Surveillance Cameras That Spot Your Personality Type

Researchers have used artificial intelligence to show that very subtle eye movements, of the sort you might pick up with a camera, can divine aspects of personality much better than random guessing.

It’s another good example of how the wealth of biometric data that humans produce, once digitised and examined at large scale, can reveal hidden aspects of identity in ways that could be a boon to intelligence gathering.

The German and Australian researchers fitted 42 volunteers with eye-tracking headgear, and had them fill out the NEO Five-Factor Inventory, a personality test that measures traits such as neuroticism, extraversion, openness, agreeableness, and conscientiousness.

They then had the subjects go about a normal routine while they quietly collected eye movement data and then used machine learning to categorise the data.

“Thanks to the machine learning approach, we could automatically analyse a large set of eye movement characteristics and rank them by their importance for personality trait prediction.

“Going beyond characteristics investigated in earlier works, this approach also allowed us to identify new links between previously under-investigated eye movement characteristics and personality traits,” they write.

While the program didn’t predict personality perfectly, it did much better than random guessing in areas such as extraversion, agreeableness, and neuroticism, etc. Only in the area of curiosity and exploration did guessing work better.

The US military has been looking for ways to use biometrics to authenticate individuals, rather than passwords that can be hacked, and to better collect intelligence on potential subjects in a way that is “non-permissive,” which really just means without the subject’s permission or attention.

But the intelligence community has become concerned about the growing amount of biometric data leakage that’s complicating efforts.

DefenseOne

You Migh Also Read: 

Biometric Products Can Help Cybersecurity:

New AI Claims To Determine If You Are Gay Or Straight:

 

« What Are Deepfakes?
Dixons Carphone Data Breach Hits 10m Users »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

NetDiligence

NetDiligence

NetDiligence is a privately-held cyber risk assessment and data breach services company.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

Medigate

Medigate

Medigate is a dedicated medical device security platform protecting all of the connected medical devices on health care provider networks.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Dale Peterson

Dale Peterson

Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS.

Area 1 Security

Area 1 Security

Area 1 is the only Pay-per-Phish solution in cyber security. And the only technology that blocks phishing attacks before they damage your business.

HENSOLDT Cyber

HENSOLDT Cyber

HENSOLDT Cyber introduces a paradigm shift to cyber security. Our products have been designed to ensure the integrity of embedded systems at the core: the operating system and the processor.

Stratus Technologies

Stratus Technologies

Edge Computing solves the inherent challenges of bandwidth, latency, and security at edge locations to enable IIoT devices and data acquisition.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

Visory

Visory

Great businesses depend on great technology. We make sure our clients go to market with enterprise-level technology and world-class security for their data and infrastructure.

Cyber Crucible

Cyber Crucible

Cyber Crucible is a cybersecurity Software as a Service company definitively removing the risk of data extortion from customer environments.

DigitalPlatforms

DigitalPlatforms

DigitalPlatforms SpA is an Italian group with the mission of providing end-to-end solutions and Internet of Things and Cyber technologies to companies that manage critical infrastructures.

Infima Cybersecurity

Infima Cybersecurity

INFIMA tackle the hard parts of managing your Security Awareness Training program so you can focus elsewhere.

AppSOC

AppSOC

AppSOC is a leader in Application Security Posture Management (ASPM) and Code-to-Cloud Vulnerability Management.

Inoxoft

Inoxoft

Inoxoft delivers IT security consulting, assessment, and protection services to help businesses secure their infrastructure, applications, and sensitive data.