SlideShare una empresa de Scribd logo
1 de 30
Fingerprint Identification
Chapter 10 Fingerprint Classification
Systems
LawTech Custom Publishing, Inc.
Copyright 2005
Overview
 Fingerprint

classification describes an
individual’s fingerprints
 Fingerprint classifications use codes on
fingerprint cards to file and retrieve
manual filing system

Fingerprint
Identification
Chapter Objectives
 Understand

classification of fingerprint
card using Henry system
 Understand classification of fingerprint
card using NCIC system

Fingerprint
Identification
Introduction
 Henry

System of Classification used
for most of 20th Century in U.S. and
most English speaking countries
Named after Sir Edward Henry of
England
 Developed system during late 1800s and
early 1900s


Fingerprint
Identification
Introduction (cont.)
 National

Crime Information Center
(NCIC) Classification System
Computerized database used in U.S.
 Allows law enforcement agencies
nationwide access to wanted bulletins
and warrants for outstanding suspects and
fugitives


Fingerprint
Identification
Introduction (cont.)
 NCIC

Classification System (cont.)

Short cut to Henry System for quick
evaluation and possible elimination of
individuals as suspects
 Further investigation required for
individuals that match NCIC
classification including a full fingerprint
search


Fingerprint
Identification
Introduction (cont.)
Both classification systems based on 10
fingers
 Automation of fingerprint files will render
manual classification filing systems
obsolete
 Knowledge of fingerprint patterns and
anatomy of hand useful and valuable
information for fingerprint examiner


Fingerprint
Identification
Introduction (cont.)



Fingerprint classification not the same as
fingerprint identification
Classification uses class characteristics to group
like fingerprints for filing and retrieval




Many people have same fingerprint classification

Fingerprint identification uses individual
characteristics to individualize a print to a specific
person
Fingerprint
Identification
Introduction (cont.)



Fingerprint classification of suspect may appear
on wanted bulletins and arrest warrants
Law enforcement can use information as a
screening tool to eliminate persons being sought




Classifications that are quite different could be used to
exclude suspected individuals
Classifications that are similar or match would be
submitted to agency holding warrant to compare to
actual fingerprints
Fingerprint
Identification
The Henry System of Classification


Blocking Out the Fingerprint Card



Determine pattern type in each finger block
Indicate pattern using symbols at the bottom middle or
right side of each finger box on fingerprint card
 Plain Arch → A
 Tented Arch → T
 Ulnar Loop → / in direction of the loop
 Radial Loop → R
 All Whorls → W
Fingerprint
Identification
The Henry System of Classification
(cont.)
 Index

finger boxes

Use capital letter of pattern type, except
for ulnar loop
 Ulnar loops designated by a diagonal line
slanting in the direction of loop


 All


other finger boxes

Use small letter to indicate pattern type,
except for ulnar loop (same as above)
Fingerprint
Identification
The Henry System of Classification
(cont.)


Loop type patterns




Place ridge count in top right hand corner of finger box

Whorl patterns




Indicate type in upper right corner of finger box
 P – plain
 C – central pocket
 Small d – double loop
 X – accidental whorl
Indicate tracing (I, M, O) next to letter designating
whorl pattern in top right corner of finger box
Fingerprint
Identification
The Henry System of Classification
(cont.)
Blocked out
fingerprint
card

Fingerprint
Identification
Six Divisions of Fingerprint
Classification
 Primary


Only whorl patterns have value
Finger #1 and #2 → 6
Finger #3 and #4 → 8
Finger #5 and #6 → 4
Finger #7 and #8 → 2
Finger #9 and #10 → 1
Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)
Primary Chart

Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)
Whorl values for odd number fingers are
added up, plus 1 for the total denominator
 Whorl values for even number fingers are
added up, plus 1 for the total numerator
 Primary reported as a fraction
Total numerator (top, even numbered
boxes) over the denominator (bottom,
odd numbered boxes)


Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)
Primary = 1 indicates no whorl patterns
 Primary = 32 and over indicates all whorl
patterns
 Total of 1,024 possible primary
classifications


Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)
 Secondary

Indicated in fraction form
Capital letter of pattern type for right
index (#2) over left index (#7) fingers
 U – ulnar loops
 Example: W/U indicates right index
finger is whorl, and left index finger is
ulanr loop


Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)


Small Letter Group Secondary
Applies to fingerprint cards that have a plain
arch, tented arch, or radial loop
 Excludes index fingers
 Location of plain arch, tented arch or radial
loops by small letter a, t, or r indicated to right
or left of secondary
 Example: small letter a to the left of the top
capital letter of the secondary indicates that a
plain arch is in right thumb


Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)


Dashes used to indicate position of
fingers not containing a plain arch, tented
arch or radial loop in the middle, ring or
little fingers to the left of the secondary
Example: - a in the denominator
(lower) line of the fraction to the right
of the capital letter secondary indicate
a plain arch in left little finger
Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)




Print cards with small letter groups do not need
to add the sub-secondary or major divisions to
the classification formula

Sub-secondary


Value of ridge counts or tracings of right index
(2), right middle (3), and right ring (4) fingers
over the values of the left index (7), left middle
(8), and left ring (9) fingers
Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)
 Key


Ridge count of first loop, excluding little
fingers

 Major


Value of ridge counts or tracings of right
and left thumbs
Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)
 Final


Ridge count of loop in right little finger
(5)
If right little finger #5 is not a loop, use
left little finger #10
If finger #10 is not a loop then there is
no final value
Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)


VALUES TABLE FOR LOOP RIDGE COUNT
CONVERSIONS









Index fingers 1-9 = I; 10 or more = O
Middle fingers 1-10 = I; 11 or more = O
Ring fingers
1-13 = I; 14 or more = O
Right thumb
1-11 = S; 12-16 = M; 17 or more = L
 when the left thumb ridge count is 16 or less
Right thumb
1-17 = S; 18-22 = M; 23 or more = L
 when the left thumb ridge count is 17 or more
Left thumb
1-11 = S; 12-16 = M; 17 or more = L
Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)

Fingerprint card
showing Henry
Classification

Fingerprint
Identification
The NCIC Classification System


Two letter or number codes used to identify
fingerprint pattern type
Plain arch → AA
 Tented arch → TT
 Ulnar loop → ridge count
 Radial loop → ridge count plus 50
 Plain whorl → P, plus the tracing I,M, or O


Fingerprint
Identification
The NCIC Classification System (cont.)


Two letter or number codes (cont.)
Central Pocket → loop C, plus the tracing I, M,
or O
 Double loop whorl → small d plus tracing I, M,
or O
 Accidental → X, plus the tracing I, M, or O
 Missing finger → XX
 Scar or mutilation → SR


Fingerprint
Identification
The NCIC Classification System (cont.)
 Fingers

listed in order of finger
numbers on a ten-finger fingerprint
card
Right thumb is number 1
 Example: A5612CIPM dM661415XX
 Classification placed in twenty small
boxes that appear just above the
fingerprint boxes


Fingerprint
Identification
The NCIC Classification System (cont.)

Fingerprint card
showing NCIC
Classification

Fingerprint
Identification
Discussion Questions
“Blocking out” refers to the marking pattern
types, ridge counts, and whorl type and
tracing on a fingerprint card. True or False?
 A fingerprint card with a primary
classification of 1 over 1 would contain no
whorls. True or False?
 What fingerprint classification is used for
an electronic warrant?


Fingerprint
Identification

Más contenido relacionado

La actualidad más candente

Fingerprint Classification- slide 1
Fingerprint Classification- slide 1Fingerprint Classification- slide 1
Fingerprint Classification- slide 1Jury Rocamora
 
Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching Palash Mehar
 
Fundamentals of fingerprinting
Fundamentals of fingerprintingFundamentals of fingerprinting
Fundamentals of fingerprintingDakota Boswell
 
Handwriting and Document Examination
Handwriting and Document ExaminationHandwriting and Document Examination
Handwriting and Document ExaminationPrashant Mehta
 
Forensic Question Document Examination,
Forensic Question Document Examination,Forensic Question Document Examination,
Forensic Question Document Examination,Ishan Tiwari
 
Sample Sample Pattern Area training Module
Sample Sample  Pattern Area training ModuleSample Sample  Pattern Area training Module
Sample Sample Pattern Area training ModuleRmcauley
 
History of fingerprinting
History of fingerprintingHistory of fingerprinting
History of fingerprintingDakota Boswell
 
forensic questioned document examination
forensic questioned document examinationforensic questioned document examination
forensic questioned document examinationkiran malik
 
Forensic analysis of foot wear impression
Forensic analysis of foot wear impressionForensic analysis of foot wear impression
Forensic analysis of foot wear impressionSURYAKANT MISHRA
 
Forensic examination of signature
Forensic examination of signatureForensic examination of signature
Forensic examination of signatureShivangiRathore8
 
Portrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S ShaktawatPortrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S ShaktawatG.S Shaktawat
 
Fingerprints, Footprint Impressions, and Tire Impressions
Fingerprints, Footprint Impressions, and Tire ImpressionsFingerprints, Footprint Impressions, and Tire Impressions
Fingerprints, Footprint Impressions, and Tire ImpressionsSangeetha Balakrishnan
 
Internal ballistic
Internal ballisticInternal ballistic
Internal ballisticHemant Jain
 
Fingerprint patterns
Fingerprint patternsFingerprint patterns
Fingerprint patternsBlancoScience
 

La actualidad más candente (20)

Fingerprint Classification- slide 1
Fingerprint Classification- slide 1Fingerprint Classification- slide 1
Fingerprint Classification- slide 1
 
Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching
 
Fundamentals of fingerprinting
Fundamentals of fingerprintingFundamentals of fingerprinting
Fundamentals of fingerprinting
 
Handwriting and Document Examination
Handwriting and Document ExaminationHandwriting and Document Examination
Handwriting and Document Examination
 
Handwriting_analysis.ppt
Handwriting_analysis.pptHandwriting_analysis.ppt
Handwriting_analysis.ppt
 
Whorl Patterns
Whorl PatternsWhorl Patterns
Whorl Patterns
 
Forensic Question Document Examination,
Forensic Question Document Examination,Forensic Question Document Examination,
Forensic Question Document Examination,
 
Glass fractures
Glass fracturesGlass fractures
Glass fractures
 
Sample Sample Pattern Area training Module
Sample Sample  Pattern Area training ModuleSample Sample  Pattern Area training Module
Sample Sample Pattern Area training Module
 
History of fingerprinting
History of fingerprintingHistory of fingerprinting
History of fingerprinting
 
Questioned Document.pptx
Questioned Document.pptxQuestioned Document.pptx
Questioned Document.pptx
 
forensic questioned document examination
forensic questioned document examinationforensic questioned document examination
forensic questioned document examination
 
Forensic analysis of foot wear impression
Forensic analysis of foot wear impressionForensic analysis of foot wear impression
Forensic analysis of foot wear impression
 
Forensic examination of signature
Forensic examination of signatureForensic examination of signature
Forensic examination of signature
 
Forensic Ballistics
Forensic BallisticsForensic Ballistics
Forensic Ballistics
 
Portrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S ShaktawatPortrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S Shaktawat
 
Fingerprints, Footprint Impressions, and Tire Impressions
Fingerprints, Footprint Impressions, and Tire ImpressionsFingerprints, Footprint Impressions, and Tire Impressions
Fingerprints, Footprint Impressions, and Tire Impressions
 
Internal ballistic
Internal ballisticInternal ballistic
Internal ballistic
 
Fingerprint patterns
Fingerprint patternsFingerprint patterns
Fingerprint patterns
 
Disguised writing
Disguised writingDisguised writing
Disguised writing
 

Similar a fingerprint classification systems Henry and NCIC

Similar a fingerprint classification systems Henry and NCIC (6)

Fingerprints
FingerprintsFingerprints
Fingerprints
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
Henry’s 10 digit classification of fingerprint
Henry’s 10 digit classification of fingerprintHenry’s 10 digit classification of fingerprint
Henry’s 10 digit classification of fingerprint
 
Finger print revised jan 10
Finger print revised jan 10Finger print revised jan 10
Finger print revised jan 10
 
