Word: fingerprinters
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
Washington will need a great deal of both this time. Amid the pandemonium in Nairobi, rescuers may have inadvertently destroyed the vital bits and shreds from which the experts reconstruct the bombs and their delivery vehicles that serve as a kind of fingerprint of the terrorists. The manhunt begins on hands and knees at the decimated sites as investigators search for telltale scraps and pass them along to high-tech analysts in Washington. Intelligence agents are already sweeping through phone intercepts and combing computer databases that list some 200,000 terrorist suspects and more than 3,000 groups...
...arrest them," says TIME reporter Clive Mutiso. A Tanzanian official's statement that "we cannot say we have got somebody who is really responsible" but "we think we are doing well" underlines the grounds for skepticism. U.S. investigators continue to probe for the forensic evidence crucial to establishing a "fingerprint" modus operandi that could help identify the bombers: Reports from Nairobi that the terrorists used the plastic explosive Semtex appear to confirm the notion that the attackers weren't amateurs...
...seemed to have. Thirteen states could also mean 13 separate outbreaks. Earlier this year, the CDC took a step to eliminate such uncertainty, employing an innovative network of biotech machines called PulseNet. The hardware allows scientists to scan a bacterium and come up with a sort of genetic fingerprint unique to that cell line. Studying samples of the Wyoming E. coli as well as bugs from the surrounding states, the EIS researchers discovered that their profiles matched perfectly. The Alpine infection, it appeared, was indeed widespread...
...Fingerprint recognition has long been used in high-security places like FBI headquarters, but only now is it finding a place in the mainstream. In August, Compaq will offer a fingerprint-recognition system to its corporate customers. Its $99 Fingerprint Identification Technology requires users to place a fingertip on a miniature scanner attached to their monitor. Once the image has been verified with a master print on file, users can access the company network without having to remember an ever-changing password...
...They've gone through a complete reengineering of the naturalization process and, of course, adding in the changes with the fingerprint policies," Koon says...