Page 16 - Automated Fingerprint Identification Systems (AFIS)
P. 16

CHAPTER 1


                                                    INTRODUCTION















          1.1 WELCOME
          There is a world in which every crime is solved in 60 minutes, DNA matches
          are made “While U Wait,” and staff work on only one case at a time. But it is a
          fantasy land, an imaginary land; it is not the real world. This book is about the
          real world of biometric identification technology. It is a fascinating topic. This
          technology can confirm the identity of an individual in a split second; it can
          also reach back in time to place a suspect at the scene of a crime that occurred
          years ago.
             With no more information than a picture or a fingerprint, it is possible to
          match a subject in question with a known individual. With or without the
          subject’s cooperation, his or her DNA, fingerprint, portrait, or some other phys-
          ical characteristic can be matched to a known person.
             An identification can lead to a record, a description of a person’s past. If the
          person has been previously arrested, the arrest information can be retrieved. If
          the person has previously applied for a job that required a fingerprint check,
          that information can be requested. Biometric identification does not need to
          rely on spoken information from the subject in question; even amnesia victims
          and the dead can be identified. Once the necessary information has been
          entered into a biometric database, future inquiries require only the successful
          comparison and matching of the biometric for confirmation of identity.
             Biometrics has many implementations. Some are extremely complex, requir-
          ing massive arrays of computers and a dedicated staff. Others are relatively less
          complex, requiring only ink, paper, training, and experience. For example,
          access to secure areas can be allowed by the matching of a finger image or
          an iris scan. Telephone conversations using voice recognition technology can
          confirm the identity of the caller and allow transactions in the caller’s financial
          account. The Federal Bureau of Investigation (FBI) master criminal file
          requires hundreds of people to support the database, communication lines, and
          inquiry processing. A latent print examiner can compare a print from a home
   11   12   13   14   15   16   17   18   19   20   21