Laterally Reversed Fingerprints Detected in Fake Documents

Size: px
Start display at page:

Download "Laterally Reversed Fingerprints Detected in Fake Documents"

Transcription

1 Case Report Laterally Reversed Fingerprints Detected in Fake Documents Carlos Magno A. Girelli Federal Police Department of Brazil Identification Group in the Espirito Santo State Abstract: Cases involving laterally reversed fingerprints have been previously reported in the literature. In general, they are detected only when the expert already has suspects and is able to analyze the latent prints substrate. This case is about the analysis of hundreds of copies of supposedly fake identity documents in which reversed fingerprints were detected, not from characteristics of the substrate, but because of the attention paid by experienced experts during all stages of their work. Some difficulties associated with the detection of laterally reversed fingerprints are discussed in terms of visual perception, contextual bias, operational procedures, automated fingerprint identification system (AFIS), and accuracy of decision making based on costs and benefits. Possible solutions for avoiding errors when dealing with probable lateral reversals are discussed: (1) applying the ACE-V methodology with blind verification and (2) in specific circumstances, performing comparisons with both direct and reversed prints and storing them in AFIS (if possible) to allow for future comparisons. Introduction Laterally reversed fingerprints are difficult to detect. Some interesting cases involving the development and examination of reversed fingerprints have been reported in the literature [1 4]. Lane et al. [1] carried out some experiments to investigate the possibility of transferring latent fingerprints deposited on a substrate to another through contact between their surfaces. They cited a case where it was speculated that suspects in a narcotics case left latent prints while sealing and stacking plastic Received July 31, 2014; accepted October 14, (1), 2015 \ 1

2 bags with drugs. The contact between the surfaces caused partial transferring of friction ridge matrix, generating a second latent print, which was a reflection of the first one. Saviano [2] also used this example while discussing the importance of examining Level 1 details in latent prints. Using ninhydrin, Kershaw [3] developed a latent print on the page of a book and then discovered that it was a reflection of the original deposited on the previous page. Czarnecki [4] presented two cases: (1) partially overlapping conjoined latent prints, showing opposite patterns of loops, developed with cyanoacrylate on a plastic bag in the region in which it was folded on itself and (2) a latent print developed with ninhydrin on a paper mailing label removed from an envelope, which led to the mistaken use of the reversed image. Later it was discovered that the original print was on the adhesive side of the label, contrary to what had been speculated before. The present case to be reported also refers to reversed fingerprints, but it exhibits some peculiarities that differentiate it from the cases mentioned above. After a description of the case and its results, there is a discussion about some possible factors involved in decision making by fingerprint experts, especially when it comes to detecting laterally reversed fingerprints. The discussion covers aspects of visual perception, contextual bias, operational procedures, use of technology such as AFIS, and accuracy of decision making based on costs and benefits involved in the identification purposes. Case Description One of the many duties of the Federal Police Department of Brazil is the suppression of crimes against federal government property. In a recent investigation of fraud against a federal bank, hundreds of copies of supposed identity documents were presented for fingerprint examination. The criminals opened bank accounts using false documents, took out loans, and disappeared without paying the money back. This crime was committed repeatedly, by different people in different locations, and it caused great damage to the public treasury. In order to open an account, a customer must present some documents to the bank. One of these documents must be a valid photo identification, such as an identity card or driver s license. The identity card shows the individual s right thumbprint, but the driver s license does not. The bank manager checks the documents submitted by the applicant, makes copies of them, 2 / 65 (1), 2015

3 and stores the copies in the bank s files. Unfortunately, the manager has no effective means to verify the authenticity of the documents and the information provided by the supposed account holder. The vulnerability of identification documents of Brazilian citizens is a subject of intense debate in the country. Some proposals to correct this problem have already been made, but they have not been implemented yet. Once fraud is detected, the police will pursue investigations based on the copies of the documents presented by the criminal to the bank. Because they are just copies, it is not possible to conduct forensic examinations on the substrates to verify their authenticity. Usually, the documents are forged and the copies of the photos, even when they are visible, cannot lead to the immediate identification of the suspects, given the lack of databases based on photos and automated face recognition systems. Thus, the only remaining forensic materials available to the investigators are the fingerprints that are in the copies of the identity cards. Each isolated incident was a single crime that would normally be investigated independently. However, because of the similarity in the modus operandi of these crimes and the fact that the victim was the same federal bank, all of them were investigated together. Therefore, all documents (copies) were bundled together and sent to the Identification Group of Federal Police Department in the State of Espirito Santo for fingerprint examination. The hundreds of fingerprints were initially compared to each other, resulting in several matches. They were then subjected to an AFIS search, which resulted in more matches with latent prints from other unsolved criminal cases stored in the system. The AFIS search also led to the identification of some suspects. The long and exhausting work of the experts seemed to have ended with satisfactory results: satisfactory, but incomplete. The examiners concluded, based upon their experience and their attention to details, that the regular use of AFIS was not enough to solve the cases. Based on the analysis of Level 1 details [5] in all fingerprints assessed, the similarity between the ridge flows and shapes of some cores attracted the attention of the experts. As a result, they found out that some fingerprints were lateral reversals of others. Figure 1 shows two laterally reversed fingerprints detected in copies of different documents, and Figure 2 illustrates the results of one examination. 65 (1), 2015 \ 3

4 Figure 1 Laterally reversed fingerprints found in copies of different documents. Figure 2 Comparison of reversed fingerprints present in copies of fake identity documents. 4 / 65 (1), 2015

5 At first, it was not possible to verify whether the substrates were fake because the analyzed samples were copies. Forgeries were deduced from the matching fingerprints present in documents on behalf of distinct persons. The presence of laterally reversed fingerprints in different documents also indicated additional forgeries, because only one of the fingerprints could be present in a genuine document, obtained by the regular touch of the finger on the target (substrate or live scan). The other fingerprint requires an operation of reflection of the first one. When the reflection arises from the partial transferring of friction ridge matrix by the contact between surfaces, the mirrored latent prints usually show damage (e.g., they are smudged, distorted, or overlapped). This was not observed in the present case. The high quality of the analyzed fingerprints, characteristic of exemplars, suggested that the reversals were produced by the possible use of some technological resource such as imaging software. Among the suspects identified by fingerprints, one was arrested. Equipment for document forging, such as color laser printers, special papers, and inks, were seized in his house. He confessed that he manufactured false documents and sold them. His biggest mistake was to use his own fingerprint on some of the documents that he produced. The source of the forged documents was shut down, and the persons who presented those forgeries to the bank are gradually being identified and arrested by the law enforcement authorities. Discussion Before discussing specific aspects of the reported case, it is necessary to present some concepts and results of research about visual perception, contextual bias, operational procedures, use of technology such as AFIS, and accuracy of decision making based on costs and benefits. The expertise of adults in recognizing faces is associated with configural processing, which considers not just the shapes of individual features, but also the relationships among them [6]. This ability arises after years of experience in differentiating among upright faces. In contrast, adults expert skill in recognizing inverted faces is surprisingly poor. The Thatcher effect is a classic example that illustrates how upside-down faces are hard to recognize because of facial expression loss [7]. In general, changes in the orientation of objects can cause confusion. There 65 (1), 2015 \ 5

