SlideShare a Scribd company logo
The History of Fingerprinting
Fingerprints
• Since the beginnings of criminal investigation,
police have sought an infallible means of human
identification. The first systematic attempt at
personal identification was devised and
introduced by a French police expert, Alphonse
Bertillon, in 1883. The Bertillon system relied on
a detailed description (portrait parlé) of the
subject, combined with full-length and profile
photographs and a system of precise body
measurements known as anthropometry.
Alphonse Bertillon
1853-1914 The use of anthropometry as a method
of identification rested on the premise
that the dimensions of the human bone
system remained fixed from age 20 until
death. Skeleton sizes were thought to be
so extremely diverse that no two
individuals could have exactly the same
measurements.
• For two decades, this system was considered
the most accurate method of identification,
but in the early years of the 20th century,
police began to appreciate and accept a
system of identification based on the
classification of finger ridge patterns known as
fingerprints. Today, the fingerprint is the pillar
of modern criminal investigation.
The Early Use of Fingerprinting
• The Chinese used fingerprints to sign legal
documents as far back as three thousand years
ago. Whether this practice was performed for
ceremonial custom or as a means of personal
identity remains a point of conjecture lost to
history. In any case, the examples of
fingerprinting in ancient history are ambiguous,
and the few that exist did not contribute to the
development of fingerprinting techniques as we
know them today.
The Early Use of Fingerprinting
• Sir William Hershel: Several years before
Bertillon began work on his system, William
Herschel, and English civil servant stationed in
India, started requiring natives to sign contracts
with the imprint of their right hand, which was
pressed against a stamp pad for the purpose.
The motives for Herschel’s requirement remain
unclear; he may have envisioned fingerprinting
as a means of personal identification or just as
a form of the Hindu custom that a trace of
bodily contact was more binding than a
signature on a contract. In any case, he did not
publish anything about his activities until after a
Scottish physician, Henry Fauld, working in a
hospital in Japan, published his views on the
potential application of fingerprinting to
personal identification.
The Early Use of Fingerprinting
• Henry Fauld: In 1880 Fauld suggested
that skin ridge patterns could be
important for the identification of
criminals. He told about a thief who
left his fingerprint on a whitewashed
wall, and how in comparing these prints
with those of a suspect, he found that
they were quite different. A few days
later, another suspect was found whose
fingerprints compared with those on
the wall. When confronted with this
evidence, the individual confessed to
the crime.
• Fauld was convinced that fingerprints
furnished infallible proof of identification. He
even offered to set up at his own expense a
fingerprint bureau at Scotland Yard to test the
practicality of the method. But his offered
was rejected in favor of the Bertillon System.
This decision was reversed less than two
decades later.
Early Classification of Fingerprints
• Extensive research into
fingerprinting conducted by
Sir Francis Galton provided
the needed impetus that
made police agencies aware
of its potential application.
In 1892, Galton published his
classic textbook Finger Prints,
the first book of its kind on
the subject. In his book,
Galton discussed the
anatomy of fingerprints and
suggested methods for
recording them.
Early Classification of Fingerprints
• Galton also proposed assigning
fingerprints to three pattern
types – loops, arches, and whorls.
Most important, the book
demonstrated that no two prints
are identical and that an
individual’s prints remain
unchanged from year to year. At
Galton’s insistence, the British
government adopted
fingerprinting as a supplement to
the Bertillon system.
Early Classification of Fingerprints
• The next step in the development
of fingerprint technology was the
creation of classifications systems
capable of filing thousands of
prints in a logical and searchable
sequence. Dr. Juan Vucetich, a
police officer from Argentina who
was fascinated by Galton’s work,
devised a workable concept in
1891. His classification system has
been refined over the years and is
still widely used today in most
Spanish-speaking countries.
• In 1897, another classification
system was proposed by an
Englishman, Sir Edward
Richard Henry. Four years
later, Henry’s system was
adopted by Scotland Yard.
Today, most English-speaking
countries, including the United
States, use some version of
Henry’s classification system to
file fingerprints.
• Early in the 20th century, Bertillon’s measurement system
began to fall into disfavor. Its results were highly
susceptible to error, particularly when the measurements
were taken by people who were not thoroughly trained.
The method was dealt its most severe and notable setback
in 1903 when a convict, Will West, arrived at Fort
Leavenworth prison. A routine check of the prison files
startlingly revealed that a William West, already in the
prison, could not be distinguished from the new prisoner
by body measurements or even by photographs. In fact,
the two men looked just like twins, and their
measurements were practically the same. Subsequently,
fingerprints of the prisoners clearly distinguished them.
• In the United States, the first systematic and
official use of fingerprints for personal
identification was adopted by the New York
City Civil Service Commission in 1901. The
method was used for certifying all civil service
applications. Several American police officials
received instruction in fingerprint
identification at the 1904 World’s Fair in St.
Louis, Missouri from representatives from
Scotland Yard.

More Related Content

What's hot

Portrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S ShaktawatPortrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S Shaktawat
G.S Shaktawat
 
Latent fingerprint development
Latent fingerprint developmentLatent fingerprint development
Latent fingerprint development
Tejasvi Bhatia
 
Charred documents
Charred documentsCharred documents
Charred documents
NishantPahuja3
 
Fingerprints
FingerprintsFingerprints
Fingerprints
mpattani
 
Chemical Methods to develop latent fingerprint.pptx
Chemical Methods to develop latent fingerprint.pptxChemical Methods to develop latent fingerprint.pptx
Chemical Methods to develop latent fingerprint.pptx
Applied Forensic Research Sciences
 
POROSCOPY AND EDGEOSCOPY
POROSCOPY AND EDGEOSCOPYPOROSCOPY AND EDGEOSCOPY
POROSCOPY AND EDGEOSCOPY
Applied Forensic Research Sciences
 
Poroscopy and edgeoscopy
Poroscopy and edgeoscopyPoroscopy and edgeoscopy
Poroscopy and edgeoscopy
kiran malik
 
Age of documents (Questioned Document)
Age of  documents (Questioned Document)Age of  documents (Questioned Document)
Age of documents (Questioned Document)
Shreyas Patel
 
influence of writing instrument on handwriting
influence of writing instrument on handwritinginfluence of writing instrument on handwriting
influence of writing instrument on handwriting
Mahipreet Kaur
 
Disguised writing
Disguised writingDisguised writing
Gunshot residue, forensic analysis and interpretation ppt 03
Gunshot residue, forensic analysis and interpretation ppt 03Gunshot residue, forensic analysis and interpretation ppt 03
Gunshot residue, forensic analysis and interpretation ppt 03
SURYAKANT MISHRA
 
alterations_oblitearations.pptx
alterations_oblitearations.pptxalterations_oblitearations.pptx
alterations_oblitearations.pptx
PallaviKumari112
 
EAR PRINT.pptx
EAR PRINT.pptxEAR PRINT.pptx
EAR PRINT.pptx
MATANGI LAD
 
NIBIN
NIBINNIBIN
Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)
Alok Yadav
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identificationguest8cbcb02
 
5.Examination_of_Typewritten_Documents.ppt
5.Examination_of_Typewritten_Documents.ppt5.Examination_of_Typewritten_Documents.ppt
5.Examination_of_Typewritten_Documents.ppt
PallaviKumari112
 
Paints as evidence
Paints as evidencePaints as evidence
Paints as evidence
VaishnaviBorse8
 
Tool marks and its forensic significance
Tool marks and its forensic significanceTool marks and its forensic significance
Tool marks and its forensic significance
Stina14
 

What's hot (20)

Portrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S ShaktawatPortrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S Shaktawat
 
Latent fingerprint development
Latent fingerprint developmentLatent fingerprint development
Latent fingerprint development
 
Charred documents
Charred documentsCharred documents
Charred documents
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
Chemical Methods to develop latent fingerprint.pptx
Chemical Methods to develop latent fingerprint.pptxChemical Methods to develop latent fingerprint.pptx
Chemical Methods to develop latent fingerprint.pptx
 
POROSCOPY AND EDGEOSCOPY
POROSCOPY AND EDGEOSCOPYPOROSCOPY AND EDGEOSCOPY
POROSCOPY AND EDGEOSCOPY
 
Poroscopy and edgeoscopy
Poroscopy and edgeoscopyPoroscopy and edgeoscopy
Poroscopy and edgeoscopy
 
Age of documents (Questioned Document)
Age of  documents (Questioned Document)Age of  documents (Questioned Document)
Age of documents (Questioned Document)
 
influence of writing instrument on handwriting
influence of writing instrument on handwritinginfluence of writing instrument on handwriting
influence of writing instrument on handwriting
 
Disguised writing
Disguised writingDisguised writing
Disguised writing
 
Gunshot residue, forensic analysis and interpretation ppt 03
Gunshot residue, forensic analysis and interpretation ppt 03Gunshot residue, forensic analysis and interpretation ppt 03
Gunshot residue, forensic analysis and interpretation ppt 03
 
alterations_oblitearations.pptx
alterations_oblitearations.pptxalterations_oblitearations.pptx
alterations_oblitearations.pptx
 
EAR PRINT.pptx
EAR PRINT.pptxEAR PRINT.pptx
EAR PRINT.pptx
 
Gun shot residue
Gun shot residueGun shot residue
Gun shot residue
 
NIBIN
NIBINNIBIN
NIBIN
 
Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
 
5.Examination_of_Typewritten_Documents.ppt
5.Examination_of_Typewritten_Documents.ppt5.Examination_of_Typewritten_Documents.ppt
5.Examination_of_Typewritten_Documents.ppt
 
Paints as evidence
Paints as evidencePaints as evidence
Paints as evidence
 
Tool marks and its forensic significance
Tool marks and its forensic significanceTool marks and its forensic significance
Tool marks and its forensic significance
 

Viewers also liked

Interview and interrogation_powerpoint
Interview and interrogation_powerpointInterview and interrogation_powerpoint
Interview and interrogation_powerpointDakota Boswell
 
Chapter 1 -_criminal_justice
Chapter 1 -_criminal_justiceChapter 1 -_criminal_justice
Chapter 1 -_criminal_justiceDakota Boswell
 
Reference samples presentation
Reference samples presentationReference samples presentation
Reference samples presentationDakota Boswell
 
Bill of rights and amendments
Bill of rights and amendments Bill of rights and amendments
Bill of rights and amendments Dakota Boswell
 
Techmical skills assessment review
Techmical skills assessment reviewTechmical skills assessment review
Techmical skills assessment reviewDakota Boswell
 
Crime why-and_how_much
Crime  why-and_how_muchCrime  why-and_how_much
Crime why-and_how_muchDakota Boswell
 
Jon benet ramsey powerpoint
Jon benet ramsey powerpointJon benet ramsey powerpoint
Jon benet ramsey powerpointDakota Boswell
 
Microscopes and microscopy
Microscopes and microscopyMicroscopes and microscopy
Microscopes and microscopyDakota Boswell
 
The role of the forensic anthropologist
The role of the forensic anthropologistThe role of the forensic anthropologist
The role of the forensic anthropologistDakota Boswell
 
Bloodstain pattern interpretation
Bloodstain pattern interpretationBloodstain pattern interpretation
Bloodstain pattern interpretationDakota Boswell
 
Fundamentals of fingerprinting
Fundamentals of fingerprintingFundamentals of fingerprinting
Fundamentals of fingerprintingDakota Boswell
 

Viewers also liked (14)

Interview and interrogation_powerpoint
Interview and interrogation_powerpointInterview and interrogation_powerpoint
Interview and interrogation_powerpoint
 
Chapter 1 -_criminal_justice
Chapter 1 -_criminal_justiceChapter 1 -_criminal_justice
Chapter 1 -_criminal_justice
 
Drugs
DrugsDrugs
Drugs
 
Reference samples presentation
Reference samples presentationReference samples presentation
Reference samples presentation
 
Bill of rights and amendments
Bill of rights and amendments Bill of rights and amendments
Bill of rights and amendments
 
Techmical skills assessment review
Techmical skills assessment reviewTechmical skills assessment review
Techmical skills assessment review
 
Crime why-and_how_much
Crime  why-and_how_muchCrime  why-and_how_much
Crime why-and_how_much
 
Jon benet ramsey powerpoint
Jon benet ramsey powerpointJon benet ramsey powerpoint
Jon benet ramsey powerpoint
 
Victimology
VictimologyVictimology
Victimology
 
Forensic serology
Forensic serologyForensic serology
Forensic serology
 
Microscopes and microscopy
Microscopes and microscopyMicroscopes and microscopy
Microscopes and microscopy
 
The role of the forensic anthropologist
The role of the forensic anthropologistThe role of the forensic anthropologist
The role of the forensic anthropologist
 
Bloodstain pattern interpretation
Bloodstain pattern interpretationBloodstain pattern interpretation
Bloodstain pattern interpretation
 
Fundamentals of fingerprinting
Fundamentals of fingerprintingFundamentals of fingerprinting
Fundamentals of fingerprinting
 

Similar to History of fingerprinting

PERSONAL-IDENTIFICATION-CHAPTER-1-1.pptx
PERSONAL-IDENTIFICATION-CHAPTER-1-1.pptxPERSONAL-IDENTIFICATION-CHAPTER-1-1.pptx
PERSONAL-IDENTIFICATION-CHAPTER-1-1.pptx
CastroMarcoAngelo
 
