SlideShare uma empresa Scribd logo
1 de 30
Fingerprint Identification
Chapter 10 Fingerprint Classification
Systems
LawTech Custom Publishing, Inc.
Copyright 2005
Overview
 Fingerprint

classification describes an
individual’s fingerprints
 Fingerprint classifications use codes on
fingerprint cards to file and retrieve
manual filing system

Fingerprint
Identification
Chapter Objectives
 Understand

classification of fingerprint
card using Henry system
 Understand classification of fingerprint
card using NCIC system

Fingerprint
Identification
Introduction
 Henry

System of Classification used
for most of 20th Century in U.S. and
most English speaking countries
Named after Sir Edward Henry of
England
 Developed system during late 1800s and
early 1900s


Fingerprint
Identification
Introduction (cont.)
 National

Crime Information Center
(NCIC) Classification System
Computerized database used in U.S.
 Allows law enforcement agencies
nationwide access to wanted bulletins
and warrants for outstanding suspects and
fugitives


Fingerprint
Identification
Introduction (cont.)
 NCIC

Classification System (cont.)

Short cut to Henry System for quick
evaluation and possible elimination of
individuals as suspects
 Further investigation required for
individuals that match NCIC
classification including a full fingerprint
search


Fingerprint
Identification
Introduction (cont.)
Both classification systems based on 10
fingers
 Automation of fingerprint files will render
manual classification filing systems
obsolete
 Knowledge of fingerprint patterns and
anatomy of hand useful and valuable
information for fingerprint examiner


Fingerprint
Identification
Introduction (cont.)



Fingerprint classification not the same as
fingerprint identification
Classification uses class characteristics to group
like fingerprints for filing and retrieval




Many people have same fingerprint classification

Fingerprint identification uses individual
characteristics to individualize a print to a specific
person
Fingerprint
Identification
Introduction (cont.)



Fingerprint classification of suspect may appear
on wanted bulletins and arrest warrants
Law enforcement can use information as a
screening tool to eliminate persons being sought




Classifications that are quite different could be used to
exclude suspected individuals
Classifications that are similar or match would be
submitted to agency holding warrant to compare to
actual fingerprints
Fingerprint
Identification
The Henry System of Classification


Blocking Out the Fingerprint Card



Determine pattern type in each finger block
Indicate pattern using symbols at the bottom middle or
right side of each finger box on fingerprint card
 Plain Arch → A
 Tented Arch → T
 Ulnar Loop → / in direction of the loop
 Radial Loop → R
 All Whorls → W
Fingerprint
Identification
The Henry System of Classification
(cont.)
 Index

finger boxes

Use capital letter of pattern type, except
for ulnar loop
 Ulnar loops designated by a diagonal line
slanting in the direction of loop


 All


other finger boxes

Use small letter to indicate pattern type,
except for ulnar loop (same as above)
Fingerprint
Identification
The Henry System of Classification
(cont.)


Loop type patterns




Place ridge count in top right hand corner of finger box

Whorl patterns




Indicate type in upper right corner of finger box
 P – plain
 C – central pocket
 Small d – double loop
 X – accidental whorl
Indicate tracing (I, M, O) next to letter designating
whorl pattern in top right corner of finger box
Fingerprint
Identification
The Henry System of Classification
(cont.)
Blocked out
fingerprint
card

Fingerprint
Identification
Six Divisions of Fingerprint
Classification
 Primary


Only whorl patterns have value
Finger #1 and #2 → 6
Finger #3 and #4 → 8
Finger #5 and #6 → 4
Finger #7 and #8 → 2
Finger #9 and #10 → 1
Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)
Primary Chart

Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)
Whorl values for odd number fingers are
added up, plus 1 for the total denominator
 Whorl values for even number fingers are
added up, plus 1 for the total numerator
 Primary reported as a fraction
Total numerator (top, even numbered
boxes) over the denominator (bottom,
odd numbered boxes)


Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)
Primary = 1 indicates no whorl patterns
 Primary = 32 and over indicates all whorl
patterns
 Total of 1,024 possible primary
classifications


Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)
 Secondary

Indicated in fraction form
Capital letter of pattern type for right
index (#2) over left index (#7) fingers
 U – ulnar loops
 Example: W/U indicates right index
finger is whorl, and left index finger is
ulanr loop


Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)


Small Letter Group Secondary
Applies to fingerprint cards that have a plain
arch, tented arch, or radial loop
 Excludes index fingers
 Location of plain arch, tented arch or radial
loops by small letter a, t, or r indicated to right
or left of secondary
 Example: small letter a to the left of the top
capital letter of the secondary indicates that a
plain arch is in right thumb


Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)


Dashes used to indicate position of
fingers not containing a plain arch, tented
arch or radial loop in the middle, ring or
little fingers to the left of the secondary
Example: - a in the denominator
(lower) line of the fraction to the right
of the capital letter secondary indicate
a plain arch in left little finger
Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)




Print cards with small letter groups do not need
to add the sub-secondary or major divisions to
the classification formula

Sub-secondary


Value of ridge counts or tracings of right index
(2), right middle (3), and right ring (4) fingers
over the values of the left index (7), left middle
(8), and left ring (9) fingers
Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)
 Key


Ridge count of first loop, excluding little
fingers

 Major


Value of ridge counts or tracings of right
and left thumbs
Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)
 Final


Ridge count of loop in right little finger
(5)
If right little finger #5 is not a loop, use
left little finger #10
If finger #10 is not a loop then there is
no final value
Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)


VALUES TABLE FOR LOOP RIDGE COUNT
CONVERSIONS









Index fingers 1-9 = I; 10 or more = O
Middle fingers 1-10 = I; 11 or more = O
Ring fingers
1-13 = I; 14 or more = O
Right thumb
1-11 = S; 12-16 = M; 17 or more = L
 when the left thumb ridge count is 16 or less
Right thumb
1-17 = S; 18-22 = M; 23 or more = L
 when the left thumb ridge count is 17 or more
Left thumb
1-11 = S; 12-16 = M; 17 or more = L
Fingerprint
Identification
Six Divisions of Fingerprint
Classification (cont.)

Fingerprint card
showing Henry
Classification

Fingerprint
Identification
The NCIC Classification System


Two letter or number codes used to identify
fingerprint pattern type
Plain arch → AA
 Tented arch → TT
 Ulnar loop → ridge count
 Radial loop → ridge count plus 50
 Plain whorl → P, plus the tracing I,M, or O


Fingerprint
Identification
The NCIC Classification System (cont.)


Two letter or number codes (cont.)
Central Pocket → loop C, plus the tracing I, M,
or O
 Double loop whorl → small d plus tracing I, M,
or O
 Accidental → X, plus the tracing I, M, or O
 Missing finger → XX
 Scar or mutilation → SR


Fingerprint
Identification
The NCIC Classification System (cont.)
 Fingers

listed in order of finger
numbers on a ten-finger fingerprint
card
Right thumb is number 1
 Example: A5612CIPM dM661415XX
 Classification placed in twenty small
boxes that appear just above the
fingerprint boxes


Fingerprint
Identification
The NCIC Classification System (cont.)

Fingerprint card
showing NCIC
Classification

Fingerprint
Identification
Discussion Questions
“Blocking out” refers to the marking pattern
types, ridge counts, and whorl type and
tracing on a fingerprint card. True or False?
 A fingerprint card with a primary
classification of 1 over 1 would contain no
whorls. True or False?
 What fingerprint classification is used for
an electronic warrant?


