Course Content
SECTION 2: Fraud Investigations and Legal Issues
0/44
Section 2: Fraud Investigations and Legal Issues 2026

Collecting Evidence in Fraud Examination

The collection of evidence is crucial to prove or disprove fraud. It involves various methods such as obtaining consent, conducting interviews, reviewing records, searching offices, seizing digital devices, and surveillance. While detailed procedures for interviews and digital device evidence are covered elsewhere, this chapter focuses on documentary evidence collection and analysis.

Key Topics for Exam Preparation

  1. Types of Evidence
  • Understand the categories and significance of evidence.
  1. General Rules for Collecting Documents
  • Follow proper protocols to ensure evidence is admissible.
  1. Obtaining Documentary Evidence
  • Employ lawful methods to collect documents critical for fraud analysis.
  1. Examining Fraudulent Documents
  • Analyze documents for signs of tampering, forgery, or manipulation.
  1. Handling Documents as Physical Evidence
  • Properly handle and store physical evidence to prevent contamination or loss.
  1. Identifying Writings
  • Study handwriting, typewritten, and printed documents for fraud indicators.
  1. The Document Expert’s Findings
  • Rely on document examiners for professional assessments.
  1. How to Obtain Handwriting Samples
  • Collect and utilize handwriting samples without violating any legal protocols.
  1. Typewriters and Computer Printers
  • Analyze evidence from typewriters and printers for authenticity.
  1. Photocopies
  • Differentiate between original documents and photocopied forgeries.
  1. Dating a Document
  • Techniques to determine when a document was created or altered.
  1. Indented Writings
  • Examine impressions left on paper for hidden information.
  1. Counterfeit Printed Documents
  • Spot and evaluate counterfeit documents and fraudulent printing.
  1. Fingerprints
  • Use fingerprints as a means of verifying document handlers.
  1. Disposal of Evidence
  • Handle the proper disposal of evidence as per legal and procedural guidelines.

Pro-Tips for Study

  • Focus on procedural integrity (e.g., chain of custody).
  • Understand legal implications of evidence handling.
  • Be aware of technological tools used for analyzing documents.

This condensed outline will help you focus your studies. Let me know if you need further elaboration on any section!

Key Points for Exam Preparation: Fraud Examination and Evidence Collection

Types of Evidence

  1. Testimonial Evidence:
    • Statements from witnesses, third parties, and suspects during interviews or trials.
    • Detailed coverage in “Interview Theory and Application” and “Interviewing Suspects and Signed Statements” .
  2. Digital Evidence:
    • Information stored electronically on devices like hard drives and flash drives.
    • Covered in chapters on “Digital Forensics” and “Data Analysis and Reporting Tools” .
  3. Documentary Evidence:
    • Records proving or disproving facts of a fraud case (e.g., checks, invoices, financial records).
    • Must be relevant, preserved, and properly presented. Excess or irrelevant documents may harm the case .

Key Rules for Documentary Evidence

  • Ensure inclusion of all relevant documents.
  • Exclude irrelevant materials to avoid confusing judges or juries.
  • Witnesses’ testimonies often outweigh the weight of documents, as over-focusing on documents might bore or confuse fact finders .

Evidence Collection and Handling

  • Collecting evidence involves planning and following strict procedures to preserve its integrity.
  • Handling of documents includes retaining originality, documenting processes, and avoiding contamination.
  • Includes specialized methods such as handwriting analysis, counterfeit detection, and dating documents .

Additional Resources for Fraud Examiners

  • Key chapters: “Digital Forensics,” “Tracing Illicit Transactions,” and “Report Writing.”
  • Investigative tools: expert document examination, covert operations, and data analysis techniques .

By focusing on these areas, fraud examiners can ensure evidence is collected, preserved, and presented effectively in fraud investigations.

General Rules for Collecting Documents

When collecting documents as evidence for a fraud examination, it’s crucial to follow proper procedures to ensure they are accepted and given proper consideration by the court. The evidence must meet specific standards: it should be relevant, material, and authentic.