1._Introduction_to_Personal_Identification.pdf
1._Introduction_to_Personal_Identification.pdf1._Introduction_to_Personal_Identification.pdf
1._Introduction_to_Personal_Identification.pdf
ArhakirAlpapara
 
Forensic science 2011
Forensic science 2011Forensic science 2011
Forensic science 2011Bruno Mmassy
 
1.2--POWERPOINT--History_of_Forensics.pptx
1.2--POWERPOINT--History_of_Forensics.pptx1.2--POWERPOINT--History_of_Forensics.pptx
1.2--POWERPOINT--History_of_Forensics.pptx
PlutarcoCastro1
 
ACFrOgAga3dNd2sR-yAX-Y0m_Kaq-BE27Tj6ouay6Pcc2wyCM27xQN7JjaA1iQLWr8u3ppBp2kNiu...
ACFrOgAga3dNd2sR-yAX-Y0m_Kaq-BE27Tj6ouay6Pcc2wyCM27xQN7JjaA1iQLWr8u3ppBp2kNiu...ACFrOgAga3dNd2sR-yAX-Y0m_Kaq-BE27Tj6ouay6Pcc2wyCM27xQN7JjaA1iQLWr8u3ppBp2kNiu...
ACFrOgAga3dNd2sR-yAX-Y0m_Kaq-BE27Tj6ouay6Pcc2wyCM27xQN7JjaA1iQLWr8u3ppBp2kNiu...
manish719012
 
introductiontoforensicscience-141011231729-conversion-gate01.pdf
introductiontoforensicscience-141011231729-conversion-gate01.pdfintroductiontoforensicscience-141011231729-conversion-gate01.pdf
introductiontoforensicscience-141011231729-conversion-gate01.pdf
alizain9604
 
Introduction to forensic science
Introduction to forensic scienceIntroduction to forensic science
Introduction to forensic science
Abby Varghese
 
FSC1801 Unit-1.pptx
FSC1801 Unit-1.pptxFSC1801 Unit-1.pptx
FSC1801 Unit-1.pptx
GURSEVSINGH5
 
Fingerprints - Creative Science
Fingerprints - Creative ScienceFingerprints - Creative Science
Fingerprints - Creative ScienceAlexa Robert
 
Historical Development in Criminalistics-1.pptx
Historical Development in Criminalistics-1.pptxHistorical Development in Criminalistics-1.pptx
Historical Development in Criminalistics-1.pptx
GeoffOgunde1
 
INTRODUCTION TO FORENSIC SCIENCE
INTRODUCTION TO FORENSIC SCIENCEINTRODUCTION TO FORENSIC SCIENCE
INTRODUCTION TO FORENSIC SCIENCE
Ketan Patil
 
Ielts reading ancient literate signals proto writing in americas 2014
Ielts reading ancient literate signals   proto writing in americas 2014Ielts reading ancient literate signals   proto writing in americas 2014
Ielts reading ancient literate signals proto writing in americas 2014
Ibrahim Khleifat
 
Fingerprints basics for scouts
Fingerprints basics for scoutsFingerprints basics for scouts
Fingerprints basics for scoutsRuss Lesco
 
History of Friction Ridge Identification
History of Friction Ridge IdentificationHistory of Friction Ridge Identification
History of Friction Ridge Identification
Heather
 
Timeline of forensic science
Timeline of forensic scienceTimeline of forensic science
Timeline of forensic sciencesevans-idaho
 
FC102-chapter-2 (1).pptx
FC102-chapter-2 (1).pptxFC102-chapter-2 (1).pptx
FC102-chapter-2 (1).pptx
jaymanalo717
 
Forensic science laboratories and facilities
Forensic science laboratories and facilitiesForensic science laboratories and facilities
Forensic science laboratories and facilities
Shreyas Patel
 
Scientific Foundation of Fingerprint Identification
Scientific Foundation of Fingerprint IdentificationScientific Foundation of Fingerprint Identification
Scientific Foundation of Fingerprint IdentificationJury Rocamora
 
FORENSIC 2 (Fingerprint).pptx
FORENSIC 2 (Fingerprint).pptxFORENSIC 2 (Fingerprint).pptx
FORENSIC 2 (Fingerprint).pptx
AizelMirabuenos1
 

Similar to History of fingerprinting (20)

