Lights, camera, authentic imagery - Digital Threat Digest
PGI’s Digital Investigations Team brings you the Digital Threat Digest, SOCMINT and OSINT insights into disinformation, influence operations, and online harms.
PGI’s Digital Investigations Team brings you the Digital Threat Digest, SOCMINT and OSINT insights into disinformation, influence operations, and online harms.
Last week, world-renowned camera company, Leica announced the release of its first ‘Encryption Verification’ camera with content credentials built in. This camera is intrinsically designed to ensure the authenticity of photos taken on it, and has features which embed a photo’s metadata, including the location, camera make, picture mode, and details of any editing history. Images can also be verified through an external website or through the Leica app, providing another avenue to confirm the legitimacy of images. Designed initially for photojournalists, this product comes at a time when images are highly susceptible to misattribution, manipulation and even being wholly generated by artificial intelligence. From AI photos of Donald Trump, to misattributed photos of conflict zones – the integrity of photos is important to maintaining public trust in what we see online, now more than ever.
One drawback is the hefty price tag of $9,000, which will create barriers to access. However, the technology behind this product is still exciting, and down the line will hopefully become more widely available to consumers, journalists, and the general public. Photo verification services are not new, but embedding of this technology into everyday products such as cameras tackles the problem directly at the point of capture. In August, Canon partnered with Reuters and Starling Lab, an academic research lab, to run a pilot program which explored how embedding metadata within images might create an increased sense of trust from viewers around the integrity of the image.
This pilot and other initiatives by camera brands and technology companies is encouraging, especially given the ease at which manipulated images can spread like wildfire on social media. There are, of course, questions about the ease of accessibility and how this type of technology will develop. But for right now, the move towards cementing authenticity and legitimacy within photos and products themselves signals a new approach to tacking misinformation. This will be beneficial not just for photographers and photojournalists, but also for members of the OSINT community who work to fight against misattributed and manipulated content.
More about Protection Group International's Digital Investigations
Our Digital Investigations Analysts combine modern exploitative technology with deep human analytical expertise that covers the social media platforms themselves and the behaviours and the intents of those who use them. Our experienced analyst team have a deep understanding of how various threat groups use social media and follow a three-pronged approach focused on content, behaviour and infrastructure to assess and substantiate threat landscapes.
Disclaimer: Protection Group International does not endorse any of the linked content.
In the mid-20th century, Gilbert Ryle threw sand in the eye of Cartesian dualism, calling the idea of a separate mind a 'category mistake' and dubbing it the 'ghost in the machine'—essentially suggesting that Descartes had outed himself as harbouring an imaginary friend.
Everything that I have learned about the US elections this year has been against my will. Don't get me wrong, I am well aware that whoever controls the White House has significant impact around the world, and I will admit that keeping up with American politics makes me a better analyst.
Digital threat intelligence helps us respond to harmful entities and their activities online. As our professional investigation capability evolves, so do the online tactics of threat actors themselves, in something of a perpetual cat and mouse game.