Podcast
Questions and Answers
Which of the following best describes the role of a forensic document examiner in a forgery case?
Which of the following best describes the role of a forensic document examiner in a forgery case?
- To assess the artistic merit and aesthetic qualities of the document.
- To analyze the document's historical context and cultural significance.
- To determine if the document's author intended to commit forgery, influencing the judge or jury's decision. (correct)
- To determine the emotional state of the document's author at the time of writing.
Which of the following actions would NOT be considered a method of document alteration?
Which of the following actions would NOT be considered a method of document alteration?
- Using correction fluid to remove a portion of the original text.
- Physically tearing a document to remove incriminating information completely.
- Employing chemical solvents to erase specific sections of a document.
- Adding personal annotations in the margins for clarification. (correct)
In the context of handwriting analysis, what distinguishes a 'qualified conclusion' from an 'identification' or 'elimination'?
In the context of handwriting analysis, what distinguishes a 'qualified conclusion' from an 'identification' or 'elimination'?
- A qualified conclusion definitively confirms the authenticity of a signature, while an identification only suggests strong evidence.
- A qualified conclusion indicates the examiner is personally certified, while an identification or elimination means they are still in training.
- A qualified conclusion demonstrates that the handwriting is stylistically unique, whereas an elimination deems it common.
- A qualified conclusion is a determination that falls ambiguously between definitively identifying and eliminating a suspect as the author. (correct)
Why is understanding the 'range of natural variation' critical in handwriting analysis?
Why is understanding the 'range of natural variation' critical in handwriting analysis?
How do modern biometric signature pads enhance security compared to signature verification methods used in the 1970s?
How do modern biometric signature pads enhance security compared to signature verification methods used in the 1970s?
What implications arise if a questioned document is found to contain paper with starch instead of fiber?
What implications arise if a questioned document is found to contain paper with starch instead of fiber?
Which security measure poses the greatest challenge to counterfeiters of U.S. currency?
Which security measure poses the greatest challenge to counterfeiters of U.S. currency?
When examining a ransom note in a kidnapping case, what is a key aspect of handwriting analysis that can significantly aid the investigation?
When examining a ransom note in a kidnapping case, what is a key aspect of handwriting analysis that can significantly aid the investigation?
Why are pen and ink manufacturers asked to submit their new ink formulations to the International Ink Library?
Why are pen and ink manufacturers asked to submit their new ink formulations to the International Ink Library?
In detecting alterations, obliterations, erasures, and page substitutions, which tool is most effective?
In detecting alterations, obliterations, erasures, and page substitutions, which tool is most effective?
How have criminals faked money printed on the correct type of paper?
How have criminals faked money printed on the correct type of paper?
What does FISH stand for?
What does FISH stand for?
What technique is used to separate individual dye components?
What technique is used to separate individual dye components?
What is the punishment for counterfeit US currency?
What is the punishment for counterfeit US currency?
Which factor is LEAST likely to be analyzed when examining handwritings?
Which factor is LEAST likely to be analyzed when examining handwritings?
Which of the following is NOT a primary method of forgery?
Which of the following is NOT a primary method of forgery?
Which of these actions is likely to occur as part of a forensic document examiner?
Which of these actions is likely to occur as part of a forensic document examiner?
What is an Electrostatic Detection Device or EDD?
What is an Electrostatic Detection Device or EDD?
What are qualified conclusions?
What are qualified conclusions?
According to the content, what is the purpose of understanding the printing process of paper money for a forensic investigator?
According to the content, what is the purpose of understanding the printing process of paper money for a forensic investigator?
Why might an examiner use a Video Spectral Comparator (VSC)?
Why might an examiner use a Video Spectral Comparator (VSC)?
What is graphology?
What is graphology?
Which database is maintained by The US Secret Service Forensic Lab?
Which database is maintained by The US Secret Service Forensic Lab?
Which statement accurately reflects a key principle in handwriting analysis?
Which statement accurately reflects a key principle in handwriting analysis?
What materials enhance the realism and persuasiveness of fraudulent literary documents?
What materials enhance the realism and persuasiveness of fraudulent literary documents?
Which of these tools is LEAST likely to be used in initial questioned document analysis?
Which of these tools is LEAST likely to be used in initial questioned document analysis?
Why is the Secret Service protecting the President?
Why is the Secret Service protecting the President?
When might a document be considered 'questioned'?
When might a document be considered 'questioned'?
How does indented handwriting analysis assist in forensic investigations?
How does indented handwriting analysis assist in forensic investigations?
What is one key factor that makes buying autographed sports memorabilia online risky?
