Counterintelligence Technologies: An Exploratory Case Study of Preliminary Credibility Assessment Screening System in the Afghan National Defense and Security Forces
Abstract
:1. Introduction
2. Literature Review
2.1. Brief Contextualization
2.2. Sensors and the Preliminary Credibility Assessment Screening System
2.3. Technological Leadership
2.4. Organizational Change
3. Methodology
4. Results and Discussion
4.1. Technological Leadership
4.2. Organizational Change
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Fuller, C.; Biros, D.; Delen, D. An Investigation of Data and Text Mining Methods for Real World Deception Detection. Expert Syst. Appl. 2011, 38, 8392–8398. [Google Scholar] [CrossRef]
- Shamoo, A. Ethical and Regulatory Challenges in Psychophysiology and Neuroscience-based Technology for Determining Behavior. Account. Res. 2010, 17, 8–29. [Google Scholar] [CrossRef] [PubMed]
- Walters, R., Jr.; Traugutt, L. The State of Afghanistan´s Intelligence Enterprise. Mil. Rev. 2017, 97, 64–71. [Google Scholar]
- Senter, S.; Waller, J.; Krapohl, D. Validation Studies for the Preliminary Credibility Assessment Screening System (PCASS); Department of Defense Polygraph Institute: Fort Jackson, SC, USA, 2006. [Google Scholar]
- Widacki, J. Discoverers of the Galvanic Skin Response. Eur. Polygr. 2015, 9, 209–220. [Google Scholar] [CrossRef] [Green Version]
- Palmatier, J.; Rovner, L. Credibility assessment: Preliminary Process Theory, the polygraph process, and construct validity. Int. J. Psychophysiol. 2015, 95, 3–13. [Google Scholar] [CrossRef]
- Gordon, N.; Fleisher, W. Effective Interviewing and Interrogation Techniques, 3rd ed.; Academic Press, Elsevier: Burlington, MA, USA, 2010. [Google Scholar]
- MacNeill, A.; Brandley, M. Temperature Effects on Polygraph Detection of Concealed Information. Psychophysiology 2016, 53, 143–150. [Google Scholar] [CrossRef] [PubMed]
- Kotter, J. Leading Change: Why Transformation Efforts Fail. Harv. Bus. Rev. 1995, 73, 59–67. [Google Scholar]
- Taylor, C. Afghanistan: The Timetable for Security Transition; House of Commons Library: London, UK, 2011. [Google Scholar]
- Berger, M.; Reese, J. From Nation-States in Conflict to Conflict in Nation-States: The United States of America and Nation Building from South Vietnam to Afghanistan. Int. Polit. 2010, 47, 451–471. [Google Scholar] [CrossRef]
- NATO. ISAF´s Mission in Afghanistan (2001–2014) (Archived). 2015. Available online: https://www.nato.int/cps/en/natohq/topics_69366.htm (accessed on 20 August 2020).
- NATO. Inteqal: Transition to Afghan Lead. 2015. Available online: https://www.nato.int/cps/en/natohq/topics_87183.htm (accessed on 23 August 2020).
- US DoD. Enhancing Security and Stability in Afghanistan. Available online: https://media.defense.gov/2020/Jul/01/2002348001/-1/-1/1/enhancing_security_and_stability_in_afghanistan.pdf (accessed on 27 February 2021).
- NATO. NATO and Afghanistan. 2020. Available online: https://www.nato.int/cps/en/natohq/topics_8189.htm (accessed on 19 December 2020).
- NATO. Newsroom. Afghan National Police Learn New System for Intelligence Sharing and Records Archiving. 2018. Available online: https://rs.nato.int/news-center/feature-stories/2018-feature-stories/afghan-national-police-learn-new-system-for-intelligence-sharing-and-records-archiving.aspx (accessed on 20 August 2020).
