Forensics Training Masterclass Module Module 3
Forensics Training Masterclass Module Module 3
MODULE NO. 3
This module covers Preparation of Suspects/ witnesses
rough list and Document Examination- an introduction.
This is step 4 of the forensic investigation process. It is at this stage that a proper investigation
commences. At this stage, the Certified Forensic Investigation Professional (CFIP) comes up
with a list of suspects and witnesses. According to the International Institute of Certified
Forensic Investigation Professionals Inc. (IICFIP Inc), forensic investigators should prepare this
list at the preliminary review stage or rather gather information for the preparation of this list(s)
If these lists are not prepared at the preliminary state, then the information gathered in the
preliminary step will be of great help here. It is the same list that will be used in the interview
steps. What I am saying here is that, it’s the client that will provide the initial list of suspects and
witnesses during your interviews with him or her during the preliminary review step. Therefore,
it has to be updated with as more information as possible. Since it is the client that gives out a
list, the list should give room to accommodate addition of other potential possible suspects or
Nonetheless, all victims may be considered witnesses and must be treated as such. Whereas a
suspect is a person who is most likely to be guilty of an offense. To succeed in any investigation,
the investigator has to get accurate details from witnesses. Forensic Investigators, whether tasked
with a volume crime or major investigation, must recognize the individual needs and concerns of
witnesses and treat them with dignity and respect. This can have a significant impact on how
Rough list is basically the list of possible suspects, and witnesses that can aid in the success of
the investigation.
Examine all available evidence - witness statements, scene examination, exhibits and
Some witnesses may self-present or be self-evident, whereas other witnesses may be more
difficult to identify and/or locate. Investigating officers must, therefore, develop clear
intelligence-led objectives for identifying witnesses. These will depend on the circumstances of
the case but should include identifying settings and communities where witnesses are likely to be
viewing CCTV.
media appeals.
house-to-house enquiries.
suspect interviews.
financial investigation.
social media.
To preserve witness testimony, the witnesses should not be allowed to discuss anything with
suspects and vice versa. It must be noted here that the lists of witnesses/suspects are not fine until
the interviews are concluded. These lists will keep on changing until interviews on chapter 6 and
7 are concluded. Experience has shown that the witnesses lists proposed by the clients. Later on
turn to be suspects and suspects proposed by the client turn out to be witnesses. Why do you
think this happen? Clients being human as they are, they are sometimes biased as opposed to
their investigators.
Experience has also shown that the staff that are most trusted by the client are the most risk staff
and in fact most clients get shocked to learn that trusted staff are the principal suspects for
Take relevant extracts from witness statements/ reports to assist in your written plan. From
experience, it has proved rather challenging work where the investigator starts work with any list
of suspects and witnesses. In this case, the investigator’s mandate is to find out who was
responsible for the perpetration of the wrong doing and also find out the co-perpetrators.
The list arrived at before is not exhaustive and that is why it is called a rough list. It will be
discovered in chapter6 and 7 that as actual interview of witnesses and suspects progress on, some
of the witnesses will close ranks and become suspects and some of the suspects will also become
witnesses. In this rough list usually provide a nice point where to start from and then progress on.
questions and an objective interviewer. Many interviews fail to gather enough information to
address the issues raised in a forensic matter because of inadequate preparation, or because
many are, there is a natural tendency to schedule a set time for the initiation and completion. If
possible, sufficient time should be allowed to conduct the interview with the time of completion
left open. If a set time is established, the person interviewed may be overly focused on the
ending time, thereby inhibiting a flow of information. Interviewers can enhance their credibility
by focusing on information that the interviewee should know, as opposed to guessing during the
interview and thereby wasting the time of the participants by asking questions that the
interviewee could not know. By remaining objective and fair, the interviewers can better gain the
confidence of the interviewee. Ideally, the interview should be conducted as soon as the alleged
impropriety has been discovered and very close to the crime scene.In fraud cases, this will be of
particular importance since the interviewing may wish to pull out a document from a file, for
An effective interviewer should be an active listener, as well as an active observer. Both are
learned skills that can be studied and improved with practice. Active listening means not only
listening more than talking, but really hearing what is being said and how it is being
communicated. Sometimes what is not being said is equally as important as what has been said
by the interviewee.
