SlideShare une entreprise Scribd logo
1  sur  28
Fingerprint Seminar and Training Programspresented by Forensic Biometric Identification Solutions LLC. http://www.fingerprintconsultingservices.com/ Why choose Forensic Biometric Identification Solutions  LLC. Seminars or Training : Cost 60% cheaper than similar training  programs currently on the market. Training available to everyone ; civilian or law enforcement. No Travel Costs No Per Diem On-line training  program is flexible and will fit  into your schedule. Equivalent of  40 hr. basic fingerprint course offered by many state and federal agencies. Our company brings forty years (40)  fingerprint experience at both  the state / local level This presentation is just a sample of the topics covered in our Seminar/Training programs. Additionally our company can  evaluate all areas of fingerprint case work to include  expert testimony at reasonable rates.
Some Common Error’s found in the Fingerprint Process Fingerprint search Missed Identification. Erroneous Bad Identification. Questionable Identification. Latent not thoroughly searched in automated fingerprint system.  Latent image quality initial analysis incorrect. Latent images destroyed based on incorrect quality analysis. Criminal History contains erroneous criminal events.  Latent image processing enhancement issue’s. The above issue’s are discussed and explained in detail, in our seminar and/or training program
“Justice denied anywhere diminishes justice everywhere ”Martin Luther King Jr. Forensic Biometric Identification Solutions LLC. has developed a seminar and a basic fingerprint training program that could benefit everyone in the legal community. As you have seen over the past few years, there have been a number of high profile cases where fingerprint errors have resulted in the wrongful incarceration of an individual. These incidents are not as isolated as once thought , the Innocence Project has now cleared over 250 cases of individuals wrongfully incarcerated, based on flawed forensic evidence. Every time one of these cases is discovered different solutions are proposed as a means of preventing future occurrence ‘s they range from certification programs to re-evaluating the discipline.  The problem with the solutions are they don’t prevent the future occurrence of error, if we look at the judicial process already in place the solution is already available; our adversarial judicial process . The ability for the prosecution and defense to bring in an expert to evaluate the forensic evidence and explain the results of their  analysis to the court. The ability to have fingerprint evidence evaluated by an unbiased 3rd. party is the most effective tool  for minimizing missed and incorrect fingerprint identifications.  The seminar and training programs offered our company are designed  to give you or your staff a better understanding of  fingerprint evidence and when or if  a latent fingerprint examiner should be engaged. The benefits from our seminar or basic fingerprint training course would be a great tool just as useful to a county attorney as it would to a defense attorney.
Erroneous Identification Today the automated systems are searching unidentified latent images against databases containing as many as 600 million fingerprint images. These automated  systems produce a large number of identifications, unfortunately a large number of suspects with similar minutiae  and minutiae orientation to the latent image being searched. When you factor in the lack of clarity and distortion in most latent images, you can understand why you are seeing more erroneous identifications.  This is just 1 of the possible reasons for an erroneous identification, in the seminar/course we go into more detail and the other common causes of an erroneous identification. There is no research that gives us an idea on how many  bad identifications are not being discovered and corrected.
Missed Identification A much more common problem are missed identifications.  A missed identification occurs when the latent image is searched  and  the examiner fails to identify the latent image to the exemplar on file in the database. Many examiners feel a miss is not as serious as a bad identification, which is a  misconception. If latent images are developed at the crime scene the ability to identify the latent images may be the only physical evidence associating or clearing an individual from that case, so it is critical that all latent's be identified.
Understanding the Automated Fingerprint Identification  National Institute of Standards and Technology (NIST) a few years back tested the search accuracy of the major AFIS vendors and discovered an accuracy rate of between 54% and 85%.  This means that a latent image could be put in for a search and the exemplar  could be in the database and the system not produce it high enough on the suspect list to have a latent examiner make a comparison. There are many cases where the latent had to be entered multiple times before the suspect was produced and an identification was completed. As an attorney on a case with unidentified latent images it is important to know how many times the latent's were searched in the automated system with a good understanding of the latent image quality.
Training and Proficiency More critical than certification are the training  and proficiency testing procedures an agency  has in place. Many agencies because of  budget or a lack of understanding of  the skill  sets required for a latent fingerprint examiner,  do not have qualified and properly trained  latent examiners.
Latent Facts ,[object Object]
Typical latent fingerprint has between 15 and 35 minutiae (points of identification).
Typical inked fingerprint contains between 75 and 175 minutiae (points of identification).
latent images recovered from crime scenes are of poor clarity, increasing the likelihood of mistaking the type of minutiae being observed.
30% of crime scenes have usable latent images.
30% of the images from a crime scene are palm images.
A palm print has approximately 800 minutiae (points of identification).
20% of identifications at local lab's are now generated by the automated fingerprint search system.
Latent search accuracy can be as low as 54% on a large database, to mid 80% with good image clarity under controlled conditions. ,[object Object]
Glossary of Terms Bad Identification – examiner identifies a latent to the wrong tenprint card.  Backward Bias – examiners’ interpretation of some features is adjusted or influenced by reasoning “backward” from features that were visible in Mayfield’s known prints.  Confirmation Bias- focusing on minutiae that confirms pre-conceived expectations while ignoring data that doesn't confirm ones beliefs.  Lights out functionality- System electronically individualizes a fingerprint. One Discrepancy Rule- a single difference in appearance between a latent print and a known fingerprint must preclude an identification unless the examiner has a valid explanation for the difference. Peer Investigative Pressure – other examiners or investigative information to influence a comparison Questionable Identification: Identification based on to few minutiae for the clarity of the image. Single Verification- Many state agencies use a single verification procedure on arrest card processing error.
THE SCIENCE OF FINGERPRINT IDENTIFICATION- Friction Ridge Identification is generally understood to be the individualization of the ridge detail found on  the end joints of the fingers, since those areas are taken for record and/or filing purposes. The technique of identifying fingerprints is equally applicable to identifying any of the other ridged areas of the hand or foot  Sample of Training Module # 6
