psychology

Politics as pathology

From Charles Platt’s “The Profits of Fear” (August 2005):

It seems to me axiomatic that most primary actors on the global stage are disturbed people, because an obsessive lust for power is itself a pathology, and in a competition among thousands or millions of power seekers, only the most pathological are likely to win. …

I think Bush understood very clearly a fundamental fact of politics: Our leaders are less valuable to us at times when we feel more secure.

Politics as pathology Read More »

The Cold War as game theory

From Charles Platt’s “The Profits of Fear” (August 2005):

Game theory began with the logical proposition that in a strategic two-player game, either player may try to obtain an advantage by bluffing. If the stakes are low, perhaps you can take a chance on trusting your opponent when he makes a seemingly fair and decent offer; but when the penalty for being deceived can be nuclear annihilation, taking a chance is out of the question. You work on the principle that the person you are dealing with may be utterly ruthless, unethical, and untrustworthy, no matter how peaceful his intentions may seem. You also have to assume that he may be smart enough to use game theory just like you; and therefore, he will assume that _you_ are ruthless, unethical, and untrustworthy, no matter how peaceful _your_ intentions may seem. In this way a supposedly rational system of assessment leads to a highly emotional outcome in which trust becomes impossible and strategy is based entirely on fear. This is precisely what happened during the decades of the Cold War.

The Cold War as game theory Read More »

Neil Postman: the medium is the metaphor for the way we think

From Tom Stites’s “Guest Posting: Is Media Performance Democracy’s Critical Issue?” (Center for Citizen Media: Blog: 3 July 2006):

In late 1980s the late Neil Postman wrote an enduringly important book called Amusing Ourselves to Death. In it he says that Marshall McLuhan only came close to getting it right in his famous adage, that the medium is the message. Postman corrects McLuhan by saying that the medium is the metaphor – a metaphor for the way we think. Written narrative that people can read, Postman goes on, is a metaphor for thinking logically. And he says that image media bypass reason and go straight to the emotions. The image media are a metaphor for not thinking logically. Images disable thinking, so unless people read and use their reason democracy is disabled as well.

Neil Postman: the medium is the metaphor for the way we think Read More »

To combat phishing, change browser design philosophy

From Federico Biancuzzi’s “Phishing with Rachna Dhamija” (SecurityFocus: 19 June 2006):

We discovered that existing security cues are ineffective, for three reasons:

1. The indicators are ignored (23% of participants in our study did not look at the address bar, status bar, or any SSL indicators).

2. The indicators are misunderstood. For example, one regular Firefox user told me that he thought the yellow background in the address bar was an aesthetic design choice of the website designer (he didn’t realize that it was a security signal presented by the browser). Other users thought the SSL lock icon indicated whether a website could set cookies.

3. The security indicators are trivial to spoof. Many users can’t distinguish between an actual SSL indicator in the browser frame and a spoofed image of that indicator that appears in the content of a webpage. For example, if you display a popup window with no address bar, and then add an image of an address bar at the top with the correct URL and SSL indicators and an image of the status bar at the bottom with all the right indicators, most users will think it is legitimate. This attack fooled more than 80% of participants. …

Currently, I’m working on other techniques to prevent phishing in conjunction with security skins. For example, in a security usability class I taught this semester at Harvard, we conducted a usability study that shows that simply showing a user’s history information (for example, “you’ve been to this website many times” or “you’ve never submitted this form before”) can significantly increase a user’s ability to detect a spoofed website and reduce their vulnerability to phishing attacks. Another area I’ve been investigating are techniques to help users recover from errors and to identify when errors are real, or when they are simulated. Many attacks rely on users not being able to make this distinction.

You presented the project called Dynamic Security Skins (DSS) nearly one year ago. Do you think the main idea behind it is still valid after your tests?

Rachna Dhamija: I think that our usability study shows how easy it is to spoof security indicators, and how hard it is for users to distinguish legitimate security indicators from those that have been spoofed. Dynamic Security Skins is a proposal that starts from the assumption that any static security indicator can easily be copied by attacker. Instead, we propose that users create their own customized security indicators that are hard for an attacker to predict. Our usability study also shows that indicators placed in the periphery or outside of the user’s focus of attention (such as the SSL lock icon in the status bar) may be ignored entirely by some users. DSS places the security indicator (a secret image) at the point of password entry, so the user can not ignore it.

