DHS OIG Whitewashes CBP Polygraph Complaints (or, CBP Dismisses 5 out of 6 Valid Complaints Against Its Polygraph Operators)

On 26 July 2018, the Department of Homeland Security Office of the Inspector General published report OIG-18-68, titled “Most Complaints About CBP’s Polygraph Program Are Ambiguous or Unfounded” (PDF).

The 17-page report’s findings are summarized on page 5:

Review of CBP’s Polygraph Complaints
We reviewed 157 complaints to determine whether CBP had an effective process and whether the complaints were true. The complaints fell into three categories — those missing information or otherwise too vague to review; those which were not true (the allegation was not substantiated by an audio review); and those which were true (the allegation was substantiated by an audio review). Of the 157 complaints, we determined that:

  • 130 (83 percent) were either not specific or did not have enough information to review;
  • 21 (13 percent) were not true based on the allegation; and
  • 6 (4 percent) were true.

We determined CBP did not adequately address five of the six substantiated complaints. For the complaint it addressed adequately, CBP conducted an audio review and allowed the applicant to retest.

What stands out is that 83% of complaints were judged as either “not specific” or “did not have enough information to review.” No breakdown is provided between these two categories, and no examples of such complaints are provided. However, it seems likely that DHS OIG would have placed in this category any complaint by any CBP applicant who alleged she told the truth yet was accused of lying by her CBP polygraph operator , simply because one cannot prove the negative in such a situation. That is, there is no way any CBP applicant falsely accused of lying can prove that she did not lie. It appears DHS OIG therefore dismisses such complaints out of hand. Yet complaints of being falsely branded as a liar by CBP polygraph operators are by far the most common ones heard.

The above citation also shows that “CBP did not adequately address five of the six substantiated complaints.” A more informative title for this DHS OIG report would be “CBP Dismisses 5 out of 6 Valid Complaints Against Its Polygraph Operators.”

“Nailing the Pretest Interview”: A Presentation by Skip Webb

AntiPolygraph.org has obtained a copy of a 2005 PowerPoint presentation prepared by former U.S. Army Criminal Investigation Command (CID) Supervisory Agent and American Polygraph Association past president and past chairman of the board of directors Milton O. “Skip” Webb, Jr.

Titled “Nailing the Pre-Test Interview: The key to reducing no opinion tests,” this presentation has been a favorite at polygraph conferences for years.

With a focus on specific issue polygraph interrogations conducted in criminal investigations, the opening slides offer a candid acknowledgement of the sort of examiner bias and error that can beset polygraph “tests.” This documentation may be useful to any attorney who needs to challenge the reliability of a client’s polygraph “test.” The following slides speak for themselves:

The entire 44-slide presentation may be downloaded as a 6.5 MB PDF file or as a 269 kb PPT file.

Polygraph Discussion on Witwatersrand University Radio Academy Program “The Science Inside”

Among the topics addressed in the 26 June 2018 episode of the Witswatersrand (Wits) University radio program and podcast “The Science Inside” was polygraph “testing.” Those interviewed for this segment by program editor Elna Schütz include Niel Visser, a retailer who has been subjected to workplace polygraph “testing,” Clifton Coetzee, a practitioner of a variety of pseudosciences including polygraphy, voice stress analysis, statement analysis, and physiognomy, and AntiPolygraph.org co-founder George Maschke. The polygraph segment begins about 36 minutes into the program.

Google De-lists AntiPolygraph.org on Key Search Terms

Search DuckDuckGo for “polygraph” and you’ll find AntiPolygraph.org, which hosts more documentation on polygraphs than any other site on the Internet, in the top 10 results. The same is true for searches on “polygraph” with Microsoft’s Bing search engine (in the United States), with Russia’s Yandex search engine, and with the open-source searX search engine.

But search Google for “polygraph” and you very likely will not be shown any links to any pages on AntiPolygraph.org.

This has not always been true. For years since going online in 2000, AntiPolygraph.org was Google’s top search result for “polygraph.” Eventually, the Wikipedia article titled “Polygraph” took the number 1 spot, but AntiPolygraph.org long remained among the top 10.

