Entry
Reader's guide
Entries A-Z
Subject index
Questioned Documents/Ink Dating
The field of questioned documents examination covers several issues. The best known is the examination of handwriting, handprinting, and signatures for authorship. Other activities are impression analysis, infrared testing, microscopy, typewriter analysis, photocopy analysis, and the restoration of burned or faded documents. The newest focus, the dating of inks and documents through chemical examinations, began in the late 1960s and continues to expand. These examinations can assist in photocopy dating, printed documents dating, and even facsimile dating. This entry explains the techniques of document examination and provides examples of how they are used in litigation and investigations.
Examination of Signatures
The examination of signatures can answer several questions. The first is whether a questioned signature was signed by its purported author. This question is commonly asked when a will, a mortgage, or a contract is disputed. In order to conduct a proper examination of a signature, the document examiner first needs the original document that contains the questioned signature. If the original is not available, a qualified opinion can often be given after examination of a photocopy, photograph, microfiche, or facsimile copy. The problem with not having the original is that several methods of forgery may not be detectable by examining something other than the original. The second item needed to determine authorship is known signatures from the purported author. Usually eight to twelve signatures are needed as a guideline; however, valid examinations can be done using less than eight, or they may require more than twelve. The closer in time the dates of the known signatures are to the date of the questioned signature, the more meaningful the examination will be.
Types of Forgery
There are four main types of forgery. The first is blind forgery, in which the forger has no idea what the signature to be forged looks like. This is the easiest type of forgery to detect because it is usually not close to the appearance of a genuine signature. This type of forgery will sometimes allow an examiner to identify who made the forgery based on the handwriting habits that are present in the forged signature. In order to perform this type of examination, an examiner needs known cursive writing samples of the suspected forger in order to compare the handwriting habits in the questioned signature to the habits in the known cursive writing.
The second (and probably most common) type of forgery is simulation, in which the forger has a sample of the signature to be forged. The quality of a simulation depends on how much the forger practices before attempting the actual forgery, the ability of the forger, and the forger's attention to detail in simulating the signature. This type of forgery is usually easily detectable by a trained document examiner when examining the original document or even a copy. Because the forger is trying to simulate the handwriting habits of someone else, the forger's own handwriting habits are masked. Therefore, it is often difficult to identify who forged a simulation.
The third type of forgery is a tracing. A tracing can be done by holding the model document and the questioned document up to light and using a pen to trace the lines of the model signature onto the questioned document. A tracing can also be done by using a blunt stylus on the questioned document to create an impression of the model signature in the paper. This impression is then filled in with a pen to create the appearance of the model signature. If the model signature used by the forger is not found, this type of forgery is sometimes difficult to detect from a photocopy.
...
- Crimes and Related Behaviors
- Antisocial Behavior
- Armed Robbery
- Arson
- Art Theft and Fraud
- Assassination
- Assault
- Banditry
- Barroom Violence
- Blackmail
- Bribery
- Bullying
- Burglary
- Campus Crime
- Capital Crimes
- Career Criminals
- Carjacking
- Child Homicide
- Child Maltreatment
- Child Neglect
- Child Physical Abuse
- Child Sexual Abuse
- Civil Disobedience
- Civil Order Crime
- Collective Violence
- Consumer Fraud
- Corporate Crime
- Crime Classification Systems
- Crime Reports and Statistics
- Crimes Against Persons With Disabilities
- Criminal History
- Cybercrime
- Delinquency
- Digital Crime
- Driving Under the Influence
- Drug Millionaires
- Drug Trafficking
- Elder Abuse
- Environmental Crime
- Euthanasia
- Family Violence
- Fencing
- Feuding
- Forgery
- Fraud
- Gambling
- Gangs
- Genocide
- Graffiti
- Hate Crimes
- Homicide and Murder
- Identity Theft
- Illicit Antiquities
- Infanticide
- Juvenile Crime and War
- Kidnapping
- Mass Murder
- Militias
- Missing Children
- Modus Operandi
- Money Laundering
- Obscenity and Pornography