DSS adds a trusted window in the browser dedicated to username and password entry. The user chooses a photographic image (or is assigned a random image), which is overlaid across the window and text entry boxes. If the window displays the user’s personal image, it is safe for the user to enter his password. …

With security skins, we were trying to solve not user authentication, but the reverse problem – server authentication. I was looking for a way to convey to a user that his client and the server had successfully negotiated a protocol, that they have mutually authenticated each other and agreed on the same key. One way to do this would be to display a message like “Server X is authenticated”, or to display a binary indicator, like a closed or open lock. The problem is that any static indicator can be easily copied by an attacker. Instead, we allow the server and the user’s browser to each generate an abstract image. If the authentication is successful, the two images will match. This image can change with each authentication. If it is captured, it can’t be replayed by an attacker and it won’t reveal anything useful about the user’s password. …

Instead of blaming specific development techniques, I think we need to change our design philosophy. We should assume that every interface we develop will be spoofed. The only thing an attacker can’t simulate is an interface he can’t predict. This is the principle that DSS relies on. We should make it easy for users to personalize their interfaces. Look at how popular screensavers, ringtones, and application skins are – users clearly enjoy the ability to personalize their interfaces. We can take advantage of this fact to build spoof resistant interfaces.

To combat phishing, change browser design philosophy Read More »

Why structureless is not only impossible, but counterproductive

From Jo Freeman’s “The Tyranny of Structurelessness” (1970):

During the years in which the women’s liberation movement has been taking shape, a great emphasis has been placed on what are called leaderless, structureless groups as the main form of the movement. …

The idea of ‘structurelessness’, however, has moved from a healthy counter to these tendencies to becoming a goddess in its own right. The idea is as little examined as the term is much used, but it has become an intrinsic and unquestioned part of women’s liberation ideology. …

If the movement is to move beyond these elementary stages of development, it will have to disabuse itself of some of its prejudices about organisation and structure. There is nothing inherently bad about either of these. …

Contrary to what we would like to believe, there is no such thing as a ‘structureless’ group. Any group of people of whatever nature coming together for any length of time, for any purpose, will inevitably structure itself in some fashion. The structure may be flexible, it may vary over time, it may evenly or unevenly distribute tasks, power and resources over the members of the group. But it will be formed regardless of the abilities, personalities and intentions of the people involved. The very fact that we are individuals with different talents, predisposition’s and backgrounds makes this inevitable. Only if we refused to relate or interact on any basis whatsoever could we approximate ‘structurelessness’ and that is not the nature of a human group. …

Thus ‘structurelessness’ becomes a way of masking power, and within the women’s movement it is usually most strongly advocated by those who are the most powerful (whether they are conscious of their power or not). The rules of how decisions are made are known only to a few and awareness of power is curtailed by those who know the rules, as long as the structure of the group is informal. Those who do not know the rules and are not chosen for initiation must remain in confusion, or suffer from paranoid delusions that something is happening of which they are not quite aware. …

A structured group always has a formal structure, and may also have an informal one. An unstructured group always has an informal , or covert, structure. It is this informal structure, particularly in unstructured groups, which forms the basis for elites. …

Correctly, an elite refers to a small group of people who have power over a larger group of which they are part, usually without direct responsibility to that larger group, and often without their knowledge or consent. A person becomes an elitist by being part of, or advocating, the rule by such a small group, whether or not that individual is well-known or not known at all. Notoriety is not a definition of an elitist. The most insidious elites are usually run by people not known to the larger public at all. Intelligent elitists are usually smart enough not to allow themselves to become well- known. When they become known, they are watched, and the mask over their power is no longer firmly lodged. …

Only three techniques have ever been developed for establishing mass group opinion: the vote or referendum, the public opinion survey questionnaire and the selection of group spokespeople at an appropriate meeting. The women’s liberation movement has used none of these to communicate with the public. Neither the movement as a whole nor most of the multitudinous groups within it have established a means of explaining their position on various issues. But the public is conditioned to look for spokespeople. …

The more unstructured a movement is, the less control it has over the directions in which it develops and the political actions in which it engages. This does not mean that its ideas do not spread. Given a certain amount of interest by the media and the appropriateness of social conditions, the ideas will still be diffused widely. But diffusion of ideas does not mean they are implemented; it only means they are talked about. Insofar as they can be applied individually they may be acted upon; insofar as they require co-ordinated political power to be implemented, they will not be.

