Digital Fingerprint and Forensic Examination as a Technology for Cybercrime Detection and Prevention in Nigeria

Size: px
Start display at page:

Download "Digital Fingerprint and Forensic Examination as a Technology for Cybercrime Detection and Prevention in Nigeria"

Transcription

1 The SIJ Transactions on Industrial, Financial & Business Management (IFBM), Vol. 5, o. 5, August 2017 Digital Fingerprint and Forensic Examination as a Technology for Cybercrime Detection and Prevention in igeria Anayo Chukwu Ikegwu*, Henry Friday weke** & Gabriel Evo Ugwu*** *Department of Computer Science, ational Open University of igeria, Enugu, IGERIA. analystitiinfo{at}gmail{dot}com **Department of Computer Science, Ebonyi State University, Abakaliki, P.M.B 053 Ebonyi State, IGERIA. ufoo2010{at}yahoo{dot}com ***Department of Computer Science, Ebonyi State University, Abakaliki, P.M.B 053 Ebonyi State, IGERIA. Ugwugabrielevo{at}yahoo{dot}co{dot}uk Abstract Digital finger printing is an important technology for fighting organized crime and identification of features possessed by individual for authentication in the society especially in igeria. There are lot of cutting edge technologies and application areas that have been developed since its invention, ranging from airport security, smart home security, mobile phones authentications and electronic commerce (E-commerce). However, understanding digital fingerprinting is quite difficult even though it is an important security mechanism. Furthermore, there are still kinds of mystery surrounding this technology especially in the third world countries like igeria. This paper provide explicit explanation of the finger printing technology, applications and processes involve in identifying specific features in individuals. Furthermore, it enables broad understanding in order to enhance adoption of the system to combat organized digital crime in the ever changing technology world. Keywords Crime Detection; Cybercrime Prevention; Digital Evidence; Finger Printing; Forensic Examination; Finger Print Analysis. Abbreviations Analysis Comparison Evaluation and Verification (ACE-V); Criminal Investigation Department (CID); Global Positioning System (GPS); ational Emergency Management (EMA); Public Safety Radio Communication (PSRC); Scanning Kelvin Probe (SKP). I. ITRODUCTIO TECHOLOG has really transformed every aspect of life. The knowledge of computer system has also changed the perception of human activities and operation from manual to more digital technological knowhow. Fingerprint as a technology for security authentication, a measure that is linked with forensic examination. Forensic examinations are urgently producing important practical results in the field of computer and applied sciences. There are evidences that serious organized crimes are being committed that lawyers, police officer and security agency find difficult to crack due to lack of sufficient information. Information is a masterpiece for every authentication measures. The application of a wide spectrum of science to answer questions of interest to a legal system is term as forensic science. The recovery and interpretation of digital devices such as computers, mobile phones and digital cameras are known as digital forensic. The print made by an impression of the ridges in the skin of a finger, normally used for biometric identification, in criminal investigations is referred to as fingerprint. Fingerprint could mean an impression made in ink as a means of identification on surface of the curves formed by the ridges on a fingertip. In law, any reproductions of a pattern of ridge on the smooth surface of the design formed by the ridges on the inside of the end joint of a thumb provide evidence of fingerprint [Reginald, 1]. The results of minute ridges and valleys found on the thumb of every person is said to be thumbprints. Therefore, it is an impression of the friction ridges of any part of the thumb. Thumbprint may also refer to as an impression of the coetaneous ridges of the fleshy distal portion of a thumb, that is obtain by pressing the thumb on an object when touch with ink. Eckert [2] commented that each print has an exclusive and unique owner since there have never been two individuals recorded with the same thumbprint. ISS: X 2017 Published by The Standard International Journals (The SIJ) 76

2 The SIJ Transactions on Industrial, Financial & Business Management (IFBM), Vol. 5, o. 5, August 2017 There are high indications of the increase in crime rate in igeria especially in the urban areas due to inequalities in social welfare [Adebayo, 3]. The country is experiencing different crime rates that are carefully committed and organized by the igeria citizen and non-citizenship on day to day basis. The use of finger print will help in identification and minimization of such crime. Fingerprinting is applied in identification of properties owners, authenticating the legitimate user of valuable items has becoming a challenging factors in developing evidence base verification. The case of baby-mix-ups and substitutions has become a worrisome, some illiterate depositors who cannot write names during their bank transactions and even travelling documents in authentication such as passport, visa etc need fingerprint for accurate identification. Although, law enforcement officers with extraordinary visual memories such as tracking system, surveillance system and other gadgets try to identify and arrested offenders [Manning, 4]. The use of photography as a mean of criminal identification provides inconsistent results. However, a fingerprint comparison can identify two different people. Fingerprinting is an important means of identification and crime analysis. The objective of this paper is to provide comprehensive analysis of digital fingerprinting process, detection mechanisms and identify technologies that behind it successful implementation. Furthermore, we present the advantages, algorithms, technological gain in to crime fighting organizations and how these can benefit igeria in fighting organized crimes. II. THUMBPRITS FOR CRIME DETECTIO Thumbprint has been recognized in criminal cases as latent print or rolled print [Michael & Imwinkelried, 5]. Rolled prints are normally gotten when a person is apprehended in relation to crimes. As a matter of booking process, the security agent rolled the culprit s thumb in ink and then impressed it on a card. After which, it is stored in libraries of such cards maintained by organization and governmental agency, but now stored in the computer storage devices for efficient and effective retrievals. In contrast, latent print may be produced and not readily visible at the crime scene. This happens when the natural secretions of skin are deposited on a surface through thumb contact at the crime scene. High degree of visual contrast between the ridge patterns and the surface on which the thumbprint was left by the use of chemical reagent and powder to visualize the image especially when the impression is left on the surface of glass, tabletop and then compared with the already stored samples. The essence of universal acceptability of thumbprint for identification over other biometrics has been contained in the works of [Michael & Imwinkelried, 5; Palmiotto, 6; Salter, 7]. The reasons for such personal authentication using thumbprint include: (a) the rapid growth of network and internet business (b) the efficient hardware computing power (c) the cost effective capture thumbprint (d) the level of awareness of reliability security components. Over the years especially between 2007 till date, the election of Presidential, Governorship, ational Assembly (Senates and Representatives) and State Assembly, thumb printing played vital role in rejecting multiple voting, void vote, upholding elections and rejections of election of winners by Tribunal and Courts [Smyth & Best, 8]. Furthermore, thumbprint helps to detect forgery or erasing of evidences in crime scene [Hilderbrandt & Dittmann, 9] Features of Thumbprints In excellent explanations contained in Eckert [2], Salter [7], Wayman et al., [10] and Vinodiny et al., [11] noted that the ridges of thumb form pattern of loop, whorl and arch. The focal prints that are used for classification are achieved from these three pattern types. There are two focal points, the core/centre and the delta in the loop pattern. The area of the pattern where there is a dividing of the ridges is called the delta. During thumbprints recording process, the delta, the area as well as the core must be recorded completely. The loop could be further classified into central pocket, ulnar and radial loop. More deltas can be form from the whorl pattern. The whorl pattern may be further classified into double loop, accidental whorl and plain whorl. o delta or core in the arch pattern. Such arch is further classified into tented and of the above mentioned patterns scientifically is not good or suited for any forensic analysis Fingerprint Identification Fingerprint identification involves the process of comparing of two instances of friction ridges skin minutiae (impressions) from human fingers/toes and even the palm of the hand/sole of the feet, in order to determine if such impressions could have come from the same persons. This process involves searching through the entire database of the stored human features to identify his/her features [Patni & Sharma, 12]. They develop fingerprinting system to detect attendance fraud in sporting events. Also, expert use these features for individual identification by deploying computer expert system operating under threshold scoring rules as benchmark. Figure 1: Friction Ridges on a Finger Figure 2: Image of Fingerprint Created by the Friction Ridge Structure Live scan technique are used to record the friction ridges digitally. White cards is used international to record the friction ridges made with black printer s ink rolled across a contrasting white eye, but with un-aided eye the patent print can be viewed. Often the latent prints are fragmentary and chemical or other alternative light source may be required. ISS: X 2017 Published by The Standard International Journals (The SIJ) 77

3 The SIJ Transactions on Industrial, Financial & Business Management (IFBM), Vol. 5, o. 5, August 2017 Perspiration, oil, grease, ink or blood will be transferred to the surface when friction ridges come into contact with such surface. Deposition pressure, pliability of the skin, slippage, the material from which the surface is made, the roughness of the surface and the substance deposited are the factors affecting the quality of friction ridge impressions. All these factors are caused by latent print to appear differently from any friction ridges known recording Types of Fingerprint There are four basic types of fingerprint, namely; (i) exemplar, (ii) latent, (iii) patent and (iv) plastic fingerprint. (i) The exemplar fingerprint could be referred to as known prints. It is obtained with live scan technology which may use ink on paper cards. (ii) Figure 3: Exemplar Prints on Paper using Ink Latent fingerprint is regarded in forensic science as any accidental impression left by friction ridge skin on a surface whether invisible or visible at the time of deposition. Visualization of invisible latent prints residues may be supported with the use of chemical, physical and electronic processing techniques irrespective of whether they are contaminant (oil, blood, ink, paint) or natural sweat on the skin. used classification techniques. In this system, the arch, whorl and the loop as the three fundamental fingerprint patterns which constitute 5%, 30-35% and 60-65% of fingerprints respectively. The whorls may have sub-group classifications that include double loop whorls, accidental whorls, plain whorls, central pocket loop whorls and peacock s eye whorls. Fingerprint may also include tenth arch, the plain arch and the central pocket loop as commonly classified. Although, there are more complex system used by the expert and it is similar to Henry system of classification. Five fractions R(right), L(left), i(index finger), m(middle finger), t(thumb), r(ring finger) and p(picky-little finger). These can be mathematically expressed thus: Ri/Rt + Rr/Rm + Lt/Rp + Lm/Li + Lp. Each print are assign numbers based on or whether they are whorls. The last fraction receives 0, the 4 th receives 2, the 3 rd receives 4, the 2 nd receives 8 and 1 st fraction receives 16. Value of 0 is assigned to arches and loops. The numbers in the numerator and denominator are added up, applying these schemes. (Ri + Rr + Lt + Lm + Lp) / (Rt + Rm + Rp + Li + Lr) and a 1 is added to both bottom and top, 0 division is excluded. For instance, if the ring index finger and the left finger have whorls the result is 0/0 + 8/0 + 0/2 + 0/0 + 1/1, and 0/0 + 0/0 + 0/0 + 0/0 + 2/0 +0/0, 1/1, by computation ( ) / ( ) = 9/3 = 3. With the use of this system, print could be drastically reduces when compared to. Arch Loop Whorl Figure 4: Visible Latent Print on Domestic Knife (iii) Patent fingerprint are chance friction ridge impressions that is visible in human eye. They are not lifted but photographed. For instance, impressions from flour and wet clay (iv) Plastic fingerprint occur when friction ridge impression is left in a material which retains the exact shape of the ridge detail. This can be seen in the case of melted candle wax and thick grease deposits on car parts Fingerprint Classification Today, almost every transactions and process have gone digital, computerization and automation system is now the edge of every operation and this is applicable in fingerprint filling system, but before that manual filling system need to categorically classifies the fingerprints based on the ridge formation. Presently, about 10 print classification systems which include Juan Vucetich system, Henry classification system and Roscher system [Karu & Jain, 13]. Based on this research paper Henry classification system is the most widely Figure 5: Fingerprint Classification 2.3. Importance of Fingerprint The following are some identify benefited areas of noncriminal and criminal uses of fingerprint. (I) Alternative means of identification for transaction in the banks. In this case, finger thumbprint may serves as infallible method of personal identification as a non-criminal uses. (ii) Detection and apprehension of criminals are one of its uses which can be made possible once the corresponding record is filled in the Criminal Investigation Departments (CID). (iii) The police investigation units operates two files records (a) noncriminal normally civilians and (b) criminal records. oncriminal records are gotten from volunteer citizen who seek for personal protection. Also, contains the databank of all fingerprint of military and para-military including the employees and aliens. This can prevent fraud in future transactions and operations. The criminal records files contain all the databank fingerprint of the victims or suspects. (iv) Government Agency and other organizations: traveling documents like passports, visa etc. It is a known fact that passports and signature can be forged / altered. Only the fingerprint remains unchangeable. Examination bodies such West African Examination Council (WAEC), Joint Matriculation Board, ational Examination Council (ECO), ISS: X 2017 Published by The Standard International Journals (The SIJ) 78

