Fingerprints.

Slides:



Advertisements
Similar presentations
Fingerprints.
Advertisements

Chapter 4 - Fingerprints “Fingerprints cannot lie, but liars can make fingerprints.” --- unknown 1.
Ch. 14 Fingerprints. History of Fingerprinting The first system of personal identification used in criminal investigations was anthropometry. The first.
Fingerprints. 1 Fingerprints  Why fingerprints are individual evidence.  Why there may be no fingerprint evidence at a crime scene.  How computers.
Fingerprints “Fingerprints cannot lie, but liars can make fingerprints.” --- unknown.
Chapter 4 Fingerprints Kendall/Hunt.
Chapter 4 Fingerprints Kendall/Hunt.
Fingerprints “Fingerprints cannot lie, but liars can make fingerprints.” --- unknown 1.
Chapter 4 Fingerprints “Fingerprints cannot lie, but liars can make fingerprints.” - Unknown.
Fingerprints Ch 17 Pgs “Fingerprints cannot lie, but liars can make fingerprints.” - Unknown.
Fingerprint Patterns MinutiaeFingerprint Anatomy Identificatio n Criteria Lifting Latent Prints
Fingerprint Classification. Classifying Prints Why classify prints? To add order to chaos – like a library organizing books by author or subject matter.
 Discovered that they are unique. No 2 alike.  A classification system was developed.  Loops  Whorls  Arches.
Chapter 4 Fingerprints Kendall/Hunt.
Chapter 4: Fingerprints “Fingerprints can not lie, but liars can make fingerprints.” —Unknown.
Fingerprints. Outline  Individuality of Fingerprints  What are fingerprints?  Classification of fingerprint patterns  AFIS  Methods of detecting.
Fingerprint patterns. Fingerprints are unique Composed of friction ridges which give us better gripping ability (tire treads) Bifurcation – a single friction.
Chapter 4: Fingerprints HAMM CASE. Chapter 4 Kendall/Hunt Publishing Company 1 Fingerprints  Why fingerprints are individual evidence.  Why there may.
Chapter 4: Fingerprints. Chapter 4 Kendall/Hunt Publishing Company 1 Fingerprints  Why fingerprints are individual evidence.  Why there may be no fingerprint.
Fingerprints YAP Ancient Fingerprinting  Chinese used fingerprints in seals by 264BCE  ~1300, Persian Rashid-al-Din Hamadani writes: "Experience.
Unit # 3 - Fingerprints1 “Fingerprints can not lie, but liars can make fingerprints.” -Unknown Unit # 3 FINGERPRINTS.
Chapter 4: Fingerprints “Fingerprints can not lie, but liars can make fingerprints.” —Unknown.
What are fingerprints? Impressions left on any surface composed of patterns made by the friction ridges – Same definitions could apply to toe, foot, or.
Fingerprints “Fingerprints can not lie, but liars can make fingerprints.” —Unknown.
Chapter 14 Fingerprints. Background Info. Bertillon’s system of anthropometry was the 1 st criminal identification method It was used for 20 years, but.
Fingerprints. Chapter 4 Fingerprints 2 Kendall/Hunt Publishing Company 2 You will understand: Why fingerprints are individual evidence. Why there may.
Unit #1 Fingerprints “Fingerprints cannot lie, but liars can make fingerprints.” —Unknown.
Chapter 4: Fingerprints “Fingerprints can not lie, but liars can make fingerprints.” —Unknown.
Chapter 4: Fingerprints HAMM CASE. Chapter 4 Kendall/Hunt Publishing Company 1 Fingerprints  Why fingerprints are individual evidence.  Why there may.
“Fingerprints can not lie, but liars can make fingerprints.” —Unknown.
Fingerprinting Part II.
Discovered that they are unique. No 2 alike. A classification system was developed. Loops Whorls Arches.
Fingerprints & Stuff Recording Prints rolling inked prints primary identification number Lifting Prints Black, white and fluorescent powder.
Fingerprints. Fingerprinting System of identification based on the classification of finger ridge patterns System of identification based on the classification.
Kendall/Hunt Publishing Company
Fingerprints. Summary  What are fingerprints?  How are fingerprints analyzed?  How are fingerprints collected?
Chapter 4: Fingerprints “Fingerprints can not lie, but liars can make fingerprints.” —Unknown.
Fingerprints Ch. 4 and some of Ch. 9. Journal Determine the Henry Number for the following: L W A A L A L W L A.
Chapter 4: Fingerprints “Fingerprints can not lie, but liars can make fingerprints.” —Unknown.
Fingerprinting Chapter 15 Courtesy of C. Fanning Crystal Violet
Fingerprints “Fingerprints can not lie,
Chapter 4 Fingerprints Kendall/Hunt.
CSI:Ibstock Lesson 2.
Chapter 4: Fingerprints
Chapter 4: Fingerprints
Chapter 4: Fingerprints
Fingerprints.
Fingerprints.
Fingerprints Definition: raised portions of skin covered in sweat that when pressed against a surface creates an impression of those friction ridges. (Sweat.
Fingerprints “Fingerprints can not lie,
Detecting, Identifying, and Evaluating Patent & Latent Prints
Chapter 4: Fingerprints
Chapter 4 Fingerprints Kendall/Hunt.
FORENSIC SCIENCE Fingerprints.
Fingerprints.
YOYO Classify the following dactylograms as either WHORLS, ARCHES, or LOOPS Challenge Yourself: Try to sketch each of the images shown.
Chapter 14 - Fingerprints
Review Fingerprints  .
Fingerprints.
Fingerprints Lecture 1.
Fingerprints Vocabulary
Etc..
Fingerprints T. Trimpe
Fingerprints “Fingerprints cannot lie, but liars can make fingerprints.” ---unknown.
Fingerprints Science & Tech 11.
Chapter 14 - Fingerprints
Fingerprinting Chapter 15 Courtesy of C. Fanning Crystal Violet
Fingerprints.
The Chemistry of Latent Print Development Techniques
Fingerprints.
Presentation transcript:

Fingerprints

What We will be Doing Part I – Intro and Background Part II - Recording and Classifying Prints Part III - “Lifting” and Preserving Prints Part IV - Reviewing other types of Prints

Background: Before Fingerprinting- Bertillion (1883) Portrait parle – a physical description of the perpetrator and their dress Anthropometry - Precise body measurements and photographs

Fingerprinting – Galton and Henry Primary classification scheme Arches, whorls and loops “Although Galton was not the first to propose the use of fingerprints for identification (Sir William Herschel had used them in India for this purpose) he was the first to place their study on a scientific basis and so lay the groundwork for their use in criminal cases.  He was able to collect a large sample of prints through his Anthropological laboratories, eventually amassing over 8,000 sets.  His study of minutiae in prints provided the  foundation for meaningful comparison of different prints, and he was able to construct a statistical proof of the uniqueness, by minutiae, of individual prints.” Wikipedia Numerical classification system

Anatomy of a Fingerprint Formed in utero, lifelong pattern No two fingerprints are identical Ridge patterns can be classified

Loops, whorls, and arches

Fingerprint Cases The Strange Case of Francisca Rojas “In 1892, two boys were brutally murdered in the village of Necochea, near Buenos Aires, Argentina. Initially, suspicion fell on a man named Velasquez, a suitor of the children's mother, Francisca Rojas. But even after torture, the police could not get him to confess. Investigators found a bloody fingerprint at the crime scene and contacted Juan Vucetich, who was developing a system of fingerprint identification for police use. Vucetich compared the fingerprints of Rojas and Velasquez with the bloody fingerprint. Francisca Rojas had denied touching the bloody bodies, but the fingerprint matched one of hers. Confronted with the evidence, she confessed—the first successful use of fingerprint identification in a murder investigation. After the Rojas case, Vucetich improved his fingerprint system, which he called "comparative dactyloscopy." Adopted by the province of Buenos Aires in 1903, it spread rapidly throughout the Spanish-speaking world.” http://www.nlm.nih.gov/visibleproofs/galleries/cases/vucetich.html Watch Amazon Prime Catching Killers – Season 1, Episode 2 (45 min: 0 – 21 min) http://www.amazon.com/gp/product/B010U4FXOI/ref=dv_dp_ep2

