This document outlines the procedures and evidence presented in a fingerprint analysis case. It discusses:
1) The expert visiting the crime scene, developing a latent fingerprint impression, and preserving the evidence.
2) The expert analyzing and comparing the latent print to the accused's fingerprints, creating enlargements and a features table on a mounted card.
3) The photographer documenting the evidence, like taking photos of the mounted card.
4) The expert concluding that the latent print matches the accused's based on a number of corresponding ridge characteristics and features.
Fingerprints have been used for identification for thousands of years. They are unique to each individual and remain unchanged over a person's lifetime. There are three basic fingerprint patterns: arches, loops, and whorls. Fingerprints are made up of ridges on the skin that have unique minutiae like ridge endings and bifurcations that can be used to identify individuals. Fingerprints can be collected using dusting powder, iodine fuming, alternative light sources, or superglue fuming.
El documento contrasta dos modelos de docentes: el tradicional pasivo frente al innovador profesional. El docente tradicional cumple con lo mínimo sin planear sus clases, mientras que el profesional se actualiza, organiza y es responsable. También describe al docente ante la reforma educativa como sujeto pasivo o ejecutor activo comprometido con su importante labor en la sociedad.
This short document promotes creating presentations using Haiku Deck, a tool for making slideshows. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In a single sentence, it pitches presentation creation software.
Sell Online through Email + Social MediaSnapRetail
Want to sell your website products through your email marketing? We'll show you the SnapRetail tool and how you can sell through email campaigns and capture the interest of your social media following!
The document discusses improving communication between healthcare providers and patients. It outlines a training program for nurses to learn effective communication techniques. The goals are to improve patient experience scores on surveys, adherence to treatment plans, and health outcomes. The training teaches techniques including active listening, avoiding medical jargon, and using "teach back" where patients restate information in their own words. An evaluation found the training significantly improved knowledge of patient communication questions and health literacy. It is recommended to provide the training to all frontline staff and measure changes in patient experience scores over time.
La Ordenanza sobre Comercialización de Leña entró en vigencia el miércoles 22 de abril de 2015, fecha en que fue publicada en nuestro sitio web de Transparencia Activa
Fingerprints have been used for identification for thousands of years. They are unique to each individual and remain unchanged over a person's lifetime. There are three basic fingerprint patterns: arches, loops, and whorls. Fingerprints are made up of ridges on the skin that have unique minutiae like ridge endings and bifurcations that can be used to identify individuals. Fingerprints can be collected using dusting powder, iodine fuming, alternative light sources, or superglue fuming.
El documento contrasta dos modelos de docentes: el tradicional pasivo frente al innovador profesional. El docente tradicional cumple con lo mínimo sin planear sus clases, mientras que el profesional se actualiza, organiza y es responsable. También describe al docente ante la reforma educativa como sujeto pasivo o ejecutor activo comprometido con su importante labor en la sociedad.
This short document promotes creating presentations using Haiku Deck, a tool for making slideshows. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In a single sentence, it pitches presentation creation software.
Sell Online through Email + Social MediaSnapRetail
Want to sell your website products through your email marketing? We'll show you the SnapRetail tool and how you can sell through email campaigns and capture the interest of your social media following!
The document discusses improving communication between healthcare providers and patients. It outlines a training program for nurses to learn effective communication techniques. The goals are to improve patient experience scores on surveys, adherence to treatment plans, and health outcomes. The training teaches techniques including active listening, avoiding medical jargon, and using "teach back" where patients restate information in their own words. An evaluation found the training significantly improved knowledge of patient communication questions and health literacy. It is recommended to provide the training to all frontline staff and measure changes in patient experience scores over time.
La Ordenanza sobre Comercialización de Leña entró en vigencia el miércoles 22 de abril de 2015, fecha en que fue publicada en nuestro sitio web de Transparencia Activa
This short document promotes creating presentations using Haiku Deck, a tool for making slideshows. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In a single sentence, it pitches presentation creation software.
Henry George Futcher is a 47-year-old South African national with extensive work experience in finance and accounting roles for the South African Police Service and Talisman Plant and Tool Hire. He has obtained qualifications in cost and management accounting and completed numerous courses in financial management, computer skills, and policing. His work experience includes roles managing budgets, personnel, claims processing, and financial systems for the police service and a tool hire company. He is computer literate and experienced in accounting software programs.
