SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD31013 | Volume – 4 | Issue – 4 | May-June 2020 Page 437
Medico Legal Importance of
Questioned Documents in Crime Investigation
Dr. Theju Kumar C
Assistant Professor, Department of Criminology,
Acharya Institute of Graduate Studies, Soladevanahalli, Bengaluru, Karnataka, India
ABSTRACT
Forensic handwriting examination has a new frontier: the digital signature in
biometric modality that uses, for recognition purposes, the anatomic and
behavioral characteristics that an individual exhibit when signing her/his
name. Data such as the dynamically captured direction, stroke, distance, size,
pressure and shape of an individual’s signature enable handwriting to be a
reliable indicator of an indivudul’s identity. “Namirial” is an Italian company
that created a biometric signature system named “GrafoCerta” (sure
signature) that has a forensic sector particularly suitable for research. In this
paper the researcher will try to explain the different characteristics of
handwriting examination and examination of questioned document.
KEYWORDS: Document, Characteristics, Handwriting, Forensic
How to cite this paper: Dr. Theju Kumar
C "Medico Legal Importance of
Questioned Documents in Crime
Investigation"
Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-4, June 2020, pp.437-440, URL:
www.ijtsrd.com/papers/ijtsrd31013.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
INTRODUCTION
The examination of questioned documents covers many
areas of investigation,includingverifyinghandwriting and
signatures; authenticating documents; characterizing
papers, pigments, and inks used in writing instruments
and copying machines; restoring erased and obliterated
writing; and even determining the relative age of
documents and inks.
Why would anyone be concerned about a piece of paper?
Believeitornot,paperisinvolvedinmostcrimes—perhaps
directly, as with a ransom note in a kidnapping or a forged
signature on a check; perhaps indirectly, as with business
records in a drug operation or a receipt for a car rental or
medical prescription.
The document examiner’s tools are the stereomicroscope,
templates, protractors, grids, and other measurement
devices. The examiner may use different types of light
sources to detect forgeries, changes & obliterations.
Questioned Document
Questioned Documentcan be a handwriting,signature,mark
or any handwritten/typewritten document whosereliability
or source is doubtful. Questioned Document Examination
generally involves handwriting examination in case of
handwritten documents.
Main Objectives of forensic questioned document is :
1. That an expert analyst individualize handwriting to a
particular person(Suspect
2. What types of evidence are submitted to the document
analyst (is it cross cheq, forgery document, wills, or etc)
3. How to characterize different types of paper
4. The types and impact of computer crime
Characteristics of Hand writing:
Handwriting is writing done by hand with a pen, pencil,
digital stylus, or another instrument.Theart,skill,ormanner
of handwriting is called penmanship.
Handwriting in which successive letters are joined is
called cursive script. Handwriting in which the letters are
separated (as block letters) is called manuscript
style or printing.
Decorative handwriting (as well as the art of producing
decorative handwriting) is called calligraphy.
Analysis of Handwriting and Handprinting
Uniqueness
Each person has their own unique style of handwriting,
whether it is everyday handwriting or their personal
signature. Even identical twins who share appearance and
genetics do not have the same handwriting. Theplacewhere
one grows up and the first language onelearnsmelttogether
IJTSRD31013
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31013 | Volume – 4 | Issue – 4 | May-June 2020 Page 438
with the different distribution of force and ways of shaping
words to create a unique style of handwriting for each
person.
Characteristics of handwriting include:
specific shape of letters, e.g. their roundness or
sharpness
regular or irregular spacing between letters
the slope of the letters
the rhythmic repetition of the elements or arrhythmia
the pressure to the paper
the average size of letters
the thickness of letters
There are many styles of handwriting, but they are
categorized into three major types; cursive, print, and
D'Nealian.
Handwriting experts may be able to make a positive
identificationifthere areenoughsamplesforexamination
andenoughexemplarsagainstwhich to compare those
samples.
To determine whether a signature or writing sample is
authentic,a documentexaminerwillgenerallyexamine12
characteristics:
1. Line quality: Arethelinessmooth,free-flowing, and
rhythmic,orshaky, nervous,and wavering?
2. Spacing of words and letters: Examine the average
amount of space between words and letters. Is the
spacing consistent in the questioned and known
documents?
3. Ratioofrelativeheight,width,andsizeofletters: What
are the overall height, width, and size of the letters in
both the known and questioned documents? Are they
consistent?
4. Penliftsandseparations:Checkhowthewriter stopsto
formnewlettersandbeginwords. Forgeries may have
pen lifts or separations in unusual places, for
instance within a single letter.
5. Connecting strokes: Compare how capital letters are
connectedtolowercaselettersandhowstrokesconnect
between letters and between words.
6. Beginning and ending strokes: Compare how the
writer begins and ends a word, number, orletter. Are
the strokes straight, curled, long, or short? Are they
