Surveillance Cameras That Spot Your Personality Type

Researchers have used artificial intelligence to show that very subtle eye movements, of the sort you might pick up with a camera, can divine aspects of personality much better than random guessing.

It’s another good example of how the wealth of biometric data that humans produce, once digitised and examined at large scale, can reveal hidden aspects of identity in ways that could be a boon to intelligence gathering.

The German and Australian researchers fitted 42 volunteers with eye-tracking headgear, and had them fill out the NEO Five-Factor Inventory, a personality test that measures traits such as neuroticism, extraversion, openness, agreeableness, and conscientiousness.

They then had the subjects go about a normal routine while they quietly collected eye movement data and then used machine learning to categorise the data.

“Thanks to the machine learning approach, we could automatically analyse a large set of eye movement characteristics and rank them by their importance for personality trait prediction.

“Going beyond characteristics investigated in earlier works, this approach also allowed us to identify new links between previously under-investigated eye movement characteristics and personality traits,” they write.

While the program didn’t predict personality perfectly, it did much better than random guessing in areas such as extraversion, agreeableness, and neuroticism, etc. Only in the area of curiosity and exploration did guessing work better.

The US military has been looking for ways to use biometrics to authenticate individuals, rather than passwords that can be hacked, and to better collect intelligence on potential subjects in a way that is “non-permissive,” which really just means without the subject’s permission or attention.

But the intelligence community has become concerned about the growing amount of biometric data leakage that’s complicating efforts.

DefenseOne

You Migh Also Read: 

Biometric Products Can Help Cybersecurity:

New AI Claims To Determine If You Are Gay Or Straight:

 

« What Are Deepfakes?
Dixons Carphone Data Breach Hits 10m Users »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Help Net Security

Help Net Security

Help Net Security has been a prime resource for information security news and insight since 1998.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

Sqreen

Sqreen

Sqreen is a web application security monitoring and protection solution helping companies protect their apps and users from attacks.

SafeLogic

SafeLogic

SafeLogic provides strong encryption products for solutions in mobile, server, Cloud, appliance, wearable, and IoT environments that are pursuing compliance to strict regulatory requirements.

ResponSight

ResponSight

ResponSight is a data science company focusing specifically on the challenge of measuring risk and identifying changes in enterprise/corporate networks using behavioural analytics.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

Bechtle

Bechtle

Bechtle is one of Europe’s leading IT service providers offering a blend of direct IT product sales and extensive systems integration services.

RedLegg

RedLegg

RedLegg is a master provider of information security services, a boutique, nimble, old-fashioned customer service company that enjoys the technology battlefield.

Schneider Downs

Schneider Downs

Schneider Downs & Co. provides accounting, tax and business advisory services through innovative thought leaders who deliver their expertise to meet the individual needs of each client.

Ciphertex Data Security

Ciphertex Data Security

Ciphertex is a leading data security company that specializes in portable data encryption and privacy protection storage systems.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

HIFENCE

HIFENCE

HIFENCE delivers cybersecurity and networking services that make your company safer and more secure. That’s all we do, so you can concentrate on all the things that you do best.

Evervault

Evervault

Evervault provides engineers easy solutions to complex data security and compliance problems.

Silence Laboratories

Silence Laboratories

Silence Laboratories is a cybersecurity company that focuses on the fusion of cryptography, sensing, and design to support a seamless authentication experience.

Enterprise Strategy Group

Enterprise Strategy Group

Enterprise Strategy Group, a division of TechTarget, is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community.

Velstadt Cybersecurity

Velstadt Cybersecurity

Velstadt's team of experienced professionals works on identifying vulnerabilities, analyzing threats, and developing strategies to ensure the highest level of security.