Fingerprint
Identification

Mais conteúdo relacionado

Mais procurados

Questioned documents Full PPT
Questioned documents Full PPTQuestioned documents Full PPT
Questioned documents Full PPTDon Caeiro
 
Fundamentals of fingerprinting
Fundamentals of fingerprintingFundamentals of fingerprinting
Fundamentals of fingerprintingDakota Boswell
 
Portrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S ShaktawatPortrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S ShaktawatG.S Shaktawat
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identificationguest8cbcb02
 
forensic questioned document examination
forensic questioned document examinationforensic questioned document examination
forensic questioned document examinationkiran malik
 
Class Characteristics of Handwriting.pptx
Class Characteristics of Handwriting.pptxClass Characteristics of Handwriting.pptx
Class Characteristics of Handwriting.pptxSoham Bhattacharya
 
Types of Crime Scenes
Types of Crime ScenesTypes of Crime Scenes
Types of Crime ScenesDon Caeiro
 
Tool marks and its forensic significance
Tool marks and its forensic significanceTool marks and its forensic significance
Tool marks and its forensic significanceStina14
 
Searching the crime scene
Searching the crime sceneSearching the crime scene
Searching the crime sceneBlancoScience
 
Crime scene management
Crime scene managementCrime scene management
Crime scene managementHafeez Bhutta
 
Handwriting and Document Examination
Handwriting and Document ExaminationHandwriting and Document Examination
Handwriting and Document ExaminationPrashant Mehta
 
Crime scene sketching basics
Crime scene sketching basicsCrime scene sketching basics
Crime scene sketching basicsnruhland
 

Mais procurados (20)

Glass fractures
Glass fracturesGlass fractures
Glass fractures
 
Fingerprint Classification
Fingerprint ClassificationFingerprint Classification
Fingerprint Classification
 
Questioned documents Full PPT
Questioned documents Full PPTQuestioned documents Full PPT
Questioned documents Full PPT
 
Disguised writing
Disguised writingDisguised writing
Disguised writing
 
Fundamentals of fingerprinting
Fundamentals of fingerprintingFundamentals of fingerprinting
Fundamentals of fingerprinting
 
Portrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S ShaktawatPortrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S Shaktawat
 
Gun shot residue
Gun shot residueGun shot residue
Gun shot residue
 
TOOL MARKS
TOOL MARKSTOOL MARKS
TOOL MARKS
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
 
forensic questioned document examination
forensic questioned document examinationforensic questioned document examination
forensic questioned document examination
 
Toolmarks
ToolmarksToolmarks
Toolmarks
 
Introduction to Questioned Document
Introduction to Questioned DocumentIntroduction to Questioned Document
Introduction to Questioned Document
 
Class Characteristics of Handwriting.pptx
Class Characteristics of Handwriting.pptxClass Characteristics of Handwriting.pptx
Class Characteristics of Handwriting.pptx
 
Types of Crime Scenes
Types of Crime ScenesTypes of Crime Scenes
Types of Crime Scenes
 
Tool marks and its forensic significance
Tool marks and its forensic significanceTool marks and its forensic significance
Tool marks and its forensic significance
 
Searching the crime scene
Searching the crime sceneSearching the crime scene
Searching the crime scene
 
Crime scene management
Crime scene managementCrime scene management
Crime scene management
 
Handwriting and Document Examination
Handwriting and Document ExaminationHandwriting and Document Examination
Handwriting and Document Examination
 
Ridge counting-and-tracing
Ridge counting-and-tracingRidge counting-and-tracing
Ridge counting-and-tracing
 
Crime scene sketching basics
Crime scene sketching basicsCrime scene sketching basics
Crime scene sketching basics
 

