Digital Threat Assessment Toolkit
8.1 Visual Details Matter
Today, most photos are taken with the camera on a phone or tablet and are immediately available for review and dissemination. Photos can also be taken from a social media app. Each app likes to distinguish itself by having different displays with unique app details and fonts. Being able to identify which social media platform an image originated from can save time and is helpful with developing focused interview questions.
To illustrate, here is a photo taken through the iPhone Camera.
Here is the exact same photo taken through and posted to a few select social media apps. The arrows indicate the unique visual user interface (UI) display features of each app. For example, the photo will look different on Instagram than it will on Snapchat.
Photo Posted to Facebook
Photo Posted to Twitter
Photo About to be Posted on an Instagram Story (disappears after 24 hours)
Photo Taken and Posted on Snapchat
It is important to notice inconsistencies which suggest that an image has been edited or changed. Look at the image below and try to find the inconsistency.
Notice the font difference. The original threat on the Snapchat example shown has been duplicated and then modified with a different (specific) school name. The student has made a simple modification to an existing image found on the internet. This is a common copycat threat.