Yes, you heard correctly – we’re here with yet another update! We’ve added some highly sought-after features to Amped DVRConv, the fastest and easiest way to convert proprietary video formats.
Settings Lock Down Option
Sometimes system administrators need to lock down the settings of Amped DVRConv in order to avoid having users modify the settings accidentally, which could disrupt the workflow of the lab; for example setting a conversion to transcode instead of stream copy. Now it is possible to protect these settings, allowing only system administrators to modify them!
Some of the new simplicities
afforded to us can, unfortunately,
cloud ones’ judgement when
dealing with images and video for
Technology has, in most parts, made things incredibly easy. Take the example of photographs and video. We all now love to quickly snap a memory or record some footage of an event. We can adjust the colour or light, crop out unwanted parts, or trim the end of a video. It’s then a simple click on the share button to immediately have that sent to friends or family via a messaging app or social media.
Some of the new simplicities afforded to us can, unfortunately, cloud ones’ judgement when dealing with images and video for legal use. Why do it one way, when it’s so much easier to do it another, perhaps quicker way?
In late 2016, at the conclusion of a
trial in Nottingham Crown Court,
for four men involved in the murder
of Aqib Mazhar, Judge Rafferty
stated, “there must never be
another case in this country where
those analysing CCTV don’t have
the best equipment.”
The quote stems from the fact that
it wasn’t until the trial had started
that video material was properly
reviewed and that significantly
changed the weight of the evidence.
Whether it is CCTV evidence, mobile phone video or a sequence of images, the software used to review that evidence can alter the viewer’s interpretation. It could be that the player drops or misses frames. The player could present the video too dark, or too light. The player could change the shape and size of the image or video, resulting in objects appearing smaller or larger. Many surveillance system players alter the image to make it look better, even though that is not what was originally recorded – scary, but true.
In 2015, a conviction of Indecent Assault was overturned at the Court of Appeal. Mr Mohammed Islam was earlier convicted at Flintshire Magistrates Court, where a CCTV image of a vehicle, alleged to be his, was used as evidence. After analysis and enhancement, it was proved not to be his vehicle and his conviction quashed. Mr Islam’s lawyer, Adam Antoszkiw, later stated the crucial evidence was not properly examined because of financial constraints.
Multimedia evidence, especially CCTV or low-quality mobile phone footage must be handled with care.
We’ve released another update for Amped DVRConv, one of the fastest ways to cleanly convert video. It is also the simplest; a clean installation tool that allows anyone who works with digital video to drag and drop proprietary video evidence in order to achieve a standard playable file – cutting out the hours, or even days, it takes to locate a proprietary player. Drag and drop – it’s that easy! With DVRConv, alongside Amped FIVE and Amped Authenticate, your workflow from scene to laboratory is completely covered and together they provide great weapons in your forensic video and image analysis arsenal!
Let’s say you regularly process video evidence and, like a lot of technicians and analysts, you are tasked with retrieving video from a scene at a location other than your lab or office. Retrieving CCTV from DVRs at scene can often be laborious, fraught with difficulty and a lot of the time the scenes are a fair distance away from your usual office. One of the most important steps during the recovery of CCTV evidence is checking to see if the download has been successful, which means playback of what is more likely to be proprietary video at scene using only a laptop and your recovery tools.
Saving time at a video recovery scene is crucial and it’s a nightmare having to trawl through hundreds of proprietary players, some of which won’t work on your current operating system or might have different versions of the same type of player. The conversion engine in Amped FIVE would be ideal, but you want something more portable to add to the tools on your retrieval laptop. This is where DVRConv steps in to quickly convert and playback your downloaded files in an easily customisable and cleanly installed package!
Utilising exactly the same conversion engine as FIVE but with twice the portability, you can not only playback and confirm your video files at scene, but have them ready for clarification and enhancement in FIVE for when you return to the office or lab. Logs are provided for disclosure and the original files are left untouched, maintaining the continuity of your video evidence from the beginning.
In our most recent update of Amped DVRConv, we added the ability to separate the audio and video streams in your DME files – to save the audio as a separate file. For some, this functionality went unnoticed. For others, it was a huge deal.
Two very specific use cases required this functionality. You asked. We delivered.
Case #1 – Child Exploitation/Human Trafficking
Agencies responsible for investigating cases of child exploitation/human trafficking were spending a lot of time redacting video files (blurring faces and other sensitive information) in order to send files off for audio transcription. The distribution of files in child exploitation cases (files that can be considered child pornography) for transcription is now made a lot easier with DVRConv. All of the evidentiary videos can be loaded into the tool and processed without having to view the footage. DVRConv helps to dramatically speed up the process of getting files to transcription whilst protecting identities and shielding staff from the harmful psychological and legal effects of viewing/distributing such material.
Case #2 – Police Generated Video
Agencies that have deployed body worn/vehicle-based cameras or have interview room recorders often have to send the resulting video files to outside companies for transcription. Like the case above, they are faced with having to redact the visual information prior to releasing the files to their contractor. Even if the agency has chosen a CJIS compliant transcription contractor, they may have agency policies that require the redaction of the visual information prior to release. DVRConv eliminates the need to perform a visual redaction ahead of such a release of files. Having this ability is already saving agencies a tremendous amount of time/money.
Users of DVRConv do not require specialized training. The tool can be used by anyone. It’s drag-drop easy. Plus, the settings can be configured so that the resulting audio file meets the requirements of your transcription vendor.
If you’d like to know more about Amped DVRConv, or any of our other Amped Software products and training options, contact us today.
Today we released an update to Amped DVRConv, the easiest way to convert videos from proprietary DVR formats.
