Worried about Digital Evidence Tampering? 292
2marcus writes "As digital technology continues to improve and is used in more and more applications, the ease of tampering with digital files becomes more pertinent. This is especially important in the field of criminal justice, where even the appearance of possible impropriety can sway a jury. CNN has an article on the issues with digital photos being used for fingerprints and other forensics evidence."
Only solution (Score:3, Insightful)
Re:Only solution (Score:5, Insightful)
Please clarify your point, because you either didn't think your comment through, or meant something entirely different than what you wrote.
four words (Score:5, Interesting)
(referring to the parent post, not the grandparent): b b witch hunt.
ok, so the FBI raids someone's PC on suspicion of kiddie porn. Now, the PC has been out of the hands of the suspect. What's to stop the FBI from planting kiddie porn on the hard drive? And will it, in the end, even be neccessary to find porn on the hard drive? Links might be enough (links that might have resulted from IE's insecurities, for example?)I truly despise child pornographers, but are we heading for a police state in the name of anti-terrorism and anti-kiddie porn?
Maybe DRM actually makes sense in this context. I would rather be unable to get porn at all than be prosecuted for planted porn. (the OS could be programmed to reject any files that have porno-like meta-data in their headers, or however DRM works). Granted, this solution would keep all porn (including "legal" porn) out, but it would solve the problem.
Re:four words (Score:3, Interesting)
This is so obviously a troll, I'm tempted not to respond, but in case anyone takes this seriously, I'll pose the following obvious question. If someone were making kiddie porn for the purpose of selling or distributing it, why would they include metadata tags w
Re:Only solution (Score:4, Interesting)
There are quite a lot of issues with kiddie porn prosecution.
So I read about this article saying they got person X on kiddie porn charges, and yet I wonder how much of that is real kiddie porn, as opposed to
*photoshopped kiddie porn
*18 and over porn, but with really young looking girls
the latter is of interest to me, there's a lot of really young looking girls used in porn, and I assume that the photographer and webmasters have done their duty to make sure the person is 18. However, those credentials don't pass over the net to the photo sitting on the hard drive, how does law enforcement know or not know if the girl really is over 18, though she could pass for 14?
As for the former, the idea of photoshopped kiddie porn is that it's kiddie porn without, hyptohetically speaking, having hurt a chlid in the process. Should that be illegal in that a person who consumed photoshopped kiddie porn is very likely to commit such an act? That's an ugly precedent.
Of course, this doesn't even touch the surface of what the difference is between kiddie porn and children who happen not to have any clothes on. Apparently the standard is some sorta fuzzy concept of one type of pic was taken specifically for the purpose of getting off, and the other was not.
Really odd case from Australia: a guy there makes videos of himself getting kicked in the jewels--that's the sexual fetish. He made one of a 14 year old kicking him, and was brought in on kiddie porn charges (though the girl was completely clothed.) The idea here is that a girl was being used for sexual satisfaction, though, under normal circumstances, it hardly is a sexual situation. (Dunno what happened to the case.)
Honestly, this is a mine field of questions that no one wants to talk about or answer.
Re:Only solution (Score:3, Insightful)
Damn Straight!!!
When it is not possible to prove that a crime was committed, how can it be reasonable to advocate prosecution of said "crime"?
Isn't that just asking for abuse?
Disassociate the REAL issue (lack of provability) with the EMOTIONAL plea (save the children, stop kiddy porn).
-dave-
PS:
Do you
Re:Only solution (Score:2)
I'll admit the potential is there for abuse on the part of law enforcement, but ignoring ALL digital evidence is just as stupid as blindly trusting law enforcement.
Re:Only solution (Score:3, Informative)
Re:having porn is not against law (Score:3, Insightful)
No, we're talking about the legalities of digital evidence under US law.
However i was talking this example to my friend, US based psychologist who is working for as an officially appointed expert. She said i would be probably OK. But she may be wrong, of course.
