Surveillance Cameras That Spot Your Personality Type

Researchers have used artificial intelligence to show that very subtle eye movements, of the sort you might pick up with a camera, can divine aspects of personality much better than random guessing.

It’s another good example of how the wealth of biometric data that humans produce, once digitised and examined at large scale, can reveal hidden aspects of identity in ways that could be a boon to intelligence gathering.

The German and Australian researchers fitted 42 volunteers with eye-tracking headgear, and had them fill out the NEO Five-Factor Inventory, a personality test that measures traits such as neuroticism, extraversion, openness, agreeableness, and conscientiousness.

They then had the subjects go about a normal routine while they quietly collected eye movement data and then used machine learning to categorise the data.

“Thanks to the machine learning approach, we could automatically analyse a large set of eye movement characteristics and rank them by their importance for personality trait prediction.

“Going beyond characteristics investigated in earlier works, this approach also allowed us to identify new links between previously under-investigated eye movement characteristics and personality traits,” they write.

While the program didn’t predict personality perfectly, it did much better than random guessing in areas such as extraversion, agreeableness, and neuroticism, etc. Only in the area of curiosity and exploration did guessing work better.

The US military has been looking for ways to use biometrics to authenticate individuals, rather than passwords that can be hacked, and to better collect intelligence on potential subjects in a way that is “non-permissive,” which really just means without the subject’s permission or attention.

But the intelligence community has become concerned about the growing amount of biometric data leakage that’s complicating efforts.

DefenseOne

You Migh Also Read: 

Biometric Products Can Help Cybersecurity:

New AI Claims To Determine If You Are Gay Or Straight:

 

« What Are Deepfakes?
Dixons Carphone Data Breach Hits 10m Users »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

KirCCS harnesses expertise across Kent University to address current and potential cyber security challenges.

Logically Secure

Logically Secure

Logically Secure provide penetration testing and security assessment services.

ManTech International

ManTech International

ManTech provides comprehensive, integrated cyber security support, which includes computer and network design, implementation, and operations.

ObserveIT

ObserveIT

ObserveIT helps companies identify & eliminate insider threats. Visually monitor & quickly investigate with our easy-deploy user activity monitoring solution.

FarrPoint

FarrPoint

FarrPoint is a specialist telecoms consultancy providing a range of services including cyber security assessments and technical assurance to safeguard your data.

Swiss Cyber Think Tank (SCTT)

Swiss Cyber Think Tank (SCTT)

The Swiss Cyber Think Tank is a business network for Cyber Risk & Insurability, providing an industry-wide networking platform for insurers, technology and security firms.

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

GitGuardian

GitGuardian

Enable developers, ops, security and compliance professionals to enforce security policies across public and private code, and other data sources as well

Dutch Innovation Park

Dutch Innovation Park

Dutch Innovation Park in Zoetermeer is a breeding ground for applied IT solutions in the field of cyber security, e-health, smart mobility and big data.

CyberMDX

CyberMDX

CyberMDX delivers proactive security built for hospital devices. 360° visibility, insight, and protection for all connected hospital technologies.

TalaTek

TalaTek

TalaTek is a full-service risk management firm providing expert services in risk management, cybersecurity, and compliance.

Ukrainian Academy of Cyber Security (UACS)

Ukrainian Academy of Cyber Security (UACS)

UACS is a professional non-profit public organization established to promote the development of an extensive network and ecosystem of education and training in the field of cyber security.

Questex Asia Total Security Conference

Questex Asia Total Security Conference

Questex Asia’s Total Security Conferences is one of the industry’s most prestigious and engaging forums for the region's top information security leaders and business decision-makers.

Finite State

Finite State

Finite State enables product security teams to protect the devices we rely on every day through market-leading software threat, vulnerability, and risk management.

42Crunch

42Crunch

42Crunch provides API security testing and threat protection. We proactively test, fix and protect your APIs from development to runtime.

Custocy

Custocy

Custocy is a unique collaborative AI technology that identifies sophisticated and unknown (zero-day) attacks.