Importance of a correct individualization Thousands of fingerprint cards are processed and identified on a on a daily basis. Many  of the larger states process over a million fingerprint transactions in a year. Background  checks for non-criminal applications has been a major factor in the increased number  of fingerprint transactions processed at the local, state and federal levels. The  AFIS system produces suspects based on the degree of correlation between the minutiae  and its location on the search print with the suspect  information stored in the system  matchers. AFIS can produce suspects that are very similar to the images being searched and  not be an identification, since most fingerprints have between 75 and 150 points of  identification, a comparison of a ten print  transaction usually has more than enough  minutiae to insure an accurate individualization. Errors have occurred and for a number of  Reasons: High volumes of work                             Poor training                              Not adhering to policies and procedure While errors are infrequent the ramifications of an error can have devastating results.  The accuracy of local, state and federal fingerprint systems is based on competent capture  of fingerprint cards often captured by poorly trained and often underpaid individuals.
AMERICAN  INSTITUTE  OF APPLIED  SCIENCE The International Association for Identification in 1973 stated "No valid basis exists at this  time for requiring that a predetermined minimum number of friction ridge characteristics  must be present in two impressions in order to establish positive identification”. The basis of fingerprint identification is the premise that the configurations formed by the  raised ridges of the palmar surface of the hands are unique and do not undergo any natural  changes, except growth, from fetal life until decomposition. Individualization is the process  of comparing friction skin ridge impressions from fingers or palms to determine if the  impressions are from the same finger or palm. The flexibility of friction ridge skin means that  no two finger or palm prints are ever exactly alike (never identical in every detail), even two  impressions recorded immediately after each other. Fingerprint identification/individualization  occurs when an fingerprint examiner determines that two friction ridge impressions originated  from the same finger or palm  based on the agreement of friction ridge formations, in  sequence, having sufficient uniqueness. The sequential relationship of all elements must be the  same; the Print must be devoid of any unexplained discrepancy; there must be sufficient  uniqueness to individualize.  This element requires an assessment of both quality and quantity  of information contained in both the unknown print and the known exemplar." There must be  an agreement of fiction ridge formation. At a minimum, level one and level two detail must  correlate.  Level three detail can be used as necessary and is generally relied upon during the  comparison process, but commonly not during the identification  decision, unless the quantity  of level two detail is minimal and the quality of level three detail provides sufficient clarity."
Visual Component of Identification When a human looks at a number, letter or other shape, neurons in various areas of the  brain’s visual center respond to different components of that shape, almost instantaneously  fitting them together like a puzzle to create an image that the individual then “sees” and  understands. The eye lens, is perfectly clear, perfectly curved and is capable of focusing on an  incredible amount of data. But vision is only partly to do with the retina, lens, and cornea.  Understanding what we see, happens in the brain, which is why a person with perfect vision is  still susceptible to optical illusion. Our visual nervous system approximates color, shape, and  dimension. The process of seeing begins with the presence of light, an image formed on the  retina, and an impulse transmitted to the brain, but there are many other factors that play a  part in how we perceive visually. Our perceptions are influenced by our past experiences,  imagination, and associations. In  a tenth of a second, we can recognize something we see as  an animal or not. Studies show this immediate, rough impression probably depends on  recognizing just one or more individual parts of what we see. Fine discriminations – such as  recognizing individual faces – take longer to happen, and the studies suggests that this  delay  depends upon emerging signals for combinations of shape fragments. The brain has to  construct an internal representation of an object from disparate pieces.”
Example Visual Interpretation In the image to the right you could interpret it as a portrait  of an older man, but when you look closer you’ll see a  number of faces, images and silhouettes of faces. Why does  our mind interpret the images we see in this way?  The simple explanation is our mind assimilates the image  we see and compares it with information already stored in  our brain.  In a recent Cambridge University study it was  found that as long as the 1st. and last letters in a word were  correct it didn’t matter if the other letters were mixed, a  person could still read the paragraph or sentence correctly  interpreting what the writer meant.  An example of  how our  perceptions are influenced by our past experiences,  imagination, and associations  which can create a  dilemma when doing fingerprint comparisons. It is critical  you are objective when doing your analysis and evaluation  of ridge detail, you cannot expect to see something based  on past knowledge/experience. You have to work at being  completely objective. The best way to accomplish an  unbiased comparison is by following the analysis,  comparison, evaluation and validation procedure.
Objective Analysis When doing a fingerprint comparison your going to be asked to make an objective  decision based on what you see in front of you and not be influenced by subjective  reasoning. The brain will attempt to assist you in recognizing images, it could give you a  perception of something that is not there. How many of us read A Bird in the Bush, not noticing THE is repeated
Fingerprint Examiners are allowed to make positive identifications with: Appropriate Training Appropriate Experience Appropriate Ability Following agency policy. There is not a required minimum number of minutiae required for an experienced examiner to individualize a fingerprint comparison. Individual agencies may have policies and procedures on what they feel constitutes an individualization. In this training course I will require 12 points for identification, similar to Locard theory on identification. Requiring a set number of minutiae is a training aid, to insure the student understands the value of minutiae along with gaining  experience in minutiae analysis/comparison. The individuals taking this course may have no  or limited experience in the individualization of friction ridge detail. The average fingerprint contains between 75 and 150 points of identification and since we will be dealing with mostly very good images, a 12 point minimum will work well. I would encourage students during the training to exceed the minimum the course requires.
The Verification Process The process of making a fingerprint comparison  between a search fingerprint image and the  suspect fingerprint image. Whether you are  doing a comparison of one (1) image or  multiple fingers the process is always the same: Analysis Comparison Evaluation  Validation process
Referred to as the Scientific Method of fingerprint individualization. ,[object Object]
Comparison  – to examine the attributes observed during analysis in order to determine agreement or discrepancies between two friction ridge impressions. 
Evaluation –   the cyclical procedure of comparison between two friction ridge impressions to effect a decision, i.e., made by the same friction skin, not made by the same friction skin, or insufficient detail to form a conclusive decision. 

