Forensics Training Masterclass Module - 3
Forensics Training Masterclass Module - 3
MODULE NO. 3
This module covers Preparation of Suspects/ witnesses
rough list and Document Examination- an introduction.
This is step 4 of the forensic investigation process. It is at this stage that a proper investigation
commences. At this stage, the Certified Forensic Investigation Professional (CFIP) comes up
with a list of suspects and witnesses. According to the International Institute of Certified
Forensic Investigation Professionals Inc. (IICFIP Inc), forensic investigators should prepare this
list at the preliminary review stage or rather gather information for the preparation of this list(s)
If these lists are not prepared at the preliminary state, then the information gathered in the
preliminary step will be of great help here. It is the same list that will be used in the interview
steps. What I am saying here is that, its the client that will provide the initial list of suspects and
witnesses during your interviews with him or her during the preliminary review step. Therefore,
it has to be updated with as more information as possible. Since it is the client that gives out a
list, the list should give room to accommodate addition of other potential possible suspects or
Nonetheless, all victims may be considered witnesses and must be treated as such. Whereas a
suspect is a person who is most likely to be guilty of an offense. To succeed in any investigation,
the investigator has to get accurate details from witnesses. Forensic Investigators, whether tasked
1
All copy and transmission rights reserved by the IICFIP USA, Incorporation
with a volume crime or major investigation, must recognize the individual needs and concerns of
witnesses and treat them with dignity and respect. This can have a significant impact on how
A Rough List is basically the list of possible suspects, and witnesses that can aid in the success
of the investigation.
Examine all available evidence - witness statements, scene examination, exhibits and
Some witnesses may self-present or be self-evident, whereas other witnesses may be more
difficult to identify and/or locate. Investigating officers must therefore develop clear intelligence-
led objectives for identifying witnesses. These will depend on the circumstances of the case but
should include identifying settings and communities where witnesses are likely to be found.
media appeals.
house-to-house enquiries.
suspect interviews.
2
All copy and transmission rights reserved by the IICFIP USA, Incorporation
financial investigation.
social media.
To preserve witness testimony, the witnesses should not be allowed to discuss anything with
suspects and vice versa. It must be noted here that the lists of witnesses/suspects are not fine until
the interviews are concluded. These lists will keep on changing until interviews on chapter 6 and
7 are concluded. Experience has shown that the witnesses lists proposed by the clients. Later on
turn to be suspects and suspects proposed by the client turn out to be witnesses. Why do you
think this happen? Clients being human as they are, are sometimes biased as opposed to their
investigators.
Experience has also shown that the staff that are most trusted by the client are the most
dishonesty, and in fact most clients get shocked to learn that the trusted staff are the principal
Take relevant extracts from witness statements/ reports to assist in your written plan. From
experience, it has proved rather challenging work where the investigator starts work with any list
of suspects and witnesses. In this case, the investigators mandate is to find out who was
responsible for the perpetration of the wrong doing and also find out the co-perpetrators.
The list arrived at before is not exhaustive and that is why it is called a rough list. It will be
discovered in chapter 6 and 7 that as an actual interview of witnesses and suspects progress on,
some of the witnesses will close ranks and become suspects and some of the suspects will also
become witnesses. The rough list usually provides a nice point where to start from and then
progress on.
3
All copy and transmission rights reserved by the IICFIP USA, Incorporation
questions and an objective interviewer. Many interviews fail to gather enough information to
address the issues raised in a forensic matter because of inadequate preparation, or because
many are, there is a natural tendency to schedule a set time for its initiation and completion. If
possible, sufficient time should be allowed to conduct the interview with the time of completion
left open ended. If a set time is established, the person interviewed may be overly focused on the
ending time, thereby inhibiting a flow of information. Interviewers can enhance their credibility
by focusing on information that the interviewee should know, as opposed to guessing during the
interview and thereby wasting the time of the participants by asking questions that the
interviewee could not know. By remaining objective and fair, the interviewers can better gain the
confidence of the interviewee. Ideally, the interview should be conducted as soon as the alleged
impropriety has been discovered and very close to the crime scene. In fraud cases, this will be of
particular importance since the interviewee may wish to pull out a document from a file, for
An effective interviewer should be an active listener, as well as an active observer. Both are
learned skills that can be studied and improved with practice. Active listening means not only
listening more than talking, but really hearing what is being said and how it is being
communicated. Sometimes what is not being said is equally as important as what has been said
by the interviewee.
4
All copy and transmission rights reserved by the IICFIP USA, Incorporation
This discusses the step number 5 of the investigation process. This is the main body of an
investigation that involves analysis of transactional documents. Documentary evidence gathered
in a forensic audit case resembles that of normal audit but differs in details and intensity. A
forensic investigator is not allowed to rely on sampling whereas an auditor uses sampling as one
of his/her important audit techniques and in the process skips many crucial and critical
evidences. The mindset of the forensic investigator is that of finding evidence for or against an
allegation. The evidence so collected must be capable of providing proof beyond reasonable
doubt.
Documentary evidence collection must follow the best evidence rule, which states that if a
document is to be produced as evidence it must be in its original form. If not a certified copy
must be produced with reasons why original is not available. Documents that provide evidence
are forged invoices, receipts, purchase orders, cheques, contracts, agreements, authorization
letters, appointment letters, promotion letters, determination letters, falsified financial statements,
tax records, diaries, emails, suicide notes, bills delivery notes, dispatch notes, transfer notes
random notes and many more.
Approach
A Certified Forensic Investigation Professional must plan his/her documentation evidence
gathering well ensuring that he/she targets the crime scene and carry out a 100% testing and
evidence collection. Sampling is not encouraged in forensic investigations/auditing. This will
ensure a reasonable expectation of collecting all the documentary evidence available without
skipping any. All documents interrelations must be traced and all relevant documents collected
from within that investigative area or outside so long as the other documents point to it. This will
be discussed further under external confirmations.
5
All copy and transmission rights reserved by the IICFIP USA, Incorporation
Investigative Fieldwork
Once the team is put together, the practitioner usually begins investigative fieldwork to set up the
validity of the claim. This mainly, involves examination of documents, and analytical
procedures, and evidence collection, and subject interviews. It is at this stage that a lot of time
has to be allocated.
Should it be substantiated, the conclusions / findings/ results of the investigation may possibly
conclude in a civil litigation. It is highly suggested that the practitioner conduct each
investigation with the intent of proving "beyond a reasonable doubt" as required by criminal
courts of law. In most cases, civil courts need enough proof by a preponderance of the evidence/
confirmation. Confirmations which satisfy the requirements of a criminal court will probably
According to the former Internal Revenue Service Agent, Richard Nose, there are seven different
crimes. Recently, NACVA included these techniques into its Forensic Accounting Academy
3. Confidential Sources;
6
All copy and transmission rights reserved by the IICFIP USA, Incorporation
The addition of these steps will assist make sure a complete review of all facts and an effective
Any method of obtaining evidence can be used in a forensic investigation engagement contracts.
This may not be limited assurance engagement in which procedures are likely to be restricted to
enquiry and analytical actions. These engagements include a detailed and wholesale review of all
documentation and electronic evidence accessible. The view given by the expert forensic
accountant must be reasoned, and backed up by evidence/ confirmation. Their view cannot be
objective if only based on what they are told; they must corroborate that statement.
To achieve success in your forensic investigation, the procedures used must not be vague. In fact,
they have to be very specific enough that the engagement team could actually follow your
instructions/ directions. For instance, it may not be sufficient to write 'interview the suspect'. The
investigator must come up with questions that should be asked of the suspect in interview/
interrogation, depending on the circumstances in the situation. For instance, he/ she may ask the
suspect to explain their job, role and what access that gives them to systems, inventory, and cash.
This also applies when recommending enquires of or discussions with management. In this case,
it ought to be concise in the answer especially what the engagement team should ask of them,
such as have they informed the law enforcers, has the suspect been suspended, and have they
informed the insurer? On the same note, it may not be sufficient to suggest the use of CAATs. In
that case, one must specify how the CAATs could be applied. For instance, information
matching bank accounts used for paying suppliers with bank accounts for paying workforce,
To design appropriate procedures you must identify the type of forensic investigation
engagement contracts, and the particular type of crime, negligence claim as mentioned on the
7
All copy and transmission rights reserved by the IICFIP USA, Incorporation
introduction. Take for instance in quantifying the theft of goods will be very different from
quantifying a loss from payroll or ghost employee fraud or loss of profits following a business
disruption.
documents) is regularly linked with white collar crimes like fraudulent checks;
nevertheless, in excises, this part of forensic science may be applied in a wide array of
Armed with complicated know-how, examiners can peer into the visible and invisible
The digital age has made the work of forensic document examiners even more important.
