{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:58:11Z","timestamp":1761897491476,"version":"build-2065373602"},"reference-count":62,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T00:00:00Z","timestamp":1615507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>The preliminary credibility assessment screening system (PCASS) is a US-based program, which is currently being implemented by intelligence units of the North Atlantic Treaty Organization (NATO) to make the initial screening of individuals suspected of infiltrating the Afghan National Defense and Security Forces (ANDSF). Sensors have been instrumental in the PCASS, leading to organizational change. The aim of this research is to describe how the ANDSF adapted to the implementation of PCASS, as well as implemented changes since the beginning of the program. To do so, we have conducted a qualitative, exploratory, and descriptive case study that allows one to understand, through the use of a series of data collection sources, a real-life phenomenon of which little is known. The results suggest that the sensors used in PCASS empower security forces with reliable technologies to identify and neutralize internal threats. It then becomes evident that the technological leadership that PCASS provides allows the developing of a relatively stable and consistent organizational change, fulfilling the objectives of the NATO and the ANDSF.<\/jats:p>","DOI":"10.3390\/info12030122","type":"journal-article","created":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T11:56:55Z","timestamp":1615550215000},"page":"122","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Counterintelligence Technologies: An Exploratory Case Study of Preliminary Credibility Assessment Screening System in the Afghan National Defense and Security Forces"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8504-0065","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Reis","sequence":"first","affiliation":[{"name":"Department of Economics, Management, Industrial Engineering and Tourism, GOVCOPP, Campus Universit\u00e1rio de Santiago, University of Aveiro, 3810-193 Aveiro, Portugal"},{"name":"Industrial Engineering and Management, Lusofona University, Campo Grande, 1749-024 Lisbon, Portugal"},{"name":"CISD, Rua de Pedrou\u00e7os, Military University Institute, 1449-027 Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0901-0614","authenticated-orcid":false,"given":"Marlene","family":"Amorim","sequence":"additional","affiliation":[{"name":"Department of Economics, Management, Industrial Engineering and Tourism, GOVCOPP, Campus Universit\u00e1rio de Santiago, University of Aveiro, 3810-193 Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1359-3437","authenticated-orcid":false,"given":"Nuno","family":"Mel\u00e3o","sequence":"additional","affiliation":[{"name":"CISeD\u2013Research Center in Digital Services, Polytechnic Institute of Viseu, Campus Polit\u00e9cnico, 3504-510 Viseu, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8225-6960","authenticated-orcid":false,"given":"Yuval","family":"Cohen","sequence":"additional","affiliation":[{"name":"Department of Industrial Engineering, Afeka Tel-Aviv College of Engineering, Tel Aviv 69988, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7514-9836","authenticated-orcid":false,"given":"Joana","family":"Costa","sequence":"additional","affiliation":[{"name":"Department of Economics, Management, Industrial Engineering and Tourism, GOVCOPP, Campus Universit\u00e1rio de Santiago, University of Aveiro, 3810-193 Aveiro, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2021,3,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"8392","DOI":"10.1016\/j.eswa.2011.01.032","article-title":"An Investigation of Data and Text Mining Methods for Real World Deception Detection","volume":"38","author":"Fuller","year":"2011","journal-title":"Expert Syst. Appl."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1080\/08989620903520271","article-title":"Ethical and Regulatory Challenges in Psychophysiology and Neuroscience-based Technology for Determining Behavior","volume":"17","author":"Shamoo","year":"2010","journal-title":"Account. Res."},{"key":"ref_3","first-page":"64","article-title":"The State of Afghanistan\u00b4s Intelligence Enterprise","volume":"97","author":"Walters","year":"2017","journal-title":"Mil. Rev."},{"key":"ref_4","unstructured":"Senter, S., Waller, J., and Krapohl, D. (2006). Validation Studies for the Preliminary Credibility Assessment Screening System (PCASS), Department of Defense Polygraph Institute."