SlideShare a Scribd company logo
1 of 20
Download to read offline
Chapter 16
Document Analysis
Document Analysis
•  Involves the examination of handwriting, ink,
   and paper to ascertain source or authenticity

•  Examples include letters, checks, licenses,
   contracts, wills, passports

•  Investigations include verification;
   authentication; characterizing papers,
   pigments, and inks
Related fields
Historical dating—the verification of age and value
  of a document or object
Fraud investigation—focuses on the money trail and
  criminal intent
Paper and ink specialists—date, type, source, and/
  or catalog various types of paper, watermarks, ink,
  printing/copy/fax machines, computer cartridges
Forgery specialists—analyze altered, obliterated,
  changed, or doctored documents and photos
Typewriting analysts—determine origin, make, and
  model
Computer crime investigators—investigate
  cybercrime
Document Examination
•  involves the analysis and comparison
   of questioned documents with known
   material
•  identifies, whenever possible, the
   author or origin of the questioned
   document
Handwriting Analysis
Handwriting analysis involves two phases:
   1.  The hardware—ink, paper, pens,
       pencils, typewriter, printers
   2. Visual examination of the writing
Handwriting Characteristics
•    Line quality
•    Word and letter spacing
•    Letter comparison
•    Pen lifts
•    Connecting strokes
•    Beginning/ending strokes
                         •  Unusual letter formation
                         •  Shading/pen pressure
                         •  Slant
                         •  Baseline habits
                         •  Flourishes or
                            embellishments
                         •  Diacritic placement
Handwriting Samples
                            Flourishes or embellishments



                                 Connecting strokes




Diacritic placement


 Word and letter spacing




 Unusual letter formation
Handwriting Characteristics
  Measuring the slant of handwriting
 Using a template overlaid the sample
Handwriting Samples
When obtaining a writing sample:
•  The subject should not be shown the
   questioned document.
•  The subject is not told how to spell words or use
   punctuation.
•  The subject should use materials similar to
   those of the document.
•  The dictated text should match some parts of
   the document.
•  The subject should be asked to sign the text.
•  Always have a witness.
Types of Forgery
Simulated forgery: made by copying a
genuine signature
Traced forgery: made by tracing a genuine
  signature
Blind forgery: made without a model of the
  signature
Types of Forgery
Check fraud
   •  Forgery
   •  Counterfeit
   •  Alterations        Credit cards
                             •  Theft of card or number
Paper money
                         Art—imitation with intent to deceive
   •  Counterfeit
                             •  Microscopic examination
                             •  Electromagnetic radiation
Identity                     •  Chemical analysis
   •  Social Security
                         Contracts—alterations of contracts,
   •  Driver’s license     medical records
Document Alterations
Obliterations: removal of writing by physical or
  chemical means can be detected by:
   •  Microscopic examination
   •  UV or infrared (IR) light
   •  Digital image processing

Indentations can be detected by:
   •  Oblique lighting
   •  Electrostatic detection apparatus (ESDA)
Forensic Linguists
Expert who looks at the linguistic content (the way
something is written) of a questioned document

Language used can help
to establish the writer’s
•  age
•  gender
•  ethnicity
•  level of education
•  professional training
•  ideology
Analyzing Ink
 Ink can be analyzed to help determine the source

 Chromatography is a method of physically
   separating the components of inks.

Types
1.  HPLC: high-performance
    liquid chromatography
2.  TLC: thin-layer
    chromatography
3.  Paper chromatography
Paper Chromatography
•  Two samples of black
   ink from two different
   manufacturers have
   been characterized
   using paper
   chromatography.

•  The different colors, in
   different ratios, can
   help to identify the
   exact type of ink
Retention Factor - Rf
•  A number that represents how far a compound
   travels in a particular solvent
•  It is determined by measuring the distance the
   compound traveled and dividing it by the
   distance the solvent traveled.
Retention Factor - Rf
•  Each dye has a characteristic Rf based on the solvent
   used during the chromatography.
•  Can help to individualize the ink
Analyzing Paper
Analysis involves looking at the following
characteristics of paper:
   •  Raw material

   •  Weight
   •  Density

   •  Thickness

   •  Color
   •  Watermarks

   •  Age

   •  Fluorescence
Document Evidence
  Class characteristics
may include general types
of pens, pencils, or paper.