This discusses the step number 5 of the investigation process. This is the main body of an
investigation that involves analysis of transactional documents. Documentary evidence gathered
in a forensic audit case resembles that of normal audit but differs in details and intensity. A
forensic investigator is not allowed to rely on sampling whereas an auditor uses sampling as one
of his/her important audit technique and in the process skips many crucial and critical evidences.
The mindset of the forensic investigator is that of finding evidence for or against an allegation.
The evidence so collected must be capable of providing proof beyond reasonable doubt.
Documentary evidence collection must follow the best evidence rule which states that if a
document is to be produced as evidence it must be in its original form. If not a certified copy
must be produced with reasons why original is not available. Documents that provide evidence
are forged invoices, receipts, purchase orders, cheques, contracts, agreements, authorization
letters, appointment letters, promotion letters, determination letters, falsified financial statements,
tax records, diaries, emails, suicide notes, bills delivery notes, dispatch notes, transfer notes
random notes and many more.
Approach
Certified Forensic Investigation Professional must plan his documentation evidence gathering
well ensuring that he/she targets the crime scene and carry out 100% testing and evidence
collection. Sampling is not encouraged in forensic investigation/audit. This will ensure a
reasonable expectation of collecting all the documentary evidence available without skipping
any. All documents interrelations must be traced and all relevant documents collected from
within that investigative area or outside so long as the other documents point to it. This will be
discussed further under external confirmations.
Investigative Fieldwork
Once the team is put together, the practitioner usually begins investigative fieldwork to set up the
validity of the claim. This mainly, involves examination of documents, and analytical
procedures, and evidence collection, and subject interviews. It is at this stage that a lot of time
has to be allocated.
Should it be substantiated, the conclusions / findings/ results of the investigation may possibly
conclude in a civil litigation. It is highly suggested that the practitioner conduct each
investigation with the intent of proving "beyond a reasonable doubt" as required by criminal
courts of law. In most cases, civil courts need enough proof by a preponderance of the evidence/
confirmation. Confirmations which satisfy the requirements of criminal court will probably meet
According to the former Internal Revenue Service Agent, Richard Nose, there are seven different
crimes. Recently, NACVA included these techniques into its Forensic Accounting Academy
3. Confidential Sources;
The addition of these steps will assist make sure a complete review of all facts and an effective
Any method of obtaining evidence can be used in a forensic investigation engagement contracts.
This may not be limited assurance engagement in which procedures are likely to be restricted to
enquiry and analytical actions. These engagements include a detailed and wholesale review of all
documentation and electronic evidence accessible. The view given by the expert forensic
accountant must be reasoned, and backed up by evidence/ confirmation. Their view cannot be
objective if only based on what they are told; they must corroborate that statement.
To achieve success in your forensic investigation, the procedures used must not be vague. In fact,
they have to be very specific enough that the engagement team could actually follow your
instructions/ directions. For instance, it may not be sufficient to write 'interview the suspect'. The
investigator must come up with questions that should be asked of the suspect in interview/
interrogation, depending on the circumstances in the situation. For instance, he/ she may ask the
suspect to explain their job role and what access that gives them to systems, inventory, and cash.
This also applies when recommending enquires of or discussions with management. In this case,
it ought to be concise in the answer especially what the engagement team should ask of them,
such as have they informed the law enforcers, has the suspect been suspended, and have they
informed the insurer? On the same note, it may not be sufficient to suggest the use of CAATs. In
that case, one must specify how the CAATs could be applied. For instance, information
matching bank accounts used for paying suppliers with bank accounts for paying workforce,
To design appropriate procedures you must identify the type of forensic investigation
engagement contracts, and the particular type of crime, negligence claim as mentioned on the
introduction. Take for instance in quantifying the theft of goods will be very different from
quantifying a loss from payroll or ‘ghost employee’ fraud or loss of profits following a business
disruption.
documents)” is regularly linked with white collar crimes like fraudulent checks;
nevertheless, in excises, this part of forensic science may be applied in a wide array of
Armed with complicated know-how, examiners can peer into the visible and invisible
The digital age has made the work of forensic document examiners even more important.
