The US Coast Guard is collaborating with experts in academia to help investigate the expensive problem of hoax callers. Machine learning is playing a vital role in their efforts.
11 Ways IT Professionals Can Make Sense of IoT Data
(Click image for larger view and slideshow.)
Hoax callers are a special kind of jerk. At best they can cause their targets emotional distress. At worst they can cause or incite property destruction and even divert scarce resources from real emergencies where they are needed to save lives.
Technology can sometimes be applied to catch the criminal. Doing so casts technology specialists in the detective role by letting them trace calls to find their origins. Criminal pranksters have gained new tools to mask call origins, making these kinds of traces difficult or impossible in some cases.
The US Coast Guard is not immune to hoaxers. This branch of the US Armed Services monitors VHF channel 16, a marine radio frequency used for distress communications such as mayday calls that has also been a channel for hoaxers. By law, the US Coast Guard, which reports to the US Department of Homeland Security, is required to launch search-and-rescue missions in response to all mayday distress calls.
(Image: iShootPhotos LLC/iStockphoto)
Gianfranco Palomba is an ensign in the US Coast Guard, working in its Research and Development Center, and the project manager for the organization's search-and-rescue hoax call project. He told InformationWeek in an interview that the US Coast Guard gets 130 to 150 prank calls each year.
Each of these calls results in a two-day search for the people in distress. A two-day search-and-rescue operation by the US Coast Guard costs taxpayers an average of $500,000 in terms of assets deployed for the mission -- personnel, helicopters, and boats.
"We've definitely seen an upward trend in these calls since 9/11," he told InformationWeek. The US Coast Guard's hoax call project has developed various technologies to track the origin of these calls to assist the investigation.
More recently, it has reached out to collaborate with academia on technology that can provide further insights into the origins and nature of such calls.
That's how recordings of these calls ended up on the desk of Rita Singh, a senior systems scientist at Carnegie Mellon University's School of Computer Science.
"The basic question was, 'Give us any information about this guy,'" Singh told InformationWeek in an interview. "The only thing we have is the recording of his voice."
Singh is a specialist in algorithms for computer speech recognition and speech processing and has studied this field for 19 years. Together with her team she applied a range of tools to the problem.
"It was like being thrown off the deep end of the pool. I applied everything I could to the analysis. My colleagues contributed, too."
Singh's team provided Homeland Security and the US Coast Guard with highly detailed information about the hoax caller and the environment this person was in when the call was placed. Because the case is still under investigation, the details Singh provided to investigators cannot be published.
Singh's research and application of technology to voice recordings can profile callers, revealing whether they are under threat, their health status, race, ethnicity, confidence, personality, truthfulness, and more.
"You cannot change how fast your muscles move, your vocal tract inertia, your lung volume, your skeletal structure," Singh said. "And all that influences voice. It's still ongoing research, but we are discovering things about how we can home in on those aspects of voice and speech that will allow us to make reliable and accurate estimations from the voice about the person's characteristics."
To accomplish this, Singh's algorithms look at the micro-properties (measurements made within fractions of a second) of both voice and speech.
"We are using machine learning algorithms to measure these micro-features, and we keep inventing new ones every day," she said. While others have pursued such research in the past, it's only today that the technology exists to extract some of these micro-features with great precision.
Singh provided InformationWeek with some additional examples of applications for this technology.
A case in point came in the form of hoax calls to fast food restaurants around the country earlier this year. The caller claimed to be from the fire department and told the restaurant managers that deadly gas had built up to explosive levels in their buildings. In many cases the caller persuaded frantic managers and their staffs to break the windows of their restaurants to relieve the pressure.
Voice processing algorithms show promise as an indicator in helping diagnose certain human conditions and diseases such as Parkinson's, Singh said. "One of the first things that gets affected are your vocal cords," she said. Other health conditions could be indicated, too. "Anything that affects your body affects your vocal tract."
Heinz College at Carnegie Mellon University will be initiating a program to study the potential of using voice as a tool for investigating white collar crimes -- such as financial crimes people commit by impersonating someone else via phone calls, Singh said.
Media organizations sometimes reach out to Singh as a voice expert, as they did when they consulted her during the current election cycle regarding the allegation that Republican presidential candidate Donald Trump had pretended to be a spokesman named John Miller during a call to a reporter in the 1990s. According to Singh's analysis, it was actually Trump.
As for catching the hoax callers that have been costing the US Coast Guard and taxpayers so much money, all the cases are still ongoing, according to Marty Martinez, special agent with the Coast Guard Investigative Service, who spoke with InformationWeek in an interview. That means that the Coast Guard is not able to comment on any specific cases where this technology has been applied. But it's helping.
"Any time we can take new and emerging technology to help us do our job better, even if it's just a little bit, it's good for law enforcement," he said.
Palomba said this voice processing project is one of several collaborations by Homeland Security with academia designed to help investigations and protect the US.
His R&D group doesn't have the resources or project focus to center on this kind of research, but there's no question of its value.
"CMU's products and research have definitely enhanced investigations."
[Editor's note: This article was updated to mention that Gianfranco Palomba works in the US Coast Guard's Research and Development Center.]
Jessica Davis has spent a career covering the intersection of business and technology at titles including IDG's Infoworld, Ziff Davis Enterprise's eWeek and Channel Insider, and Penton Technology's MSPmentor. She's passionate about the practical use of business intelligence, ... View Full Bio
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.