With the availability of powerful software programs such as Photoshop, Adobe, amongst
others. In fact, it has ended up being significantly easier for criminals to create and
Forensic document examiners often deal with questions of document genuineness. In order to
establish whether a document is authentic, the examiner may attempt to confirm who
created the document(s), establish the timeframe in which it was twisted, recognize the
materials used in its preparation or uncover modifications to the original text/ message.
Document(s) may be examined for evidence of obliterations, page substitutions, and alterations.
8
All copy and transmission rights reserved by the IICFIP USA, Incorporation
Or rather the examiner can study the materials, machines, and methods that created the
document(s), availing the main information that can identify or narrow the possible
sources of the document. The paper, writing tools, ink, seals, ribbons, and stamps used in
production of a document may all reveal important clues/ leads. A document examiner
examination and comparison of a handwriting that includes signatures and the hand, is based on
3 main principles:
2. Every person has a range of natural variation to his or her writing; and
Computer databases maintained by the United States Secret Service, the German Federal Police
and Federal Bureau of Investigation contain handwriting samples from hundreds of thousands of
writers. The Comparisons of these databases have not identified two individuals who have the
9
All copy and transmission rights reserved by the IICFIP USA, Incorporation
Since documents are part of daily life, document examiners work a vast variety of instances.
Document examiners are called to investigate the authenticity of documents in situations such as:
Forgeries Kidnappings
Counterfeiting Extortion
Table 1: Document examiners are called to investigate the authenticity of documents in situations above
Forensic document examiners are most frequently asked to resolve questions of authorship. This
question includes whether the signature on the mortgage loan is genuine or not. Can you say
who wrote this anonymous note?. Simply by doing this comparison of documents found at a
crime scene to a suspects known writing samples, the document examiner is able confirm who
wrote the note and include or exclude suspects from the examination. The document examiner
can also be a CFIP that has majored in such examinations, and undertaken special training in
documents examination
10
All copy and transmission rights reserved by the IICFIP USA, Incorporation
A 1956 kidnapping case from Long Island, New York, helps illustrate the key role forensic
document examination can play in an investigation. In this case, a one Month old child was taken
from his home and a ransom note was found in the babys carriage, supposedly left by the childs
babysitter.
Investigators discovered distinguishing characteristics in the way the writer formed 16 letters of
the alphabet, most notably the lowercase m, which resembled a sideways z. Investigators
searched through nearly two million documents looking for similar writing until a probation
officer found in his files documents written by a 31year old auto mechanic with the same
peculiar m. Document examiners were able to conclusively match the ransom note to the
suspects handwriting, helping to secure a conviction. It was discovered that it was the mechanic
who murdered the one month old child not the babysitter.
Fraudulent Checks
legal documents. For instance, if someone altered a check to increase its amount, examiners may
be able to determine this by comparing the way the inks from different pens react when subjected
to infrared radiation.
In the example below, a check made out to Cash for USD 1,000 has been altered by changing
the 1 to a 9 and adding a recipients name. Although the black inks appear the same in
visible light, when subjected to certain frequencies of infrared light, the ink used to prepare the
11
All copy and transmission rights reserved by the IICFIP USA, Incorporation
genuine check reacts differently than the ink used to alter the check, making the alteration
obvious.
Documents in a suspects possession may also reveal clues from hidden impression
evidence that could link a suspect to a crime. For instance, did the bank robbery
suspect write the hold-up note on top of another piece of paper that now contains
impression of that?
12
All copy and transmission rights reserved by the IICFIP USA, Incorporation
Examiners can also identify the materials, inks and even the type of office equipment or writing
implements used to produce the document. This is especially useful in fraud cases because these
details can identify the time frame in which a document was created. For instance, if an analysis
of the documents paper reveals a substance that was not used in paper manufacturing during the
time frame in question, the document, piece of art, or historical record would be demonstrated to
be fraudulent.
How is it done?
Questioned material may consist of identification cards, contracts, wills, titles and deeds, seals,
stamps, bank checks, handwritten correspondence, machine Generated documents (such as those
13
All copy and transmission rights reserved by the IICFIP USA, Incorporation
from photocopiers, fax machines, and printers), currency and electronic documents. In some
circumstances, graffiti and digital signatures may be examined; however, the client should be
Documents that does not contain visible identifiable marks may contain valuable impression
evidence if they were underneath other documents when the writing was performed. Even
equipment in the suspects possession may be collected by the investigator. In digital documents,
evidence could even be collected from the metadata of electronic signature files, providing
information such as who the author is and when the document was written.
When conducting examinations, forensic document examiners must have known specimens to
which they compare the material in question. These samples may come from any number of
Requested specimens are writings dictated by the investigator to the writer. These specimens
are created under carefully controlled conditions, with the writer being closely monitored.
Collected writing specimens, however, are writings that were completed by the suspect prior to
the investigation. Good sources of writing specimens may include items such as cancelled
14
All copy and transmission rights reserved by the IICFIP USA, Incorporation
cheques, letters, diaries, signed receipts, medical records, real estate contracts, tax records or
Analysis ought to be done by a qualified forensic document inspector, if possible one who is a
member of a well established professional association like the ABFDE or the ASQDE or other
Membership requirements for these associations differ; nevertheless, an examiner typically must
have completed a two year, full time training program under the guidance of a qualified forensic
document investigator. In order to maintain membership in good standing and keep their skills
present, inspectors/ examiners are required to complete continuing training and personal
development. If the examiners are members of the IICFIP USA Inc they must also conform to
Forensic document examiners either work as private examiners within their own laboratory, or
for publicly funded laboratories. If an agency does not have questioned documents analysis
capabilities, investigators may opt to send the evidence to a nearby lab, or retain a private
examiner.
The techniques and tools used in forensic document examinations leverage well established
principles of physics and chemistry. A typical Questioned Documents Unit in a crime laboratory
is equipped with microscopes, digital imaging instrumentation, infrared and ultraviolet light
sources, video analysis tools and specialized equipment including electrostatic detection devices
15
All copy and transmission rights reserved by the IICFIP USA, Incorporation
Many forensic document examiners use only non Destructive techniques that use light and/or
destructive because they require removal of small samples of ink from the questioned
documents. These types of examinations may be sent off to laboratories that specialize in this
For analyses of documents created by typewriters, fax machines, or printers, examiners may rely
on various databases created for comparison purposes. During handwriting analyses, examiners
compare samples provided from particular populations. Certain agencies, such as the U.S. Secret
Service and the German Federal Police, maintain larger databases. For example, the Forensic
Information System for Handwriting (FISH) maintained by the U.S. Secret Service Forensic
Revealing text from indented impressions Documents that may contain indented impressions
not visible to the naked eye can be visualized through the use of an Electrostatic Detection
Device (EDD) such as the Electrostatic Detection Apparatus (ESDA). An EDD uses applied
charges and toner to visualize areas of indented writing, making them visible to the eye. The
ESDA uses the principle that indented areas of the document carry less negative charge than
surrounding areas. This causes the toner used in the EDD to be attracted to these areas, revealing
Using this technique, indented impressions have been recovered from up to seven layers of paper
beneath the original writings. Research has demonstrated that impressions can be successfully
visualized from documents up to 60 years old, provided the papers are not mishandled or stored
improperly.
16
All copy and transmission rights reserved by the IICFIP USA, Incorporation
and erasures not visible to the human eye can often be detected through use of photography and
other imaging devices that utilize ultraviolet and infrared wavelengths of light. Using radiation
(VSC) can reveal writing that has been added with a different ink, or has been altered or removed
by exploiting variations in the way different inks respond to different wavelengths of light. For
example, under certain light sources combined with an infrared filter, a document containing
information written in ink that has faded over time may be enhanced or processed to appear
Figure 4: Obliterated Note View with Visible Light (Courtesy of Marie Durina)
17
All copy and transmission rights reserved by the IICFIP USA, Incorporation
Figure 5: Same Note Viewed With Infrared Radiation (Courtesy of Marie Durina)
conducted to identify the chemical composition of inks on a document. In this technique, a small
cutting from the questioned document is dissolved in a solvent and analyzed. This is one of the
few destructive techniques employed by the document examiner. The inks can be compared to
the International Ink Library, a database maintained by the U.S. Secret Service that contains data
on more than 9,500 inks that have been manufactured since 1920.
with ink jet, laser printers, fax machines and photocopiers may be sourced to a particular make
or model, or even to a specific machine. The printing process used to prepare documents can
also be identified. When possible, the examiner should obtain known standards and any available
accessories from the machine in question and the machine itself should be submitted for
examination.