Último

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Último (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

fingerprint classification systems Henry and NCIC

  • 1. Fingerprint Identification Chapter 10 Fingerprint Classification Systems LawTech Custom Publishing, Inc. Copyright 2005
  • 2. Overview  Fingerprint classification describes an individual’s fingerprints  Fingerprint classifications use codes on fingerprint cards to file and retrieve manual filing system Fingerprint Identification
  • 3. Chapter Objectives  Understand classification of fingerprint card using Henry system  Understand classification of fingerprint card using NCIC system Fingerprint Identification
  • 4. Introduction  Henry System of Classification used for most of 20th Century in U.S. and most English speaking countries Named after Sir Edward Henry of England  Developed system during late 1800s and early 1900s  Fingerprint Identification
  • 5. Introduction (cont.)  National Crime Information Center (NCIC) Classification System Computerized database used in U.S.  Allows law enforcement agencies nationwide access to wanted bulletins and warrants for outstanding suspects and fugitives  Fingerprint Identification
  • 6. Introduction (cont.)  NCIC Classification System (cont.) Short cut to Henry System for quick evaluation and possible elimination of individuals as suspects  Further investigation required for individuals that match NCIC classification including a full fingerprint search  Fingerprint Identification
  • 7. Introduction (cont.) Both classification systems based on 10 fingers  Automation of fingerprint files will render manual classification filing systems obsolete  Knowledge of fingerprint patterns and anatomy of hand useful and valuable information for fingerprint examiner  Fingerprint Identification
  • 8. Introduction (cont.)   Fingerprint classification not the same as fingerprint identification Classification uses class characteristics to group like fingerprints for filing and retrieval   Many people have same fingerprint classification Fingerprint identification uses individual characteristics to individualize a print to a specific person Fingerprint Identification
  • 9. Introduction (cont.)   Fingerprint classification of suspect may appear on wanted bulletins and arrest warrants Law enforcement can use information as a screening tool to eliminate persons being sought   Classifications that are quite different could be used to exclude suspected individuals Classifications that are similar or match would be submitted to agency holding warrant to compare to actual fingerprints Fingerprint Identification
  • 10. The Henry System of Classification  Blocking Out the Fingerprint Card   Determine pattern type in each finger block Indicate pattern using symbols at the bottom middle or right side of each finger box on fingerprint card  Plain Arch → A  Tented Arch → T  Ulnar Loop → / in direction of the loop  Radial Loop → R  All Whorls → W Fingerprint Identification
  • 11. The Henry System of Classification (cont.)  Index finger boxes Use capital letter of pattern type, except for ulnar loop  Ulnar loops designated by a diagonal line slanting in the direction of loop   All  other finger boxes Use small letter to indicate pattern type, except for ulnar loop (same as above) Fingerprint Identification
  • 12. The Henry System of Classification (cont.)  Loop type patterns   Place ridge count in top right hand corner of finger box Whorl patterns   Indicate type in upper right corner of finger box  P – plain  C – central pocket  Small d – double loop  X – accidental whorl Indicate tracing (I, M, O) next to letter designating whorl pattern in top right corner of finger box Fingerprint Identification
  • 13. The Henry System of Classification (cont.) Blocked out fingerprint card Fingerprint Identification
  • 14. Six Divisions of Fingerprint Classification  Primary  Only whorl patterns have value Finger #1 and #2 → 6 Finger #3 and #4 → 8 Finger #5 and #6 → 4 Finger #7 and #8 → 2 Finger #9 and #10 → 1 Fingerprint Identification
  • 15. Six Divisions of Fingerprint Classification (cont.) Primary Chart Fingerprint Identification
  • 16. Six Divisions of Fingerprint Classification (cont.) Whorl values for odd number fingers are added up, plus 1 for the total denominator  Whorl values for even number fingers are added up, plus 1 for the total numerator  Primary reported as a fraction Total numerator (top, even numbered boxes) over the denominator (bottom, odd numbered boxes)  Fingerprint Identification
