LIE DETECTION SYSTEMS

Post on 11-Feb-2016

49 views 0 download

description

LIE DETECTION SYSTEMS. THEORY AND OPERATING PRINCIPLES. AUTONOMIC NERVOUS SYSTEM. Polygraph-Biometrical Measurements. 1. Cardiovascular (heart beat, blood pressure) 2. Respiration 3. Galvanic 4. Brain Waves 5. Muscular Contractions. BIOMETRICAL LINEAR GRAPHS-POLYGRAPH. 1.- 2.- 3.- 4.- - PowerPoint PPT Presentation

Transcript of LIE DETECTION SYSTEMS

LIE DETECTION SYSTEMS

THEORY AND OPERATING PRINCIPLES

AUTONOMIC NERVOUS SYSTEM

Polygraph-Biometrical Measurements

1. Cardiovascular (heart beat, blood pressure)

2. Respiration 3. Galvanic 4. Brain Waves 5. Muscular

Contractions

BIOMETRICAL LINEAR GRAPHS-POLYGRAPH

1.- 2.- 3.- 4.- 5.

EXTREMELY SUBJECTIVE GRAPHS TO INTERPRET

THE “INCONCLUSIVE” PHENOMENOM, MONOPOLY OF EXAMINER, VOLUNTARY

EXTERNAL EFFECTS

Inconclusivity

Danger of a single analyst

The “thumb tack” effect

V. S. A.

EXCESSIVE STRESS:Low level detection

from the Voice

VSA “Excessive” Stress Micro-Tremors in vocal chords –

LIPPOLD effect in the 8-12Hz range- Normal voice range 90-200Hz-

VSA-LIE DETECTION IN INVESTIGATIVE PROCEDURES

POLYGRAPH Invasive method It cannot be applied without the

knowledge of the subject Cannot be used over a phone

line Cannot analyze previous

interrogations Inconclusive results More costly Analysis only in one location

(one on one)

VSA Non-Invasive method It can be applied without the

knowledge of the subject Can be used over a phone line Can be used with previos

recordings No inconclusive results Less costly Can conduct analysis in multiple

locations

VSA G3Voice Stress Analyzer

VSA MARK-2000Voice Stress Analyzer

(earlier model)

VSA 15 Handheld Voice Stress

Analyzer (earlier model)

Answer the following questions:

1. How do you know that the person you are hiring is not or has not been involved in fraud, extortion, selling of company information, or is on the borderline of the law?

2. How do you know that your employees are conducting their functions properly and are not involved in criminal circles?

Answer the following questions:

3. In cases of missing money, false currency, alteration of information, and fraud…How do you determine who is involved?Is it only one person or a group or gang?Is someone in your company leaking information?

Answer the following questions:4. How do you determine if critical processes within your company are conducted properly?5. Have you had the need to evaluate an employee because you have certain suspicions?6. How do you evaluate an employee that you do not see? That is not in front of you? Who is in another city or country?

VSA – Working Principle

By analyzing micro-tremors in the vocal chords of spoken responses to specific questions of concern.

This subconscious reaction cannot be controlled, especially when the questioning is done by a trained expert.

VSA

VSA - Applications

Personnel Selection. Investigations.

– Frauds– Robbery– Loss of Information

Audits and control of Personnel in critical positions.

VSA - Advantages

The analysis can be conducted:– In person – even without the subject’s

knowledge.– Via telephone lines.– With recent or older recordings.– In remote locations with the subject away from

the VSA unit.

VSA - Advantages Multiple analysis from different locations

simultaneously Visual record is possible with covert

camera Numerical read-out No inconclusive results Immediate results Print-out of the results

VSA - Users

Police Departments in the USA:– More than 1000 –More than 2,200 trained

users -California (120) -Florida (106) -Missouri (103)

– Ohio (101) Indiana (76) -North Carolina (40) -Georgia (30) -New York (35) -Wisconsin (25)

– New Jersey (23) -Louisiana (20) -Maryland and Minnesota (15)

– 17 Police Schools

VSA - Users

Police Departments of St. Louis, Miami, Cincinnati, Fairbanks, AK, PD, Prescott, AZ, PD, New Orleans PD, Washington, D.C., Metropolitan, Raleigh, Baltimore, New Mexico State Police, Arizona Dept. of Public Safety, Pittsburgh, Minneapolis, Orlando, Fort Lauderdale and the California Highway Patrol.

VSA - Users

Insurance companies International groups Private investigation companies Casinos Moving Companies Armored Cash Transport Groups

VSA – Technical Characteristics Digital technology of the most advanced fidelity in

recording Printer for record keeping Automatic internal power source 110/220 volts Selective on-board audio source to external line-in Wireless capacity for audio and video applications

VSA - Service

Analysis and evaluation of the specifc situation. Preparation of questionnaires for each specific

subject. Preliminary interview with each subject. Detailed interrogation with each subject using the

VSA Mark-2000 unit. Second interrogation with the VSA Mark-2000 for

subjects of high interest. Report, observations, and suggestions after analysis

of results.

VSA - Source Homeland Security Strategies and HSS Development Recognized world leader in the design, manufacturing and

implementation of the most advanced technology in specialized security, intelligence, counterintelligence, personal protection, and antiterrorism.

www.secintel.com www.bombjammer.com www.cellularintercept.com

VSA-PREPARATION OF THE QUESTIONNAIRE

CONTROL QUESTIONS

QUESTIONS OF NO RELEVANCE

QUESTIONS OF RELEVANCE– S. K. Y.-

CONTROL QUESTIONS Are questions to which we know what is the

truthful answer and are used to calibrate the base line level of stress of each subject being interrogated: “Is your name John Smith?”, “Are we in Miami?”, “Were you born in London?”, “Is your wife’s name Jane?”, etc.

QUESTIONS OF NO RELEVANCE

The purpose of these questions is to create a psychological imbalance on a subject who is “prepared” on what to answer to expected questions: “In the last 24 hours, did you attend the hotel gym?”, “Were you at the 8th street McDonald’s this morning between 8:00 and 8:30AM?”, etc.

Relevant Questions These are the questions of interest in the

investigation and we need to use the technique called “S.K.Y.” – S - K - Y– U - N - O– S - O - U– P - W– E– C– T

VSA-APPLICATIONS IN THE PRESENCE

OF THE SUBJECT BY TELEPHONE

LINK BY E-MAIL WITH RECORDINGS WITH COVERT

AUDIO DEVICES

Questions? Homeland Security

Strategies Thank you for your

interest in the 3rd Generation VSA G3