Skip to content

Camera Ballistics

Description

Camera Ballistics is a unique software product that uses advanced algorithms and cutting-edge technology to determine if a photo was truly taken by a suspected camera or not. Camera Ballistics is not based on metadata such as EXIF, but it uses mathematics to analyze the physics of the sensor.

Generate tamper proof evidence

All possible information such as device make, model, GPS, camera settings, mean square error, fingerprint presence result, probability, and correlation will be organized into a well-designed and comprehensive PDF report, suitable for submission as evidence.

 
 

Interpreting results

  • Multiple views for data, like Email Explorer, provide the needed context to build a complete picture of an incident.
  • Establish connections and relationships between evidence from different sources.
  • Data visualizations help you to quickly connect the dots between all the artifacts in your case.

Combination with phone forensics

When you use Camera Ballistics in combination with our premier mobile device forensic tool MOBILedit Forensic, you get not only all photos extracted from a phone, but each photo comes with information if it was taken by the analyzed phone or not. This will clearly distinguish downloaded, shared or received photos from those that were actually taken by phone owner.

Two steps to digital forensic expertise

LEARN : In this first step, you will supply reference photos from a camera in order to create its sensor fingerprint. The more photos you supply, the more precise your results will be. It is recommended to take at least 30 photos of white walls or clouds – images without sharp shapes and edges. Camera Ballistics will apply advanced algorithms to this folder in order to establish the sensor fingerprint.

Analyze

This step will match the fingerprint file created by the learn process to the photos under investigation. When you run the analysis, you can see the processing progress followed by the mathematical data and results as after analysis. Finally, a comprehensive and well-organized PDF report suitable for submission as evidence is generated