from the assuming-you're-subtle-about-it dept.
George Maschke writes: AntiPolygraph.org has published a document (14 MB PDF) on polygraph countermeasures that is allegedly derived from classified information. The document suggests techniques that polygraph operators might use in an attempt to detect efforts to beat the polygraph, but fails to offer any coherent strategy for detecting sophisticated countermeasures such as those outlined in AntiPolygraph.org's The Lie Behind the Lie Detector (1 MB PDF) or Doug Williams' How to Sting the Polygraph. Ominously, the leaked document avers that an examinee's stated lack of belief in polygraphy is a marker of deception. AntiPolygraph.org has also published an older U.S. Air Force Office of Special Investigations polygraph countermeasure handbook (3.2 MB PDF) that similarly offers no methodology for detecting sophisticated countermeasures (such as any actual spy, saboteur, or terrorist might be expected to use).
Thus spake the master programmer:
"When a program is being tested, it is too late to make design changes."
-- Geoffrey James, "The Tao of Programming"