made on the upstroke or down stroke?
7. Unusual letter formation: Look for unusual letter
formation; for instance, letters written backward,
letterswithatail,orunusual capitals.
8. Shading or pen pressure: Individuals use different
amountsofpressure with a pen or pencil, making the
lines lighter or darker, narrower or wider. Check for
pressureonthedownwardandupwardstrokes.
9. Slant:Doesthewritingslanttotheleftorright,orisit
straight up and down? Are some letters consistently
slantedmoreorlessthan others?
10. Baseline habits: Does the writing tend to follow a
straight horizontal line, or move downward or
upward?Isitaboveorbelowthebaseline?
11. Flourishes or embellishments: Are there any fancy
letters,curls,loops, circles, double loops, orunderlines?
12. Placementofdiacritics: Checkthecrossingoft’sand
dotting of i’s, j’s, or any other letters or punctuation
marks. Is the cross on the t long in proportion to the
stem? Is it located to the left or right of the stem? Are
thei’sdottedaboveortothe rightor left of the stem?
The examiner also looks for irregularities such as an
awkwardorunnatural appearance or circle shapes made
up of different strokes. There is wide variation in how
people make their uppercase (capital) letters and the
lowercaselettersy,j,g, andq.
Methods of Forgery:
The most common forgery is a signature. There are three
types of forgery. One of the most common types, and
probably the easiest to detect for a layperson, is a blind
forgery,wheretheforgeruseshisorherown handwriting.
The forger does not even try to copytheoriginalsignature,
and may not even know what the signaturelooks like.This
is usually the case in petition fraud and anonymous
harassing subscriptions, as well as in many other civil and
criminalcases.Investigatorshavethehighestsuccessratein
identifying this type of forger.
Copying a genuine signature by carefully drawing it is
termed a simulated forgery. Often the forger practices the
signature so much that he or she can avoid many of the
hesitations and pen lifts usually seen in a forgery.
Investigatorscandetectasimulated forgerybyidentifying
theindividualmicroscopic handwriting traitsconsistently
present in the known signatures but missing from the
questioned signature. The forger is often unable to
duplicate all the victim’s individual handwriting habits.
This type of forgery canbeverydifficulttolinktoasuspect.
A third type of forgery is a traced forgery, which can be
donebytracingagenuinesignatureontoadocument using
alightboxorsimilardevice.Forgersmayuseothermethods
suchascarbonpaperorevenpressinghardover a genuine
signature and then tracing theindentation.
Stereomicroscopic examination can disclose this type of
forgery, because the line quality may be inconsistent.
Sometimesoblique lightingwillshowofftheindentations.
Obliterations:
Often documents are changed after they are prepared.
Common methods include physically erasing with a
rubber eraser or scraping the ink off the paper’s surface.
Both methods disturb the upper layer of fibers or the
paper’s coating; you can see these disturbances under the
microscope in reflected oblique lighting. Many papers
today are coated with optical brighteners that make the
paper look very white when seen under UV light.
Disturbing the coating may cause a darker area to appear.
Forgers also use chemical methods to obliterate words.
For example, a strong oxidizing agent such as chlorine or
sodium hypochlorite can make ink become colorless.
Examining the sample under a microscope or in UV or
infrared (IR) light may reveal the alteration
Indeed, use of alternate sources of lighting, that is, lamps
or lasers with specificwavelengths,canbeapowerfulwayto
showthedifferencesamong inksofthesamecolorbutwith
differentcomposition.Investigatorshavesuccessfullyused
infraredphotographytofinderasures,readcontent covered
by intentional obliterations (crossing out), and even
reconstruct writingfromcharreddocuments.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31013 | Volume – 4 | Issue – 4 | May-June 2020 Page 439
Digital image processing is becoming a more useful tool
in making obliterated markings more visible through
lightening, darkening, contrast, and filters.
Indentations:
Often an indented impression is left on paper beneath the
primary writing because of the pressure of the writing
utensil. Theseimpressions cansometimesbeusedtoforgea
signature, but often they have also led to the arrest of
criminals. The method we have all seen of rubbing the
impression with a soft pencil is the worst thing to do. It
doesn’t work very well and alters the evidence. Often,
oblique lightingwillenhancetheindentations.
Indentations also increase a paper’s capacity to hold an
electrostatic charge. This property is used to “develop”
imagesusinganelectrostaticdetection apparatus (ESDA).
Pouring toner powder from a copy machine over a
chargedsheetofplasticcoveringthepaperinquestioncan
create an image of the impressions, which is then
photographed.
Individualizing Typing and Printing
Whentypewriterswerecommonlyused,investigators could
often individualize their printing by examining wear and
defects in the typeface and misalignment of characters.
The FBI maintains a library of makes and models of all
manufactured typewriters as well as thousands of type
fonts.
Word processors and printers have largely replaced
typewriters, yet there are still ways to trace and compare
output. For example, color printers and photocopiers may
add a pattern of minuscule yellow dots to the printout,
encodingtheprinter’sserialnumber.
