A study on the Rarest case of Disguised Signatures in the form of Lateral expansion

Similar documents
Solicitors & Investigators Guide For Questioned Document Examination Page 1 of 5

Handwriting Analysis, Forgery, and Counterfeiting. Forensic Science Chapter 10

4/8/2016. c. Major factors influencing handwriting: i. Size of fingers, hands, arms ii. Muscular makeup iii. Education iv. Style and personality

Can the Forger be Identified from His Handwriting

Unidentifiable Handwriting: An Anonymous Note Case. From My Forensic Case File

Forensic Document Examination

Chapter 17: Questioned Documents Voice Analysis (Forensic Linguistics)

Journal of Criminal Law and Criminology

Ronald N. Morris & Associates, Inc. Ronald N. Morris Certified Forensic Document Examiner

The Expert Examination of Signatures

MODULE No. 14: Age of Documents

B.A. / B.Sc. (Honours) 6th Semester (Theory)

Detecting Forged & Altered Documents

Forensic Document Examination

Citations and Self Citations of Indian Authors in Library and Information Science: A Study Based on Indian Citation Index

ART I: UNIT NINE CALLIGRAPHY

Visual Control of Standard Operating Procedure (SOP), Inspection, Packaging and Storage.

CHAPTER 8 CONCLUSION AND FUTURE SCOPE

Charles University in Prague

Ronald N. Morris & Associates, Inc. Ronald N. Morris Certified Forensic Document Examiner

2007 Issue No. 15 Walter Benjamin and the Virtual Politicizing Art : Benjamin s Redemptive Critique of Technology in the Age of Fascism

Process Control and Instrumentation Prof. D. Sarkar Department of Chemical Engineering Indian Institute of Technology, Kharagpur

Journal of Food Health and Bioenvironmental Science. Book Review

Desidoc Journal of Library and Information Technology during : A Bibliometric Analysis

AN OVERVIEW ON CITATION ANALYSIS TOOLS. Shivanand F. Mulimani Research Scholar, Visvesvaraya Technological University, Belagavi, Karnataka, India.

CITY POLICY SUPERSEDES: NEW CORPORATE BILLINGS AND CHEQUES - FORMS

Worldwide Forensic Services Inc.

Passive Image Forensic Method to Detect Resampling Forgery in Digital Images

CRITIQUE OF PARSONS AND MERTON

INTERNATIONAL GARMENT FAIR ASSOCIATION

IDENTIFICATION OF FINGER PRINTS & LAW

THE JOURNAL OF POULTRY SCIENCE: AN ANALYSIS OF CITATION PATTERN

INSTRUCTIONS TO THE AUTHORS FOR PUBLICATION IN BJ KINES-NATIONAL JOURNAL OF BASIC & APPLIED SCIENCE

NCRA Standards for Video Depositions

Application Form for Admission (Before mailing the application form, it is mandatory to register online)

Characterization and improvement of unpatterned wafer defect review on SEMs

GUIDELINES FOR THE CONTRIBUTORS

1. Structure of the paper: 2. Title

What s the title? some challenges when cataloguing artists books. Maria White, Cataloguer, London Metropolitan University

Forensic Video Analysis Technical Procedure Manual Page 1

Author's guidelines. General policy

STANDARDS AND INFORMATION DOCUMENTS

THE HEROIC AGE OF EXPLORATION. Sample file

I, Kent Gibson, state the following, of which I have personal. knowledge: I am the founder of Forensic Audio (ForensicAudio.

