CRIMES WITHOUT A
CORPSE
UNIT OVERVIEW: This unit will introduce crimes without corpses. Some of these crimes include art forgery, currency forgery, music piracy, environmental crime, cyber crime, and questioned documents. Each individual crime will be discussed and the forensic approach to solving the crimes. The Student will build a “Forensic Science Kit” from the list of common materials provided.
DIRECTIONS: Read the unit material, look at the illustrations, access the suggested web sites, and complete the unit experiment. Answer the questions at the end of the unit.
FORENSIC SCIENCE |
|
|
|
|
|
|
|
|
|
Key Terms |
||
art forgery |
currency forgery |
counterfeit |
UV lights |
music piracy |
cyber crime |
Cyber criminals |
white-collar crime |
computer |
deleting |
standards |
requested standard |
trademarks |
oblique |
freehand simulation |
questioned document |
over-writing |
disguised writing |
non-requested standards |
watermark |
indented writing |
National Fraudulent Check File |
ESDA |
chemical fingerprinting |
Bank Robbery Note File |
FISH |
|
Anonymous Letter File |
TLC |
|
microspectrophotometry |
|
|
Crimes without
Corpses
The headlines are full of crimes of murder, but crimes without corpses are more prevalent. What do we mean by crimes without corpses? Those types of crimes might include art forgery, currency forgery, cyber crime, environmental crime, and document forgery. These types of crimes are dominated by greed, rather than anger and violence. These crimes are have sophisticated offenders and demand more inventive solutions by law enforcement and forensic investigators.
Art
Forgery
Art forgery is not a common crime; however, it has been around for centuries and baffled investigators for almost as long. Art forgery is the crime of falsely making or altering artwork. In order to detect forgeries, art collectors and museum curators rely on forensic scientists to analyze works of art. Forensic scientists can analyze art work through various methods which will be discussed later.
Art forgers often study the works of the original artist so that they are able to learn about the country of origin, the pigments used (natural or artificial), and the artist’s style. A tremendous amount of work goes into art forgery. The forger attempts to match the pigment composition and attempts to use the same brushstrokes as the original artist. Not all art forgeries are paintings. Some are other forms of media such as metals and ceramics. Ceramics are hard to copy because they are labor intensive to reproduce as well as difficult to obtain the clay from the same source as the original.
It always becomes necessary to undertake a careful scientific evaluation of the artwork before deciding on what and how the testing will be carried out. Forensic scientists use many methods to detect fakes. Some of the methods would include x-rays, analyzing fingerprints and palm prints left on a surface, UV light (black light), gas chromatography and gel electrophoresis. Each type of art object and forensic test presents its own challenges, but a thorough investigation can help to determine if the artwork is genuine or not. Just in recent years, it has become realistic to use forensic science testing and the availability of non-destructive techniques to analyze artwork and separate the original from the fraud.
One of the most well-known modern forgers was Tom Keating who claimed to have painted more than 2,000 works by great artists. However, it was not a forgery of one of the great artists, but that of a lesser-known English artist, that contributed to his arrest. In the question and answer section of this unit, you will have the opportunity to research some famous art forgeries and answer questions about them. Check out the following web site about art forgery:
https://www.futurelearn.com/courses/art-crime/0/steps/11884
Suggested readings on art forgery:
“Artful Dodgers” by Walter C. McCrone, The Sciences, January 2001
“Crime Science: How Investigators Use Science to Track Down the Bad Guys” by Vivien Bowers. Owl Books, 1997.
Currency
Forgery
The crime of currency forgery, or counterfeiting, is as old as money itself. Counterfeit money describes an imitation (made with the intent to defraud) of coins, paper money, or evidence of governmental obligations. Throughout the centuries it has continued to be difficult to detect, and still continues to be so today. As forensic investigators improve their methods of detection and prevention, the criminals search for easier targets, e.g., credit card fraud, identity theft, music piracy, and trademark infringement.
Most counterfeiters are organized criminals who use multi-million-dollar printing plants to produce currency copies that are convincing to the general public. These people select their targets with careful planning. They seek currencies that have a wide international circulation, because these notes are quite easy to pass off outside the issuing country. Probably the most widely copied of all currencies is the U.S. dollar bill.
Counterfeit coins are not copied today to defraud banks, but to cheat coin collectors. This has become a big business.
