When using an image as evidence during a court case, the point of view it represents acquires a resonance much stronger than the testimony of a witness. With video, this is even more true, as we may understand the dynamics even from the frames and any additional information which may be gleaned from the audio track.
Nowadays, there are many free and easy tools which can be used to modify pictures with ease, and thus the authentication of images is of paramount importance. But even more importantly, we need to understand how much data there is in an image, in addition to what we can already see.
Read the full article published in Lawyer Monthly.
Amped Authenticate Update 10641 introduced the new Social Media Identification filter. It can be found in the File Analysis filter group.
The filters in the File Analysis group are generally looking at the file’s container to return relevant information about the file. The Social Media Identification filter examines the file for traces of information that may indicate the file’s social media source. The key word here is “may.”
The workflow that I will explain here is typical in the US and Canada. Take from it what you need in order to apply it to your country’s legal system.
The science behind forensic image analysis is growing fast and constantly evolving. Even within the last 5 years, the ability to take a photo, manipulate it to tell a different story, and circulate the misinformation online has become infinitely easier. The advent of smartphones, convenient digital image manipulation software and easy dissemination of information are throwing up new challenges that investigators and forensic technicians must adapt to.
Unfortunately, it is too risky to simply take digital images at face value. Instead, we must ask and have the tools to query, such as “Where did the image or video originate from?”; “Who provided it and is there any reason they might have modified it?”; “Is it a camera-original?”; and “Do I believe this is a true and accurate representation of events?”
To give a practical example, back in the summer of 2017, two images featured prominently in the initial reporting of Hurricane Harvey. The first was of a shark swimming along the Houston freeway. The second showed several aeroplanes virtually underwater at what was claimed to be Houston airport. These iconic images were circulated widely on Twitter and were featured on mainstream national media such as Fox News. There was just one small problem. Neither situation had actually occurred!
If this behaviour is widespread on social and traditional media, then why shouldn’t we believe it is also impacting police and legal investigations? After all, if members of the public are prepared to manipulate images for the sake of a few likes and retweets, what will they be prepared to resort to when the stakes are much higher?
Read the full article published in eForensics Magazine.
The partnership between Amped Software and Griffeye keeps growing and so does the integration between Griffeye Analyze DI Pro and Amped Authenticate. Analyze DI Pro is a media investigation software for handling large volumes of images and videos, filter irrelevant digital files, prioritize, correlate and identify the most pertinent material in investigations. It will let you scan and import data from a device or from a folder on your workstation. Once the import is complete, you can easily browse and intelligently sort/filter media.
In this post, we’ll take a look at what Griffeye Analyze DI Pro enables you to do when linked with the Amped Authenticate plugins. Let’s create a case and import a folder containing a few JPEG files.
Analyze DI Pro lets you look at image metadata, and Amped Authenticate users know how interesting they are, but, we also know that a single image may contain hundreds of Exif metadata, and reading all of them is quite a boring job. Luckily, from the very same panel above we can call in Amped Authenticate File Format Analysis to automatically spot suspicious metadata. Once you installed Authenticate and the corresponding plugin in Analyze DI Pro, this is just as simple as right-clicking on one or all the images and then hit the “Plugin” voice and select “Amped Authenticate – File Format Analysis” from the pop-up list as shown below.