We have been working on this update for some time and a few users have received beta updates in order to support formats that were urgently required. During this period we have re-engineered a good part of the architecture to improve stability, speed and format compatibility.
A crime occurs and is “witnessed” by a digital CCTV system. The files that your investigation wants/needs are in the system’s recording device (DVR). What do you do to get them? Do you seize the entire DVR as evidence (“bag and tag”)? Do you try to access the recorder through its user interface and download/export/save the files to USB stick/drive or other removable media?
Answer: it depends.
There are times when you’d want to seize the DVR. Perhaps 5% of cases will present a situation where having the DVR in the lab is necessary:
Arsons/fires can turn a DVR into a bunch of melted down parts. You’re obviously not going to power up a melted DVR.
An analysis that tests how the DVR performs and creates files. For example, does the frame timing represent the actual elapsed time or how the DVR fit that time into its container? Such tests of reliability will require access to the DVR throughout the legal process.
Content analysis questions where there’s a difference of opinion between object/artifact. For example, is it a white sticker on the back of a car or an artifact of compression (random bit of noise)?
If you’re taking a DVR from a location, you can follow the guidance of the computer forensics world on handling the DVR (which is a computer) and properly removing it from the scene.
We work in the field of forensic video analysis, which is generally intended as the analysis of the images themselves and their context in a legal setting. For this reason, our customers often ask us if our products are valid for court use and if they have been validated and certified. We have written this post as an answer to the most common questions related to this topic.
You can also download this as a PDF document here.
What are the scientific foundations of Amped Software products?
All the processes implemented in our software follow the principles of scientific methodology. Any process follows these basic principles:
Accuracy (Reliability): our tools and training program help users avoid processing errors caused by the implementation of an inappropriate tool or workflow and help mitigate the impact of human factors / bias.
Repeatability: the same process, executed by the same user at a different time, must lead to the same result. The project format in Amped FIVE, for example, does not save any image data. Every time a project is reopened, all the processing happens again starting from the original data. In the event that a project file is lost or as a part of a validation or other test scenario, the same user can repeat the steps and settings, guided by the tool’s report, and achieve the same results.
Reproducibility: another user with the proper competency, should be able to reproduce the same results. Amped FIVE generates a complete report detailing all the steps of the processing, the settings / parameters applied, a description of the algorithms employed in the processing and the scientific references for those algorithms (when applicable). In this way, another user, with a different tool set or by implementing the same algorithms, should be able to reproduce the same results. Given the huge number of implementation details and possible differences, it is not expected to produce a bit by bit copy of the results, but only to produce an image of similar informative content.
Additionally, we apply strict due diligence on the applicability of the algorithms for the forensic environment. Not every algorithm is, in fact, properly applicable in a forensic science setting. We cannot use algorithms which have a random component because they would not be reproducible and repeatable (when we do, we set a fixed seed for the random number generation) and we cannot use algorithms which “add” external data to the original, for example improving the quality of a face with information added from an average face. All information is derived from the actual evidence file.
We employ algorithms which have been validated by the scientific community through peer review, such as university textbooks, scientific publications, or conference papers. If for some specific task, there are not good enough algorithms available or we need to adapt existing algorithms, we describe the algorithm and attempt to publish them in scientific journals. Continue reading →
When a driver wraps his car around a tree, the damage is likely rather obvious. Same again for a head-on collision at high speed. There’s not much car left to repair, so the insurance companies will likely pay out on the policy.
But in today’s app-driven world, minor dents and scratches are now being handled by the policy holder through the use of mobile device apps. Simply snap a picture or video of the damage and upload it to the insurance company. Claims are processed the same day and your money arrives quickly. Folks love this mobile claims processing functionality so much that insurance companies are featuring their time-saving apps in their advertising.
Whilst customers love this convenience, so do crooks. It turns out that fraudsters are using photo editing software to create fake photo evidence in support of bogus claims. This type of activity affects all policy holders as losses are spread out across all customers, keeping rates higher than they should be in a fraud-free world.
Enter Amped Software.
Without naming names (I don’t want to ruin the fraud-catchers’ fun), our software is being employed as both a risk management function (catching fraud), as well as to assist claims processors when folks turn in proprietary CCTV files in support of claims. Continue reading →
Simplicity, speed, and forensic integrity all come together in Amped’s latest software, providing law enforcement and digital forensic labs with a quick and easy stand-alone solution to the challenge of video conversion.
It’s been a few months since its release, so hopefully by now, you will have seen the blog posts and press releases regarding Amped DVRConv. It is a very easy program to use…it really is. You tell the application that you have a video file that you cannot play, the software analyzes the file and format, and then it gives you a video file that you can play in any standard playback software, along with the conversion log for full disclosure.
How do you tell it? That’s easy as well. You either use drag and drop, copy and paste, or even have it ‘watch’ a specific folder and then convert immediately.
Customers often ask us about the hardware requirements for our products before purchasing. While we have some recommendation, the reality is that many of our customers use Amped FIVE (or our other products) on unbelievably old computers. Sure, Amped FIVE would be slower, but for working on low-resolution CCTV videos, even a 10-year-old PC with Windows XP (not recommended!) still works mostly fine.
I recently taught one of our courses at a customer’s premises. Since the class was quite full and they didn’t have enough recent laptops to bring into the training room, about half of the students had pretty old laptops. During the training, we normally provide the software installer and training examples on USB drives. Some people claimed that their PC was not able to see the drive. We figured out that they were using Windows XP SP2, they were not connected to the Internet and had not updated in ages. Continue reading →