's RV data, including trend analysis through multi-variable DBMS manipulation of thedata. so M6 aw 92 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/06K 8kIDP96-00788ROO1300240001-2 no II INTRODUCTION A. Background As operational remote sensing by psychoenergetic means evolves from the demonstration phase toward full status as a recognized intelligence collection technique, it is necessary to develop an overall accurate assessment of the large amount of data collected to date, and to be able to recognize significant trends within that data. In addition, as the data base continues to expand, a convenient archival technique with rapid access to the data is mandatory. It is possible to ascertain interesting trends by casual examination of the raw data transcripts. However, this type of informal inspection does not easily provide the detailed, multi-variable analysis by which to optimize further collection assignments, and it may lead to underutiliza- tion of RV'er resources. A mission officer could in principle increase contribution in the operational environment on the basis of correlation revealed by detailed DBMs analysis of previous results. A data base management system provides at least three major advan- tages over manual inspection. DBMS 1. indicates optimal use of multiple RV'ers for specific operational targets of interest, 2. efficiently archives and cross-correlates rapidly increasing volumes of RV data, and 3. provides means for recognizing and implementing more subtle targeting strategies for individual RV'ers. 93 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/0$97C &9IDP96-00788RO01 300240001-2 no Appendix A contains the introductory comments of one such DBMS as an illustration. B. Proposal We propose to select a standard data base management system (DBMS) which optimally meets the client's requirements, and to construct RV data assessment sheets to simplify data reduction. We further propose to create a data base from existing data, and to initiate a multi-variable search for important trends. 94 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/OSEC REIDP96-00788RO01 300240001-2 III METHOD OF APPROACH It is important to note here that the technology of data base management systems (DBMS) is finely developed. The required computer codes already exist; it is necessary only to select that system which is most tailored for application to the client's needs. Once a DBMS has been selected, we will modify and expand the tenta- tive prototype RV assessment sheet (shown in Appendix B) so that it con- forms to the constraints of the DBMS and accommodates the specific needs of the client organization supplying the data. It is presently envisioned that a number of assessment sheets would be developed and tailored to the type of facility targeted for the session under consideration. The follow- ing is a tentative list of possible operational remote sensing target assessment categories. ~ Large scale structures and technical sites (e.g. beam facilities) ~ Small scale technical sites (e.g. cryptographic equipment) ~ Events (timing of, e.g., nuclear events) e Person-oriented (e.g., health of foreign head of state) ~ Location (e.g., of downed aircraft) ~ Communication (e.g., reading of documents). We propose to work with the client organization to provide instruc- tions and guidance to reduce the current data for entry into the DBMS. We would then create the data base using the DBMS itself, working closely with the client to initiate trend searches. 95 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 low U9 IV PROPOSED PROGRAM We propose the following: ow * Select an appropriate DBMS. 9 Construct a series of task-related assessment sheets. Mi * Build a data base from contractor and client-completed assessment sheets. * Initiate trend analysis and produce computer-generated reports describing the results. * Provide access to the data base by the client organi- zation and recommendations for an in-house DBMS capability. It is proposed that the above program be completed on a one-man year level-of-effort basis. We envision a single year's expenditure of approximately $75K. An itemized cost breakdown will be provided on request. aw 96 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 ow Approved For Release 2000/06ACUIDP96-00788ROO1300240001-2 im mi Appendix A INTRODUCTORY CHAPTER OF THE PRIME 400 DBMS aw ow mw ON 97 SECRET no Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 INTRODUCTION Approved For Release 209 0 _TD~P-00788 ROO 1300240001-2 Koqog~ SECTION I INTRODUCTION INTRODUCTION PRIME/POWER is a complete data management system combining the features of Prime's operating system (PRIMOS) with the simplicity of a high-level, user-oriented query and report language. With PRIME/POWER, anyone can quickly learn on-line data management at an interactive terminal. It is not necessary to know anything about programing or data processing to use PRIME/POWER. The POWER commands. prompts (asks) you give describing language is based on simple, easy-to-understand English Using interactive dialog in all its operations, POWER you for the input it needs to perform each function. If it the wrong information, POWER displays an error message the problem. POWER's HELP command provides a brief description of the function and format of any POWER