Contact for a training/ support in digital safety

Use a pseudonym if you are not comfortable with submiting your real name

FINGERPRINTS; SECURITY FEATURES

A finger print placed on paper

Fingerprint identification is the method of identifying people with patterns on their fingertips. Fingertips have been used for a very long time, since the world’s beginning. You understand that in the early days, fingerprints were used instead of signatures because most people didn’t know how to write. If there was a land agreement to be signed, the people placed their fingers in mud and then pressed on the paper to be able to sign.

Why are fingerprints unique security features?

No two fingerprints look alike, there is a difference. Even after making several comparisons using billions of computations, it has been discovered that there has to be a great difference in the fingertips. That is why many governments have adopted the use of fingerprints as a security feature. Read onin.com’ article on fingerprints

https://onin.com/fp/fphistory.html

In what instances are fingerprints used in security?

In criminal cases.

The police have often used fingerprints to identify criminals. If there is a murder scene, one of the first things that the police will check out for is the fingerprint. That is why if you find someone dead, you shouldn’t touch them because you will destroy the evidence and be pinned for a crime you did not commit. What do police usually scan? They could scan anything that could be touched like a cloth, door knobs, computers

How are the fingerprints scanned?

Once evidence is collected, fingerprints are computerized by the police. The collection of fingerprints varies according to the type of fingerprint; latent fingerprints are formed when the body’s sweat gets in touch with the surface; they are not readily available and detection requires the use of fingerprint powders.

Patent fingerprints are the easiest to collect; they are simply photographed using a high-resolution with a forensic measurement scale in the image. The investigators can improve on the fingerprints by working on the lighting or using dyes

Latent fingerprints are a bit hard to scan and trace; the surface suspected to have the fingerprint is dusted with fingerprint powder and when the fingerprint appears, it is photographed improved, and lifted from the surface using superglue

Comparison with already collected information

So the already existing databases are used to analyze potential matching sources. Some of the databases could be government databases where fingerprints are captured for example the Interpol database, and the National Identification Agency database. Many of the databases enable the identification of the match. It is after making the match that the potential offenders are identified. That is why there are instances when arrests are performed

In the protection of electronic devices

We realize that if we use fingerprints to protect our devices like phones, no one has access to the information that is in them. This is because fingerprints never look alike and so if a hacker tries to open your phone, the fingerprint will be repelled

Biometric as a lock; sample finger prints

In the protection of bank accounts

For you to be able to withdraw money when you don’t have proof of identification, you must put your fingerprint for scanning so that protection is ensured in the account. When you go and withdraw money from a bank’s counter, your fingerprint is scanned to verify if you are the owner of the account

In clearing off offenses

This happens in the Interpol mostly. If the state wants to verify that there is nothing wrong with you and you are not a criminal, your details are collected and matched with the details of other security agencies to show you are not a criminal

In the identification of unknown persons.

This could happen when someone had been kidnapped and has now been recovered when an accident has happened and the police don’t even know the name of the accident victims

There are so many instances where persons have been kidnapped but I am just going to refer you to external links that could aid your reading. I am not so fine today

https://www.forensicsciencesimplified.org/prints/how.html

https://www.forensicsciencesimplified.org/prints/why.html#:~:text=Fingerprints%20can%20be%20used%20in,their%20fingerprints%20are%20on%20file)

One advise is that whenever you come across a crime scene, try as much as possible not to touch anything or use gloves if you must because you may be implicated for a crime you never committed. Your fingerprint often stays on the item. I have already described how it is possible above and trust me you would want to fall victim

You may love other articles on this blog and so I am embedding the posts of this blog for your relevance

Prevent adware attacks

Prevent adware attacks with these 5 useful tips

Adware has a high potential of harming your computer as well as destroying every information you hav…

Why your Linkedin account was restricted

10 reasons why your linkedin account was restricted

Are you wondering why your LinkedIn account was restricted? LinkedIn is a good platform for networki…

Can anyone hack google photos?

Can anyone hack google photos?: 5 answers

Google Photos is a feature of your Google account. The question ” Can anyone hack Google Photo…

6 Secure browsing practices to adopt

6 secure browsing practices to adopt in 2025 for safer online experiences

Secure browsing practices are key to ensuring that internet users do not fall prey of cyber threats …

Phones are used for vishing

10 ways to know it is Vishing; a famous phishing scam nowadays

Vishing is the act of scammers using malicious calls to gather information or money from their victi…

Be cautious of alerts from paypal for resetting your password

6 Tips for preventing PayPal Scam

Preventing PayPal scam is crucial in this error where there is too much malicious activity being don…

6 effective tips for checking phishing links

Tools for checking phishing links Phishing links have traditionally been used to steal people’…

Archives

Prevent adware attacks with these 5 useful tips

Adware has a high potential of harming your computer as well as destroying every information you hav…

10 reasons why your linkedin account was restricted

Are you wondering why your LinkedIn account was restricted? LinkedIn is a good platform for networki…

Can anyone hack google photos?: 5 answers

Google Photos is a feature of your Google account. The question ” Can anyone hack Google Photo…

6 secure browsing practices to adopt in 2025 for safer online experiences

Secure browsing practices are key to ensuring that internet users do not fall prey of cyber threats …

10 ways to know it is Vishing; a famous phishing scam nowadays

Vishing is the act of scammers using malicious calls to gather information or money from their victi…

6 Tips for preventing PayPal Scam

Preventing PayPal scam is crucial in this error where there is too much malicious activity being don…

6 effective tips for checking phishing links

Tools for checking phishing links Phishing links have traditionally been used to steal people’…

1 2 3 7

About author

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *