Friday, August 9, 2019
CRJS472IP3 Research Paper Example | Topics and Well Written Essays - 750 words
CRJS472IP3 - Research Paper Example This implies that the investigating agency must have an original sample from the person to work with if they require accurate results. However, samples are also important in unintended recordings. The agency can get an individual original voice recording by securing a court order demanding the suspect to do so (FBI n.d). In high secretive missions, voice recorders are planted in strategic places in order to identify the speakers. For example, police may plant recorders in the body of an undercover agent to capture the conversation between drug dealers, arms dealers and terrorist. The device captures the voices that can be analyzed and used as evidence before a court of law (Becker 2009). Voice recognition works effectively when the police or the investigating agency has an authentic voice sample of a suspect. Analysis is then done on the sample with the original sample as a reference. Analysis is done using high-tech computer programs. The programs identify modification in the voices that are meant to disguise the conversation by use of personal voice tracts that cannot be compromised. The most used source of voices is telephone conversations. This method entails recording and listening to selected telephone conversations. The conversations are passed across a voice recognition system whereby speakers are likely to be identified. In this method, the speakers must speak for some time for analysis and authentication to be complete. The timing is usually pegged at thirty seconds; however, it is impossible to control the length of the conversation in cases where the investigator is not part of the conversation. Voice recognition has been used in investigations involving drug dealers in the USA. Drug cartels are highly secretive thus it is very hard to nab them with their cargo. As such, the police and FBI use telephone conversations and undercover agents to obtain voice samples of the criminals. The voices are then analyzed
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.