This chapter provides an overview of forensic document examination. It defines forensic science as the application of scientific techniques to legal investigations. Forensic document examination specifically involves the scientific examination of questioned documents to determine their authenticity, origin, and history. The PNP Questioned Document Examination Division examines questioned documents and provides expert testimony in court. A forensic document examiner studies all aspects of a document, including handwriting, signatures, paper and ink analysis, to determine facts about its preparation and history.
forensic questioned document examinationkiran malik
Power point presentation basically related to document examination in forensic science laboratories, related various facilities and was related to expert evidences.
A fingerprint is an impression of the friction ridges on all parts of the finger. A friction ridge is a raised portion of the epidermis on the palmar (palm) or digits (fingers and toes) or plantar (sole) skin, consisting of one or more connected ridge units of friction ridge skin. These are sometimes known as "epidermal ridges" which are caused by the underlying interface between the dermal papillae of the dermis and the interpapillary (rete) pegs of the epidermis. These epidermal ridges serve to amplify vibrations triggered when fingertips brush across an uneven surface, better transmitting the signals to sensory nerves involved in fine texture perception. The ridges do not assist in gripping objects, sometimes in fact reducing grip to as much as 30% compared to completely smooth fingerpads.
It is the beginning point for obtaining evidence which will be used by the crime scene investigator and the forensic expert
A thorough investigation of the crime scene must be completed
Crime scene is basically a scene of occurrence of crime. It is a place where a particular crime has been committed.
It is starting point for the investigator.
Introduction to Forensic Questioned Document. This further will equip the reader's knowledge of the background on forensics, particularly on examination of disputed documents.
influence of writing instrument on handwritingMahipreet Kaur
in case of questioned documents writing instrument should b identified. this ppt. will give you the brief idea about the writing instruments and their effect on handwriting.
This PPT explains you that how a single signature of an individual helps to gain knowledge of Individual's personality,emotions, behaviour etc. It also explains that how to recognize forged signatures.
Shivangi
Babasaheb Bhimrao Ambedkar University,Lucknow
forensic questioned document examinationkiran malik
Power point presentation basically related to document examination in forensic science laboratories, related various facilities and was related to expert evidences.
A fingerprint is an impression of the friction ridges on all parts of the finger. A friction ridge is a raised portion of the epidermis on the palmar (palm) or digits (fingers and toes) or plantar (sole) skin, consisting of one or more connected ridge units of friction ridge skin. These are sometimes known as "epidermal ridges" which are caused by the underlying interface between the dermal papillae of the dermis and the interpapillary (rete) pegs of the epidermis. These epidermal ridges serve to amplify vibrations triggered when fingertips brush across an uneven surface, better transmitting the signals to sensory nerves involved in fine texture perception. The ridges do not assist in gripping objects, sometimes in fact reducing grip to as much as 30% compared to completely smooth fingerpads.
It is the beginning point for obtaining evidence which will be used by the crime scene investigator and the forensic expert
A thorough investigation of the crime scene must be completed
Crime scene is basically a scene of occurrence of crime. It is a place where a particular crime has been committed.
It is starting point for the investigator.
Introduction to Forensic Questioned Document. This further will equip the reader's knowledge of the background on forensics, particularly on examination of disputed documents.
influence of writing instrument on handwritingMahipreet Kaur
in case of questioned documents writing instrument should b identified. this ppt. will give you the brief idea about the writing instruments and their effect on handwriting.
This PPT explains you that how a single signature of an individual helps to gain knowledge of Individual's personality,emotions, behaviour etc. It also explains that how to recognize forged signatures.
Shivangi
Babasaheb Bhimrao Ambedkar University,Lucknow
This is my presentation about what is money laundering crime and what is the role of financial institutions in the fight against it. I used it during my speech for a bunch of Business School Students (ISM).
A robust risk assessment process is central to maintaining a strong Anti-Money Laundering (AML) compliance program. In this new Accenture presentation we explore how financial services firms can set-up an effective process. Visit our fraud and financial crime blog post for more on AML risk assessment program: http://bit.ly/2aPlQQ7
Cybersecurity is a constant, and, by all accounts growing, challenge. Although software products are gradually becoming more secure and novel approaches to cybersecurity are being developed, hackers are becoming more adept, their tools are better, and their markets are flourishing. The rising tide of network intrusions has focused organizations' attention on how to protect themselves better. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures — and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses. A heuristic model was developed to demonstrate the various cybersecurity levers that organizations can control, as well as exogenous factors that organizations cannot control. Among the report's findings were that cybersecurity experts are at least as focused on preserving their organizations' reputations as protecting actual property. Researchers also found that organizational size and software quality play significant roles in the strategies that defenders may adopt. Finally, those who secure networks will have to pay increasing attention to the role that smart devices might otherwise play in allowing hackers in. Organizations could benefit from better understanding their risk posture from various actors (threats), protection needs (vulnerabilities), and assets (impact). Policy recommendations include better defining the role of government, and exploring information sharing responsibilities.
Research of the Current Status of Vinyl Records in Context of the InternetSarah Steffen
English translation of my Bachelor's Thesis written in 2013 (unabridged), view the original version here (abridged): http://www.slideshare.net/anyonesdaughter/untersuchung-zum-stellenwert-der-vinylschallplatte-im-internet
Gannon UniversityDepartment of Mechanical EngineeringDecision .docxshericehewat
Gannon University
Department of Mechanical Engineering
Decision Making Under Uncertainty, GENG 623
Problem # 10
In your own words, explain six sigma (6 ) process in detail including DMAIC & DFSS. Find five big and famous corporations that use six sigma process to reduce the variation in every process. Explain how this process was used to help them reduce variation. Present your report with at least one example for each corporation. Submit all internet material with URL listed at the bottom of the page.
Cyber At tacks
“Dr. Amoroso’s fi fth book Cyber Attacks: Protecting National Infrastructure outlines the chal-
lenges of protecting our nation’s infrastructure from cyber attack using security techniques
established to protect much smaller and less complex environments. He proposes a brand
new type of national infrastructure protection methodology and outlines a strategy presented
as a series of ten basic design and operations principles ranging from deception to response.
The bulk of the text covers each of these principles in technical detail. While several of these
principles would be daunting to implement and practice they provide the fi rst clear and con-
cise framework for discussion of this critical challenge. This text is thought-provoking and
should be a ‘must read’ for anyone concerned with cybersecurity in the private or government
sector.”
— Clayton W. Naeve, Ph.D. ,
Senior Vice President and Chief Information Offi cer,
Endowed Chair in Bioinformatics,
St. Jude Children’s Research Hospital,
Memphis, TN
“Dr. Ed Amoroso reveals in plain English the threats and weaknesses of our critical infra-
structure balanced against practices that reduce the exposures. This is an excellent guide
to the understanding of the cyber-scape that the security professional navigates. The book
takes complex concepts of security and simplifi es it into coherent and simple to understand
concepts.”
— Arnold Felberbaum ,
Chief IT Security & Compliance Offi cer,
Reed Elsevier
“The national infrastructure, which is now vital to communication, commerce and entertain-
ment in everyday life, is highly vulnerable to malicious attacks and terrorist threats. Today, it
is possible for botnets to penetrate millions of computers around the world in few minutes,
and to attack the valuable national infrastructure.
“As the New York Times reported, the growing number of threats by botnets suggests that
this cyber security issue has become a serious problem, and we are losing the war against
these attacks.
“While computer security technologies will be useful for network systems, the reality
tells us that this conventional approach is not effective enough for the complex, large-scale
national infrastructure.
“Not only does the author provide comprehensive methodologies based on 25 years of expe-
rience in cyber security at AT&T, but he also suggests ‘security through obscurity,’ which
attempts to u ...
