0% found this document useful (0 votes)
48 views32 pages

Forensics Training Masterclass Module Module 3

This document discusses the preparation of witness and suspect lists, as well as the examination of documentary evidence, as part of the forensic investigation process. It provides guidance on: 1) Creating rough lists of potential suspects and witnesses by examining all available evidence from the preliminary review and updating the lists based on new information. 2) Identifying and locating witnesses through various methods like CCTV footage, media appeals, interviews, and social media searches. 3) Conducting effective interviews by planning strategically, asking relevant questions, remaining objective, and allowing sufficient time. 4) Gathering and examining documentary evidence like invoices, receipts, contracts and notes to prove allegations beyond reasonable doubt. All documents must be

Uploaded by

olamideodiahi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views32 pages

Forensics Training Masterclass Module Module 3

This document discusses the preparation of witness and suspect lists, as well as the examination of documentary evidence, as part of the forensic investigation process. It provides guidance on: 1) Creating rough lists of potential suspects and witnesses by examining all available evidence from the preliminary review and updating the lists based on new information. 2) Identifying and locating witnesses through various methods like CCTV footage, media appeals, interviews, and social media searches. 3) Conducting effective interviews by planning strategically, asking relevant questions, remaining objective, and allowing sufficient time. 4) Gathering and examining documentary evidence like invoices, receipts, contracts and notes to prove allegations beyond reasonable doubt. All documents must be

Uploaded by

olamideodiahi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

All copy and transmission rights reserved by the IICFIP USA, Incorporation

MODULE NO. 3
This module covers Preparation of Suspects/ witnesses
rough list and Document Examination- an introduction.

Preparation of witnesses and suspects rough list


Introduction

This is step 4 of the forensic investigation process. It is at this stage that a proper investigation

commences. At this stage, the Certified Forensic Investigation Professional (CFIP) comes up

with a list of suspects and witnesses. According to the International Institute of Certified

Forensic Investigation Professionals Inc. (IICFIP Inc), forensic investigators should prepare this

list at the preliminary review stage or rather gather information for the preparation of this list(s)

during Step 1: Preliminary Review Step.

If these lists are not prepared at the preliminary state, then the information gathered in the

preliminary step will be of great help here. It is the same list that will be used in the interview

steps. What I am saying here is that, it’s the client that will provide the initial list of suspects and

witnesses during your interviews with him or her during the preliminary review step. Therefore,

it has to be updated with as more information as possible. Since it is the client that gives out a

list, the list should give room to accommodate addition of other potential possible suspects or

witnesses. I will start by defining a witness and suspect.

A witness is a person, excluding a defendant, likely to avail evidence in a court of law.

Nonetheless, all victims may be considered witnesses and must be treated as such. Whereas a

suspect is a person who is most likely to be guilty of an offense. To succeed in any investigation,

the investigator has to get accurate details from witnesses. Forensic Investigators, whether tasked

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

with a volume crime or major investigation, must recognize the individual needs and concerns of

witnesses and treat them with dignity and respect. This can have a significant impact on how

witnesses cooperate with the investigation and any subsequent prosecution.

Rough list is basically the list of possible suspects, and witnesses that can aid in the success of

the investigation.

To prepare a list of potential suspects or witnesses;

 Examine all available evidence - witness statements, scene examination, exhibits and

other supporting documents.

 Use information given by the client during the preliminary step.

Identifying and locating witnesses

Some witnesses may self-present or be self-evident, whereas other witnesses may be more

difficult to identify and/or locate. Investigating officers must, therefore, develop clear

intelligence-led objectives for identifying witnesses. These will depend on the circumstances of

the case but should include identifying settings and communities where witnesses are likely to be

found. Communities may be cultural, religious, sporting, occupational, clubs, associations or

societies. Resources can then be directed towards identifying witnesses.

Methods for identifying and locating witnesses:

 viewing CCTV.

 media appeals.

 house-to-house enquiries.

 interviews with victims and other witnesses.

 suspect interviews.

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

 financial investigation.

 open-source internet search tools.

 social media.

To preserve witness testimony, the witnesses should not be allowed to discuss anything with

suspects and vice versa. It must be noted here that the lists of witnesses/suspects are not fine until

the interviews are concluded. These lists will keep on changing until interviews on chapter 6 and

7 are concluded. Experience has shown that the witnesses lists proposed by the clients. Later on

turn to be suspects and suspects proposed by the client turn out to be witnesses. Why do you

think this happen? Clients being human as they are, they are sometimes biased as opposed to

their investigators.

Experience has also shown that the staff that are most trusted by the client are the most risk staff

and in fact most clients get shocked to learn that trusted staff are the principal suspects for

financial wrong doing in their organizations.

