Upload
fatima-ramos-del-cano
View
221
Download
0
Embed Size (px)
Citation preview
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
1/33
!ro$uc's) +vervie/
Currently deployed fieldproven Biometric SpeakerIdentification andVerification Technology.
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
2/33
!"#$%&'()**+(
,-.&/
! 0!,12(3,!4256,17
! 3850!9
! 87,7
! 37:
! 1!;1
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
3/33
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
0$>"&(3>$?'>"@A(B&C(5&"D-$E$FC(G$'(7&"H'>#C(
! Use of voice evidence in court.
! Identification of unknown intercepted voices
! Intelligence and crime prevention using phone conversationsmonitoring.
! Protection against Identity fraud
0$>"&(3>$?'>"@
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
4/33
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
IDJ#(>@(0$>"&(3>$?'>"@K
0$>"&(3>$?'>"@
Extraction of unique characteristics of vocal tract,from voice sound waves.
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
5/33
A12ITI+ !ro$uc')s +vervie/
IDJ#(>@(>-(#D&(L$>"&K
! ,-G$'?J#>$-(EJC&'A
! What the person is saying. The content of the speech.
! Can be automatically obtained using classical speech recognition technologies.
! 3&DJL>$'JE(EJC&'A
! How do you say itA Your accent, your emotions, your culture, your country DlanguageE,
!"#$%&'!#(!)
! This is the level used by impersonators, and the level the brain mainly uses to identify
a person Dand obtain additional informationE
0$>"&(3>$?'>"@
5M2(3,!4256,1(
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
6/33
M$O(0$>"&(3>$?'>"@(O$'P@K
! 5oice mo$el 8aka as ;voice
! Using a minimum of M seconds of net speech, we compare the utterance with the model
*'+$&,!*-'$*$./%&0#12$3"#$"-4"#0$!"#$/%&0#$!"#$5&0#$60&,*,7#$-!$-/$!"*!$!"#$8'9'&:'$;&-%#$
belongs to the same person.
! 6&@HE#@
! epending on the application, different techniques are used to .'&05*7-$?'>"@
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
7/33
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
0$>"&(3>$?'>"@A(B&C(1$?Q>#>L&(8.LJ-#JF&@
Driver& Increasing internationa0terroris1 and cri1e using di44erentt56es o4 6hones8 the Internet8 and in
1u0ti60e 0anguages9
Voice is the only biometric characteristicobtained remotely
It is already available in abundance.
Includes valuable information besidesbiometric information
asy to integrate in existinginfrastructure: Telephone networks, VoIP,etc..
0$>"&(3>$?'>"@
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
8/33
Agni'io)s CniDue A$?'>"@
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
9/33
8F->#>$A(R>$-&&'>-F(R'$.H"#@
G$'(0$>"&(M"J#>$-@
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
Present VoiceEvidence in court
Identification ofunknown voice during
police investigation
Speaker spotting tofilter mass phone
interceptions.
0$>"&(3>$?'>"@
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
10/33
ST(U$'&-@>"(2L>.&-"&(>-(1$H'#(M&J'>-F@(
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
Forensic Labs relying only on Phonetic and
Linguistic techniques have limitations:Impossible to handle unknown languages,
difficult to handle great number of calls,!"#$
Intercepted phoneconversations are used asevidence in court. Experts
are required to performSpeaker Verification
MARKET NEED
SOLUTION
Tool for biometric voice verificationdesigned for Forensic Experts. It
provides the precision andreliability required in court hearings
PROBLEM
3850!9
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
11/33
7Q&JP&'(,V(>-(U$'&-@>"@
!1EJ@@>"JE(8QQ'$J"DA(-FH>@#>"WQD$->"@
! An expert in languages and phonetics compares both voice samples(Suspect and unknown)
!7&?>JH#$?J#>"
! Using computer voice analysis programs, sonograms, formants and othertechnical information are compared.
!0$>"&(3>$?'>"@
! Computer generates voice print, unique to speakers physical vocal tract.
! Computer compares suspect and unknown voice samples and provides amatching score.
