Skip to main content

Forensic Video Workflow with Amped FIVE – Part Two: Analysis of Video Evidence

Reading time: 6 min

Now, in the second episode, the analysis of video evidence: turn messy timestamps and inconsistent metadata into a timeline. Inside FIVE, we reconcile timings, inspect structure, and prepare clean clips that tell one story: the suspect’s movements, minute by minute.

forensic video workflow with Amped FIVE - part two: analysis of video evidence

Welcome back to this series in which we’re following a full Amped FIVE workflow as part of a case. If you missed part one, then be sure to check that out. To briefly summarise, I will be working on various types of digital media evidence to build a forensic video case from the initial steps to file analysis and through to presentation in response to a murder investigation. We have body worn video, dashcam footage, drone footage, mobile phone footage, CCTV footage and action camera footage.

We’ve already created our FIVE project and hashed our files, so we can verify them throughout if required. We’ve made sure to perform an initial review of the files so we can strategize any particular concerns or techniques.

Amped FIVE forensic video analysis interface displaying a frame from body-worn camera footage showing the back of a bald man’s head under a clear blue sky near tree foliage. The main viewer window centers the video, while the right-side Filter Settings – Video Loader panel details technical metadata such as source file path, video engine (FFMS with Audio), stream index, color range, and chroma upsampling settings. The History panel lists evidence items (MOVI0002, DJI_0014) with associated filters, including video loader, file info, and hash code verification. At the bottom, a waveform audio timeline displays sound amplitude peaks in red, with frame count, timestamps, and playback controls visible, supporting detailed forensic review and synchronization of audio-visual evidence.

Now, it’s time for the analysis step. Within this post, I’ll be looking at the files in depth and I’ll be showing you the following workflows:

  • File Analysis
  • Editing, Adjustments and Correcting Issues

Let’s dive right in, shall we?

File Analysis

As part of my file analysis, I’m first going to focus on timing since we don’t have reliable timestamps for a number of these video files.

Let’s start with the file “MOVI0002.mp4”, which is the covert police body worn video.

Body-worn camera footage captured by a police officer showing the upper part of a person’s face wearing sunglasses on the right side of the frame, with a background of tall, leafy trees under daylight. The timestamp "2025/08/10 19:41:08" is visible in the bottom left corner, indicating the recording time. The image is slightly angled upward, suggesting the camera is positioned on the officer’s chest or shoulder, providing a first-person perspective of the outdoor scene during an operation or patrol.

I’m already aware of the strange colour issue at the start of this file. This could be down to poor handling of light and exposure by the device (since the colours seem to stabilise further on in the file). However, I’m not too concerned about this and I tend to try and avoid commenting on colour due to it being so subjective and prone to interference.

What I am concerned about is the massive timestamp inaccuracy and what other timings we have available to us within the metadata, since I’ll need to be able to explain the discrepancy here. The file has a pixel-embedded timestamp showing “2025/06/10”, but we know the arrest actually happened on the 11th, the day after! We absolutely need to work out why and explain this, maybe even allowing for the education of our front-line officers on how to ensure the date and time are accurate, if possible.

We’ll use Advanced File Info for this, so let’s take a look at some of the file timings:

Screenshot of the 'Advanced File Info' panel for a video file named "MOVI0002.mp4" showing detailed metadata and technical information. The display includes data such as frame count (1371), stream size, data size (65993233), header and footer size, stream proportion, and whether the file is streamable. It also lists key timestamps like file creation date (2025-06-14 11:53:27 UTC), last modification date (2025-06-10 18:42:08 UTC), and tagged date (2002-10-29). At the bottom, there are options to save to log file, convert DVR, open in FIVE, or load the file. This detailed metadata view is commonly used in digital forensics and video evidence analysis.

… Wow. Ok, so there are a fair few issues here! The file creation date seems to make the most sense, since this would be the time the footage was downloaded from the camera following the arrest at 14:30 on 11th June. This timestamp includes the local time, which was an hour ahead of UTC at the time.

I’ve requested the device make and model for this type of covert camera and looked into how it works. I can see that the time and date are set via a text file stored on the SD card. This method of setting the time on the device seems to have caused all sorts of weird and wonderful oddities. There’s no dedicated playback software supplied with this device that could correctly (or incorrectly…) decode any other timestamps either, so this is all we have.

This means I can’t fully rely upon a lot of the timing data from this file. However, I can explain it and verify the time and date of this capture with the police radio records and officer statements if required.

Luckily, the drone footage contains EXIF CreateDate timestamps that match the times of the search for the suspect prior to the arrest:

Close-up screenshot showing file metadata timestamps with "Create Date" and "Modify Date" both listed as 2025:06:11 12:31:40, indicating the file was created and last modified at the same time. This type of metadata is typically used in digital forensics, evidence analysis, and file integrity verification.

As mentioned before, this drone footage includes a subtitle file with the flight data that we can use for presentation purposes later on.

So that’s our police generated footage looked at, now onto our witness-provided footage, starting with the dashcam video footage, “20151001_171451.MOV”.

It’s a classic story; the witness has a dashboard camera in their car and has used it for years, but they never thought to check or change the time and date. Now we have another timestamp we can’t rely on! We will once again have to rely on file creation times as opposed to encoded times. For this file, the creation time shows a local timestamp of 2025-06-11 15:53:46.796, which indicates when it was saved to the external drive.

