A Framework for Deception
Draft Report

Back - Next

Designator Structure Characteristic Principle Example
0 GENERAL FACTORS GENERAL FACTORS (affecting capabilities). GENERAL FACTORS & PRINCIPLES -
0.A - - Design deception to have the desired total, integrated, effect on target's processes (understanding, inference, decision, judgement, monitoring, goal setting, memory, learning, etc.). -
0.A.1 - - NOTE: 'The effect is the thing'.--Annemmann. -
0.A.2 - - NOTE: The measure of the effectiveness of a deception should be based on its effect on target's cognitive processes, not our perception of it. -
0.A.3 - - NOTE: our individual personality and approach must determine what we present, and how we present it. -
0.B - - Increase difficulty for target to find the truth (i.e., target's info processes). -
0.B.a - - Increase ambiguity ('A-type' deception). -
0.B.aa - - Manipulate or capitalize on target's EXPECTATIONS. -
0.B.b - - Decrease ambiguity, but lead away from the truth ('M-type' deception--misleading). -
0.B.i - - Manipulate mental set via instructions, suggestion, pre-planned experiences. -
0.B.i.1 - - NOTE: We see things as our minds think target ought to be; our minds find simple (sic) patterns automatically; and once a meaning or pattern is established, it is difficult to change ('perceptual prejudice').--Weibel. -
0.B.i.2 - - NOTE: 'We represent it so vividly to ourselves we believe we see it.'--A. Binet, 1894 regarding habitually associated acts. -
0.B.i.3 - - NOTE: 'Always endeavor to form an accurate conception of the point of view most likely to be adopted by a disinterested spectator.'--Maskelyne. -
0.B.ii - - Capitalize on target's education, prior experiences. -
0.B.ii.1 - - NOTE: Perception (e.g., based on partial info; see 4.4.1.1.2.), including the finding and interpretation of evidence, is affected by expectation, beliefs, motives, past experiences. -
0.C - - Induce / capitalize on target's general processing capabilities and strategies (e.g., to predict susceptibility to particular types of deception). -
0.C.a - - Whether target's thinking style is 'left-hemisphere' (logical, analytical, ...), or 'right-hemisphere' (intuitive, spacial, visual, ...). -
1 EXECUTIVE (EXEC) & WORKING MEMORY (STM). (EXEC monitors STM contents and its own STATES and PROCESSES.) EXEC & WORKING MEMORY - -
1.0 GENERAL. - EXEC PRINCIPLES -
1.0.A - - Capitalize on the speed and accuracy of target's EXEC processes (understanding, inference, decision, judgement, monitoring, goal setting, memory, learning, etc.). -
1.0.B - - Capitalize on patterns of target's EXEC processing, especially those revealed by his type of education and thinking habits. Provide target with input which leads him along his accustomed paths of thinking. -
1.0.a - Emotions affect avail. of proc. resources & decision speed - -
1.0.b - Directs and manages other processes - -
1.0.c - Interacts with LTM - -
1.0.d - Guides and utilizes MONITOR - -
1.1 MONITOR / ASSESS CURRENT INTERNAL COGNITIVE SYSTEM STATE (PHYSICAL & MENTAL CONDITION; high-level goals, motivation, readiness, available resources / time, emotions / feelings / intuitions, confidence). - Use physical and mental (POW) techniques such as brute force and 'brainwashing' to reduce target's mental capability, possibly without him realizing it (e.g., alter his self-image; lower his self-esteem). See 2.3.1.1.4.A., 8.3.B., 8.5.A, 8.8.5. -
1.1.0 GENERAL. - - -
1.1.1 MOTIVATION ('Will'). Includes 'will', determination, loyalty, and commitment Manipulate or capitalize on target's motivation (e.g., to alienate from group or authority and win to our side). -
1.1.1.1 Intensity of Motivation. Level of motivation; laziness - -
1.1.1.1.A - - Capitalize on target's laziness on non-delegated tasks -
1.1.1.1.B - - Weaken target's morale. -
1.1.1.1.C - - Induce / capitalize on complacency / lack of motivation. -
1.1.1.1.D - - Induce / capitalize on target's appreciation for or interest in events (entertainment, art, grace, beauty, etc.) to delay action. -
1.1.1.2 Commitment, loyalty. Commitment to goals and means - -
1.1.1.2.A - - Obtain premature commitment (e.g., by pressure tactics). -
1.1.1.2.B - - Strengthen commitment to a goal by inducing belief that it was target's idea. -
1.1.1.2.C - - Strengthen commitment to a goal by making target work for it (e.g., seemingly against our will). -
1.1.1.2.D - - Weaken commitment by inducing belief target's asset is a liability he should discard. -
1.1.1.3 Responsibility (actual & perceived). - Decrease perceived responsibility by dividing it: The standard explanation for war crimes activities after WWII was, 'I was just following orders'.
1.1.1.3.a - - 'Collective guilt becomes singularly absolving'. -
1.1.1.5 Motivating factors. (Feelings / motives to do or obtain something. General high-level goals & constraints; positive or negative.) - - -
1.1.1.5.1 Hope for obtaining something of value. - Build false hopes. (Hope for something of value can be a major payoff in con games in which it is the result of intense belief and focus overriding the low validity and the low likelihood of obtaining the desired outcome. See also 4.4.2.3.1. Payoff Value). -
1.1.1.5.10 Altruism (feelings of charity, sympathy). - - -
1.1.1.5.11 Empathy, identification, helpfulness, humanitarianism, compassion. - - -
1.1.1.5.12 Feelings of embarrassment, humiliation, unworthiness. - - -
1.1.1.5.13 Particular emotions (q.v.). - - -
1.1.1.5.2 Greed or desire for. - - -
1.1.1.5.3 Interest in; boredom. - - -
1.1.1.5.4 Involvement in. - - -
1.1.1.5.5 Curiosity about. - - -
1.1.1.5.6 Pride, vanity, (e.g., due to flattery). - - -
1.1.1.5.7 Jealousy, envy. - - -
1.1.1.5.8 Revenge. - - -
1.1.1.5.9 Sense of obligation. - - -
1.1.1.6 Objectives of value ('direction' of motivation): - - -
1.1.1.6.1 Personal values: ethics, esthetics, simplicity, efficiency, understanding, entertainment, humor, pleasure, ego-boost. - - -
1.1.1.6.2 Achievement (& to inform, entertain, persuade). - - -
1.1.1.6.3 Control & Power: influence, security, safety, profit, reward. - - -
1.1.1.6.4 Social values: companionship, sympathy, acceptance, sense of belonging, participation, status, recognition, 'saving face'. - Put target in a position where to disagree would make him look bad to himself or others (Logical Fallacy 27), or where to agree would make him look good. Have the deception put target in a position which makes him look good. (See also 4.4.2.3.1. Payoff Value). -
1.1.1.A - - So target does not want (see also 1.3.2.2.): -
1.1.1.A.a - - to obtain key info. -
1.1.1.A.b - - to process key info correctly. -
1.1.1.A.c - - to communicate or establish a close relationship (e.g., by simulating an unappealing characteristic or condition). -
1.1.1.B - - Induce belief that the end (goal) justifies the means. -
1.1.1.B.a - - - In Shakespeare's 'As You Like It,' the king finds it distasteful to examine the executed prisoner's head closely enough to detect it is not that of the prisoner he ordered beheaded.
1.1.1.B.b - - - A psychological experiment was done in which a student was part of what he thought to be a group study on perception. Each individual was to say which line of a set looked longest. However all of the other subjects were stooges and, in specific cases, would all choose the wrong line. It was found that the student would often choose the wrong line just to keep it from appearing that he was disagreeing with everyone else: he preferred to lie than to appear foolish.
1.1.1.C - - Offer 'greener grass' (capitalize on target's desparation; point to unfulfilled promises; promise gain). -
1.1.1.D - - Induce / capitalize on conflicting motives. -
1.1.2 READINESS. Factors affecting readiness: Induce / capitalize on a change in activation threshold level (e.g., by 2.4.2.1.1.B.b.bb. increasing false alarm rate; 8.3.2. NOTE 3: partially dehoaxing a subject in an experiment involving nested deceptions, and thereby changing his expectations and making him more sensitive to the possibility of deception.) -
1.1.2.1 Availability of proc resources for delegation to CONTROLLER. - - -
1.1.2.2 Fatigue (e.g., reduces avail proc res). Factors affecting fatigue: - -
1.1.2.2.a - Amount of sleep - -
1.1.2.2.b - amount of food and water - -
1.1.2.a - confinement - -
1.1.2.b - physical exercise - -
1.1.3 EMOTIONAL STATE / MOOD (& the processes which activate emotions). - - -
1.1.3.1 Intensity. - - -
1.1.3.2 Quality (emotion type). - - -
1.1.3.2.1 anxiety, fear, panic. - - -
1.1.3.2.2 love, compassion, pity, hate, anger. - - -
1.1.3.2.3 pessimism, guilt, shame, inadequacy, inferiority. - - -
1.1.3.2.4 happiness, enthusiasm, optimism, elation (e.g., uplifting feeling from a positive, self-fulfilling, morally righteous, or therapeutic experience), sadness, despondency, depression. - - -
1.1.3.2.5 humor. - - -
1.1.3.2.6 satisfaction, dissatisfaction, jealousy, envy. - - -
1.1.3.2.7 attraction, fascination, obsession, distaste, disgust. - - -
1.1.3.A - - Create or capitalize on emotional commitment -
1.1.3.B - - Arouse emotions (e.g., fluster, q.v.) to: -
1.1.3.B.a - - decrease available processing resources (2.1.). -
1.1.3.B.b - - manipulate or take advantage of motivation (1.1.1.); e.g., demotivate and disarm through depression. -
1.1.3.B.c - - distract target from something; cloud thinking. -
1.1.3.B.d - - make target lose sense of time. -
1.1.4 COGNITIVE SYSTEM's SELF-CONFIDENCE; SELF-ESTEEM. (The COGNITIVE SYSTEM derives self-confidence from the knowledge in the self-image (see 8.8.5. SELF-IMAGE in LTM), & K attributes such as reliability & trust.) - - -
1.1.4.A - - Make target distrust own capabilities, information, or solution. -
1.1.4.A..a.aa - - which target prefers. -
1.1.4.A.a - - Provide an (alternative) explanation. -
1.1.4.A.b - - Feed recognizably false info into sensors or sensor buffers. -
1.1.4.B - - Encourage unwarranted trust in target's capabilities. -
1.1.4.B.a - - Continue to emit obsolete data to encourage target's continued use of obsolete info processing methods (see also 6.MSS.5.2.D.c.). If it is known that a particular code or channel is being read by the enemy then, even after a new communication method is established, deceptive messages may continue to be sent by the old method to feed false info to the enemy and to keep the enemy from looking for the new method.
1.1.4.B.b - - Capitalize on ignorance of true sensor sensitivity especially under special circumstances. target may believe he can detect a faint object beyond a bright light when in fact he can not because the sensitivity of his eyes adjusts to the light instead of to the object beyond it.
1.1.A - - Brainwashing techniques include: -
1.1.A.a - - fatigue; sleep, food, water deprivation. -
1.1.A.b - - repetitive stimuli. -
1.1.A.c - - rhythmic stimuli such as photic driving at natural brain wave frequencies to produce seizures in epileptics. -
1.1.A.d - - forceful stimuli. -
1.1.A.e - - sensory deprivation; reduced stimulation. -
1.1.A.f - - unpredictable environment. -
1.1.A.g - - unpredictable attitudes of brainwashers (e.g., from conciliatory to brutal). -
1.1.A.h - - unpredictable punishment. -
1.1.A.i - - isolation. -
1.1.A.j - - indoctrination lectures, lies, persuasion. -
1.1.A.k - - threats; fear; simulate punishment of others. -
1.1.A.l - - disorientation. -
1.1.A.note - - NOTE: Make target susceptible to 'brainwashing' by emotional deprivation or high states of emotion (e.g., anger & fear) as may be produced by excessive leniency or excessive punishment, especially when used alternately. -
1.1.B - - Techniques for producing hallucinations (e.g., confusion of reality and fantasy) include: Joshua Slocum, 1900, on a solo South Atlantic crossing, hallucinated that somone else steered the ship for him ('Savior' hallucination).
1.1.B.a - - confine (physically; by threats; by commands). -
1.1.B.b - - remove from environment--(prolonged) isolation. -
1.1.B.c - - sensory habituation; monotonous stimuli (e.g., noises). -
1.1.B.d - - (prolonged) uncertainty of outcome (e.g., life raft experience). -
1.1.B.e - - physiological damage; deprivation. -
1.1.C - - Hypnosis can be used to induce sensor & affector hallucinations, make memory modifications, control attention, and control EXEC processes such as decision and judgement. -
1.1.D - - Drugs and Chemicals. -
1.1.E - - Electro-stimulation of the brain to produce artificial sensations, emotions, epileptic seizures, etc. -
1.1.F - - Physical changes. Temperature (e.g., heat exhaustion to produce disorientation); Movement (e.g., inner ear / visual disparity; spinning to cause dizziness; ship motion to cause seasickness). -
1.3 HIGH-LEVEL THINKING PROCESSES (Understanding, Inference, Judgement, & Decision). (See list of processes in 1.6. EXEC PROCESSES & procedures in 4.4. ANALYTICAL PROCEDURES.) - - -
1.3.1 Control & Autonomy. Intellectual maturity; capacity for independent thought - -
1.3.1.1 Independence of thinking processes (See also 2.3.1.2.2. & 4.4.1.2.2.2.2.2.). - Induce / strengthen reliance on other's decisions. -
1.3.1.1.a - - Discourage skepticism & independent thought. Captors reindoctrinate new POWs with the help of experienced POWs who are already partially reindoctrinated, and who now 'know more than the new POWs' and can use this claim and peer pressure in converting the new POWs to the captors' viewpoints.
1.3.1.1.b - - Encourage dependence and unquestioning info acceptance. Cult organizations isolate members from the outside world and discourage free thought, particularly negative thoughts about the cult. target encourage unquestioning belief of and obedience to cult leaders.
1.3.1.1.b.aa - - Appeal to ignorance ('You don't know, so believe me'). Captors reindoctrinate new POWs with the help of experienced POWs who are already partially reindoctrinated, and who now 'know more than the new POWs' and can use this claim and peer pressure in converting the new POWs to the captors' viewpoints.
1.3.1.1.b.bb - - We, in authority position, give target faulty advice which makes target still more in need of or dependent on our advice. -
1.3.1.1.c - - Utilize herd instinct; peer pressure; fads; popular ideas (Logical Fallacy 24 part b). (Susceptibility affected by excitement; physiological / chemical changes such as adrenalin flow; motivational speeches; humor--it spreads.) -
1.3.1.1.d - - Create an imaginary new entity so target's only source information on it is from us. Snipe hunt. The victim is invited to 'join' a hunt for a (nonexistent) bird or animal. His role is to wait very quietly and patiently in the brush with a bag and catch it when it is flushed out by the others. The victim ends up alone in a dark or spooky place.
1.3.1.2 Perceived amount of control. - - -
1.3.1.2.A - - Make target believe he is in control: -
1.3.1.2.A.a - - that target has a plan that will accomplish his objective and can carry or is carrying it out. Play along with target's deception. -
1.3.1.2.A.b - - that target is obtaining information through his own efforts, and independently of our wishes. -
1.3.1.2.A.c - - that target is responsible for initiating the contact or event. -
1.3.1.2.A.d - - that events, especially target's losses, are due to his own actions. -
1.3.1.2.A.e - - that target has the advantage of practice, which in fact serves as a control condition for correctly interpreting his later actions. Questions given in advance of a lie detector test serve to calibrate the subject's responses, rather than to help beat the test as the subject may believe.
1.3.1.2.A.f - - that target, rather than someone else, has set the conditions for the 'test'. -
1.3.1.2.B - - Make target think he is 'in on' the plan. -
1.3.1.2.B.a - - Multiple targets, 'in on the plan' and cooperating, none of whom knows the deeper deception in which the plan is nested. -
1.3.2 Belief formation & employment processes Criteria for belief - -
1.3.2.1 Expectation (result of prediction). - Induce / utilize belief which itself can produce the desired / expected effect (e.g., physiological effect; psychological effect; self-fulfilling prophesy; placebos). The reduction of pain by a placebo. The creation of a false high by a nonhallucinogenic substance. In an experiment, a person expecting to be touched by hot metal developed a blister when touched by ice. An influential analyst's stock-market prediction is fulfilled when many investors act to take advantage of it.
1.3.2.2 Receptivity to info; belief criteria (skepticism & gullibility (involved in making 8.8. World Image & current situation image). Tendency to suspect deception - -
1.3.2.2.A - - Induce or capitalize on suspicions or conclusions caused by (false) allegations ('Where there's smoke, there's fire') (Logical Fallacy 28.). Political candidates are sometimes indicted (on false or exaggerated charges) immediately before an election to sway public opinion.
1.3.2.2.B - - Alter target's receptivity to information or a concept by changing his emotional state / mood (see 1.1.3. & 4.4.1.3.2.1.) through employment of humor, ridicule, flattery, etc. (Logical Fallacy 38). The degree to which one is intimidated and influenced by belief in fortune telling, witches, ghosts, psychic phenomena, etc., may be reduced by treating these subjects with humor or ridicule.
1.3.2.2.C - - Induce / strengthen target's belief in something by virtue of target's involvement in it (see 1.1.1.5.4.). -
1.3.2.2.D - - Induce target to increase his receptivity to information (suspend his skepticism) by withholding information from him, thereby creating an 'appetite' for information. -
1.3.2.2.E - - Induce target to accept an excuse (e.g. for a failure, an experiment failure, or for cheating) by inventing a characteristic which requires the behavior. (See also 4.4.1.1.2.2.A. Logical Fallacy 30, 'The Good Reason'). Psychics' excuses for failure: 'No genuine psychic can regularly produce phenomena upon demand' (the shyness effect--a phenomenon is adversely affected by the presence of distrust, e.g., experimental controls or the presence of careful observers, especially disbelievers or skeptical evaluators). Psychics' explanations cheating: 'Psychics are compulsory cheaters and should be forgiven when caught'; 'Psychics cheat some of the time because target don't want to disappoint the audience when target fail'; Consequently, a psychic must be assumed genuine unless ALL of his phenomena are proven fake. (Source: The Amazing Randi).
1.3.2.2.F - - Utilize target's beliefs and assumptions about plausibility (see also 4.4.1.1.2.1.): -
1.3.2.2.F.a - - Keep deception story within bounds which target believes to be plausible & a viable option for us. -
1.3.2.2.F.a.aa - - If target won't believe a truth which we want target to believe (e.g., because it is astounding or unacceptable), then distort the truth to be within plausible bounds. In Poul Anderson's 'When Half-Gods Go,' aliens from space have such unbelievably good things to offer humanity that target must substantially reduce their claims to be believed.
1.3.2.2.F.b - - Make target's concept of our plan implausible, or select plan which target considers implausible: -
1.3.2.2.F.b.aa - - No possible means to goal; therefore either we have a different goal or we will fail (note: the goal may be obtaining particular information). -
1.3.2.2.F.b.bb - - The particular means to goal is impossible; therefore either we have a different goal, or we have a different means to the goal, or we will fail. -
1.3.2.2.F.b.cc - - Required preparation is not worthwhile or reasonable or probable. -
1.3.2.2.F.c - - Capitalize on improbable, special / unique cases. -
1.3.2.2.G - - Induce or capitalize on SELF-PERPETUATION OF BELIEFS, particularly prior or desired beliefs. -
1.3.2.2.G.Note - - Note: Rationality is a self-correcting system of discovery; a rational attitude allows testing of beliefs. Rationalization consists of those processes which make beliefs self-perpetuating regardless of the evidence. -
1.3.2.2.G.a - - Capitalize on target's strong tendency to believe what he wants to believe (Logical Fallacy 31--wishful thinking). (See also 1.1.1. Motivated behavior.) -
1.3.2.2.G.b - - Self-perpetuation of beliefs due to SUBJECTIVE VALIDATION, in which only evidence supporting the belief is sought, noticed, or fully processed / pursued. Non-supporting or contradictory evidence is not-noticed, ignored, interpreted as supporting, or disregarded. Also see other 1.3.2.2.G. headings. -
1.3.2.2.G.b.aa - - Source selection. Selective seeking, exposure to, or use of only those info sources which support current view (2.4.2. Info Selection). (See also 8.1.9.3.). -
1.3.2.2.G.b.bb - - Information selection. Capitalize on target's tendency to FAIL TO OBSERVE OR NOTICE, to ignore, or to suppress evidence which fails to support or which contradicts his current view (see also Logical Fallacy 34; 2.4.2. Info Selection). (INFO SELECTION) 'Mistories' (Marks & Kammen's term) of popular authors Von Daeniken (Ancient Astronauts), Castaneda, Berlitz (Bermuda Triangle) supply a barrage of information, but only that which supports the author's hypothesis; target omit the rest.
1.3.2.2.G.b.cc - - Information validation. Capitalize on target's failure to question evidence (e.g., 'amazing results' of a psychic) which supports his current view. -
1.3.2.2.G.c - - Induce / capitalize on target's tendency to interpret or MISINTERPRET ALL EVIDENCE AS SUPPORTING or more favorable to one's preferred beliefs. Note: A 'non-falsifiable' belief is one which any data likely to be obtained can be interpreted to support. -
1.3.2.2.G.d - - Capitalize on target's tendency to deduce without consideration of, or in spite of, the facts, especially on the basis of prior beliefs (Logical Fallacy 34), or when lacking information. -
1.3.2.2.G.d.aa - - Induce / capitalize on target's tendency to disregard or excuse contradictory evidence. -
1.3.2.2.G.d.aa.aaa - - e.g., to hypothesize 'if A then B', and then, when B fails to occur, to conclude that A needs to be done better, rather than that the hypothesis is false. -
1.3.2.2.H - - Capitalize on target's tendency to notice or concentrate on EXPECTED stimuli, successes, meaningful stimuli, and matches; and to fail to notice or ignore UNEXPECTED or 'non-' (meaningless) objects or events, such as a failure to match. -
1.3.2.2.H.a - - Capitalize on target's tendency to notice those things to which he has been alerted. (See also 0.B.b.aa. Expectation.) -
1.3.2.2.H.a.aa - - and to therefore subsequently perceive it as occuring more frequently than before. -
1.3.2.2.H.a.aa.aaa - - 'Illusionary correlation' is a type of subjective validation in which expected matches are imagined to occur more often than target really do. -
1.3.2.2.H.b - - Induce recognition of an incorrect pattern, e.g., by suggesting a particular interpretation of data ('suggestion'). (EXPECTATION) 'suggestion.' The journal 'Science' once reported an undercover evaluation of mental health facilities in which the actions of the investigators, who were disguised as patients, were interpreted as part of their psychoses by the doctors. These actions included, for example, their inquisitiveness about the facility and their constant notetaking.
1.3.2.2.H.c - - Induce / capitalize on target's tendency to accept the apparent accuracy and specificity of matches between two descriptions or predictions, when target in fact are due to underestimation of the size of sample sets and the principle of EQUIVALENT ODDMATCHES rather than to any significant analytical or predictive power. (ODDMATCHES) Personality readings by psychics seem to fit us because target are general enough to fit many people. Their accuracy seems beyond the realm of chance; the psychic as well as the subject often being deceived in this regard. Nostradamus wrote poems which seem prophetic because target are ambiguous and capitalize on the principle of oddmatches. For any century, one can find an event which matches each verse.
1.3.2.2.H.c.Note - - ODDMATCHES: The subjective 'oddmatch' effect occurs when the matching of one event, such as a dream, with another, such as a subsequent happening, is perceived as unlikely (and perhaps paranormal) because of a failure to realize the very large number of opportunities for matches. A person may greatly underestimate the size of the sets of match candidates: (1) because he fails to notice many match candidates which do not occur, but which could occur; and (2) because he perceives what is actually a long-run situation (unlimited time) as a short-run situation. -
1.3.2.2.H.c.Note2 - - Thus, an 'oddmatch' situation is one with multiple 'hit' endpoints (see also 8.8.6.2.D. 'multiple outs'), and in which any of many possible matches produces the desired outcome. The principle of equivalent oddmatches is that any of these matches is as good as any other. People naturally mistake an 'oddmatch' situation for a 'probability match' situation with a single 'hit' endpoint, for which only one possible match produces the desired outcome. (Reference: Marks & Kammann##, pages 24, 40, 158, 161, 166, 168). (See 4.4.3.5.2.). -
1.3.2.2.a - Experience being deceived - -
1.3.2.3 Weighting of info. - Inappropriate weighting of info (e.g., unequal weighting of data when equal weighting is required.) -
1.3.3 Simplification and Approximation. - - -
1.3.3.A - - Oversimplification (Logical Fallacy 62). Prevent complete understanding of a complex situation. -
1.3.3.B - - Assume linearity for a nonlinear system (See 4.4.1.1.2.A.c.cc. Unwarranted extrapolation of periodic function). -
1.3.A - - Capitalize on inadequacies in target's conceptualization, comprehension, & inferencing (e.g., conditional probabilities are difficult to comprehend).(see 4.4.2.). -
1.3.B - - Justification. -
1.3.B.a - - Special pleading: applying a principle only in cases when it supports a given (target's) view (Logical Fallacy 32). -
1.3.B.b - - Special consideration: appeal to pity, extenuating circumstances (Logical Fallacy 39). -
1.3.B.c - - Fallacies: 'Point to another wrong': 'Every one else does it'; 'two wrongs make a right' (Logical Fallacy 41). -
1.4 HIGH-LEVEL GOAL PURSUIT ACTIVITIES. - - -
1.4.1 Define Current Situation. - - -
1.4.1.1 Observe & Compare Goals & Current State. - - -
1.4.1.2 Assess resources & capabilities (requirements &availability; refer to self-image). - - -
1.4.1.2.1 STATE K (features, templates, associations). - - -
1.4.1.2.2 PROCESS K (procedures, routines, preplanned responses (actions; changed data base) for specified conditions). - - -
1.4.1.2.2.1 General effectiveness of high-level decision processes. - - -
1.4.1.2.2.1.1 Speed. - - -
1.4.1.2.2.1.1.A - - Induce a quick (hasty) decision: -
1.4.1.2.2.1.1.A.a - - Limit analysis time (desperation, urgency) (e.g. to limit info sources, competition, etc.) (e.g., by manipulating payoff matrix as function of time). Often advertisements will state that the buyer has only a very limited time to respond to the offer. Thus, the buyer must send in his money before he has had time to judge if he really needs the product or if he can get it at a better price.
1.4.1.2.2.1.1.A.b - - Arouse target's emotions. -
1.4.1.2.2.1.1.A.c - - Induce belief target has sufficient or all available data. -
1.4.1.2.2.1.1.A.c.aa - - fit target's preconceptions. -
1.4.1.2.2.1.1.B - - Slow target's decision by introducing uncertainty: -
1.4.1.2.2.1.1.B.a - - Make target consider possibility of deception. -
1.4.1.2.2.1.1.B.b - - Use confusion or contradiction. -
1.4.1.2.2.1.1.B.c - - Distort target's perception of progress towards a solution. -
1.4.1.2.2.1.2 Timing. - - -
1.4.1.2.2.1.3 Reliability. Ability to detect deception - -
1.4.1.2.2.1.3.a - Alert status - -
1.4.1.2.2.1.4 Criticality. - Conceal / disguise criticality of target's critical decisions. -
1.4.1.2.2.1.A - - Enhance target's indecision by making all alternatives seem: -
1.4.1.2.2.1.A.a - - equal. -
1.4.1.2.2.1.A.b - - bad (Logical Fallacy 43). -
1.4.1.2.2.1.B - - Hinder target's decision by limiting target's analysis resources. -
1.4.1.2.2.1.B.a - - Induce failure of target to examine all data before making decision. -
1.4.1.2.2.1.B.c - - - Many mazes are arranged so that, after leaving the correct path near the start, one can proceed almost all the way to the goal before a barrier defeats the attempt.
1.4.2 Generate Plan to Satisfy High-Level Goals (options, priorities, initiate internal action). - - -
1.4.2.1 Generate & plan high-level options: - - -
1.4.2.2 Determine assignment for delegation to manager. Select system component (e.g., MANAGER) & processing strategy (e.g., 'K-USING & K-BUILDING Thinking Modes'). (May delegate to CONTROLLER). - - -
1.4.2.3 Evaluate & prioritize high-level options. (Reasonableness check.) - - -
1.4.3 Initiate Internal & External Action Processes to Satisfy High-Level Goals. - - -
1.4.3.1 Allocate required processing resources for assignment by CONTROLLER. - - -
1.4.3.3 Delegate task to MANAGER, etc. - - -
1.6 FUNDAMENTAL PROCESSES (& CATEGORIES thereof) (e.g., thinking processes & inference tools employed in problem solving procedures used by MANAGER; Data-reduction (chunking) to selected level of detail. Prediction, e.g., using context to produce expectations). Comprehension, concept formation Induce target to make a faulty GENERALIZATION (see also 4.4.3.5. Logical and Intuitive reasoning & judgement): -
1.6.1 Establish, construct, synthesize, or refer to a STATE DESCRIPTION, such as a situation image / picture, or a goal, initial, or current state. (See also MANAGER 4.4.1.1.2.) - - -
1.6.1.1 Assumptions. - Induce or capitalize on SELF-PERPETUATION OF BELIEFS, particularly prior or desired beliefs. -
1.6.1.1.A - - Induce / capitalize on plausible, but erroneous assumptions which are used implicitly or automatically during organization and categorization of (e.g., input) data (e.g., assumptions about the results of data handling processes or transformations). (See also 4.4.1.1.2.1.). -
1.6.1.1.A.a - - Induce target to erroneously assume temporal or spacial continuity. -
1.6.1.2 Hypotheses. - - -
1.6.1.3 Perceived probability of deception. - - -
1.6.1.4 Measures of confidence in achieving goal. - - -
1.6.1.5 External monitoring (FEEDBACK input). - - -
1.6.2 COMPARE two state images (e.g., for goal & initial / current state). - - -
1.6.3 CONNECT states and processes. - - -
1.6.4 ASSOCIATE / CONNECT (High-level part of data input process; see SENSORS & AFFECTORS for low- & mid-level processes): (This is a read process rather than a write process.) Organization, sorting, categorizing of (input) data (data reduction (chunking) to selected level of detail). - - -
1.6.4.1 Types of ASSOCIATIONS: - - -
1.6.4.1.1 Passive (e.g., characteristics). - - -
1.6.4.1.2 Causal / influential. - - -
1.6.4.1.2.A - - Induce target to assume a cause due to spacial or temporal (observe A & B, assume A causes B): -
1.6.4.1.2.A.a - - proximity or sequence (Logical Fallacy 04. 'Assuming the cause'). A person taking prescribed medication may assume he recovers because of it, when in fact he may have recovered equally well without it.
1.6.4.1.2.A.b - - relation. -
1.6.4.1.2.A.c - - exclusion. -
1.6.4.1.2.A.d - - (Logical Fallacy 07) correlation (e.g., covary normally unrelated events). -
1.6.4.1.2.B - - Faulty causal generalization (observe B, assume existence of A--reverse of assuming the cause) (Logical Fallacy 05.). -
1.6.4.1.2.C - - Faulty ultimate cause (mistake triggering event for ultimate cause) (Logical Fallacy 06.). -
1.6.4.A - - 'Reification' or 'Hypostation'-- Making an abstract concept into a substance (Logical Fallacy 15.). Personification-- Attributing human characteristics (e.g., intent, motivation, emotion) to non-human creatures or objects (Logical Fallacy 35). -
1.6.4.B - - Word Magic: because the word exists, the thing does (Logical Fallacy 19). (E.g., the average person who has 2.3 children; fate). -
1.6.5 HIGH-LEVEL PATTERN RECOGNITION & INTERPRETATION. Recognition & interpretation of patterns, using induction, deduction, relational patterns including analogies, metaphors, logical relationships (at a high-level rather than at mid-level as in the case of 6.7.MSS.5. PERCEIVE under SENSORS). - - -
1.6.5.1 Speed - - -
1.6.5.2 Accuracy (Classification, Identification) - - -
1.6.5.2.A - - Employ 'branding' or 'name-calling' to induce inaccurate classification (e.g., capitalize on the 'Them vs Us' mentality by branding a third party as the 'enemy'). -
1.6.5.2.B - - Induce or capitalize on target's tendency to be unable to see alternative interpretations once the first one has been established (i.e., once a 'Gestalt' has been formed, or 'closure' has occured.) The initial impression is crucial, since the system uses it as a basis for finding a pattern match. -
1.6.5.2.C - - Faulty set definition. -
1.6.5.2.C.a - - Sampling: sample set not as implied); Sample from inappropriate (nonrepresentative) subset (Logical Fallacy 02.). -
1.6.5.2.C.b - - Non-exhaustive classification (classification does not include all cases) (Logical Fallacy 13). -
1.6.5.2.C.c - - Non-exclusive classification (classification does not uniquely classify each case) (Logical Fallacy 14.) -
1.6.5.2.D - - Unnecessary vagueness (Logical Fallacy 17). (See also 4.4.1.1.2.A.c.aa.). -
1.6.5.2.E - - Overprecision (specify more precision than is justified by measurement or method) (Logical Fallacy 18). Unwarranted or unnecessary accuracy. -
1.6.5.2.E.a - - Can't make any decision unless something is defined in its entirety. -
1.6.5.2.E.b - - Demand precise definition of something which can't be defined. -
1.6.5.A - - Simulate, substitute, or disguise to fit a known pattern (see also 6.MSS.5.) 2.4.2.1.1.A. & D.b. 6.MSS.5.2.D.a. & D.c. 7.AA.5. An enterprising individual replaced check deposit slips in the lobby of various bank branches with his own. Regardless of what was written on them, the computer automatically deposited customers' deposits to his account. Three weeks later, before the ceiling fell in, he withdrew a newly deposited $250,000 and left the country.
