Category Archives: How to Amped Authenticate

Where Are You From? Learn How to Investigate Which Camera Model Took an Image Using Exif Metadata and JPEG Quantization Tables

Welcome, dear Amped blog maniacs! Digital image forensics people have a bittersweet relationship with metadata. We love them… but can we trust them? Today’s tip is about how you can cross-check Exif information about the camera model that allegedly created your evidence image. We’ll see that Amped Authenticate‘s JPEG Quantization Tables is a great resource for that, making your integrity verification far more reliable. Keep reading to find out more.

Continue reading

Tired of Clicking? Learn How to Use Amped Authenticate’s Command Line Interface to Quickly Analyze or Triage Lots of Images!

Happy New Year dear blog friends! Welcome to the first tip of 2020! Today we’re showing you a rather hidden functionality of Amped Authenticate: the possibility of loading and processing images using the command line interface! It’s something that comes pretty handy when you have to deal with a lot of files and want to save hundreds of clicks… keep reading to find out more!

Continue reading

Long Story Short: Learn How to Quickly Include Screenshots of Maps, Documents and More in Your Amped Authenticate Reports!

Dear Amped blog readers, welcome to this week’s tip! Today we’re dedicating some room to a simple yet very effective trick that can make Amped Authenticate reports more comprehensive and clear. We’ll see how we can effectively add screenshots to our project and comment on them, in such a way that they appear in the report helping to build up the story. Keep reading to find out more…

Continue reading

Feed The Machine! Learn How to Easily Generate Computer-Processable Results With Amped Authenticate

Dear Amped blog readers, welcome! This week’s tip is dedicated to a rather hidden feature of Amped Authenticate: the possibility to use TSV (Tab-Separated Values) as the output format for the Smart Report and Batch Processing tools, instead of the classical HTML format. All those thinking “why should we even care?!”, raise your hands! I see many of you! Keep reading to find out why this feature could be way more important than you think.

Continue reading

The Power of Amped Authenticate for Investigating CSE Cases

When we talk about Amped Authenticate, you may automatically think of its use in detecting forged and manipulated images such as those created using editing software to portray a different scenario or message from that of the original purpose of the image, and you’re certainly right about that (particularly in the age of the ever-prevalent ‘fake news’). The great thing about Amped Authenticate is that it’s also so much more on top of forgery detection – identify image processing history from capture to publish, extract images from documents, provide camera ballistics, but, in my view most importantly, add more weight to your child sexual exploitation, or CSE, investigations with all these tools  and ultimately safeguard vulnerable children.

I always think of Authenticate as the tool I wish I’d had during my time examining mobile devices and computers, now realizing its potential to further solidify my cases and digital evidence, least of all because of the seamless integration with Griffeye Analyze. As digital forensics investigators, the majority of our work involves CSE material and recovering evidence from a multitude of devices to prove or disprove the offense in question, and the more evidence we can provide the more likely we are to achieve a successful prosecution or clear an innocent party – we keep an open and unbiased mind as forensics professionals, as always. 

The PRNU, or photo response non-uniformity (also known as camera ballistics), capabilities of Authenticate are often under-utilized by law enforcement digital forensics professionals – I admit, I didn’t realize it had such a tool and how useful it could be in my work at the start of my career! Let’s take a safeguarding investigation as an example, often unpleasant cases in which a child has been exploited. We know law enforcement and governments around the world have similar methods of tracking illegal images and videos, usually through databases, in order to identify such material quickly and to avoid unnecessary exposure of traumatic material to investigators, but these safeguarding cases often involve newly generated images, not stored in any database.

Continue reading

First Things First: Learn How a Proper Visual Inspection Can Guide Your Image Authentication on the Right Path!

Dear friends, thanks for coming here for this week’s Tip Tuesday! Today we are dealing with a basic feature of Amped Authenticate that often gets overlooked during our training courses, but it really shouldn’t be. I’m talking about the possibility of adjusting levels to get a better Visual Inspection of your evidence image. Keep reading and you’ll see how it can be useful.

Continue reading

Learning by Examples: You Have a Treasure in Your Amped Authenticate’s Samples Folder, Learn How to Make the Most of It

Dear Tip Tuesday aficionados, welcome to this brand new tip! Today we’re dealing with Amped Authenticate, the most complete software for image integrity and authenticity analysis you can find out there. If you installed the latest, recent update, you may have noticed that a lot of new features were added. But there’s one thing we worked on a whole lot and we really don’t want you to miss: the totally renewed and enriched Samples Folder. This tip will show you why that folder is definitely worth a look.

Continue reading

Check Them All! Learn How to Run Camera Identification Against Multiple Reference Devices in Batch with Amped Authenticate

Welcome, dear Amped blog friends! This week’s tip is dedicated to Amped Authenticate‘s Camera Identification filter, which received important upgrades with the last software release! Today we’ll see how you can check images against multiple cameras in batch, saving a lot of time!

Camera Identification is one of the core features in Amped Authenticate: it has been present since the beginning and, not surprisingly, it has always attracted our users’ attention. In fact, the possibility to link an image to the exact device that captured it has a dramatic impact on investigations (e.g., it may help to prove that a child abuse picture was generated by the device found in the suspect’s home).

Continue reading

Bet on the Net! Amped Authenticate Allows Searching for Reference Images on the Web for Better Integrity Analysis

Dear Amped blog fellows, welcome to a brand new Tip Tuesday! When you need to check the integrity of an image, nothing is better than having a reference picture to compare with. Unfortunately, it is common not to have it! That’s why Amped Authenticate lets you search for images from the same device model on the web. Keep reading to find out how!

Continue reading

No Need to Believe: How to Verify the Reliability of Time and Place Information in a Picture Using Amped Authenticate, Your Eyes, and the World Wide Web!

Dear Tip Tuesday friends, welcome! A few weeks ago, we dedicated a Tip to explain why you may find many different datetimes in modern images’ metadata when working with Amped Authenticate, and what those values mean. Today, we’ll focus on how you can cross-check the time information in your image, both working in Authenticate alone, and using external tools on the Internet!

Continue reading