What is Restflix?



Getting enough sleep is an essential part of our health but sometimes it's hard to turn your mind off at night. Restflix is designed to help users fall asleep faster and stay asleep through the night. It uses a technology called binaural beats' to harness the brain's responsiveness to sound and help create a restful state. The sleep streaming service offers over 20+ channels filled with hundreds of hours of soothing bedtime stories, music, meditations and dark screen videos that aim to ease anxiety OS and stress and fall into a peaceful slumber. Fall asleep to ocean sounds, o rainstorms and the chirp of nature, along with visual aids. Even if you're not having trouble sleeping, Restflix is a helpful tool for relaxation. The app is compatible with iOS, Amazon Fire, Apple TV, Roku and Android.



Even if you're not having trouble sleeping, Restflix can be a valuable tool to help you relax and develop a healing meditation practice.



The good news is that the reviews back up what it claims to do, too. Restflix has earned perfect 5-star ratings on both the Google Play Store and App Store because it really works. You don't have to struggle to sleep each night and drag through each day. Get the best sleep of your life with Restflix. Right now, you can save big. Get 40 percent off a one-year subscription at just $29.99, 50 percent off a two-year subscription at $49.99, or 59 percent off a three-year subscription at $59.99.



 



Picture Credit : Google


A mask that integrates safety with hands-free access to your smartphone



Maskfone is a "hands-free" smart mask that allows wearers to take calls, listen to music, and access their virtual assistant without removing their protective barrier. It has medical-grade, replaceable PM 2.5 and N95 filters, IPX5 water resistance, adjustable neoprene rubber ear hooks, a cable clip and the fabric used is washable too. An internal microphone provides access to clearer voice calls thanks to background noise isolation, while a wireless Bluetooth headset offers 8-12 hours of playtime/listening, whether it be to music, podcasts, audio books or phone calls. It even allows the user to use voice projection while speaking to someone in person powered by Hubble M HASKFON connect app. Masfone is compatible with voice assistants like Alexa, Siri and Google Assistant, so users will be able to use it to control smart home appliances as well.



 



Picture Credit : Google


What is moulage?



When emergency medical personnel are being trained, simulations of victims are used in the practice scenarios. This is where moulage comes in. It is the French word for casting or moulding. Moulage technicians use the same methods in accident and disaster scenes in movies.



Moulage may be applied to dummies or on people who are pretend victims and it can simulate all kinds of injuries. It may be simple make-up, false wounds made from rubber or latex or involve complicated prosthetics (artificial devices). An expert in moulage can fake a several limb, mangle a car accident victim, or create less obvious injuries which require careful examination and an in-depth patient interview.



Several firms specialize in moulage. They may work in the film industry or in emergency services training. Medical colleges usually have a moulage department so that a steady supply of fake injuries is available for lectures and practice.



 



Picture Credit : Google


How a soldier can ‘see’ in the dark?



The nightsight can turn night into day for a soldier, which means that darkness no longer provides cover for enemy troops. With a nightsight their movements can easily be detected, exposing them to accurate fire.



A nightsight looks like an oversized telescopic sight. It enables a soldier to see clearly on all but the darkest nights by amplifying moonlight or starlight. First a highly sensitive photoelectric cell converts the image into an electrical signal, just as it would in a TV camera. Then the electrical signal is amplified by circuits similar to those of a hi-fi amplifier. It is finally turned back into an image and displayed on a small TV screen.



Even on a night that most people would describe as pitch black, there is usually some light, if only from the stars. In such conditions a soldier can accurately aim at a target up to 400yds (365m) away. More powerful versions, with a range of 1100yds (1km), are used by artillery, tanks, helicopters and aircraft.



If there is not even a glimmer of starlight, a different instrument can be used – an infrared camera, which detects hear rather than light. Objects that generate heat – for example aircraft, missile outlets, or army camp fires – can be detected at a range of several miles. These signals are used routinely in surveillance operations. During the Falklands War, they were used by British troops to detect the position of Argentine defences. Infrared cameras can also detect the body heat of an enemy soldier.



When all soldiers, tabks an aircraft are regularly equipped with nightsights, battle will be possible 24 hours a day.



