skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Knowing Individuals: Fingerprinting, Policing, and the Limits of Professionalization in 1920s Beijing
This article examines the adoption of modern fingerprinting in early twentieth-century China through a case study of the Fingerprint Society, an association affiliated with the Ministry of Interior’s police academy that was active in 1920s Beijing. The members of this association viewed fingerprinting as both a technique that could be used to demonstrate China’s adoption of globally accepted standards of policing and justice and a body of academic knowledge that could form the basis for a would-be profession of fingerprinting experts. While the Fingerprint Society ultimately failed to accomplish its profession-building goals, its activities nonetheless shed light on an early moment in the history of new identification practices in China as well as on dynamics that have shaped the global history of fingerprinting as an area of modern expert knowledge located ambiguously between policing and science.  more » « less
Award ID(s):
1654990
PAR ID:
10113558
Author(s) / Creator(s):
Date Published:
Journal Name:
Modern China
ISSN:
0097-7004
Page Range / eLocation ID:
009770041984764
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract This article is a study of forensic science researchers’ attempts to develop paternity tests based on fingerprint patterning, a physical trait that is partially inherited. Pursued in different times and places—ranging from Austria to Japan to China and from the early 20th century to the 1990s—the projects under study represent an ongoing dialogue, carried out through decades of international scientific exchange, about how to extract genetic information from fingerprints and present this data as scientifically-valid evidence in courts of law. Over time, those who engaged in this work increasingly experimented with methods for presenting fingerprint-based evidence of paternity in quantifiable and even probabilistic terms. Fingerprint-based paternity tests remained an obscure area of forensic practice and were eventually overshadowed by advances in serology and DNA profiling. This unfamiliar corner of forensic science, nonetheless, can provide additional perspective on the history of statistical expertise and probabilistic reasoning in modern forensic science, including the application of Bayesian approaches. The larger body of 20th-century ‘dermatoglyphics’ knowledge out of which these tests emerged also continues to influence the foundation of scientific knowledge on which latent print examination is based today. 
    more » « less
  2. Yeager, Meredith (Ed.)
    Abstract Global sequencing of genomes of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) has continued to reveal new genetic variants that are the key to unraveling its early evolutionary history and tracking its global spread over time. Here we present the heretofore cryptic mutational history and spatiotemporal dynamics of SARS-CoV-2 from an analysis of thousands of high-quality genomes. We report the likely most recent common ancestor of SARS-CoV-2, reconstructed through a novel application and advancement of computational methods initially developed to infer the mutational history of tumor cells in a patient. This progenitor genome differs from genomes of the first coronaviruses sampled in China by three variants, implying that none of the earliest patients represent the index case or gave rise to all the human infections. However, multiple coronavirus infections in China and the United States harbored the progenitor genetic fingerprint in January 2020 and later, suggesting that the progenitor was spreading worldwide months before and after the first reported cases of COVID-19 in China. Mutations of the progenitor and its offshoots have produced many dominant coronavirus strains that have spread episodically over time. Fingerprinting based on common mutations reveals that the same coronavirus lineage has dominated North America for most of the pandemic in 2020. There have been multiple replacements of predominant coronavirus strains in Europe and Asia as well as continued presence of multiple high-frequency strains in Asia and North America. We have developed a continually updating dashboard of global evolution and spatiotemporal trends of SARS-CoV-2 spread (http://sars2evo.datamonkey.org/). 
    more » « less
  3. Program accreditation in medical or religious professions has existed since the 1800s while accreditation of business and engineering programs started in the early twentieth century. With this long history, these disciplines have focused on ensuring the competence of their graduates, as modern society demands appropriate expertise from doctors and engineers before letting them practice their profession. In computing, however, professional accreditation started in the last decades of the twentieth century only after computer science, informatics, and information systems programs became widespread. At the same time, although competency-based learning has existed for centuries, its growth in computing is relatively new, resulting from recent curricular reports such as Computing Curricula 2020, which have defined competency comprising knowledge, skills, and dispositions. In addition, demands are being placed on university programs to ensure their graduates are ready to enter and sustain employment in the computing profession. This work explores the role of accreditation in forming and developing professional competency in non-computing disciplines worldwide, building on this understanding to see how computing accreditation bodies could play a similar role in computing. This work explores the role of accreditation in forming and developing professional competency in non-computing disciplines worldwide, building on this understanding to see how computing accreditation bodies could play a similar role in computing. Its recommendations are to incorporate competencies in all computing programs and future curricular guidelines; create competency-based models for computing programs; involve industry in identifying workplace competencies, and ensure accreditation bodies include competencies and the assessment in their standards. 
    more » « less
  4. Perumalla, Kalyan; Lopez Jr., Juan; Siraj, Ambareen (Ed.)
    Executable steganography, the hiding of software machine code inside of a larger program, is a potential approach to introduce new software protection constructs such as watermarks or fingerprints. Software fingerprinting is, therefore, a process similar to steganography, hiding data within other data. The goal of fingerprinting is to hide a unique secret message, such as a serial number, into copies of an executable program in order to provide proof of ownership of that program. Fingerprints are a special case of watermarks, with the difference being that each fingerprint is unique to each copy of a program. Traditionally, researchers describe four aims that a software fingerprint should achieve. These include the fingerprint should be difficult to remove, it should not be obvious, it should have a low false positive rate, and it should have negligible impact on performance. In this research, we propose to extend these objectives and introduce a fifth aim: that software fingerprints should be machine independent. As a result, the same fingerprinting method can be used regardless of the architecture used to execute the program. Hence, this paper presents an approach towards the realization of machine-independent fingerprinting of executable programs. We make use of Low-Level Virtual Machine (LLVM) intermediate representation during the software compilation process to demonstrate both a simple static fingerprinting method as well as a dynamic method, which displays our aim of hardware independent fingerprinting. The research contribution includes a realization of the approach using the LLVM infrastructure and provides a proof of concept for both simple static and dynamic watermarks that are architecture neutral. 
    more » « less
  5. US police militarization is commonly understood as military violence abroad flowing to domestic policing, where it does not belong. Despite years of reform efforts, attempts to demilitarize local police have thus far failed to effect substantive change. This essay builds on the history of US policing, as well as sixteen months of ethnographic research with police in Maryland, to suggest that the ideological labor of policing contributes to these failures. Specifically, I examine two elements of what I call police common sense: preparedness as moral practice and violence as professional technique. In so doing, I demonstrate how policing metabolizes militarization as an apolitical technical craft that counterintuitively reduces violence, and that allows officers to fulfill their primary ethical role as stewards of public crises. Demilitarization reforms function in tandem with the political work of preparedness and professionalism to consecrate “good” militarization as commonsensical and legitimate. These reforms thus inadvertently lend power to the notion of police as the “thin blue line” between extreme violence and innocent (white) society. 
    more » « less