Seals and stamps Questioned documents bearing rubber stamp impressions, embossed seals,
watermarks, or other mechanically printed marks may be submitted for examination. When
possible, it is best to provide the examiner with any suspected devices associated with the
18
All copy and transmission rights reserved by the IICFIP USA, Incorporation
questioned document that may have been involved in its preparation. This includes writing
instrument(s), papers, or other substances, rubber stamp(s), sealing devices (such as notary
To illustrate the value of a manufacturers mark, consider a 1989 case when a young girl was
kidnapped and murdered. Investigators called in forensic document examiners to examine the
plastic garbage bag in which the victim was found. The minute markings created by the heat, and
sealing process used in manufacturing such bags enabled investigators to determine that the bag
was manufactured on the same machine within seconds of other bags found in the parents
house. This was key evidence that resulted in the conviction of the girls mother for murder.
Examination of handwriting When a sufficient amount of writing from two different people
is closely examined, there are always identifiable differences. Comparisons of writing samples
take into consideration a wide variety of handwriting characteristics including words and letter
spacing, slant or slope, speed, pen position, capitalization of letters, embellishments, legibility,
use of punctuation, proportion of letters and other attributes; for example, one person may form
the letter O in a clockwise motion, while another may form the same letter in a counter
clockwise motion. A particular writer may form the letter M using an upward moving arch
formation, while another prefers to make a garland form of M, forming this letter with a U
motion to resemble the garland on a Christmas tree. Document examiners take into account the
various combinations of features present within the writing sample as a whole. In addition,
examiners look for features such as hesitations in the natural flow of writing, possible retouching
or unnatural tremors. These may indicate that an unnatural writing process has been employed.
No one writes with a machine like precision every time, and variations are evident in a persons
handwriting even within the same document. For example, if a person writes an entire page of
19
All copy and transmission rights reserved by the IICFIP USA, Incorporation
signatures, each one will vary slightly. A trained forensic document examiner can discriminate
between natural variations in a writers own handwriting and significant differences denoting
different writers.
To conduct handwriting comparisons, the investigator should obtain known writing samples that
compared to known cursive writing. If it contains upper and lowercase letters, the known
writings must also contain upper and lowercase letters. Wherever possible, the investigator
should also obtain known writing containing similar combinations of letters and numbers seen in
the questioned documents. For comparison purposes, it is recommended that investigators obtain
written letters. The investigator should also attempt to obtain known writing that is prepared
around the same time period as the questioned writing. This is particularly important in cases
involving writing from young people, as writing formation may still be at a developmental stage,
Documentary techniques
These are basically the techniques applied in categorizing, investigating, interpreting and
identifying the boundaries of physical sources, such as written documents, whether in the private
or public domain.
The following are the generally accepted criteria for assessing the quality of evidence:
20
All copy and transmission rights reserved by the IICFIP USA, Incorporation
3. Representativeness: Is the evidence typical of its kind, and if not, is the extent of its
untypicality known?
Despite the fact that most documents are stored in paper containing printed matter, handwriting,
typewritten material, or a combination, valuable data or messages maybe left on the mirrors,
As a document examiner, you should thoroughly examine the questioned documents to draw
substitutions amongst others problems, which concerns documents and their content. In most
cases, this examination also includes the examination of content of the message to check for
According to Erickson (2014) the rules of evidence necessitate that the production of the original
document, unless if a satisfactory clarification is given for failing to produce the original; like the
loss of the original document. In cases of loss or destruction of the original, photocopies are
often accepted by the courts despite the fact that they may have undetected alterations, rendering
them unreliable. To solve this problem, the reproduction of photocopies must be accurate and
must be done on the original documents, but it is always best to examine originals. Other
problems, like dating documents and sequence of writing, necessitate the original document to
establish conclusions concerning the document. In an event that the originals are not accessible,
21
All copy and transmission rights reserved by the IICFIP USA, Incorporation
A first generation photocopy is a photocopy made from the original document. Every time a
photocopies are much unreliable therefore courts do not readily accept them.
Transporting documents
Basically, evidence is gathered, secured, and sealed before the examiner enters the case. In most
cases, it is the duty of the examiner to go on to preserving the documents whilst they are in his or
her custody. Ideally, evidence is collected, safeguarded and preserved before a document
examiner enters the case. It is the responsibility of the document examiner to continue to
preserve the document while in his or her care and to return them intact to the forensic
investigator.
