Sorry if I came off as too straightforward on the analysis.
Certain things jump out at you when you've had hands on experience in the subject.
For example, implementing ciphers make no sense if you consider several facts about how straightforward psychic targeting is carried out.
Like C3Gamma means absolutely nothing. Both to the CRV team nor their psychic components and extended awareness.
C3Gamma is what you'd understand as a pointer/cipher. Something that substitutes for something else. A reference.
By itself it is useless. Sort of like a nick name that has nothing associated with it. It means nothing.
Unless a particular neurological datapoint inside a person or post-processed (psychic imprinted) information is associated with a piece of data with the term "C3Gamma". It is essentially a term without meaning.
-----------------
Now, if you associate a datapoint (C3Gamma) with a kinetic weapon on some sub in the Navy. That can be meaningful as a CRV/RV target.
It all depends on whether the CRV team can query the cipher and have it associated with targeting data.
For example, "a location" that someone knows what C3Gamma refers to or what it represents.
And additional properties (lines of association) like what it is, what it does, where it is, who knows of it, where are the XXXX devices located.
As you probably are reading this, you can figure out what you are actually doing is querying remote sources of information (usually human) to transform a nick name into actual targeting descriptions or vectors that isolate the identity of a target.
https://en.wikipedia.org/wiki/Six_degrees_of_separation
From there you spread out accessing human beings thoughts and knowledge base on what C3Gamma represents.
That is where CRV (probably in a different implementation than this guy describes) would jot down what they gather about human nodes with disparate piece of data. So it is basically espionage without a physical presence.
Except your either observing the external world if you know where you are looking; or your are remotely running queries against the person with targeting information. Either in their organic memories or their post-processed psychic imprints of those organic memories. (less noticeable to your average individual)
From querying each node, and it's post-processed (psychic data). You can figure out how big is the kinetic missile, what properties it has (tons, color, shape, volume, details like speed or deployment issues), or any number of things. Anything the target knows, the CRV'er should assimilate and absorb as their own knowledge.
Putting all the pieces together they should eventually know as much as the (human) nodes combined.
----------------------
Of course the ET explain
pretty plainly in lessons that to circumvent this vulnerability, the average project has multiple individuals who are compartmentalized and each team knows the same project by different names and different details and teams are often not allowed to associate with one another for reasons beyond their understanding. (protocol)
So a group of 6 teams may know the same project under various names that do not coincide with one another. Usually the ET explain the human protocols are made so that they do not need to become aware of that fact. In fact, the lessons the ET give you about how to understand this is that cover stories are given to compartments so that they do not really fully know what they are supposedly working on.
Lines of association and psychic targeting techniques break between teams because there should not be (in the explanations given by the ET on common knowledge) any Rosetta stone in common between the project teams. What one team calls "Eagle Break" the next team calls "Figure Pusher". Even if they are in the same room on different sides. They don't know (according to the ET examples) what the project is called and the names are throw away terms.
And that is only on white world secrecy.
------------------
When they explain black world secrecy and unknown projects the designs of the projects are inhumane.
People are scanned psychically on a regular basis and precognitive assessed on a repeated basis (never known when they are being scanned)*(only aware that they are being monitored at all times). They don't even think freely within themselves and are described as living under extreme ongoing tension.
People who are at risk of defecting even if not in present time are passed on to a different (human) team by the ET's and they are "discharged" (dead, or "re-purposed"). They have no right to live or decide anything important about where they do the next job. The main strategy is to recycle individuals until they burn out. They explained that vast majority end up as corpses one way or another. The ones who live are never going to see common society due to risks of leaking information.
The ET's said the ones who are extremely "lucky" (handful) and are favorably treated have the option of being implanted with invasive false memories and starting a new life as a disinformation agent. They explained that is considered something like an honorable discharge that very (VERY) few obtain from pretty evil ET project managers.
------------------
The unknown projects (unknown to the ET but assumed to exist) are completely invisible and are largely unknown in details. They are human led and they are impossible to find by psychic means. Several of the ET's mentioned over the years that human installations (as a standard) use light security measure like generating noise on a non-physical level to disrupt parts of the psychic targeting methods.
Others supposedly use a disruptive phenomena (that I think) is electrical or physical in nature to isolate facilities from psychic intrusion. And some heads of state in the white world have wearable devices (never seen it) that looks like a short pen which generates scattering noise. They also mentioned the intelligence agencies also supposedly use electrical (physical) phenomena to broadcast noise surrounding facilities to disrupt certain ranges of phenomena (less sophisticated). (different from targeting disruption) I found out this was actually true in several documentaries about how NSA and CIA buildings have countermeasure for electronic spying.
==================
Anyway, if you can imagine, the ciphers by themselves mean nothing. So if the man implied they use ciphers, then there is logically a third party or "a system" in place to connect the cipher with the target.
It doesn't automatically work by itself.
What is the third party? Who knows. If they are getting 70% hit ratios in a group, then they either have a third party who is talented and is projecting the data into them so they can jot it down. Either that or the USA must have something that is capable of targeting a large scope of people and running queries to see what comes up.
Honestly, do not know what the missing element might be. But from the way he describes his activity, either he is lying (understandable) or he doesn't know what feeds him the information. The setup doesn't make sense without the missing component.
---------------
He seems to have performed RV as he describes it, but notices that "CRV" is less detectable.
So it implies there is a different implementation at work when they are doing CRV. Nothing he shared seems to imply he knows what exactly the missing element might be.