2 Types of films recommended for international exchange of television programmes

NATIONAL FILM ARCHIVE OF INDIA MINISTRY OF INFORMATION AND BROADCASTING GOVT OF INDIA LAW COLLEGE ROAD, PUNE NOTICE INVITING TENDER

International Journal of Recirculating Aquaculture

How to write a scientific paper for an international journal

980 Protocol Analyzer General Presentation. Quantum Data Inc Big Timber Road Elgin, IL USA Phone: (847)

British Theatre Archives: Scattered but Accessible

Journal of Material Science and Mechanical Engineering (JMSME)

Study on Indication pattern in Time of Flight Diffraction technique

MASTER S DISSERTATION PRESENTATION GUIDELINES 2016/17

Articles. Reliability and Authenticity: The Concepts and Their Implications

NPAA & Scientica Research Pharmakon invites abstracts for Nationwide Young Talent Hunt Competition

CBA LFL 9/22/2015 1

A COLLECTION of COPYBOOK STYLES. Diane Simpson

Working BO1 BUSINESS ONTOLOGY: OVERVIEW BUSINESS ONTOLOGY - SOME CORE CONCEPTS. B usiness Object R eference Ontology. Program. s i m p l i f y i n g

Sir Sean Connery. Availability. His Autograph

The comments/suggestions for further improvement of the Bulletin are also welcome which may be send to:

Instructions to Authors is an international peer reviewed bi-monthly online Journal, which publishes full-length original papers and

SHIVAJI UNIVERSITY, KOLHAPUR

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

SOLUTION. Forensic Video Analysis

BROADCAST. The following concepts help ensure the way we distribute revenue to members is equitable.

RECOMMENDATION ITU-R BR.716-2* (Question ITU-R 113/11)

Library and Information Science (079) Marking Scheme ( )

Protective Marking Not Protectively Marked Publication Scheme Y/N N. Version 5 Student Lesson Note

GUIDELINES FOR THE PREPARATION AND SUBMISSION OF YOUR THESIS OR DISSERTATION

Administrative Support Guide (Instructions for the Conduct of the Controlled Assessment and Examination)

Owen Barfield. Romanticism Comes of Age and Speaker s Meaning. The Barfield Press, 2007.

Tender Notification for the procurement of a Scanning Electron Microscope" at IISc (Last Date for submission of tenders: 3 rd October 2018)

A Bibliography of Bagpipe Music

A Modified Compression Algorithm for Nucleotide Data Based on Differential Direct Coding and Variable Length

Precise Digital Integration of Fast Analogue Signals using a 12-bit Oscilloscope

Sprint Corporation - Strategy, SWOT and Corporate Finance Report

Graphics Standards Manual

DISCIPLINARY COMMITTEE OF THE ASSOCIATION OF CHARTERED CERTIFIED ACCOUNTANTS

Tri Nugroho Adi,M.Si. Program Studi Ilmu Komunikasi sinaukomunikasi.wordpress.com. Copyright 2007 by Patricia Aufderheide

CYRIL JACKSON PRIMARY SCHOOL CCTV POLICY

Corporate Identification Guidelines

Hans-Georg Gadamer, Truth and Method, 2d ed. transl. by Joel Weinsheimer and Donald G. Marshall (London : Sheed & Ward, 1989), pp [1960].

What most often occurs is an interplay of these modes. This does not necessarily represent a chronological pattern.

Looking at Movies. From the text by Richard Barsam. In this presentation: Beginning to think about what Looking at Movies in a new way means.

NEW APPROACHES IN TRAFFIC SURVEILLANCE USING VIDEO DETECTION

Efforts at Disguise in Typewritten Documents

PA Substitution Cipher

G.G.S.INDRAPRASHTHA UNIVERSITY Registration of Vendor(s) for Supply of Books

Auto classification and simulation of mask defects using SEM and CAD images

Guide To Calligraphy

A Layered Approach for Watermarking In Images Based On Huffman Coding

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

The role of the Alexander technique in musical training and performing

AES recommended practice for forensic purposes Managing recorded audio materials intended for examination

Indian Journal of Science International Journal for Science ISSN EISSN Discovery Publication. All Rights Reserved

GUIDELINES FOR PREPARATION OF THESIS AND SYNOPSIS

The Muffin Man. Sheet music in all twelve keys for piano

TARGA RESOURCES, INC.

Reducing False Positives in Video Shot Detection

Chapt er 3 Data Representation

Transcription:

Research Journal of Recent Sciences E-ISSN 2277-2502 A study on the Rarest case of Disguised Signatures in the form of Lateral expansion Abstract Misra V.C., Agrawal N. and Shukla S.K.* Amity Institute of Forensic Sciences, Amity University, Noida, India drskshukla@gmail.com Available online at: www.isca.in, www.isca.me Received 24 th February 2015, revised 4 th June 2015, accepted 11 th August 2015 Questioned documents have always been a challenge in forensic investigations. The disguising of signatures is the most common practice in white collar crime. In case of disguise, people deliberately change their usual pattern of writing including signatures with the intent to deny the authenticity of the same in future for some obvious benefits. There may be numerous methods to disguise the original handwriting and signatures depending upon the capability of the writer and intention behind disguising. In the present case study, the subject has disguised his own signatures by putting the alphabets in lateral expansion instead of usually used overlapped alphabets. A critical study was done to decipher the rare methodology of disguising using technique of lateral expansion. Keywords: Disguised writing, Signatures, Forensic. Introduction It is well known fact that documents are not always what they are represented to be. The crime of alteration of documents, manipulations in the scripts and forgeries are quite in trend since antiquity. Whenever there is a transaction of vast properties or of large sums of money where the signature on a will or agreement is questioned, the importance of establishing authenticity of the document becomes utmost important. Forgery by disguising is a very common practice 1. A deliberate departure from normal handwriting habits is generally referred to as disguise. Guise means external appearance 2. Disguise means modification of the external appearance so as to conceal the real original identity of the entity. In document examination, alteration of the handwriting appearance and other characteristics of writing is called disguise. The modifications known as disguise are intended to conceal the identity of the writer. The end concealed writing is called disguise writing and the one who disguises his handwriting is called disguiser 3. The main purpose of the disguiser to disguise his handwriting is to conceal his linkage with the disguised text/signature as its author when he is questioned. Documents bearing disguised handwriting or signatures have increased tremendously in recent years. Therefore the methods used by the disguisers are also escalating significantly. Methodology The document bearing the questioned signature (denied by the subject) was provided by the investigative agency for expert opinion. The standard signatures were obtained by the subject s personal identities such as his passport, and other authentic documents. Both scanned and photocopied documents were collected from the suspect. The tools for comparison included hand lens magnifier, a digital camera, scale, head fitted microscope, and a transmitted illuminating device. Case history: The subject came to India to play for football club on a contract basis and took the payment for playing vide two payment receipts in the months and year August and October 2007 respectively. After few months he again demanded the contractual amount, denying the fact that he had already taken the payments. He also denied his two signatures on the money receipts dated August and October 2007 given to the club. Observations: Experience has shown that certain features of handwriting are rarely changed; however they can be altered by the disguiser by using rarest techniques. The general appearance of handwriting may give a useful pointer to its probable author, no matter how carefully it has been disguised. The questioned sample Q1 and Q2 were examined for the presence of line quality defects and comparison of class and individual characteristics against standard samples S1 to S4 using instruments such as a magnifier, scale, transmitted light, etc. The signatures on the payment receipts were marked as Q-1 and Q-2. The signatures of the player on his passport and specimen sheet, marked as S-1 to S-4 were considered as the 'standard' signatures of player and these standard signatures were compared with the questioned signatures put by him on the two money receipts. International Science Community Association 51

Figure-1 Questioned sample (Q1) Figure-2 Questioned sample (Q2) International Science Community Association 52

Figure-3 Specimen sample (S1) Figure-4 Specimen sample (S2) International Science Community Association 53

Figure-5 Specimen sample (S3) Figure-6 Specimen sample (S4) International Science Community Association 54