With the availability of powerful software programs such as Photoshop, Adobe, amongst
others. In fact, it has ended up being a significantly easier for criminals to create and
Forensic document examiners often deal with questions of document genuineness. In order to
establish whether a document is authentic, the examiner may attempt to confirm who
created the document(s), establish the timeframe in which it was twisted, recognize the
materials used in its preparation or uncover modifications to the original text/ message.
Document(s) may be examined for evidence of obliterations, page substitutions, and alterations.
Or rather the examiner can study the materials, machines, and methods that created the
document(s), availing main information that can identify or narrow the possible sources
of the document. The paper, writing tools, ink, seals, ribbons, and stamps used in
production of the document may all reveal important clues/ leads. Document examiner
examination and comparison of handwriting, that includes signatures and hand, is based on 3
main principles:
2. Every person has a range of natural variation to his or her writing; and
Computer databases maintained by the United States Secret Service, the German Federal Police
and Federal Bureau of Investigation contain handwriting samples from hundreds of thousands of
writers. The Comparisons of these databases have not identified two individuals who have the
Since documents are part of daily life, document examiners work a vast variety of instances.
Document examiners are called to investigate the authenticity of documents in situations such as:
Forgeries Kidnappings
Counterfeiting Extortion
robberies
Table 1: Document examiners are called to investigate the authenticity of documents in situations Above
Forensic document examiners are most frequently asked to resolve questions of authorship. This
questions include, is the signature on the mortgage loan genuine? Can you say who wrote this
anonymous note? Simply by doing this comparison of documents found at a crime scene to a
suspect’s known writing samples, the document examiner is able confirm who wrote the note
and include or exclude suspects from the examination. The document examiner can also be a
CFIP that has majored in such examination and also undertaken special training in documents
examination
A 1956 kidnapping case from Long Island, New York, helps illustrate the key role forensic
document examination can play in an investigation. In this case, a one Month old child was taken
from his home and a ransom note was found in the baby’s carriage, supposedly left by the child’s
babysitter.
Investigators discovered distinguishing characteristics in the way the writer formed 16 letters of
the alphabet, most notably the lowercase “m”, which resembled a sideways “z”. Investigators
searched through nearly two million documents looking for similar writing until a probation
officer found in his files documents written by a 31year old auto mechanic with the same
peculiar “m”. Document examiners were able to conclusively match the ransom note to the
suspect’s handwriting, helping to secure a conviction. It was discovered that it was the mechanic
who murdered the one month old child not the babysitter.
Fraudulent Checks
legal documents. For instance, if someone altered a check to increase its amount, examiners may
be able to determine this by comparing the way the inks from different pens react when subjected
to infrared radiation.
In the example below, a check made out to “Cash” for USD 1,000 has been altered by changing
the “1” to a “9” and adding a recipient’s name. Although the black inks appear the same in
visible light, when subjected to certain frequencies of infrared light, the ink used to prepare the
genuine check reacts differently than the ink used to alter the check, making the alteration
obvious.
Documents in a suspect’s possession may also reveal clues from hidden impression
evidence that could link a suspect to a crime. For instance, did the bank robbery
suspect write the hold-up note on top of another piece of paper that now contains
impression of that?
Examiners can also identify the materials, inks and even the type of office equipment or writing
implements used to produce the document. This is especially useful in fraud cases because these
details can identify the time frame in which a document was created. For instance, if analysis of
the document’s paper reveals a substance that was not used in paper manufacturing during the
time frame in question, the document, piece of art, or historical record would be demonstrated to
be fraudulent.
How is it done?
