I’ve been on the road a lot lately. By the end of this month, I’ll have spent two weeks with District Attorney’s Offices in New Jersey (US) training users in the many uses of Amped’s flagship product, Amped FIVE. Every user has a slightly different use case and needs. Prosecutors’ Offices are no different.
Field personnel / crime scene technicians / analysts might not be very concerned with trail prep and the creation of demonstratives for court. But, DA’s offices are. That being said, there are a few things that every user of Amped FIVE can do – beginning with the end in mind – to make the trial prep job a bit easier.
Hopefully, by now you know that you can rename processing chains in Amped FIVE to aid in your organization.
Right click on the Chain and select Rename Chain. Then, name it something unique that describes what you’re working with or the question you’re trying to answer in the file. Examples include camera number, vehicle determination, license plate determination, etc.
This is quite helpful. But, did you know that you can also rename the Bookmarks? Additionally, you can add a description to the bookmark. Let’s see what this looks like.
There were a couple of interesting discussions this week which prompted me to write this blog post. One is related to the scientific methods used during the analysis of images and videos, the other relates to the tools used.
There was a pretty interesting and detailed conversation that happened on an industry specific mailing list where a few experts debated about the scientific and forensic acceptability of different methodologies. This discussion began with the reliability of speed determination from CCTV video but then evolved into a more general discussion.
There are two extreme approaches to how forensic video analysts work: let’s call one group the cowboys and the other the bureaucrats. I’ve seen both kinds of “experts” in my career, and – luckily – many different variations across this broad spectrum.
What is a cowboy? A cowboy is an analyst driven only by the immediate result, with no concern at all for the proper forensic procedure, the reliability of his methods and proper error estimation. Typical things the cowboy does:
- To convert a proprietary video, he just does a screen capture maximizing the player on the screen, without being concerned about missing or duplicated frames.
- Instead of analyzing the video and identify the issues to correct, he just adds filters randomly and tweaks the parameters by eye without any scientific methodology behind it.
- He uses whatever tool may be needed for the job, recompressing images and videos multiple times, using a mix of open source, free tools, commercial tools, plugins, more or less legitimate stuff, maybe some Matlab or Python script if he has the technical knowledge.
- He will use whatever result “looks good” without questioning its validity or reliability.
- If asked to document and repeat his work in detail he’ll be in deep trouble.
- If asked the reason and validity of choosing a specific algorithm or procedure, he will say “I’ve always done it like this, and nobody ever complained”.
- When asked to improve a license plate he will spell out the digits even if they are barely recognizable on a single P frame and probably are just the result of compression artifacts amplified by postprocessing.
- When asked to identify a person, he will be able to do so with absolute certainty even when comparing a low-quality CCTV snapshot with a mugshot sent by fax.
- When sending around results to colleagues he just pastes processed snapshots into Word documents.
- When asked to authenticate an image, he just checks if the Camera Make and Model is present in the metadata.
David Spreadborough, international trainer at Amped Software, and a regular expert witness in criminal investigations, charts the technical history of bringing CCTV images to court and provides an insight into the challenges associated with preparing surveillance images as evidence.
Read the article published on IFSEC Global
Here we are again with another Amped FIVE update, full of user enhancements and product refinements, designed to help you in your analysis and forensic reporting.
Before we dive in, it’s worth saying that, here at Amped we strive to provide you with the very best product for image and video analysis, and enhancement. If you want our software to do something that it doesn’t do, just let us know. Many of the new functions in this update come directly from user feedback and requests.
Genetec File Support
Genetec is the latest surveillance system manufacturer to allow integration between the export format and forensic analysis.
Currently utilizing the .G64 and .G64X file extensions, most Genetec exports can now either be reformatted using the original H264 encoding or, when this is not possible due to the export type, transcoded into .ASF to aid in initial analysis and preview.
When you load a Genetec export into Amped FIVE, either using the loader or drag and drop, the Direct Play dialogue box will appear.
After selecting ‘Yes’ to attempt conversion, ensure that ‘Copy Stream if possible, or else Transcode’ is selected in Convert DVR.
