The Concept of Forensic Biometrics: Physiological and Behavioral Characteristics Essay

Exclusively available on Available only on IvyPanda® Written by Human No AI

Introduction

Biometrics is a concept which has attained significant popularity in recent years due to the prevalence and capabilities of technology. Biometrics is a form of access control which can accurately, efficiently, and uniquely identify humans. Biometrics can be identified as either physiological or behavioral characteristics (Saferstein and Roy 153). The concept of forensic biometrics seeks to use automated and human-based systems to identify, analyze, and interpret biometric data for forensic and investigatory activities.

Origin and Development

Considering that biometrics consist of several elements, including iris, fingerprint, and facial recognition, alongside behavioral characteristics – each has a unique history of origin and development. First attempts of using the iris for identification came in the 1950s by J.H. Doggart who emphasized that the iris is unique for each individual forming infinite patterns. By 1985, Dr. John Daugman created an algorithmic computer system which could analyze and verify the human iris, which became known as the IrisCode and is the foundation to most modern iris scanners. Similarly, technology has also focused on scanning the retina of the eye, which also has a unique pattern of veins and capillaries but remains less consistent and reliable than iris biometrics (Saferstein and Roy 158).

Similarly, facial recognition is a non-intrusive and efficient mechanism of biometrics. Facial recognitions amongst people in society has been used historically for centuries (wanted posters), but the modern technology of is attributed to Matthew Turk and Alex Pentland in the 1990s. They created the Eigenface technique which uses matrices of human faces to identify and authenticate human faces. It was an automated biometric solution which allowed the computer to effectively track faces from a camera without error or human intervention (Saferstein and Roy 161).

Fingerprints are the earliest known biometric system, with some accounts of its use as identifying marks dating back to 500BC in the Babylonian Empire. In 1896, Sir Edward Henry created the Henry Classification System which sorted fingerprints by physiological characteristics for quick searching and became the first official system of identification used by law enforcement, and later became the basis for modern databases (Lee). Currently law enforcement has huge databases, transitioning from IAFIS to NGI, which stores millions of fingerprints due to the Tenprint techniques in addition to the NPPS with palm prints. These databases can use complex algorithms to match up fingerprints of most citizens in matter of minutes (Saferstein and Roy 164).

Therefore, the biometric boom occurred in the 1990s when biometrics grew significantly as a field of research. In combination with the onset of the digital age, computerized algorithms and rapid automation could be combined with traditional techniques and databases that law enforcement agencies have been developing for decades. The gradual integration of biometrics into commercial technology has also significantly helped to boost the research and applications of forensic biometrics.

Physical Evidence

Biometric systems use biological traits (modalities) which are known in advance and used for person recognition. Recognition occurs in real time depending on the computational efficiency of biometric applications (Jain & Ross 4). Forensic biometrics relies on a mixture of physical and digital evidence. Some of forensic concepts developed for physical evidence can be applied to digital evidence, but others cannot be due to its nature. Biometric technologies can be utilized to process data from latent fingerprints and palmprints as well as written documents as purely physical evidence. Recovering latent fingerprints, including its age, can be very important, particularly when conventional methods may not work effectively on surfaces such as metal or in unfavorable conditions. Using tools such as high resolution optical capturing devices or electromagnetic spectrum tools (infrared to X-ray) can track potential biometrics even in a covert mode. These treatments meant for latent fingerprint visualization allow the physical evidence to be digitized and analyzed through the numerous databases to search for offenders (Tistarelli et al. 157).

Generally, the physical or biological evidence which may be potentially applicable in forensic biometric matching such as fingerprints, sources of DNA, or physical audio or visual recordings are collected, treated, and stored as they would with traditional forensic techniques. It is a well-developed process to effective identification, documentation, collection, and preservation which seeks to follow scientific analysis and maintain integrity of the evidence. In a forensic context, a sample obtained from the crime scene are referenced to existing samples and needs to be of sufficiently good quality for the biometric system to perform as intended. However, biometric traits on evidence need to be unique, distinctive, and robust to the forensic conditions. Therefore, quality of sample is reliant on integrity of evidence collection and environmental conditions at the scene (Saini and Kapoor, 3)

Tests

Although more common in military rather than law enforcement, one preliminary test for biometrics used is Sensitive Site Exploration (SSE). It can be defined as systematically searching for and collecting information and material from a designated location and analyzing them to answer information requires, facilitating subsequent operations or supporting criminal persecution (Blestrieri). Essentially, it is the use of special exploitation kits which can capture biometric data at the scene (retina, facial, DNA, and fingerprints) as well as analyze personal documents and communications, and provide a limited but efficient overview of available intelligence. The confirmatory test, such as for fingerprints, can considered AFIS searching. It is conducted in a secure and stable location, after the evidence was collected and processed. The fingerprint is submitted into the automated fingerprint identification system (AFIS) at which point algorithms automatically return of a number of most likely of potentially matches, at which point the human examiner has to confirm the match to avoid potential error (Kellman et al. 2).

Identification Processes and Applications

Biometrics at its core is a verification mechanism which is meant to identify the individual based on their physiological or behavioral traits. The biometrics expansions can be observed in various forensic identification parameters such as face, fingerprint, iris, voice, handwriting, and others. The biometrics system can be classified into two categories, identification and verification. In the identification mode, the biometric system attempts to identify the individual by search the individua by search the templates stored in the database, conducting a one to many comparisons in order to find an identity. In verification mode, the biometrics of an individual is compared to the biometric template stored in the system database, known as one-to-one comparison (Saini and Kapoor, 2).