There are a lot of viriables to consider, but here's the basic situation:
If you never show those pictures to anyone else you would certainly be OK. Even if you did allow someone else to
Re:Only solution (Score:5, Insightful)
Re:Only solution (Score:5, Insightful)
Then the images could be copied to cdrom along with the md5 sums. If the defense feels that the images have been tampered with, they can always be verified against the md5sum and then if so, the archived memory card.
Re:Only solution (Score:5, Funny)
Re:Only solution (Score:2, Informative)
Unfortunately the benefits of the digital camera are lost then. If I wanted write once media, I would use film. On the other hand, I see where your trying to go with this in setting up a tamper resistant protection scheme. Even so, one could still do some elaborate tampering to bypass security methods. They'd almost have to do it, just for the challenge. Look at all the protection schemes p
Re:Only solution (Score:5, Interesting)
Of course... (Score:3, Interesting)
Unless you want the camera to digitally sign them as well. Might work, if you have the secret key in a WOM not directly readable (i.e. you may sign the MD5 and verify the signature, but not read the actual key).
Kjella
CD-R? (Score:3, Informative)
The article does bring up a very good point:
Re:Do you know nothing about Technology? (Score:3, Insightful)
What it really comes down to (Score:3)
But yes, ultimately, the police will be able to manufac
Re:Only solution (Score:5, Informative)
It's not hard for experts to detect Photoshop fakery, even if amateurs can be fooled. If you move objects around in the picture, you'll never be able to get every cast shadow right, or get the lighting of the removed objects right. The analysis process that the experts use is analogous to ray tracing run backwards: given the images, figure out where the lighting is. Then boundaries between regions that have been altered and regions that have not come out clearly.
Furthermore, as its name implies, many of the Photoshop tools correspond to tricks that photographers have traditionally played in darkrooms, it just makes it easier.
Re:Only solution (Score:5, Informative)
I work in wholesale justice -- I do a lot of court-appointed work. There is no way that an expert will be approved in every case to authenticate or detect alterations of digital images. At the basic level of the legal system, the people who most need this sort of protection (accused criminals) will not be able to afford it.
I like the idea of digital photographs with some sort of cryptographic self-authentication. It would reduce the risk of cowboy cops faking evidence and putting it over on juries and judges. Someone needs to police the police, and this might help.
GF.
Re:Only solution (Score:3, Interesting)
Sadly, 'experts' proved that the moon landing was faked, too. Shadows cannot be easily disproven because of things that are happening off-camera.
The best you can do is detect use of a filter algorithm. Gaussian blur, for example, should be easy to detect. Clone tool? Yo
This shouldn't change anything (Score:4, Insightful)
Wrong (Score:5, Interesting)
Bullshit.
This should matter a lot.
Mark Furman's bigotry was enough to create the appearance of "reasonable" doubt as to the veracity of the DNA evidence that unequivocably linked O.J. Simpson to the murder of his ex wife and her friend. Nevermind that the evidence was almost certainly NOT tainted or modified
Digital evidence is as fleeting as the wind. I can copy a file to your hard drive, make a phone call, and the assumption will be you're guilty. Or a cop could walk in with a CD, do the same thing, and convict you.
Gnupg and similiar encryption tools, combined with date and time stamping (perhaps even authenticated date and time stamping via ntp servers) could be deployed relatively simply and make data tampering virtually impossible (e-mails are certain to be real, and have been created on such-and-such a date, etc).
Similiar schemes might be applicable to preserving the integrity of digital imagry, video, etc., and it is very important that these issues be addressed.
We know that the police and the FBI do tamper with evidence. We know that they bear false witness in court
Law enforcement will tamper evidence on occasion, and making it easier for them to do so virtually insures that it will be tampered more often. In order to maintain (or even improve) the integrity of our justice system, we need to make modifying digital evidence as difficult (or impossible) as is possible, and we have numerous tools already to do so.
Dismissing this issue is foolish
Re:Wrong (Score:4, Insightful)
Ah, but they were written by someone who broke into your machine, used a keylogger to get your passphrase, and were sent by this other individual while you were out having a beer with your buddies.
Sure, you have a good record that the email was sent at 8:30pm, but, then you can't really prove that you were at the corner bar at that time. After all, will the jury believe the testamony of your drinking buddies, or a cold, cryptographically-secure computer log?
