Extending Textual Models of Deception to Interrogation Settings
Abstract
Models that detect deception in text typically outperform humans but are limited to single pieces of text created by a single individual. Text from dialogues and wider conversations reflects linguistic influence among the participants, and this intertwining makes it difficult to ascribe deception to any one of them. We address this problem in dialogues, particularly interrogations. by seeking to detect and remove the influence of the language of a question from the language of the response. Surprisingly, this does not work as expected: the response by a deceptive person to certain categories of words in questions is qualitatively different from that of a truthful person. Successful prediction of deception in responses, therefore, requires analysis using the words of both questions and answers. We show that such prediction is indeed effective.
Keywords
Full Text:
PDFReferences
(1) American Broadcasting Company. 2011 (December 11). Full Transcript: ABC News Iowa Republican Debate. abcnews.go.com/Politics/full-transcript-abc-news-iowa-republican-debate/.
(2) Breiman, L. 2001. Random Forests. Machine Learning, 45, 5–32.
(3) Brown, A.S., & Murphy, D.R. 1989. Cryptomnesia: Delineating Inadvertent Plagiarism. Journal of Experimental Psychology: Learning, Memory, and Cognition, 15(3), 432–442.
(4) Burgoon, J.K., Hamel, L., & Qin, T. 2012. Predicting Veracity from Linguistic Indicators. Pages 323–328 of: 2012 European Intelligence and Security Informatics Conference.
(5) Cable News Network. 2011a (September 12). Full Transcript of CNN-Tea Party Republican Debate, 20:00-22:00. transcripts.cnn.com/TRANSCRIPTS/1109/12/se.06.html.
(6) Cable News Network. 2011b (June 13). Republican Debate. transcripts.cnn.com/TRANSCRIPTS/1106/13/se.02.html.
(7) Cable News Network. 2012a (Feburary 22). Full Transcript of CNN Arizona Republican Presidential Debate.
archives.cnn.com/TRANSCRIPTS/1202/22/se.05.html.
(8) Cable News Network. 2012b (January 26). Full Transcript of CNN Florida Republican Presidential Debate. archives.cnn.com/TRANSCRIPTS/1201/26/se.05.html.
(9) Carlson, J.R., George, J. F., Burgoon, J.K., Adkins, M., & White, C.H. 2004. Deception in Computer-Mediated Communication. Group Decision and Negotiation, 13, 5–28.
1023/B:GRUP.0000011942.31158.d8.
(10) Chartrand, T. L., & van Baaren, R. 2009. Human Mimicry. Advances in Experimental Social Psychology, 41.
(11) Chicago Sun-Times. 2011a (November 13). CBS/National Journal GOP debate. Transcript, video. blogs.suntimes.com/sweet/2011/11/_cbsnational_journal_gop_debat.html.
(12) Chicago Sun-Times. 2011b (November 9). CNBC Republican debate. Transcript, video highlights. blogs.suntimes.com/sweet/2011/11/cnbc_republican_debate_transcr.html.
(13) Chicago Sun-Times. 2011c. CNN Republican debate, Nov. 22, 2011. Transcript. blogs.suntimes.com/sweet/2011/11/cnn_republican_debate_nov_22_2.html.
(14) Chicago Sun-Times. 2011d (October 19). Republican Las Vegas CNN debate: Transcript. blogs.suntimes.com/sweet/2011/10/republican_las_vegas_cnn_debat.html.
(15) Chicago Sun-Times. 2012a (January 8). GOP NH ABC/Yahoo News debate: Transcript. blogs.suntimes.com/sweet/2012/01/gop_nh_abcyahoo_news_debate_tr.html.
(16) Chicago Sun-Times. 2012b (January 8). GOP NH NBC’s Meet the Press/Facebook debate: Transcript. blogs.suntimes.com/sweet/2012/01/gop_nh_nbcs_meet_the_pressface.html.
(17) Chicago Sun-Times. 2012c (January 20). South Carolina GOP CNN debate, Jan. 19, 2012. Transcript. blogs.suntimes.com/sweet/2012/01/south_carolina_gop_cnn_debate_.html.
(18) Chung, C., & Pennebaker, J. 2007. The Psychological Functions of Function Words. Pages 343–359 of: Fiedler, K. (ed), Social Communication. New York: Psychology Press.
(19) Council on Foreign Relations. 2012. Republican Debate Transcript, Tampa, Florida, January 2012. www.cfr.org/us-election-2012/republican-debate-transcript-tampa-florida-january-2012/p27180.
(20) DePaulo, B.M., Kashy, D.A., Kirkendol, S.E., Wyer, M.M., & Epstein, J.A. 1996. Lying in everyday life. Journal of Personality and Social Psychology, 70(5), 979–95.
(21) DePaulo, B.M., Linday, J.J., Malone, B.E., Muhlenbruck, L., Charlton, K., & Cooper, H. 2003. Cues to deception. Psychological Bulletin, 129, 74–118.
