Page 40 - Automated Fingerprint Identification Systems (AFIS)
P. 40

INTRODUCTION     25



          job applicants, and the second is for latent print processing. Both rely on the
          same database for an identification, but there are inherent differences in how
          this is accomplished. Another distinguishing feature is that much of the work
          of the tenprint identification process is automated, including some “lights out”
          or no-human intervention practices. By contrast, latent print processing
          is very labor intensive. The latent print examiner prepares the latent print for
          image capture, selects search parameters, and launches the search. This may
          be replicated numerous times.




          1.12.4 CHAPTER 5 FROM PRINT TO IDENTIFICATION

          Chapter 5 provides a more detailed description of identification processing.
          Beginning with a system overview, the various key elements of AFIS processing
          are reviewed, with illustrations of equipment in use. The chapter includes a
          process flow that provides a step-by-step description of a typical search of a
          forensic AFIS. The chapter describes some of the changes in processing that
          AFIS has created, and concludes with a description of both tenprint and latent
          print processing reports that should be available to managers and decision
          makers. The importance of reliable data cannot be overestimated. Just because
          data is produced by a computer does not guarantee that it is accurate or that
          it reports what it was intended to report.





          1.12.5 CHAPTER 6 CURRENT ISSUES
          Chapter 6 includes a SWOT (strengths, weaknesses, opportunities, and threats)
          analysis of AFIS. As with any successful enterprise, managers need to know not
          just how the system is performing, but what are its areas of vulnerability and
          growth. Among the weaknesses of AFIS described is the lack of interoperabil-
          ity between large federal agencies such as the Department of Homeland Secu-
          rity IDENT system and the FBI IAFIS system. IDENT relies on two fingers, IAFIS
          uses ten. They are not truly interconnected. The chapter includes a compari-
          son of current DNA processing with latent print processing. Rather than
          competing technologies, these should be considered as complementary, with
          advantages and disadvantages for each.
            This chapter also describes the advances made in the civil application of AFIS
          technology. More states are using AFIS technology to confirm identities of those
          who are qualified to receive public benefits. This has moved onward to include
          multinational programs such as Eurodac, in which refugees seeking political
          asylum and public benefits are enrolled.
   35   36   37   38   39   40   41   42   43   44   45