PERSONAL-IDENTIFICATION-CHAPTER-1-1.pptx
PERSONAL-IDENTIFICATION-CHAPTER-1-1.pptxPERSONAL-IDENTIFICATION-CHAPTER-1-1.pptx
PERSONAL-IDENTIFICATION-CHAPTER-1-1.pptx
 
1._Introduction_to_Personal_Identification.pdf
1._Introduction_to_Personal_Identification.pdf1._Introduction_to_Personal_Identification.pdf
1._Introduction_to_Personal_Identification.pdf
 
Forensic science 2011
Forensic science 2011Forensic science 2011
Forensic science 2011
 
1.2--POWERPOINT--History_of_Forensics.pptx
1.2--POWERPOINT--History_of_Forensics.pptx1.2--POWERPOINT--History_of_Forensics.pptx
1.2--POWERPOINT--History_of_Forensics.pptx
 
ACFrOgAga3dNd2sR-yAX-Y0m_Kaq-BE27Tj6ouay6Pcc2wyCM27xQN7JjaA1iQLWr8u3ppBp2kNiu...
ACFrOgAga3dNd2sR-yAX-Y0m_Kaq-BE27Tj6ouay6Pcc2wyCM27xQN7JjaA1iQLWr8u3ppBp2kNiu...ACFrOgAga3dNd2sR-yAX-Y0m_Kaq-BE27Tj6ouay6Pcc2wyCM27xQN7JjaA1iQLWr8u3ppBp2kNiu...
ACFrOgAga3dNd2sR-yAX-Y0m_Kaq-BE27Tj6ouay6Pcc2wyCM27xQN7JjaA1iQLWr8u3ppBp2kNiu...
 
introductiontoforensicscience-141011231729-conversion-gate01.pdf
introductiontoforensicscience-141011231729-conversion-gate01.pdfintroductiontoforensicscience-141011231729-conversion-gate01.pdf
introductiontoforensicscience-141011231729-conversion-gate01.pdf
 
Introduction to forensic science
Introduction to forensic scienceIntroduction to forensic science
Introduction to forensic science
 
FSC1801 Unit-1.pptx
FSC1801 Unit-1.pptxFSC1801 Unit-1.pptx
FSC1801 Unit-1.pptx
 
Fingerprints - Creative Science
Fingerprints - Creative ScienceFingerprints - Creative Science
Fingerprints - Creative Science
 
Historical Development in Criminalistics-1.pptx
Historical Development in Criminalistics-1.pptxHistorical Development in Criminalistics-1.pptx
Historical Development in Criminalistics-1.pptx
 
INTRODUCTION TO FORENSIC SCIENCE
INTRODUCTION TO FORENSIC SCIENCEINTRODUCTION TO FORENSIC SCIENCE
INTRODUCTION TO FORENSIC SCIENCE
 
Ielts reading ancient literate signals proto writing in americas 2014
Ielts reading ancient literate signals   proto writing in americas 2014Ielts reading ancient literate signals   proto writing in americas 2014
Ielts reading ancient literate signals proto writing in americas 2014
 
Fingerprints basics for scouts
Fingerprints basics for scoutsFingerprints basics for scouts
Fingerprints basics for scouts
 
2mock up of Odontology
2mock up of Odontology2mock up of Odontology
2mock up of Odontology
 
History of Friction Ridge Identification
History of Friction Ridge IdentificationHistory of Friction Ridge Identification
History of Friction Ridge Identification
 
Timeline of forensic science
Timeline of forensic scienceTimeline of forensic science
Timeline of forensic science
 
FC102-chapter-2 (1).pptx
FC102-chapter-2 (1).pptxFC102-chapter-2 (1).pptx
FC102-chapter-2 (1).pptx
 
Forensic science laboratories and facilities
Forensic science laboratories and facilitiesForensic science laboratories and facilities
Forensic science laboratories and facilities
 
Scientific Foundation of Fingerprint Identification
Scientific Foundation of Fingerprint IdentificationScientific Foundation of Fingerprint Identification
Scientific Foundation of Fingerprint Identification
 
FORENSIC 2 (Fingerprint).pptx
FORENSIC 2 (Fingerprint).pptxFORENSIC 2 (Fingerprint).pptx
FORENSIC 2 (Fingerprint).pptx
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