Take relevant extracts from witness statements/ reports to assist in your written plan. From

experience, it has proved rather challenging work where the investigator starts work with any list

of suspects and witnesses. In this case, the investigator’s mandate is to find out who was

responsible for the perpetration of the wrong doing and also find out the co-perpetrators.

The list arrived at before is not exhaustive and that is why it is called a rough list. It will be

discovered in chapter6 and 7 that as actual interview of witnesses and suspects progress on, some

of the witnesses will close ranks and become suspects and some of the suspects will also become

witnesses. In this rough list usually provide a nice point where to start from and then progress on.

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

Characteristics of an Effective Interview

To be successful, an interview should be thorough. It requires strategic planning, relevant

questions and an objective interviewer. Many interviews fail to gather enough information to

address the issues raised in a forensic matter because of inadequate preparation, or because

insufficient time is allowed to complete the interview. If an interview is scheduled in advance, as

many are, there is a natural tendency to schedule a set time for the initiation and completion. If

possible, sufficient time should be allowed to conduct the interview with the time of completion

left open. If a set time is established, the person interviewed may be overly focused on the

ending time, thereby inhibiting a flow of information. Interviewers can enhance their credibility

by focusing on information that the interviewee should know, as opposed to guessing during the

interview and thereby wasting the time of the participants by asking questions that the

interviewee could not know. By remaining objective and fair, the interviewers can better gain the

confidence of the interviewee. Ideally, the interview should be conducted as soon as the alleged

impropriety has been discovered and very close to the crime scene.In fraud cases, this will be of

particular importance since the interviewing may wish to pull out a document from a file, for

instance. More discussion on interviewing is on chapters 6 and 7 of this book.

An effective interviewer should be an active listener, as well as an active observer. Both are

learned skills that can be studied and improved with practice. Active listening means not only

listening more than talking, but really hearing what is being said and how it is being

communicated. Sometimes what is not being said is equally as important as what has been said

by the interviewee.

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

Documentary evidence gathering and


examination
Introduction

This discusses the step number 5 of the investigation process. This is the main body of an
investigation that involves analysis of transactional documents. Documentary evidence gathered
in a forensic audit case resembles that of normal audit but differs in details and intensity. A
forensic investigator is not allowed to rely on sampling whereas an auditor uses sampling as one
of his/her important audit technique and in the process skips many crucial and critical evidences.
The mindset of the forensic investigator is that of finding evidence for or against an allegation.
The evidence so collected must be capable of providing proof beyond reasonable doubt.

Documentary evidence collection must follow the best evidence rule which states that if a
document is to be produced as evidence it must be in its original form. If not a certified copy
must be produced with reasons why original is not available. Documents that provide evidence
are forged invoices, receipts, purchase orders, cheques, contracts, agreements, authorization
letters, appointment letters, promotion letters, determination letters, falsified financial statements,
tax records, diaries, emails, suicide notes, bills delivery notes, dispatch notes, transfer notes
random notes and many more.

Approach
Certified Forensic Investigation Professional must plan his documentation evidence gathering
well ensuring that he/she targets the crime scene and carry out 100% testing and evidence
collection. Sampling is not encouraged in forensic investigation/audit. This will ensure a
reasonable expectation of collecting all the documentary evidence available without skipping
any. All documents interrelations must be traced and all relevant documents collected from
within that investigative area or outside so long as the other documents point to it. This will be
discussed further under external confirmations.

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

Investigative Fieldwork

Once the team is put together, the practitioner usually begins investigative fieldwork to set up the

validity of the claim. This mainly, involves examination of documents, and analytical

procedures, and evidence collection, and subject interviews. It is at this stage that a lot of time

has to be allocated.

Should it be substantiated, the conclusions / findings/ results of the investigation may possibly

conclude in a civil litigation. It is highly suggested that the practitioner conduct each

investigation with the intent of proving "beyond a reasonable doubt" as required by criminal

courts of law. In most cases, civil courts need enough proof by a preponderance of the evidence/

confirmation. Confirmations which satisfy the requirements of criminal court will probably meet

the requirements of civil proceedings.

According to the former Internal Revenue Service Agent, Richard Nose, there are seven different

forensic techniques to consider when conducting an investigation of alleged financial related

crimes. Recently, NACVA included these techniques into its Forensic Accounting Academy

syllabus. These include the following:

1. Public Document Reviews & Background Investigations;

2. Interviews of Relevant Persons;

3. Confidential Sources;

4. Laboratory Analysis of Physical & Electronic Evidence;

5. Physical & Electronic Surveillance;

6. Undercover Operations; and

7. Analysis of Financial Transactions.

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

The addition of these steps will assist make sure a complete review of all facts and an effective

and efficient resolution of the investigation procedures.

