HOW FINGERPRINTS ARE USED TO DETERMINE SUSPECTS

Modern days technology has advanced to the level of using biometry as security. Mobile phones, laptops, doors and many gadgets uses biometry as a form of encryption to safeguard it owner's data. The use of biometry for security is very efficient, infact the use of fingerprints is most reliable because no 2 human have same fingerprints, neither identical twins.
Moreover, these gadgets are online devices, but have you ever thought of who is on the other end of your phone?.
The data stored in your phone, are you the only one seeing it?.
These are rhetorical questions, one would not have thought of, but the truth is, all you biometry data are sent to your country's security control agents.


Literally everything you touch, you leave your fingerprints on it, and this makes it easy for the police and other investigation bodies find a criminal.

How Do Police Collect Fingerprints?.

Fingerprints duplicated on a material are of 2 types;
  • The Visible Print
  • The Latent Print
The visible print are made on surface that creates a visible copy of what is impressed on it, e.g Blood, Clay, Dirt and Oil. Prints made by these material are visible and collectible. Whereas, the latent print are prints formed on surfaces which are not visible to the eyes until dark powder is applied under laser light or any other light sources. Latent prints are formed by sweat, water, and other substances that comes out of the skin.

Images of these prints are collected by the investigation officers and they find a perfect match of the prints in their data base. Police get records of bank registrations, mobile SIM registrations, and many data that involves people's biometry signatures.

Mobile phones and other online devices are being monitored by secret agents on the other end of your network,. At-least three strands of network lines running into an online device is enough to track and hack a persons database. The term is called TRIANGULATION.

COMMENTS AND QUESTIONS ARE WELCOMED IN THE COMMENT BOX

WE WILL REPLY AS SOON AS WE CAN

PLEASE SHARE FOR OTHERS TO BENEFIT

READ MORE:


READ ALSO:

Comments

  1. Technology will not kuku kill us

    ReplyDelete
    Replies
    1. Smiles aamin ooo, pls share for others to gain

      Delete
  2. There you go, 👏pls share for others to gain

    ReplyDelete
  3. Replies
    1. That's the fun abt it, pls share with other to benefit as well

      Delete
  4. This is great, technology has gone beyond what people think it of, how I wish government should apply technological strategies in combating national bandits

    ReplyDelete
    Replies
    1. We are developing, most of the development will cone from we the youth.. But single handedly without waiting for support

      Delete
  5. Replies
    1. Exactly, share to others as well to inform them

      Delete
  6. Wow...this really teaches safety in all we do and post, it's an awareness thou.. thank you

    ReplyDelete
    Replies
    1. You welcome,please share for other to know about it as well

      Delete
  7. Replies
    1. Thanks, click on share to make others educated abt it

      Delete

Post a Comment