iCognative

iCognative scientifically detects whether specific information is stored in the brain by measuring brainwaves. Brainwave Science has developed an EEG/P300 based testing systems that determine with accuracy whether or not specific information is stored in a person's memory.


iCognative solution advances investigation, intelligence collection, and forensic capabilities in Counterterrorism, Counterintelligence, and Law Enforcement.

The fundamental difference between the perpetrator of a terrorist act or crime and an innocent person is that the perpetrator, having committed the crime, has specific knowledge of the crime stored in his brain. An innocent suspect does not. Similarly, a terrorist mastermind or trained terrorist has specific terrorism-related knowledge stored in his brain. This is what iCognative testing detects, scientifically and accurately.

Words, phrases, or pictures relevant to a terrorist act, crime, terrorist training, or specific knowledge or expertise are presented on a computer screen, in a series with other, irrelevant words, phrases or pictures. A suspect’s brainwave responses are measured non-invasively using a headset equipped with EEG sensors. A proprietary computer program then analyzes the data to determine if the crime-relevant information is stored in the brain. A specific “P300-MERMER” brain response is emitted by the brain of a perpetrator who has the details of a crime stored in his brain but not by an innocent suspect lacking this record in his brain. This is proven by extensive peer-reviewed, published scientific research.

 

COUNTER-TERRORISM

Challenge
• Insufficient information
• Accurate intelligence on leads and networks
• Pace and scope of suspected terrorists
• Identifying terrorists before terror attack
• Terrorists in sleeper cells

Solution
• Detect any form of terrorist training/ knowledge
• Link suspects to events, places and other known terrorists
• Detecting EOD / IED (Bomb) Knowledge
• Counter Improvised Explosive Device Test
• Uncover High Value Individual (HVI)
• Reverse Engineering the Terrorist Network

 

COUNTER-INTELLIGENCE

Challenge

• Absence of accurate cross-verification solutions
• Limitations to unreliable truth-verification solutions and conventional background checks on personnel
• Validating Sources Information
• Identifying double agents
• Identifying moles

Solution
• Identifies and associate a suspected person with:
           • Specific knowledge of unauthorized knowledge
           • Tactical plans for past operations
           • Financial details of illicit transactions

• Verifies whether information about the person matches the true record retained in his/her brain.
• Validation test to identify whether or not a spy belong to other country Intelligence Agency.
• Validating the Sources Information.
• Detecting Double Agents, spy from other countries.
 

LAW ENFORCEMENT

Challenge
• Identification of perpetrators
• Obtain conclusive evidence
• False accounts, tips, bogus claims, manipulated facts
• Low case-clearance rates
• Detect accomplices and members of gangs and criminal organizations.
              • Costly
              • Fatigued manpower and resources
              • Increased threat to society

• Identifying members of organized crime
• Identifying genuinity of witnesses and victims

Solution
• Identify the mastermind of any organized crime
• Validating the trustworthiness of the victim’s claims
• Validating the honesty of the witness claims
• Applicable in 90 – 95% of cases (validated by the FBI)