Forensics Topic: Fingerprints
Forensics Topic: FingerprintsForensics Topic: Fingerprints
Forensics Topic: Fingerprints
 
Classification
ClassificationClassification
Classification
 

Último

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

fingerprint classification systems Henry and NCIC

  • 1. Fingerprint Identification Chapter 10 Fingerprint Classification Systems LawTech Custom Publishing, Inc. Copyright 2005
  • 2. Overview  Fingerprint classification describes an individual’s fingerprints  Fingerprint classifications use codes on fingerprint cards to file and retrieve manual filing system Fingerprint Identification
  • 3. Chapter Objectives  Understand classification of fingerprint card using Henry system  Understand classification of fingerprint card using NCIC system Fingerprint Identification
  • 4. Introduction  Henry System of Classification used for most of 20th Century in U.S. and most English speaking countries Named after Sir Edward Henry of England  Developed system during late 1800s and early 1900s  Fingerprint Identification
  • 5. Introduction (cont.)  National Crime Information Center (NCIC) Classification System Computerized database used in U.S.  Allows law enforcement agencies nationwide access to wanted bulletins and warrants for outstanding suspects and fugitives  Fingerprint Identification
  • 6. Introduction (cont.)  NCIC Classification System (cont.) Short cut to Henry System for quick evaluation and possible elimination of individuals as suspects  Further investigation required for individuals that match NCIC classification including a full fingerprint search  Fingerprint Identification
  • 7. Introduction (cont.) Both classification systems based on 10 fingers  Automation of fingerprint files will render manual classification filing systems obsolete  Knowledge of fingerprint patterns and anatomy of hand useful and valuable information for fingerprint examiner  Fingerprint Identification
  • 8. Introduction (cont.)   Fingerprint classification not the same as fingerprint identification Classification uses class characteristics to group like fingerprints for filing and retrieval   Many people have same fingerprint classification Fingerprint identification uses individual characteristics to individualize a print to a specific person Fingerprint Identification
  • 9. Introduction (cont.)   Fingerprint classification of suspect may appear on wanted bulletins and arrest warrants Law enforcement can use information as a screening tool to eliminate persons being sought   Classifications that are quite different could be used to exclude suspected individuals Classifications that are similar or match would be submitted to agency holding warrant to compare to actual fingerprints Fingerprint Identification
  • 10. The Henry System of Classification  Blocking Out the Fingerprint Card   Determine pattern type in each finger block Indicate pattern using symbols at the bottom middle or right side of each finger box on fingerprint card  Plain Arch → A  Tented Arch → T  Ulnar Loop → / in direction of the loop  Radial Loop → R  All Whorls → W Fingerprint Identification
  • 11. The Henry System of Classification (cont.)  Index finger boxes Use capital letter of pattern type, except for ulnar loop  Ulnar loops designated by a diagonal line slanting in the direction of loop   All  other finger boxes Use small letter to indicate pattern type, except for ulnar loop (same as above) Fingerprint Identification
  • 12. The Henry System of Classification (cont.)  Loop type patterns   Place ridge count in top right hand corner of finger box Whorl patterns   Indicate type in upper right corner of finger box  P – plain  C – central pocket  Small d – double loop  X – accidental whorl Indicate tracing (I, M, O) next to letter designating whorl pattern in top right corner of finger box Fingerprint Identification
  • 13. The Henry System of Classification (cont.) Blocked out fingerprint card Fingerprint Identification
  • 14. Six Divisions of Fingerprint Classification  Primary  Only whorl patterns have value Finger #1 and #2 → 6 Finger #3 and #4 → 8 Finger #5 and #6 → 4 Finger #7 and #8 → 2 Finger #9 and #10 → 1 Fingerprint Identification
  • 15. Six Divisions of Fingerprint Classification (cont.) Primary Chart Fingerprint Identification
