Skip to main navigation Skip to search Skip to main content

Profiling hoax callers

Rita Singh, Joseph Keshet, Eduard Hovy

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Hoax calls annually cost law enforcement and security agencies over a billion dollars, and sometimes lives. Bogus bomb threats, 'swatting' calls to the police, hoax calls to the coast guard etc. cause these agencies to respond, deploying personnel and resources needlessly. The response itself could cause direct danger to innocent citizens, while also drawing resources away from genuine emergencies that could otherwise have been expeditiously attended to. Law enforcement agencies would hence benefit greatly from technologies that could assist them in identifying the circumstances of a hoax call, or identifying the hoax callers themselves. These could lead to more informed responses to hoax calls, or to the arrest of the perpetrators. In this paper we describe technologies to profile hoax callers. Profiling in this context refers to the estimation of the speaker's personal traits, and of their physical surroundings, from their voice. This is a difficult task, particularly because the hoax calls are often very short, degraded in audio quality, and highly dramatized, with the callers attempting to disguise their voices to prevent identification. We present aspects of current technology in various fields that we have applied to this problem, and the challenges that remain in formulating reliable solutions.

Original languageEnglish
Title of host publication2016 IEEE Symposium on Technologies for Homeland Security, HST 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509007707
DOIs
StatePublished - 14 Sep 2016
Event2016 IEEE Symposium on Technologies for Homeland Security, HST 2016 - Waltham, United States
Duration: 10 May 201611 May 2016

Publication series

Name2016 IEEE Symposium on Technologies for Homeland Security, HST 2016

Conference

Conference2016 IEEE Symposium on Technologies for Homeland Security, HST 2016
Country/TerritoryUnited States
CityWaltham
Period10/05/1611/05/16

All Science Journal Classification (ASJC) codes

  • Computer Vision and Pattern Recognition
  • Safety Research
  • Computer Science Applications
  • Computer Networks and Communications
  • Law

Fingerprint

Dive into the research topics of 'Profiling hoax callers'. Together they form a unique fingerprint.

Cite this