command. PRIME/POWER and PRIME/POWER+ POWER has two versions: PRIME/POWER and PRIME/POWER+. PRIME/POWER runs on all Prime CPUs, from the PRI14E 350 on up through the 750. it provides the basic query language, report writer, data entry and maintenance functions required for simple data management. PRIME/POWER+ expands these capabilities by providing the end user with the tools for system development. The additional features include formatted data entry, validation of data entry, text and keyword processing, table processing, a dictionary file for keywords, sophisticated report features, procedure files with variables, file linking, multi-file reporting, concurrent usage safeguards, and a versatile EDITOR facility. PRIME/POWER+ runs only in V-inode on a 350 CPU and up. Common Features PRIME/POWER and PRIME/POWER+ use PRIMOS file utilities to create, interrogate and update all types of standard data files. These file types are: MIDAS (index sequential), binary sequential, binary direct access and ASCII sequential. Files created outside the POWER system can be easily overlaid, or mode compatible with POWER. Such files can then be interrogated and updated like any POWER-created file. Since PRIME/POWER and PRImE/P0WER+ are self-contained, all data management operations can be performed entirely within the POWER system. In addition, all files created or overlaid by POWER are accessible by applications programs written in COBOL, FORTRAN, PL/l, RPGII and BASIC. Similarly, files created by such programs can be 1 98 1 June 1979 no UNCLASSIFIED Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 ullu HLU LA~6 .R,FrION Idu proVeh For Release 2000/08/01F. -RDP96-00788RO01 300240001-2 overlaid and interrogated with POWER. Features of PRIME/POWER and PRIME/POWER+ The common features of PRIME/PCWER and PRIME/P0A[ER+ include: * Easy-to-use interactive language. 9 Up to 20 user-defined direct access keys. * Support for complex search expressions, including range evaluation. e Automatic data length check during data entry. * Interface to all standard file types: Index Sequential (MIDAS), ASCII sequential, binary sequential and binary direct access files. * Simple creation of all standard file types. * POWER-created files accessible by applications programs (COBOL, BASIC, FCRTRAN, etc.) . 0 Simple data update capabilities. 0 e Basic report-writing features. 9 Extensive camputational functions. * Support for all standard data types, including COBOL COMP-3 and DECIMAL. e Procedure files to perform routine or repeated operations. 9 Automatic retention of CREATE and ADD dialogues for easy procedure file creation. go 9 Password-oriented security system. aw Features exclusive to POWER+ Ability to define and search on keywords. Text processing and editing. Support for tables in files and reports. 9 File-locks to prevent simultaneous file modification. 9 Dynamic and static file linking. 99 REV. 0 1 2 UMAQ5~JFD Approved For Release 20 FW rw-00788RO01 300240001-2 ~LA91 ED Approved For Release 200, P96-00788RO01MU&n- fj ~ Range checking for data input. ~ Computed fields and linked files in reports. 9 Support for different terminal features. ~ Screen formatting for simplified data entry. ~ An EDITOR facility for text, keywords, and procedure files. ~ System-level audit and accounting facilities. INTRODUCTION TO EATA MANAGEMENT 'Data management' is a widely used term which refers to the organization and upkeep of large quantities of information. This can be a difficult task; however, a simple approach often yields the best results. The PCWER system is designed to make data management as simple and painless as possible. If you have never used a data management system or language before, the summary below should help put some terms and concepts into perspective. Data Kanagement: Data management 1. 2. 3. 4. 5. The Basic Concepts involves five basic operations: Organizing and storing information (data). Retrieving and optionally reporting on specific data items. Updating information in a file. Adding new data to a file. Deleting data from a file. These data management operations are based on several general concepts: 0 Information, or data, can be stored and accessed most efficiently moo using computer facilities. ('Data' refers to two or more 'pieces' of information, while Idatuml refers to a single piece of information.) 9 Similar information is grouped into files; e.g., all data pertaining to a canpany's employees maTbe put into an Employee file. * Files are composed of records; for example, each record in an employee file might contain several pieces of information pertaining to a single employee. See Figure 1-1. * Each record in a file is usually divided into one or more fields r-w--*l each o h'-ch contains a singular piece of information. An Employee file record might contain fields like last name, first name, social security nLxnber, date of hire, etc. These fields are common to ow 1 100 3 June 1979 am Approved For Release 2u*"SWEB6-00788ROO1300240001-2 UNCLASSIFIED rPWUWd For Release 2000/08/OTMM-RDP96-00788 ROO 1300240001-2 FIELDS FIELD NUMBERFIELD FIELD FIELD FIELD FIELD I 2 3 4 FIELD NAMELAST NAMEFIRST SOC. SEC.BIRTH JkL NAME NO. DATE RECORDI joses Steve 32340-9W 2 DEC 53 RECORD2 H&Mm mike IN-07-409123 MAY 0 RECORD3 UmInsky Becky 231-57-Mi25 MAY S2 RECORD n Figure 1-1. Onployee File Records 