Forensic Examination Methods – Kingdom of Kush Official Documents

Step-by-Step Forensic Examination Protocol I Would Follow

Based on standard digital image forensics best practices as of 2026):

  1. Metadata Extraction & Verification (EXIF, IPTC, XMP)
    • Check: Camera make/model, date/time stamps (DateTimeOriginal vs. ModifyDate), GPS coordinates, software used (e.g., Photoshop, GIMP → indicates editing), shutter count, lens info.
    • Red flags: Inconsistent timestamps, editing software in the chain, missing original creation data, or signs of stripping tools (e.g., “ExifTool” or “Adobe Photoshop” repeatedly).
    • Tools: Use free online viewers like https://jimpl.com/, https://metadata2go.com/, or https://onlineexifviewer.com.
  2. Error Level Analysis (ELA)
    • Detects recompression differences — edited areas often show brighter/darker compression artifacts.
    • Red flags: Inconsistent ELA patterns (e.g., cloned areas, spliced elements, or AI-generated content).
    • Best free tool: Forensically — highly regarded by Bellingcat and investigators (includes ELA, clone detection, noise analysis, level sweep, etc.).
  3. Clone Detection & Noise Analysis
    • Looks for duplicated regions (copy-move forgery) or unnatural noise patterns (common in deepfakes/AI edits).
    • Tools: Same Forensically site (Clone Detection + Noise Analysis).
  4. JPEG Compression & Quantization Analysis
    • Checks for double compression (re-saving after edit) or inconsistencies in quantization tables.
    • Tools: FotoForensics or Forensically’s JPEG Analysis.
  5. Content Authenticity (C2PA) & Modern Checks
    • Newer standard for provenance (used by some news orgs). If present, it shows edit history.
    • Tools: Forensically now supports C2PA.
  6. Visual & Contextual Review
    • Lighting/shadow inconsistencies, edge artifacts, perspective errors, anatomical anomalies (for AI), etc.