(Admittedly, this is less likely to be an issue in investigating a crime that has already been committed... but if it's a computer-related crime, the probability goes up.)
Re:Wrong (Score:2)
Nevermind that the evidence was almost certainly NOT tainted or modified
Almost certainly?
Excellent, then justice was served, he was almost convicted :-)
Re:Wrong (Score:5, Informative)
What case was that?
Joseph Salvati ABC News [go.com]
A quick google [google.com] turns up other probable cases.
And it's not going to change until someone gets the guts to start bringing charges against cops and prosecutors who knowingly use false information, or withhold information.
Re:This shouldn't change anything (Score:3, Funny)
Slightly? Right now, I can take a picture of myself and make it look like I'm drinking a beer with Bill Clinton and George W. Bush while we all sit around a table at a titty bar. This wasn't possible 30 years ago.
It shouldn't matter however because it is always based on the honesty of the law enforcement official to do what is right.
Law enforcement
Re:This shouldn't change anything (Score:2)
it was. it was slightly harder but it still was possible.
usually the more important evidence is backed up with somebody saying(under oath) that it's truthful(logs&etc..).
Re:This shouldn't change anything (Score:2)
OK, I'll concede that it was *possible* 30 years ago, but it was a LOT more difficult then than it is now.
LK
Comment removed (Score:5, Informative)
The real thing (Score:3, Funny)
Actually, the KGB tended to prefer actually kidnapping you, drugging you, and actually sitting you down at a titty bar.
It's a lot easier than airbrushing someone out, and impossible to disprove(whereas the airbrushed photos were usually very obviously air
Re:This shouldn't change anything (Score:3, Insightful)
Chain of Evidence (Score:4, Informative)
One way of hardening the chain is to burn the digital record onto a CD-R, with a least two witnesses and recording the serial number of the CD-R onto the evidence log.
Re:This shouldn't change anything (Score:2, Funny)
"If Chewbacca lives on Endor YOU MUST ACQUIT!"
maybe someone should write a book (Score:3, Funny)
Someone has tampered with this article! (Score:3, Funny)
Seriously, this has been coming for a long time and there is plenty of material about the impact of a totally digital, totally manipulable reality in the SciFi archives.
It's a cycle anyhow. Eventually paper and touch will become valuable again because they mean something. Anyone want to buy a signed printout of this comment? Only $0.02!
Re:Someone has tampered with this article! (Score:2)
Do you take PayPal?
Re:Someone has tampered with this article! (Score:2)
Chain of custody (Score:5, Insightful)
Tamper vs Analyse (Score:5, Insightful)
There are actually cases of people photoshopping fingerprints to "bring them out".
Is that evidence tampering?
What if they just use a large burn/dodge tool? what if they just use a small one?
Where is the line?
Re:Chain of custody (Score:2)
If you had read the article you would have noticed that Photoshop can do 100x more "damage"/"good" than a photographer in a dark room.
Re:Chain of custody (Score:2, Informative)
That is also why I applaud the Oregon State Police's efforts at ensuring chain of custody by keeping an encrypted version of the original image locked away on CD. It also makes any mods reproducible in front of a jury, if necessary.
The potential for modification doesn't scare me as much as the ability to permanently archive evidence. I can go back to a negative shot in 1930 and print it (provi
Re:Chain of custody (Score:2)
Chain of custody is one small part of the overall picture.
Re:Chain of custody (Score:2)
I love it (Score:5, Funny)
Videos and photos (Score:3, Funny)
DIGITAL evidence ? (Score:5, Insightful)
Basically only human intel is admitted as evidence (witnesses) - if you want to admit other evidence (such as footprints etc.) you show photos (as an illustration, not as the proof) of course, but _always_ backed up by witnesses (fellow officers, forensics guy) who could be called to testify under oath.
Witnesses (Score:5, Informative)
Re:DIGITAL evidence ? (Score:3, Informative)
With analog, you end up with a dozen 'experts' with magnifying glasses who cant decide if its bigfoot or a guy in a gorilla outfit.
