0% found this document useful (0 votes)
109 views

Joseph, Sheilo Pearl P. Forensic-4

This document discusses different types of forgeries: 1. Non-genuine signatures are those used to replicate a signature without passing it off as real, such as rubber stamps or autopens. 2. A spurious or simple forgery has no attempt at simulation or imitation of the genuine signature. 3. A simulation or simulated forgery involves copying a signature through drawing to include normal characteristics of the writer's hand. 4. A tracing or traced forgery involves tracing over a genuine signature, making it impossible to identify the writer but possible to determine it was traced.

Uploaded by

Kate Btta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
109 views

Joseph, Sheilo Pearl P. Forensic-4

This document discusses different types of forgeries: 1. Non-genuine signatures are those used to replicate a signature without passing it off as real, such as rubber stamps or autopens. 2. A spurious or simple forgery has no attempt at simulation or imitation of the genuine signature. 3. A simulation or simulated forgery involves copying a signature through drawing to include normal characteristics of the writer's hand. 4. A tracing or traced forgery involves tracing over a genuine signature, making it impossible to identify the writer but possible to determine it was traced.

Uploaded by

Kate Btta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

JOSEPH, SHEILO PEARL P.

FORENSIC-4
BSCRIM 3-G

                  Forensic-4

Assignment

1. Non-Genuine Signature-Handwritten

 Non-genuine signatures are those that are used to replicate a signature, but not pass it off as
real. Two prime examples of this are the rubber stamps used by secretaries and the autopens
that reproduce a digital signature.

2. Spurious Signature (Simple forgery)

A fraudulent signature in which there is no apparent attempt at simulation or imitation.

3. Simulation (Simulated Forgery)

 Is the copying of a signature or other writing by “drawing” it. If the writing contains enough
normal characteristics of the writer's true hand, it may be possible to identify the writer
4. Tracing (Traced Forgery)

In this type, the writer traces over a signature or other writing. Because the writer does not
write in his or her natural hand, it is not possible to identify the writer, but it is possible to
determine if the writing was produced by tracing.

5. Transmitted Light Tracing


The identifying feature that should be taken into consideration while dealing with traced
forgery cases are as follows abrupt changes in the direction of the line, lack of fluency, more
line tremors, pen lifts, blobs of ink, retracing, and poorer duplication of the line quality than
free-hand forgeries.

6. Carbon-Medium Tracing
In this method, carbon paper is positioned between the genuine document and
targeted document, then the signature on the genuine document is outlined with the help of a
dry pen, stylus or any other pointed device with pressure. Carbon copy is completed with ink
and pen.
7. Pressure indented Tracing
In this method, the genuine document containing the model signature is positioned over the
targeted document, then the signature is outlined with a sharp and hard point with pressure.

8. Tracing Paper Techniques


Tracing paper is paper made to have low opacity, allowing light to pass through. It is named
as such for its ability for an image to be traced onto it. It was originally developed for
architects and design engineers to create drawings which could be copied precisely using the
diazo copy process.

10. Transferred or Transposed Forgery


The paper that is to receive the spurious signature is placed over a document bearing the
genuine signature. These documents are then aligned so as to put the genuine signature
directly under the selected location for the forgery.
11 .Phocopy Forgery (Cut and Paste Photocopy)
This examination must necessarily include significant thought as to the possibility that a
genuine signature can be affixed to a fraudulent document and the composite, or paste-up,
photocopied. This may result is what would appear to be a photocopy of an original
document bearing a genuine signature.

12. Desktop Forgery


Desktop publishing is making it easy to create counterfeit documents from letters of credit to
forged checks.

13. Electronic Signature


An electronic signature, or e-signature, is data that is logically associated with other data and
which is used by the signatory to sign the associated data.

You might also like