Hi everyone, great to be back writing a quick blog post on here. We are SO busy here at Amped with so much going on… but I do like to chat with you all when I can.
This year’s LEVA event was in San Antonio, Texas.
What a place! If you ever get the chance to get down there, it’s a wonderful city.
During the event, I held a 12-hour workshop on using Amped FIVE. Many people had received some training before, but some were new users, and some didn’t even have the software yet. That’s one of the many things I love about FIVE — it’s so quick to get using, once you understand the interface.
The workshop concentrated on task and question orientated workflows — how to complete a desired task, and how to answer a specific question. The magic of FIVE is that you can do multiples of these in a single project.
No need to reformat or transcode in one piece of software, then edit images in another, then process video in one more. Keeping things simple means a much quicker result and that’s what we are here — to help you with getting results!
We looked at many functions and filters so I thought I would give a rundown here. It may help as a review to those who attended or be of interest to all you guys out there who may have missed a blog post over the past few years.
Please note though that workshops like these allow you to see just some specific features of Amped FIVE — you really should attend the official Amped FIVE training to learn about all the possibilities in FIVE. Check the schedule here.
David Spreadborough here, the International Trainer at Amped Software. It’s great to be back writing a blog post. The past few months have been very busy at Amped and our image authentication software, Amped Authenticate, has become the ‘go-to’ tool for many requiring an image’s history or to identify signs of manipulation. Helped maybe by the huge amounts of press detailing fake stories and images.
In this crazy world of multimedia forensics, we cannot stand still. The tech wizards at Amped HQ have been hard at work integrating new filters and tools to assist you further. So, let’s dive in and take a look!
Social Media Identification Filter
Under the File Analysis category, you will find this new filter.
Its purpose is to detect traces in the file formats left on images by social media platforms. As most of you probably already know, it is very easy to save other people’s images from sharing sites. With a simple right-click, you can save the displayed image to your computer.
An image from someone’s Facebook timeline
This filter now enables you to identify if the images you are examining originate from a Social Media Platform.
Otherwise known as ‘The Science of Single View Metrology’
The first common question asked to a forensic video analyst is, “Can you tell me what that license plate is?”. The second question is, “What is the height of that person?”.
It is then the forensic video analyst’s responsibility to analyze the video, assess its suitability to answer the question, process and prepare the images, and then finally use science to provide the answer, based on facts.
Taking a ‘workflow’ approach can often safeguard the user from missing vital information that may be relevant further along in the process.
There are a few different methods to attempt an answer to this height question, with different constraints, reliability, and drawbacks. In this post I will be taking an in-depth look at the technique built into Amped FIVE, using the filter Measure 3d.
It’s a common question during training – “What Monitor to use?”
One of the many reasons why people start using software like Amped FIVE is that it installs and runs on any modern Windows PC. There is no need to have huge amounts of hardware or specific configurations. A good, stable setup will work perfectly well.
For those unaware, this is the airport in Amsterdam, The Netherlands.
I’m often here as I use this airport as a layover for many international flights when I can’t get one from my local airport in the UK.
This time though I have stayed here, in the Netherlands, delivering more Amped FIVE training.
It’s an easy airport to find a quiet spot to type!
I haven’t been able to blog as much as I would like over the past few months as I have been running many different training sessions and workshops. During these, I have noticed an emerging trend but never made the connection until this week.
To lay the foundations for this subject, let’s look at how a large law enforcement agency or a country made up with smaller agencies are commonly organised. I know there are many, many configurations but you should get the picture!!
During a recent workshop on image authentication, I ran a few practical sessions. One concentrated on the changes that online services and social media platforms make to the images that we upload. It turned out to be an interesting experiment that has had some structured research over the past few years.
These are excellent starting resources when developing any internal Standard Operating Procedure:
It’s a crazy busy time here at Amped Software, but that doesn’t stop development. Yes, it’s time for another update to Amped FIVE.
The craziness has meant that I have been a little quiet on here and I apologize for that. I really enjoy reaching out to you via the medium of this blog, so I do feel it when I don’t have the time to do so. Conferences, training, workshops, seminars and exhibitions—it’s fantastic that more and more people are seeing how Amped Authenticate, Amped DVRConv, and Amped FIVE can help them solve their video and image challenges.
With this latest update to Amped FIVE, more help is available today!
Let’s start things off with a big one! One that we have been working on for a while and one that shows the true power of partnerships really working…
With digital images, people are starting to ask the question – “is it authentic?”
My first digital camera was probably around 1997/8 – that’s nearly 20 years ago! It was a Canon and stored its tiny images on a CF Card. It was pretty heavy and bulky, but a huge step up from the first Kodak prototypes of the 1970’s.
Those had to store an image onto a cassette tape!
In 1990, a few years before my first adventures into digital imaging, Adobe released Photoshop for the Mac.
Take a look at the digital photography timeline to learn more:
This little trip down memory lane has revealed that for over 25 years, people have been able to easily capture and edit digital images. We have reached a point where high-quality images can be captured quickly, edited, and then shared within a few clicks of a mouse or taps on a screen. It’s no wonder then, that during this digital generation, people have also learned how easy it is to change that picture for unlawful reasons.
You are, most likely, from within the investigative community, so you can probably think of many different reasons why someone would want to, ‘tell a different story’. A digital image can be manipulated to reinforce that story, and up until now, many people have trusted that image as being a true and accurate representation. Continue reading →