Objectives. You will understand: Fingerprints Fingerprints

Similar documents
Fingerprints. Fingerprints. Dusan Po/Shutterstock.com

FORENSIC SCIENCE Fingerprints

Study Guide Chapters 3 & 4 Forensic Science Name

Unit 5- Fingerprints and Other Prints (palm, lip, shoe, tire)

Unit 2 Review-Fingerprints. 1. Match the definitions of the word on the right with the vocabulary terms on the right.

The study of fingerprints for identification purposes is known as dactylography or dactyloscopy.

History of Fingerprints

Fingerprints - Formation - Fingerprints are a reproduction of friction skin ridges that are on the palm side of fingers and thumbs

History of Fingerprinting

Fingerprints. Sierra Kiss

Fingerprint Principles

Fingerprint Analysis. Bud & Patti Bertino

Fingerprints (Unit 4)

Name TRAINING LAB - CLASSIFYING FINGERPRINTS

Historical Development. Historical Development. Chapter 6 Fingerprints By the end of this chapter you will be able to: Ch 6 Fingerprinting Notes

Arches are the simplest type of fingerprints that are formed by ridges that enter on one of the print and exit on the. No are present.

T. Trimpe

Fingerprinting. Forensic Science

T. Trimpe 2006

JAW BREAKERS AND HEART THUMPERS AIMS EDUCATION FOUNDATION

Whose Fingerprints Were Left Behind

Katherine Leger (order # ) 1

Thank you for your purchase!

E-book Code: By Fiona Rayns. For ages 10+

CRM 341 Key Concepts Module 5

ARIZONA PEACE OFFICER STANDARDS AND TRAINING BOARD HOUR BASIC CURRICULUM MODEL LESSON PLAN LESSON TITLE: FINGERPRINTING 5.

Mr. Futrell is a supervisory fingerprint specialist in the Latent Fingerprint Section of the FBI Laboratory in Washington, D.C.

Forensic Science Edition I Student Work Book 2017 Sherlock Holmes Style Edwin P. Davis, M.Ed.

CORRECT ORDER FOR JOB PAPERS

Fingerprints CHAPTER UNALTERED IDENTITY CHAPTER

SYLLABUS FOR ALL INDIA BOARD EXAMINATION FOR FINGERPRINT EXPERTS. Index

2. The most common tool for collecting evidence is/are: a. tweezers. b. computers. c. Q-Tips. d. tape. Day 1

JY Division I nformation

From the gun Andy Bob Cathy 3. Who beat the old lady up because she tried to hold on to her purse?: 4. Prove that the other 2 do not match.

2017 Science Olympiad

The Visualization of latent fingerprints on fruits and vegetables

OHIO STATE UNIVERSITY EXTENSION

Fingerprints. Chapter. Objectives. After reading this chapter, you will understand:

Friction ridge detail of the fingers, palms and feet is among the

BIOMETRICS BY- VARTIKA PAUL 4IT55

Fingerprints in Criminal Investigation

Research on Friction Ridge Pattern Analysis

TP Basic Fingerprint Training Manual Section 6 - Classification - Reference Rules. NCIC Classification

Quantitative Assessment of the Individuality of Friction Ridge Patterns

FORENSICS LAB MANUAL. For written permissions, please contact

DNA Station. 3. Extract DNA from your own cheek. (see Wind your way around your own DNA)

DRAFT FOR COMMENT. (Washed Out Portions Not Open for Comment)

Chapter 15 Cast and Impressions By the end of this chapter you will be able to:

SCIENCE FINGERPRINTS

Technical Procedure for the UltraLite ALS

Shannon Information theory, coding and biometrics. Han Vinck June 2013

Introduction to Biometrics 1

I. Introduction. Fingerprint Pattern Types 1. Loop, Whorl, Arch. III. Fingerprint Impression Types 1. Rolled, Plain

PAPER No. 3; FINGERPRINTS AND OTHER IMPRESSIONS Module No. 19; Silver Nitrate Method

Department of Pathobiology, Faculty of Science, Mahidol University, Bangkok 10400, Thailand

Finger print Recognization. By M R Rahul Raj K Muralidhar A Papi Reddy

Detection and Identification of a Latent Palmprint on a Cartridge

) Forensic Footwear and Tire Impression Evidence. t the form of a three-dimensional shoe impression

Footwear & Tire Track Evidence

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL

The Integument Laboratory

GLS can. Gellifter imaging system. Easy to operate and results in less then a minute. Detect the weakest of traces excellent illumination

Labino Nova Torch 8 LAMPS SMALL LIGHT WEIGHT PERFECT LIGHT BEAM TECHNICAL SPECIFICATION.