- Krapohl, D.; Handler, M.; Sturm, S.; Ansley, N.; Backster, C.; Barland, G.; Brown, T.; Cestaro, V.; Dollins, A.; Dutton, D.; et al. Terminology Reference for the Science of Psychophysiological Detection of Deception; 3rd Edition. 2012. Available online: https://www.polygraph.org (accessed on 19 December 2020).
- Senter, S.; Dollins, A.; Krapohl, D. A Comparison of Polygraph Data Evaluation Conventions Used at the University of Utah and the Department of Defense Polygraph Institute. Polygraph 2004, 33, 214–222. [Google Scholar]
- Harris, M.; McQuarrie, A. The Preliminary Credibility Assessment System Embedded Algorithm Description and Validation Results; Johns Hopkins University Applied Physics Laboratory Report Number GED-R-06-7571; Johns Hopkins University: Baltimore, MD, USA, 2009. [Google Scholar]
- Battelle Memorial Institute. Efficacy of Prototype Credibility Assessment Technologies: PCASS Final Report; Battelle Memorial Institute: Columbus, OH, USA, 2007. [Google Scholar]
- CSFP. Counterintelligence Support to Force Protection. Number 5240.22. 2019. Available online: https://fas.org/irp/doddir/dod/ (accessed on 2 July 2019).
- Reis, J. Counterintelligence in Afghanistan: Preliminary Credibility Assessment Screening System. Adv. Mil. Technol. 2020, 15, 43–53. [Google Scholar] [CrossRef]
- Wei, C.; Sheng, L.; Lihua, G.; Yuquan, C.; Min, P. Study on conditioning and feature extraction algorithm of photoplethysmography signal for physiological parameters detection. In Proceedings of the 2011 4th International Congress on Image and Signal Processing, Shanghai, China, 15–17 October 2011; IEEE: Piscatway, NJ, USA, 2011; Volume 4, pp. 2194–2197. [Google Scholar]
- Kubis, J. Analysis of Polygraphic Data (Part 2). Polygraph. J. Am. Polygr. Assoc. 1973, 2, 89–107. Available online: https://www.polygraph.org/assets/docs/APA-Journal.Articles/Vol.2.1973/polygraph%201973%20022.pdf (accessed on 26 August 2020).
- Pool, R. Field Evaluation in Intelligence and Counterintelligence Context: Workshop Summary; National Academies Press: Washington, DC, USA, 2010. [Google Scholar]
- Bartlett, M.; Littlewort, G.; Frank, M.; Lainscsek, C.; Fasel, I.; Movellan, J. Automatic Recognition of Facial Actions in Spontaneous Expressions. J. Multimed. 2006, 1, 22–35. [Google Scholar] [CrossRef]
- Sajjad, M.; Nasir, M.; Ullah, F.; Muhammad, K.; Sangaiah, A.; Baik, S. Raspberry Pi assisted facial expression recognition framework for smart security in law-enforcement services. Inf. Sci. 2019, 479, 416–431. [Google Scholar] [CrossRef]
- Hugdahl, K. Perspectives in Cognitive Neuroscience. Psychophysiology: The Mind-Body Perspective; Harvard University Press: Cambridge, MA, USA, 1995. [Google Scholar]
- Blair, G. Leadership and Context to Create the New Technological Society. J. Innov. Res. Educ. Manag. 2020, 4, 6–9. [Google Scholar]
- Bao, Y. Organizational Resistance to Performance-enhancing Technological Innovations: A Motivation-threat-ability Framework. J. Bus. Ind. Mark. 2009, 24, 119–130. [Google Scholar] [CrossRef] [Green Version]
- Farahnak, L.; Ehrhart, M.; Torres, E.; Aarons, G. The influence of transformational leadership and leader attitudes on subordinate attitudes and implementation success. J. Leadersh. Organ. Stud. 2020, 27, 98–111. [Google Scholar] [CrossRef]