- Organized Crime—Global
- Organized Crime—United States
- Piracy, Intellectual Property
- Piracy, Sea
- Political Corruption
- Prostitution
- Race and Violence
- Rape
- Rape, Date and Marital
- Recidivism
- Religious Deviance
- Riots
- Road Rage
- Robbery
- Same-Sex Abuse
- School Violence
- Scientific Misconduct
- Securities Fraud
- Sexual Violence
- Shoplifting
- Sibling Violence
- Smuggling
- Spectator Violence
- Sport Violence
- Spree Murder
- Stalking
- Stranger Violence
- Student Threats
- Suicide
- Terrorism
- Vagrancy
- War Crimes
- Witchcraft
- Women as Offenders
- Women Who Kill
- Workplace Violence
- Law and Justice
- Adversarial Justice
- Alternative Dispute Resolution
- Appeal/Appellate
- Arraignment
- Arrestee Drug Abuse Monitoring (ADAM) Program
- Assembly-Line Justice
- Bail and Bond
- Cameras in the Courtroom
- Charge Attrition
- Child Witness
- Civil Law Legal Traditions
- Clemency
- Common Law Legal Traditions
- Community Justice Programs
- Community Prosecution
- Comparative Law and Justice
- Competency to Stand Trial
- Court Structure, Federal
- Court Structure, State
- Court Unification
- Criminal Defenses
- Criminal Insanity
- Criminal Justice
- Criminal Law
- Criminal Trial
- Customary Law
- Death Sentence Outcomes
- Defense Counsel Systems
- Determinate Sentences
- Differentiated Case Management
- Discretionary Justice
- Diversion Programs
- Domestic Violence Courts
- Drug Courts
- Drug Legalization
- Drug Treatment
- Due Process
- Entrapment
- Exclusionary Rule
- Expert Witness
- Eyewitness Testimony
- Family Court
- Family Strengthening Programs
- Fines
- Get-Tough Initiatives
- Grand Jury
- Gun Control
- Habitual Felony Laws
- Harm Reduction
- Human Rights
- Indeterminate Sentences
- Inquisitorial Justice
- Intensive Probation Supervision
- International Criminal Court
- Judicial Selection Process
- Jury Nullification
- Jury System
- Justice
- Juvenile Court
- Juvenile Justice
- Juvenile Offenders in Adult Courts
- Mandatory Sentencing
- Mercy
- Military Justice
- Miranda Rights
- Online Victimization of Youth
- Pardon
- Plea Bargaining
- Probation
- Procedural Justice
- Prosecutorial Discretion
- Public Defender
- Race and Sentencing
- Rehabilitation Model
- Reintegration Model
- Release on Own Recognizance
- Restorative Justice
- Retributive Justice
- Revenge, Retribution, and Rehabilitation
- Scared Straight Programs
- Selective Incapacitation
- Sentencing
- Sentencing Guidelines
- Speedy Trial Legislation
- Split Sentence
- United States Supreme Court
- Whistle-Blowing
- Wickersham Commission
- Wrongful Convictions
- Zero Tolerance Policing
- Policing
- Alcohol, Tobacco and Firearms, Bureau of
- Arrest Clearance
- Arrest Practices
- Broken Windows Theory
- Citizen Review
- Community Policing
- Comparative Policing
- Confession
- Counterterrorism
- Criminal Investigation
- Deadly Force
- Detective Work
- Federal Bureau of Investigation
- Foot Patrol
- Geographic Information Systems
- Geographic Profiling
- Homicide Investigation
- Hot Spot Policing
- House Arrest
- Informants
- Interrogation
- KGB
- Mandatory Arrest
- Neighborhood Watch Programs
- Net Widening
- Police Attitudes and Behavior
- Police Corruption
- Police Information Systems
- Police Organizations
- Police Privatization
- Police Pursuits
- Police Strategies and Operations
- Police Technology
- Police Training and Selection
- Police, Killing of
- Private Security
- Problem-Oriented Policing
- Race and Policing
- Racial Profiling
- Recreational Law Enforcement
- Royal Canadian Mounted Police
- Rural Law Enforcement
- Scotland Yard
- Surveillance Abuse
- Women and Policing
- Zero Tolerance Policing
- Forensics
- Anthropology, Forensic
- Cognitive Interview
- Crime Analysis
- Crime Laboratory
- Crime Scene Assessment
- Criminal Profiling
- Criminalistics
- Detection of Deception
- DNA Testing
- Firearms Identification
- Forensic Behavioral Sciences
- Forensic Interrogation
- Forensic Polygraph
- Forensic Science
- Hypnosis
- Medical Examiner
- Odontology
- Psychiatry, Forensic
- Psychology, Forensic
- Questioned Documents/Ink Dating
- Scientific Evidence
- Toxicology
- Voice Identification
- Voice Stress Analysis
- Corrections
- Abolitionism
- Alcatraz
- Attica
- Auburn State Prison
- Boot Camps
- Corrections
- Corrections Officers
- Day Release
- Death Row
- Death Row Inmates
- Devil's Island
- Early Release Programs
- Eastern State Penitentiary
- Electronic Monitoring
- Elmira Reformatory
- Furlough Programs
- Halfway House
- International Imprisonments
- Joliet Correctional Center
- Leavenworth Federal Penitentiary
- New Generation Jails
- Parole
- Penal Colonies
- Preventive Detention
- Prison Overcrowding
- Prison Reform
- Prison Riots
- Prison Systems
- Prison Violence
- Prisoner Literature
- Prisoner Rights
- Prisoners, Elderly
- Race and Corrections
- Religion in Prison
- San Quentin