1.6.5.B - - Induce recognition of expected pattern by providing partial info compatable with it; e.g., by providing pieces of an item, or by providing items ,personnel, events, or activities obviously associated with it. (The parts imply the existence of the whole). -
1.6.5.B.a - - (Also: recognition of a stimulus may be supressed bythe use of incongruent stimulus, e.g., by dominance of one member of a set over others.) When a red six-of-spades is briefly presented to subjects in a psychological experiment, it is seen either as a black spade, a red heart, or, by some subjects, as a red spade.
1.6.5.C - - Induce finding of non-significant pattern post-hoc so target wastes future resources searching for it, or is unjustifiably confident he knows situation. In experiments which test individuals for ESP using the guessing of unknown cards, a few individuals may, by chance, perform much worse than chance. On observing this, a researcher may decide to perform statistical tests on these same data to determine whether the individual is 'anti-psychic': i.e. has psychic ability which leads him to tend to guess the wrong cards. Such a statistical test is meaningless because: 1) the experiment was originally intended to test a different hypothesis, i.e., to to test for better than normal 'guessing' ability, 2) the data were selected to provide a biased sample from only selected 'anti-psychic' subjects, and 3) the test for 'anti-psychic' abilities was prescribed after the fact, and because it was particularly well-suited to the patterns which occurred by chance in that particular data set. Since one could probably find some hypothesis to fit any data set generated, the analysis result is statistically meaningless.
1.6.5.D - - Fit pattern target expects and / or seeks to achieve goal. -
1.6.5.E - - Make pattern unrecognizable by restructuring input data. A Southern California door-to-door magazine sales group, the 'Clearing And Subscription House,' offered a wide selection at excellent prices. target had checks made out using their acronym: CASH, which their customers failed to recognize as a meaningful word. Arrests were made early in 1985.
1.6.5.E.a - - Provide incorrect segmentation. An artifact was inscribed 'Toti e hors esto'. What was it used for? Ans: To tie horses to.
1.6.5.F - - Capitalize on the ambiguity of stimuli with multiple interpretations by providing suitable context; E.g., visual illusions such as figure-ground reversal; pictures with two or more visual interpretations. -
1.6.5.G - - Use of misleading or ambiguous appearance of data (e.g., visual illusions) to manipulate target's interpretation of data (e.g., a comparison). -
1.6.5.H - - Faulty analogy (Logical Fallacy 08). Relate to common, but inappropriate experience. -
1.6.5.I - - Dissimulate something; e.g., a capability. Cause failure of recognition of a pattern by providing data incompatible with it. -
1.6.6 EVALUATION, CHOICE, & PREDICTION: (See MANAGER.) Prediction contributes to expectations; Building & use of hypotheses; see MANAGER. Prediction supports interpretation of info & K at all levels. - Relativitism (Logical Fallacy 16.). 'All things are relative'; no essential or absolute features. -
1.6.6.1 States & Processes Supporting 'PREDICT'. - - -
1.6.6.1.1 Context (see MANAGER). - - -
1.6.6.1.1.1 Current spacial & temporal context (see MANAGER; STM; & EXEC 1.8.8.2.1.). - - -
1.6.6.1.1.2 Long term & associative context (see LTM). - - -
1.6.6.1.2 MANAGER processes using theories, models, etc. - - -
1.6.7 DIRECT (ORCHESTRATE). (First part of external output processing. See AFFECTORS for IMPLEMENT & DRIVE). - Orchestrate multiple actions to achieve a unified deceptive effect. -
1.6.7.1 Pattern generation USING established actions (e.g., automatic processes, procedures, routines). - Capitalize on target's established behaviors and actions. -
1.6.7.1.a - - Evoke from target an inappropriate or self-defeating response (e.g., by misleading target as to nature of threat & context, evoking the corresponding countermeasure). Soft snowball showers target who, instead of ducking, blocks it as if were hard. Bomb designed not to detonate until defused. Drone with missiles programmed to hit whatever shoots drone down.
1.6.7.1.b - - Capitalize on target's tendency to see new information in terms of his old framework and questions, even when new ones are required. -
1.6.7.1.c - - Induce target to utilize outdated policy or other behaviors which were established on the basis of beliefs no longer held, but which are difficult to identify and change when beliefs change. Subgoals may take on a 'life of their own' even after the goals target support are obsolete. -
1.6.7.2 BUILDING / learning (orchestrated) action patterns. - Teach target something we can exploit. -
1.6.7.3 ACTION PROCESSES. - - -
1.6.7.3.1 Domain of operation: - - -
1.6.7.3.1.1 Temporal. - Capitalize on situation known to cause delay (e.g. to buy time). -
1.6.7.3.1.2 Controls & Constraints. - - -
1.6.7.3.1.3 Resources (e.g. avail of sensors and affectors). - - -
1.6.7.3.1.4 Output. - - -
1.6.7.3.2 (IDEF) parameters for Process: - Induce target to use up resources at wrong time or place. -
1.6.7.3.2..1 Input. - - -
1.6.a - Meaning (Logical Fallacy 01.) Hasty generalization from insufficient sample / data. -
1.6.b - Problem solving overgeneralize (use of general characteristic of inhomog group). (Overgeneralization of statistical base.) -
1.6.c - Linguistic processing population stereotype (non-use of gen char of homog group) -
1.6.c.a - Inference - -
1.6.c.b - Parsing - -
1.6.c.c - Verbal representation - -
1.6.c.d - Semantics - -
1.6.d - - sweeping generalization (without taking into account special circumstances--reverse direction from overgeneralization). -
1.6.e - - Fallacy of composition (if true for each member, then true for the group as an entity) (Logical Fallacy 09). -
1.6.f - - Fallacy of division (if true for group as a entity, then true for each member) (Logical Fallacy 10). -
1.6.f.aa - - Statistical average for group applies to each member. -
1.8 WORKING MEMORY PROCESSES (e.g., 1. STM with 'seven plus-or-minus two' slots; 2. Spreading activation theory with working memory as an 'illuminated' or 'activated' part of LTM). STM Memorial Comparison Process (e.g. Comparison of input with STM contents.) - -
1.8.3 Info storage processes (to STM). - - -
1.8.5 Retention and forgetting processes (info loss, especially before LTM storage). - Induce info loss before storage in LTM. -
1.8.5.1 Decay of info with time. - Wait for info to decay with time. -
1.8.5.2 Info interference. - - -
1.8.5.2.1 Information overload. - Overload working memory with relevant information. -
1.8.5.3 Discard of irrelevant or obsolete information. - Induce belief that info is irrelevant or obsolete. -
1.8.5.4 Interference with retention (rehearsal) process. - Give competing task to interfere with rehearsal process. -
1.8.8 COGNITIVE SYSTEM's WORKING MEMORY (STM) IMAGES. (Also see 8.8. LTM: INTERNAL IMAGES.) - - -
1.8.8.1 WORKING IMAGE: GOAL STATES - - -
1.8.8.2 WORKING IMAGE: CURRENT STATE / SITUATION - - -
1.8.8.2.1 World STATE (environment, ...). - - -
1.8.8.2.2 Current STATE / situation and PROCESSES. - Provide an alternative explanation (or 'cover') to mislead target regarding the purpose of current processes, e.g., regarding the means of obtaining information. Psychics sometimes use the 'one-ahead' method (claiming to be verifying one message while actually reading the next) to simulate reading of sealed messages by psychic powers.
1.8.8.2.2.1 Current context. - - -
1.8.8.2.2.1.1 Spacial context. - - -
1.8.8.2.2.1.2 Temporal context. - - -
1.8.8.2.2.1.A - - Induce desired action by creating incorrect context and thereby making the desired action appropriate rather than inappropriate. Trojan horse (discard war context for peace context). In a 'Mission Impossible' TV episode, a prisoner is induced to believe that he has regained consciousness in a post- holocaust world and is therefore no longer bound by his prior loyalties and reasons for keeping secrets his captors needed.
1.8.8.2.2.1.A.aa - - Artifice: manipulate context to make a lie more believable. -
1.8.8.2.2.1.B - - Influence target by using ceremony & setting (Logical Fallacy 21). (E.g., by persuasion, affecting emotions, goals, priorities, scheduling, etc. See section 1.1.) In a 'Ghost Show,' darkness, special effects, and the lack of familiar context can make one feel strange and spooky.
1.8.8.3 WORKING IMAGE: HISTORY / RECENT PAST - - -
1.8.8.3.1 Significance of past / current events. - - -
1.8.8.4 WORKING IMAGE: PREDICTED / PROJECTED FUTURE STATES (e.g., outcomes for alternative options). (see Payoff Matrix; Evaluate / Predict). - - -
1.8.a - Capacity limited to five 'chunks' - -
1.8.a.aa - Decay of info within about 30 seconds - -
1.8.a.bb - Interference by other info - -
2 CONTROLLER & BUFFER MEMORY CONTROLLER & BUFFER MEMORY Controller -
2.0 - CONTROLLER is a single channel processor which: - -
2.0.a - has limited capacity - -
2.0.b - directs info processing resources - -
2.0.c - itself requires info processing resources - -
2.0.d - is affected by motivation and emotion - -
2.0.e - Other Processing Characteristics: - -
2.0.e.a - speed - -
2.0.e.b - timing and coordination - -
2.1 List of (LIMITED) PROCESSING RESOURCES. - - -
2.1.1 ENERGY. - - -
2.1.2 TIME. - - -
2.1.3 SPACE. - - -
2.1.3.1 CHANNELS (interfaces at which CONTROLLER controls info flow). Controls info flow at interfaces; access to Controller Buffer, STM, LTM, and Sensory and Affector Buffers. - -
2.1.3.1.1 CONTROLLER-Buffer / LTM Interface. - - -
2.1.3.1.1.1 Info type: commands & programmed routines for CONTROLLER. - - -
2.1.3.1.3 EXEC-Working-Memory / LTM Interface. - - -
2.1.3.1.3.1 Info type: varied. - - -
2.1.3.1.5 SENSOR-buffer / Working-Memory Interface. - - -
2.1.3.1.5.1 Info type: Sensor input data. - - -
2.1.3.1.7 AFFECTOR-buffer / LTM Interface. - - -
2.1.3.1.7.1 Info type: Commands & routines for affector output. Output coding for affectors - -
2.1.3.1.7.1.a - Message generation and encription to indicators. - -
2.1.3.1.7.1.b - Motor patterns; speech articulation patterns. - -
2.1.3.1.7.1.c - Inclusion of unintended information (info leaks). - -
2.1.3.1.7.1.d - Errors and delays. - -
2.2 List of PROCESSING RESOURCE 'CUSTOMERS'. - - -
2.2.1 EMOTIONS. - - -
2.2.2 PROCESSES. Routine requirements to inspect STM and SENSOR BUFFER for new info, and to process this info (before it is lost). See list of processes in EXEC 1.6 'Fundamental Processes'. - - -
2.3 Control info processing strategy; & distribute processing resources required for info flow and processing. - - -
2.3.1 Select processing strategy. Selects Processing Strategy. - -
2.3.1.1 UTILIZE EXEC / K-USING MANAGER processes which consider: - - -
2.3.1.1.1 goals. - - -
2.3.1.1.2 priorities. - - -
2.3.1.1.3 motivation. - - -
2.3.1.1.4 alternative available processing strategies. - - -
2.3.1.1.4.A - - Teach (brainwash) a new (automatic) process and then capitalize on the new behavior. -
2.3.1.1.4.A.a - - Classical (Pavlovian) conditioning to produce conditioned reflex (e.g., by using fear, shock, etc). -
2.3.1.1.4.A.b - - Operant conditioning (shaping a behavior by rewarding the closest occuring behavior whenever it occurs). -
2.3.1.1.4.B - - Capitalize on non-lateral thinking; get target committed to a reasonable but wrong interpretation, thus preventing recognition of correct interpretation. Building security guards detect an alarm or noise. On arrival at the point of the disturbance target discover a cat which obviously caused the problem. This assumption keeps the guards from looking for and finding the real intruder.
2.3.1.1.5 availability of processing resources (see 2.1.). - - -
2.3.1.1.5.A - - Allow insufficient processing time. -
2.3.1.1.5.B - - Induce target to allot insufficient processing time. -
2.3.1.1.5.B.a - - Distort target's time sense. (e.g., induce emotions; confuse, panic, make busy, make enjoyable). -
2.3.1.2 Affected by: - - -
2.3.1.2.1 Dependence on preprogrammed, automatic, habitual, subconscious, (inflexible) processes. - Induce / capitalize on the inflexible use of habitual or automatic processes by: -
2.3.1.2.1.a - - Having target invoke the incorrect one of two processes with identical beginnings. When driving to location A, which entails driving a portion of the driver's usual route home, the driver inadvertently takes the turn to his home.
2.3.1.2.1.b - - Having target invoke a usually appropriate process, for a particular, inappropriate situation. Following notice of change in meeting location, driver inadvertently starts driving to its usual location.
2.3.1.2.1.c - - Having target invoke, and then fail to stop a longer process, only the first part of which is required. A person returns from his morning shower to his previously arranged breakfast, only to find that the bread he had put in the toaster for later toasting is already cooked and cold.
2.3.1.2.2 Dependence on external guidance & influence (see also 1.3.1.1 & 4.4.1.2.2.2.2.2.). - - -
2.3.1.2.3 Willingness to expend resources to obtain info. - - -
2.3.1.2.4 Distribution of proc resources required by task. - - -
2.3.1.2.5 Discomfort (physical; mental). - - -
2.3.1.A - - Manipulate target's information processing strategy or (automatic) problem solving procedure. 'The horse raced past the barn fell.' While reading that sentence, most people use a processing strategy which commits them to interpreting 'raced' as the main verb. Hence, when target see the word 'fell,' target are surprised and cannot easily reinterpret the meaning as, 'The horse (the one which was raced past the barn) fell.'
2.3.1.B - - Induce target to apply wrong processing strategy; e.g., induce target to commit himself to a particular strategy, and thereby lose flexibility, before he has sufficient information to select the correct strategy. Riddles: How many two cent stamps in a dozen? How much is 6 divided by 1 / 2?
2.3.1.B.a - - Provide obvious but incorrect processing goal. Riddle: Pronounce 'folk'. Pronounce the word for the white of an egg. Pronounce the word for the yellow of an egg.
2.3.1.B.b - - Provide, or provide data which induces, obvious but incorrect proc rule or strategy. -
2.3.1.B.b.aa - - Provide large amount of info to support wrong strategy, to direct attention away from right one. Riddle: 'As I was going to St. Ives I met a man with 7 wives; each wife had 7 sacks; each sac had 7 cats; each cat had 7 kitts; kitts, cats, sacks, wives; how many were going to St Ives?' Ans: 1.
2.3.1.B.c - - Induce processing strategy which discards or fails to recognize and utilize relevant info. Math riddle: Provide data of boarding and off-loading of passengers for a bus, stop by stop. After a number of stops ask, not how many people are on the bus, but how many stops the bus made.
2.3.1.B.d - - Lead target away from correct proc rule or strategy. -
2.3.1.a - Encoding processes - -
2.3.1.a.aa - Level of detail (F / NF) - -
2.3.1.a.bb - Code forming / code using - Probable bias for code using strategies vs lengthy code forming (learning) strategies - -
2.3.1.b - Automatic processes vs controlled processes - -
2.3.1.b.aa - Novel vs familiar data - -
2.3.1.b.bb - Flexible vs inflexible - -
2.3.1.c - Selection of reference information - -
2.3.1.d - External influence - -
2.3.2 Assign processing resources to customers. - - -
2.3.3 Implement info processing strategy. Implementation of processing strategy - -
2.3.3.a - Encoding processes (decoding from indicators to message; analyze, interpret, validate, evaluate, screen evaluation) - -
2.3.3.a.aa - Chunking - -
2.4.2 Directs processing resources in controlling info selection (INFO SELECTION & SELECTIVE ATTENTION). Controls ATTENTION PROCESSES Control or limit target's information input. -
2.4.2.1 Percent engaged - Manipulate or capitalize on percent attention is engaged. -
2.4.2.1.1 Disengaged (relaxed; attention not attracted) - RELAX Attention. -
2.4.2.1.1.A - - Create belief that analysis is unnecessary. -
2.4.2.1.1.A.a - - Seem above suspicion. -
2.4.2.1.1.A.b - - Seem not worth attention or evaluation ('be natural'). -
2.4.2.1.1.A.b.bb - - - The little shepherd boy cried 'wolf' so often that when the wolf really did show up no one believed him.
2.4.2.1.1.A.c - - Seem innocuous, esp. completely outside or contradicting target's expectations. To use a low-technology weapon delivery system such as a balloon, light aircraft, or sailboat which are unexpected and seem innocuous.
2.4.2.1.1.B - - Create belief nothing much or unusual is happening (de-emphasis). -
2.4.2.1.1.B.a - - Fit target's image of situation & context (keep emphasis and overall balance within expected range). -
2.4.2.1.1.B.a.aa - - Simulate background. To signal one another covertly, indians some-times used bird calls. Such signals could avoid notice because target seemed to be, or blended in with, usual background noises.