Any method of obtaining evidence can be used in a forensic investigation engagement contracts.

This may not be limited assurance engagement in which procedures are likely to be restricted to

enquiry and analytical actions. These engagements include a detailed and wholesale review of all

documentation and electronic evidence accessible. The view given by the expert forensic

accountant must be reasoned, and backed up by evidence/ confirmation. Their view cannot be

objective if only based on what they are told; they must corroborate that statement.

To achieve success in your forensic investigation, the procedures used must not be vague. In fact,

they have to be very specific enough that the engagement team could actually follow your

instructions/ directions. For instance, it may not be sufficient to write 'interview the suspect'. The

investigator must come up with questions that should be asked of the suspect in interview/

interrogation, depending on the circumstances in the situation. For instance, he/ she may ask the

suspect to explain their job role and what access that gives them to systems, inventory, and cash.

This also applies when recommending enquires of or discussions with management. In this case,

it ought to be concise in the answer especially what the engagement team should ask of them,

such as have they informed the law enforcers, has the suspect been suspended, and have they

informed the insurer? On the same note, it may not be sufficient to suggest the use of CAATs. In

that case, one must specify how the CAATs could be applied. For instance, information

matching bank accounts used for paying suppliers with bank accounts for paying workforce,

exception reports identifying employees who are not taking holiday.

To design appropriate procedures you must identify the type of forensic investigation

engagement contracts, and the particular type of crime, negligence claim as mentioned on the

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

introduction. Take for instance in quantifying the theft of goods will be very different from

quantifying a loss from payroll or ‘ghost employee’ fraud or loss of profits following a business

disruption.

An abundance of crucial information can be gleaned from documents related to criminal


cases. For example, suicide note found next to the departed, was it actually written by a
killer trying to cover up their crime? The wealthy individuals’, was it altered so a relative
could receive a hand-out?
The discipline of forensic document examination, often referred to as (questioned

documents)” is regularly linked with white collar crimes like fraudulent checks;

nevertheless, in excises, this part of forensic science may be applied in a wide array of

cases from medical malpractice to art forgeries to homicide(s).

Armed with complicated know-how, examiners can peer into the visible and invisible

marks on a document to extract an abundance of details that may verify authenticity or

provide additional information crucial to the investigation process.

The digital age has made the work of forensic document examiners even more important.

With the availability of powerful software programs such as Photoshop, Adobe, amongst

others. In fact, it has ended up being a significantly easier for criminals to create and

manipulate all manner of fraudulent documents from contracts to money.

Principles of Forensic Document Examination

Forensic document examiners often deal with questions of document genuineness. In order to

establish whether a document is authentic, the examiner may attempt to confirm who

created the document(s), establish the timeframe in which it was twisted, recognize the

materials used in its preparation or uncover modifications to the original text/ message.

Document(s) may be examined for evidence of obliterations, page substitutions, and alterations.

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

Or rather the examiner can study the materials, machines, and methods that created the

document(s), availing main information that can identify or narrow the possible sources

of the document. The paper, writing tools, ink, seals, ribbons, and stamps used in

production of the document may all reveal important clues/ leads. Document examiner

may even discover valuable evidence in a document’s invisible impressions/ imitation.

A Main element of document examination focuses on Handwriting/ calligraphy. The

examination and comparison of handwriting, that includes signatures and hand, is based on 3

main principles:

1. Given a sufficient amount of handwriting, no two skilled writers exhibit

identical handwriting features;

2. Every person has a range of natural variation to his or her writing; and

3. No writer can exceed his or her skill level.

Computer databases maintained by the United States Secret Service, the German Federal Police

and Federal Bureau of Investigation contain handwriting samples from hundreds of thousands of

writers. The Comparisons of these databases have not identified two individuals who have the

exact same combination of handwriting features, adding up to the authenticity of handwriting as

a solid form of confirmation.

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

Why and when is forensic document examination used?

Since documents are part of daily life, document examiners work a vast variety of instances.

Document examiners are called to investigate the authenticity of documents in situations such as:

Forgeries Kidnappings

Counterfeiting Extortion

Identity theft Stalking

Fraud Contested wills

Suicides Contested contracts

Homicides Medical malpractice

Bank Title/deed lawsuits

robberies

Table 1: Document examiners are called to investigate the authenticity of documents in situations Above

Forensic document examiners are most frequently asked to resolve questions of authorship. This

questions include, is the signature on the mortgage loan genuine? Can you say who wrote this

anonymous note? Simply by doing this comparison of documents found at a crime scene to a

suspect’s known writing samples, the document examiner is able confirm who wrote the note

and include or exclude suspects from the examination. The document examiner can also be a

CFIP that has majored in such examination and also undertaken special training in documents

examination

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

Ransom Note Nabs Kidnapper

A 1956 kidnapping case from Long Island, New York, helps illustrate the key role forensic

document examination can play in an investigation. In this case, a one Month old child was taken

from his home and a ransom note was found in the baby’s carriage, supposedly left by the child’s

babysitter.