'REV. 0 1 101 4 Approved For Release 2kW~bAN%P5-00788ROO13OO24OOO1-2 UIIUUWINLU INTRODUCTION Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 every record in the file. e Each field within a record is given a name which accurately describes the information it contains. Such field-names are referred to as descriptors or keys. ordinarily, one retrieves certain pieces of inro ion trom a file by specifying the search conditions, fields or keys must meet in order to be retrieved. Cnly those field values which satisfy the stated search conditions are retrieved frcm the file during a search. Data Management: The Basic 0 perations VNhat can be done with information once it is organized in files? Some of the possibilities are: * Retrieve certain information from the file. * Examine data. * Perform arithmetic operations on the data. * Change or update the data. e Delete specific data items. rM e obtain a paper copy of the data (i.e., print it out). * Flormat the data, and print it out in a 'report' format. e Add new data to the file. POWER TEF;V4S AND CCNCEPTS Most of the terms used in POWER are very similar to those just discussed. There are a few modifications: * In POWER, fields are named by descriptors. e There are tmo types of descriptors: search and display. Search descriptors name fields which will be used as keys and will be frequently searched on. Display descriptors usually describe fields which are less frequently searched on. 1 102 5 June 1979 Approved For Release 2JACLASSIFIED-00788ROO1300240001-2 WN UNCM!FIED RVE?d For Release 2000/08/ RDP96-00788RO01 300240001-2 WF8 so MW Terms In addition to those defined above, the POWER vocabulary includes the following terms: File A collection of related information divided into common records. Each file has a unique set of descriptors or fields associated with it. For example, a file containing payroll information might contain one record per company employee. Each record is composed of several fields or descriptors, e.g., MME, SALARY, AGE, etc. Data Base A group of interrelated files. Record A block of related data composed of one or more fields named by descriptors. A file is made up of one or more records. Descriptor A field that is common to all records in a file. Descriptors are defined when the file is created. For example, in a Personnel file, there may be several descriptors such as NkME, ADDRESS, PHONE, etc. Search Descriptor A descriptor that is used to retrieve a selected record or records. This descriptor can be used with the FIND, GET, PRINT or DISPLAY commands. Search descriptors can be up to 32 characters in length. (In a MIDAS file, each search descriptor is an index and is part of the index subfile.) Display Descriptor A descriptor that is used in a selected display or print of a record. These descriptors are used to sequentially search a file ow for information. Display descriptors can be a maximum of 80 characters in length. (In a MIDAS file they are not physically part of the index subfile, they are non-indexed fields.) 9 Text (PaA!ER+) A free-form portion of a record that may contain up to 50 lines of data. Each line can be up to 80 characters in length. REV. 0 1 103 6 Approved For Release 20"Nf,17A,-9SfqfbOO788ROO1300240001-2 ui%jLAn.ir1LU IDR3709 INTRODUCTION Approved For Release 2000/08/07: CIA-RDP96-00788ROO1300240001-2 Set A group of records fulfilling any stated search requirement. A set is created as a result of a successful FIND, GET, or EXPAND command. For exampler a FIND command may search using NkME IS ISMITH' as the criteria. All records within the selected file whose NAME field contained 'SMITH' would form a set. Up to 49 sets can be active at one time per user. 0 Current Set The last set created by a successful search operation, such as FIND, GET, or EXPAND. im 9 Keyword (POWER+) A word or phrase that is contained within a record or wbich appropriately describes a concept within a record; can be used as a search criterion. Keywords can be up to 20 characters in length. (Keywords are stored in indices 15-17 in a MIDAS file). 9 Internal Keyword (POWER+) A keyword actually contained in the TEXr portion of a file. Keywords are defined by bracketing them, , as text is added to each record. * External Keyword (POWER+) A keyword that is not contained within the text of a record. External keywords are logical search keys that describe or relate to the information contained in a particular record. External keywords are added to a record after the text has been entered. Data ManNement in POWER POWER offers all the basic tools needed for data organization and go management. With POWER you can: Create a file with up to 20 keys (search descriptors) for retrieving information. Take an already existing file and define it according to KNER terms; called 'overlay'. Retrieve and display infomation from the file, using previously defined descriptors as search keys. Compute and update numeric data. Ud 9 Change fields in selected records or change file globally. 