Investigators can also sometimes compare copy machine
output. Debris,grippermarks,platendefects,anddirtcanall
contributetowhataretermed trashmarksoncopiesfroma
copier.Thesemarkscanchangeovertime,sosometimesthe
materialcanevenbedated.
Paper
Most modern paper is made from wood pulp. Some types
of paper are manufactured mechanically,someare treated
with chemicals, and some have additives, such as cotton
fibers. Paper can be graded depending on the percentage
of cotton fibers; from 25 to 50 percent cotton may be
called bond paper. Mechanically produced wood pulp
paper is used for newspapers. Special writing paper such
as stationery is chemically treated with sodium sulfite.
Shopping bags are treated with asulfatefor extrastrength.
Some manufacturers include their own watermark design
during the manufacturing processbyreducingthe number
of fibers within a certain patterned area. The
manufacturer can change the watermark and sometimes
can use it to indicate when the paper was manufactured
and even where the paper was sold.
The forensic scientist may look at the following
characteristicsto identifypaper:
What raw material the paperis madefrom
Color
Density
Watermarks
Dyes orbleaches
Fluorescence under ultravioletlight
Thicknessasdetermined byusing a micrometer
Inks:
Investigators often compare inks by their composition.
Sometimestheycan evenchemicallyestablishhowlongthe
inkhasremainedonthepaper.
Counterfeiting:
Counterfeiting money is one of the oldest crimes known. It
wasa seriousprobleminthe19thcentury,whenbanksissued
their own currency. In 1863 the United States adopted a
national currency, but counterfeiting was still extensive. In
1865 the U.S. Secret Service was established to suppress
counterfeiting.
Although counterfeiting has substantially decreased since
the creation of the Secret Service, this crime continues to
be a potential danger to the nation’s economy and citizens.
Productionmethodsusedincounterfeitingoperationshave
evolvedovertheyears
COMPARISON OF QUESTIONED DOCUMENT:
The Questioned Documents unit is responsible for
determining the authenticity and/or authorship of
documents. The examination can be a handwriting
comparison; detection of alterations, obliterations, or
indented writing; or discovery of the typewriter, printer, or
fax machine that generated a document.
The most common examination is comparison of
handwriting or hand printing. Authorship of any type of
document may come into question during an investigation
Everyone has similarities intheirhandwriting;otherwise we
wouldn't be able to read what each other writes. Although
the following documents have a great deal of pictorial
similarity, they were written by different people
The forensic document examiner trains for 2 to 4 years in
the study of handwriting and other document-related
problems. It is the expert's responsibility to examine every
element of a writing, including the minute details, and to
look for both similarities and differences between known
and questioned writing.Noticethesimilaritiesbetweenthe2
documents below:
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31013 | Volume – 4 | Issue – 4 | May-June 2020 Page 440
Given enough writing evidence, bothknownandquestioned,
the forensic document examiner may be able to identify or
eliminate a suspected writer of having prepared a
questioned document. The examiner is often calledtotestify
in court and present exhibits to demonstrate the opinion.
Conclusion:
The medico legal expert should visit the death scene before
the autopsy if it is possible. Although, death investigation
differs in different countries, there is always a crime scene
investigation team with different branches. The study is
about questioned document and medico legal importance of
documents, inks, printer and etc.researcherdiscussedabout
the medico legal importance of documents at criminal
investigation, it is very much important to know about
document types before going to analyses of any documents,
inks and printer, so in this paper the researcher studied
about obliteration, indentation, individualizing typing and
printing, papers, ink and counterfeiting and also studied
important characteristics of document examination.
Reference:
[1] American Society of Questioned Document Examiners,
3(2), 57-65. Huber, R., & Headrick, A.(1999).
Handwriting Identification: Facts and Fundamentals.
CRC Press LLC, Boca Raton, FL.
[2] Clark SC (1999) Death Investigation: A Guide for the
Scene Investigator. National Institute of Justice,
Washington, USA.
[3] Horswell J (2005a) Major incident scene management
In: Encyclopedia of Forensic and Legal Medicine. In
Payne James J, Byard R, Corey T, Henderson C (Eds.),
Academic Press, London, UK, pp.12-20.
[4] Lee HC, Palmback T, Miller MT (2000) Henry Lee’s
Crime Scene Handbook. Academic Press, California,
USA.
[5] Linton MOHAMMED, Bryan FOUND, Michael
CALIGIURI, Doug ROGERS (2009) Pen Pressure as a
Discriminatory Feature between Genuine and Forged
Signatures, Proceedings of IGS 2009
[6] Miller MT (2003) Crime scene investigation In:
Forensic Science: An Introduction to Scientific and
Investigative Techniques. In James SH, Nordby JJ,
Florida (Eds.), USA, pp. 115-135.
[7] M.R. Hecker, Treatise on the Scientific Foundation of
Forensic Handwriting Comparison, published by
Kolonia Ltd; 2000.
[8] UK, Forensic Science Service, EVETT: Forensic
HandwritingComparison,ProbabilityandtheNatureof
the Science, ***given at 10 th ECPGHE (Joint Meeting of
the European Conferences for Police and Government
Handwriting and Documents Experts), Tulliallan,
Scotland; 1998.