2.4.2.1.1.B.a.bb - - Simulate an irrelevant event. -
2.4.2.1.1.B.b - - Change target's image of situation and context so that desired deceptive event, alerting event, or alerting cessation of an event will fit (preconditioning; establish potential alerting condition as common place) (e.g., anesthetize defenses; hold regular military maneuvers or demonstrations). Preceeding Normandy landings the Allies had many intermitent periods of radio silence so the radio silence preceeding the actual invasion would not alert the Germans.
2.4.2.1.1.B.b.aa - - Modify, in advance, background, irrelevant or relevant event, or many events to look like deceptive event. -
2.4.2.1.1.B.b.bb - - Increase false alarm rate to excess so alarms ignored. -
2.4.2.1.1.C - - Utilize a rhythmical timing pause; ie, capitalize on target's natural tendency to assume there is little happening on the off-beat. -
2.4.2.1.1.D - - Create boredom (anticipation of nothing happening). -
2.4.2.1.1.D.a - - By repetition and monotony. -. Often, three times is about right, and five times seems endless. -. Metrically; pace & rhythm are important. -
2.4.2.1.1.D.b - - Implication (imply a method; imply subsequent proceedings). -
2.4.2.1.1.E - - Create belief that analysis is complete. -
2.4.2.1.1.E.a - - Event is completed ('natural conclusion'). also 2.4.2.1.1.E.b. The use of a simulated assassination attempt as a decoy to misdirect attention from the real assassination attempt.
2.4.2.1.1.E.b - - target believes he can adequately predict future events. Some members of a particular religious group believe that, in relatively few years, the earth's magnetic field will be too weak for man to survive. This belief, however, is based on overextrapolation of the current temporal pattern, ignoring the fact that the earth's magnetic field strength is cyclical.
2.4.2.1.1.E.b.aa - - create a pattern, e.g., by repetition. -
2.4.2.1.1.E.b.bb - - imply a well-known procedure. -
2.4.2.1.1.E.c - - target is no longer attending because he has already examined the object (e.g. before covert substitution). -
2.4.2.1.2 Partially engaged - Control processing effort needed for detailed examination (See also 2.4.2.2.3.1. Divide Attention). -
2.4.2.1.2.a - - Increase required processing. -
2.4.2.1.2.a.aa - - have key item be one of many. In 'Raiders of the Lost Ark,' Marion was hidden in a basket identical to many others in the marketplace; and the ark was stored in a warehouse in a crate along with thousands of similar crates. Prior to D-Day the Allies sent many fake messages along with the real ones.
2.4.2.1.2.a.bb - - misfile item. -
2.4.2.1.2.b - - Decrease required processing. -
2.4.2.1.2.b.aa - - Induce target to make a quick exam & move on. -
2.4.2.1.2.c - - Capitalize on target's low level of motivation (q.v.). -
2.4.2.1.2.d - - Manipulate target's pattern recognition criterion. -
2.4.2.1.3 Fully engaged - - -
2.4.2.1.4 Overloaded - Overload target's processing resources. -
2.4.2.1.4.a - - - In WWII, to prevent the Germans from discovering the true D-Day landing site, the Allies 'leaked' false plans for landings at points covering most of the continent.
2.4.2.1.4.b - - - A claims approver was successful in getting required insurance company signatures on fictitious claims because he pushed them through the system during a period of high volume and high personnel turnover when individual cases were not carefully reviewed.
2.4.2.1.a - - Emphasize key points we want target to remember (e.g., by using timing, routining). -
2.4.2.1.b - - Feed target info we want target to appreciate. -
2.4.2.2 Where directed - Manipulate (control) target's attention, & capitalize on where it is directed (e.g., misdirection). -
2.4.2.2.1 Shift center of attention; Attract; DIVERT - - -
2.4.2.2.1.A - - Shift or attract target's attn to something we want target to find and appreciate. -
2.4.2.2.1.B - - DIVERT all of target's attention to something to prevent target from attending to the correct means to a goal, to thinking laterally, or to a deceptive event. Use successive diversions, each of which covers the deceptive preparation for the one which follows it. -
2.4.2.2.1.B.a - - provide alternative goals or means (see EXEC) -
2.4.2.2.1.B.a.aa - - Propose impossible task or illusionary solution (e.g., to use up target's time or processing resources until it's too late); (refuse to accept less than perfection) (Logical Fallacy 44). -
2.4.2.2.1.B.b - - Simulate a relevant event, especially a high- interest event or activity, or the presence of an important item or person. Or exaggerate the importance of an irrelevant event (Logical Fallacy 40 -- red herring). -
2.4.2.2.1.B.c - - Induce or capitalize on target's belief that his enemy is a third party rather than us, especially when we pretend to be target's friend (8.8.6.2.A.b.). -
2.4.2.2.1.C - - Attract target's attn to desired info by providing incidental clues for target to follow. -
2.4.2.2.1.D - - Use an irrelevant argument or proof (Logical Fallacy 55 --irrelevant thesis) to exaggerate and call attention to an irrelevant point and away from the relevant one. Scott advertised that its paper towels were heavier than its competitor's towels, implying that target, therefore, performed better.
2.4.2.2.1.E - - Types of diversion: -
2.4.2.2.1.E.aa - - External to the event (digression). -
2.4.2.2.1.E.bb - - Integral to the event: -
2.4.2.2.1.E.bb.i - - Switch (sidetrack). -. Should wait for the right cover. -
2.4.2.2.1.E.bb.ii - - Mask (screen secret events from target's view). -
2.4.2.2.1.E.bb.iii - - Disguise (dual purpose). -. Having target properly motivated to expect the disguise is key. -
2.4.2.2.1.E.bb.iv - - Pointing (pause- action- pause; make secret move during the action). -. Timing and smooth performance are key; pauses are on the downbeat, the action on the upbeat. -
2.4.2.2.1.E.bb.v - - Climax (use the climax of one event to hold target's attention away from the deceptive preparation for the next event). -
2.4.2.2.2 HOLD (maintain) - HOLD target's attention. -
2.4.2.2.2.a - - Substitute fake and covertly remove original or vice versa. -
2.4.2.2.2.a.aa - - without lapse of target's attention. -
2.4.2.2.2.a.bb - - utilize continuity during brief interruption of observation (see EXEC, also). A common action in movies is for a pursued car to drive into an alley, only to reappear immediately and escape in a different direction. The pursuers, close behind, are now being led astray by a different car, the original having remained in the alley.
2.4.2.2.3 Field of view (focus) - - -
2.4.2.2.3.1 Widen; DIVIDE attn (DISTRACT) - - -
2.4.2.2.3.1.1 Among relevant events ('integral DISTRACTION') - DIVIDE (DISTRACT) target's attention among relevant events (e.g., feints, negotiations, etc.) ('integral distraction'). -
2.4.2.2.3.1.1.a - - contradiction. Prior to D-Day (Operation Overlord) the Allies presented the Germans with information indicating many different locations for the forthcoming attack to divide their resources.
2.4.2.2.3.1.1.b - - confusion (def: uncertainty as to what data is relevant, or how to analyze data); create a mild commotion. Psychic Uri Geller sometimes creates confusion verbally and with actions (The Amazing Randi has dubbed this the 'Geller Tornado') in order to prevent a social group audience from closely watching his sleight-of-hand.
2.4.2.2.3.1.1.c - - flustering (def: utilization of processing resources by emotion). -
2.4.2.2.3.1.1.c.aa - - by flattery. -
2.4.2.2.3.1.1.c.bb - - by accusation. -
2.4.2.2.3.1.1.d - - perplexity (def: uncertainty as to meaning of puzzling analysis results, or how to continue complicated data analysis; due to something which is complicated, involved, or puzzling). -
2.4.2.2.3.1.2 Among irrelevant events ('external DISTRACTION') - DIVIDE target's attention among irrelevant events ('external distraction'). (E.g., provide a brief, but well- timed incident which temporarily demands target's attention). A pickpocket can use a well-timed comment or collision to hide his deed.
2.4.2.2.3.1.2.a - - Startling (e.g., explosion). A guard standing watch is lured to help those in an 'accident'. While he does so someone sneaks past his post.
2.4.2.2.3.1.2.b - - Incidental (e.g., girl on stage) (a natural or expected event). -
2.4.2.2.3.2 Narrow - Direct target's attention to specific aspect (e.g., a hazard), so others ignored or target loses overall perspective. -
2.4.2.2.3.2.a - - so target misses big picture (forest for trees). -
2.4.2.2.3.2.b - - so target loses temporal perspective. -
2.4.2.2.a - - Factors: appearance, size, shape, intensity, color, frequency, & other attributes of stimulus; spacial and temporal magnitude of movement; contrast; novelty; dominant member of set (e.g., Ace of Spades stands out in a group of cards); compromise (e.g., a person selects the only member of a group which does not stand out). target's desires and needs; interesting activity. -
2.4.2.a - Determines allocation of limited processing resources to Controller, EXEC, STM, LTM, sensory, and affector processes. Supply information which supports one's hypothesis, especially in large quantities, and omit the rest. (See 4.4.1.1.2.A.b.aa.). -
2.4.2.b - Percent engaged - -
2.4.2.c - Where directed - -
4 MANAGER MANAGER MANAGER PRINCIPLES -
4.3 SYNTHETIC / CREATIVE / K-BUILDING PROCEDURES / THINKING MODE. This thinking mode handles the building of the knowledge structures used by other parts of the cognitive system. It uses processes which produce each state description or process found elsewhere in the system, except those which are innate. This section is not developed, the principles being listed with other, corresponding parts of the system. Controls: K-BUILDING PRINCIPLES have been combined with the K-USING MANAGER principles in this edition. -
4.3.a - Info selection from external and internal sources. (See also 6.3.2. CONTROLLER.) - -
4.3.b - Info format and modality - -
4.3.c - Reference information - -
4.4 ANALYTICAL / PROBLEM-SOLVING PROCEDURES / THINKING MODE. - K-USING PRINCIPLES -
4.4.0 General effectiveness of problem-solving processes. - - -
4.4.0.1 Speed - - -
4.4.0.2 Timing - - -
4.4.0.3 Reliability - - -
4.4.0.4 Criticality - - -
4.4.1 LOCAL GOAL PURSUIT & PROBLEM SOLVING PROCEDURE. - - -
4.4.1.1 FORMULATE PROBLEM & (RE-)EXPRESS IN INTERNAL FORM: (Note: Relating EXT WORLD to INT IMAGE is fundamental.) - - -
4.4.1.1.1 Establish / Refer to GOAL (including actual and perceived intent, priorities). Planning. Determines: Affect / capitalize on target's goals & priorities (Note: evaluate and predict target's goals). -
4.4.1.1.1.1 Goals (e.g., setting) - -
4.4.1.1.1.1.1 Time factors (constraints on achieving goal) - - -
4.4.1.1.1.1.1.a Long term - - -
4.4.1.1.1.1.1.b Intermediate term - - -
4.4.1.1.1.1.1.c Short term (see 2.3. CONTROLLER: processing strategy) - - -
4.4.1.1.1.1.2 Specificity - - -
4.4.1.1.1.1.2.a General - - -
4.4.1.1.1.1.2.b Specific - - -
4.4.1.1.1.1.A - - Induce target to establish a goal or subgoal which: -
4.4.1.1.1.1.A.a - - is new, and of equal or higher priority. -
4.4.1.1.1.1.A.b - - works against target's intent. -
4.4.1.1.1.1.A.b.aa - - pursues (apparently accidentally) sacrificial bait which lures target into disadvantageous position. -
4.4.1.1.1.1.A.c - - is non-optimal. -
4.4.1.1.1.1.A.c.aa - - due to target's compromise with our falsely stated goal. Bargaining agent sets higher price than he wants so final compromise meets his original goal.
4.4.1.1.1.1.A.d - - is irrelevant or a decoy. If the Russians were to make the U.S. believe that Soviet research into ESP were paying off when in fact it was not, it might induce the U.S. to expend funds on fruitless research.
4.4.1.1.1.1.A.e - - is an additional concern. -
4.4.1.1.1.1.A.f - - is defensive rather than offensive. -
4.4.1.1.1.1.B - - Resurrect a previously satisfied goal of higher priority. A gambit (sacrifice) in chess can eliminate the defense created by ones opponent and force the opponent to rebuild.
4.4.1.1.1.1.C - - Induce or capitalize on target's efforts by having their ultimate effect be toward a higher level goal we desire. -
4.4.1.1.1.1.D - - Induce target to commit a partial investment toward an initial goal, and then induce target to change his goal to a different one we prefer, e.g., by allowing target to see that his original goal was not worthwhile (bait and switch). -
4.4.1.1.1.a - goals, subgoals - -
4.4.1.1.1.b - priorities among goals - -
4.4.1.1.1.c - means to goals, authority, resources - -
4.4.1.1.1.d - time schedule - -
4.4.1.1.2 Establish / Refer to INITIAL or CURRENT STATE (see also 8.8. LTM INTERNAL IMAGES of COGNITIVE SYSTEM's and OTHER SYSTEM's physical & mental condition) (see also EXEC 1.6.1.). Perceived story or scenario - -
4.4.1.1.2.1 Assumptions. - - -
4.4.1.1.2.1.A - - Go outside the subconscious assumptions target has. -
4.4.1.1.2.1.A.a - - Violate target's assumption that what is trying to avoid him will remain out of his sight, for example put item or info where it is obvious, and therefore not expected. In E. A. Poe's 'The Purloined Letter,' the letter is placed in plain sight in the maildrop where it was completely overlooked.
4.4.1.1.2.1.A.b - - Have sought item or solution outside normally considered set (or involve additional spatial dimension, make solution dynamic rather than static, etc). In Agatha Christie's mystery, 'The Murder of Roger Ackroyd,' the murderer is the writer. Puzzle: How can one rearrange 6 coins in the form of a 't' to form two intersecting rows with an equal number coins in each? Solution (which involves an additional dimension): stack two coins at intersection.
4.4.1.1.2.1.A.c - - Lead target to overlook the correct solution by making others' actions or his task seem illogical or unnecessary if he knew what the correct solution was. (e.g., by an action which is 'bold', or completely unexpected; 'hutzpah', nerve, gall.) In a role-playing game, the player was sent out to find someone (the king) who turned out to be himself. In murder mysteries, the killer often makes himself appear to be a victim to remove suspicion from himself.
4.4.1.1.2.1.A.c.aa - - Challenge target on the same point we are using deceptively. Shopper shoplifts and then requests a refund for the product. If he fails to get it, he takes the product and leaves.
4.4.1.1.2.1.A.d - - See 1.6.1.1.A. re erroneous automatic assumptions.
4.4.1.1.2.1.A.e - - Capitalize on cultural or popular values, biases, & prejudices (Logical Fallacy 25 & Logical Fallacy 36). (See also 8.8.1.) -
4.4.1.1.2.1.B - - Get target to accept an assumption which presumes the existance of something imaginary. (Note: counterdeception is difficult because target must identify ALL his assumptions.) Puzzle: An electric train travels north at 10m / sec; the wind is easterly at 5 m / sec; in what direction does the smoke travel? Ans: Electric trains don't make smoke. (The smoke & the problem are imaginary; the solution is irrelevant.)
4.4.1.1.2.1.C - - Get target to accept the erroneous assumption of a third party by providing intent information from the third party's viewpoint. A person goes to bed at eleven pm and sets his alarm to wake him at noon. How many hours sleep will he get?
4.4.1.1.2.1.D - - Induce / capitalize on target's failure to scrutinize basic or implicit assumptions; to 'take things for granted'. (See also 1.3.2.2.) -
4.4.1.1.2.1.D.a - - Use unproven 'facts' to prove something (Logical Fallacy 52.). -
4.4.1.1.2.1.D.b - - Circular reasoning (Logical Fallacy 51.). -
4.4.1.1.2.1.D.c - - Use a leading question, which assumes its own answer (Logical Fallacy 63.) -
4.4.1.1.2.1.D.d - - Complex question, which assumes a fact related to its answer (Logical Fallacy 54.). 'Have you stopped beating your wife?' One's response may be led astray unless he realizes that the question assumes he has been beating his wife.
4.4.1.1.2.2 Hypotheses. - - -
4.4.1.1.2.2.A - - Provide alternative hypotheses for target so target needs to consider them in addition to, or (Logical Fallacy 30 'The Good Reason') will consider them instead of, the correct one.
4.4.1.1.2.2.A.a - - Protect info sources by providing plausible alternatives. -
4.4.1.1.2.2.A.b - - Implicitly provide an alternative question to consider (e.g., consider means rather than the end: Instead of arguing against something, give an excuse why it can't be done (Logical Fallacy 58)). -
4.4.1.1.2.2.B - - Get target committed to an incorrect hypothesis (e.g., by emphasizing a false 'fact'). During WWII, Hitler withheld reinforcements from Normandy for days after the Allies had landed because he was convinced that the Allies were going to land at Pas de Calais, and, therefore, that this landing was a ruse.
4.4.1.1.2.3 Perceived probability of deception. - Capitalize on target's belief about the probability of deception: -
4.4.1.1.2.3.a - - Induce / capitalize on the belief that there is more deception than there is. -
4.4.1.1.2.3.a.aa - - Capitalize on behavior introduced by suspicion. -- use 'reverse psychology': tell truth in a way such that target believes it is not true. The ruse 'look behind you!' to distract an opponent became such a cliche', particularly in fiction, that the standard response became to refuse to do so. Thus it was then possible to prevent someone from looking behind him simply by saying 'look behind you!'
