After all, although the polygraph cannot be considered to be definitive proof -- it cannot be used as evidence in the court of law, for example -- it is a cheap way to identify and eliminate major threats to security.
Nevertheless, the notorious instances in which the polygraph provided counterintelligence operations with unreliable information seem to loom over the head of much of the information that is gathered through them. Very routinely, the process of determining the reliability of informants in foreign agencies becomes paralyzed even after a polygraph has been administered. Typically, this has occurred within the CIA following apparent breaches of security, or instances in which it was never clearly determined whether an informant was providing legitimate information: "In the case of Vitaly Yurchenko, the CIA Counterintelligence Staff was faced with assessing whether he was a legitimate defector who changed his mind or a planet who intended to redefect from the beginning." It was eventually determined, after several years of investigation into the incident, that Yurchenko was a real defector who was put under pressured from the Soviet Union to return; this conclusion was in agreement with the polygraph administered to him.
Still, the polygraph, though relied upon heavily in the United States, is avoided almost altogether as a recruitment tool abroad: "They believe the polygraph is subjective, that it intrudes too fear into a person's private life, that it makes mistakes, and that people can be trained to beat it. Furthermore, critics of the United States' use...
Evaluating a Counterterrorism Strategy Introduction One of the problems with the “war on terror” as first conceived in the wake of 9/11 was that it lacked objectivity and realism (Taddeo, 2010). The mission calculus was unclear, the operation involved lacking in all the variables of iSTART (ideology, strategy, tactics, accounting/financing, recruitment, targets). What was the aim of the counterterrorism operation in Afghanistan? Numerous negative consequences of the mission followed: the liberation of
Sometimes, it is even necessary to carry out certain clandestine operations like deceptions, clandestine collection of information, covert actions, and also the carrying out of the exercise of distributing disinformation or misleading information, which would mislead the suspected threat. The United States Intelligence Community is, as stated earlier, made up a number of different agencies. The Central Intelligence Agency is one of these. Also known popularly as the CIA, this
Abstract Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state
Police Psychology Identify the different domains police psychologists work in, and discuss some of the roles psychologists might assume when working in different domains. A police psychologist will work primarily in the assessment domain. In many instances, police officers must be properly screened and evaluated prior to duty. In other instances, officers will be evaluating during duty to proper access their ability to fully protect society. As such, psychologists have the primary
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now