 



Picture Credit : Google


What is the device called that record all flight data?



The most important pieces of wreckage to be recovered are usually the two recorders carried on all civil airliners.



The flight data recorder provides a record of the movements of key instruments, such as airspeed and altitude indicators, and the positions of rudders and spoilers. The information is recorded as electronic pulses on a tape. When the tape is played back, it will give a computer printout of the aircraft’s movements. A computer screen can also be programmed to look like the main instruments, giving a more realistic playback.



In the future it may be possible to increase the items recorded and to play them back through a flight simulator, which is normally used for training pilots, to re-create the cockpit of the aircraft in the hours before it crashed. Flight data recorders can record up to 200 hours of flying time.



Cockpit voice recorders pick up conversations and sounds of the crew. They work on a continuous tape lasting 30 minutes, so at any time only the last 30 minutes is recorded. A weakness of the system is that if a crash does not stop the recorder working, it can remain switched on and erase the vital section.



The recorders are installed in the rear of aircraft – the area most likely to survive a crash. They are housed in a case made of two shells of stainless steel with heat protective material between. They must be able to survivor a temperature of 2000ºF (1100ºC) for 30 minutes.



 



Picture Credit : Google


What are the old and new ways of outsmarting smugglers?



Customs officers at Southampton were highly suspicious of part of a cargo on its way from Colombia – a major drug-producing country – to the Netherlands. The padlocks on a container filled with ceramic tiles seemed to have been tampered with. So, with nothing more than this and intuition to go on, the officers decided to investigate.



The cargo had been unloaded from a container ship for routine re-stowage and the officers had to act swiftly and secretively.



They removed the container for examination and came across a hidden steel compartment 4in (100mm) deep running the length of its top. The compartment was cut open with oxyacetylene torches and inside was found 460lb (208kg) of cocaine, in 263 small packages, with a street value of some £51 million ($79 million).



The container was sealed up again – with bags of grain substituted for the drugs – and put back on the ship without anyone being the wiser. The ship continued its voyage and the container was unloaded at the Dutch port of Rotterdam. Together with its load of tiles it was taken to a caravan site. There a gang of eight men began cutting into the roof. As they did so, Dutch police moved in and arrested the smugglers – who were later tried and imprisoned for up to six years for importing and dealing in cocaine.



The incident took place in the autumn of 1987 and was typical of the way in which modern customs officers work. Despite the introduction of electronic surveillance techniques, the tried-and-true methods of experience and intuition –plus underworld tip-offs and international cooperation – have a large part to play.



Dark glasses



Any incoming foot or vehicle passenger who behaves nervously will attract the customs men’s attention. The officers are on the lookout for anyone who is unduly agitated – who blinks more than the usual 20-30 times a minute; who wears dark glasses to hide such telltale signs; who perspires unduly (particularly, with men, on the backs of the hands); or whose breathing is fast and noisy.



Once their suspicious are aroused, customs officers may use special equipment to probe further. With a spectroscope – a long thin tube with a lens on the end – they can look into petrol tanks or behind door paneling. Optical fibres in the tube carry a picture back to a small eyepiece. The device is like a telescope that sees around corners.



Special X-ray machines give a colour picture and are ‘tuned’ to detect anything concealed inside a container. For instance, they show the size and relative position of objects inside a bag, even if a large number of bags are stacked together.



One of the most useful machines used by the officers is also one of the simplest: the weighing machine. Officers know what an average luggage bag weighs when full. So bags belonging to suspect people are weighed, and if they are found to be overweight they are searched. Or a bag might be emptied and then weighed. If it weighs more than the weight given by the manufacturers it could be searched for drugs, diamonds, gold or other contraband hidden in compartments in the lining.



Sometimes, a bag is singled out after it leaves an aircraft by an X-ray machine or a sniffer dog. Customs men wait until the bag has been reclaimed by its owner – and they stop him as he passes the checkpoint.



Customs officers pay close attention to passengers arriving from countries with a reputation for exporting drugs. In particular, they are on the lookout for ‘swallowers’ and ‘stuffers’.



