Vocal Analysis Software for Security Screening Validity and Deception Detection Potential
Elkins, Aaron C.
MetadataShow full item record
"Our voices are encoded with emotional information. While it is complex and difficult to develop software to classify emotion and deception from the voice, it is possible. Using experimental methods, this research examines current commercial vocal analysis software for predictive and statistical validity in identifying emotion and deception for security screening. It is unrealistic to rely completely on the voice to detect deception and hostile intent for all people and all situations. But, by exploring the vocal variables used by the software, we are able to correspond and fuse them with other detection technologies for higher prediction reliability and accuracy. Implementing an unreliable and invalid detection technology could place the country's security in jeopardy by failing to detect actual threats. Just as deleterious, however, would be to dismiss technology, such as vocal analysis, before it has been thoroughly examined. This would deprive us of a valuable tool for detecting threats and securing our homeland."
This article appeared in Homeland Security Affairs (April 2012), supplement 4, article 1
Showing items related by title, author, creator and subject.
Phase I report on intelligent software decoys: technical feasibility and institutional issues in the context of homeland security Michael, James Bret; Rowe, Neil C.; Rothstein, Hy; Auguston, Mikhail; Drusinsky, Doron; Riehle, Richard (Monterey, California. Naval Postgraduate School, 2002-12-10); NPS-CS-03-001The purpose of this project is to explore the technical feasibility and institutional issues associated with applying software-based deception techniques as part of Homeland defense. At present, we refer to the embodiment ...
Rowe, Neil C. (Monterey, California. Naval Postgraduate School, 2008);We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories applicable to cyberspace. We then examine deception for commercial gain such as ...
Martin, Charmine L. (Monterey, California. Naval Postgraduate School, 2008-06);This thesis explores the elements of military deception and defines the overarching principles that make for successful military deception. A good reference point is the six principles of military deception as defined ...