Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo


Unsupported browser: Your browser does not meet modern web standards. See how it scores »

{ action.text }

V-Priorities works on three levels, says Microsoft’s Horvitz. One level of analysis examines the prosody – rhythm, syllabic rate, pitch, and length of pauses – of a caller’s voice. In a second level, rudimentary word and phrase recognition is done to spot target words that could indicate the nature of a call. It’s a simple but effective approach, says Horvitz. “How often does your wife say ‘my name is’?” he asks. The third level of analysis involves metadata, such as the time and length of a message. “These things are all working together,” he says.

The machine-learning algorithm that powers the crude prototype of V-Priorities was trained on 207 voice-mail messages collected from a single recipient over an eight- month period. Voice mail was used for the sake of convenience. In a final version, the system would be designed to answer calls and ask callers to identify themselves, before determining whether to put the call through or divert it to voice mail.

In principle it’s the same sort of “challenge-response” approach used to deal with e-mail spam, says Genes. “It definitely works well with e-mail, but it’s not a popular technology,” he says. People tend to find it annoying and offensive.

There are some challenge-response systems designed for phone-call screening, says IBM’s Sobers. But they’re not automated and require the person receiving the call to listen to a recording of the caller identifying themselves before deciding whether or not to take the call.

Checking a caller’s ID is, of course, one way to screen a call, says Horvitz. But often businesses or individuals block their IDs. Also, sometimes it’s not just the caller’s identity that dictates whether you might want to take the call. For example, you may wish to take a call from a colleague only if it’s urgent, such as when they’re running late. To do this, the automated system could look for phrases such as “running late,” “traffic,” or “missed the train.”

But, according to Trend Micro’s Genes, applying an automated challenge-response approach to voice spam is likely to be less effective than it is with e-mail. It could be easy for someone to fool the software, by pretending to know the person they’re calling and by using more familiar language, he says.

The low cost of labor in developing countries means that voice spam calls are as likely to be made by humans as machines – but on a scale far beyond old-fashioned telemarketing, says Genes. And this will make it much tougher to filter out, because people are smarter. “If a person is really determined to reach you, they will find a way,” he says.

2 comments. Share your thoughts »

Tagged: Communications

Reprints and Permissions | Send feedback to the editor

From the Archives


Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me