Today we presented our products Amped FIVE and Amped Authenticate at the GTTI 2017 Thematic Meeting on Multimedia Signal Processing. The meeting gathered 50+ people from Italian universities and research labs. We got lots of attention and many hints that will help improve our products in the future – stay tuned!
AMPED Software at the DEMO session of the GTTI-MMSP meeting
Many of you will have seen the recent Amped Training schedule, detailing some of the training events at our HQ in Trieste, Italy, and also at the Henderson training facility in the USA.
As we mentioned, we also come to you… and this is important in a number of ways.
Forensic Video Analysis and the enhancement of Digital Images and Video, is a relatively small sector in Forensic Science. However, the input, (the amount of product being acquired), and the output, (the amount of images and video presented as evidence), is huge.
As a result, those people doing the job are very, very busy people… but if you are one of those people – you don’t need us to tell you that!
At Amped Software, we understand this. That’s why, whenever possible – we will come to you… wherever you are!
We provide complete hands-on training courses on the use of our products at our Amped Software Training Labs in Italy and in the USA. For some countries, we can also arrange for in-house training at your organization. The purpose of the Amped Software training is to:
- Provide students with the theory and the basics of image processing
- Understand different issues affecting images and videos in an investigative context
- Acquire an in-depth knowledge of all product features
- Work effectively on real cases and be able to testify on the results
Below is a list of some of the next scheduled classes. For more details and to register for any of these classes please click here.
January 24-26, 2017 / Henderson, NV, USA
Instructor: Jim Hoerricks
February 27-March 01, 2017 / Henderson, NV, USA
Instructor: Jim Hoerricks
March 02-03, 2017 / Henderson, NV, USA
Instructor: Jim Hoerricks
March 14-17, 2017 / Trieste, Italy
Instructor: Stefano Bianchi
March 27-29, 2017 / Garland (TX) Police Department, USA
Instructor: Jim Hoerricks Continue reading
When a driver wraps his car around a tree, the damage is likely rather obvious. Same again for a head-on collision at high speed. There’s not much car left to repair, so the insurance companies will likely pay out on the policy.
But in today’s app-driven world, minor dents and scratches are now being handled by the policy holder through the use of mobile device apps. Simply snap a picture or video of the damage and upload it to the insurance company. Claims are processed the same day and your money arrives quickly. Folks love this mobile claims processing functionality so much that insurance companies are featuring their time-saving apps in their advertising.
Whilst customers love this convenience, so do crooks. It turns out that fraudsters are using photo editing software to create fake photo evidence in support of bogus claims. This type of activity affects all policy holders as losses are spread out across all customers, keeping rates higher than they should be in a fraud-free world.
Enter Amped Software.
Without naming names (I don’t want to ruin the fraud-catchers’ fun), our software is being employed as both a risk management function (catching fraud), as well as to assist claims processors when folks turn in proprietary CCTV files in support of claims. Continue reading
Back in 2009, an article in the North Dakota Law Review noted the following about the use of drones by law enforcement, “The widespread use of Unmanned Aerial Vehicles (UAVs) and Unmanned Aerial Systems (UASs) in domestic law enforcement is imminent. Every police department, chief, and beat officer in the United States dreams of the ability to have eyes everywhere—a constant panoramic view of every angle in every precinct with the ability to instantly zoom in on suspicious behavior. That ability is available now. And it is on sale, cheap.“
That was 2009. We haven’t seen a surge in the use of drones by US law enforcement agencies. As the author noted at the time, “[t]he problem is regulatory uncertainty surrounding operations of UAVs in American airspace, and no one wants to be the guinea pig. The Federal Aviation Administration (FAA), tasked with ensuring the safe and orderly operation of aircraft, is regulating UAV operations of the kind that domestic law enforcement wants. The FAA has effectively stopped domestic law enforcement agencies from operating small UAVs in their operations without running afoul of FAA regulations for now.“
US Law Enforcement Agencies Using Drones
The market for dedicated UAVs and UASs hasn’t really materialized in the way that other equipment markets, like body worn cameras, has. In the absence of such a manufacturing segment, the few police agencies that have decided to deploy drones, like the Los Angeles Sheriff’s Department, are generally choosing to buy consumer-oriented models.
Simplicity, speed, and forensic integrity all come together in Amped’s latest software, providing law enforcement and digital forensic labs with a quick and easy stand-alone solution to the challenge of video conversion.
It’s been a few months since its release, so hopefully by now, you will have seen the blog posts and press releases regarding Amped DVRConv. It is a very easy program to use…it really is. You tell the application that you have a video file that you cannot play, the software analyzes the file and format, and then it gives you a video file that you can play in any standard playback software, along with the conversion log for full disclosure.
How do you tell it? That’s easy as well. You either use drag and drop, copy and paste, or even have it ‘watch’ a specific folder and then convert immediately.
A key amendment to US Federal Rules of Evidence 902, in the form of new subsection (14), will go into effect on December 1, 2017. The committee note on the proposed rule lists the following as the justification for the addition of subsection 14:
“The amendment sets forth a procedure by which parties can authenticate data copied from an electronic device, storage medium, or an electronic file, other than through the testimony of a foundation witness. As with the provisions on business records in Rules 902(11) and (12), the Committee has found that the expense and inconvenience of producing an authenticating witness for this evidence is often unnecessary. It is often the case that a party goes to the expense of producing an authentication witness, and then the adversary either stipulates authenticity before the witness is called or fails to challenge the authentication testimony once it is presented. The amendment provides a procedure in which the parties can determine in advance of trial whether a real challenge to authenticity will be made, and can then plan accordingly.
Today, data copied from electronic devices, storage media, and electronic files are ordinarily authenticated by “hash value.” A hash value is a unique alpha-numeric sequence of approximately 30 characters that an algorithm determines based upon the digital contents of a drive, media, or file. Thus, identical hash values for the original and copy reliably attest to the fact that they are exact duplicates. This amendment allows self-authentication by a certification of a qualified person that she checked the hash value of the proffered item and that it was identical to the original. The rule is flexible enough to allow certifications through processes other than comparison of hash value, including by other reliable means of identification provided by future technology.” Continue reading