Digital Fingerprint and Forensic Examination as a Technology for Cybercrime Detection and Prevention in Nigeria
|
|
- Bruce Rice
- 5 years ago
- Views:
Transcription
1 The SIJ Transactions on Industrial, Financial & Business Management (IFBM), Vol. 5, o. 5, August 2017 Digital Fingerprint and Forensic Examination as a Technology for Cybercrime Detection and Prevention in igeria Anayo Chukwu Ikegwu*, Henry Friday weke** & Gabriel Evo Ugwu*** *Department of Computer Science, ational Open University of igeria, Enugu, IGERIA. analystitiinfo{at}gmail{dot}com **Department of Computer Science, Ebonyi State University, Abakaliki, P.M.B 053 Ebonyi State, IGERIA. ufoo2010{at}yahoo{dot}com ***Department of Computer Science, Ebonyi State University, Abakaliki, P.M.B 053 Ebonyi State, IGERIA. Ugwugabrielevo{at}yahoo{dot}co{dot}uk Abstract Digital finger printing is an important technology for fighting organized crime and identification of features possessed by individual for authentication in the society especially in igeria. There are lot of cutting edge technologies and application areas that have been developed since its invention, ranging from airport security, smart home security, mobile phones authentications and electronic commerce (E-commerce). However, understanding digital fingerprinting is quite difficult even though it is an important security mechanism. Furthermore, there are still kinds of mystery surrounding this technology especially in the third world countries like igeria. This paper provide explicit explanation of the finger printing technology, applications and processes involve in identifying specific features in individuals. Furthermore, it enables broad understanding in order to enhance adoption of the system to combat organized digital crime in the ever changing technology world. Keywords Crime Detection; Cybercrime Prevention; Digital Evidence; Finger Printing; Forensic Examination; Finger Print Analysis. Abbreviations Analysis Comparison Evaluation and Verification (ACE-V); Criminal Investigation Department (CID); Global Positioning System (GPS); ational Emergency Management (EMA); Public Safety Radio Communication (PSRC); Scanning Kelvin Probe (SKP). I. ITRODUCTIO TECHOLOG has really transformed every aspect of life. The knowledge of computer system has also changed the perception of human activities and operation from manual to more digital technological knowhow. Fingerprint as a technology for security authentication, a measure that is linked with forensic examination. Forensic examinations are urgently producing important practical results in the field of computer and applied sciences. There are evidences that serious organized crimes are being committed that lawyers, police officer and security agency find difficult to crack due to lack of sufficient information. Information is a masterpiece for every authentication measures. The application of a wide spectrum of science to answer questions of interest to a legal system is term as forensic science. The recovery and interpretation of digital devices such as computers, mobile phones and digital cameras are known as digital forensic. The print made by an impression of the ridges in the skin of a finger, normally used for biometric identification, in criminal investigations is referred to as fingerprint. Fingerprint could mean an impression made in ink as a means of identification on surface of the curves formed by the ridges on a fingertip. In law, any reproductions of a pattern of ridge on the smooth surface of the design formed by the ridges on the inside of the end joint of a thumb provide evidence of fingerprint [Reginald, 1]. The results of minute ridges and valleys found on the thumb of every person is said to be thumbprints. Therefore, it is an impression of the friction ridges of any part of the thumb. Thumbprint may also refer to as an impression of the coetaneous ridges of the fleshy distal portion of a thumb, that is obtain by pressing the thumb on an object when touch with ink. Eckert [2] commented that each print has an exclusive and unique owner since there have never been two individuals recorded with the same thumbprint. ISS: X 2017 Published by The Standard International Journals (The SIJ) 76
2 The SIJ Transactions on Industrial, Financial & Business Management (IFBM), Vol. 5, o. 5, August 2017 There are high indications of the increase in crime rate in igeria especially in the urban areas due to inequalities in social welfare [Adebayo, 3]. The country is experiencing different crime rates that are carefully committed and organized by the igeria citizen and non-citizenship on day to day basis. The use of finger print will help in identification and minimization of such crime. Fingerprinting is applied in identification of properties owners, authenticating the legitimate user of valuable items has becoming a challenging factors in developing evidence base verification. The case of baby-mix-ups and substitutions has become a worrisome, some illiterate depositors who cannot write names during their bank transactions and even travelling documents in authentication such as passport, visa etc need fingerprint for accurate identification. Although, law enforcement officers with extraordinary visual memories such as tracking system, surveillance system and other gadgets try to identify and arrested offenders [Manning, 4]. The use of photography as a mean of criminal identification provides inconsistent results. However, a fingerprint comparison can identify two different people. Fingerprinting is an important means of identification and crime analysis. The objective of this paper is to provide comprehensive analysis of digital fingerprinting process, detection mechanisms and identify technologies that behind it successful implementation. Furthermore, we present the advantages, algorithms, technological gain in to crime fighting organizations and how these can benefit igeria in fighting organized crimes. II. THUMBPRITS FOR CRIME DETECTIO Thumbprint has been recognized in criminal cases as latent print or rolled print [Michael & Imwinkelried, 5]. Rolled prints are normally gotten when a person is apprehended in relation to crimes. As a matter of booking process, the security agent rolled the culprit s thumb in ink and then impressed it on a card. After which, it is stored in libraries of such cards maintained by organization and governmental agency, but now stored in the computer storage devices for efficient and effective retrievals. In contrast, latent print may be produced and not readily visible at the crime scene. This happens when the natural secretions of skin are deposited on a surface through thumb contact at the crime scene. High degree of visual contrast between the ridge patterns and the surface on which the thumbprint was left by the use of chemical reagent and powder to visualize the image especially when the impression is left on the surface of glass, tabletop and then compared with the already stored samples. The essence of universal acceptability of thumbprint for identification over other biometrics has been contained in the works of [Michael & Imwinkelried, 5; Palmiotto, 6; Salter, 7]. The reasons for such personal authentication using thumbprint include: (a) the rapid growth of network and internet business (b) the efficient hardware computing power (c) the cost effective capture thumbprint (d) the level of awareness of reliability security components. Over the years especially between 2007 till date, the election of Presidential, Governorship, ational Assembly (Senates and Representatives) and State Assembly, thumb printing played vital role in rejecting multiple voting, void vote, upholding elections and rejections of election of winners by Tribunal and Courts [Smyth & Best, 8]. Furthermore, thumbprint