Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
CIA RDP96 00788r001800210001 0
Page 53
53 / 57
Approved For Reledbd NGLASSIELED oo7ssr001 800210001-0
(U)
Specifically, in accordance with an a priori defined set of rules con-
sistent with the training program under investigation, each response is
assessed as to the presence or absence of each element in the list. (Of
course, the assessment is accomplished without any knowledge of the target
for that particular session, that is, in a double-blind fashion.) Thus a
20-bit binary number can be constructed that represents the information
contained in the RV response.
D. (U) RV Analysis
(U) An assessment of RV accuracy in a given RV session can be made
by comparing the 20-bit numbers for the target and response. Specifically,
the accuracy is defined as the percent of the target information (pércent
of target elements) that was correctly perceived by the remote viewer.
Similarly, an assessment of RV reliability can be made by determining the
efficiency of the response. The RV reliability is defined as the percent
of the RV response (percent of RV response elements) that was correct. Both
RV accuracy and RV reliability provide quanitative measures of the RV
response to a given target. To provide a quantitative measure of progress
it is necessary to assess a given RV response not only with respect to its
corresponding target but also with respect to all other targets in the
target pool. This is accomplished with the aid of a computer and data base
Management techniques. The result of this analysis is a statistical
measure of RV training and a quantitative measure of the information
transfer in the RV process.
E. (U) Summary
(U) The following is a step-by-step representation of the analysis
of a single RV session:
(1) The response is assessed (without knowledge of the
corresponding target) as to the presence or absence
of each of the items shown in Table A-1.
(2) A 20-bit binary number is constructed from Step 1.
(3) The predefined 20-bit representation of the cor-
responding target is obtained.
49
UNCLASSIFIED
Approved For Release 2002/05/17 : CIA-RDP96-00788R001800210001-0
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic