SlideShare ist ein Scribd-Unternehmen logo
1 von 14
The History of Fingerprinting
Fingerprints
• Since the beginnings of criminal investigation,
police have sought an infallible means of human
identification. The first systematic attempt at
personal identification was devised and
introduced by a French police expert, Alphonse
Bertillon, in 1883. The Bertillon system relied on
a detailed description (portrait parlé) of the
subject, combined with full-length and profile
photographs and a system of precise body
measurements known as anthropometry.
Alphonse Bertillon
1853-1914 The use of anthropometry as a method
of identification rested on the premise
that the dimensions of the human bone
system remained fixed from age 20 until
death. Skeleton sizes were thought to be
so extremely diverse that no two
individuals could have exactly the same
measurements.
• For two decades, this system was considered
the most accurate method of identification,
but in the early years of the 20th century,
police began to appreciate and accept a
system of identification based on the
classification of finger ridge patterns known as
fingerprints. Today, the fingerprint is the pillar
of modern criminal investigation.
The Early Use of Fingerprinting
• The Chinese used fingerprints to sign legal
documents as far back as three thousand years
ago. Whether this practice was performed for
ceremonial custom or as a means of personal
identity remains a point of conjecture lost to
history. In any case, the examples of
fingerprinting in ancient history are ambiguous,
and the few that exist did not contribute to the
development of fingerprinting techniques as we
know them today.
The Early Use of Fingerprinting
• Sir William Hershel: Several years before
Bertillon began work on his system, William
Herschel, and English civil servant stationed in
India, started requiring natives to sign contracts
with the imprint of their right hand, which was
pressed against a stamp pad for the purpose.
The motives for Herschel’s requirement remain
unclear; he may have envisioned fingerprinting
as a means of personal identification or just as
a form of the Hindu custom that a trace of
bodily contact was more binding than a
signature on a contract. In any case, he did not
publish anything about his activities until after a
Scottish physician, Henry Fauld, working in a
hospital in Japan, published his views on the
potential application of fingerprinting to
personal identification.
The Early Use of Fingerprinting
• Henry Fauld: In 1880 Fauld suggested
that skin ridge patterns could be
important for the identification of
criminals. He told about a thief who
left his fingerprint on a whitewashed
wall, and how in comparing these prints
with those of a suspect, he found that
they were quite different. A few days
later, another suspect was found whose
fingerprints compared with those on
the wall. When confronted with this
evidence, the individual confessed to
the crime.
• Fauld was convinced that fingerprints
furnished infallible proof of identification. He
even offered to set up at his own expense a
fingerprint bureau at Scotland Yard to test the
practicality of the method. But his offered
was rejected in favor of the Bertillon System.
This decision was reversed less than two
decades later.
Early Classification of Fingerprints
• Extensive research into
fingerprinting conducted by
Sir Francis Galton provided
the needed impetus that
made police agencies aware
of its potential application.
In 1892, Galton published his
classic textbook Finger Prints,
the first book of its kind on
the subject. In his book,
Galton discussed the
anatomy of fingerprints and
suggested methods for
recording them.
Early Classification of Fingerprints
• Galton also proposed assigning
fingerprints to three pattern
types – loops, arches, and whorls.
Most important, the book
demonstrated that no two prints
are identical and that an
individual’s prints remain
unchanged from year to year. At
Galton’s insistence, the British
government adopted
fingerprinting as a supplement to
the Bertillon system.
Early Classification of Fingerprints
• The next step in the development
of fingerprint technology was the
creation of classifications systems
capable of filing thousands of
prints in a logical and searchable
sequence. Dr. Juan Vucetich, a
police officer from Argentina who
was fascinated by Galton’s work,
devised a workable concept in
1891. His classification system has
been refined over the years and is
still widely used today in most
Spanish-speaking countries.
• In 1897, another classification
system was proposed by an
Englishman, Sir Edward
Richard Henry. Four years
later, Henry’s system was
adopted by Scotland Yard.
Today, most English-speaking
countries, including the United
States, use some version of
Henry’s classification system to
file fingerprints.
• Early in the 20th century, Bertillon’s measurement system
began to fall into disfavor. Its results were highly
susceptible to error, particularly when the measurements
were taken by people who were not thoroughly trained.
The method was dealt its most severe and notable setback
in 1903 when a convict, Will West, arrived at Fort
Leavenworth prison. A routine check of the prison files
startlingly revealed that a William West, already in the
prison, could not be distinguished from the new prisoner
by body measurements or even by photographs. In fact,
the two men looked just like twins, and their
measurements were practically the same. Subsequently,
fingerprints of the prisoners clearly distinguished them.
• In the United States, the first systematic and
official use of fingerprints for personal
identification was adopted by the New York
City Civil Service Commission in 1901. The
method was used for certifying all civil service
applications. Several American police officials
received instruction in fingerprint
identification at the 1904 World’s Fair in St.
Louis, Missouri from representatives from
Scotland Yard.

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Fingerprints
FingerprintsFingerprints
Fingerprints
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
ESDA
ESDAESDA
ESDA
 
Poroscopy and edgeoscopy
Poroscopy and edgeoscopyPoroscopy and edgeoscopy
Poroscopy and edgeoscopy
 
The polygraph test
The polygraph testThe polygraph test
The polygraph test
 
Age of documents (Questioned Document)
Age of  documents (Questioned Document)Age of  documents (Questioned Document)
Age of documents (Questioned Document)
 
Glass fracture
Glass fracture Glass fracture
Glass fracture
 
History of Fingerprints
History of FingerprintsHistory of Fingerprints
History of Fingerprints
 
restoration of toolmarks
restoration of toolmarksrestoration of toolmarks
restoration of toolmarks
 
influence of writing instrument on handwriting
influence of writing instrument on handwritinginfluence of writing instrument on handwriting
influence of writing instrument on handwriting
 
Video Spectral Comparator
Video Spectral ComparatorVideo Spectral Comparator
Video Spectral Comparator
 
Forensic analysis of foot wear impression
Forensic analysis of foot wear impressionForensic analysis of foot wear impression
Forensic analysis of foot wear impression
 
POROSCOPY AND EDGEOSCOPY
POROSCOPY AND EDGEOSCOPYPOROSCOPY AND EDGEOSCOPY
POROSCOPY AND EDGEOSCOPY
 
Internal ballistics
Internal ballisticsInternal ballistics
Internal ballistics
 
Forensic analysis of tool marks
Forensic analysis of tool marksForensic analysis of tool marks
Forensic analysis of tool marks
 
Fingerprints and ridge characteristics
Fingerprints and ridge characteristicsFingerprints and ridge characteristics
Fingerprints and ridge characteristics
 
Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
TOOL MARKS
TOOL MARKSTOOL MARKS
TOOL MARKS
 
conventional methods of fingerprint development
 conventional methods of fingerprint development conventional methods of fingerprint development
conventional methods of fingerprint development
 

Andere mochten auch

Interview and interrogation_powerpoint
Interview and interrogation_powerpointInterview and interrogation_powerpoint
Interview and interrogation_powerpointDakota Boswell
 
Chapter 1 -_criminal_justice
Chapter 1 -_criminal_justiceChapter 1 -_criminal_justice
Chapter 1 -_criminal_justiceDakota Boswell
 
Reference samples presentation
Reference samples presentationReference samples presentation
Reference samples presentationDakota Boswell
 
Bill of rights and amendments
Bill of rights and amendments Bill of rights and amendments
Bill of rights and amendments Dakota Boswell
 
Techmical skills assessment review
Techmical skills assessment reviewTechmical skills assessment review
Techmical skills assessment reviewDakota Boswell
 
Crime why-and_how_much
Crime  why-and_how_muchCrime  why-and_how_much
Crime why-and_how_muchDakota Boswell
 
Jon benet ramsey powerpoint
Jon benet ramsey powerpointJon benet ramsey powerpoint
Jon benet ramsey powerpointDakota Boswell
 
Microscopes and microscopy
Microscopes and microscopyMicroscopes and microscopy
Microscopes and microscopyDakota Boswell
 
The role of the forensic anthropologist
The role of the forensic anthropologistThe role of the forensic anthropologist
The role of the forensic anthropologistDakota Boswell
 
Bloodstain pattern interpretation
Bloodstain pattern interpretationBloodstain pattern interpretation
Bloodstain pattern interpretationDakota Boswell
 
Fundamentals of fingerprinting
Fundamentals of fingerprintingFundamentals of fingerprinting
Fundamentals of fingerprintingDakota Boswell
 

Andere mochten auch (14)

Interview and interrogation_powerpoint
Interview and interrogation_powerpointInterview and interrogation_powerpoint
Interview and interrogation_powerpoint
 
Chapter 1 -_criminal_justice
Chapter 1 -_criminal_justiceChapter 1 -_criminal_justice
Chapter 1 -_criminal_justice
 
Drugs
DrugsDrugs
Drugs
 
Reference samples presentation
Reference samples presentationReference samples presentation
Reference samples presentation
 
Bill of rights and amendments
Bill of rights and amendments Bill of rights and amendments
Bill of rights and amendments
 
Techmical skills assessment review
Techmical skills assessment reviewTechmical skills assessment review
Techmical skills assessment review
 
Crime why-and_how_much
Crime  why-and_how_muchCrime  why-and_how_much
Crime why-and_how_much
 
Jon benet ramsey powerpoint
Jon benet ramsey powerpointJon benet ramsey powerpoint
Jon benet ramsey powerpoint
 
Victimology
VictimologyVictimology
Victimology
 
Forensic serology
Forensic serologyForensic serology
Forensic serology
 
Microscopes and microscopy
Microscopes and microscopyMicroscopes and microscopy
Microscopes and microscopy
 
The role of the forensic anthropologist
The role of the forensic anthropologistThe role of the forensic anthropologist
The role of the forensic anthropologist
 
Bloodstain pattern interpretation
Bloodstain pattern interpretationBloodstain pattern interpretation
Bloodstain pattern interpretation
 
Fundamentals of fingerprinting
Fundamentals of fingerprintingFundamentals of fingerprinting
Fundamentals of fingerprinting
 

Ähnlich wie History of fingerprinting

PERSONAL-IDENTIFICATION-CHAPTER-1-1.pptx
PERSONAL-IDENTIFICATION-CHAPTER-1-1.pptxPERSONAL-IDENTIFICATION-CHAPTER-1-1.pptx
PERSONAL-IDENTIFICATION-CHAPTER-1-1.pptxCastroMarcoAngelo
 
1._Introduction_to_Personal_Identification.pdf
1._Introduction_to_Personal_Identification.pdf1._Introduction_to_Personal_Identification.pdf
1._Introduction_to_Personal_Identification.pdfArhakirAlpapara
 
Forensic science 2011
Forensic science 2011Forensic science 2011
Forensic science 2011Bruno Mmassy
 
1.2--POWERPOINT--History_of_Forensics.pptx
1.2--POWERPOINT--History_of_Forensics.pptx1.2--POWERPOINT--History_of_Forensics.pptx
1.2--POWERPOINT--History_of_Forensics.pptxPlutarcoCastro1
 
ACFrOgAga3dNd2sR-yAX-Y0m_Kaq-BE27Tj6ouay6Pcc2wyCM27xQN7JjaA1iQLWr8u3ppBp2kNiu...
ACFrOgAga3dNd2sR-yAX-Y0m_Kaq-BE27Tj6ouay6Pcc2wyCM27xQN7JjaA1iQLWr8u3ppBp2kNiu...ACFrOgAga3dNd2sR-yAX-Y0m_Kaq-BE27Tj6ouay6Pcc2wyCM27xQN7JjaA1iQLWr8u3ppBp2kNiu...
ACFrOgAga3dNd2sR-yAX-Y0m_Kaq-BE27Tj6ouay6Pcc2wyCM27xQN7JjaA1iQLWr8u3ppBp2kNiu...manish719012
 
introductiontoforensicscience-141011231729-conversion-gate01.pdf
introductiontoforensicscience-141011231729-conversion-gate01.pdfintroductiontoforensicscience-141011231729-conversion-gate01.pdf
introductiontoforensicscience-141011231729-conversion-gate01.pdfalizain9604
 
Introduction to forensic science
Introduction to forensic scienceIntroduction to forensic science
Introduction to forensic scienceAbby Varghese
 
FSC1801 Unit-1.pptx
FSC1801 Unit-1.pptxFSC1801 Unit-1.pptx
FSC1801 Unit-1.pptxGURSEVSINGH5
 
Fingerprints - Creative Science
Fingerprints - Creative ScienceFingerprints - Creative Science
Fingerprints - Creative ScienceAlexa Robert
 
Historical Development in Criminalistics-1.pptx
Historical Development in Criminalistics-1.pptxHistorical Development in Criminalistics-1.pptx
Historical Development in Criminalistics-1.pptxGeoffOgunde1
 
INTRODUCTION TO FORENSIC SCIENCE
INTRODUCTION TO FORENSIC SCIENCEINTRODUCTION TO FORENSIC SCIENCE
INTRODUCTION TO FORENSIC SCIENCEKetan Patil
 
Ielts reading ancient literate signals proto writing in americas 2014
Ielts reading ancient literate signals   proto writing in americas 2014Ielts reading ancient literate signals   proto writing in americas 2014
Ielts reading ancient literate signals proto writing in americas 2014Ibrahim Khleifat
 
Fingerprints basics for scouts
Fingerprints basics for scoutsFingerprints basics for scouts
Fingerprints basics for scoutsRuss Lesco
 
History of Friction Ridge Identification
History of Friction Ridge IdentificationHistory of Friction Ridge Identification
History of Friction Ridge IdentificationHeather
 
Timeline of forensic science
Timeline of forensic scienceTimeline of forensic science
Timeline of forensic sciencesevans-idaho
 
FC102-chapter-2 (1).pptx
FC102-chapter-2 (1).pptxFC102-chapter-2 (1).pptx
FC102-chapter-2 (1).pptxjaymanalo717
 
Forensic science laboratories and facilities
Forensic science laboratories and facilitiesForensic science laboratories and facilities
Forensic science laboratories and facilitiesShreyas Patel
 
Scientific Foundation of Fingerprint Identification
Scientific Foundation of Fingerprint IdentificationScientific Foundation of Fingerprint Identification
Scientific Foundation of Fingerprint IdentificationJury Rocamora
 
FORENSIC 2 (Fingerprint).pptx
FORENSIC 2 (Fingerprint).pptxFORENSIC 2 (Fingerprint).pptx
FORENSIC 2 (Fingerprint).pptxAizelMirabuenos1
 

Ähnlich wie History of fingerprinting (20)

PERSONAL-IDENTIFICATION-CHAPTER-1-1.pptx
PERSONAL-IDENTIFICATION-CHAPTER-1-1.pptxPERSONAL-IDENTIFICATION-CHAPTER-1-1.pptx
PERSONAL-IDENTIFICATION-CHAPTER-1-1.pptx
 
1._Introduction_to_Personal_Identification.pdf
1._Introduction_to_Personal_Identification.pdf1._Introduction_to_Personal_Identification.pdf
1._Introduction_to_Personal_Identification.pdf
 
Forensic science 2011
Forensic science 2011Forensic science 2011
Forensic science 2011
 
1.2--POWERPOINT--History_of_Forensics.pptx
1.2--POWERPOINT--History_of_Forensics.pptx1.2--POWERPOINT--History_of_Forensics.pptx
1.2--POWERPOINT--History_of_Forensics.pptx
 