(22) Ekman, P. 2002. Telling Lies: Clues to Deceit in the Marketplace, Marriage, and Politics. 3rd edn. W.W. Norton.
(23) Ekman, P., & O’Sullivan, M. 1991. Who Can Catch a Liar? American Psychologist, 46(9), 913–920.
(24) Fitzpatrick, E., & Bachenko, J. 2012. Building a Data Collection for Deception Research. Pages 31–38 of: EACL 2012, Proceedings of the Workshop on Computational Approaches to Deception Detection.
(25) Fornaciari, T., & Poesio, M. 2012 (April 23). On the Use of Homogenous Sets of Subjects in Deceptive Language Analysis. Pages 39–47 of: Proceedings of the Workshop on Computational Approaches to Deception Detection. 13th Conference of the European Chapter of the Association for Computational Linguistics.
(26) Fox News. 2011 (August 12). Complete Text of the Iowa Republican Debate on Fox News Channel. foxnewsinsider.com/2011/08/12/full-transcript-complete-text-of-the-iowa-republican-debate-on-fox-news-channel/.
(27) Golub, G.H., & van Loan, C.F. 1996. Matrix Computations. 3rd edn. Johns Hopkins University Press.
(28) Gregory Jr., S.W., Dagan, K., & Webster, S. 1997. E
vaulating the relation of vocal accomodation in conversation partners’ fundamental frequencies to perceptions of communication quality. Journal of Nonverbal Behavior, 21(1).
(29) Groom, C.J., & Pennebaker, J.W. 2005. The Language of Love: Sex, Sexual Orientation, and Language Use in Online Personal Advertisements. Sex Roles, 52(7/8).
(30) Gupta, S., & Skillicorn, D. B. 2006. Improving a textual deception detection model. In: Proceedings of the 2006 conference of the Center for Advanced Studies on Collaborative Research. CASCON ’06. New York, NY, USA: ACM.
(31) Hancock, J.T., Curry, L.E., Goorha, S., & Woodworth, M. 2008. On lying and being lied to: a linguistic analysis of deception in computer-mediated communication. Discourse Processes, 45, 1–23.
(32) Hauch, V., Blandón-Gitlin, I., Masip, J., & Sporer, S.L. 2012 (April 23). Linguistic Cues to Deception Assessed by Computer Programs: A Meta-Analysis. Pages 1–4 of: Proceedings of the Workshop on Computational Approaches to Deception Detection. 13th Conference of the European Chapter of the Association for Computational Linguistics.
(33) His Majesty’s Stationery Office. 1946. The Trial of German Major War Criminals Sitting at Nuremberg, Germany. nizkor.org/hweb/imt/tgmwc/.
(34) History Musings. 2011. Republican Candidates Debate in Sioux City, Iowa December 15, 2011.
historymusings.wordpress.com/2011/12/16/full-text-campaign-buzz-december-15-2011-fox-news-gop-iowa-debate-transcript-republican-presidential-candidates-debate-sioux-city-iowa/.
(35) Hu, X., & Liu, H. 2012. Text Analytics in Social Media. Pages 385–414 of: Aggarwal, C.C., & Zhai, C.X. (eds), Mining Text Data. Springer Science+Business Media.
(36) Ireland, M.E., & Pennebaker, J.W. 2010. Language Style Matching in Writing: Synchrony in Essays, Correspondence, and Poetry. Journal of Personality and Social Psychology, 99(3), 549–572.
(37) Keila, P. S., & Skillicorn, D. B. 2005a. Detecting unusual and deceptive communication in email. Pages 17–20 of: Centers for Advanced Studies Conference.
(38) Keila, P.S., & Skillicorn, D.B. 2005b. Structure in the Enron Email Dataset. Computational and Mathematical Organization Theory, 11(3), 183–199.
(39) Koppel, M., Akiva, N., Alshech, E., & Bar, K. 2009. Automatically Classifying Documents by Ideological and Organizational Affiliation. Pages 176–178 of: Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI 2009).
(40) Levelt, W.J.M., & Kelter, S. 1982. Surface form and memory in question answering. Cognitive Psychology, 14(1), 78–106.
(41) Little, A., & Skillicorn, D.B. 2008 (June 17-20). Detecting deception in testimony. Pages 13–18 of: IEEE International Conference on Intelligence and Security Informatics.
(42) Mihalcea, R., & Straparava, C. 2009. The Lie Detector: Explorations in the Automatic Recognition of Deceptive Language. Pages 309–312 of: ACL-IJCNLP.
(43) Miller, G.A. 1995. The science of words. New York: Scientific American Library.
(44) Natale, M. 1975. Convergence of Mean Vocal Intensity in Dyadic Communication as a Function of Social Desirability. Journal of Personality and Social Psychology, 52(5), 790–804.
(45) National Archive. 1946-1947. Official Transcript of the Military Tribunal in the Matter of the United States of America Against Karl Brandt et al. Harvard Law School Library: Nuremberg Trials Project: A Digital Document Collection. nuremberg.law.harvard.edu/.