The reliability of fingerprint pore area in. personal identification

Biometrics and Fingerprint Authentication Technical White Paper

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems

CRIME FIGHTER S CASE BOOK

Introduction to Latent Fingerprints

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

Information hiding in fingerprint image

TECHNICAL INFORMATION Crystal Violet (Methyl Violet) Catalog Nos. LV502, LV5021

CRIME SCENE SEARCH STUDY GUIDE 2010

Fingerprints: 75 Billion-Class Recognition Problem Anil Jain Michigan State University October 23, 2018

Individuality of Fingerprints

a. Tools are objects used to simplify everyday living by helping us do work. i. Examples include hammers, screwdrivers, knives, crowbars, and saws.

Abstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image.

ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION

Schedule of Accreditation issued by United Kingdom Accreditation Service 2 Pine Trees, Chertsey Lane, Staines-upon-Thames, TW18 3HR, UK

Selection of Authentication Systems for Hungarian Health Care, Based on Physiological Study Part I. The Biometric Systems

Touchless Fingerprint Recognization System

DEVELOPMENT ON MULTICOLOURED SURFACES, A PROBLEM RESOLVED USING FLUORESCENT DYES

Detection of Latent Fingerprints on Fruits and Vegetables

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

(60 MINUTES) PATTERNS EVERYWHERE AT A GLANCE OBJECTIVES KEY VOCABULARY NEXT GENERATION SCIENCE STANDARDS

Introduction and Use of this Text List of Contributors About the Companion Website. PART I Crime Scene Principles 1

Basics of Footwear/Tire Tracks Impressions March 5, 2015

Roll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database

Biometrics in Law Enforcement and Corrections. Presenters: Orlando Martinez & Lt. Pat McCosh

Tools in Forensic Science Student Notes

When You Think You Are Done

SIRCHIE. 1 of 20. Products Vehicles Training

PAPER No. 7: CRIMINALISTICS AND FORENSIC PHYSICS MODULE No. 11; TRACE EVIDENCE

TECHNICAL INFORMATION Hungarian Red Catalog Nos. LV503, LV5031

Latent Print Development TECHNIQUES

TECHNICAL INFORMATION DFO (1,8-Diazafluoren-9-One) Catalog Nos. LV500, LV5001, DFS200P

FINGERPRINTS ON PHOTOGRAPHS

Crime Busters B Test

Exploring Various Techniques to Process and Identify Latent Friction Ridge Details from Fingers on Semi-Porous Surfaces

Digital Fingerprint and Forensic Examination as a Technology for Cybercrime Detection and Prevention in Nigeria

Authenticated Document Management System

Transcription:

Fingerprints

Objectives You will understand: Why fingerprints are individual evidence. Why there may be no fingerprint evidence at a crime scene. How computers have made personal identification easier. 2 2

Objectives, continued You will be able to: Define the three basic properties that allow individual identification by fingerprints. Obtain an inked, readable fingerprint for each finger. Recognize the general ridge patterns (loops, whorls, and arches). Identify friction ridge characteristics and compare two fingerprints with at least ten points of identification. Explain the differences among latent, plastic, and visible fingerprints. Develop latent prints (make them visible) using physical and chemical methods. 3 3

Recording and classifying prints Rolling inked prints Loops, whorls, arches, ridge characteristics Primary identification number Lifting prints Black, white, and fluorescent powder Chemicals ninhydrin, iodine, silver nitrate, cyanoacrylate Other types of prints Palm, lip, teeth, eye, ear, voice, shoeprints, and footprints 4 4

Dactyloscopy The Study of Fingerprints History from 1850 to 1900 William Herschel required Indians to put their fingerprints on contracts, and used fingerprints as a means of identifying prisoners Henry Faulds claimed that fingerprints did not change over time and that they could be classified for identification Alphonse Bertillon proposed body measurements as a means of identification; termed anthropometry Francis Galton developed a primary classification scheme based on loops, arches, and whorls Edward Richard Henry in collaboration with Galton, instituted a numerical classification system Juan Vucetich developed a fingerprint classification system based on Galton s that is used in Spanish-speaking countries 5 5

Fundamental Principles of Fingerprints A fingerprint is an individual characteristic. A fingerprint remains unchanged during an individual s lifetime. Fingerprints have general characteristic ridge patterns that permit them to be systematically classified. 6 6

