Feeds

Police use 24/7 power grid recordings to spot doctored audio

Fakers outed by telltale buzz

Securing Web Applications Made Simple and Scalable

Forging audio recordings is a lot harder than it used to be, thanks to a new method of authenticating recordings based on the buzz of the electrical power grid at the time they were recorded.

The oscillations of alternating current (AC) produce a distinct frequency – 50Hz in the UK, 60Hz in North America – that varies slightly with the demand placed on the power grid. At times of high demand, the frequency will be lower; when demand is low, it will be higher.

As reported by the BBC on Tuesday, audio specialists at the Metropolitan Police forensic lab in south London have been recording the hum of this frequency continuously for the last seven years – 24 hours a day, 365 days a year – and they say they can now use that data to verify the authenticity of audio recordings.

The method works because sound recordings invariably pick up a hint of the AC power hum from nearby electrical sockets, lights, and other power sources.

It's a problem that's well known to sound engineers, who work painstakingly to remove the buzz from their recordings. Often it's to no avail; amplify the recording enough, and the buzz is still there.

In the kinds of amateur recordings that are often entered as evidence in court, however, typically no effort has been made to edit the power grid hum from the audio, which allows investigators to use the subtle variations in the frequency of the noise to determine whether the recording is genuine.

If a witness claims a recording was made in the morning on a certain date, for example, then the telltale buzz picked up by the recording device had better match the buzz logged by the police forensic lab at that time.

Similarly, if a portion of a recording has been edited out, the resulting stutter in the electrical hum will be detectable, even when the edits are imperceptible to the human ear.

Sources say this method of audio forensics is now in use by law enforcement agencies in various countries throughout the world, though the Metropolitan Police were reportedly the first to automate the system.

According to researchers, the process is aided in the UK by the fact that the entire country is served by a single power grid, which means AC hum data recorded in London can be used to check recordings made anywhere else.

Other countries, such as the US, are served by multiple power grids, which means researchers must monitor the buzz at multiple locations to build a useful reference library.

Although the technique has reportedly already been instrumental in determining the outcomes of several trials, the technology continues to evolve as new types of recording devices are introduced.

"Digital forensics is constantly in flux, and the technology is changing every day," says the Met Police's Dr. Alan Cooper. "Every time a new format comes out, we need to be able to extract the data from those recordings and find different techniques to find out more about them." ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
Diary note: Pluto's close-up is a year from … now!
New Horizons is less than a year from the dwarf planet
Forty-five years ago: FOOTPRINTS FOUND ON MOON
NASA won't be back any time soon, sadly
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.