Questioned material may consist of identification cards, contracts, wills, titles and deeds, seals,
those from photocopiers, fax machines, and printers), currency and electronic documents. In
some circumstances, graffiti and digital signatures may be examined; however, the client should
Documents that don’t contain visible identifiable marks may contain valuable impression
evidence if they were underneath other documents when the writing was performed. Even
equipment in the suspect’s possession may be collected by the investigator. In digital documents,
evidence could even be collected from the metadata of electronic signature files, providing
information such as who the author is and when the document was written.
When conducting examinations, forensic document examiners must have known specimens to
which they compare the material in question. These samples may come from any number of
Requested specimens are writings dictated by the investigator to the writer. These specimens
are created under carefully controlled conditions, with the writer being closely monitored.
Collected writing specimens, however, are writings that were completed by the subject prior to
the investigation. Good sources of writing specimens may include items such as cancelled
checks, letters, diaries, signed receipts, medical records, real estate contracts, tax records or other
Analysis ought to be done by a qualified forensic document inspector, if possible one who is a
member of a well established professional association like the ABFDE or the ASQDE or other
Membership wants for these associations differ; nevertheless, an examiner typically must have
completed a two year, full time training program under the guidance of a qualified forensic
document investigator. In order to maintain membership in good standing and keep their skills
present, inspectors/ examiners are required to complete continuing training and personal
development. If the examiners are members of the IICFIP USA, Inc they must also conform to
Forensic document examiners either work as private examiners within their own laboratory, or
for publicly funded laboratories. If an agency does not have questioned documents analysis
capabilities, investigators may opt to send the evidence to a nearby lab, or retain a private
examiner.
The techniques and tools used in forensic document examinations leverage well? Established
principles of physics and chemistry. A typical Questioned Documents unit in a crime laboratory
is equipped with microscopes, digital imaging instrumentation, infrared and ultraviolet light
sources, video analysis tools and specialized equipment including electrostatic detection devices
Many forensic document examiners use only non Destructive techniques that use light and/or
destructive because they require removal of small samples of ink from the questioned
documents. These types of examinations may be sent off to laboratories that specialize in this
For analyses of documents created by typewriters, fax machines, or printers, examiners may rely
on various databases created for comparison purposes. During handwriting analyses, examiners
compare samples provided from particular populations. Certain agencies, such as the U.S. Secret
Service and the German Federal Police, maintain larger databases. For example, the Forensic
Information System for Handwriting (FISH) maintained by the U.S. Secret Service Forensic
Revealing text from indented impressions ― Documents that may contain indented impressions
not visible to the naked eye can be visualized through the use of an Electrostatic Detection
Device (EDD) such as the Electrostatic Detection Apparatus (ESDA). An EDD uses applied
charges and toner to visualize areas of indented writing, making them visible to the eye. The
ESDA uses the principle that indented areas of the document carry less negative charge than
surrounding areas. This causes the toner used in the EDD to be attracted to these areas, revealing
Using this technique, indented impressions have been recovered from up to seven layers of paper
beneath the original writings. Research has demonstrated that impressions can be successfully
visualized from documents up to 60 years old, provided the papers are not mishandled or stored
improperly.
and erasures not visible to the human eye can often be detected through use of photography and
other imaging devices that utilize ultraviolet and infrared wavelengths of light. Using radiation
(VSC) can reveal writing that has been added with a different ink, or has been altered or
removed by exploiting variations in the way different inks respond to different wavelengths of
light. For example, under certain light sources combined with an infrared filter, a document
containing information written in ink that has faded over time may be enhanced or processed to
Figure 5: Same Note Viewed With Infrared Radiation (Courtesy of Marie Durina)
small cutting from the questioned document is dissolved in a solvent and analyzed. This is one of
the few destructive techniques employed by the document examiner. The inks can be compared
to the International Ink Library, a database maintained by the U.S. Secret Service that contains
data on more than 9,500 inks that have been manufactured since 1920.
with ink jet, laser printers, fax machines and photocopiers may be sourced to a particular make
or model, or even to a specific machine. The printing process used to prepare documents can
also be identified. When possible, the examiner should obtain known standards and any available
accessories from the machine in question and the machine itself should be submitted for
examination.