Part I – Intro and Background Part II - Recording and Classifying Prints Rolling Ink Prints Loops, Arches and Whorls Ridge Characteristics Primary Identification Number Part III - “Lifting” and Preserving Prints Part IV - Reviewing other types of Prints

RIDGE CHARACTERISTICS 65% 30% 5%

RIDGE CHARACTERISTICS Minutiae: Characteristic Ridge Patterns

First lab – recording and classifying fingerprints

What We will be Doing Part I – Intro and Background Part II - Recording and Classifying Prints Part III - “Lifting” and Preserving Prints Powders: Black, gray, magnetic and fluorescent Chemicals: ninhydrin, iodine, cyanoacrylate (Superglue) Part IV - Reviewing other types of Prints Watch Amazon Prime Catching Killers – Season 1, Episode 2 (45 min: 21 min - )

Powders Powder choices are determined by the type and color of the surface holding the latent print. Most examiners use black or gray powders on nonabsorbent surfaces. Black powder contains carbon (charcoal) and is used on light surfaces. Gray power contains aluminum particles and is used on dark surfaces, mirrors and metal surfaces. Black and gray magnetic powders are used on rougher textures like leather and rough plastics where tradition powder might clump and get caught in the surface features. Fluorescent powders are used when the background color needs to be subtracted out for clarity.