4.4.1.1.2.3.a.bb - - Slow target's decisions & actions by making him overly cautious. -
4.4.1.1.2.3.b - - Induce / capitalize on the belief that there is less deception than there is (target may be less vulnerable if he knows he has been deceived before). -
4.4.1.1.2.4 Measures of confidence in achieving goal. - - -
4.4.1.1.2.5 External monitoring (FEEDBACK input). - - -
4.4.1.1.2.A - - Induce desired decision based on partial information: -
4.4.1.1.2.A.a - - Provide info supporting desired decision first. -
4.4.1.1.2.A.b - - Omit info: -
4.4.1.1.2.A.b.aa - - opposing desired decision. -
4.4.1.1.2.A.b.bb - - to produce a biased picture. -
4.4.1.1.2.A.b.cc - - Suppress quantification info: omit 'some' or 'all' (Logical Fallacy 47). -
4.4.1.1.2.A.c - - Induce target to fill in own info. -
4.4.1.1.2.A.c.aa - - provide ambiguous info (e.g., omit units; ambiguous written letters with more than one interpretation depending on context.) NOTE: An unsophisticated target (such as a child) routinely observes more general detail than a sophisticated target (such as an adult) because he has not yet learned to fill in as much information from previous experience. His attention shifts more easily: it is easier to misdirect, but is also more likely to shift again to the 'wrong place'. 'THE CAT', in which the H and the A are written in an identical, intermediate form which can be interpreted as either.
4.4.1.1.2.A.c.bb - - provide ambiguous language structure (e.g., target understands first meaning; second one is true; literal use of figure of speech, or vice versa; ambiguous sentence structure, accent or stress, word order, or punctuation (Logical Fallacy 49)). Q: 'I have two coins totaling $.30, and one is not a quarter. What are target?' Ans: One is a nickel; the OTHER one is the quarter. Q: 'One would cost 20 cents; twelve would cost 40 cents; nine-hundred and twelve would cost 60 cents. What are we buying?' Ans: Street numbers.
4.4.1.1.2.A.c.cc - - unwarranted extrapolation (e.g., on the basis of a partial cycle of a periodic function). -
4.4.1.1.2.A.c.dd - - emphasize a characteristic of an item to induce target to falsely infer that it is a unique characteristic which does not apply to the items in the complement set. A brewery advertised that target washed their bottles with live steam. Consumers falsely inferred that their competitors did not do likewise.
4.4.1.1.2.A.d - - Provide part of surface structure to imply false deep structure (e.g., quote out of context). -
4.4.1.1.2.B - - Induce desired decision by providing contradictory information (Logical Fallacy 53) (e.g., words used in opposition to meaning, such as Orwell's 1984 slogan 'War is peace'). -
4.4.1.2 DEFINE CURRENT PROBLEM-SOLVING STATUS & PROBLEM SPACE: - - -
4.4.1.2.1 Define Problem-Solving Status (COMPARE images: goal state & initial / current state). - - -
4.4.1.2.2 Define Problem Space. - - -
4.4.1.2.2.1 Assess Resource Requirements. - - -
4.4.1.2.2.1.1 External Resources. - - -
4.4.1.2.2.1.2 Internal Resources. - - -
4.4.1.2.2.1.2.1 K, K-Types, K-Sources, Attributes (see 5.1. STRUCTURE OF WORLD-IMAGE KNOWLEDGE & BELIEF). - - -
4.4.1.2.2.2 Assess Available Capabilities and Processes. - - -
4.4.1.2.2.2.1 See section 1.2. MENTAL CONDITION: Motivation, self-image, etc. - - -
4.4.1.2.2.2.2 Process IDEF parameters: - - -
4.4.1.2.2.2.2.1 Input. - - -
4.4.1.2.2.2.2.2 Controls & Constraints on processes; autonomy (see also 1.3.1.1 & 2.3.1.2.2). - - -
4.4.1.2.2.2.2.3 Resources (e.g. avail of sensors and affectors). - - -
4.4.1.2.2.2.2.4 Output. - - -
4.4.1.3 SOLVE PROBLEM. - Abandonment of discussion (Logical Fallacy 45). (We abandon discussion to lead target away from further pursuit of a line of reasoning. We claim discussion is unnecessary, irrelevant, indecent, immoral, unpatriotic, etc.; or abuses target using ad hominum; etc.) (Example of Abandonment of Discussion.) A psychic states: 'I don't care what people think, I KNOW my powers are genuine.'
4.4.1.3.1 Generate & Plan Options (means to goals). - Induce target to establish means which: -
4.4.1.3.1.1 - Relate states & processes. - - -
4.4.1.3.1.1.1 - PREDICT effects of processes & other resources on states. - - -
4.4.1.3.1.2 - Plan go / no-go conditions. - - -
4.4.1.3.1.3 - Plan preplanned responses. - - -
4.4.1.3.1.a - - are non-optimal (require more work). The false shortcut was a standard ruse in old films and cartoons. Instead of being quicker, it took much longer.
4.4.1.3.1.b - - work against target's intent. -
4.4.1.3.1.c - - lead in wrong direction (ask wrong question; solve wrong problem; false lead; red herring). -
4.4.1.3.2 Evaluate Options. (E.g., by using procedure 4.4.2. Payoff Matrix Evaluation.) - - -
4.4.1.3.2.1 Generate, select, & employ standards and Measures of Effectiveness (MOE's). - Anesthetize critical faculties (e.g. by flattery). -
4.4.1.3.2.2 MONITOR and evaluate PAST effects of PROCESSES on STATES using FEEDBACK. (Compare current state with previous states; Evaluate appropriateness.) - - -
4.4.1.3.2.2.1 Previous goals. - - -
4.4.1.3.2.2.2 Previous processes. - - -
4.4.1.3.2.2.3 Previous choices. - - -
4.4.1.3.2.2.4 Progress toward goal. - - -
4.4.1.3.2.2.4.A - - Demonstrate initial success (e.g., a pyramid scheme; a 'Ponzi' scheme).
4.4.1.3.2.2.4.B - - Reinforce target's belief that he is attaining his goal. -
4.4.1.3.2.2.4.C - - Induce target to believe the goal he seeks has already been achieved (may be processed by CONTROLLER). -
4.4.1.3.2.2.4.C.a - - found info he seeks. In Isaac Asimov's 'Second Foundation,' the organization called 'the second foundation' allows a large number of their people to be discovered and eliminated so that the rest of the galaxy, who wanted to be free of them, would presume them destroyed. Thus, the organization could continue its operations.
4.4.1.3.2.2.4.C.b - - found info source or channel he seeks. -
4.4.1.3.2.2.4.C.c - - has already 'observed carefully'. -
4.4.1.3.2.2.4.C.d - - has already seen through the deception.
4.4.1.3.2.2.4.C.e - - mission accomplished. -
4.4.1.3.2.2.4.C.f - - goal is obsolete. -
4.4.1.3.2.2.8 FEEDBACK: Performance coupling (degree; value). - - -
4.4.1.3.2.2.8.A - - Provide target with false feedback where none exists, and use it to control target's actions or responses. Experimenter provides subject with false biofeedback (e.g., heartrate) to influence male subject's attraction to females in pictures. Effects were not removed by debriefing.
4.4.1.3.2.2.8.B - - Induce target to interpret (uncoupled) data as feedback bearing on a decision. -
4.4.1.3.2.3 Validate CURRENT picture / situation. - - -
4.4.1.3.2.3.A - - Level of detail that target will examine is crucial, and depends on the scale (size) of the deception, target's available resources, and target's level of suspicion. To provide target with picture complete down to smallest detail (e.g., in case target checks): -
4.4.1.3.2.3.A.a - - Play role exactly as if it were true (viz a theatrical act). -
4.4.1.3.2.3.A.b - - Cover all sensors. Fake military maneuvers may include dummy radio messages, sound effects, etc.
4.4.1.3.2.3.B - - Allow, or subtly induce, target to evaluate data critically where or when there's nothing to find which will weaken his (deceived) picture. -
4.4.1.3.2.4 Predict FUTURE outcomes (use context, models, etc., to generate expectation). - Induce target to make incorrect predictions, and, therefore, to have false expectations. -
4.4.1.3.2.4.a - - by providing faulty input data. -
4.4.1.3.2.7 Evaluate Options. - - -
4.4.1.3.2.7.1 With respect to absolute criteria, assumptions, and K-validity. - - -
4.4.1.3.2.7.2 Relative evaluation (comparison) with respect to optimal / best-fit. - - -
4.4.1.3.2.7.3 Cost / effectiveness evaluation. - - -
4.4.1.3.3 Choose / Prioritize Options. - - -
4.4.1.3.3.1 Decision threshold or criterion. - - -
4.4.1.3.3.2 Prioritize options. - Induce target to change priorities among goals -
4.4.1.3.3.2.1 STATE DESCRIPTIONS: Goals & Subgoals. - - -
4.4.1.3.3.2.2 PROCESSES: Means to Solutions. - - -
4.4.1.3.3.2.a - - to non-optimal priorities. -
4.4.2 PAYOFF-MATRIX Evaluation. Set up a table which includes the following: - - -
4.4.2.1 Conditions or events. - - -
4.4.2.1.1 Possible conditions or events. - Assuming a dichotomy for a continuum of possibilities. -
4.4.2.1.1.a - - All or nothing mistake (assuming one must have all or none) (Logical Fallacy 11). Fallacy: One is either knowledgeable or ignorant. (In fact, one may be knowledgeable about some topics and ignorant about others.)
4.4.2.1.1.b - - False dilemma (assuming one must have condition A or B, but not both; that only one can be right) (Logical Fallacy 12). -
4.4.2.1.1.c - - Falsely imply A & B make up the entire set of possibilities. -
4.4.2.1.1.c.aa - - Then convince target that C is true because both A and B imply C. -
4.4.2.1.1.c.bb - - 'The wicked alternative'-- since one alternative is obviously wrong, another, falsely assumed to be the only other choice, must be right (Logical Fallacy 42). -
4.4.2.1.1.c.cc - - Choose A & B so target selects the one we desire because it is the lesser of two evils. -
4.4.2.1.1.d - - Claiming that, since one can't prove A, NOT-A must be true (Logical Fallacy 57). -
4.4.2.1.2 Probabilities of conditions or events. - - -
4.4.2.2 Possible alternative decisions / choices for a given condition or event. - - -
4.4.2.2.1 Investment (Cost, effort, manpower, material, logistics, weapons, to pursue alternative). - Make target work hard for partial recovery of loss to change his perception of the possibilities, and to divert his energy from his original complete-recovery goal. -
4.4.2.3 Possible outcomes (e.g., hit, miss, FA, CR). - - -
4.4.2.3.1 Payoff value for each possible outcome (event x decision). - - -
4.4.2.3.1.1 Positive components. - Use positive social motivating factors (see 1.1.1.5.). Levi's ads constantly emphasize how long Levi's pants have existed, trying to make them appear to be an American tradition.
4.4.2.3.1.2 Negative components. - - -
4.4.2.3.1.2.A - - Decrease perceived value of outcome. -
4.4.2.3.1.2.A.a - - Make seem obsolete. -
4.4.2.3.1.2.A.a.aa - - New situation. -
4.4.2.3.1.2.B - - Use negative social motivating factors to make target unwilling to oppose an idea. -
4.4.2.3.2 Probability of outcome, for a given choice. - - -
4.4.2.3.2.A - - Make outcome in target's favor have zero probability without target's knowledge. You win if this ear of corn has an odd number of rows of kernels; Otherwise, I win; O.K.? (Result is always even.)
4.4.2.3.2.B - - Shift target's matrix probability values by a rigged example, especially one in which his skepticism causes him to miss a 'genuine opportunity'. In a western saloon, a miner openly sells his confederate a gold brick at a ridiculously low price. Others, skeptical, tease the confederate who proves the gold brick is indeed genuine. When the miner keeps his promise to return with many more (fakes), he sells them all.
4.4.2.3.2.C - - Change perceived false alarm (FA) rate (cry wolf).
4.4.2.3.A - - Research target's needs and offer something target needs, or that we can persuade target to want. -
4.4.2.3.B - - Fabricate an imaginary entity that target wants. -
4.4.2.3.C - - Show target apparent results of selecting alternatives. -
4.4.2.3.a.aa - - - Many things sold today have planned obsolesence: e.g., even though the item may be just as good now as when it was new, we are made to believe it is worth much less just because it is old or out of style.
4.4.2.4 Expected (overall average) payoff for each possible decision. - Establish good associations; appeal to tradition (or faith?) ('because it has worked, been good, been done in the past, it should be done now') (Logical Fallacy 23). -
4.4.2.4.1 Actual expected payoff values. - - -
4.4.2.4.2 Perceived expected payoff values. - Misrepresent our or third party's attitude towards value of something in order to influence target's perception of its value. Tom Sawyer made it look like it was so much fun that he induced others to pay him to whitewash his fence for him.
4.4.2.4.2.1 Hope (see EXEC 1.2.1.5.1. Motivation). - - -
4.4.2.4.2.2 Perceived risk, peril. - If target wants to maintain the status quo in a hostile situation, and we make confusing signals, then target will probably procrastinate unless he perceives risk in waiting, in which case he will probably start early action. -
4.4.2.4.2.2.A - - Bluff. Disguise as target's high ranking officer. Demand entry saying if target's guard delays you, he will be in 'big trouble'.
4.4.2.A - - Change actual payoff matrix without target's knowledge. -
4.4.2.B - - Change (manipulate) target's perceived payoff matrix as a function of time. -
4.4.2.B.a - - Planned obsolence. Clothing may become unusable for its original purpose while still practically new due to changes in fashion. Mechanical parts may be designed to fail after limited use.
4.4.2.C - - Manipulate / misrepresent target's perceived payoff matrix to control decisions. -
4.4.2.C.a - - get initial commitment (e.g., of money, time, involvement) before modifying payoff matrix. -
4.4.2.C.b - - Also 4.4.2.1.2. Claim imminent loss is likely (e.g. emergency exists) (false warning). -
4.4.2.C.c - - Claim imminent change in supply, price, or reward. -
4.4.2.C.d - - Manipulate impact of changes in matrix values. -
4.4.2.C.d.aa - - Control info flow to target about changes. -
4.4.3 ANALYTICAL PROCEDURES, TOOLS, THEORIES, MODELS, ETC. - - -
4.4.3.1 Mathematical tools and procedures. - - -
4.4.3.3 Formulas; models & simulations; procedures, algorithms, & routines. - - -
4.4.3.5 Logical & intuitive reasoning & judgement. (NOTE: Some intuition may be considered as an EXEC function involving a less conscious or less rigorous application of analytical tools without extensive MANAGER involvement. Perhaps it employs 'table look-ups' made possible by previous experience.) - - -
4.4.3.5.1 Logical reasoning and judgement. - - -
4.4.3.5.1.A - - 'Undistributed middle'. Unwarranted transfer of a characteristic via an intermediate set (Logical Fallacy 46); e.g.: -
4.4.3.5.1.A.1 - - (1) A is B, C is B, so A is C. (e.g., guilt by association.) -
4.4.3.5.1.A.2 - - (2) A is B, some B is C, so all C are A. -
4.4.3.5.1.A.3 - - (3) For further examples, see logical fallacies references (e.g., Fernside). -
4.4.3.5.1.B - - Unequal negation (Logical Fallacy 61): -
4.4.3.5.1.B.1 - - No A are B, No C are A, so all C are B. -
4.4.3.5.1.B.2 - - All A are B, All B are C, so some C are not A. -
4.4.3.5.1.C - - Non sequitur -
4.4.3.5.1.C.1 - - (Claiming falsely that A implies B) (Logical Fallacy 48). -
4.4.3.5.1.C.2 - - False converse (A implies B, so B implies A). -
4.4.3.5.1.C.3 - - Incorrect conditional (A implies B, so NOT-A implies NOT-B). -
4.4.3.5.1.C.4 - - Incorrect alternatives (A or B, so A implies NOT-B). -
4.4.3.5.1.D - - Claiming that the exception proves the rule (Logical Fallacy 60). -
4.4.3.5.1.E - - The 'thin, entering wedge' (Logical Fallacy 59). The domino' theory. Once allowed to start, it will not be stoppable as scheduled. 'Give them an inch and target'll take a mile. -
4.4.3.5.2 Intuitive judgement & estimation biases. Intuitive estimation biases: Capitalize on intuitive estimation biases. -
4.4.3.5.2.1 Sampling bias. - - -
4.4.3.5.2.1.A - - If something normally present is not normally observed and is believed absent, claim we caused it and instruct target to observe it. (e.g., focus attention on a particular feature, such as a match between two events.) (See also 1.3.2.2. Belief: Oddmatches). A psychic on the radio told listeners that if target concentrated along with him target would create unusual effects around their houses such as stopping clocks, starting broken watches, and bending keys. Many called in to verify that such effects were indeed occuring. Subsequently it was revealed that the man was not a psychic, but was demonstrating how psychics can take credit for causing amazing effects by taking advantage of peoples' common failure to notice everyday occurences.