These are poorly paid couriers who put drugs, mainly cocaine or heroin – into condoms. They then either swallow the condoms – and retrieve them later by defecating or vomiting – or stuff them into bodily orifices.



At ferry ports and frontier crossings, drivers or passengers who cannot give an adequate explanation for their trip, those that appear tense or hesitant, or a scruffy person driving an expensive car, might be subjected to a check.



Many seizures are the result of chance suspicious; but many more are due to hours of painstaking detective work on the part of the customs officers. This involves surveillance, undercover work and informers – in many countries and often over long periods of time.



The strange case of the drug-carrying snails



In July 1988 a customs officer at Hanover airport in West Germany became suspicious of a passenger carrying a battered holdall who had just flown in from Lagos, the capital of Nigeria in West Africa.



 The holdall was opened and found to contain a plastic bag full of live edible snails – agate snails, or Archatina fulica, whose shells, the officer discovered beneath it several small packages, each containing just under 1oz (28g) of heroin.



Similar packages were found hidden in the other snails, making a total of some 21oz (595g) of the drug.



 The smuggler was arrested – and the Hanover customs men reported the case of the 16 drug-carrying snails to their colleagues throughout Germany. From then on a keen eye was kept on passengers from Nigeria.



Two weeks later another Nigerian was caught at Hanover airport trying to smuggle in a slightly larger cache of heroin also under the shells of agate snails. Thanks to an officer’s alertness, an ingenious new means of smuggling had been thwarted.



 



Picture Credit : Google


How dogs and machines sniff out drugs and explosives?


After five women form Bogota, Colombia, aroused suspicion at London’s Heathrow Airport in 1988, sniffer dogs were brought in to examine their luggage. The dogs led customs men to 20 LP records in each of the women’s suitcases. When the vinyl layers of the records were split open, cocaine was discovered sandwiched between the halves. A total of 16 kilos of the drug was found in the records and in the jackets of books. The women were all jailed for 14 years.



Sniffer dogs are used by police and customs throughout the world to detect drugs and explosives.



Dogs that are trained for the job include natural retrievers used in filed sports, such as Labradors, collies and spaniels. Dogs have a far better sense of smell than people because the smell receptors at the top of a dog’s nose are 100 times longer than in humans.



The training course for a sniffer dog normally lasts about 12 weeks. The dog is first taught to recognize a particular drug or explosive.



Its handler conceals a sample of the substance inside something the dog can grip in its mouth – a rolled-up newspaper, a piece of pipe or a rag – which is known as a training aid.



The dog is commanded to bring the aid back to the handler, and then receives a reward. The reward will be whatever that particular dog enjoys doing – usually a friendly fight with the handler or a game of hide-and-seek.



The dog learns to recognize the smell of the training aid, which is in fact the smell of the drug or explosive. The type of training aid is changed regularly, but the smell always remains the same. At fist the aid is placed within sight of the dog, but is then hidden out of sight.



Smells such as perfumes, which some smugglers spread to disguise the scent of drugs, are also used so that the dog becomes familiar with them.



A dog can eventually be trained to respond to up to 12 different types of explosives and four different types of drugs, usually cannabis, cocaine, heroin and amphetamine.



When a dog is sent out to search for drugs, perhaps in a lorry or warehouse, it is put into a special harness – a signal that it should start working. When it locates a smell which it knows will lead to a reward, it will become agitated and excited.



Other customs or police officers then take over.



The handler drops a training aid where the dog will see it and return it, and the dog then gets its reward.



Air samples



Machines that are used to detect drugs and explosives suck in air through a tube that can be inserted into concealed spaces such as petrol tanks, paneling in vehicles or gaps between walls.



They also take air samples from containers and lorries where drugs and explosives might be hidden.



The samples are analyzed by a machine called a mass spectrometer which breaks them down into their chemical parts and identifies minute traces of individual substances used in explosives or drugs.



It is claimed that traces as small as one-trillionth of a gram can be detected.



Electron movement



‘Sniffer’ machines large enough for people to walk through have been installed at the Houses of Parliament in London and at some international airports, including Seoul before the 1988 Olympic Games. They can detect dynamite or nitroglycerine, which gives off a vapour that attracts electrons. A current running through the sniffer machine detects the movement of the electrons.