                          Individual characteristics
                          may include unique,
                         individual handwriting
                      characteristics; trash marks
                        from copiers; or printer
                            serial numbers.
Counterfeiting
•  In 1996 the government starting adding new
   security features to paper money
•  Subtle background colors have been added
   along with other features to discourage
   counterfeiting
      •  October 2003 - $20 bill
      •  September 2004 - $50 bill
      •  September 2005 - $10 bill

More Related Content

Viewers also liked

Forensics ch 4 notes
Forensics ch 4 notesForensics ch 4 notes
Forensics ch 4 notesLeah Morgan
 
Forensics Ch 1 Notes
Forensics Ch 1 NotesForensics Ch 1 Notes
Forensics Ch 1 NotesLeah Morgan
 
Forensics ch 1 notes
Forensics ch 1 notesForensics ch 1 notes
Forensics ch 1 notesLeah Morgan
 
Morgan History part 2
Morgan History part 2Morgan History part 2
Morgan History part 2Leah Morgan
 
Anatomical positioning notes
Anatomical positioning notesAnatomical positioning notes
Anatomical positioning notesLeah Morgan
 
Statistics Notes
Statistics NotesStatistics Notes
Statistics NotesLeah Morgan
 
Forensics Ch 1 notes
Forensics Ch 1 notesForensics Ch 1 notes
Forensics Ch 1 notesLeah Morgan
 
History of forensics 2012
History of forensics 2012History of forensics 2012
History of forensics 2012Leah Morgan
 
Chapter 13 - Process of Death
Chapter 13 - Process of DeathChapter 13 - Process of Death
Chapter 13 - Process of DeathLeah Morgan
 
Unit 1 jeopardy game
Unit 1 jeopardy gameUnit 1 jeopardy game
Unit 1 jeopardy gameLeah Morgan
 
Forensics Ch 2 notes
Forensics Ch 2 notesForensics Ch 2 notes
Forensics Ch 2 notesLeah Morgan
 
Forensics ch 3 notes
Forensics ch 3 notesForensics ch 3 notes
Forensics ch 3 notesLeah Morgan
 
forensics ch 5 & 6 notes
forensics ch 5 & 6 notesforensics ch 5 & 6 notes
forensics ch 5 & 6 notesLeah Morgan
 

Viewers also liked (15)

Forensics ch 4 notes
Forensics ch 4 notesForensics ch 4 notes
Forensics ch 4 notes
 
Ch 16 due dates
Ch 16 due datesCh 16 due dates
Ch 16 due dates
 
Forensics Ch 1 Notes
Forensics Ch 1 NotesForensics Ch 1 Notes
Forensics Ch 1 Notes
 
Forensics ch 1 notes
Forensics ch 1 notesForensics ch 1 notes
Forensics ch 1 notes
 
Morgan History part 2
Morgan History part 2Morgan History part 2
Morgan History part 2
 
Anatomical positioning notes
Anatomical positioning notesAnatomical positioning notes
Anatomical positioning notes
 
Statistics Notes
Statistics NotesStatistics Notes
Statistics Notes
 
Forensics Ch 1 notes
Forensics Ch 1 notesForensics Ch 1 notes
Forensics Ch 1 notes
 
History of forensics 2012
History of forensics 2012History of forensics 2012
History of forensics 2012
 
Chapter 13 - Process of Death
Chapter 13 - Process of DeathChapter 13 - Process of Death
Chapter 13 - Process of Death
 
Unit 1 jeopardy game
Unit 1 jeopardy gameUnit 1 jeopardy game
Unit 1 jeopardy game
 
Forensics Ch 2 notes
Forensics Ch 2 notesForensics Ch 2 notes
Forensics Ch 2 notes
 
Forensics ch 3 notes
Forensics ch 3 notesForensics ch 3 notes
Forensics ch 3 notes
 
Karyotype notes
Karyotype notesKaryotype notes
Karyotype notes
 
forensics ch 5 & 6 notes
forensics ch 5 & 6 notesforensics ch 5 & 6 notes
forensics ch 5 & 6 notes
 

Similar to Fs ch 16 documents

Hand Writing and Documents Analysis
Hand Writing and Documents AnalysisHand Writing and Documents Analysis
Hand Writing and Documents AnalysisBob Smullen
 
Handwriting and Document Examination
Handwriting and Document ExaminationHandwriting and Document Examination
Handwriting and Document ExaminationPrashant Mehta
 
Introduction to question documents.pptxt
Introduction to question documents.pptxtIntroduction to question documents.pptxt
Introduction to question documents.pptxtAryaThampi9
 
REVIEWER IN QUESTIONED DOCUMENT EXAMINATION.pptx
REVIEWER IN QUESTIONED DOCUMENT EXAMINATION.pptxREVIEWER IN QUESTIONED DOCUMENT EXAMINATION.pptx
REVIEWER IN QUESTIONED DOCUMENT EXAMINATION.pptxRandyPellazar
 
Classes of questioned documents
Classes of questioned documentsClasses of questioned documents
Classes of questioned documentskiran malik
 
