CameraForensics Labs
CameraForensics Labs is a suite of tools designed to search, analysis and cluster collections of sensitive media (images and video).
The architecture provides a vendor-agnostic hosting strategy to allow for the integration, evaluation, validation and deployment of best-in-class analysers and classifiers.
Features
- Search by description: Find media using natural language
- Automatic clustering using specific image features, such as detected faces
- Similar image search
- Generative AI: detection of created and modified images
- Complete Exif searching across your media
- Detailed worldwide mapping
- Automatic Project VIC indexing
- Imports of CameraForensics OSINT data to identify online leads
- Flexible deployment options including local air-gapped installation
Benefits
- Rapidly analyse large media caches to establish investigative priorities
- Intuitive user interface with multiple search criteria options
- Organise large media caches based on visual and non-visual features
- Quickly extract new intelligence from unstructured media collections
- Deployable on public or private cloud infrastructure
- Can be delivered to air-gapped systems for sensitive media analysis
- Easily updated with the latest analysis techniques
- Automatic Project VIC categorisation for classification of CSAM
- Import OSINT data and hashlists to identify external leads
- Reduce manual assessment work, focus investigators time on new intelligence
Pricing
£231,567.12 to £340,450.12 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 9 1 9 5 3 7 0 9 7 7 7 9 3 0
Contact
CameraForensics Ltd
info@cameraforensics.com
Telephone: 07812165133
Email: info@cameraforensics.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- Users access the service through an internet browser. No software download is required to access a cloud-instance. Local installation is also available - e.g. onto a HighSide system. Suitable hardware can be provided if required. For cloud-instances https internet connection is required and is subject to local firewall and access control policies. Connectivity is verified using TLS certification. Access control is via email accounts within pre-approved domains. The service is supported for recent releases of Edge, Chrome and Mozilla Firefox.
- System requirements
-
- Internet Browser: Chrome, Firefox or Edge
- Local firewall and access control policies that permit https connection
- All licencing required for analytics components is included
- Local installation requires appropriate hardware, including at least one GPU
- Hardware can be configured and delivered by CameraForensics if required
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our system is accessible 24/7 with an availability well in excess of 99.9% over the past 3 years. Second-line support will be provided via a dedicated email account. Users and/or their first line support will be able to raise issues which will be responded to by email or telephone during business hours (typically within 2 hours), or if reported out of hours, at the start of the next working day.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
As described above, second-line support will be provided via a dedicated email account. This facilitates the reporting of issues at any time, and prompt response during business hours. This approach also has the advantage that it is independent of the status of the main system and therefore provides a robust mechanism for problem reporting. Users and/or their first line support will be able to raise issues which will be responded to by email or telephone during business hours, or if reported out of hours, at the start of the next working day. Where the CameraForensics team have proactively identified any issues the same reporting, fix and communication process will be used.
Monthly reporting, including standard metrics on the service performance against the SLA and issues raised and resolved, will be provided.
This level of support is included in the baseline service costs.
Provision of on-site support (e.g. training) can be provided at an additional per-event cost. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We design our powerful user interface to be efficient and intuitive, thereby minimising training requirements and making the tool suitable for infrequent use. There are inbuilt online help tips, which guide the user on how to get the most out of the system, and we employ tooltips to clarify elements that might not be immediately obvious.
Formal training can be delivered in-person or remotely. Some remote training for new users is included in the licence cost. Additional on-site training can be delivered (at extra cost) to develop expert users and local champions. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Retained information includes user account information. This can be provided on request to appropriate management account holders. Data is typically provided in CSV format.
- End-of-contract process
-
At the end of a contract period, the associated user and manager accounts are suspended.
Account data can be provided and/or deleted at the customer's request.
Accounts and keys can be preserved and reactivated under a new contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Our powerful user interface is efficient and intuitive, thereby minimising training requirements and making the tool suitable for infrequent use. Searching, clustering and analysis is straightforward yet powerful, allowing users to combine multiple analytics to prioritise investigative work and identify new leads.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- No testing with assistive technology users, but the interface is analysed with a combination of automatic and manual checks against the WCAG checklists.
- API
- No
- Customisation available
- Yes
- Description of customisation
-
The system can be customised through the addition of analytics modules - for example Buyer-owned or 3rd-party capabilities of interest to the Buyer. The Buyer can also elect to remove specific default features depending on their use-case and local policy constraints.
Customisation is carried out by CameraForensics developers on behalf of the Buyer.
Scaling
- Independence of resources
-
Professional performance testing and measurement software Gatling is used to test the system. This enables us to define testing criteria and ramp up users to beyond a life-like usage profile to stress-test the system.
Current testing criteria include:
1: Simulation of multiple simultaneous users searches with simple and complex analysis combinations;
2: Assessment of each installed analytic to provide reliable performance expectations.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
The CameraForensics system records active users and logins in a metrics database. These data are available to nominated client administrator accounts. If necessary, collection of this data can be disabled to meet user security or privacy requirements.
This data can easily be exported from CameraForensics in a format to be agreed with the user (e.g. CSV) for subsequent loading and analysis in other systems. - Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data related to customer accounts can be provided on request.
- Data export formats
- CSV
- Data import formats
- Other
- Other data import formats
-
- Image metadata as search input (project VIC)
- Image metadata as search input (JSON)
- Search-by-image is available using a variety of standard image formats
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Our system is accessible 24/7 with an availability target of 99.9%. In our experience of operating similarly configured systems to date the most serious incidents encountered have been resolved within 2 hours.
