On 21 February 2013, federal agents raided former police polygraphist Doug Williams‘ home and office, seizing his customer records as part of an investigation targeting polygraph countermeasure instructors. The U.S. government used these records to create a interagency watch list of individuals who had purchased Williams’ manual, How to Sting the Polygraph, an accompanying DVD, or had received in-person training on how to pass a polygraph “test.”
Court records obtained by AntiPolygraph.org reveal that one of the individuals on the list, Ray Dwight Sluss of Johnson City, Tennessee, a convicted sex offender on probation, passed four post-conviction polygraph examinations. In a memorandum (PDF) dated 22 November 2013, United States Attorney William C. Killian writes:
In 2013, federal agents received information that Sluss had purchased polygraph counter-measures techniques and training from an individual in Oklahoma City, Oklahoma who marketed these products to convicted felons like Sluss who were subject to polygraph examinations. FBI in Oklahoma referred the defendant to FBI in Johnson City, where an agent confirmed that Sluss had been convicted of child pornography crimes, was on state court probation, and had completed periodic polygraph examinations. As a convicted sex offender, Sluss was also subject to limitations on his residence, employment, and activities. FBI verified that Sluss had successfully passed four polygraph examinations since his release from prison.
There is no indication that any polygraph operator ever detected Sluss using polygraph countermeasures. Sluss had completed his polygraph requirement and on 10 September 2010 was placed on “unsupervised” probation.
According to another court filing, on 28 August 2013, FBI Special Agent Peter O’Hare, Jr. “visited Mr. Sluss at his home to question him about a report that Mr. Sluss had purchased materials relating to polygraph examination countermeasures. Mr. Sluss denied making such a purchase.”
O’Hare returned to Sluss’s residence two days later accompanied by the latter’s probation officer, and a search of the home led to the discovery of computer media with child pornography, for possession of which Sluss was sentenced to 17.5 years in federal prison.
The Sluss case highlights the vulnerability of polygraphy to simple countermeasures (see Chapter 4) that polygraph operators cannot detect and the foolishness of official reliance on this pseudoscientific procedure for public safety purposes.