Seals and stamps ― Questioned documents bearing rubber stamp impressions, embossed seals,
watermarks, or other mechanically printed marks may be submitted for examination. When
possible, it is best to provide the examiner with any suspected devices associated with the
questioned document that may have been involved in its preparation. This includes writing
instrument(s), papers, or other substances, rubber stamp(s), sealing devices (such as notary
To illustrate the value of a manufacturer’s mark, consider a 1989 case when a young girl was
kidnapped and murdered. Investigators called in forensic document examiners to examine the
plastic garbage bag in which the victim was found. Minute markings created by the heat? Sealing
process used in manufacturing such bags enable investigators to determine that the bag was
manufactured on the same machine within seconds of other bags found in the parents’ house.
This was key evidence that resulted in the conviction of the girl’s mother for murder.
Examination of handwriting ― When a sufficient amount of writing from two different people
is closely examined, there are always identifiable differences. Comparisons of writing samples
take into consideration a wide variety of handwriting characteristics including word and letter
spacing, slant or slope, speed, pen position, use of capitalization, embellishments, legibility, use
For example, one person may form the letter “O” in a clockwise motion, while another may form
the same letter in a counter Clockwise motion. A particular writer may form the letter “M” using
an upward? Moving “arch” formation, while another prefers to make a “garland” form of “M”,
forming this letter with a “U” motion to resemble the garland on a Christmas tree. Document
examiners take into account the various combinations of features present within the writing
sample as a whole. In addition, examiners look for features such as hesitations in the natural flow
of writing, possible retouching or unnatural tremors. These may indicate that an unnatural
No one writes with machine like precision every time, and variations are evident in a person’s
handwriting even within the same document. For example, if a person writes an entire page of
signatures, each one will vary slightly. A trained forensic document examiner can discriminate
between natural variations in a writer’s own handwriting and significant differences denoting
different writers.
To conduct handwriting comparisons, the investigator should obtain known writing samples that
compared to known cursive writing. If it contains upper and lowercase letters, the known
writings must also contain upper and lowercase letters. Wherever possible, the investigator
should also obtain known writing containing similar combinations of letters and numbers seen in
the questioned documents. For comparison purposes, it is recommended that investigators obtain
20–30 repetitions of signatures, 15–20 repetitions of bank checks, 3–4 repetitions of entire
written letters. The investigator should also attempt to obtain known writing that is prepared
around the same time period as the questioned writing. This is particularly important in cases
involving writing from young people, as writing formation may still be at a developmental stage,
Documentary techniques
These are basically the techniques applied in categorizing, investigating, interpreting and
identifying the boundaries of physical sources, such as written documents, whether in the private
or public domain.
The following are the generally accepted criteria for assessing the quality of evidence:
3. Representativeness: Is the evidence typical of its kind, and, if not, is the extent of its
untypicality known?
Despite the fact that most documents are stored in paper containing printed matter, handwriting,
typewritten material, or a combination, valuable data or messages maybe left on the mirrors,
As a document examiner, you should thoroughly examine the questioned documents to draw
substitutions amongst others problems, which concerns documents and their content. In most
cases, this examination also includes the examination of content of the message to check for
According to Erickson (2014) the rules of evidence necessitate that the production of the original
document unless a satisfactory clarification is given for failing to produce the original, like the
loss of the original document. In cases of loss or destruction of the original Photocopies are often
accepted by the courts despite the fact that they may have undetected alterations, rendering them
unreliable. To solve this problem, the reproduction of photocopies must be accurate and must be
done on the original documents, but it is always best to examine originals. Other problems, like
dating documents and sequence of writing, necessitate the original document to establish
conclusions concerning the document. In an event that the originals are not accessible, then the
First generation photocopy is a photocopy made on the original document. Every time a
photo- copies are much unreliable therefore courts do not readily accept them
Transporting documents
Basically, evidence is gathered, secured, and sealed before the examiner enters the case. In most
cases, it is the duty of the examiner to go on to preserving the documents while in his or her
custody. Ideally, evidence is collected, safeguarded and preserved before a document examiner
enters the case. It is the responsibility of the document examiner to continue to preserve the
document while in his or her care and to return them intact To the forensic investigator.