Más contenido relacionado

Similar a Medico Legal Importance of Questioned Documents in Crime Investigation

CHAPTER-2-1 question documents examination
CHAPTER-2-1 question documents examinationCHAPTER-2-1 question documents examination
CHAPTER-2-1 question documents examination
AndalesMelbertG
 
Hand Writing and Documents Analysis
Hand Writing and Documents AnalysisHand Writing and Documents Analysis
Hand Writing and Documents Analysis
Bob Smullen
 

Similar a Medico Legal Importance of Questioned Documents in Crime Investigation (20)

PPT on Handwriting and Specimen Signature Forensics.pptx
PPT on Handwriting and Specimen Signature Forensics.pptxPPT on Handwriting and Specimen Signature Forensics.pptx
PPT on Handwriting and Specimen Signature Forensics.pptx
 
Forensic Examination of Signature
Forensic Examination of SignatureForensic Examination of Signature
Forensic Examination of Signature
 
CHAPTER-2-1 question documents examination
CHAPTER-2-1 question documents examinationCHAPTER-2-1 question documents examination
CHAPTER-2-1 question documents examination
 
Questioned Document.pptx
Questioned Document.pptxQuestioned Document.pptx
Questioned Document.pptx
 
Forensic examination of signature
Forensic examination of signatureForensic examination of signature
Forensic examination of signature
 
Handwriting and its Characteristics.pptx
Handwriting and its Characteristics.pptxHandwriting and its Characteristics.pptx
Handwriting and its Characteristics.pptx
 
