ANOMALOUS HUMAN-COMPUTER INTERACTION (AHCI): TOWARDS AN UNDERSTANDING OF WHAT CONSTITUTES AN ANOMALY (OR, HOW TO MAKE FRIENDS AND
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP96-00792R000701020005-3
Release Decision:
RIFPUB
Original Classification:
U
Document Page Count:
3
Document Creation Date:
November 4, 2016
Document Release Date:
May 17, 2000
Sequence Number:
5
Case Number:
Content Type:
RP
File:
Attachment | Size |
---|---|
CIA-RDP96-00792R000701020005-3.pdf | 246.09 KB |
Body:
Approved For Release 2009118/15: CIA-RD 1792M0b1O h20005-3
human
n
h
on p
seed informa
pro
side to this debate suggests that errors are caused by
cuts.
e
t
y
adaptive information-processing s
.,++r;r,,,tional field into that of human
sear
ment and decision making in the
d
g
ju
era have pointed out many weaknesse
ha
h
d
paper
esc- - Ps
h
Kahneman and A. Tversky (moo
Thus i
resent the more general processes t
cognitive errors.
certai
rocessing influences. The getnerallye
ti
Kahneman and Tversky sugg
are effecti
of events may b
objects or events,
availability
in perception, men
vidual's judgment of
Wends very much on th
strategy which can lead to
adju stment. Here, individ
ing with an initial value o
justed to account for new
which erroneous beliefs
confirming information.
logical research that
human judgment and
of errors in conclusi
settings. The rese
ent theory of huma
and present them
logical research on
parapsychologists
false-negative con
an
sions about the operation of p-
to stress that
quality of data on the occurrence of psi; and (3) mistaken
while there is some emphasis in parapsychology
g information--this is one way ,,
? of d s-
ibes three areas of
ognitive social psycho-
ear on the question o
ference and consequen
y on the examination
error and indeed, may not b
_P findings of relevance t
This re-
parapsychology
ii the vui-h'. ? .. ,
lusions about the occurrence of psi may be
istaken conelu-
help in eventually identifying m
hancinL the
in human cognition, oul Lhu?
been highlighted by D.
al Review, 1973, 237-251).
on-processing factors may rep-
st that people habitually use 1
o lead to errors. The first of
s
availability, where people's
t b
y
nenev of objects or the likelihood
to the accessibility of items
--;n
-
g
The
~1naLiOn .
---
sor similarity, where an indi-
s
~tivene
that two events are related de-
bilit
y
a
ee to which these events have features
The final information-processing
rrors is judgment by anchoring and
r tart-
o
conclusions that psi has occurred, psychological researc
error logically cuts both ways, and can aid in the identification of
false-positive and false-negative conclusions about the occurrence of
psi.
ANOMALOUS HUMAN-COMPUTER INTERACTION (AHCI):
TOWARS
(OR, AN
HOW TO MAKE FRIENDS AND INFLUENCE
COMPUTERS)
K. Morgan (Dept. of Psychology, Univ9Jty of Edinburgh,
7 George Square, Edinburgh EH8
This paper is an attempt to clarify in what manner a genuine
anomaly can be distinguished from an incident explicable by
physical means. It also tries to exemplify the various methods that
could be used to simulate an anomalous human-computer interaction
(AHCI). This paper does not dwell in any more than a superficial obs manner upon the psychology involvedi in manipulati go bservrrs
which would allow the described phy
out. That would demand a paper in its own right.
Part of the research being carried out at the Koestler Chair
and other institutions is the investigation of anomalous human-
computer interaction. As with any area of parapsychological re-
search there always exists the danger of the researcher mistaking
a normally explicable phenomenon as an anomaly. paper s
written to help people who are confronted by an unusual happening
to evaluate the situation
on a computer sibility of there beng normal methods offsimulating almost any pos
anom aly .
The various categories into which both simulated and genuine
anomalies could fall can be separated into the following:
(1) Human. The majority of so-called anomalies might be
found to be caused by the users' ignorance of their own computer
system or aspects of it. This, coupled with the human trait of
forcing unconnected events into meaningful patterns, might explain
many anomalies.
(2) Software Anomaly. The methods of achieving the simula-
tion of a softwar dware-based) anomaly can be broken down
into the following categories:
(a) Replacement of the target program. The target program
or process is exchanged for an amended version that contains the
extra "feature" that will become the "anomaly."
Approved For Release 2000/08/15: CIA-RDP96-00792R000701020005-3
Approved For Release 2000tGOP15 : CIA-RDP964070RO0O 01020005-3
(b) Adjusting or amending the target program or process.
In this scenario the target process is amended at the same time or
very shortly before the "anomaly." This would of course demand
the knowledge of the specification of the software being used at the
target site.
(c) Breaches in computer /organizational security both prior
to and simultaneously with anomaly. These are often a necessary
prerequisite of any of the above software anomalies. The breach in
security could even be from a remote site, via a computer communica-
tion link that has access to the target system. The use of inter-
preted languages or online debugging (disassembling) tools makes
this reasonably easy.
