Skip to main content

OPINION article

Front. Psychiatry, 12 February 2019
Sec. Forensic Psychiatry
This article is part of the Research Topic Deception in Court: Open Issues and Detection Techniques View all 16 articles

Digging Further Into the Speech of Liars: Future Research Prospects in Verbal Lie Detection

  • 1Department of Criminology, Bar-Ilan University, Ramat-Gan, Israel
  • 2Investigative Psychology Section, The Division of Identification and Forensic Science, Investigation and Intelligence Branch, Israel Police, Haifa, Israel

The field of verbal lie detection has grown rapidly in the past decade. Derived by the assumption that lies have different content patterns than do truths, research in this area promotes searching for content criteria to detect them. One prime content-based indicator for deception detection, which stems from the Reality Monitoring (RM) theory (1), is richness in detail. According to RM, truthful memories of actual events originate in perceptual experience and are embedded in the context of time and space. As such, they are expected to include more spatial and temporal contextual attributes (i.e., locations, spatial arrangement of people and objects, times, duration and sequence of events) and perceptual attributes (i.e., what the individual felt, tasted, smelled, heard, or saw when the event took place) than do false memories, which originate in self-generated thought or imagination. Derived from this prediction, the traditional use of richness in detail as an indicator of deception is based on the number of perceptual and contextual details in the interviewee's accounts. However, as a memory source-monitoring theory, RM does not take into consideration the intention of liars to deceive and consequently cannot explain the full scope of richness in detail in the field of deception (2). In contrast to false memories, where the individual has no intention to deceive but wrongly believes that his/her memory of an event that never happened is truthful, fabricated memories are an outcome of manipulation [and have thus been labeled “self-manipulated memories”; (2)]. Liars frequently attempt to manipulate their fabricated accounts to make them seem truthful (35), for example by intentionally adding false perceptual and contextual details (6, 7). Affecting the quantity of the details in their fabricated accounts, such strategic manipulations reduce the diagnostic efficacy of the richness in detail indicator. Yet, in the current paper, we aim to show that the same strategies leave traces on the quality of details. Therefore, we propose that to maximize the potential utility of the richness in detail indicator, it is necessary to dig deeper into the speech of liars, particularly by looking for traces of deception strategies found in the quality of the details. In fact, the Verifiability Approach [VA; (4, 8)] applies this notion.

The Verifiability Approach (VA)

The VA (8) for lie detection was initiated based on the understanding that lies, by nature, are based on strategies. The first VA study (4) clearly demonstrated that lie detection benefits more from consideration of the quality of perceptual and contextual details than it does from consideration of their quantity alone.

According to the VA, the strategy employed by liars is guided by the liars' dilemma hypothesis. Specifically, liars perceive richness in detail as an indicator of truthfulness (9, 10) and are thus motivated to provide many details to make an impression of honesty (7, 11). On the other hand, the provision of details also puts liars at risk, as the truthfulness of the details provided can be checked. Aware of this danger [see (6, 7)], liars are inclined to avoid mentioning false details, to minimize the chances of being caught. These two contradicting motivations—for and against the provision of details—put liars in a dilemma. A strategy that resolves the conflict involves the provision of details that cannot be checked and verified.

When used by liars, this strategy of providing non-verifiable information affects the quantity and quality of the contextual and perceptual details that appear in their accounts. They “inflate” the quantity of detail by incorporating false, non-verifiable, details, and as a result provide accounts that appear closer to the RM prototype of truthful accounts (i.e., accounts rich in perceptual and contextual details). However, their strategy leaves traces in the quality of their accounts, in terms of verifiability. By assessing the quality (i.e., the verifiability of the contextual and perceptual details) rather than the quantity of details provided, it is possible to reveal the liars' strategy, and thereby indicate their lies.

