Secure Camera Mark II

  1. Security
    1. Encryption of the photo, date, and hash number.
      1. Usage of a PIN (Photo Identification Number).
        1. The PIN is the date along with the time stamp as a header to the hash number.
        2. The PIN is encrypted with a private encryption key.
      2. Encryption is done with the RSA algorithm (private key algorithm).
    2. Use of a retinal scanner within the encrypted photo.
      • Time and Date stamped onto the photo.
    3. The camera casing will be secured in case of tampering with security tab.
      • The secuity tab will have several major functions:
        • Camera memory and command functions will be locked and encryption with a private key lock.
        • A discolorant gas will be released showing that the casing seal has been broken.

  2. Production
    1. Government contractor will be contracted to provide production and maintenance of the camera (and all that it entails).
      1. Unique message digest time for each camera.
      2. Time -> GMT (Greenwich Mean Time) is used and a clock chip is placed in the camera and set at production time.
        1. Both primary and backup cells will be used as well as a lithium battery built into the circuit board. With a photo-electric re-chargable backup to extend survivability.
        2. Lithium battery may only be replaced by the manufacturer.
        3. External LED time display will display either GMT or local time.
    2. WORM drive CD ROM or an alternative ZIP Drive with a one way write will be used to store the PIN and the digital image.
    3. This camera will be black boxed and sealed with NO access to the CD ROM/ZIP.
    4. If camera casing is either tampered with or broken into, security measures, as described above, will be instituted.

  3. Verification
    1. Camera users can optionally register the camera with the manufacturer and at retrieval may register the disk.
    2. Courts are responsible for verification.
      1. The judge gets the disk with has a copy of the PIN and digital image with retinal scan.
      2. The judge verifies the original chip.
      3. Judge verifies originality of the disk and the digital image by comparing the PIN and the retinal scan of the photographer to the information on the disk.
      4. The hash numbers are compared after proper decryption to verify the pictures.
      5. The retinal scan is also embedded into the digital image, therefore verifying its veracity.
      6. All other procedures are as defined by the court.

  4. Usage
    1. All military and governmental organizations to include police and court officials.
    2. News organizations, private investigators, and anyone else with the means to procure a camera (legally).



Background
Rules of Evidence




1