Download presentation
Presentation is loading. Please wait.
Published byWalter Hensley Modified over 9 years ago
1
Chapter 4: Fingerprints “Fingerprints can not lie, but liars can make fingerprints.” —Unknown
2
Chapter 4 Kendall/Hunt Publishing Company 1 Fingerprints Why fingerprints are individual evidence. Students will learn:
3
Chapter 4 Kendall/Hunt Publishing Company 2 Students will be able to: Define the three basic properties that allow individual identification by fingerprints. Obtain an inked, readable fingerprint for each finger. Fingerprints
4
Chapter 4 Kendall/Hunt Publishing Company 3 Recognize the general ridge patterns (loops, whorls, and arches) Identify friction ridge characteristics and compare two fingerprints with at least ten points of identification. Fingerprints
5
Chapter 4 Kendall/Hunt Publishing Company 4 Explain the differences among latent, plastic, and visible fingerprints. Develop latent prints (make them visible) using physical and chemical methods. Fingerprints
6
Chapter 4 Kendall/Hunt Publishing Company 5 What is a fingerprint? An imprint made by ridge patterns on the tip of a finger Also used to describe the characteristic pattern of DNA fragments
7
Chapter 4 Kendall/Hunt Publishing Company 6 Fingerprints Recording Prints: Rolling inked prints Primary identification number
8
Chapter 4 Kendall/Hunt Publishing Company 7 Fingerprints
9
Chapter 4 Kendall/Hunt Publishing Company 8 Fingerprints Lifting Prints Black, white and fluorescent powder Chemicals: ninhydrin, iodine, silver nitrate, cyanoacrylate
10
Chapter 4 Kendall/Hunt Publishing Company 9 Fingerprints Other Types of Prints Palm, lip, teeth, eye, ear, voice, shoe and footprints
11
Chapter 4 Kendall/Hunt Publishing Company 10 Dactyloscopy The study of fingerprints Historically William Herschel—required Indians to put their fingerprints on contracts, and also as a means of identifying prisoners Henry Faulds—claimed that fingerprints did not change over time and that they could be classified for identification
12
Chapter 4 Kendall/Hunt Publishing Company 11 Dactyloscopy The study of fingerprints Alphonse Bertillon—proposed body measurements as a means of identification; termed anthropometry Francis Galton—developed a primary classification scheme based on loops, arches and whorls.
13
Chapter 4 Kendall/Hunt Publishing Company 12 Dactyloscopy The study of fingerprints Edward Richard Henry—in collaboration with Galton instituted a numerical classification system
14
Chapter 4 Kendall/Hunt Publishing Company 13 Dactyloscopy The study of fingerprints Juan Vucetich—developed a fingerprint classification based on Galton’s that is used in Spanish-speaking countries
15
Chapter 4 Kendall/Hunt Publishing Company 14 Fundamental Principles of Fingerprints A fingerprint is an individual characteristic.
16
Chapter 4 Kendall/Hunt Publishing Company 15 Fundamental Principles of Fingerprints A fingerprint will remain unchanged during an individual’s lifetime.
17
Chapter 4 Kendall/Hunt Publishing Company 16 Fundamental Principles of Fingerprints Fingerprints have general characteristic ridge patterns that permit them to be systematically classified.
18
Chapter 4 Kendall/Hunt Publishing Company 17 Ridge Characteristics Minutiae: Characteristics of ridge patterns The term used to define common micro features in a fingerprint.
19
Chapter 4 Kendall/Hunt Publishing Company 18 Ridge Characteristics
20
Chapter 4 Kendall/Hunt Publishing Company 19 Ridge Characteristics Ridge ending
21
Chapter 4 Kendall/Hunt Publishing Company 20 Ridge Characteristics Dot or fragment
22
Chapter 4 Kendall/Hunt Publishing Company 21 Ridge Characteristics Eye or Enclosure
23
Chapter 4 Kendall/Hunt Publishing Company 22 Ridge Characteristics Bifurcation: A splitting line.
24
Chapter 4 Kendall/Hunt Publishing Company 23 Ridge Characteristics Bridge Enclosure Spur
25
Chapter 4 Kendall/Hunt Publishing Company 24 Fingerprint Minutiae
26
Chapter 4 Kendall/Hunt Publishing Company 25 Fingerprint Patterns
27
Chapter 4 Kendall/Hunt Publishing Company 26 Arch - 5% 1. Has friction ridges that enter on one side of the finger and cross to the other side while rising upward in the middle.