In the last years, the validity of the VA, which was originally developed and tested in police interview setting [e.g., (4, 5, 12, 13)] has been examined in other settings including insurance [e.g., (1417)], airport security [see (18, 19)], occupation [e.g., (20)], and malingering [e.g., (21, 22)]. Some of these applications were more successful than others, but mostly the VA perspectives were confirmed [for a recent review see (23)], thereby providing an empirical evidence to the profitability of looking for quality of details. Encouraged by the success of the VA, we propose that research in this field should dig further into the speech of liars, in an attempt to identify additional indications of strategies in the quality of details provided. As such, we present two new approaches, both are derived from the theoretical and empirical framework of the VA.

Context Embedded Perception (CEP)

The first approach was recently proposed by the authors of the current paper Nisin and Nahari (in preparation), who suggest that the qualitative differences between perceptual and contextual details can serve as a potential generator of deception strategy. According to this approach, while perceptual information is actually experienced, and acquired directly by the senses, contextual information is virtual in its nature, and based on semantic knowledge and relative conceptualizations. For instance, we experience the perceptual aspects of an interaction with a friend through our senses: we see the friend and the clothes he is wearing, hear his speech, and feel his touch. Meanwhile, the contextual aspects of this interaction, such as its length and specific location, are based on conceptualization and knowledge. In fact, the contextual attributes are imposed on the perceptual details and frame them in time and space. Accordingly, the perceptual details (e.g., visions, smells, sounds, sensations, and tastes) can be regarded as primary data, and the contextual details (e.g., indications of where, when, and for how long those perceptual details were experienced)—as meta-data. Obviously, the truthfulness of perceptual details can be checked only when they are given by the interviewee within the framework of contextual information regarding time and space. Thus, the contextual details are those that confer the status of verifiability upon perceptual details. Considering the differences between the two types of details in light of the VA (8), liars would be expected to avoid the provision of contextual details as often as possible. Motivated to provide non-verifiable details, they would be likely to provide perceptual details without framing them in time and space, making it difficult to check their truthfulness. Truth-tellers, on the other hand, would be expected to freely provide both types of details, as they have no reason to avoid verification. Thus, the prediction yielded from this approach is that liars, when adding false details to their accounts, will strategically prefer to provide perceptual details over (or without) contextual details, while truth-tellers will provide both types of details. As such, the number of contextual details in an account can serve as a verbal lie indicator.

Resolution of Verifiability (RoV)

The second approach involves the resolution of the verifiable details provided, as determined by the immediacy in which the information they incorporate can be verify. A good example of such resolution involves the use of names, which already found significance for lie detection (24). According to the VA (4), events that occurred in the presence of another person will be considered verifiable only when that person can be traced. Once an identifiable person has been mentioned, that person can be approached to confirm the truthfulness of the reported occurrences. However, the mention of a name is not a necessary condition for rendering the person identifiable and traceable. It is reasonable to assume that an interviewee who mentions a “friend” or “neighbor,” even without volunteering a name, has considered that the police will ask about the person's specific identity, especially because identified persons can serve as witnesses (i.e., prime and significant evidence) who can confirm details in the interviewee's account. Consequently, it is likely that by mentioning persons who can be traced, with or without mentioning their names, interviewees mean, or at least are aware of the fact, that they are providing verifiable details [see (8)]. The difference between the two conditions (named vs. unnamed but traceable) is in the resolution of the verifiable details provided: names increase the resolution of the details. The mention of an identifiable person without a name leaves the interviewees with degrees of freedom, at least temporarily, such that the verifiability of the details is neither immediate nor easy (relatively speaking) to check. Importantly, these degrees of freedom also range, as mentioning an unnamed uncle, for example, leaves less degrees of freedom than mentioning an unnamed acquaintance. These assumptions lead to the expectation that liars, when they do provide verifiable details, will strategically prefer low-resolution over high-resolution details, while truth-tellers will prefer high-resolution details. Again, as with the contextual details, the number of low-resolution verifiable details in an account can serve as a verbal lie indicator.

Conclusions

The current paper is a call for more strategy-based research in the field of verbal lie detection. By demonstrating how strategies blur the differences in detail quantity while sharpening the differences in detail quality between truthful and fabricated accounts, we stress that research should go beyond the surface of content, to look for strategies that activate verbal behaviors among liars, define the qualitative manifestations of their strategies, and then—to exploit these manifestations in indicating their lies. The VA, a new and promising paradigm for deception detection is an outcome of this research approach. Having presented two new, un-studied, strategy-based approaches to further demonstrate and extend this line of research, we propose that following this path will benefit the field both theoretically and practically.

Author Contributions

GN: conceptualization and writing the first draft, revising and editing. ZN: conceptualization and review and editing.

Funding

This research was supported by the Israel Science Foundation grant (grant No. 372/14).

Conflict of Interest Statement

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

The reviewer BK declared a past collaboration with one of the authors GN to the handling editor.

References

1. Johnson MK, Raye CL. Reality monitoring. Psychol Rev. (1981) 88:67–85.

Google Scholar

2. Nahari G. The applicability of the verifiability approach to the Real world. In: Rosenfeld JP, editors. Detecting Concealed Information and Deception: Recent Developments. London: Elsevier (2018). p. 329–49.

Google Scholar

3. Granhag PA, Hartwig M. A new theoretical perspective on deception detection: on the psychology of instrumental mind-reading. Psychol Crime Law (2008) 14:189–200. doi: 10.1080/10683160701645181

CrossRef Full Text | Google Scholar

4. Nahari G, Vrij A, Fisher R. Exploiting liars' verbal strategies by examining unverifiable details. Legal Criminol Psychol. (2014) 19:227–39. doi: 10.1111/j.2044-8333.2012.02069.x

CrossRef Full Text | Google Scholar

5. Nahari G, Vrij A, Fisher R. The verifiability approach: countermeasures facilitate its ability to discriminate between truths and lies. Appl Cogn Psychol. (2014) 28:122–8. doi: 10.1002/acp.2974

CrossRef Full Text | Google Scholar

6. Masip J, Herrero C. ‘What would you say if you were guilty?’ Suspects' strategies during a hypothetical behavior analysis interview concerning a serious crime. Appl Cogn Psychol. (2013) 27:60–70. doi: 10.1002/acp.2872

CrossRef Full Text | Google Scholar

7. Nahari G, Vrij A, Fisher RP. Does the truth come out in the writing? Scan as a lie detection tool. Law Human Behav. (2012) 36:68–76. doi: 10.1037/h0093965

PubMed Abstract | CrossRef Full Text | Google Scholar

8. Nahari G. Reality monitoring in the forensic context: digging deeper into the speech of liars. J Appl Res Mem Cogn. (2018) 7:432–40. doi: 10.1016/j.jarmac.2018.04.003

CrossRef Full Text | Google Scholar

9. Bell BE, Loftus EF. Trivial persuasion in the courtroom: the power of (a few) minor details. J Pers Soc Psychol. (1989) 56:669–79.

PubMed Abstract | Google Scholar

10. Johnson MK. Memory and reality. Am Psychol. (2006) 61:760–71. doi: 10.1037/0003-066X.61.8.760

PubMed Abstract | CrossRef Full Text | Google Scholar

11. Hartwig M, Granhag PA, Strömwall LA. Guilty and innocent suspects' strategies during police interrogations. Psychol Crime Law (2007) 13:213–27. doi: 10.1080/10683160600750264

CrossRef Full Text | Google Scholar

12. Nahari G, Vrij A. Are you as good as me at telling a story? Individual differences in interpersonal reality-monitoring. Psychol Crime Law (2014) 20:573–83. doi: 10.1080/1068316X.2013.793771

CrossRef Full Text | Google Scholar

13. Nahari G, Vrij A. Can someone fabricate verifiable details when planning in advance? It all depends on the crime scenario. Psychol Crime Law (2015) 21:987–99. doi: 10.1080/1068316X.2015.1077248