(3) Hardware Anomaly. This section covers any physical ef-
fect that occurs to an item of computer machinery (but not to the
logic controlling it). These "effects" could often take the form
of either repairing or destroying an item of equipment. These items
could be anything from a personal electronic belonging (e.g., an
electronic watch) to a computer's storage device.
(a) Replacement. In this scenario an exact duplicate of the
target is prepared and exchanged for the target item when the op-
portunity arises. The duplicate has some extra "feature" which will
be used by the false anomalist to simulate the required anomaly.
(b) Adjustment/destruction--"live." To adjust or amend an
item of equipment is not as difficult as it might appear. Much com-
puting equipment is sensitive to one or many of the following en-
vironmental influences : weak magnetic fields, physical force (e.g.,
bending), exposure for long periods to strong sunlight, contact
with sharp objects, extreme humidity, temperatures outside the
tolerated range, contact with static electricity, and any substances
or object making contact with a recording or electrically conductive
surface.
(c) Breaches in computer /organizational security before or
simultaneously with anomaly. In contrast to the previous scenarios,
simulating hardware anomalies requires the physical presence of the
false anomalist or environmental influence in order to achieve the
anomaly.
(4) External to Computer System. Such things as electrical
mains fluctuations are a possible example of natural "disasters,"
and if the fluctuation coincided with some other meaningful event
the users might decide that an anomaly had occurred which had a
correlation with that meaningful event, thus starting local lore
about this false correlation.
Methods of Avoiding Computer-Based Fraudulent Anomalies
Examples of new technology that might help alleviate the above-
mentioned problems are
(1) WORMS (write once read many times) optical disks.
These (at present) are noneditable and are immune to "grubby
thumbs," magnetic fields, and static. They are therefore much
better potential psi-corruption targets than the currently favorite
floppy disk, especially if the target data on the disk are well en-
crypted and the disk uniquely identified.
(2) Optical fiber cables. This makes data transmission line
monitoring or adjustment much more complex.
(3) Automated technical advisers for computer-based security.
These can rapidly and thoroughly analyze a large and highly com-
plex system specification for security weaknesses. They are only
as good as the level of detail or accuracy in the specification and
the expertise of their user.
(4) Gypsy verification environments & (5) Program analysis
tools. Both of these methods could be useful in the analysis of a
piece of code that has been in an "anomaly." Again, they are sub-
ject to the same weaknesses discussed under the previous heading.
(6) Cryptographic methods. These can be highly effective
in preventing access to information, provided a sufficiently good
encryption method is selected.
(7) Shielding. Simple shielding of vdu screen emission can
eliminate the chance of a computer screen being reconstituted out-
side the system confines.
This paper has tried to portray the various scenarios that
could be misinterpreted as an "anomalous" human-computer inter-
action (AHCI). It also tried to show that there are conceptual pat-
terns that allow AHCI anomalies to be categorized, along with their
possible fraudulent explanations. It is hoped that armed with such
a method of categorization experimenters may be able better to re-
cord and evaluate the intriguing field of AHCI. In such evaluations
it may be more cost effective to create a means of detecting a fraud-
ulent anomaly rather than to proof a system against every possible
threat. A highly motivated false anomalist with large financial and
time resources might be able to create fraudulent anomalies, regard-
less of the tightest precautions. Experimenters might therefore
find it helpful to adopt an experimental condition where no one
Approved For Release 2000/08/15: CIA-RDP96-00792R000701020005-3
Approved For Release 2000/08/15: CIA-RDP96-00792R000701020005-3
Papers
star "makes or breaks" the results. By using large "anonymous"
source groups the incentive for any one individual to create false
anomalies might be greatly reduced.
WHEN WILL WE BEGIN TO REDUCE ALPHA AND BETA ERRORS
IN STATISTICAL PSI EXPERIMENTS?
Ulrich Timm (Institut fur Grenzgebiete der Psychologie and
Psychohygiene, Eichhalde 12, 7800 Freiburg i.Br., West
Germany)
In many psi experi
made, after whose correct
appears. These are Type
That does not necessarily
real psi effects do not exis
correctly, are often so inef
instability, and inconsistenc
seldom lead to statistical sign
cal methods creates Type II er
tical selection errors are
'statistical significance dis-
er, that in these experiments
e usual methods, if utilized
ith regard to the rareness,
e. This inefficiency of statisti-
or beta errors. Therefore,
gnificances but also the reduction
ase of real significance.
First I give an overview of tho e alpha errors that I call
statistical selection errors. T ese sho , simply stated, the follow-
ing three qualities (Timm, 4, 1983, 19k-229):
(1) From a set of st istical result a single result is se-
lected and eval ted by some si ficance test.
(2) The selection not performed radomly but according
to a criterion hat is related to th level of the single
result in that it directly or indirectly favors positive
(3) Despite this success-dependent selection, the significance
test is carri~d out and interpreted in the usual manner
without any correction.
Approved For Release 2000/08/15: CIA-RDP96-00792R000701020005-3