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
3. Copyrighted Material.
Forensic Examination of Questioned Documents
(ChapterHouse Publishing Incorporated series in Forensic Sciences)
First Edition
Philippine Copyright, 2013
By: ChapterHouse Publishing Incorporated
All Rights Reserved.
The text of this book or any part hereof, may not be reproduced or
transmitted in any form or by any means, electronic or mechanical,
including copying, recording, storage in any informational retrieval
system, or otherwise, without the prior written permission of the
publisher.
Any unauthorized copying, reproduction, or dissemination of any
portion of this book shall be prosecuted in accordance with law.
Published and Distributed by:
ChapterHouse Publishing Incorporated
Novaliches, Quezon City
Edited by:
The English Factor
www.englishfactor.com
“Providing international-quality editorial services at reasonable costs.”
ISBN: 978-971-95775-4-6
4. Copyrighted Material.
Table of Contents
DEDICATION........................................................................VII
PREFACE..............................................................................IX
CHAPTER 1
THE FIELD OF FORENSIC DOCUMENT EXAMINATION............ 1
What is Forensic Science?............................................................ 2
What is Forensic Document Examination?................................... 2
The PNP Questioned Document Examination Division.................. 4
The Forensic Document Examiner............................................... 7
CHAPTER 2
HISTORY OF FORENSIC DOCUMENT EXAMINATION............. 11
History of Writing...................................................................... 12
History of Forgery...................................................................... 13
Expert Witnesses and Pioneers of Document Examination......... 13
Historical Cases of the Twentieth Century.................................. 15
5. Copyrighted Material.
CHAPTER 3
DOCUMENTS............................................................................ 21
What Are Documents?............................................................... 22
What Are Questioned Documents?............................................. 22
Nature and Classification of Documents.................................... 23
Proper Care and Handling of Questioned Documents................. 24
Standards of Comparison.......................................................... 27
CHAPTER 4
FORGERY................................................................................. 29
What is Forgery?........................................................................ 30
Indication of Genuineness......................................................... 30
Indication of Forgery.................................................................. 32
Kinds and Methods of Forging.................................................... 33
Techniques of the Forger............................................................ 35
CHAPTER 5
TOOLS, TECHNIQUES AND PROCEDURES.............................. 37
Techniques Used in the Examination of
Questioned Documents...................................................... 39
Procedure in Examining Questioned Documents........................ 40
Instruments and Equipment in Forensic
Document Examination..................................................... 43
Photography in Forensic Document Examination....................... 50
CHAPTER 6
WRITING MATERIALS, TOOLS AND EQUIPMENT................... 53
Paper......................................................................................... 54
Brief History of Paper............................................................. 54
Types of Paper........................................................................ 54
Properties of Paper................................................................. 56
Examination of Paper............................................................. 56
Writing Instruments.................................................................. 58
Pencils.................................................................................... 58
6. Copyrighted Material.
Ink.......................................................................................... 59
Typewriters and Printers............................................................ 59
CHAPTER 7
HANDWRITING IDENTIFICATION............................................ 61
What Is Handwriting?................................................................ 62
What Is Handwriting Identification?........................................... 62
The Process Underlying Handwriting Identification.................... 63
Five Intricacies or Complexities of Handwriting.......................... 64
What is Handwriting System?.................................................... 65
Individual Characteristics in Handwriting.................................. 67
Variations in Handwriting.......................................................... 68
Factors That Affect Handwriting................................................. 68
CHAPTER 8
FORENSIC EXAMINATION OF HANDWRITING........................ 71
Systematic Examination of Handwriting..................................... 72
Handwriting and Hand Printing Examination............................. 74
Different Structures of Letter Design.......................................... 88
Disguised Writing.................................................................... 114
CHAPTER 9
FORENSIC EXAMINATION OF
QUESTIONED SIGNATURES................................................... 117
What Is a Signature?............................................................... 118
Kinds of Signature................................................................... 119
Stroke Structure of Signatures................................................. 119
What Is Signature Identification?............................................. 120
Classification of Suspect Signatures........................................ 122
Indications of Forgery.............................................................. 123
Characteristics of a Genuine Signature.................................... 125
Standards of Comparison........................................................ 125
Suggested Steps in the Examination of Signatures................... 128
Methodology of Forgery............................................................ 128