Investigators discovered distinguishing characteristics in the way the writer formed 16 letters of

the alphabet, most notably the lowercase “m”, which resembled a sideways “z”. Investigators

searched through nearly two million documents looking for similar writing until a probation

officer found in his files documents written by a 31year old auto mechanic with the same

peculiar “m”. Document examiners were able to conclusively match the ransom note to the

suspect’s handwriting, helping to secure a conviction. It was discovered that it was the mechanic

who murdered the one month old child not the babysitter.

Fraudulent Checks

A common problem brought to forensic document examiners involves alterations, especially to

legal documents. For instance, if someone altered a check to increase its amount, examiners may

be able to determine this by comparing the way the inks from different pens react when subjected

to infrared radiation.

In the example below, a check made out to “Cash” for USD 1,000 has been altered by changing

the “1” to a “9” and adding a recipient’s name. Although the black inks appear the same in

visible light, when subjected to certain frequencies of infrared light, the ink used to prepare the

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

genuine check reacts differently than the ink used to alter the check, making the alteration

obvious.

Figure 1: Fraudulent Checks

Figure 2: Fraudulent Checks 2

Documents in a suspect’s possession may also reveal clues from hidden impression

evidence that could link a suspect to a crime. For instance, did the bank robbery

suspect write the hold-up note on top of another piece of paper that now contains

impression of that?

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

Figure 3: Note from The suspect

Examiners can also identify the materials, inks and even the type of office equipment or writing

implements used to produce the document. This is especially useful in fraud cases because these

details can identify the time frame in which a document was created. For instance, if analysis of

the document’s paper reveals a substance that was not used in paper manufacturing during the

time frame in question, the document, piece of art, or historical record would be demonstrated to

be fraudulent.

How is it done?

Evidence That May Be Examined

Questioned material may consist of identification cards, contracts, wills, titles and deeds, seals,

stamps, bank checks, handwritten correspondence, machine? Generated documents (such as

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

those from photocopiers, fax machines, and printers), currency and electronic documents. In

some circumstances, graffiti and digital signatures may be examined; however, the client should

be aware that the examination of these types of evidence can be problematic.

Documents that don’t contain visible identifiable marks may contain valuable impression

evidence if they were underneath other documents when the writing was performed. Even

documents that were shredded or burned may prove useful if reconstructed.

In addition, writing instruments, rubber stamps, envelopes and makes/models of office

equipment in the suspect’s possession may be collected by the investigator. In digital documents,

evidence could even be collected from the metadata of electronic signature files, providing

information such as who the author is and when the document was written.

Collecting the Known and Unknown

When conducting examinations, forensic document examiners must have known specimens to

which they compare the material in question. These samples may come from any number of

known sources, such as a particular ink manufacturer or machine. In cases involving

handwriting, samples are usually divided into two types:

A. Requested writing specimens.

B. Collected writing specimens.

Requested specimens are writings dictated by the investigator to the writer. These specimens

are created under carefully controlled conditions, with the writer being closely monitored.

Collected writing specimens, however, are writings that were completed by the subject prior to

the investigation. Good sources of writing specimens may include items such as cancelled

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

checks, letters, diaries, signed receipts, medical records, real estate contracts, tax records or other

signed legal documents.

Who is to conduct the Analysis?

Analysis ought to be done by a qualified forensic document inspector, if possible one who is a

member of a well established professional association like the ABFDE or the ASQDE or other

professional however permitted document examiner in one’s state.

Membership wants for these associations differ; nevertheless, an examiner typically must have

completed a two year, full time training program under the guidance of a qualified forensic

document investigator. In order to maintain membership in good standing and keep their skills

present, inspectors/ examiners are required to complete continuing training and personal

development. If the examiners are members of the IICFIP USA, Inc they must also conform to

the 48 CPD requirements of the institute in general investigative training.

How and Where the Analysis Is Performed

Forensic document examiners either work as private examiners within their own laboratory, or

for publicly funded laboratories. If an agency does not have questioned documents analysis

capabilities, investigators may opt to send the evidence to a nearby lab, or retain a private

examiner.

The techniques and tools used in forensic document examinations leverage well? Established

principles of physics and chemistry. A typical Questioned Documents unit in a crime laboratory

is equipped with microscopes, digital imaging instrumentation, infrared and ultraviolet light

sources, video analysis tools and specialized equipment including electrostatic detection devices

(EDD) and materials to perform analytical chemistry.