Then, around the time the federal government launched Operation Lie Busters, which targeted the owners of websites that provided information on how to pass (or beat) a polygraph “test” for entrapment and criminal prosecution, AntiPolygraph.org’s Google ranking for “polygraph” slipped, often appearing on the second, third, or later pages of results. AntiPolygraph.org has reason to believe that co-founder George Maschke was targeted in Operation Lie Busters, and that visitors to AntiPolygraph.org have been the target of electronic eavesdropping.

AntiPolygraph.org provides documentation on polygraphy that the U.S. government’s intelligence and law enforcement agencies do not want the public — especially those who face polygraph “testing” — to know, including the precise questions asked in various polygraph techniques (PDF), how to pass or beat a polygraph “test” (PDF), and the federal government’s unscientific and ineffective methodology for attempting to detect polygraph countermeasures.

In 2018, it appears that Google has effectively de-listed AntiPolygraph.org for such relevant keywords as “polygraph” and “lie detector.” We first noticed this early in the year; the de-listing has persisted for at least four months.

Google Search Analytics shows that from 29 March 2018 to 26 June 2018, there were no clicks via Google searches on “polygraph” to any page on AntiPolygraph.org:

There were only 7 clicks via Google searches on “lie detector” to any page on AntiPolygraph.org:

Similarly, there were zero clicks via Google searches on “polygraphs” or “lie detectors.”

For comparison purposes, during the same period, there were 165 clicks via Google searches on the exact phrase “where to find underage porn,” even though the linked page does not remotely address this question:

It seems that something is not kosher here. AntiPolygraph.org is a non-profit, public interest website. We host no advertising and we don’t engage in spam, link-farming, or other abusive practices.

Reader thoughts are welcome.

Update (30 June 2018): The situation appears to be worse than we imagined, as illustrated in this screenshot from Google Search Console Beta:

The chart shows that over the past 16 months, Google reports 146,576 impressions for the search word “polygraph,” with an average position of 8.4, but only 381 total clicks, for an average click through rate of just 0.3%!

U.S. Customs and Border Protection Polygraph “Test for Espionage, Sabotage, and Corruption” Exposed

In 2017, U.S. Customs and Border Protection, unable to fill available positions because of the agency’s roughly 70% pre-employment polygraph failure rate (1 MB PDF), began a “pilot program” whereby instead of using the probable-lie Law Enforcement Pre-Employment Test (1 MB PDF) technique used by other federal law enforcement agencies, CBP applicants would instead be subjected to a new directed-lie technique based on the Test for Espionage and Sabotage, which is used by the Departments of Defense and Energy for security screening.

CBP’s new polygraph screening technique is called the “Test for Espionage, Sabotage, and Corruption” or “TES-C.” AntiPolygraph.org has obtained, and is publishing, CBP documentation regarding this procedure, including the precise questions asked, and their order.

Those who face CBP pre-employment polygraph screening can familiarize themselves with this information to prepare and help protect themselves against a false positive outcome, which is common in this scientifically baseless procedure.

The TES-C consists of two main question series, “Sub-test A” and “Sub-test B.” These are XML files (originally with the LXQ file extension associated with the Lafayette Instrument Company’s LX Polygraph Software; AntiPolygraph.org has substituted the XML extension to make the files readable in web browsers).

The questions, in order, with types, on Sub-test A are:

X Start of Chart Please remain still, the test is about to begin.

I1 Irrelevant/Neutral Are the lights on in this room?

I2 Irrelevant/Neutral Are you now sitting down?

SRQ Sacrifice Relevant Concerning/Regarding the security issues we discussed, do you intend to answer each question truthfully?

1C1 Control/Comparison Did you ever commit a minor traffic violation?

1R1 Relevant Have you been involved in terrorism against the US?

1R2 Relevant Have you deliberately compromised any classified information?

1C2 Control/Comparison Did you ever take any (government/company) supplies for your personal use?

2R1 Relevant Have you been involved in terrorism against the US?

