SlideShare a Scribd company logo
1 of 17
Download to read offline
Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 1
SPY THE LIE
Digiday Agency
Summit
October 27, 2015
Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 2
โ€ขโ€ฏ Founding Partner, QVerity
โ€“โ€ฏ Co-author of The NY Times bestsellers โ€œSpy the Lieโ€ and โ€œGet the Truthโ€
โ€“โ€ฏ Widely considered a leading authority on detection of deception, critical
interviewing, and non-coercive elicitation
โ€“โ€ฏ Developer of a behavioral screening program currently in use within the federal
government and a variety of private industries
โ€“โ€ฏ Provides consulting services for Forbes Top 10 Richest Families
โ€“โ€ฏ Conducts high-level screening interviews within the U.S. government
โ€“โ€ฏ Extensive experience in conducting training for U.S. government agencies to
include the CIA, FBI, Border Patrol, USCIS, DOS, and DOD; within the law
enforcement community; for financial services and private sector firms
โ€ขโ€ฏ Former CIA security specialist and instructor (20+ years)
โ€“โ€ฏ Extensive experience in interviewing, interrogation, and polygraph
examination, focused primarily on national security, employment, and criminal
issues
โ€ขโ€ฏ Education
โ€“โ€ฏ MA, Forensic Psychology and MA, Secondary Education/English, Marymount U.
Susan Carnicero
Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 3
Is she lying or telling the truth?
Suspect
Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 4
Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 5
โ€ขโ€ฏ Analyze vs. speculate
โ€ขโ€ฏ Manage your bias
โ€ขโ€ฏ Recognize evasiveness
โ€ขโ€ฏ Beware of aggression
โ€ขโ€ฏ Differentiate between convince vs. convey
โ€ขโ€ฏ Know what non-verbal cues mean
Spy the Lie Keys to Success
Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 6
โ€ขโ€ฏ Disregard global behaviors
โ€ขโ€ฏ Identify the stimulus
โ€ขโ€ฏ Focus on behaviors directly
associated with the response
โ€ขโ€ฏ Rely on:
โ€“โ€ฏ Timing
โ€“โ€ฏ Clusters
Analyze vs. Speculate
Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 7
Seconds
Initial deceptive behavior must begin within the first five
seconds
10 2 3 4 5
Question
(stimulus)
Answer
(response)
Timing
Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 8
Seconds10 2 3 4 5
Question
(stimulus)
Answer
(response)
Start of deceptive verbal and non-verbal behaviors
= Verbal = Non-Verbal
Clusters
Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 9
โ€ขโ€ฏ Ignore truthful behavior
โ€ขโ€ฏ Avoid self-fulfilling prophecy
โ€ขโ€ฏ Guards against the halo effect
Manage Your Bias
Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 10
โ€ขโ€ฏ Failure to provide information asked for
โ€ขโ€ฏ Failure to deny
โ€ขโ€ฏ Use of exclusionary qualifier(s)
Recognize Evasiveness
Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 11
โ€ขโ€ฏ Attacking the questioner
โ€ขโ€ฏ Attacking third party
โ€ขโ€ฏ Demonstrating an inappropriate level of
concern
Beware of Aggression
Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 12
โ€ขโ€ฏ Convincing statements
โ€ขโ€ฏ Referral statements
โ€ขโ€ฏ Invoking religion
โ€ขโ€ฏ Perception qualifiers
Differentiate Between
Convince vs. Convey
Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 13
โ€ขโ€ฏ Behavioral pause
โ€ขโ€ฏ Verbal/Non-verbal disconnect
โ€ขโ€ฏ Anchor point movements
โ€ขโ€ฏ Grooming gestures
โ€ขโ€ฏ Hand to face
Know What Non-verbal
Cues Mean
Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 14
Is she lying or telling the truth?
Suspect
Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 15
Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 16
โ€ขโ€ฏ Analyze vs. speculate
โ€ขโ€ฏ Manage your bias
โ€ขโ€ฏ Recognize evasiveness
โ€ขโ€ฏ Beware of aggression
โ€ขโ€ฏ Differentiate between convince vs. convey
โ€ขโ€ฏ Know what non-verbal cues mean
Spy the Lie Keys to Success
Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 17

More Related Content

What's hot

What's hot (20)

Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
ย 
ATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICS
ย 
Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
ย 
Building an API Security Strategy
Building an API Security StrategyBuilding an API Security Strategy
Building an API Security Strategy
ย 
Zero trust Architecture
Zero trust Architecture Zero trust Architecture
Zero trust Architecture
ย 
Automating the mundanity of technique IDs with ATT&CK Detections Collector
Automating the mundanity of technique IDs with ATT&CK Detections CollectorAutomating the mundanity of technique IDs with ATT&CK Detections Collector
Automating the mundanity of technique IDs with ATT&CK Detections Collector
ย 
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint Security
ย 
Projects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the CenterProjects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the Center
ย 
The ATT&CK Philharmonic
The ATT&CK PhilharmonicThe ATT&CK Philharmonic
The ATT&CK Philharmonic
ย 
Lecture 10 - Multi-Party Computation Protocols
Lecture 10 - Multi-Party Computation ProtocolsLecture 10 - Multi-Party Computation Protocols
Lecture 10 - Multi-Party Computation Protocols
ย 
State of the ATT&CK
State of the ATT&CKState of the ATT&CK
State of the ATT&CK
ย 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
ย 
Entity System Architecture with Unity - Unite Europe 2015
Entity System Architecture with Unity - Unite Europe 2015Entity System Architecture with Unity - Unite Europe 2015
Entity System Architecture with Unity - Unite Europe 2015
ย 
ATTACK-Onomics: Attacking the Economics Behind Techniques Used by Adversaries
ATTACK-Onomics: Attacking the Economics Behind Techniques Used by AdversariesATTACK-Onomics: Attacking the Economics Behind Techniques Used by Adversaries
ATTACK-Onomics: Attacking the Economics Behind Techniques Used by Adversaries
ย 
Threat Modelling - It's not just for developers
Threat Modelling - It's not just for developersThreat Modelling - It's not just for developers
Threat Modelling - It's not just for developers
ย 
Landing on Jupyter: The transformative power of data-driven storytelling for ...
Landing on Jupyter: The transformative power of data-driven storytelling for ...Landing on Jupyter: The transformative power of data-driven storytelling for ...
Landing on Jupyter: The transformative power of data-driven storytelling for ...
ย 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
ย 
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CKATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
ย 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
ย 
Introduction to Multi Party Computation
Introduction to Multi Party ComputationIntroduction to Multi Party Computation
Introduction to Multi Party Computation
ย 

Viewers also liked

CIA Elective Paper- final
CIA Elective Paper- finalCIA Elective Paper- final
CIA Elective Paper- final
Dennis H. Levesque
ย 

Viewers also liked (12)

Former CIA Officer will tell you How to Spot a Lie - DRS, 1/26/16
Former CIA Officer will tell you How to Spot a Lie - DRS, 1/26/16Former CIA Officer will tell you How to Spot a Lie - DRS, 1/26/16
Former CIA Officer will tell you How to Spot a Lie - DRS, 1/26/16
ย 
Spy the lie
Spy the lieSpy the lie
Spy the lie
ย 
CIA Elective Paper- final
CIA Elective Paper- finalCIA Elective Paper- final
CIA Elective Paper- final
ย 
The 15 Most Common Body Language Mistakes
The 15 Most Common Body Language MistakesThe 15 Most Common Body Language Mistakes
The 15 Most Common Body Language Mistakes
ย 
SpyFly Lying Infographic
SpyFly Lying InfographicSpyFly Lying Infographic
SpyFly Lying Infographic
ย 
Chapter 8 - Case Study - Identifying a CIA Agent - JNL-2105 - Journalism Ethi...
Chapter 8 - Case Study - Identifying a CIA Agent - JNL-2105 - Journalism Ethi...Chapter 8 - Case Study - Identifying a CIA Agent - JNL-2105 - Journalism Ethi...
Chapter 8 - Case Study - Identifying a CIA Agent - JNL-2105 - Journalism Ethi...
ย 
WE16 - Lessons in Leadership & Influence
WE16 - Lessons in Leadership & InfluenceWE16 - Lessons in Leadership & Influence
WE16 - Lessons in Leadership & Influence
ย 
4 deception new
4 deception new4 deception new
4 deception new
ย 
WE16 - Shine Theory
WE16 - Shine TheoryWE16 - Shine Theory
WE16 - Shine Theory
ย 
Cover letters
Cover lettersCover letters
Cover letters
ย 
WE16 - The State of Women in Engineering
WE16 - The State of Women in EngineeringWE16 - The State of Women in Engineering
WE16 - The State of Women in Engineering
ย 
Detecting Deception
Detecting DeceptionDetecting Deception
Detecting Deception
ย 

