Erick's Assignment ( Forensic methods)
Erick's Assignment ( Forensic methods)
Fingerprint Recognition…………………………………………………………………….…………………..5
Voice Recognition…………………………………………………………………………………………………15
Conclusions ………………………………………………………………………………………………..……16
REFERENCES………………………………………………..………………………………………………….…. 17
INTRODUCTION
Criminal identification and profiling are critical forensic methods and techniques that support
law enforcement agencies in narrowing down suspects and understanding criminal behavior.
. Criminal Identification
Criminal identification refers to various techniques used to establish or confirm the identity of a
person involved in criminal activity. It involves several methods, such as:
Digital Forensics: With the rise of cybercrime, digital footprints like email addresses, IP
logs, or phone records also help in identifying individuals associated with criminal
activities.
. Criminal Profiling
Criminal profiling, or offender profiling, is the psychological and behavioral analysis used to
infer the characteristics of an unknown offender. It relies on identifying patterns in criminal
behavior to predict aspects of the suspect's personality, background, and potential future actions.
The major approaches include:
Deductive Profiling: Analyzing crime scene evidence to draw conclusions about the
offender's personality traits and behavior. This approach is often rooted in forensic
psychology.
Inductive Profiling: Comparing the current case with historical cases that have similar
characteristics to generalize or predict offender traits.
Geographic Profiling: Mapping out locations of crimes to predict where the offender
may reside or target next, which helps to optimize search efforts.
Both criminal identification and profiling are essential forensic techniques. Identification focuses
on the "who" by linking suspects to specific evidence, while profiling aids in understanding the
"why" and "how" by offering insight into behavior patterns and motivations. Together, these
methods help in the apprehension of criminals, prevention of future offenses, and ultimately, in
delivering justice.
Biometric methods play a significant role in criminal identification by using unique biological
traits to confirm an individual’s identity. Here are some practical examples of biometric methods
commonly used:
1)Fingerprints Recognition.
Fingerprint recognition is one of the most reliable and widely used biometric methods in criminal
identification due to the uniqueness of fingerprints—no two people have the same fingerprint
pattern. In Kenya, fingerprint recognition plays a crucial role in law enforcement, helping to
identify suspects, confirm identities, and solve criminal cases. Here’s how fingerprint recognition
is used, with specific examples relevant to Kenya:
Example: In high-profile cases, like armed robbery and homicide, AFIS helps identify
suspects even if they have fled across county or national borders. For instance, if
fingerprints from a crime scene in Nairobi match with a suspect previously apprehended
in Mombasa, law enforcement can easily track and apprehend them.
Kenya’s law enforcement has also adopted mobile fingerprint scanners, allowing police
officers to perform instant checks in the field. These handheld devices can scan
fingerprints and instantly match them with the national database.
Example: In Nairobi and other urban areas, police use mobile scanners during patrols
and stop-checks. If they apprehend a suspicious individual, they can quickly verify if the
person is linked to any criminal records or outstanding warrants.
. Counter-Terrorism Efforts
The fight against terrorism in Kenya has significantly benefited from fingerprint
recognition. Law enforcement agencies can identify and track suspects associated with
terrorist groups, especially in high-risk areas.
Example: In cases where terrorism suspects are detained or eliminated, fingerprints are
taken and checked against criminal databases to link them to previous terrorist activities
or to identify other suspects involved in related operations.
Fingerprint recognition in Kenya is a powerful tool, enabling law enforcement to solve crimes
efficiently, track down suspects, and identify individuals swiftly. The integration of fingerprint
data across various national databases, like IPRS and AFIS, has modernized criminal
investigations in Kenya, making it easier to handle cases with more accuracy and reduce the risk
of mistaken identity. This approach has not only enhanced security but also instilled public
confidence in the criminal justice system.
Fingerprint collection and analysis are key stages in fingerprint recognition, helping to link
suspects to crime scenes and confirm identities. This process involves the systematic collection
of fingerprint evidence from crime scenes or suspects, followed by a detailed analysis that
compares the prints with existing records to identify individuals. Here’s an overview of each
step:
Fingerprint Collection
Fingerprint collection involves locating, lifting, and preserving fingerprint evidence. This
process requires meticulous attention to detail to avoid contamination or degradation.
Chemical Methods: For porous surfaces like paper, chemicals such as ninhydrin,
iodine fuming, or cyanoacrylate (superglue) fuming are used. These chemicals
react with components in fingerprint residues, revealing the pattern.
. Fingerprint Analysis
Once fingerprints are collected, forensic experts analyze them using several techniques to
compare and identify matches. This stage involves detailed examination and automated matching
systems.
Minutiae Points: Minutiae are unique features in fingerprints, like ridge endings,
bifurcations, and dots. Analysts focus on these details, as they create the unique
fingerprint structure that distinguishes one person’s print from another's.
Automated Comparison Using AFIS:
Automated Fingerprint Identification System (AFIS): AFIS is a computerized
system that scans and compares fingerprints to find potential matches within a
large database. It uses complex algorithms to detect ridge patterns and minutiae
points, matching them with stored prints. AFIS can quickly narrow down suspects
by finding matches with high accuracy.
These fingerprints are then analyzed and compared against the national database using AFIS. If
a match is found, the system provides law enforcement with a suspect’s identity, enabling further
investigation or arrest.
In summary, fingerprint collection and analysis are integral to modern forensic investigations.
Collection methods ensure that usable prints are obtained from crime scenes, while analysis and
comparison through AFIS and manual verification help accurately identify suspects, providing a
strong foundation for criminal identification.
Detection: A camera captures an image or video of a person’s face. This can be from
CCTV footage, a suspect’s photo, or a database of known individuals.
Alignment: The software identifies the face within the image, aligning it for analysis. It
adjusts for angles, lighting, and facial expressions to ensure accuracy.
Feature Extraction: The system extracts unique facial features, like the distance
between the eyes, nose shape, jawline, and cheekbone structure. These measurements
create a "faceprint," a digital signature unique to each individual.
Matching: The system compares this faceprint against a database of known images. In
criminal investigations, this often means comparing with a database of criminals, missing
persons, or individuals of interest.
Impact: This technology has helped prevent crimes in crowded areas and identify
suspects who may be planning or engaging in illegal activities. For instance, in the wake
of the Westgate Mall attack and other security threats, such technology has played a role
in securing public areas against potential threats.
Impact: This approach has improved border security, assisting in the arrest of suspects
involved in cross-border crimes such as smuggling, drug trafficking, or terrorism.
Example: Kenya has faced challenges with terrorism, especially from groups like Al-
Shabaab. Facial recognition technology assists law enforcement in identifying suspected
terrorists by matching their images against a database of known extremists and terror
suspects. Surveillance at malls, hotels, and other high-risk areas has been crucial in
preventing potential attacks.
Impact: This has been particularly helpful in Nairobi, where crimes such as robbery and
mugging are often caught on CCTV. In such cases, facial recognition aids in the quick
identification and arrest of suspects, contributing to an overall reduction in crime rates in
some areas.
Facial recognition in Kenya is becoming a key tool for preventing, investigating, and solving
crimes, as well as enhancing public safety. From high-traffic public spaces to border control, it
supports law enforcement in tracking down suspects more efficiently. As Kenya continues to
adopt and refine this technology, it has the potential to transform security and criminal
investigations across the country.
3) DNA Profiling as a Biometric Method of Identification
Sample Collection: Biological samples are collected from crime scenes, victims, or
suspects. Samples might include blood stains, saliva on cigarette butts, hair strands, or
skin cells left on personal items.
Extraction and Amplification: The DNA is extracted from the collected samples and
then amplified using Polymerase Chain Reaction (PCR), which makes millions of copies
of the DNA, allowing forensic scientists to analyze even trace amounts.
Analysis of Short Tandem Repeats (STRs): Forensic scientists examine specific
regions of the DNA called Short Tandem Repeats (STRs), which are highly variable
among individuals. STR analysis produces a unique genetic profile, or "DNA
fingerprint," for each person.
Matching and Comparison: The DNA profile from the crime scene is compared to the
profiles of known suspects or those in DNA databases. A match confirms that the DNA
samples are from the same person, while a non-match excludes a suspect from suspicion.
Example: In cases of sexual assault, DNA profiling can identify the perpetrator by
comparing the DNA from bodily fluids left at the crime scene with a suspect's DNA. The
Kenyan government has used DNA profiling in sexual assault cases to bring justice to
victims and convict offenders. In many instances, it has provided irrefutable evidence in
court, increasing the chances of conviction.
Impact: The use of DNA profiling in sexual assault cases has not only improved
conviction rates but also deters potential offenders, knowing that DNA evidence can
easily implicate them.
Example: In Kenya, DNA profiling is widely used in paternity disputes and inheritance
cases. For example, in cases where family members dispute inheritance rights, DNA
testing can confirm blood relations. This is common in cases involving inheritance
disputes or proving the identity of children born out of wedlock.
Impact: In these cases, DNA profiling establishes clear biological connections, which
can resolve legal disputes and ensure that justice is served in cases involving family
rights and inheritance.
Example: DNA profiling has been essential in identifying bodies after disasters or in
cases where individuals go missing. In 2019, when several people were killed in floods
and landslides in West Pokot County, DNA profiling was used to identify victims and
return remains to their families. Similarly, in the wake of the 2013 Westgate Mall attack,
DNA profiling helped identify both victims and perpetrators.
Impact: DNA profiling brings closure to families by identifying lost loved ones. It also
aids forensic investigations by identifying potential suspects or victims of crime or
disaster, helping law enforcement close missing person cases more effectively.
Impact: By linking seized items to poachers or specific areas, DNA profiling has
strengthened Kenya’s efforts against wildlife crime, contributing to conservation and the
protection of endangered species.
DNA profiling in Kenya is a vital tool in criminal investigations, used across a range of cases
from homicide and sexual assault to wildlife crime and disaster victim identification. By
providing conclusive evidence, DNA profiling has improved conviction rates, brought justice to
victims, and helped protect Kenya’s wildlife. While challenges remain, the continued adoption
and advancement of DNA technology will further enhance Kenya's forensic capabilities,
benefiting the criminal justice system and society at large.
4) Iris Recognition as a Method of Identification
Image Capture: A high-resolution infrared camera takes a detailed image of the eye,
focusing on the iris. Infrared light is used to reduce glare and enhance visibility of the
intricate patterns.
Pattern Analysis: The system analyzes unique characteristics in the iris, such as furrows,
rings, freckles, and crypts (tiny gaps), to create a detailed iris "template" or digital
signature.
Matching and Identification: The system quickly compares the new iris scan to stored
records. Because of the highly unique structure of each iris, matches are accurate, making
it highly suitable for identification and verification.
Impact: This technology would help prevent mistaken identities within prisons and
ensure that inmates are properly accounted for, lowering the risk of unauthorized releases
or escapes.
Example: Law enforcement agencies can use iris recognition to confirm the identities of
suspects arrested for criminal activities. If a suspect is apprehended but lacks
identification, law enforcement can cross-reference an iris scan with national or criminal
databases to confirm their identity.
Impact: This is especially helpful in regions with high crime rates, like Nairobi, where
accurate identification is crucial to linking suspects to previous records or outstanding
warrants. Iris recognition can enhance the accuracy of criminal databases and prevent
identity fraud among suspects.
Example: Iris recognition is suitable for secure facilities, such as military bases,
government buildings, and research facilities where access must be strictly controlled. In
Kenya, this technology could secure access to critical infrastructure, allowing only
authorized individuals to enter and deterring potential threats.
Example: The Kenyan government’s eCitizen portal, which handles services like ID
registration, passport issuance, and other legal documents, has the potential to adopt iris
recognition to prevent identity fraud. For instance, individuals applying for ID or passport
renewals could have their irises scanned, providing an additional layer of verification.