CrossRef Full Text | Google Scholar

14. Harvey CH, Vrij A, Leal S, Lafferty M, Nahari G. Insurance-based lie detection: enhancing the verifiability approach with a model statement component. Acta Psychol. (2017) 174:1–8. doi: 10.1016/j.actpsy.2017.01.001

PubMed Abstract | CrossRef Full Text | Google Scholar

15. Harvey AC, Vrij A, Nahari G, Ludwig K. Applying the verifiability approach to insurance claims settings: exploring the effect of the information protocol Legal Criminol Psychol. (2016) 22:47–59 doi: 10.1111/lcrp.12092

CrossRef Full Text | Google Scholar

16. Vrij A, Nahari G, Isitt R, Leal S. Using the verifiability lie detection approach in an insurance claim setting. J Investig Psychol Offend Profiling (2016) 13:183–97. doi: 10.1002/jip.1458

CrossRef Full Text | Google Scholar

17. Nahari G, Leal S, Vrij A, Warmelink L, Vernham Z. Did somebody see it? Applying the verifiability approach to insurance claims interviews. J Investig Psychol Offend Profiling (2014) 11:237–43. doi: 10.1002/jip.1417

CrossRef Full Text | Google Scholar

18. Jupe LM, Leal S, Vrij A, Nahari G. Applying the verifiability approach in an international airport setting. Psychol Crime Law (2017) 23:812–25. doi: 10.1080/1068316X.2017.1327584

CrossRef Full Text | Google Scholar

19. Kleinberg B, Nahari G, Arntz A, Verschuere B. An investigation on the detectability of deceptive intent about flying through verbal deception detection. Collabra: Psychol. (2017) 3:21. doi: 10.1525/collabra.80

CrossRef Full Text | Google Scholar

20. Jupe LM, Vrij A, Leal S, Mann S, Nahari G. The lies we live: using the verifiability approach to detect lying about occupation. J Articles Support Null Hypothesis (2016) 13:1–13. Available online at: https://researchportal.port.ac.uk/portal/en/publications/the-lies-we-live(56beb3f2-0c7c-4821-905f-49bbba9c0b7e).html

Google Scholar

21. Boskovic I, Bogaard G, Merckelbach H, Vrij A, Hope L. The verifiability approach to detection of malingered physical symptoms. Psychol Crime Law (2017) 23:717–29. doi: 10.1080/1068316X.2017.1302585

CrossRef Full Text | Google Scholar

22. Boskovic I, Gallardo CT, Vrij A, Hope L, Merckelbach H. Verifiability on the run: an experimental study on the verifiability approach to malingered symptoms. Psychiatry Psychol Law (2018). doi: 10.1080/13218719.2018.1483272 [Epub ahead of print].

CrossRef Full Text | Google Scholar

23. Vrij A, Nahari G. The verifiability approach. In: Dickinson J, Schreiber Compo N, Carol R, McCauley M, editors. Evidence-Based Investigative Interviewing. London: Routledge; Taylor and Francis Group (in press).

PubMed Abstract

24. Kleinberg B, Mozes M, Arntz A, Verschuere B. Using named entities for computer-automated verbal deception detection. J Forensic Sci. (2018) 63:714–23. doi: 10.1111/1556-4029.13645

PubMed Abstract | CrossRef Full Text | Google Scholar

Keywords: deception and deceptive strategies, verbal lie detection, verifiability approach, detection deception, reality monitoring, context embedded perception

Citation: Nahari G and Nisin Z (2019) Digging Further Into the Speech of Liars: Future Research Prospects in Verbal Lie Detection. Front. Psychiatry 10:56. doi: 10.3389/fpsyt.2019.00056

Received: 14 August 2018; Accepted: 24 January 2019;
Published: 12 February 2019.

Edited by:

Giuseppe Sartori, University of Padova, Italy

Reviewed by:

Bennett Kleinberg, University College London, United Kingdom
Emiliano Ricciardi, IMT School for Advanced Studies Lucca, Italy

Copyright © 2019 Nahari and Nisin. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Galit Nahari, galit.nahari@biu.ac.il

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.