Similar to Deception Training by a Former CIA Agent

Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional Intelligence
Ron Steinkamp
ย 
Fraud Prevention - St. Louis - March 6, 2015
Fraud Prevention - St. Louis - March 6, 2015Fraud Prevention - St. Louis - March 6, 2015
Fraud Prevention - St. Louis - March 6, 2015
Ron Steinkamp
ย 
2015_03_05_Decoded_Book_LunchandLearn
2015_03_05_Decoded_Book_LunchandLearn2015_03_05_Decoded_Book_LunchandLearn
2015_03_05_Decoded_Book_LunchandLearn
Mark Hall
ย 
keys to fraud prevention in the public sector
keys to fraud prevention in the public sectorkeys to fraud prevention in the public sector
keys to fraud prevention in the public sector
Ron Steinkamp
ย 

Similar to Deception Training by a Former CIA Agent (20)

Npma 2015 referral websites reputation management
Npma 2015   referral websites reputation managementNpma 2015   referral websites reputation management
Npma 2015 referral websites reputation management
ย 
Experian and 41st Parameter - 2015 CNP Expo Session
Experian and 41st Parameter - 2015 CNP Expo SessionExperian and 41st Parameter - 2015 CNP Expo Session
Experian and 41st Parameter - 2015 CNP Expo Session
ย 
Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional Intelligence
ย 
Webinar - Working with Whistleblowers and confidential Informants
Webinar - Working with Whistleblowers and confidential InformantsWebinar - Working with Whistleblowers and confidential Informants
Webinar - Working with Whistleblowers and confidential Informants
ย 
The Intersection of Social Media, Personal Brand, and Reputation Management
The Intersection of Social Media, Personal Brand, and Reputation ManagementThe Intersection of Social Media, Personal Brand, and Reputation Management
The Intersection of Social Media, Personal Brand, and Reputation Management
ย 
Catelas Legal - Intelligent Discoveryor Slideshare
Catelas Legal - Intelligent Discoveryor SlideshareCatelas Legal - Intelligent Discoveryor Slideshare
Catelas Legal - Intelligent Discoveryor Slideshare
ย 
Identifying Abuse in Foster Care Children
Identifying Abuse in Foster Care ChildrenIdentifying Abuse in Foster Care Children
Identifying Abuse in Foster Care Children
ย 
Identifying Abuse in Foster Care Children
Identifying Abuse in Foster Care ChildrenIdentifying Abuse in Foster Care Children
Identifying Abuse in Foster Care Children
ย 
Cyber Crime: Preparing Your Organization for the New Normal
Cyber Crime: Preparing Your Organization for the New NormalCyber Crime: Preparing Your Organization for the New Normal
Cyber Crime: Preparing Your Organization for the New Normal
ย 
Managing a Hack: Orchestrating Incident Response to Preserve Brand Reputation
Managing a Hack: Orchestrating Incident Response to Preserve Brand ReputationManaging a Hack: Orchestrating Incident Response to Preserve Brand Reputation
Managing a Hack: Orchestrating Incident Response to Preserve Brand Reputation
ย 
Investigation and discovery tools in law firms
Investigation and discovery tools in law firmsInvestigation and discovery tools in law firms
Investigation and discovery tools in law firms
ย 
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011
ย 
Fraud Prevention - St. Louis - March 6, 2015
Fraud Prevention - St. Louis - March 6, 2015Fraud Prevention - St. Louis - March 6, 2015
Fraud Prevention - St. Louis - March 6, 2015
ย 
2015_03_05_Decoded_Book_LunchandLearn
2015_03_05_Decoded_Book_LunchandLearn2015_03_05_Decoded_Book_LunchandLearn
2015_03_05_Decoded_Book_LunchandLearn
ย 
Emotion Drives Behavior: Building a Data Narrative
Emotion Drives Behavior: Building a Data NarrativeEmotion Drives Behavior: Building a Data Narrative
Emotion Drives Behavior: Building a Data Narrative
ย 
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
ย 
keys to fraud prevention in the public sector
keys to fraud prevention in the public sectorkeys to fraud prevention in the public sector
keys to fraud prevention in the public sector
ย 
Integrity Matters Guide to Internal Whistleblowing
Integrity Matters Guide to Internal WhistleblowingIntegrity Matters Guide to Internal Whistleblowing
Integrity Matters Guide to Internal Whistleblowing
ย 
Steve Weissman - 5 Keys to Managing Information as an Asset
Steve Weissman - 5 Keys to Managing Information as an Asset�Steve Weissman - 5 Keys to Managing Information as an Asset�
Steve Weissman - 5 Keys to Managing Information as an Asset
ย 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
ย 