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

Many forensic document examiners use only non Destructive techniques that use light and/or

electrostatics to examine documents for indented impression evidence or ink differentiation.

However, a few examination techniques, such as liquid chromatography, are considered

destructive because they require removal of small samples of ink from the questioned

documents. These types of examinations may be sent off to laboratories that specialize in this

type of ink analysis.

For analyses of documents created by typewriters, fax machines, or printers, examiners may rely

on various databases created for comparison purposes. During handwriting analyses, examiners

compare samples provided from particular populations. Certain agencies, such as the U.S. Secret

Service and the German Federal Police, maintain larger databases. For example, the Forensic

Information System for Handwriting (FISH) maintained by the U.S. Secret Service Forensic

Laboratory contains handwriting samples from tens of thousands of writers.

Revealing text from indented impressions ― Documents that may contain indented impressions

not visible to the naked eye can be visualized through the use of an Electrostatic Detection

Device (EDD) such as the Electrostatic Detection Apparatus (ESDA). An EDD uses applied

charges and toner to visualize areas of indented writing, making them visible to the eye. The

ESDA uses the principle that indented areas of the document carry less negative charge than

surrounding areas. This causes the toner used in the EDD to be attracted to these areas, revealing

indentations that are present.

Using this technique, indented impressions have been recovered from up to seven layers of paper

beneath the original writings. Research has demonstrated that impressions can be successfully

visualized from documents up to 60 years old, provided the papers are not mishandled or stored

improperly.

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

Detecting alterations obliterations erasures and page substitutions ― Alterations, obliterations

and erasures not visible to the human eye can often be detected through use of photography and

other imaging devices that utilize ultraviolet and infrared wavelengths of light. Using radiation

filtered at various wavelengths, an imaging instrument such as a video spectral comparator

(VSC) can reveal writing that has been added with a different ink, or has been altered or

removed by exploiting variations in the way different inks respond to different wavelengths of

light. For example, under certain light sources combined with an infrared filter, a document

containing information written in ink that has faded over time may be enhanced or processed to

appear darker and therefore more legible.

Figure 4: Obliterated Note View with Visible Light(Courtesy of Marie Durina)

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

Figure 5: Same Note Viewed With Infrared Radiation (Courtesy of Marie Durina)

Determining individual dye components ― An examination called liquid chromatography can

be conducted to identify the chemical composition of inks on a document. In this technique, a

small cutting from the questioned document is dissolved in a solvent and analyzed. This is one of

the few destructive techniques employed by the document examiner. The inks can be compared

to the International Ink Library, a database maintained by the U.S. Secret Service that contains

data on more than 9,500 inks that have been manufactured since 1920.

Typewritten and machine printed documents ― Documents created on a typewriter or printed

with ink jet, laser printers, fax machines and photocopiers may be sourced to a particular make

or model, or even to a specific machine. The printing process used to prepare documents can

also be identified. When possible, the examiner should obtain known standards and any available

accessories from the machine in question and the machine itself should be submitted for

examination.

Seals and stamps ― Questioned documents bearing rubber stamp impressions, embossed seals,

watermarks, or other mechanically printed marks may be submitted for examination. When

possible, it is best to provide the examiner with any suspected devices associated with the

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

questioned document that may have been involved in its preparation. This includes writing

instrument(s), papers, or other substances, rubber stamp(s), sealing devices (such as notary

seals), printing devices or other mechanisms.

To illustrate the value of a manufacturer’s mark, consider a 1989 case when a young girl was

kidnapped and murdered. Investigators called in forensic document examiners to examine the

plastic garbage bag in which the victim was found. Minute markings created by the heat? Sealing

process used in manufacturing such bags enable investigators to determine that the bag was

manufactured on the same machine within seconds of other bags found in the parents’ house.

This was key evidence that resulted in the conviction of the girl’s mother for murder.

Examination of handwriting ― When a sufficient amount of writing from two different people

is closely examined, there are always identifiable differences. Comparisons of writing samples

take into consideration a wide variety of handwriting characteristics including word and letter

spacing, slant or slope, speed, pen position, use of capitalization, embellishments, legibility, use

of punctuation, and proportion of letters and other attributes.

For example, one person may form the letter “O” in a clockwise motion, while another may form

the same letter in a counter Clockwise motion. A particular writer may form the letter “M” using

an upward? Moving “arch” formation, while another prefers to make a “garland” form of “M”,

forming this letter with a “U” motion to resemble the garland on a Christmas tree. Document

examiners take into account the various combinations of features present within the writing

sample as a whole. In addition, examiners look for features such as hesitations in the natural flow

of writing, possible retouching or unnatural tremors. These may indicate that an unnatural

writing process has been employed.