6 are several studies about the effects of images rotations and reversals on the observer s brain [8 12]. Busey and Vanderkolk [13] performed experiments to detect evidence of configural processing in fingerprint experts. The tests were given to experts and novices, and the results provided evidence for configural processing when experts view fingerprints. The improved identification performance of the experts can be explained in terms of the strategies and visual skills possibly developed during training and practice (perceptual learning), as well as by the following of standard procedures such as the ACE-V methodology [5]. The analysis, comparison, evaluation, and verification (ACE-V) process is a well-known method for latent print examination and has been adopted in many countries and by respected entities such as the Scientific Working Group on Friction Ridge Analysis, Study and Technology (SWGFAST) [5]. The analysis stage leads to the determination of suitability for comparison. The comparison and evaluation stages result in one of three outcomes: individualization, exclusion, or inconclusive. The verification stage requires the independent application of the ACE process... by a subsequent examiner to either support or refute the conclusions of the original examiner [5]. This can be done in a blind mode, in which the verifier does not know the initial examiner s decision. SWGFAST requires verification for individualization decisions, but verification is optional for exclusion or inconclusive decisions. Champod et al. [14] suggest that a systematic blind verification is not necessary during most routine examinations, because over 90% of identifications are generally not problematic and blind verification is time consuming and it unnecessarily drains significant personnel resources. Ulery et al. [15] performed a large-scale study of the accuracy and reliability of latent print examiners decisions, concluding, independent examination of the same comparisons by different participants (analogous to blind verification) was found to detect all false positive errors and the majority of false negative errors in their study. According to these authors, Policymakers will need to consider tradeoffs between the financial and societal costs and benefits of additional verifications. In a typical fingerprint matching process, the expert usually places the two fingerprints with the fingertips facing up and makes eye movements in search of matching features. The ACE-V methodology utilizes a qualitative and quantitative assessment of three levels of details [5]. When the print is of poor quality 6 / 65 (1), 2015

7 or represents only part of the entire fingerprint (something common for latent prints recovered from crime scenes), the presence of focal points, such as deltas and cores, may help the expert to reorient the fingerprint in order to perform the comparison, solving the rotation problem. Computational research has brought to the field efficient algorithms to recognize and orient fingerprints [16]. Usually, AFIS systems work within tolerance ranges for orientation angles, size variations, and small distortions. It is also common that the system makes available optional tools to set a complete 360 rotational search for unoriented latent prints or to reverse the images to work with the laterally reversed latent prints. Obviously, the unavailability of an AFIS system and the absence of focal points make the task harder. The use of AFIS represents a partnership between humans and technology for fingerprint examination in forensic science [17]. The cognitive distribution between them will depend on some factors such as quality of the fingerprints, purposes of the examination, and so forth. Identification of latent prints for criminal purposes requires human intervention in almost all stages and, above all, in decision making. Comparison of tenprints or exemplars for civilian purposes permits a lights-out process, in which the AFIS itself determines whether there is a match, after a predefined threshold is reached. AFIS is a database that is capable of storing fingerprints (and other ridge skin impressions) and uses an algorithm to compare them. In general, the existing minutiae in the fingerprints are assigned and their positions and directions are recorded in the system. Comparisons are made based on this minutiae map associated with each fingerprint. Modern processors enable fast and efficient searches of fingerprints in a database containing millions of records of tenprints and latent prints. At the end of the search, AFIS shows a list of candidates sorted according to a score interpreted by the system as a measure of similarity with the fingerprint being examined. Although the numerical value of the score presented by AFIS is not conclusive about the matching, it provides useful information for estimating relative probabilities [18]. AFIS specifications vary by manufacturer, but in general, there are many tools available in the system to assist the operator to achieve his results. Basically, these tools can be divided into two groups: (1) filters that can be used to restrict the search to a particular group of fingerprints within the whole database and (2) image-editing tools that allow the expert to reduce the 65 (1), 2015 \ 7

8 noise and thus increase the quantity and quality of minutiae marked for use in comparisons. One can realize that there is a conflict between response time (group 1) and reliability of the results (group 2). The cost-benefit ratio depends on the aims of the comparison and availability of resources. As an example, validation of identity to access a restricted area involving fingerprints collected in situ can (and should) be performed in lights-out mode, providing instant results. Any error, even if unlikely, will not cause significant damage. A completely different situation occurs with latent prints from criminal cases. The role of the expert is necessary in almost all steps: in the analysis and selection of prints, acquisition and editing of selected images, assignment and codification of minutiae, analysis and comparison with the candidates presented by the system, and finally decision making. The priority is to get reliable results, even if this requires longer response times. Errors can bring serious implications. Meagher et. al [19] discussed some possible scenarios for latent print processing in lights-out mode on AFIS. They proposed some tiers in which the activities performed by the experts were gradually replaced by automatic processing in AFIS, changing the cognitive distribution between human and technology. According to these authors, a complete understanding of the processes from latent print detection to expert testimony in courts is essential in order to fully analyze the costs and benefits and to identify any associated risks of the various scenarios presented. Although some AFIS tasks can be pre-programmed to run automatically, the examination of latent prints requires special attention because its results may have serious implications, affecting the life and freedom of people. Each crime scene has particular characteristics relating to the events that occurred. Likewise, each latent print has a history of the events related to the crime scene and characteristics of the surfaces and methods of development applied. There is no single process to consider all the factors involved, and constant decision making is needed when processing latent prints. In this sense, it does not seem reasonable to perform a latent print comparison in a lights-out mode. AFIS must be rationally used by the expert as a tool to optimize his or her original task. Each latent print has some peculiarities, such as noise, that require different processing and variable thresholds to be adopted. 8 / 65 (1), 2015

9 Even when using efficient technological resources such as AFIS and following appropriate standard operating procedures such as the ACE-V methodology, errors still occur [20]. Dror and Charlton [21] classify errors into three categories: (1) human errors (intentional, negligent, or competency); (2) instrumentation errors (failure and breakdown of equipment); and (3) nonspecific fundamental errors (limitations inherent to the nature of the human cognition process and also from the inaccuracy of the instruments). Error rates and the influence of contextual bias on decision making in forensic sciences have been studied in the last decade. Dealing specifically with fingerprint identification, Evett and Williams [22] suggested that there was a bias when examiners were presented with the latent and the known prints simultaneously. After the misidentification of a latent print in the 2004 Madrid bombing [23], the research in this direction became more intense. Dror et al. [24] examined the question of consistency during the analysis stage of latent marks. These researchers found out that the presence of a target comparison print affects the results, although this stage of the ACE-V methodology seems to be more objective and robust than other stages. Schiffer and Champod [25] also carried out research about the influence of observational biases at the analysis stage of fingerprint examination. Unlike the conclusions of previous authors, the results indicated, no effect of the stimuli used to induce observational biases has been observed [25]. One possible explanation for these unexpected results is the employment of a formal guideline, reducing the risk of drifting in the analysis stage, which is considered to be of a less decisional nature. It is also possible to see in their paper [25, Graph 2] that there are small differences between groups A and B. Perhaps with some changes in the experiments, those differences could be accentuated and the bias effect would become appreciable. The tests were applied to forensic science students before and after they followed specific training in fingermark individualization. The effect of training was observed in the form of an increase of minutiae annotated and a higher consensus between participants [25]. This better performance that is due to expertise is in agreement with Busey and Vanderkolk s results [13] and was also verified by Langenburg [26], as a result of a study concerning statistical analysis of the ACE-V methodology in its analysis stage. 65 (1), 2015 \ 9

