全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
PLOS ONE  2014 

Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough

DOI: 10.1371/journal.pone.0090595

Full-Text   Cite this paper   Add to My Lib

Abstract:

One major drawback of deception detection is its vulnerability to countermeasures, whereby participants wilfully modulate their physiological or neurophysiological response to critical guilt-determining stimuli. One reason for this vulnerability is that stimuli are usually presented slowly. This allows enough time to consciously apply countermeasures, once the role of stimuli is determined. However, by increasing presentation speed, stimuli can be placed on the fringe of awareness, rendering it hard to perceive those that have not been previously identified, hindering the possibility to employ countermeasures. We tested an identity deception detector by presenting first names in Rapid Serial Visual Presentation and instructing participants to lie about their own identity. We also instructed participants to apply a series of countermeasures. The method proved resilient, remaining effective at detecting deception under all countermeasures.

References

[1]  Skolnick JH (1961) Scientific Theory and Scientific Evidence: An Analysis of Lie-Detection. The Yale Law Journal 70: 694–728.
[2]  Wolpe PR, Foster KR, Langleben DD (2005) Emerging neurotechnologies for lie-detection: Promises and perils. The American Journal of Bioethics 5: 39–49. doi: 10.1080/15265160590923367
[3]  Vrij A (2008) Detecting lies and deceit: Pitfalls and opportunities. Wiley-Interscience.
[4]  Committee to Review the Scientific Evidence on the Polygraph, National Research Council (2003) The Polygraph and Lie Detection. The National Academies Press.
[5]  Kleinmuntz B, Szucko JJ (1984) Lie detection in ancient and modern times. A call for contemporary scientific study. The American psychologist 39: 766–776. doi: 10.1037/0003-066x.39.7.766
[6]  Lykken DT (1998) A tremor in the blood: Uses and abuses of the lie detector. Plenum Press.
[7]  Saxe L, Dougherty D, Cross T (1985) The validity of polygraph testing: Scientific analysis and public controversy. American Psychologist 40: 355. doi: 10.1037/0003-066x.40.3.355
[8]  Farwell LA, Donchin E (1991) The Truth Will Out: Interrogative Polygraphy (”Lie Detection”) With Event-Related Brain Potentials. Psychophysiology 28: 531–547. doi: 10.1111/j.1469-8986.1991.tb01990.x
[9]  Rosenfeld JP, Labkovsky E, Winograd M, Lui MA, Vandenboom C, et al. (2008) The Complex Trial Protocol (CTP): A new, countermeasure-resistant, accurate, P300-based method for detection of concealed information. Psychophysiology 45: 906–919. doi: 10.1111/j.1469-8986.2008.00708.x
[10]  Langleben DD, Schroeder L, Maldjian Ja, Gur RC, McDonald S, et al. (2002) Brain activity during simulated deception: an event-related functional magnetic resonance study. NeuroImage 15: 727–732. doi: 10.1006/nimg.2001.1003
[11]  Wang G, Chen H, Atabakhsh H (2004) Automatically detecting deceptive criminal identities. Communications of the ACM 47: 70–76. doi: 10.1145/971617.971618
[12]  Inbau FE, Reid JE (1964) Lie-Detector Technique: A Reliable and Valuable Investigative Aid, The. American Bar Association Journal 50: 470–473.
[13]  Honts CR, Amato SL, Gordon AK (2001) Effects of spontaneous countermeasures used against the comparison question test. Polygraph 30: 1–9.
[14]  Hu X, Hegeman D, Landry E, Rosenfeld JP (2012) Increasing the number of irrelevant stimuli increases ability to detect countermeasures to the P300-based Complex Trial Protocol for concealed information detection. Psychophysiology 49: 85–95. doi: 10.1111/j.1469-8986.2011.01286.x
[15]  Ganis G, Rosenfeld JP, Meixner J, Kievit Ra, Schendan HE (2011) Lying in the scanner: covert countermeasures disrupt deception detection by functional magnetic resonance imaging. NeuroImage 55: 312–319. doi: 10.1016/j.neuroimage.2010.11.025
[16]  Meixner JB, Rosenfeld JP (2010) Countermeasure mechanisms in a P300-based concealed information test. Psychophysiology 47: 57–65. doi: 10.1111/j.1469-8986.2009.00883.x
[17]  Labkovsky E, Rosenfeld JP (2012) The P300-based, complex trial protocol for concealed information detection resists any number of sequential countermeasures against up to five irrelevant stimuli. Applied psychophysiology and biofeedback 37: 1–10. doi: 10.1007/s10484-011-9171-0