Besides, cases are built on actual physical evidence. That freak who kidnapped the little girl from the carwash will get t
Re:DIGITAL evidence ? (Score:2)
> footprints etc.) you show photos (as an
> illustration, not as the proof) of course, but
> _always_ backed up by witnesses (fellow officers,
> forensics guy) who could be called to testify
> under oath.
That's how it works in the US.
Re:DIGITAL evidence ? (Score:2)
Where do you come from?
Switzerland.
I think it's paranoid to assume everything has been tampered with.
You remember all those nice pictures [globalsecurity.org] of the mobile WMD sites ? Were we the only ones not buying it ? ... oh wait, there's France and Germany too....
personally (Score:2, Funny)
Thank you. I'll be here till im modded down.
Fear of false tampering claims (Score:5, Insightful)
In practice, the rejection of valid evidence will probably be a bigger problem than the creation of invalid evidence.
Re:Fear of false tampering claims (Score:2)
Until, of course, judges/juries/lawyers realize and overcompensate.
Easy Solution (Score:4, Funny)
Nobody would tamper with digital evidence given THAT outcome.
DRM? (Score:4, Funny)
Re:DRM? (Score:2)
They are using Photoshop to ENHANCE photographs. Bring out details that would not have been there (the example given was a fingerprint on the inside of a piece of duct-tape used to wrap someone up).
Sure Photoshop makes photos look good but do we want to put people away when there's a good chance that the modifications made to the photo changed the print?
Re:DRM? (Score:4, Insightful)
Someone who is highly skilled in photoshop can easily manipulate an image well enough that even people in the image can't quite tell what if anything is different. This is quite common with photos used for magazine covers, advertising and the like.
Absolutely. (Score:2)
Re:DRM? (Score:2, Insightful)
Be careful if you take (digital) pictures (Score:5, Interesting)
Unfortunately, when we went to move in, the place was trashed and grossly out of code for the city/county. In an effort to be released from the lease, I took a bunch of photographs of everything that was wrong with the house, but I took them on my digital camera. I even brought my camera to a developer and had the photos professionally developed.
Nevertheless, I brought my pictures to a lawyer (school-subsidized, provided for student lessor/lessee problems) and he said that if I wanted to use them in any practical way, I had to go take the pictures again with a real camera (and you could _barely_ tell it was digital).
Fortunately, we had enough evidence that the landlord caved (and we all learned many valuable lessons about leasing, and the law in that time period).
Personally, I think that... (Score:2, Funny)
[This message has been deleted by the administrator]
Who needs evidence? (Score:4, Interesting)
logs (Score:2, Interesting)
Myren
Re:logs (Score:3, Interesting)
Each camera would contain a tamperproof digital signature chip and a tamperproof clock.
This seems a long ways away from being credible, because it does not take more than a few seconds to think of how to get around it. It is so easy to take a picture of another high-res picture that has been digitally created or modified. Of course, this could be done with a film-based camera, as well. Look all the UFOs people have on film with no digital photography required. Many years ago I knew a photo lab techni
Seems kinda funny (Score:4, Insightful)
Re:Seems kinda funny (Score:3, Insightful)
We need people who will look at the computers output and say, "That can't be right. I don't care if it came from the computer, it can't be right!" Like especially the doctor who is just about to remove a cancerous lymph node, and the computer is telling him/her to amputate your leg.
Re:Seems kinda funny (Score:2)
It's expected considering our past stupidity.. or naiveness.. or what have you.
Digital Camera Manufacturers have thought of this (Score:5, Informative)
So technology has answered, its back in the hands of law enforcement to present their case properly.
It's only a matter of time (Score:2, Insightful)
At first, photography wasn't accepted right away, and it shouldn't have been. I mean, if I were to persuade you in trying my new revolutionary kind of ca
partial answers to issues raisedin articles (Score:5, Insightful)
modify ONLY copies
originals all go onto read-only media
checksum religiously
WRITE GOOD POLICY for maintaining digital evidence...and post it before you start using digital media. Review it once a year, or more often to revise for unforeseen issues. Educate your detectives, and your Asst. DA's.