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

No one writes with machine like precision every time, and variations are evident in a person’s

handwriting even within the same document. For example, if a person writes an entire page of

signatures, each one will vary slightly. A trained forensic document examiner can discriminate

between natural variations in a writer’s own handwriting and significant differences denoting

different writers.

To conduct handwriting comparisons, the investigator should obtain known writing samples that

are similar in character to the document in question. If it is written in cursive, it should be

compared to known cursive writing. If it contains upper and lowercase letters, the known

writings must also contain upper and lowercase letters. Wherever possible, the investigator

should also obtain known writing containing similar combinations of letters and numbers seen in

the questioned documents. For comparison purposes, it is recommended that investigators obtain

20–30 repetitions of signatures, 15–20 repetitions of bank checks, 3–4 repetitions of entire

written letters. The investigator should also attempt to obtain known writing that is prepared

around the same time period as the questioned writing. This is particularly important in cases

involving writing from young people, as writing formation may still be at a developmental stage,

and by elderly persons, as writing may deteriorate with age or illness.

Documentary techniques

These are basically the techniques applied in categorizing, investigating, interpreting and

identifying the boundaries of physical sources, such as written documents, whether in the private

or public domain.

Criteria for Assessing The Quality Of Evidence

The following are the generally accepted criteria for assessing the quality of evidence:

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

1. Authenticity: Is the evidence genuine and of unquestionable origin?

2. Credibility: Is the evidence free from error and distortion?

3. Representativeness: Is the evidence typical of its kind, and, if not, is the extent of its

untypicality known?

4. Meaning: Is the evidence clear and comprehensible?

5. Relevance: Is the evidence relevant?

Despite the fact that most documents are stored in paper containing printed matter, handwriting,

typewritten material, or a combination, valuable data or messages maybe left on the mirrors,

walls, locker doors or blackboards.

As a document examiner, you should thoroughly examine the questioned documents to draw

deductions concerning the authenticity or spuriousness of the documents. This examination

involves comparing and identifying signatures, establishing alterations, erasures and

substitutions amongst others problems, which concerns documents and their content. In most

cases, this examination also includes the examination of content of the message to check for

grammar, spelling, and punctuation.

According to Erickson (2014) the rules of evidence necessitate that the production of the original

document unless a satisfactory clarification is given for failing to produce the original, like the

loss of the original document. In cases of loss or destruction of the original Photocopies are often

accepted by the courts despite the fact that they may have undetected alterations, rendering them

unreliable. To solve this problem, the reproduction of photocopies must be accurate and must be

done on the original documents, but it is always best to examine originals. Other problems, like

dating documents and sequence of writing, necessitate the original document to establish

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

conclusions concerning the document. In an event that the originals are not accessible, then the

court may accept first generation photocopy.

First generation photocopy is a photocopy made on the original document. Every time a

photocopy is reproduced, the copy becomes a later-generation photocopy. Later generation

photo- copies are much unreliable therefore courts do not readily accept them

Transporting documents

Basically, evidence is gathered, secured, and sealed before the examiner enters the case. In most

cases, it is the duty of the examiner to go on to preserving the documents while in his or her

custody. Ideally, evidence is collected, safeguarded and preserved before a document examiner

enters the case. It is the responsibility of the document examiner to continue to preserve the

document while in his or her care and to return them intact To the forensic investigator.

Evidence must be protected whenever it is transferred to another party. Original documents must

be safeguarded during transit. Original should never be sent through ordinary mail. Insist that

originals be sent by registered mail if the client uses postal mail. Federal express is preferred by

many for its speed and ability to track the whereabouts of its parcels at all times. Courier service

is an alternative that keeps the documents secure at all times. Instruct the clients that documents

must be signed for and handed to a responsible person in the office.

If documents are picked up from the client, be sure to take proper materials for transporting the

documents safely. Original documents should be protected in an envelopes or folders. Envelopes

should be large enough for the documents to lie flat. Documents should never be folded. Clear

plastic folders can be used if they are the type of plastic that does not stick to the documents.

Mylar folders are the best. Manila envelopes may also be used. Be certain that any information

placed on the envelope is done before the documents are inserted into the envelope. Documents

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

can also be transported in file folders in an attaché case. They should never be placed in a pocket

or pocketbooks. It is against this background that evidence requires a chain of custody to ensure

its physical integrity at all times. Each part that handles the evidence must sign the chain of

custody at the appendix1 at the end of this book. Keeping good chain of custody for all physical

evidence that is moved from one place to another or from one person to the other is required to

assure the court that the item in court is the one that was collected from the crime scene and that

it in the same condition as the time of collection i.e. that has not been contaminated or replaced

or tampered with in any way significant enough to affect its integrity as an exhibit.

