Page 40 - Automated Fingerprint Identification Systems (AFIS)
P. 40
INTRODUCTION 25
job applicants, and the second is for latent print processing. Both rely on the
same database for an identification, but there are inherent differences in how
this is accomplished. Another distinguishing feature is that much of the work
of the tenprint identification process is automated, including some “lights out”
or no-human intervention practices. By contrast, latent print processing
is very labor intensive. The latent print examiner prepares the latent print for
image capture, selects search parameters, and launches the search. This may
be replicated numerous times.
1.12.4 CHAPTER 5 FROM PRINT TO IDENTIFICATION
Chapter 5 provides a more detailed description of identification processing.
Beginning with a system overview, the various key elements of AFIS processing
are reviewed, with illustrations of equipment in use. The chapter includes a
process flow that provides a step-by-step description of a typical search of a
forensic AFIS. The chapter describes some of the changes in processing that
AFIS has created, and concludes with a description of both tenprint and latent
print processing reports that should be available to managers and decision
makers. The importance of reliable data cannot be overestimated. Just because
data is produced by a computer does not guarantee that it is accurate or that
it reports what it was intended to report.
1.12.5 CHAPTER 6 CURRENT ISSUES
Chapter 6 includes a SWOT (strengths, weaknesses, opportunities, and threats)
analysis of AFIS. As with any successful enterprise, managers need to know not
just how the system is performing, but what are its areas of vulnerability and
growth. Among the weaknesses of AFIS described is the lack of interoperabil-
ity between large federal agencies such as the Department of Homeland Secu-
rity IDENT system and the FBI IAFIS system. IDENT relies on two fingers, IAFIS
uses ten. They are not truly interconnected. The chapter includes a compari-
son of current DNA processing with latent print processing. Rather than
competing technologies, these should be considered as complementary, with
advantages and disadvantages for each.
This chapter also describes the advances made in the civil application of AFIS
technology. More states are using AFIS technology to confirm identities of those
who are qualified to receive public benefits. This has moved onward to include
multinational programs such as Eurodac, in which refugees seeking political
asylum and public benefits are enrolled.