Category Archives: How to Amped Authenticate

Using Amped Authenticate for Video Source Identification When You Only Have Images As Reference

Dear friends, welcome to this week’s tip! It’s a rather special one: longer, but also very exciting. We’ll see how the latest Amped Authenticate update enables you to carry out source identification of digital videos when only images are available as reference, and vice-versa! We’ll provide an introduction to the problem and then go practical with a step-by-step example available for everyone. Keep reading!

Continue reading

Unity Is Strength! In Challenging Cases, Amped Authenticate’s Compare CRP Makes Source Device Identification More Accurate

Welcome to a brand new tip, dear friends! Today we’re showing you one of the newest features introduced in Amped Authenticate: the possibility to use the PRNU Identification filter to compare the sensor noise obtained from two sets of images. Reading this sentence left you confused? Then this tip is just for you! Keep reading to shed light on the mystery…

Continue reading

The Truth Will Come Out: Easily Verify Time and Location Metadata With Amped Authenticate and Avoid Being Deceived by Them!

Dear Amped fellows, welcome to this week’s tip! Like we did last week, we begin this tip with an Italian saying, which goes: “Le bugie hanno le gambe corte”. Literally, it translates to “Lies have short legs”, suggesting that, eventually, the truth will come out. And this is something Amped Authenticate users care a lot about! Today we’ll see how Amped Authenticate makes it easy to verify whether shadows in your evidence images are consistent with the declared time metadata. Keep reading to find out more!

Continue reading

Where Are You From? Learn How to Investigate Which Camera Model Took an Image Using Exif Metadata and JPEG Quantization Tables

Welcome, dear Amped blog maniacs! Digital image forensics people have a bittersweet relationship with metadata. We love them… but can we trust them? Today’s tip is about how you can cross-check Exif information about the camera model that allegedly created your evidence image. We’ll see that Amped Authenticate‘s JPEG Quantization Tables is a great resource for that, making your integrity verification far more reliable. Keep reading to find out more.

Continue reading

Tired of Clicking? Learn How to Use Amped Authenticate’s Command Line Interface to Quickly Analyze or Triage Lots of Images!

Happy New Year dear blog friends! Welcome to the first tip of 2020! Today we’re showing you a rather hidden functionality of Amped Authenticate: the possibility of loading and processing images using the command line interface! It’s something that comes pretty handy when you have to deal with a lot of files and want to save hundreds of clicks… keep reading to find out more!

Continue reading

Long Story Short: Learn How to Quickly Include Screenshots of Maps, Documents and More in Your Amped Authenticate Reports!

Dear Amped blog readers, welcome to this week’s tip! Today we’re dedicating some room to a simple yet very effective trick that can make Amped Authenticate reports more comprehensive and clear. We’ll see how we can effectively add screenshots to our project and comment on them, in such a way that they appear in the report helping to build up the story. Keep reading to find out more…

Continue reading

Feed The Machine! Learn How to Easily Generate Computer-Processable Results With Amped Authenticate

Dear Amped blog readers, welcome! This week’s tip is dedicated to a rather hidden feature of Amped Authenticate: the possibility to use TSV (Tab-Separated Values) as the output format for the Smart Report and Batch Processing tools, instead of the classical HTML format. All those thinking “why should we even care?!”, raise your hands! I see many of you! Keep reading to find out why this feature could be way more important than you think.

Continue reading

The Power of Amped Authenticate for Investigating CSE Cases

When we talk about Amped Authenticate, you may automatically think of its use in detecting forged and manipulated images such as those created using editing software to portray a different scenario or message from that of the original purpose of the image, and you’re certainly right about that (particularly in the age of the ever-prevalent ‘fake news’). The great thing about Amped Authenticate is that it’s also so much more on top of forgery detection – identify image processing history from capture to publish, extract images from documents, provide camera ballistics, but, in my view most importantly, add more weight to your child sexual exploitation, or CSE, investigations with all these tools  and ultimately safeguard vulnerable children.

I always think of Authenticate as the tool I wish I’d had during my time examining mobile devices and computers, now realizing its potential to further solidify my cases and digital evidence, least of all because of the seamless integration with Griffeye Analyze. As digital forensics investigators, the majority of our work involves CSE material and recovering evidence from a multitude of devices to prove or disprove the offense in question, and the more evidence we can provide the more likely we are to achieve a successful prosecution or clear an innocent party – we keep an open and unbiased mind as forensics professionals, as always. 

The PRNU, or photo response non-uniformity (also known as camera ballistics), capabilities of Authenticate are often under-utilized by law enforcement digital forensics professionals – I admit, I didn’t realize it had such a tool and how useful it could be in my work at the start of my career! Let’s take a safeguarding investigation as an example, often unpleasant cases in which a child has been exploited. We know law enforcement and governments around the world have similar methods of tracking illegal images and videos, usually through databases, in order to identify such material quickly and to avoid unnecessary exposure of traumatic material to investigators, but these safeguarding cases often involve newly generated images, not stored in any database.

Continue reading