10 Langenburg et al. [27] tested for potential contextual bias effects during the verification stage on novices and experts when conducting fingerprint comparisons. The bias effects were stronger for novice participants. Experts were more resistant to bias suggestions towards individualization and less so to suggestions towards inconclusive results and exclusion decisions. Dror et al. [28] re-presented fingerprints taken from real criminal cases to the same examiners who had previously made positive identifications of suspects, but this time, the examiners were provided with biasing contextual information, suggesting that they were nonmatches. Most of the experts made inconsistent decisions, leading the authors to conclude that fingerprint experts are vulnerable to biasing information. A subsequent similar study, also including past exclusion decisions, was conducted by Dror and Charlton [21]. The results indicated inconsistent decisions again, especially in past individualization decisions. According to these authors, It seems that the threshold to make a decision of exclusion is lower than that to make a decision of individualization. [21], in agreement with the results of Langenburg et al. [27] Also, according to Dror and Charlton, the psychological and cognitive vulnerabilities are most pronounced in the difficult cases [21], although they can also occur in simpler ones. They suggested, contextual information is not the only factor that may affect fingerprint experts [21]. Changes in decisions that were context-free were observed and may indicate that expert decisions can be inconsistent with time, reflecting changes in decision thresholds or changes of the decision strategy itself [21]. The research described above converges in the sense that experts can be biased by contextual information. The bias effect seems to be more intense during complex comparisons, especially when the quality of latent prints decreases and the number of minutiae approaches the standard threshold adopted. In such cases, the experts tend to be conservative in their decision making, something that is evidenced by the greater number of inconclusive and exclusion decisions compared to individualization. A general goal of these studies is to examine the objective and subjective elements involved in the human identification by fingerprints. The scientific basis for the use of fingerprints as robust evidence in courts requires a preponderance of objectivity over subjectivity, in order to avoid errors like that in the Mayfield case [23]. Recent work by Kellman et al. [29] 10 / 65 (1), 2015

11 demonstrates advances in this direction. They developed a methodology to quantify the level of difficulty of comparisons and to estimate error rates by measuring image features. Making mistakes is inherent to the nature of human cognition. No matter how well trained the expert is or how well the technology used by him or her works, the possibility of making errors does exist. A thorough understanding of the phenomena involved in the fingerprint identification activity may contribute to the improvement of techniques and technologies and thus enable the creation of procedures to reduce the probability of errors. The implementation of these procedures will depend on the balance between the societal costs of errors and inappropriate decisions, and the operational costs of detection [15]. In the words of Charlton [30], It is futile to develop tools and technology that can help minimize the effects of bias in law enforcement if the cost of those tools becomes prohibitive. Returning to the case report in question, the experts were biased by the contextual information, but in a positive way. The fraudulent nature of the crimes attracted the attention of the experts to details of the fingerprints, because there was the possibility that those fingerprints were manipulated during the process of forging the documents. Also preponderant was the fact that all of the documents were gathered and examined by the same experts. If they had been analyzed separately at different times or by different experts, reversals probably would not have been detected. Another important detail is the fact that the laterally reversed prints were whorl patterns, with reasonable lateral symmetry. If they had been loops, they would probably not have been detected, because the reversal would have changed the primary classification of the fingerprint. The perceptual learning cited by Busey and Vanderkolk [13], which leads to expertise, also promotes errors among the experts, as per Wertheim et al. [31]: if the latent print is a left-slant loop pattern and the exemplar bears a right-slant loop pattern, it is highly unlikely that a participant with even minimal training and experience would effect such an individualization. The expression was used within a specific context, referring to a likely clerical error committed in the experiment carried out by those authors, but demonstrates how difficult it is to detect laterally reversed fingerprints following routine operational procedures. This usual practice among experts results from the need to optimize searches for fingerprint identification, where Fingerprint classification is crucial to reduce the processing time in a large-scale database. 65 (1), 2015 \ 11

12 [32] During examination, one of the first steps is to exclude fingerprints based on their classification. This is a common risk assumed by examiners when they search for a fingerprint in a large list of candidates such as the database of an AFIS system [17]. Laterally reversed fingerprints are difficult to detect. Errors in decision making when comparing fingerprints with their own reversals can be classified as those of the third category proposed by Dror and Charlton [21], because sometimes errors are almost inevitable, even with human expertise and technology working well. In general, the regular search in AFIS is not sufficient to ensure a reversal s detection. In the case of latent prints from criminal cases, the examination deserves special attention, and it is necessary to have standard procedures for dealing with specific situations where reversals are more likely. The elucidation of the authorship of crimes by means of the identification of reversed fingerprints should not depend on luck or a sum of coincidences. One possible alternative to prevent human error in this sense, in addition to the best practices recommended by the NIST Human Factors report [33], is to establish standard operational procedures [34] containing welldefined criteria of how to proceed in specific situations with a real possibility of occurrence of reversals. The addition of such standard procedures requires further research in this field. The inclusion of matching from lateral reversals to experiments such as those of Busey and Vanderkolk [13], Langenburg et al. [27], and Wertheim et al. [31] could provide valuable information to better understand the difficulties associated with the human perception of laterally reversed fingerprints. Simulations involving the handling of substrates, such as those of real cases described in the introduction, can also generate useful information to address the issue. After deposition, development, and assessment of the latent prints, the ratio between the total number of reversals and direct prints could be calculated, thus estimating mean incidence rates of reversals for different situations. Although there are some parameters to be considered, this could be a first step towards providing scientific support to evaluate costs and benefits when establishing new search procedures considering lateral reversals. It is possible that there are nondetected reversals currently stored in the AFIS systems. They could be identified if all fingerprints of the database were reversed and re-processed. The enormous operational cost to realize this can be compared 12 / 65 (1), 2015

13 to performing blind verification in 100% of cases. Although this allows more reliable results, the benefits may not justify the costs. However, this work could be done only for latent prints derived from cases in which lateral reversals are most likely. This could not only lead to the identification of suspects in those real cases, but also support research with statistical data about incidence rate of lateral reversals. One suggestion to increase the detection of lateral reversals in special situations is to perform those comparisons with both direct and reversed prints and store them in AFIS (if possible) to allow for eventual future identifications. Some examples of special cases where lateral reversals can occur are (1) cases involving fake documents, (2) latent prints recovered from substrates in which the reversal could occur by the contact and ridge skin matrix transfer, such as folded plastic bags or stacked packages, and (3) photographs of latent prints from transparent substrates without indication of the surface on which it was developed. In such cases, the potential benefits seem to justify the operational costs. Furthermore, based on best practices suggested to reduce human error in fingerprint analysis [15, 33, 35], the application of ACE-V methodology with blind verification is also recommended for such cases. Conclusion The cases of reversed prints mentioned in other works referred to developments on various substrates using different developers. The existence of suspects and the circumstances involved led the experts to find the reversals, after thorough analysis of the possible dynamics that originated the latent prints. In this case, we could not rely on the dynamics involved in the creation of latent prints because there were no developments, but only comparison examinations on copies of documents. The identification of reversed fingerprints was due to the (positive) contextual biasing and examination of all documents by the same experts, who used their expertise and attention during all stages of the work. The default configurations of the AFIS used by the Federal Police Department of Brazil do not automatically consider the possibility of reversals. AFIS has a tool that allows for the reversed latent prints, but its use is optional. This is probably because the history of reversals had not justified, so far, the 65 (1), 2015 \ 13