 



Picture Credit : Google


When a new job depends upon your handwriting



Applicants for the job of deputy personnel of a computer company had been whittled down to two young men of equal experience, skill and qualifications. Outwardly, there seemed little to choose between them – so the interviewing board called in a graphologist, or handwriting analyst, to assess character and potential.



The handwriting of the first applicant was large, fluid and rounded, that of the second was small, sharp and angular. According to the graphologist, the first handwriting showed someone who was self-confident, flexible and who got on well with people. The second handwriting, however, portrayed someone who – despite his social and professional ‘front’ – was self-doubting and rigid. So the job went to the first applicant.



Graphologists maintain that handwriting – from public relations companies to banks – use expert handwriting analysts for sifting through job applicants, requests for promotion, and business ideas that come through the post. In West Germany 80 per cent of major companies employ graphologists for personnel selection. It is not widely used in Australia although the practice is growing around the world.



Its adherents claim that it is an effective way of deciding whether a person can be trusted. In the USA –where firms lose up to $40,000 million each year to dishonest employees – graphology has taken the place of polygraph, or lie detector tests, which are no longer legal.



Critics of graphology say that it has no firm validity. Not only are many handwriting experts self-trained but their evaluation are often found to contradict each other.



However, most graphologists agree on certain basic concepts – such as the importance of assessing character on a combination of several main factors, and not any one ‘peculiar’ characteristic.



They divide handwriting into three ‘zones’: the upper and lower zones, formed by the tops and bottoms of capital letters and other letters such as b, d and g; and the middle zone, containing the remaining small letters. The relative forms and sizes of the zones are said to reveal people’s true selves.



For example, a large upper zone indicates someone who is outgoing and cheerful; a small lower zone suggests someone shallow and emotionally stunted; and an average-sized middle zone may point to someone who is well-organized and practical.



 



Picture Credit : Google


How handwriting experts catch criminals?



On the afternoon of July 4, 1956, Mrs. Beatrice Weinberger brought her month-old baby, Peter, back from an outing near their home in Westbury, Long Island, USA. She left the pram on the patio of her house and hurried inside to get the baby a clean nappy. When she returned a few moments later, the pram was empty – and a scrawled note was lying where Peter had been.



The note said: ‘Attention. I’m sorry this had to happen, but I’m in bad need of money, and couldn’t get it any other way. Don’t tell anyone or go to the police about this because I am watching you closely. I’m scared stiff, and will kill the baby at your first wrong move.



‘Just put $2000 (two thousand) in small bills in brown envelope, and place it next to the signpost at the corner of Albemarle Rd. and Park Ave. at exactly 10 o’clock tomorrow (Thursday) morning.



‘If everything goes smooth, I will bring the baby back and leave him on the same corner “Safe and Happy” at exactly 12 noon. No excuse, I can’t wait! Your baby-sitter.’



Despite the kidnapper’s warning. Mr. and Mrs. Weinberger, frantic with worry, contacted the police.



A dummy parcel containing cut-up pieces of newspaper was placed on the corner the following morning. But the kidnapper did not show up. He failed to keep two other ‘appointments’ with the Weinberger, and left a second note signed ‘Your baby-sitter’. By then, police felt that the baby was no longer alive.



The FBI was called in and the Bureau’s handwriting experts set to work to try to track down the kidnapper. In both the ransom notes an unusual z-shaped stroke was placed at the front of the y in words such as ‘money’ and ‘baby’.



Starting with New York State Motor Vehicle Bureau, the analysts spent the next six weeks combing through local records and at probation offices, work places, factories, aircraft plants, clubs and schools.



Altogether, more than 2 million signatures and handwriting samples were examined by eye and compared to the writing on the ransom notes.



Then, in the middle of August, the experts’ painstaking efforts paid off. The handwriting of Angelo John La Marca, of Plainview, Long Island, matched that of the kidnapper’s – especially in the peculiar formation of the y’s.