Evidence must be protected whenever it is transferred to another party. Original documents must
be safeguarded during transit. Original should never be sent through ordinary mail. Insist that
originals be sent by registered mail if the client uses postal mail. Federal express is preferred by
many for its speed and ability to track the whereabouts of its parcels at all times. Courier service
is an alternative that keeps the documents secure at all times. Instruct the clients that documents
If documents are picked up from the client, be sure to take proper materials for transporting the
should be large enough for the documents to lie flat. Documents should never be folded. Clear
plastic folders can be used if they are the type of plastic that does not stick to the documents.
Mylar folders are the best. Manila envelopes may also be used. Be certain that any information
placed on the envelope is done before the documents are inserted into the envelope. Documents
can also be transported in file folders in an attaché case. They should never be placed in a pocket
or pocketbooks. It is against this background that evidence requires a chain of custody to ensure
its physical integrity at all times. Each part that handles the evidence must sign the chain of
custody at the appendix1 at the end of this book. Keeping good chain of custody for all physical
evidence that is moved from one place to another or from one person to the other is required to
assure the court that the item in court is the one that was collected from the crime scene and that
it in the same condition as the time of collection i.e. that has not been contaminated or replaced
or tampered with in any way significant enough to affect its integrity as an exhibit.
One of the key advantages in conducting documentary research is that you can get access to
information that would be difficult to get in any other way, such as people or cases who might
not be willing to talk in a formal research interview or might be difficult to track down. By using
documents you eliminate the effect that you, as an individual, have on a person or situation when
you conduct research. The effect you have on a situation or subject may be partly due to the
knowledge that you are there as a researcher. People will also be affected by how you conduct
yourself and how they perceive you. Issues of sex, age, race and other characteristics are likely to
have an impact on what people tell you or do when they know they are being researched.
Documents are often particularly useful for tracking change over time; that is, doing longitudinal
often make possible the collection of data over a longer period of time as well as larger samples
than might be collected from questionnaires or interviews. Some documents may contain
spontaneous data, such as feelings, and refer to actions that are recorded in a specific context, not
with a view to answering a particular research question. Confessional documents may give us an
insight into how people see things or how they want to present things. Either way, they provide a
very particular account of reality whatever the confessor's motivation behind their account.
Further advantages of using documents in research include the fact that such research is
relatively low cost, particularly when the documents are easily accessible and already located in
your workplace, or on the internet. Documents vary a great deal in quality, often related to the
perceived importance of recording certain information, but some types of document can be
extremely detailed and yield much more information than you could hope to gain from a
Documents may include various forms of evidence of non-formal, informal, and formal
evidence.
Documents don’t change mind or become emotional during repeated interrogation and
examination.
Documentary evidence is the best evidence since documents never lie. Most of the
documentary evidences are keenly inspected before being accepted as evidence thereby
Documents will assist in establishing intent the most important of element in forensic
investigation.
Documents assist in quantifies the amount of loss; by examining the documents, you
get to get the extent to which the act, or other elicit activity being investigated has
progressed
Nevertheless, documents are usually not designed with research in mind. The information
recorded may be idiosyncratic or incomplete. Documents get misfiled, left on people's desks for
long periods or simply just do not get fully completed at all. Even standard ways of collecting
data in a police station may change, so there may be information that is available for one period
of time and not another. All of this will create gaps in data as well as coding difficulties. The
motivation to collect certain types of data will vary over time, perhaps related to the decision by
a particular team to focus on a specific issue for a period of time or because of government
Documentary Evidence
Documentary evidence is a document presented and allowed as evidence in a hearing or trial, but
not oral testimony. Nevertheless, in some cases, the opposing attorney may decline to its being
admitted. From the onset, it must be proved by other evidence from a witness that the paper is
Gathering evidence
In order to gather detailed evidence, the investigator must understand the specific type of fraud
that has been carried out, and how the fraud has been committed. The evidence should be
sufficient to ultimately prove the identity of the fraudster(s), the mechanics of the fraud scheme,
and the amount of financial loss suffered. It is important that the investigating team is skilled in
collecting evidence that can be used in a court case, and in keeping a clear chain of custody until
the evidence is presented in court. If any evidence is inconclusive or there are gaps in the chain
of custody, then the evidence may be challenged in court, or even become inadmissible.