History of Writing (GRAPHOLOGY)
History of Writing (GRAPHOLOGY)History of Writing (GRAPHOLOGY)
History of Writing (GRAPHOLOGY)Buthainah Hamdy
 
Medico Legal Importance of Questioned Documents in Crime Investigation
Medico Legal Importance of Questioned Documents in Crime InvestigationMedico Legal Importance of Questioned Documents in Crime Investigation
Medico Legal Importance of Questioned Documents in Crime Investigationijtsrd
 
Write for media ucsd_ext_spring12_1
Write for media ucsd_ext_spring12_1Write for media ucsd_ext_spring12_1
Write for media ucsd_ext_spring12_1dml communications
 
Chao. 16- Document Examination-Csi- 14s.ppt
Chao. 16- Document Examination-Csi- 14s.pptChao. 16- Document Examination-Csi- 14s.ppt
Chao. 16- Document Examination-Csi- 14s.pptAbdullah Azzeh
 

Similar to Fs ch 16 documents (15)

documents.pptx
documents.pptxdocuments.pptx
documents.pptx
 
Hand Writing and Documents Analysis
Hand Writing and Documents AnalysisHand Writing and Documents Analysis
Hand Writing and Documents Analysis
 
Handwriting and Document Examination
Handwriting and Document ExaminationHandwriting and Document Examination
Handwriting and Document Examination
 
Introduction to question documents.pptxt
Introduction to question documents.pptxtIntroduction to question documents.pptxt
Introduction to question documents.pptxt
 
documents (1).pptx
documents (1).pptxdocuments (1).pptx
documents (1).pptx
 
Introduction to Questioned Document
Introduction to Questioned DocumentIntroduction to Questioned Document
Introduction to Questioned Document
 
112_QD_1 (1).ppt
112_QD_1 (1).ppt112_QD_1 (1).ppt
112_QD_1 (1).ppt
 
12150145.ppt
12150145.ppt12150145.ppt
12150145.ppt
 
REVIEWER IN QUESTIONED DOCUMENT EXAMINATION.pptx
REVIEWER IN QUESTIONED DOCUMENT EXAMINATION.pptxREVIEWER IN QUESTIONED DOCUMENT EXAMINATION.pptx
REVIEWER IN QUESTIONED DOCUMENT EXAMINATION.pptx
 
Classes of questioned documents
Classes of questioned documentsClasses of questioned documents
Classes of questioned documents
 
History of Writing (GRAPHOLOGY)
History of Writing (GRAPHOLOGY)History of Writing (GRAPHOLOGY)
History of Writing (GRAPHOLOGY)
 
Medico Legal Importance of Questioned Documents in Crime Investigation
Medico Legal Importance of Questioned Documents in Crime InvestigationMedico Legal Importance of Questioned Documents in Crime Investigation
Medico Legal Importance of Questioned Documents in Crime Investigation
 
Write for media ucsd_ext_spring12_1
Write for media ucsd_ext_spring12_1Write for media ucsd_ext_spring12_1
Write for media ucsd_ext_spring12_1
 
Chao. 16- Document Examination-Csi- 14s.ppt
Chao. 16- Document Examination-Csi- 14s.pptChao. 16- Document Examination-Csi- 14s.ppt
Chao. 16- Document Examination-Csi- 14s.ppt
 
Questioned Document.pptx
Questioned Document.pptxQuestioned Document.pptx
Questioned Document.pptx
 

More from Leah Morgan

Biology Exam Student Preparation Booklet
Biology Exam Student Preparation BookletBiology Exam Student Preparation Booklet
Biology Exam Student Preparation BookletLeah Morgan
 
Genetics review sheet
Genetics review sheetGenetics review sheet
Genetics review sheetLeah Morgan
 
CHapter 11 Notes - Blood Analysis
CHapter 11 Notes - Blood AnalysisCHapter 11 Notes - Blood Analysis
CHapter 11 Notes - Blood AnalysisLeah Morgan
 
Cell bio review sheet
Cell bio review sheetCell bio review sheet
Cell bio review sheetLeah Morgan
 
sketching/photo lab sheet
sketching/photo lab sheetsketching/photo lab sheet
sketching/photo lab sheetLeah Morgan
 
Forensics syllabus
Forensics syllabusForensics syllabus
Forensics syllabusLeah Morgan
 

More from Leah Morgan (8)

Biology Exam Student Preparation Booklet
Biology Exam Student Preparation BookletBiology Exam Student Preparation Booklet
Biology Exam Student Preparation Booklet
 
Ch 16 lab info
Ch 16 lab infoCh 16 lab info
Ch 16 lab info
 
Genetics review sheet
Genetics review sheetGenetics review sheet
Genetics review sheet
 
CHapter 11 Notes - Blood Analysis
CHapter 11 Notes - Blood AnalysisCHapter 11 Notes - Blood Analysis
CHapter 11 Notes - Blood Analysis
 