More from Digiday

More from Digiday (20)

Amazon Strategies January 2019 | Sellwin
Amazon Strategies January 2019 | SellwinAmazon Strategies January 2019 | Sellwin
Amazon Strategies January 2019 | Sellwin
ย 
Amazon Strategies January 2019 | OneSpace
Amazon Strategies January 2019 | OneSpaceAmazon Strategies January 2019 | OneSpace
Amazon Strategies January 2019 | OneSpace
ย 
Amazon Strategies January 2019 | Tatari
Amazon Strategies January 2019 | TatariAmazon Strategies January 2019 | Tatari
Amazon Strategies January 2019 | Tatari
ย 
Amazon Strategies January 2019 | 23andme
Amazon Strategies January 2019 | 23andmeAmazon Strategies January 2019 | 23andme
Amazon Strategies January 2019 | 23andme
ย 
Amazon Strategies January 2019 | Booyah
Amazon Strategies January 2019 | BooyahAmazon Strategies January 2019 | Booyah
Amazon Strategies January 2019 | Booyah
ย 
Amazon Strategies January 2019 | Publicis
Amazon Strategies January 2019 | PublicisAmazon Strategies January 2019 | Publicis
Amazon Strategies January 2019 | Publicis
ย 
Amazon Strategies January 2019 | Perpetua
Amazon Strategies January 2019 | PerpetuaAmazon Strategies January 2019 | Perpetua
Amazon Strategies January 2019 | Perpetua
ย 
Amazon Strategies January 2019 | Podean
Amazon Strategies January 2019 | PodeanAmazon Strategies January 2019 | Podean
Amazon Strategies January 2019 | Podean
ย 
Amazon Strategies January 2019 | eos
Amazon Strategies January 2019 | eosAmazon Strategies January 2019 | eos
Amazon Strategies January 2019 | eos
ย 
Amazon Strategies January 2019 | iCrossing
Amazon Strategies January 2019 | iCrossingAmazon Strategies January 2019 | iCrossing
Amazon Strategies January 2019 | iCrossing
ย 
Amazon Strategies January 2019 | Dash Hudson
Amazon Strategies January 2019 | Dash HudsonAmazon Strategies January 2019 | Dash Hudson
Amazon Strategies January 2019 | Dash Hudson
ย 
Amazon Strategies January 2019 | Direct Agents & Carhartt
Amazon Strategies January 2019 | Direct Agents & CarharttAmazon Strategies January 2019 | Direct Agents & Carhartt
Amazon Strategies January 2019 | Direct Agents & Carhartt
ย 
Amazon Strategies January 2019 | WellPath
Amazon Strategies January 2019 | WellPathAmazon Strategies January 2019 | WellPath
Amazon Strategies January 2019 | WellPath
ย 
Amazon Strategies January 2019 | Tinuiti
Amazon Strategies January 2019 | TinuitiAmazon Strategies January 2019 | Tinuiti
Amazon Strategies January 2019 | Tinuiti
ย 
Amazon Strategies January 2019 | Belkin
Amazon Strategies January 2019 | BelkinAmazon Strategies January 2019 | Belkin
Amazon Strategies January 2019 | Belkin
ย 
Amazon Strategies January 2019 | Stella Rising
Amazon Strategies January 2019 | Stella RisingAmazon Strategies January 2019 | Stella Rising
Amazon Strategies January 2019 | Stella Rising
ย 
Amazon Strategies January 2019 | Moroccanoil
Amazon Strategies January 2019 | MoroccanoilAmazon Strategies January 2019 | Moroccanoil
Amazon Strategies January 2019 | Moroccanoil
ย 
Digiday Brand Summit December 2019 | NASCAR
Digiday Brand Summit December 2019 | NASCARDigiday Brand Summit December 2019 | NASCAR
Digiday Brand Summit December 2019 | NASCAR
ย 
Digiday Brand Summit December 2019 | Recess
Digiday Brand Summit December 2019 | RecessDigiday Brand Summit December 2019 | Recess
Digiday Brand Summit December 2019 | Recess
ย 
Digiday Brand Summit December 2019 | LipLove
Digiday Brand Summit December 2019 | LipLoveDigiday Brand Summit December 2019 | LipLove
Digiday Brand Summit December 2019 | LipLove
ย 

Recently uploaded

Brand experience Dream Center Peoria Presentation.pdf
Brand experience Dream Center Peoria Presentation.pdfBrand experience Dream Center Peoria Presentation.pdf
Brand experience Dream Center Peoria Presentation.pdf
tbatkhuu1
ย 
BUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAIL
BUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAILBUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAIL
BUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAIL
DIGISHIFT INDIA +918368319550
ย 
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Hazratganj Lucknow best sexual service Online
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Hazratganj Lucknow best sexual service OnlineCALL ON โžฅ8923113531 ๐Ÿ”Call Girls Hazratganj Lucknow best sexual service Online
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Hazratganj Lucknow best sexual service Online
anilsa9823
ย 
Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdf
tbatkhuu1
ย 

Recently uploaded (20)

Foundation First - Why Your Website and Content Matters - David Pisarek
Foundation First - Why Your Website and Content Matters - David PisarekFoundation First - Why Your Website and Content Matters - David Pisarek
Foundation First - Why Your Website and Content Matters - David Pisarek
ย 
Brand experience Dream Center Peoria Presentation.pdf
Brand experience Dream Center Peoria Presentation.pdfBrand experience Dream Center Peoria Presentation.pdf
Brand experience Dream Center Peoria Presentation.pdf
ย 
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO SuccessBrighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
ย 
BUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAIL
BUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAILBUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAIL
BUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAIL
ย 
Major SEO Trends in 2024 - Banyanbrain Digital
Major SEO Trends in 2024 - Banyanbrain DigitalMajor SEO Trends in 2024 - Banyanbrain Digital
Major SEO Trends in 2024 - Banyanbrain Digital
ย 
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Hazratganj Lucknow best sexual service Online
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Hazratganj Lucknow best sexual service OnlineCALL ON โžฅ8923113531 ๐Ÿ”Call Girls Hazratganj Lucknow best sexual service Online
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Hazratganj Lucknow best sexual service Online
ย 
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
ย 
Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdf
ย 
BDSMโšกCall Girls in Sector 144 Noida Escorts >เผ’8448380779 Escort Service
BDSMโšกCall Girls in Sector 144 Noida Escorts >เผ’8448380779 Escort ServiceBDSMโšกCall Girls in Sector 144 Noida Escorts >เผ’8448380779 Escort Service
BDSMโšกCall Girls in Sector 144 Noida Escorts >เผ’8448380779 Escort Service
ย 
Brand Strategy Master Class - Juntae DeLane
Brand Strategy Master Class - Juntae DeLaneBrand Strategy Master Class - Juntae DeLane
Brand Strategy Master Class - Juntae DeLane
ย 
Google 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best StrategiesGoogle 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
ย 
The Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdfThe Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdf
ย 
Netflix Ads The Game Changer in Video Ads โ€“ Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads โ€“ Who Needs YouTube.pptx (Chester Y...Netflix Ads The Game Changer in Video Ads โ€“ Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads โ€“ Who Needs YouTube.pptx (Chester Y...
ย 
Call Us โžฅ9654467111โ–ปCall Girls In Delhi NCR
Call Us โžฅ9654467111โ–ปCall Girls In Delhi NCRCall Us โžฅ9654467111โ–ปCall Girls In Delhi NCR
Call Us โžฅ9654467111โ–ปCall Girls In Delhi NCR
ย 
BDSMโšกCall Girls in Sector 128 Noida Escorts >เผ’8448380779 Escort Service
BDSMโšกCall Girls in Sector 128 Noida Escorts >เผ’8448380779 Escort ServiceBDSMโšกCall Girls in Sector 128 Noida Escorts >เผ’8448380779 Escort Service
BDSMโšกCall Girls in Sector 128 Noida Escorts >เผ’8448380779 Escort Service
ย 
Labour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptxLabour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptx
ย 
Cash payment girl 9257726604 Hand โœ‹ to Hand over girl
Cash payment girl 9257726604 Hand โœ‹ to Hand over girlCash payment girl 9257726604 Hand โœ‹ to Hand over girl
Cash payment girl 9257726604 Hand โœ‹ to Hand over girl
ย 
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose GuirgisCreator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
ย 
Defining Marketing for the 21st Century,kotler
Defining Marketing for the 21st Century,kotlerDefining Marketing for the 21st Century,kotler
Defining Marketing for the 21st Century,kotler
ย 
Unraveling the Mystery of the Hinterkaifeck Murders.pptx
Unraveling the Mystery of the Hinterkaifeck Murders.pptxUnraveling the Mystery of the Hinterkaifeck Murders.pptx
Unraveling the Mystery of the Hinterkaifeck Murders.pptx
ย 

