Dear Amped blog readers, welcome to this week’s tip! Today we’re dedicating some room to a simple yet very effective trick that can make Amped Authenticate reports more comprehensive and clear. We’ll see how we can effectively add screenshots to our project and comment on them, in such a way that they appear in the report helping to build up the story. Keep reading to find out more…Continue reading
Dear friends, welcome to this Tip Tuesday! It’s a rather anomalous one, indeed, since we’ll not show any trick about using a specific Amped solution as usual. But we’ll still provide you with a very good tip: we’ll guide you through some of the freely available datasets you can find online, that you can use to test and validate our Amped FIVE, Amped Authenticate, Amped Replay, and Amped DVRConv. Yes, you’ve read correctly! There is lots of data out there that you can use to make your own experiments and increase your confidence in our software reliability. Keep reading to find out.Continue reading
Dear Amped blog readers, welcome! This week’s tip is dedicated to a rather hidden feature of Amped Authenticate: the possibility to use TSV (Tab-Separated Values) as the output format for the Smart Report and Batch Processing tools, instead of the classical HTML format. All those thinking “why should we even care?!”, raise your hands! I see many of you! Keep reading to find out why this feature could be way more important than you think.Continue reading
When we talk about Amped Authenticate, you may automatically think of its use in detecting forged and manipulated images such as those created using editing software to portray a different scenario or message from that of the original purpose of the image, and you’re certainly right about that (particularly in the age of the ever-prevalent ‘fake news’). The great thing about Amped Authenticate is that it’s also so much more on top of forgery detection – identify image processing history from capture to publish, extract images from documents, provide camera ballistics, but, in my view most importantly, add more weight to your child sexual exploitation, or CSE, investigations with all these tools and ultimately safeguard vulnerable children.
I always think of Authenticate as the tool I wish I’d had during my time examining mobile devices and computers, now realizing its potential to further solidify my cases and digital evidence, least of all because of the seamless integration with Griffeye Analyze. As digital forensics investigators, the majority of our work involves CSE material and recovering evidence from a multitude of devices to prove or disprove the offense in question, and the more evidence we can provide the more likely we are to achieve a successful prosecution or clear an innocent party – we keep an open and unbiased mind as forensics professionals, as always.
The PRNU, or photo response non-uniformity (also known as camera ballistics), capabilities of Authenticate are often under-utilized by law enforcement digital forensics professionals – I admit, I didn’t realize it had such a tool and how useful it could be in my work at the start of my career! Let’s take a safeguarding investigation as an example, often unpleasant cases in which a child has been exploited. We know law enforcement and governments around the world have similar methods of tracking illegal images and videos, usually through databases, in order to identify such material quickly and to avoid unnecessary exposure of traumatic material to investigators, but these safeguarding cases often involve newly generated images, not stored in any database.Continue reading
Dear friends, thanks for coming here for this week’s Tip Tuesday! Today we are dealing with a basic feature of Amped Authenticate that often gets overlooked during our training courses, but it really shouldn’t be. I’m talking about the possibility of adjusting levels to get a better Visual Inspection of your evidence image. Keep reading and you’ll see how it can be useful.Continue reading
Dear Tip Tuesday aficionados, welcome to this brand new tip! Today we’re dealing with Amped Authenticate, the most complete software for image integrity and authenticity analysis you can find out there. If you installed the latest, recent update, you may have noticed that a lot of new features were added. But there’s one thing we worked on a whole lot and we really don’t want you to miss: the totally renewed and enriched Samples Folder. This tip will show you why that folder is definitely worth a look.Continue reading
Welcome, dear Amped blog friends! This week’s tip is dedicated to Amped Authenticate‘s Camera Identification filter, which received important upgrades with the last software release! Today we’ll see how you can check images against multiple cameras in batch, saving a lot of time!
Camera Identification is one of the core features in Amped Authenticate: it has been present since the beginning and, not surprisingly, it has always attracted our users’ attention. In fact, the possibility to link an image to the exact device that captured it has a dramatic impact on investigations (e.g., it may help to prove that a child abuse picture was generated by the device found in the suspect’s home).Continue reading
Dear Amped blog fellows, welcome to a brand new Tip Tuesday! When you need to check the integrity of an image, nothing is better than having a reference picture to compare with. Unfortunately, it is common not to have it! That’s why Amped Authenticate lets you search for images from the same device model on the web. Keep reading to find out how!Continue reading
Dear Tip Tuesday friends, welcome! A few weeks ago, we dedicated a Tip to explain why you may find many different datetimes in modern images’ metadata when working with Amped Authenticate, and what those values mean. Today, we’ll focus on how you can cross-check the time information in your image, both working in Authenticate alone, and using external tools on the Internet!Continue reading
The extra-hot summer we’ve had in Italy didn’t stop our dev team! So here we are again this week with another release, this time for Amped Authenticate, maybe just in time for you to try it before your summer holidays!
Projects and Report
We are proud to introduce this widely requested feature: you have now the ability to bookmark results, add comments, organize bookmarks in folders, and finally generate a fully-detailed Report for your case. Below is how Authenticate’s new interface will look like at the end of an image investigation:Continue reading