28
Chapter 4 Kendall/Hunt Publishing Company 27 Arch - 5% 2. They do NOT have type lines, deltas, or cores.
29
Chapter 4 Kendall/Hunt Publishing Company 28 Arch - 5% Types Plain Tented
30
Chapter 4 Kendall/Hunt Publishing Company 29 Arch - 5% Plain
31
Chapter 4 Kendall/Hunt Publishing Company 30 Arch - 5% Tented
32
Chapter 4 Kendall/Hunt Publishing Company 31 Loop – 65% 1.Must have one or more ridges entering and exiting from the same side. Loops must have one delta.
33
Chapter 4 Kendall/Hunt Publishing Company 32 Loop – 65% 2. Types Radial: Opens toward the thumb Ulnar: Opens toward the “pinky” (little finger)
34
Chapter 4 Kendall/Hunt Publishing Company 33 Loop – 65% Ulnar Loop
35
Chapter 4 Kendall/Hunt Publishing Company 34 Loop – 65% Radial Loop
36
Chapter 4 Kendall/Hunt Publishing Company 35 Whorl – 30-35% 1. Types Plain Central Pocket Double Loop Accidental
37
Chapter 4 Kendall/Hunt Publishing Company 36 Whorl – 30-35% 2. Whorls have at least two deltas and a core.
38
Chapter 4 Kendall/Hunt Publishing Company 37 Whorl – 30-35% 3. A plain or central pocket whorl has at least one ridge that makes a complete circuit.
39
Chapter 4 Kendall/Hunt Publishing Company 38 Whorl – 30-35% 4. A double loop is made of two loops.
40
Chapter 4 Kendall/Hunt Publishing Company 39 Whorl – 30-35% 5. An accidental is a pattern not covered by other categories.
41
Chapter 4 Kendall/Hunt Publishing Company 40 Whorl – 30-35%
42
Chapter 4 Kendall/Hunt Publishing Company 41 Identify the Pattern Tented Arch
43
Chapter 4 Kendall/Hunt Publishing Company 42 Identify the Pattern Plain Whorl
44
Chapter 4 Kendall/Hunt Publishing Company 43 Identify the Pattern Central Pocket
45
Chapter 4 Kendall/Hunt Publishing Company 44 Primary Classification The Henry—FBI Classification: Each finger is given a point value
46
Chapter 4 Kendall/Hunt Publishing Company 45 Primary Classification rightleft
47
Chapter 4 Kendall/Hunt Publishing Company 46 Primary Classification Assign the number of points for each finger that has a whorl and substitute into the equation:
48
Chapter 4 Kendall/Hunt Publishing Company 47 Primary Classification right right left left left index ring thumb middle little + 1 right right right left left thumb middle little index ring +1
49
Chapter 4 Kendall/Hunt Publishing Company 48 Primary Classification That number is your primary classification number
50
Chapter 4 Kendall/Hunt Publishing Company 49 Comparison There are no legal requirements in the United States on the number of points. Generally, criminal courts will accept 8 to 12 points of similarity.
51
Chapter 4 Kendall/Hunt Publishing Company 50 Latent Prints 1. Those that are not visible to the naked eye. 2. These prints consist of the natural secretions of human skin and require development for them to become visible.
52
Chapter 4 Kendall/Hunt Publishing Company 51 Latent Prints 3. Most secretions come from three glands: Eccrine Apocrine Sebaceous
53
Chapter 4 Kendall/Hunt Publishing Company 52 Latent Prints A. Eccrine: 1. Largely water with both inorganic (ammonia, chlorides, metal ions, phosphates) and organic compounds (amino acids, lactic acids, urea, sugars).
54
Chapter 4 Kendall/Hunt Publishing Company 53 Latent Prints A. Eccrine: 2. Most important for fingerprints.
55
Chapter 4 Kendall/Hunt Publishing Company 54 Latent Prints B. Apocrine: Secrete pheromones and other organic materials.
56
Chapter 4 Kendall/Hunt Publishing Company 55 Latent Prints C. Sebaceous: Secrete fatty or greasy substances.
57
Chapter 4 Kendall/Hunt Publishing Company 56 Developing Latent Prints Developing a print requires substances that interact with secretions that cause the print to stand out against its background.
58
Chapter 4 Kendall/Hunt Publishing Company 57 Developing Latent Prints It may be necessary to attempt more than one technique, done in a particular order so as not to destroy the print.