14 inclusion of this routine in standard processing, which would mean an increase in workload and in response times. Further research on laterally reversed fingerprints is necessary to provide scientific support for editing new standard operational procedures regarding the issue. Until this happens, one suggestion is to apply differential treatment for latent prints originating from cases where the nature of the substrate and the circumstances indicate the possibility of lateral reversals. In such cases, both the original print and its lateral reversal (generated in AFIS or any image editing software) should be compared with the exemplars and should remain stored in AFIS (if possible) for future comparisons. In addition, the application of the ACE-V methodology with blind verification is highly recommended. It is believed that the potential benefits from positive identifications of lateral reversals generated by criminals justify the increase in workload and response time resulting from the implementation of this procedure. Acknowledgment The author would like to thank Paulo Alves and Danilo Fonseca for help with the language, as well as the anonymous reviewers for the valuable comments that have made this case report worthy of publication. For further information, please contact: References Carlos Magno A. Girelli MJ - Departamento de Policia Federal Superintendencia Regional no Espirito Santo Grupo de Identificacao Av. Vale do Rio Doce, 01, Sao Torquato Vila Velha - ES, Brazil girelli.cmag@dpf.gov.br 1. Lane, P. A.; Hilborn, M.; Guidry, S.; Richard, C. E. Serendipity and Super Glue: Development of Laterally Reversed, Transferred Latent Prints. J. For. Ident. 1988, 38 (6), Saviano, J. The Significance of Using Level 1 Detail in Latent Print Examinations. J. For. Ident. 2003, 53 (2), Kershaw, M. H. Laterally Reversed. J. For. Ident. 2000, 50 (2), / 65 (1), 2015

15 4. Czarnecki, E. R. Laterally Inverted Fingerprints. J. For. Ident. 2005, 55 (6), SWGFAST. Document #10 Standards for Examining Friction Ridge Impressions and Resulting Conclusions (Latent/Tenprint). Ver swgfast.org/documents/examinations-conclusions/130427_ Examinations-Conclusions_2.0.pdf (Accessed September 2, 2014). 6. Maurer, D.; Le Grand, R.; Mondloch, C. J. The Many Faces of Configural Processing. Trends Cogn. Sci. 2002, 6 (6), Thompson, P. Margaret Thatcher: A New Illusion. Perception 1980, 9 (4), Fehn, U.; Streicher, M.; Ettlinger, G.; Brown, J. V. Confusion of Laterally Inverted Mirror-Images: A Relationship to Brain Anatomy? Cortex 1985, 21 (1), Jordan, K.; Heinze, H. -J.; Lutz, K.; Kanowski, M.; Jäncke, L. Cortical Activations during the Mental Rotation of Different Visual Objects. NeuroImage 2001, 13 (1), Rossion, B. Picture-Plane Inversion Leads to Qualitative Changes of Face Perception. Acta Psychol. 2008, 128 (2), Milivojevic, B.; Hamm, J. P.; Corballis, M. C. About Turn: How Object Orientation Affects Categorisation and Mental Rotation. Neuropsychologia 2011, 49 (13), Lawson, R.; Jolicoeur, P. Recognition Thresholds for Plane- Rotated Pictures of Familiar Objects. Acta Psychol. 2003, 112 (1), Busey, T. A.; Vanderkolk, J. R. Behavioral and Electrophysiological Evidence for Configural Processing in Fingerprint Experts. Vision Research 2005, 45 (4), Champod, C.; Lennard, C.; Margot, P.; Stoilovic, M. Fingerprints and Other Ridge Skin Impressions. CRC Press: Boca Raton, 2004; p Ulery, B. T.; Hicklin, R. A.; Buscaglia, J.; Roberts, M. A. Accuracy and Reliability of Forensic Latent Fingerprint Decisions. Proc. Natl. Acad. Sci. USA 2011, 108 (19), Huckemann, S.; Hotz, T.; Munk, A. Global Models for the Orientation Field of Fingerprints: An Approach Based on Quadratic Differentials. IEEE Trans. Pattern Anal. Mach. Intell. 2008, 30 (9), Dror, I. E.; Mnookin, J. L. The Use of Technology in Human Expert Domains: Challenges and Risks Arising from the Use of Automated Fingerprint Identification Systems in Forensic Science. Law, Prob. & Risk 2010, 9, (1), 2015 \ 15

16 18. Egli, N. M.; Champod, C.; Margot, P. Evidence Evaluation in Fingerprint Comparison and Automated Fingerprint Identification Systems Modelling within Finger Variability. For. Sci. Int. 2007, 167 (2 3), Meagher, S.; Dvornychenko, V.; Garris, M. Characterization of Latent Print Lights-Out Modes for Automated Fingerprint Identification Systems. J. For. Ident. 2014, 64 (3), Cole, S. A. More Than Zero: Accounting for Error in Latent Fingerprint Identification. J. Crim. Law Criminol. 2005, 95 (3), Dror, I. E.; Charlton, D. Why Experts Make Errors. J. For. Ident. 2006, 56 (4), Evett, I.; Williams, R. A Review of the Sixteen Point Fingerprint Standard in England and Wales. J. For. Ident. 1996, 46 (1), Stacey, R. B. A Report on the Erroneous Fingerprint Individualization in the Madrid Train Bombing Case. J. For. Ident. 2004, 54 (6), Dror, I. E.; Champod, C.; Langenburg, G.; Charlton, D.; Hunt, H.; Rosenthal, R. Cognitive Issues in Fingerprint Analysis: Inter- and Intra-Expert Consistency and the Effect of a Target Comparison. For. Sci. Int. 2011, 208 (1 3), Schiffer, B.; Champod, C. The Potential (Negative) Influence of Observational Biases at the Analysis Stage of Fingermark Individualisation. For. Sci. Int. 2007, 167 (2 3), Langenburg, G. M. Pilot Study: A Statistical Analysis of the ACE-V Methodology Analysis Stage. J. For. Ident. 2004, 54 (1), Langenburg, G.; Champod, C.; Wertheim, P. Testing for Potential Contextual Bias Effects During the Verification Stage of the ACE-V Methodology when Conducting Fingerprint Comparisons. J. For. Sci. 2009, 54 (3), Dror, I. E.; Charlton, D.; Péron, A. E. Contextual Information Renders Experts Vulnerable to Making Erroneous Identifications. For. Sci. Int. 2006, 156 (1), Kellman, P. J.; Mnookin, J. L.; Erlikhman, G.; Garrigan, P.; Ghose, T.; Mettler, E.; Charlton, D.; Dror, I. E. Forensic Comparison and Matching of Fingerprints: Using Quantitative Image Measures for Estimating Error Rates through Understanding and Predicting Difficulty. PloS one 2014, 9 (5), e Charlton, D. Standards to Avoid Bias in Fingerprint Examination? Are Such Standards Doomed to be Based on Fiscal Expediency? J. Appl. Res. Mem. Cogn. 2013, 2 (1), / 65 (1), 2015

17 31. Wertheim, K.; Langenburg, G.; Moenssens, A. A Report of Latent Print Examiner Accuracy During Comparison Training Exercises. J. For. Ident. 2006, 56 (1), Li, J.; Yau, W. Y.; Wang, H. Combining Singular Points and Orientation Image Information for Fingerprint Classification. Pattern Recognition 2008, 41 (1), Expert Working Group on Human Factors in Latent Print Analysis. Latent Print Examination and Human Factors: Improving the Practice through a Systems Approach. U.S. Department of Commerce, National Institute of Standards and Technology: Gaithersburg, MD, IFRG. Guidelines for the Assessment of Fingermark Detection Techniques. J. For. Ident. 2014, 64 (2), Kassin, S. M.; Dror, I. E.; Kukucka, J. The Forensic Confirmation Bias: Problems, Perspectives, and Proposed Solutions. J. Appl. Res. Mem. Cogn. 2013, 2 (1), (1), 2015 \ 17

Defining AFIS Latent Print Lights-Out

Defining AFIS Latent Print Lights-Out NIST ELFT Workshop March 19-20, 2009 Defining AFIS Latent Print Lights-Out Stephen B. Meagher Dactyl ID, LLC AFIS 10-Print Lights-Out Arrest Booking Process Booking Officer performs 10-Print fingerprint