Evidence must be protected whenever it is transferred to another party. Original documents must
be safeguarded during transit. Original documents should never be sent through ordinary mail.
Insist that original documents be sent by registered mail if the client uses postal mail. Federal
express is preferred by many for its speed and ability to track the whereabouts of its parcels at all
times. Courier service is an alternative that keeps the documents secure at all times. Instruct the
clients that documents must be signed for and handed to a responsible person in the office.
If documents are picked up from the client, be sure to take proper materials for transporting the
should be large enough for the documents to lie flat. Documents should never be folded. Clear
plastic folders can be used if they are the type of plastic that does not stick to the documents.
Mylar folders are the best. Manila envelopes may also be used. Be certain that any information
placed on the envelope is done before the documents are inserted into the envelope. Documents
can also be transported in file folders in an attach case. They should never be placed in a pocket
22
All copy and transmission rights reserved by the IICFIP USA, Incorporation
or pocketbooks. It is against this background that evidence requires a chain of custody to ensure
its physical integrity at all times. Each part that handles the evidence must sign the chain of
custody as shown in the appendix 1 at the end of this book. Keeping good chain of custody for
all physical evidence that is moved from one place to another or from one person to the other is
required to assure the court that the item in court is the one that was collected from the crime
scene, and that it is in the same condition as the time of collection i.e. that has not been
contaminated or replaced or tampered with in any way significant enough to affect its integrity as
an exhibit.
One of the key advantages in conducting documentary research is that you can get access to
information that would be difficult to get in any other way, such as people or cases who might
not be willing to talk in a formal research interview or might be difficult to track down. By using
documents you eliminate the effect that you, as an individual, have on a person or situation when
you conduct research. The effect you have on a situation or subject may be partly due to the
knowledge that you are there as a researcher. People will also be affected by how you conduct
yourself and how they perceive you. Issues of sex, age, race and other characteristics are likely to
have an impact on what people tell you or do when they know they are research subjects.
Documents are often particularly useful for tracking change over time; that is, doing longitudinal
often make possible the collection of data over a longer period of time as well as larger samples
than might be collected from questionnaires or interviews. Some documents may contain
spontaneous data, such as feelings, and refer to actions that are recorded in a specific context, not
23
All copy and transmission rights reserved by the IICFIP USA, Incorporation
with a view to answering a particular research question. Confessional documents may give us an
insight into how people see things or how they want to present things. Either way, they provide a
very particular account of reality whatever the confessor's motivation behind their account.
Further advantages of using documents in research include the fact that such research is
relatively low cost, particularly when the documents are easily accessible and already located in
your workplace, or on the internet. Documents vary a great deal in quality, often related to the
perceived importance of recording certain information, but some types of document can be
extremely detailed and yield much more information than you could hope to gain from a
Documents may include various forms of evidence of non-formal, informal, and formal
evidence.
Documents dont change mind or become emotional during repeated interrogation and
examination.
24
All copy and transmission rights reserved by the IICFIP USA, Incorporation
Documentary evidence is the best evidence since documents never lie. Most of the
documentary evidences are keenly inspected before being accepted as evidence thereby
Documents will assist in establishing intent, which is one of the most important
you get to the extent to which the act or other elicit activity being investigated has
progressed.
Nevertheless, documents are usually not designed with research in mind. The information
recorded may be idiosyncratic or incomplete. Documents get misfiled, left on people's desks for
long periods or simply just do not get fully completed at all. Even standard ways of collecting
data in a police station may change, so there may be information that is available for one period
of time and not another. All of this will create gaps in data as well as coding difficulties. The
motivation to collect certain types of data will vary over time, perhaps related to the decision by
25
All copy and transmission rights reserved by the IICFIP USA, Incorporation
a particular team to focus on a specific issue for a period of time or because of government
Documentary Evidence
Documentary evidence is a document presented and allowed as evidence in a hearing or trial, but
not oral testimony. Nevertheless, in some cases, the opposing attorney may decline for it to be
admitted. From the onset, it must be proved by other evidence from a witness that the paper is
Gathering evidence
In order to gather detailed evidence, the investigator must understand the specific type of fraud
that has been carried out, and how the fraud has been committed. The evidence should be
sufficient to ultimately prove the identity of the fraudster(s), the mechanics of the fraud scheme,
and the amount of financial loss suffered. It is important that the investigating team is skilled in
collecting evidence that can be used in a court case, and in keeping a clear chain of custody until
the evidence is presented in court. If any evidence is inconclusive or there are gaps in the chain
26
All copy and transmission rights reserved by the IICFIP USA, Incorporation
of custody, then the evidence may be challenged in court, or even become inadmissible.