The document describes 8 case studies conducted by Diligent Insights, a company that provides due diligence and investigative services. The case studies involved conducting investigations into allegations of insider trading in Bangladesh, assessing reputational risks of a company operating in Iraq, investigating professional affiliations in Dubai, identifying links to organized crime in Kazakhstan, assessing political and security threats for a renewable energy project in Pakistan, researching attitudes towards family planning and vaccinations in Pakistan, conducting regulatory and litigation checks on a company in Pakistan, and performing due diligence on an energy company operating in Pakistan.
Elder Joseph B. Wirthlin outlines five keys to financial freedom: 1) paying tithing, 2) saving money, 3) spending less than you earn, 4) honoring financial obligations, and 5) teaching children good financial habits from a young age. He also discusses "heavenly debts" which include honoring parents for giving us life, honoring ancestors by performing temple ordinances for them, and honoring Christ's sacrifice through which our sins can be forgiven.
Este documento trata sobre los hechos posteriores al cierre de un período contable. Define los hechos posteriores como aquellos que ocurren entre la fecha de cierre del período y la fecha de emisión de los estados financieros. Dentro de este período de hechos posteriores, identifica tres tipos de situaciones: aquellas del nuevo período que no afectan los estados cerrados, aquellas que confirman hechos del período anterior que modifican la valuación de activos y pasivos, y aquellas
This systematic review aimed to evaluate the efficacy of barrier membranes for vertical and horizontal bone regeneration compared to no membrane controls. The review included human and animal studies evaluating various membrane types. Meta-analyses found a statistically significant benefit of membranes for vertical bone gain in animal studies, but human studies lacked quantitative data. The review concluded that while membranes may aid vertical bone regeneration, more high-quality human RCTs are needed due to heterogeneity between studies.
Fingerprints are visible through glass filled with water due to the refractive properties of oil on fingerprints. Ridges are visible as they are in contact with the glass, allowing light to enter the higher refractive index oil and scatter within the skin. Furrows appear as bright lines as light is reflected at the glass-air boundary and scattered light from furrows exits at angles that are not visible. Calculations show the "visible zone" for fingerprints is from 36-61 degrees as light must enter and exit boundaries within their critical angles.
Whether your in the courtroom, the office or just at your house, this presentation will help you use your iPad in the most effective ways possible.
Do you want to use your iPad for presentation but technology is holding you back? Here is a quick step-by-step tutorial on how to set-up your own wifi network, independent of the internet for use in trials, office, classrooms, and more.
The document discusses the history of fingerprints, including their earliest uses in ancient China over 2000 years ago on clay seals and legal documents. It then outlines key developments in the study and use of fingerprints over time, including early scientific observations in Europe in the 1600s-1700s and the first systematic collection of fingerprints for identification purposes in India by Sir William Herschel in 1858.
Seminar, Webinars and Training available from Forensic Biometric Identificati...Rmcauley
Forensic Biometric Identification Solutions LLC offers fingerprint seminars and training programs at a lower cost than similar programs. Their online training can be completed flexibly and covers the same material as a 40-hour basic fingerprint course. The training discusses common fingerprint errors, fingerprint analysis techniques, and how to determine if expert fingerprint testimony is needed in a case. It also provides an overview of fingerprint patterns, minutiae, and the identification process.
This document discusses fingerprint identification and reconstruction from minutiae points. It begins with an introduction to fingerprint identification and the minutiae features used for comparison. It then outlines the hardware and software requirements for the project, including the use of MATLAB. The main body of the document describes the process of minutiae extraction from fingerprints and using the minutiae points to reconstruct fingerprint images through estimating ridge orientation, constructing streamlines, and enhancing the ridge structure. Implementation details are provided for image enhancement, thinning, and minutiae extraction steps. The document concludes by noting the scope for further improvements and accuracy.
The document discusses the fingerprint identification process (ACE-V) and provides details on:
1) The key steps in ACE-V including analysis, comparison, evaluation, and verification by a second examiner.
2) Important factors in latent fingerprint identifications such as the number of identification points, the experience and skill level required of examiners, and policies/procedures used.
3) Potential issues that can arise including erroneous identifications that have led to wrongful convictions, and missed identifications that can impact criminal cases.
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersHarpreetSaini48
Discover how Mississauga criminal defence lawyers defend clients facing weapon offence charges with expert legal guidance and courtroom representation.