Investigators must be alert to documents being falsified, damaged or destroyed by the suspect(s).
testing controls to gather evidence which identifies the weaknesses, which allowed the
fraud to be perpetrated;
applying computer assisted investigation techniques, for example to identify the timing
documentation.
The ultimate goal of the forensic investigation team is to obtain a confession by the fraudster, if a
fraud did actually occur. For this reason, the investigators are likely to avoid deliberately
confronting the alleged fraudster(s) until they have gathered sufficient evidence to extract a
confession. The interview with the suspect is a crucial part of evidence gathered during the
investigation. The documentary evidence gathered so far together with witness testimonies can
Evidence Packaging
All efforts should be made to maintain and preserve documentary evidence in the same condition
as it was received. The evidence must not be folded, torn, stapled, marked or touched
unnecessarily, stamped, subjected to indent writing impressions, etc. Unless legal aspects or
good judgment dictate otherwise, all articles submitted as evidence should be carefully marked
for identification. These markings should be of a discreet nature so as not to injure the evidence
itself. Good judgment may dictate that the evidence itself not be marked. It should be placed in
an envelope or container that has been identified on the outside with the date, initials, case
number and other pertinent data, prior to the evidence being placed inside and sealed. The
envelope or container containing documentary evidence should not be written on with the
At no time should documentary evidence be beneath a sheet of paper on which you are writing.
The importance of protecting a document from indented writing impressions cannot be over
emphasized. Each item of evidence must be placed in a separate, sealed envelope or container.
When multiple items are submitted as known of the same subject, they may be submitted in the
Evidence that is a reproduction copy of an original should not be submitted in a plastic container.
The printed areas may transfer and adhere to the surface of the container. As a general rule,
Original evidence is always preferable over reproduction copies. Certain examinations can only
be conducted with original documents. Occasionally the reproduction copy is the questioned
document. The inability to obtain original evidence should never stop the submission of
questioned items. The forensic investigation expert will examine the best evidence available.
the Forensic lab first. Certain evidence may be destroyed if the document is treated for latent
prints before a document examination is performed. The Forensic lab will do all appropriate
examinations and preserve the document in its original condition. It will then either be returned
to the submitter or forwarded to the Forensic Identification team for examination, as requested
by the submitter. It is always advisable to treat all documents as though they were being
Documents Examination
During document examination, the investigator should use an elderly approach to examine the
questioned documents/ materials presented. He/ she must adhere to a uniform procedure for a
systematic and thorough study of suspect documents to see to it that important piece of evidence
is not disregarded.
Photocopies and Photographs must be made of the original documents the quickest possible.
Photographs safeguard the honesty of the documents/ materials by availing an accurate copy of
the items. Although enlargements often reveal evidence, which may not be without
magnification, enlarging photographs should also been done with a lot of caution. A one on one
photocopy should also be made so that the size of the document can be easily established. A
200% enlargement is useful for examination. Enlarged document is easy to examine and extract
PROGRESS TEST 3
B. No
A. A victim.
B. A person that is thought to be guilty of a crime.
C. Expert witness.
D. None of the above
A. True
B. False
A. True
B. False
B. False
B. False
8. During document examination, the investigator should use an elderly approach to examine
the questioned documents/ materials presented.
A. True
B. False
9. The investigator should base their understanding of the responses on the hypothesis
given to him.
A. True
B. False
10. The investigator retains the sole right to hide and to conceal the name of some suspects for
security reasons.
A. Yes
B. No