Why structureless is not only impossible, but counterproductive Read More »

The power of PR

From Paul Graham’s “The Submarine” (April 2005):

Why do the media keep running stories saying suits are back? Because PR firms tell them to. One of the most surprising things I discovered during my brief business career was the existence of the PR industry, lurking like a huge, quiet submarine beneath the news. Of the stories you read in traditional media that aren’t about politics, crimes, or disasters, more than half probably come from PR firms.

I know because I spent years hunting such “press hits.” Our startup spent its entire marketing budget on PR: at a time when we were assembling our own computers to save money, we were paying a PR firm $16,000 a month. And they were worth it. PR is the news equivalent of search engine optimization; instead of buying ads, which readers ignore, you get yourself inserted directly into the stories. …

If anyone is dishonest, it’s the reporters. The main reason PR firms exist is that reporters are lazy. Or, to put it more nicely, overworked. Really they ought to be out there digging up stories for themselves. But it’s so tempting to sit in their offices and let PR firms bring the stories to them. After all, they know good PR firms won’t lie to them.

A good flatterer doesn’t lie, but tells his victim selective truths (what a nice color your eyes are). Good PR firms use the same strategy: they give reporters stories that are true, but whose truth favors their clients. …

Where the work of PR firms really does get deliberately misleading is in the generation of “buzz.” They usually feed the same story to several different publications at once. And when readers see similar stories in multiple places, they think there is some important trend afoot. Which is exactly what they’re supposed to think. …

Remember the exercises in critical reading you did in school, where you had to look at a piece of writing and step back and ask whether the author was telling the whole truth? If you really want to be a critical reader, it turns out you have to step back one step further, and ask not just whether the author is telling the truth, but why he’s writing about this subject at all.

Online, the answer tends to be a lot simpler. Most people who publish online write what they write for the simple reason that they want to. You can’t see the fingerprints of PR firms all over the articles, as you can in so many print publications — which is one of the reasons, though they may not consciously realize it, that readers trust bloggers more than Business Week. …

I didn’t realize, till there was an alternative, just how artificial most of the writing in the mainstream media was. I’m not saying I used to believe what I read in Time and Newsweek. Since high school, at least, I’ve thought of magazines like that more as guides to what ordinary people were being told to think than as sources of information.

The power of PR Read More »

The feeling of being watched causes greater honesty

From “Big Brother eyes ‘boost honesty’” (BBC News: 28 June 2006):

The feeling of being watched makes people act more honestly, even if the eyes are not real, a study suggests.

A Newcastle University team monitored how much money people put in a canteen “honesty box” when buying a drink.

They found people put nearly three times as much in when a poster of a pair of eyes was put above the box than when the poster showed flowers.

The brain responds to images of eyes and faces and the poster may have given the feeling of being watched, they say. …

Dr Melissa Bateson, a behavioural biologist from Newcastle University and the lead author of the study, said: “We found that people paid 2.76 times as much money when we put a notice on the wall that featured a pair of eyes as opposed to when the image was of some flowers.”

The feeling of being watched causes greater honesty Read More »

Spinoza’s conception of God

From Laura Miller’s “Everybody loves Spinoza” (Salon: 17 May 2006):

Key to Spinoza’s heresy was his monism, his belief that everything that exists is essentially a single thing, “nature” (that is, the infinite universe), and that this is identical with God. (As a girl, Goldstein was taught that Spinoza wickedly equated God with nature, when Jews and Christians agreed that God is supernatural, outside of nature, and a person.) Everything we experience — people, events, objects — is simply a “mode” of that single “Substance” or essence. Because God/Nature is infinite and we are finite, we perceive these things to be separate when they are not; all separate identities, including our own individuality, are merely an illusion or misperception. We perceive good and evil when neither really exists, from the perspective of God. The only way we can come to understand the true unity of the world is through the understanding of pure reason, which is integral to Substance in the same way that roundness is integral to a circle.

