Sunday, June 8, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network Social Engineering 

Home » Cybersecurity » Social Engineering » Myths About Human Lie Detection

SBN

Myths About Human Lie Detection

by Social-Engineer on June 22, 2022

“Look me in the eyes.” People often use phrases like this to determine if someone is lying. We may think this is an effective method, after all who could lie while looking straight into your eyes? It turns out that there are many people who are perfectly ok with lying while looking straight at you. Popular magazines, as well as TV shows, have perpetuated many myths about how to tell if someone is lying. There are also self-declared deception experts that claim to be able to detect deception based on behavior. They also claim that these lie-detecting skills can be taught, making you a human lie detector machine. How much truth is there behind these claims? And, what do the real experts have to say on this subject? Let’s explore some myths and truths about detecting lies.

Debunking Myths About Human Lie Detection

Myth #1: Eye Movement

It is a common notion that when people talk, the direction of their eye movements reveals whether they’re lying or not. If the person glances up and to the left, that indicates they are telling the truth. Whereas if they look to the upper right, it signals deceit.

Techstrong Gang Youtube
AWS Hub

This myth comes from a 1970’s theory called Nero-Linguistic Programming (NLP), a set of techniques to help people master social interactions. However, new research thoroughly debunks these notions. NLP has long been discredited as there was no scientific backing to prove its theories. The University of Hertfordshire in the UK, conducted a study where volunteers were filmed as they told the truth or lied. Another group of volunteers then watched the film and tried to determine who was lying and who was telling the truth; simply by watching their eye movements. Professor Wiseman, a psychologist who ran the study said: “The results of the study revealed no relationship between lying and eye movements.” Thus, this suggests that no significant relationships exist between eye movements and lying.

Myth #2: Nervousness

Stuttering, fidgeting, looking away, touching your nose or mouth, are practices commonly thought to indicate deception. However, this is not always the case. Stress can result in increased heart rate and adrenaline which provides extra energy to the limbs resulting in fidgeting with hands or legs. Also, while under stress some people display self-pacifying behaviors such as touching their hair, playing with a ring or necklace, and rubbing their neck just to name a few. These behaviors are a sign of stress or just being uncomfortable, they do not necessarily point to deception.

During a recent Advanced Practical Social Engineering class (APSE), some students were asked to tell a true story about themselves. Another group of students were asked to tell a false story. Everyone else in the class had to try to determine who was lying and who was telling the truth. While telling her story, one of the female students was fidgeting, then put her hand behind her neck as she finished the story. Many viewed this as a sign of high discomfort and assumed she was telling a false story. The student was indeed uncomfortable; however, it was not because she was fabricating a story, rather she was sharing a traumatic experience that she went through some time ago. This exercise proved that just because we can see the signs of someone being nervous or uncomfortable, does not mean we know the cause behind the behavior.

Myth #3: Facial Expressions

The muscles in the face relax when we are comfortable. While relaxed we tend to smile or laugh. The lips are full, and the chin tends to be further out. The moment there’s psychological discomfort, it begins to manifest in certain areas. For some people, it can be furrowing of the forehead or squinting. With discomfort, there can also be tucking down of the chin, lip compression, and at times covering of the eyes. Our faces put our emotions on display without us realizing it. By analyzing facial expressions all we can determine is if the behavior is consistent with comfort or discomfort.

Dr. Paul Ekman is known around the world for his research on universal facial expressions that reveal concealed emotion. According to Dr. Ekman, “Fleeting facial expressions do reveal an emotion that is being concealed, and that is a kind of lie, but innocents under suspicion may conceal their fear, or anger about being suspected. You need to find out why they are concealing their emotions…” Facial expressions may indicate an internal emotional turmoil that is being suppressed, but that is it. Facial expressions alone do not reveal deceit.

Can Lies Be Detected?

Scientific studies, as well as experts in the field, agree that deception has no set of behaviors. Human lie detection is as accurate as tossing a coin in the air. Does that mean that FBI agents and other law enforcement agencies rely on the polygraph for lie detection? Though they may use the polygraph as one of their tools, on its own it is not a reliable method for lie detection. According to the American Psychological Association a polygraph is an instrument that recognizes physiological changes in reaction to a question, but it does not have the ability to detect lies. How then, do experts determine if someone is lying?

Professionals trained in human behavior establish a baseline of the person of interest. When asking a question, they look for a shift in behavior. They also look for incongruencies (verbal and physical), such as a slight shrug coinciding with a verbal statement of confidence. Also, a slight head shake indicating “no” while verbally saying “yes.” These incongruencies are a “hot spot” or cue that something is amiss. At which point the professional conducting the interview would ask further questions about the topic that brought on incongruent behavior.

