Polygraphs in the control room

November 2016 Editor's Choice, Surveillance, Security Services & Risk Management

CCTV surveillance, together with the broader context of security, is there to protect and ensure the integrity of people, places, processes, and objects within a given environment. In order to do this, any CCTV operation needs to be able to ensure the integrity of its own people, equipment and systems.

From a people point of view, the honesty and reliability of operators, supervisors and managers may be compromised in a number of ways. Personal circumstances relating to family, social stress, substance abuse or living conditions may push someone to do things that compromise their standing.

Financial misfortunes or lifestyle pressures can join other factors which lead to excessive loans or indebtedness. Work stress may result in emotional breakdowns or anxiety and conditions such as depression.

Finally, we have clear demonstrations internationally and possibly even more so in South Africa of syndicates working to compromise incumbents in positions, and recruiting people, often in situations where they take advantage of the above factors to intimidate or offer a ‘way out’ of debt or income issues. Further, we have active attempts to infiltrate members of the syndicate into organisations and control room positions. This includes starting from organisational entry at the recruitment stage into organisations.

CCTV or other control operators are just one of many different groups that may be targeted for illegal purposes. Who will forget the situation of Hansie Cronje and ongoing local and international examples of cricket match fixing payments? FIFA looms large in any discussion of corruption as well as the broader football game. In the US, the words “Say it ain’t so, Joe” reflected the fall of one of the most capable baseball players in US history.

I was amazed during a visit to the ASIS security exhibition in the US a few years ago, at just how many vetting and integrity companies had stands and were marketing their services. Currently in South Africa, we appear to have some of most aggressive syndicate activities in our history in a range of sectors of industry, with security and surveillance people being targeted among others, probably more than most countries internationally. For this reason, integrity assessment as part of the selection system prior to appointment, as well as regular polygraphing is usually desired.

Polygraph verification

Verifying the integrity of people is an exceptionally difficult thing to do. This is particularly so if you are looking at large numbers of people who need to be checked or confirmed. Ideally you also need to ensure that people who come into the organisation are verified before you even begin. Once employed, a questionable employee becomes that much more difficult to deal with.

The range of options for integrity verification includes voice stress analysis, integrity questionnaires, and behavioural-based interviewing. All of these have issues on lower scientific validity, consistency of use, capacity for administration, or being prone to manipulation in comparison to the polygraph.

The polygraph is not acknowledged as being 100% effective, even in scientific literature published by polygraph interest groups. Actual effectiveness may vary between anything from 60% to 90% depending on who you speak to or what you read. Although polygraphing is based on a scientific process, along with the use of many other tools, some people are better at administration and interpretation than others. This variability accounts for the reason that the courts treat polygraph results with caution. Yet when it comes to integrity assessment or detection of involvement in crime or other illegal activities, it clearly stands out as more effective, consistent and more easily applied in comparison to other techniques.

Reliable and auditable

The primary advantages of the polygraph are that it is an independent, scientifically based, verifiable process. Within the same process, a number of physiological responses are measured and can be analysed as a set. Administrators can be held accountable, results can be reviewed by other experts, and some certification of training is advised. It can also be administered relatively efficiently and the costing, while somewhat expensive especially in a group situation, is generally within reasonable limits.

It also provides a basis to compare people on the same standard, and is an internationally accepted instrument. The process can be recorded with video, data can be audited, and the process can be replicated by another polygrapher as another independent verification of responses on the same questions.

Certainly, for more serious cases involving theft or fraud leading to disciplinary actions such as dismissal or arrest, I would recommend that two independent polygraphers be used to corroborate findings. This is likely to make the legitimacy of findings much higher for all concerned. Polygraph evidence should also always be used in conjunction with other information which indicates the involvement in crime or deception by suspects.

The polygraph administrator does seem to have an impact on findings and it is important to have somebody with credible qualifications, training and experience. Different personalities of administrators can also play a role, with some styles such as aggressive questioning causing issues not just for the process but also for the relationships with the people being questioned.

Companies using the polygraph should consider the approach of the administrator and their character to ensure they are consistent with how they would like employees to be treated – many employees evaluated will be innocent and will be continuing with company employment afterwards, and they need to feel they have been treated with respect. Besides the direct purpose of verifying the truth of statements or the nature of involvement in possible crime, the use and understanding of body language and interviewing techniques can play a major part in assisting the polygraph process and questioning.

Cheating the polygraph

There are ways of ‘cheating’ or producing questionable results on polygraphing, but most of them produce specific behaviours that highlight the fact that such cheating behaviour is being used, through either behaviour or distortion of results. Where results show potential guilt or deception, follow up questions can often lead to confessions during such interviews, which can be used for additional evidence, especially if the process is recorded with audio.

Ensuring integrity should be done at entry points into organisations and should be done as part of a broad assessment including things like credit checks for those in organisation where a high risk of loss exists. A question then arises about whether it should be done on an ongoing basis.

Any organisation should have confidence in their people, but given the systematic attempts by syndicates to infiltrate and influence strategic operations within security, an ongoing programme of polygraphing over regular intervals of time is an option to maintain confidence in staff. An advantage of this is that it allows a surveillance official to defend against requests by syndicates who are trying to coerce illegal involvement by enabling the operators to state that they would lose their job as any such involvement would be shown up in the polygraphing process.

It also avoids the situation where people feel picked on or distracted where they are just suddenly asked to do polygraphs while others aren’t. Polygraphing is not just to catch people who are lying, it can also confirm the innocence of people. It can also narrow down the range of people who are looked at in more depth during investigations, not only making things more streamlined but also avoiding have more people affected by such investigations in their lives.

If a polygraph is used, this needs to be catered for in contracts of employment and in a company’s policy and procedures. Also, in my view if a person is found guilty on a polygraph, they should have the right for an independent confirmation of such findings. Further, if a company decides that the polygraph is suitable for operating personnel, there is no reason why it should not be applied to supervisory and management personnel within the same enterprise to ensure consistent treatment.

Lastly, polygraphs are seen as an aide and wherever possible should be used with other information as part of decision making, and companies should also use them with discretion.

Dr Craig Donald is a human factors specialist in security and CCTV. He is a director of Leaderware which provides instruments for the selection of CCTV operators, X-ray screeners and other security personnel in major operations around the world. He also runs CCTV Surveillance Skills and Body Language, and Advanced Surveillance Body Language courses for CCTV operators, supervisors and managers internationally, and consults on CCTV management. He can be contacted on +27 (0)11 787 7811 or craig.donald@leaderware.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.