The file will then be scanned and either reformatted or transcoded if required.
There is a new configuration tab specifically for Genetec G64 and G64X files.
A crime occurs and is “witnessed” by a digital CCTV system. The files that your investigation wants/needs are in the system’s recording device (DVR). What do you do to get them? Do you seize the entire DVR as evidence (“bag and tag”)? Do you try to access the recorder through its user interface and download/export/save the files to USB stick/drive or other removable media?
Answer: it depends.
There are times when you’d want to seize the DVR. Perhaps 5% of cases will present a situation where having the DVR in the lab is necessary:
- Arsons/fires can turn a DVR into a bunch of melted down parts. You’re obviously not going to power up a melted DVR.
- An analysis that tests how the DVR performs and creates files. For example, does the frame timing represent the actual elapsed time or how the DVR fit that time into its container? Such tests of reliability will require access to the DVR throughout the legal process.
- Content analysis questions where there’s a difference of opinion between object/artifact. For example, is it a white sticker on the back of a car or an artifact of compression (random bit of noise)?
If you’re taking a DVR from a location, you can follow the guidance of the computer forensics world on handling the DVR (which is a computer) and properly removing it from the scene.
People often ask, “How can we speed up the processing of files in Amped FIVE ?” (As if it’s not fast enough :). “Can we create actions/templates?” The answer is yes. Here’s how.
Load a video file. In this case, we’ll load a BWC file from an Axon Body 2 camera.
Then, we’ll rename the processing chain. Right mouse click on the processing chain – Rename Chain.
Otherwise known as ‘The Science of Single View Metrology’
The first common question asked to a forensic video analyst is, “Can you tell me what that license plate is?”. The second question is, “What is the height of that person?”.
It is then the forensic video analyst’s responsibility to analyze the video, assess its suitability to answer the question, process and prepare the images, and then finally use science to provide the answer, based on facts.
Taking a ‘workflow’ approach can often safeguard the user from missing vital information that may be relevant further along in the process.
There are a few different methods to attempt an answer to this height question, with different constraints, reliability, and drawbacks. In this post I will be taking an in-depth look at the technique built into Amped FIVE, using the filter Measure 3d.
What’s wrong with this video? Hint: look at the Inspector’s results for width / height.
Unfortunately, the answer in many people’s minds is …. nothing. I can’t begin to count the number of videos and images in BOLOs that attempt to depict a scene that looks quite like the one above. If you don’t know what you’re looking at, it’s hard to say what’s actually wrong with this video.
You may remember the announcement of our partnership with Griffeye, some months ago. This partnership is especially interesting since we both work on images and videos, but in a different, yet complementary way. Griffeye focuses on finding the needle in a haystack, while Amped focuses on sharpening the needle and verifying it is actually a needle and not a stick.
In the latest release of Griffeye Analyze, the Amped FIVE plugin has been added to the Analyze Forensic Market, but in the near future we plan to also add apps for Amped Authenticate and Amped DVRConv. In this post, we will show you how to start with the integration and how the two software work together.
First of all, we assume that you have installed Amped FIVE (build 9010 or later) and Griffeye Analyze (17.1.0 or later) on the same machine.
In order to enable the integration, you need to click on the button “Analyze Forensic Market”.
I’ve had a few questions about our tool’s reporting feature, so I thought a blog post would help explain and illustrate the philosophy behind our report creation process. Here it goes.
To understand why we format our reports in the way that we do, you must first understand the legal and regulatory environment in which forensic analysis exists in much of the world. We don’t just create tools in a vacuum. We didn’t make a tool for another industry and repurpose it for forensic science. Amped FIVE is purpose built for the forensic analysis of video and images.
Thus, we’ll start our tour at the ASTM. ASTM’s E2825-12 is at the heart of why our reports are formatted as they are.
More specifically, in Section 4 of E2825-12 it notes the following:
4.2.1 – Processing steps are documented in a manner sufficient to permit a comparably trained person to understand the steps taken, the techniques used, and …
Amped FIVE’s reports are created to satisfy this guidance – every time, automatically.