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1515\/ep-2015-0008","article-title":"Discoverers of the Galvanic Skin Response","volume":"9","author":"Widacki","year":"2015","journal-title":"Eur. Polygr."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.ijpsycho.2014.06.001","article-title":"Credibility assessment: Preliminary Process Theory, the polygraph process, and construct validity","volume":"95","author":"Palmatier","year":"2015","journal-title":"Int. J. Psychophysiol."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Gordon, N., and Fleisher, W. (2010). Effective Interviewing and Interrogation Techniques, Academic Press, Elsevier. [3rd ed.].","DOI":"10.1016\/B978-0-12-381986-4.00018-3"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1111\/psyp.12557","article-title":"Temperature Effects on Polygraph Detection of Concealed Information","volume":"53","author":"MacNeill","year":"2016","journal-title":"Psychophysiology"},{"key":"ref_9","first-page":"59","article-title":"Leading Change: Why Transformation Efforts Fail","volume":"73","author":"Kotter","year":"1995","journal-title":"Harv. Bus. Rev."},{"key":"ref_10","unstructured":"Taylor, C. (2011). Afghanistan: The Timetable for Security Transition, House of Commons Library."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1057\/ip.2010.21","article-title":"From Nation-States in Conflict to Conflict in Nation-States: The United States of America and Nation Building from South Vietnam to Afghanistan","volume":"47","author":"Berger","year":"2010","journal-title":"Int. Polit."},{"key":"ref_12","unstructured":"NATO (2020, August 20). ISAF\u00b4s Mission in Afghanistan (2001\u20132014) (Archived). Available online: https:\/\/www.nato.int\/cps\/en\/natohq\/topics_69366.htm."},{"key":"ref_13","unstructured":"NATO (2020, August 23). Inteqal: Transition to Afghan Lead. Available online: https:\/\/www.nato.int\/cps\/en\/natohq\/topics_87183.htm."},{"key":"ref_14","unstructured":"US DoD (2021, February 27). Enhancing Security and Stability in Afghanistan, Available online: https:\/\/media.defense.gov\/2020\/Jul\/01\/2002348001\/-1\/-1\/1\/enhancing_security_and_stability_in_afghanistan.pdf."},{"key":"ref_15","unstructured":"NATO (2020, December 19). NATO and Afghanistan. Available online: https:\/\/www.nato.int\/cps\/en\/natohq\/topics_8189.htm."},{"key":"ref_16","unstructured":"NATO (2020, August 20). Newsroom. Afghan National Police Learn New System for Intelligence Sharing and Records Archiving., Available online: https:\/\/rs.nato.int\/news-center\/feature-stories\/2018-feature-stories\/afghan-national-police-learn-new-system-for-intelligence-sharing-and-records-archiving.aspx."},{"key":"ref_17","unstructured":"Krapohl, D., Handler, M., Sturm, S., Ansley, N., Backster, C., Barland, G., Brown, T., Cestaro, V., Dollins, A., and Dutton, D. (2020, December 19). Terminology Reference for the Science of Psychophysiological Detection of Deception; 3rd Edition. Available online: https:\/\/www.polygraph.org."},{"key":"ref_18","first-page":"214","article-title":"A Comparison of Polygraph Data Evaluation Conventions Used at the University of Utah and the Department of Defense Polygraph Institute","volume":"33","author":"Senter","year":"2004","journal-title":"Polygraph"},{"key":"ref_19","unstructured":"Harris, M., and McQuarrie, A. (2009). The Preliminary Credibility Assessment System Embedded Algorithm Description and Validation Results, Johns Hopkins University. Johns Hopkins University Applied Physics Laboratory Report Number GED-R-06-7571."},{"key":"ref_20","unstructured":"Battelle Memorial Institute (2007). Efficacy of Prototype Credibility Assessment Technologies: PCASS Final Report, Battelle Memorial Institute."},{"key":"ref_21","unstructured":"CSFP (2019, July 02). Counterintelligence Support to Force Protection. Number 5240.22. Available online: https:\/\/fas.org\/irp\/doddir\/dod\/."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"43","DOI":"10.3849\/aimt.01343","article-title":"Counterintelligence in Afghanistan: Preliminary Credibility Assessment Screening System","volume":"15","author":"Reis","year":"2020","journal-title":"Adv. Mil. Technol."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2194","DOI":"10.1109\/CISP.2011.6100581","article-title":"Study on conditioning and feature extraction algorithm of photoplethysmography signal for physiological parameters detection","volume":"Volume 4","author":"Wei","year":"2011","journal-title":"Proceedings of the 2011 4th International Congress on Image and Signal Processing"},{"key":"ref_24","first-page":"89","article-title":"Analysis of Polygraphic Data (Part 2)","volume":"2","author":"Kubis","year":"1973","journal-title":"Polygraph. J. Am. Polygr. Assoc."