1 104 7 June 1979 Approved For Release 20UWjM% LCLFR~0788 ROO 1300240001-2 "Pro V1 %it 1VLJ 1VV1j IL-W SECTION I IM3709 Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 ~ Write simple command sequences (procedures) that can be performed repeatedly. ~ Write reports to format data output. ~ Delete data from a file. ~ Add new records to a file. Files Created by POWER Most users of POWER will not need to worry about file types and structures; POWER takes care of file-related details for you. However, some users will need to know about the files POWER creates. The most commonly encountered files in the POWER system are called MIDAS, ftltiple Index Data Access Systems) files. MIDAS files: MIDAS files are special data files structured for quick data Fe-t-r-Teval. POWER can access these files using a 'direct' retrieval method. Each MIDAS file has an associated index subfile, which serves as a quick look-up file (much like a phone book). All the search descriptors you've defined for the file are listed in the subfile along with their 'address' locations in the file. When you specify a descriptor to be searched on during a file query, POWER goes to the index subfile, looks up the descriptor and its address, goes to the data file and retrieves the proper records. This kind of search can be called the index access method. Other files: Files of other types, such as ASCII sequential, may be created or overlaid in POWER. Sequential files are set up quite differently from MIDAS files. There is no index subfile for sequential files; therefore, all descriptor values must be searched for sequentially in the file instead of directly. Sequential searching involves stepping through every record in the file, one after the other, in the order in which they are physically located in the file, until the desired one is found. When a descriptor is specified in a search expression, POWER goes directly to the file and searches every record until the proper descriptor (key) value is located. The sequential access method can take a lot more time than the index access method, especially if the file contains many records. Display Descr12tors vs. Search Descriptors In MIDAS files, a descriptor defined as a display descriptor does not appear in the index subfile. When you search on a display descriptor, POWER must do a sequential search through the actual MIDAS file until the desired field value for the descriptor is found. In other words, for MIMS files, search descriptors are accessed by the index access method; display descriptors, by the sequential access method. REV. 0 1 105 8 Approved For Release 20UMMS11WIDE D00788 ROO 1300240001-2 UNU60 O~INLU INTRODXTION Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 In sequential files, display descriptors are accessed sequentially, just as search descriptors are; however, they are usually reserved for fields not often searched on. The reasons for having both search and display descriptors are simple: ~ You can define only 20 search descriptors per file (only 14 if you select the TEXT and KEYWORD option in POWER+); if you want more keys to search on, they must be defined as display descriptors. ~ Search descriptors have a maximum length of 32 characters; Display descriptors have a maximum length of 80 characters. * Display descriptors are usually the fields you won't search on frequently. ~ In both POWER and POWER+, having display descriptors enables you to define up to 512 fields per record, instead of just 20. CONVENrIONS Throughout this manual, many symbols and conventions are used in describing command formats and syntax. There are also some special rules for defining descriptor names and file names in POWER. These conventions are listed below. Command Syntax Rules A11 POWER command formats are governed by the following syntax rules: * WORDS -IN-UPPER-CASE Capital letters identify command words or keywords. They are to be entered literally. If a portion of an upper-case word is underlined, the underlined letters indicate the minimum legal abbreviation. e kbrds-in-lower-case Lower case letters identify parameters. The user substitutes an appropriate numerical or text value. * Braces { I Braces indicate a choice of parameters and/or keywords. At least one choice must be selected. * Brackets [ I Brackets indicate that the word or parameter enclosed is optional. 1 106 9 June 1979 Approved For Release 20UNM7 ~&IM800788ROO1300240001-2 SECTION I UNCLASSIFIED Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Hyphen A hyphen identifies a command line option, as in: SPOOL -LIST Parentheses %hen parentheses appear in a command format, they must be included literally. e Ellipsis ... The preceding parameter may be repeated. * option The word option indicates one or more keywords or parameters can be given, and that a list of options for the particular command follows. Command Ebrmat The general format of many POWER commands is given below. Cwmands are im uppercase: lowercase words are 'arguments', or 'parameters'. Arguments are usually optional on a cammand line and can be any one of several values, depending on the context in which the command is being used. variable COMMAND (Snn) descriptor-name) 'value' ( I Im variablel Snn Set number to 49. where nn is a number from 1 descriptor-name A specific various descriptor name used in search and display commands. Indicates searched that a keyword value is to be on or displayed. 