Contenu connexe

Tendances

Background Screening Presentation 2011
Background Screening Presentation 2011Background Screening Presentation 2011
Background Screening Presentation 2011poseyjj
 
Face Recognition report
Face Recognition reportFace Recognition report
Face Recognition reportlavanya693
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisFraudBusters
 
New CFPB Forms & FCRA Overview Webinar
New CFPB Forms & FCRA Overview WebinarNew CFPB Forms & FCRA Overview Webinar
New CFPB Forms & FCRA Overview WebinarMike McCarty
 
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS  An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS Animetrics
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technologyusha2016
 
Final parkin orendac background screening
Final  parkin orendac background screeningFinal  parkin orendac background screening
Final parkin orendac background screeningStephenZiemkowski
 

Tendances (8)

Frs
FrsFrs
Frs
 
Background Screening Presentation 2011
Background Screening Presentation 2011Background Screening Presentation 2011
Background Screening Presentation 2011
 
Face Recognition report
Face Recognition reportFace Recognition report
Face Recognition report
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 
New CFPB Forms & FCRA Overview Webinar
New CFPB Forms & FCRA Overview WebinarNew CFPB Forms & FCRA Overview Webinar
New CFPB Forms & FCRA Overview Webinar
 
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS  An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Final parkin orendac background screening
Final  parkin orendac background screeningFinal  parkin orendac background screening
Final parkin orendac background screening
 

En vedette

History of Friction Ridge Identification
History of Friction Ridge IdentificationHistory of Friction Ridge Identification
History of Friction Ridge IdentificationHeather
 
Reconstruction of fingerprints
Reconstruction of fingerprintsReconstruction of fingerprints
Reconstruction of fingerprintsJuhi Khandelwal
 
Latent Fingerprint Individualization
Latent Fingerprint IndividualizationLatent Fingerprint Individualization
Latent Fingerprint IndividualizationRmcauley
 
Leading Fingerprint Evidence in Trinidad and Tobago
Leading Fingerprint Evidence in Trinidad and TobagoLeading Fingerprint Evidence in Trinidad and Tobago
Leading Fingerprint Evidence in Trinidad and TobagoBrent Winter
 
Friction ridge analysis
Friction ridge analysisFriction ridge analysis
Friction ridge analysisdurhamls
 
conventional methods of fingerprint development
conventional methods of fingerprint developmentconventional methods of fingerprint development
conventional methods of fingerprint developmentfaraharooj
 
Introduction to Fingerprints
Introduction to FingerprintsIntroduction to Fingerprints
Introduction to FingerprintsCtantoco
 
Crime Scene Basics PowerPoint
Crime Scene Basics PowerPointCrime Scene Basics PowerPoint
Crime Scene Basics PowerPointts0001718
 