(46) New York Times. 2011 (September 7). The Republican Debate at the Reagan Library. www.nytimes.com/2011/09/08/us/politics/08republican-debate-text.html.
(47) Newman, M.L., Pennebaker, J.W., Berry, D.S., & Richards, J.M. 2003. Lying words: predicting deception from linguistic styles. Personality and Social Psychology Bulletin, 29(5), 665–675.
(48) Niederhoffer, K.G., & Pennebaker, J.W. 2002. Linguistic Style Matching in Social Interaction. Journal of Language and Social Psychology, 21(4), 337–360.
(49) Pennebaker, J.W. 2011. Using Computer Analyses to Identify Language Style and Aggressive Intent: The Secret Life of Function Words. Dynamics of Asymmetric Conflict: Pathways Towards Terrorism and Genocide, 2(4), 92–102.
(50) Pennebaker, J.W. 2013. Linguistic Inquiry and Word Count. http://www.liwc.net/.
(51) Polikovsky, S., Quiros-Ramirez, M.A., Kameda, Y., Ohta, Y., & Burgoon, J. 2012. Benchmark Driven Framework for Development of Emotion Sensing Support Systems. Pages 353–355 of: 2012 European Intelligence and Security Informatics Conference (EISIC).
(52) PolitiSite. 2011. Transcript - Fox News-Google GOP Presidential debate September 22, 2011 Orlando, Florida.
www.politisite.com/2011/09/23/transcript-fox-news-google-gop-presidential-debate-september-22-2011-orlando-florida/.
(53) Porter, S., & Yuille, J.C. 1996. The language of deceit: an investigation of the verbal clues to deception in the interrogation context. Law and Human Behavior, 20(4), 443–458.
(54) RonPaul.com. 2011 (May 5). Fox News Debate, Greenville SC. /previous/may-5-2011-greenville-south-carolina/.
(55) Rude, S.S., Gortner, E.M., & Pennebaker, J.W. 2004. Language use of depressed and depression-vulnerable college students. Cognition and Emotion, 18(8), 1121–1133.
(56) Simmons, R.A., Gordon, P.C., & Chambless, D.L. 2005. Pronouns in Marital Interaction: What do “You” and “I” Say About Marital Health? Psychological Science, 16(12).
(57) Skillicorn, D.B. 2010. Applying Interestingness Measures to Ansar Forum Texts. Pages 1–9 of: Proceedings of KDD 2010, Workshop on Intelligence and Security Informatics.
(58) Skillicorn, D.B. 2012. Lessons from a Jihadi Corpus. In: Foundations of Open-Source Intelligence FOSINT 2012.
(59) Skillicorn, D.B., & Leuprecht, C. 2012 (August). The Mental State of Influencers. Pages 922–929 of: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Workshop on Foundations of Open-Source Intelligence.
(60) Skillicorn, D.B., & Little, A. 2010. Patterns of word use for deception in testimony. Pages 25–39 of: Yang, Christopher C., Chau, Michael, Wang, Jau-Hwang, & Chen, Hsinchun (eds), Security Informatics. Annals of Information Systems, vol. 9. Springer US.
(61) Superior Court of the State of California. 1996. The Simpson Trial Transcripts. walraven.org/simpson/.
(62) Tausczik, Y.R., & Pennebaker, J.W. 2010. The psychological meaning of words: LIWC and computerized text analysis methods. Journal of Language and Social Psychology, 29, 24–54.
(63) Vrij, A., & Mann, S. 2001. Telling and Detecting Lies in a High-Stake Situation: The Case of a Convicted Murderer. Applied Cognitive Psychology, 15, 187–203.
(64) Washington Post, The. 2011 (October 11). Republican presidential debate (full transcript).
www.washingtonpost.com/politics/republican-debate-transcript/2011/10/11/gIQATu8vdL_story.html.
(65) Webb, J.T. 1969. Subject speech rates as a function of interviewer behaviour. Language & Speech, 12(Jan-Mar), 54–67.
(66) Zhou, L., Twitchell, D.P., Qin, T., Burgoon, J.K., & Jr., J.F. Nunamaker. 2003. An exploratory study into deception detection in text-based computer-mediated communication. In: Proceedings of the 36th Hawaii International Conference on System Sciences. IEEE.
(67) Zhou, L., Burgoon, J.K., J.F. Nunamaker, Jr., & Twitchell, D. 2004. Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communication. Group Decision and Negotiation, 13, 81–106.
(68) Zhou, L., Shi, Y., & Zhang, D. 2008. A statistical language modeling approach to online deception detection. IEEE Transactions on Knowledge and Data Engineering, 20(8), 1077–81.
(69) Zuckerman, M., DePaulo, B.M., & Rosenthal, R. 1981. Verbal and nonverbal communication of deception. Advances in experimental social psychology, 14(1), 59.
DOI: https://doi.org/10.5195/lesli.2013.1
Refbacks
- There are currently no refbacks.