In Conclusion

Detecting deceit is very complex. Like a puzzle, there are many pieces that need to be in place to form an accurate picture. You cannot rely on just one aspect of human behavior to tell if someone is lying. Rather, it’s a composite set of behaviors that lead to a hint of deceit. The ability to ask questions is a key component; this provides you with the opportunity of verifying if the information given was accurate. Former FBI agent and international body language expert Joe Navarro said it best: “no matter what technique is used to look for deception, the only way to really know the truth is to verify and corroborate every single last detail of what someone says. And that is the truth about lie detection.”

Sources:
https://www.forbes.com/sites/amymorin/2015/06/08/the-8-biggest-myths-about-lying-according-to-the-best-human-lie-detector-in-the-world/?sh=191d5d864d11
https://www.humintell.com/2020/01/lies-lies-and-more-lies-plus-the-top-5-myths-about-liars/
https://www.jnforensics.com/post/the-truth-about-lie-detection
https://www.learning-mind.com/eye-movements-when-lying/
https://www.psychologytoday.com/us/blog/the-athletes-way/201510/one-simple-way-you-can-become-human-lie-detector
https://www.livescience.com/34068-eye-movements-lying.html#:~:text=Conventional%20wisdom%20has%20it%20that,research%20thoroughly%20debunks%20these%20notions.

Image:
https://www.smithsonianmag.com/smart-news/lie-detectors-dont-work-advertised-and-they-never-did-180961956/

*** This is a Security Bloggers Network syndicated blog from Security Through Education authored by Social-Engineer. Read the original post at: https://www.social-engineer.org/social-engineering/myths-about-human-lie-detection/

June 22, 2022June 22, 2022 Social-Engineer facial expressions, General Social Engineer Blog, human lie detection, Joe Navarro, polygraph, social engineering
  • ← Machine Learning Tackles Ransomware Attacks
  • Enhancing Software Change Impact Analysis →

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Cloud Field Day

Upcoming Webinars

How to Spot and Stop Security Risks From Unmanaged AI Tools
Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web
Akamai Extends Cybersecurity Reach to DNS Posture Management
Yet Another Exposed Database, This Time with 184 Million Records
Barracuda Networks Leverages AI to Integrate Cybersecurity Workflows
From Idea to Outcome: How WWT Is Leading the AI Security Conversation at Scale
EU Launches New Vulnerability Database to Enhance Cybersecurity
Anthropic Unveils Claude 4 Family and New AI Models
Coinbase Aware of Data Breach Since January, Report Reveals
OffensiveCon25 – No Signal, No Security: Dynamic Baseband Vulnerability Research
Cybersecurity Needs Satellite Navigation, Not Paper Maps

Industry Spotlight

Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web
Application Security Cloud Security Cyberlaw Cybersecurity Data Privacy DevOps Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threats & Breaches Vulnerabilities 

Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web

June 4, 2025 Richi Jennings | 4 days ago 0
USDA Worker, 5 Others Charged in Food Stamp Fraud Operation
Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Identity & Access Industry Spotlight News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

USDA Worker, 5 Others Charged in Food Stamp Fraud Operation

May 30, 2025 Jeffrey Burt | May 30 0
Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers
Cloud Security Cybersecurity Data Security Featured Incident Response Industry Spotlight Malware Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers

May 29, 2025 Jeffrey Burt | May 29 0

Top Stories

Zscaler Tightens AI Security With New Tools
Application Security Cybersecurity Data Privacy Data Security Featured Network Security News Social - Facebook Social - LinkedIn Social - X Zero-Trust 

Zscaler Tightens AI Security With New Tools

June 5, 2025 Jon Swartz | 3 days ago 0
Microsoft Launches Free Security Program for European Governments
Cloud Security Cybersecurity Data Privacy Data Security Featured Governance, Risk & Compliance Incident Response Malware Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Microsoft Launches Free Security Program for European Governments

June 4, 2025 Jeffrey Burt | 4 days ago 0
Microsoft, CrowdStrike Partner to Bring Clarity to Threat Actor Identities
Cloud Security Cybersecurity Data Security Featured Identity & Access Incident Response Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Microsoft, CrowdStrike Partner to Bring Clarity to Threat Actor Identities

June 3, 2025 Jeffrey Burt | Jun 03 0

Security Humor

Facebook CEO Mark Zuckerberg announces the plan to make Facebook more private at Facebook’s Developer Conference on April 30, 2019

Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web

Download Free eBook

The Dangers of Open Source Software and Best Practices for Securing Code

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×