4 The SIJ Transactions on Industrial, Financial & Business Management (IFBM), Vol. 5, o. 5, August 2017 International Examination Certification etc. uses fingerprint to fish out impersonators. Companies such insurance, merchant houses and institutions, sacked employees cannot obtain re-employment in the same company or its branch. Fraud during payment of bursary and other beneficiaries such as a case of ational Emergency Management Agency (EMA), Flood disaster, fire destruction, compensation of land properties etc. can be reduce with a fingerprint comparison, simply because fingerprint has the feature of detecting existing payment. Civil servant uses it for checkmating ghost workers and death of active workers (v) Maternity homes and hospitals make use of fingerprint, footprint, palm print systems to guard against baby substitutions and mix-ups. This occurs in a case of twins or triplets etc. which sometimes throw the doctors and nurses off balance. Fingerprint produce unique features and characteristics in every individual [Jain et al., 14] that are deployed for identifications Brain Fingerprinting Application The basic applications of Brain Fingerprinting are detecting the record of a specific crime, incident stored in the brain and terrorist act [Farwell & Smith, 15] and [Dalbey, 16] and detecting a specific type of knowledge, training expertise like Al-Quaeda, trained terrorists/bomb makers and specific knowledge to FBI agents [Farwell, 17]. Farewell s brain fingerprinting are widely applied in crime scene investigation due to its effectiveness [Farwell & Makeig, 18]. The IOWA District court dismissed the defendant s petition for a new trial due to the established clear P300 test provided by Dr. Farewell s brain fingerprinting. III. TECHIQUES FOR FIGERPRIT AALSIS Police Agencies and other Criminal Investigations Agency worldwide have used fingerprint to identify criminals. Though, the close rival is Deoxyribonucleic acid (DA) whose evidence can be hard to undertake and its analysis is complex as well as expensive, therefore fingerprint analysis remains the essential tools. There are two (2) techniques used in Fingerprint Analysis (a) Analysis, Comparison, Evaluation and Verification (ACE-V) and (b) Scanning Kelvin Probe (SKP) [Zabell, 19; Black, 20; Dafyadd et al., 21] Analysis, Comparison, Evaluation and Verification (ACE-V) This technique is used by forensic scientists when analyzing the features such as shape, pattern and length of finger s ridges under examination. Fingerprint database are used to find match as a comparison. Probability and inconsistencies are evaluated for potential matches. The second examiner may be engage in the same result in order to validate the analysis. ACE-V need more examiners to arrive at identical results and may not be expected to arrive at the same result identically. Fingerprints analysis can guarantee 100% accuracy has been comparing to against the high standard Deoxyribonucleic acid analysis Scanning Kelvin Probe (SKP) This kind of technique is use for fingerprints analysis that works towards achieving an accurate result as well as keeps any Deoxyribonucleic acid (DA) evidence intact of which extraction of fingerprints is made. An image of a fingerprint is mapped when measuring the voltage and electrical potential of a conductive surface. As a results of the electrical potential conduct, SKP only works on mental like bullet, for instance, without smudging and preserves any possible DA, fingerprint is extracted perfectly from the surface. SKP is a non-contact form of fingerprint analysis that is starting to restore the reliability and accuracy of fingerprint analysis. otwithstanding, due to the high cost of the device, only few criminal investigation department has access to few devices. Based on this expensive device, SKP and its unavailability, ACE-V fingerprint analysis is adopted in most fingerprint analysis Other Crime Investigation and Detection Technology The new technology are making waves in both police and other high-tech crime investigation department, namely; (i) Website Evidence, (ii) Global Positioning System (GPS) Tracking Darts, (iii) Facial Recognition and Iris Scanning devices, (iv) X-Ray Van, (v) ational Criminal Intelligence Service (CIS). (i) Website Evidence is gotten from the Internet especially the social network sites such as 2go, Facebook, twitter etc. and in electronic commerce have increase applications of Finger Printing. Both police, attorneys and judges is sourcing for information from website evidence. This comes inform of searching for particular sales of confiscated items, stolen goods and properties, and other illegal contraband goods. Website evidence can provide a means on getting information to combat credit card theft, pornographic materials distributions and hate speeches. (ii) GPS Tracking Darts enables police and patrol teams to shoot a small sticky dart containing a micro GPS tracker from the grill of their Batman Style that is their patrol car in the vehicle of suspect. It also helps to monitor the suspects and smugglers vehicle s location from a distance undetected. (iii) Facial Recognition and Iris Scanning devices enable both police and other crime management agencies to take a snapshot of someone s face in the far away as 5 feet in the public. This is done by attaching the device to mobile devices, Automated Teller Machine (ATM) etc. which scan the image of a person and compares the results to both noncommon and criminal databases. (iv) X-Ray Vans allows the police and high-tech crime agency to peek inside vehicles, houses and other buildings as well as other jurisdictions. It is comparable to those of TSA airport scan bodies. Productive efforts have been made to reveal illegal migrants being transported in trucks through x- ray vans. (v) ational Criminal Intelligence Service (CIS) was launched in 1992 where majority of criminals in United Kingdom were targeted. Objectively, to process and disseminating information analyzing major criminal activity ISS: X 2017 Published by The Standard International Journals (The SIJ) 79

5 The SIJ Transactions on Industrial, Financial & Business Management (IFBM), Vol. 5, o. 5, August 2017 as well as helping law enforcement agencies both at home and abroad. Offenders such as traffickers, money launderers, football hooligans and organized criminal groups are some of the source of information gathering. CIS is linked to other countries that have anti-drugs networks. IV. HOW PRITS CA BE APPL I CRIME IVESTIGATIOS Once the high-tech officer or police officers book a suspected person such suspect s fingerprint is captured and kept on file or store in the computer storage device. With the aid of modern computer technology, physiological features and characteristics of the suspect can be run through billions of items stored in database within few minutes. Basically, there are three (3) kinds of crime scene prints, namely; (i) True latent prints and (b) plastic prints and visible prints. The true latent prints are invisible print impressions caused as a result of perspiration on the ridges of one s skin coming in contact with a surface. Liquid and crystal such water, amino acids, salt etc. easily allows impressions to be made as contain in perspiration. But plastic prints as discussed in above, the ridge impressions left on a soft [[material like wax, soap, putty etc. Then visible prints are prints obtain by fingers touching a surface after such ridge have been in contact with a colored material like ink, paint, grease and even blood. The photographed prints is lifted to the crime lab where the comparison will be carried out with all other pints of persons identify to have hand or knowledge in the crime scene. This exercise reduces all criminal s prints Lay Down Step of Crime Scene Investigation using Finger Printing The first step for forensic evidence to solve a crime is scene investigation. Preliminary items at the crime scene are collected and analyzed in order to determine the extent the crime was committed. This is achieved only through the following steps: securing the scene, managing the scene, surveying the scene, documenting the scene, searching the scene, collecting the evidence and storing the evidence, as well as reconstructing and releasing the scene [22]. (i) Securing of the scene is made effective by providing of a security personnel to guard against non-concerned people entering the scene during the event capturing or evidence taking. This gives rise to (ii) proper managing of the scene where movements are restricted, information is filtered, and technology devices used in the scene are preserved. (iii) Surveying the scene involves the stages whereby both the police officer and other crime investigator employ to handle the case are formulating theories and drawing some conclusion based on what happen or being discovered at the crime scene. This is an important stage since these hypotheses are subject to change depending on the forensic examinations pursuit. (iv) Documenting the scene is also important that might involve phases such as; keeping the photos album, videos, sketches and written notes. Attention is paid in each phase because it serves as a tool or reference maker for forensic examiners as the location has been wipeout. It is wise to note that none of the phase ruined each other. (v) Searching the scene, the scene investigator established the order in which the evidence is collected because the evidence collected in the crime scene and what was observed. (vi) Collecting evidence the lead investigator at the crime scene appoint a person to preserve all the collected evidence who ensure that more evidence is lost or affected by external source. All the evidences are carefully marked for proper identification by the crime investigator. (vii) Finally, reconstructing and releasing the scene play a significant role. The forensic scientist test the reliability of the theories of a crime collected and developed at the crime scene. The lead investigator release the evidence both date and time of the release is documented. V. FIGERPRIT AALSIS Fingerprint analysis is very important to the success of the criminal justice system of a nation. The latent prints are the most common type of forensic science evidence and have been used for more than 110 years in criminal investigations. The comparison of latent print to identifiable print (otherwise known as 'exemplar') is a step towards achieving examination of fingerprint evidence. The latent print examiners is expected to reach correct results as well as produce records of the examination and, in some cases, present their results and the reasoning behind them in court during this step-by-step matching process. The subject of increased scrutiny in the recent years, the accuracy of latent print identification is explained by AS [22]. In this discussion, the researchers take look at various issues ranging from the acquisition of impressions of friction ridge skin to the testimony of courtroom and from laboratory design and equipment to emerging methods for associating latent prints with exemplars and contribution of manual (human factors) fingerprint analysis such as communication of results through witness testimony and report Analysis, Comparison, Evaluation and Verification Flowchart Figure 7 below provide comprehensive evaluation and comparison of finger printing techniques and the technologies involve. The process is provided as flowcharts that explain the latent print examination used by most security organizations for forensic crime scene analysis. These steps include pre-analysis activity, Analysis, comparison of methods, evaluation and verification to ensure adequate performance. Pre-analysis activities involve the gathering of evidences from crime scenes, documentation and careful transmission of evidences to avoid damages which is then analyzed by experts. The analysis stages extract distinct features for identification of the entities. The identified features are compared with the ones stored in the finger print databases and then evaluated for accuracy and performances. Furthermore, the results are transmitted to the security agencies for communication to the appropriate authorities involve. These processes are shown below ISS: X 2017 Published by The Standard International Journals (The SIJ) 80