Rinse, later, repeat.
Not a worry.. (Score:5, Interesting)
There's always an auditable chain of custody with all eveidence, digitally the product i use accomplishes it with encryptions and checksums. If an officer takes a pic out to alter it (they have to crop/lighten/darken mugshots so they look consistent for use in a lineup), his actions are logged, and a copy of the original is always kept. Just like checking stuff in and out of any CVS.
There are some digicams out there specially designed for the task which create special checksums and hashes to prove, mathematically that the image on a disk is the same one the camera took.
This is all tied to the officer who took the picture and entered it into the system, and ultimately would be held accountable for it.
If needed, I could be called on to swear an affidavid that the file hadn't been altered since taken/entered.
Now, for the most part, the agencies I've dealt with only use digital imagine for mugshots, and a few take digital shots of traffic accidents. But more and more are expanding the use of technology. 911 calls, and police radio chatter, being encoded to mp3 and permanently attached to the case file, stills from dashboard cameras, crime scene photos.
Frankly, you can prove mathematically with some simple tech these days that not even a single pixel in a digital photograph had been altered. It'd much easier to fake an old-fashioned analog photograph.
Of course, sleazy lawyers will wow clueless jury members with how easy it is to change things in photoshop, which they'll understand. And those jury members will be asleep when the mathemetician demonstrates that there's only a 1 in 400 kajillion chance of altering time image without changing the checksums...
Re:Not a worry.. (Score:2)
sleazy lawyers will wow clueless jury members
Sleazy lawyers are just like the rest of us - they'll take the path of least resistance.
Presented with some staggering insurmountable pile of scientific evidence (eg, odds of matching DNA), they'll search out for a Mark Fuhrman and suggest to the jury that there's "reasonable doubt".
Market opportunity... (Score:4, Insightful)
Re:Market opportunity... (Score:2)
Precedent Set by Common Sense? (Score:5, Insightful)
Lawmakers should take this into account and require the prosecution or plaintiff show beyond a reasonable doubt that the data can in fact be reasonably trusted and has not been handled by an untrusted or malicious party.
Overall, this question raises a lot of issues. But I feel the courts need to decide on a set of guidelines that can be used to assure the jury and the defense that the evidence presented to support accusations can in fact be trusted.
Because who's to say an overzaelous prosecuter didn't hire someone to "put" something on the suspect HD?
But even then the courts might have a hard time ahead. Already we've seen cases that raise this question in which there can be no "safe-guard" and in fact the defense relies upon the exploitablity of software. This was demonstrated in the kiddie porn trial in the UK in which the defendant got aquitted because his lawyers successfully argued that a virus planted the porn on his PC.
Ulitmately, it is double-sided issues such as this that are leading us down the path of Microsofts Secure Computing initiative. But that is a mission that is doomed from the start... history shows us that no matter how secure they make it, some one will break it.
Digital sound evicence (Score:2, Interesting)
Re:Digital sound evicence (Score:4, Insightful)
And yet, with a simple md5 checksum or any other of dozens of other techniques, such a change is impossible to make undetectable. The chain of evidence would need to show that at time of recording the md5 checksum of the file was 258c2891488526d239077559ae4fabab, and that the md5 checksum of the current file is still the same. Show the chain is intact, you've got that part of it covered. Get some mathematician to explain to the sheep of the jury that these are better odds than DNA, hell, call it "Digital Fingerprint" or something, and get on with the case.
Demonstrate this, since they won't get it from the math guy, by taking an image, changing a single pixel, and recalculating the checksum showing that it changes entirely. Don't _tell_ them, _show_ them that if you change the digital information, the "Digital Fingerprint" changes drastically.
Public Key Encryption (Score:3, Interesting)
How ironic... (Score:5, Interesting)
that CNN is publishing this story; back in the late 1990s, they stole a frame from one of my computer generated animations of a pulsating star, and put it in a story [cnn.com] on their website. They tweaked the colourmap a little, but apart from that the image is identical to my original animations [ucl.ac.uk].
