Solved

screenshot as evidence

Posted on 2014-01-17
9
509 Views
Last Modified: 2014-01-19
How can we detect if a screen shot has been edited?
Must it be of certain format (jpg, png, PDF, ...) ?
0
Comment
Question by:sunhux
  • 4
  • 4
9 Comments
 
LVL 83

Assisted Solution

by:Dave Baldwin
Dave Baldwin earned 100 total points
ID: 39790246
PCs normally create JPgs, Macs create PNGs, I don't know what Linux GUI will create.  You would have to look for something that doesn't match what a known screenshot will show.  It could be very difficult to tell whether it has been edited.  One possible clue could be that the screenshot is not the same size as the screen it is supposed to be showing.  That would indicate that it has been cropped or resized.
0
 
LVL 79

Assisted Solution

by:David Johnson, CD, MVP
David Johnson, CD, MVP earned 400 total points
ID: 39790253
With a skilled editor you won't see any difference even at high magnification (zoom in).  Date Time stamps can be altered. You need to have the complete chain of evidence .  From the time the screenshot is taken until it is presented as evidence. A forensic search of the hard drive that it was originally saved on can reveal older versions.  Computer graphics do not stand up well in court these days.
0
 

Author Comment

by:sunhux
ID: 39790314
Right, the screen shots are needed as evidence to auditors that
certain accounts have been deleted as of a certain date/time:
my plan was to have the date+time displayed at the bottom
right corner with Windows "Users" management listed, then
take a screen shot but I was asked how do I know the screen
shots have not been altered/rigged?
0
What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

 
LVL 79

Assisted Solution

by:David Johnson, CD, MVP
David Johnson, CD, MVP earned 400 total points
ID: 39790325
Take the screen shots yourself then sign a declaration is about all you can do.
0
 

Author Comment

by:sunhux
ID: 39790407
Thought a video shot of, say, a crime taking place (say theft in a shop)
could stand in a court, or couldn't it?

Actually those screen shots are not taken by me, rather by my
Wintel colleague from a different group.
0
 

Author Comment

by:sunhux
ID: 39790409
Perhaps could ask my colleague to use his iPhone to take
a very short video of his screen?
0
 

Author Comment

by:sunhux
ID: 39790413
I was tasked to front the auditors
0
 
LVL 79

Assisted Solution

by:David Johnson, CD, MVP
David Johnson, CD, MVP earned 400 total points
ID: 39791540
Actually those screen shots are not taken by me, rather by my
Wintel colleague from a different group.


Print the screenshot and have him sign it
0
 
LVL 79

Accepted Solution

by:
David Johnson, CD, MVP earned 400 total points
ID: 39791544
A CCTV used as evidence the video is removed from the scene and a strict chain of custody is enforced.  A video of unknown parentage is unacceptable  i.e. using a green screen I can put anyone anywhere.
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
creating custom .audit file with Nessus Tenable 3 102
Access 2016 5 53
Read Only access to a Facebook Profile 9 19
sql server service accounts 4 20
Ensuring effective and secure communication in the age of healthcare BYOD.
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
Sometimes we receive PDF files that are in the wrong orientation. They may be sideways or even upside down. This most commonly happens with scanned or faxed documents. It is possible to rotate the view of these PDFs with the free Adobe Reader produc…
This video Micro Tutorial is the second in a two-part series that shows how to create and use custom scanning profiles in Nuance's PaperPort 14.5 (http://www.experts-exchange.com/articles/17490/). But the ability to create custom scanning profiles a…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question