Researchers Looking To Commercialize Eye-Tracking Technology As Polygraph Alternative

Shifty eyes long have been thought to signify a person’s problem telling the truth. Now a group of University of Utah researchers are taking that old adage to a new level.

Educational psychologists John Kircher, Doug Hacker, Anne Cook, Dan Woltz and David Raskin are using eye-tracking technology to pioneer a promising alternative to the polygraph for lie detection. The researchers’ efforts to commercialize their new technology reached a milestone recently when the University of Utah licensed the technology to Credibility Assessment Technologies (CAT).

CAT is based in Park City, Utah, and managed by venture capitalists Donald Sanborn and Gerald Sanders, who are the president and chairman, respectively.

“The eye-tracking method for detecting lies has great potential,” Sanders said. “It’s a matter of national security that our government agencies have the best and most advanced methods for detecting truth from fiction, and we believe we are addressing that need by licensing the extraordinary research done at the University of Utah.”

In addition to bringing the technology closer to the marketplace, the licensing also helps maintain the university’s leadership in lie-detection research. The university has been a leader in the field for at least 30 years, through the work of Raskin and Kircher, who both completed substantial research on the subject. Raskin now is a professor emeritus.

Tracking eye movement to detect lies became possible in recent years because of substantial improvements in technology. The Utah researchers say they are the first to develop and assess the software and methods for applying these tests effectively.

Using eye movement to detect lies contrasts with polygraph testing. Instead of measuring a person’s emotional reaction to lying, eye-tracking technology measures the person’s cognitive reaction. To do so, the researchers record a number of measurements while a subject is answering a series of true-and-false questions on a computer. The measurements include pupil dilation, response time, reading and rereading time, and errors.

The researchers determined that lying requires more work than telling the truth, so they look for indications that the subject is working hard. For example, a person who is being dishonest may have dilated pupils and take longer to read and answer the questions. These reactions are often minute and require sophisticated measurement and statistical modeling to determine their significance.

“We have gotten great results from our experiments,” Kircher said. “They are as good as or better than the polygraph, and we are still in the early stages of this innovative new method to determine if someone is trying to deceive you.”

Besides measuring a different type of response, eye-tracking methods for detecting lies has several other benefits over the polygraph. Eye tracking promises to cost substantially less, require one-fifth of the time currently needed for examinations, require no attachment to the subject being tested, be available in any language and be administered by technicians rather than qualified polygraph examiners.

Research into this method began five years ago, when faculty members started discussing the concept casually. They secured seed funding and the university’s Department of Educational Psychology hired new faculty with relevant skills.

The researchers still have more development work to do, but they hope the recent licensing will help them attract the additional funding necessary and interest from potential customers. Numerous government agencies, such as the Department of Defense, Department of Homeland Security, Customs and Border Protection, and Department of Energy use polygraphs regularly to screen employees and applicants for sensitive positions, and these agencies always are looking for more effective ways to detect lies.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

Featured Cybersecurity

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3