As discussed earlier, each type of biometric is inherently unique to an individual, ranging from fingerprint patterns to iris capillaries to distinctions in voice and handwriting. Modern technology uses complex sensors and analysis to identify and track these individual traits in biometric characteristics and compare them to databases in order to present the closest matches. Since the system is yet imperfect, usually algorithms err on the side of caution and require subsequent confirmation of matches by human beings who evaluate the parameters and final results of the algorithms.

Forensic biometrics play a role in crime detection in a combination of applications. The techniques and modules of biometrics analyze evidence by overcoming human sensory, cognitive, or simply time/physical limitations; thus, increasing both the efficiency and the effectiveness of investigations using forensic biometrics. Second, the methods applied provide a scientific and data-oriented basis to criminal investigation procedures and investigation, also going beyond human capabilities by applying computer science, mathematics, and statistics to large data. Finally, the methods help to standardize the elements of evidence analysis and criminal identification, decreasing human biases or errors (Saini and Kapoor, 2).

Case Studies

One example of forensic biometrics being utilized was in the aftermath of the Boston Marathon bombing of 2013. At the behest of the FBI, tips were pouring in with photographs and videos. Each was meticulously analyzed, and face identifications were compared to databases of terrorists or persons of interest. However, the system at the time failed to recognize the terrorists and provide identification, the Tsamaev brothers, even though government agencies had their up-to-date photographs on hand and one was involved in a terrorism-related investigation, all of which was digitally recorded. However, the biometric system at the time failed to recognize them clear in several of the photographs due to low resolution of photos and one of the terrorists wearing sunglasses. It is a challenge that modern systems to this day struggle with, but with Next Generation Information System implementation, there is potential for improvement (Saferstein and Roy). As technology improves, both visual capturing (including on commercial devices) and digital analytics algorithms meant to search and compare databases, the biometric system can potentially experience greater success.

One noted benefit of the new technology and biometrics databases is that it allows law enforcement to revisit cold cases. Recently, a 30-year-old murder case was resolved using the FBI’s Integrated Automated Fingerprint Identification System (IAFIS). A 61-year old senior was brutally stabbed in 1978 in his apartment. After which the perpetrator stole the victim’s car and escaped. Police was able to collect evidence, including latent fingerprints and palmprints in the apartment, and later, in the found care, but no new leads could be found despite fingerprints being manually compared to local and state files. In 2008, after receiving an inquiry on the case, an office at the Omaha Police Department ran the latent fingerprints through the IAFIS. After investigating possible matches, she came up with a positive identification of a known felon currently serving prison time. An investigation was opened, placing the perpetrator in the vicinity of the crime, and subsequent DNA testing proved to be a match, allowing for prosecution of the dangerous criminal placing him in prison for life (“30-Year-Old-Murder Solved”). Repeatedly, the FBI notes that cold or contested cases can significantly benefit from modern biometric systems as technology allows for a much wider and efficient search of databases than ever before.

Conclusion

In modern society, the ability to identify individuals in real time, both reliably and effectively, is the foundation to various applications of biometrics in a highly networked world. Forensic biometrics seeks to take advantage of this, both in real-time and post event collection of evidence at a crime scene. The biometric modalities are algorithmically analyzed in complex databases which allow for rapid identification of individuals and offenders. As technology and networks continue to improve and become prominent in society, biometric data will become central to various applications, including forensic investigations.

Works Cited

.” FBI, 2020. Web.

Balestrieri, Steve. ” Spec Ops Forensics: Everything You Need To Know About Sensitive Site Exploitation (SSE).” SOFREP, 2019, Web.

Jain, Anil K., and Arun Ross. “Bridging the Gap: From Biometrics to Forensics.” Philosophical Transactions of the Royal Society B: Biological Sciences, vol. 370, no. 1674, 2015, p. 1-10.

Kellman, Philip J., et al. “Forensic Comparison and Matching of Fingerprints: Using Quantitative Image Measures for Estimating Error Rates through Understanding and Predicting Difficulty.” PLoS ONE, vol. 9, no. 5, 2014, p. 1-14.

Lee, Jason. “A Brief History of Biometrics.” Bioconnect Solutions, 2020, Web.

Saferstein, Richard, and Tiffany Roy. Criminalistics: An Introduction to Forensic Science 13th edition. Pearson, 2020.

Saini, Monika, and Anup Kumar Kapoor. “Biometrics in Forensic Identification: Applications and Challenges.” Journal of Forensic Medicine, vol. 1, no. 2, 2016, Web.

Tistarelli, Massimo, et al. “Biometrics in Forensic Science: Challenges, Lessons and New Technologies.” Biometric Authentication, 2014, pp. 153–164.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 1). The Concept of Forensic Biometrics: Physiological and Behavioral Characteristics. https://ivypanda.com/essays/the-concept-of-forensic-biometrics/

Work Cited

"The Concept of Forensic Biometrics: Physiological and Behavioral Characteristics." IvyPanda, 1 Mar. 2022, ivypanda.com/essays/the-concept-of-forensic-biometrics/.

References

IvyPanda. (2022) 'The Concept of Forensic Biometrics: Physiological and Behavioral Characteristics'. 1 March.

References

IvyPanda. 2022. "The Concept of Forensic Biometrics: Physiological and Behavioral Characteristics." March 1, 2022. https://ivypanda.com/essays/the-concept-of-forensic-biometrics/.

1. IvyPanda. "The Concept of Forensic Biometrics: Physiological and Behavioral Characteristics." March 1, 2022. https://ivypanda.com/essays/the-concept-of-forensic-biometrics/.


Bibliography


IvyPanda. "The Concept of Forensic Biometrics: Physiological and Behavioral Characteristics." March 1, 2022. https://ivypanda.com/essays/the-concept-of-forensic-biometrics/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1