  • 16. Six Divisions of Fingerprint Classification (cont.) Whorl values for odd number fingers are added up, plus 1 for the total denominator  Whorl values for even number fingers are added up, plus 1 for the total numerator  Primary reported as a fraction Total numerator (top, even numbered boxes) over the denominator (bottom, odd numbered boxes)  Fingerprint Identification
  • 17. Six Divisions of Fingerprint Classification (cont.) Primary = 1 indicates no whorl patterns  Primary = 32 and over indicates all whorl patterns  Total of 1,024 possible primary classifications  Fingerprint Identification
  • 18. Six Divisions of Fingerprint Classification (cont.)  Secondary Indicated in fraction form Capital letter of pattern type for right index (#2) over left index (#7) fingers  U – ulnar loops  Example: W/U indicates right index finger is whorl, and left index finger is ulanr loop  Fingerprint Identification
  • 19. Six Divisions of Fingerprint Classification (cont.)  Small Letter Group Secondary Applies to fingerprint cards that have a plain arch, tented arch, or radial loop  Excludes index fingers  Location of plain arch, tented arch or radial loops by small letter a, t, or r indicated to right or left of secondary  Example: small letter a to the left of the top capital letter of the secondary indicates that a plain arch is in right thumb  Fingerprint Identification
  • 20. Six Divisions of Fingerprint Classification (cont.)  Dashes used to indicate position of fingers not containing a plain arch, tented arch or radial loop in the middle, ring or little fingers to the left of the secondary Example: - a in the denominator (lower) line of the fraction to the right of the capital letter secondary indicate a plain arch in left little finger Fingerprint Identification
  • 21. Six Divisions of Fingerprint Classification (cont.)   Print cards with small letter groups do not need to add the sub-secondary or major divisions to the classification formula Sub-secondary  Value of ridge counts or tracings of right index (2), right middle (3), and right ring (4) fingers over the values of the left index (7), left middle (8), and left ring (9) fingers Fingerprint Identification
  • 22. Six Divisions of Fingerprint Classification (cont.)  Key  Ridge count of first loop, excluding little fingers  Major  Value of ridge counts or tracings of right and left thumbs Fingerprint Identification
  • 23. Six Divisions of Fingerprint Classification (cont.)  Final  Ridge count of loop in right little finger (5) If right little finger #5 is not a loop, use left little finger #10 If finger #10 is not a loop then there is no final value Fingerprint Identification
  • 24. Six Divisions of Fingerprint Classification (cont.)  VALUES TABLE FOR LOOP RIDGE COUNT CONVERSIONS       Index fingers 1-9 = I; 10 or more = O Middle fingers 1-10 = I; 11 or more = O Ring fingers 1-13 = I; 14 or more = O Right thumb 1-11 = S; 12-16 = M; 17 or more = L  when the left thumb ridge count is 16 or less Right thumb 1-17 = S; 18-22 = M; 23 or more = L  when the left thumb ridge count is 17 or more Left thumb 1-11 = S; 12-16 = M; 17 or more = L Fingerprint Identification
  • 25. Six Divisions of Fingerprint Classification (cont.) Fingerprint card showing Henry Classification Fingerprint Identification
  • 26. The NCIC Classification System  Two letter or number codes used to identify fingerprint pattern type Plain arch → AA  Tented arch → TT  Ulnar loop → ridge count  Radial loop → ridge count plus 50  Plain whorl → P, plus the tracing I,M, or O  Fingerprint Identification
  • 27. The NCIC Classification System (cont.)  Two letter or number codes (cont.) Central Pocket → loop C, plus the tracing I, M, or O  Double loop whorl → small d plus tracing I, M, or O  Accidental → X, plus the tracing I, M, or O  Missing finger → XX  Scar or mutilation → SR  Fingerprint Identification
  • 28. The NCIC Classification System (cont.)  Fingers listed in order of finger numbers on a ten-finger fingerprint card Right thumb is number 1  Example: A5612CIPM dM661415XX  Classification placed in twenty small boxes that appear just above the fingerprint boxes  Fingerprint Identification
  • 29. The NCIC Classification System (cont.) Fingerprint card showing NCIC Classification Fingerprint Identification
  • 30. Discussion Questions “Blocking out” refers to the marking pattern types, ridge counts, and whorl type and tracing on a fingerprint card. True or False?  A fingerprint card with a primary classification of 1 over 1 would contain no whorls. True or False?  What fingerprint classification is used for an electronic warrant?  Fingerprint Identification