Impact: By adding iris recognition to eCitizen, the government would enhance the
security of citizen identification processes, making it difficult for criminals to forge
identities or obtain fraudulent documents.
Benefits and Challenges of Iris Recognition in Kenya
Benefits: Iris recognition is non-invasive, highly accurate, and provides fast
identification, especially useful for high-security areas and border control. Since iris
patterns are unique to each person and stable over time, the technology ensures reliability
in criminal identification and identity verification.
Challenges: Implementing iris recognition in Kenya faces challenges such as high costs,
technical infrastructure requirements, and privacy concerns. Additionally, the
technology’s effectiveness relies on high-quality imaging, which may not work well with
individuals who have certain eye conditions or in areas with limited resources.
In Kenya, iris recognition holds great potential for improving criminal identification, border
security, and fraud prevention. From managing secure facilities and verifying inmates to
enhancing eCitizen services, iris recognition could greatly benefit Kenya’s security infrastructure
. While it is not yet widespread, the technology’s reliability and accuracy make it a promising
addition to Kenya’s evolving approach to security and criminal justice.
CONCLUSIONS
: Voice recognition is convenient, as it doesn’t require physical contact or specialized equipment
beyond a microphone. It provides quick and reliable identification, making it suitable for remote
authentication, especially in financial services and security. It’s also useful for identifying
individuals when physical biometrics like fingerprints are unavailable.
Voice recognition faces technical challenges in environments with poor audio quality or
background noise, which can affect accuracy. Voice variations due to illness, stress, or emotions
can also lead to inconsistencies. Moreover, privacy concerns arise with storing voiceprints, as
individuals may worry about unauthorized access or misuse of their data.
Anil K. Jain, An Introduction to Biometric Recognition IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS
FOR VIDEO TECHNOLOGY, VOL. 14, NO. 1, JANUARY 2004.
Ajay Kumar1, David C. M. Wong1 Personal Verification using Palmprint and Hand Geometry Biometric
Pattern Recognition and Image Processing Lab, 2006.
Damien Dessimoz Multimodal Biometrics for Identity Documents Research Report PFS 341-08.05
(Version 2.0) June 2006.
Anil K. Jain, Ajay Kumar Biometrics of Next Generation: An Overview ‗SECOND GENERATION
BIOMETRICS‘ SPRINGER, 2010.
Saurabh Zadikar1 et al. Criminal Investigatio & Identification System (CI2S) IJCSMC, Vol. 4, Issue. 2,
February 2015, pg.402 – 407
Cyrus Shahabi et al. Multi Source Event Detection and Collection System for Effective Surveillance of
Criminal Activity. J Inf Process Syst, Vol.10, No.1, pp.1~22, March 2014.
C. S. Chua and R. Jarvis, ―Point signatures: A new representation for 3D object recognition,‖
International Journal of Computer Vision, vol. 271,pp. 63–85, 1997
Barua K., Bhattacharya S., ―Fingerprint Identification‖, Global Journal of Computer Science &
Technology, Vol. 11 (Issue 1), (Apr 2011).
Shritosh Kumar, Vishal Shrivastav, Performance of Gabor Mean Feature Extraction Techniques for Ear
Biometric Recognition. International Journal of Informative & Futuristic Research Vol 2, Issue 2, 2015.
Amandeep Singh Dhillon, Ashok Kumar Bathla, Approaches for Finding Correlation Between Fingerprints
and Footprints of a Person, Journal of Information Sciences and Computing Technologies. Vol 1, Issue 1,
December 2014.
Anil K. Jain* and Arun Ross, Bridging the Gap: From Biometrics to Forensics, Philosophical Transactions of
The Royal Society B, 2015.
M.Loganathan, Dr.E.Kirubakaran, A Study on Cyber Crimes and protection, IJCSI International Journal of
Computer Science Issues, Vol. 8, Issue 5, No 1, September 2011 ISSN (Online): 1694-0814.