Forensic Examination Methods – Kingdom of Kush Official Documents
Step-by-Step Forensic Examination Protocol I Would Follow
Based on standard digital image forensics best practices as of 2026):
- Metadata Extraction & Verification (EXIF, IPTC, XMP)
- Check: Camera make/model, date/time stamps (DateTimeOriginal vs. ModifyDate), GPS coordinates, software used (e.g., Photoshop, GIMP → indicates editing), shutter count, lens info.
- Red flags: Inconsistent timestamps, editing software in the chain, missing original creation data, or signs of stripping tools (e.g., “ExifTool” or “Adobe Photoshop” repeatedly).
- Tools: Use free online viewers like https://jimpl.com/, https://metadata2go.com/, or https://onlineexifviewer.com.
- Error Level Analysis (ELA)
- Detects recompression differences — edited areas often show brighter/darker compression artifacts.
- Red flags: Inconsistent ELA patterns (e.g., cloned areas, spliced elements, or AI-generated content).
- Best free tool: Forensically — highly regarded by Bellingcat and investigators (includes ELA, clone detection, noise analysis, level sweep, etc.).
- Clone Detection & Noise Analysis
- Looks for duplicated regions (copy-move forgery) or unnatural noise patterns (common in deepfakes/AI edits).
- Tools: Same Forensically site (Clone Detection + Noise Analysis).
- JPEG Compression & Quantization Analysis
- Checks for double compression (re-saving after edit) or inconsistencies in quantization tables.
- Tools: FotoForensics or Forensically’s JPEG Analysis.
- Content Authenticity (C2PA) & Modern Checks
- Newer standard for provenance (used by some news orgs). If present, it shows edit history.
- Tools: Forensically now supports C2PA.
- Visual & Contextual Review
- Lighting/shadow inconsistencies, edge artifacts, perspective errors, anatomical anomalies (for AI), etc.