7. Copyrighted Material.
CHAPTER 10
FORENSIC EXAMINATION OF ALTERATION......................... 139
Alteration................................................................................ 140
Kinds of Alteration................................................................... 140
Obliteration............................................................................. 142
Erasure................................................................................... 142
Indented Writing...................................................................... 143
Elements of Proof..................................................................... 143
Methods of Alteration............................................................... 145
Points to Consider in Alterations.............................................. 145
CHAPTER 11
FORENSIC EXAMINATION OF COUNTERFEIT CURRENCY... 147
What is Counterfeiting?........................................................... 148
The Evolution of the Philippine Currency................................. 148
Philippine Peso Banknotes:
The New Generation Currency (NGC) Series..................... 152
Protecting the Philippine Currency........................................... 160
CHAPTER 12
FORENSIC EXAMINATION OF TYPEWRITING....................... 161
What is a Typewriter?.............................................................. 162
What is Typewriting Identification?.......................................... 162
Techniques in Typewriting Identification.................................. 163
Kinds of Typewriter ................................................................. 164
Determining Document Genuineness....................................... 164
Typewriter Defects................................................................... 164
Parts of Typewriter................................................................... 170
CHAPTER 13
FORENSIC EXAMINATION OF PRINTED AND
PHOTOCOPIED DOCUMENTS................................................ 171
Examination of Computer-Generated Documents..................... 172
Examination of Photocopied Documents.................................. 174
8. Copyrighted Material.
CHAPTER 14
PRESENTATION OF EVIDENCE IN COURT............................ 177
Presentation of Handwriting Evidence...................................... 178
Presentation of Other Evidence in QD...................................... 180
CHAPTER 15
PHILIPPINE LAWS ON QUESTIONED DOCUMENTS............... 183
Revised Penal Code – Crimes Against Public Interest................ 184
Revised Penal Code – Crimes against Public Interest................ 189
GLOSSARY.............................................................................. 199
BIBLIOGRAPHY...................................................................... 205
9. Copyrighted Material.
THE FIELD OF FORENSIC DOCUMENT EXAMINATION
CHAPTER 1
THE FIELD OF FORENSIC DOCUMENT EXAMINATION
Learning Objectives
At the end of this chapter, the student will be able to:
•
Define forensic science and forensic document
examination
•
Enumerate the functions of the PNP Questioned
Document Examination Division
•
Describe the work of a forensic document examiner
1
10. Copyrighted Material.
2
Forensic Examination of Questioned Documents
What is Forensic Science?
Broadly speaking, forensic science is the application of scientific
techniques and principles in order to provide evidence to legal or related
investigations and determinations. In simpler terms, it can be defined
as science as it pertains to legal problems. For example, DNA typing
and the identification of drugs involve the use of specialized scientific
equipment by personnel with science degrees. However, there are also
difficulties in this definition such as when the detection of fingerprints
at a crime scene is conducted by a police officer who does not have a
science degree. In fact, recent court cases in the U.S.A. have questioned
whether there truly is a scientific principle underlying the discipline of
forensic science (Tilstone, Savage, & Clark, 2006).
Criminalistics, or the application of forensic science to criminal
matters, should be distinguished from the term criminology, or the
social science study of crime and criminal behavior. In practice,
criminalistics applies science to the solution of crimes through the
examination of physical evidence in the field or the crime laboratory.