helps to detect forgery or erasing of evidences in crime scene [Hilderbrandt & Dittmann, 9] Features of Thumbprints In excellent explanations contained in Eckert [2], Salter [7], Wayman et al., [10] and Vinodiny et al., [11] noted that the ridges of thumb form pattern of loop, whorl and arch. The focal prints that are used for classification are achieved from these three pattern types. There are two focal points, the core/centre and the delta in the loop pattern. The area of the pattern where there is a dividing of the ridges is called the delta. During thumbprints recording process, the delta, the area as well as the core must be recorded completely. The loop could be further classified into central pocket, ulnar and radial loop. More deltas can be form from the whorl pattern. The whorl pattern may be further classified into double loop, accidental whorl and plain whorl. o delta or core in the arch pattern. Such arch is further classified into tented and of the above mentioned patterns scientifically is not good or suited for any forensic analysis Fingerprint Identification Fingerprint identification involves the process of comparing of two instances of friction ridges skin minutiae (impressions) from human fingers/toes and even the palm of the hand/sole of the feet, in order to determine if such impressions could have come from the same persons. This process involves searching through the entire database of the stored human features to identify his/her features [Patni & Sharma, 12]. They develop fingerprinting system to detect attendance fraud in sporting events. Also, expert use these features for individual identification by deploying computer expert system operating under threshold scoring rules as benchmark. Figure 1: Friction Ridges on a Finger Figure 2: Image of Fingerprint Created by the Friction Ridge Structure Live scan technique are used to record the friction ridges digitally. White cards is used international to record the friction ridges made with black printer s ink rolled across a contrasting white eye, but with un-aided eye the patent print can be viewed. Often the latent prints are fragmentary and chemical or other alternative light source may be required. ISS: X 2017 Published by The Standard International Journals (The SIJ) 77
3 The SIJ Transactions on Industrial, Financial & Business Management (IFBM), Vol. 5, o. 5, August 2017 Perspiration, oil, grease, ink or blood will be transferred to the surface when friction ridges come into contact with such surface. Deposition pressure, pliability of the skin, slippage, the material from which the surface is made, the roughness of the surface and the substance deposited are the factors affecting the quality of friction ridge impressions. All these factors are caused by latent print to appear differently from any friction ridges known recording Types of Fingerprint There are four basic types of fingerprint, namely; (i) exemplar, (ii) latent, (iii) patent and (iv) plastic fingerprint. (i) The exemplar fingerprint could be referred to as known prints. It is obtained with live scan technology which may use ink on paper cards. (ii) Figure 3: Exemplar Prints on Paper using Ink Latent fingerprint is regarded in forensic science as any accidental impression left by friction ridge skin on a surface whether invisible or visible at the time of deposition. Visualization of invisible latent prints residues may be supported with the use of chemical, physical and electronic processing techniques irrespective of whether they are contaminant (oil, blood, ink, paint) or natural sweat on the skin. used classification techniques. In this system, the arch, whorl and the loop as the three fundamental fingerprint patterns which constitute 5%, 30-35% and 60-65% of fingerprints respectively. The whorls may have sub-group classifications that include double loop whorls, accidental whorls, plain whorls, central pocket loop whorls and peacock s eye whorls. Fingerprint may also include tenth arch, the plain arch and the central pocket loop as commonly classified. Although, there are more complex system used by the expert and it is similar to Henry system of classification. Five fractions R(right), L(left), i(index finger), m(middle finger), t(thumb), r(ring finger) and p(picky-little finger). These can be mathematically expressed thus: Ri/Rt + Rr/Rm + Lt/Rp + Lm/Li + Lp. Each print are assign numbers based on or whether they are whorls. The last fraction receives 0, the 4 th receives 2, the 3 rd receives 4, the 2 nd receives 8 and 1 st fraction receives 16. Value of 0 is assigned to arches and loops. The numbers in the numerator and denominator are added up, applying these schemes. (Ri + Rr + Lt + Lm + Lp) / (Rt + Rm + Rp + Li + Lr) and a 1 is added to both bottom and top, 0 division is excluded. For instance, if the ring index finger and the left finger have whorls the result is 0/0 + 8/0 + 0/2 + 0/0 + 1/1, and 0/0 + 0/0 + 0/0 + 0/0 + 2/0 +0/0, 1/1, by computation ( ) / ( ) = 9/3 = 3. With the use of this system, print could be drastically reduces when compared to. Arch Loop Whorl Figure 4: Visible Latent Print on Domestic Knife (iii) Patent fingerprint are chance friction ridge impressions that is visible in human eye. They are not lifted but photographed. For instance, impressions from flour and wet clay (iv) Plastic fingerprint occur when friction ridge impression is left in a material which retains the exact shape of the ridge detail. This can be seen in the case of melted candle wax and thick grease deposits on car parts Fingerprint Classification Today, almost every transactions and process have gone digital, computerization and automation system is now the edge of every operation and this is applicable in fingerprint filling system, but before that manual filling system need to categorically classifies the fingerprints based on the ridge formation. Presently, about 10 print classification systems which include Juan Vucetich system, Henry classification system and Roscher system [Karu & Jain, 13]. Based on this research paper Henry classification system is the most widely Figure 5: Fingerprint Classification 2.3. Importance of Fingerprint The following are some identify benefited areas of noncriminal and criminal uses of fingerprint. (I) Alternative means of identification for transaction in the banks. In this case, finger thumbprint may serves as infallible method of personal identification as a non-criminal uses. (ii) Detection and apprehension of criminals are one of its uses which can be made possible once the corresponding record is filled in the Criminal Investigation Departments (CID). (iii) The police investigation units operates two files records (a) noncriminal normally civilians and (b) criminal records. oncriminal records are gotten from volunteer citizen who seek for personal protection. Also, contains the databank of all fingerprint of military and para-military including the employees and aliens. This can prevent fraud in future transactions and operations. The criminal records files contain all the databank fingerprint of the victims or suspects. (iv) Government Agency and other organizations: traveling documents like passports, visa etc. It is a known fact that passports and signature can be forged / altered. Only the fingerprint remains unchangeable. Examination bodies such West African Examination Council (WAEC), Joint Matriculation Board, ational Examination Council (ECO), ISS: X 2017 Published by The Standard International Journals (The SIJ) 78