Since the relevance of certain documents may not be clear at the initial stages of an investigation, all potentially relevant documents should be obtained. Unused documents can always be returned later. To handle documents properly, follow these general rules:

  1. Prioritize Original Documents:
    • Whenever possible, obtain the original versions of documents.
    • Create working copies of the documents for examination and review purposes.
    • Keep the original documents securely stored and separate from copies.
  2. Handle Originals with Care:
    • Minimize handling of original documents to avoid altering or damaging them.
    • Originals may undergo forensic analysis, so it’s essential to preserve their condition.
  3. Implement a Reliable Filing System:
    • Use a well-organized and dependable filing system, particularly when managing a large volume of documents.
    • Losing important documents can harm the investigation and weaken the case.
    • Stamp or mark working copies with sequential numbers for easy tracking and reference.

By adhering to these rules, investigators can ensure the integrity and organization of the documents and strengthen their case in legal proceedings.

Key Points for Exam Preparation

Obtaining Documentary Evidence

  1. Preferred Method: Obtain evidence by consent when possible.
    • Consent can be oral but should be written for adverse witnesses or examination targets .
    • Sample consent forms are provided in the “Additional Resources” of the Fraud Examiners Manual .
  2. Without Consent:
    • Investigators may use subpoenas or court orders when evidence is controlled by third parties or located in uncontrolled spaces .
    • Attempting to acquire evidence through other means (e.g., trespass) may lead to legal consequences such as theft charges .
  3. Special Considerations:
    • Specific evidence, like bank records, requires written consent from the subject unless obtained via legal action .

Types of Admissible Evidence

  1. Direct Evidence:
    • Evidence that directly proves facts (prima facie) without the need for inference .
    • Example: A check from a vendor to the suspect that doesn’t align with a legitimate invoice .
  2. Circumstantial Evidence:
    • Evidence that indirectly proves or disproves facts through inference .
    • Example: Unexplained cash deposits during suspicious transactions .

Organizing Evidence in Fraud Examinations

  1. Segregation:
    • Organize documents by witness or transaction—not chronologically, which complicates searches .
  2. Key Document File:
    • Maintain a separate file with critical documents for quick access .
    • Periodically review the file, moving less important documents to backups .
  3. Database Setup:
    • Create a document-tracking database with fields such as:
      • Document date
      • Source
      • Date obtained
      • Brief description
      • Associated subject .
  1. Chronology of Events:
    • Establish and update a brief timeline of events to outline the chain of proof.
    • Use this for case analysis and report preparation .
  2. Investigation Checklist:
    • Maintain an updated checklist for investigation objectives, focusing on both long-term (e.g., proving case elements) and short-term goals (e.g., conducting interviews) .

By applying these methods, fraud examiners can ensure the effective collection, classification, and utilization of evidence throughout an investigation.

Key Points for Exam Preparation: Fraudulent Documents and Forensic Examinations

Understanding Fraudulent Documents

  • Fraudulent documents include forged, altered, fabricated, or suspicious documents commonly used in fraud .
  • These documents can provide evidence regarding the commission, scope, and perpetrators of fraud .

Role of Fraud Examiners

  • Fraud examiners are not document experts but must spot counterfeit documents and understand forensic examination capabilities and limitations .

Types of Forensic Document Examinations

Forensic examinations provide insights into document authenticity and can involve the following :

  • Signatures and Handwriting:
    • Detecting forged signatures and identifying writers of handwriting or hand printing.
  • Document Alterations:
    • Detecting altered documents, inserted text, or erased/eradicated information.
  • Document Dating:
    • Determining when or if a document was created.
  • Printed and Typed Documents:
    • Examining typewritten, printed, or photocopied documents and identifying the source machine.
  • Paper and Ink Analysis:
    • Comparing paper, ink, folds, tears, or charred remains.
  • Seals and Stamps:
    • Identifying and detecting alterations to notary seals, wax seals, cachets, and rubber stamps.
  • Adhesive Analysis:
    • Detecting resealed documents or tampering.

