High-Tech Lie Detection Systems

Scientists at Tel Aviv University that have developed a new method of lie detection. Prof. Hanein and colleague Prof. Dino Levy lead a team that have identified two types of liars - those who involuntarily move their eyebrows when they tell a fib, and those that cannot control a very slight lip movement where their lips meet their cheeks.

The software and algorithm they use can now detect 73% of lies and they intend to improve that as they develop the system. "When you try to conceal a lie, one of the things you try to avoid is any sort of body reaction... But it's very, very hard for you to conceal a lie with this technology." Prof Levy says.

The early 20th Century saw the invention of the first lie detection machines or polygraphs. The most well-known of these is the "analogue polygraph", which typically has three or four ink-filled needles that dance round on a strip of moving paper. The suspect has sensors attached to their fingers, arms and body and the machine then measures breathing rate, pulse, blood pressure and perspiration as they answer a series of questions. 

Currently the polygraph is the best-known technique for psycho-physiological detection of deception. The goal of all of these techniques is to detect deception by analysing signals of changes in the body that cannot normally be detected by human observation. Unfortunately, these devices are not considered wholly accurate.

However, the availability of cheaper computing power, brain-scanning technologies and artificial intelligence has given birth to  a powerful new generation of lie-detection tools based upon measuring changes in cognitive load,  which has an involuntary impact on the eyes and reading behaviour, which can be accurately measured. 

The Tel Aviv researchers say that a combination of skin electrodes measuring facial muscle movements and video cameras monitoring eye movements and subtle changes in pupil size, are capable of detecting a liar with a much higher level of certainty.

In the commercial sector a number of companies have been set up with the aim of using similar technology to produce what they hope will be an infallible lie detector  for use law enforcement and other state agencies as  well as employers, insurance companies and others. 

Conversus:     NewsMagus:     BBC:      Userwalls:     Guardian:    Eye-Detect

You Might Also Read: 

Do People Lie More Often When Using Social Media?:

 

« Britain Aims To Protect Children From Online Pornography
Facebook Tanks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

it-sa 365

it-sa 365

it-sa 365 is a digital platform for connecting IT security vendors and experts with those who bear responsibility for IT security in management and technology.

Cyber8Lab

Cyber8Lab

Cyber8Lab provides cybersecurity training programmes simulating real world cybersecurity incidents such as web defacement, malware, phishing, digital forensics analysis and wireless intrusion.

Navarino

Navarino

Navarino is the maritime industry’s most advanced communications and connectivity company. We develop advanced technologies and innovative IT solutions including cyber security.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

Relution

Relution

Relution is the Unified Endpoint Management platform for innovative companies and educational institutions. It enables you to manage your mobile apps and devices easily and securely.

Nordic Cyber Summit

Nordic Cyber Summit

Nordic Cyber Security Summit addresses a wide range of technological issues from the IT Security spectrum and also provides a wider perspective from all aspects of the industry.

Forgepoint Capital

Forgepoint Capital

ForgePoint Capital is a premier venture investor for early stage cybersecurity companies.

Noventiq

Noventiq

Noventiq (the brandname of Softline Holding plc) is a leading global solutions and services provider in digital transformation and cybersecurity.

CyberNet Albania

CyberNet Albania

Cybernet Albania has been providing IT support and services to small businesses since 2016. We strive to eliminate your IT issues before they cause downtime and impact your operations.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

HackersEra

HackersEra

HackersEra is a leading offensive cybersecurity service provider. We enable our clients to operate in a more secure environment efficiently and produce more value.

Cybersecurity Dubai

Cybersecurity Dubai

Protect your business from cyber-attacks with Cybersecurity Dubai, your partner in online security solutions.

MAUSHIELD

MAUSHIELD

MAUSHIELD is the national platform for sharing cyber threat information and intelligence that can help organisations to improve their cybersecurity posture, minimize risks and prevent cyber-attacks.

Geobridge

Geobridge

Geobridge was one of the first information security solutions providers to support cryptography and payment applications for payment processors, financial institutions and retail organizations.

Oak9

Oak9

Oak9's Security as Code platform dynamically secures Infrastructure as Code (IaC) and deployed cloud workloads, automatically.

Cyber Castellum

Cyber Castellum

Cyber Castellum is a cybersecurity consulting firm that specializes in the identification of security vulnerabilities in an organization’s technology landscape.