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
3850!9
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
12/33
A$$e$ 5alue) of 5oice Giome'rics in Horensics
! 7Q&JP&'(,V(L&'>G>"J#>$-(H@>-F(QDC@>"JE("DJ'J"#&'>@#>"@($G(#D&(
L$"JE(#'J"#X(>-@#&J.($G(#D&(OJC(#D&(Q&'@$-(@Q&JP@(
! >&%*7$!0*%!$.7#*;#/1$8'-?8#$@#*!80#/$-'$;&-%#$/&8'+$:*;#/A
! 0$>"&(3>$?'>"@(J..@(-&O(J-.('&E&LJ-#(>-G$'?J#>$-(#$("EJ@@>"JE(#&"D->YH&@T
! epending on the case DLanguage, unique phonetic features, ..E it is more or less
relevant.
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
3850!9
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
13/33
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
3850!9A(R>$-&&'>-F(R'$.H"#(G$'(U$'&-@>"(&@
! 2-#'C(R'$.H"#
! Widely used in urope, Latin merica
and sia
!First working system in SpanishPolice DIdentivox 2000E
! xpert reports presented in many
courts globally
V'T(BZ-[&E(\=->LT(4J'%H'FX(]&'?J-C^(G$'?&'EC(#D&(P&C(&/Q&'#($G(#D&(
]&'?J-(U&.&'JE(R$E>"&T(!-&($G(#D&(?$@#('&@Q&"#&.(@Q&">JE>@#@(O$'E._O>.&T
!"#$%&'#('')#*+,)-#.$'#/01234#%*.56%.,7#+8+.'6#999,)#65:'#.$%)#;
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
14/33
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
BATVOX reduces learning curve, guiding the new userwith a wizard, qualifying results and helping
interpretation of data
3850!9
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
15/33
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
"BTVO provides the
expert Likelihood Rate DLREresults
"BC$-/$!"#$D/!*!#-of-the-*0!E$metric to measure evidencestrength in court hearings
3850!9
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
16/33
7H""&@@(7#$'CA(1$?%J#>-F(1$''HQ#>$-
! R'$?>-&-#(EJOC&'(>-(4JEJC@>J(OJ@(#JQ&.(%'$P&'>-F(#D&(JQQ$>-#?&-#(($G(#$Q(`H.F&@
!0>.&$(Q$@#&.($-(N$H5H%&("'&J#&.(J(#H'?$>E(>-(4JEJC@>J-(Q$E>#>"@
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
%&'&()*&+,-+"*,./0012"*/+,-3!+#(,1)!4,-567879:),20/41#"),&+4,,,,,,,,,,support to verify the voice identity, and present evidence in court
3850!9
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
17/33
7H""&@@(7#$'CA(((((((((((((((((((((((((((((((((((((((((((1$?%J#>-F(,-#&'-J#>$-JE(!'FJ->[&.(1'>?&
! 8E%J->J-(]J-F(J"#>-F(>-(]&'?J-C("$??>##&.(>.&-#>#C(G'JH.(#D'$HFD(#D&(#&E&QD$-&T
! ffecting more than Z00 German elder citi\ens
! ]&'?J-(Q$E>"&('&"$'.&.(?$'&(#DJ-(:X***(QD$-&("$-L&'@J#>$-@(%$#D(J?$-F(#D&(FJ-F(?&?%&'@(#D&?@&EL&@X(J-.($G(FJ-F(?&?%&'@(@O>-.E>-F(#D&>'(L>"#>?@T
! Conversations were in German, nglish, lbanian and Sinto. Some ofthe gang members spoke three different languages in various tapedconversations.
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
German Forensic Experts verified the identity of the gang members*+;/';!4,*+,"
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
18/33
IDJ#a@(-&/#KA(SA(;(,.&-#>G>"J#>$-(1JQJ%>E>#>&@
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
1:1 Forensicevidenceverifications
1:N for Lawenforcementidentifications
87,7
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
19/33
)T(?>-JE(,.&-#>G>"J#>$-(H@>-F(0$>"&
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
Police have a large amount of voicescaptured but identification was not possible.