4.4.3.5.2.a - Personal, personality, mental, & physical predispositions See characteristics. -
4.4.3.5.2.b - Innate, learned, preprogrammed by others See 1.3.2.2.G. Subjective Validation; & 1.3.2.2.H. Oddmatches. -
4.4.3.5.2.c - Statistical estimation Humans are poor at estimating combinations of events. -
4.4.3.5.2.c.aa - Poor at Bayesian statistics: - -
4.4.3.5.2.c.aa.1 - Often employs unrepresentative sampling - -
4.4.3.5.2.c.aa.2 - Incorrectly estimates probability of events - -
4.4.3.5.2.c.bb - Makes oddmatches due to failure to know size of target or sampled sets - -
4.4.3.5.2.c.bb.1 - Notices events but fails to notice non-events - -
4.4.3.5.2.c.cc - Subject to subjective validation of a hypothesis (Ignore data which does not fit; Use data which does) - -
4.4.3.5.2.d - - Humans are poor at estimating randomness (e.g., target tend avoid repeated numbers when generating a random string of numbers). -
4.4.3.5.2.e - - Overconfidence increases with increasing odds, such that an amount bet increases too fast and long-run expected losses increase. -
4.4.3.5.A - - Induce / capitalize on target's use of intuition instead of logic. -
4.4.3.5.B - - Falsely conclude a parameter is significant (e.g., by 'lying with statistics'). -
4.4.3.5.C - - The use of non-independent samples as though target were independent sources of information may lead to overconfidence. -
4.4.3.5.D - - Assuming dependence of independent data (Logical Fallacy 37); i.e., the assumption of relationships which don't actually exist. (Logical Fallacy #37.) In roulette, gamblers may incorrectly assume that after a run of black the ball is more likely to come up red.
4.4.3.5.c - - - Uri Geller routinely amazes his audiences by discerning figures sketched by a spectator. In one such case, he uses the knowledge that, when asked to draw a simple geometrical shape, a high percentage of people will draw a triangle. People are generally unaware of this fact.
4.4.3.5.e - - - Fallacy according to Roosevelt's new deal policy: If the individual must spend within his budget, so must the federal government.
4.4.3.5.f - - - 'Women are weaker than men' is true on the average, but not true for many specific cases.
4.4.3.5.f.aa - - - The belief that an individual is entitled to a refund from the insurance company because he (as an individual) has a good claims record.
4.4.3.7 Comparison. - - -
4.4.3.7.A - - Improper comparison. -
4.4.3.7.A.a - - compare noncomparables ('apples & oranges'). -
4.4.3.7.A.b - - look at gross numbers rather than proportions, or vice versa. -
4.4.3.7.A.c - - refer to 'all else being equal' when all else is not equal. -
4.4.3.7.A.d - - due to improper data reduction. -
4.4.3.7.A.e - - change emphasis by comparing something with 'all others' when there are significant others worthy of individual consideration. -
4.4.3.7.B - - Improper scales and baselines. -
4.4.3.7.B.a - - omit or use improper (e.g., non-zero) baselines. -
4.4.3.7.B.b - - comparative rather than absolute basis. -
4.4.3.7.B.c - - fail to normalize. -
4.4.3.7.B.d - - Change scale between graphs. -
4.4.3.7.B.e - - pick scales (absolute number, percent, linear, logarithmic, etc.) to emphasize desired relationship. -
4.4.3.7.B.f - - Omit relevant info; e.g., give mean, but no distribution. -
4.4.3.8.A - - - In a Pyramid scheme (e.g., a chain letter), the number of people required increases geometrically as the scheme progresses, so that the victim fails to be paid off because there are too few people in the 'world' to accommodate the scheme. The victim may also be mislead as to the probability of each individual perpetuating the scheme.
4.6 EXTERNAL INPUT (SENSOR) PROCEDURES. - - -
4.7 EXTERNAL OUTPUT (AFFECTOR) PROCEDURES. - - -
4.8 INTERNAL (LTM) INPUT & OUTPUT PROCEDURES. - - -
4.8.8 Available memories are LTM, STM, & sensor & affector buffers (q.v.). - - -
6 SENSORS & BUFFERS SENSORS & BUFFERS SENSOR PRINCIPLES -
6.0 General - - -
6.0.A - - Emit a false signal. -
6.0.B - - Deny close observation. Anti-aircraft fire to keep enemy spotter planes high and deny them close observation. A magician controls where his audience sits.
6.111.10 - Visual Information Store (VIS) - -
6.111.10.a - Time decay in about 0.1 seconds. - -
6.111.10.b - Interference - -
6.111.7.A - - - Color reversal after-image illusions are induced by selectively fatiguing visual receptors with the complementary color.
6.121.10 - Precategorical Acoustic Store (PAS) - -
6.121.10.a - Time decay in about 2 seconds - -
6.121.10.b - Interference - -
6.1SS Passive Mode - - -
6.2SS Active Mode - - -
6.M01 Electromagnetic - - -
6.M02 Acoustic - - -
6.M03 Chemical - - -
6.M04 Skin - - -
6.M05 Acceleration & Motion - - -
6.M11 Visual - - -
6.M21 Auditory - - -
6.M31 Taste - - -
6.M32 Smell - - -
6.M41 Pressure - - -
6.M42 Temperature - - -
6.M43 Damage - - -
6.MSS Mode & Type unspecified SENSOR MODE & TYPE: - -
6.MSS.1 DETECT (SENSE) (DETECTION) Avoid detection (deny sensor input, camouflage, cover, hide, secret compartment.) -
6.MSS.1.1 Coverage area - Evade sensor coverage area (spatial & temporal) During WWII POW camp escapes, prisoners would avoid detection by moving only when the search lights were directed away from them, taking cover when the sweeps covered their area.
6.MSS.1.1.a - - Capitalize on gaps within the coverage area of which target is unaware, or which target ignores. -
6.MSS.1.2 Amplitude & S / N ratio & sensitivity threshold - Make invisible by decreasing S / N ratio (decrease S & / or increase N) to below detection threshold. -
6.MSS.1.2.1 Signal level - - -
6.MSS.1.2.1.A - - Operate below sensor absolute sensitivity threshold. -
6.MSS.1.2.1.B - - Decrease sensor sensitivity. -
6.MSS.1.2.1.B.a - - Habituation. -
6.MSS.1.2.1.B.b - - Fatigue. Optical illusions caused by fatigue (e.g., at the retinal level) include Mach bands; Hermann grid; complementary color after images (selective fatigue); halos.
6.MSS.1.2.1.B.c - - High intensity stimulus at boundaries of area of interest. In the dark, an individual standing in front of a bright light can be seen only as a silhouette, and can not be identified.
6.MSS.1.2.1.B.d - - Supersaturation of sensor. -
6.MSS.1.2.1.C - - Deflect 'illumination' so object is not illuminated. -
6.MSS.1.2.1.D - - Deflect 'illumination' so it is not returned to sensor. -
6.MSS.1.2.1.E - - Make object 'transparent'. -
6.MSS.1.2.1.F - - Change (e.g., increase) signal strength to misrepresent source characteristics (size & distance). -
6.MSS.1.2.2 Noise level - Mask (or 'jam') with: -
6.MSS.1.2.2.a - - noise. WWII Allied bombers dropped foil (chaff) to 'fog' enemy radar and keep them from obtaining an accurate fix.
6.MSS.1.2.2.b - - other stimuli. -
6.MSS.1.2.2.b.aa - - Large deliberate motion to cover smaller secret movement. -
6.MSS.1.2.2.b.bb - - Swift deliberate motion to cover slower secret movement. -
6.MSS.1.3 Sensor capacity - Use up limited sensor capacity (e.g. one shot device). -
6.MSS.1.3.a - - Trigger one-shot sensor (or alarm) so it can't detect (or warn of) the presence of a second object. In the space game Empire, in which spaceships can be made invisible, each player has a device to warn him when an enemy is within a certain range. But an invisible ship can still approach unnoticed if a visible ship also approaches at the same time and triggers the warning device first.
6.MSS.1.4 Precision (resolution, discriminability). (PRECISION / DISCRIMINATION) - -
6.MSS.1.4.1 Spacial. - Capitalize on sensor spatial discriminability limits. -
6.MSS.1.4.1.A - - Get close to and blend in with a background (or other) object (e.g., 'black art'). -
6.MSS.1.4.1.B - - Move several objects close together so target appear to be only one. -
6.MSS.1.4.1.C - - Capitalize on sensor spatial resolution limits (e.g., depth perception). -
6.MSS.1.4.2 Temporal. - Capitalize on sensor temporal discriminability limits. (E.g., sensor tracking or focusing time, observation sampling time, sensor storage time, sensory integration time). In playing the child's game 'Duck- duck- goose' under a strobe light, a runner's visual feedback is periodically delayed, inducing him to run wildly off course.6.MSS.5.2.A. Visual illusions: (1) Two parallel lines with an intersecting diagonal, the piece of the diagonal between the two parallel lines being removed from view. The remaining two parts of the diagonal appear offset. (2) Lines radiating from a point distort size of nearby squares (due to perspective effect). When two equal line segments form an inverted 'T,' the vertical one appears longer. An example of ambiguous perspective is the Necker Cube illusion, in which an outline drawing of a cube (or even a cube made of wire) can be seen as viewed from either of two positions. In one optical illusion, one stares at a fuzzy yellow ring on a crosshatch background until the ring vanishes due to retinal fatigue; in its place, instead of a void, one sees (literally) the cross hatch pattern which fills in the space where one formerly saw the ring.
6.MSS.10 - BUFFER STORES - -
6.MSS.111 - (Visual) - Eyes - -
6.MSS.121 - (Auditory) - Ears - -
6.MSS.131 - (Chemical: Taste) - Tongue - -
6.MSS.132 - (Chemical: Smell) - Nose - -
6.MSS.142 - (Skin) - Temperature - -
6.MSS.143 - (Skin) - Damage / Pain - -
6.MSS.3 PERCEIVE (SENSE) FEATURES (PRIMATIVES / CHARACTERISTICS). (Reduces (chunks) data to selected level of detail). - - -
6.MSS.3.1 Speed. - - -
6.MSS.3.2 Accuracy. - - -
6.MSS.3.2.A - - Degrade signal to decrease accuracy of feature perception. -
6.MSS.5 PERCEIVE THE WHOLE (GESTALT); Pattern recognition (e.g. by TEMPLATE MATCHING), classification, & identification. (Reduces (chunks) data to selected level of detail. See also high level processes 1.6.4. & 1.6.5. in EXEC). PATTERN ANALYSIS / RECOGNITION / CLASSIFICATION / IDENTIFICATION - -
6.MSS.5.1 Speed & Response Time. - - -
6.MSS.5.2 Accuracy. NOTE: 'ASSOCIATE', the process for the next higher level, is in EXEC. - - -
6.MSS.5.2.A - - Induce or capitalize on inaccuracies in target's perceptual processes. (See also 1.6.5. EXEC for high level processes; and 6.MSS.7 for effects due to reference values & feedback). E.g.: -
6.MSS.5.2.A.a - - Violate constancy expectancy to produce distortions of color, size, distance, form, angles, direction; e.g., size illusion induced by comparison with memory. The 'giant' actor illusion induced by using small furniture.
6.MSS.5.2.A.b - - Use systematic errors in extrapolation or perspective to induce distortions of shape or orientation. -
6.MSS.5.2.A.c - - Use spatial context to induce size changes. The 'boom-squish' illusion, in which a circle has radiating lines alternately inside and outside.
6.MSS.5.2.B - - Induce brain to provide its own sensory data to fill in for missing or ambiguous data (analogous to 4.4.1.1.2.A.c.). -
6.MSS.5.2.B.a - - Cause failure of the process. -
6.MSS.5.2.B.b - - Illusions caused by ambiguous perspective. -
6.MSS.5.2.C - - Dissimulate (simulate the absence of) something (e.g., object, capability, etc.) which is present. (Control detectable stimuli to be compatable with the absence of something, and apparently incompatable with its presence.) Provide cover. (See also 6.MSS.1. Avoid detection.) -
6.MSS.5.2.C.a - - Mask with a superset (blend with another signal). Obscure boundaries (disruptive patterns; countershading). Tigers' stripes and leopards' spots serve to break up their visual form, making them hard to detect in grass or brush.
6.MSS.5.2.C.b - - Make signal blend with background. The praying mantis blends with leaves; the walking stick with branches.
6.MSS.5.2.C.c - - Make background blend with signal. -
6.MSS.5.2.C.d - - Use a new, apparently random pattern (which target has not yet learned). -
6.MSS.5.2.C.e - - Provide data incompatible with the presence of something. -
6.MSS.5.2.D - - Simulate something (which does or doesn't exist). (May use decoys, lures, fakes (seen), shells, disguises, dummies, duplicates, positions & motions.) A carnivorous female firefly immitates the mating attraction light pattern of females of other species of fireflies.
6.MSS.5.2.D.a - - Simulate something else. -
6.MSS.5.2.D.a.aa - - impersonate. A popular ruse is to impersonate a delivery man or repair man to move about an area unnoticed or to gain access to a house.
6.MSS.5.2.D.b - - Simulate unimportant objects. -
6.MSS.5.2.D.b.aa - - disguise as one of many objects. -
6.MSS.5.2.D.c - - Simulate important objects. -
6.MSS.5.2.D.c.aa - - Simulate same (hidden) object elsewhere. During the Battle of Britain, the British constructed fake airdromes near the real ones and blacked them out just after target had been spotted by German bombers. After the first bombing wave, fires were set to simulate damage and provide markers for the second wave of bombers.
6.MSS.5.2.D.c.bb - - Simulate inputs and outputs to induce target to infer the existence of structure, content, or processes. In a pyramid scheme, or a 'Ponzi' scheme, early investors receive a handsome return on their investment. Instead of being derived from company profits, however, this money is actually that being contributed by later investors. In reality, there are no profits. But the return to previous investors encourages more and more people to invest, and the company may grow very large and appear very prosperous before its ultimate collapse.
6.MSS.5.2.D.c.cc - - Simulate something using a fake which is disposable or easily hidden. -
6.MSS.5.2.E - - Substitute / switch one object for another, especially under cover. (See 1.6.1.1.A.a. continuity; 8.3.A.). -
6.MSS.5.2.E.a - - faked object for real; or defective objects for quality ones (e.g., spare parts). -
6.MSS.5.2.F - - Change features often (use substitutes) to prevent learning which features belong to the pattern. -
6.MSS.5.a - Method or algorithm - -
6.MSS.5.b - Initial low level processing - -
6.MSS.5.b.a - Automatic at lowest levels - -
6.MSS.5.b.b - Controllable at intermediate levels - -
6.MSS.5.c - level of detail - -
6.MSS.5.d - For ambiguous info, fills in info from memory pattern - -
6.MSS.7 Reference Values and Feedback. - - -
6.MSS.7.A - - Induce sensory imbalance by selective fatigue. -
6.MSS.7.B - - Induce sensory imbalance by sensory deprivation. -
6.MSS.7.B.a - - Disorient all or part of the cognitive system by denying sensory feedback / ref stimuli. -
6.MSS.7.C - - Induce / capitalize on loss or distortion of spatial reference. Optical illusions caused by a shift in reference conditions include apparent reverse motion after stopping.
6.MSS.7.D - - Induce / capitalize on loss or distortion of temporal reference (e.g., loss or distortion of sense of time during sleep or intense activity).(See also 2.3.1.1.5.B.a.). Murderer establishes alibi by resetting clocks while his witness is asleep.
6.MSS.7.E - - Induce perception of opposite characteristic by contrast effects. E.g.: -
6.MSS.7.E.a - - color contrast; -
6.MSS.7.E.b - - brightness contrast (brightness changes induced by brightness context; -
6.MSS.8 Buffer Memory. - - -
6.MSS.9 Other. - - -
6.MSS.M41 - (Skin) - Tactile - -
6.a - Inputs: signal (S), and noise (N) - -
7 AFFECTORS & BUFFERS. AFFECTORS & BUFFERS Affector -
7.0 General. - - -
7.03 - (Chemical) - GSR, sweat - -
7.05 - Muscle (Motor) - -
7.05.a - Physical movement - -
7.05.a.a - Body Language - -
7.05.b - Appearance changes - -
7.05.c - Involuntary muscle movements - -
7.05.c.a - Regular automatic (e.g., heart rate) - -
7.05.c.b - Idiosynchratic (subconsciously variable) - -
7.21 - (Acoustic) - Speech - -
7.AA Affector type (AA) specified as follows: Affector Types: - -
7.AA.01 Electromagnetic. - - -
7.AA.02 Acoustic. - - -
7.AA.03 Chemical. - - -
7.AA.05 Kinetic (Physical) (e.g., muscle). - - -
7.AA.1 DRIVE. - - -
7.AA.1.1 Coverage area. - - -
7.AA.1.2 Amplitude. - - -
7.AA.1.3 Capacity (Power). - Induce target to expend limited affector resource uselessly. Dummy ships full of balsa wood were used as decoys to induce submarines to attack, waste torpedos in continued attempts to sink them, and remain long enough to be targeted themselves.