6 The SIJ Transactions on Industrial, Financial & Business Management (IFBM), Vol. 5, o. 5, August 2017 Start The Latent Print Examination Process Chart 10 Identify item useful to the case bearing latent prints 20 Physical item is documented and collected in the field for further analysis 30 The item is transmitted to the laboratory and chain of custody is documented PRE AALSIS ACTIVIT 40 Latent print is developed/captured (applies to field or laboratory) 50 Is latent processing adequate? 60 Is the latent suitable for analysis? 80 Latent print is retained as case evidence for further analysis 70 The latent print is deemed unsuitable and hence OT preserved, collected or retained as case evidence for further analysis 100 Latent print enters the examination process 200 Latent print provided to examiner for analysis 210 distinctive details of the latent print 220 relevant distortion in latent print 230 Analysis sufficient? 240 Suitable for comparison? 250 Determine likely up & down and location (area of the skin) of the latent print 260 Known prints available? 300 Known prints obtained by law enforcement agency & sent to laboratory AALSIS 270 Latent suitable for AFIS? 280 Latent is formatted encoded & AFIS search performed 310 Known prints or candidates provided to the examiner for analysis 290 Determine and memorize a distinct target group of latent print detail to search 350 Known prints suitable for comparison? 320 distinctive details of the known print 360 Common area in latent and known prints? 330 relevant distortion of the known print 340 Known print analysis adequate? 370 quality and quantity?(suitable to compare?) 400 The latent is not compared but is retained as case evidence according to policy 410 Known Prints obtained? 500 disagreement of Level 1 detail? 510 Target group exists within tolerance? 520 Would new target be beneficial? COMPARISO 530 Continue comparison of additional detail (levels 1,2 & 3) To Dissimilarity present? 550 Similarity present? 600 Within tolerance for an ID? 650 agreement? * The terms individualization and identification are synonymous in this document EVALUATIO 620 disagreement? 680 Reanalysis beneficial? 720 Exclusion To Individualization 780 Inconclusive To Refer to agency policy to determine if verification is required 810 Verification required? 820 Conclusion confirmed? 840 Conflict resolution according to organization policy 900 Results sent to requestor Start V E R I F I C A T I O Figure 7: Finger Printing Techniques and Analysis ISS: X 2017 Published by The Standard International Journals (The SIJ) 81

7 The SIJ Transactions on Industrial, Financial & Business Management (IFBM), Vol. 5, o. 5, August 2017 VI. COCLUSIO This paper provide architectural and technological application of digital finger printing to fight organized crime through analysis of evidences found at the crime scenes. This is necessary to provide guidelines for its adoptions by igeria security organizations to fight cybercrime. We presented lucid explanation of the technology, application and processes involve in digital finger printing and how this process can be utilized by third world countries like igeria to guarantee adequate cyber security to boost economic growths. REFERECES [1] U. Reginald (2008), The Evolution of Finger Prints Investigation and Evidence of a Forensic Expert, Owerri: Alphabet igeria Published. [2] B. Eckert (1996), Introduction to Forensic Science, ew ork: Elsevier. [3] A.A. Adebayo (2013), ouths' Unemployment and Crime in igeria: A exus and Implications for ational Development, International Journal of Sociology and Anthropology, Vol. 5, o. 9, Pp [4] P.K Manning (2001). Technology s Way: Information Technology Crime Analysis and the Rationalizing of Policing, Journal of Crime Justice, Vol. 1, o. 1, Pp [5] C. Michael & E. Imwinkelried (2006), Defence Practice Tips: A Cautionary ote about Fingerprint Analysis and Reliance on Digital Technology, Judicature, Vol. 90, o.2. [6] M. Palmiotto (1994), Criminal Investigation, Chicago: elson Hall. [7] D. Salter (2006), Thumbprint: An Emerging Technology, Engineering Technology, ew Mexico State University. [8] T.. Smyth & M.L. Best (2013), Tweet to Trust: Social Media and Election in West Africa, Proceeding of the Sixth International Conference in Information Communication Technology and Development, Vol. 1, Pp [9] M. Hilderbrandt & J. Dittmann (2016), StirTraceV3.0 and Printed Fingerprint Detection: Simulation of Acquisition Condition Tilting and its Impact to Latent Fingerprint Detection Feature Spaces for Crime Scene Forgerie, Proceeding of IEEE international Workshop on Biometrics and Forensic, Pp [10] J. Wayman, A. Jain, D. Maltoni & D. Maio (2005), Biometrics Systems, London: Springer Verlag. [11] P. Vinodiny, C. azhini, E. Vinya & P. Anandan (2016), EEG based Brain Fingerprinting using MERMER Technology, Middle-East Journal of Scientific Research, Vol. 24, o. 4, Pp [12] G. Patni & S. Shipa (2017), Sports Academy Player Attendance System using Biometric Fingerprints Identification, International Journal of Scientific Research in Computer Science Engineering and Information Technology, Vol. 2, o. 3, Pp [13] K. Karu & A.K Jain (1996), Fingerprint Classification, Pattern Recognition, Vol. 29, o. 3, Pp [14] A. Jain, L. Hong, S. Pankenti & R. Bolle (1997), An Identity Authentication using Fingerprint, Proceeding of IEEE Conference, Vol. 85, o. 9, Pp [15] L.A. Farwell & S.S Smith (2001), Using Brain MERMER Testing to Detect Concealed Knowledge despite Efforts to Conceal, Journal of Forensic Sciences, Vol. 46, o. 1. Pp [16] B. Dalbey (1999), Brain Fingerprinting Testing Traps Serial Killer in Missouri, The Fairfield, IA. ng.ppt [17] L. Farwell (1992), Two ew Twists on the Truth Detector: Brainwave Detection of Occupational Information, Psychophysiology, Vol. 29, o. 4A. S3. [18] L.A. Farwell & T. Makeig (2005), Farwell Brain Fingerprinting in the case of Harrington v. State. Open Court X, Indiana State Bar Assoc., o. 3. Pp [19] S.L Zabell (2005), Fingerprinting Evidence, Journal of Law and Policy, Pp [20] J.P Black (2012), Is there a need for 100% Verification (Review) of Latent Print Examination before Conclusions, Journal of Forensic Identification, Vol. 62, o. 1, Pp [21] H. Dafyadd, G. Williams & S. Bleays (2014), Latent Fingerprint Visualisation using a Scanning Kelving Probe in Conjunctions with Vacuum Metal Deposition, Journal of Forensic Science, Vol. 59, o. 1. Pp [22] ational Academy of Sciences (2009), Finds 'Serious Deficiencies' in ation's Crime Labs, ational Association of Criminal Defense Lawyers. Anayo Chukwu Ikegwu, he is currently a PG student of ational Open University of igeria, pursing M.Sc in Information Technology. He obtained B.Sc in Computer Science from Ebonyi State University, Abakaliki, igeria. His research interests are Knowledge Discovery in Large Databases, Big Data Analytics, and Web Technologies. weke F. Henry is currently working as a Lecturer at Computer Science Department, Ebonyi State University, Abakaliki, Ebonyi State igeria. He received his Master of Science (Computer Science) in 2011 from University of Bedfordshire, Luton United Kingdom and Bachelor of Science (Computer Science) in 2006 from Ebonyi State University, Abakaliki igeria. His research interests are Data mining, Intelligent Tutoring System, cloud computing and security, wireless technologies and emerging technology. Ugwu Gabriel Evo is currently a Lecturer with Ebonyi State University, Abakaliki, Ebonyi State, igeria. He had his first degree in Computer Engineering in Enugu State University of Science and Technology (ESUT) Enugu and Master of Science (M Sc.) Computer Science from Ebonyi State University (EBSU). He has just defended his Ph.D thesis in computer Science from Ebonyi State University (EBSU). His research interests are Computer etworking and Security, Object Identification and Recognition from Images. ISS: X 2017 Published by The Standard International Journals (The SIJ) 82