Basic Fingerprints Classification And Analysis
Basic Fingerprints Classification And AnalysisBasic Fingerprints Classification And Analysis
Basic Fingerprints Classification And Analysisheremi
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System123456chan
 
Taking Legible Fingerprints
Taking Legible FingerprintsTaking Legible Fingerprints
Taking Legible FingerprintsJury Rocamora
 
Fingerprint Classification - Arch Patterns
Fingerprint Classification - Arch PatternsFingerprint Classification - Arch Patterns
Fingerprint Classification - Arch PatternsJury Rocamora
 
Expert Witness Testimony 2
Expert Witness Testimony 2Expert Witness Testimony 2
Expert Witness Testimony 2warren142
 
Fingerprint Classification- Loop Patterns
Fingerprint Classification- Loop PatternsFingerprint Classification- Loop Patterns
Fingerprint Classification- Loop PatternsJury Rocamora
 
Fingerprint Evidence
Fingerprint EvidenceFingerprint Evidence
Fingerprint Evidencemalababoy
 

En vedette (20)

History of Friction Ridge Identification
History of Friction Ridge IdentificationHistory of Friction Ridge Identification
History of Friction Ridge Identification
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
Setting Up Your iPad for Use in Court
Setting Up Your iPad for Use in CourtSetting Up Your iPad for Use in Court
Setting Up Your iPad for Use in Court
 
History of Fingerprints
History of FingerprintsHistory of Fingerprints
History of Fingerprints
 
Reconstruction of fingerprints
Reconstruction of fingerprintsReconstruction of fingerprints
Reconstruction of fingerprints
 
Latent Fingerprint Individualization
Latent Fingerprint IndividualizationLatent Fingerprint Individualization
Latent Fingerprint Individualization
 
Leading Fingerprint Evidence in Trinidad and Tobago
Leading Fingerprint Evidence in Trinidad and TobagoLeading Fingerprint Evidence in Trinidad and Tobago
Leading Fingerprint Evidence in Trinidad and Tobago
 
Friction ridge analysis
Friction ridge analysisFriction ridge analysis
Friction ridge analysis
 
conventional methods of fingerprint development
conventional methods of fingerprint developmentconventional methods of fingerprint development
conventional methods of fingerprint development
 
Introduction to Fingerprints
Introduction to FingerprintsIntroduction to Fingerprints
Introduction to Fingerprints
 
Crime Scene Basics PowerPoint
Crime Scene Basics PowerPointCrime Scene Basics PowerPoint
Crime Scene Basics PowerPoint
 
Classification
ClassificationClassification
Classification
 
Basic Fingerprints Classification And Analysis
Basic Fingerprints Classification And AnalysisBasic Fingerprints Classification And Analysis
Basic Fingerprints Classification And Analysis
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Taking Legible Fingerprints
Taking Legible FingerprintsTaking Legible Fingerprints
Taking Legible Fingerprints
 
Fingerprint Classification - Arch Patterns
Fingerprint Classification - Arch PatternsFingerprint Classification - Arch Patterns
Fingerprint Classification - Arch Patterns
 
Expert Witness Testimony 2
Expert Witness Testimony 2Expert Witness Testimony 2
Expert Witness Testimony 2
 
Fingerprint Classification- Loop Patterns
Fingerprint Classification- Loop PatternsFingerprint Classification- Loop Patterns
Fingerprint Classification- Loop Patterns
 
Whorl Patterns
Whorl PatternsWhorl Patterns
Whorl Patterns
 
Fingerprint Evidence
Fingerprint EvidenceFingerprint Evidence
Fingerprint Evidence
 

Similaire à Seminar, Webinars and Training available from Forensic Biometric Identification Solutions LLC

Cd For Attorneys
Cd For AttorneysCd For Attorneys
Cd For AttorneysRmcauley
 
Unidentified Latent Images
Unidentified Latent ImagesUnidentified Latent Images
Unidentified Latent ImagesRmcauley
 
Steven Greschner Biography
Steven Greschner BiographySteven Greschner Biography
Steven Greschner BiographyNextNet Partners
 
Automated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsAutomated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsRmcauley
 
No Nalue Latent Images
No Nalue Latent ImagesNo Nalue Latent Images
No Nalue Latent ImagesRmcauley
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial RecognitionJennifer York
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxBHARATHGOWDAHA
 
Synthetic ID Fraud DetectionFINAL
Synthetic ID Fraud DetectionFINALSynthetic ID Fraud DetectionFINAL
Synthetic ID Fraud DetectionFINALSally Ewalt
 
Background check misconceptions 5 12 15
Background check misconceptions  5 12 15Background check misconceptions  5 12 15
Background check misconceptions 5 12 15wbrownsureid
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)sachin yadav
 
Data Facts Employment Screening Services
Data Facts Employment Screening ServicesData Facts Employment Screening Services
Data Facts Employment Screening Servicesheathermelissa
 
FADV_Its a Crime Guide 4 09 25 14
FADV_Its a Crime Guide 4 09 25 14FADV_Its a Crime Guide 4 09 25 14
FADV_Its a Crime Guide 4 09 25 14Kerri Lorch
 