7.AA.1.4 Precision. - - -
7.AA.1.4.1 Spacial. - - -
7.AA.1.4.2 Temporal. - - -
7.AA.21 Speech. - - -
7.AA.3 IMPLEMENT FEATURES (USE OF PRIMATIVES / CHARACTERISTICS). - - -
7.AA.3.1 Speed. - - -
7.AA.3.2 Accuracy. - - -
7.AA.5 IMPLEMENT THE WHOLE (GESTALT); Pattern generation USING TEMPLATES. - Capitalize on affector's inflexible action (speed or accuracy) when driven by preprogrammed (or automatic) routine (eg, a feint). (See also 2.3.1.2.1. Dependence on Automatic Processes.) -
7.AA.5.1 Speed & Response Time. - Capitalize on affector's speed limitations or response time (refractory period) in performing a task: An (illegal) scheme for 'borrowing' money is to cash a check on an empty account, covering it before the check clears by a check on a second empty account, and so on, and on, and on....
7.AA.5.1.a - - Influence target's free decision with a candid gesture or statement, the falseness of which will not be discovered until too late. -
7.AA.5.1.b - - Cause action from which target cannot recover in time to respond to our next action. -
7.AA.5.2 Accuracy. NOTE: 'DIRECT' (ORCHESTRATE), the process for the next higher level, is in EXEC. - - -
7.AA.7 Reference Values and Feedback. - - -
7.AA.7.A - - Cause change in reference position or equilibrium. -
7.AA.7.A.a - - fatigue selected affectors. Push your arms outward very hard against door jam for one minute. Then let them relax at your side. Although target will feel like target are remaining at your sides, target will begin to float up without conscious effort.
7.AA.7.B - - Delay feedback to make fb-dependent processes 'stutter'. Delayed auditory feedback of one's own speech makes one stutter.
7.AA.8 Buffer Memory. - - -
7.AA.9 Other. - - -
7.a - Output: signal, noise - -
8 WORLD IMAGE & LONG TERM MEMORY (LTM) LONG TERM MEMORY & WORLD IMAGE LONG TERM MEMORY (LTM) & WORLD IMAGE PRINCIPLES -
8.1 STRUCTURE OF WORLD-IMAGE KNOWLEDGE & BELIEF - - -
8.1.1 TYPES of Info and Knowledge. - - -
8.1.1.1 STATES (STATE DESCRIPTIONS). - - -
8.1.1.2 PROCESSES. - - -
8.1.2 LEVEL of Info and Knowledge. - - -
8.1.2.1 LOW. - - -
8.1.2.2 MID. - - -
8.1.2.3 HIGH. - - -
8.1.3 ORGANIZATION of Info and Knowledge. - - -
8.1.3.1 Connections. - - -
8.1.3.1.1 Passive associations. - - -
8.1.3.1.2 Causal associations. - - -
8.1.4 ATTRIBUTES of info & K (K-ATTRIBUTES) (Group 1). - - -
8.1.4.1 PURPOSE. - - -
8.1.4.2 IMPORTANCE. - - -
8.1.4.3 APPLICABILITY. - - -
8.1.5 K-ATTRIBUTES (Group 2). - - -
8.1.5.1 QUANTITY. - - -
8.1.5.2 COMPLEXITY. - - -
8.1.5.3 ACCURACY. - - -
8.1.5.4 PRECISION. - - -
8.1.5.5 DEGREE OF FORMALISM (DEGREE TO WHICH EXPLICITLY SPECIFIED). - - -
8.1.6 K-ATTRIBUTES (Group 3). - - -
8.1.6.1 AVAILABILITY. - - -
8.1.6.2 BASIS (SOURCE; DERIVATION). - - -
8.1.6.3 PERMANENCE. - - -
8.1.6.4 RELIABILITY (REPEATABILITY based on statistical tests). - - -
8.1.7 K-ATTRIBUTES: VALIDITY (Correctness based on evidence). - - -
8.1.7.1 Validity of info being stored. - - -
8.1.7.2 Validity of info in knowledge base. - - -
8.1.7.2.a Parameter: Truth value: probability info is true based on evidence (0 to 1). - - -
8.1.7.3 Validity of info after retrieval. - - -
8.1.8 K-ATTRIBUTES: BELIEF & TRUST (Commitment to dependence on K). - - -
8.1.8.1 Belief in info being stored. - - -
8.1.8.2 COGNITIVE SYSTEM's belief about validity of info in its knowledge base. - - -
8.1.8.2.a Parameter: Belief: believe, don't know, disbelieve; believe opposite (1, 0.5, 0; -1). - - -
8.1.8.3 Belief in info after retrieval. - - -
8.1.9 Relationship between info validity and belief. - Utilize or manipulate target's belief about info validity. -
8.1.9.1 Trust in reliable info or source. - - -
8.1.9.2 Distrust of unreliable info or source. - - -
8.1.9.3 Trust in unreliable info or source. - Establish trust in the info, source, or channel so target will utilize it. To make us or other source appear reliable, establish confidence in info; and vice versa. EITHER INFO OR SOURCE (IS): -
8.1.9.3.1 - - INFO ONLY (IO): -
8.1.9.3.1.a - - Provide initial apparent verification of validity. -
8.1.9.3.1.b - - Make target work for info. -
8.1.9.3.1.c - - Make it appear obtaining info is against our will or hurts us. -
8.1.9.3.1.d - - Appeal to the authority of misunderstood 'modern' advancements (e.g., 'science', 'experiment', 'quantitative measures', photographs , medicine. See 1.3.2. -
8.1.9.3.2 - - SOURCE ONLY (SO): -
8.1.9.3.2.a - - Maintain a high truth-to-error ratio. Keep the deceptive indicator frequency less than the channel error rate. A reliable source can provide deceptive info only rarely. Leak valid but minor info, or important but known info, thru known agent. (Move to SI). -
8.1.9.3.2.b - - (Logical Fallacy 22.) Employ a perceived 'authority'. -
8.1.9.3.2.b.aa - - e.g., popular, trusted, famous; even if unqualified, inappropriate, or only tenuously associated with topic. -
8.1.9.3.2.b.bb - - e.g., work under the auspices of an authority. -
8.1.9.3.2.b.cc - - Use majority or prevalent opinion to persuade target to jump on the bandwagon (Logical Fallacy 24). -
8.1.9.3.2.b.dd - - Reference a reliable source of closely related information (as the source of the deceptive information). -
8.1.9.3.2.c - - Induce false belief in third party before relay to target (e.g., before capture & interrogation). -
8.1.9.3.2.d - - Make collaborating sources appear independent. -
8.1.9.3.2.e - - Make target believe target controls source. -
8.1.9.3.2.e.aa - - Make establishment of new sources appear accidental or initiated by target. -
8.1.9.3.2.e.bb - - Utilize / intrude on target's own communication channels. -
8.1.9.3.2.f - - Source (or any deceiver) should play the expected role (e.g., act confident). -
8.1.9.3.2.g - - Conceal our interest in source (control or use). -
8.1.9.3.2.g.aa - - Covertly manipulate third parties by baiting. -
8.1.9.3.2.g.bb - - Covertly utilize visible stooges: -
8.1.9.3.2.g.bb.1 - - - establish an agent as one of target's team. e.g., first establish long term relationship ('mole'). -
8.1.9.3.2.g.bb.2 - - - enlist one of target's team as an agent. -
8.1.9.3.2.g.bb.3 - - - obtain assistance from actor in antagonist role. -
8.1.9.3.2.g.cc - - Covertly utilize hidden stooges: -
8.1.9.3.2.g.cc.1 - - - relay info from encounter area when we and target are away. -
8.1.9.3.IO.b - - - In a trick called a 'hidden exhibition,' a spy places leads in his residence which, when tracked down by an investigating agent, confirm the spy's false identity. The agent finds such evidence very convincing because of the effort necessary to find it and because looking for it was his own idea.
8.1.9.3.IS.c - - - Scientists occasionally succeed in publishing fraudulent experimental results. One reason is that other scientists apparently are unable to believe that another in their profession would do such a thing and, therefore, do not look for fraud.
8.1.9.3.SO.b - - - A scientist published fabricated experimental results under the authority of his unsuspecting superior who was highly respected in the field. He used his friends' goodwill to pass the peer review process, and capitalized on the unwillingness of scientists to believe other scientists would do such a thing.
8.1.9.3.SO.c - - - Before D-Day, commando groups that were sent out were often given false information about Allied invasion plans so that, if captured, target would pass it on to the Germans. Troops to be sent to North Africa were given mosquito netting and lectures on tropical diseases to convince them, and thus enemy spies, that target were to be sent to the tropics instead.
8.1.9.3.SO.d - - - A scientist published fabricated experimental results under the authority of his unsuspecting superior who was highly respected in the field. He used his friends' goodwill to pass the peer review process, and capitalized on the unwillingness of scientists to believe other scientists would do such a thing.
8.1.9.3.SO.e.aa - - - In an intelligence operation, an agent was planted in a class being taken by a Russian spy. Long after the class ended, the agent deliberately met the Russian 'by chance.' Subsequently, the agent was recruited into the Russian organization where he was able to obtain info on Russian agents.
8.1.9.3.SO.g.aa - - - A business agent drops money on the ground to attract a crowd to where his client is. He then makes sure that those who are considering hiring his client see the crowd and believe that it was attracted meerly by his client's presence.
8.1.9.3.SO.g.bb - - - Planting a 'mole' in an adversary's organization is common espionage practice. Moles may work for the adversary for many years before being utilized in a vital espionage role.
8.1.9.3.a - - Provide apparently true or expected info, or simulate a trusted source. -
8.1.9.3.b - - Provide corroborating info from multiple 'independent' sources (e.g., collusion). -
8.1.9.3.c - - Give target a stake in the info or source being (e.g., emotional; cherished beliefs; vested interests; social; claim target has succeeded) -
8.1.9.3.d - - Create what target seeks or can be induced to seek as a sign of source validity. -
8.1.9.4 Distrust of reliable info or source. - Discredit info, source, or channel so target will disregard it. To make source appear unreliable, discredit info; and vice versa. -
8.1.9.4.1 - - EITHER INFO OR SOURCE (IS): -
8.1.9.4.1.a - - Provide recognizably false info -
8.1.9.4.1.b - - Change apparent info quality -
8.1.9.4.1.c - - Make target believe we want target to accept the info. -
8.1.9.4.2.INFO - - ONLY (IO): -
8.1.9.4.2.a - - Induce or capitalize on dislike or distrust of source to induce distrust of information. ('Damning the origin': since dislike source, info must be wrong; Ad hominum: attack the source rather than the information (Logical Fallacy 26.)). (Opposite of appeal to authority Logical Fallacy 22). -
8.1.9.4.IS.a - - - Visitor: Do you pronounce it 'Ha - why - ee' or 'Ha - vhy - ee'? Native: 'Ha - vhy - ee' Visitor: Thank you. Native: You're velcome.
8.1.9.a - - Appeal to decision & judgement processes (1.6.). -
8.1.9.b - - Bias / slant information when transmitting it. Dr. Watson often makes disparaging remarks about Sherlock Holmes' speculations, conning the reader into discounting them.
8.1.9.b.aa - - provide commentary. -
8.1.9.b.bb - - use colorful language (Logical Fallacy 20). -
8.3 LTM ORGANIZATION AND STORAGE PROCESSES. (ORGANIZATION AND STORAGE PROCESSES) - -
8.3.1 Failure of Process. - Cause info not to be stored. -
8.3.1.a - - Induce belief that info is not relevant. In many Agatha Christie mysteries some of the most important clues given by the detective are disguised as offhand comments with a second, completely different, meaning. Other characters reinforce the readers erroneous interpretation of these misleading comments by making the same mistake and responding accordingly.
8.3.1.b - - Induce belief that info is not useful. -
8.3.1.b.aa - - Present confusing or contradictory picture. -
8.3.1.c - - Overwhelm LTM capacity with new info & associations. -
8.3.2 Info Validity. - - -
8.3.2.A - - Induce storage of, reinforce, or capitalize on false or misleading info, especially with reference to target's knowledge structure. E.g., Lie (or create falsehood). May use repetition to reinforce the lie. 'Disinformation'. A scientist published fabricated experimental results under the authority of his unsuspecting superior who was highly respected in the field. He used his friends' goodwill to pass the peer review process, and capitalized on the unwillingness of scientists to believe other scientists would do such a thing.
8.3.2.A.1 - - NOTE 1. OBJECTIVES of lying: -
8.3.2.A.1.a - - to commit fraud; to cover / disguise fraud; -
8.3.2.A.1.b - - to misrepresent opposing viewpoints; -
8.3.2.A.1.c - - to make target expect action when none is intended (words are cheaper than action) (procrastination). -
8.3.2.A.1.d - - to misrepresent the value of materials (e.g., for collecting insurance when object is lost or destroyed.) -
8.3.2.A.1.e - - to misrepresent unqualified materials (e.g., medicines). -
8.3.2.A.1.f - - to misrepresent the significance of information. -
8.3.2.A.1.g - - to provide a cover story for our deceptive actions. -
8.3.2.A.2 - - NOTE 2. DEVICES & METHODS of lying: -
8.3.2.A.2.a - - Initiate or capitalize on false or misleading statements or documents (e.g., press releases, hazard notices, reports, mail order ads, bad checks). -
8.3.2.A.2.b - - Rumors. -
8.3.2.A.2.c - - Information leaks, press leaks. To help prevent an info leak, keep all unnecessary parties (including us) uninformed, or informed only of cover story. -
8.3.2.A.2.d - - Forgeries, counterfeits (e.g., fictitious bank transactions). -
8.3.2.A.2.e - - Preplanned stories. -
8.3.2.A.3 - - NOTE 3. It may be very difficult for target to correct such errors in his knowledge structure, as has been demonstrated in experiments on hoaxing, dehoaxing, and desensitizing. Once target is deceived (i.e., hoaxed), attempts to convince target of the existence and nature of the deception involved (i.e., to dehoax), and to reeducate target to remove the effects of the deception (i.e., to desensitize), may not be successful. This is especially true in experiments employing nested deceptions. Once target has been debriefed regarding part of the hoax, he may no longer behave as he would in the 'real world'; and may also realize that he can't distinguish between hoaxing and dehoaxing information. Therefore, his behavior may change; and he may not trust the correct information when the experimenter is desensitizing him about false information learned during the hoax. (See also 8.8.6.2.B. & C. nested deceptions; 8.8.5.2.1.A. subsequently discredited source.) -
8.3.2.B - - Induce target to store hypothetical example as fact. At an official party, the vague statement 'Someone like the Secretary of State said the U.S. might ....' became 'The Secretary of State said ....' (Official policy), after transmission through several parties to a foreign representative.
8.3.2.B.a - - Communicate general idea via specific hypothetical example. -
8.3.2.C - - Create false results of test or experiment. -
8.3.2.C.a - - Design or implement experiment in a biased way. -
8.3.2.C.b - - Control (rig) the data. -
8.3.2.C.c - - Select only desired portions of results (see also 1.3.3.A. Oversimplification; 1.3.2.2. Subjective validation; 2.4.2. Info Selection.) -
8.3.2.C.d - - Use a misleading model. -
8.3.2.C.e - - Use a misleading measure. -
8.3.2.D - - Interpret results to yield false conclusion, especially by 'lying with statistics' (see also 4.4.3. Analytical Procedures). When quoting divorce rate, failing to restrict the set to first-time marriages.
8.3.2.D.a - - Omit an important factor (e.g., a covariable). -
8.3.2.D.b - - Overemphasize an unimportant fact so that it achieves unwarranted significance or weighting (see 1.3.2.3.). Advertiser stresses features of product which are in fact no different from those of other products.
8.3.A - - Cause incorrect correlation of real or stored information. -
8.3.A.a - - of multisensor inputs. -
8.3.A.b - - So target believes 2 items exist instead of 1 (correlation failure). Coin bobbing, attaching a thread to a coin to retrieve it, was once used to deceive vending machines.
8.3.A.c - - So target believes 1 item exists instead of 2. Just before the PSA airliner collision in San Diego, the air traffic controllers warned the pilot about a close flying small plane. The pilot said he saw it and was avoiding it. Newspaper reports suggested the plane he saw was a different one, however. The jet collided with the plane the controller had reported to the pilot.
8.3.A.d - - So target's memory rep refers to wrong real-world item. -
8.3.A.e - - Misuse of etymology (assuming falsely that a a concept should be closely related to the origin of words describing it) (Logical Fallacy 50). -
8.3.B - - Cause improper associations and organization during storage. -
8.3.B.a - - Use 'brute force' (brainwashing) to create memories or associations. See 1.1. 'Brainwashing'. -
8.3.B.b - - Use context to cause improper associations and organization during storage. -
8.3.B.b.aa - - Use incorrect context. -
8.3.B.b.bb - - Use unusual context which seems usual. -
8.3.B.b.cc - - Induce target to discard correct context. Two jokes in a series of unrelated elephant jokes. Q: Why do elephants paint their toenails pink? (I don't know.) A: To hide in strawberry patches. Q: Have you ever seen an elephant in a strawberry patch? (No.) A: Effective isn't it? (One automatically discards the context of the first joke before listening to the next.)