Importance of Consulting Forensic Experts

  • Investigation Assistance:
    • Experts aid in developing fraud theories (e.g., who, what, when) and corroborating or refuting witness or suspect statements .
    • Early consultation can identify fraud methods, eliminate suspects, and narrow investigation focus .
  • Leverage in Interrogation:
    • Expert findings strengthen interview tactics with suspects, potentially leading to admissions of guilt .
  • Trial Preparation:
    • Experts can testify in court to validate evidence from document analysis .
  • Intent Proof:
    • Handwriting analysis can demonstrate intentionality or willfulness, supporting fraud prosecutions .

Summary

Fraud investigations often rely on forensic document analysis to uncover or confirm fraudulent activities. Early involvement of experts can enhance the investigation’s effectiveness and build stronger cases against perpetrators .

Key Points for Exam Preparation on Document Handling and Forensic Examination:

Handling Documents as Physical Evidence

  • Treat documents as physical evidence, not just information sources.
  • Store originals in sealed, initialed, and dated paper folders or envelopes to avoid damage or contamination. Do not use transparent plastic envelopes as documents might stick to them .
  • Avoid folding, stapling, crumpling, or marking original documents. If necessary, create a working copy for use .

Marking Evidence for Identification

  • Evidence should be marked with initials and the date, preferably in a noncritical area. Use a different instrument (e.g., pen type) from the one used on the document .
  • If marking the document could cause damage, place it in an acid-free, sealable envelope that is marked beforehand .

Chain of Custody

  • Maintain a clear, documented chain of custody to verify evidence authenticity and prevent tampering .
  • Record details such as:
    • Items received
    • When and from whom they were received
    • Where they are stored
    • Transfers of possession, each documented with a memo .
  • For original business records, consider using small, unobtrusive marks or unique identifiers if direct marking is not practical .

Preserving Fingerprints

  • Handle documents with gloves when fingerprint examination is anticipated. Avoid using tweezers, which might leave indentations .
  • Provide names and ink fingerprints of individuals who handled the document previously for elimination purposes .

Handling Charred or Burned Documents

  • These documents require expert handling due to fragility. For immediate collection:
    • Use a crush-proof container with layers of cotton to cushion fragments.
    • Place fragments gently inside, seal the container, and mark it as fragile .

Recognizing Counterfeit Documents

  • Fraud indicators can include signature irregularities, substituted pages, ink differences, or signs of tampering.
  • Techniques for detection:
    • Hold documents to a bright light for differences in paper density, opacity, or fiber patterns.
    • Examine ink alterations and indented writings with specific lighting angles .
  • Counterfeit printed documents (e.g., checks, certificates) may be identified via side-by-side comparisons with genuine samples .

Tools and Methods in Forensic Document Analysis

  • Forensic examiners use scientific techniques and specialized instruments, such as microscopes, ultraviolet/infrared lighting, and chemical analysis, to examine handwriting, typescripts, and document modifications .

Key Points for Exam Preparation:

  1. Handwriting Characteristics:
    • Handwriting includes unique personal characteristics and shared class characteristics ().
    • Writing styles vary based on physical/mental abilities, age, education, and personal/professional use ().
  2. Forensic Document Examiners:
    • Experts trained to analyze individual/class handwriting characteristics to identify or exclude authorship ().
  3. Class Characteristics:
    • Similarities in handwriting may arise due to standardized copybook systems taught in schools or professions ().
    • Handwriting from individuals taught in similar systems might appear alike but can contain differences ().
  4. Imitator Styles:
    • People may adopt handwriting styles from teachers, parents, or peers, especially in adolescence. Such styles often change with maturity ( ).
  5. Natural Variations:
    • No one writes identical signatures twice due to natural variation. Multiple examples are needed to determine if a questioned writing is within this range ().
    • Identical signatures are likely forgeries, often traced ().
  6. Disguise:
    • Intentionally altering handwriting to conceal identity (e.g., changing slant, size, or style) ().
    • Disguises can make identification challenging when limited samples are available ().
  7. Distortions:
    • Unintentional changes in handwriting caused by illness, injury, substance abuse, aging, or unusual writing environments ().
    • Severe distortions may render identification impossible ().
  8. Forgeries:
    • Defined as writings intended to deceive or defraud ().
    • Simulated/Traced Forgeries: Created by copying or tracing genuine signatures ().
      • Identical signatures suggest tracing. Ink traces or indentations may link forged and genuine documents ().
    • Freehand Forgeries: Created without knowing the genuine signature’s appearance. These can often be tied to the forger ().
    • Autoforgeries: Genuine signatures written in a distorted manner, allowing denial of authorship later ().