},{"key":"ref_25","unstructured":"Pool, R. (2010). Field Evaluation in Intelligence and Counterintelligence Context: Workshop Summary, National Academies Press."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"22","DOI":"10.4304\/jmm.1.6.22-35","article-title":"Automatic Recognition of Facial Actions in Spontaneous Expressions","volume":"1","author":"Bartlett","year":"2006","journal-title":"J. Multimed."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1016\/j.ins.2018.07.027","article-title":"Raspberry Pi assisted facial expression recognition framework for smart security in law-enforcement services","volume":"479","author":"Sajjad","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_28","unstructured":"Hugdahl, K. (1995). Perspectives in Cognitive Neuroscience. Psychophysiology: The Mind-Body Perspective, Harvard University Press."},{"key":"ref_29","first-page":"6","article-title":"Leadership and Context to Create the New Technological Society","volume":"4","author":"Blair","year":"2020","journal-title":"J. Innov. Res. Educ. Manag."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1108\/08858620910931730","article-title":"Organizational Resistance to Performance-enhancing Technological Innovations: A Motivation-threat-ability Framework","volume":"24","author":"Bao","year":"2009","journal-title":"J. Bus. Ind. Mark."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1177\/1548051818824529","article-title":"The influence of transformational leadership and leader attitudes on subordinate attitudes and implementation success","volume":"27","author":"Farahnak","year":"2020","journal-title":"J. Leadersh. Organ. Stud."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"2158244019899085","DOI":"10.1177\/2158244019899085","article-title":"Transformational Leadership and Job Performance. The Mediating Role of Work Engagement","volume":"10","author":"Lai","year":"2020","journal-title":"SAGE Open"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1002\/smj.509","article-title":"Leaders, Laggards, and the Pursuit of Foreign Knoledge","volume":"27","author":"Berry","year":"2006","journal-title":"Strateg. Manag. J."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.jebo.2011.05.003","article-title":"Leaders, Laggards and Technology Seeking Strategies","volume":"80","author":"Smeets","year":"2011","journal-title":"J. Econ. Behav. Organ."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Galvin, T., and Clark, L. (2015). Beyond Kotters Leading Change: A Broad Perspective on Organizational Change for Senior US Military Leaders, Army War College Carlisle United Stage.","DOI":"10.21236\/AD1001714"},{"key":"ref_36","first-page":"13","article-title":"Leading Change in Military Organizations: Primer for Senior Leaders","volume":"73","author":"Sandler","year":"2020","journal-title":"Nav. War Coll. Rev."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1067","DOI":"10.1108\/IJEBR-04-2020-0214","article-title":"The economics of COVID-19: Initial empirical evidence on how family firms in five European countries cope with the corona crisis","volume":"26","author":"Kraus","year":"2020","journal-title":"Int. J. Entrep. Behav. Res."},{"key":"ref_38","unstructured":"Yin, R. (2018). Case Study Research and Applications: Design and Methods, SAGE Publications."},{"key":"ref_39","unstructured":"Hancock, D., and Algozzine, B. (2016). Doing Case Study Research: A Practical Guide for Beginning Researchers, Teachers College Press."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Mills, A., Durepos, G., and Wiebe, E. (2010). Encyclopedia of Case Study Research, SAGE Publications.","DOI":"10.4135\/9781412957397"},{"key":"ref_41","first-page":"193","article-title":"Research Dilemmas: Paradigms, Methods and Methodology","volume":"16","author":"Mackenzie","year":"2006","journal-title":"Issues Educ. Res."},{"key":"ref_42","unstructured":"Yin, R. (2016). Qualitative Research from Start to Finish, The Guilford Press."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Given, L. (2008). The Sage Encyclopedia of Qualitative Research Methods, SAGE Publications.","DOI":"10.4135\/9781412963909"},{"key":"ref_44","unstructured":"Merriam, S., and Tisdell, E. (2015). Qualitative Research: A Guide to Design and Implementation, John Wiley & Sons."