Examples of such physical evidence include hairs, fibers, latent
fingerprints, and biological material. The strength of criminalistics lies
in the reliability and objectivity of scientific testing (Fisher, Tilstone, &
Woytowicz, 2009).
What is Forensic Document Examination?
The American Board of Forensic Document Examiners defines
forensic document examination as the practice of the application
of document examination to the purposes of the law. This includes
the identification of handwriting, typewriting, the authenticity of
signatures, alterations in documents, the significance of inks and
papers, photocopying processes, writing instruments, sequence of
writings and other elements of a document in relation to its authenticity
or spuriousness (Eckert, 1997).
Forensic document examination is also usually called questioned
document examination or scientific examination of questioned
documents. In the Philippines, crime laboratories and popular media
refer to it simply as “QD” as short for “questioned documents.” It
is also known by other names such as handwriting examination or
handwriting analysis. It should, however, be distinguished from
graphology, which is the study of handwriting to identify the writer’s
personality traits. Forensic document examiners do not engage in
personality identification via a study of handwriting.
The terms forensic document examination and questioned
document examination will be used interchangeably in this textbook to
11. Copyrighted Material.
THE FIELD OF FORENSIC DOCUMENT EXAMINATION
refer to the task of answering questions about a disputed document
using a variety of scientific processes and methods.
These questions may include the following: Is the document
authentic? Was anything added to or removed from the document?
Does the handwriting belong to the individual or the typescript to a
particular machine? What is the age of the document? If the document
has been altered, can we recover any of the original? Analyses are
conducted in order to answer these questions and be able to determine
who created or what device was used to create it, what changes have
occurred since its original production, and if it is as old as it purports
to be.
Examinations include the following:
• Handwriting and signature comparisons
• Detection of alterations, deletions, and substitutions
• Mechanical and electronic impression comparisons
• Detection of counterfeits
• Decipherment of obliterated text
• Examination of water-soaked, charred, stained, or torn
documents
• Ink and paper comparison
• Determination of sequence of entry
• Detection and analysis of indented and other accidental
writings
• Age of documents
A combination of examination techniques may be required
depending on the questions raised about the integrity and method
of production of the questioned document. Examples of questioned
documents submitted for such examinations include the following:
• Wills
• Checks
• Credit card receipts
3
12. Copyrighted Material.
4
Forensic Examination of Questioned Documents
• Business contracts
• Marriage contracts
• Birth certificates
• Mortgages, deeds of land, transfers, and leases
• Insurance applications
• Agreements
• Accounting ledgers and financial records
• Anonymous and threatening letters
• Suicide notes
• Tests and examinations
• Medical charts
• Diaries, agendas, and appointment books
• Legal files
The PNP Questioned Document Examination Division
The Philippine National Police (PNP) Crime Laboratory Group
includes the Questioned Document Examination Division (QDED),
which aims to provide scientific support in forms of documentary
and testimonial evidences. Their function to examine questioned
documents specifically includes the following:
1. Handwriting examination – including hand lettering (such
as anonymous letters, ransom notes and suicide notes) and
signatures (such as those appearing in deeds of absolute sale,
receipts, marriage contracts and land titles)