More information

SWGFAST. Defining Level Three Detail

SWGFAST. Defining Level Three Detail SWGFAST Defining Level Three Detail ANSI / NIST Workshop Data Format for the Interchange of Fingerprint, Facial, & Scar Mark & Tattoo (SMT) Information April 26-28,2005 28,2005 Defining Level Three Detail

More information

Document #8 Standard for the Documentation of Analysis, Comparison, Evaluation, and Verification (ACE-V) (Latent)

Document #8 Standard for the Documentation of Analysis, Comparison, Evaluation, and Verification (ACE-V) (Latent) Document #8 Standard for the Documentation of Analysis, Comparison, Evaluation, and Verification (ACE-V) (Latent) 1. Preamble 1.1. When friction ridge detail is examined using the ACE-V methodology, examiners

More information

Confirmation bias in biometric and forensic identification. Tim Valentine

Confirmation bias in biometric and forensic identification. Tim Valentine Confirmation bias in biometric and forensic identification Tim Valentine Face Comparison tasks Biometric Review of candidate faces from an automatic facial recognition system (e.g biometric security system

More information

Forensic Science - A Path Forward Committee on Finding the Perfect Career

Forensic Science - A Path Forward Committee on Finding the Perfect Career Strengthening Forensic Science in the United States: A Path Forward Committee on Identifying the Needs of the Forensic Sciences Community, National Academy of Sciences, 2009 Position Summary The Scientific

More information

Cognitive Issues in Fingerprint Analysis: Inter- and Intra- Consistency and the Effect of a Target Comparison

Cognitive Issues in Fingerprint Analysis: Inter- and Intra- Consistency and the Effect of a Target Comparison Cognitive Issues in Fingerprint Analysis / Page 1 DRAFT Please do not cite or quote without permission Cognitive Issues in Fingerprint Analysis: Inter- and Intra- Consistency and the Effect of a Target

More information

Contextual information renders experts vulnerable to making erroneous identifications

Contextual information renders experts vulnerable to making erroneous identifications Forensic Science International 156 (2006) 74 78 Preliminary communication Contextual information renders experts vulnerable to making erroneous identifications Itiel E. Dror *, David Charlton, Ailsa E.

More information

Quantified Assessment of AFIS Contextual Information on Accuracy and Reliability of Subsequent Examiner Conclusions

Quantified Assessment of AFIS Contextual Information on Accuracy and Reliability of Subsequent Examiner Conclusions 233 East Main Street Suite C Bridgeport, WV 26330 (304) 933-3162 Final Draft Technical Report Quantified Assessment of AFIS Contextual Information on Accuracy and Reliability of Subsequent Examiner Conclusions

More information

Strengthening Forensic Science in the United States: A Path Forward

Strengthening Forensic Science in the United States: A Path Forward This PDF is available from The National Academies Press at Strengthening Forensic Science in the United States: A Path Forward ISBN 978-0-309-13135-3 Committee on Identifying the Needs of the Forensic

More information

Guidelines concerning Fingerprint Transmission

Guidelines concerning Fingerprint Transmission Guidelines concerning Fingerprint Transmission INTERPOL OS/FTD/IDFP 2012 INTERPOL For official use only P a g e 1 GUIDELINES FOR FINGERPRINTS TRANSMISSION Purpose of this guideline This document has been

More information

PAPER GENERAL. Itiel E. Dror, 1,2 Ph.D.; Kasey Wertheim, 3 M.B.A.; Peter Fraser-Mackenzie, 2,4 Ph.D.; and Jeff Walajtys, 3 B.A.

PAPER GENERAL. Itiel E. Dror, 1,2 Ph.D.; Kasey Wertheim, 3 M.B.A.; Peter Fraser-Mackenzie, 2,4 Ph.D.; and Jeff Walajtys, 3 B.A. PAPER J Forensic Sci, March 2012, Vol. 57, No. 2 doi: 10.1111/j.1556-4029.2011.02013.x Available online at: onlinelibrary.wiley.com GENERAL Itiel E. Dror, 1,2 Ph.D.; Kasey Wertheim, 3 M.B.A.; Peter Fraser-Mackenzie,

More information

Strategic White Paper

Strategic White Paper Strategic White Paper Increase Security Through Signature Verification Technology Takeaway Understand the benefits of automatic signature verification Learn about the types of automatic signature verification

More information

POTENTIAL USE OF FINGERPRINTS IN FORENSIC INTELLIGENCE: CRIME SCENE LINKING

POTENTIAL USE OF FINGERPRINTS IN FORENSIC INTELLIGENCE: CRIME SCENE LINKING POTENTIAL USE OF FINGERPRINTS IN FORENSIC INTELLIGENCE: CRIME SCENE LINKING Alexandre ANTHONIOZ, Aude AGUZZI, Alexandre GIROD, Nicole EGLI, Olivier RIBAUX Institut de Police Scientifique et de Criminologie,

More information

NATIONAL COMMISSION ON FORENSIC SCIENCE. Ensuring That Forensic Analysis is Based Upon Task-Relevant Information

NATIONAL COMMISSION ON FORENSIC SCIENCE. Ensuring That Forensic Analysis is Based Upon Task-Relevant Information NATIONAL COMMISSION ON FORENSIC SCIENCE Ensuring That Forensic Analysis is Based Upon Task-Relevant Information Type of Work Product: Views Document Issued by Human Factors Subcommittee Statement of the

More information

Case study on asset tracing

Case study on asset tracing Recovering Stolen Assets: A Practitioner s Handbook ARNO THUERIG * Case study on asset tracing I. Case study background The client adviser of a Swiss private bank transferred approximately USD 1 million

More information

CFSD 21 ST CENTURY SKILL RUBRIC CRITICAL & CREATIVE THINKING

CFSD 21 ST CENTURY SKILL RUBRIC CRITICAL & CREATIVE THINKING Critical and creative thinking (higher order thinking) refer to a set of cognitive skills or strategies that increases the probability of a desired outcome. In an information- rich society, the quality

More information

Practical Solutions to Cognitive and Human Factor Challenges in Forensic Science

Practical Solutions to Cognitive and Human Factor Challenges in Forensic Science Forensic Science Policy & Management, 4(3 4):1 9, 2013 Copyright c Taylor & Francis Group, LLC ISSN: 1940-9044 print / 1940-9036 online DOI: 10.1080/19409044.2014.901437 Practical Solutions to Cognitive

More information

Latent Prints Overview

Latent Prints Overview Latent Prints Overview Latent prints are impressions produced by the ridged skin, known as friction ridges, on human fingers, palms, and soles of the feet. Examiners analyze and compare latent prints to

More information

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - nzarrin@qiau.ac.ir

More information

COMMUNITY UNIT SCHOOL DISTRICT 200. Course Description

COMMUNITY UNIT SCHOOL DISTRICT 200. Course Description Forensic Science High School Elective Course Description Forensic Science is a one semester high school level course that satisfies a CUSD200 graduation requirement in the area of science. Successful completion

More information

High Resolution Fingerprint Matching Using Level 3 Features

High Resolution Fingerprint Matching Using Level 3 Features High Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain and Yi Chen Michigan State University Fingerprint Features Latent print examiners use Level 3 all the time We do not just count

More information

The Science of Forensics

The Science of Forensics The Science of Forensics Stage 3 Purpose and focus Students will learn the basic processes forensic scientists go through when investigating crimes. Notes This unit deals with a great number of ethical

More information

Forensic Science Testing: The Forensic Filler-Control Method for Controlling Contextual Bias, Estimating Error Rates, and Calibrating Analysts Reports