We can’t fully grasp this — our minds aren’t adequate to the task — but with a dash of intuition, we can glimpse it and experience Spinoza’s notion of true happiness. We can then attain what Goldstein calls a “radical objectivity,” a perspective that’s outside of our own limited identity. This objectivity will enable us to see the insignificance of our own pains, pleasures and losses except insofar as they help or hinder our ability to reason. We will realize that a life of restraint and peaceful coexistence with our fellow man is exactly what will sustain us in this cause; self-interest and virtue will be revealed as identical. Finally, we will be able to regard with tranquility the fact that we are mortal, that our minds, like our bodies, are simply a mode of the great infinity of Substance, and will someday end.

Spinoza’s conception of God Read More »

Media-induced fear & its effects

From John Twelve Hawks’s “ How We Live Now” (2005):

In his insightful book “The Culture of Fear,” Barry Glassner shows how many of our specific fears are created and sustained by media manipulation. There can be an enormous discrepancy between what we fear and the reality of what could happen to us. Glassner analyzes several “threats” such as airplane disasters, youth homicide, and road rage, and proves that the chance of any of these dangers harming an individual is virtually nonexistent.

Although Glassner accurately describes the falseness of a variety of threats, he refrains from embracing any wide-reaching explanation. It can be argued that the constant message of impending destruction is simply a way for the media to keep us watching television – “Are cyber predators targeting your children?” is a tagline that is going to get the audience’s attention. What interests me is not the reality of these threats, but the effect they have on our view of the world. Fear encourages intolerance, racism and xenophobia. Fear creates the need for a constant series of symbolic actions manufactured by the authorities to show that – yes, they are protecting us from all possible dangers.

Media-induced fear & its effects Read More »

5 reasons people exaggerate risks

From Bruce Schneier’s “Movie Plot Threat Contest: Status Report” (Crypto-Gram Newsletter: 15 May 2006):

In my book, Beyond Fear, I discussed five different tendencies people have to exaggerate risks: to believe that something is more risky than it actually is.

1. People exaggerate spectacular but rare risks and downplay common risks.

2. People have trouble estimating risks for anything not exactly like their normal situation.

3. Personified risks are perceived to be greater than anonymous risks.

4. People underestimate risks they willingly take and overestimate risks in situations they can’t control.

5. People overestimate risks that are being talked about and remain an object of public scrutiny.

5 reasons people exaggerate risks Read More »

Why airport security fails constantly

From Bruce Schneier’s “Airport Passenger Screening” (Crypto-Gram Newsletter: 15 April 2006):

It seems like every time someone tests airport security, airport security fails. In tests between November 2001 and February 2002, screeners missed 70 percent of knives, 30 percent of guns, and 60 percent of (fake) bombs. And recently, testers were able to smuggle bomb-making parts through airport security in 21 of 21 attempts. …

The failure to detect bomb-making parts is easier to understand. Break up something into small enough parts, and it’s going to slip past the screeners pretty easily. The explosive material won’t show up on the metal detector, and the associated electronics can look benign when disassembled. This isn’t even a new problem. It’s widely believed that the Chechen women who blew up the two Russian planes in August 2004 probably smuggled their bombs aboard the planes in pieces. …

Airport screeners have a difficult job, primarily because the human brain isn’t naturally adapted to the task. We’re wired for visual pattern matching, and are great at picking out something we know to look for — for example, a lion in a sea of tall grass.

But we’re much less adept at detecting random exceptions in uniform data. Faced with an endless stream of identical objects, the brain quickly concludes that everything is identical and there’s no point in paying attention. By the time the exception comes around, the brain simply doesn’t notice it. This psychological phenomenon isn’t just a problem in airport screening: It’s been identified in inspections of all kinds, and is why casinos move their dealers around so often. The tasks are simply mind-numbing.

Why airport security fails constantly Read More »

The way to trick smart people

From Paul’s “The easiest way to fool smart people“:

There’s a saying among con-men that smart people are easier targets, because they don’t think they can be conned.

I’m not sure if that’s true, but there’s one scam that’s almost guaranteed to make smart people switch off their brains and reach for their wallets. It’s a trick that’s used so pervasively in our culture, that once you become aware of it, you start to see it everywhere. …

Most smart people have a hidden weakness and it’s this – they’re absolute suckers for anything that sounds clever.