Results and Discussion On first visual examination, the two questioned signatures, Q-1 and Q-2 on the receipts were not found matching with the four standard signatures S-1 to S-4, however, the further observations and careful examination revealed that questioned signatures Q-1 and Q-2 were not having any suspicious evidence of forgery or copying act as line quality, speed, skill and movement etc were found similar with the standard signatures. In the absence of line quality defects, the evidence of forgery was ruled out. Seeing the strong similarities of individual characteristics of letters in Q-1, Q-2, S-1, S-2, S-3 and S-4 it was found that the two questioned signatures were in fact disguised signatures, originally written by the same person with attempts of lateral expansion of alphabets separately. In fact, the writer was in the habit of putting all the alphabets of his signatures in overlapped manner in intermingled fashion and unconventional manner. Much handwriting are characterized by abnormal spacing of the words; in some the words are separated by less than a width of a letter, whilst in other the spacing may be as much as the width of four or five letters. Close spacing is so common that its occurrence is of a little evidential value, but extremely wide spacing is comparatively rare. In the majority of disguise handwriting the word spacing is almost certain to be that of the normal script, a fact which may prove of some evidential value. For study of lateral expansion of the signature by the disguiser, various class and individual characteristics were studied, which are as under. The class characteristics like line quality, speed, skill, movement, slant, alignments, spacing, size and proportion of letters and variations were studied. The line quality was smooth, the speed and skill was superior, the slant was backhand, and the alignment was ascending in two sets. The spacing between the letters of questioned signatures was wider because of attempted disguise. The size and proportions of letters cannot be compared because the standard signatures show over lapping of letters but questioned signatures do not show overlapping of letters but show 'deliberate' separate formations of letters because of deliberate disguise. Further, the individual characteristics were studied for a detailed scrutiny of the signatures. It was noted that the questioned signatures were deliberately expanded signatures in respect of letters/ alphabets. This is a rare example of disguising effort when a person has not changed the shape, slant and size of letters but the person has changed the usual overlapped letters formations into separate letters formations. Such type of disguising efforts pose great difficulty as similar form and formations of each alphabet cannot be demonstrated in the form of juxtaposed chart, by keeping each alphabet of Q-series and S- series in a side by side manner. Here it was deciphered that all the alphabets of standard signatures were in an overlapped and complicated bunch of strokes. The form and formations of E, Z, 'h' and last 'a' were found similar in respect of movement impulses and individual characteristics in Q and S-series. In the absence of line quality defects in Q-1 and Q-2 and at the same time, considering the symptoms of disguise in Q-1 and Q- 2, it was concluded that Q-1 and Q-2 are deliberately disguised signatures. Otherwise also, this is not at all a case of forgery because forger always follows a genuine model and no forger would copy differently from model. It is the original disguiser who deviates from his usual pattern to defy detection. In the absence of line quality defects in Q-1 and Q-2, it is doubly proved that Q-1 and Q-2 are genuine but disguised signatures. Since, there are disguising efforts in questioned signatures; there are variations due to disguise in two sets. Conclusion In the interesting and rare case study discussed here, it was observed that the person tried his level best to disguise his usual pattern of signature in an expanded manner, yet he was not able to change his 'individual characteristics' in some of the alphabets/letters. This finding has proved that even in rare and very uncommon method of disguise i.e. Lateral expansion of overlapped signature, the identification is possible. There could be innumerable methods of disguising efforts in time to come but it is a fact that, no person can be 100% successful in totally hiding his brain reflexes, stamping his individuality. It is because of the fact that certain individual characteristics are so deeply engraved into the sub- conscious mind that it becomes very difficult for the original writer to leave all such characteristics in the act of deliberate deviation/disguise. References 1. Wilson R (1997). Harrison, Suspected Documents: Their scientific examination, second Indian reprint, Universal law publishing Co. Pvt. Ltd. 2. Dr. B.R. Sharma (2012). Law relating to handwriting forensics, Edition, Universal law publishing Co. Pvt. Ltd. 3. Katherine M. Koppenhaver (2007). Forensic Document Examination- Principles and Practice, Humana press. 4. Jane A. Lewis (2014). Forensic Document Examination- Fundamentals and Current Trends, Academic Press. 5. Ordway Hilton (1993). Scientific Examination of Questioned Documents, Revised Edition, CRC Press. International Science Community Association 55