8.3.B.b.dd - - Induce target to store unrelated items in close 'proximity' and to forget target are unrelated (e.g., by presenting them in close temporal or spatial proximity and following them with a mass of new information). Von Daniken, in Chariots of the Gods, relates his brief visit to a famous Russian scientist, who is noncommittal on the issues, and then his visit to a Russian writer, who is very opinionated. By the end of the chapter, the reader remembers the opinions as belonging to the scientist rather than to the writer.
8.3.B.c - - Induce target to store a composite event which represents the strengths of two similar events. (E.g., emphasize controls on initial attempt (which, however, fails) and success of second attempt (which, however, has fewer controls) to induce target to remember that attempt succeeded with initial controls.) Psychics sometimes perform a magnificient mind reading effect with much showmanship, only to have it fail. In the heightened suspense which follows, he makes a brief second attempt which succeeds. After the performance, most of the audience remembers only that he succeeded under the stringent conditions of his first attempt.
8.3.a - Time required - -
8.3.b - Reference information - -
8.3.c - Input information - -
8.5 LTM RETENTION AND FORGETTING PROCESSES. (RETENTION (AND FORGETTING) PROCESSES) Allows discarding of detailed input when a match is found. - -
8.5.A - - Use 'brute force' to break down memory or associations. See 1.1.A. Brainwashing. Or use subversion (e.g., 1.1.C. Hypnosis). -
8.5.B - - Take advantage of expected imperfect memory over the long term: -
8.5.B.a - - by referring to a plausible, non-existent entity (e.g., emulate plausible, non-existent info source). A practical joker sent Christmas cards to acquaintances under false names, pretending to have known them in the past and announcing he would visit them soon.
8.5.B.b - - by using a series of deceptions which create an overall impression. The overall effect remembered can be much more magnificent than would be possible if target could remember the the individual events separately. -
8.7 LTM SEARCH AND RETRIEVAL PROCESSES. (SEARCH & RETRIEVAL PROCESSES) - -
8.7.A - - Hinder target's info retrieval: -
8.7.A.a - - Supress or eliminate retrieval cues. -
8.7.A.b - - Induce target to initiate retrieval of nonexistent info (that target believes exists). -
8.7.A.c - - Block recall of correct information by activating an interfering process or item. When trying to recall a familiar tune or name, the thought of a similar one can block recall.
8.7.B - - Induce target to recall a particular schema by raising its activation level by activating related schema. -
8.7.C - - Induce target to retrieve false information. -
8.7.C.a - - previously 'known' info (e.g., common knowledge, stereotypes). -
8.7.C.b - - info which we previously induced target to store. -
8.7.D - - Interpret events for target to help him remember the desired (incorrect) version (e.g., a mock explanation to help target misinterpret an upcoming event; a recapitulation of a past event; leading interrogation of a witness.) -
8.7.a - Time required - -
8.7.b - Reference information - -
8.7.c - Input information - -
8.7.d - Compare input and reference information - -
8.7.d.aa - Finds 'schema' in LTM which represents data (matches, classifies, summarizes) - -
8.8 COGNITIVE SYSTEM'S INTERNAL IMAGES: STATE DESCRIPTION KNOWLEDGE & VIEW OF PROCESSES. (WORLD IMAGE): perceptions & beliefs not easily altered - -
8.8.0 - STRUCTURE OF MEMORY - -
8.8.0.a - Knowledge structure - -
8.8.0.b - Frames, schemata - -
8.8.0.c - Nodes and links (relations; associative) - -
8.8.0.d - Organization - -
8.8.0.e - Activation - -
8.8.0.f - MOPS (Memory Organizational Principles) - -
8.8.0.g - Scripts - -
8.8.0.g.a - Episodic memory (based on events) vs Semantic memory (based on hierachies) - -
8.8.0.h - Learned patterns and procedures - -
8.8.0.i - Routines (programs & subroutines) vs production systems (conditions and actions) - -
8.8.0.j - Automatic processes, rote memory, 'habits' - -
8.8.1 COGNITIVE SYSTEM's GENERAL K & BELIEFS ABOUT THE WORLD. (e.g. superstition, stereotypes) - - -
8.8.1.A - - Induce or capitalize on superstitious beliefs or faulty beliefs about the unknown. -
8.8.1.A.a - - Induce the (false) belief that target is under the control of hypnosis, or the fear that target can be made to act against his will through hypnotic power. -
8.8.1.B - - Utilize or build on target's existing beliefs to direct his acceptance or rejection of ideas (e.g., value judgements). -
8.8.1.C - - Induce / capitalize on troublesome social differences. -
8.8.1.D - - Capitalize on common faulty assumptions and beliefs about everyday life. -
8.8.2 COGNITIVE SYSTEM's IMAGE: PHYSICAL WORLD & PROCESSES. (e.g., natural phenomena, math, physics, frequency data, the existence, nature, & effects of processes) - - -
8.8.3 COGNITIVE SYSTEM'S IMAGE: HUMAN BEHAVIOR. - - -
8.8.3.A - - Establish / capitalize on target's trust in human behavior. Especially, establish trust by familiarity or association; capitalize on trust in a known individual or peer. A scientist published fabricated experimental results under the authority of his unsuspecting superior who was highly respected in the field. He used his friends' goodwill to pass the peer review process, and capitalized on the unwillingness of scientists to believe other scientists would do such a thing.
8.8.3.B - - Establish target's trust in an individual for the purpose of exploiting it. -
8.8.3.B.a - - Establish an agent as one of target's fellow group members or subordinates. -
8.8.3.C - - Capitalize on target's failure to realize that the thought patterns of two or more persons (e.g., himself and someone else) may be surprisingly similar due to common experiences, mutual familiarity, or frequent thinking about each other. -
8.8.4 COGNITIVE SYSTEM'S IMAGE: HISTORY, EXPERIENCE, & EVENTS. - - -
8.8.5 COGNITIVE SYSTEM'S IMAGE: K & BELIEFS ABOUT ITSELF ('SELF-IMAGE'). - - -
8.8.5.1 Physical characteristics & capabilities. - Capitalize on inaccuracies in target's concept of his own physical processes, e.g., idiosyncratic movements. In J.R.R. Tolkien's 'The Lord of the Rings,' the advisor Grimer achieves control over the Kingdom of Rohan by convincing the King that he had been affected by age much more than he actually had, and that he must, therefore, severely restrict his activity and let Grimer handle matters for him.
8.8.5.2 Mental characteristics & capabilities. - - -
8.8.5.2.1 Adequacy of knowledge base (STATES). - - -
8.8.5.2.1.A - - Capitalize on target's false beliefs introduced by a subsequently discredited source (dehoaxing does not imply desensitizing: If a source is discredited, target can't easily invalidate info it had provided). In an experiment, a magician was presented to an audience either as a stage magician or as a genuine psychic. He then performed magic tricks which could be interpreted as proof of genuine psychic powers. It was found, even after a debriefing in which it was emphasized that he did not have such powers, that a majority of each audience remained convinced that he did.
8.8.5.2.1.B - - Capitalize on inaccuracies in target's concept of his own knowledge base. -
8.8.5.2.1.a Relation of world image to real world. - - -
8.8.5.2.2 Adequacy of PROCESSES. - Capitalize on inaccuracies in target's concept of his own mental processes: EXEC, CONTROLLER, SENSOR, etc. -
8.8.5.2.A - - Capitalize on inaccuracies in target's concept of his own mental processes. -
8.8.5.2.B - - Capitalize on target's belief in the correctness and justice of his own values, biases, & prejudices (Logical Fallacy 29). -
8.8.5.2.B.a - - in a cause (e.g., in which target is involved); -
8.8.5.2.B.b - - self- righteousness, rationalizing (e.g., something unjust); (e.g., pride and ego prevent the public from accepting that it is so easily deceived). (See also 1.1.1.2. Commitment; 1.1.1.5.4. Involvement; 1.1.1.5.6. Emotion of pride). -
8.8.5.A - - Alter target's self-image. -
8.8.5.A.a - - Especially, lower target's self-esteem. (E.g., see 1.1.A. brainwashing.) Religions and imaginary or exaggerated folk heros help shape people's self-image, especially with regard to goals, capabilities, and loyalties.
8.8.5.A.b - - Provide a desired model for target to believe in and as a model after which to pattern his own self image of ideals, goals, loyalties, and capabilities. -
8.8.5.A.c - - Undermine target's belief, confidence, and trust in target's basis for his values and beliefs, especially to create a vacuum to be filled by our ideology. Undermine target's acceptance of, or motivation to remain loyal to his values and beliefs (e.g., by using guilt, depression). -
8.8.5.B - - Capitalize on / affect target's perceptions of target's goals & priorities. -
8.8.6 COGNITIVE SYSTEM's IMAGE: K & BELIEFS ABOUT OTHER SYSTEM. - - -
8.8.6.1 Physical characteristics & capabilities. - Induce / capitalize on inaccuracies in target's concept of our physical characteristics and capabilities. -
8.8.6.1.a - - Feign our injury, illness, or death. -
8.8.6.1.b - - Feign outward appearances: attractive, likeable. -
8.8.6.2 Mental characteristics & capabilities. - - -
8.8.6.2.1 Adequacy of knowledge base (STATES). - - -
8.8.6.2.1.A - - Induce / capitalize on inaccuracies in target's concept of our knowledge base (world image). -
8.8.6.2.1.A.a - - Feign ignorance of a situation, identity, etc. In the play 'Mayday', we (disguised as chimneysweep) feigns ignorance of target's identity, and insults target to arouse and direct target's anger to our ends.
8.8.6.2.1.A.b - - Search for info we already has to imply we don't have it. -
8.8.6.2.1.B - - Induce / capitalize on inaccuracies in target's concept of our knowledge about target. We send a misleading message in a code that he knows target has cracked. target assumes that we don't know the code has been cracked, and therefore accepts the message as true.
8.8.6.2.1.B.a - - Feign ignorance of target's identity. -
8.8.6.2.1.B.b - - - In the play 'Mayday', we (disguised as chimneysweep) feign ignorance of target's identity, and insults target to arouse and direct target's anger to our ends.
8.8.6.2.1.a Relation of world image to real world. - - -
8.8.6.2.1.b OTHER SYSTEM's knowledge about COGNITIVE SYSTEM. - - -
8.8.6.2.2 Adequacy of PROCESSES. - - -
8.8.6.2.A - - Induce / capitalize on inaccuracies (or ignorance) in target's concept (perceptions) of our mental processes: EXEC (motives, emotions; goals, intent, priorities; means to goals), CONTROLLER, etc. -
8.8.6.2.A.a - - Show great interest in something (see also 2.4.2.2.1.). -
8.8.6.2.A.b - - Show (pretended) relationships with people (e.g., friendship, helpfulness, cooperation). -
8.8.6.2.A.c - - Methods: by feigning personality, enthusiasm, emotions. -
8.8.6.2.A.d - - Show (pretended) agreement or support (e.g., pay lip service) (Logical Fallacy 33). -
8.8.6.2.A.e - - Withhold information about us. -
8.8.6.2.A.f - - Put on false front (e.g., show excessive leniency to captives). -
8.8.6.2.A.g - - Induce target to believe we have a different goal from the actual one, e.g., by making movements which imply it, but which also support, or at least are not incompatible with, the actual goal. aa. e.g., 'reverse psychology'. Head fakes, or fake hand-offs in football.
8.8.6.2.A.h - - Fabricate a cover story to explain motives for our actions; use natural, expected actions. -
8.8.6.2.A.i - - Induce target to act by showing a faked vunerability; feign retreat while preparing to attack (see also 8.6.6.2.A.h. & 1.8.8.2. Current Situation Image). When a predator nears a quail's nest, the mother quail will pull it away from the nest by acting as if she were injured. The predator pursues the 'injured' bird, a seemingly easy prey, and is thus prevented from discovering the nest.
8.8.6.2.B - - Nest visible goal(s) within the covert goal, so as to induce target to perceive progress toward the covert goal as merely progress toward the visible goal(s), and thereby prevent target's discovery of the covert goal (see also 8.3.2.A. NOTE 3. Hoaxing). -
8.8.6.2.C - - Nest covert goal(s) within a visible goal, so as to induce target to perceive progress toward them as merely progress toward the visible goal, and thereby prevent target's discovery of the covert one(s). In Asimov's 'Foundation's Edge,' two men are looking for the planet Earth. The first is looking for it because of its historic importance. The second, however, wants only to locate a particular organization without arousing its suspicions, and is using the search of the first as a cover while he checks out his primary search area, Earth.
8.8.6.2.D - - Establish multiple alternative covert outcomes ('multiple outs'), all of which would appear to achieve a stated goal. Thereby induce target to believe, when any of the outcomes is achieved, that we achieved the stated goal as intended in spite of target's efforts. On a TV show, a magician on the phone had Columbo select a number from 1 to 4. He then directed him to a note hidden under a lamp in which he had correctly predicted the number. Had Columbo selected a different number, the magician would have directed him to a different note.
8.8.6.2.E - - Leave target uncertain of our goals / intent: -
8.8.6.2.E.a - - to hinder target's counterdeception effort. -
8.8.6.2.E.b - - so we can claim success later by switching goals, no matter how things turn out ('multiple outs'). -
8.8.6.2.E.b.aa - - We perform random process, observes result, & challenges target to duplicate the event. -
8.8.6.2.E.b.bb - - If an experiment shows 'worse than chance' results, claim target prove the independent variable (which actually has no effect) has an effect in the opposite direction. Some experimenters have erroneously claimed that an experiment showing fewer ESP hits than expected by chance demonstrates involuntary, counterproductive psychic powers.
8.8.6.A - - Induce / capitalize on inaccuracies in target's concept of our characteristics and capabilities. Suitors may feign wealth. Uri Geller claims to have genuine psychic powers.
8.8.6.A.a - - Make target believe we possess particular characteristics & capabilities. -
8.8.6.A.a.aa - - Simulate qualifications or power (e.g., capitalize on target's awe of a position or title). -
8.8.6.A.a.bb - - Make target believe we possess special information sources. (Mentalists' methods include cold reading techniques such as inducing target to tell us information without realizing or remembering he has done so, and inducing target to fit generalities to himself (see 1.3.2.2.H.c. oddmatches).) -
8.8.6.A.b - - Withhold information about our identity. -
8.8.6.A.c - - Establish in target's mind early a legitimate cover for our activities. Shopper shoplifts and then requests a refund for the product. If he fails to get it, he takes the product and leaves.
8.8.6.A.d - - Make deliberate errors to imply lesser capability. A psychic may make deliberate errors or have deliberate failures to heighten the effect when he succeeds.
8.8.6.A.e - - Possess, unknown to target, particular characteristics & capabilities. -
8.8.6.A.e.aa - - Secretly acquire capability. (e.g., by contriving a special gimmick; or by deriving pertinent info from a complement set.). Especially, capability to discover, steal, organize, or alter information or material. (E.g., hidden miniature transmitters & sensors.) (Mentalists' methods include those for message reading, cold reading, code systems, covert employment of third parties, rapid calculation, sightless vision.) -
8.8.6.A.e.bb - - Induce target to make relevant a capability we secretly possess (e.g., force target to utilize particular information). (Methods include mentalists' techniques for forcing choices.) -
8.8.6.A.e.cc - - Utilize common characteristics or capabilities of which target is unaware (e.g., mnemonic techniques, 'chemical magic' effects). -
8.8.6.B - - Induce / capitalize on inaccuracies in target's concept of our method of operation. -
8.8.6.B.a - - 'Bundle of sticks' (ref: Diaconis): Induce target to systematically rule out all methods we might be using by using multiple methods sucessively to repeat the same effect (so weaknesses in one method are covered by the others.) -
8.8.7 COGNITIVE SYSTEM's IMAGE: K & BELIEFS ABOUT THE CURRENT SITUATION: World state, environment, context, significance of past events, processes currently operating. (See 1.8.8. EXEC Working Info). - - -
8.8.7.A - - Make target believe there is much more to know than there is. -
8.8.7.B - - Capitalize on interia in target's beliefs about world when world changes (e.g. change the world). -
8.8.7.C - - Induce or capitalize on differences between target's knowledge and the true state of the world (e.g., by preparing an area in advance for later entry or observation; using (unseen) gimmicks such as microphones, tracers, indicators, lubricants). Bugging a room.
8.8.7.D - - Induce / capitalize on inaccuracies in target's concept of the current situation. In a mail fraud scheme, one mails out a large number of predictions of an event with two possible outcomes. Half predict one result, half the other. Following the event, predictions are made for another event, but are sent only to those for whom the first prediction was correct. This pattern is repeated until a relatively small number of very-convinced potential victims remain for the next phase of the scam.
8.8.7.D.a - - Make deliberate errors to imply task is more difficult than it really is. A psychic may make deliberate errors or have deliberate failures to heighten the effect when he succeeds.
8.8.A - - Capitalize on target's lack of knowledge (ignorance). Many individuals have tried to sell 'perpetual motion machines' which run forever without additional energy input. Such salesmen capitalize on, among other things, people's ignorance of the physics which makes such devices impossible.
Back - Next