CSAA — Cognitive Signature Authenticity Assessment — determines whether a narrative reflects genuine cognitive experience or constructed fabrication. Designed for legal proceedings, insurance verification, and security screening.
When someone recalls a genuine experience, their narrative carries the oscillatory signature of the brain that lived it. When someone constructs a fabricated account, the cognitive architecture is fundamentally different — regardless of how convincing the story sounds to a human listener.
CSAA analyzes narratives through the same NOUS pipeline that powers clinical diagnostics, but with a specialized forensic focus. The output is an Authenticity Index score (0-100) indicating the probability that a narrative reflects genuine versus constructed cognitive processing.
Zero clinical leakage. CSAA operates as a completely separate pathway from CI clinical assessment. No diagnostic information crosses the boundary. A CSAA report tells you whether the narrative is authentic — not what condition the speaker may have.
Subject provides account via text or voice. Interview Mode enables real-time analysis during structured questioning.
REMIEL extracts features across all 8 channels. R2X processes through forensic-specific parameters.
Authenticity Index (0-100) with confidence level. Segment-by-segment analysis highlighting areas of concern.
Federal forensic format PDF. Law enforcement sensitive markings. Court-admissible documentation standard.
Assess the cognitive authenticity of witness statements, depositions, and courtroom testimony. Identify segments where constructed narrative diverges from genuine recall.
Flag potentially fabricated injury claims, disability narratives, and workers' compensation accounts. RTCA integration enables analysis of recorded claims interviews at scale.
Cognitive authenticity assessment for security clearance interviews, insider threat detection, and background investigation narratives.
Post-operation debrief analysis, returned POW/hostage cognitive assessment, and interrogation support with real-time RTCA monitoring.
Suspect statement analysis, victim narrative assessment, and cold case re-evaluation through recorded interview analysis.
Compliance investigation support, whistleblower claim assessment, and workplace incident narrative verification.
CSAA extends beyond authenticity assessment into full forensic cognitive profiling. The Profile Matching System reconstructs the cognitive architecture of whoever produced the artifact — letter, manifesto, phone call transcript, email, social media post — and classifies it against a reference library of known cognitive patterns.
Every artifact produces a 12-sector NOSS cognitive profile, a Beverly Index score, and a clinical summary identifying the closest archetypal match. One sentence tells the analyst what kind of mind produced this artifact.
Four concern pattern archetypes — Acute Destabilization, CTE-Consistent, Neurodegenerative, and Dissociative Fragmentation — are evaluated automatically. When a concern pattern exceeds the threshold, the system flags it with recommended clinical action.
When multiple artifacts from the same source are available, CSAA reconstructs the cognitive trajectory over time. The dampening coefficient indicates whether the subject is stabilizing, stalled, or escalating. This is quantitative threat assessment — not subjective interpretation.
Every profile is compared against reference populations with known outcomes. Case Study 003 demonstrated zero population overlap between healthy controls and individuals who committed acts of mass violence across all measured dimensions.
Multi-Artifact Discount: Each additional artifact after the first is priced at 50% of the tier rate.
Agency Retainer: $8,000/month for up to 5 Standard Reports with priority 24-hour turnaround. Contact for details.
Thank you for your inquiry. We will review your request and respond within 24 hours to establish a secure channel for data transfer.
View our case studies while you wait.
This page describes what CSAA does and where it applies. The specific detection methodology — the linguistic markers, algorithmic architecture, and scoring heuristics — is classified and available only to authorized users through the Tier 4 authenticated platform.
This is by design. CSAA's effectiveness depends on subjects not knowing how fabrication is detected. Methodology exposure would compromise the tool for all users.
CSAA access requires authorized credentials. Contact us for a classified briefing.