You say now that the video format is MP4
In my experience these are harder to modify than AVI files. The 'moov' atom has to be exact. It stores the locations of each audio and video frame, either as an exact location, or as a length, This information will typically be stored in memory before the file is closed.
Again, most frames are a different length though I have seen an audio codec that typically had a fixed size audio frame.
To modify a static file is possible, but to change an open file is very difficult
yes the video is MP4 because since the previous software was freezing up, I downloaded a new recording program, ISpyu that comes in the windows 8 app that does not give problems. The videos recorded are MP4. However, I have this doubt. I do not understand from your reply exactly how this works. Is this very difficult to obtain or impossible? Would this leave traces that can be recognized on the pc or on the file?
The idea is, what if the pc clock is being stopped. Does the program end the recording or will hang on until the clock starts ticking again? In the latter case, is there a way to track down this?
So to explain again, the previous software I had was freezing up the whole pc (or rather I suspect they might have frozen up). The video could not be played afterwards or rather I could retrieve part of the video, hours missing.
This new software does not give the same problem, the pc is ok, the program seems to be recording ok but I was suspecting that instead of freezing the pc they tried to block for a few minutes the pc clock
So, as indicated, I would simply like to know in which ways I may be tricked
-video being modified as the camera/program recording | possible? | how to find out
-video being remotely saved to an invisible folder, the folder that is indicated where the files are saved is a fake folder where they are feeding a video being recorded somewhere else | possible? | how to find out
-recording software made to freeze at times and resumed, video files can be played back afterwards | possible? | how to find out
-pc made to freeze at times, video files cannot be played afterwards | possible? | how to find out
-various types of disguises used to enter the scene, mimetics, things that blend in the environment | possible? | how to find out
- anything they might have attempted not listed
So, as indicated, I would simply like to know in which ways I may be tricked
And, as I indicated earlier, I would simply like to know some background of what you are after.
Are you trying to secure *something*?
If yes, among all the possible ways to "secure" *something* by setting up a security camera recording, the most insecure are
- using a PC <- 10 points
- running Windows 8.1 <- +1000 points
- allowing physical access to it <- +100 points
- allowing remote access to it <- +100 points
if you summed up 100 points or more your security system is so insecure that you are losing your (and our) time.
What you initially asked was an entirely different question, suitable for a forum and connected to forensics, what you are now asking is more like "teach me every possible way to trick a security camera" which is far less suited and you also have this vague "conspiracy" approach.
Who (the heck) are the "they"?
You have to understand how if the "they" are disgruntled fastfood employees that are suspected to pilfer a few hamburgers from the fridge of the restaurant or if "they" are three letters Government agencies or secret agents from enemy countries the technology available to "them" may be substantially different.
jaclaz
So, as indicated, I would simply like to know in which ways I may be tricked
And, as I indicated earlier, I would simply like to know some background of what you are after.
Are you trying to secure *something*?
…
r if "they" are three letters Government agencies or secret agents from enemy countries the technology available to "them" may be substantially different.jaclaz
Well yes I am trying to secure something or rather to make sure that if something goes wrong gets detected. The pc is a store of information, so the information that you find there can be used as evidence that something wrong took place. Am I correct? As to who, I do not know who and I do not even know if anything took place. To be sure to head in the right direction, let's consider the worst case scenario, a three letters agency etc. I need to understand how the storage of data on the pc can be used to understand that something was done, modified etc. Let's stick to this. And I am not interested in knowing the tricks but in detecting them
Well yes I am trying to secure something or rather to make sure that if something goes wrong gets detected. The pc is a store of information, so the information that you find there can be used as evidence that something wrong took place. Am I correct? As to who, I do not know who and I do not even know if anything took place. To be sure to head in the right direction, let's consider the worst case scenario, a three letters agency etc. I need to understand how the storage of data on the pc can be used to understand that something was done, modified etc. Let's stick to this. And I am not interested in knowing the tricks but in detecting them
Look, if the "they" are any of the three letters agency, you are ALREADY "theirs".
For the "worst case scenario" (excluding the three letters agencies above) you need AT THE VERY LEAST 2 (two) video security recording circuits, BOTH NOT based on a PC, a crappy OS and a probably even crappier video recording "app", but rather professional, dedicated, hardware, stored in a place where NO physical access is possible, NOT connected externally to anything, with cables running in protected pathways, connectors with lock-in devices, UPS, etc., i.e. the first defense against possible tampering is to limit the possibilities, as opposed to allow many ways to do so and attempting to detect later if something was fiddled with.
As well, there is a whole branch of digital forensics about video (and image) forensics, that (besides the training and knowledge of the operator) typically use high cost dedicated software, example
http//
though free programs do exist, example
http//
jaclaz
Thanks for your reply. What I am looking into truly is which things I should be looking for in the Operating system for obvious signs of editing, changing. The things you are suggesting are not an option for me and my resources. I think there must be a way, thanks to the pc, to know what events took place. Examining perhaps physically the pc or going into the OS event viewer, comparing those to a 'normal' pc should be enough to provide some sort of proof that something took place or of the contrary. This is what I am looking for. If you have idea, please reply. In case you do not know how to respond, please let someone who wants provide an answer. This is to avoid running again into that 'loop'. So far I understand that you are only focusing on blaming the lack of technology. To that I respond that a pc should be a gold mine of data where you might find every information that is needed. I hope this is the case
forevid I have downloaded on my pc
Thanks for your reply. What I am looking into truly is which things I should be looking for in the Operating system for obvious signs of editing, changing. The things you are suggesting are not an option for me and my resources. I think there must be a way, thanks to the pc, to know what events took place. Examining perhaps physically the pc or going into the OS event viewer, comparing those to a 'normal' pc should be enough to provide some sort of proof that something took place or of the contrary. This is what I am looking for. If you have idea, please reply. In case you do not know how to respond, please let someone who wants provide an answer. This is to avoid running again into that 'loop'. So far I understand that you are only focusing on blaming the lack of technology. To that I respond that a pc should be a gold mine of data where you might find every information that is needed. I hope this is the case
I think jaclaz, who has now humored your conspiracy theory for 9 pages, has posted any number of well thought out replies, yet every time you manage to turn to the most illogical scenarios.
You are not a digital forensic examiner. How do you expect to examine anything you have described?
It would take you at the very least several years to get to the point of understanding how to perform forensics on the video you have. Then several more to hone your skills to the point where you could work at the level of sophistication to detect the bad actors you think are sneaking in and out of your video.
Additionally, if you wanted to perform forensics on the PC in question it would take several more years of training for you to be functionally literate in digital forensics. Even more to be able to detect the tampering you claim is happening.
If you have something so precious you need to protect, have professionals come in a set up a camera system where every camera sees another camera AND sees the recorder. Have pressure plates installed under the floor to detect whatever it is you believe is walking in and out of the room. Have laser motion detectors installed. And have all of this installed not just in the room but every where in the facility and everywhere on the perimeter of the facility.
Then hire guards, from different companies in different cities , to work in randomly assigned pairs to monitor the area 24/7.
And then you can post on some security forum and start asking how someone could break in to your facility and walk between the laser beams while floating above the floor and break into a sealed recorder without ever breaking the seal to remove their presence from the video. See if you can get them to go along for 9 pages.
roll