2. Imprint examination – including those produced by manual
devices (rubber stamps, dater stamps and some cancellation
stamps), mechanical devices (typewriters and cheque writers),
and electronic printing devices, (typewriters, computer printers,
time clocks and cash registers); also includes those produced
by the manufacture of counterfeits (currencies, negotiable
13. Copyrighted Material.
THE FIELD OF FORENSIC DOCUMENT EXAMINATION
instruments, travel documents, licenses, and various personal
credentials and identification documents)
3. Writing media examination – including instruments, inks and
papers
4. Dating examination – including absolute determinations (e.g.,
dates of introduction of products) and relative determination
(e.g., erasures or alterations), changes, insertions and
substitutions
5. Examination of falsification and alterations – including
removals (e.g., erasures or alterations), changes, insertions and
substitutions
6. Examination of invisible, faded and obscured writings and
impressions of writings
7. Examination of preternatural paper characteristics – including
tears, fasteners (e.g., paper clips and staples), cuts and
perforations
8. Miscellaneous examination – including envelope tampering,
adhesives, laminations, typist’s characteristics and linguistics
9. Conduct lectures to PNP, AFP and other government agencies
10. Conduct field laboratory works – questioned document
examiners are sent to agencies/offices to conduct examination
and to photograph original documents that cannot be submitted
to the PNP Crime Laboratory
11. Attend court duties
Document examinations performed by the PNP-QDED are based
on written requests from government agencies, private investigating
agencies, court orders, as well as private requesting parties. However,
documents previously examined by any competent government agency
are not reexamined unless ordered by the court of law. If the case is
undergoing trial in court, disputed documents are examined only upon
order of the court having jurisdiction of the case.
The PNP Crime Laboratory provides frontline services for the
examination of questioned documents. Below is a table showing the
requirements for the conduct of examination based on the PNP Citizen’s
Charter (PNP, 2009).
5
14. Copyrighted Material.
6
Forensic Examination of Questioned Documents
PNP CRIME
LAB SERVICE
1. Examination
of altered
or erased
documents
2. Examination
of counterfeit
bills
3. Handwriting
Identification
4. Signature
Identification
DOCUMENTARY
REQUIREMENTS
FEES
DURATION
P2,000
4 working
days
• Four copies of letter
request
• Original copy of altered/
erased document
P2,000
3 working
days
• Four copies of letter
request
• Original of the
questioned bills
P3,500
P2,000
10 working
days
• Four copies of letter
request
• Original of the
questioned document
• Original copy of at least
five pages of extended
handwriting of similar
writing style of subject
individual
10 working
days
• Four copies of letter
request
• Original of the
questioned document
• Original copy of at
least eight different
documents bearing
similar writing style and
standard signatures,
executed five years
before and after the
execution of the
questioned signature
(Fees and Duration Reflect Rates as of October 2013)
Other chapters in this textbook include information based on
the PNP’s adherence to the highest professional standards of ethics
as questioned document examiners. In Chapter 5, for example, the
techniques and procedures used by the PNP-QDED in examining
questioned documents will be enumerated. The same chapter also
includes tools and equipment used in the PNP Crime Laboratory.
15. Copyrighted Material.
THE FIELD OF FORENSIC DOCUMENT EXAMINATION
The Forensic Document Examiner
In past decades experts in
the area of analyzing documents
were generally referred to as
questioned document examiners.
Sometimes they are also called
forensic
scientists,
document
examiners, document experts,
handwriting experts, or by a
combination of these and other
descriptions. Today, they are more
commonly referred as forensic
document examiners. For purposes
of this book, however, the terms forensic document examiners and
questioned document examiners will both be used.
Forensic document examiners or a questioned document
examiners refer to persons who study all aspects of a document to
determine its authenticity, origin, handwriting, photocopies, inks
and papers. Unlike the typical law enforcement officer, they do not
conduct crime scene searches, street investigations, interviews or
interrogations. Their work does not involve face-to-face encounters
with the street reality of crime and its victims, witnesses and suspects.
Forensic document examiners are basically laboratory investigators.
The profession of forensic document examination did not
develop as an extension of other scientific professions such as medicine,
chemistry or engineering. Instead, it evolved within the legal system
due to the courts’ need for assistance in interpreting evidence relating
to questioned documents (Kelly & Lindblom, 2006).
The goal of a forensic document examiner is to study and
investigate documents in order to determine the facts about their
preparation and history. The work usually involves the examination of
handwriting, but the forensic document examiner’s scope of expertise
also includes the following:
• Recognizing genuineness
• Analyzing colortone of inks, papers, and other substances
that comprise documents
• Revealing additions and substitutions
• Restoring or deciphering erased and obliterated writing
7