'value' Actual to the record value corresponding descriptor, named variable or keyword previously. quotes. Must be enclosed in single variable A numeric or character variable used in search or computation expressions. REV. 0 107 Approved For Release 209W1AUlFa-00788ROO1300240001-2 idk DO I r7l r7n RMODXTION Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Some POWER commands accept one or more options from a list. These are represented as follows: COMMAND option-I option-2 option-n If more than one option is specified on a command line, they are separated by commas or spaces, as indicated in each individual command format. Special Characters Several characters reserved for special uses by POWER cannot be included in descriptor narnes or file names. These special characters are: period comma left parenthesis right parenthesis slash * asterisk + plus minus equal < greater than < less than I single quote rhe only characters listed above which can be used in defining file names are: period and minus 1 108 11 June 1979 rr% Approved For Release 20VA/ ~/V~~IfIW-00788RO01300240001-2 Ow Approved For Release 2000/06K. RtIDP96-00788ROO1300240001-2 so am aw so mi Appendix B A TENTATIVE RV ASSESSMENT SHEET 109 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 SECRET S U~88RO UUZ.14UUU 1 -7. Approved For ReVp YffiPCQJ& - %ARRU 013. T%. Oe (U) The information provided as enclosure to this report was obtained in response to a collection requirement provided by This information was acquired from a new and potentially valuable source of intelligence. Work is currently being pursued to determine the accuracy, reliability, and improvement potential of this source. Your remarks and attention to the evaluation sheet will be the basis for our assessment of this new collection technique. Therefore, the effort you expend will greatly assist us and will ultimately result in you receiving more data of increasing accuracy and reliability. (U) While formulating your judgements concerning the data, the following comments concerning this new source of intelligence may be helpful. (U) Foremost, the data is likely to consist of a mixture of correct and incorrect elements. Specifically: (1) (S) The descriptive elements, are generally of higher reliability than Judgements or labels as to what is being described (recreational swimming pool may be mistaken for water purification pools, an aircraft hull may be mistaken for a submarine hull, etc.). Therefore, seemingly appropriate descriptive elements should not be rejected because of mislabeling. (2) (S) The data often contain gaps (in a 3-building complex, for example, perhaps only two of the buildings may be described, and an airfield may be added that isn't there). Such gaps or additions should not be taken to mean that the rest of the data is necessarily inaccurate. (S) Therefore, a recommended approach is to first examine the entire information packet to obtain an overall "flavor" of the response,, reserving final judgement even in the face of certain errors, and then go back through for detailed analysis. (U) If you have questions regarding the data you have received or on its evaluation please feel free to contact me at any time. Thank you. DIA (DT-1A) c/o L. Lavelle - Bldg. 44 SG1J SRI International Menlo Park., CA 04025 110 SECRET - NOT PXLEASABLE TO FOREIGN NATIO Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For ReleaseP2QWW9ftT MiROM-00788 ROO 1300240001-2 OPERATIONAL TARGET FILE (SRI Internal Use Only) (U) Project Name ow (S) Viewer (S) Monitor (S) Date Time of Start Time of Finish (S) Client to (S) Priority Urgent Routine (U) Target Key Variance from Standard Protocol (U) Target ID No. Information Provided by Requestor Information Provided to the Monitor Information Provided to the Source Information Requested by Analyst Ali (S) Date Information Delivered to Client (S) Additional Data Request by Client Yes No F-1 im (S) Dates Additional Data Requests Met so Remarks SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 SU% - Y El TATIJ 3HEIt., LY) I t t I t . (U) tot the summary evaluatioii) check the followingboxes the Please as to accuracy of the submitted material* ACCURAC Y Site Contactl > Little with Not > - a Correspondence Mixed Results Good Excellent UnknownApplicable a 0 0 0 1 2 3 CL (S) Geographical locale descrip- -n tion (terrain, water,, etc.) F-1 El F-I ED -n 0 0 (S) Large-scale marmade elements X X (cities, buildings, silos, docks., railroad lines., ID F-1 El airfields, etc.) (D M (S) Snall-scale mamade elements CD (antennas,, computers., tanks.. CD CD CD l f CD missi CD es., of ices, etc.) CD CD 00 (S) General target ambience (re- 00 CD search,, production, adminis- CD 4 tration storage, troop move- -4 ..I- P ED 1:3 o w ments,, naval activity,, air 0 activity., weapons testing., > etc.) W (S) Relevant specific activities 0 (nuclear testing, missile 0 U T W W firing, CBW storage,, ELINT 1:3 M M ID a) monitoring, etc.) 6 6 CD CD 4 S) ersonality information -4 00 (physical descriptions 00 00 00 actions responsibilities, X X M CD CD plans., etc.) CD CD - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - _L - - - - - - - - - - - - - - - - CD Cannot de- CD CD (S) Overall utility None El Marginal Useful Very be at this me M Useful terminedti P F-1 -Ph- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - m - - - - - - - - CD - - - 4:~ CD CD CD (U) Definitions for the accuracy CD scale: 731 0 - Little correspondence . Self explanatory. 