Polygraph
There has always been a search for a way in the social order regarding the degree of truthfulness or dishonesty in an individual. History reveals that there has been almost a universal constant endeavor to uncover the falsehood and know the truth. The Ancient Chinese, Arabs and Indians are known to have used methods from torture to duel fight for obtaining the truth and distinguish innocent and guilty (White Jr., 2001, p. 483).
This quest of differentiating the liar and the honest still goes on today. One of the modern-day methods to distinguish truth from fraud is the use of the polygraph (lie detector). The polygraph is both favored and criticized by the modern man. It is defended on the basis of its success as innumerable criminals have confessed and numerous spies and terrorists have been uncovered when tested through the polygraph. Moreover, its capability in revealing the employee theft and saving millions of dollars has also made polygraph a dependable instrument. On the other hand, polygraph is considered a quackery and trick by its critics who claim it to be erratic, illogical and variable. They regard it as an unreliable tool that has branded countless innocent persons as guilty (White Jr., 2001, p. 483).
What is a Polygraph?
A polygraph is a sensitive and receptive electronic examining device. It uses ink writing pens for marking out diverse types of physiological responses on a moving chart paper. Modern polygraphs are convenient and transportable that can fit inside an attache case. It monitors and examines those physiological reactions that are run by the autonomic nervous system. Autonomic is that branch of the nervous system that is susceptible to an individual's emotional states. Three types of autonomic responses i.e. palmar sweating, blood pressure & pulse rate and respiratory activity are usually measured using a polygraph. The signals that are received from these autonomic responses are recorded while different types of questions are asked to the suspected individual. Thus, polygraph examiners scrutinize the record obtained on the resulting paper to determine whether the person is truthful or not (Brewer & Wilson, 1995, p. 156).
Brief History
In order to detect lie, oafish and horrible methods were used by the civilizations that existed as early as 300 B.C. The hot iron method which required the suspected individual to lick a hot iron was used by the Bedouins of Arabia. The person was regarded as truthful is his or her tongue did not get burned. Similarly, the rice powder method was developed by the ancient Chinese. In this method, the person was asked to place rice powder in the mouth. he/she was considered as honest if the rice powder came out moist. The belief that governed these practices was that those people who lie have a dryer mouth and less saliva. Primitive people who detected lies using such method believed that those who are not nervous and tell the truth have moist mouths with more saliva (Lewis & Cuppari, 2009).
In the 18th century, the adverse method of burning was used. The accused was to stick his or her hand into a pot of boiling water. He or she was considered as lying if the hand was burned. The individual was considered to be lying. In the same way, a test was conducted in which red hot stones were used to find out the reality. The person was considered untruthful if his/her feet burned (Lewis & Cuppari, 2009).
To end with, it was the Italian criminologist, physician, and anthropologist, Cesare Lombrosso who in 1881 created the first contemporary lie detection device called Lombrosso's Glove. Using this instrument, Lombrosso attempted to measure changes in the blood pressure of the accused. He recorded those changes on a graph/chart. Later, another lie detection technology was introduced during the World War I by William M. Marston who used it to inquire the prisoners of war. This technology turned out to be a popular one in criminal investigation. However, the credit of the creation of the first genuine and authentic polygraph goes to John Larson and Leonarde Keele as it...
There are three types of stimuli used, which are: 1) Targets; 2) Irrelevant; and 3) Probes. These are used "in the form of words, pictures, or sounds..." which a computer presents for a second or even a partial second. Incoming stimulus, if it is worth noting, results in a P-300, which is an electrical brain response. The P-300 is part of a MERMER or a memory and encoding related multifaceted electroencephalographic response,
Identify examples of problems dealing with educational levels, pay scale, and seniority. Problems with educational levels, pay scale, and seniority are also issues with merged departments. Smaller departments may not have had the training opportunities that larger departments had, and their officers may not be as prepared or well versed in some areas, such as detective work or gang activities. This can affect pay scale, and different departments may have different
After all, although the polygraph cannot be considered to be definitive proof -- it cannot be used as evidence in the court of law, for example -- it is a cheap way to identify and eliminate major threats to security. Nevertheless, the notorious instances in which the polygraph provided counterintelligence operations with unreliable information seem to loom over the head of much of the information that is gathered through them.
Green River Killer In 1982, the remains of a number of young women started to show up in the area surrounding Seattle. These women were all relatively young and shared a lifestyle, prostitution and street life, that made them easy targets for a killer. Before the slayings officially ended in 1998, a total of 42 women would be thought to be potential victims of the Green River Killer with the potential
This process of prescreening travelers before they board the plane is one of the most important parts of the security system. Electronic Privacy Information Center, 2008); (United States Government Accountability Office, 2007) Another system which was in use since the late 1990s and discontinued after 9/11, was the Threat Image Protection -- TIP system. TSA has also implemented the PMIS or Performance Management Information System which helps to gather
Big Brother Watches America When Orson Wells wrote his famous novel about government surveillance taken to the extreme, the world he described seemed very unrealistic. However, at the turn of the new millenium, the world that he describes is not so different and it seems as if we are just one step away from the "thought police" knocking on the door. For some this gives them an extra-added element of
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now