Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


+ - DIA Polygraph Countermeasure Case Files Leaked

Submitted by George Maschke
George Maschke (699175) writes "AntiPolygraph.org (of which I am a co-founder) has published a set of leaked Defense Intelligence Agency polygraph countermeasure case files along with a case-by-case analysis. The case files, which include polygraph charts and the exact questions used, suggest that the only people being "caught" trying to beat the polygraph are those using crude, unsophisticated methods that anyone who actually understood polygraph procedure and effective countermeasures (like, say, a real spy, saboteur, or terrorist) would ever use. AntiPolygraph.org has previously published polygraph community training materials on countermeasures that indicate they lack the ability to detect countermeasures like those described in our free book, The Lie Behind the Lie Detector (PDF) or in former police polygraph examiner Doug Williams' manual, How to Sting the Polygraph . Williams, who was indicted last year after teaching undercover federal agents how to pass a polygraph, is scheduled to stand trial on May 12 in Oklahoma City."

Comment: Re:I blame J. Edgar Hoover (Score 2) 328

J. Edgar Hoover actually took a pretty dim view toward polygraphs. When the FBI relied on them for the first time in a counterintelligence investigation, polygraph results led them to relax surveillance of a Nazi spy suspect, who promised to cooperate with the FBI. But after finishing his polygraph, he got on the next ship to Germany and was gone. See Chapter 15 of Nazi Spies in America, a book by the FBI special agent who was in charge of the bungled case.

Comment: Re:First Post (Score 1) 328

It is telling, I think, that the only "crimes" that the U.S. government alleges against Williams are those it conceived, funded, and stage-managed. The government has had records of nearly 5,000 of his customers for well over a year, and yet the indictment doesn't refer to a single one of his actual customers. I think this is a clear case of the government abusing its investigatory and prosecutorial powers in order to stifle speech it dislikes. Discovery and witness cross-examination in U.S. v. Doug Williams should prove interesting.

Comment: Re:Not as simple as teaching how to ... (Score 1) 328

Indeed, the indictment avoids framing the mere teaching of polygraph countermeasures as a crime. But I think it's clear that Williams was targeted for prosecution in order to silence speech that the U.S. government doesn't like. The only "crimes" in the indictment are those that the government cooked up, funded, and stage-managed. This despite the fact that the government has the names of nearly 5,000 of his customers.

A comment by the head of the U.S. Customs and Border Protection polygraph unit last year before an audience of law enforcement polygraph examiners underscores the political nature of this prosecution. Explaining the criminal investigation, dubbed "Operation Lie Busters," Special Agent John R. Schwartz told members of the American Association of Police Polygraphists that those who “protest the loudest and the longest” against polygraph testing “are the ones that I believe we need to focus our attention on.”

+ - Former Police Officer Indicted for Teaching How to Pass a Polygraph Test

Submitted by George Maschke
George Maschke (699175) writes "On Friday afternoon, the U.S. Department of Justice announced the indictment (2.6 mb PDF) of Douglas Gene Williams, a 69-year-old former Oklahoma City police polygraphist turned anti-polygraph activist for teaching two undercover agents posing as federal law enforcement applicants how to pass (or beat) a polygraph test. Williams offers instruction on how to pass polygraph tests through his website, Polygraph.com, which remains online. Marisa Taylor of McClatchy, who has been covering polygraph policy issues for several years, has written an informative report. This appears to be a case where an individual was targeted for criminal prosecution to suppress speech that the U.S. government dislikes. AntiPolygraph.org, which may also have been the target of an attempted entrapment, has a commentary."

+ - German E-mail Provider Files Criminal Complaint Against Police->

Submitted by George Maschke
George Maschke (699175) writes "German e-mail provider Posteo is the first in the country to issue a transparency report (in German). Posteo reveals that in July 2013 (around the time Ladar Levison of Lavabit was being pressured by the FBI), German authorities pressured Posteo to provide unlawful cooperation and threatened to seize the company's business records if it refused. Instead of complying, Posteo filed a criminal complaint against the officials involved."
Link to Original Source

+ - Anti-Polygraph Instructor Targeted by Feds Goes Public 1

Submitted by George Maschke
George Maschke (699175) writes "Last year, the McClatchy newspaper group reported on a federal criminal investigation into individuals offering instruction on how to pass polygraph tests. The ongoing investigation, dubbed "Operation Lie Busters," has serious free speech implications, and one of the two men known to have been targeted is presently serving an 8-month prison term. The other, Doug Williams, himself a former police polygrapher, has this week for the first time gone public with the story of federal agents' February 2013 raid on his office and home. Williams, who has not been charged with a crime but remains in legal jeopardy, is selling his story in an e-book. Public interest website AntiPolygraph.org (which I co-founded) has published a synopsis."

Comment: Re:When will they realize (Score 1) 303

" The emperor has no clothes, so instead of clothing the emperor we just make sure everybody's wearing a blindfold."

That's precisely the official thinking about polygraph policy. Ten years ago, a senior instructor at the federal polygraph school floated the idea of criminalizing the public dissemination of information about polygraph countermeasures. I never thought it would come to pass, but it seems a considerable effort is being made.

+ - U.S. Government Circulates Watch List of Buyers of Polygraph Book/DVD/Training 1

Submitted by George Maschke
George Maschke (699175) writes "Investigative reporter Marisa Taylor of the McClatchy newspaper group reports that a list of 4,904 individuals who purchased a book, DVD, or personal training on how to pass a polygraph test has been circulated to nearly 30 federal agencies including the CIA, NSA, DIA, DOE, TSA, IRS, and FDA. Most of the individuals on the list purchased former police polygraphist Doug Williams' book, How to Sting the Polygraph, which explains how to pass or beat a polygraph test. Williams also sells a DVD on the subject and offers in-person training. In February 2013, federal law enforcement officials seized Williams' business records, from which the watch list was primarily compiled. Williams has not been charged with a crime."

Comment: Re:George you were hacked. (Score 3, Informative) 465

I did, in fact, first use a PDF reader other than Adobe's. The PDF is available as a MIME attachment to the e-mail I received, the raw source of which can be downloaded here: https://antipolygraph.org/documents/help%20help%20help%20please.eml . If any readers have the technical skills to analyze it for malware, I'd be grateful.

Comment: Re:Sounds like malware, not entrapment (Score 1) 465

I found no malware associated with the PDF, though the thought occurred to me before I opened it that it might be malware. The original, raw source of that e-mail message is available here: https://antipolygraph.org/documents/help%20help%20help%20please.eml

+ - Full Details of My Attempted Entrapment for Teaching Polygraph Countermeasures

Submitted by George Maschke
George Maschke (699175) writes "In May of this year, I was the target of an attempted entrapment, evidently in connection with material support for terrorism. Marisa Taylor of McClatchy reported briefly on this in August. I've now published a full public accounting, including the raw source of the e-mails received and the IP addresses involved. Comments from Slashdot readers more technically savvy than I are welcome."

Dynamically binding, you realize the magic. Statically binding, you see only the hierarchy.