Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:10 PM
Connect Directly

Liar, Liar: New Service Uses Voice Analysis To Detect Truthfulness

LiarCard analyzes and "hacks" emotions in voice calls

It's not what you say, but how you say it: That's not just your mom talking, but also the premise of a new beta voice-call service that acts as a lie detector, using voice analysis technology to determine when the person on the other end of the line isn't telling the truth.

The LiarCard service detects the emotional content in speech patterns, which provides information about the speaker's mental and emotional state during the call, according to TelTech Systems, which developed the tool, now available in beta.

The concept of psyche-hacking is nothing new. Researcher Nitesh Dhanjani has been studying how a user's online persona and activity could be used to hack his or her state of mind -- for intelligence-gathering and even as a way to influence behavior.

"Should something like this [LiarCard technology] get to a more mature state, I can see a clear correlation to the online social psyche analysis I have been pondering," Dhanjani says. "Perhaps tie contextual analysis of the...person on the other end of the call's statements on the social media applications to point out contradictions and correlate emotional states with personality analysis."

TelTech promotes the tool as a way to get an edge in a business negotiation, or to find better employees or suppliers. "LiarCard 'listens' to the millisecond changes that occur in the human voice when a sudden process starts in the brain and extract some of the attention needed to process the words," LiarCard's Website says.

LiarCard works like this: You purchase a PIN number ($10 for 30 minutes of calls to $80 for 240 minutes), then dial LiarCard's toll-free number, and input your PIN and destination phone number. LiarCard provides a "heartbeat pulse" to the subscriber. "When the called party is stressed about what is said, then you'll hear it beat quicker and then slow down again if they're being truthful," according to the LiarCard Website. "A buzz is played when the called party is suspected of not telling the truth or is in an extreme state of mind."

There's also a Web-based dashboard that provides visual graphics, such as the "truth indicator" as the called party speaks.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
US Counterintelligence Director & Fmr. Europol Leader Talk Election Security
Kelly Sheridan, Staff Editor, Dark Reading,  10/16/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-20
The Transaction Insight reporting component of TIBCO Software Inc.'s TIBCO Foresight Archive and Retrieval System, TIBCO Foresight Archive and Retrieval System Healthcare Edition, TIBCO Foresight Operational Monitor, TIBCO Foresight Operational Monitor Healthcare Edition, TIBCO Foresight Transaction...
PUBLISHED: 2020-10-20
The Boxstarter installer before version 2.13.0 configures C:\ProgramData\Boxstarter to be in the system-wide PATH environment variable. However, this directory is writable by normal, unprivileged users. To exploit the vulnerability, place a DLL in this directory that a privileged service is looking ...
PUBLISHED: 2020-10-20
In Spree before versions 3.7.11, 4.0.4, or 4.1.11, expired user tokens could be used to access Storefront API v2 endpoints. The issue is patched in versions 3.7.11, 4.0.4 and 4.1.11. A workaround without upgrading is described in the linked advisory.
PUBLISHED: 2020-10-20
DomainMOD before 4.14.0 uses MD5 without a salt for password storage.
PUBLISHED: 2020-10-20
Netwrix Account Lockout Examiner before 5.1 allows remote attackers to capture the Net-NTLMv1/v2 authentication challenge hash of the Domain Administrator (that is configured within the product in its installation state) by generating a single Kerberos Pre-Authentication Failed (ID 4771) event on a ...