731 M 0 * 0 0 1^ 1 - Site contact with . . . Mixture of correctand incorrect of the . . . . elements, former but enough to M mixed results indicate source probably the target has accessed site. 2 - Good e - e * e e D * ~ Good correspondencewith several . e e e elements matching , but some incorrect information 3 - Excellent . . . . Good correspondence . elementsand relatively with unwnbiguous unique matchable M little incorrect information. NO go 40 go ON aw fm WO NO Now SECRET Approved For Release 2000/09-/07: CIA-RDP96-00788ROO1300240001-2 ) DETAIIXD EVAIXATION SHEET (U) Specif ic Transcript/Drawing Items Evaluation Reference 2. 3. 4. 5. 6. 7. 9. 10. 12. 0 to 3 point scale of previous page. 113 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 go.. mw so so so so aw wo Approved For Release 2000/AAf"9&T-RDP96-00788RO01 300240001-2 (S) Additional information desired? Ye s (S) Priority Urgent date No 0 Routine D Items l. 2. 3. 4. SG1J Return to: (DIA, DT-IA) c/o L. lavelle Bldg. 44 SRI international Menlo Park, CA 94025 114 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 20001OUF ~ IIA-IRDP96-00788 ROO 1300240001-2 PROPOSAL UPDATE After considering the various computer/programs that are available, it has become clear that the most optimal way to proceed is to construct our own data base management system on an expanded Digital Equipment Corporation LSI-11/23 microcomputer. This has two principle advantages over using existing systems: 0 Since the LSI-11 system is nearly "desk-top" size, the potential security problem of classified computing is completely solved by having a dedicated computer, at a reasonable cost, which is maintained in a secure facility. 0 The DBMS may be easily tailored to fit the application. 1. Hardware Upgrade For the last two years, we have been using a Digital Equipment so. LSI-11/2 micro-computer to monitor various psychoenergetic experiments and to perform modest computational tasks. Table 1 shows the current 4W system configuration, which was developed for real-time data acquisition under another program. Computer data based target management and manipulation of opera- no tional and training remote viewing experiments is being explored in the FY'81 Joint Services contract. The on-site monitor has been briefed on aw the feasibility of the system and is recommending that the hardware be expanded in FY'81 and that data base management be included in the FY'82 program for final development and implementation. This document proposes that approximately $30K be expended in FY'81 to acquire the hardware and software to meet the current requirements of the program. The computational requirements of a data base management system WIN (DBMS) differ significantly from those of our real-time data acquisition computer. A DBMS requires: 115 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/0591C glk-IDP96-00788RO01 300240001-2 Table 1 CURRENT MICRO-COMPUTER CONFIGURATION Function CPU Computing Memory Disks Graphics output Graphics input Terminal Serial 1/0 Parallel 1/0 Slow analogue 1/0 Calendar Device LSI-11/2 Floating point chip 32K words Dual double density 8-inch floppy 512 x 256 x 8 frame buffer with color tables 20" x 20" tablet with cursor Video with graphics 4 ports 16-bits 16 channels in--2 out Battery date/time board Rapid access to disk storage medium Increase CPU memory to expand disk memory buffers Fast CPU cycle to reduce file search and sorting times significantly. Long term stable archival storage Hard copy output. Table 2 shows the recommended system expansion components and includes function and approximate cost of each item. It is recommended that $30,000 be added to the Joint Services contract in FY'81,-specifically to expand the computer system with the items shown in Table 2. The addition of this hardware/software expansion 116 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 0 (D CL -n 0 Q Q Q Q 00 V1 Q M 4 0 > ~u 0 T 6 Q 4 00 00 X Q Q L W Q Q Q Q Q Table 2 0 MICRO-COMPUTER SYSTEM EXPANSION < (D CL -n 0 Item Description Function Cost Hardware 1 35 Mb Winchester disk Rapid file access S 4,954 (D Q 2 Dual 65 Mb tape drive Archival storage 5,200 Q Q 3 Printer and interface Report generation 2,500 %A 4 LSI-11/23 CPU, memory Rapid file search 8,180 5 Card expansion cage Implementation requirement 1,080 6 Mounting rack, general hardware Implementation requirement 1,600 7 Bus expansion card Implementation requirement 160 Software 6 Q 1 RT-11 v04 software, 11/23 11/23 implementation requirement1,725 -4 00 00 2 11/23 compatable FORTRAN with extensions 1,430 X Q Q -L Supplies W Q Q I Tapes, floppies, paper 3,100 Q Q Total $29,929 Q so Approved For Release 2000AKRUATRIDP96-00788RO01 300240 )bO 1~2 to the data-base management system, now under development, will provide ~the DoD with a unique capability in manipulating psychic derived data~ and will enhance the application and the conceptual understanding of the phenomena. 