Fingerprint Evidence
Are Fingerprint Identifications Such that Can be Considered Valid Evidence
Fingerprint identification is a means of personal identification that is infallible and this is the reason that fingerprints have replaced other methods of identification of criminals. The science of fingerprint identification is stated to stand out among all other forensic sciences for the following reasons: (1) fingerprint identification has served governments across the globe for more than 100 years in the provision of accurate identification of criminals. In billions of human and automated computer, comparisons there are no two fingerprints found to be alike. Fingerprints are the basis for criminal history in every law enforcement agency worldwide; (2) the first forensic professional organization, the International Association for Identification (IAI) was established in 1915; (3) the first professional certification program for forensic scientists was established in 1977; (3) fingerprint identification is the most commonly used of all forensic evidence worldwide; (4) fingerprint identification continues to expand as the primary method for making positive identification of persons; and (5) Fingerprints harvested from crime scenes lead to more suspects and generate more evidence in court than all other forensic lab techniques combined. (FBI, 2012, p.1) While other visible human characteristics have a tendency to change with age, fingerprints do not change unless the individual's hands are injured or if the individual undergoes surgery. Fingerprints are reported to be processed presently through the Integrated Automated Fingerprint Identification System and are submitted through mail or electronic submissions and a response received in two hours or less for electronic criminal fingerprint submissions and twenty-four hours or less for electronic civil fingerprint submissions. (FBI, 2012, p.2)
II. History of Fingerprint Identification
The first known instance of fingerprint identification was in ancient Babylon as fingerprints were utilized on clay tablets in the conduction of business transactions. Fingerprints or specifically, thumbprints were found on clay seals used in ancient China. (FBI, 2012, p.1) The first use of fingerprints by the English occurred in 1858 when Sir William James Herschel, Chief Magistrate of the Hooghly district in Jungipoor, India, used fingerprints on native contracts. While Herschel did not at first understand how unique each individual's fingerprints were in the beginning, as his collection grew, it is reported that Herschel "began to note that the linked impressions, could, indeed, prove or disprove identity." (FBI, 2012, p.1)
In 1863, Paul-Jean Coulier of Val-de-Grace in Paris published his observations that latent fingerprints can be developed on paper through use of iodine fuming. Fingerprint identification is the "method of identification that uses the impression made by the minute ridge formations or patterns found on the fingertips." (FBI, 2012, p.1) Fingerprints are recorded on a standard fingerprint card or can be recorded digitally and transmitted electronically to the FBI for comparison." (FBI, 2012, p.1) There are reported to be several types of fingerprints including those shown in the following illustration labeled Figure 1 in this study.
Figure 1 - Fingerprint Pattern Type
Source: FBI (2012)
The American fingerprint system is reported to have "evolved through several stages, including nationalization, computerization, and digitization." (Cherry and Imwinkelreid, 2006, p.54) First inked fingerprint cards were used and were not stored in alphabetical order but were sorted into "one of several predefined categories specified by the Henry Fingerprint Classification System: (1) whorl; or (2) tented arch. (Cherry and Imwinkelreid, 2006, p. 54)
The Henry System is reported to have used all ten of the individual's fingers and the "interrelationships in classifying an individual." (Cherry and Imwinkelreid, 2006, p.54) As the years passed, the databases of government agencies grew so large that manual searches were consuming a vast amount of time making this method of searching impractical. In addition, many of the offender's crimes were not limited to a single metropolitan area or state. When computer based Automated Fingerprint Systems...
Even thenm once in a while the heads of the more powerful families would meet to work out differences (Meltzer, 1990, pp. 40-41). Still, striking at the mob could not be effected easily by the use of normal investigative methods alone. Indeed, the failure of the FBI to use even those methods in a concerted manner is noted by Kessler (2002), who reports that Hoover usually claimed that the FBI
However, the Academy of Sciences definition of the term enterprise architecture also extends beyond mere IT architecture, although such architecture will certainly support the Academy's definition. This definition denotes "a detailed characterization of the bureau's goals, tasks, strategies, and key operational processes" (National Academy of Sciences, 2004). These objectives would then be facilitated by IT solutions it implement them. One of the most important lessons learned in this particular case
Regardless of these facts, the media failed to put arguments such as these on the front page of the paper because of the control the Administration had on the media channels at the time. It is rather difficult to say the extent to which the independent or small town media actually covered the stories, with its details and discoveries. The internet search can prove more useful, but for the aim
Introduction The USS Cole Bombing in October 2000 was a prelude to the intense focus on the spread of weapons of mass destruction (WMDs) that the FBI took up in earnest one year later in the wake of and in response to 9/11. With the killing of several crewmen and the wounding of several more, the USS Cole Bombing was in reality just one more terrorist incident in an already growing
Criminal Justice Issues Since there is no official legal definition of sexual homicide, therefore sexual homicide cannot be truly characterized as criminal behavior. Reaction Although there is no specific legal definition for sexual homicide, homicides that are listed as "criminal" include the killing of humans by either murder or manslaughter, so a closer look at what "sexual homicide" really refers to is warranted. In the book Sexual Murder: Catathymic and Compulsive Homicides, Louis
FBI vs. Apple in Relation to the Patriot Act America is divided over the tradeoff between personal privacy and security needs. The focus is, now, on the government surveillance, but there are concerns over how data is being used by businesses. The issue was raised after the federal court was requested to force Apple to assist the FBI to unlock one of the phones used by a suspect in the terrorist
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now