To know more visit: https://www.saini-law.com/
What are the common challenges faced by women lawyers working in the legal pr...lawyersonia
The legal profession, which has historically been male-dominated, has experienced a significant increase in the number of women entering the field over the past few decades. Despite this progress, women lawyers continue to encounter various challenges as they strive for top positions.
Genocide in International Criminal Law.pptxMasoudZamani13
Excited to share insights from my recent presentation on genocide! 💡 In light of ongoing debates, it's crucial to delve into the nuances of this grave crime.
Lifting the Corporate Veil. Power Point Presentationseri bangash
"Lifting the Corporate Veil" is a legal concept that refers to the judicial act of disregarding the separate legal personality of a corporation or limited liability company (LLC). Normally, a corporation is considered a legal entity separate from its shareholders or members, meaning that the personal assets of shareholders or members are protected from the liabilities of the corporation. However, there are certain situations where courts may decide to "pierce" or "lift" the corporate veil, holding shareholders or members personally liable for the debts or actions of the corporation.
Here are some common scenarios in which courts might lift the corporate veil:
Fraud or Illegality: If shareholders or members use the corporate structure to perpetrate fraud, evade legal obligations, or engage in illegal activities, courts may disregard the corporate entity and hold those individuals personally liable.
Undercapitalization: If a corporation is formed with insufficient capital to conduct its intended business and meet its foreseeable liabilities, and this lack of capitalization results in harm to creditors or other parties, courts may lift the corporate veil to hold shareholders or members liable.
Failure to Observe Corporate Formalities: Corporations and LLCs are required to observe certain formalities, such as holding regular meetings, maintaining separate financial records, and avoiding commingling of personal and corporate assets. If these formalities are not observed and the corporate structure is used as a mere façade, courts may disregard the corporate entity.
Alter Ego: If there is such a unity of interest and ownership between the corporation and its shareholders or members that the separate personalities of the corporation and the individuals no longer exist, courts may treat the corporation as the alter ego of its owners and hold them personally liable.
Group Enterprises: In some cases, where multiple corporations are closely related or form part of a single economic unit, courts may pierce the corporate veil to achieve equity, particularly if one corporation's actions harm creditors or other stakeholders and the corporate structure is being used to shield culpable parties from liability.
This document briefly explains the June compliance calendar 2024 with income tax returns, PF, ESI, and important due dates, forms to be filled out, periods, and who should file them?.
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee
Presentation slides for a session held on June 4, 2024, at Kyoto University. This presentation is based on the presenter’s recent paper, coauthored with Hwang Lee, Professor, Korea University, with the same title, published in the Journal of Business Administration & Law, Volume 34, No. 2 (April 2024). The paper, written in Korean, is available at <https://shorturl.at/GCWcI>.
This short document promotes creating presentations using Haiku Deck, a tool for making slideshows. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In a single sentence, it pitches presentation creation software.
Henry George Futcher is a 47-year-old South African national with extensive work experience in finance and accounting roles for the South African Police Service and Talisman Plant and Tool Hire. He has obtained qualifications in cost and management accounting and completed numerous courses in financial management, computer skills, and policing. His work experience includes roles managing budgets, personnel, claims processing, and financial systems for the police service and a tool hire company. He is computer literate and experienced in accounting software programs.
The document describes 8 case studies conducted by Diligent Insights, a company that provides due diligence and investigative services. The case studies involved conducting investigations into allegations of insider trading in Bangladesh, assessing reputational risks of a company operating in Iraq, investigating professional affiliations in Dubai, identifying links to organized crime in Kazakhstan, assessing political and security threats for a renewable energy project in Pakistan, researching attitudes towards family planning and vaccinations in Pakistan, conducting regulatory and litigation checks on a company in Pakistan, and performing due diligence on an energy company operating in Pakistan.
Elder Joseph B. Wirthlin outlines five keys to financial freedom: 1) paying tithing, 2) saving money, 3) spending less than you earn, 4) honoring financial obligations, and 5) teaching children good financial habits from a young age. He also discusses "heavenly debts" which include honoring parents for giving us life, honoring ancestors by performing temple ordinances for them, and honoring Christ's sacrifice through which our sins can be forgiven.
Este documento trata sobre los hechos posteriores al cierre de un período contable. Define los hechos posteriores como aquellos que ocurren entre la fecha de cierre del período y la fecha de emisión de los estados financieros. Dentro de este período de hechos posteriores, identifica tres tipos de situaciones: aquellas del nuevo período que no afectan los estados cerrados, aquellas que confirman hechos del período anterior que modifican la valuación de activos y pasivos, y aquellas
This systematic review aimed to evaluate the efficacy of barrier membranes for vertical and horizontal bone regeneration compared to no membrane controls. The review included human and animal studies evaluating various membrane types. Meta-analyses found a statistically significant benefit of membranes for vertical bone gain in animal studies, but human studies lacked quantitative data. The review concluded that while membranes may aid vertical bone regeneration, more high-quality human RCTs are needed due to heterogeneity between studies.
Fingerprints are visible through glass filled with water due to the refractive properties of oil on fingerprints. Ridges are visible as they are in contact with the glass, allowing light to enter the higher refractive index oil and scatter within the skin. Furrows appear as bright lines as light is reflected at the glass-air boundary and scattered light from furrows exits at angles that are not visible. Calculations show the "visible zone" for fingerprints is from 36-61 degrees as light must enter and exit boundaries within their critical angles.
Whether your in the courtroom, the office or just at your house, this presentation will help you use your iPad in the most effective ways possible.
Do you want to use your iPad for presentation but technology is holding you back? Here is a quick step-by-step tutorial on how to set-up your own wifi network, independent of the internet for use in trials, office, classrooms, and more.
The document discusses the history of fingerprints, including their earliest uses in ancient China over 2000 years ago on clay seals and legal documents. It then outlines key developments in the study and use of fingerprints over time, including early scientific observations in Europe in the 1600s-1700s and the first systematic collection of fingerprints for identification purposes in India by Sir William Herschel in 1858.
Seminar, Webinars and Training available from Forensic Biometric Identificati...Rmcauley
Forensic Biometric Identification Solutions LLC offers fingerprint seminars and training programs at a lower cost than similar programs. Their online training can be completed flexibly and covers the same material as a 40-hour basic fingerprint course. The training discusses common fingerprint errors, fingerprint analysis techniques, and how to determine if expert fingerprint testimony is needed in a case. It also provides an overview of fingerprint patterns, minutiae, and the identification process.
This document discusses fingerprint identification and reconstruction from minutiae points. It begins with an introduction to fingerprint identification and the minutiae features used for comparison. It then outlines the hardware and software requirements for the project, including the use of MATLAB. The main body of the document describes the process of minutiae extraction from fingerprints and using the minutiae points to reconstruct fingerprint images through estimating ridge orientation, constructing streamlines, and enhancing the ridge structure. Implementation details are provided for image enhancement, thinning, and minutiae extraction steps. The document concludes by noting the scope for further improvements and accuracy.
The document discusses the fingerprint identification process (ACE-V) and provides details on:
1) The key steps in ACE-V including analysis, comparison, evaluation, and verification by a second examiner.
2) Important factors in latent fingerprint identifications such as the number of identification points, the experience and skill level required of examiners, and policies/procedures used.
3) Potential issues that can arise including erroneous identifications that have led to wrongful convictions, and missed identifications that can impact criminal cases.
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersHarpreetSaini48
Discover how Mississauga criminal defence lawyers defend clients facing weapon offence charges with expert legal guidance and courtroom representation.
To know more visit: https://www.saini-law.com/
What are the common challenges faced by women lawyers working in the legal pr...lawyersonia
The legal profession, which has historically been male-dominated, has experienced a significant increase in the number of women entering the field over the past few decades. Despite this progress, women lawyers continue to encounter various challenges as they strive for top positions.
Genocide in International Criminal Law.pptxMasoudZamani13
Excited to share insights from my recent presentation on genocide! 💡 In light of ongoing debates, it's crucial to delve into the nuances of this grave crime.
Lifting the Corporate Veil. Power Point Presentationseri bangash
"Lifting the Corporate Veil" is a legal concept that refers to the judicial act of disregarding the separate legal personality of a corporation or limited liability company (LLC). Normally, a corporation is considered a legal entity separate from its shareholders or members, meaning that the personal assets of shareholders or members are protected from the liabilities of the corporation. However, there are certain situations where courts may decide to "pierce" or "lift" the corporate veil, holding shareholders or members personally liable for the debts or actions of the corporation.
Here are some common scenarios in which courts might lift the corporate veil:
Fraud or Illegality: If shareholders or members use the corporate structure to perpetrate fraud, evade legal obligations, or engage in illegal activities, courts may disregard the corporate entity and hold those individuals personally liable.