Fingerprints - Formation - Fingerprints are a reproduction of friction skin ridges that are on the palm side of fingers and thumbs

Fingerprints - Formation - Fingerprints are a reproduction of friction skin ridges that are on the palm side of fingers and thumbs Fingerprints - Formation - Fingerprints are a reproduction of friction skin ridges that are on the palm side of fingers and thumbs - these skin surfaces have been designed by nature to provide our bodies

More information

History of Fingerprints

History of Fingerprints Fingerprints History of Fingerprints Johann Christoph Andreas Mayer 1788 First scientist to recognize fingerprints were unique William Herschel 1856 Began the collecting of fingerprints Alphonse Bertillon

More information

The study of fingerprints for identification purposes is known as dactylography or dactyloscopy.

The study of fingerprints for identification purposes is known as dactylography or dactyloscopy. The study of fingerprints for identification purposes is known as dactylography or dactyloscopy. Your fingers, toes, feet, palms, and lips are covered with small ridges that are raised portions of the

More information

FORENSIC SCIENCE Fingerprints

FORENSIC SCIENCE Fingerprints FORENSIC SCIENCE Fingerprints 1 History 3000 years ago: Chinese used fingerprints to sign legal documents 1892 Galton describes loops, whorls, and arches 1897 Sir Edward Henry develops the classification

More information

Fingerprint Analysis. Bud & Patti Bertino

Fingerprint Analysis. Bud & Patti Bertino Fingerprint Analysis Bud & Patti Bertino Fingerprints Formation Skin produce secretions oil, salts Dirt combines with secretions Secretions stick to unique ridge patterns on skin Did You Know? Fingerprints

More information

Objectives. You will understand: Fingerprints Fingerprints

Objectives. You will understand: Fingerprints Fingerprints Fingerprints Objectives You will understand: Why fingerprints are individual evidence. Why there may be no fingerprint evidence at a crime scene. How computers have made personal identification easier.

More information

Unit 2 Review-Fingerprints. 1. Match the definitions of the word on the right with the vocabulary terms on the right.

Unit 2 Review-Fingerprints. 1. Match the definitions of the word on the right with the vocabulary terms on the right. Name: KEY Unit 2 Review-Fingerprints 1. Match the definitions of the word on the right with the vocabulary terms on the right. 1. Fluoresce O 2. Iodine fuming F 3. Latent fingerprint P 4. Livescan A 5.

More information

Name TRAINING LAB - CLASSIFYING FINGERPRINTS

Name TRAINING LAB - CLASSIFYING FINGERPRINTS TRAINING LAB - CLASSIFYING FINGERPRINTS Name Background: You have some things that are yours and yours alone - and NO ONE else on earth has anything exactly like it! They are your fingerprints. Everyone

More information

History of Fingerprinting

History of Fingerprinting Fingerprints History of Fingerprinting People have always wanted a full proof way to identify someone. The first system was created by Alphonse Bertillon (1883) Used a detailed description plus full length

More information

Unit 5- Fingerprints and Other Prints (palm, lip, shoe, tire)

Unit 5- Fingerprints and Other Prints (palm, lip, shoe, tire) Unit 5- Fingerprints and Other Prints (palm, lip, shoe, tire) Historical Perspective: Quest for reliable method of personal identification: Tattooing Numbers Branding Cutting off Fingers Holocaust Survivor

More information

Fingerprints. Fingerprints. Dusan Po/Shutterstock.com

Fingerprints. Fingerprints. Dusan Po/Shutterstock.com Fingerprints Dusan Po/Shutterstock.com 1 Objectives You will understand: Why fingerprints are individual evidence. Why there may be no fingerprint evidence at a crime scene. How computers have made personal

More information

Fingerprints. Sierra Kiss

Fingerprints. Sierra Kiss Fingerprints Sierra Kiss Introduction Fingerprints are one of the most commonly known biometrics that play a major role in law enforcement and the criminal justice system in identification of criminals.

More information

Fingerprint Principles

Fingerprint Principles What pattern are you? T. Tomm 2006 http://sciencespot.net 8 th Grade Forensic Science Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint

More information

DRAFT FOR COMMENT. (Washed Out Portions Not Open for Comment)

DRAFT FOR COMMENT. (Washed Out Portions Not Open for Comment) (Washed Out Portions Not Open for Comment) STANDARD FOR THE DOCUMENTATION OF ANALYSIS, COMPARISON, EVALUATION, AND VERIFICATION (ACE-V) (LATENT) Preamble When friction ridge detail is examined using the

More information

Study Guide Chapters 3 & 4 Forensic Science Name

Study Guide Chapters 3 & 4 Forensic Science Name Chapter 3 Body of the Crime 1. Corpus Delicti means. Money 2. Top 3 reasons for committing a crime. Revenge Emotion-love,hate, anger. Body 3. 3 sources of evidence: Primary or secondary crime scene Suspects

More information

Historical Development. Historical Development. Chapter 6 Fingerprints By the end of this chapter you will be able to: Ch 6 Fingerprinting Notes

Historical Development. Historical Development. Chapter 6 Fingerprints By the end of this chapter you will be able to: Ch 6 Fingerprinting Notes Read the introduction on page 134 of your text and the scenario below. Answer the questions in pairs. It is your first year at college and there is a break in at the dorm. Fingerprints have been left at

More information

Arches are the simplest type of fingerprints that are formed by ridges that enter on one of the print and exit on the. No are present.

Arches are the simplest type of fingerprints that are formed by ridges that enter on one of the print and exit on the. No are present. Name: 1. Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: 1. A fingerprint is an characteristic; no two people have been found with the same fingerprint

More information

Thank you for your purchase!

