78574747
submission
George Maschke writes:
AntiPolygraph.org has published a document (14 MB PDF) on polygraph countermeasures that is allegedly derived from classified information. The document suggests techniques that polygraph operators might use in an attempt to detect efforts to beat the polygraph, but fails to offer any coherent strategy for detecting sophisticated countermeasures such as those outlined in AntiPolygraph.org's The Lie Behind the Lie Detector (1 MB PDF) or Doug Williams' How to Sting the Polygraph . Ominously, the leaked document avers that an examinee's stated lack of belief in polygraphy is a marker of deception. AntiPolygraph.org has also published an older U.S. Air Force Office of Special Investigations polygraph countermeasure handbook (3.2 MB PDF) that similarly offers no methodology for detecting sophisticated countermeasures (such as any actual spy, saboteur, or terrorist might be expected to use).
76547881
submission
George Maschke writes:
A mid-career veteran of the FBI has been suspended without pay and faces revocation of his/her security clearance (which would inevitably lead to termination) because the Bureau's polygraph operators allege he/she tried to beat the polygraph. The case is currently the subject of an unpublicized Congressional inquiry. Retired FBI scientist, supervisory special agent, and polygraph critic Dr. Drew Richardson has publicly shared a memorandum he wrote in support of the accused in this case, which has heretofore been shrouded in secrecy. It should be borne in mind that polygraphy is vulnerable to simple countermeasures (PDF, see Ch. 4) that polygraph operators cannot detect. This case is yet another example of how the pseudoscience of polygraphy endangers virtually everyone with a high-level security clearance.
73736545
submission
George Maschke writes:
Patrick G. Eddington writes in a Christian Science Monitor op-ed about indications that the government may be snooping on users of Surespot, a free and open source encrypted messaging app for Android and iOS. Such users include, but are hardly limited to, Islamic State militants.
72037559
submission
George Maschke writes:
AntiPolygraph.org (of which I am a co-founder) has published a set of leaked Defense Intelligence Agency polygraph countermeasure case files along with a case-by-case analysis. The case files, which include polygraph charts and the exact questions used, suggest that the only people being "caught" trying to beat the polygraph are those using crude, unsophisticated methods that anyone who actually understood polygraph procedure and effective countermeasures (like, say, a real spy, saboteur, or terrorist) would ever use. AntiPolygraph.org has previously published polygraph community training materials on countermeasures that indicate they lack the ability to detect countermeasures like those described in our free book, The Lie Behind the Lie Detector (PDF) or in former police polygraph examiner Doug Williams' manual, How to Sting the Polygraph . Williams, who was indicted last year after teaching undercover federal agents how to pass a polygraph, is scheduled to stand trial on May 12 in Oklahoma City.
66622859
submission
George Maschke writes:
On Friday afternoon, the U.S. Department of Justice announced the indictment (2.6 mb PDF) of Douglas Gene Williams, a 69-year-old former Oklahoma City police polygraphist turned anti-polygraph activist for teaching two undercover agents posing as federal law enforcement applicants how to pass (or beat) a polygraph test. Williams offers instruction on how to pass polygraph tests through his website, Polygraph.com, which remains online. Marisa Taylor of McClatchy, who has been covering polygraph policy issues for several years, has written an informative report. This appears to be a case where an individual was targeted for criminal prosecution to suppress speech that the U.S. government dislikes. AntiPolygraph.org, which may also have been the target of an attempted entrapment, has a commentary.
56100639
submission
George Maschke writes:
Last year, the McClatchy newspaper group reported on a federal criminal investigation into individuals offering instruction on how to pass polygraph tests. The ongoing investigation, dubbed "Operation Lie Busters," has serious free speech implications, and one of the two men known to have been targeted is presently serving an 8-month prison term. The other, Doug Williams, himself a former police polygrapher, has this week for the first time gone public with the story of federal agents' February 2013 raid on his office and home. Williams, who has not been charged with a crime but remains in legal jeopardy, is selling his story in an e-book. Public interest website AntiPolygraph.org (which I co-founded) has published a synopsis.
52950453
submission
George Maschke writes:
Investigative reporter Marisa Taylor of the McClatchy newspaper group reports that a list of 4,904 individuals who purchased a book, DVD, or personal training on how to pass a polygraph test has been circulated to nearly 30 federal agencies including the CIA, NSA, DIA, DOE, TSA, IRS, and FDA. Most of the individuals on the list purchased former police polygraphist Doug Williams' book, How to Sting the Polygraph, which explains how to pass or beat a polygraph test. Williams also sells a DVD on the subject and offers in-person training. In February 2013, federal law enforcement officials seized Williams' business records, from which the watch list was primarily compiled. Williams has not been charged with a crime.
52593871
submission
George Maschke writes:
In May of this year, I was the target of an attempted entrapment, evidently in connection with material support for terrorism. Marisa Taylor of McClatchy reported briefly on this in August. I've now published a full public accounting, including the raw source of the e-mails received and the IP addresses involved. Comments from Slashdot readers more technically savvy than I are welcome.
50097883
submission
George Maschke writes:
In a case with serious First Amendment implications, McClatchy reports that federal prosecutors are seeking a prison sentence for Chad Dixon of Indiana, who committed the crime of teaching people how to pass or beat a lie detector test. Some of his students passed polygraphs and went on to be hired by federal agencies. A pleading filed by prosecutors all but admits that polygraph tests can be beaten. The feds have also raided and seized business records from Doug Williams, who has taught many more people how to pass or beat a polygraph over the past 30 years. Williams has not been criminally charged.
I'm a co-founder of AntiPolygraph.org (we suggest using Tor to access the site) a non-profit, public interest website dedicated to exposing and ending waste, fraud, and abuse associated with the use of lie detectors. We offer a free e-book, The Lie Behind the Lie Detector (1 mb PDF) that explains how to pass a polygraph (whether or not one is telling the truth). We make this information available not to help liars beat the system, but to provide truthful people with a means of protecting themselves against the high risk of a false positive outcome. As McClatchy reported last week, I received suspicious e-mails earlier this year that seemed like an attempted entrapment.
Rather than trying to criminalize teaching people how to pass a polygraph, isn't it time our government re-evaluated its reliance on the pseudoscience of polygraphy?