Forensic Science Testing: The Forensic Filler-Control Method for Controlling Contextual Bias, Estimating Error Rates, and Calibrating Analysts Reports Forensic Science Testing: The Forensic Filler-Control Method for Controlling Contextual Bias, Estimating Error Rates, and Calibrating Analysts Reports Gary L. Wells 1 Miko M. Wilford 1 Laura Smalarz 1

More information

Evidence Technician s School

Evidence Technician s School Evidence Technician s School Program Overview The Evidence Technician s School is designed to provide your Evidence Technician or Crime Scene Investigator with a sound foundation of the basic principles

More information

CURRICULUM GUIDE. When this Forensics course has been completed successfully, students should be able to:

CURRICULUM GUIDE. When this Forensics course has been completed successfully, students should be able to: CURRICULUM GUIDE NAME OF COURSE: FORENSICS COURSE NUMBER: SCI 40 WRITTEN / REVISED: SEPTEMBER, 2011 LEVEL OF COURSE: REPLACMENT NUMBER OF CREDITS: SIX (6) PREREQUISITES: BIOLOGY GRADE LEVELS OFFERED TO:

More information

TROY POLICE DEPARTMENT MERCHANTS GUIDE BAD CHECKS Page 1 of 13

TROY POLICE DEPARTMENT MERCHANTS GUIDE BAD CHECKS Page 1 of 13 Page 1 of 13 Millions of dollars are lost annually through the passing of bad checks in Oakland County. The complaints for such fraudulent transactions now mount in the thousands. The Troy Police Department

More information

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004 A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:

More information

From fact to opinion 1. Managing the change from fact to opinion.

From fact to opinion 1. Managing the change from fact to opinion. 04.04. Objectives of this presentation International Workshop on Biometrics and Forensics (IWBF) Expose my views on the opportunities and challenges a probabilistic (LR-based) assessment of the weight

More information

case asset management database software electronic case notes

case asset management database software electronic case notes case asset management powerful security configurable data forms comparative analysis case asset management database software electronic case notes messaging configurable reports LIMS integration www.mideosystems.com

More information

MORPHO CRIMINAL JUSTICE SUITE

MORPHO CRIMINAL JUSTICE SUITE MORPHO CRIMINAL JUSTICE SUITE FULL RANGE OF PRODUCTS DEDICATED TO CRIMINAL JUSTICE MISSIONS 2 1 3 Morpho provides law enforcement with a wide range of products to support criminal investigation, background

More information

Fingerprinting Information Sheet

Fingerprinting Information Sheet Fingerprinting Information Sheet HISTORY Fingerprints weren t always used as a means to identify criminals. One of the first methods used to compare physical characteristics was developed in 1883 by Alphonse

More information

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification

More information

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014 Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College

More information

case image management database software electronic case notes

case image management database software electronic case notes case management powerful security configurable field sets comparative analysis ACE-V documentation case image management database software electronic case notes messaging configurable reports LIMS integration

More information

Forensic Science Lesson 3: Trace Evidence Analysis

Forensic Science Lesson 3: Trace Evidence Analysis Forensic Science Lesson 3: Trace Evidence Analysis History Alphonse Bertillon 1883 Created the first systematic system of individual classification & identification Detailed description of subject, full-length

More information

Supported by. A seven part series exploring the fantastic world of science.

Supported by. A seven part series exploring the fantastic world of science. Supported by A seven part series exploring the fantastic world of science. Find out what techniques are used by forensic scientists and why they are so useful. Forensic science is the term given to the

More information

Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap

Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic

More information

City of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, 2009. Effective Date: Last Revised Date: Responsible Office:

City of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, 2009. Effective Date: Last Revised Date: Responsible Office: 2009 1 City of Geneva Policy Number: Effective Date: Last Revised Date: Responsible Office: 1.0 April 28, 2009 April 27, 2009 Tammy Shuttleworth Status: Draft Under Review Approved Obsolete IDENTITY THEFT

More information

CITY OF TAMPA. United States Senate Special Committee on Aging

CITY OF TAMPA. United States Senate Special Committee on Aging CITY OF TAMPA Bob Buckhorn, Mayor POLICE DEPARTMENT Jane Castor Chief of Police United States Senate Special Committee on Aging Mr. Chairman Members of the Committee On behalf of the City of Tampa, Mayor

More information

Programme Specification. MSc/PGDip Forensic and Legal Psychology

Programme Specification. MSc/PGDip Forensic and Legal Psychology Entry Requirements: Programme Specification MSc/PGDip Forensic and Legal Psychology Applicants for the MSc must have a good Honours degree (2:1 or better) in Psychology or a related discipline (e.g. Criminology,

More information

Checking signatures at postal vote openings

Checking signatures at postal vote openings Checking signatures at postal vote openings Introduction This guidance aims to provide practical advice on postal vote opening procedures, with special regard to carrying out manual checking of signatures.

More information

FORENSIC SCIENCE COURSE DESCRIPTION

FORENSIC SCIENCE COURSE DESCRIPTION FORENSIC SCIENCE COURSE DESCRIPTION This course is an overview of how science is applied to solving crimes. Topics include history of forensic sciences, collecting of evidence, analyzing results and hands-on

More information

A CRIME HAS BEEN COMMITTED

A CRIME HAS BEEN COMMITTED A CRIME HAS BEEN COMMITTED QUICK PEEK In this lesson, students will demonstrate all of the techniques they have learned during the lessons Ink Chromatography, What Could It Be? Glass Chip Density, Forensics,

More information

INTRUSION PREVENTION AND EXPERT SYSTEMS

INTRUSION PREVENTION AND EXPERT SYSTEMS INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion

More information

Signature Verification Why xyzmo offers the leading solution.

Signature Verification Why xyzmo offers the leading solution. Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all

More information

INEL- 4dl"0033oZ m~1f-46. \/l3--fi

INEL- 4dl0033oZ m~1f-46. \/l3--fi INEL- 4dl"0033oZ m~1f-46 \/l3--fi Limiting Liability via High Resolution Image Processing L. Eric Greenwade, Advisory Scientist Trudy K. Overlin, Scientist Idaho National Engineering Laboratory Lockheed

More information

Lies, Lies and Damn Business Psychology

Lies, Lies and Damn Business Psychology Lies, Lies and Damn Business Psychology Assessment Tools Survey Blending Solutions Research with Application Training Consulting Services. Introduction Rather than lies, we are looking at mistruths. An

More information

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network

More information

Application of Amido Black Mixture for the Development of Blood-based Fingerprints on Human Skin

Application of Amido Black Mixture for the Development of Blood-based Fingerprints on Human Skin Case Report Application of Amido Black Mixture for the Development of Blood-based Fingerprints on Human Skin Rodney Lawley Birmingham Police Department Birmingham, AL Abstract: Amido black is a chemical

More information

Low-resolution Image Processing based on FPGA

Low-resolution Image Processing based on FPGA Abstract Research Journal of Recent Sciences ISSN 2277-2502. Low-resolution Image Processing based on FPGA Mahshid Aghania Kiau, Islamic Azad university of Karaj, IRAN Available online at: www.isca.in,

More information

What will I study? Year One core modules currently include:

What will I study? Year One core modules currently include: What will I study? Year One core modules currently include: Introduction to Psychology You will examine how psychology research is conducted and interpreted; a range of perspectives in psychology, including

More information

Department of Police SOUTHINGTON, CONNECTICUT 06489

Department of Police SOUTHINGTON, CONNECTICUT 06489 Department of Police SOUTHINGTON, CONNECTICUT 06489 Chief John F. Daly 69 Lazy Lane Southington, Connecticut 06489 HEADQUARTERS: TEL (860) 378-1600 FAX (860) 378-1605 ABOUT THE SOUTHINGTON POLICE DEPARTMENT

