Feeds

London council to use lie detectors to finger benefit cheats

Calling call centres is stressful already

Seven Steps to Software Security

Lambeth Council has done a deal with KPMG Capita* to use voice recognition software to finger cheats contacting call centres to sort out benefits.

Everyone contacting the centre will be told they are being scanned and will then be asked 19 questions."Voice Risk Analysis" will then finger voices it considers suspicious. The pilot is being paid for by the Department of Work and Pensions.

The technology supposedly works by detecting "micro-tremors" which, we are told, indicate not only stress but also "when stress is generated by an attempt to deceive".

Micro-tremors are present in normal relaxed speech but disappear when the subject is stressed and, it is assumed, lying. What impact the pain of dealing with a local authority call centre has on a person's voice is not yet clear.

VRA technology has been quite widely used in the US, along with full polygraph tests, but with mixed results. It was previously trialled by Harrow Council.

Lambeth claims the technology will not only detect fraud but also "cut bureaucracy" and allow genuine claims to be processed more quickly.

The pilot starts this autumn.

*A PR for Lambeth got in touch to explain the deal is with Capita not KPMG. Lambeth has signed a separate fraud contract with KPMG which was mentioned in the voice recognition press release.

The press release outlining the contract with KPMG is here. The release on voice recognition is not currently available on Lambeth's website.

®

Seven Steps to Software Security

More from The Register

next story
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.