The detection of faked identity using unexpected questions and mouse dynamics

The detection of faked identities is a major problem in security. Current memory-detection techniques cannot be used as they require prior knowledge of the respondent’s true identity. Here, we report a novel technique for detecting faked identities based on the use of unexpected questions that may be used to check the respondent identity without any prior autobiographical information. While truth-tellers respond automatically to unexpected questions, liars have to “build” and verify their responses. This lack of automaticity is reflected in the mouse movements used to record the responses as well as in the number of errors. Responses to unexpected questions are compared to responses to expected and control questions (i.e., questions to which a liar also must respond truthfully). Parameters that encode mouse movement were analyzed using machine learning classifiers and the results indicate that the mouse trajectories and errors on unexpected questions efficiently distinguish liars from truth-tellers. Furthermore, we showed that liars may be identified also when they are responding truthfully. Unexpected questions combined with the analysis of mouse movement may efficiently spot participants with faked identities without the need for any prior information on the examinee.

[1]  Juan Wang,et al.  Evolution of cooperation in the spatial public goods game with adaptive reputation assortment , 2016 .

[2]  Fenna H. Poletiek,et al.  The Effects of Unexpected Questions on Detecting Familiar and Unfamiliar Lies , 2013 .

[3]  Henry T. Greely,et al.  Deception, Detection of, P300 Event-Related Potential (ERP) , 2012 .

[4]  Bruno Verschuere,et al.  UvA-DARE ( Digital Academic Repository ) Memory detection 2 . 0 : The first web-based memory detection test , 2018 .

[5]  Aldert Vrij,et al.  A cognitive load approach to lie detection , 2008 .

[6]  Juan Wang,et al.  Utility Evaluation Based on One-To-N Mapping in the Prisoner’s Dilemma Game for Interdependent Networks , 2016, PloS one.

[7]  S. Cessie,et al.  Ridge Estimators in Logistic Regression , 1992 .

[8]  S. Sathiya Keerthi,et al.  Improvements to Platt's SMO Algorithm for SVM Classifier Design , 2001, Neural Computation.

[9]  Yuxuan Yang,et al.  Visibility Graph from Adaptive Optimal Kernel Time-Frequency Representation for Classification of Epileptiform EEG , 2017, Int. J. Neural Syst..

[10]  J P Rosenfeld,et al.  P300 scalp amplitude distribution as an index of deception in a simulated cognitive deficit model. , 1999, International journal of psychophysiology : official journal of the International Organization of Psychophysiology.

[11]  Bruno Verschuere,et al.  Lie, truth, lie: the role of task switching in a deception context , 2015, Psychological research.

[12]  Toniann Pitassi,et al.  The reusable holdout: Preserving validity in adaptive data analysis , 2015, Science.

[13]  Adriaan Spruyt,et al.  UvA-DARE ( Digital Academic Repository ) Learning to lie : effects of practice on the cognitive cost of lying , 2012 .

[14]  Bruno Verschuere,et al.  ID‐Check: Online Concealed Information Test Reveals True Identity , 2016, Journal of forensic sciences.

[15]  Martial Mermillod,et al.  Combined effects of expectations and visual uncertainty upon detection and identification of a target in the fog , 2015, Cognitive Processing.

[16]  Rick Dale,et al.  The Cognitive Dynamics of Negated Sentence Verification , 2011, Cogn. Sci..

[17]  Aldert Vrij,et al.  Sorting the liars from the truth tellers: the benefits of asking unanticipated questions on lie detection , 2013 .

[18]  Mei-huan Chen,et al.  Impact of individual response strategy on the spatial public goods game within mobile agents , 2015, Appl. Math. Comput..

[19]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[20]  Maria Hartwig,et al.  Guilty and innocent suspects’ strategies during police interrogations , 2007 .

[21]  A. Vrij,et al.  Outsmarting the Liars: The Benefit of Asking Unanticipated Questions , 2009, Law and human behavior.

[22]  Drew H. Abney,et al.  Response dynamics in prospective memory , 2015, Psychonomic bulletin & review.

[23]  John C. Platt,et al.  Fast training of support vector machines using sequential minimal optimization, advances in kernel methods , 1999 .

[24]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[25]  J Peter Rosenfeld,et al.  A mock terrorism application of the P300-based concealed information test. , 2011, Psychophysiology.

[26]  Jonathan B Freeman,et al.  MouseTracker: Software for studying real-time mental processing using a computer mouse-tracking method , 2010, Behavior research methods.

[27]  Jonathan B Freeman,et al.  A Perceptual Pathway to Bias , 2016, Psychological science.

[28]  Giuseppe Sartori,et al.  The autobiographical IAT: a review , 2013, Front. Psychol..

[29]  Eibe Frank,et al.  Logistic Model Trees , 2003, ECML.

[30]  Umberto Castiello,et al.  How to Accurately Detect Autobiographical Events , 2008, Psychological science.

[31]  Nicholas D. Duran,et al.  The action dynamics of overcoming the truth , 2010, Psychonomic bulletin & review.

[32]  Judith Donath,et al.  Identity and deception in the virtual community , 1998 .

[33]  Giovanni Pezzulo,et al.  Unfolding Visual Lexical Decision in Time , 2012, PloS one.