- Lai, F.; Tang, H.; Lu, S.; Lee, Y.; Lin, C. Transformational Leadership and Job Performance. The Mediating Role of Work Engagement. SAGE Open 2020, 10, 2158244019899085. [Google Scholar] [CrossRef] [Green Version]
- Berry, H. Leaders, Laggards, and the Pursuit of Foreign Knoledge. Strateg. Manag. J. 2006, 27, 151–168. [Google Scholar] [CrossRef]
- Smeets, R.; Bosker, E. Leaders, Laggards and Technology Seeking Strategies. J. Econ. Behav. Organ. 2011, 80, 481–497. [Google Scholar] [CrossRef]
- Galvin, T.; Clark, L. Beyond Kotters Leading Change: A Broad Perspective on Organizational Change for Senior US Military Leaders; Army War College Carlisle United Stage: Carlisle, PA, USA, 2015; pp. 1–59. [Google Scholar]
- Sandler, K.; Galvin, T. Leading Change in Military Organizations: Primer for Senior Leaders. Nav. War Coll. Rev. 2020, 73, 13. [Google Scholar]
- Kraus, S.; Clauss, T.; Breier, M.; Gast, J.; Zardini, A.; Tiberius, V. The economics of COVID-19: Initial empirical evidence on how family firms in five European countries cope with the corona crisis. Int. J. Entrep. Behav. Res. 2020, 26, 1067–1092. [Google Scholar] [CrossRef]
- Yin, R. Case Study Research and Applications: Design and Methods; SAGE Publications: Thousand Oaks, CA, USA, 2018. [Google Scholar]
- Hancock, D.; Algozzine, B. Doing Case Study Research: A Practical Guide for Beginning Researchers; Teachers College Press: New York, NY, USA, 2016. [Google Scholar]
- Mills, A.; Durepos, G.; Wiebe, E. Encyclopedia of Case Study Research; SAGE Publications: London, UK, 2010. [Google Scholar]
- Mackenzie, N.; Knipe, S. Research Dilemmas: Paradigms, Methods and Methodology. Issues Educ. Res. 2006, 16, 193–205. [Google Scholar]
- Yin, R. Qualitative Research from Start to Finish; The Guilford Press: New York, NY, USA, 2016. [Google Scholar]
- Given, L. The Sage Encyclopedia of Qualitative Research Methods; SAGE Publications: Thousand Oaks, CA, USA, 2008. [Google Scholar]
- Merriam, S.; Tisdell, E. Qualitative Research: A Guide to Design and Implementation; John Wiley & Sons: Hoboken, NJ, USA, 2015. [Google Scholar]
- Galletta, A. Mastering the Semi-Structured Interview and Beyond: From Research Design to Analysis and Publication; New York University Press: New York, NY, USA, 2013. [Google Scholar]
- Saunders, M.; Townsend, K. Reporting and Justifying the number of Interview Participants in Organizational and Workplace Research. Br. J. Manag. 2016, 27, 836–852. [Google Scholar] [CrossRef]
- Reis, J.; Amorim, M.; Melão, N. Multichannel Service Failure and Recovery in a O2O Era: A Qualitative Multi-Method Research in the Banking Services Industry. Int. J. Prod. Econ. 2019, 215, 24–33. [Google Scholar] [CrossRef]
- Thorpe, R.; Holt, R. The Sage Dictionary of Qualitative Management Research; SAGE Publications: Thousand Oaks, CA, USA, 2008. [Google Scholar]
- Bloor, M.; Wood, F. Keywords in Qualitative Methods: A Vocabulary of Research Concepts; SAGE Publications: London, UK, 2006. [Google Scholar]
- Elo, S.; Kyngäs, H. The Qualitative Content Analysis Process. J. Adv. Nurs. 2008, 62, 107–115. [Google Scholar] [CrossRef] [PubMed]
- Neuendorf, K.; Kumar, A. Content Analysis. Int. Encycl. Polit. Commun. 2015, 1–10. [Google Scholar] [CrossRef]
