Identity Theft: The essence of Voice Biometrics

The Problem: Identity Theft
One of the most growing and urgent problems in Kenya that many people have is that they’ll become victims of identity theft.
In fact, Kenyans from the countryside have suffered majorly from this identity theft and they have lost a lot of money yet through wouldn’t even know what hit them. The essence of their mindset doesn’t allow them to even contemplate why.
Most people just have the “oh, well, it won’t happen to me” mindset. Hence when it happens, they shut down and move on, carrying the pain and loss in silence, without sharing to warn others about it. For 4 out of every 10 people, that’s a different mindset to take. Which one of those ten are you?
The most everyday sort of identity theft is MPESA pin frauds, usually through concern takeover. In most cases, the victim either lost their identity card and it’s hence used to compromise their MPESA pin and they have their money lost or just being careless and giving out their pin and ID number to strangers pretending to be from the telecom firm.
The rise of identity theft coupled with the desire by companies to proactively secure client data has witnessed a surge in use of voice biometrics. MPESA has led the revolution of technological advancement and this has given rise to fraudulent opportunists as is always the case.
In every changing aspect, there is always the vulnerable that fall victims to fraudulent scammers and this means the brand has the duty of care to ensure that their customers are best protected within the bounds of the law in terms of service provision.
Solution: Jitambulishe
A vulnerability is the birthplace of innovation, creativity, and change. As we advance in technological use, the need to protect the consumer and the business, any brand must innovate, must stay steps ahead of the frauds in ways that make it difficult for them to take advantage of the vulnerable of the society.
Safaricom, in a move to protect the consumer and secure their mobile transaction, innovatively launched voice biometrics, (sometimes called voice authentication) a type of user security that uses a customer’s voice, relying on the fact that vocal characteristics, just like fingerprints and people’s irises (eyes), are unique for each individual. This was in an effort to secure one’s mobile transaction and ensure that it’s seamless to transact without fear of frauds invading one’s phone.

It’s the latest innovation to take place at the call center in a bid to improve customer engagement and experience. When a customer calls the Call Centre, they will be able to register their voices for the voice print enrolment/ verification service. Hence the next time a customer calls and had enrolled their voice, after verification with their pre-recorded voice print – they will then be able to do SIM swaps, unlock M-PESA PIN and PUK requests using voice biometrics. This, in essence, ensures the identity of the consumer cannot be compromised by whatever reason or excuse.
Safaricom has put the consumer first and wants to improve efficiency in the call center and enhance Customer Experience on both Voice and Interactive Voice Response (IVR) due to quicker and less intrusive vetting process. As Kenyans, we love the convenience and we love to feel important.
The vetting process is always vexing and we try to pull rank and call important people we know or rush to social media to complain about the brand and how they are making it difficult for us to access our own money et al. This product eliminates all that and make the experience and process smooth and friendly.
How it works
Voice biometrics technology recognizes a person by their voice, ensuring that every interaction begins with a more human experience, eliminating the need to use PINs, passwords and security questions to log in to consumer devices, call centers, mobile apps, and Web sites.
Jitambulishe’ allows customers to use their voices for authentication before accessing assisted services such as resetting M-PESA PIN, and PUK, significantly cutting down the steps a customer goes through before they are assisted.
To activate the service, the customer’s voice patterns are captured and used to create a unique “voiceprint”, which is stored as a secure string of numbers and characters. These attributes help identify and verify callers when they call the customer care desk. This system made it possible to transcribe what a person says and how they said it by replicating the position a mouth makes when speaking a certain speech pattern.
During enrollment into the voice biometric system, one’s voice is recorded, creating what is called a voiceprint for comparison with samples taken for user identification. To enhance the security of stored samples, one may be asked to repeat pre-recorded voiceprints randomly and this is what the system uses to proof a request for entry.
Using biometric technology can quickly and easily authenticate a user and open the door for a new world of personalized service. This will also reduce Fraud/identity theft by use of a unique voice print for enrolled customers. More on the same can be found here and to those wondering how this can happen to them and ensure that their transactions are secure and they have the experience they deserve and love, you can dial 100/200 and experience it today.
Why Jitambulishe by Safaricom
Voice biometrics works by retrieving three aspects of one’s speech. First is ‘What you are saying’, which is retrieved using automatic speech recognition technology. Second is ‘How you speak’, which involves language, accent and speaking style. This is the best way to secure your identity in today’s modern age where everything and everyone can be compromised.
This is the information used by linguists and phoneticians to identify a speaker, their culture, and mood. Moreover, the most important information from one’s voice is through the vocal tract: Basically the shape of one’s larynx, mouth, and nose.
This information is particular to an individual and cannot be changed or disguised and is not dependent on language. This is the fundamental basis on which voice biometrics works.
