I’d love to do the forensics on such a case. What are the markers for video manipulation? Can you distinguish the altered data from the original? Can you recover the original video from the computer where the fake was created?
My first Unix was SunOS 3.4 running on a Sun 3/160 server (Motorola 68020) and diskless Sun 3/50 workstations. 10base2 ethernet and a 1200 baud modem for email and USENET via UUCP. #bsdstart