2R2 Relevant Have you deliberately compromised any classified information?

2C1 Control/Comparison Did you ever commit a minor traffic violation?

3R1 Relevant Have you been involved in terrorism against the US?

3R2 Relevant Have you deliberately compromised any classified information?

2C2 Did you ever take any (government/company) supplies for your personal use?

XX End of Chart This part of the test is now over, please remain still.

The questions, in order, with types, on Sub-test B are:

X Start of Chart Please remain still, the test is about to begin.

I1 Irrelevant Are the lights on in this room?

I2 Irrelevant Are you now sitting down?

SRQ Sacrifice Relevant Concerning / Regarding the security issues we discussed, do you intend to answer each question truthfully?

1C1 Control/Comparison Did you ever say anything in anger that you later regretted?

1R3 Relevant Have you been involved in any serious criminal activity?

1R4 Relevant Have you deliberately hidden any foreign contact from CBP?

1C2 Control/Comparison Did you ever say anything derogatory about another person behind their back?

2R3 Relevant Have you been involved in any serious criminal activity?

2R4 Relevant Have you deliberately hidden any foreign contact from CBP?

2C1 Control/Comparison Did you ever say anything in anger that you later regretted?

3R3 Relevant Have you been involved in any serious criminal activity?

3R4 Relevant Have you deliberately hidden any foreign contact from CBP?

2C2 Control/Comparison Did you ever say anything derogatory about another person behind their back?

XX End of Chart This part of the test is now over, please remain still.

The scope of the relevant questions is outlined in a Suitability Scoping Guide (28 kb PDF). A PowerPoint presentation titled “CBP Route Maps” also shows the scope of the relevant questions, revealing, among other things, that the question about “serious criminal activity” includes a wide array of crimes ranging from, among other things, “viewing, downloading, searching, distributing, selling, [or] producing” child pornography, drug possession or use in the past three years, and drug transactions anytime.

A CBP Polygraph TES-C Pre-Test Outline lays out in detail the script to be followed by the polygraph operator administering the TES-C. Applicants are required to sign a CBP Applicant Release of Liability form (92 kb PDF) agreeing “not to sue CBP, the Department of Homeland Security (“DHS”), and CBP’s and DHS’s employees, officers, and agents, their heirs, successors, or assigns (the “Released Parties”), and agree to hold the Released Parties harmless of and from any and all actions or omissions, rights or causes of actions, suits, damages, judgments, claims, and demands whatsoever, present or future, in law or in equity, whether known or unknown, which arise out of, result from, occur during, or are connected in any manner with my polygraph examination….”

What other pre-employment test requires such bureacratic CYA?

The pre-test outline also reflects CBP’s fear of polygraph countermeasures, which CBP and other federal agencies have no reliable means of detecting. Step 5 of the pre-test outline instructs the polygraph operator as follows:

5. Countermeasure Statement

  • Tell me what you know about Polygraph.
  • Have you conducted any research on Polygraph?
  • If the examinee answers “No”, let the examinee know that most information on the Internet is opinion based and often incorrect and misleading.
  • Tell the examinee that they should NOT do anything to alter their polygraph examination.
  • If the examinee says “Yes”, they have conducted polygraph research, ask them what information did they learn and where did they get the information.
  • Again, tell the examinee that “most information on the Internet is incorrect and misleading.”

Inform the examinee that they should NOT do anything to alter their polygraph examination.

Polygraph operators want their examinees to be ignorant about polygraphy. They are not nearly so much concerned about examinees getting “incorrect and misleading” information about polygraphy as they are about them getting factual and correct information about polygraphy and polygraph countermeasures. The polygraph operator will likely arbitrarily accuse any examinee who states that he or she has visited AntiPolygraph.org, or otherwise researched polygraphy, with having employed polygraph countermeasures.

Those facing CBP pre-employment polygraph screening will want to read the entire TES-C Pre-Test Outline and additional TES-C documentation available at the AntiPolygraph.org Reading Room. They will also want to read our free book, The Lie Behind the Lie Detector (1 MB PDF) to learn how to protect themselves against the high risk of a false positive outcome associated with this pseudoscientific procedure.

