Transfer refers to the electronic or physical movement of video, metadata, and related documentation from one device or location to another. Transferring can occur at any point in a workflow, and often happens at multiple points.
Transferring includes any kind of copying, uploading, or downloading of files between local or remote devices (e.g. camera to computer, camera to cloud service, hard drive to local server, etc.) and the physical transportation or shipment of storage devices, such as USB sticks or hard drives.
Ideally, the result of a transfer is a file that is complete, unaltered, and in its original format. Videos can be easily lost, altered, corrupted, or disassociated from each other and their metadata and documentation when transfers are not done properly. Transferring media can also be a very time consuming process, so it is important to transfer efficiently.
A Scenario: Getting Video to its Destination
The Citizen Journalists Network aims to get credible, high-quality video footage to major news outlets to highlight growing unrest in a remote area of their country. The Network needs to get video from this remote location to their contacts at BBC, CNN, and Al Jazeera without losing the metadata needed for verification, and without degrading the image/audio quality. The Network also needs to make sure that information with security restrictions is not released. What do they do?
- After recording, Saira offloads the unaltered original files from her camera onto two encrypted portable hard drives. She also puts a text file with metadata on the hard drives.
- Yaser physically carries one of the hard drives to the network’s safe central location, while Saira holds on to the other copy for safekeeping.
- At the central location, Ahmed performs a virus check, then decrypts and copies the original files and additional metadata from the portable hard drive to their primary storage device, which is backed up.
- Hala looks at the footage, and checks whether there is sensitive information that needs to be restricted in the videos or its metadata before it is shared outside of the network.
- Hala selects and sends some original files with descriptions to her contacts in the news media via FTP.
Encrypt files when necessary
If your videos or documentation contain confidential information and your transfer is at risk of interception, encryption can be used to prevent the information from being revealed. The interceptor cannot decrypt and read your files without a secret key. Note that encryption does not prevent your files from being intercepted. Also be aware that possession of encrypted information can be incriminating in some cases.
Check for viruses
Malware like viruses and Trojans can spread through the Internet or on portable devices. Protect yourself from inadvertently acquiring malware by running virus check software on your computer and on portable devices before you transfer. If viruses are detected, clean your devices before transfer, and clean again after transfer. Also, only download or open attachments from known and trusted sources.
Try This: BASIC
There are many commercially available virus scanners. Some free virus scanners include ClamXAV, Immunet, and ClamWin.
Try This: ADVANCED
ClamAV is an open source anti-virus engine for detecting Trojans, malware, viruses, and other malicious threats.