As soon as you start hitting people with technical terms, fancy graphs, famous names and the like, you’ll immediately increase your credibility. If they’re smart, they’re even more likely to find themselves nodding in agreement. Many intelligent people would rather cut off a finger than admit they don’t know what you’re talking about. …

Even better, they can pretend to be teaching their audience something important. A person who was previously completely ignorant about quantum physics now feels as if they understand something about it – even if that something is absolute baloney. The audience have been fed ideas they’ll now defend even against someone who’s a real expert in that subject. Nobody likes to be told that something they’ve been led to believe is wrong. …

Consultants behave this way because they know that’s how to get a sale. Bombard people with clever-sounding stuff they don’t really understand, and they’ll assume that you’re some kind of genius. It’s a great way of making money.

Stock analysts, economic forecasters, management consultants, futurologists, investment advisors and so on use this tactic all the time. It’s their chief marketing strategy for the simple reason that it works.

The way to trick smart people Read More »

The history of solitary confinement

From Daniel Brook’s “A History of Hard Time” (Legal Affairs: January/February 2003):

Dickens wasn’t the first European intellectual who had crossed the Atlantic to visit Eastern State Penitentiary. A decade earlier, Alexis de Tocqueville had been sent by the French government to study the Philadelphia prison. …

What drew the attention of Americans and Europeans was an innovative method of punishment being pioneered at the prison called solitary confinement. While the practice had roots in medieval monasteries, where it was used to punish disobedient monks, solitary confinement came to prominence as a form of criminal punishment in the United States soon after the Revolution. …

In colonial America, capital punishment had been common, and not just for murder – burglary and sodomy could earn an offender the death penalty as well. For less serious offenses, criminals were generally subjected to physical punishments meted out on the public square. In a frontier nation of small towns, public embarrassment was seen as the key to deterring crime. Physical punishment, whether in the form of the stockade or the whipping post, was combined with the psychological punishment of being shamed in front of the community. Jails existed, but they were used mainly to hold criminals before trial and punishment. There were no cells and few rules: Men and women were housed together, and alcohol was often available. …

In 1787, at a soiree held in Benjamin Franklin’s living room, [Dr. Benjamin Rush of Philadelphia, a signatory of the Declaration of Independence & widely regarded as America’s foremost physician] presented an essay titled, “An Enquiry Into the Effects of Public Punishments Upon Criminals, and Upon Society.” Rush declared that “crimes should be punished in private, or not punished at all.” He claimed that public punishment failed to rehabilitate the criminal and risked letting the convict become an object of community sympathy. In lieu of public, physical punishments, Rush endorsed the creation of a “house of repentance.” Grounded in the Quaker principle that each individual is blessed with “Inner Light,” Rush envisioned a place of anonymity, solitude, and silence, where prisoners could dwell on their crimes, repent, and return rehabilitated into society. …

In 1821, the reformers finally convinced the Pennsylvania legislature to approve funding for Eastern State Penitentiary, which would be the largest public building in the country; with a price tag of nearly $800,000, it was likely the most costly one as well. No expense was spared: To prevent disease, each cell in the new prison was equipped with a toilet, a rare luxury at the time. When the penitentiary opened in 1829, President Andrew Jackson was still using an outhouse on the White House lawn.

The principles of the penitentiary system – silence, solitude, surveillance, and anonymity – were incorporated into the architectural plan. Eastern State was designed by John Haviland, a young architect, who proposed a hub-and-spokes model that allowed for constant surveillance. Inmates were housed in 8-by-12-foot cells arranged along a series of cellblocks radiating out from a central observation tower.

Each prisoner remained in his cell at all times, save for a brief daily exercise period held in an individual pen adjoining each cell. Prisoners ate their meals in their cells and did small-scale prison labor there like shoemaking. On the rare occasions when prisoners were allowed to leave their cells, they were prevented from interacting with other prisoners by hoods they were forced to wear to protect their anonymity. They were also forced to use numbers instead of names for the same reason. Silence was maintained at all times in the prison, and reading the Bible was the only activity other than labor that was permitted. Reformers believed that cutting inmates off from the world would foster meditation that would lead to rehabilitation, so visits from family or friends were prohibited. On average, inmates spent two to four years alone in their cells, underneath a single round skylight, known in the prison as the “eye of God.”