4 The SIJ Transactions on Industrial, Financial & Business Management (IFBM), Vol. 5, o. 5, August 2017 International Examination Certification etc. uses fingerprint to fish out impersonators. Companies such insurance, merchant houses and institutions, sacked employees cannot obtain re-employment in the same company or its branch. Fraud during payment of bursary and other beneficiaries such as a case of ational Emergency Management Agency (EMA), Flood disaster, fire destruction, compensation of land properties etc. can be reduce with a fingerprint comparison, simply because fingerprint has the feature of detecting existing payment. Civil servant uses it for checkmating ghost workers and death of active workers (v) Maternity homes and hospitals make use of fingerprint, footprint, palm print systems to guard against baby substitutions and mix-ups. This occurs in a case of twins or triplets etc. which sometimes throw the doctors and nurses off balance. Fingerprint produce unique features and characteristics in every individual [Jain et al., 14] that are deployed for identifications Brain Fingerprinting Application The basic applications of Brain Fingerprinting are detecting the record of a specific crime, incident stored in the brain and terrorist act [Farwell & Smith, 15] and [Dalbey, 16] and detecting a specific type of knowledge, training expertise like Al-Quaeda, trained terrorists/bomb makers and specific knowledge to FBI agents [Farwell, 17]. Farewell s brain fingerprinting are widely applied in crime scene investigation due to its effectiveness [Farwell & Makeig, 18]. The IOWA District court dismissed the defendant s petition for a new trial due to the established clear P300 test provided by Dr. Farewell s brain fingerprinting. III. TECHIQUES FOR FIGERPRIT AALSIS Police Agencies and other Criminal Investigations Agency worldwide have used fingerprint to identify criminals. Though, the close rival is Deoxyribonucleic acid (DA) whose evidence can be hard to undertake and its analysis is complex as well as expensive, therefore fingerprint analysis remains the essential tools. There are two (2) techniques used in Fingerprint Analysis (a) Analysis, Comparison, Evaluation and Verification (ACE-V) and (b) Scanning Kelvin Probe (SKP) [Zabell, 19; Black, 20; Dafyadd et al., 21] Analysis, Comparison, Evaluation and Verification (ACE-V) This technique is used by forensic scientists when analyzing the features such as shape, pattern and length of finger s ridges under examination. Fingerprint database are used to find match as a comparison. Probability and inconsistencies are evaluated for potential matches. The second examiner may be engage in the same result in order to validate the analysis. ACE-V need more examiners to arrive at identical results and may not be expected to arrive at the same result identically. Fingerprints analysis can guarantee 100% accuracy has been comparing to against the high standard Deoxyribonucleic acid analysis Scanning Kelvin Probe (SKP) This kind of technique is use for fingerprints analysis that works towards achieving an accurate result as well as keeps any Deoxyribonucleic acid (DA) evidence intact of which extraction of fingerprints is made. An image of a fingerprint is mapped when measuring the voltage and electrical potential of a conductive surface. As a results of the electrical potential conduct, SKP only works on mental like bullet, for instance, without smudging and preserves any possible DA, fingerprint is extracted perfectly from the surface. SKP is a non-contact form of fingerprint analysis that is starting to restore the reliability and accuracy of fingerprint analysis. otwithstanding, due to the high cost of the device, only few criminal investigation department has access to few devices. Based on this expensive device, SKP and its unavailability, ACE-V fingerprint analysis is adopted in most fingerprint analysis Other Crime Investigation and Detection Technology The new technology are making waves in both police and other high-tech crime investigation department, namely; (i) Website Evidence, (ii) Global Positioning System (GPS) Tracking Darts, (iii) Facial Recognition and Iris Scanning devices, (iv) X-Ray Van, (v) ational Criminal Intelligence Service (CIS). (i) Website Evidence is gotten from the Internet especially the social network sites such as 2go, Facebook, twitter etc. and in electronic commerce have increase applications of Finger Printing. Both police, attorneys and judges is sourcing for information from website evidence. This comes inform of searching for particular sales of confiscated items, stolen goods and properties, and other illegal contraband goods. Website evidence can provide a means on getting information to combat credit card theft, pornographic materials distributions and hate speeches. (ii) GPS Tracking Darts enables police and patrol teams to shoot a small sticky dart containing a micro GPS tracker from the grill of their Batman Style that is their patrol car in the vehicle of suspect. It also helps to monitor the suspects and smugglers vehicle s location from a distance undetected. (iii) Facial Recognition and Iris Scanning devices enable both police and other crime management agencies to take a snapshot of someone s face in the far away as 5 feet in the public. This is done by attaching the device to mobile devices, Automated Teller Machine (ATM) etc. which scan the image of a person and compares the results to both noncommon and criminal databases. (iv) X-Ray Vans allows the police and high-tech crime agency to peek inside vehicles, houses and other buildings as well as other jurisdictions. It is comparable to those of TSA airport scan bodies. Productive efforts have been made to reveal illegal migrants being transported in trucks through x- ray vans. (v) ational Criminal Intelligence Service (CIS) was launched in 1992 where majority of criminals in United Kingdom were targeted. Objectively, to process and disseminating information analyzing major criminal activity ISS: X 2017 Published by The Standard International Journals (The SIJ) 79
5 The SIJ Transactions on Industrial, Financial & Business Management (IFBM), Vol. 5, o. 5, August 2017 as well as helping law enforcement agencies both at home and abroad. Offenders such as traffickers, money launderers, football hooligans and organized criminal groups are some of the source of information gathering. CIS is linked to other countries that have anti-drugs networks. IV. HOW PRITS CA BE APPL I CRIME IVESTIGATIOS Once the high-tech officer or police officers book a suspected person such suspect s fingerprint is captured and kept on file or store in the computer storage device. With the aid of modern computer technology, physiological features and characteristics of the suspect can be run through billions of items stored in database within few minutes. Basically, there are three (3) kinds of crime scene prints, namely; (i) True latent prints and (b) plastic prints and visible prints. The true latent prints are invisible print impressions caused as a result of perspiration on the ridges of one s skin coming in contact with a surface. Liquid and crystal such water, amino acids, salt etc. easily allows impressions to be made as contain in perspiration. But plastic prints as discussed in above, the ridge impressions left on a soft [[material like wax, soap, putty etc. Then visible prints are prints obtain by fingers touching a surface after such ridge have been in contact with a colored material like ink, paint, grease and even blood. The photographed prints is lifted to the crime lab where the comparison will be carried out with all other pints of persons identify to have hand or knowledge in the crime scene. This exercise reduces all criminal s prints Lay Down Step of Crime Scene Investigation using Finger Printing The first step for forensic evidence to solve a crime is scene investigation. Preliminary items at the crime scene are collected and analyzed in order to determine the extent the crime was committed. This is achieved