Undercapitalization: If a corporation is formed with insufficient capital to conduct its intended business and meet its foreseeable liabilities, and this lack of capitalization results in harm to creditors or other parties, courts may lift the corporate veil to hold shareholders or members liable.
Failure to Observe Corporate Formalities: Corporations and LLCs are required to observe certain formalities, such as holding regular meetings, maintaining separate financial records, and avoiding commingling of personal and corporate assets. If these formalities are not observed and the corporate structure is used as a mere façade, courts may disregard the corporate entity.
Alter Ego: If there is such a unity of interest and ownership between the corporation and its shareholders or members that the separate personalities of the corporation and the individuals no longer exist, courts may treat the corporation as the alter ego of its owners and hold them personally liable.
Group Enterprises: In some cases, where multiple corporations are closely related or form part of a single economic unit, courts may pierce the corporate veil to achieve equity, particularly if one corporation's actions harm creditors or other stakeholders and the corporate structure is being used to shield culpable parties from liability.
This document briefly explains the June compliance calendar 2024 with income tax returns, PF, ESI, and important due dates, forms to be filled out, periods, and who should file them?.
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee
Presentation slides for a session held on June 4, 2024, at Kyoto University. This presentation is based on the presenter’s recent paper, coauthored with Hwang Lee, Professor, Korea University, with the same title, published in the Journal of Business Administration & Law, Volume 34, No. 2 (April 2024). The paper, written in Korean, is available at <https://shorturl.at/GCWcI>.
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordinary And Special Businesses And Ordinary And Special Resolutions with Companies (Postal Ballot) Regulations, 2018
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Massimo Talia
This guide aims to provide information on how lawyers will be able to use the opportunities provided by AI tools and how such tools could help the business processes of small firms. Its objective is to provide lawyers with some background to understand what they can and cannot realistically expect from these products. This guide aims to give a reference point for small law practices in the EU
against which they can evaluate those classes of AI applications that are probably the most relevant for them.
Matthew Professional CV experienced Government LiaisonMattGardner52
As an experienced Government Liaison, I have demonstrated expertise in Corporate Governance. My skill set includes senior-level management in Contract Management, Legal Support, and Diplomatic Relations. I have also gained proficiency as a Corporate Liaison, utilizing my strong background in accounting, finance, and legal, with a Bachelor's degree (B.A.) from California State University. My Administrative Skills further strengthen my ability to contribute to the growth and success of any organization.
3. •Developing fingerprint impression at crime scene
•Performing Research
•Making Comparison
•Arriving at Conclusion
Expert
•Contact print
•Enlargements of Fingerprint Slip impression & Contact print
•Photograph of Mounted Card
Photographer
•Procedure adopted on recording fingerprint impression of accused
on fingerprint slip
•Signature of accused on fingerprint slip
Person recording
impression of
accused
4. Object upon which impression developed -
‘A’
Contact print of impression on object – ‘B’
Fingerprint Slip with impressions of accused
– ‘C’
Original Mounted Card – ‘D’
Photograph of Mounted Card – ‘E’
5. Analysis & Conclusion
Mounted Card
Contact Print –v- Fingerprint Slip
Fingerprint Slip
Preparation of Contact Print
Discovery of latent fingerprint at scene
Fingerprint Expert
6. Qualifications
•Certificates, diplomas, fellowships, etc.
•Experience as Fingerprint Expert
•Amount of sets of fingerprints examined
Principles of
fingerprint
identification
•Fingerprints are impressions made by the end joints of the fingers and, therefore, are reversed
reproductions of the skin surface details
•Positive identification, or elimination, of fingerprints is dependent upon the individual ridge
characteristics in a fingerprint, their relative position to each other, and whether or not there are
any dissimilar characteristics that cannot be explained.
•Ridge characteristics – types (bifurcation, endings, dots, cross-overs, etc.)
•Technique - application of brush and powder to develop latent fingerprint impression
•Uniqueness – Each of the 10 fingers on every person’s hands bears its own individual and
distinctive trademark in its ridge pattern and characteristics. No two fingers have ever been found
identical in their ridge patterns and characteristics
•Permanence – fingerprints formed as foetus and, except for size, remains unchanged throughout
life and even after death, until decomposition.
7. Discovery of latent
fingerprint
impression
• Expert visited and processed the crime scene
• Found object
• Applied brush and powder
• Developed latent fingerprint impression
The Object
• Expert took possession of object
• Markings placed thereon
• Protection of latent fingerprint impression by covering
• Admit into evidence – “A”
8. Expert passes object to photographer for latent
fingerprint to be photographed
Photographer Evidence -
•Identifies Object passed by Expert – (‘A’)
•Contact print developed (markings, etc.)