Criminal Record Checks: Relevance Is Key
Criminal Record Checks: Relevance Is KeyCriminal Record Checks: Relevance Is Key
Criminal Record Checks: Relevance Is KeyAIS International Group
 
C:\Documents And Settings\Jferral\Desktop\Roe Temps\Fingerprint Department\Fi...
C:\Documents And Settings\Jferral\Desktop\Roe Temps\Fingerprint Department\Fi...C:\Documents And Settings\Jferral\Desktop\Roe Temps\Fingerprint Department\Fi...
C:\Documents And Settings\Jferral\Desktop\Roe Temps\Fingerprint Department\Fi...ROE14
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?Kavika Roy
 
Facial recognition systems
Facial  recognition  systemsFacial  recognition  systems
Facial recognition systemstom12thomas
 
Facial recognition e-skills assignment
Facial recognition e-skills assignmentFacial recognition e-skills assignment
Facial recognition e-skills assignmentMagalyLippens
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey FireEye, Inc.
 

Similaire à Seminar, Webinars and Training available from Forensic Biometric Identification Solutions LLC (20)

Cd For Attorneys
Cd For AttorneysCd For Attorneys
Cd For Attorneys
 
Unidentified Latent Images
Unidentified Latent ImagesUnidentified Latent Images
Unidentified Latent Images
 
Steven Greschner Biography
Steven Greschner BiographySteven Greschner Biography
Steven Greschner Biography
 
Automated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsAutomated Fingerprint Identification Systems
Automated Fingerprint Identification Systems
 
No Nalue Latent Images
No Nalue Latent ImagesNo Nalue Latent Images
No Nalue Latent Images
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial Recognition
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Synthetic ID Fraud DetectionFINAL
Synthetic ID Fraud DetectionFINALSynthetic ID Fraud DetectionFINAL
Synthetic ID Fraud DetectionFINAL
 
Background check misconceptions 5 12 15
Background check misconceptions  5 12 15Background check misconceptions  5 12 15
Background check misconceptions 5 12 15
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Kenya AMC Presentation 2
Kenya AMC Presentation 2Kenya AMC Presentation 2
Kenya AMC Presentation 2
 
Data Facts Employment Screening Services
Data Facts Employment Screening ServicesData Facts Employment Screening Services
Data Facts Employment Screening Services
 
FADV_Its a Crime Guide 4 09 25 14
FADV_Its a Crime Guide 4 09 25 14FADV_Its a Crime Guide 4 09 25 14
FADV_Its a Crime Guide 4 09 25 14
 
Criminal Record Checks: Relevance Is Key
Criminal Record Checks: Relevance Is KeyCriminal Record Checks: Relevance Is Key
Criminal Record Checks: Relevance Is Key
 
C:\Documents And Settings\Jferral\Desktop\Roe Temps\Fingerprint Department\Fi...
C:\Documents And Settings\Jferral\Desktop\Roe Temps\Fingerprint Department\Fi...C:\Documents And Settings\Jferral\Desktop\Roe Temps\Fingerprint Department\Fi...
C:\Documents And Settings\Jferral\Desktop\Roe Temps\Fingerprint Department\Fi...
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
Facial recognition systems
Facial  recognition  systemsFacial  recognition  systems
Facial recognition systems
 
Facial recognition e-skills assignment
Facial recognition e-skills assignmentFacial recognition e-skills assignment
Facial recognition e-skills assignment
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 

Seminar, Webinars and Training available from Forensic Biometric Identification Solutions LLC

