{"id":74,"date":"2026-02-01T00:00:53","date_gmt":"2026-02-01T00:00:53","guid":{"rendered":"https:\/\/wp.lancs.ac.uk\/botornot\/?page_id=74"},"modified":"2026-02-22T12:16:03","modified_gmt":"2026-02-22T12:16:03","slug":"fort-vox","status":"publish","type":"page","link":"https:\/\/wp.lancs.ac.uk\/botornot\/extras\/fort-vox\/","title":{"rendered":"Fort Vox"},"content":{"rendered":"<p>What if you could break into the contents of a locked box with only the power of your voice? If that seems a little farfetched, the reality is that many security systems use \u201cvoice biometrics\u201d \u2013 the sound of a person\u2019s voice \u2013 as a key to unlock valuable content, including our money, healthcare records, and billing accounts. Some banks, for instance, authenticate a caller\u2019s identity by comparing them saying, \u201cMy voice is my password\u201d to a version they hold on file. If the two samples match well enough, the individual passes that verification task, and may even be granted full access to the account. But in this age of deepfakes and voice clones, should we be relying on these kinds of systems? How robust are they? And when is it too soon to start thinking about AI, security, and privacy?<\/p>\n<p><iframe loading=\"lazy\" title=\"Fort VOX: A Raspberry Pi Voice Locked Box You Can Try to Hack\" width=\"676\" height=\"380\" src=\"https:\/\/www.youtube.com\/embed\/HnVyIX9bDVc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>That\u2019s the magic of\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=HnVyIX9bDVc\" target=\"_blank\" rel=\"noopener noreferrer\">Fort Vox<\/a>, a playful new prototype developed through a collaboration between\u00a0<a href=\"https:\/\/www.lancaster.ac.uk\/scc\/about-us\/people\/lorraine-underwood\" target=\"_blank\" rel=\"noopener noreferrer\">Dr Lorraine Underwood<\/a>\u00a0and\u00a0<a href=\"https:\/\/community.element14.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">element14<\/a>\u00a0on the one hand, and FACTOR\u2019s forensic linguist,\u00a0<a href=\"https:\/\/www.lancaster.ac.uk\/social-sciences\/people\/claire-hardaker\" target=\"_blank\" rel=\"noopener noreferrer\">Professor Claire Hardaker<\/a>\u00a0and forensic speech scientist,\u00a0<a href=\"https:\/\/www.lancaster.ac.uk\/social-sciences\/people\/georgina-brown\" target=\"_blank\" rel=\"noopener noreferrer\">Dr George Brown<\/a>\u00a0on the other.<\/p>\n<p>Fort Vox is small, clever, and deliberately designed to get children and young people excited about how voices, technology, and security\u00a0<em>really<\/em>\u00a0work. Players are presented with a physical box that can only be unlocked by mimicking the voice password well enough. Like an inverse escape room, the prize is quite literally inside, and to get to it, players have to listen carefully, think critically, and experiment with different approaches until they\u2019re able to bypass the voice recognition system. This encourages children to think about ideas that usually sit firmly in the grown-up world: how AI systems make decisions, how data like speech are analysed, and why privacy and security matter when our voices are used as biometrics.<\/p>\n<p>Children are growing up in a swiftly evolving context of voice assistants and automated decision-making, and Fort Vox makes increasingly invisible technologies tangible. For teachers and parents, this aligns naturally with classroom discussions around computing, STEM, citizenship, and digital literacy. Playing doesn\u2019t require specialist knowledge, but for the more adventurous and technically minded,\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=HnVyIX9bDVc\" target=\"_blank\" rel=\"noopener noreferrer\">the video<\/a> and links provide a full set of instructions on how to build your own.<\/p>\n<div id=\"attachment_77\" style=\"width: 686px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_1-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-77\" class=\"wp-image-77 size-large\" src=\"http:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_1-1024x665.jpg\" alt=\"\" width=\"676\" height=\"439\" srcset=\"https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_1-1024x665.jpg 1024w, https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_1-300x195.jpg 300w, https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_1-768x499.jpg 768w, https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_1-1536x998.jpg 1536w, https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_1-2048x1330.jpg 2048w, https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_1-676x439.jpg 676w\" sizes=\"auto, (max-width: 676px) 100vw, 676px\" \/><\/a><p id=\"caption-attachment-77\" class=\"wp-caption-text\">Semi-transparent box, Raspberry Pi, button, screen, speaker, and the obligatory nest of wires&#8230;<\/p><\/div>\n<p>While Fort Vox is intentionally accessible, it also sits within a much bigger picture. The UK faces\u00a0<a href=\"https:\/\/www.gov.uk\/government\/publications\/cyber-security-skills-in-the-uk-labour-market-2025\/cyber-security-skills-in-the-uk-labour-market-2025\" target=\"_blank\" rel=\"noopener noreferrer\">a well-documented skills gap in cyber security, AI, and digital forensics<\/a>. The North West, with its growing concentration of universities, tech companies, and public-sector security partners, is increasingly recognised as a vital part of\u00a0<a href=\"https:\/\/www.gchq.gov.uk\/information\/nwpst\" target=\"_blank\" rel=\"noopener noreferrer\">the national cyber landscape<\/a>. Projects like Fort Vox help inspire and recruit to that future workforce long before university applications are on the table.