Thank you for your purchase! TM Thank you for your purchase! Please be sure to save a copy of this document to your local computer. This activity is copyrighted by the AIMS Education Foundation. All rights reserved. No part of this

More information

Katherine Leger (order # ) 1

Katherine Leger (order # ) 1 Anyone for a Bit of Dactyloscopy? It sounds prehistoric, and actually it is. It s been around as long as mankind. Or, at least what leads up to dactyloscopy. Put your finger on the tip of your nose. Now

More information

JAW BREAKERS AND HEART THUMPERS AIMS EDUCATION FOUNDATION

JAW BREAKERS AND HEART THUMPERS AIMS EDUCATION FOUNDATION Topic Fingerprints Key Question How do our fingerprints compare? Focus Comparisons are made of the fingerprints on all five digits to determine likenesses and differences. Guiding Documents Project 2061

More information

CRM 341 Key Concepts Module 5

CRM 341 Key Concepts Module 5 Key Concepts of Chapter 8: CRM 341 Key Concepts Module 5 General Types of Patterns 3 general types of patterns Arches Loops Whorls Primary groups are sub-divided into 8 smaller groups Fingerprint patterns

More information

T. Trimpe

T. Trimpe T. Trimpe 2006 http://sciencespot.net Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual characteristic; no two people

More information

DNA Station. 3. Extract DNA from your own cheek. (see Wind your way around your own DNA)

DNA Station. 3. Extract DNA from your own cheek. (see Wind your way around your own DNA) DNA Station 1. Identify yourself! DNA (deoxyribonucleic acid) is the genetic material that identifies all of us as unique unless you're an identical twin. Even between identical twins, fingerprints are

More information

Introduction and Use of this Text List of Contributors About the Companion Website. PART I Crime Scene Principles 1

Introduction and Use of this Text List of Contributors About the Companion Website. PART I Crime Scene Principles 1 Introduction and Use of this Text List of Contributors About the Companion Website PART I Crime Scene Principles 1 1 The Crime Scene Context 3 Raul Sutton 1.1 Introduction 3 1.2 What is a crime? 4 1.3

More information

Fingerprints (Unit 4)

Fingerprints (Unit 4) 21 Fingerprints (Unit 4) Fingerprints have long been a mainstay in the area of forensic science. Since the nineteenth century, authorities have used fingerprints to prove a person handled an object or

More information

OHIO STATE UNIVERSITY EXTENSION

OHIO STATE UNIVERSITY EXTENSION Cloverbud Investigators: Career Detectives November Background: When we think of crime scene investigation, we may think of famous fictional characters like Sherlock Holmes, the Hardy Boys, Nancy Drew

More information

T. Trimpe 2006

T. Trimpe 2006 T. Trimpe 2006 http://sciencespot.net Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual characteristic; no two people

More information

Introduction to Biometrics 1

Introduction to Biometrics 1 Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living

More information

Crime Scene Management: Scene Specific Methods

Crime Scene Management: Scene Specific Methods Brochure More information from http://www.researchandmarkets.com/reports/992036/ Crime Scene Management: Scene Specific Methods Description: Crime Scene Management: Scene Specific Methods is an accessible

More information

Friction ridge detail of the fingers, palms and feet is among the

Friction ridge detail of the fingers, palms and feet is among the Chapter 11 Latent Prints Friction ridge detail of the fingers, palms and feet is among the most definitive scientific evidence used for personal identification. The real benefit of this scientific identification

More information

Touchless Fingerprint Recognization System

Touchless Fingerprint Recognization System e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph

More information

At the Crime Scene. FORENSIC SCIENCE - BURKS Crime Scene

At the Crime Scene. FORENSIC SCIENCE - BURKS Crime Scene FORENSIC SCIENCE - BURKS Crime Scene At the Crime Scene Forensic science begins at the crime scene, which can provide useful information that must be carefully, systematically, scientifically, and legally

More information

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT Abstract This report brings together the final papers presented by the students in the Frontiers in Information

More information

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems J.K. Schneider, C. E. Richardson, F.W. Kiefer, and Venu Govindaraju Ultra-Scan Corporation, 4240 Ridge

More information

) Forensic Footwear and Tire Impression Evidence. t the form of a three-dimensional shoe impression

) Forensic Footwear and Tire Impression Evidence. t the form of a three-dimensional shoe impression 101 An Introduction to Forensic Science j3 surfaces, 3uch as sand, soil, or snow, iney may cause a permanent deformation of that surface an object that made them An examiner will examine these characteristics

More information

The Integument Laboratory

The Integument Laboratory Name Period Ms. Pfeil A# Activity: 1 Visualizing Changes in Skin Color Due to Continuous External Pressure Go to the supply area and obtain a small glass plate. Press the heel of your hand firmly against

More information

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

Whose Fingerprints Were Left Behind

Whose Fingerprints Were Left Behind Edvo-Kit #S-91 Whose Fingerprints Were Left Behind Experiment Objective: The objective of this experiment is to familiarize students with the use of various fingerprinting dusting powders and to match

More information

I. Introduction. Fingerprint Pattern Types 1. Loop, Whorl, Arch. III. Fingerprint Impression Types 1. Rolled, Plain

I. Introduction. Fingerprint Pattern Types 1. Loop, Whorl, Arch. III. Fingerprint Impression Types 1. Rolled, Plain Section I. Introduction The purpose of this program is to provide information regarding the nature of fingerprints and outline techniques for taking legible fingerprints. Fingerprints can be recorded on

More information

Fingerprinting. Forensic Science

Fingerprinting. Forensic Science Fingerprinting Forensic Science Even with the recent advancements made in the field of DNA analysis, the science of fingerprinting, dactylography,, is still commonly used as a form of identification, whether

More information

BIOMETRICS BY- VARTIKA PAUL 4IT55

BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics

More information

E-book Code: By Fiona Rayns. For ages 10+

E-book Code: By Fiona Rayns. For ages 10+ E-book Code: REAU4018 Forensic Science By Fiona Rayns For ages 10+ Written by Fiona Rayns. Illustrated by Murray Smoker. Typesetting and design by Shay Howard. - 2005. Published by (2005) P.O. Box 276

More information

JY Division I nformation

JY Division I nformation Feature Article JY Division I nformation Forensic Products and Technologies of the Forensic Division Nicolas Vezard The Forensic Division has been focused on Identification Instruments since its beginnings

More information

PAPER No. 7: CRIMINALISTICS AND FORENSIC PHYSICS MODULE No. 11; TRACE EVIDENCE

PAPER No. 7: CRIMINALISTICS AND FORENSIC PHYSICS MODULE No. 11; TRACE EVIDENCE SUBJECT FORENSIC SCIENCE Paper No and Title Module No. and Title Paper 7 : Criminalistics and Forensic Physics Module No. 11; Trace evidence Module Tag FSC_P7_M11 TABLE OF CONTENTS 1. Learning Outcomes

More information

Handling Digital Photographs for Use in Criminal Trials V2, March 2008

Handling Digital Photographs for Use in Criminal Trials V2, March 2008 Handling Digital Photographs for Use in Criminal Trials V2, March 2008 This is a DRAFT guide that may, once fully developed, be used by law enforcement to help ensure that digital photographs are admissible

More information

CASE STUDY. Montgomery County Sheriff s Office. ADAMS Software Chosen for Managing Photos, Physical Evidence

CASE STUDY. Montgomery County Sheriff s Office. ADAMS Software Chosen for Managing Photos, Physical Evidence Montgomery County Sheriff s Office gains efficiency, cost savings with ADAMS Software for managing physical evidence, digital and latent assets CASE STUDY Montgomery County Sheriff s Office Crime laboratories

More information

MCPI Annual Conference Tuesday, September 19, 2017

MCPI Annual Conference Tuesday, September 19, 2017 Michigan Council of Professional Investigators MCPI Annual Conference Tuesday, September 19, 2017 Location: Cleary University, 3750 Cleary Drive, Howell, MI 48843 Time 8:45am 9:00am 9:00am 9:45am 9:45am

More information

ARIZONA PEACE OFFICER STANDARDS AND TRAINING BOARD HOUR BASIC CURRICULUM MODEL LESSON PLAN LESSON TITLE: FINGERPRINTING 5.