3._Handwritten_Document_Examination.ppt
3._Handwritten_Document_Examination.ppt3._Handwritten_Document_Examination.ppt
3._Handwritten_Document_Examination.ppt
 
Presentation-Finals.pptx
Presentation-Finals.pptxPresentation-Finals.pptx
Presentation-Finals.pptx
 
Introduction to question documents.pptxt
Introduction to question documents.pptxtIntroduction to question documents.pptxt
Introduction to question documents.pptxt
 
Handwriting_analysis.ppt
Handwriting_analysis.pptHandwriting_analysis.ppt
Handwriting_analysis.ppt
 
forensic_document_analysis.ppt
forensic_document_analysis.pptforensic_document_analysis.ppt
forensic_document_analysis.ppt
 
Document_Analysis.ppt
Document_Analysis.pptDocument_Analysis.ppt
Document_Analysis.ppt
 
documents.pptx
documents.pptxdocuments.pptx
documents.pptx
 
Graf, document, dactil cp
Graf, document, dactil cpGraf, document, dactil cp
Graf, document, dactil cp
 
Handwriting and Document Examination
Handwriting and Document ExaminationHandwriting and Document Examination
Handwriting and Document Examination
 
Hand Writing and Documents Analysis
Hand Writing and Documents AnalysisHand Writing and Documents Analysis
Hand Writing and Documents Analysis
 
How handwriting communicates
How handwriting communicatesHow handwriting communicates
How handwriting communicates
 
Disguised writing
Disguised writingDisguised writing
Disguised writing
 
Secured Employee Attendance Management System Using Fingerprint
Secured Employee Attendance Management System Using FingerprintSecured Employee Attendance Management System Using Fingerprint
Secured Employee Attendance Management System Using Fingerprint
 
Presentation on FORENSIC DOCUMENT EXAMINATION.ppt
Presentation on FORENSIC DOCUMENT EXAMINATION.pptPresentation on FORENSIC DOCUMENT EXAMINATION.ppt
Presentation on FORENSIC DOCUMENT EXAMINATION.ppt
 