History of fingerprinting

  • 1. The History of Fingerprinting Fingerprints
  • 2. • Since the beginnings of criminal investigation, police have sought an infallible means of human identification. The first systematic attempt at personal identification was devised and introduced by a French police expert, Alphonse Bertillon, in 1883. The Bertillon system relied on a detailed description (portrait parlé) of the subject, combined with full-length and profile photographs and a system of precise body measurements known as anthropometry.
  • 3. Alphonse Bertillon 1853-1914 The use of anthropometry as a method of identification rested on the premise that the dimensions of the human bone system remained fixed from age 20 until death. Skeleton sizes were thought to be so extremely diverse that no two individuals could have exactly the same measurements.
  • 4. • For two decades, this system was considered the most accurate method of identification, but in the early years of the 20th century, police began to appreciate and accept a system of identification based on the classification of finger ridge patterns known as fingerprints. Today, the fingerprint is the pillar of modern criminal investigation.
  • 5. The Early Use of Fingerprinting • The Chinese used fingerprints to sign legal documents as far back as three thousand years ago. Whether this practice was performed for ceremonial custom or as a means of personal identity remains a point of conjecture lost to history. In any case, the examples of fingerprinting in ancient history are ambiguous, and the few that exist did not contribute to the development of fingerprinting techniques as we know them today.
  • 6. The Early Use of Fingerprinting • Sir William Hershel: Several years before Bertillon began work on his system, William Herschel, and English civil servant stationed in India, started requiring natives to sign contracts with the imprint of their right hand, which was pressed against a stamp pad for the purpose. The motives for Herschel’s requirement remain unclear; he may have envisioned fingerprinting as a means of personal identification or just as a form of the Hindu custom that a trace of bodily contact was more binding than a signature on a contract. In any case, he did not publish anything about his activities until after a Scottish physician, Henry Fauld, working in a hospital in Japan, published his views on the potential application of fingerprinting to personal identification.
  • 7. The Early Use of Fingerprinting • Henry Fauld: In 1880 Fauld suggested that skin ridge patterns could be important for the identification of criminals. He told about a thief who left his fingerprint on a whitewashed wall, and how in comparing these prints with those of a suspect, he found that they were quite different. A few days later, another suspect was found whose fingerprints compared with those on the wall. When confronted with this evidence, the individual confessed to the crime.
  • 8. • Fauld was convinced that fingerprints furnished infallible proof of identification. He even offered to set up at his own expense a fingerprint bureau at Scotland Yard to test the practicality of the method. But his offered was rejected in favor of the Bertillon System. This decision was reversed less than two decades later.
  • 9. Early Classification of Fingerprints • Extensive research into fingerprinting conducted by Sir Francis Galton provided the needed impetus that made police agencies aware of its potential application. In 1892, Galton published his classic textbook Finger Prints, the first book of its kind on the subject. In his book, Galton discussed the anatomy of fingerprints and suggested methods for recording them.
  • 10. Early Classification of Fingerprints • Galton also proposed assigning fingerprints to three pattern types – loops, arches, and whorls. Most important, the book demonstrated that no two prints are identical and that an individual’s prints remain unchanged from year to year. At Galton’s insistence, the British government adopted fingerprinting as a supplement to the Bertillon system.
  • 11. Early Classification of Fingerprints • The next step in the development of fingerprint technology was the creation of classifications systems capable of filing thousands of prints in a logical and searchable sequence. Dr. Juan Vucetich, a police officer from Argentina who was fascinated by Galton’s work, devised a workable concept in 1891. His classification system has been refined over the years and is still widely used today in most Spanish-speaking countries.
  • 12. • In 1897, another classification system was proposed by an Englishman, Sir Edward Richard Henry. Four years later, Henry’s system was adopted by Scotland Yard. Today, most English-speaking countries, including the United States, use some version of Henry’s classification system to file fingerprints.
  • 13. • Early in the 20th century, Bertillon’s measurement system began to fall into disfavor. Its results were highly susceptible to error, particularly when the measurements were taken by people who were not thoroughly trained. The method was dealt its most severe and notable setback in 1903 when a convict, Will West, arrived at Fort Leavenworth prison. A routine check of the prison files startlingly revealed that a William West, already in the prison, could not be distinguished from the new prisoner by body measurements or even by photographs. In fact, the two men looked just like twins, and their measurements were practically the same. Subsequently, fingerprints of the prisoners clearly distinguished them.
  • 14. • In the United States, the first systematic and official use of fingerprints for personal identification was adopted by the New York City Civil Service Commission in 1901. The method was used for certifying all civil service applications. Several American police officials received instruction in fingerprint identification at the 1904 World’s Fair in St. Louis, Missouri from representatives from Scotland Yard.