Voice tech and the question of trust

voice

(Andres Urena, Unsplash)

This article is brought to you thanks to the collaboration of The European Sting with the World Economic Forum.

Author: Robb Henzi, Vice President NY, sparks & honey, Omnicom Group & Amie Stepanovich, Executive Director, Silicon Flatirons, University of Colorado, Boulde & Jennifer Lynch, Director, Surveillance Litigation, Electronic Frontier Foundation


Voice technology is becoming more ubiquitous, integrating into tools and services by major corporations, startups, governments, and public sector players.

But if these tools are to gain broad public acceptance, these actors will need to demonstrate that they are being used in a trustworthy manner, with respect for human rights.

Big tech companies clearly see the value, and they continue to develop new abilities when it comes to collecting voice data for advertising and product recommendations. Tech titan patent activity reflects this, including new Amazon patent filings describing how a “voice sniffer algorithm” could be used on a variety of different devices to analyze audio in near-real time when it hears words like “love,” “bought,” or “dislike.” Google has patent applications describing how audio and visual signals can be used in a smart home context. This may seem harmless and even helpful in simplifying everyday tasks, but it also has serious implications for access to and use of personal data.

According to a 2018 PwC report, of the 25% of Americans who have no plans to shop with their voice in the future, more than 90% said lack of trust was a factor. These statistics find support and reinforcement in widely publicized examples of ways the technology has been used contrary to personal expectations. For example, a story of the recording of a private conversation between spouses that was sent to the husband’s employee was covered in national news outlets. While most experts predict a positive growth trajectory for virtual assistants, this trust gap will likely hinder truly universal adoption.

Three foundational issues sit at the heart of the issue of trustworthiness and voice tech and will need to be addressed: data protection and transparency, privacy, and fraud.

Data Protection and Transparency

There is a significant body of data associated with the development and use of voice technology. While the words spoken by a person to the interface may be the most obvious type of information being collected, analyzed, and (possibly) stored, there are several other categories that should be considered, including background noise captured, metadata, biometric data and voice prints, derivative data (for example, emotional information that can be determined based on the tone and pitch of the voice), not to mention the body of data collected to develop and train the voice algorithm.

The key principles of data protection have been long-recognized and are embodied in the Fair Information Practices. Legal frameworks around the world, such as the EU’s General Data Protection Regulation (GDPR), have codified and expanded upon these principles, often with severe penalties for non-compliance. Some jurisdictions, including the U.S. State of Illinois, have even pursued laws specifically covering biometric information, such as voiceprints. These frameworks provide a baseline level of protection for people who interact with voice-driven tools, though it is often not enough.

To compliment these legal requirements, professionals in the field of privacy engineering have been developing practical approaches to incorporating data protection into tools and services. Additionally, the U.S. National Institute for Standards and Technologies (NIST) is currently developing a privacy framework that is likely to extend beyond notions of legal compliance and provide a common language for approaching and mitigating potential threats associated with the increased collection of information, including voice information.

By building tools in a way that respects “privacy by design,” entities can make sure they are appropriately considering data protection from the outset. One example is the incorporation of blockchain as a potential decentralized solution for voice data protection, and French startup Snips is leaning into this idea of decentralization by building its software to run 100% on-device, independently from the cloud. Unlike more mainstream, centralized virtual assistants, Snips knows nothing about its users.

Privacy and Security

The more data collected through the use of voice technologies, the more risk information could be disclosed to governments or compromised by bad actors—a particularly ominous notion when voice data-specific human rights have yet to be defined.

“To the extent platforms store biometrics, they are vulnerable to government demands for access and disclosure,” noted Albert Gidari, director of privacy at the Stanford Center for Internet and Society. What government actors can then do with that information is potentially boundless. One example is the United States National Security Agency (NSA), where it was recently revealed that technology exists to analyze the physical and behavioral features that make each person’s voice distinctive, such as the pitch, shape of the mouth, and length of the larynx. An algorithm creates a dynamic computer model of the individual’s vocal characteristics–their voiceprint.

Globally, similar discussions are taking place at the government level. HMRC, the United Kingdom’s tax authority, has collected 5.1 million taxpayers’ voiceprints as part of its new voice identification policy. Advocacy groups reported HMRC’s system repeatedly asks users to create their “voice ID” without giving them instructions on how to opt out. In China, the government has been using voice data in conjunction with other biometric data and tracking technologies to target and surveil minority communities.

The existence of this data also provides a new attack surface for bad actors. With major data breaches in the news every week, the threat of unauthorized access to databases of voice data could provoke immeasurable damage, particularly as companies are increasingly turning to this type of biometric data to authenticate users for access to their personal accounts.

International law and policy are starting to take shape to provide guidance in these areas. The Necessary and Proportionate principles provide a rights-based framework to limit government access to personal information, though few countries have yet to adopt it. The Digital Geneva Convention is currently a draft private sector effort, while public sector forces are urging the UN Human Rights Committee to issue a new General Comment on the right to privacy under Article 17 of the International Covenant on Civil and Political Rights (ICCPR) and the Budapest Convention on Cybercrime is keenly focused on the topic.

It is clear there is a need for more and better national surveillance and cybersecurity laws and policies to help codify protections for these categories of personal data, including biometric information.

Fraud

Deep fakes and fraud are already surging problems in the world of online video, and U.S. lawmakers are already sounding the alarm about similar issues in the audio space.

Fraud is a growing problem in voice technology, with voice fraud rates growing more than 350% since 2013 across a variety of industries. Today, the same deep-learning technology that enables the modification of videos without detection can also be used to create audio clips that sound like real people.

Big technology firms all over the world are developing technology to clone anyone’s voice, such as the “Deep Voice” AI algorithm developed by Chinese firm Baidu that can clone anyone’s voice in just 3.7 seconds. Over the course of a year, the technology went from requiring about 30 minutes to create a new fake video to, now, just seconds.

Meanwhile, this need to fight fraud is leading to new innovation. Pindrop, for example, is a startup that recently raised $90M to bring its voice-fraud protection to IoT devices and the European continent. They claim their platform can identify even the most sophisticated fakes by analyzing almost 1,400 acoustic attributes, which enables it to effectively verify a legitimate voice file.

Academia is also leaning in to help prevent fraud. MIT Technology Review reported Berkeley researchers are able to “take a waveform and add a layer of noise that fools DeepSpeech, a state-of-the-art speech-to-text AI, every time. The technique can make music sound like arbitrary speech to the AI, or obscure voices so they aren’t transcribed.”

There are steps that can be taken to ensure privacy in voice-driven platforms, provide data security on the backend, and fight the risk of fraud. This means increasing access to information and education to help inform the general public, perhaps including new curriculum additions to global school systems. It also means meaningful legislation and genuine public/private sector collaboration.

Advertising

Advertising

Advertising

Advertising

Advertising

Advertising

the sting Milestone

Featured Stings

Can we feed everyone without unleashing disaster? Read on

These campaigners want to give a quarter of the UK back to nature

How to build a more resilient and inclusive global system

Stopping antimicrobial resistance would cost just USD 2 per person a year

4 innovative renewable energy projects powering Europe’s green future

China’s Ambassador to the EU Zhang Ming wishes to Brussels a Happy 2019 Year of the Pig

Putting a price on carbon will help New York state achieve a clean energy future

EU-Singapore trade agreement enters into force

Uganda’s Ebola preparedness ‘will go a long way’ says WHO chief

Bioethics: how to recover trust in the doctor-patient relationship

Encryption is under attack. Here’s why that matters

Practicing healthcare: Skills of a good healthcare professional and its effects

Work to make the world a better place: 5 things you need to know about ‘green jobs’

Mali just took a huge step towards universal healthcare

Not much of a help the new EU Directive on pensions

The UK to split if May’s hard or no-deal Brexit is pursued

This company is breeding millions of insects in the heart of London

Member states jeopardising the rule of law will risk losing EU funds

Regional competitiveness and growth: a Gordian knot for Europe

EU Budget: A Reform Support Programme and an Investment Stabilisation Function to strengthen Europe’s Economic and Monetary Union

European Parliament calls on Russia to end occupation of Georgian territories

European Commission Joint Research Centre opens world-class laboratories to researchers

Conditions deteriorating alarmingly in Yemen, warns senior UN official

“Private” sea freight indexes hide Libor like skeletons?

Tuesday’s Daily Brief: UNESCO ready to help after Notre Dame fire, and updates on Libya, Nicaragua, and the Cyclone Idai response

Who are the winners and losers in Africa’s Continental Free Trade area?

Greater transparency, fairer prices for medicines ‘a global human rights issue’, says UN health agency

Statement by the Brexit Steering Group on UK paper on EU citizens in the UK

Pakistan has just planted over a billion trees

Samsung’s profits fall as cheaper smartphones gain market share

UN health agency spotlights stalled effort to close health divide across Europe, in new report

EU Council agrees to reform the system for motor vehicles but with “restricted” power for the Commission

Can we create an empathic alternative to the capitalist system?

Scaling for success: SMEs, tech innovations and the ITU Telecom World Awards 2019, in association with The European Sting

European Court of Justice to Google: It is #righttobeforgotten but not #righttoberemembered

Is Eurozone heading towards a long stagnation?

China is a renewable energy champion. But it’s time for a new approach

UN member states express their will to tackle global migration but specific actions are still missing

Anti-vaccination scaremongering: What should we know about anti-vaccine argument?

UN chief urges India and Pakistan to dial down tensions in wake of Kashmir attack

10 of Albert Einstein’s best quotes

Distributed ownership: what it means and how it could transform India

Step up action to protect the planet during wartime: UN environment chief

Who will secure Lithuania?

Mental health and suicide prevention – What can be done to increase access to mental health services in my region?

In polarized America, a new divide looms

Massive cholera vaccine campaign planned for cyclone-ravaged Mozambique, as UN calls for ‘urgent’ step-up in support

Young migrants: Is Europe creating a lost generation?

UN atomic watchdog chief updates governing body on key North Korean reactor

“BEUC cautions against TTIP that would seek to align EU and US chemicals management frameworks”

Juncker Plan reaches almost €410 billion in triggered investment across the EU

How Japan became the world leader in floating solar power

Council’s position on Visa Directive a step back for young people’s mobility

Commission reports on progress in risk reduction in the Banking Union and calls for faster progress on Capital Markets Union ahead of EU Leaders’ meetings

Quicker freezing and confiscation of criminal assets in the EU

Libya: UN mobilized to support thousands uprooted by Tripoli clashes, renews call for humanitarian truce

ILO discusses world of work response to global refugee crisis

How well you age depends on what you think of old age

“Airbnb and YouTube are two great examples of a crowd based capitalism”, key stakeholders outline the boundaries of the 4th Industrial Revolution in Davos

What is the IMF telling Eurozone about fiscal and banking unification?

In Rwanda, high-speed drones are delivering blood to remote communities

These countries create most of the world’s CO2 emissions

‘Refrain from violence’ UN chief urges, as presidential election result is announced in DR Congo

Yemen talks: Truce agreed over key port city of Hudaydah

More Stings?

Comments

  1. Aarushi Singh says:

    Canon printer ingests amongst the various commonly happening defects to exist found at the users from Canon printers. That class of error hinders rather hinders the printing of papers and frequently leaves somebody clueless concerning the actions which should be taken to solve the specific captioned problem.

Speak your Mind Here

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s