- Reis, J.; Santo, P.; Melão, N. Impact of Artificial Intelligence Research on Politics of the European Union Member States: The Case Study of Portugal. Sustainability 2020, 12, 6708. [Google Scholar] [CrossRef]
- Stake, R. The Art of Case Study Research; SAGE Publications: Thousand Oaks, CA, USA, 1995. [Google Scholar]
- Ciesielska, M. Qualitative Methodologies in Organization Studies Volume II: Methods and Possibilities; Springer: Cham, Switzerland, 2018. [Google Scholar]
- Golafshani, N. Understanding Reliability and Validity in Qualitative Research. Qual. Rep. 2003, 8, 597–607. [Google Scholar]
- Baesler, J. From Detection to Surveillance: US Lie Detection Regimes from the Cold War to the War on Terror. BEHEMOTH-A J. Civilis. 2015, 8, 46–66. [Google Scholar]
- Beten, D.; Palestini, C.; Marchesoni, E.; Brouillon, M. Advanced Technologies at NATO: An Overview. In Advanced Technologies for Security Applications; Palestini, C., Ed.; NATO Science for Peace and Security Series B: Physics and Biophysics; Springer: Dordrecht, The Netherlands, 2020. [Google Scholar] [CrossRef]
- Cockburn, T.; Smith, P. Reflecting Emerging Digital Technologies in Leadership Models. In Global Business Leadership Development for the Fourth Industrial Revolution; IGI Global: Hershey PA, USA, 2021; pp. 26–64. [Google Scholar]
- Long, A. “Green on Blue”: Insider attacks in Afghanistan. Survival 2013, 55, 167–182. [Google Scholar] [CrossRef]
- Roggio, B.; Lundquist, L. Green-on-Blue Attacks in Afghanistan: The Data. Available online: http://www.longwarjournal.org/archives/2012/08/Green-on-blue_attack.php (accessed on 23 August 2020).
- Shortland, N.; Nader, E.; Sari, H.; Palasinski, M.; Hilland, C. Murder on Maneuver: Exploring Green-on-blue Attacks in Afghanistan. Armed Forces Soc. 2019, 45, 368–388. [Google Scholar] [CrossRef]
- Kircher, J.C.; Packard, T.; Bell, B.G.; Bernhardt, P. Effects of Prior Demonstrations of Polygraph Accuracy on Outcomes of Probable-Lie and Directed-Lie Polygraph Tests; Utah University: Salt Lake City, UT, USA, 2001; Available online: https://apps.dtic.mil/sti/citations/ADA404128 (accessed on 27 February 2021).
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Reis, J.; Amorim, M.; Melão, N.; Cohen, Y.; Costa, J. Counterintelligence Technologies: An Exploratory Case Study of Preliminary Credibility Assessment Screening System in the Afghan National Defense and Security Forces. Information 2021, 12, 122. https://doi.org/10.3390/info12030122
Reis J, Amorim M, Melão N, Cohen Y, Costa J. Counterintelligence Technologies: An Exploratory Case Study of Preliminary Credibility Assessment Screening System in the Afghan National Defense and Security Forces. Information. 2021; 12(3):122. https://doi.org/10.3390/info12030122
Chicago/Turabian StyleReis, João, Marlene Amorim, Nuno Melão, Yuval Cohen, and Joana Costa. 2021. "Counterintelligence Technologies: An Exploratory Case Study of Preliminary Credibility Assessment Screening System in the Afghan National Defense and Security Forces" Information 12, no. 3: 122. https://doi.org/10.3390/info12030122
APA StyleReis, J., Amorim, M., Melão, N., Cohen, Y., & Costa, J. (2021). Counterintelligence Technologies: An Exploratory Case Study of Preliminary Credibility Assessment Screening System in the Afghan National Defense and Security Forces. Information, 12(3), 122. https://doi.org/10.3390/info12030122