Advantages of using documentary evidence

One of the key advantages in conducting documentary research is that you can get access to

information that would be difficult to get in any other way, such as people or cases who might

not be willing to talk in a formal research interview or might be difficult to track down. By using

documents you eliminate the effect that you, as an individual, have on a person or situation when

you conduct research. The effect you have on a situation or subject may be partly due to the

knowledge that you are there as a researcher. People will also be affected by how you conduct

yourself and how they perceive you. Issues of sex, age, race and other characteristics are likely to

have an impact on what people tell you or do when they know they are being researched.

Documents are often particularly useful for tracking change over time; that is, doing longitudinal

research. Longitudinal research may be done either prospectively or retrospectively. Documents

often make possible the collection of data over a longer period of time as well as larger samples

than might be collected from questionnaires or interviews. Some documents may contain

spontaneous data, such as feelings, and refer to actions that are recorded in a specific context, not

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

with a view to answering a particular research question. Confessional documents may give us an

insight into how people see things or how they want to present things. Either way, they provide a

very particular account of reality whatever the confessor's motivation behind their account.

Further advantages of using documents in research include the fact that such research is

relatively low cost, particularly when the documents are easily accessible and already located in

your workplace, or on the internet. Documents vary a great deal in quality, often related to the

perceived importance of recording certain information, but some types of document can be

extremely detailed and yield much more information than you could hope to gain from a

questionnaire or interview. Other advantages of documentary evidence include.

 They are relatively cheap and easy to access.

 Documents can be invaluable for providing important details of events.

 Documents make things visible and are traceable.

 Documents may include various forms of evidence of non-formal, informal, and formal

evidence.

 Can be streamlined through use of templates or e-Portfolio software.

 Information can be electronically shared and stored.

 Minimizes paper-based evidence collection.

 Documents don’t change mind or become emotional during repeated interrogation and

examination.

 Documents do not forget.

 Documents do not require appointments for examinations or interrogations

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

 Documentary evidence is the best evidence since documents never lie. Most of the

documentary evidences are keenly inspected before being accepted as evidence thereby

reduces any chances of them being in-genuine.

 Documents will assist in establishing intent the most important of element in forensic

investigation.

 Documents do not suffer from the effects of fatigue.

 Documents assist in quantifies the amount of loss; by examining the documents, you

get to get the extent to which the act, or other elicit activity being investigated has

progressed

 Documents may reveal conspirators; through following a proper chain of custody,

you are able to know possible conspirators to the act.

 Documentary evidence is readily acceptable as evidence of financial wrong doing or

any other crime for which they are presented as evidence.

Disadvantages of using documentary evidence

Nevertheless, documents are usually not designed with research in mind. The information

recorded may be idiosyncratic or incomplete. Documents get misfiled, left on people's desks for

long periods or simply just do not get fully completed at all. Even standard ways of collecting

data in a police station may change, so there may be information that is available for one period

of time and not another. All of this will create gaps in data as well as coding difficulties. The

motivation to collect certain types of data will vary over time, perhaps related to the decision by

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

a particular team to focus on a specific issue for a period of time or because of government

targets. Other disadvantages of documentary evidence include.

1. Access can be difficult for some types of documents.

2. May be judged on presentation rather than content.

3. May be difficult to confirm authenticity/validity.

4. Requires writing and presentation analysis skills.

5. Requires document examination experts.

6. May get contaminated if not carefully handled.

7. May be misplaced or destroyed if not kept well.

8. The writing on the document may fade irretrievably.

Documentary Evidence

Documentary evidence is a document presented and allowed as evidence in a hearing or trial, but

not oral testimony. Nevertheless, in some cases, the opposing attorney may decline to its being

admitted. From the onset, it must be proved by other evidence from a witness that the paper is

genuine and authentic.

Gathering evidence

In order to gather detailed evidence, the investigator must understand the specific type of fraud

that has been carried out, and how the fraud has been committed. The evidence should be

sufficient to ultimately prove the identity of the fraudster(s), the mechanics of the fraud scheme,

and the amount of financial loss suffered. It is important that the investigating team is skilled in

collecting evidence that can be used in a court case, and in keeping a clear chain of custody until

the evidence is presented in court. If any evidence is inconclusive or there are gaps in the chain

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

of custody, then the evidence may be challenged in court, or even become inadmissible.

Investigators must be alert to documents being falsified, damaged or destroyed by the suspect(s).

Evidence can be gathered using various techniques, such as:

 testing controls to gather evidence which identifies the weaknesses, which allowed the

fraud to be perpetrated;

 using analytical procedures to compare trends over time or to provide comparatives

between different segments of the business;

 applying computer assisted investigation techniques, for example to identify the timing

and location of relevant details being altered in the computer system;

 discussions and interviews with employees and

 Substantive techniques such as reconciliations, cash counts and reviews of

documentation.