The expense of the building limited its influence in the United States, but Eastern State was widely copied in Europe and even in Latin America and Japan, where economic conditions made the model more attractive. Over 300 prisons were built on Eastern States’ hub-and-spokes model, in cities as diverse as London, Paris, Milan, St. Petersburg, and Beijing. Architectural historians consider the hub-and-spokes penitentiary to be the only American building type to have had global influence until the first skyscrapers began to rise in Chicago and New York in the 1880s. …

Dickens, who also interviewed prisoners at Eastern State, was far more skeptical. In his travelogue, American Notes, he described Philadelphia’s system of “rigid, strict, and hopeless solitary confinement” as “cruel and wrong.” …

Dickens didn’t accept that the penitentiary represented human progress over the days of floggings on the public square, or as his prose suggested, even the medieval torture chamber. “I hold this slow and daily tampering with the mysteries of the brain to be immeasurably worse than any torture of the body.” …

In New York, at the Auburn prison near Syracuse and later at Sing Sing in Westchester County, a modified system of solitary confinement was being put into practice. While inmates spent their nights in solitary cells, they worked together silently in a common area during the day. This allowed wardens to set up profitable prison industries that could offset the costs of prison construction. …

Despite this vehement defense of the solitary system, in the period after the Civil War, the regimen at Eastern State was slowly abandoned. … Without enough funding to keep the system running, inmates were frequently doubled up in cells. In 1913, the solitary system was officially abandoned. Solitary confinement became a short-term punishment for misbehaving prisoners rather than the prison’s standard operating procedure. …

More than half of all U.S. prisons in use today were built in the past 25 years, to house a prison population that has risen almost 500 percent over roughly the same period. The United States has the highest incarceration rate in the world. In raw numbers, it has more prisoners than China, a country with over four times as many people. …

Supermax prisons – high-tech, maximum-security facilities – were the answer politicians and corrections departments were looking for to solve the problem of increasing violence in prisons. Following Marion’s lead, corrections departments around the country began building supermax prisons, or adding supermax wings to their existing prisons to handle the growing number of violent prisoners who could not be controlled in the traditional prison system. Today there are 20,000 supermax inmates in the United States, roughly 2 percent of the total prison population, though in some states the proportion is much higher: In Mississippi, 12 percent of prisoners live in supermax units.

The system of punishment in supermax units resembles nothing so much as the system of punishment pioneered at Eastern State. The Pelican Bay Security Housing Unit, which cost California taxpayers a quarter of a billion dollars, is perhaps the most notorious supermax. From the air it looks like a high-tech version of the Philadelphia prison: Its hub-and-spokes design is clearly descended from John Haviland’s 19th-century architectural plan. Inmates in the SHU (known as “the shoe”) are kept in their cells close to 24 hours a day. As at Eastern State, inmates eat in their cells and exercise in isolated attached yards. …

Dr. Stuart Grassian, a Harvard Medical School psychiatrist who was given access to SHU inmates to prepare for providing expert testimony in lawsuits against the California Department of Corrections, has concluded that the regimen in security housing units drives prisoners insane, and he estimates that one-third of all SHU inmates are psychotic. He writes of what he calls “the SHU syndrome,” the symptoms of which include self-mutilation and throwing excrement.

Dr. Terry Kupers, a psychiatrist who has interviewed supermax inmates, writes that a majority of inmates “talk about their inability to concentrate, their heightened anxiety, their intermittent disorientation and confusion, their experience of unreality, and their tendency to strike out at the nearest person when they reach their ‘breaking point.’ ” Even those inmates who don’t become psychotic experience many of these symptoms. Those least likely to become mentally ill in solitary confinement are prisoners who can read, because reading prevents the boredom that can lead to insanity. (The human psyche appears not to have changed since the days of Eastern State, when an inmate told Alexis de Tocqueville that reading the Bible was his “greatest consolation.”) Because roughly 40 percent of U.S. prisoners are functionally illiterate, however, reading can provide solace and sanity to only a fraction of those behind bars.

The history of solitary confinement Read More »

Kaspar Hauser

From Damn Interesting’s “Feral Children“:

One of the more mysterious cases is that of Kaspar Hauser, who was discovered in Nuremberg, Germany in 1828. He was unsteady on his feet, held a letter for a man he had never met, and only spoke the phrase “I want to be a horseman like my father is.” The letter was addressed to the captain of the 4th squadron of the 6th cavalry regiment:

Honored Captain,

I send you a lad who wishes to serve his king in the Army. He was brought to me on October 7th, 1812. I am but a poor laborer with children of my own to rear. His mother asked me to bring up the boy, and so I thought I would rear him as my own son. Since then, I have never let him go one step outside the house, so no one knows where he was reared. He, himself, does not know the name of the place or where it is.

