Abstract
This paper discusses the origins of fingerprinting and the usage of fingerprint analysis in the field of forensics. It traces the history of the practice from the 19th century on into the 20th and discusses the methods used to obtain fingerprints from a crime scene. It also examines some of the problems of fingerprint analysis and how it is not a foolproof manner of identification and never has been. It shows why fingerprint analysis should be used as a tool and not as an end-all-be-all means of identification for investigators conducting a criminal investigation. The numerous cases of mistaken identity based upon faulty forensics applied in the case of fingerprint analysis are sufficient to indicate the merit of this claim.
Keywords: fingerprint analysis, forensics fingerprinting, crime scene investigation
Introduction
The unique characteristics and contours of the fingerprint were first noted by 17th century anatomist Marcello Malpighi, who highlighted the spirals and ridges of the fingerprint and after whom the Malpighi layer is named. Some two hundred years later, fingerprinting as a way of identification was practiced by an English administrator in India. It was not long before fingerprinting became a primary way of identifying and databasing information on a person’s unique characteristics. Fingerprint analysis in the field of forensics was a staple of criminal justice by the middle of the 20th century, the FBI being in possession of 100 million fingerprint cards, which could be read by the Automated Fingerprint Identification System, which kept the files on digital drives (Hawthorne, 2008). This paper will provide background information on the history of fingerprint analysis, how the process is conducted today, and major controversies surrounding the practice in the field of forensics.
Historical Background
Fingerprint analysis has been a way of identifying individuals since the 19th century, when a British Administrator in India, Sir William Herschel, required civil contractors to provide both signatures and fingerprints (Herschel, 1916). By 1880, Dr. Henry Faulds had published an article on fingerprinting in the journal Nature (Reid, 2003). Two years later in France, Alphonse Bertillion devised the Bertillion System of classifying identification measurements of persons based on their body measurements, such as height and length—a system that would be used for classification purposes until fingerprinting would prove a better option. In 1891, the system of fingerprinting criminals was put into practice in Argentina, and in 1892, Sir Francis Galton published a book in England on how fingerprints are unique to each and every person (a claim that has never been substantially verified by scholarship). In 1901, Sir Edward Henry, in India, instituted the world’s first systematic classification of fingerprints, which would eventually be adopted by the United Kingdom and dispersed through the rest of the world. In 1903, the need for fingerprinting as a formal classification of identification was seen when at Leavenworth prison, two inmates by the same name and same Bertillion measurements were incarcerated. Fingerprint identification was seen as the best method of distinguishing individuals—and two years later, the U.S. military was using fingerprints of soldiers for that exact purpose. Law enforcement agencies soon followed, and the first fingerprint...
References
Hawthorne, M. (2008). Fingerprints: Analysis and understanding. Boca Raton, FL: CRC Press.
Henry, Edward R., Sir (1900). Classification and Uses of Finger Prints. London: George Rutledge & Sons, Ltd.
Herschel, W. J. (1916). The Origin of Finger-Printing. Oxford University Press.
Innocence Project. (2018). Fingerprint analysis. Retrieved from https://californiainnocenceproject.org/issues-we-face/fingerprint-analysis/
National Academy of Sciences. (2009). Badly fragmented' forensic science system needs overhaul; evidence to support reliability of many techniques is lacking. Retrieved from http://www8.nationalacademies.org/onpinews/newsitem.aspx?RecordID=12589
NFSTC. (2013). Fingerprint analysis. Retrieved from http://www.forensicsciencesimplified.org/prints/how.html
Reid, D. L. (2003). Dr. Henry Faulds – Beith Commemorative Society. Journal of Forensic Identification, 53 (2).
Zabell, S. L. (2005). Fingerprint evidence. Journal of Law and Policy (Brooklyn College Law School), 143–77.
Fingerprint Classifications Practical Applications of Fingerprint Classifications in Forensic Science Fingerprint identification has numerous practical applications. Particular fingerprints may be matched to individuals because they are distinct and unchanging. The individuality of fingerprints is based on the ridge structure and minutiae. The recognition of these landmarks, including shape, number, and location is an automated process by which computer algorithms filter data and match a subset of individuals with a particular print. More
T. Apparantely in good health, need to investigate insurance and other issues, get medical report. Married, one-4-year-old son Appears happily married with young child, no indication of turmoil in marriage; check. Colleagues say victim was "very organized," and kept to himself, did not make friends nor enemies Mr. T. appears to be inoffensive, not prone to situations that would engender violence. Profession: Attorney; normal office hours 8am-5pm; known to work late on cases as necessary Q:
SWOT Analysis iPhones 5C 5S promotion Please give strong clear examples. SWOT Analysis of iPhone 5C vs. 5S and promotions Both the iPhone 5C and the iPhone 5S have been extremely successful products for Apple thus far. However, they have been targeted to different demographics and have different relative strengths (and weaknesses) when compared with one another as well as with competitors. Strengths The iPhone 5S has been called "Apple's heavyweight competitor to the
" Giannelli (2003) stresses that advantages and reliability of scientific and technical evidence depend on whether a scientific culture exists. For reliability of DNA and other scientific evidence, there have to be sufficient written protocols and "an empirical basis for the most basic procedures." (Giannelli, 2003) Barry Scheck, Peter Neufeld, and Jim Dwyer (cited by Giannelli, 2003) conclude that their investigations revealed that a third of the criminal convictions of 62
Biometric Controls Biometric Cost Analysis There are some questions that will help determine the cost benefit analysis of a new biometric system (Cooper). The level of security, the level of reliability, need of backup, the acceptable time for enrollment, level of privacy, and storage needed are things that need to be determined first. Will the system be attended or not? Does the system need to be resistant to spoofing? Will the system
Hair is also in contact with chemicals in shampoos, and any dyes, gels, sprays or other cosmetics that may be placed on the hair (11). Since there is no standardized method for cleaning these external contaminants off of the hair prior to analysis, the potential for inaccurate results from external contamination is widespread. There is no way to tell in the laboratory if a chemical is contained within the hair,
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now