[18]  Lui M, Rosenfeld JP (2009) The application of subliminal priming in lie detection: Scenario for identification of members of a terrorist ring. Psychophysiology 46: 889–903. doi: 10.1111/j.1469-8986.2009.00810.x
[19]  Maoz K, Breska A, Ben-Shakhar G (2012) Orienting response elicitation by personally significant information under subliminal stimulus presentation: demonstration using the concealed information test. Psychophysiology 49: 1610–1617. doi: 10.1111/j.1469-8986.2012.01470.x
[20]  Giesbrecht B, Bischof WF, Kingstone A (2003) Visual masking during the attentional blink: tests of the object substitution hypothesis. Journal of Experimental Psychology: Human Perception and Performance 29: 238. doi: 10.1037//0096-1523.29.1.238
[21]  Bowman H, Wyble B (2007) The simultaneous type, serial token model of temporal attention and working memory. Psychological Review 114: 38–70. doi: 10.1037/0033-295x.114.1.38
[22]  Bowman H, Filetti M, Janssen D, Su L, Alsufyani A, et al. (2013) Subliminal salience search illustrated: EEG identity and deception detection on the fringe of awareness. PLoS ONE 8: e54258. doi: 10.1371/journal.pone.0054258
[23]  Luck SJ, Vogel EK, Shapiro KL (1996) Word meanings can be accessed but not reported during the attentional blink. Nature 383: 616–618. doi: 10.1038/383616a0
[24]  Craston P, Wyble B, Chennu S, Bowman H (2009) The attentional blink reveals serial working memory encoding: evidence from virtual and human event-related potentials. Journal of Cognitive Neuroscience 21: 550–566. doi: 10.1162/jocn.2009.21036
[25]  Chennu S, Craston P, Wyble B, Bowman H (2009) Attention Increases the Temporal Precision of Conscious Perception: Verifying the Neural-ST2 Model. PLoS Computational Biology 5: e1000576. doi: 10.1371/journal.pcbi.1000576
[26]  Delorme A, Makeig S (2004) EEGLAB: an open source toolbox for analysis of single-trial EEG dynamics including independent component analysis. Journal of Neuroscience Methods 134: 9–21. doi: 10.1016/j.jneumeth.2003.10.009
[27]  Polich J, Comerchero MD (2003) P3a from visual stimuli: typicality, task, and topography. Brain topography 15: 141–152. doi: 10.1023/a:1022637732495
[28]  Blair RC, Karniski W (1993) An alternative method for significance testing of waveform difference potentials. Psychophysiology 30: 518–524. doi: 10.1111/j.1469-8986.1993.tb02075.x
[29]  Hayasaka S, Nichols TE (2004) Combining voxel intensity and cluster extent with permutation test framework. Neuroimage 23: 54–63. doi: 10.1016/j.neuroimage.2004.04.035
[30]  Whitlock MC (2005) Combining probability from independent tests: the weighted Z-method is superior to Fisher’s approach. Journal of Evolutionary Biology 18: 1368–1373. doi: 10.1111/j.1420-9101.2005.00917.x
[31]  Ludbrook J (2008) Analysis of 2×2 tables of frequencies: matching test to experimental design. International Journal of Epidemiology 37: 1430–1435. doi: 10.1093/ije/dyn162
[32]  Fay MP, Proschan MA (2010) Wilcoxon-Mann-Whitney or t-test? On assumptions for hypothesis tests and multiple interpretations of decision rules. Statistics surveys 4: 1–39. doi: 10.1214/09-ss051
[33]  Fischler I, Jin Y-S, Boaz TL, Perry NW, Childers DG (1987) Brain potentials related to seeing one’s own name. Brain and Language 30: 245–262. doi: 10.1016/0093-934x(87)90101-5
[34]  Fischer C, Dailler F, Morlet D (2008) Novelty P3 elicited by the subject’s own name in comatose patients. Clinical Neurophysiology 119: 2224–2230. doi: 10.1016/j.clinph.2008.03.035
[35]  Tateuchi T, Itoh K, Nakada T (2012) Neural mechanisms underlying the orienting response to subject’s own name: an event-related potential study. Psychophysiology 49: 786–791. doi: 10.1111/j.1469-8986.2012.01363.x
[36]  Holeckova I, Fischer C, Giard M-H, Delpuech C, Morlet D (2006) Brain responses to a subject’s own name uttered by a familiar voice. Brain Research 1082: 142–152. doi: 10.1016/j.brainres.2006.01.089
[37]  Polich J (2007) Updating P300: an integrative theory of P3a and P3b. Clinical neurophysiology 118: 2128–2148. doi: 10.1016/j.clinph.2007.04.019
[38]  Bergstr?m ZM, Anderson MC, Buda M, Simons JS, Richardson-Klavehn A (2013) Intentional retrieval suppression can conceal guilty knowledge in ERP memory detection tests. Biological Psychology 94: 1–11. doi: 10.1016/j.biopsycho.2013.04.012

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133