ARIZONA PEACE OFFICER STANDARDS AND TRAINING BOARD HOUR BASIC CURRICULUM MODEL LESSON PLAN LESSON TITLE: FINGERPRINTING 5. ARIZONA PEACE OFFICER STANDARDS AND TRAINING BOARD 585 - HOUR BASIC CURRICULUM MODEL LESSON PLAN LESSON TITLE: FINGERPRINTING 5.5 NOVEMBER 2009 SUBJECT: AZ POST DESIGNATION: Fingerprinting 5.5 HOURS: 4

More information

TP Basic Fingerprint Training Manual Section 6 - Classification - Reference Rules. NCIC Classification

TP Basic Fingerprint Training Manual Section 6 - Classification - Reference Rules. NCIC Classification NCIC Classification Pattern Code Plain Arch..AA Tented Arch. TT Ulnar Loop. Two numeric characters indicating exact ridge count. If there is a ridge count less than 10, precede with a zero. Radial Loop..Two

More information

Academic Vocabulary Test 1:

Academic Vocabulary Test 1: Academic Vocabulary Test 1: How Well Do You Know the 1st Half of the AWL? Take this academic vocabulary test to see how well you have learned the vocabulary from the Academic Word List that has been practiced

More information

Detection and Identification of a Latent Palmprint on a Cartridge

Detection and Identification of a Latent Palmprint on a Cartridge Case Report Detection and Identification of a Latent Palmprint on a Cartridge Michelle E. Waldron Adrianne Walls Sarasota County Sheriff s Office Sarasota, FL Abstract: In crime scene work, fragments of

More information

LONDONDERRY POLICE DEPARTMENT POLICIES AND PROCEDURES

LONDONDERRY POLICE DEPARTMENT POLICIES AND PROCEDURES POLICY NO: S-301-A LONDONDERRY POLICE DEPARTMENT POLICIES AND PROCEDURES DATE OF ISSUE: December 1, 1997 EFFECTIVE DATE: December 1, 1997 REVISED DATE: January 10, 2016 SUBJECT: COLLECTION AND PRESERVATIONOF

More information

Crime Scene Investigation

Crime Scene Investigation Crime Scene Investigation The 7 S s of Crime Scenes 1. Secure the scene 2. Separate witnesses 3. Scan the scene 4. See the scene 5. Sketch the scene 6. Search for evidence 7. Scene evidence collection

More information

Biometrics and Fingerprint Authentication Technical White Paper

Biometrics and Fingerprint Authentication Technical White Paper Biometrics and Fingerprint Authentication Technical White Paper Fidelica Microsystems, Inc. 423 Dixon Landing Road Milpitas, CA 95035 1 INTRODUCTION Biometrics, the science of applying unique physical

More information

Unit 2: THE CRIME SCENE

Unit 2: THE CRIME SCENE Unit 2: THE CRIME SCENE Oh, how simple it would all have been had I been here before they came like a herd of buffalo and wallowed all over it. A. Conan Doyle, in The Boscombe Valley Mystery, 1892 CORPUS

More information

Questioned Documents

Questioned Documents Questioned Documents Questioned Documents Any document about which some issue has been raised or that is the subject of an investigation Document Examiners Mostly examine handwriting to originate its source

More information

Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.

Notes from a seminar on Tackling Public Sector Fraud presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit

More information

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) www.irjaet.com ISSN (PRINT) : 2454-4744 ISSN (ONLINE): 2454-4752 Vol. 1, Issue 4, pp.240-245, November, 2015 IRIS RECOGNITION

More information

North Carolina Fire and Rescue Commission. Certified Fire Investigator Board. Course Equivalency Evaluation Document

North Carolina Fire and Rescue Commission. Certified Fire Investigator Board. Course Equivalency Evaluation Document North Carolina Fire and Rescue Commission Certified Fire Investigator Board Course Equivalency Evaluation Document NOTICE This material is to be used to correlate equivalency of outside programs to the

More information

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase Term Paper Sample Topics Your topic does not have to come from this list. These are suggestions.

More information

User Awareness of Biometrics

User Awareness of Biometrics Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org

More information

Trade Secret Protection of Inventions

Trade Secret Protection of Inventions Trade Secret Protection of Inventions Phil Marcoux & Kevin Roe Inventions - Trade Secret or Patent? Theft by employees, executives, partners Theft by contract Note - this class does not create an attorney-client

More information

Interoperable systems that are trusted and secure

Interoperable systems that are trusted and secure Government managers have critical needs for models and tools to shape, manage, and evaluate 21st century services. These needs present research opportunties for both information and social scientists,

More information

Non-Contact Vein Recognition Biometrics

Non-Contact Vein Recognition Biometrics Non-Contact Vein Recognition Biometrics www.nearinfraredimaging.com 508-384-3800 info@nearinfraredimaging.com NII s technology is multiple modality non-contact vein-recognition biometrics, the visualization

More information

CORRECT ORDER FOR JOB PAPERS

CORRECT ORDER FOR JOB PAPERS CORRECT ORDER FOR JOB PAPERS 1. EVALUATION PAGE 2. BUDGET PAGE 3. YOUR NEAT, PROFESSIONAL LETTER 4. YOUR NEAT, LABELED, AND TITLED TABLES 5. YOUR NEAT, LABELED, AND TITLED GRAPHS 13 ABC Technologies Ms.

More information

AURORA POLICE DEPARTMENT DIRECTIVES MANUAL

AURORA POLICE DEPARTMENT DIRECTIVES MANUAL 15.15 Title: DIGITAL EVIDENCE AURORA POLICE DEPARTMENT DIRECTIVES MANUAL Approved By: Nick Metz, Chief of Police Effective: 11/09/2006 Revised: 02/24/2017 Associated Policy: DM 08.09 References: DM 16.03,

More information

Technical Procedure for Liquid Adhesive Lifters

Technical Procedure for Liquid Adhesive Lifters Technical Procedure for Liquid Adhesive Lifters 1.0 Purpose - This procedure describes how to apply Liquid Adhesive Print Lifters to items of evidence. 2.0 Scope - This procedure applies to rough, grainy

More information

Authenticated Document Management System

Authenticated Document Management System Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College

More information

Digital Forensics Lecture 11. Evidence, Reporting, and Action

Digital Forensics Lecture 11. Evidence, Reporting, and Action Digital Forensics Lecture 11 Evidence, Reporting, and Action This Week s Presentations Certifications Risk Analysis Normal (non-it) Parents Keeping Their Children Safe and Happy Encase Sleuth Kit Next

More information

2. The most common tool for collecting evidence is/are: a. tweezers. b. computers. c. Q-Tips. d. tape. Day 1

2. The most common tool for collecting evidence is/are: a. tweezers. b. computers. c. Q-Tips. d. tape. Day 1 Day 1 1. Which of the items below is NOT evidence? a. A scrap of clothing b. Mud from a footprint c. A fingerprint d. The investigator s birthplace 2. The term Forensic has to do with a(n): a. shoelace.

More information

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by PAKISTAN DISCLAIMER: The views presented

More information

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique TECHNICAL REPORT ISO/IEC TR 24741 First edition 2007-09-15 Information technology Biometrics tutorial Technologies de l'information Tutoriel biométrique Reference number ISO/IEC 2007 Contents Page Foreword...