- Approach to resilience
- We are dependent on hosting services and connectivity provided by world-class third party suppliers, under standard commercial terms. The hosting services include full backup and failover contingencies which provide robust assurance that underpins our service commitments.
- Outage reporting
-
Service status, outages and planned maintenance are communicated via a “splash screen” at the login page, and by automated response to queries to our second-line support via email.
Significant outages are reported via email to nominated client leads.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Username or password
- Access restrictions in management interfaces and support channels
- User access is determined by roles assigned to nominated user accounts. These roles govern access to management reporting and support.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We maintain and update a local security policy and associated procedures, overseen by Matt Burns, CEO. This policy and associated governance documents are annually self-assessed against the CyberEssentials standard.
- Information security policies and processes
- Information security is governed by local policies which are overseen by Matt Burns CEO. We self-certify these policies and associated processes.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Software version and release control is via industry-standard tools. Software development is controlled via BitBucket.
Changes are pushed, checked, approved and released.
A Jenkins service is used to execute, test and confirm a new build. The automated testing includes security-related test scripts. If these test are successful then there is a manually controlled switch to a new release version.
There is an automated methodology for building and adding new server resources via the cloud services provider to ensure that new resources are consistently configured.
. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We respond to relevant vendor security update notifications for all software and service components.
Our cloud servers are patched regularly.
Updates that are classed as urgent will be implemented within 24 hours. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Protective monitoring is performed via automated event reporting. Events include notification of potential attack events (e.g. multiple failed access attempts, or script insertion attempts). In the rare event where a potential vulnerability is detected via this route, our software is patched and updated promptly.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Service management processes are in place which include incident response and communication methods. Service status is reported via the web interface and via email to the customer's nominated user support contacts.
Users report incidents by phone or the email-based support service.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
As a small technology business, we are able to keep our consumption of manufactured items very low. We are paperless, and any IT equipment is specified and procured for longevity.
Careful consideration is given to the necessity for foreign travel. Whilst an amount is necessary to build relationships within the international community, we now maintain and build many of these relationships online and via teleconferencing technologies. When we do travel, we ensure efficiency; e.g. attending a conference with a number of other international delegates, rather than multiple single trips.
Analysis of our business shows that our most significant climate impact is via our use of cloud compute resources. We are careful to only employ resources that we need for our business, and are also mindful of the impact of our choices. We are starting to monitor our impact on an ongoing basis, through the use of online tools designed to help and optimise for the purpose.Covid-19 recovery
During and after the COVID period we have been mindful of employee health and wellbeing, ensuring staff are able to balance work, health and other commitments in a changing and evolving landscape. We are a modern technology company, with both our facilities and ways-of-working intrinsically designed around hybrid working. We are similarly mindful of ensuring our suppliers have a good understanding of the state of our business in uncertain times, such that they are fully apprised of potential issues or changes that may impact them.Tackling economic inequality
We are an agile SME and a significant proportion of our work is in assessing, developing and implementing innovative and disruptive technologies ultimately providing more effective, efficient and higher quality services to government. Our cloud-based services maximise our ability to provide services to public service customers elsewhere in the world where they are aligned with our core values and mission. We take security and risk management very seriously, and engage with external experts and auditors to ensure we identify and manage cyber security risks in the delivery of any contract to protect both us and the Buyer.Equal opportunity
As a business, we are working to continually review and improve our provision of equal opportunities in the company day-to-day operations and during recruitment. All recruitment adverts are written mindfully of inclusivity, and are reviewed by an external HR specialist for this purpose. We also use language analysis tools for this purpose. Salaries are stated on job adverts, and we are open about salary scales within the business.
We support flexible working and remote working, and the majority of our staff are not on full-time contracts. Our recruitment campaigns make this clear, and we acknowledge that more traditional set hours are not suited to everyone’s situation.
We engage with groups in our local ecosystem that help with diversity of recruitment and engagement.
We have a robust modern slavery policy, written in conjunction with a number of other SMEs and NGOs working in our industry.Wellbeing
Our services are developed for, and used by, law enforcement. Several wellbeing benefits arise, not least a reduction in time spent by investigators and other law enforcement personnel reviewing and assessing disturbing illegal imagery. Our services assist in the identification of victims of online crimes thus reducing harm to those victims and to wider society.
The CameraForensics approach to employee wellbeing is driven from the company’s healthy and safety policy and assessments, with the topic an ongoing entry in the risk assessment process. Given the area work within, the team are provided with a fortnightly opportunity to discuss concerns or issues with senior staff, and have the open offer of support via professional counseling services if required. No staff are permitted to view IIoC material (not an issue when working in the UK, but potentially in other legislative environments abroad), and have full authority and empowerment to leave a situation where they feel that this might happen. Exposure to descriptions of acts is done so mindfully, and at minimum to allow the technical work to be carried out. Where results of crawl or search activities have the potential to discover IIoC, staff interact with the data using console-based activities. As an additional safeguard, the CameraForensics platform automatically hides any images flagged as potential IIoC, and the option is available to hide all images.
CameraForensics senior management periodically review the company’s approach to this topic as part of the company’s health and safety assessment and continuous improvement activities.
Pricing
- Price
- £231,567.12 to £340,450.12 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Full service for a month