WikiLeaks CIA Vault 7 Leak and Child Pornography Suspect Joshua Adam Schulte Passed Multiple Polygraphs

Joshua Adam Schulte

On 23 August 2017, the U.S. Department of Justice indicted former CIA employee Joshua Adam Schulte for receipt, possession, and transportation of child pornography dating back to 2009.

In 2010, Schulte sought and obtained employment with the CIA. All CIA applicants are required to pass a pre-employment polygraph as well as periodic polygraph screening after hire. The relevant questions asked typically include computer crimes including possession of child pornography. In a proceeding held on 24 August 2017, Schulte’s lawyer, Kenneth F. Smith, stated that Schulte had passed a CIA polygraph that addressed the issue of child pornography:

MR. SMITH: …Pursuant to his employment and his security clearances, he has undergone extensive and extreme vetting, including numerous polygraph examinations. He was subjected to polygraph examinations in the beginning, when he started, and continuing throughout his career. And, Judge, particularly I think it’s important to note  in those polygraph examinations and as a part of that vetting, he was asked specifically about this conduct, and he passed all of those polygraphs with flying colors.

Judge, it’s important because…

THE COURT: He was asked about child pornography in the polygraphs?

MR. SMITH: That’s correct, Judge.

On 18 June 2018, the U.S. Department of Justice issued a superseding indictment additionally charging Schulte with, among other things, “illegal gathering of national defense information…for the purpose of providing it to, and causing it to be provided to, an organization that purports to publicly disseminate classified, sensitive, and confidential information (“Organization-1″), which posted the Classfied Information on the Internet.”

“Organization-1” is widely understood to be WikiLeaks, and the national defense information in question is widely understood to be WikiLeaks’ “Vault 7” release of CIA hacking tools, publication of which began in March 2017.

The indictment alleges that Schulte gathered this information in 2016, the year he left CIA employment. It is unknown whether Schulte was polygraphed after the time that he allegedly gathered information allegedly provided to WikiLeaks.

In any event, if the child pornography charges against Schulte, which again date to 2009, a year before the CIA hired him, are true, and if the polygraph is capable of detecting deception, as the CIA and other federal agencies claim, then the polygraph should have eliminated Schulte from consideration for CIA employment. But it didn’t.

NCCA Test Data Analysis Pamphlet

AntiPolygraph.org has today published the National Center for Credibility Assessment’s “Test Data Analysis: Numerical Scoring System Pamphlet” dated August 2017 (488 kb PDF). A note before the table of contents details the changes made over the years:

Note: The content and substance of this pamphlet was officially approved on 23 Aug 2006. In March 2011, this pamphlet was edited, but only for grammatical issues and curriculum style, format, and consistency of design factors, and no substantive changes to the content were made. In January 2012, content changes were made relative to requirements for two artifact free askings. In June, 2014, content changes were made effectively eliminating the 2:1 ratio from the EDA Ratio Scale. In Aug 2015, content changes were made changing the wording of “artifact free” to “valid asking”, as well as a definition added to App. G. Jan 2017: Changed EDA/CV ROW from “SO to EA” to “SO to 5 seconds beyond the EA”. The latency rule is effectively eliminated by the new ROW. Aug 2017: Updated the description of the 7-position scoring methods for the CV channel.

AntiPolygraph.org has previously published the August 2006 version of this document, which remains available (376 kb PDF).

NCCA Polygraph Countermeasure Course Files Leaked

AntiPolygraph.org has today published a collection of documents associated with the National Center for Credibility Assessment’s training courses on polygraph countermeasures. These documents, which date to circa 2013, describe the U.S. government’s best efforts to detect polygraph countermeasures. Key revelations include:

  • In a secret 1995 study, 80 percent of test subjects who were taught polygraph countermeasures succeeded in beating the U.S. government’s primary counterintelligence polygraph screening technique. The training took no more than an hour. NCCA officials have concealed this study from the National Academy of Sciences and the American public;
  • The federal government’s methods for attempting to detect polygraph countermeasures are conjectural in nature and were developed by two non-scientist polygraph operators at the federal polygraph school;
  • The U.S. government’s polygraph countermeasure detection training is centered on countering information found on two “anti-polygraph websites” (including this one) run by U.S. citizens (one of whom was entrapped and sent to prison and the other of whom was targeted for entrapment). Minimal attention is paid to foreign intelligence services.