59
Chapter 4 Kendall/Hunt Publishing Company 58 Developing Latent Prints Powders: Adhere to both water and fatty deposits. Choose a color to contrast the background.
60
Chapter 4 Kendall/Hunt Publishing Company 59 Developing Latent Prints Iodine: Fumes react with oils and fats to produce a temporary yellow brown reaction.
61
Chapter 4 Kendall/Hunt Publishing Company 60 Iodine Fingerprint
62
Chapter 4 Kendall/Hunt Publishing Company 61 Developing Latent Prints Ninhydrin: Reacts with amino acids to produce a purple color.
63
Chapter 4 Kendall/Hunt Publishing Company 62 Ninhydrin Fingerprint
64
Chapter 4 Kendall/Hunt Publishing Company 63 Developing Latent Prints Silver nitrate: Reacts with chloride to form silver chloride, a material which turns gray when exposed to light.
65
Chapter 4 Kendall/Hunt Publishing Company 64 Developing Latent Prints Cyanoacrylate: “Super glue” fumes react with water and other fingerprint constituents to form a hard, whitish deposit.
66
Chapter 4 Kendall/Hunt Publishing Company 65 Cyanoacrylate Fingerprints
67
Chapter 4 Kendall/Hunt Publishing Company 66 Developing Latent Prints In modern labs and criminal investigations, lasers and alternative light sources are used to view latent fingerprints.
68
Chapter 4 Kendall/Hunt Publishing Company 67 Developing Latent Prints These were first used by the FBI in 1978. Since lasers can damage the retina of the eye, special precautions must be taken.
69
Chapter 4 Kendall/Hunt Publishing Company 68 Other Prints Ears: Shape, length and width Voice: Electronic pulses measured on a spectrograph
70
Chapter 4 Kendall/Hunt Publishing Company 69 Other Prints Foot: Size of foot and toes; friction ridges on the foot
71
Chapter 4 Kendall/Hunt Publishing Company 70 Other Prints Shoes: Can be compared and identified by type of shoe, brand, size, year of purchase, and wear pattern.
72
Chapter 4 Kendall/Hunt Publishing Company 71 Other Prints Palm: Friction ridges can be identified and may be used against suspects.
73
Chapter 4 Kendall/Hunt Publishing Company 72 Other Prints Footprints are taken at birth as a means of identification of infants.
74
Chapter 4 Kendall/Hunt Publishing Company 73 Other Prints Lips: Display several common patterns
75
Chapter 4 Kendall/Hunt Publishing Company 74 Other Prints Short vertical lines Short horizontal lines Crosshatching Branching grooves
76
Chapter 4 Kendall/Hunt Publishing Company 75 Other Prints
77
Chapter 4 Kendall/Hunt Publishing Company 76 Other Prints Teeth: A. Bite marks are unique and can be used to identify suspects.
78
Chapter 4 Kendall/Hunt Publishing Company 77 Other Prints B. These imprints were placed in gum and could be matched to crime scene evidence.
79
Chapter 4 Kendall/Hunt Publishing Company 78 Other Prints The blood vessel patterns in the eye may be unique to individuals. They are used today for various security purposes.
80
Chapter 4 Kendall/Hunt Publishing Company 79 AFIS The Automated Fingerprint Identification System: A computer system for storing and retrieving fingerprints
81
Chapter 4 Kendall/Hunt Publishing Company 80 AFIS Began in the early 1970’s to: A. Search large files for a set of prints taken from an individual
82
Chapter 4 Kendall/Hunt Publishing Company 81 AFIS B. Compare a single print, usually a latent print developed from a crime scene
83
Chapter 4 Kendall/Hunt Publishing Company 82 AFIS By the 1990’s most large jurisdictions had their own system in place. The problem - a person’s fingerprints may be in one AFIS but not in others
84
Chapter 4 Kendall/Hunt Publishing Company 83 AFIS IAFIS: The FBI’s Integrated Automated Fingerprint Identification system which is a national database of all 10-print cards from all over the country
85
Chapter 4 Kendall/Hunt Publishing Company 84 Biometrics Use of some type of body metrics for the purpose of identification.
86
Chapter 4 Kendall/Hunt Publishing Company 85 Biometrics Used today in conjunction with AFIS Examples include retinal or iris patterns, voice recognition, hand geometry
87
Chapter 4 Kendall/Hunt Publishing Company 86 Biometrics Other functions for biometrics— can be used to control entry or access to computers or other structures; can identify a person for security purposes; can help prevent identity theft or control social services fraud.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.