},{"key":"ref_45","unstructured":"Galletta, A. (2013). Mastering the Semi-Structured Interview and Beyond: From Research Design to Analysis and Publication, New York University Press."},{"key":"ref_46","first-page":"836","article-title":"Reporting and Justifying the number of Interview Participants in Organizational and Workplace Research","volume":"27","author":"Saunders","year":"2016","journal-title":"Br. J. Manag."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.ijpe.2018.07.001","article-title":"Multichannel Service Failure and Recovery in a O2O Era: A Qualitative Multi-Method Research in the Banking Services Industry","volume":"215","author":"Reis","year":"2019","journal-title":"Int. J. Prod. Econ."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Thorpe, R., and Holt, R. (2008). The Sage Dictionary of Qualitative Management Research, SAGE Publications.","DOI":"10.4135\/9780857020109"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Bloor, M., and Wood, F. (2006). Keywords in Qualitative Methods: A Vocabulary of Research Concepts, SAGE Publications.","DOI":"10.4135\/9781849209403"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1111\/j.1365-2648.2007.04569.x","article-title":"The Qualitative Content Analysis Process","volume":"62","author":"Elo","year":"2008","journal-title":"J. Adv. Nurs."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Neuendorf, K., and Kumar, A. (2015). Content Analysis. Int. Encycl. Polit. Commun., 1\u201310.","DOI":"10.1002\/9781118541555.wbiepc065"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Reis, J., Santo, P., and Mel\u00e3o, N. (2020). Impact of Artificial Intelligence Research on Politics of the European Union Member States: The Case Study of Portugal. Sustainability, 12.","DOI":"10.3390\/su12176708"},{"key":"ref_53","unstructured":"Stake, R. (1995). The Art of Case Study Research, SAGE Publications."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Ciesielska, M. (2018). Qualitative Methodologies in Organization Studies Volume II: Methods and Possibilities, Springer.","DOI":"10.1007\/978-3-319-65217-7"},{"key":"ref_55","first-page":"597","article-title":"Understanding Reliability and Validity in Qualitative Research","volume":"8","author":"Golafshani","year":"2003","journal-title":"Qual. Rep."},{"key":"ref_56","first-page":"46","article-title":"From Detection to Surveillance: US Lie Detection Regimes from the Cold War to the War on Terror","volume":"8","author":"Baesler","year":"2015","journal-title":"BEHEMOTH-A J. Civilis."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Palestini, C. (2020). Advanced Technologies at NATO: An Overview. Advanced Technologies for Security Applications, Springer.","DOI":"10.1007\/978-94-024-2021-0"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Cockburn, T., and Smith, P. (2021). Reflecting Emerging Digital Technologies in Leadership Models. Global Business Leadership Development for the Fourth Industrial Revolution, IGI Global.","DOI":"10.4018\/978-1-7998-4861-5.ch002"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1080\/00396338.2013.802860","article-title":"\u201cGreen on Blue\u201d: Insider attacks in Afghanistan","volume":"55","author":"Long","year":"2013","journal-title":"Survival"},{"key":"ref_60","unstructured":"Roggio, B., and Lundquist, L. (2020, August 23). Green-on-Blue Attacks in Afghanistan: The Data. Available online: http:\/\/www.longwarjournal.org\/archives\/2012\/08\/Green-on-blue_attack.php."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1177\/0095327X17752425","article-title":"Murder on Maneuver: Exploring Green-on-blue Attacks in Afghanistan","volume":"45","author":"Shortland","year":"2019","journal-title":"Armed Forces Soc."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Kircher, J.C., Packard, T., Bell, B.G., and Bernhardt, P. (2001). Effects of Prior Demonstrations of Polygraph Accuracy on Outcomes of Probable-Lie and Directed-Lie Polygraph Tests, Utah University. Available online: https:\/\/apps.dtic.mil\/sti\/citations\/ADA404128.","DOI":"10.21236\/ADA404128"}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/12\/3\/122\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:35:01Z","timestamp":1760160901000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/12\/3\/122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,12]]},"references-count":62,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,3]]}},"alternative-id":["info12030122"],"URL":"https:\/\/doi.org\/10.3390\/info12030122","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2021,3,12]]}}}