Extracting concealed information from groups.

نویسندگان

  • Ewout H Meijer
  • Fren T Y Smulders
  • Harald L G J Merckelbach
چکیده

Lie detection procedures are typically aimed at determining guilt or innocence of a single suspect. Serious security threats, however, often involve groups, such as terrorist networks or criminal organizations. In this report, we describe a variant of the skin conductance-based Concealed Information Test (CIT) that allows for the extraction of critical information from such groups. Twelve participants were given information about an upcoming (mock) terrorist attack, with specific instructions not to reveal this information to anyone. Next, each subject was subjected to a CIT, with questions pertaining to the details of the attack. Results showed that for every question, the average skin conductance response to the correct answer option differed significantly (p < 0.05) from those to all other options. These results show that the information about the upcoming attack could be extracted from the group of terror suspects as a whole.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ارائه مدلی برای استخراج اطلاعات از مستندات متنی، مبتنی بر متن‌کاوی در حوزه یادگیری الکترونیکی

As computer networks become the backbones of science and economy, enormous quantities documents become available. So, for extracting useful information from textual data, text mining techniques have been used. Text Mining has become an important research area that discoveries unknown information, facts or new hypotheses by automatically extracting information from different written documents. T...

متن کامل

Automatic Extraction of Concealed Relations from Email

People interact with each other for various reasons. Based on the purpose of the relationship, these interactions exhibit certain characteristics. One such important characteristic is that of concealment. Concealed relations can often be a source of interest especially in the domain of counterterrorism where relations fostering malicious activities tend to be secretive or concealed from the gen...

متن کامل

Presenting a method for extracting structured domain-dependent information from Farsi Web pages

Extracting structured information about entities from web texts is an important task in web mining, natural language processing, and information extraction. Information extraction is useful in many applications including search engines, question-answering systems, recommender systems, machine translation, etc. An information extraction system aims to identify the entities from the text and extr...

متن کامل

Identifying Insider Threats through Monitoring Mouse Movements in Concealed Information Tests

Insider threats are often cited as the greatest threat to organizations. The identification of insider threats, however, is extremely difficult, expensive, error prone, and time-consuming. For example, the polygraph is used to screen employees for certain government positions; while useful, it cannot be mass-deployed in large organizations, is expensive, and is subject to human bias. To help ov...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of forensic sciences

دوره 55 6  شماره 

صفحات  -

تاریخ انتشار 2010