The core of the U.S. government’s training for polygraph operators on how to detect countermeasures is a 40-hour “comprehensive” course taught by the National Center for Credibility Assessment’s Threat Assessment and Strategic Support Branch (TASS). The course, called “CE 839,” is restricted to federally certified polygraph operators. The NCCA website, which disappeared from the Internet shortly after the 2016 presidential election, described the course thus (PDD is short for “Psychophysiological Detection of Deception,” a buzzword for “polgyraphy”):

This 40-hour course prepares the PDD examiner to deter and detect employment of polygraph countermeasures in criminal and intelligence testing environments. The course presents background information for a foundation in concepts, theories, and research data related to polygraph countermeasures. Laboratory exercises are included to enhance skills and provide hands-on experience. Detailed discussion of numerous case studies involving examples of confirmed countermeasures. Law enforcement and intelligence PDD examinations are used to demonstrate methods of detecting and defeating this threat. Information provided includes discussion of threats posed by foreign intelligence services, terrorist organizations, and other criminal elements attempting to defeat law enforcement and intelligence PDD examinations. This course is intended as the primary polygraph countermeasures course for criminal and security screening PDD examiners or as a periodic refresher course for examiners supporting intelligence operations. The course included daily directed reading assignments followed by classroom discussions and quizzes.

The documents published today by AntiPolygraph.org include an instructor’s template as well as PowerPoint presentations (including presenter’s notes) for the course.

A note to slide 7 of the first block of instruction (18 MB PDF), dubbed “Back to Basics,” chides AntiPolygraph.org for publishing two Arabic-language jihadist documents on polygraph countermeasures with English translations, averring that “For the Anti-polygraph crowd the ‘end justifies the means’ – they are willing to compromise national security in their quest to rid the world of polygraph.”

No explanation is provided as to how AntiPolygraph.org’s documenting of jihadist literature on polygraph countermeasures (and in the process bringing it to the attention of the federal polygraph community) constitutes our compromising national security. We would counter that NCCA is compromising national security through its embrace of the pseudoscience of polygraphy and its mulish resistance to independent review of its “research” findings.

This “Back to Basics” presentation also includes a suggestion (at slide 22) to overinflate the blood pressure cuff (which causes pain) to punish examinees who breath more slowly than the polygraph operator would like:

Block 2 (11.4 MB PDF) of the comprehensive course (“Physiological Features”) is what NCCA considers to be the core of the course. It identifies features of polygraph tracings that NCCA believes are indicative of polygraph countermeasure use. Although none of the NCCA documents provided to AntiPolygraph.org are marked as being classified, the presenter’s notes for slide 5 state that the discussion will be classified “secret”:

The presenter’s notes for the concluding slide (52) bemoan the fact that “Today we have many performing high level CM. The average person can go on-line and find not only the test technique that will be used in their polygraph but the questions asked.”

You are at the right site to find that kind of information.

The presentation for the fourth block of instruction (4.5 MB PDF) includes some of the information we found most interesting. It documents a secret U.S.  government countermeasure study conducted by Gordon H. Barland circa 1995 in which (including inconclusive results) 80% of test subjects taught to beat the polygraph were successful in doing so. Countermeasure training lasted no more than an hour and consisted of telling the examinee, upon hearing a “control” question, to pick a number over 600 and count backwards by threes.

