Page 24 - WBG July 2025
P. 24

FEATURE

                                       AI in the Courtroom:

                How We Proved a Voice Was Cloned and

                                  Screenshots Were Faked


                       By Fernando Fernández International Private Investigator & Certified Digital Forensic Expert CIG, LLC


        In a case that may set the tone for how artificial intelligence is   Step 1: Chain of Custody Breakdown – The Screenshots
        treated in courtrooms moving forward, I had the opportunity to
        serve as a digital forensic expert in what would become Puerto   Screenshots are never conclusive digital evidence—yet they continue to
        Rico’s first criminal case involving a voice cloned with AI used   be used in courts around the world. In this case, there was no physical
        as fabricated evidence. Alongside my forensic audio colleague   extraction of the device from which the screenshots originated. Instead,
        and our legal team, we successfully demonstrated that the key   the complainant simply submitted image files, claiming they were from her
        evidence against our client, Elizabeth Torres, had been digitally   device.
        altered and artificially generated—leading to a full Not Guilty
        verdict.                                            I requested a forensic image of the phone to verify metadata and origin.
                                                            No such image existed. In fact, the screenshots were submitted via a CD,
        Elizabeth  was  facing  up  to  8  years  in  prison  for  allegedly   copied from an unknown source. Worse, the phone was never turned over to
        violating a protective order under Puerto Rico’s Law 54 on   the defense for independent review, and the police had merely performed
        Domestic Violence. According to the allegations, she had   a drag and drop of the screenshots and generated a  hash afterward,
        made contact not with her ex-husband directly, but with his   believing this would validate the files.
        new girlfriend, which was also prohibited under the protective
        order, as it included contact with partners, relatives, and close   We also made mention that for the screenshots we used software to detect
        associates of the complainant.                      changes in the metadata, where it was discovered that the file extension
                                                            claimed to be PNG, but in its internal structure it was JPEG. We verified the
        This article is a behind-the-scenes account of how we achieved   ELA (Error Level Analysis), the noise map, PCA (Principal Component
        the acquittal, what forensic strategies we used, and what   Analysis) and cloning detection, where we discovered, among many
        lessons fellow detectives and investigators should draw in this   other things, inconsistencies in the timestamp of the call that were not
        new era where AI can now manufacture “truth.”       compatible with the official call detail records provided by the phone
                                                            company.
        The Case: A Call Log and a Voice Message            This  provided not  only technical proof of manipulation,  but  a  forensic

        The core of the accusation relied on two pieces of evidence:  roadmap for how to challenge digital evidence that  lacks chain  of
                                                            custody and original device access.
        1. 2 screenshots showing a received call log from an unknown
          number with a U.S. area code, which was later confirmed to
          belong to Twilio—a platform known for hosting automated   Step 2: Proving the Voice Was Cloned
          communications.
                                                            The  second  piece  of  evidence  was  the  audio  clip  in  which  the  phrase
        2. An audio file in which the phrase “Keishla, Keishla” was   “Keishla, Keishla” was repeated on three different occasions
          repeated on three different occasions throughout the   throughout the 1-minute and 17-second audio recording. Though short, it
          1-minute  and  17-second  audio  recording, referring to the   was presented as a direct and intentional violation of the protective order.
          name of the new girlfriend.                       I brought in Lyanne Flores Báez, a certified forensic expert in acoustics
                                                            and phonetics, who is part of my investigative office and works under my
        There were no texts, no video—only this combination of a visual   direct supervision. Together, we conducted a detailed forensic analysis of
        call log and a short voice snippet. Both the ex-husband and his   the recording.
        new partner claimed under oath that the voice in the audio
        belonged to Elizabeth.                              Using advanced tools to analyze spectrograms, frequency distribution,
                                                            waveform behavior, and biometric vocal signatures, we identified
        However, upon thorough analysis and reconstruction of the   significant anomalies:
        timeline, we demonstrated that there had been no active 3-way     No breathing sounds
        call on the day and time the audio was allegedly received. Our     Abrupt transitions in tone
        sequence analysis proved that the complainant was never part
        of a conference call during that period, contradicting their claim     Unnatural pacing and pitch
        and raising serious doubt about the authenticity of the entire     Irregularities in formants and in the fundamental frequency, both of
        event.                                                which were anomalous and inconsistent with natural human speech

     22        W.A.D Beyond Global
   19   20   21   22   23   24   25   26   27   28   29