{"id":1223,"date":"2014-10-13T00:52:32","date_gmt":"2014-10-13T05:52:32","guid":{"rendered":"https:\/\/antipolygraph.org\/blog\/?p=1223"},"modified":"2014-10-13T06:15:19","modified_gmt":"2014-10-13T11:15:19","slug":"ncca-seeks-polygraph-countermeasure-detection-software","status":"publish","type":"post","link":"https:\/\/antipolygraph.org\/blog\/2014\/10\/13\/ncca-seeks-polygraph-countermeasure-detection-software\/","title":{"rendered":"NCCA Seeks Polygraph Countermeasure Detection Software"},"content":{"rendered":"<div class=\"entry\">\n<p>A 2013 <a title=\"National Center for Credibility Assessment FY 2013 Research &amp; Development\" href=\"https:\/\/antipolygraph.org\/read.shtml#ncca-research-fy2013\">presentation<\/a> by the National Center for Credibility Assessment documents that the federal polygraph school is working on a computer software project intended to automate the detection of polygraph countermeasures. It appears that the software does not employ a new approach to countermeasure detection, but rather seeks to &#8220;[v]alidate the countermeasure detection features taught by the NCCA Threat Assessment and Strategic Support Branch.&#8221; A competent scientist might first attempt to determine whether such putative &#8220;countermeasure detection features&#8221; are indeed valid, rather than set out to &#8220;validate&#8221; them. NCCA seems not to allow for the possibility that any of their teachings might not be valid.<\/p>\n<p>To date, no polygrapher has ever demonstrated any ability to detect the kinds of countermeasures described in AntiPolygraph.org&#8217;s free book, <a title=\"The Lie Behind the Lie Detector\" href=\"https:\/\/antipolygraph.orglie-behind-the-lie-detector.pdf\"><em>The Lie Behind the Lie Detector<\/em><\/a> or in former police polygraphist Doug Williams&#8217; manual, <a title=\"How to Sting the Polygraph\" href=\"http:\/\/www.polygraph.com\">&#8220;How to Sting the Polygraph&#8221;<\/a> and <a title=\"The Countermeasure Files\" href=\"https:\/\/antipolygraph.org\/read.shtml#countermeasure-files\">documentation<\/a> obtained by AntiPolygraph.org <a title=\"Polygraph Countermeasures: What Polygraph Operators Say Behind Closed Doors\" href=\"https:\/\/antipolygraph.org\/blog\/2013\/04\/07\/polygraph-countermeasures-what-polygraph-operators-say-behind-closed-doors\/\">indicates<\/a> that the polygraph community has no reliable method of detecting such countermeasures.<\/p>\n<p>Indeed, the federal government considers Doug Williams&#8217; information to be such a threat that it launched a <a title=\"McClatchy on Operations Lie Busters\" href=\"https:\/\/antipolygraph.org\/blog\/2013\/08\/17\/mcclatchy-on-operations-lie-busters\/\">criminal investigation<\/a> into him, <a title=\"Doug Williams Goes Public on Federal Agents\u2019 Attempted Entrapment and Raid\" href=\"https:\/\/antipolygraph.org\/blog\/2014\/01\/28\/doug-williams-goes-public-on-his-attempted-entrapment-and-raid-by-federal-agents\/\">attempted to entrap him and raided his home and office<\/a>, seized his customer records, and created and distributed a <a title=\"U.S. Government Circulates Watch List of Buyers of Information on How to Pass a Polygraph Test\" href=\"https:\/\/antipolygraph.org\/blog\/2013\/11\/14\/u-s-government-circulates-watch-list-of-buyers-of-information-on-how-to-pass-a-polygraph-test\/\">watch list<\/a> based on them. Williams remains in legal jeopardy for teaching techniques that the head of the U.S. Customs and Border Protection polygraph unit avers <a title=\"CBP Polygraph Chief John R. Schwartz Claims \u201cSophisticated Countermeasures Can Be Routinely Identified\u201d\" href=\"https:\/\/antipolygraph.org\/blog\/2014\/01\/25\/cbp-polygraph-chief-john-r-schwartz-claims-sophisticated-countermeasures-can-be-routinely-identified\/\">&#8220;can be routinely identified.&#8221;<\/a><\/p>\n<p>The NCCA presentation projects that the countermeasures detection software project would be completed by the end of 2013 with a report and software to be delivered at a date that remained to be determined. The project had a budget of $199,200 in fiscal years 2012 and 2013, with another $100,000 projected for fiscal year 2014.