Archive for the ‘Identification’ Category

Voice print technology led to arrests of alleged terrorists in Europe

October 8, 2010

Officials who apparently thwarted an alleged terror plot against Europe used voiceprinting technology to catch several suspects.

 

By the time you are 18 you have a unique voice print:derlinguist.com

 

The British Government Communications Headquarters used voice identification technology to help uncover the plot according to a report in the Canadian Press. Several of the voices were recorded along the Pakistan-Afghanistan border.

Police in southern France on Tuesday arrested 12 suspects in sweeps against suspected Islamic militant networks, including three men linked to a network recruiting fighters for Afghanistan.

In one of the cases, nine suspected Islamic militants were detained in southeastern Marseille and its suburbs, and authorities turned up at least one automatic rifle and a pump gun, the officials said.

In Tuesday’s other roundup, two men were arrested in Marseille and another in southwestern Bordeaux on suspected ties to a Frenchman arrested in Naples, Italy, last month accused of links to an Afghan recruiting ring.

Officials in Germany were tightlipped Tuesday on details of a U.S. missile strike in Pakistan’s rugged mountain border area where Pakistani officials said eight German militants were killed.

U.S. officials believe a cell of Germans and Britons was at the heart of the Europe terror plot. Germany’s ARD public television cited unidentified sources Tuesday as saying four of the Germans killed in the missile attack were of Turkish descent.

Developers of voice biometric technology say it can be more useful than traditional fingerprint analysis in fighting terror. The private sector has already embraced the technology, with U.S. probation officers using it to monitor offenders, and Canadian call centres using it to identify customers. Israel’s largest bank, Bank Leumi, says it has been using voice biometrics for the past decade to deter fraud and boost customer safety.

U.S. and British intelligence run an international eavesdropping program that gathers huge amounts of information. So big is the overload that the National Security Agency is building a massive storage centre in Utah to handle the mountains of data.

Almog Aley-Raz, whose Israel-based company PerSay Ltd. supplies governments and businesses around the world, said that using voice biometrics could allow officials to scan a large number of phone conversations for a several suspects’ voices, greatly streamlining intelligence work.

“An entry-level server enables you to run 100 streams of audio against maybe 100 voiceprints,” he said, noting that in some cases dozens or even hundreds of servers could be run back-to-back to comb through intercepted calls. Aley-Raz accepted that the technology had its flaws — it is vulnerable to background noise and poor audio quality, for example, and can become confused when people start talking over one another.

And Kim Jong Un may actually be Kim Jong 2 or maybe 3….?

October 5, 2010

German Expert Casts Doubt on Identity of Kim Jong Un

Kim the student in Switzerland

So-called “Kimologists” based in Seoul, Tokyo and Beijing are busy analyzing the impenetrable machinations of North Korea’s power structure. There is broad agreement that Kim Jong Il, referred to in North Korea as the “Dear Leader,” who succeeded his father Kim Il Sung (known as “Great Leader”) in 1994, suffered a stroke in 2008 and was forced to take time off governing for months.

At least one Japanese expert believes that Kim Jong Il died a long time ago and that doppelgangers are being used.

Was the fat-cheeked young man shown alongside North Korean dictator Kim Jong Il in an official photo really his son and chosen successor, Kim Jong Un?

The last few days have highlighted once again how little the world knows about the regime in Pyongyang. North Korean dictator Kim Jong Il, 68, summoned an extremely rare meeting of his Workers Party and presented his son Kim Jong Un, who is aged 26 or perhaps 27, as his successor.

Kim, the heir apparent

A German expert on face research claims he is not identical with the pupil shown in a widely published photo taken during his school days in Switzerland.

A Hamburg-based expert on facial research who was asked by SPIEGEL to compare several photos supposedly portraying Kim in his youth with the latest official one has come to an astonishing conclusion. There is a “high probablility that they are not one and the same person,” he said.

Many Kimologists say it doesn’t really matter who the young man is because he will be firmly embedded in a power apparatus made up of older relatives.

Read the Der Spiegel article: http://www.spiegel.de/international/world/0,1518,721076,00.html

He is supposed to have attended the International School of Berne incognito but even that is disputed, and Kim the heir -apparent may well not be Kim the schoolboy and maybe just the Kim who never was ……….

Biometric identification inherently fallible

September 25, 2010

Cave paintings created some 30,000 years ago include hand-prints which are thought to identify the artist. Babylonian merchants included finger prints on clay tablets perhaps to identify those involved in particular transactions. In early Egypt physical descriptions were appended to the names of traders also presumably as a means of indisputable identification. Hand and foot-prints were used in China about 600 years ago to identify children and this method is still used today.

Modern biometrics started in the mid-19th century with Bertillon’s anthropometrics and his system was called Bertillonage.

Edward Henry

The use of fingerprints by police started in Asia, S. America and Europe. By the late 19th century systems for recording, storing and retrieving finger prints were being established. The first such robust system of classification was developed in Bengal, India by Azizul Haque for Edward Henry who was the Inspector General of Police. The Henry System caught on and variations are still in use today.


Development of modern day biometric systems took off in the second half of the 20th century and with the advent of computers has exploded since the 1990’s.

Face recognition

But a new report by the National Research Council warns that no single trait has been identified that is stable and distinctive across all groups.

http://www.eurekalert.org/pub_releases/2010-09/naos-bit092410.php

Biometric systems — designed to automatically recognize individuals based on biological and behavioral traits such as fingerprints, palm prints, or voice or face recognition — are “inherently fallible,” says a new report by the National Research Council, and no single trait has been identified that is stable and distinctive across all groups.

“For nearly 50 years, the promise of biometrics has outpaced the application of the technology,” said Joseph N. Pato, chair of the committee that wrote the report and distinguished technologist at Hewlett-Packard’s HP Laboratories, Palo Alto, Calif. “While some biometric systems can be effective for specific tasks, they are not nearly as infallible as their depiction in popular culture might suggest. Bolstering the science is essential to gain a complete understanding of the strengths and limitations of these systems.”

Biometric systems are increasingly used to regulate access to facilities, information, and other rights or benefits, but questions persist about their effectiveness as security or surveillance mechanisms. The systems provide “probabilistic results,” meaning that confidence in results must be tempered by an understanding of the inherent uncertainty in any given system, the report says. It notes that when the likelihood of an imposter is rare, even systems with very accurate sensors and matching capabilities can have a high false-alarm rate. Biometric characteristics may vary over an individual’s lifetime due to age, stress, disease, or other factors. Technical issues regarding calibration of sensors, degradation of data, and security breaches also contribute to variability in these systems.

The study was funded by the Defense Advanced Research Projects Agency, the Central Intelligence Agency, and the U.S. Department of Homeland Security, with assistance from the National Science Foundation. The National Academy of Sciences, National Academy of Engineering, Institute of Medicine, and National Research Council make up the National Academies.