Comparison

EyeTrek vs. Polygraph

The polygraph has been the dominant credibility assessment tool for decades. Its limitations are well documented: slow, examiner-dependent, vulnerable to countermeasures, and with a scientific evidence base that is contested, particularly in screening contexts.

EyeTrek is not a digital polygraph. It operates on a different scientific principle: the Concealed Information Test. It is designed for a different operational reality: high-throughput environments where speed, objectivity, and scalability matter as much as accuracy.

This page sets out the key differences.

The core difference

The polygraph asks
Is this person showing signs of stress when answering questions?
EyeTrek asks
Does this person’s brain recognize information they claim not to know?

These are fundamentally different questions. The first is indirect, and the connection between the measures and deception is not reliably established. The second is more direct: recognition is a measurable cognitive event, and the involuntary eye responses associated with it are well-characterized in peer-reviewed research.

Polygraph EyeTrek
How it works Measures physiological arousal proxies (respiration, electrodermal activity, cardiovascular response) while an examiner runs a structured interview and question sequence. Interpretation depends heavily on protocol and examiner decisions. Measures involuntary gaze and fixation patterns, pupil dilation, during brief, standardized stimulus protocols. Proprietary ML analytics classify patterns consistent with recognition, concealed knowledge, and elevated cognitive load.
Test duration Typically 1.5–3 hours including pre-test interview, chart collection, and post-test debrief. 2–4 minutes per session. Automated report generated in seconds.
Accuracy Variable and difficult to quantify across real-world conditions. Evidence is limited, particularly for screening contexts, and likely overestimates real-world performance. Utility is often attributed to eliciting admissions rather than to detection validity. >90% accuracy for concealed information detection in validated CIT protocols.
False detection rate Not reliably established. False detection rates vary significantly across examiners, protocols, and subject populations. Low. Configurable by the client to reflect the operational risk tolerance of the deployment environment.
Invasiveness Requires physical contact sensors attached to the body. Combined with a lengthy examiner-led interview, it is frequently perceived as intrusive and stressful by subjects. Non-contact. A standard screen and commercially available eye-tracking camera. No sensors, wires, or physical contact required.
Objectivity Examiner-dependent. Results vary across practitioners, protocols, and settings. The evidence base has been widely criticized for inconsistency and susceptibility to examiner variability. Fully standardized and automated. No examiner interpretation involved. Results are consistent across sessions, operators, and locations.
Countermeasure resistance Documented vulnerability to physical and cognitive countermeasures. Countermeasure training is publicly available. Involuntary eye responses are difficult to consciously suppress. Attempts to control gaze behavior introduce their own detectable signatures.
Language & culture Highly dependent on verbal communication and the subject’s language proficiency. Cultural factors influence both subject responses and examiner interpretation. Language and culture agnostic. No verbal response required from the subject.
Training & personnel Requires trained, certified examiners. Basic certification programs typically run 8–12+ weeks and approximately 400 hours. Ongoing proficiency maintenance required. No trained operator required. Administration is fully automated. Standard staff can run sessions after a brief onboarding.
Scalability One examiner per session. Session length and personnel requirements make large-scale or high-frequency deployment impractical. Designed for high-throughput environments. Multiple simultaneous sessions possible. Consistent results across all deployments.
Scientific validation Evidence — particularly for screening — is limited and not robustly established across conditions. Validity is frequently conflated with the polygraph’s utility in eliciting confessions rather than its accuracy as a detection tool. Controversial in the scientific community. Grounded in the Concealed Information Test (CIT), a methodology with a substantial peer-reviewed research base. Best positioned for screening and triage. Performance is well-characterized within validated protocol parameters.

Use EyeTrek when:

Speed and throughput matter — border control, access vetting, large-scale HR screening
Trained examiners are not available or not practical to deploy
The subject population is linguistically or culturally diverse
Objectivity and standardization are operationally or legally important
You need to test for concealed knowledge of specific items, people, or events
Explore the Technology

If you have a screening challenge, we’d like to hear from you.

Get in Touch