What is one key factor that makes buying autographed sports memorabilia online risky?
Why do forensic document units use databases like FISH?
Why do forensic document units use databases like FISH?
The Lindbergh case helped connect the person who left the ransom note to multiple other cases. Choose how it happened.
The Lindbergh case helped connect the person who left the ransom note to multiple other cases. Choose how it happened.
Which of the following shredders are best for confidential documents?
Which of the following shredders are best for confidential documents?
Which of the following is NOT one of the four ways to alter a document?
Which of the following is NOT one of the four ways to alter a document?
What is fraudulence?
What is fraudulence?
How can you test that money is printed on the correct type of paper?
How can you test that money is printed on the correct type of paper?
Which of the following documents is LEAST likely to be forged or counterfeited?
Which of the following documents is LEAST likely to be forged or counterfeited?
Which of these factors is LEAST likely to influence a person's handwriting?
Which of these factors is LEAST likely to influence a person's handwriting?
What does it mean to obliterate a document?
What does it mean to obliterate a document?
Flashcards
Questioned Document?
Questioned Document?
Any written or typewritten mark whose source isn't agreed on or is unknown.
Document Analysis?
Document Analysis?
The practice of examining forensic documents for forgery and counterfeit.
Federal agencies with QD units?
Federal agencies with QD units?
FBI, Immigration & Customs, Secret Service, Army Crime Lab, USPS, and the Bureau of Alcohol, Tobacco, and Firearms.
What is FISH?
What is FISH?
Signup and view all the flashcards
Job responsibilities of a Forensic document examiner?
Job responsibilities of a Forensic document examiner?
Signup and view all the flashcards
Freehand Forgery
Freehand Forgery
Signup and view all the flashcards
Simulation Forgery
Simulation Forgery
Signup and view all the flashcards
Tracing Forgery
Tracing Forgery
Signup and view all the flashcards
Disguised Forgery
Disguised Forgery
Signup and view all the flashcards
Alteration Forgery
Alteration Forgery
Signup and view all the flashcards
Ways to alter a document?
Ways to alter a document?
Signup and view all the flashcards
What is counterfeiting?
What is counterfeiting?
Signup and view all the flashcards
Why was the Secret Service originally created?
Why was the Secret Service originally created?
Signup and view all the flashcards
Punishment for counterfeiting US currency?
Punishment for counterfeiting US currency?
Signup and view all the flashcards
Security features of currency?
Security features of currency?
Signup and view all the flashcards
Special Paper Currency
Special Paper Currency
Signup and view all the flashcards
Testing Real Money
Testing Real Money
Signup and view all the flashcards
Tools for document analysis?
Tools for document analysis?
Signup and view all the flashcards
Principle of handwriting analysis?
Principle of handwriting analysis?
Signup and view all the flashcards
Characteristics of handwriting analysis?
Characteristics of handwriting analysis?
Signup and view all the flashcards
What are Exemplars?
What are Exemplars?
Signup and view all the flashcards
Describe authorship conclusions?
Describe authorship conclusions?
Signup and view all the flashcards
What is fraudulence?
What is fraudulence?
Signup and view all the flashcards
Who is the father of questioned document examination?
Who is the father of questioned document examination?
Signup and view all the flashcards
What is ABFDE?
What is ABFDE?
Signup and view all the flashcards
What is ASQDE?
What is ASQDE?
Signup and view all the flashcards
What are qualified conclusions?
What are qualified conclusions?
Signup and view all the flashcards
Initial questioned document analysis uses what tools?
Initial questioned document analysis uses what tools?
Signup and view all the flashcards
What machine reveals text from indented impressions?
What machine reveals text from indented impressions?
Signup and view all the flashcards
Detect alterations, obliterations, erasures, page substitutions?
Detect alterations, obliterations, erasures, page substitutions?
Signup and view all the flashcards
Separate dye components?
Separate dye components?
Signup and view all the flashcards
Who maintains the FISH database?
Who maintains the FISH database?
Signup and view all the flashcards
How are Biometric Signature Pads used differently today than in the 1970s?
How are Biometric Signature Pads used differently today than in the 1970s?
Signup and view all the flashcards
Biometric Signature Pad record?
Biometric Signature Pad record?
Signup and view all the flashcards
Confidential documents?
Confidential documents?
Signup and view all the flashcards
Study of the personality
Study of the personality
Signup and view all the flashcards
Study Notes
- A questioned document is any written or typewritten mark with a disputed or unknown source.
- Document analysis involves examining forensic documents for forgeries and counterfeits.