Some time previously La Marca had been put on probation for making illegal alcohol. On being shown the handwriting samples, he broke down and confessed to the kidnapping of baby Peter.



It had been a super-of-the-moment crime, he stated, committed to ease his financial problems. He told the police he had left Peter alive and well in a nearby park on the day after the kidnapping. But when officers hurried to the spot, all they found was the infant’s dead body. La Marca was later executed in New York’s Sing Sing Prison.



Even if La Marca had tried to disguise his handwriting he probably would still have been caught.



No matter how hard someone may try to disguise handwriting quirks and characteristics – or adopt those of somebody else – the ‘individuality’ of the writer shows through. The very angle at which he or she holds a pen; the way a t is crossed and an I is dotted; the height and size of capital and small letters; the amount of space between words; the use (or misuse) of punctuation marks. All these can identify a person as surely as fingerprints.



In 1983 Gary Herbertson, the head of the FBI laboratory’s document department, stated: ‘Any time you try to change your handwriting; you do things that look unnatural. A forger’s writing doesn’t have the speed, fluidity, the smoothness of natural writing.



‘You can see blunt beginnings and ends of strokes, rough curves, inappropriate breaks, little tremors. Two letters may be the same shape, but you can tell if one’s written quickly and the other is carefully drawn.’



In addition to their knowledge, handwriting experts use sophisticated instruments and machines in their work. These include infrared and ultraviolet scanning devices with which they look beneath erasures and changes; spilt-screen equipment for comparing dubious documents with genuine ones; and tools for greatly magnifying handwriting and comparing different ways of joining up letters.



The most notorious handwriting case in recent times involved the forgiving in the early 1980s of the ‘diaries’ of Adolf Hitler – committed his innermost thoughts in an antiquated German script. They included an entry on the Russian attack on Berlin in April 1945, when – in his bunker hide-out – Hitler allegedly wrote: ‘The long-awaited offensive has begun. May the Lord God stand by us.’



The 60 diaries were bought by the German weekly news magazine Stern for a reputed 6 million marks. Stern then sold subsidiary rights in France, Spain, Belgium, Holland, Italy, Norway and England – where extracts were published in the Sunday Times.



Publication in Germany began in the spring of 1983. And two of the diaries – from 1932, the year before Hitler became dictator, and 1945, the year of his suicide – were sent to the American magazine Newsweek, which was also interested in publishing them.



The magazine called in a leading handwriting expert, Kenneth Rendell, of Boston, Mass – who was immediately suspicious. ‘Even at first glance,’ he stated, ‘everything looked wrong.’



Using a powerful microscope and samples of Hitler’s genuine handwriting, he compared the two sets of writing – particularly the capital letters E, H and K – and found major discrepancies and dissimilarities between the two. These convinced Rendell that the diaries were fakes. In addition, the ink proved to be modern; and Hitler, when he had made notes and records in the early 1930s, had used only the finest quality, gold-embossed paper. He would not have resorted to the sort of cheap, lined notepaper on which the fake diaries were written.



As a result of the expose, a German criminal with a string of convictions – Konrad Paul Kujau – was later arrested along with two accomplices and tried for forging the diaries. In July 1985 he was found guilty by a Hamburg court and sentenced to four and a half years imprisonment. Once again, the handwriting expert had exposed the handwriting cheat.



 



Picture Credit : Google


How do police create an Identikit of a wanted man?



In February 1959 an armed robber held up a liquor store in southern California and made off which the takings, it was a typical small-time crime, but for one thing: the store owner gave Sheriff Peter Pitches of Los Angeles County Police a detailed description of the robber. This enabled the police to create a lifelike portrait of the wanted man.



Pictures of the robber were circulated in the area and, as a result of them, he was identified and arrested. He confessed to the crime and was duly punished – so becoming the first criminal in the world to be caught by means of Identikit.



The system had been conceived in the mid-1940s principally by Hugh C. McDonald, a detective with the Los Angeles Identification Bureau. Taking some 50,000 photographs of people’s faces, he cut them into some 12 main sections – and used them as the basis of what he called Identikit.