- Sex Offender Treatment
- Shelters
- Shock Incarceration
- Sing Sing
- Supermax Prisons
- Tucker State Farm
- Women in Prison
- Work Release
- Victimology
- Juvenile Victimization and Offending
- National Crime Victimization Survey
- Online Victimization of Youth
- Repeat Victimization
- Victim Advocates
- Victim Needs and Services
- Victim Rights and Restitution
- Victim Theories
- Victim-Offender Mediation
- Victim/Witness Protection
- Victimization
- Victims' Bill of Rights
- Women as Victims
- Punishment
- Sociocultural Context and Popular Culture
- Alcohol
- Buddhism
- Christianity
- Cinema
- Comic Books
- Commercial Sex Industry
- Conduct Norms and Crime
- Costs of Crime
- Crime and Everyday Life
- Daoism
- Demography
- Discrimination in the Criminal Justice Workplace
- Drugs
- Environmental Design
- Ethics
- Ethnicity and Race
- Fear of Crime
- Financial Costs and Benefits of Crime Prevention
- Gated Communities
- Gender
- Gun Control
- Hinduism
- HIV/AIDS in Criminal Justice
- Islam
- Judaism
- Literature, Fiction
- Literature, True Crime
- Masculinity, Anger, and Violence
- Media
- Moral Panic
- Policing Democracy
- Political Corruption
- Prisoner Literature
- Public Housing
- Public Opinion
- Risk
- Security Management
- Sensation Seeking
- Shame and Guilt
- Shinto
- Social Class
- Television
- Video and Computer Games
- Vigilantism
- International
- Alternative Punishments in Sub-Saharan Africa
- Australia
- Buddhism
- Canada
- Caribbean
- China
- Christianity
- Comparative Law and Justice
- Comparative Policing
- Counterterrorism
- Daoism
- Europe, Central Eastern
- France
- Genocide
- Germany
- Great Britain
- Hinduism
- Human Rights
- India
- Indonesia
- International Criminal Court
- International Imprisonments
- Islam
- Italian Mafia
- Italy
- Japan
- Judaism
- Latin America, Crime and Violence in
- Mexico
- Organized Crime—Global
- Penal Colonies
- Piracy, Intellectual Property
- Piracy, Sea
- Policing Democracy
- Political Corruption
- Poverty
- Russia
- Shinto
- Singapore
- Smuggling
- South Pacific Islands
- Sub-Saharan Africa
- Terrorism
- War Crimes
- Witchcraft
- Women and Crime in a Global Perspective
- Concepts and Theories
- Attachment Theory
- Biocriminology
- Broken Windows Theory
- Cartographic School of Criminology
- Control Theories
- Crime as Pathology
- Crime Control Model
- Critical Criminology
- Culture Conflict and Crime
- Deterrence Theory
- Deviance
- Economic Theories of Crime
- Education and Employment
- Evolutionary Perspectives on Crime
- Experimental Criminology
- Feminist Theory
- Integrative Theories
- Life-Course Theories
- Nonintervention Model
- Peacemaking Criminology
- Radical Criminology
- Social Control Theory
- Social Learning Theories
- Sociological Theories
- Strain Theory
- Trait Theories
- Research Methods and Information
- Sourcebook of Criminal Justice Statistics
- Arrestee Drug Abuse Monitoring (ADAM) Program
- Crime Classification Systems
- Crime Reports and Statistics
- Criminal Justice
- Criminology
- Ethnography of Crime and Punishment
- Information Systems
- National Crime Victimization Survey
- Self-Report Surveys
- Social Psychology
- Statistical Methods and Models
- Uniform Crime Reports
- Organizations and Institutions
- Alcatraz
- Alcohol, Tobacco, and Firearms
- Appendix 3: Professional and Scholarly Associations
- Attica
- Auburn State Prison
- Devil's Island
- Eastern State Penitentiary
- Elmira Reformatory
- Federal Bureau of Investigation
- International Criminal Court
- Italian Mafia
- Joliet Correctional Center
- KGB
- Leavenworth Federal Penitentiary
- Royal Canadian Mounted Police
- San Quentin
- Sing Sing
- Tucker State Farm
- United States Supreme Court
- Special Populations
- American Indians and Alaska Natives
- Animals in Criminal Justice
- Child Homicide
- Child Maltreatment
- Child Neglect
- Child Physical Abuse
- Child Sexual Abuse
- Child Witness
- Ethnicity and Race
- Homeless Men and Crime
- Homeless Women and Crime
- Infanticide
- Juvenile Court
- Juvenile Crime and War
- Juvenile Justice
- Juvenile Offenders in Adult Courts
- Juvenile Victimization and Offending
- Mentally Ill Offenders
- Military Justice
- Militias
- Missing Children
- Online Victimization of Youth
- Prisoners, Elderly
- School Violence
- Street Youth
- Student Threats
- Women and Crime in a Global Perspective
- Women and Policing
- Women as Offenders
- Women as Victims
- Women in Prison
- Women Who Kill
- Youth, At-Risk
- Youthful Offender
- Loading...
Get a 30 day FREE TRIAL
-
Watch videos from a variety of sources bringing classroom topics to life
-
Read modern, diverse business cases
-
Explore hundreds of books and reference titles
Sage Recommends
We found other relevant content for you on other Sage platforms.
Have you created a personal profile? Login or create a profile so that you can save clips, playlists and searches