➖Dustin Miller➖ Profile picture
Jan 12, 2021 11 tweets 2 min read Read on X
With the bounty of raw video and photo files available from the January 6th Capitol terror attack, participants can potentially be identified using the video taken by someone else. Or, more specifically, by identifying who is recording the video.

A thread!

1/9
Every cellphone uses a sensor to convert a visible image (or video) into digital data that is processed to create the final media file. These sensors—and the digital signal they create—are imperfect (because physics). But every sensor is *uniquely imperfect*.

2/9
These imperfections result in digital “noise” in the data. Videos taken by one cellphone can be analyzed to extract a sort of “fingerprint” of the digital noise inherent in that cellphone’s imperfect image sensor. That fingerprint persists, even in videos taken weeks apart.

3/9
If an analyst has physical access to the cellphone thought to have recorded a video, a new video can be taken, and its noise fingerprint compared to the video under investigation. If the fingerprints match, you’ve identified the source camera.

It gets more interesting…

4/9
There are even analysis techniques that can extract a “partial” noise fingerprint from a still image, and identify a match between a still photograph and a video—even if the original media was uploaded to a social media and compressed. Why is this so relevant?

5/9
Let’s say “John Q. MAGA” live streamed his exploits to DLive. He’s wearing a mask, so you can’t identify him.

Let’s also say that “John Smith” is on YouTube, where he used the same cell to record an (unmasked) video of himself.

Reviewing testosterone supplements, probably.

6/9
Now, you don’t know if “John Q. MAGA” is actually “John Smith” by sight—he’s wearing a balaclava, after all. But multimedia forensics can extract the sensor noise fingerprint of the two videos, and if it was the same phone, those fingerprints will match. Boom: unmasked MAGA.

7/9
There are many papers detailing various approaches that multimedia forensics experts use to link source videos across social media platforms using the sensor noise fingerprint. Here’s one:

8/9

ncbi.nlm.nih.gov/pmc/articles/P…
The money quote from that paper: “its effectiveness has been proved to link Facebook images to YouTube videos…”

I just wanted folks to be aware that, just because a cellphone camera operator hides their face in their criminal selfie videos, there are ways to identify them.

9/9
PS: to tie it back to the first tweet in that thread…

If you can use sensor noise to identify a person recording *someone else committing a crime*, you’ve just opened up a new avenue of investigation; one that can place the videographer alongside the subject of the video.
P.P.S.: remember that Parler gave verified status to anyone who sent a photo of their drivers license?

How do you think they took that photo?

Using their cellphone camera.

Which adds that unique sensor noise fingerprint.

So, yeah…there’s a lot of data available to the FBI.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with ➖Dustin Miller➖

➖Dustin Miller➖ Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @spdustin

Dec 10, 2022
The format of this post isn’t Slack’s default format.

The way <!here> is rendered is the giveaway that non-employees have been given a (potentially complete) export of Twitter’s private Slack workspace.

Such exports can (and often do, for enterprise users) include Slack DMs
If I was a former Twitter employee, I’d be furious. Access has been described as “complete” and “unfettered.” Combined with the screenshot, it leads me to believe that non-employees were given a complete “compliance export” of Twitter’s private Slack Enterprise Grid workspace.
If true, it’s likely in violation of California’s tough privacy laws. Yes, even internal corporate chats would be covered once they’re shared outside the corporation, like Twitter’s current leadership appears to have done here.

Ex-tweeps: call your lawyers. You’re under attack.
Read 7 tweets
Jan 10, 2021
Parler getting kicked off AWS is really wild. Don’t get me wrong, AWS has the absolute right to do it, but the fact that they ARE doing it is mostly unheard of.

For sure, the act *itself* makes Parler toxic to every other cloud computing provider with infrastructure in the U.S.
Google Cloud Platform and Microsoft’s Azure certainly won’t touch them with a ten foot pole. And as much as Parler admins claim they developed the site to avoid vendor lock-in, that’s probably the most expensive way to host on AWS, and is almost certainly not true in real life.
And they have, what, a day to move the site? There’s probably enough data alone to make that impossible, even with Mercer Money. Unless they’ve been backing up offsite to external media (highly doubtful), they likely won’t be able to get all their data out in time.
Read 7 tweets
Jan 9, 2021
Twitter told @verge: “If a government account, like @POTUS, was used to evade @realDonaldTrump’s ban, Twitter said that it would remove the content associated with this behavior and try to remove Trump’s access to this account.”

theverge.com/2021/1/8/22218… ImageImageImageImage
Looks like he already deleted them.

But @TwitterSafety / @Twitter knows he did it.
Aside from his ban-evasion tweets from minutes ago (now deleted), the last time Trump tweeted as @POTUS was June 1, 2018—two and a half years ago. Image
Read 6 tweets
Jan 6, 2021
Protesters are now **inside** the Capitol Building. Senate hearings are suspended.

These MAGA terrorists are now brawling with police inside the U.S. Capitol Building, and trying to get through to the interior chambers.

Doors to the Senate have been locked, Pence and Grassley were whisked away to a secure location, remaining senators instructed to stay away from the doors and remain silent.

Your kids know what that feels like.
Read 49 tweets
Jan 6, 2021
We’re gonna win this thing.
I’m serious, we’re gonna win this thing.
New York Times reporter @jennymedina liveblogs, “Georgia election officials have suggested we may not know final numbers until midday tomorrow,” which is true.

But it looks like we’ll know tonight if we won the Senate.

(It sure does look that way.)
Read 5 tweets
Oct 18, 2020
You’d think that Trump’s own DOJ would be shouting from the rooftops about “Hunter’s hard drive” if it was found to be legitimate after a digital forensics analysis. But they’re not.

One thing we do know: the FBI was investigating if it’s a Russian disinformation campaign.
The repair shop owner said the computer (an an external hard drive that appears to have been purchased by the shop after the laptop was allegedly dropped off) was given to the FBI for a grand jury investigation in December 2019.
Also in December 2019: NSA Chief O’Brien told Trump that he believed Giuliani was being targeted by a Russian disinformation campaign in an effort to influence the 2020 election by discrediting Joe Biden.
Read 9 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(