Surveillance Cameras That Spot Your Personality Type

Researchers have used artificial intelligence to show that very subtle eye movements, of the sort you might pick up with a camera, can divine aspects of personality much better than random guessing.

It’s another good example of how the wealth of biometric data that humans produce, once digitised and examined at large scale, can reveal hidden aspects of identity in ways that could be a boon to intelligence gathering.

The German and Australian researchers fitted 42 volunteers with eye-tracking headgear, and had them fill out the NEO Five-Factor Inventory, a personality test that measures traits such as neuroticism, extraversion, openness, agreeableness, and conscientiousness.

They then had the subjects go about a normal routine while they quietly collected eye movement data and then used machine learning to categorise the data.

“Thanks to the machine learning approach, we could automatically analyse a large set of eye movement characteristics and rank them by their importance for personality trait prediction.

“Going beyond characteristics investigated in earlier works, this approach also allowed us to identify new links between previously under-investigated eye movement characteristics and personality traits,” they write.

While the program didn’t predict personality perfectly, it did much better than random guessing in areas such as extraversion, agreeableness, and neuroticism, etc. Only in the area of curiosity and exploration did guessing work better.

The US military has been looking for ways to use biometrics to authenticate individuals, rather than passwords that can be hacked, and to better collect intelligence on potential subjects in a way that is “non-permissive,” which really just means without the subject’s permission or attention.

But the intelligence community has become concerned about the growing amount of biometric data leakage that’s complicating efforts.

DefenseOne

You Migh Also Read: 

Biometric Products Can Help Cybersecurity:

New AI Claims To Determine If You Are Gay Or Straight:

 

« What Are Deepfakes?
Dixons Carphone Data Breach Hits 10m Users »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

GovCERT.HK

GovCERT.HK

GovCERT.HK is the Government Computer Emergency Response Team for Hong Kong.

Forensic Control

Forensic Control

Forensic Control specialise in providing simple & straightforward Cyber Security to organisations, helping them assess, prevent and respond to cyber threats.

Stormshield

Stormshield

Stormshield is a European leader in digital infrastructure security. We offer smart, connected solutions in order to anticipate attacks and protect digital infrastructures.

Emerson Electric Co

Emerson Electric Co

Emerson provides industrial automation systems and associated cybersecurity solutions to protect critical process control systems from cyber attack.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

Zeguro

Zeguro

Zeguro provides complete cybersecurity risk assessment, mitigation and insurance, allowing you to easily manage your cyber risk.

Onward Security

Onward Security

Onward Security provides security solutions including network & application assessment, product security testing and security consulting services.

Russell Reynolds Associates

Russell Reynolds Associates

Russell Reynolds Associates is a global leadership advisory and search firm with functional expertise in Digital Leadership, Data & Analytics, and Compliance.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

Qascom

Qascom

Qascom is an engineering company offering security solutions in satellite navigation and space cybersecurity. We are one of the European key players in GNSS authentication and security.

Across Verticals

Across Verticals

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices.

TOTM Technologies

TOTM Technologies

TOTM Technologies provides end-to-end identity management and biometrics products, powering Digital identity and Digital onboarding solutions.

Papua New Guinea National Cyber Security Centre (PNG NCSC)

Papua New Guinea National Cyber Security Centre (PNG NCSC)

PNG NCSC is a jointly funded initiative enabling PNG to benefit with the most advanced cyber protection of its critical information and communications technology infrastructure.

Octane

Octane

Octane is an AI cybersecurity startup using machine learning to identify and fix vulnerabilities in blockchain codebases.

Unosecur

Unosecur

Unosecur is a comprehensive identity security platform that addresses identity-related threats in multi-cloud and on-premise environments.

Seasia Infotech

Seasia Infotech

Seasia Infotech is a leader in offering efficient, tailor-made and comprehensive digital transformation services.