Detecting Concealment of Intent in Transportation Screening: A Proof of Concept

Transportation and border security systems have a common goal: to allow law-abiding people to pass through security and detain those people who intend to harm. Understanding how intention is concealed and how it might be detected should help in attaining this goal. In this paper, we introduce a multidisciplinary theoretical model of intent concealment along with three verbal and nonverbal automated methods for detecting intent: message feature mining, speech act profiling, and kinesic analysis. This paper also reviews a program of empirical research supporting this model, including several previously published studies and the results of a proof-of-concept study. These studies support the model by showing that aspects of intent can be detected at a rate that is higher than chance. Finally, this paper discusses the implications of these findings in an airport-screening scenario.

[1]  Elizabeth Shriberg,et al.  Switchboard SWBD-DAMSL shallow-discourse-function annotation coders manual , 1997 .

[2]  Alex Pentland,et al.  Pfinder: real-time tracking of the human body , 1996, Proceedings of the Second International Conference on Automatic Face and Gesture Recognition.

[3]  Matthew L. Jensen,et al.  Deception detection through automatic, unobtrusive analysis of nonverbal behavior , 2005, IEEE Intelligent Systems.

[4]  Dariu Gavrila,et al.  The Visual Analysis of Human Movement: A Survey , 1999, Comput. Vis. Image Underst..

[5]  Judee K. Burgoon,et al.  Writing Style as Predictor of Newspaper Readership, Satisfaction and Image , 1981 .

[6]  J. Nunamaker,et al.  Automatic, Multimodal Evaluation of Human Interaction , 2010 .

[7]  U. Undeutsch The Development of Statement Reality Analysis , 1989 .

[8]  B. Depaulo,et al.  Telling lies. , 1979, Journal of personality and social psychology.

[9]  H Stanislaw,et al.  Calculation of signal detection theory measures , 1999, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.

[10]  Laura K. Guerrero,et al.  Interpersonal deception: XII. Information management dimensions underlying deceptive and truthful messages , 1996 .

[11]  Shan Lu,et al.  Using multiple cues for hand tracking and model refinement , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..

[12]  J. Burgoon A Communication Model of Personal Space Violations: Explication and an Initial Test. , 1978 .

[13]  Jay F. Nunamaker,et al.  A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..

[14]  M. Zuckerman Verbal and nonverbal communication of deception , 1981 .

[15]  Jay F. Nunamaker,et al.  Training Professionals to Detect Deception , 2003, ISI.

[16]  Jay F. Nunamaker,et al.  Advances in automated deception detection in text-based computer-mediated communication , 2004, SPIE Defense + Commercial Sensing.

[17]  J. Burgoon,et al.  The Dynamic Nature of Deceptive Verbal Communication , 2006 .

[18]  Jay F. Nunamaker,et al.  Speech act profiling: a probabilistic method for analyzing persistent conversations and their participants , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[19]  J. Searle Expression and Meaning: A taxonomy of illocutionary acts , 1975 .

[20]  Matthew L. Jensen,et al.  Blob Analysis of the Head and Hands: A Method for Deception Detection , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[21]  J. Nunamaker,et al.  Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications , 2004 .

[22]  Paul Ekman,et al.  Lying and nonverbal behavior: Theoretical issues and new findings , 1988 .

[23]  Jay F. Nunamaker,et al.  An exploratory study into deception detection in text-based computer-mediated communication , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[24]  James J. Lindsay,et al.  Cues to deception. , 2003, Psychological bulletin.

[25]  Jay F. Nunamaker,et al.  Detecting Deception through Linguistic Analysis , 2003, ISI.

[26]  Andreas Stolcke,et al.  Dialogue act modeling for automatic tagging and recognition of conversational speech , 2000, CL.

[27]  Jay F. Nunamaker,et al.  Using Speech Act Profiling for Deception Detection , 2004, ISI.

[28]  D. M. Green,et al.  Signal detection theory and psychophysics , 1966 .

[29]  A. Vrij Detecting Lies and Deceit: The Psychology of Lying and the Implications for Professional Practice , 2000 .

[30]  J. Searle Expression and Meaning: Studies in the Theory of Speech Acts , 1979 .

[31]  Alex Pentland,et al.  Pfinder: Real-Time Tracking of the Human Body , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[32]  Jay F. Nunamaker,et al.  StrikeCOM: A Multi-Player Online Strategy Game for Researching and Teaching Group Dynamics , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[33]  Matthew L. Jensen,et al.  An Approach for Intent Identification by Building on Deception Detection , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[34]  J. Burgoon,et al.  Interpersonal Deception Theory , 1996 .

[35]  Harry Hollien,et al.  FINAL REPORT CIFA CONTRACT - FA 4814-04-0011 Voice Stress Analyzer Instrumentation Evaluation , 2006 .

[36]  Victor L. Cestaro A Comparison Between Decision Accuracy Rates Obtained Using the Polygraph Instrument and the Computer Voice Stress Analyzer (CVSA) in the Absence of Jeopardy. , 1995 .

[37]  R. Lazarick Airport vulnerability assessment-a methodology evaluation , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[38]  R. Bull,et al.  Detecting Deceit via Analysis of Verbal and Nonverbal Behavior , 2000 .

[39]  Shan Lu,et al.  Color-based hands tracking system for sign language recognition , 1998, Proceedings Third IEEE International Conference on Automatic Face and Gesture Recognition.