Slides 7-9, with presenter’s notes, are reproduced below (you can click on the images to view them in a larger size):

Barland’s study strongly suggested that polygraph screening is highly vulnerable to polygraph countermeasures. The U.S. government has concealed this study from the public, including the U.S. National Academy of Sciences’ National Research Council, which in 2001-2002 conducted a  review of the scientific evidence on the polygraph. In its report, The Polygraph and Lie Detection (10.3 MB PDF), the Council noted (at p. 118, emphasis added):

“…we were advised by officials from [the Department of Energy] and [the Department of Defense Polygraph Institute, since renamed the National Center for Credibility Assessment] that there was information relevant to our work, classified at the secret level, particularly with regard to polygraph countermeasures. In order to review such information, several committee members and staff obtained national security clearances at the secret level. We were subsequently told by officials of the Central Intelligence Agency and DoDPI that there were no completed studies of polygraph countermeasures at the secret level; we do not know whether there are any such studies at a higher level of classification.”

NCCA deliberately misled, and concealed relevant documentation from, the National Research Council.

With respect to the mention of officials of the Central Intelligence Agency, note that the most influential person at DoDPI/NCCA at the time was Donald J. Krapohl, a career CIA agent and polygraph operator who for many years was the éminence grise at DoDPI/NCCA.

The presentation goes on to document how two non-scientist NCCA staff members, Paul M. Menges and Daniel V. Weatherman, devised a system that purports to identify those who employed countermeasures in Barland’s study by examining the polygraph tracings. Their scheme identifies a number of “physiological features” that are posited to be evidence of polygraph countermeasure use. The criteria are so broad that any polygraph operator could likely find indications of countermeasure use in any particular set of polygraph charts if he looks hard enough. Slide 13 notes that when Weatherman applied his “global scoring” approach to detect countermeasures, only 47% of the innocent were correctly identified.

The entire NCCA comprehensive countermeasure course is centered on these two non-scientists’ unpublished, un-peer-reviewed “research.”

Slide 36 notes: “Software unable to identify CM.” This is not surprising, given the conjectural, “I know them when I see them!” nature of Menges’ and Weatherman’s countermeasure “detection” methods.

It’s worth noting that around the time Menges and Weatherman were attempting to devise a technique for detecting polygraph countermeasures, Menges authored an article published in the American Polygraph Association quarterly, Polygraph, suggesting that teaching polygraph countermeasures to the public should be outlawed.

A decade later, Doug Williams, who runs Polygraph.com, which features prominently in NCCA’s polygraph countermeasure training, was targeted for entrapment in Operation Lie Busters and ultimately sentenced to two years in federal prison. He has since been released but is prohibited from providing in-person training on how to pass a polygraph “test” until July 2020. AntiPolygraph.org co-founder George Maschke was also targeted for entrapment during Operation Lie Busters but was not charged with any crime. Contemporaneous evidence suggests that AntiPolygraph.org was additionally targeted for surveillance by the NSA.

The fifth block of instruction (5.7 MB PDF) covers suggested supplemental polygraph counter-countermeasure techniques such as the “Repeat the Last Word Test,” the “Focused CM Technique,” the “Yes/No Test,” and the abandonment of the “control” question “test” (CQT) in favor of the Concealed Information Test.

On a final note, recall our 11 October 2014 blog post, “Senior Official at Federal Polygraph School Accused of Espionage.” Then recently-retired Defense Intelligence Agency counterintelligence investigator Scott W. Carmichael said this about these documents in an e-mail message to retired FBI polygrapher Robert Drdak:

The study conducted by Dan [Weatherman] and Paul [Menges] drew on raw data collected by Dr. Gordon H. Barland and the classified report of his earlier study of mental countermeasures dated in 1994. Dan, Paul and Dr. Senter performed their work as employees of DoDPI. Your old colleague and former business partner Don Krapohl provided oversight for their work and edited the report submitted by Dan and Paul back in CY2003. The entire effort was official, and it was based on a classified study.

Dan and Paul believed their findings constituted a new, reliable, and therefore extremely valuable diagnostic tool. Dr. Senter tested the tool and determined that, sure enough, the specific diagnostic features identified by Dan and Paul through their study correlated with a high degree of probability to the employment of countermeasures. As you may know, the U.S. government now requires all federal polygraph examiners to receive 40 hours of instruction on polygraph countermeasures to become certified as federal examiners; and, to receive 4 hours of polygraph countermeasures refresher training every year to maintain their certifications. DoDPI/DCCA [sic, correct NCCA] is so confident in the diagnostic tool developed by Dan and Paul, they decided to use the new tool as the very foundation for the 40-hour instruction and the annual 4-hour refresher training.