More information

Recruitment and Selection

Recruitment and Selection Recruitment and Selection The recruitment and selection belongs to value added HR Processes. The recruitment is about: the ability of the organization to source new employees, to keep the organization

More information

PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS

PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS Ram P. Krish 1, Julian Fierrez 1, Daniel Ramos 1, Javier Ortega-Garcia 1, Josef Bigun 2 1 Biometric Recognition

More information

Extended Feature Set Profile Specification

Extended Feature Set Profile Specification NIST Special Publication 1134 Extended Feature Set Profile Specification Will Chapman Austin Hicklin George Kiebuzinski Peter Komarinski John MayerSplain Melissa Taylor Rachel Wallner http://dx.doi.org/10.6028/nist.sp.1134

More information

SWGFAST Glossary - Classification

SWGFAST Glossary - Classification SWGFAST Glossary - Classification APPENDAGE An attachment or connection within friction ridges. ARCH - PLAIN A fingerprint pattern in which the ridges enter on one side of the impression, and flow, or

More information

Effectiveness and Cost Efficiency of DNA Evidence in Volume Crime Denver Colorado Site Summary

Effectiveness and Cost Efficiency of DNA Evidence in Volume Crime Denver Colorado Site Summary Effectiveness and Cost Efficiency of DNA Evidence in Volume Crime Denver Colorado Site Summary Simon Ashikhmin 1, Susan G. Berdine 2, Mitchell R. Morrissey 1, and Greggory S. LaBerge 2 1 Denver District

More information

Forensic Specialist Supervisor Crime Scene #00781 (1 of 2) City of Virginia Beach Job Description Date of Last Revision: 08-12-2015

Forensic Specialist Supervisor Crime Scene #00781 (1 of 2) City of Virginia Beach Job Description Date of Last Revision: 08-12-2015 Forensic Specialist Supervisor Crime Scene #00781 (1 of 2) City of Virginia Beach Job Description Date of Last Revision: 08-12-2015 FLSA Status: Non-Exempt Pay Plan: General Grade: 23 City of Virginia

More information

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS BIMS BIOMETRIC DATA ACQUISITION BIMS Biometric Data Acquisition is an application for persons biographical and biometrical data collection in real time or from

More information

A framework for creating custom rules for static analysis tools

A framework for creating custom rules for static analysis tools A framework for creating custom rules for static analysis tools Eric Dalci John Steven Cigital Inc. 21351 Ridgetop Circle, Suite 400 Dulles VA 20166 (703) 404-9293 edalci,jsteven@cigital.com Abstract Code

More information

Crime Scene Investigator I

Crime Scene Investigator I Office of Human Resources Crime Scene Investigator I Page 1 of 5 GENERAL STATEMENT OF CLASS DUTIES Performs entry-level professional work while receiving training in the principles, practices, methods,

More information

Application-Specific Biometric Templates

Application-Specific Biometric Templates Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies

More information

Identity Theft. The Identity Theft Conundrum

Identity Theft. The Identity Theft Conundrum Identity Theft The Identity Theft Conundrum Identity theft presents an inherent conundrum: The very attributes of modern commerce that consumers value and expect rapid, easy, 24-hour access to a wide variety

More information

CRIME SCENE FORENSICS

CRIME SCENE FORENSICS CRIME SCENE FORENSICS Description Crime Scene Forensics, which is a laboratory-based course, will promote and cultivate the development of student s scientific inquiry and scientific method skills, which

More information

CITY OF CARLSBAD CLASS SPECIFICATION COMMUNITY SERVICE OFFICER I /II

CITY OF CARLSBAD CLASS SPECIFICATION COMMUNITY SERVICE OFFICER I /II CITY OF CARLSBAD CLASS SPECIFICATION JOB TITLE: DEPARTMENT: COMMUNITY SERVICE OFFICER I /II POLICE BASIC FUNCTION: Under direct supervision, performs a variety of routine community service, paraprofessional

More information

Interactive comment on Total cloud cover from satellite observations and climate models by P. Probst et al.

Interactive comment on Total cloud cover from satellite observations and climate models by P. Probst et al. Interactive comment on Total cloud cover from satellite observations and climate models by P. Probst et al. Anonymous Referee #1 (Received and published: 20 October 2010) The paper compares CMIP3 model

More information

Council Tax and Housing Benefit Overpayments Vale of Glamorgan Council

Council Tax and Housing Benefit Overpayments Vale of Glamorgan Council September 2010 Authors: Margaret Griffiths and Jayne Power Ref: 426A2010 Council Tax and Housing Benefit Overpayments Vale of Glamorgan Council Good arrangements helped the Vale of Glamorgan Council overpay

More information

Prentice Hall Algebra 2 2011 Correlated to: Colorado P-12 Academic Standards for High School Mathematics, Adopted 12/2009

Prentice Hall Algebra 2 2011 Correlated to: Colorado P-12 Academic Standards for High School Mathematics, Adopted 12/2009 Content Area: Mathematics Grade Level Expectations: High School Standard: Number Sense, Properties, and Operations Understand the structure and properties of our number system. At their most basic level

More information

SCOTTISH FINGERPRINT SERVICE REPORT TO ESTABLISH AN APPROPRIATE AUTHORISED BUREAU ESTABLISHMENT OF FINGERPRINT EXPERTS

SCOTTISH FINGERPRINT SERVICE REPORT TO ESTABLISH AN APPROPRIATE AUTHORISED BUREAU ESTABLISHMENT OF FINGERPRINT EXPERTS SCOTTISH FINGERPRINT SERVICE REPORT TO ESTABLISH AN APPROPRIATE AUTHORISED BUREAU ESTABLISHMENT OF FINGERPRINT EXPERTS Inspector Graham Jones September 2004 1 Index 1. Introduction 2. Recorded Crime -

More information

Forensic Science TEKS/LINKS Student Objectives One Credit

Forensic Science TEKS/LINKS Student Objectives One Credit First Six Weeks Intro/Observation FS 4(A) The student will distinguish between forensic science and criminalistics in law, public safety, corrections, and security. FS 5(D) The student will apply knowledge

More information

Chain of evidence refers to the continuity of custody of material and items collected as evidence.

Chain of evidence refers to the continuity of custody of material and items collected as evidence. University of Wisconsin Madison Police Policy: 83.2 SUBJECT: EVIDENCE PROCESSING EFFECTIVE DATE: 06/01/10 REVISED DATE: 12/31/11, 11/01/13 REVIEWED DATE: 01/07/15 INDEX: 83.2.1 COLLECTING, PROCESSING,

More information

Crime Scene Search and Processing

Crime Scene Search and Processing Objective: Crime Scene Search and Processing Crime scene search scenarios involve significant teamwork. Each team member should be assigned a specific duty during the crime scene processing. Explorers

More information

Digital Evidence Search Kit

Digital Evidence Search Kit Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University

More information

LEARNING OUTCOMES FOR THE PSYCHOLOGY MAJOR

LEARNING OUTCOMES FOR THE PSYCHOLOGY MAJOR LEARNING OUTCOMES FOR THE PSYCHOLOGY MAJOR Goal 1. Knowledge Base of Psychology Demonstrate familiarity with the major concepts, theoretical perspectives, empirical findings, and historical trends in psychology.

More information

May 2010. For other information please contact:

May 2010. For other information please contact: access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.