This consisted of almost 400 different and contrasting pairs of eyes, lips, noses, chins, hairlines, eyebrows, beards, moustaches  and so on. To build up a likeness, the various features were drawn on transparent plastic sheets, which were changed and overlaid until a composite portrait was created that matched eyewitness descriptions of the wanted person.



The use of photographs or artists’ impressions to identify and apprehend criminals dates back to the 1880s in France. Then a French criminologist named Alphonse Bertillon introduced a system which he called portrait parle, or ‘speaking portrait’. It involved the use of front and side photographs of captured criminals, cut into sections and mounted so that particular features – a hooked nose, a pointed chin, protruding ears and so forth – could be studied.



In the mid-1970s a second and now more commonly used Identikit system was introduced in North America. It was developed by Pat Dunleavy, an officer in the Royal Canadian Mounted Police, and it uses plastic sheets which contain actual photographs of facial features.



In the United Kingdom a system called Photo-FIT (Facial Identification Technique) has been used by the police since 1970. It is also used in Australia where it is commonly known as the Penry system. Photo-FIT also uses real photographs of ‘ordinary’ people mounted on thin plastic sheets. The basic five-section kit consists of 195 hairlines, 99 eyes and eyebrows, 89 noses, 105 mouths, and 74 chins and cheeks, which enable billions of possible combinations to be assembled. Features such as facial hair and spectacles are available as overlays. The pieces are cut so that the length and width the composite face can be fitted into a frame which holds them in place.



The basic kit relates to Caucasian (white) faces and there are supplementary kits to give North American Indian, Indian subcontinent and Afro-Caribbean features. A kit has not yet been developed for Oriental faces, which are usually drawn by artists.



Witnesses of crimes are interviewed by the police as soon after the events as possible – most people’s ability to recall starts to diminish after about a week.



For both Photo-FIT and Identikit, detectives begin by asking witnesses to recall details of the crime itself. They then move on to general descriptions of the suspect or suspects. For instance, were they short and burly, or lean and tall? What sort of clothes were they wearing? And what did the suspects actually do at the scene of the crime? Only then are the witnesses asked about facial details.



They leaf through books, or ‘feature atlases’ containing the various Photo-FIT or Identikit sheets, from which they make their selections. Faces are put together sheet by sheet, or strip by strip.



Often, a police artist is then called in to heighten the picture. A clear plastic sheet is laid over it and fine details such as hair shade, skin blemishes, scars or shaped eyebrows are added. The picture is then covered with an artist’s fixative spray and is signed by the witness.



Recently, computer technology has been introduced to enhance the pictures. This enables extremely lifelike faces to be drawn n computer screens according to eyewitness, descriptions, and fine alterations can be made to the image. From this, a photograph-like print can be obtained.



In addition, police mugshots (photographs of arrested criminals) can be stored on computer. They are coded according to physical characteristics and the computer can choose a selection which most closely matches witness descriptions.



 



Picture Credit : Google


What is Genetic fingerprinting?



Genetic fingerprinting has changed the course of crime detection. It is the most accurate method yet developed of identifying individuals. The probability against any two genetic fingerprints being the same by pure chance is greater than the number of people on Earth. The technique can also prove paternity of children and is being used to control the breeding of rare animals.



Professor Alec Jeffreys, a British geneticist at Leicester University, discovered genetic fingerprinting in 1984. He was conducting research into DNA – the chemical substance in the nucleus of every living cell which determines a person’s individual characteristics, such as the colour of hair and eyes. The structure of DNA is different in everybody, with the exception of identical twins.



Professor Jeffreys discovered that within the DNA molecule there is a sequence of genetic information which is repeated many times along the structure of the DNA, which looks like an endless twisting ladder.



The length of the sequence, the number of times it is repeated and its precise location within the DNA chain are unique to each individual. A process was developed to translate these sequences into a visual record. The finished picture, the genetic fingerprint, is a series of bars on an X-ray film, rather like the bar codes printed on food packets.



To obtain a DNA specimen, a scientist only needs a biological sample containing some human cells. This is usually blood, semen or hair, and only very small amounts are necessary.



