Can 3D-Printed Fingers Help Police Solve A Murder? - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Data Management // IoT

Can 3D-Printed Fingers Help Police Solve A Murder?

Michigan police are working with university researchers to re-create a dead man's fingers. The goal is to use the digits to unlock his smartphone and uncover information that may help catch his killer.

Robotics Gone Wild: 8 Animal-Inspired Machines
Robotics Gone Wild: 8 Animal-Inspired Machines
(Click image for larger view and slideshow.)

Michigan police are taking an unusual tactic to solve a murder case. In hopes of revealing his killer, they're working with a university to create 3D copies of the victim's fingers in order to unlock his smartphone.

The victim's fingerprints were already on file with the police department from an earlier, unrelated incident. However, the prints alone are not enough to unlock the phone. The victim's own fingers cannot be used, for reasons that will make you cringe. So, according to a report in the Daily Mail, police are working with Michigan State University to recreate the victim's fingers using the university's 3D printing lab.

The desire by law enforcement to access a locked smartphone has come up before, most notably in the high-profile case involving San Bernardino terrorist Syed Farook. In that case, FBI officials sought to unlock his iPhone. Farook, however, did not have a fingerprint reader, or Touch ID, on his iPhone 5C.

[What you need to know about Apple and the FBI. Read Apple, FBI, Congress: 5 Burning Questions.]

In the Michigan murder case, the victim's smartphone does have a fingerprint reader. However, the victim's actual fingers cannot be used to swipe across the reader for several reasons. According to The Verge, the victim's body is badly decomposed. According to the Daily Mail report, fingerprint readers may need more than the tissue ridge pattern of a user's fingerprint.

While it is not clear whether the Michigan victim used an iPhone, recent versions of the device require the presence of an electrostatic charge when Touch ID is pressed, according to the Daily Mail. Humans who are deceased do not emit an electrostatic charge.

As a workaround, Michigan State University Professor Anil Jain and his PhD student Sunpreet Arora have been able to create 3D copies of the victim's fingers with a thin layer of conductive metallic particles coating the plastic digits. This metallic material is designed to emit an electrostatic charge, the Daily Mail reported. Currently, the 3D fingers are being tested in the lab, and the results are not known.

(Image: dreamnikon/iStockphoto)

(Image: dreamnikon/iStockphoto)

3D fingers are the only the latest effort to potentially fool a fingerprint scanner. Other techniques have been used with more primitive materials, The Verge reported. Unlike Apple's more recent iPhones, older versions of smartphones reportedly do not necessarily need the presence of an electrostatic charge to unlock a phone.

Even as the technology advances, legal precedent about unlocking devices in the event of a criminal case continues to evolve. For example, a recent court case in Los Angeles came down in favor of the FBI, which sought to compel a woman to use her fingerprint to unlock an iPhone. The court ruled that doing so would not violate the Fifth Amendment, which is designed to protect individuals from self-incrimination.

There will likely be no opposition to the use of the deceased victim's fingerprints -- either from the courts or the victim. Dead men don't talk, after all.

The real question is what this means for the privacy of the individuals whose personal details, communications, and other information might be contained on the victim's phone. Does finding his killer override the expectation of privacy for those who communicated with him? Tell us what you think in the comments section below.

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Strategist
7/30/2016 | 9:44:24 PM
Re: Scary and wonderful

> "I fear corruption could certainly cause serious problems in a future where 3D printed IDs are used in nefarious ways."

Official abuse of power is as certain as user stupidity.

Snowden revealed that the NSA was recording the location of everyone in the USA to within 3 feet, 24/7, as well as photographing all mail anyone sends, recording every phone call made by millions of people, and even monitoring what kind of p0rn people look at.

 Because the NSA's spy HQ was on the UM campus and I had done some grad work in natural language recognition there, I was interviewed for a job improving the ontological aspect of computer-reading every single email sent in the united states to see if there was anything "interesting" to the government.

It seems that the "better safe than sorry" policy was overwhelming the human spies that those emails were forwarded to.*

...But of course, it would only be used to Fight Terrorism.

Then we found out that the DEA got NSA to listen to and give the locations of drug dealers.

...and you can bet they wouldn't turn down an FBI request to solve a kidnapping.

Or a murder.

Or a bank robbery.

. . .

Or an ATM robbery

Or speeding drivers

Or kids skipping school


But that's okay; no one would object to it unless they have something to hide.


*I didn't get the job because my DOJ security clearance had expired (I consulted there briefly at a non-enforcment division). The interviewer spilled too much info because my interview was held at the end of the day in a resturant, which turned into drinking at the bar into the night. The (single) guy was drunk and bragging and interested in acquiring some, uhh... "inside" information.

He would have if he had just asked me instead of being a pompous, arrogant jerk. ...You know, I wonder if that's the real reason I didn't get the job. He already knew my clearence was inactive.

Damn. And he probably thought I knew that was the price for being hired.

User Rank: Ninja
7/29/2016 | 5:04:48 PM
Scary and wonderful
Have they opened that phone yet? I am hopeful for the victim's family. I want them to have closure, and for justice to be served. I don't think we'll have an answer on the privacy issues anytime soon. I fear corruption could certainly cause serious problems in a future where 3D printed IDs are used in nefaious ways.
How GIS Data Can Help Fix Vaccine Distribution
Jessica Davis, Senior Editor, Enterprise Apps,  2/17/2021
Graph-Based AI Enters the Enterprise Mainstream
James Kobielus, Tech Analyst, Consultant and Author,  2/16/2021
11 Ways DevOps Is Evolving
Lisa Morgan, Freelance Writer,  2/18/2021
White Papers
Register for InformationWeek Newsletters
The State of Cloud Computing - Fall 2020
The State of Cloud Computing - Fall 2020
Download this report to compare how cloud usage and spending patterns have changed in 2020, and how respondents think they'll evolve over the next two years.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you.
Flash Poll