Researchers Looking To Commercialize Eye-Tracking Technology As Polygraph Alternative

Shifty eyes long have been thought to signify a person’s problem telling the truth. Now a group of University of Utah researchers are taking that old adage to a new level.

Educational psychologists John Kircher, Doug Hacker, Anne Cook, Dan Woltz and David Raskin are using eye-tracking technology to pioneer a promising alternative to the polygraph for lie detection. The researchers’ efforts to commercialize their new technology reached a milestone recently when the University of Utah licensed the technology to Credibility Assessment Technologies (CAT).

CAT is based in Park City, Utah, and managed by venture capitalists Donald Sanborn and Gerald Sanders, who are the president and chairman, respectively.

“The eye-tracking method for detecting lies has great potential,” Sanders said. “It’s a matter of national security that our government agencies have the best and most advanced methods for detecting truth from fiction, and we believe we are addressing that need by licensing the extraordinary research done at the University of Utah.”

In addition to bringing the technology closer to the marketplace, the licensing also helps maintain the university’s leadership in lie-detection research. The university has been a leader in the field for at least 30 years, through the work of Raskin and Kircher, who both completed substantial research on the subject. Raskin now is a professor emeritus.

Tracking eye movement to detect lies became possible in recent years because of substantial improvements in technology. The Utah researchers say they are the first to develop and assess the software and methods for applying these tests effectively.

Using eye movement to detect lies contrasts with polygraph testing. Instead of measuring a person’s emotional reaction to lying, eye-tracking technology measures the person’s cognitive reaction. To do so, the researchers record a number of measurements while a subject is answering a series of true-and-false questions on a computer. The measurements include pupil dilation, response time, reading and rereading time, and errors.

The researchers determined that lying requires more work than telling the truth, so they look for indications that the subject is working hard. For example, a person who is being dishonest may have dilated pupils and take longer to read and answer the questions. These reactions are often minute and require sophisticated measurement and statistical modeling to determine their significance.

“We have gotten great results from our experiments,” Kircher said. “They are as good as or better than the polygraph, and we are still in the early stages of this innovative new method to determine if someone is trying to deceive you.”

Besides measuring a different type of response, eye-tracking methods for detecting lies has several other benefits over the polygraph. Eye tracking promises to cost substantially less, require one-fifth of the time currently needed for examinations, require no attachment to the subject being tested, be available in any language and be administered by technicians rather than qualified polygraph examiners.

Research into this method began five years ago, when faculty members started discussing the concept casually. They secured seed funding and the university’s Department of Educational Psychology hired new faculty with relevant skills.

The researchers still have more development work to do, but they hope the recent licensing will help them attract the additional funding necessary and interest from potential customers. Numerous government agencies, such as the Department of Defense, Department of Homeland Security, Customs and Border Protection, and Department of Energy use polygraphs regularly to screen employees and applicants for sensitive positions, and these agencies always are looking for more effective ways to detect lies.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3