Voice tech and the question of trust

voice

(Andres Urena, Unsplash)

This article is brought to you thanks to the collaboration of The European Sting with the World Economic Forum.

Author: Robb Henzi, Vice President NY, sparks & honey, Omnicom Group & Amie Stepanovich, Executive Director, Silicon Flatirons, University of Colorado, Boulde & Jennifer Lynch, Director, Surveillance Litigation, Electronic Frontier Foundation


Voice technology is becoming more ubiquitous, integrating into tools and services by major corporations, startups, governments, and public sector players.

But if these tools are to gain broad public acceptance, these actors will need to demonstrate that they are being used in a trustworthy manner, with respect for human rights.

Big tech companies clearly see the value, and they continue to develop new abilities when it comes to collecting voice data for advertising and product recommendations. Tech titan patent activity reflects this, including new Amazon patent filings describing how a “voice sniffer algorithm” could be used on a variety of different devices to analyze audio in near-real time when it hears words like “love,” “bought,” or “dislike.” Google has patent applications describing how audio and visual signals can be used in a smart home context. This may seem harmless and even helpful in simplifying everyday tasks, but it also has serious implications for access to and use of personal data.

According to a 2018 PwC report, of the 25% of Americans who have no plans to shop with their voice in the future, more than 90% said lack of trust was a factor. These statistics find support and reinforcement in widely publicized examples of ways the technology has been used contrary to personal expectations. For example, a story of the recording of a private conversation between spouses that was sent to the husband’s employee was covered in national news outlets. While most experts predict a positive growth trajectory for virtual assistants, this trust gap will likely hinder truly universal adoption.

Three foundational issues sit at the heart of the issue of trustworthiness and voice tech and will need to be addressed: data protection and transparency, privacy, and fraud.

Data Protection and Transparency

There is a significant body of data associated with the development and use of voice technology. While the words spoken by a person to the interface may be the most obvious type of information being collected, analyzed, and (possibly) stored, there are several other categories that should be considered, including background noise captured, metadata, biometric data and voice prints, derivative data (for example, emotional information that can be determined based on the tone and pitch of the voice), not to mention the body of data collected to develop and train the voice algorithm.

The key principles of data protection have been long-recognized and are embodied in the Fair Information Practices. Legal frameworks around the world, such as the EU’s General Data Protection Regulation (GDPR), have codified and expanded upon these principles, often with severe penalties for non-compliance. Some jurisdictions, including the U.S. State of Illinois, have even pursued laws specifically covering biometric information, such as voiceprints. These frameworks provide a baseline level of protection for people who interact with voice-driven tools, though it is often not enough.

To compliment these legal requirements, professionals in the field of privacy engineering have been developing practical approaches to incorporating data protection into tools and services. Additionally, the U.S. National Institute for Standards and Technologies (NIST) is currently developing a privacy framework that is likely to extend beyond notions of legal compliance and provide a common language for approaching and mitigating potential threats associated with the increased collection of information, including voice information.

By building tools in a way that respects “privacy by design,” entities can make sure they are appropriately considering data protection from the outset. One example is the incorporation of blockchain as a potential decentralized solution for voice data protection, and French startup Snips is leaning into this idea of decentralization by building its software to run 100% on-device, independently from the cloud. Unlike more mainstream, centralized virtual assistants, Snips knows nothing about its users.

Privacy and Security

The more data collected through the use of voice technologies, the more risk information could be disclosed to governments or compromised by bad actors—a particularly ominous notion when voice data-specific human rights have yet to be defined.

“To the extent platforms store biometrics, they are vulnerable to government demands for access and disclosure,” noted Albert Gidari, director of privacy at the Stanford Center for Internet and Society. What government actors can then do with that information is potentially boundless. One example is the United States National Security Agency (NSA), where it was recently revealed that technology exists to analyze the physical and behavioral features that make each person’s voice distinctive, such as the pitch, shape of the mouth, and length of the larynx. An algorithm creates a dynamic computer model of the individual’s vocal characteristics–their voiceprint.

Globally, similar discussions are taking place at the government level. HMRC, the United Kingdom’s tax authority, has collected 5.1 million taxpayers’ voiceprints as part of its new voice identification policy. Advocacy groups reported HMRC’s system repeatedly asks users to create their “voice ID” without giving them instructions on how to opt out. In China, the government has been using voice data in conjunction with other biometric data and tracking technologies to target and surveil minority communities.

The existence of this data also provides a new attack surface for bad actors. With major data breaches in the news every week, the threat of unauthorized access to databases of voice data could provoke immeasurable damage, particularly as companies are increasingly turning to this type of biometric data to authenticate users for access to their personal accounts.

International law and policy are starting to take shape to provide guidance in these areas. The Necessary and Proportionate principles provide a rights-based framework to limit government access to personal information, though few countries have yet to adopt it. The Digital Geneva Convention is currently a draft private sector effort, while public sector forces are urging the UN Human Rights Committee to issue a new General Comment on the right to privacy under Article 17 of the International Covenant on Civil and Political Rights (ICCPR) and the Budapest Convention on Cybercrime is keenly focused on the topic.

It is clear there is a need for more and better national surveillance and cybersecurity laws and policies to help codify protections for these categories of personal data, including biometric information.

Fraud

Deep fakes and fraud are already surging problems in the world of online video, and U.S. lawmakers are already sounding the alarm about similar issues in the audio space.

Fraud is a growing problem in voice technology, with voice fraud rates growing more than 350% since 2013 across a variety of industries. Today, the same deep-learning technology that enables the modification of videos without detection can also be used to create audio clips that sound like real people.

