{"id":595,"date":"2015-03-05T08:20:30","date_gmt":"2015-03-05T08:20:30","guid":{"rendered":"http:\/\/blogs.kent.ac.uk\/unikentcomp-news\/?p=595"},"modified":"2015-03-12T11:41:35","modified_gmt":"2015-03-12T11:41:35","slug":"theres-no-deceiving-university-of-kent-technology","status":"publish","type":"post","link":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2015\/03\/05\/theres-no-deceiving-university-of-kent-technology\/","title":{"rendered":"There&#8217;s no deceiving University of Kent technology"},"content":{"rendered":"<p><strong>Final year Undergraduate student Oliver Florence explores deception detection and a new technology being developed at The University of Kent\u2019s School of Computing.<\/strong><\/p>\n<p>Although the idea of being strapped into a polygraph machine might well make you uncomfortable, it seems as though there isn\u2019t much to be worried about.<\/p>\n<p>The American Psychological Association assert that \u2018Most psychologists agree that there is little evidence that polygraph tests can accurately detect lies.\u2019 But even though the consensus seems to be that they don\u2019t work, they are still being used by the police, and in the workplace.<\/p>\n<p>Given that they don\u2019t work, why are they still used? The answer is perhaps a combination of two factors. People are not aware of how inaccurate polygraphs are, and there are numerous studies showing that the effect of being plugged in to these all-knowing machines makes people more likely to tell the truth, or at the very least offer up more information than they would, were they not covered in measurement equipment. This is referred to as the bogus pipeline effect.<\/p>\n<p>Polygraphs are not the only technology available that make the claim of being able to detect deception though. There are a number of other technologies used for lie detection that all have various criticisms laid upon them. The common theme of the criticisms is that the person being tested is able to consciously modulate their physiological responses to the stimuli and make the technology give inaccurate results. Differing methods of response measurement tend not to produce notably different success rates, and as a result it seems that we\u2019re still left without lie detection technology that is accurate enough for us to say \u2018it works\u2019. Or are we?<\/p>\n<p>A research team led by Professor Howard Bowman at the University of Kent have created a technology called the Fringe-P3 method. Howard Bowman holds two part-EEGtime positions, one at Kent as a Computer Science professor and the other at Birmingham as a Psychology professor. Having spent the first phase of his academic career on developing mathematical theories of computation, Professor Bowman now focuses entirely on the field of Cognitive Neuroscience.<\/p>\n<p>The Fringe-P3 technology is able to circumvent the traditional problem deception detection machines have faced; it presents the stimuli to the subject in a way that means they are unable to employ countermeasures.<\/p>\n<p>A simplified yet useful means of describing the technology is to split its description into two parts. Firstly the way the subject\u2019s response is measured is with Electroencephalography (EEG), which is used to measure a brainwave called the P3. The second and more important aspect is the way the stimuli are presented to the person. This is done with rapid serial visual presentation (RSVP), which in this case means presenting the person a series of stimuli very quickly. So quickly in fact, that the subjects are able to recall very few\u00a0of the stimuli presented.<\/p>\n<p>The result of this RSVP is that the subject is unable to attempt to fool the measurement device, as they aren\u2019t aware of some key stimuli that have been presented to them. According to Bowman this is a result of the stimulus being on the \u2018fringe of awareness\u2019, meaning that the brain will unconsciously process the stimuli until it is presented with something that causes perceptual breakthrough. Perceptual breakthrough is the transition of information from your unconscious to your conscious mind, or in simpler terms, the act of conscious recognition.<\/p>\n<p>This method of deception detection is described by Bowman as \u2018piggy backing\u2019, as the EEG measurement in isolation is just whether or not the person has consciously recognised the stimuli. It\u2019s the context and content of the stimuli coupled with the detection of conscious recognition of stimuli that indicates whether or not the person is attempting deception. An example of how deception can be detected using this technology is asking a subject if they have ever met a specific person, and then showing them the person\u2019s face using RSVP. If the subject claims to not know of this person but exhibit a large\u00a0P3 when tested, you can know that they\u2019re not being truthful.<\/p>\n<p>The experiments carried out by Bowman and his team have demonstrated the effectiveness of the Fringe-P3 technology. Subjects were given a \u2018fake name\u2019 to pretend was theirs and then shown a series of names using RSVP.<\/p>\n<p>The graph below shows the averaged data for the experiment carried out in Bowman\u2019s paper. The two dotted lines on the graph represent the area in which you would expect to see a modulation in the P3 wave when a subject is presented with something they consciously recognise (in this case their own name).<\/p>\n<p><a href=\"http:\/\/blogs.kent.ac.uk\/unikentcomp-news\/files\/2015\/03\/Deception-detection-images.jpg\"><img loading=\"lazy\" class=\"alignleft size-medium wp-image-607\" src=\"http:\/\/blogs.kent.ac.uk\/unikentcomp-news\/files\/2015\/03\/Deception-detection-images-300x153.jpg\" alt=\"Graph of deception detection\" width=\"300\" height=\"153\" srcset=\"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/files\/2015\/03\/Deception-detection-images-300x153.jpg 300w, https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/files\/2015\/03\/Deception-detection-images-1024x522.jpg 1024w, https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/files\/2015\/03\/Deception-detection-images.jpg 1046w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>\u2018Probe\u2019 represents the subject\u2019s real name, \u2018Fake\u2019 represents their assumed name, and irrelevant were two names unknown to the subjects. \u2013 A convention of this type of graph is that the Y axis is upside down, so in this case the downward spikes indicate positive deflections.<\/p>\n<p>When the subjects were shown their own names (probe) and their assumed names (fake) a spike was produced in P3 modulation clearly showing the subjects perception of the stimuli. The difference between the irrelevant P3\u2019s and the probe\/fake is the evidence that perceptual breakthrough has occurred.<\/p>\n<p>The knowledge one can potentially acquire by using the Fringe-P3 method is better suited to indicating innocence as opposed to proving guilt. The example given earlier of a subject claiming not to know someone that they are shown to consciously recognise could have use in the real world, but this only indicates that they recognise them, not that they have committed a crime.<\/p>\n<p>There have been numerous alleged cases of fabricated amnesia. These allegations have traditionally been very difficult to prove. The use of the Fringe-P3 technology could aid in the diagnosing genuine amnesia by demonstrating the absence of conscious recognition on a neurological level.<\/p>\n<p>The creation of this technology by Bowman and his team is a significant move forwards in the way deception detection is approached. Its effectiveness has been demonstrated in a number of contexts all of which benefit directly from its ability to resist countermeasures. According to Bowman\u2019s team there are still many unexplored possibilities and benefits that require further experimentation, so for the moment at least, this lie detector will stay in the hands of its creators.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Final year Undergraduate student Oliver Florence explores deception detection and a new technology being developed at The University of Kent\u2019s School of Computing. Although the &hellip; <a href=\"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2015\/03\/05\/theres-no-deceiving-university-of-kent-technology\/\">Read&nbsp;more<\/a><\/p>\n","protected":false},"author":5321,"featured_media":607,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[57908,70],"tags":[112427,54861,112430,112431,112429,1082],"_links":{"self":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/595"}],"collection":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/users\/5321"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/comments?post=595"}],"version-history":[{"count":4,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/595\/revisions"}],"predecessor-version":[{"id":611,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/595\/revisions\/611"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/media\/607"}],"wp:attachment":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/media?parent=595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/categories?post=595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/tags?post=595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}