Dr. Luka Wandanje, a linguistics instructor at GEMS Cambridge International School, says most people mimic others and can be extremely good at the art of voice deception, but can never change the deployment of vocal tract abilities.
“When one is born, just like with the fingerprints or iris, which are never same across individuals, the voice track also remains same and particular to an individual. When I speak in my native language or English, I alter my intonation or pitch, but if I have my voice captured on a biometrics tool, I won’t fool it, because the waves of the vocal tract when speaking cannot be changed”, he says.
“Because of the permanent characteristics a biometric tool measures, it cannot be fooled into thinking it is another person. Not even a cold or flu can alter this,” he adds. This is why Safaricom has invested heavily in this technology to ensure that your experience with the brand, is secure, its above board and it is seamless. Something that our desire for convenience has brought upon our lifestyles.
About Soko Directory Team
Soko Directory is a Financial and Markets digital portal that tracks brands, listed firms on the NSE, SMEs and trend setters in the markets eco-system.Find us on Facebook: facebook.com/SokoDirectory and on Twitter: twitter.com/SokoDirectory
- January 2026 (220)
- February 2026 (243)
- March 2026 (237)
- January 2025 (119)
- February 2025 (191)
- March 2025 (212)
- April 2025 (193)
- May 2025 (161)
- June 2025 (157)
- July 2025 (227)
- August 2025 (211)
- September 2025 (270)
- October 2025 (297)
- November 2025 (230)
- December 2025 (219)
- January 2024 (238)
- February 2024 (227)
- March 2024 (190)
- April 2024 (133)
- May 2024 (157)
- June 2024 (145)
- July 2024 (136)
- August 2024 (154)
- September 2024 (212)
- October 2024 (255)
- November 2024 (196)
- December 2024 (143)
- January 2023 (182)
- February 2023 (203)
- March 2023 (322)
- April 2023 (297)
- May 2023 (267)
- June 2023 (214)
- July 2023 (212)
- August 2023 (257)
- September 2023 (237)
- October 2023 (264)
- November 2023 (286)
- December 2023 (177)
- January 2022 (293)
- February 2022 (329)
- March 2022 (358)
- April 2022 (292)
- May 2022 (271)
- June 2022 (232)
- July 2022 (278)
- August 2022 (253)
- September 2022 (246)
- October 2022 (196)
- November 2022 (232)
- December 2022 (167)
- January 2021 (182)
- February 2021 (227)
- March 2021 (325)
- April 2021 (259)
- May 2021 (285)
- June 2021 (272)
- July 2021 (277)
- August 2021 (232)
- September 2021 (271)
- October 2021 (304)
- November 2021 (364)
- December 2021 (249)
- January 2020 (272)
- February 2020 (310)
- March 2020 (390)
- April 2020 (321)
- May 2020 (335)
- June 2020 (327)
- July 2020 (333)
- August 2020 (276)
- September 2020 (214)
- October 2020 (233)
- November 2020 (242)
- December 2020 (187)
- January 2019 (251)
- February 2019 (215)
- March 2019 (283)
- April 2019 (254)
- May 2019 (269)
- June 2019 (249)
- July 2019 (335)
- August 2019 (293)
- September 2019 (306)
- October 2019 (313)
- November 2019 (362)
- December 2019 (318)
- January 2018 (291)
- February 2018 (213)
- March 2018 (275)
- April 2018 (223)
- May 2018 (235)
- June 2018 (176)
- July 2018 (256)
- August 2018 (247)
- September 2018 (255)
- October 2018 (282)
- November 2018 (282)
- December 2018 (184)
- January 2017 (183)
- February 2017 (194)
- March 2017 (207)
- April 2017 (104)
- May 2017 (169)
- June 2017 (205)
- July 2017 (189)
- August 2017 (195)
- September 2017 (186)
- October 2017 (235)
- November 2017 (253)
- December 2017 (266)
- January 2016 (164)
- February 2016 (165)
- March 2016 (189)
- April 2016 (143)
- May 2016 (245)
- June 2016 (182)
- July 2016 (271)
- August 2016 (247)
- September 2016 (233)
- October 2016 (191)
- November 2016 (243)
- December 2016 (153)
- January 2015 (1)
- February 2015 (4)
- March 2015 (164)
- April 2015 (107)
- May 2015 (116)
- June 2015 (119)
- July 2015 (145)
- August 2015 (157)
- September 2015 (186)
- October 2015 (169)
- November 2015 (173)
- December 2015 (205)
- March 2014 (2)
- March 2013 (10)
- June 2013 (1)
- March 2012 (7)
- April 2012 (15)
- May 2012 (1)
- July 2012 (1)
- August 2012 (4)
- October 2012 (2)
- November 2012 (2)
- December 2012 (1)
