Photo & Video Verification
Photo & Video Verification
Section titled “Photo & Video Verification”How to verify authenticity, extract information, and properly document visual evidence.
Why Verification Matters
Section titled “Why Verification Matters”In rapid response situations:
- False alarms waste resources and cause unnecessary fear
- Misinformation can spread quickly through networks
- Verified information builds trust and credibility
- Proper documentation supports legal proceedings
Image Verification Steps
Section titled “Image Verification Steps”1. Check the Source
Section titled “1. Check the Source”Questions to ask:
- Who shared this image?
- Where did they get it?
- Is the source reliable?
- Is there a chain of custody?
Red flags:
- Unknown or anonymous sources
- “Friend of a friend” sharing
- Screenshots without context
- Viral images without attribution
2. Reverse Image Search
Section titled “2. Reverse Image Search”Tools:
- Google Images - Click camera icon
- TinEye - Finds exact matches
- Yandex Images - Often finds what others miss
Process:
- Save or screenshot the image
- Upload to reverse image search
- Look for earlier versions
- Check if image appears in different contexts
What to look for:
- Is this an old image being recirculated?
- Has it been used in other locations/contexts?
- Is there an original source with more information?
3. Examine Metadata (EXIF)
Section titled “3. Examine Metadata (EXIF)”What EXIF data can reveal:
- Date and time taken
- Device used (phone, camera model)
- GPS coordinates (if not stripped)
- Camera settings
Tools:
- Jeffrey’s EXIF Viewer
- Pic2Map - Shows location on map
Limitations:
- Social media platforms strip EXIF data
- Screenshots don’t preserve original metadata
- Can be edited or removed intentionally
4. Analyze Image Content
Section titled “4. Analyze Image Content”Consistency checks:
- Do shadows match the claimed time?
- Is weather consistent with reported date?
- Are visible signs/landmarks accurate?
- Does vegetation match the season?
Look for manipulation:
- Inconsistent lighting or shadows
- Blurry edges around objects
- Repeated patterns (clone stamp artifacts)
- Color inconsistencies
Tools:
- FotoForensics - Error level analysis
- Image Edited? - Quick check
Video Verification
Section titled “Video Verification”Initial Assessment
Section titled “Initial Assessment”Check these first:
- Video length and completeness
- Audio quality and consistency
- Any visible timestamps
- Platform of origin
Frame-by-Frame Analysis
Section titled “Frame-by-Frame Analysis”For critical videos:
- Download the video (if possible)
- Use video player with frame advance
- Look for inconsistencies between frames
- Note any cuts or edits
Tools:
- InVID Verification Plugin - Browser extension
- YouTube DataViewer - Extract YouTube metadata
Audio Analysis
Section titled “Audio Analysis”Listen for:
- Consistent background noise
- Audio cuts or jumps
- Sound that doesn’t match visuals
- Language/accents that match location
Geolocation Techniques
Section titled “Geolocation Techniques”Confirming Location from Images
Section titled “Confirming Location from Images”Step 1: Identify landmarks
- Buildings, signs, structures
- Natural features (mountains, water)
- Street furniture (lights, benches)
- Vegetation types
Step 2: Cross-reference with maps
- Google Maps Street View
- Google Earth for satellite imagery
- OpenStreetMap
Step 3: Verify perspective
- Does the angle match?
- Are distances consistent?
- Do landmarks align?
Sun and Shadow Analysis
Section titled “Sun and Shadow Analysis”Shadows can reveal:
- Time of day - Shadow length and direction
- Date approximation - Sun angle varies by season
- Consistency - All shadows should match
Tool: SunCalc - Shows sun position for any location/time
Documentation Best Practices
Section titled “Documentation Best Practices”When Receiving Images/Video
Section titled “When Receiving Images/Video”Record immediately:
- Source (who sent it)
- Time received
- Original platform
- Any accompanying text
- Context provided
Creating a Chain of Custody
Section titled “Creating a Chain of Custody”| Field | Record |
|---|---|
| Original source | Who captured/created it |
| Date/time of capture | When was it taken |
| Location of capture | Where was it taken |
| How received | Platform, method |
| When received | Date and time |
| By whom | Your name |
| Storage location | Where you saved it |
File Preservation
Section titled “File Preservation”Do:
- ✅ Save original file without editing
- ✅ Create working copies for analysis
- ✅ Use descriptive filenames with dates
- ✅ Back up to multiple locations
- ✅ Document any edits made to copies
Don’t:
- ❌ Edit originals
- ❌ Compress or convert originals
- ❌ Screenshot instead of saving
- ❌ Lose track of source
Filename Convention
Section titled “Filename Convention”YYYYMMDD_HHMMSS_location_description.extExample: 20250115_0730_123MainSt_vehicle.jpgVerification Checklist
Section titled “Verification Checklist”Before sharing verified information:
Source verification:
- Source identified and documented
- Source reliability assessed
- Original file preserved
Image/video analysis:
- Reverse image search completed
- Metadata examined (if available)
- Content consistency checked
- No signs of manipulation
Location verification:
- Landmarks identified
- Location cross-referenced with maps
- Perspective verified
Time verification:
- Claimed time documented
- Shadows/lighting consistent
- Weather matches claims
Documentation:
- Chain of custody recorded
- Original preserved
- Analysis notes saved
Common Manipulation Types
Section titled “Common Manipulation Types”Be Aware Of:
Section titled “Be Aware Of:”| Type | Signs |
|---|---|
| Cropping | Important context removed |
| Splicing | Multiple images combined |
| Clone stamp | Repeated patterns, smoothed areas |
| Date manipulation | EXIF data edited |
| Old images | Recycled from past events |
| Misattribution | Real image, wrong context |
When Verification Fails
Section titled “When Verification Fails”If you cannot verify an image or video:
- Don’t share it as verified
- Note what couldn’t be verified
- Seek additional sources
- Label as unverified if sharing
It’s better to say “unverified report” than to spread misinformation.
Resources
Section titled “Resources”Verification Tools
Section titled “Verification Tools”- InVID/WeVerify - Comprehensive toolkit
- Bellingcat Verification Tools