Más de ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 

Más de ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 

Último (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 

Medico Legal Importance of Questioned Documents in Crime Investigation

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD31013 | Volume – 4 | Issue – 4 | May-June 2020 Page 437 Medico Legal Importance of Questioned Documents in Crime Investigation Dr. Theju Kumar C Assistant Professor, Department of Criminology, Acharya Institute of Graduate Studies, Soladevanahalli, Bengaluru, Karnataka, India ABSTRACT Forensic handwriting examination has a new frontier: the digital signature in biometric modality that uses, for recognition purposes, the anatomic and behavioral characteristics that an individual exhibit when signing her/his name. Data such as the dynamically captured direction, stroke, distance, size, pressure and shape of an individual’s signature enable handwriting to be a reliable indicator of an indivudul’s identity. “Namirial” is an Italian company that created a biometric signature system named “GrafoCerta” (sure signature) that has a forensic sector particularly suitable for research. In this paper the researcher will try to explain the different characteristics of handwriting examination and examination of questioned document. KEYWORDS: Document, Characteristics, Handwriting, Forensic How to cite this paper: Dr. Theju Kumar C "Medico Legal Importance of Questioned Documents in Crime Investigation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-4, June 2020, pp.437-440, URL: www.ijtsrd.com/papers/ijtsrd31013.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) INTRODUCTION The examination of questioned documents covers many areas of investigation,includingverifyinghandwriting and signatures; authenticating documents; characterizing papers, pigments, and inks used in writing instruments and copying machines; restoring erased and obliterated writing; and even determining the relative age of documents and inks. Why would anyone be concerned about a piece of paper? Believeitornot,paperisinvolvedinmostcrimes—perhaps directly, as with a ransom note in a kidnapping or a forged signature on a check; perhaps indirectly, as with business records in a drug operation or a receipt for a car rental or medical prescription. The document examiner’s tools are the stereomicroscope, templates, protractors, grids, and other measurement devices. The examiner may use different types of light sources to detect forgeries, changes & obliterations. Questioned Document Questioned Documentcan be a handwriting,signature,mark or any handwritten/typewritten document whosereliability or source is doubtful. Questioned Document Examination generally involves handwriting examination in case of handwritten documents. Main Objectives of forensic questioned document is : 1. That an expert analyst individualize handwriting to a particular person(Suspect 2. What types of evidence are submitted to the document analyst (is it cross cheq, forgery document, wills, or etc) 3. How to characterize different types of paper 4. The types and impact of computer crime Characteristics of Hand writing: Handwriting is writing done by hand with a pen, pencil, digital stylus, or another instrument.Theart,skill,ormanner of handwriting is called penmanship. Handwriting in which successive letters are joined is called cursive script. Handwriting in which the letters are separated (as block letters) is called manuscript style or printing. Decorative handwriting (as well as the art of producing decorative handwriting) is called calligraphy. Analysis of Handwriting and Handprinting Uniqueness Each person has their own unique style of handwriting, whether it is everyday handwriting or their personal signature. Even identical twins who share appearance and genetics do not have the same handwriting. Theplacewhere one grows up and the first language onelearnsmelttogether IJTSRD31013
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31013 | Volume – 4 | Issue – 4 | May-June 2020 Page 438 with the different distribution of force and ways of shaping words to create a unique style of handwriting for each person. Characteristics of handwriting include: specific shape of letters, e.g. their roundness or sharpness regular or irregular spacing between letters the slope of the letters the rhythmic repetition of the elements or arrhythmia the pressure to the paper the average size of letters the thickness of letters There are many styles of handwriting, but they are categorized into three major types; cursive, print, and D'Nealian. Handwriting experts may be able to make a positive identificationifthere areenoughsamplesforexamination andenoughexemplarsagainstwhich to compare those samples. To determine whether a signature or writing sample is authentic,a documentexaminerwillgenerallyexamine12 characteristics: 1. Line quality: Arethelinessmooth,free-flowing, and rhythmic,orshaky, nervous,and wavering? 2. Spacing of words and letters: Examine the average amount of space between words and letters. Is the spacing consistent in the questioned and known documents? 3. Ratioofrelativeheight,width,andsizeofletters: What are the overall height, width, and size of the letters in both the known and questioned documents? Are they consistent? 4. Penliftsandseparations:Checkhowthewriter stopsto formnewlettersandbeginwords. Forgeries may have pen lifts or separations in unusual places, for instance within a single letter. 5. Connecting strokes: Compare how capital letters are connectedtolowercaselettersandhowstrokesconnect between letters and between words. 6. Beginning and ending strokes: Compare how the writer begins and ends a word, number, orletter. Are the strokes straight, curled, long, or short? Are they made on the upstroke or down stroke? 7. Unusual letter formation: Look for unusual letter formation; for instance, letters written backward, letterswithatail,orunusual capitals. 8. Shading or pen pressure: Individuals use different amountsofpressure with a pen or pencil, making the lines lighter or darker, narrower or wider. Check for pressureonthedownwardandupwardstrokes. 9. Slant:Doesthewritingslanttotheleftorright,orisit straight up and down? Are some letters consistently slantedmoreorlessthan others? 10. Baseline habits: Does the writing tend to follow a straight horizontal line, or move downward or upward?Isitaboveorbelowthebaseline? 11. Flourishes or embellishments: Are there any fancy letters,curls,loops, circles, double loops, orunderlines? 12. Placementofdiacritics: Checkthecrossingoft’sand dotting of i’s, j’s, or any other letters or punctuation marks. Is the cross on the t long in proportion to the stem? Is it located to the left or right of the stem? Are thei’sdottedaboveortothe rightor left of the stem? The examiner also looks for irregularities such as an awkwardorunnatural appearance or circle shapes made up of different strokes. There is wide variation in how people make their uppercase (capital) letters and the lowercaselettersy,j,g, andq. Methods of Forgery: The most common forgery is a signature. There are three types of forgery. One of the most common types, and probably the easiest to detect for a layperson, is a blind forgery,wheretheforgeruseshisorherown handwriting. The forger does not even try to copytheoriginalsignature, and may not even know what the signaturelooks like.This is usually the case in petition fraud and anonymous harassing subscriptions, as well as in many other civil and criminalcases.Investigatorshavethehighestsuccessratein identifying this type of forger. Copying a genuine signature by carefully drawing it is termed a simulated forgery. Often the forger practices the signature so much that he or she can avoid many of the hesitations and pen lifts usually seen in a forgery. Investigatorscandetectasimulated forgerybyidentifying theindividualmicroscopic handwriting traitsconsistently present in the known signatures but missing from the questioned signature. The forger is often unable to duplicate all the victim’s individual handwriting habits. This type of forgery canbeverydifficulttolinktoasuspect. A third type of forgery is a traced forgery, which can be donebytracingagenuinesignatureontoadocument using alightboxorsimilardevice.Forgersmayuseothermethods suchascarbonpaperorevenpressinghardover a genuine signature and then tracing theindentation. Stereomicroscopic examination can disclose this type of forgery, because the line quality may be inconsistent. Sometimesoblique lightingwillshowofftheindentations. Obliterations: Often documents are changed after they are prepared. Common methods include physically erasing with a rubber eraser or scraping the ink off the paper’s surface. Both methods disturb the upper layer of fibers or the paper’s coating; you can see these disturbances under the microscope in reflected oblique lighting. Many papers today are coated with optical brighteners that make the paper look very white when seen under UV light. Disturbing the coating may cause a darker area to appear. Forgers also use chemical methods to obliterate words. For example, a strong oxidizing agent such as chlorine or sodium hypochlorite can make ink become colorless. Examining the sample under a microscope or in UV or infrared (IR) light may reveal the alteration Indeed, use of alternate sources of lighting, that is, lamps or lasers with specificwavelengths,canbeapowerfulwayto showthedifferencesamong inksofthesamecolorbutwith differentcomposition.Investigatorshavesuccessfullyused infraredphotographytofinderasures,readcontent covered by intentional obliterations (crossing out), and even reconstruct writingfromcharreddocuments.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31013 | Volume – 4 | Issue – 4 | May-June 2020 Page 439 Digital image processing is becoming a more useful tool in making obliterated markings more visible through lightening, darkening, contrast, and filters. Indentations: Often an indented impression is left on paper beneath the primary writing because of the pressure of the writing utensil. Theseimpressions cansometimesbeusedtoforgea signature, but often they have also led to the arrest of criminals. The method we have all seen of rubbing the impression with a soft pencil is the worst thing to do. It doesn’t work very well and alters the evidence. Often, oblique lightingwillenhancetheindentations. Indentations also increase a paper’s capacity to hold an electrostatic charge. This property is used to “develop” imagesusinganelectrostaticdetection apparatus (ESDA). Pouring toner powder from a copy machine over a chargedsheetofplasticcoveringthepaperinquestioncan create an image of the impressions, which is then photographed. Individualizing Typing and Printing Whentypewriterswerecommonlyused,investigators could often individualize their printing by examining wear and defects in the typeface and misalignment of characters. The FBI maintains a library of makes and models of all manufactured typewriters as well as thousands of type fonts. Word processors and printers have largely replaced typewriters, yet there are still ways to trace and compare output. For example, color printers and photocopiers may add a pattern of