More information

Research and Innovation. Roadmap

Research and Innovation. Roadmap Research and Innovation Roadmap 2017-2020 About NIFS The National Institute of Forensic Science (NIFS) is a directorate within the Australia New Zealand Policing Advisory Agency (ANZPAA). Our strategic

More information

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area

More information

Questioned Documents. Forensic Science

Questioned Documents. Forensic Science Questioned Documents Forensic Science Type Script Comparison and Altered Documents Typescript Comparisons Typescript is the result of machine-created documents, such as computer printers, photocopiers,

More information

This version has been archived. Find the current version at on the Current Documents page. Scientific Working Groups on.

This version has been archived. Find the current version at  on the Current Documents page. Scientific Working Groups on. Scientific Working Groups on Digital Evidence and Imaging Technology SWGDE/SWGIT Guidelines & Recommendations for Training in Digital & Multimedia Evidence Disclaimer: As a condition to the use of this

More information

Technologies that will make a difference for Canadian Law Enforcement

Technologies that will make a difference for Canadian Law Enforcement The Future Of Public Safety In Smart Cities Technologies that will make a difference for Canadian Law Enforcement The car is several meters away, with only the passenger s side visible to the naked eye,

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,

More information

Digital Forensics. What is it, and how can I get involved? Phil Cobley Training Development Lead for MSAB

Digital Forensics. What is it, and how can I get involved? Phil Cobley Training Development Lead for MSAB Digital Forensics What is it, and how can I get involved? Phil Cobley Training Development Lead for MSAB What we shall look to cover Who am I? What is Digital Forensics? Some basic (but core) Digital Forensic

More information

Individuality of Fingerprints

Individuality of Fingerprints Individuality of Fingerprints Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York srihari@cedar.buffalo.edu IAI Conference, San Diego, CA

More information

Fabric Impressions Results and Testimony. Glenn Schubert Illinois State Police So IL Forensic Science Centre Carbondale, Illinois

Fabric Impressions Results and Testimony. Glenn Schubert Illinois State Police So IL Forensic Science Centre Carbondale, Illinois Fabric Impressions Results and Testimony Glenn Schubert Illinois State Police So IL Forensic Science Centre Carbondale, Illinois What is a Fabric Impression? Definition - Transference of a fabric s construction

More information

Mr. Futrell is a supervisory fingerprint specialist in the Latent Fingerprint Section of the FBI Laboratory in Washington, D.C.

Mr. Futrell is a supervisory fingerprint specialist in the Latent Fingerprint Section of the FBI Laboratory in Washington, D.C. By Ivan Ross Futrell Mr. Futrell is a supervisory fingerprint specialist in the Latent Fingerprint Section of the FBI Laboratory in Washington, D.C. This Article Originally Appeared in the FBI Law Enforcement

More information

Model Pro Bono Policy for Large Firms

Model Pro Bono Policy for Large Firms Model Pro Bono Policy for Large Firms An extraordinary need exists in this country for the provision of legal services for those unable to pay for them. Law firms possess the talent and resources to take

More information

MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC.

MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC. MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC. Minutiae Manipulation for Biometric Attacks 1 INTRODUCTION

More information

DEVON & CORNWALL C O N S T A B U L A R Y

DEVON & CORNWALL C O N S T A B U L A R Y DEVON & CORNWALL C O N S T A B U L A R Y Force Policy & Procedure Guideline EVIDENTIAL DIGITAL IMAGING Reference Number D296 Policy Version Date 17 November 2010 Review Date 01 April 2015 Policy Ownership

More information

The Role of Biometrics in Virtual Communities. and Digital Governments

The Role of Biometrics in Virtual Communities. and Digital Governments The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024

More information

Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design

Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design Norulzahrah Mohd Zainudin, Madjid Merabti, David Llewellyn-Jones School of Computing and

More information

From the gun Andy Bob Cathy 3. Who beat the old lady up because she tried to hold on to her purse?: 4. Prove that the other 2 do not match.

From the gun Andy Bob Cathy 3. Who beat the old lady up because she tried to hold on to her purse?: 4. Prove that the other 2 do not match. Do you see the island, the bifurcation, the ending ridge in this fingerprint? Name: These are actual crime-scene fingerprints and some scenarios. Solve the crime! 1. Which person held up the couple at

More information

Footwear & Tire Track Evidence

Footwear & Tire Track Evidence Footwear & Tire Track Evidence Impression Evidence Overview Impression evidence is the most common type of evidence recovered from scenes of crime. This type of evidence encompasses: Fingerprints Bite

More information

Civil Registry System National Population Register

Civil Registry System National Population Register Civil Registry System National Population Civil Registration System National Population /Civil Registration of births and deaths is developed for the Ministry of State for Immigration and Registration

More information

3 I, Kent Gibson, state the following, of which I have personal knowledge:

3 I, Kent Gibson, state the following, of which I have personal knowledge: 1 Regarding an antique Tintype Photograph Thought to contain the image of JESSE JAMES. FORENSIC DECLARATION of Photographic Authenticity Via Face Recognition 2 Analysis requested by: Justin Whiting DECLARATION

More information

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used

More information

MSc(CompSc) List of courses offered in

MSc(CompSc) List of courses offered in Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The

More information

National Civil and Voter Registration, Pg. 11

National Civil and Voter Registration, Pg. 11 National Civil and Voter Registration, 2017 Pg. 11 What is Voter Registration? Voter registration is the process of verifying the identity of potential voters and entering their names and other substantiating

More information

Innovation and Technology Law Curriculum

Innovation and Technology Law Curriculum Innovation and Technology Law Curriculum Core Courses FOUNDATIONS OF PRIVACY LAW (FALL 2016) This course explores the principles of privacy law in relation to the affairs of government, non-government

More information

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor Mohamed. K. Shahin *, Ahmed. M. Badawi **, and Mohamed. S. Kamel ** *B.Sc. Design Engineer at International

More information

Hey guys copy what is outlined in yellow in your notebooks. Slides 2-15

Hey guys copy what is outlined in yellow in your notebooks. Slides 2-15 Hey guys copy what is outlined in yellow in your notebooks. Slides 2-15 Crime Scene Come in and get your notebooks out. We have notes today! The goal of a crime scene investigation is to recognize, document,

More information

Abstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image.

Abstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image. An Approach To Extract Minutiae Points From Enhanced Fingerprint Image Annu Saini Apaji Institute of Mathematics & Applied Computer Technology Department of computer Science and Electronics, Banasthali

More information

THE NEED FOR DIGITAL FORENSIC INVESTIGATIVE FRAMEWORK

THE NEED FOR DIGITAL FORENSIC INVESTIGATIVE FRAMEWORK THE NEED FOR DIGITAL FORENSIC INVESTIGATIVE FRAMEWORK I. Ademu 1, C. Imafidon 2 1 Postgraduate Student, School of Architecture, Computing and Engineering, University of East London, London, United Kingdom,

More information

FIRE INVESTIGATOR SCENE EXAMINATION

FIRE INVESTIGATOR SCENE EXAMINATION 10 FIRE INVESTIGATOR SCENE EXAMINATION 1. Secure a fire ground/scene so that unauthorized persons can recognize the perimeters of the investigative scene and are kept from restricted areas and evidence

More information