only through the following steps: securing the scene, managing the scene, surveying the scene, documenting the scene, searching the scene, collecting the evidence and storing the evidence, as well as reconstructing and releasing the scene [22]. (i) Securing of the scene is made effective by providing of a security personnel to guard against non-concerned people entering the scene during the event capturing or evidence taking. This gives rise to (ii) proper managing of the scene where movements are restricted, information is filtered, and technology devices used in the scene are preserved. (iii) Surveying the scene involves the stages whereby both the police officer and other crime investigator employ to handle the case are formulating theories and drawing some conclusion based on what happen or being discovered at the crime scene. This is an important stage since these hypotheses are subject to change depending on the forensic examinations pursuit. (iv) Documenting the scene is also important that might involve phases such as; keeping the photos album, videos, sketches and written notes. Attention is paid in each phase because it serves as a tool or reference maker for forensic examiners as the location has been wipeout. It is wise to note that none of the phase ruined each other. (v) Searching the scene, the scene investigator established the order in which the evidence is collected because the evidence collected in the crime scene and what was observed. (vi) Collecting evidence the lead investigator at the crime scene appoint a person to preserve all the collected evidence who ensure that more evidence is lost or affected by external source. All the evidences are carefully marked for proper identification by the crime investigator. (vii) Finally, reconstructing and releasing the scene play a significant role. The forensic scientist test the reliability of the theories of a crime collected and developed at the crime scene. The lead investigator release the evidence both date and time of the release is documented. V. FIGERPRIT AALSIS Fingerprint analysis is very important to the success of the criminal justice system of a nation. The latent prints are the most common type of forensic science evidence and have been used for more than 110 years in criminal investigations. The comparison of latent print to identifiable print (otherwise known as 'exemplar') is a step towards achieving examination of fingerprint evidence. The latent print examiners is expected to reach correct results as well as produce records of the examination and, in some cases, present their results and the reasoning behind them in court during this step-by-step matching process. The subject of increased scrutiny in the recent years, the accuracy of latent print identification is explained by AS [22]. In this discussion, the researchers take look at various issues ranging from the acquisition of impressions of friction ridge skin to the testimony of courtroom and from laboratory design and equipment to emerging methods for associating latent prints with exemplars and contribution of manual (human factors) fingerprint analysis such as communication of results through witness testimony and report Analysis, Comparison, Evaluation and Verification Flowchart Figure 7 below provide comprehensive evaluation and comparison of finger printing techniques and the technologies involve. The process is provided as flowcharts that explain the latent print examination used by most security organizations for forensic crime scene analysis. These steps include pre-analysis activity, Analysis, comparison of methods, evaluation and verification to ensure adequate performance. Pre-analysis activities involve the gathering of evidences from crime scenes, documentation and careful transmission of evidences to avoid damages which is then analyzed by experts. The analysis stages extract distinct features for identification of the entities. The identified features are compared with the ones stored in the finger print databases and then evaluated for accuracy and performances. Furthermore, the results are transmitted to the security agencies for communication to the appropriate authorities involve. These processes are shown below ISS: X 2017 Published by The Standard International Journals (The SIJ) 80
6 The SIJ Transactions on Industrial, Financial & Business Management (IFBM), Vol. 5, o. 5, August 2017 Start The Latent Print Examination Process Chart 10 Identify item useful to the case bearing latent prints 20 Physical item is documented and collected in the field for further analysis 30 The item is transmitted to the laboratory and chain of custody is documented PRE AALSIS ACTIVIT 40 Latent print is developed/captured (applies to field or laboratory) 50 Is latent processing adequate? 60 Is the latent suitable for analysis? 80 Latent print is retained as case evidence for further analysis 70 The latent print is deemed unsuitable and hence OT preserved, collected or retained as case evidence for further analysis 100 Latent print enters the examination process 200 Latent print provided to examiner for analysis 210 distinctive details of the latent print 220 relevant distortion in latent print 230 Analysis sufficient? 240 Suitable for comparison? 250 Determine likely up & down and location (area of the skin) of the latent print 260 Known prints available? 300 Known prints obtained by law enforcement agency & sent to laboratory AALSIS 270 Latent suitable for AFIS? 280 Latent is formatted encoded & AFIS search performed 310 Known prints or candidates provided to the examiner for analysis 290 Determine and memorize a distinct target group of latent print detail to search 350 Known prints suitable for comparison? 320 distinctive details of the known print 360 Common area in latent and known prints? 330 relevant distortion of the known print 340 Known print analysis adequate? 370 quality and quantity?(suitable to compare?) 400 The latent is not compared but is retained as case evidence according to policy 410 Known Prints obtained? 500 disagreement of Level 1 detail? 510 Target group exists within tolerance? 520 Would new target be beneficial? COMPARISO 530 Continue comparison of additional detail (levels 1,2 & 3) To Dissimilarity present? 550 Similarity present? 600 Within tolerance for an ID? 650 agreement? * The terms individualization and identification are synonymous in this document EVALUATIO 620 disagreement? 680 Reanalysis beneficial? 720 Exclusion To Individualization 780 Inconclusive To Refer to agency policy to determine if verification is required 810 Verification required? 820 Conclusion confirmed? 840 Conflict resolution according to organization policy 900 Results sent to requestor Start V E R I F I C A T I O Figure 7: Finger Printing Techniques and Analysis ISS: X 2017 Published by The Standard International Journals (The SIJ) 81