Cell bio review sheet
Cell bio review sheetCell bio review sheet
Cell bio review sheet
 
sketching/photo lab sheet
sketching/photo lab sheetsketching/photo lab sheet
sketching/photo lab sheet
 
Forensics syllabus
Forensics syllabusForensics syllabus
Forensics syllabus
 
Safety contract
Safety contractSafety contract
Safety contract
 

Recently uploaded

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Recently uploaded (20)

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Fs ch 16 documents

  • 2. Document Analysis •  Involves the examination of handwriting, ink, and paper to ascertain source or authenticity •  Examples include letters, checks, licenses, contracts, wills, passports •  Investigations include verification; authentication; characterizing papers, pigments, and inks
  • 3. Related fields Historical dating—the verification of age and value of a document or object Fraud investigation—focuses on the money trail and criminal intent Paper and ink specialists—date, type, source, and/ or catalog various types of paper, watermarks, ink, printing/copy/fax machines, computer cartridges Forgery specialists—analyze altered, obliterated, changed, or doctored documents and photos Typewriting analysts—determine origin, make, and model Computer crime investigators—investigate cybercrime
  • 4. Document Examination •  involves the analysis and comparison of questioned documents with known material •  identifies, whenever possible, the author or origin of the questioned document
  • 5. Handwriting Analysis Handwriting analysis involves two phases: 1.  The hardware—ink, paper, pens, pencils, typewriter, printers 2. Visual examination of the writing
  • 6. Handwriting Characteristics •  Line quality •  Word and letter spacing •  Letter comparison •  Pen lifts •  Connecting strokes •  Beginning/ending strokes •  Unusual letter formation •  Shading/pen pressure •  Slant •  Baseline habits •  Flourishes or embellishments •  Diacritic placement
  • 7. Handwriting Samples Flourishes or embellishments Connecting strokes Diacritic placement Word and letter spacing Unusual letter formation
  • 8. Handwriting Characteristics Measuring the slant of handwriting Using a template overlaid the sample
  • 9. Handwriting Samples When obtaining a writing sample: •  The subject should not be shown the questioned document. •  The subject is not told how to spell words or use punctuation. •  The subject should use materials similar to those of the document. •  The dictated text should match some parts of the document. •  The subject should be asked to sign the text. •  Always have a witness.
  • 10. Types of Forgery Simulated forgery: made by copying a genuine signature Traced forgery: made by tracing a genuine signature Blind forgery: made without a model of the signature
  • 11. Types of Forgery Check fraud •  Forgery •  Counterfeit •  Alterations Credit cards •  Theft of card or number Paper money Art—imitation with intent to deceive •  Counterfeit •  Microscopic examination •  Electromagnetic radiation Identity •  Chemical analysis •  Social Security Contracts—alterations of contracts, •  Driver’s license medical records
  • 12. Document Alterations Obliterations: removal of writing by physical or chemical means can be detected by: •  Microscopic examination •  UV or infrared (IR) light •  Digital image processing Indentations can be detected by: •  Oblique lighting •  Electrostatic detection apparatus (ESDA)
  • 13. Forensic Linguists Expert who looks at the linguistic content (the way something is written) of a questioned document Language used can help to establish the writer’s •  age •  gender •  ethnicity •  level of education •  professional training •  ideology
  • 14. Analyzing Ink Ink can be analyzed to help determine the source Chromatography is a method of physically separating the components of inks. Types 1.  HPLC: high-performance liquid chromatography 2.  TLC: thin-layer chromatography 3.  Paper chromatography
  • 15. Paper Chromatography •  Two samples of black ink from two different manufacturers have been characterized using paper chromatography. •  The different colors, in different ratios, can help to identify the exact type of ink
  • 16. Retention Factor - Rf •  A number that represents how far a compound travels in a particular solvent •  It is determined by measuring the distance the compound traveled and dividing it by the distance the solvent traveled.
  • 17. Retention Factor - Rf •  Each dye has a characteristic Rf based on the solvent used during the chromatography. •  Can help to individualize the ink
  • 18. Analyzing Paper Analysis involves looking at the following characteristics of paper: •  Raw material •  Weight •  Density •  Thickness •  Color •  Watermarks •  Age •  Fluorescence
  • 19. Document Evidence Class characteristics may include general types of pens, pencils, or paper. Individual characteristics may include unique, individual handwriting characteristics; trash marks from copiers; or printer serial numbers.
  • 20. Counterfeiting •  In 1996 the government starting adding new security features to paper money •  Subtle background colors have been added along with other features to discourage counterfeiting •  October 2003 - $20 bill •  September 2004 - $50 bill •  September 2005 - $10 bill