SWEAR has announced the completion of its integration with Milestone Systems’ XProtect® Video Management Software (VMS), enabling organizations to verify the authenticity of surveillance footage directly within their existing video management workflows.
The integration strengthens confidence in the evidentiary value of video used for investigations, compliance, and operational decision-making by ensuring that footage remains authentic and uncompromised.
Strengthening Trust In Surveillance Video
With the rapid growth of AI-generated media, manipulated content and hyper-realistic deepfakes are becoming increasingly common. These developments raise serious concerns for businesses, public institutions, and security teams that depend on video as reliable evidence.
Tampering with surveillance footage can compromise chain-of-custody requirements, threaten admissibility in legal proceedings, and undermine the credibility of security systems. The integration between SWEAR and XProtect Video Management Software addresses these risks by embedding authenticity verification directly into the VMS environment.
Open Platform Partnership For Secure Video
“Our open platform is designed to grow stronger through partnerships,”
said Allan Tange, Director of Technology Partner Management at Milestone Systems.
“As AI reshapes the media landscape, verifying what’s real becomes essential. Integration with SWEAR helps ensure that video managed in XProtect remains credible, defensible, and compliant with regulatory requirements.”
The collaboration provides a standards-aligned approach to preserving the evidentiary value of surveillance footage across large-scale security deployments.
Cryptographic Verification From Capture
SWEAR’s technology establishes content authenticity starting at the point of capture. Video elements such as pixels, frames, audio samples, and metadata are mapped to generate cryptographic fingerprints.
These fingerprints are anchored to a distributed permissioned blockchain ledger that stores only verification data—not the media itself. By operating at the VMS layer, the system integrates authenticity checks into normal security operations without disrupting existing infrastructure or workflows.
Protecting The Chain Of Custody
“As deepfakes and manipulated media become more prevalent, maintaining the credibility of video evidence is a paramount concern for organizations,”
said Jason Crawforth, Founder and CEO of SWEAR.
“With SWEAR, we’re giving security leaders proof. Our technology locks in integrity from the moment surveillance footage is captured, creating a secure chain of custody and maintaining full evidentiary value.”
Instant Tamper Detection
The platform allows verification immediately after capture or even years later. When video is checked, the system compares the current file with the original cryptographic record stored on the ledger.
Any discrepancy—even down to a single pixel, frame, or audio sample—triggers instant tamper detection. This provides investigators and compliance teams with cryptographic proof of whether video content has been altered and where the modification occurred.

SWEAR develops digital media protection technology designed to preserve the authenticity of digital content. Its platform provides real-time protection that maintains content integrity from creation to distribution.
The company was recognized on TIME’s Best Inventions of 2025 list and aims to establish a global standard for digital media authenticity and protection.
Internal Links:
https://security.world/video-management-software-in-physical-security/
https://security.world/ai-in-video-surveillance-security/
External Links:
https://swear.com
https://www.milestonesys.com
Frequently Asked Questions (FAQs)
1. What is the purpose of SWEAR’s integration with Milestone XProtect?
The integration enables organizations using XProtect to verify the authenticity of surveillance video directly within their VMS workflow, helping maintain the evidentiary value of recorded footage.
2. How does SWEAR verify video authenticity?
SWEAR generates cryptographic fingerprints from video pixels, frames, audio samples, and metadata at the moment of capture and anchors them to a distributed blockchain ledger for verification.
3. Can tampered video be detected years later?
Yes. The system compares the current version of a video with its original fingerprint stored on the ledger, allowing tampering to be detected at any time.
4. Does the system store video on the blockchain?
No. Only verification data and cryptographic fingerprints are stored, not the video itself.
5. Why is video authenticity important for security teams?
Authentic video evidence is critical for investigations, compliance, legal admissibility, and maintaining trust in security systems.
