AFIS Lectures
AFIS Lectures
Compilation Report
GRADUATE STUDIES
In
IN CRIMINOLOGY (AFIS)
Submitted By:
SY: 2015-2016
JANUARY 2016
AFIS
AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM (AFIS)
3. Search a latent print from a crime scene against the record of existing
unsolved crimes database (Latent to Latent Inquiry (LLI)); and
AFIS was approved under the Japanese General Grant Aid Program
(GGAP) in April 1998 in the amount of Y839,291,634 (P419,645,817.80).
In August 2004, AFIS started operation and was eventually turned over
to the PNP in May 2005.
• On July 15, 2002 to August 03, 2002 – JICA sent initial study team
to the Philippines.
• On January 19, 2003 – JICA sent to the Philippines its Draft Report
on the Basic Design Study.
Purpose of Equipment
TYPES OF FINGERPRINTS
1. Arch
- Simple arch or Tented arch
- These are simple patterns that originate from the left or right side of
the fingertip and flow to the oppoite side
2. Right-slanted loop
- Loop slanted to the left in the print
- Finger number is not relevant
3. Left-slanted loop
- Loop slanted to the right in the print
- Finger number is not relevant
4. Whorl
- Has at least one (1) whorl or has at least two
(2) Deltas
- These patterns are circles, ovals, or swirls
formed around the center.
5. Scar
- Contains scar that obscures determination of Pattern Type
- Finger is amputated or bandaged
AFIS
FINGERPRINT IDENTIFICATION
There are two types of fingerprint identification: Tenprint Identification
used to confirm the identity and criminal histories of arrested suspects, and
Latent Print Identification using latent print from the scene of a crime to
identify a suspect. The PNP Crime Laboratory (PNP CL) uses an
Automated Fingerprint Identification System to process these operations.
The procedure of fingerprint identification is as follows:
1. Outline
File Types-The Fingerprint Identification system has a Tenprint
Database that contains the minutia data
for rolled prints, and a Latent print Database that contain the minutia data
for latent prints. Both Databases have their own Fingerprint Image
Database that contains the images of the fingerprints.
File Function-The Tenprint Database is used for Tenprint to Tenprint
Inquiries (TI) and Latent to Tenprint Inquiries (LI). The Latent print
Database is used to check if the arrested suspect has committed a
previous crime (TLI) and check also if the collected Latent print match with
another unsolved crimes (LLI). The images of the candidate fingerprints are
retrieved from the Fingerprint Image Database and displayed on the
fingerprint workstation.
2. Characteristics
Partial Fingerprint Inquiries In addition to clear fingerprints that have been
rolled on the fingerprint cards, partial fingerprints can also be searched.
Reading Speed
Conducts searching for 40,500 fingerprints per second Ex: search a print
versus 10 million fingerprints in less than 4 minutes
(It would take over 25 years for Fingerprint Examiner to conduct the same
manually)
Verification Using Fingerprint Images
The images of tenprint and latent prints are storedon istorage disk.
Candidate images resulting from an inquiry are automatically retrieved from
these istorage disks and displayed on the Fingerprint Workstation
AFIS “HITS”
A “HIT” is a term used if the findings of an AFIS examiner/operator
matched the search print and the file print in the database.
The AFIS is about to reach its obsolescence in this year because the
hardware is no longer available in the market as per NECJ letter on July 20,
2010 and the end of its maintenance in 2013.To prolong the lifespan of
AFIS the PNP bought spare parts needed as recommended while waiting
for the UPGRADING/REPLACEMENT of AFIS.
The PNPCL recommend an estimated amount of 329 million for the
purpose. However, these amounts were reduced to 270 million by the
UESB, down to PNPDL for procurement but due to some reason the
procurement of AFIS budget is now at the DBM.
This unit is looking forward for the success of the UPGRADING
/REPLACEMENT of AFIS for speedy identification of unidentified suspect
through fingerprint for the early solution of crime and administration of
justice to include the identification of unidentified victim of natural and
manmade disaster for their family and relatives and, to the victims dignified
burial be given to them as last respect from their love one