<\/p>\n<p>By introducing children to speech technology, AI, and security concepts early \u2013 and in a way that\u2019s engaging rather than intimidating \u2013 Fort Vox contributes to a talent pipeline that starts with curiosity and leads, eventually, to skills that matter nationally. It reflects a broader commitment to developing expertise ethically and responsibly, with privacy and security baked in from the very beginning rather than bolted on later. At Lancaster University, FACTOR researchers working in forensic speech science, forensic linguistics, AI, and cyber security are deeply invested in that long game. Fort Vox speaks the same language: playful on the surface, serious underneath. However, none of this works without thoughtful design, and Fort Vox is a testament to what happens when creative technologists take education seriously.<\/p>\n<div id=\"attachment_78\" style=\"width: 686px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_2-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-78\" class=\"wp-image-78 size-large\" src=\"http:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_2-1024x665.jpg\" alt=\"\" width=\"676\" height=\"439\" srcset=\"https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_2-1024x665.jpg 1024w, https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_2-300x195.jpg 300w, https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_2-768x499.jpg 768w, https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_2-1536x998.jpg 1536w, https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_2-2048x1330.jpg 2048w, https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_2-676x439.jpg 676w\" sizes=\"auto, (max-width: 676px) 100vw, 676px\" \/><\/a><p id=\"caption-attachment-78\" class=\"wp-caption-text\">Critical component: the prize. (Capture the&#8230; Penguin?)<\/p><\/div>\n<p>Dr Lorraine Underwood and the team at element14 have created something that celebrates young people\u2019s intelligence, trusts them with complex ideas, and invites them to explore without fear of getting things \u201cwrong\u201d. That combination of technical rigour, creativity, and openness is exactly what the next generation of security and AI professionals will need.<\/p>\n<div id=\"attachment_81\" style=\"width: 686px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_0-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-81\" class=\"size-large wp-image-81\" src=\"http:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_0-1024x556.jpg\" alt=\"Dr Lorraine Underwood successfully unlocking Fort Vox\" width=\"676\" height=\"367\" srcset=\"https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_0-1024x556.jpg 1024w, https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_0-300x163.jpg 300w, https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_0-768x417.jpg 768w, https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_0-1536x834.jpg 1536w, https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_0-2048x1112.jpg 2048w, https:\/\/wp.lancs.ac.uk\/botornot\/files\/2026\/02\/fort_vox_0-676x367.jpg 676w\" sizes=\"auto, (max-width: 676px) 100vw, 676px\" \/><\/a><p id=\"caption-attachment-81\" class=\"wp-caption-text\">Dr Lorraine Underwood successfully capturing the Penguin<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>What if you could break into the contents of a locked box with only the power of your voice? If that seems a little farfetched, the reality is that many security systems use \u201cvoice biometrics\u201d \u2013 the sound of a person\u2019s voice \u2013 as a key to unlock valuable content, including our money, healthcare records, [&hellip;]<\/p>\n","protected":false},"author":77,"featured_media":81,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-74","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/wp.lancs.ac.uk\/botornot\/wp-json\/wp\/v2\/pages\/74","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.lancs.ac.uk\/botornot\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wp.lancs.ac.uk\/botornot\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wp.lancs.ac.uk\/botornot\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.lancs.ac.uk\/botornot\/wp-json\/wp\/v2\/comments?post=74"}],"version-history":[{"count":8,"href":"https:\/\/wp.lancs.ac.uk\/botornot\/wp-json\/wp\/v2\/pages\/74\/revisions"}],"predecessor-version":[{"id":132,"href":"https:\/\/wp.lancs.ac.uk\/botornot\/wp-json\/wp\/v2\/pages\/74\/revisions\/132"}],"up":[{"embeddable":true,"href":"https:\/\/wp.lancs.ac.uk\/botornot\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.lancs.ac.uk\/botornot\/wp-json\/wp\/v2\/media\/81"}],"wp:attachment":[{"href":"https:\/\/wp.lancs.ac.uk\/botornot\/wp-json\/wp\/v2\/media?parent=74"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}