You may question him, Honoured Captain, but he will not be able to tell you where I live. I brought him out at night. He cannot find his way back. He has not a penny, for I have nothing myself. If you do not keep him, you must strike him dead or hang him.

Kaspar was about sixteen years old, but he behaved like a small child. At first, when a mirror was handed to him he would look behind it trying to find the person behind the mirror, and he burned his hand while touching a candle’s flame in curiosity. Kaspar had excellent night vision and a keen sense of smell. He detested meat and alcohol, and was offended by the smell of flowers. Unlike many of the other cases described here, Kaspar did learn much over time, eventually learning to speak enough to describe the small cage in which he had been raised, and the mysterious keeper who finally released him outside of town. But about five years after appearing from nowhere, Kaspar was assassinated. The reason for his murder might be because some believed he was the missing heir to the throne of Baden. His assassin lured him away under the pretense that they would reveal who his parents were, and stabbed him fatally in the chest. The mystery of his early life and violent death has never been satisfactorily answered.

Kaspar Hauser Read More »

5 reasons people exaggerate risk

From Bruce Schneier’s “Movie Plot Threat Contest: Status Report“:

In my book, Beyond Fear, I discusse five different tendencies people have to exaggerate risks: to believe that something is more risky than it actually is.

1. People exaggerate spectacular but rare risks and downplay common risks.
2. People have trouble estimating risks for anything not exactly like their normal situation.
3. Personified risks are perceived to be greater than anonymous risks.
4. People underestimate risks they willingly take and overestimate risks in situations they can’t control.
5. People overestimate risks that are being talked about and remain an object of public scrutiny.

5 reasons people exaggerate risk Read More »

Why infosec is so hard

From Noam Eppel’s “Security Absurdity: The Complete, Unquestionable, And Total Failure of Information Security“:

A cyber-criminal only needs to identify a single vulnerability in a system’s defenses in order to breach its security. However, information security professionals need to identify every single vulnerability and potential risk and come up with suitable and practical fix or mitigation strategy.

Why infosec is so hard Read More »

Flow defined

From Mihaly Csiksczentmihalyi’s “Flow: The Psychology Of Optimal Experience“:

Pleasure by itself does not bring happiness. We can experience pleasure (e.g. eating, sleeping, sex) without an investment of psychic energy. Enjoyment on the other hand, happens only as a result of an unusual amount of attention. Pleasure is fleeting and, unlike enjoyment, does not bring complexity (growth) to the self. If one only invests energy in new directions solely for extrinsic rewards, one may end up no longer enjoying life, and pleasures become the only source of positive experience. Without enjoyment life can be endured and can even be pleasant. But it can be so only precariously, depending on luck and the cooperation of the external environment.

Eight Components of Enjoyment

1. Confronting tasks that we have a chance of completing.
2. Concentration.
3. Concentration is possible because the task has clear goals.
4. Task provides immediate feedback.
5. A deep, effortless involvement removes from awareness the worries and frustrations of everyday life.
6. Enjoyable experiences allow one to exercise a sense of control over one’s actions.
7. Concern for self disappears, yet paradoxically the sense of self emerges stronger after the flow experience is over.
8. Sense of time is altered – hours pass by in minutes.

When experience is intrinsically rewarding, one’s life is justified in the present, instead of one being held hostage to a hypothetical future, but we must constantly re-evaluate what we do, lest habits and past ‘wisdom’ blind us to new possibilities. The flow experience – like anything else – is not “good” in an absolute sense, but only in that it has the potential to make life richer, more intense and meaningful. One must distinguish between useful and harmful forms of flow, making the most of the former and limiting the latter.

Commencement of learning something is a flow situation – everything is new and flow absorption is present as one struggles to master the skill. As one progresses, either boredom will ensue because there is no more challenge (the skill has been learned at that level) or anxiety occurs because a bigger challenge than we can cope with presents itself. Either way, one wants to get back to flow, either by overcoming the anxiety challenge by becoming more skilled, or taking on a challenge that will overcome the boredom, thus getting back into flow at a more complex level.

Flow defined Read More »