Again, Dr. Barland’s 1994 study, which formed the basis for Weatherman and Menges’s study, was classified. By definition, then, and by DoD Instruction, Weatherman and Menges’s study and findings, were therefore also classified.

But DoDPI did something stupid. They committed a security violation. In fact, they did so repeatedly. They found it inconvenient and unwieldy to carry classified briefing slides around with them as they traveled to various parts of the country to teach the diagnostic tool to examiners – and, when they found it necessary to brief uncleared personnel on the tool, rather than follow routine but bothersome administrative procedures which would have enabled them to do so, they elected to simply not stamp their briefing slides at all. Instead, they stamped their materials as Unclassified/FOUO – while handling and treating their materials as though they were classified, in order to ensure their tool did not fall into foreign hands. Why? Because anyone who learns how the entire US government now detects the employment of countermeasures, will be able to device [sic] methods to defeat the US government examination process.

Additional NCCA countermeasure training materials, with brief descriptions, are available for download here.

 

Gordon H. Barland on Polygraph Countermeasures

Gordon H. Barland, Ph.D. worked at the Department of Defense Polygraph Institute (now the National Center for Credibility Assessment) from 1986 until his retirement in 2000. During this period, he conducted research on polygraph countermeasures, and by his own estimation, “[p]rior to his retirement from DoDPI, he was the Federal Government’s primary authority on polygraph countermeasures.”

In July 2003, Dr. Barland presented a week-long course on polygraphy including polygraph countermeasures at the Instituto Nacional de Ciencias Forenses in Mexico City. According to an NCCA timeline on polygraph countermeasures, “[t]he course was presented by Barland after being approved by the National Security Agency.”

AntiPolygraph.org has obtained a copy of the 397-slide PowerPoint file Dr. Barland used in this presentation, which we are also making available as a PDF file. All are invited to download the file and to review it slide by slide. We present here only a few highlights.

The title slide:

Slide 42 discusses common polygraph operator doctrine about countermeasures and admits that it only applies to “naïve” countermeasures, that is, the sort of thing that someone who doesn’t understand polygraph procedure might attempt. In this slide, “E” is shorthand for “examiner”:

In slide 54,  Dr. Barland’s mentions his fear, in the aftermath of the National Research Council’s damning 2003 report (10.3 mb PDF) and referencing a federal lawsuit that was ultimately dismissed on procedural grounds, that the United States Congress might outlaw polygraph screening:

Dr. Barland was particularly concerned with two websites that he said polygraph operators needed to monitor regularly: www.polygraph.com, run by former Oklahoma City Police Department polygrapher Doug Williams, who turned against polygraphy and began offering the public information about polygraphy’s shortcomings and how to pass or beat a polygraph “test,” and AntiPolygraph.org. The CAAWP listserv mentioned in the presentation is defunct:

The presentation devotes numerous slides to Doug Williams, including a biographical synopsis:

Regarding Williams’ motives, Barland paints a very different picture of Williams than did the federal officials behind Operation Lie Busters, who set out to entrap, arrest, and incarcerate him:

Barland goes on to discuss Williams’ manual, How to Sting the Polygraph, at length.

Slide 148 suggests interrogation approaches for getting a polygraph examinee to admit to having used countermeasures:Barland also addresses AntiPolygraph.org and characterized our book, The Lie Behind the Lie Detector as “an excellent polygraph manual, with an extensive chapter on [countermeasures]”:

Numerous slides discuss conversations on the AntiPolygraph.org message board and the contents of The Lie Behind the Lie Detector.

Absent from the presentation is any clearly stated, effective method for reliably detecting the kinds of countermeasures outlined in How to Sting the Polygraph and The Lie Behind the Lie Detector.