  • 1. Fingerprint Seminar and Training Programspresented by Forensic Biometric Identification Solutions LLC. http://www.fingerprintconsultingservices.com/ Why choose Forensic Biometric Identification Solutions LLC. Seminars or Training : Cost 60% cheaper than similar training programs currently on the market. Training available to everyone ; civilian or law enforcement. No Travel Costs No Per Diem On-line training program is flexible and will fit into your schedule. Equivalent of 40 hr. basic fingerprint course offered by many state and federal agencies. Our company brings forty years (40) fingerprint experience at both the state / local level This presentation is just a sample of the topics covered in our Seminar/Training programs. Additionally our company can evaluate all areas of fingerprint case work to include expert testimony at reasonable rates.
  • 2. Some Common Error’s found in the Fingerprint Process Fingerprint search Missed Identification. Erroneous Bad Identification. Questionable Identification. Latent not thoroughly searched in automated fingerprint system. Latent image quality initial analysis incorrect. Latent images destroyed based on incorrect quality analysis. Criminal History contains erroneous criminal events. Latent image processing enhancement issue’s. The above issue’s are discussed and explained in detail, in our seminar and/or training program
  • 3. “Justice denied anywhere diminishes justice everywhere ”Martin Luther King Jr. Forensic Biometric Identification Solutions LLC. has developed a seminar and a basic fingerprint training program that could benefit everyone in the legal community. As you have seen over the past few years, there have been a number of high profile cases where fingerprint errors have resulted in the wrongful incarceration of an individual. These incidents are not as isolated as once thought , the Innocence Project has now cleared over 250 cases of individuals wrongfully incarcerated, based on flawed forensic evidence. Every time one of these cases is discovered different solutions are proposed as a means of preventing future occurrence ‘s they range from certification programs to re-evaluating the discipline. The problem with the solutions are they don’t prevent the future occurrence of error, if we look at the judicial process already in place the solution is already available; our adversarial judicial process . The ability for the prosecution and defense to bring in an expert to evaluate the forensic evidence and explain the results of their analysis to the court. The ability to have fingerprint evidence evaluated by an unbiased 3rd. party is the most effective tool for minimizing missed and incorrect fingerprint identifications. The seminar and training programs offered our company are designed to give you or your staff a better understanding of fingerprint evidence and when or if a latent fingerprint examiner should be engaged. The benefits from our seminar or basic fingerprint training course would be a great tool just as useful to a county attorney as it would to a defense attorney.
  • 4. Erroneous Identification Today the automated systems are searching unidentified latent images against databases containing as many as 600 million fingerprint images. These automated systems produce a large number of identifications, unfortunately a large number of suspects with similar minutiae and minutiae orientation to the latent image being searched. When you factor in the lack of clarity and distortion in most latent images, you can understand why you are seeing more erroneous identifications. This is just 1 of the possible reasons for an erroneous identification, in the seminar/course we go into more detail and the other common causes of an erroneous identification. There is no research that gives us an idea on how many  bad identifications are not being discovered and corrected.
  • 5. Missed Identification A much more common problem are missed identifications. A missed identification occurs when the latent image is searched and the examiner fails to identify the latent image to the exemplar on file in the database. Many examiners feel a miss is not as serious as a bad identification, which is a misconception. If latent images are developed at the crime scene the ability to identify the latent images may be the only physical evidence associating or clearing an individual from that case, so it is critical that all latent's be identified.
  • 6. Understanding the Automated Fingerprint Identification National Institute of Standards and Technology (NIST) a few years back tested the search accuracy of the major AFIS vendors and discovered an accuracy rate of between 54% and 85%. This means that a latent image could be put in for a search and the exemplar could be in the database and the system not produce it high enough on the suspect list to have a latent examiner make a comparison. There are many cases where the latent had to be entered multiple times before the suspect was produced and an identification was completed. As an attorney on a case with unidentified latent images it is important to know how many times the latent's were searched in the automated system with a good understanding of the latent image quality.
  • 7. Training and Proficiency More critical than certification are the training and proficiency testing procedures an agency has in place. Many agencies because of budget or a lack of understanding of the skill sets required for a latent fingerprint examiner, do not have qualified and properly trained latent examiners.
  • 8.
  • 9. Typical latent fingerprint has between 15 and 35 minutiae (points of identification).
  • 10. Typical inked fingerprint contains between 75 and 175 minutiae (points of identification).
  • 11. latent images recovered from crime scenes are of poor clarity, increasing the likelihood of mistaking the type of minutiae being observed.
  • 12. 30% of crime scenes have usable latent images.
  • 13. 30% of the images from a crime scene are palm images.
  • 14. A palm print has approximately 800 minutiae (points of identification).
  • 15. 20% of identifications at local lab's are now generated by the automated fingerprint search system.
  • 16.
  • 17. Glossary of Terms Bad Identification – examiner identifies a latent to the wrong tenprint card. Backward Bias – examiners’ interpretation of some features is adjusted or influenced by reasoning “backward” from features that were visible in Mayfield’s known prints. Confirmation Bias- focusing on minutiae that confirms pre-conceived expectations while ignoring data that doesn't confirm ones beliefs. Lights out functionality- System electronically individualizes a fingerprint. One Discrepancy Rule- a single difference in appearance between a latent print and a known fingerprint must preclude an identification unless the examiner has a valid explanation for the difference. Peer Investigative Pressure – other examiners or investigative information to influence a comparison Questionable Identification: Identification based on to few minutiae for the clarity of the image. Single Verification- Many state agencies use a single verification procedure on arrest card processing error.