2. Updated Proposed Program ~ Obtain items from Table 2. ~ Develop stand-alone DBMS tailored to the RV application. ~ Demonstrate capability on in-house LSI system by using National Geographic training targets. MW Estimated contract cost: 0 Hardware expansion (recommended for FY'81) $ 29,929 0 Senior technical (1/2 time) 60,000 0 Research analyst (1/4 time) 12,000 0 Secretary (2 hrs/week) 2,250 Total $104,179 V"k 4V Mi L U j 6 "**-4 ANS kAv 1~ NAX4 118 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/5tF'~&-~DP96-00788ROO1300240001-2 Appendix III COUNTERMEASURES/INTRUSION DETECTION A. Background We have been tasked under the_jpint Services-contract to provide an initial investigation into the countermeasures problem. This FY'81 effort will be devoted to scientific critiques of the open literature that pertain to various aspects of countermeasures--e.g., papers relating to intrusion detectors and to theories of Extremely Low Frequency E&M radiation. The concept of intrusion detection is an important, initial step toward RV countermeasures. It is beyond the scope of this report to describe the theoretical and experimental background that suggests that intrusion detection may be possible. A graduated two-year effort that addresses the intrusion question will, however, be outlined. B. Method of Approach To reduce the problem to a manageable size we will now define a number of terms: Intrusion I. A perturbation of a physical system ad that is correlated with the RV acquisition of data. ~ Intrusion II. A perturbation of a physical system that is correlated with an RV session, however with so no evidence of RV data acquisition. (Active PK) ~ Future RV 1. The correct acquisition of RV infor- ow mation from the trial feedback period rather than from the target itself. 0 Future RV Il. The acquisitions of correct RV infor- mation when trial-by-trial target information is not available to anyone, yet global feedback (i.e., "you 119 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/05/K Rik-IDP96-00788RO01 300240001-2 so had 4 out of 6 first place matches) is given to the Rver. Remote Perturbation. Remote interaction with a physical system. Retro-Cognitive RP. RP intention as some future time interacting with a physical system in present time. Eli Further, we will define a successful intrusion detection program as clear an evidence of Intrusion 1. From an operational viewpoint, the actual source ol the physical interaction (i.e., the RVer or someone else in his vicinity) i.,, inconsequential. Therefore, in what follows, we will ignore the possi- bility that during experiments an RV monitor might be the source of the interaction. And we will defer the operationally important problem that individuals within the secure facility might inadvertently cause an in- trusion-like alarm. Figure I outlines the initial experiment which must succeed prior to designing a complete intrusion detection system. Although the No figure appears straightforward, it may be difficult to prove that the given detector system was actually perturbed rather than that the observed effect was obtained by psychoonergetic data selection. This will constitute the entire effort for FY182. Once a given device has been verified perturbable, a second stage of experiments will be initiated to search for RV/RP correlations. (Beginning FY'83.) Figure 2 shows the decision flow chart for this stage. A subject will be asked to remote view target information that is in the near vicinity of the detection device. (The extensive protocols to do this are beyond the scope of this memo, but will be supplied upon demand.) Future RV Il is a debatable point with regard to real time data acquisition (clairvoyance); we have used it here to avoid the difficult question of a real time data acquisition proof. 120 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 2000/6rVC:jt&TRDP96-00788R001 300240001-2 STAW Device 0- Ap Possible '**~ ~70 a CONCLUSIONS RP exists top FIGURE I DEVICE INDEPENDENT RP ANALYSIS PLAN (FY'82) 121 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 0 0 < RV Zxperlment Trial/TrIal -n -n 0 0 ~ ltv RV 48 no --V e3 atul Ucces < ? ? Q Q Q Q Q Q Q Q 00 RP RP Q no 6s Os no 4 orrelatlon orrelation e9 ~w __L_ 0 7 > ~u 0 M U COWLIUSIONS CONCLUSIONS CONCIA-ISIO" C 'ONS U S C C CONCLUSIONS L ' 6 active RP intrusion I f uture 19V I or Q . no effect or u O qn I or :~ !~Ul CO __~qZr Q or no effect Q 4 intrusion 11 -4 , P bad design retrecog RP t retrocog. i 00 00 00 00 X X Q Q Q Q Stop stop Stop stop Q Q Q Q Q Q Q Q Q FIGURE 2 DEVICE INDEPENDENT INTRUSION IT11 TRIAL-BY-TRIAI,FEEDBACK (FY'82) Q 73, DETECTION PLAN W 73, m m Approved For Release 2000/AW~kTRDP96-OO788 ROO 1300240001-2 He will be given trial-by-trial feedback of the target immediately after the session. During the entire RV session the detector device will be in a continuous operation mode. There are two sets of conclusions one would draw after an RV experiment that was considered a success by blind judging: ~ With RP correlation we would conclude that we have Intrusion I detection. And at this stage we would be unable to differentiate between standard retrocogni- tive RP and Intrusion 1. ~ With no RP correlation, either there might not be an Md RP interaction concomitant with remote viewing, or the successful RV resulted from future RV I. Likewise there are two sets of conclusions one would draw after an unsuccessful RV experiment. 