They even had the gall to claim the copyright for themselves. Bastards.
Also, "ownership" of events (Score:5, Insightful)
But this points up a scary possibility, one which has already been hinted at in various places, which is that there's no robust trace of events. Once there's a backdoor in your system, there are a lot of things that can happen:
- secrets can be observed.
- "evidence" can be planted.
- activities can be spoofed.
Say you live under a repressive government, and somehow offend someone with 'l33t h@x0r skillz. You may find, for example, that you published a series of articles critical of the leadership. Yup, it came from your personalized copy of Word, and was sent from your IP address. If they've planted a keylogger, it could even be digitally signed with your PGP key. In a less oppressive environment, you might discover that you just mailed a collection of kiddie porn to the FBI.
Now the person screwing you could be some vicious script kiddie, but there's also the potential for abuse in the political world. Like the case in Malaysia, where an opposition leader was tarred with a faked sex scandal, political operatives can be neutralized by opponents through these means (please don't let Karl Rove read this posting!).
Scary stuff...
Your honor (Score:3, Funny)
If the image don't fit you must acquit.
Your Honor, the prosecution submits... (Score:3, Insightful)
And here is Exhibit C, film footage where President Kennedy can clearly be seen saying "Congratulations, how does it feel to be an All-American?" to Forrest Gump.
veripic (Score:3, Interesting)
http://www.veripic.com/certified [veripic.com]
My guess on how they do it would be by checking how the image was encoded? any ideas?
Re:veripic (Score:2, Informative)
Re:veripic (Score:3, Interesting)
An altered photograph will often be mathematically inconsistent. Real photos are formed by light sources reflecting and refracting off objects. Mess with it, and you create regions that have inconsistent lighting. Furthermore, Photoshop (or Gimp) tools have specific mathematical properties which can be detected; for example, if you use the Clone tool, there will be little circles of pixels that are highly correlated (not exactly because of the fuzzy edge of the brush). So, with an autocorrelation appro
Do you trust the system administrator? (Score:5, Insightful)
Now let's say that the person who did this is found because he forgot to modify/erace the system logs and a criminal trial begins.
Now let's also say he hires Jacky Childs as his lawyer who asks the system admins, under oath, if the system logs are nothing more than common text files. Then he asks if it is possible that any of the admins could log on and edit that text file log. Unless they got the logs being directed to a line printer an constantly printed out, Jacky Childs just found his reasonable doubt. Good luck with the civil suits!
Seriously though, this could be a real problem one day soon.
Re:Do you trust the system administrator? (Score:3, Insightful)
Second, you seem a bit upset. Calm down. You got the point of the whole thing although you seem to be upset that in my scenario they cought the guy that did it. I only made the crime a severe one to give the trial importance. You seem to think I am saying something that I am not.
Interesting that you bring up DNA. If enough criminals figure out how to harvest dna from like hospital medical waste or such and leaving it at crime scenes I could see Lawyers tr
Canon has a "data verification kit" (Score:2)
photographic evidence.... (Score:5, Informative)
Jury's, and judges consider the instant developed photos of the instamatic camera are considered unalterable because of how they are made
usually the oldest technology is the most accepted in the court of law.
We sell software (Score:3, Informative)
Isn't this what keysigning is for? (Score:2)
The scary part... (Score:5, Insightful)
Um, yeah. Well, if they're encrypted, you either:
I think what he meant to say was checksummed and encrypted. While this does provide a reasonable degree of security against tampering, it in no way establishes that the pictures were real in the first place. It is a very trivial matter to write a CD today with a date of 01/01/1998.
Yes, checksumming does provide a reasonable degree of security provided other safegaurds are taken. However, defeating this scheme is still too simple. Consider:
Tell me I'm more secure now. Evidence fakery has been around since mankind learned to lie. The digital age just makes it more convenient.
"Forget photographs as evidence of anything..." (Score:3, Informative)
Now we can do it with Photoshop Elements on a home computer.
Yes, juries ''should'' be cautious in their approach toward photographic evidence. It was never true that "the camera doesn't lie," but the ease and inexpensiveness with which digital images can be altered certainly ought to alter the jury's Bayesian estimates of the likelihood that tampering could have occurred.