  • 18. THE SCIENCE OF FINGERPRINT IDENTIFICATION- Friction Ridge Identification is generally understood to be the individualization of the ridge detail found on the end joints of the fingers, since those areas are taken for record and/or filing purposes. The technique of identifying fingerprints is equally applicable to identifying any of the other ridged areas of the hand or foot Sample of Training Module # 6
  • 19. Importance of a correct individualization Thousands of fingerprint cards are processed and identified on a on a daily basis. Many of the larger states process over a million fingerprint transactions in a year. Background checks for non-criminal applications has been a major factor in the increased number of fingerprint transactions processed at the local, state and federal levels. The AFIS system produces suspects based on the degree of correlation between the minutiae and its location on the search print with the suspect information stored in the system matchers. AFIS can produce suspects that are very similar to the images being searched and not be an identification, since most fingerprints have between 75 and 150 points of identification, a comparison of a ten print transaction usually has more than enough minutiae to insure an accurate individualization. Errors have occurred and for a number of Reasons: High volumes of work Poor training Not adhering to policies and procedure While errors are infrequent the ramifications of an error can have devastating results. The accuracy of local, state and federal fingerprint systems is based on competent capture of fingerprint cards often captured by poorly trained and often underpaid individuals.
  • 20. AMERICAN INSTITUTE OF APPLIED SCIENCE The International Association for Identification in 1973 stated "No valid basis exists at this time for requiring that a predetermined minimum number of friction ridge characteristics must be present in two impressions in order to establish positive identification”. The basis of fingerprint identification is the premise that the configurations formed by the raised ridges of the palmar surface of the hands are unique and do not undergo any natural changes, except growth, from fetal life until decomposition. Individualization is the process of comparing friction skin ridge impressions from fingers or palms to determine if the impressions are from the same finger or palm. The flexibility of friction ridge skin means that no two finger or palm prints are ever exactly alike (never identical in every detail), even two impressions recorded immediately after each other. Fingerprint identification/individualization occurs when an fingerprint examiner determines that two friction ridge impressions originated from the same finger or palm based on the agreement of friction ridge formations, in sequence, having sufficient uniqueness. The sequential relationship of all elements must be the same; the Print must be devoid of any unexplained discrepancy; there must be sufficient uniqueness to individualize.  This element requires an assessment of both quality and quantity of information contained in both the unknown print and the known exemplar." There must be an agreement of fiction ridge formation. At a minimum, level one and level two detail must correlate.  Level three detail can be used as necessary and is generally relied upon during the comparison process, but commonly not during the identification  decision, unless the quantity of level two detail is minimal and the quality of level three detail provides sufficient clarity."
  • 21. Visual Component of Identification When a human looks at a number, letter or other shape, neurons in various areas of the brain’s visual center respond to different components of that shape, almost instantaneously fitting them together like a puzzle to create an image that the individual then “sees” and understands. The eye lens, is perfectly clear, perfectly curved and is capable of focusing on an incredible amount of data. But vision is only partly to do with the retina, lens, and cornea. Understanding what we see, happens in the brain, which is why a person with perfect vision is still susceptible to optical illusion. Our visual nervous system approximates color, shape, and dimension. The process of seeing begins with the presence of light, an image formed on the retina, and an impulse transmitted to the brain, but there are many other factors that play a part in how we perceive visually. Our perceptions are influenced by our past experiences, imagination, and associations. In a tenth of a second, we can recognize something we see as an animal or not. Studies show this immediate, rough impression probably depends on recognizing just one or more individual parts of what we see. Fine discriminations – such as recognizing individual faces – take longer to happen, and the studies suggests that this delay depends upon emerging signals for combinations of shape fragments. The brain has to construct an internal representation of an object from disparate pieces.”
  • 22. Example Visual Interpretation In the image to the right you could interpret it as a portrait of an older man, but when you look closer you’ll see a number of faces, images and silhouettes of faces. Why does our mind interpret the images we see in this way? The simple explanation is our mind assimilates the image we see and compares it with information already stored in our brain. In a recent Cambridge University study it was found that as long as the 1st. and last letters in a word were correct it didn’t matter if the other letters were mixed, a person could still read the paragraph or sentence correctly interpreting what the writer meant. An example of how our perceptions are influenced by our past experiences, imagination, and associations which can create a dilemma when doing fingerprint comparisons. It is critical you are objective when doing your analysis and evaluation of ridge detail, you cannot expect to see something based on past knowledge/experience. You have to work at being completely objective. The best way to accomplish an unbiased comparison is by following the analysis, comparison, evaluation and validation procedure.
  • 23. Objective Analysis When doing a fingerprint comparison your going to be asked to make an objective decision based on what you see in front of you and not be influenced by subjective reasoning. The brain will attempt to assist you in recognizing images, it could give you a perception of something that is not there. How many of us read A Bird in the Bush, not noticing THE is repeated