7 The SIJ Transactions on Industrial, Financial & Business Management (IFBM), Vol. 5, o. 5, August 2017 VI. COCLUSIO This paper provide architectural and technological application of digital finger printing to fight organized crime through analysis of evidences found at the crime scenes. This is necessary to provide guidelines for its adoptions by igeria security organizations to fight cybercrime. We presented lucid explanation of the technology, application and processes involve in digital finger printing and how this process can be utilized by third world countries like igeria to guarantee adequate cyber security to boost economic growths. REFERECES [1] U. Reginald (2008), The Evolution of Finger Prints Investigation and Evidence of a Forensic Expert, Owerri: Alphabet igeria Published. [2] B. Eckert (1996), Introduction to Forensic Science, ew ork: Elsevier. [3] A.A. Adebayo (2013), ouths' Unemployment and Crime in igeria: A exus and Implications for ational Development, International Journal of Sociology and Anthropology, Vol. 5, o. 9, Pp [4] P.K Manning (2001). Technology s Way: Information Technology Crime Analysis and the Rationalizing of Policing, Journal of Crime Justice, Vol. 1, o. 1, Pp [5] C. Michael & E. Imwinkelried (2006), Defence Practice Tips: A Cautionary ote about Fingerprint Analysis and Reliance on Digital Technology, Judicature, Vol. 90, o.2. [6] M. Palmiotto (1994), Criminal Investigation, Chicago: elson Hall. [7] D. Salter (2006), Thumbprint: An Emerging Technology, Engineering Technology, ew Mexico State University. [8] T.. Smyth & M.L. Best (2013), Tweet to Trust: Social Media and Election in West Africa, Proceeding of the Sixth International Conference in Information Communication Technology and Development, Vol. 1, Pp [9] M. Hilderbrandt & J. Dittmann (2016), StirTraceV3.0 and Printed Fingerprint Detection: Simulation of Acquisition Condition Tilting and its Impact to Latent Fingerprint Detection Feature Spaces for Crime Scene Forgerie, Proceeding of IEEE international Workshop on Biometrics and Forensic, Pp [10] J. Wayman, A. Jain, D. Maltoni & D. Maio (2005), Biometrics Systems, London: Springer Verlag. [11] P. Vinodiny, C. azhini, E. Vinya & P. Anandan (2016), EEG based Brain Fingerprinting using MERMER Technology, Middle-East Journal of Scientific Research, Vol. 24, o. 4, Pp [12] G. Patni & S. Shipa (2017), Sports Academy Player Attendance System using Biometric Fingerprints Identification, International Journal of Scientific Research in Computer Science Engineering and Information Technology, Vol. 2, o. 3, Pp [13] K. Karu & A.K Jain (1996), Fingerprint Classification, Pattern Recognition, Vol. 29, o. 3, Pp [14] A. Jain, L. Hong, S. Pankenti & R. Bolle (1997), An Identity Authentication using Fingerprint, Proceeding of IEEE Conference, Vol. 85, o. 9, Pp [15] L.A. Farwell & S.S Smith (2001), Using Brain MERMER Testing to Detect Concealed Knowledge despite Efforts to Conceal, Journal of Forensic Sciences, Vol. 46, o. 1. Pp [16] B. Dalbey (1999), Brain Fingerprinting Testing Traps Serial Killer in Missouri, The Fairfield, IA. ng.ppt [17] L. Farwell (1992), Two ew Twists on the Truth Detector: Brainwave Detection of Occupational Information, Psychophysiology, Vol. 29, o. 4A. S3. [18] L.A. Farwell & T. Makeig (2005), Farwell Brain Fingerprinting in the case of Harrington v. State. Open Court X, Indiana State Bar Assoc., o. 3. Pp [19] S.L Zabell (2005), Fingerprinting Evidence, Journal of Law and Policy, Pp [20] J.P Black (2012), Is there a need for 100% Verification (Review) of Latent Print Examination before Conclusions, Journal of Forensic Identification, Vol. 62, o. 1, Pp [21] H. Dafyadd, G. Williams & S. Bleays (2014), Latent Fingerprint Visualisation using a Scanning Kelving Probe in Conjunctions with Vacuum Metal Deposition, Journal of Forensic Science, Vol. 59, o. 1. Pp [22] ational Academy of Sciences (2009), Finds 'Serious Deficiencies' in ation's Crime Labs, ational Association of Criminal Defense Lawyers. Anayo Chukwu Ikegwu, he is currently a PG student of ational Open University of igeria, pursing M.Sc in Information Technology. He obtained B.Sc in Computer Science from Ebonyi State University, Abakaliki, igeria. His research interests are Knowledge Discovery in Large Databases, Big Data Analytics, and Web Technologies. weke F. Henry is currently working as a Lecturer at Computer Science Department, Ebonyi State University, Abakaliki, Ebonyi State igeria. He received his Master of Science (Computer Science) in 2011 from University of Bedfordshire, Luton United Kingdom and Bachelor of Science (Computer Science) in 2006 from Ebonyi State University, Abakaliki igeria. His research interests are Data mining, Intelligent Tutoring System, cloud computing and security, wireless technologies and emerging technology. Ugwu Gabriel Evo is currently a Lecturer with Ebonyi State University, Abakaliki, Ebonyi State, igeria. He had his first degree in Computer Engineering in Enugu State University of Science and Technology (ESUT) Enugu and Master of Science (M Sc.) Computer Science from Ebonyi State University (EBSU). He has just defended his Ph.D thesis in computer Science from Ebonyi State University (EBSU). His research interests are Computer etworking and Security, Object Identification and Recognition from Images. ISS: X 2017 Published by The Standard International Journals (The SIJ) 82
Fingerprints - Formation - Fingerprints are a reproduction of friction skin ridges that are on the palm side of fingers and thumbs
Fingerprints - Formation - Fingerprints are a reproduction of friction skin ridges that are on the palm side of fingers and thumbs - these skin surfaces have been designed by nature to provide our bodies
More informationHistory of Fingerprints
Fingerprints History of Fingerprints Johann Christoph Andreas Mayer 1788 First scientist to recognize fingerprints were unique William Herschel 1856 Began the collecting of fingerprints Alphonse Bertillon
More informationThe study of fingerprints for identification purposes is known as dactylography or dactyloscopy.
The study of fingerprints for identification purposes is known as dactylography or dactyloscopy. Your fingers, toes, feet, palms, and lips are covered with small ridges that are raised portions of the
More informationFORENSIC SCIENCE Fingerprints
FORENSIC SCIENCE Fingerprints 1 History 3000 years ago: Chinese used fingerprints to sign legal documents 1892 Galton describes loops, whorls, and arches 1897 Sir Edward Henry develops the classification
More informationFingerprint Analysis. Bud & Patti Bertino
Fingerprint Analysis Bud & Patti Bertino Fingerprints Formation Skin produce secretions oil, salts Dirt combines with secretions Secretions stick to unique ridge patterns on skin Did You Know? Fingerprints
More informationObjectives. You will understand: Fingerprints Fingerprints
Fingerprints Objectives You will understand: Why fingerprints are individual evidence. Why there may be no fingerprint evidence at a crime scene. How computers have made personal identification easier.
More informationUnit 2 Review-Fingerprints. 1. Match the definitions of the word on the right with the vocabulary terms on the right.
Name: KEY Unit 2 Review-Fingerprints 1. Match the definitions of the word on the right with the vocabulary terms on the right. 1. Fluoresce O 2. Iodine fuming F 3. Latent fingerprint P 4. Livescan A 5.
More informationName TRAINING LAB - CLASSIFYING FINGERPRINTS
TRAINING LAB - CLASSIFYING FINGERPRINTS Name Background: You have some things that are yours and yours alone - and NO ONE else on earth has anything exactly like it! They are your fingerprints. Everyone
More informationHistory of Fingerprinting
Fingerprints History of Fingerprinting People have always wanted a full proof way to identify someone. The first system was created by Alphonse Bertillon (1883) Used a detailed description plus full length
More informationUnit 5- Fingerprints and Other Prints (palm, lip, shoe, tire)
Unit 5- Fingerprints and Other Prints (palm, lip, shoe, tire) Historical Perspective: Quest for reliable method of personal identification: Tattooing Numbers Branding Cutting off Fingers Holocaust Survivor
More informationFingerprints. Fingerprints. Dusan Po/Shutterstock.com
Fingerprints Dusan Po/Shutterstock.com 1 Objectives You will understand: Why fingerprints are individual evidence. Why there may be no fingerprint evidence at a crime scene. How computers have made personal
More informationFingerprints. Sierra Kiss
Fingerprints Sierra Kiss Introduction Fingerprints are one of the most commonly known biometrics that play a major role in law enforcement and the criminal justice system in identification of criminals.