ACFrOgAga3dNd2sR-yAX-Y0m_Kaq-BE27Tj6ouay6Pcc2wyCM27xQN7JjaA1iQLWr8u3ppBp2kNiu...
ACFrOgAga3dNd2sR-yAX-Y0m_Kaq-BE27Tj6ouay6Pcc2wyCM27xQN7JjaA1iQLWr8u3ppBp2kNiu...ACFrOgAga3dNd2sR-yAX-Y0m_Kaq-BE27Tj6ouay6Pcc2wyCM27xQN7JjaA1iQLWr8u3ppBp2kNiu...
ACFrOgAga3dNd2sR-yAX-Y0m_Kaq-BE27Tj6ouay6Pcc2wyCM27xQN7JjaA1iQLWr8u3ppBp2kNiu...
 
introductiontoforensicscience-141011231729-conversion-gate01.pdf
introductiontoforensicscience-141011231729-conversion-gate01.pdfintroductiontoforensicscience-141011231729-conversion-gate01.pdf
introductiontoforensicscience-141011231729-conversion-gate01.pdf
 
Introduction to forensic science
Introduction to forensic scienceIntroduction to forensic science
Introduction to forensic science
 
FSC1801 Unit-1.pptx
FSC1801 Unit-1.pptxFSC1801 Unit-1.pptx
FSC1801 Unit-1.pptx
 
Fingerprints - Creative Science
Fingerprints - Creative ScienceFingerprints - Creative Science
Fingerprints - Creative Science
 
Historical Development in Criminalistics-1.pptx
Historical Development in Criminalistics-1.pptxHistorical Development in Criminalistics-1.pptx
Historical Development in Criminalistics-1.pptx
 
INTRODUCTION TO FORENSIC SCIENCE
INTRODUCTION TO FORENSIC SCIENCEINTRODUCTION TO FORENSIC SCIENCE
INTRODUCTION TO FORENSIC SCIENCE
 
Ielts reading ancient literate signals proto writing in americas 2014
Ielts reading ancient literate signals   proto writing in americas 2014Ielts reading ancient literate signals   proto writing in americas 2014
Ielts reading ancient literate signals proto writing in americas 2014
 
Fingerprints basics for scouts
Fingerprints basics for scoutsFingerprints basics for scouts
Fingerprints basics for scouts
 
2mock up of Odontology
2mock up of Odontology2mock up of Odontology
2mock up of Odontology
 
History of Friction Ridge Identification
History of Friction Ridge IdentificationHistory of Friction Ridge Identification
History of Friction Ridge Identification
 
Timeline of forensic science
Timeline of forensic scienceTimeline of forensic science
Timeline of forensic science
 
FC102-chapter-2 (1).pptx
FC102-chapter-2 (1).pptxFC102-chapter-2 (1).pptx
FC102-chapter-2 (1).pptx
 
Forensic science laboratories and facilities
Forensic science laboratories and facilitiesForensic science laboratories and facilities
Forensic science laboratories and facilities
 
Scientific Foundation of Fingerprint Identification
Scientific Foundation of Fingerprint IdentificationScientific Foundation of Fingerprint Identification
Scientific Foundation of Fingerprint Identification
 
FORENSIC 2 (Fingerprint).pptx
FORENSIC 2 (Fingerprint).pptxFORENSIC 2 (Fingerprint).pptx
FORENSIC 2 (Fingerprint).pptx
 