  • 24. Fingerprint Examiners are allowed to make positive identifications with: Appropriate Training Appropriate Experience Appropriate Ability Following agency policy. There is not a required minimum number of minutiae required for an experienced examiner to individualize a fingerprint comparison. Individual agencies may have policies and procedures on what they feel constitutes an individualization. In this training course I will require 12 points for identification, similar to Locard theory on identification. Requiring a set number of minutiae is a training aid, to insure the student understands the value of minutiae along with gaining experience in minutiae analysis/comparison. The individuals taking this course may have no or limited experience in the individualization of friction ridge detail. The average fingerprint contains between 75 and 150 points of identification and since we will be dealing with mostly very good images, a 12 point minimum will work well. I would encourage students during the training to exceed the minimum the course requires.
  • 25. The Verification Process The process of making a fingerprint comparison between a search fingerprint image and the suspect fingerprint image. Whether you are doing a comparison of one (1) image or multiple fingers the process is always the same: Analysis Comparison Evaluation Validation process
  • 26.
  • 27. Comparison – to examine the attributes observed during analysis in order to determine agreement or discrepancies between two friction ridge impressions. 
  • 28. Evaluation –   the cyclical procedure of comparison between two friction ridge impressions to effect a decision, i.e., made by the same friction skin, not made by the same friction skin, or insufficient detail to form a conclusive decision. 
  • 29. Validation- It is highly recommended that all fingerprint identifications be validated by 2nd. examiner or electronically in an AFIS.  
  • 30. Only possible results from a fingerprint comparison You will come to one of the following conclusions: The fingerprint images an Individualization (Identification). The fingerprint images are not from the same individual. An individualization cannot be made due to the quality or lack of detail of one(1) or more images. If you cannot verify an identification it is considered a non-ident. One other note, another examiner could come to a different conclusion because the image quality is often a subjective determination. Latent examiners like all professions have some very good examiners and many that lack experience and the skill sets required.
  • 31.
  • 32. Level 2 detail -- Ridge formations (ridge endings, bifurcations, dots, or combinations thereof)
  • 33. Level 3 detail -- Ridge path deviation (ridge structure or formation, which includes ridge width, shape, pores and other details) Level I detail is the pattern and ridge flow. As an examiner looks at the pattern type and observes the ridge flow, they can gather a lot of helpful information for use in your comparison. All the information gathered will help them determine when to take a closer look at a suspect. You could consider the Level I detail as your 1st. filter. The individualization is established by the Level II (minutiae) detail.
  • 34. Minutiae Detail Suspect Image Search Image
  • 35. The next few slide deal with the Mayfield Case Most of you are aware of the case of the Oregon Attorney whose fingerprint was identified to a latent image the Spanish police developed in the Madrid bombing. The case was evaluated by four(4) experienced latent examiners three (3) from the FBI and one (1) retired from San Francisco PD. All four (4) came to an incorrect identification to Mayfield. In the identification report the FBI noted 10 points of level II detail and 7 points of Level III detail. In a follow up report investigating the error the following slides discuss some of the reasons given for the error. I would also point out Mayfield was developed as a suspect based on an AFIS search. The search compared his finger to close to 600 million fingers in the database and while not the same there were some similarities. That said there is no reason the error should have occurred. I would also point out that if the Spanish examiners had not strongly disagreed with their FBI counterparts Mr. Mayfield would’ve been convicted based on the fingerprint. In a seminar or training situation we will go into these causes for the error in more detail. Our seminar/training program will assist you in insuring the fingerprint evidence in your case is accurate and reliable.
  • 36. THE ONE(1) DISCREPANCY RULE#1 Every examiner knows, search and exemplar (database) images are never exactly the same. The reasons are many; how the exemplar was recorded or temporary or permanent damage to the fingers, etc. The fingerprint examiner during the analysis and evaluation must be able to understand and explain any discrepant points found in either the search or exemplar images. The 1 discrepancy rule , if there is 1 unexplainable discrepancy in either the search or exemplar image an individualization cannot be made. These images are from the same card the rolled and plain impression of the right thumb.
  • 37. SIMILARITY OF MINUTIAE CONSTELLATIONS #2 The 2nd. major area of concern is suspect images produced in today’s automated fingerprint systems often have very similar constellations or points of similarity. Despite the unusual similarity in the relationship between points in many prints, the prints may not be a fingerprint identification. The enormous size of today’s AFIS databases and the power of the search algorithms can find a confusingly similar print to the one being searched. As databases increase and algorithms improve, there will be more suspects produced, that will have unusual similarity between points but will not be the individuals print. So can this type of error be prevented ? The answer is “yes” we can minimize the numbers of these type errors with good training and adherence to procedure.
  • 38. BACKWARD BIAS#3 The 3rd. Area of concern is when an examiner uses "backward " reasoning. In effect allowing themselves to be influenced by the search print, working backward from the suspect print. The examiners will find features in the print being searched and then look for them in the image being searched. The danger is in poor quality images murky or ambiguous points may be erroneously identified. When an examiner is dealing with a poor quality latent that lacks clarity, it is tempting to look at the exemplar and work backward but it can have disastrous results.
  • 39. OVER RELIANCE LEVEL III DETAIL#4 To much reliance on Level III detail. Level III detail can include a number of things from ridge shape and pores to scars and this information can be beneficial in individualization when properly used. While level III detail can be helpful, it becomes less helpful as clarity decreases. Latent images by their very nature are normally images that lack clarity and when Level III detail is used with a poor quality often distorted image problems can occur.
  • 40. If you have any questions please contact us: Phone: 402 321-3933 or 402 717-9013 E-Mail: fbis@cox.net Mail: P.O. Box 562 Boys Town NE 68010-0562 Web sites: http://www.linkedin.com/in/fingerprintconsultingservices http://www.fingerprintconsultingservices.com