Feeds

Met lab claims 'biggest breakthrough since Watergate'

Power lines act as police informers

Top 5 reasons to deploy VMware with Tegile

Police scientists have hailed a new technique that recently played a pivotal role in securing a murder conviction as the most significant development in audio forensics since Watergate.

The capability, called "electrical network frequency analysis" (ENF), is now attracting interest from the FBI and is considered the exciting new frontier in digital forensics, with power lines acting as silent witnesses to crime.

In the "high profile" murder trial, which took place earlier this year, ENF meant prosecutors were able to show that a seized voice recording that became vital to their case was authentic. Defence lawyers suggested it could have been concocted by a witness to incriminate the accused.

The police force that ran the investigation this week declined to name the murderer in response to requests from The Register, citing undisclosed "operational reasons".

ENF relies on frequency variations in the electricity supplied by the National Grid. Digital devices such as CCTV recorders, telephone recorders and camcorders that are plugged in to or located near the mains pick up these deviations in the power supply, which are caused by peaks and troughs in demand. Battery-powered devices are not immune to to ENF analysis, as grid frequency variations can be induced in their recordings from a distance.

At the Metropolitan Police's digital forensics lab in Penge, south London, scientists have created a database that has recorded these deviations once every one and a half seconds for the last five years. Over a short period they form a unique signature of the electrical frequency at that time, which research has shown is the same in London as it is in Glasgow.

On receipt of recordings made by the police or public, the scientists are able to detect the variations in mains electricity occuring at the time the recording was made. This signature is extracted and automatically matched against their ENF database, which indicates when it was made.

The technique can also uncover covert editing - or rule it out, as in the recent murder trial - because a spliced recording will register more than one ENF match.

The Met emphasised that ENF analysis is in its infancy as a practical tool, having been used in only around five cases to date. Proponents are optimistic about its uses in counter-terrorism investigations, for example to establish when suspects made reconnaissance videos of their targets, or to uncover editing in propaganda videos.

Dr Alan Cooper, the leader of the Met's ENF project, said the technique is proving invaluable in serious cases, where audio and video evidence and its authenticity is often questioned.

ENF analysis is founded on research originally carried out by Dr Catalin Grigoras, a Romanian audio forensics expert. The British team showed Dr Grigoras' findings in eastern Europe were applicable to the UK National Grid, and developed algorithms to automate the analysis.

"ENF has basically been made possible by the move to digital recording," Dr Cooper said.

"Old magnetic cassette and VHS tapes didn't keep time accurately enough to extract reliable data, but now we can analyse even cheap voice recorders.

"The Americans are very interested. It's fair to say this is the most significant development in the field since techniques were developed to analyse the Watergate Tapes."

The field of audio forensics was largely established as a result of the Watergate scandal. In 1973 a federal court commissioned a panel of audio engineers to investigate the infamous 18 and a half minute gap in President Nixon's Watergate Tapes, the magnetic recordings he secretly made of his White House conversations.

The probe gave rise to a range of new techniques that showed that in fact as many as nine separate sections of a vital tape had been erased. Their report went on to form the basis of audio forensics for decades.

In contrast to the months of painstaking work on the Watergate Tapes, the computer power now cheaply available means the Met's ENF lab could authenticate a month-long digital audio or video recording in 10 to 12 minutes. ®

Intelligent flash storage arrays

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.