More information

MegaMatcher Case Study

MegaMatcher Case Study MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated

More information

An effective approach to preventing application fraud. Experian Fraud Analytics

An effective approach to preventing application fraud. Experian Fraud Analytics An effective approach to preventing application fraud Experian Fraud Analytics The growing threat of application fraud Fraud attacks are increasing across the world Application fraud is a rapidly growing

More information

ACH 1.1 : A Tool for Analyzing Competing Hypotheses Technical Description for Version 1.1

ACH 1.1 : A Tool for Analyzing Competing Hypotheses Technical Description for Version 1.1 ACH 1.1 : A Tool for Analyzing Competing Hypotheses Technical Description for Version 1.1 By PARC AI 3 Team with Richards Heuer Lance Good, Jeff Shrager, Mark Stefik, Peter Pirolli, & Stuart Card ACH 1.1

More information

REQUIREMENTS FOR APPLICATION FOR ADMISSION TO THE PROGRAMME BA (VISUAL ARTS) IN 2015

REQUIREMENTS FOR APPLICATION FOR ADMISSION TO THE PROGRAMME BA (VISUAL ARTS) IN 2015 REQUIREMENTS FOR APPLICATION FOR ADMISSION TO THE PROGRAMME BA (VISUAL ARTS) IN 2015 Dear Applicant, Thank you for your enquiry regarding study in Visual Arts. In order to have the best chance of judging

More information

SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY:

SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY: SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: ISSUED: 11/7/06 REVISED: 3/16/07; 5/6/08 (web reference updates only) Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED

More information

CONSUMERLAB. sharing information. The rise of consumer influence

CONSUMERLAB. sharing information. The rise of consumer influence CONSUMERLAB sharing information The rise of consumer influence An Ericsson Consumer Insight Summary Report September 2015 Contents 3 INFORMATION SHARING DYNAMICS 4 INFORMATION SHARING WITH INDIVIDUALS

More information

Introduction to Crime Scene Dynamics

Introduction to Crime Scene Dynamics Chapter 1 Introduction to Crime Scene Dynamics OVERVIEW The development of the field of forensics has been a process steeped in science and research. On the other hand, the practice of crime scene investigation

More information

SERIAL RAPE: OFFENDER PROFILING

SERIAL RAPE: OFFENDER PROFILING SERIAL RAPE: OFFENDER PROFILING Detective Inspector John Manning New Zealand Police Liaison Officer, Sydney Offender profiling as a viable investigative tool has been graphically illustrated in a number

More information

Best Practices in Model Development and Maintenance Adam Rose (adam.rose@xpsolutions.com), Product Manager, XP Solutions

Best Practices in Model Development and Maintenance Adam Rose (adam.rose@xpsolutions.com), Product Manager, XP Solutions Best Practices in Model Development and Maintenance Adam Rose (adam.rose@xpsolutions.com), Product Manager, XP Solutions adopted from Best practices for software development projects Mike Perks (mperks@us.ibm.com),

More information

Sufficiency of Windows Event log as Evidence in Digital Forensics

Sufficiency of Windows Event log as Evidence in Digital Forensics Sufficiency of Windows Event log as Evidence in Digital Forensics Nurdeen M. Ibrahim & A. Al-Nemrat, Hamid Jahankhani, R. Bashroush University of East London School of Computing, IT and Engineering, UK

More information

Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology

Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology MegaMattcher g Ma Case a Sttudy Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology Bangladesh selected MegaMatcher multi-biometric

More information

Analecta Vol. 8, No. 2 ISSN 2064-7964

Analecta Vol. 8, No. 2 ISSN 2064-7964 EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,

More information

A responsive Fingerprint Matching system for a scalable functional agent

A responsive Fingerprint Matching system for a scalable functional agent A responsive Fingerprint Matching system for a scalable functional agent N. Nagaraju Research Scholar, PACE Institute of Technology & Sciences Ongole. ABSTRACT The Fingerprint Matching is that the most

More information

PROFICIENCY QUIZ. Print B. 3. Explain the difference between Class Evidence and Individual Evidence. Give an an example of each.

PROFICIENCY QUIZ. Print B. 3. Explain the difference between Class Evidence and Individual Evidence. Give an an example of each. PROFICIENCY QUIZ 1. You are at a crime scene investigating a robbery. You dust the area and find two good prints. One is a Radial Loop and the other is a Tented Arch. A rookie officer at the crime scene

More information

Resilience / Expertise and technology

Resilience / Expertise and technology Resilience / Expertise and technology The case of robotic surgery AS Nyssen & A. Blavier Cognitive Ergonomics University of Liege, Belgium asnyssen@ulg.ac.be Research question Resilience System s capacity

More information

County of Monterey DISTRICT ATTORNEY INVESTIGATOR I

County of Monterey DISTRICT ATTORNEY INVESTIGATOR I DISTRICT ATTORNEY INVESTIGATOR I DEFINITION Under supervision, investigates cases of suspected welfare fraud and other criminal activity to obtain facts and evidence in support of administrative action

More information

Study of the Human Eye Working Principle: An impressive high angular resolution system with simple array detectors

Study of the Human Eye Working Principle: An impressive high angular resolution system with simple array detectors Study of the Human Eye Working Principle: An impressive high angular resolution system with simple array detectors Diego Betancourt and Carlos del Río Antenna Group, Public University of Navarra, Campus

More information

How do we build and refine models that describe and explain the natural and designed world?

How do we build and refine models that describe and explain the natural and designed world? Strand: A. Understand Scientific Explanations : Students understand core concepts and principles of science and use measurement and observation tools to assist in categorizing, representing, and interpreting

More information

Response to Critiques of Mortgage Discrimination and FHA Loan Performance

Response to Critiques of Mortgage Discrimination and FHA Loan Performance A Response to Comments Response to Critiques of Mortgage Discrimination and FHA Loan Performance James A. Berkovec Glenn B. Canner Stuart A. Gabriel Timothy H. Hannan Abstract This response discusses the

More information

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems

More information

The NAS Report and Foundations of Good Science

The NAS Report and Foundations of Good Science The NAS Report and Foundations of Good Science March 29, 2012 NACDL/Innocence Network Kansas City, MO Andrea Roth, UC Berkeley School of Law aroth@law.berkeley.edu Goals for the Next Hour Learn what the

More information

APPENDIX N. Data Validation Using Data Descriptors

APPENDIX N. Data Validation Using Data Descriptors APPENDIX N Data Validation Using Data Descriptors Data validation is often defined by six data descriptors: 1) reports to decision maker 2) documentation 3) data sources 4) analytical method and detection

More information

Executive Summary. Summary - 1

Executive Summary. Summary - 1 Executive Summary For as long as human beings have deceived one another, people have tried to develop techniques for detecting deception and finding truth. Lie detection took on aspects of modern science

More information

FINGERPRINTING IS A SCIENCE - TAKE A SCIENTIFIC APPROACH

FINGERPRINTING IS A SCIENCE - TAKE A SCIENTIFIC APPROACH FINGERPRINTING IS A SCIENCE - TAKE A SCIENTIFIC APPROACH FINGERPRINT CLEAN HANDS ONLY DRY HANDS THOROUGHLY ROLL FINGERS FROM NAIL-TO-NAIL NOTE THE CORES AND DELTAS TAKE IMPRESSIONS IN CORRECT ORDER PRODUCE

More information

History and Purpose of the Standards for Educational and Psychological Testing

History and Purpose of the Standards for Educational and Psychological Testing California State Personnel Board Merit Selection Manual: Policy and Practices SUMMARY OF THE STANDARDS FOR EDUCATIONAL AND The following summary of the Standards for Educational and Psychological Testing

More information