- Job duties of a forensic document examiner include checking for forgeries, analyzing handwriting, examining origins of typed documents, piecing together damaged documents, determining when a document was made, examining indented handwriting, and identifying alterations.
- Tools commonly used for forensic document analysis include microscopes, magnifying lenses, ink identifiers, databases like FISH, the International Ink Library, handheld lenses, illuminated magnifiers, infrared spectroscopes, electrostatic detection devices, video spectral comparators, and chromatography equipment.
Federal Agencies with Questioned Document Units
- The FBI
- Immigration and Customs Enforcement
- The Secret Service
- The Army Crime Lab
- The International Revenue Service
- The USPS
- The Bureau of Alcohol, Tobacco, and Firearms
FISH (Forensic Information System for Handwriting)
- A forensic database of digitized text writings
- It assists in finding matches between writings.
- The US Secret Service Forensic Lab maintains the FISH database
The International Ink Library
- Pen and ink manufacturers submit their new ink formulations.
Famous Cases Involving Questioned Documents
- Lindbergh Kidnapping: Analysis of a ransom note led to the conviction of the perpetrator, who was found to have left 13 similar notes.
- Ramsey Case: A ransom note was found in the case of a kidnapped and murdered 6-year-old girl; handwriting analysis helped eliminate suspects.
- 9/11 Terrorist Attack: Forensic document examiners deciphered burned documents to identify the plane hijackers.
- BTK Killer (Dennis Rader): Handwriting analysis matched Rader to letters he sent, confirming his guilt.
Handwriting Analysis and Factors Influencing Handwriting
- Handwriting analysis can connect a person to multiple cases or eliminate suspects.
- Major factors influencing handwriting include hand size, muscular makeup, education, and personal style.
- The three main principles include:
- No two writers have identical handwriting with enough samples.
- The same person's writing can vary.
- People can't write beyond their skill level.
- The 12 major characteristics include: line quality, letter spacing, size consistency, connected letters, continuous writing, complete letters, cursive/printed letters, pen pressure, slant, line habits, fancy curls, and T crosses/I dots.
Exemplars
- Writings from before an investigation (diary entries, checks)
- Writings created for the investigation under controlled conditions.
- Possible conclusions include identification, elimination, inconclusive, and qualified.
- Qualified conclusions fall between identification and elimination.
- Initial document analysis tools include the eye, handheld lens, or microscope/illuminated magnifier.
- An Electrostatic Detection Device (EDD) reveals text from indented impressions. A Video Spectral Comparator (VSC) detects alterations, obliterations, erasures, and page substitutions.
- Chromatography separates individual dye components.
Biometric Signature Pads
- They record how a signature is made, tracking speed, rhythm, and pressure.
- Cross-cut shredders are best for confidential documents.
- Graphology is the study of handwriting to analyze personality.
- Forgery is the attempt to make a document seem official to deceive.
- Fraudulence is getting something for committing forgery.
Forgery Cases involve
- The document expert determines intent
- The judge or jury decides if forgery was committed
Common situations
- Passing fraudulent checks
- Selling counterfeit money
- Buying fake tickets
Famous Forgers and Fraud in Memorabilia
- Jean Baptiste Corot is the most faked artist.
- Auction sites increase fraud in autographed sports memorabilia due to lack of physical inspection.
- 70-90% of autographed sports memorabilia may be fake.
Making Fraudulent Documents Look Real
- Use old materials (paper, ink)
- Employ period-specific writing styles
- Chemically age materials
- Use watermarks.
Methods of Forgery
- Freehand: Copying something without knowing its appearance.
- Simulation: Imitating writing.
- Tracing: Copying by tracing.
- Disguised: Altering writing to be untraceable.
- Alteration: Changing existing writing.
Document Alterations
Document alterations include:
- Erasing
- Obliterating by burning or chemicals
- Altering writing
- Overwriting.
- Counterfeiting is producing something that looks like something else, such as money or art.
- The Secret Service was created to suppress counterfeit money and now protects the President.
- Counterfeiting US currency carries a punishment of up to 15 years in prison.
Security Features on Currency
Security features include:
- Plastic strips that glow under UV light
- Color variations
- Paper currency contains fiber instead of starch.
- Iodine pens turn counterfeit paper blue-black.
- Criminals bleach paper and print higher money counts on it.
- George Washington is on the $1 bill.
- Abraham Lincoln is on the $5 bill.
- Alexander Hamilton appears on the $10 bill.
- Andrew Jackson is on the $20 bill.
- Common documents forged or counterfeited include: contracts, checks, wills, birth certificates, passports, money, lottery tickets, and ransom notes.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.