•Admitted into evidence – (‘B’)
•Explain contact print
•Object (‘A’) and Contact print (‘B’) returned to Expert
9. Expert:
•Identifies contact print (‘B’)
•Verifies that contact print and latent impression on object
identical
Expert performs research and comes to an
opinion
Expert gives blank fingerprint form to Officer
(generally Complainant) to take impressions
from accused
10. Officer taking impressions from accused
Received
blank
fingerprint
slip from
fingerprint
expert
Informs
accused of
intention to
take
fingerprints
Any
objections
or
complaints
Each finger
placed in
Ink Slab
Rolled onto
fingerprint
slip
Signature of
accused at
foot of
fingerprint
slip
Admit
signed
fingerprint
slip into
evidence –
(‘C’)
Return of
completed
fingerprint
slip to
fingerprint
expert
11. Expert
•Receives fingerprint slip
•Compares impressions on fingerprint slip with Contact Print
•Identifies matching impression and places mark above relevant digit on fingerprint slip
and on contact print
•Identifies fingerprint slip – (‘C’)
•Contact print (‘B’) and fingerprint slip (‘C’) returned to photographer
Photographer
•Receives marked contact print and fingerprint slip
•Places marking on fingerprint slip
•Identifies fingerprint slip (‘C’) with marking
•Makes enlargements of contact print and impression designated on fingerprint slip
(markings of photographer)
•Submits enlargements, together with contact print (‘B’) and fingerprint slip (‘C’) to Expert
12. Expert
•Verification of enlargements as that of contact print (‘B’) and fingerprint slip (‘C’)
•Places enlargements side by side on mounted card
•Prepares a features table
•Signs at back of Mounted Card
•Admit original mounted card into evidence – ‘D’
•Transmit original mounted card to photographer for photograph to be taken
Photographer
•Receives from Expert original Mounted Card – ‘D’
•Identifies original mounted card – ‘D’
•Takes photograph of original mounted card – (markings, etc.)
•Admit into evidence photograph of original mounted card – ‘E’
•Returns original mounted card and photograph (‘E’) to Expert
•Produce copies of photograph of original mounted card for Magistrate and Defence Counsel
13. Expert receives original mounted card (‘D’) and
photograph thereof (‘E’)
Identifies photograph of original mounted card
(‘E’)
Verification that photograph of original mounted
card is identical to original mounted card
Copies of photograph of original mounted card
passed to Magistrate and Defence Counsel
Expert then explains the content of the original
mounted card (‘D’)
14. Magnifying glasses to be made available
Treat with each ridge characteristic individually
from the features table
Conclusion -
•Based on the number of corresponding ridge characteristics
both in continuous sequence and agreement
•Opinion – the source of the latent print is the accused
15. •Subjective exercise
•Number of ridge characteristics required in order for positive identification
•Mistakes made in the past
Erroneous
Identification
•Impossible to determine time of placementAge of latent print
•Utilizing an adhesive tape to remove an impression and replace it on another object
Planted or forged
prints
•Pre-emptive evidence to defence claims
Legitimate (innocent)
access
•ProcedureOn Academic Material
17. Statute
•Police Service
Act, (repealed)
Ch. 15:01 – s. 37
•Police Service
Act , 2006 (as
amended) – s.50
Commonlaw
•Buckley 163 J.P.
561
•Culpepper, 58
WIR 420
•Hallam, Court of
Appeal N.S.W.
10/09/90
•Tyres –v- Barr,
45 WIR 7
•Small, 27 WIR 64
•Tottenham
Justices, 82
Cr.App.R. 277
•Chappel, 89
Cr.App.R. 82
Texts
•Scott’s
Fingerprint
Mechanics, 1978
(Olsen)
•Modern Scientific
Evidence, Vol. 4
(Faigman)
Precedents
•Sean
Subransingh et al
(Bobart
Kidnapping)
•Sidiqque Martin
and anor
•Kevin Culpepper
•Pitman & Agard
(Cascade Murder)
•Junior Colin
Nicome
•Timothy Wise
•Marlon Mackain
•Shawn Parris
18. N.B. the Prosecutor must take great care in
leading fingerprint evidence not to
inadvertently disclose the previous bad
character of the accused.