<\/p>\n<p>The slides from the presentation that deal with the countermeasure detection software are reproduced below. Among other things, the presentation indicates that NCCA has developed a &#8220;common NCCA specification&#8221; for polygraph chart data. To AntiPolygraph.org&#8217;s knowledge, such specification has not been publicly documented.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/antipolygraph.org\/blog\/wp-content\/uploads\/2014\/10\/ncca-research-overview-fy2013-p6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-1225\" src=\"https:\/\/antipolygraph.org\/blog\/wp-content\/uploads\/2014\/10\/ncca-research-overview-fy2013-p6-1024x768.png\" alt=\"ncca-research-overview-fy2013-p6\" width=\"730\" height=\"547\" srcset=\"https:\/\/antipolygraph.org\/blog\/wp-content\/uploads\/2014\/10\/ncca-research-overview-fy2013-p6-1024x768.png 1024w, https:\/\/antipolygraph.org\/blog\/wp-content\/uploads\/2014\/10\/ncca-research-overview-fy2013-p6-300x225.png 300w, https:\/\/antipolygraph.org\/blog\/wp-content\/uploads\/2014\/10\/ncca-research-overview-fy2013-p6-730x547.png 730w, https:\/\/antipolygraph.org\/blog\/wp-content\/uploads\/2014\/10\/ncca-research-overview-fy2013-p6.png 1500w\" sizes=\"auto, (max-width: 730px) 100vw, 730px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/antipolygraph.org\/blog\/wp-content\/uploads\/2014\/10\/ncaa-research-overview-fy2013-p7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-1226\" src=\"https:\/\/antipolygraph.org\/blog\/wp-content\/uploads\/2014\/10\/ncaa-research-overview-fy2013-p7-1024x768.png\" alt=\"ncaa-research-overview-fy2013-p7\" width=\"730\" height=\"547\" srcset=\"https:\/\/antipolygraph.org\/blog\/wp-content\/uploads\/2014\/10\/ncaa-research-overview-fy2013-p7-1024x768.png 1024w, https:\/\/antipolygraph.org\/blog\/wp-content\/uploads\/2014\/10\/ncaa-research-overview-fy2013-p7-300x225.png 300w, https:\/\/antipolygraph.org\/blog\/wp-content\/uploads\/2014\/10\/ncaa-research-overview-fy2013-p7-730x547.png 730w, https:\/\/antipolygraph.org\/blog\/wp-content\/uploads\/2014\/10\/ncaa-research-overview-fy2013-p7.png 1500w\" sizes=\"auto, (max-width: 730px) 100vw, 730px\" \/><\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A 2013 presentation by the National Center for Credibility Assessment documents that the federal polygraph school is working on a computer software project intended to automate the detection of polygraph countermeasures. It appears that the software does not employ a new approach to countermeasure detection, but rather seeks to &#8220;[v]alidate the countermeasure detection features taught &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[64,117],"class_list":{"0":"post-1223","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-polygraph","7":"tag-countermeasures","8":"tag-ncca","9":"anons"},"_links":{"self":[{"href":"https:\/\/antipolygraph.org\/blog\/wp-json\/wp\/v2\/posts\/1223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antipolygraph.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antipolygraph.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antipolygraph.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/antipolygraph.org\/blog\/wp-json\/wp\/v2\/comments?post=1223"}],"version-history":[{"count":2,"href":"https:\/\/antipolygraph.org\/blog\/wp-json\/wp\/v2\/posts\/1223\/revisions"}],"predecessor-version":[{"id":1228,"href":"https:\/\/antipolygraph.org\/blog\/wp-json\/wp\/v2\/posts\/1223\/revisions\/1228"}],"wp:attachment":[{"href":"https:\/\/antipolygraph.org\/blog\/wp-json\/wp\/v2\/media?parent=1223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antipolygraph.org\/blog\/wp-json\/wp\/v2\/categories?post=1223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antipolygraph.org\/blog\/wp-json\/wp\/v2\/tags?post=1223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}