Remote Tampering: Declassified SRI Project
An excerpt from "Perceptual Augmentation Techniques, Part One--Executive Summary" by Harold Puthoff and Russell Targ, SRI Project 3183, Final Report, Covering the Period January 1974 through February 1975. RECENTLY DECLASSIFIED BY THE CIA.
"The goal of this program was to determine the extent to which certain individuals obtain accurate information about their environment under conditions thought to be secure against such access and without the use of known human perceptual modalities...
"As a result of exploratory research on human perception carried out in SRI's Electronics and Bioengineering Laboratory, we observed the emergence of a perceptual channel whereby certain individuals access and describe, by means of mental imagery, randoml y-chosen remote sites located several miles or more away. In this final report, we document the study at SRI of this human information-accessing capability which we call 'remote viewing'..."
"Perturbation of Remote Equipment"
"Additional experimentation was initiated to investigate the possibility that the remote sensing channel may possess bilateral aspects; for example, it might be possible to couple energy from an individual to a remote location as well as in reverse. To te st this hypothesis, experiments were carried out with a sensitive magnetometer in an adjoining laboratory as the remote target. Use of an ORD-developed magnetometer was arranged by ORD personnel. In a series of thirteen 10-trial runs with 50 seconds per t rial, perturbations of the magnetometer by a subject gifted in remote viewing were obtained under strict randomization protocol, yielding a positive result significant at the p=0.004 level. Because of the potential significance and implications of such fi ndings, we intend to collect considerable additional data before arriving at a a hard conclusion. Nonetheless, as a tentative conclusion there is evidence that a piece of sensitive equipment can be perturbed by a subject during remote viewing, thus implyi ng that the information channel under investigation may sustain energy transfer in either direction."
Suggested Pdf Resources
- Security Issues in Mobile Agents
- lected by the agent from one host should be protected from tampering by another host in the . wants to use large amounts of data located at a remote site. As an In this project, we look into the general issues in mobile agent security, ...
- Technical Steps to Support Nuclear Arsenal Downsizing
- Declassify the total number of US nuclear weapons – deployed, reserve and retired – and . focused primarily in the areas of radiation detection, remote monitoring, and tamper-indicating devices — were developed over the last 15 years to .
- Risking Communications Security: Potential Hazards of the Protect
- NEUMANN. SRI. International.
- Risking Communications Security: Potential Hazards of the “Protect
- Peter G. Neumann, SRI International. Jennifer 2002, it declassified its opinion, helping to shape the later debate on the PATRIOT Act renewal ..
- From Security to Dependability
- In the ESPRIT research project. PDCS, a formal . cus on only one aspect of declassification (what is declassified, who controls Seri, Mouna; Sanders, Bill.
Suggested News Resources
- Military Interactions with Extraterrestrials
- For a good source of declassified and leaked documents one can go to http://majesticdocuments.com/ .
Suggested Web Resources
Related searchesgeological eras
history of london population
appeal to motive examples
space-time block code alamoutis code