Just because they CAN... (Score:3, Interesting)
If you asked the average juror what the signs of digital photo tamering are, they be baffled to answer. The bottom line is that this will be used by defense lawyers to plant the seed of doubt in otherwise ignorant minds (concerning digital media.)
Just because it is (perhaps) easier to tamper with pixels than crystals on substrate, doesn't mean it's going to happen more often. Better yet, if people don't understand that digital evidence is subject, but not PRONE, to tampering this myth will continue to perpetuate.
Maybe I'm wrong with my conclusion that it is not more likely, but it certainly isn't a new issue. In fact, I worries me that it's brought up in the context of a new issue because that just perpetuates a legacy of ignorance... and if you read the article you will find out that the issue is MUCH more a case of poor evidence. If the only evidence a prosecutor has is a previously unidentifyable fingerprint, and suddenly they can identify it, you're going to get skepticism. Furthermor, if that's the only evidence they had on the guy then there's no way you can prosecute on inconclusive evidence.
The professor was able to reproduce the visual effect that occured when the scientific software processed the finger print. I hate to say it, but SO WHAT? I happen to be an experienced photoshop guy, and artist, but just because I can reproduce what I see, doesn't mean the scientific process involved is invalid. I'm concerned about this kind of defense approach, because it involves voodoo...
I'd propose that a series of laws clearly define what is digitally permissable based on established algorthms. If a new one is created, it must pass through a panel of reviewers and eventually be passed into law before it can be permissable. In this way, there would be far less "reinvention of doubt" every time a digital photograph is brought into a court room that has a couple filters run on it.
It would probably involve a series of check and balances at each stage of processing, too.
Canon has a no-tampering digital photo kit (Score:3, Informative)
Basically, the way it works is that the camera computes a cryptographically strong hash of the image file at the time the picture is taken and stores it on a tamper-proof secure card. The kit is specifically targeted at law enforcement.
DOJ likes DD for Drive imaging (Score:3, Informative)
http://www.cftt.nist.gov/documents/Atlanta.pdf
They have been testing a bunch of programs, and so far dd on Free BSD has performed best:
http://www.ojp.usdoj.gov/nij/pubs-sum/203095.ht
How to guarantee digital images are the real deal (Score:3, Informative)
Canon has a "Data Verification Kit" (DVK-E2) for law enforcement and related types that worry about tampering.
From DPReview's copy of Canon's press release, "The kit consists of a dedicated SM (secure mobile) card reader/writer and verification software. When the appropriate function (Personal Function 31) on the EOS-1D Mark II or EOS-1Ds is activated, a code based on the image contents is generated and appended to the image. When the image is viewed, the data verification software determines the code for the image and compares it with the attached code. If the image contents have been manipulated in any way, the codes will not match and the image cannot be verified as the original."
So it looks like, when you combine the EOS-1D/1Ds w/ the "Secure Mobile" card and put the camera in to a special data verification mode, it probably generates a MD5 or similar hash for each image that is generated.
This seems to be a fairly obvious way to defeat cries of tampering, although I have no idea how well this software/hardware has been pushed. Perhaps there is a hole somewhere? Hard to say. Hopefully Canon will release similar products for all of their higher-end (300D and up) cameras.
Re:Nothing new here. Move along. (Score:3, Insightful)
It's happened with DNA, fingerprints, computer cracking.... Hopefully the technology is eventually ironed out such that this stops happening.]
Meantime, this is cold comfort to victims of such miscarriages of justice, or their families.
But it's two edged:
DNA evidence is now being used to clear people who have s
Re:Nothing new here. Move along. (Score:2)
That's the problem. DNA I won't argue with, but do you know how bad fingerprint evidence is? The number of points required for a match varies from 9 (US) to over 28 (AU I think). Fingerprints are far from what I would consider objective scientific evidence.
Some would say Lie Detectors are "Scientific Evidence" as well. Go do a google search on the truth about lie detectors. The rely on a tricking the user into beliveing it can read them. It can e