The ultimate goal of the forensic investigation team is to obtain a confession by the fraudster, if a

fraud did actually occur. For this reason, the investigators are likely to avoid deliberately

confronting the alleged fraudster(s) until they have gathered sufficient evidence to extract a

confession. The interview with the suspect is a crucial part of evidence gathered during the

investigation. The documentary evidence gathered so far together with witness testimonies can

assist in a great deal during interviews with the suspect(s)

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

Submission of Documentary Evidence

Evidence Packaging

All efforts should be made to maintain and preserve documentary evidence in the same condition

as it was received. The evidence must not be folded, torn, stapled, marked or touched

unnecessarily, stamped, subjected to indent writing impressions, etc. Unless legal aspects or

good judgment dictate otherwise, all articles submitted as evidence should be carefully marked

for identification. These markings should be of a discreet nature so as not to injure the evidence

itself. Good judgment may dictate that the evidence itself not be marked. It should be placed in

an envelope or container that has been identified on the outside with the date, initials, case

number and other pertinent data, prior to the evidence being placed inside and sealed. The

envelope or container containing documentary evidence should not be written on with the

evidence inside of it.

At no time should documentary evidence be beneath a sheet of paper on which you are writing.

The importance of protecting a document from indented writing impressions cannot be over

emphasized. Each item of evidence must be placed in a separate, sealed envelope or container.

When multiple items are submitted as known of the same subject, they may be submitted in the

same container. When unusual circumstances are encountered.

Evidence that is a reproduction copy of an original should not be submitted in a plastic container.

The printed areas may transfer and adhere to the surface of the container. As a general rule,

paper envelopes are preferable for all documentary evidence.

Original evidence is always preferable over reproduction copies. Certain examinations can only

be conducted with original documents. Occasionally the reproduction copy is the questioned

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

document. The inability to obtain original evidence should never stop the submission of

questioned items. The forensic investigation expert will examine the best evidence available.

1. Witness should initial or sign and date each page and

2. If available, samples of non-request writings should be obtained.

Latent Fingerprint Examinations

If the evidence is to be chemically treated to develop latent fingerprints, it should be submitted to

the Forensic lab first. Certain evidence may be destroyed if the document is treated for latent

prints before a document examination is performed. The Forensic lab will do all appropriate

examinations and preserve the document in its original condition. It will then either be returned

to the submitter or forwarded to the Forensic Identification team for examination, as requested

by the submitter. It is always advisable to treat all documents as though they were being

protected for latent prints examination.

Documents Examination

During document examination, the investigator should use an elderly approach to examine the

questioned documents/ materials presented. He/ she must adhere to a uniform procedure for a

systematic and thorough study of suspect documents to see to it that important piece of evidence

is not disregarded.

Photocopies and Photographs must be made of the original documents the quickest possible.

Photographs safeguard the honesty of the documents/ materials by availing an accurate copy of

the items. Although enlargements often reveal evidence, which may not be without

magnification, enlarging photographs should also been done with a lot of caution. A one on one

photocopy should also be made so that the size of the document can be easily established. A

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

200% enlargement is useful for examination. Enlarged document is easy to examine and extract

evidence that is not possible without the enlargement.

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

PROGRESS TEST 3

1. Documentary evidence is a document presented and allowed as evidence in a hearing or


trial, but not oral testimony.
A. Yes

B. No

2. A witness is also known as?

A. A victim.
B. A person that is thought to be guilty of a crime.
C. Expert witness.
D. None of the above

3. Although enlargements often reveal evidence, which may not be without


magnification, enlarging photographs should also been done with a lot of caution

A. True

B. False

4. What is an inappropriate procedure during an interview?


A. Let the person being interviewed do the talking.
B. Conduct the interview privately.
C. Challenge answers given.
D. Create rapport with the subject of the Interview.
5. The investigator should coerce the witness to respond.

A. True

B. False

6. Interview Should precede every interrogation


A. True

B. False

7. An experienced Investigator can leave an interview or interrogation knowingly outwitted by


the witness/ suspect.
A. True

We are the global leaders in forensic investigation skills training


All copy and transmission rights reserved by the IICFIP USA, Incorporation

B. False

8. During document examination, the investigator should use an elderly approach to examine
the questioned documents/ materials presented.

A. True
B. False
9. The investigator should base their understanding of the responses on the hypothesis
given to him.
A. True

B. False

10. The investigator retains the sole right to hide and to conceal the name of some suspects for
security reasons.
A. Yes

B. No

We are the global leaders in forensic investigation skills training

You might also like