Traditional methods not suitable for largevoice database searches. Sometimes voiceis the only available personal characteristic
of a criminal
Police obtains voice fromunknown person involved in
crime. (Bomb threat, lawfulphone interception, terroristvideo). Identification is
needed
MARKET NEED
SOLUTION
Tool for unknown speakeridentification using voice
biometrics. Automatic biometricsearch easy to perform with
basic training
PROBLEM
87,7
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
20/33
87,7A(0$>"&(3>$?'>"(VJ#J%J@&(G$'(
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
21/33
87,7A(4$.HEJ'(J-.(@"JEJ%E&
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
87,7
DB Manager
GUI
Browser 1
Engine 1
DB
Task Manager
Application
Server
Presentation Tier
GUI
Browser 2
GUI
Browser N
Business Logic
Logic Tier
Data Tier
Engine Manager
Engine 2
Engine N
Queue
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
22/33
87,7A(4$.HEJ'(J-.(@"JEJ%E&
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
Browser 1
Browser 2
Browser 3
Engine 1
Engine 2
Engine NDB Server
Internet
Application Server Task Manager Engine Manager
ASIS MULTICORE
Active MQ
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
23/33
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
From 1,000 up to 100,000 voice models per minute.
SP
From ^0,000 up to 200,000 voices stored DBithout6er4or1ance degradationE
From ^ up to 1,000 simultaneous connections.
aximum capacity
Optimi\ed for HP and Linux Suse ngines: Proliant L320 with eon Quad cores Task anager: Integrity 300 with Itanium ual
core.
Hardware/OS
87,7
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
24/33
87,7(R&'G$'?J-"&A(141
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
AGNITIO s forensic bench test Database.
How to measure
performance on 1:NsystemsA
CC: Cumulative atchingCharacteristic
Probability of your targetbeing among the first Ncandidates
87,7
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
25/33
us'omers are S'ar'ing 'o Tes' an$ 'o Cse i'
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
A Latin A1erican securit5organiation9 Ehe 0argest :Fnvoice test 6er4or1ed unti0now9 A01ost :G8=== voicesand 1ore than :9HM tria0s
!"
!#
$"
$#
1""
1 11 21 '1 (1 #1 )1 *1 !1 $1
1'+("" ,-./0
1#"3/3
4-516!17
4-5#6$#7
4-51"6$*7
4-589:3;/093 ?>9093@
4-51 *27
4-5' $'7
4-5# $)7
An uro6ean 6o0iceorganiation9 Eest with rea04orensic audios9 S1a00erdata@ase9
87,7
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
26/33
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
3850!9 87,7
R'&">@>$- aximumaccuracy in a1:1 verification
Obtain a list ofcandidate. Theverification can then berefined in a forensiclaboratory
2''$'@ inimi\e falsepositives inimi\e false negatives
=@J%>E>#C( For experts withan importantbackground inforensics
For operatives with nobackground in audio andbiometrics
7Q&&.( Not critical Critical: thousands ofidentifications perminute
87,7
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
27/33
87,7A(0$>"&(,.&-#>G>"J#>$-
!
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
28/33
:T(,;52
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
29/33
37:A(B&C(G>E#&'>-F(#$$E(G$'(,-#&EE>F&-"&(8F&-">&@
! 7R28B26(V25215,!;(,;(4877(52
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
30/33
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
37:
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
31/33
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
BTVO
SIS BS3
FISCOISIBISCentral
Criminal ata
OtherIdentification
atabases
Selected udios
atacrunching
Key wordspotting
BS3
37:
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
32/33
!"#$%&'()**+(A12ITI+ !ro$uc')s +vervie/
3850!9 87,7 37:
R'&">@>$- aximumaccuracy in a1:1verification
Obtain a list ofcandidate. Theverification canthen be refined in aforensic laboratory
Obtain a list ofcandidates callswhere the target isspeaking.
2''$'@ inimi\e falsepositives
inimi\e falsenegatives
inimi\e falsenegatives
=@J%>E>#C( For expertswith animportantbackground inforensics
For operatives withno background inaudio andbiometrics
For Intelligencegencies doingcriminal prevention.
7Q&&.( Not critical Critical: thousandsof identificationsper minute
Critical: Several callsper minute.
8/3/2019 The Spy Files, Wikileaks. Espaa vol I
33/33
5DJ-P@(G$'(
C$H'(J##&-#>$-T
U$'(GH'#D&'(>-G$'?J#>$-X(QE&J@&("$-#J"#A
milio artne\ CO
emartine\agnitio.es
mmanuel erome VP HLS Business evelopment
ederomeagnitio.es
Christian oreno HLS Business evelopment
chmorenoagnitio.es
Beatri\ Gon\le\ Sigen\a HLS Business evelopment
bgon\ale\agnitio.es
!"#$%&'()**+(