Feeds

Scientists force confessions from mucky fingerprints

No more clean getaways

Top 5 reasons to deploy VMware with Tegile

Wannabe criminals would do well to listen to their dear old ma's and wash their hands regularly, or PC Plod will be knocking on the door in double quick time*.

According to boffins at London's Imperial College, minute traces of chemicals are left behind in our fingerprints that could be very useful to police trying to track down a suspect.

The technique could help investigators find out about the crims' diet and race, the scientists claim, as well as identifying traces of dodgy items like explosives, narcotics, and so on.

In addition, the researchers say relatively large quantities of urea in the residue indicate that the fingerprints are from a man. Smaller traces indicate a woman. [Or someone who shakes hands with lots of men perhaps. Like the Queen? Ed]

Conventional fingerprint collection tends to destroy the tiny traces of chemicals we leave behind every time we touch something. But the researchers at Imperial found that using an ordinary gelatine based tape allowed them to lift and preserve this chemical fingerprint.

The prints are then analysed in a spectroscopic microscope to reveal the particular chemical profile associated with the print.

Research leader Professor Sergei Kazarian says the work could help investigators working on difficult cases like arson, where fingerprints are particularly hard to lift.

"By focusing on what is left in a fingerprint after periods of time, scientists could potentially gauge how old a crime scene is. Studying what happens to prints when they are exposed to high temperatures could also be particularly significant," he said.

Kazarian says he sees a role for the technique in the courtrooms of the future. At the time of press he could not be reached for further comment on the precision of identification that the chemicals could provide, and how researchers would distinguish between substances a person had excreted, vs external contamination.

*It probably wouldn't help, We're talking tiny traces here. Sorry. ®

Internet Security Threat Report 2014

More from The Register

next story
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
Renewable energy 'simply WON'T WORK': Top Google engineers
Windmills, solar, tidal - all a 'false hope', say Stanford PhDs
SEX BEAST SEALS may be egging each other on to ATTACK PENGUINS
Boffin: 'I think the behaviour is increasing in frequency'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
The next big thing in medical science: POO TRANSPLANTS
Your brother's gonna die, kid, unless we can give him your, well ...
NASA launches new climate model at SC14
75 days of supercomputing later ...
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Simon's says quantum computing will work
Boffins blast algorithm with half a dozen qubits
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.