Skip to main content

Currently Skimming:

Appendix K: Behavioral-Surveillance Techniques and Technologies
Pages 250-262

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 250...
... . Many behavioral-detection methods monitor biological systems (such as cardiac activity, facial expressions, and voice tone)
From page 251...
... None of those persons would be the targets of counterterrorist efforts, nor should they be -- and the possibility that their true motivations and intents may be revealed has definite privacy implications. K.2 MAJOR BEHAVIORAL-DETECTION METHODS Most behavioral methods are based on monitoring the activity of neural systems that are thought to be difficult to control voluntarily or that reveal measurable signs when they are being controlled.
From page 252...
... that circle the eyes. 4 Facial-muscle activity can be measured accurately by careful examination of the changes in appearance that are produced as the muscles cause facial skin to be moved.5 Trained coders working with video recordings can analyze facial expressions reliably, but it is extremely time-consuming (it can take hours to analyze a few minutes of video fully)
From page 253...
... and intensity than to the detection of specific emotions. Another indirect method of assessing facial-muscle activity is to measure the "heat signature" of the face associated with changes in blood flow to different facial regions.8 That information can be read remotely by using infrared cameras; however, the spatial and temporal resolutions are problematic.
From page 254...
... In the emotion realm, much of the promise of mapping paralinguistic qualities of vocalization onto specific emotions has yet to be realized, and the history of using paralinguistic markers in the deception realm is not very encouraging. At one time, a great deal of attention was given to the detection of deception by quantifying microtremors in the voice ("voice stress analyzers")
From page 255...
... Decades of methodological development in medicine and psychophysiology have produced ways to measure a wide array of autonomic functions reliably and noninvasively. Some of the measures are direct (such as using the electrical activity of the heart muscle to determine heart rate)
From page 256...
... and stimulus rejection (elevated skin conductance plus heart rate acceleration) ,14 and the more recent distinction between the cardiovascular responses to threat (moderate increases in cardiac contractility, no change or decrease in cardiac output, and no change or increase in total peripheral resistance)
From page 257...
... and indirectly with such methods as magnetoencephalography (MEG, which detects changes in magnetic fields produced by the brain's electrical activity) , positron-emission tomography (PET, which uses radioactive markers to track blood flow into the brain areas that are most active)
From page 258...
... . The electrical activity of the brain can be monitored using these technologies while an individual is undertaking fairly complex behavioral activities and can sometimes be linked to particular discrete stimulus events.
From page 259...
... Successful methods will need to have high rates of true positives and true negatives and low rates of false positives and false negatives. Because of the low base rate of terrorism in most contexts (for example, in airport security lines)
From page 260...
... 0 PROTECTING INDIVIDUAL PRIVACY IN THE STRUGGLE AGAINST TERRORISTS BOX K.1 Questions for Assessing Validity and Characteristics of Accurate Studies Questions for Assessing Validity • Does the technique have a plausible theoretical rationale, that is, a proposed psychological, physiological, or brain mechanism that is consistent with current physi ological, neurobiological, and psychological knowledge? • Does the psychological state being tested for (deception or recognition)
From page 261...
... • Cross-validation of any exploratory data analytic solution on independent data. Any standardized or computerized scoring system for measurements from a technique cannot be seriously considered as providing accurate detection unless it has been shown to perform well on samples of examinees different from those on whom it was developed.
From page 262...
... Traditional jurisprudence and ethics generally regard a person's body as worthy of a higher degree of protection than his or her information, residences, or possessions. Thus, techniques that require the collection of physiological and biological data (especially data relevant to one's thoughts)


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.