  • 17. Six Divisions of Fingerprint Classification (cont.) Primary = 1 indicates no whorl patterns  Primary = 32 and over indicates all whorl patterns  Total of 1,024 possible primary classifications  Fingerprint Identification
  • 18. Six Divisions of Fingerprint Classification (cont.)  Secondary Indicated in fraction form Capital letter of pattern type for right index (#2) over left index (#7) fingers  U – ulnar loops  Example: W/U indicates right index finger is whorl, and left index finger is ulanr loop  Fingerprint Identification
  • 19. Six Divisions of Fingerprint Classification (cont.)  Small Letter Group Secondary Applies to fingerprint cards that have a plain arch, tented arch, or radial loop  Excludes index fingers  Location of plain arch, tented arch or radial loops by small letter a, t, or r indicated to right or left of secondary  Example: small letter a to the left of the top capital letter of the secondary indicates that a plain arch is in right thumb  Fingerprint Identification
  • 20. Six Divisions of Fingerprint Classification (cont.)  Dashes used to indicate position of fingers not containing a plain arch, tented arch or radial loop in the middle, ring or little fingers to the left of the secondary Example: - a in the denominator (lower) line of the fraction to the right of the capital letter secondary indicate a plain arch in left little finger Fingerprint Identification
  • 21. Six Divisions of Fingerprint Classification (cont.)   Print cards with small letter groups do not need to add the sub-secondary or major divisions to the classification formula Sub-secondary  Value of ridge counts or tracings of right index (2), right middle (3), and right ring (4) fingers over the values of the left index (7), left middle (8), and left ring (9) fingers Fingerprint Identification
  • 22. Six Divisions of Fingerprint Classification (cont.)  Key  Ridge count of first loop, excluding little fingers  Major  Value of ridge counts or tracings of right and left thumbs Fingerprint Identification
  • 23. Six Divisions of Fingerprint Classification (cont.)  Final  Ridge count of loop in right little finger (5) If right little finger #5 is not a loop, use left little finger #10 If finger #10 is not a loop then there is no final value Fingerprint Identification
  • 24. Six Divisions of Fingerprint Classification (cont.)  VALUES TABLE FOR LOOP RIDGE COUNT CONVERSIONS       Index fingers 1-9 = I; 10 or more = O Middle fingers 1-10 = I; 11 or more = O Ring fingers 1-13 = I; 14 or more = O Right thumb 1-11 = S; 12-16 = M; 17 or more = L  when the left thumb ridge count is 16 or less Right thumb 1-17 = S; 18-22 = M; 23 or more = L  when the left thumb ridge count is 17 or more Left thumb 1-11 = S; 12-16 = M; 17 or more = L Fingerprint Identification
  • 25. Six Divisions of Fingerprint Classification (cont.) Fingerprint card showing Henry Classification Fingerprint Identification
  • 26. The NCIC Classification System  Two letter or number codes used to identify fingerprint pattern type Plain arch → AA  Tented arch → TT  Ulnar loop → ridge count  Radial loop → ridge count plus 50  Plain whorl → P, plus the tracing I,M, or O  Fingerprint Identification
  • 27. The NCIC Classification System (cont.)  Two letter or number codes (cont.) Central Pocket → loop C, plus the tracing I, M, or O  Double loop whorl → small d plus tracing I, M, or O  Accidental → X, plus the tracing I, M, or O  Missing finger → XX  Scar or mutilation → SR  Fingerprint Identification
  • 28. The NCIC Classification System (cont.)  Fingers listed in order of finger numbers on a ten-finger fingerprint card Right thumb is number 1  Example: A5612CIPM dM661415XX  Classification placed in twenty small boxes that appear just above the fingerprint boxes  Fingerprint Identification
  • 29. The NCIC Classification System (cont.) Fingerprint card showing NCIC Classification Fingerprint Identification
  • 30. Discussion Questions “Blocking out” refers to the marking pattern types, ridge counts, and whorl type and tracing on a fingerprint card. True or False?  A fingerprint card with a primary classification of 1 over 1 would contain no whorls. True or False?  What fingerprint classification is used for an electronic warrant?  Fingerprint Identification