Focus on identifying class and individual characteristics, understanding variations versus distortions, and applying principles to detect forgeries effectively.

The Document Expert’s Findings: Summary for Study

  1. Limitations of Handwriting Analysis
    • A forensic document examiner cannot determinea writer’s:
      • Age
      • Sex
      • Race
      • Physical or mental condition
      • Personality or character
      • Which hand (left or right) was used.
    • These conclusions are impossible in handwriting analysis, regardless of claims.
  2. Outcomes of Handwriting Comparisons
    Forensic handwriting analysis typically results in one of three conclusions:
  3. Non-Identification
    • The suspected person did notwrite the questioned signature or document.
  1. Identification
  • The suspected person didwrite the questioned signature or document.
  1. Inconclusive
  • It’s not possible to definitively concludewhether the suspected person wrote or did not write the questioned document.
    • Reasons could include:
      • Insufficient or inadequate handwriting samplesfor analysis.
      • Photocopieswere provided instead of the original document.
  1. Inconclusive Results: Additional Information
    • Even with inconclusive findings, some writings might:
      • Display common characteristicssuggesting possible authorship.
      • Show differencessuggesting the person might not have written the questioned document.
    • The expert may suggest additional leadsto help fraud investigators address inconclusive results.

This summary emphasizes critical points, helping simplify the information for exam preparation.

Key Points for Exam Preparation: Handwriting Sample Collection and Analysis

Types of Writing Standards

  1. Non-Dictated Writing Samples
    • Written during the normal course of business; reflects natural writing habits.
    • Example sources: canceled checks, signed documents, applications, or other writings authenticated by witnesses or routine activities .
    • Key Criteria:
      • Must be contemporaneous to the evidence document’s date.
      • Should contain the same letters, combinations of letters, and type of writing (e.g., hand-printed, handwritten, capitalized/lowercase) as the evidence .
  1. Dictated Writing Samples
    • Obtained at the request of the fraud examiner, typically during an interview .
    • Can be obtained voluntarily or through a court order. The court order should specify writing must be in normal handwriting and adequate for examination .

Methods for Collecting Dictated Samples

  • Use writing materials similar to those in the evidence (e.g., pen type, paper type) .
  • Begin with innocuous text (e.g., name, date, voluntary statement to aid court admission) .
  • Patiently dictate text containing the same letters/combinations as the evidence. Do not assist suspect in spelling, punctuation, or grammar .
  • Collect multiple samples to display suspect’s range of normal variation. Use separate sheets and remove finished samples from view before starting a new one .

Precautions During Dictation

  • Suspect should not see the evidence documents before or during the process .
  • Be alert for attempts to disguise writing (e.g., exaggerated slant, unusual letter formations) .

Preparation for Collecting Samples

  • Fraud examiners must prepare thoroughly before the interview, ensuring all materials and evidence copies are on hand .
  • Avoid rushing the process; allow breaks if necessary .

Summary

Effective handwriting analysis depends on collecting authentic, comparable, and sufficiently contemporaneous samples to the evidence. Non-dictated and dictated writing samples serve distinct purposes and must align closely with the questioned documents for valid comparison. Proper collection techniques and vigilance for disguised writing are crucial throughout the process .