Kürzlich hochgeladen

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 

Kürzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

History of fingerprinting

  • 1. The History of Fingerprinting Fingerprints
  • 2. • Since the beginnings of criminal investigation, police have sought an infallible means of human identification. The first systematic attempt at personal identification was devised and introduced by a French police expert, Alphonse Bertillon, in 1883. The Bertillon system relied on a detailed description (portrait parlé) of the subject, combined with full-length and profile photographs and a system of precise body measurements known as anthropometry.
  • 3. Alphonse Bertillon 1853-1914 The use of anthropometry as a method of identification rested on the premise that the dimensions of the human bone system remained fixed from age 20 until death. Skeleton sizes were thought to be so extremely diverse that no two individuals could have exactly the same measurements.
  • 4. • For two decades, this system was considered the most accurate method of identification, but in the early years of the 20th century, police began to appreciate and accept a system of identification based on the classification of finger ridge patterns known as fingerprints. Today, the fingerprint is the pillar of modern criminal investigation.
  • 5. The Early Use of Fingerprinting • The Chinese used fingerprints to sign legal documents as far back as three thousand years ago. Whether this practice was performed for ceremonial custom or as a means of personal identity remains a point of conjecture lost to history. In any case, the examples of fingerprinting in ancient history are ambiguous, and the few that exist did not contribute to the development of fingerprinting techniques as we know them today.
  • 6. The Early Use of Fingerprinting • Sir William Hershel: Several years before Bertillon began work on his system, William Herschel, and English civil servant stationed in India, started requiring natives to sign contracts with the imprint of their right hand, which was pressed against a stamp pad for the purpose. The motives for Herschel’s requirement remain unclear; he may have envisioned fingerprinting as a means of personal identification or just as a form of the Hindu custom that a trace of bodily contact was more binding than a signature on a contract. In any case, he did not publish anything about his activities until after a Scottish physician, Henry Fauld, working in a hospital in Japan, published his views on the potential application of fingerprinting to personal identification.
  • 7. The Early Use of Fingerprinting • Henry Fauld: In 1880 Fauld suggested that skin ridge patterns could be important for the identification of criminals. He told about a thief who left his fingerprint on a whitewashed wall, and how in comparing these prints with those of a suspect, he found that they were quite different. A few days later, another suspect was found whose fingerprints compared with those on the wall. When confronted with this evidence, the individual confessed to the crime.
  • 8. • Fauld was convinced that fingerprints furnished infallible proof of identification. He even offered to set up at his own expense a fingerprint bureau at Scotland Yard to test the practicality of the method. But his offered was rejected in favor of the Bertillon System. This decision was reversed less than two decades later.
  • 9. Early Classification of Fingerprints • Extensive research into fingerprinting conducted by Sir Francis Galton provided the needed impetus that made police agencies aware of its potential application. In 1892, Galton published his classic textbook Finger Prints, the first book of its kind on the subject. In his book, Galton discussed the anatomy of fingerprints and suggested methods for recording them.
  • 10. Early Classification of Fingerprints • Galton also proposed assigning fingerprints to three pattern types – loops, arches, and whorls. Most important, the book demonstrated that no two prints are identical and that an individual’s prints remain unchanged from year to year. At Galton’s insistence, the British government adopted fingerprinting as a supplement to the Bertillon system.
  • 11. Early Classification of Fingerprints • The next step in the development of fingerprint technology was the creation of classifications systems capable of filing thousands of prints in a logical and searchable sequence. Dr. Juan Vucetich, a police officer from Argentina who was fascinated by Galton’s work, devised a workable concept in 1891. His classification system has been refined over the years and is still widely used today in most Spanish-speaking countries.
  • 12. • In 1897, another classification system was proposed by an Englishman, Sir Edward Richard Henry. Four years later, Henry’s system was adopted by Scotland Yard. Today, most English-speaking countries, including the United States, use some version of Henry’s classification system to file fingerprints.
  • 13. • Early in the 20th century, Bertillon’s measurement system began to fall into disfavor. Its results were highly susceptible to error, particularly when the measurements were taken by people who were not thoroughly trained. The method was dealt its most severe and notable setback in 1903 when a convict, Will West, arrived at Fort Leavenworth prison. A routine check of the prison files startlingly revealed that a William West, already in the prison, could not be distinguished from the new prisoner by body measurements or even by photographs. In fact, the two men looked just like twins, and their measurements were practically the same. Subsequently, fingerprints of the prisoners clearly distinguished them.
  • 14. • In the United States, the first systematic and official use of fingerprints for personal identification was adopted by the New York City Civil Service Commission in 1901. The method was used for certifying all civil service applications. Several American police officials received instruction in fingerprint identification at the 1904 World’s Fair in St. Louis, Missouri from representatives from Scotland Yard.