More informationFingerprint Principles
What pattern are you? T. Tomm 2006 http://sciencespot.net 8 th Grade Forensic Science Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint
More informationDRAFT FOR COMMENT. (Washed Out Portions Not Open for Comment)
(Washed Out Portions Not Open for Comment) STANDARD FOR THE DOCUMENTATION OF ANALYSIS, COMPARISON, EVALUATION, AND VERIFICATION (ACE-V) (LATENT) Preamble When friction ridge detail is examined using the
More informationStudy Guide Chapters 3 & 4 Forensic Science Name
Chapter 3 Body of the Crime 1. Corpus Delicti means. Money 2. Top 3 reasons for committing a crime. Revenge Emotion-love,hate, anger. Body 3. 3 sources of evidence: Primary or secondary crime scene Suspects
More informationHistorical Development. Historical Development. Chapter 6 Fingerprints By the end of this chapter you will be able to: Ch 6 Fingerprinting Notes
Read the introduction on page 134 of your text and the scenario below. Answer the questions in pairs. It is your first year at college and there is a break in at the dorm. Fingerprints have been left at
More informationArches are the simplest type of fingerprints that are formed by ridges that enter on one of the print and exit on the. No are present.
Name: 1. Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: 1. A fingerprint is an characteristic; no two people have been found with the same fingerprint
More informationThank you for your purchase!
TM Thank you for your purchase! Please be sure to save a copy of this document to your local computer. This activity is copyrighted by the AIMS Education Foundation. All rights reserved. No part of this
More informationKatherine Leger (order # ) 1
Anyone for a Bit of Dactyloscopy? It sounds prehistoric, and actually it is. It s been around as long as mankind. Or, at least what leads up to dactyloscopy. Put your finger on the tip of your nose. Now
More informationJAW BREAKERS AND HEART THUMPERS AIMS EDUCATION FOUNDATION
Topic Fingerprints Key Question How do our fingerprints compare? Focus Comparisons are made of the fingerprints on all five digits to determine likenesses and differences. Guiding Documents Project 2061
More informationCRM 341 Key Concepts Module 5
Key Concepts of Chapter 8: CRM 341 Key Concepts Module 5 General Types of Patterns 3 general types of patterns Arches Loops Whorls Primary groups are sub-divided into 8 smaller groups Fingerprint patterns
More informationT. Trimpe
T. Trimpe 2006 http://sciencespot.net Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual characteristic; no two people
More informationDNA Station. 3. Extract DNA from your own cheek. (see Wind your way around your own DNA)
DNA Station 1. Identify yourself! DNA (deoxyribonucleic acid) is the genetic material that identifies all of us as unique unless you're an identical twin. Even between identical twins, fingerprints are
More informationIntroduction and Use of this Text List of Contributors About the Companion Website. PART I Crime Scene Principles 1
Introduction and Use of this Text List of Contributors About the Companion Website PART I Crime Scene Principles 1 1 The Crime Scene Context 3 Raul Sutton 1.1 Introduction 3 1.2 What is a crime? 4 1.3
More informationFingerprints (Unit 4)
21 Fingerprints (Unit 4) Fingerprints have long been a mainstay in the area of forensic science. Since the nineteenth century, authorities have used fingerprints to prove a person handled an object or
More informationOHIO STATE UNIVERSITY EXTENSION
Cloverbud Investigators: Career Detectives November Background: When we think of crime scene investigation, we may think of famous fictional characters like Sherlock Holmes, the Hardy Boys, Nancy Drew
More informationT. Trimpe 2006
T. Trimpe 2006 http://sciencespot.net Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual characteristic; no two people
More informationIntroduction to Biometrics 1
Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living
More informationCrime Scene Management: Scene Specific Methods
Brochure More information from http://www.researchandmarkets.com/reports/992036/ Crime Scene Management: Scene Specific Methods Description: Crime Scene Management: Scene Specific Methods is an accessible
More informationFriction ridge detail of the fingers, palms and feet is among the
Chapter 11 Latent Prints Friction ridge detail of the fingers, palms and feet is among the most definitive scientific evidence used for personal identification. The real benefit of this scientific identification
More informationTouchless Fingerprint Recognization System
e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph
More informationAt the Crime Scene. FORENSIC SCIENCE - BURKS Crime Scene
FORENSIC SCIENCE - BURKS Crime Scene At the Crime Scene Forensic science begins at the crime scene, which can provide useful information that must be carefully, systematically, scientifically, and legally
More informationUNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT
UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT Abstract This report brings together the final papers presented by the students in the Frontiers in Information
More informationOn The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems
On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems J.K. Schneider, C. E. Richardson, F.W. Kiefer, and Venu Govindaraju Ultra-Scan Corporation, 4240 Ridge
More information) Forensic Footwear and Tire Impression Evidence. t the form of a three-dimensional shoe impression
101 An Introduction to Forensic Science j3 surfaces, 3uch as sand, soil, or snow, iney may cause a permanent deformation of that surface an object that made them An examiner will examine these characteristics
More informationThe Integument Laboratory
Name Period Ms. Pfeil A# Activity: 1 Visualizing Changes in Skin Color Due to Continuous External Pressure Go to the supply area and obtain a small glass plate. Press the heel of your hand firmly against
More informationBiometric Recognition: How Do I Know Who You Are?
Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu
More informationWhose Fingerprints Were Left Behind
Edvo-Kit #S-91 Whose Fingerprints Were Left Behind Experiment Objective: The objective of this experiment is to familiarize students with the use of various fingerprinting dusting powders and to match
More informationI. Introduction. Fingerprint Pattern Types 1. Loop, Whorl, Arch. III. Fingerprint Impression Types 1. Rolled, Plain
Section I. Introduction The purpose of this program is to provide information regarding the nature of fingerprints and outline techniques for taking legible fingerprints. Fingerprints can be recorded on
More informationFingerprinting. Forensic Science
Fingerprinting Forensic Science Even with the recent advancements made in the field of DNA analysis, the science of fingerprinting, dactylography,, is still commonly used as a form of identification, whether
More informationBIOMETRICS BY- VARTIKA PAUL 4IT55
BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics
More informationE-book Code: By Fiona Rayns. For ages 10+
E-book Code: REAU4018 Forensic Science By Fiona Rayns For ages 10+ Written by Fiona Rayns. Illustrated by Murray Smoker. Typesetting and design by Shay Howard. - 2005. Published by (2005) P.O. Box 276
More informationJY Division I nformation
Feature Article JY Division I nformation Forensic Products and Technologies of the Forensic Division Nicolas Vezard The Forensic Division has been focused on Identification Instruments since its beginnings
More informationPAPER No. 7: CRIMINALISTICS AND FORENSIC PHYSICS MODULE No. 11; TRACE EVIDENCE
SUBJECT FORENSIC SCIENCE Paper No and Title Module No. and Title Paper 7 : Criminalistics and Forensic Physics Module No. 11; Trace evidence Module Tag FSC_P7_M11 TABLE OF CONTENTS 1. Learning Outcomes
More informationHandling Digital Photographs for Use in Criminal Trials V2, March 2008
Handling Digital Photographs for Use in Criminal Trials V2, March 2008 This is a DRAFT guide that may, once fully developed, be used by law enforcement to help ensure that digital photographs are admissible
More informationCASE STUDY. Montgomery County Sheriff s Office. ADAMS Software Chosen for Managing Photos, Physical Evidence
Montgomery County Sheriff s Office gains efficiency, cost savings with ADAMS Software for managing physical evidence, digital and latent assets CASE STUDY Montgomery County Sheriff s Office Crime laboratories
More informationMCPI Annual Conference Tuesday, September 19, 2017
Michigan Council of Professional Investigators MCPI Annual Conference Tuesday, September 19, 2017 Location: Cleary University, 3750 Cleary Drive, Howell, MI 48843 Time 8:45am 9:00am 9:00am 9:45am 9:45am
More informationARIZONA PEACE OFFICER STANDARDS AND TRAINING BOARD HOUR BASIC CURRICULUM MODEL LESSON PLAN LESSON TITLE: FINGERPRINTING 5.
ARIZONA PEACE OFFICER STANDARDS AND TRAINING BOARD 585 - HOUR BASIC CURRICULUM MODEL LESSON PLAN LESSON TITLE: FINGERPRINTING 5.5 NOVEMBER 2009 SUBJECT: AZ POST DESIGNATION: Fingerprinting 5.5 HOURS: 4
More informationTP Basic Fingerprint Training Manual Section 6 - Classification - Reference Rules. NCIC Classification
NCIC Classification Pattern Code Plain Arch..AA Tented Arch. TT Ulnar Loop. Two numeric characters indicating exact ridge count. If there is a ridge count less than 10, precede with a zero. Radial Loop..Two
More informationAcademic Vocabulary Test 1:
Academic Vocabulary Test 1: How Well Do You Know the 1st Half of the AWL? Take this academic vocabulary test to see how well you have learned the vocabulary from the Academic Word List that has been practiced
More informationDetection and Identification of a Latent Palmprint on a Cartridge
Case Report Detection and Identification of a Latent Palmprint on a Cartridge Michelle E. Waldron Adrianne Walls Sarasota County Sheriff s Office Sarasota, FL Abstract: In crime scene work, fragments of
More informationLONDONDERRY POLICE DEPARTMENT POLICIES AND PROCEDURES
POLICY NO: S-301-A LONDONDERRY POLICE DEPARTMENT POLICIES AND PROCEDURES DATE OF ISSUE: December 1, 1997 EFFECTIVE DATE: December 1, 1997 REVISED DATE: January 10, 2016 SUBJECT: COLLECTION AND PRESERVATIONOF
More informationCrime Scene Investigation
Crime Scene Investigation The 7 S s of Crime Scenes 1. Secure the scene 2. Separate witnesses 3. Scan the scene 4. See the scene 5. Sketch the scene 6. Search for evidence 7. Scene evidence collection
More informationBiometrics and Fingerprint Authentication Technical White Paper
Biometrics and Fingerprint Authentication Technical White Paper Fidelica Microsystems, Inc. 423 Dixon Landing Road Milpitas, CA 95035 1 INTRODUCTION Biometrics, the science of applying unique physical
More informationUnit 2: THE CRIME SCENE
Unit 2: THE CRIME SCENE Oh, how simple it would all have been had I been here before they came like a herd of buffalo and wallowed all over it. A. Conan Doyle, in The Boscombe Valley Mystery, 1892 CORPUS
More informationQuestioned Documents
Questioned Documents Questioned Documents Any document about which some issue has been raised or that is the subject of an investigation Document Examiners Mostly examine handwriting to originate its source
More informationNotes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.
Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit
More informationINTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)
INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) www.irjaet.com ISSN (PRINT) : 2454-4744 ISSN (ONLINE): 2454-4752 Vol. 1, Issue 4, pp.240-245, November, 2015 IRIS RECOGNITION
More informationNorth Carolina Fire and Rescue Commission. Certified Fire Investigator Board. Course Equivalency Evaluation Document
North Carolina Fire and Rescue Commission Certified Fire Investigator Board Course Equivalency Evaluation Document NOTICE This material is to be used to correlate equivalency of outside programs to the
More informationA Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics
A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase Term Paper Sample Topics Your topic does not have to come from this list. These are suggestions.
More informationUser Awareness of Biometrics
Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org
More informationTrade Secret Protection of Inventions
Trade Secret Protection of Inventions Phil Marcoux & Kevin Roe Inventions - Trade Secret or Patent? Theft by employees, executives, partners Theft by contract Note - this class does not create an attorney-client
More informationInteroperable systems that are trusted and secure
Government managers have critical needs for models and tools to shape, manage, and evaluate 21st century services. These needs present research opportunties for both information and social scientists,
More informationNon-Contact Vein Recognition Biometrics
Non-Contact Vein Recognition Biometrics www.nearinfraredimaging.com 508-384-3800 info@nearinfraredimaging.com NII s technology is multiple modality non-contact vein-recognition biometrics, the visualization
More informationCORRECT ORDER FOR JOB PAPERS
CORRECT ORDER FOR JOB PAPERS 1. EVALUATION PAGE 2. BUDGET PAGE 3. YOUR NEAT, PROFESSIONAL LETTER 4. YOUR NEAT, LABELED, AND TITLED TABLES 5. YOUR NEAT, LABELED, AND TITLED GRAPHS 13 ABC Technologies Ms.
More informationAURORA POLICE DEPARTMENT DIRECTIVES MANUAL
15.15 Title: DIGITAL EVIDENCE AURORA POLICE DEPARTMENT DIRECTIVES MANUAL Approved By: Nick Metz, Chief of Police Effective: 11/09/2006 Revised: 02/24/2017 Associated Policy: DM 08.09 References: DM 16.03,
More informationTechnical Procedure for Liquid Adhesive Lifters
Technical Procedure for Liquid Adhesive Lifters 1.0 Purpose - This procedure describes how to apply Liquid Adhesive Print Lifters to items of evidence. 2.0 Scope - This procedure applies to rough, grainy
More informationAuthenticated Document Management System
Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College
More informationDigital Forensics Lecture 11. Evidence, Reporting, and Action
Digital Forensics Lecture 11 Evidence, Reporting, and Action This Week s Presentations Certifications Risk Analysis Normal (non-it) Parents Keeping Their Children Safe and Happy Encase Sleuth Kit Next
More information2. The most common tool for collecting evidence is/are: a. tweezers. b. computers. c. Q-Tips. d. tape. Day 1
Day 1 1. Which of the items below is NOT evidence? a. A scrap of clothing b. Mud from a footprint c. A fingerprint d. The investigator s birthplace 2. The term Forensic has to do with a(n): a. shoelace.
More informationUNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by PAKISTAN DISCLAIMER: The views presented
More informationISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique
TECHNICAL REPORT ISO/IEC TR 24741 First edition 2007-09-15 Information technology Biometrics tutorial Technologies de l'information Tutoriel biométrique Reference number ISO/IEC 2007 Contents Page Foreword...
More informationResearch and Innovation. Roadmap
Research and Innovation Roadmap 2017-2020 About NIFS The National Institute of Forensic Science (NIFS) is a directorate within the Australia New Zealand Policing Advisory Agency (ANZPAA). Our strategic
More informationIRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology
IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area
More informationQuestioned Documents. Forensic Science
Questioned Documents Forensic Science Type Script Comparison and Altered Documents Typescript Comparisons Typescript is the result of machine-created documents, such as computer printers, photocopiers,
More informationThis version has been archived. Find the current version at on the Current Documents page. Scientific Working Groups on.
Scientific Working Groups on Digital Evidence and Imaging Technology SWGDE/SWGIT Guidelines & Recommendations for Training in Digital & Multimedia Evidence Disclaimer: As a condition to the use of this
More informationTechnologies that will make a difference for Canadian Law Enforcement
The Future Of Public Safety In Smart Cities Technologies that will make a difference for Canadian Law Enforcement The car is several meters away, with only the passenger s side visible to the naked eye,
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,
More informationDigital Forensics. What is it, and how can I get involved? Phil Cobley Training Development Lead for MSAB
Digital Forensics What is it, and how can I get involved? Phil Cobley Training Development Lead for MSAB What we shall look to cover Who am I? What is Digital Forensics? Some basic (but core) Digital Forensic
More informationIndividuality of Fingerprints
Individuality of Fingerprints Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York srihari@cedar.buffalo.edu IAI Conference, San Diego, CA
More informationFabric Impressions Results and Testimony. Glenn Schubert Illinois State Police So IL Forensic Science Centre Carbondale, Illinois
Fabric Impressions Results and Testimony Glenn Schubert Illinois State Police So IL Forensic Science Centre Carbondale, Illinois What is a Fabric Impression? Definition - Transference of a fabric s construction
More informationMr. Futrell is a supervisory fingerprint specialist in the Latent Fingerprint Section of the FBI Laboratory in Washington, D.C.
By Ivan Ross Futrell Mr. Futrell is a supervisory fingerprint specialist in the Latent Fingerprint Section of the FBI Laboratory in Washington, D.C. This Article Originally Appeared in the FBI Law Enforcement
More informationModel Pro Bono Policy for Large Firms
Model Pro Bono Policy for Large Firms An extraordinary need exists in this country for the provision of legal services for those unable to pay for them. Law firms possess the talent and resources to take
More informationMINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC.
MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC. Minutiae Manipulation for Biometric Attacks 1 INTRODUCTION
More informationDEVON & CORNWALL C O N S T A B U L A R Y
DEVON & CORNWALL C O N S T A B U L A R Y Force Policy & Procedure Guideline EVIDENTIAL DIGITAL IMAGING Reference Number D296 Policy Version Date 17 November 2010 Review Date 01 April 2015 Policy Ownership
More informationThe Role of Biometrics in Virtual Communities. and Digital Governments
The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024
More informationOnline Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design
Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design Norulzahrah Mohd Zainudin, Madjid Merabti, David Llewellyn-Jones School of Computing and
More informationFrom the gun Andy Bob Cathy 3. Who beat the old lady up because she tried to hold on to her purse?: 4. Prove that the other 2 do not match.
Do you see the island, the bifurcation, the ending ridge in this fingerprint? Name: These are actual crime-scene fingerprints and some scenarios. Solve the crime! 1. Which person held up the couple at
More informationFootwear & Tire Track Evidence
Footwear & Tire Track Evidence Impression Evidence Overview Impression evidence is the most common type of evidence recovered from scenes of crime. This type of evidence encompasses: Fingerprints Bite
More informationCivil Registry System National Population Register
Civil Registry System National Population Civil Registration System National Population /Civil Registration of births and deaths is developed for the Ministry of State for Immigration and Registration
More information3 I, Kent Gibson, state the following, of which I have personal knowledge:
1 Regarding an antique Tintype Photograph Thought to contain the image of JESSE JAMES. FORENSIC DECLARATION of Photographic Authenticity Via Face Recognition 2 Analysis requested by: Justin Whiting DECLARATION
More informationBiometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics
CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used
More informationMSc(CompSc) List of courses offered in
Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The
More informationNational Civil and Voter Registration, Pg. 11
National Civil and Voter Registration, 2017 Pg. 11 What is Voter Registration? Voter registration is the process of verifying the identity of potential voters and entering their names and other substantiating
More informationInnovation and Technology Law Curriculum
Innovation and Technology Law Curriculum Core Courses FOUNDATIONS OF PRIVACY LAW (FALL 2016) This course explores the principles of privacy law in relation to the affairs of government, non-government
More informationOn-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor
On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor Mohamed. K. Shahin *, Ahmed. M. Badawi **, and Mohamed. S. Kamel ** *B.Sc. Design Engineer at International
More informationHey guys copy what is outlined in yellow in your notebooks. Slides 2-15
Hey guys copy what is outlined in yellow in your notebooks. Slides 2-15 Crime Scene Come in and get your notebooks out. We have notes today! The goal of a crime scene investigation is to recognize, document,
More informationAbstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image.
An Approach To Extract Minutiae Points From Enhanced Fingerprint Image Annu Saini Apaji Institute of Mathematics & Applied Computer Technology Department of computer Science and Electronics, Banasthali
More informationTHE NEED FOR DIGITAL FORENSIC INVESTIGATIVE FRAMEWORK
THE NEED FOR DIGITAL FORENSIC INVESTIGATIVE FRAMEWORK I. Ademu 1, C. Imafidon 2 1 Postgraduate Student, School of Architecture, Computing and Engineering, University of East London, London, United Kingdom,
More informationFIRE INVESTIGATOR SCENE EXAMINATION
10 FIRE INVESTIGATOR SCENE EXAMINATION 1. Secure a fire ground/scene so that unauthorized persons can recognize the perimeters of the investigative scene and are kept from restricted areas and evidence
More information