0 With RP correlation we would conclude that we would have, by definition, Intrusion II. 0 With no RP correlation, either there would be no effect in general, or we would have an incorrect experimental design. In summary, for the trial-by-trial feedback experiment, it would be possible to observe actual intrusion; it would also be possible, however, to have an ambiguous result--namoly good RV with no RP. To remove this last ambiguity, it will be necessary to do remote MW viewing experiments with global feedback only (second half of FY'83). In this mode of operation, neither the subject nor any experimenter will ever MW be aware of the individual targets used in an experiment. This is necessary to close any possible future RV I channels. For this class of experiments, to pictorial target material will be chosen randomly from a large pool of targets stored on magnetic tape and will be displayed on the computer's MW graphic system. The subject will register his response as usual, and later it will be analyzed with regard to a standard series of questions, 123 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 SFC~ET Approved For Release 2000/0'8/U1-. IA-RDP96-00788ROO1300240001-2 so which have been developed to facilitate automatic computer judging. The computer automated results of each trial will be saved in a protected file until the series is completed. At the conclusion of the series, the subject and experimenters will be told the results of the entire series (e.g., 4 first place matches out of 6), but not the individual trial results. The computer will then destroy the trial-by-trial results. This last, extreme step is mandatory, if we are to conclude that at no time in his future will the subject ever be exposed to the result of a single trial. These trials will be conducted with the detector device in continuous operation. Figure 3 shows the decision flow diagram for the global feedback experiment. As in the case above, there are two sets of conclusions one would draw from M successful RV in such an experiment. 6 With RP correlation we would conclude that we have Intrusion I detection. If there were successful RV in the trial-by-trial case but no RP correlation, it would most likely be due to a future RV I effect. Of course retrocognitive RP might also be a possibility. Retrocognitive RP here would require that this phenomenon work in the absence of overt RP feedback, an assumption which has not yet been verified. 0 With no RP correlation there would be either no RP MW interaction concomitant with remote viewing, or the successful RV would have resulted by future RV Il effects. Eli Likewise these are two sets of conclusions one would draw after an unsuccessful RV experiment. 0 With RP correlation, we would conclude that we have Intrusion II (active RP) and that trial-by-trial feedback is necessary for a successful RV experiment. 0 With no RP correlation we would conclude either there is no R11 correlate to RV or we have a bad experimental design. We might also conclude that trial-by-trial feedback is necessary for a successful RV experiment. 124 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 I t t t t t t t t 0 -n 0 (D F fu Q Q Q Q 00 Q tA 4 m 0 > ~u m 0 to a) 6 Q 4 00 00 X Q Q L W Q Q m -Ph Q Q Q 731 RV 1xperlment Global no latlot ? '-00" CONCLUSION& active RP intrusion 11 fbk necessary, top F CONCLUSIONS no effect bad design fbk necessary, top RVr> as ul Yes ? CONCLUSIONS Intrusion I T/r future RV or retro. RP top 0 -n 0 Q Q Q ILP &M latlon Zen IF Y) IF Cm COINCLUSIO" 0 a to future XV 11 or goof fect 6 Q --m 00 00 M Q stop Q Q m 44. Q Q Q FIGURE 3 DEVICE INDEPENDENT INTRUSION DETECTION PIAN WIT11 GLOBAL FEEDBACK ONLY (FY'82-'83) Approved For Release 200010HIC R IS -TRDP96-00788RO01 300240001-2 Figure 4 shows how the three experiments described above fit into an overall plan to determine if intrusion detection is possible. C. Proposal (FY'82) 1. Hardware Expansion To accomplish stage one of the above program, the current computer facility needs to be upgraded beyond that required for a DBMS. Table 1 shows the hardware expansion which is necessary for a real time system. Technical justification of these improvements is beyond the scope of this memo, however they will be provided upon request. 2. Intrusion Detector Program-Stage 1 (PY'82) 0 Obtain items from Table 2. 0 Use existing and well understood RNG system in modified RP experiments with the previous successful RP subjects. 9 Adjust experimental parameters to assure the existence of RP with the RNG. Estimated contract cost: (FY82) ~ Hardware expansion $ 2,000 ~ Senior technical (1/2 time) 60,000 ~ Research analyst (1/4 time) 12,000 ~ Consultants 81400 Total $82f4OO FY'83 cost can be supplied upon request. D. Concluding Remarks There are a number of possible intrusion detector devices one might investigate (e.g., magnetometers, strain guages and lasers). However, to Eli 126 09 SECRET mi Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 Approved For Release 200016K. It RVIDID96.00788 ROO 1300240001-2 Mi avoid a six man-month equipment development effort, we strongly urge the use of the certified RNG system as a starting point. We also wish to point out that the overall intrusion plan (Figure 4) is a series of relatively low cost experiments with well defined success wit criteria that must be met for the continuation of the effort. 4W Table 1 HARDWARE Item Description PK/Intrusion Useage Price - ADC development board Possible PK/PDS disc$1,500 1 2 Parallel input interfaceRemote start of exp.500 Total $2V000 127 SECRET Approved For Release 2000/08/07 : CIA-RDP96-00788ROO1300240001-2 SECREI 10 i" m m am SECRET Figure 4. DKVICE INDEPENDENT INTRUSION DETECTION PLAN - OVERVIEW sm Approved For Release 2000/08/07 : OWRDP96-00788ROO1300240001-2