Iodine Fuming Oldest Method Mechanism unknown Impermanent Must be photographed

FBI BIOMETRIC DATABASES AFIS: Automated Fingerprint Identification System: 1970s – each state had their own with IAFIS: Integrated Automated Fingerprint Identification System: FBI July 1999 NGI: Next Generation Identification: incremental replacement of IAFIS beginning 2011 What is included in IAFIS: Not only fingerprints, but corresponding criminal histories; mug shots; scars and tattoo photos; physical characteristics like height, weight, and hair and eye color; and aliases. The system also includes civil fingerprints, mostly of individuals who have served or are serving in the U.S. military or have been or are employed by the federal government. The fingerprints and criminal history information are submitted voluntarily by state, local, and federal law enforcement agencies. How big it is: IAFIS is the largest criminal fingerprint database in the world, housing the fingerprints and criminal histories for more than 70 million subjects in the criminal master file, along with more than 34 million civil prints. Included in our criminal database are fingerprints from 73,000 known and suspected terrorists processed by the U.S. or by international law enforcement agencies who work with us. How fast it works: The average response time for an electronic criminal fingerprint submission is about 27 minutes, while electronic civil submissions are processed within an hour and 12 minutes. IAFIS processed more than 61 million ten-print submissions during Fiscal Year 2010. When it started: IAFIS was launched on July 28, 1999. Prior to this time, the processing of ten-print fingerprint submissions was largely a manual, labor-intensive process, taking weeks or months to process a single submission. The FBI has been the national repository for fingerprints and related criminal history data since 1924, when more than 800,000 fingerprint records from the National Bureau of Criminal Identification and Leavenworth Penitentiary were consolidated with Bureau files. The first use of computers to search fingerprint files took place in October 1980. What’s new: While IAFIS has been an effective system, criminal and terrorist threats have evolved over the past decade. Today’s environment demands faster and more advanced identification capabilities. The Next Generation Identification program, or NGI, represents a quantum leap in fingerprint identification that will help us in solving investigations, preventing crime, and apprehending criminals and terrorists. NGI—which delivers an incremental replacement of IAFIS—provides automated fingerprint and latent search capabilities, electronic image storage, and electronic exchange of fingerprints to more than 18,000 law enforcement agencies and other authorized criminal justice partners 24 hours a day, 365 days a year. Upon completion, NGI will have the ability to process fingerprint transactions more effectively and accurately.  With the delivery of NGI Increment 4 in the summer of 2014, NGI will effectively replace IAFIS. Next Generation Identification (NGI) Identification and Investigative Services The NGI system, developed over multiple years, is an incremental replacement of the Integrated Automated Fingerprint Identification System (IAFIS) that provides new functionality and improves existing capabilities.  The FBI’s Criminal Justice Information Services (CJIS) Division operated and maintained IAFIS, which became the world’s largest person-centric biometric database when it was implemented in July 1999. Since then, advancements in technology and the changing business needs of IAFIS’s customers necessitated the next generation of identification services. To further advance biometric identification services, the CJIS Division, with guidance from the user community, established the vision for the Next Generation Identification. This technological upgrade accommodates increased information processing and sharing demands from local, state, tribal, federal, and international agencies. The NGI system offers state-of-the-art biometric identification services and compiles core capabilities that serve as the platform for multimodal functionality. Advanced Fingerprint Identification Technology (AFIT) AFIT, deployed on February 25, 2011, enhances fingerprint and latent processing services, increases the accuracy and daily fingerprint processing capacity, and improves system availability. This deployment implemented a new fingerprint matching algorithm which has improved matching accuracy from approximately 92% to over 99.6%. This improvement resulted in over 900 additional matches during the 5-day parallel operations period immediately after deployment. Additionally, the improved accuracy resulted in a 90% reduction in the number of manual fingerprint reviews required by our service providers. Repository for Individuals of Special Concern (RISC) RISC, deployed on August 25, 2011, implemented that repository’s rapid search supporting mobile identification. This capability enables officers and agents in the field to screen detainees and criminal suspects against a repository of Wanted Persons, Sex Offenders Registry Subjects, Known or appropriately Suspected Terrorists, and other persons of special interest for rapid identification. Currently, 21 agencies are using this capability. Latest performance metrics show a red hit rate between three to six percent, proving this capability is a valuable first check allowing officers to quickly assess the level of threat an encountered individual poses Interstate Photo System The Interstate Photo System (IPS), a compilation of all photos received by the FBI with tenprint transactions, holds over 23 million front-facing photos. Authorized law enforcement agencies may submit a photo image (probe) for a face recognition search in the IPS. Search results are processed automatically (no human intervention) and returned in a ranked candidate list. Information returned in the response is provided as an investigative lead only and is not to be considered a positive identification. Latents and National Palm Print System (NPPS) In 2013, the NGI System deployed the new NPPS which contains millions of palm prints that are now searchable on a nationwide basis. The NPPS and improvements in latent fingerprint search performance are providing powerful new and enhanced crime-solving capabilities for more than 18,000 local, state, tribal, and federal law enforcement agencies across the country. In addition, NGI has expanded criminal and civil searches against the Universal Latent File, potentially generating new investigative leads in unsolved and/or cold cases as well as latent enrollment and search enhancements.  Rap Back Service The Rap Back Service provides authorized agencies with notification of criminal, and, in limited cases, civil activity of individuals that occurs after the initial processing and retention of criminal or civil transactions. Rap Back does not provide new authority to agencies, including the FBI, for collection of biometric and biographical information. It does, however, implement new response services to notify agencies of subsequent activity for individuals enrolled in the service. Including a more timely process of confirming suitability of those individuals placed in positions of trust and notification to users of criminal activity for those individuals placed on probation or parole. Iris Recognition (IR) As the iris of the eye gains momentum as a strong biometric capability, IR is poised to offer law enforcement a new tool to quickly and accurately determine identity. The NGI iris pilot follows the recommendations of the NGI stakeholders and evaluates the technology in an operational setting.

What We will be Doing Part I – Intro and Background Part II - Recording and Classifying Prints Part III - “Lifting” and Preserving Prints Part IV - Reviewing other types of Prints Watch Amazon Prime Catching Killers – Season 1, Episode 2 (45 min: 10 min) Watch PBS NOVA – Forensics on Trial: http://www.pbs.org/wgbh/nova/tech/forensics-on-trial.html

LIP PRINTS

VOICE PRINTS Electronic pulses measured on a spectrograph

OTHER PRINTS Shoe Prints Palm Prints Footprints

IRIS SCANS and Retinal scans

EAR PRINTS