minuscule yellow dots to the printout, encodingtheprinter’sserialnumber. Investigators can also sometimes compare copy machine output. Debris,grippermarks,platendefects,anddirtcanall contributetowhataretermed trashmarksoncopiesfroma copier.Thesemarkscanchangeovertime,sosometimesthe materialcanevenbedated. Paper Most modern paper is made from wood pulp. Some types of paper are manufactured mechanically,someare treated with chemicals, and some have additives, such as cotton fibers. Paper can be graded depending on the percentage of cotton fibers; from 25 to 50 percent cotton may be called bond paper. Mechanically produced wood pulp paper is used for newspapers. Special writing paper such as stationery is chemically treated with sodium sulfite. Shopping bags are treated with asulfatefor extrastrength. Some manufacturers include their own watermark design during the manufacturing processbyreducingthe number of fibers within a certain patterned area. The manufacturer can change the watermark and sometimes can use it to indicate when the paper was manufactured and even where the paper was sold. The forensic scientist may look at the following characteristicsto identifypaper: What raw material the paperis madefrom Color Density Watermarks Dyes orbleaches Fluorescence under ultravioletlight Thicknessasdetermined byusing a micrometer Inks: Investigators often compare inks by their composition. Sometimestheycan evenchemicallyestablishhowlongthe inkhasremainedonthepaper. Counterfeiting: Counterfeiting money is one of the oldest crimes known. It wasa seriousprobleminthe19thcentury,whenbanksissued their own currency. In 1863 the United States adopted a national currency, but counterfeiting was still extensive. In 1865 the U.S. Secret Service was established to suppress counterfeiting. Although counterfeiting has substantially decreased since the creation of the Secret Service, this crime continues to be a potential danger to the nation’s economy and citizens. Productionmethodsusedincounterfeitingoperationshave evolvedovertheyears COMPARISON OF QUESTIONED DOCUMENT: The Questioned Documents unit is responsible for determining the authenticity and/or authorship of documents. The examination can be a handwriting comparison; detection of alterations, obliterations, or indented writing; or discovery of the typewriter, printer, or fax machine that generated a document. The most common examination is comparison of handwriting or hand printing. Authorship of any type of document may come into question during an investigation Everyone has similarities intheirhandwriting;otherwise we wouldn't be able to read what each other writes. Although the following documents have a great deal of pictorial similarity, they were written by different people The forensic document examiner trains for 2 to 4 years in the study of handwriting and other document-related problems. It is the expert's responsibility to examine every element of a writing, including the minute details, and to look for both similarities and differences between known and questioned writing.Noticethesimilaritiesbetweenthe2 documents below:
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31013 | Volume – 4 | Issue – 4 | May-June 2020 Page 440 Given enough writing evidence, bothknownandquestioned, the forensic document examiner may be able to identify or eliminate a suspected writer of having prepared a questioned document. The examiner is often calledtotestify in court and present exhibits to demonstrate the opinion. Conclusion: The medico legal expert should visit the death scene before the autopsy if it is possible. Although, death investigation differs in different countries, there is always a crime scene investigation team with different branches. The study is about questioned document and medico legal importance of documents, inks, printer and etc.researcherdiscussedabout the medico legal importance of documents at criminal investigation, it is very much important to know about document types before going to analyses of any documents, inks and printer, so in this paper the researcher studied about obliteration, indentation, individualizing typing and printing, papers, ink and counterfeiting and also studied important characteristics of document examination. Reference: [1] American Society of Questioned Document Examiners, 3(2), 57-65. Huber, R., & Headrick, A.(1999). Handwriting Identification: Facts and Fundamentals. CRC Press LLC, Boca Raton, FL. [2] Clark SC (1999) Death Investigation: A Guide for the Scene Investigator. National Institute of Justice, Washington, USA. [3] Horswell J (2005a) Major incident scene management In: Encyclopedia of Forensic and Legal Medicine. In Payne James J, Byard R, Corey T, Henderson C (Eds.), Academic Press, London, UK, pp.12-20. [4] Lee HC, Palmback T, Miller MT (2000) Henry Lee’s Crime Scene Handbook. Academic Press, California, USA. [5] Linton MOHAMMED, Bryan FOUND, Michael CALIGIURI, Doug ROGERS (2009) Pen Pressure as a Discriminatory Feature between Genuine and Forged Signatures, Proceedings of IGS 2009 [6] Miller MT (2003) Crime scene investigation In: Forensic Science: An Introduction to Scientific and Investigative Techniques. In James SH, Nordby JJ, Florida (Eds.), USA, pp. 115-135. [7] M.R. Hecker, Treatise on the Scientific Foundation of Forensic Handwriting Comparison, published by Kolonia Ltd; 2000. [8] UK, Forensic Science Service, EVETT: Forensic HandwritingComparison,ProbabilityandtheNatureof the Science, ***given at 10 th ECPGHE (Joint Meeting of the European Conferences for Police and Government Handwriting and Documents Experts), Tulliallan, Scotland; 1998.