Deception Training by a Former CIA Agent

  • 1. Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 1 SPY THE LIE Digiday Agency Summit October 27, 2015
  • 2. Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 2 โ€ขโ€ฏ Founding Partner, QVerity โ€“โ€ฏ Co-author of The NY Times bestsellers โ€œSpy the Lieโ€ and โ€œGet the Truthโ€ โ€“โ€ฏ Widely considered a leading authority on detection of deception, critical interviewing, and non-coercive elicitation โ€“โ€ฏ Developer of a behavioral screening program currently in use within the federal government and a variety of private industries โ€“โ€ฏ Provides consulting services for Forbes Top 10 Richest Families โ€“โ€ฏ Conducts high-level screening interviews within the U.S. government โ€“โ€ฏ Extensive experience in conducting training for U.S. government agencies to include the CIA, FBI, Border Patrol, USCIS, DOS, and DOD; within the law enforcement community; for financial services and private sector firms โ€ขโ€ฏ Former CIA security specialist and instructor (20+ years) โ€“โ€ฏ Extensive experience in interviewing, interrogation, and polygraph examination, focused primarily on national security, employment, and criminal issues โ€ขโ€ฏ Education โ€“โ€ฏ MA, Forensic Psychology and MA, Secondary Education/English, Marymount U. Susan Carnicero
  • 3. Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 3 Is she lying or telling the truth? Suspect
  • 4. Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 4
  • 5. Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 5 โ€ขโ€ฏ Analyze vs. speculate โ€ขโ€ฏ Manage your bias โ€ขโ€ฏ Recognize evasiveness โ€ขโ€ฏ Beware of aggression โ€ขโ€ฏ Differentiate between convince vs. convey โ€ขโ€ฏ Know what non-verbal cues mean Spy the Lie Keys to Success
  • 6. Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 6 โ€ขโ€ฏ Disregard global behaviors โ€ขโ€ฏ Identify the stimulus โ€ขโ€ฏ Focus on behaviors directly associated with the response โ€ขโ€ฏ Rely on: โ€“โ€ฏ Timing โ€“โ€ฏ Clusters Analyze vs. Speculate
  • 7. Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 7 Seconds Initial deceptive behavior must begin within the first five seconds 10 2 3 4 5 Question (stimulus) Answer (response) Timing
  • 8. Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 8 Seconds10 2 3 4 5 Question (stimulus) Answer (response) Start of deceptive verbal and non-verbal behaviors = Verbal = Non-Verbal Clusters
  • 9. Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 9 โ€ขโ€ฏ Ignore truthful behavior โ€ขโ€ฏ Avoid self-fulfilling prophecy โ€ขโ€ฏ Guards against the halo effect Manage Your Bias
  • 10. Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 10 โ€ขโ€ฏ Failure to provide information asked for โ€ขโ€ฏ Failure to deny โ€ขโ€ฏ Use of exclusionary qualifier(s) Recognize Evasiveness
  • 11. Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 11 โ€ขโ€ฏ Attacking the questioner โ€ขโ€ฏ Attacking third party โ€ขโ€ฏ Demonstrating an inappropriate level of concern Beware of Aggression
  • 12. Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 12 โ€ขโ€ฏ Convincing statements โ€ขโ€ฏ Referral statements โ€ขโ€ฏ Invoking religion โ€ขโ€ฏ Perception qualifiers Differentiate Between Convince vs. Convey
  • 13. Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 13 โ€ขโ€ฏ Behavioral pause โ€ขโ€ฏ Verbal/Non-verbal disconnect โ€ขโ€ฏ Anchor point movements โ€ขโ€ฏ Grooming gestures โ€ขโ€ฏ Hand to face Know What Non-verbal Cues Mean
  • 14. Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 14 Is she lying or telling the truth? Suspect
  • 15. Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 15
  • 16. Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 16 โ€ขโ€ฏ Analyze vs. speculate โ€ขโ€ฏ Manage your bias โ€ขโ€ฏ Recognize evasiveness โ€ขโ€ฏ Beware of aggression โ€ขโ€ฏ Differentiate between convince vs. convey โ€ขโ€ฏ Know what non-verbal cues mean Spy the Lie Keys to Success
  • 17. Copyright ยฉ 2015, QVerity, Inc. All rights reserved. 17