Looking at the GOP Analysis tab within Advanced File Info, we see something interesting:

Screenshot showing a GOP (Group of Pictures) analysis view of a video file within Amped FIVE. The window displays a sequence of video frame types (I-frames, P-frames, and B-frames) arranged in chronological order, which are crucial for understanding video compression structure and frame dependencies. The background video, captured from a dashcam on 2015/10/01 at 17:15:25, shows a parked van and a person walking near a row of garages, indicating the context of the analyzed footage.

Detailed GOP (Group of Pictures) analysis window of a video file displayed in Amped FIVE, showing a sequence of I-frames, P-frames, and B-frames essential for decoding and verifying video integrity. The summary below indicates GOP structure (M = 3, N = 15) and distribution of frame types: 6.70% I-frames, 26.63% P-frames, and 66.67% B-frames across 1656 total frames. In the background, a dashcam still from 2015/10/01 at 17:15:25 shows a parking area with a white van and a person walking, providing visual context to the analyzed footage.

The GOP seems to start with two B frames and finish with a partial GOP. A GOP should start with an I frame, so seeing this at the start of the file is indicative of a previous GOP no longer in this file. Perhaps, this is down to stream clipping and the way the files are written to the SD card by this particular camera. I have also seen this behavior before with body worn video footage, too.

In this case, my dashcam footage shows the suspect fleeing the scene and will be used for continuity and story building. However, if I were to use this for speed estimation, I would certainly consider the frame analysis, timing, and GOP information from this file. So it’s worth bearing this sort of analysis in mind and being meticulous!

In terms of other timings, the CCTV from the scene (the apartment building) shows a CreateDate of “2025:06:11 – 10:20:51” which matches the time and date provided by the pathologist. We can’t rely on any of the timing from the GoPro camera, nor the mobile phone footage, since this has been stripped of metadata after being sent via WhatsApp. The clue is in the file name: “WhatsApp Video 2025-06-11 at 13.46.41_bc958cf2.mp4”!

This is why we should always try and recover the original files where possible, as we risk losing valuable file data when using cloud assets or social media images or videos.

I’ve also run Frame Hash from within Advanced File Info over each file to check for duplicate frames at this stage, which demonstrates there aren’t any in this case.

Editing, Adjustments and Correcting Issues

Now I will perform any edits or adjustments that may be necessary to help with presentation purposes further down the line. First, I’m going to use Range Selector to clip the portions of the video to where I want them. This will show only the suspect moving from the scene to the weapon deposition site and finally being caught.

You can see below a snapshot of the file “VID_20250611_062051_00_021.mp4”, which is from the apartment complex. I’ve now added a timestamp using Add Timestamp, based on the file’s timing information from my earlier file analysis.

Wide-angle CCTV image of a residential courtyard surrounded by red-brick buildings under a clear blue sky, captured at 10:20:51 on June 11, 2025, as indicated by a timestamp in the bottom right corner highlighted by a red arrow. The paved pathway borders a small grassy area with scattered flowers, and several windows and doors are visible on the buildings, suggesting a secure, enclosed property environment.

I was able to help verify that the timestamp, taken from the file metadata, appeared to be correct by using “Add Text” to show the “PTSTime” and “PTSDuration” macros and checking this whilst seeking through the file frame by frame and using PTS-Based Playback. This is a handy trick for comparing timings during playback and identifying gaps or motion detection.

Screenshot of the playback settings dropdown menu in a forensic video analysis tool, showing three playback mode options: Average FPS Playback [FFMS], PTS-based Playback [Container] (selected), and Timestamp-based Playback. The waveform timeline is visible below, indicating the audio or video data being analyzed.

So I’ve now selected all the portions of footage I’ll require for the next step of the case. If I needed to, I’d also perform any enhancements and adjustments at this stage. However,  in this instance, this isn’t required.

Because I want to eventually use Timeline to present my footage, I need to use Convert Frame Rate to make sure all my files have the same frame rate. I’m going to be preserving my original files alongside my presentation copies and will make it clear what changes to the files have been made. In this instance, my files range from 22fps all the way to 60fps (with some variability).  I’d rather duplicate frames than lose any, so we’ll select 60fps as our converted frame rate.

Amped FIVE showing dashcam footage of a residential car park with a white van at center; date-time overlay "2015/10/01 17:16:52" at the top of the frame. The interface shows Filters list and Tools pane on the left, the Viewer in the middle, and Filter Settings – Video Loader on the right (FFMS engine, stream parameters, color range "From File"). The right panel also shows region/selection controls and a small thumbnails strip for quick review. Along the bottom is the Player with transport controls and a dense audio waveform envelope timeline for scrubbing and event spotting, indicating frame-accurate playback for verification, enhancement, and reporting.

Final Note

My files are now analysed and prepared. The next stage of my workflow will be documenting my presentation tasks, which I’ll be discussing in the next and final post of this series. So I’ll see you in the final chapter of this investigation!


 Lucy Carey-Shields

Lucy Carey-Shields is a forensic analyst with Amped Software, primarily providing technical support to Amped users. Her career started as a front-line officer with UK law enforcement in 2010 where she spent six years before graduating from her degree in computer forensics in 2014, when she shortly afterwards started work in a digital forensics unit alongside her front-line duties. She now has over ten years of law enforcement and digital forensics experience in both video, mobile and computer forensics cases.

Subscribe to our Blog

Receive an email notification when a new blog post is published and don’t miss out on our latest updates, how-tos, case studies and much more content!