Investigators must be alert to documents being falsified, damaged or destroyed by the suspect(s).
testing controls to gather evidence which identifies the weaknesses, which allowed the
fraud to be perpetrated;
applying computer assisted investigation techniques, for example, to identify the timing
documentation.
The ultimate goal of the forensic investigation team is to obtain a confession by the fraudster, if a
fraud did actually occur. For this reason, the investigators are likely to avoid deliberately
confronting the alleged fraudster(s) until they have gathered sufficient evidence to extract a
confession. The interview with the suspect is a crucial part of evidence gathered during the
investigation. The documentary evidence gathered so far together with witness testimonies can
27
All copy and transmission rights reserved by the IICFIP USA, Incorporation
Evidence Packaging
All effort should be made to maintain and preserve documentary evidence in the same condition
as it was received. The evidence must not be folded, torn, stapled, marked or touched
unnecessarily, stamped, subjected to indent writing impressions, etc. Unless legal aspects or
good judgment dictate otherwise, all articles submitted as evidence should be carefully marked
for identification. These markings should be of a discreet nature so as not to injure the evidence
itself. Good judgment may dictate that the evidence itself not be marked. It should be placed in
an envelope or container that has been identified on the outside with the date, initials, case
number and other pertinent data, prior to the evidence being placed inside and sealed. The
envelope or container containing documentary evidence should not be written on, with the
At no time should documentary evidence be beneath a sheet of paper on which you are writing.
The importance of protecting a document from indented writing impressions cannot be over
emphasized. Each item of evidence must be placed in a separate, sealed envelope or container.
When multiple items are submitted as known of the same subject, they may be submitted in the
Evidence that is a reproduction copy of an original should not be submitted in a plastic container,
the printed areas may transfer and adhere to the surface of the container. As a general rule, paper
Original evidence is always preferable over reproduction copies. Certain examinations can only
be conducted with original documents. Occasionally the reproduction copy is the questioned
28
All copy and transmission rights reserved by the IICFIP USA, Incorporation
document. The inability to obtain original evidence should never stop the submission of
questioned items. The forensic investigation expert will examine the best evidence available.
the Forensic lab first. Certain evidence may be destroyed if the document is treated for latent
prints before a document examination is performed. The Forensic lab will do all appropriate
examinations and preserve the document in its original condition. It will then either be returned
to the submitter or forwarded to the Forensic Identification team for examination, as requested
by the submitter. It is always advisable to treat all documents as though they were being
Documents Examination
During document examination, the investigator should use an elderly approach to examine the
questioned documents/ materials presented. He/ she must adhere to a uniform procedure for a
systematic and thorough study of suspects documents to see to it that an important piece of
Photocopies and Photographs must be made of the original documents in the quickest possible
time. Photographs safeguard the honesty of the documents/ materials by availing an accurate
copy of the items. Although enlargements often reveal evidence, which may not be without
magnification, enlarging photographs should also be done with a lot of caution. A one on one
photocopy should also be made so that the size of the document can be easily established. A
29
All copy and transmission rights reserved by the IICFIP USA, Incorporation
200% enlargement is useful for examination. An enlarged document is easy to examine and
30
All copy and transmission rights reserved by the IICFIP USA, Incorporation
PROGRESS TEST 3
B. No
A. A victim.
B. A person that is thought to be guilty of a crime.
C. Expert witness.
D. None of the above
3. Documentary evidence collection must follow the best evidence rule, which states that if
a document is to be produced as evidence it must be in its original form
A. True
B. False
A. True
B. False
B. False
31
All copy and transmission rights reserved by the IICFIP USA, Incorporation
B. False
8. During document examination, the investigator should use an elderly approach to examine
the questioned documents/ materials presented.
A. True
B. False
9. The investigator should base their understanding of the responses on the hypothesis
given to him.
A. True
B. False
10. The investigator retains the sole right to hide and to conceal the name of some suspects for
security reasons.
A. Yes
B. No
32