Ridge Characteristics Minutiae characteristics of ridge patterns Ridge ending Island or short ridge Bridge Eye or enclosure Delta Bifurcation or fork Dot Spur Double bifurcation Trifurcation 7 7

Fingerprint Minutiae 8 8

Arch An arch has friction ridges that enter on one side of the finger and cross to the other side while rising upward in the middle. They do NOT have type lines, deltas, or cores. Types Plain Tented 9 9

Loop A loop must have one or more ridges entering and exiting from the same side. Loops must have one delta. Types Radial opens toward the thumb Ulnar opens toward the pinky (little finger) Which type of loop is this, if it is on the right hand? Left hand? 10 10

Whorl A plain or central pocket whorl has at least one ridge that makes a complete circuit. A double loop is made of two loops. An accidental is a pattern not covered by other categories. Whorls have at least two deltas and a core. Types Plain Central pocket Double loop Accidental 11 11

LOOP WHORL ARCH 12 12

13 13

14 14

Primary Classification The Henry-FBI Classification System Each finger is given a point value. right left 15 15

Primary Classification, continued Assign the number of points for each finger that has a whorl and substitute into the equation: right right left left left index ring thumb middle little + 1 right right right left left thumb middle little index ring + 1 = That number is your primary classification number. 16 16

Comparison There are no legal requirements in the United States on the number of points required for a match. Generally, criminal courts will accept 8 to 12 points of similarity. 17 17

Latent Prints Latent fingerprints are those that are not visible to the naked eye. These prints consist of the natural secretions of human skin and require development for them to become visible. Most secretions come from three glands: Eccrine secretes largely water, with both inorganic (ammonia, chlorides, metal ions, phosphates) and organic (amino acids, lactic acids, urea, sugars) compounds. Most important for fingerprints. Apocrine secretes pheromones and other organic materials. Sebaceous secretes fatty or greasy substances. 18 18

Developing Latent Prints Developing a print requires substances that interact with secretions, causing the print to stand out against its background. It may be necessary to attempt more than one technique, done in a particular order so as not to destroy the print. Powders adhere to both water and fatty deposits. Choose a color to contrast with the background. Iodine fumes react with oils and fats to produce a temporary yellow-brown color. 19 19

Developing Latent Prints, continued Ninhydrin reacts with amino acids to produce a purple color. Silver nitrate reacts with chloride to form silver chloride, a material that turns gray when exposed to light. Cyanoacrylate superglue fumes react with water and other fingerprint constituents to form a hard, whitish deposit. In modern labs and criminal investigations, lasers and alternative light sources are used to view latent fingerprints. These were first used by the FBI in 1978. Since lasers can damage the retina of the eye, special precautions must be taken. 20 20

Iodine Fingerprint 21 21

Ninhydrin Fingerprint 22 22

Cyanoacrylate Fingerprints 23 23

Other Prints Lips several common patterns Voice electronic pulses measured on a spectrograph Foot size of foot and toes; friction ridges on the foot Shoes can be compared and identified by type of shoe, brand, size, year of purchase, and wear pattern 24 24

Other Prints, continued Palm friction ridges can be identified and may be used against suspects 25 25

Other Prints, continued Footprints are taken at birth as a means of identification of infants. 26 26

Other Prints, continued Earprint catches murderer A man has been convicted of suffocating an eldery woman on the basis of earprint evidence. The assailant was caught after police matched the inprint of his ear on the victim s window. Police believe that the thief put his ear to the window to listen for signs of anyone home. 27 27

Other Prints, continued Teeth bite marks are unique and can be used to identify suspects. These imprints were placed in gum and could be matched to crime scene evidence. 28 28

Other Prints, continued The blood vessel patterns in the eye may be unique to individuals. They are used today for various security purposes. 29 29

AFIS The Automated Fingerprint Identification System a computer system for storing and retrieving fingerprints Established in the 1970s, AFIS enables law enforcement officials to: Search large files for a set of prints taken from an individual Compare a single print, usually a latent print developed from a crime scene By the 1990s, most large jurisdictions had their own system in place. The problem: A person s fingerprints may be in one AFIS database but not in others. IAFIS the FBI s Integrated Automated Fingerprint Identification System, which is a national database of all 10-print cards from all over the country 30 30

31 31

Biometrics Use of some type of body metrics for the purpose of identification. (The Bertillon system may actually have been the first biometry system.) Used today in conjunction with AFIS. Examples include retinal or iris patterns, voice recognition, hand geometry. Other functions for biometrics: can be used to control entry or access to computers or other structures; can identify a person for security purposes; can help prevent identity theft or control social services fraud. 32 32