1,923
24
Essay, 3 pages (550 words)

Advanced criminalistics - document examination

Advantages of Paper Transactions
The most significant benefit of using paper for transactions is the uniqueness of handwriting. Paper transactions bear handwritten signatures that numerous transactions today still call for (Blackhawk, 2014). For example, transactions requiring simple check to bank account transfers, benefits, or mortgage requests need handwritten signatures. When it comes to identity theft, the subtleties of two seemingly identical signatures dictate their slight difference. These subtleties are what make paper transactions advantageous and special in terms of forensics or investigation. Spacing, inks, dates, pen pressure, and numerals used are some of the subtleties that make handwritten transactions unique.
Handwriting also helps investigators determine the date the transaction or any changes made after writing the paper (Blackhawk, 2014). For instances, if the identity thief erased or made some content obscure, a forensic investigator may be able to notice through handwriting. Handwriting can denote numerous aspects of the paper transaction that range from simple records to whole contracts. Handwriting is the aspect of the identity criminal that makes distinguishes and offers the likelihood for detection as irrespective of how proficient they are at stealing identities. Often, a subtlety of handwriting gives the identity thief away.
A second advantage of using paper for transactions is protection by state laws. State laws secure individuals and organizations against crimes committed by an identity thief who uses paper documents such as stolen or falsified checks (Federal Trade Commission, n. d.). Although federal laws apply to identify theft carried out electronically, state laws apply to electronic transactions that the state considered paper. States allow this double application when investigators are unsure of the kind of paper transaction the identity criminal used to carry out the offense.
Relationship between Identity Theft and Forgery and Document Falsification
Forgery is a means of committing identity theft, which occurs when the perpetrator forms or uses any counterfeit information identifying an unreal person or a real individual without his or her consent. Owing such information is enough evidence for a conviction by the court if the individual means to apply the information illegally. In such a case, the person commits identity theft (Federal Trade Commission, n. d.). In terms document falsification, the identity thief changes, modifies, or adjusts a document with the aim of misleading another individual. Identity theft occurs when this criminal process entails the thief passing copies of documents as legitimate while knowing they are made-up. Many states consider identify theft through document falsification a felony.
Forensic Science in Fighting Identity Theft
Forensic science can provide and use POS terminals and VPD techniques for detecting modified ATM intersections, concealed CCTV setups, listening gadgets, and custom-built or modified electronics of all kinds (Kevin, 2008). These techniques offer an innovative approach towards expanding the scope of identity theft. Through forensic science’s joint effort with the technology industry and the police, forensic analysis or investigations that formerly showed technological or paper transaction limitations or unknowns become solvable. Logistics regarding penetrated ATMs, electronic devices, or forged documents become more accessible with the application of these forensic techniques(Kevin, 2008). Intel garnered through forensic science through POS terminals and VPD techniques, and collaboration with the technology sector and the police will usually lead forensic analysis units to a properly organized group of identity thieves.
References
Blackhawk. 2014. Forensic Handwriting Service. Blackhawk Investigations. Retrieved from http://www. blackhawkinvestigations. co. uk/corporate-services/forensic-handwriting-service/
Federal Trade Commission. (n. d.). Identity Theft Victims: Resolving Specific Problems. SaveAndInvest. Retrieved from http://www. saveandinvest. org/ProtectYourMoney/IdentityTheft/P124308#sthash. pPFBI9jV. dpuf
Kevin, P. (2008). A Forensic Approach to Effective Identity Theft Investigations. The Police Chief, LXXV(4), p. 1-4.

Thank's for Your Vote!
Advanced criminalistics - document examination. Page 1
Advanced criminalistics - document examination. Page 2
Advanced criminalistics - document examination. Page 3
Advanced criminalistics - document examination. Page 4

This work, titled "Advanced criminalistics – document examination" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Advanced criminalistics - document examination'. 14 January.

Reference

AssignBuster. (2022, January 14). Advanced criminalistics - document examination. Retrieved from https://assignbuster.com/advanced-criminalistics-document-examination/

References

AssignBuster. 2022. "Advanced criminalistics - document examination." January 14, 2022. https://assignbuster.com/advanced-criminalistics-document-examination/.

1. AssignBuster. "Advanced criminalistics - document examination." January 14, 2022. https://assignbuster.com/advanced-criminalistics-document-examination/.


Bibliography


AssignBuster. "Advanced criminalistics - document examination." January 14, 2022. https://assignbuster.com/advanced-criminalistics-document-examination/.

Work Cited

"Advanced criminalistics - document examination." AssignBuster, 14 Jan. 2022, assignbuster.com/advanced-criminalistics-document-examination/.

Get in Touch

Please, let us know if you have any ideas on improving Advanced criminalistics – document examination, or our service. We will be happy to hear what you think: [email protected]