Analysis Protocol

Analysis Protocol / Analysis Clarified


by Valtra
26 October 1998

I feel it is important to describe the Analysis Protocol that the Colts execute on the operational targets.

It is imperative to emphasize the impeccable chain of custody of the target that is maintained throughout the entire process. The Targeteer is the sole custodian of the target cue and feed back information until the Working Notes and Scenarios prepared by the Analyst is accepted by the Targeteer.

The Targeteer issues the 8-digit target ID to the Mission Manager to be worked Double Blind. The Mission Manager schedules the sessions and issues the target ID to the Viewer and the Monitor.

After the target has been worked double blind by the Viewer, Mission Manager and the Monitor, the three sessions are submitted to the Analyst for corroborative data analysis. The Analyst examines each of the three sessions and prepares a Data Extraction, isolating and defining the key data points from each of the sections of the sessions. Any data that are corroborated by two or more of the viewers’ work are highlighted and notated separately in the Analyst’s Working Notes as signifiers of the target’s nature.

The Analyst then examines the Working Notes and extrapolates possible Scenarios that may define the target’s identity. The Scenarios are driven solely from the Analyst’s Working Notes, which again comprise only the data that are corroborated by two or more viewers’ sessions.

The Analyst then submits the Working Notes and the Scenarios to the Targeteer for review. The Targeteer examines the accuracy of how the Working Notes and Scenarios were derived. If all is in order, the Targeteer then reveals the target cue and any feedback information to the Analyst.

A collateral data search is conducted and the session work is corroborated with the target cue, feedback information and any other collateral data that is found. The Analyst then reevaluates all the sessions for congruency with the target information. Each viewer’s work is tallied as to percentage of congruent data collected to the overall data content of the session. The Analyst then briefs the Viewer, Mission Manager and Monitor as to the congruency of their work. An Analyst’s Assessment is prepared to provide the Targeteer with probable target identification and recommendations for possible subcues to further work the target.

Aloha, Valtra


by Glenn
26 October 1998

MJ001 is doing very well in the basic analysis done on their work. Valtra’s recount of the procedural aspects was very good, and is how it works.

The data Extraction Matrix is used to find only the data that corroborates among the sessions. A data item that does surface in two or more sessions from different viewers will cause an entry to the working notes.

Any entry to the working notes must have an audit trail to that data in the sessions. This is non-negotiable. In basic analysis the analyst is not allowed to report as a working note anything not qualified by the session work. It is also the case that no data that does exist in the sessions will be stretched or massaged to illustrate a higher level thought or statement than it actually is.

Once the working notes are complete the analyst then can format between one and three target scenarios based totally and only on the working notes. These scenarios must audit trail to data in the working notes. No words, ideas or concepts can be reported that do not reflect data flow clearly present in the working notes.

Advanced Analysis training must be conducted before the Final Analytical assessment can be produced. This final report on the target to the tasker is a liability to the Analyst alone. It is his/her valued judgement to the tasker. Advanced analysis is a web of techniques and puzzle piecing that will take sometime to master.

We have started basic analysis training and will push on to the advanced techniques as we go along. So bear with us as we build some Analysts.

Aloha, Glenn

Scroll to Top