Typewriters and Computer Printers: Key Points for Study

Typewriters

  • Older Models:
    • Documents from traditional typebaror segment-shift typewriters (manual and electric) can often be positively identified by experts.
    • Identification is based on mechanical defectsunique to each machine.
  • Later Models:
    • Typewriters with interchangeable elements(e.g., daisy wheels, ball, or basket-type elements) are much harder, or nearly impossible, to identify.

Computer Printers

  • Identification Challenges:
    • Documents from inkjetor laser printers are harder to trace to the exact source.
    • Experts can often only determine similarities, such as:
      • Typeface (font)
      • Font size
      • Letter spacing
      • Print process used.
    • Yellow Dot Tracking:
      • Many laser printersprint microscopic yellow dots on all documents.
      • These dots encode:
        • Printer’s serial number
        • Time and date of printing.
      • Yellow dots can be viewed using:
        • microscope.
        • Blue light(yellow dots appear black under this light).
      • Only some law enforcement agencies can decodethese marks, primarily used to combat counterfeiting.
    • Other Identifications:
      • Some color printersembed an identification number in printouts.
      • Printer-specific features (e.g., paper-feeding mechanisms) may create minor variationsthat help identify a specific printer.

This revised summary highlights the essential points for study and exam preparation.

Key Points for Exam Preparation: Photocopies and Examination

Photocopies as Evidence

  • Definition: A photocopy is a paper copy of a document or image. It may serve as the “original” record if the actual document is unavailable.
  • Limitations: Document examiners cannot detect certain features (e.g., indentations, erasures) from photocopies compared to originals. When possible, original documents should be submitted and handled with chain-of-custody protocols.

Photocopier Characteristics & Identification

  • Admissibility in Court: Photocopies are recognized as evidence in cases such as anonymous letters, unauthorized disclosures, and counterfeit documents.
  • Identifying Machines: Experts can determine the type of machine used to produce a copy by analyzing:
    • Markings: Minute, unique features like specks, spots, streaks, or edge markings.
    • Trash Marks: Identifiable patterns from imperfections, categorized as permanent or transient.

Types of Trash Marks

  1. Permanent Trash Marks:
    • Caused by deep scratches or imperfections in fixed parts of the copier (e.g., glass surface).
    • Persist until repairs or replacements are made.
  2. Transient Trash Marks:
    • Caused by dirt, smudges, or loose debris.
    • Temporary and vanish after cleaning.

Photocopier Sample Preparation

  1. Create six blank copiesfrom the copier’s glass surface and number them sequentially. These copies capture all trash marks, including internal printing elements.
  2. Copy a calibrated measuring device(e.g., ruler) to determine the copier’s reduction/enlargement standard. Include the measurements and initial/number the copies.
  3. Copy a sample documentcontaining typewritten and handwritten text and repeat the above steps.
  4. Place all samples in a sturdy envelope, label with machine details (make, model, location), and seal before submission.

Usage of Photocopier Analysis

  • Identifying specific machines based on unique markings.
  • Estimating the approximate timing of document creation based on transient trash marks.

This concise summary emphasizes key concepts, methods, and the investigatory process for exam scenarios.

Key Points for Exam Preparation on Document Forgery and Authentication:

Document Dating and Backdating

  • Backdating: The act of assigning an earlier date to a document than its actual creation date, often for deceptive purposes .
  • Fraud examiners may question the genuineness of documents during investigations and use forensic analyses to detect backdating .

Common Types of Forged Documents

  1. Alibi Documents:
    • Created to benefit a suspect by contradicting evidence or providing a fabricated defense.
    • Often appear late in investigations and are fraudulent .
  2. Long-Lost Wills:
    • Newly “discovered” wills often supersede earlier versions.
    • Typically fabricated to benefit the person who “finds” them, often using cut-and-paste methods .
  3. Historical and Collectible Documents:
    • Counterfeit items include forged autographs, counterfeit first-edition books, and fake historical documents (e.g., “Hitler Diaries”).
    • These can involve the backdating of items to add false historical significance .

Techniques for Document Authentication

  • Experts detect forged or backdated materials by examining:
    1. Inks: Analyzing composition and comparing to ink standards maintained by forensic labs like the U.S. Secret Service .
    2. Typewriters: Identifying typewriter models and production dates from reference collections .
    3. Paper: Inspecting paper properties (e.g., watermarks) to determine manufacturer and production dates .
    4. Photocopy/Fax Machines: Comparing questioned copies to known examples from specific machines .
  • Limitations: Current methods cannot reliably determine how long ink, toner, or typewriter impressions have been on a document .

Identifying Anachronisms

  • Anachronisms: Elements in a document that could not have existed at the claimed time of creation (e.g., future dates, modern language).
  • Methods:
    • Historical and linguistic analysis (e.g., detecting out-of-place words, idioms, or syntax using tools like etymology databases) .
    • Materials analysis to disprove the claimed age of a document .

Fraud Examiner Knowledge

  • Fraud examiners should understand forensic methods for document authentication, their limitations, and when to involve experts .

Study Notes: Indented Writings

Definition

  • Indented Writing: Impressions left by a writing instrument on sheets of paper belowthe original written page.
  • Can be key evidence for fraud investigations.

Detecting Indented Writing for Fraud Investigation

  1. Indented writings are often found in situations where documents are kept in multi-page sets (e.g., legal forms, notebooks, pads).
  2. Signals for Suspicion:
    • Absenceof expected indentations on following sheets (may indicate missing or altered pages).
    • Unexplainedindentations not matching the text on the visible page (could hint at page substitution).

Developing Indented Writings

  • Avoid These Methods:
    • Shading or scratching the paper surface with a pencil.
      • Reason: This only reveals deep indentations, destroys faint ones, and might ruin the document for expert analysis.
    • Applying liquids to the document.
      • Reason: Liquids may damage the document and prevent further technical analysis.
    • Oblique-Lighting Method:
      1. Use subdued lighting and place the document on a flat surface.
      2. Shine a bright light (e.g., flashlight) at a low oblique angle(parallel to the surface).
      3. Move the light around to reveal shadows forming text in the indentations.

Expert Techniques

  • Use forensic document examination for advanced analysis:
    • Electrostatic Detection Apparatus (ESDA): Detect faint indentations and permanently record them.
    • Other Methods: Special lighting and photographic techniques.
  • These methods uncover indentations not visible with simple oblique lighting.

Key Takeaways

  1. Indented writings can confirm altered or missing pages in fraud cases.
  2. Never use crude methods (pencil shading or liquids) on original documents.
  3. Oblique lighting is a simple technique but may miss faint writings—rely on experts for advanced analysis.

Here’s a condensed version of the passage for exam preparation:

Counterfeit Printed Documents

Types of Counterfeited Documents:

  • Monetary Value Documents:Currency, bank checks, traveler’s checks, money orders, bonds, postage stamps, gift certificates, lottery tickets.
  • Identity Documents:Passports, birth certificates, driver’s licenses, ID cards.
  • Other Examples:Product labels, business forms and logos, motor vehicle titles, and safety inspection stickers.

Despite preventive efforts, any document with value can be counterfeited. Counterfeiting is especially common in developing countries with advanced printing technology.

Counterfeiting Methods

  • Traditional methods using engraved printing plates are obsolete.
  • Current methods rely on photo-reproduction processes:
    • Lithography (photo-offset)and flexography create counterfeit copies from retouched negatives of genuine documents.
  • Technology-based methods: Sophisticated scanners, graphic design software, color printers, and photocopiers allow untrained individuals to produce high-quality counterfeits.

Detecting Counterfeits

Key strategies for detecting fakes:

  1. Side-by-Side Comparisons:Compare suspected counterfeit with a genuine document.
    • Check for differences in:
      • Ink color and brightness
      • Paper materials (texture, thickness, appearance)
      • Fonts and type sizes
      • Retouched areas (e.g., where text or numbers overlap designs).
  1. Forensic Examinations:
    • Analyze printing processes, ink, and paper types.
    • Reconstruct text or serial numbers removed during retouching to locate the original document.
    • Use fingerprints from the original document to trace counterfeiters.

By using these methods, fraud examiners can locate original documents, trace their history, and potentially identify counterfeiters.

This summary simplifies the concepts while maintaining crucial details for study purposes.

Key Points on Fingerprints:

Types of Fingerprints

  • Latent fingerprints: Invisible; formed by oils, salts, and amino acids from the skin. Transferred to surfaces via body contact ().
  • Patent fingerprints: Visible; formed by substances like blood, paint, or soil ().

Preservation of Fingerprints

  • Latent fingerprintson porous surfaces (e.g., paper):
    • Do not dust or alter them ().
    • Store in labeled, sealable, acid-free containers (e.g., paper envelopes) to prevent acid damage or condensation ( ).
    • Label the container with initials, date, location of collection, and exhibit number ().
  • Latent fingerprintson nonporous surfaces (e.g., metal, glass):
    • Can be dusted using special fingerprint powders ().
    • Use adhesive lifting tape for removal, and store on an index card with proper labeling ().
    • For fragile prints or surfaces where dusting might fail, retain the item in a protective container and consult fingerprint experts ().

Examination Methods

  • Porous surfaces: Techniques like iodine fuming, ninhydrin spraying, or silver nitrate can reveal prints but may permanently discolor documents ().
  • Nonporous surfaces: Experts may use techniques like cyanoacrylate fuming or lasers for challenging materials ().

Fingerprint Comparison and Legal Considerations

  • Repositories: Many fingerprints are stored in law enforcement databases, but millions of people remain unregistered ().
  • Legal action: Obtaining inked fingerprints from suspects who haven’t been fingerprinted may require a court order ().
  • Ensure all individuals who handled an item of evidence provide inked fingerprints for comparison purposes ().

Handling Guidelines

  • Use protective glovesor tweezers to avoid smudges or contamination ().
  • Do not use tweezers on documents intended for other forensic examinations like indented writing ().
  • Consider environmental risks like insects and moisture during storage ().

This summary condenses key definitions, procedures, and considerations relating to fingerprint examination and preservation for exam preparation.

Disposal of Evidence

After completing an investigation or examination, fraud examiners may need to manage the disposal of evidence gathered during the engagement. Proper disposal procedures are often guided by organizational policies, but not all organizations have such policies in place. Even if such policies exist, specific circumstances surrounding the engagement may need to be considered when deciding how to dispose of evidence. The following factors can influence evidence disposal at the conclusion of a fraud investigation or examination:

  1. Personal Information:The evidence might contain sensitive information about suspects or witnesses.
  2. Jurisdictional Regulations:Legal or regulatory requirements in the jurisdiction may dictate how evidence is handled or disposed of.
  3. Likelihood of Future Litigation:If there is potential for related legal action, evidence may need to be retained for possible use.
  4. Organizational Policies:Internal protocols for disposing of sensitive information could provide guidance.
  5. Document Retention Policies:The organization’s general rules for retaining documents and records may come into play.
  6. Litigation Holds:If a litigation hold is in effect, evidence must not be destroyed until the hold is lifted.

These factors may require evidence to be retained, disposed of, or returned to its rightful owner in a particular manner. Fraud examiners must ensure compliance with all applicable legal, organizational, and regulatory requirements before taking any action regarding evidence disposal.

Sources for Expert Document Examinations

There are two main sources for expert document examination:

  1. Law Enforcement Laboratories
    • Used in cases where criminal prosecutions are anticipated.
    • Access is often limited by jurisdiction and dependent on the relationship between the fraud examiner and the agency.
  2. Forensic Document Experts in Private Practice
    • Some jurisdictions maintain lists of qualified forensic document examiners.
      • United States: Contact the American Board of Forensic Document Examiners (ABFDE).
      • United Kingdom: Seek assistance from the British Academy of Forensic Sciences (BAFS).
      • Other Regions: The Association of Forensic Document Examiners (AFDE) has members in select South American, Asian, and African countries.

 

 

 

 

 

 

0% Complete