Secure Camera Mark II
- Security
- Encryption of the photo, date, and hash number.
- Usage of a PIN (Photo Identification Number).
- The PIN is the date along with the time stamp as a header to the
hash number.
- The PIN is encrypted with a private encryption key.
- Encryption is done with the RSA algorithm (private key
algorithm).
- Use of a retinal scanner within the encrypted photo.
- Time and Date stamped onto the photo.
- The camera casing will be secured in case of tampering with
security tab.
- The secuity tab will have several major functions:
- Camera memory and command functions will be
locked and encryption with a private
key lock.
- A discolorant gas will be released showing
that the casing seal has been broken.
- Production
- Government contractor will be contracted to provide production
and maintenance of the camera (and all that it entails).
- Unique message digest time for each camera.
- Time -> GMT (Greenwich Mean Time) is used and a clock chip
is placed in the camera and set at production time.
- Both primary and backup cells will be used as well
as a lithium battery built into the circuit
board. With a photo-electric re-chargable
backup to extend survivability.
- Lithium battery may only be replaced by the
manufacturer.
- External LED time display will display either GMT or
local time.
- WORM drive CD ROM or an alternative ZIP Drive with a one way write
will be used to store the PIN and the digital image.
- This camera will be black boxed and sealed with NO access to
the CD ROM/ZIP.
- If camera casing is either tampered with or broken into, security
measures, as described above, will be instituted.
- Verification
- Camera users can optionally register the camera with the
manufacturer and at retrieval may register the disk.
- Courts are responsible for verification.
- The judge gets the disk with has a copy of the PIN and
digital image with retinal scan.
- The judge verifies the original chip.
- Judge verifies originality of the disk and the digital
image by comparing the PIN and the retinal scan of the
photographer to the information on the disk.
- The hash numbers are compared after proper decryption
to verify the pictures.
- The retinal scan is also embedded into the digital
image, therefore verifying its veracity.
- All other procedures are as defined by the court.
- Usage
- All military and governmental organizations to include police and
court officials.
- News organizations, private investigators, and anyone else with
the means to procure a camera (legally).
Background
Rules of Evidence