Genetic fingerprinting is an important in establishing innocence as guilt. For example, a burglar who breaks a window may leave a blood sample behind on the glass. This can be used to create a genetic fingerprint. When police arrest a suspect, a blood sample can be taken from him and compared. If it matches, he is the burglar. If it does not, he is innocent.



When the police have a genetic fingerprint, but no suspect, they can fingerprint groups of people by taking samples of their blood. The first mass genetic fingerprinting happened in Leicestershire in 1987 when samples were taken from 5500 men living around a village where two young girls had been raped and murdered.



The killer was eventually found when a man was heard to say that a workmate had asked him to take his place when the samples were being taken. Another man who had previously been accused of one of the murders was freed because his genetic fingerprint did not match those made from the scene-of-crime evidence.



Genetic fingerprinting can also determine who is the father of a child and resolve paternity disputes. A DNA strand is made up equally of the characteristics of each parent. By comparing the genetic fingerprints of mother and child, a scientist can say with certainty that the parts of the child’s fingerprint which do not match those of the mother must have come from its true father.



Another use is in bone-marrow transplants which are given to people suffering from leukaemia. Doctors can check whether the genetic fingerprint extracted from a patient after a transplant matches that of the donor. If it does, the transplant has been successful and is producing healthy white blood cells. If it does not, the transplant has failed to take. This allows the possibility of another transplant.



Zoologists can use genetic fingerprinting to control the breeding of rare animals and preserve species. They can compare genetic fingerprints taken from animals to ensure that inbreeding among endangered species, which is known to lead to weaker animals, is avoided.



 



Picture Credit : Google


What is the Astounding case of four brothers?



Fingerprint evidence led to probably the only case in which two brothers, jointly convicted of murder, were executed by two other brothers.



In 1905, Alfred and Albert Stratton were accused of murdering an elderly couple who were battered to death above their shop in London.



Lying on the floor next to the bodies was an emptied cashbox in which the couple had kept their takings. On the box’s metal tray, fingerprint officers found the impression of a sweaty or oily thumbprint which did not match those of the dead couple – or that of the first police officer at the scene.



Suspicion fell upon the Strattons, both known housebreakers. They were arrested and tried at the Old Bailey. The thumbprint was the main piece of evidence.



Bothe men were found guilty and sentenced to death. They were hanged together by the brothers John William Billington, the public executioners, on May 23, 1905.



‘Mr Fingerprints’



The comparison of fingerprints for catching criminals was first developed in the 1890s by Edward Henry, the British inspector-general of the Indian police in Bengal.



Previously, the usual method of registering the characteristics of criminals was the anthropometric system, developed by Alphonse Bertillon, a French criminologist. It involved measuring the criminal’s arms and legs, and taking photographs from the front and sides.



Edward Henry became interested in fingerprints which had previously been used to study racial characteristics and evolution. He instructed his police officers to take impressions of criminals’ left thumbs in the belief that as most people were right-handed the ridges on the left thumb would be less worn. He then went on to devise a system based on the patterns of prints which was adopted in India.



His revolutionary ideas attracted interest in England, and in 1901 he was put in charge of the Criminal Investigation Department at Scotland Yard. He set up the first Fingerprint Branch which made more than 100 successful identifications within six months.



Henry later became Commissioner of the Metropolitan Police. He retired and was made a baronet in 1918, but was always known as ‘Mr Fingerprints’.



 



Picture Credit : Google


How to match up fingerprints to track down criminals?



The matching of fingerprints requires good eyesight and intense concentration.



The process is similar to one of those puzzles where you have to spot the differences between two apparently identical pictures. With fingerprint identification, the reverse applies – the fingerprint expert has to look for the similarities.



Fingerprints are normally stored by name on card-index systems at a control fingerprint bureau. In most countries, only the prints of convicted criminals together with unidentified marks in unsolved cases are kept.



Some countries keep a national archive of fingerprints but because of the time it can take to search, it is usually considered as only a back-up, for use if a mark is not matched locally.



Files of criminals with known specialties, such as car thieves or handbag snatchers, are also kept. Secret police forces and intelligence organizations also keep their own files of people they consider to be revolutionaries or enemy agents.



A fingerprint officer will begin by examining the marks taken from the scene and memorising their characteristics. He will then compare them against prints taken from innocent people who might have left marks at the scene – members of the family or policemen, for example. Any marks that match the innocent prints are rejected. The fingerprint officer then takes from the file all prints of possible suspects, whose names have been supplied by the investigating detective.



If these do not match, the officer has to make a wider and more painstaking search. If he is searching for a burglar, he will begin looking through all burglary cases in the locality and then all those from the adjoining town or area.



Depending on how much time was ordered to be spent on the search, he might pursue it through neighboring fingerprint bureaus in other police forces. The search for a house burglar can be widened to other potential types of criminals, such as safe-crackers, but the officer might not feel it worthwhile to extend the search to criminals who only pass bogus cheques.



Fingerprint officers also check the fingerprints of newly arrested criminals against unidentified marks from other crimes in the hope of clearing up unsolved cases. They will also compare unidentified marks against new marks to see if a series of crimes can be established. Officers can make dozens of comparisons a day, but many work for days without ever having a positive identification.



Most of this work is manual and can be very laborious. In the early 1980s electronic systems were developed to speed up the work. Prints and marks can now be stored and retrieved on electronic indexing systems, so that the press of a button calls up all the prints of, say, known car thieves living in a certain area and aged under 30. Systems can now be linked up between neighbouring forces, or with national collections, to widen the potential search. However, the actual comparison still has to be carried out by the fingerprint officer.



Scientists around the world are developing computer systems which store, retrieve and, most importantly, match prints and marks. Some matching methods, which can make 60,000 comparisons a second, are already being used by local police forces. But a fully automated, national fingerprint system is still in the future.



 



Picture Credit : Google


How to use glove prints to track down criminals?



Gloves yield distinct prints in much the same way as human flesh because of the grease which accumulates on the surface. Glove prints can also be revealed by a layer of powder and if they can be matched with a glove found in the possession of a suspect, it becomes powerful evidence.



The prints can distinguish the type of leather or fabric, its age, and the type of stitching used.



The first case of its type in the world was in 1971 at the Inner London Quarter Sessions. Police had obtained a print from a left-hand glove a burglar was believed to have worn while breaking a window. The print matched that of a pair of sheepskin leather gloves found in the possession of the suspect. He pleaded guilty.



 



Picture Credit : Google


How to use plastic and paint fingerprints to track down criminals?



The traces, actually called fingermarks, consist of tiny amounts of moisture which form patterns corresponding to the ridges and lines on the fingers and other parts of the hand. Non-absorbent materials such as plastics and painted surfaces produce better marks than absorbent ones like fabrics. Marks are normally invisible unless they have been left by paint or blood. So a police fingerprint expert coats likely surfaces with very fine dust, often powered aluminium. The particles stick to the moisture traces, making them visible. Sticky tape is then places on the mark to lift away an impression of the pattern, which can be taken away and photographed. Some fingermarks are now photographed on site.



Modern technology is now helping the police to obtain marks from some previously bags and smooth leather.



One method called vacuum metallization involves putting the surface into a container from which the air is expelled, creating a vacuum. A layer of gold, then a layer of zinc, is evaporated onto the surface. The gold is deposited uniformly over the area, but it is absorbed by the ridges of moisture which make up the fingermark pattern. Zinc will only condense onto another metal, so it adheres to the gold-coated areas, enhancing them to provide a contrast with the uncoated fingermarks. The pattern of marks is then photographed.



Once the photograph is obtained, it is compared with fingerprints of known criminals held on police files. There are four main types of fingerprint pattern. The patterns are divided up into such features as ‘forks’, ‘lakes’, ‘spurs’ and ‘islands’.



For an identification to be presented in court, a number of recognizable features of the mark of a single finger or thumb must correspond with the same number of features on the print. The number varies between countries, but can be as high as 17. If the mark shows more than one finger the court will usually accept fewer features per finger. Most fingerprint officers and detectives regard more than eight features as enough to confirm identity. Although this would not be presented in court, it would be enough to concentrate investigation on a suspect.



 



Picture Credit : Google