Big technology firms all over the world are developing technology to clone anyone’s voice, such as the “Deep Voice” AI algorithm developed by Chinese firm Baidu that can clone anyone’s voice in just 3.7 seconds. Over the course of a year, the technology went from requiring about 30 minutes to create a new fake video to, now, just seconds.

Meanwhile, this need to fight fraud is leading to new innovation. Pindrop, for example, is a startup that recently raised $90M to bring its voice-fraud protection to IoT devices and the European continent. They claim their platform can identify even the most sophisticated fakes by analyzing almost 1,400 acoustic attributes, which enables it to effectively verify a legitimate voice file.

Academia is also leaning in to help prevent fraud. MIT Technology Review reported Berkeley researchers are able to “take a waveform and add a layer of noise that fools DeepSpeech, a state-of-the-art speech-to-text AI, every time. The technique can make music sound like arbitrary speech to the AI, or obscure voices so they aren’t transcribed.”

There are steps that can be taken to ensure privacy in voice-driven platforms, provide data security on the backend, and fight the risk of fraud. This means increasing access to information and education to help inform the general public, perhaps including new curriculum additions to global school systems. It also means meaningful legislation and genuine public/private sector collaboration.

Advertising

Advertising

Advertising

Advertising

Advertising

Advertising

the sting Milestone

Featured Stings

Can we feed everyone without unleashing disaster? Read on

These campaigners want to give a quarter of the UK back to nature

How to build a more resilient and inclusive global system

Stopping antimicrobial resistance would cost just USD 2 per person a year

UN says ‘many humanitarian achievements’, one year after ouster of ISIL from Mosul

Breaking news: Juncker’s Commission mutant trojan horse is on the loose in Strasbourg

The 4 types of leader who will thrive in the Fourth Industrial Revolution

Brexit talks: Today the world to hear of a predictable failure

EU to scrutinise foreign direct investment more closely

Unemployment and immigrants haunt the EU; who can offer relief?

Compensation for damages by the State for infringement of EU law: the European Commission refers Spain to the Court of Justice for its rules on the compensation for damages incurred by private parties

‘Growing alarm’ over Fall Armyworm advance, with cash crops ‘under attack’ across Asia

GSMA Mobile World Congress Americas

Mergers: Commission fines Canon €28 million for partially implementing its acquisition of Toshiba Medical Systems Corporation before notification and merger control approval

UN chief welcomes G20 commitment to fight climate change

4 steps to developing responsible AI

4 reasons why women should lead the G7 agenda in 2018

Why the merchant ships can pollute the atmosphere with CO2 quite freely

Data exchanges: Strengthening Europol cooperation with non-EU countries

Impressions of China

Economy and living standards of Gaza ‘eviscerated’ by crippling blockade – UN trade and development report

Migration crisis update: What are the chances of a fair deal at this EU Summit?

The time is up but the game is still not over for Greece: negotiations continue in anticipation of a new deal

Opposite cultures: Should it be a problem?

Changing for the change: Medicine in Industry 4.0

Climate Change : An Already Health Emergency

Bank resolutions set to remain a national affair

Scotland “shows the way” to separatist movements as Catalonia calls a vote on independence

Here are 3 alternative visions for the future of work

‘Global trust’ declining, ‘our world needs stepped-up global leadership’

Let Nagasaki remain ‘the last city’ to suffer nuclear devastation says museum director, as UN chief arrives

Primary Healthcare: Back to the Basics

This Netherlands football stadium creates its own energy and stores it in electric car batteries

Israel is joining forces with Arab states to save coral from climate change destruction

Globalization 4.0 must build a better world for working people

The G7 should take the lead on ocean targets for 2020

Algorithmic warfare is coming. Humans must retain control

Libya: EU efforts should focus on protecting migrants, MEPs say

Strengthening security through an EU-wide information system

New EU rules ensure better protection for 120 million holidaymakers this summer

Can the next financial crisis be avoided?

Imported and EU fisheries products should be treated equally

One billion people have preventable eye conditions, increasingly linked to lifestyle choices: UN health agency

War of words in Davos over Eurozone’s inflation/deflation

Parliament approves EU rules requiring life-saving technologies in vehicles

North Macedonia President, credits dialogue and diplomacy for setting a decades-long ‘name dispute’

10 ways central banks are experimenting with blockchain

The EU checks the multinationals for tax fraud but Britain may sail out of the EU via Panama

Why lay people don’t expect anything good from G20

UN launches plan to promote peace, inclusive growth in Africa’s Sahel

Medical research: between progress and speculation

We have to fight for a fairer tech industry for women

Humanitarian visas would reduce refugees’ death toll

More funds needed to counter ‘persistent and multi-faceted humanitarian problems’ in Ethiopia

Europe’s forests are booming. Here’s why.

Eurozone stuck in a high risk deflation area; Draghi expects further price plunge

The impact of refugees on the European healthcare system

Hospitals among seven health centres attacked in Syria’s north-east

3 charts that show the economics of European football

Germany to help China in trade disputes with Brussels

Colombia: Santos thanks the EU for its support to the peace process

Europe united in not supporting a US attack on Syria

The EU stops being soft with 10 Downing Street about Brexit

Draghi tells the EU Parliament his relaxed policies are here to stay

More Stings?

Comments

  1. Aarushi Singh says:

    Canon printer ingests amongst the various commonly happening defects to exist found at the users from Canon printers. That class of error hinders rather hinders the printing of papers and frequently leaves somebody clueless concerning the actions which should be taken to solve the specific captioned problem.

Speak your Mind Here

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s