In the past, banknotes were issued by having elaborate engraved designs that included hard-to-duplicate watermarking, sequential numbering, and even metal threads. Once high-quality printers became widely available, further steps were necessary to stop the forgers. Today’s bank notes have new and improved safeguards to stop the forgery of currency. These safeguards include words that only appear when the note is heated by a copier lamp, color-changing ink that turns from green to black when the note is turned over, print that is only visible when viewed through a magnifying glass, machine readable bar codes, shimmering ink, and holograms. The look and feel of the bill, the watermark, and the security thread are the most reliable ways of verifying notes at the cash register which is the front line defense. Less reliable, but popular way of detecting fraud, is the UV light and iodine pens. These will detect florescent brighteners and starch, which are not used in genuine banknote paper. For more information on currency and currency forgeries, visit the following site:
https://quizlet.com/69540596/forensics-counterfeit-flash-cards/
To track down the currency forgers, investigators search for clues that are found in the paper type, printing techniques and the variety of ink used. All paper banknotes are now printed on high-quality stock that is impossible to mass duplicate economically. Substituted paper forms can be detected using a microscope, while UV lights (ultraviolet) can show the metal security threads in the true banknotes. X-rays are used to show watermarks and make them clearer. The laser and inkjet printers used to copy notes are easily detected when compared to the high quality methods used on the authentic banknotes. Chemical analysis of the ink can be traced back to the counterfeiters by suing a computer database that can match the characteristics of the ink.
Most criminal use of plastic cards such as credit cards and debit cards, involves fraud rather than counterfeiting; however, we will discuss it in this section of the unit. Card theft is becoming a big business with thieves. In most cases, the cards are stolen rather than copied. But being able to duplicate a card is not difficult, if the criminal gains access to genuine account details used to encode the magnetic stripe on the back. In fact, it is much easier to copy credit cards than it is to copy currency, due to the fact that there are so many different card designs. As long as the data contained in the magnetic strip is correct and the card looks like the real thing, a merchant will not suspect anything. When investigators look at these cards for fraud, they look for common identifying characteristics, such as defects used in the embossing process used to raise the numerals, details of the signature strip, the hologram, and the PVC overlays that cover the card’s white core.
Copyrights
and Trademarks
When we discuss crimes without corpses, we cannot forget about copyright and trademark infringement. Believe it or not, faked products make up an unbelievable one-tenth of all world trade. Music piracy is a huge problem for music companies. In fact, it is so huge that the federal government has enacted legislation to stop this crime. The government has committed to protecting musicians, songwriters, record labels, and the music they work so hard to create. Given the growing sophistication of today’s music piracy trade, taking the profit out of crime is now more important than ever.
Some other types of copyright and trademark infringement include, but are not limited to, computer games, jewelry, and perfumes.
Cyber Crime
Cyber crime, or crime committed using the computer, is a big business in today’s world. It includes :
In fact, criminals using the computer to perpetrate crimes are commonly referred to as cyber criminals. Cyber crime is often referred to as a white-collar crime. A white-collar crime is a nonviolent crime committed by an individual or a corporation that is a breech of trust, confidence, or duty. Because of the increase in computer crimes, it has become necessary for investigators to have a working knowledge of common computer-crime terms.
Because of our society’s dependence on data, computers are now mainstreamed into our lives. The term “computer” extends beyond what we think of as desktops, laptops, and pocket computers. The term applies to anything containing a microprocessor. Even cell phones, fax machines, cameras, video recorders, even newer washing machines and clothes dryers – all contain chips to process and store data records. All of these are potential sources of evidence.
The majority of cyber crimes committed involve the use of conventional PC’s. Deleting a file doesn’t necessarily remove a file from a hard disk. “Deleting” simply changes the name of the file, in order to hide it from the user.
Computer criminals are more sophisticated these days, and are aware of the security loopholes, and use some sort of encryption and more secure deletion programs to hide incriminating data. The following list includes some common computer-crime terms and their meanings:
When computer crimes are being investigated, employees or other persons help by providing information regarding the crime or possible suspects. An investigation begins at the lowest level of employees and will continue to the highest level of administration. Investigators have to remember that more than one person may be involved in cyber crime. Sometimes an audit or a repair order may bring the crime to the attention of authorities. The investigation starts with making a determination of which employees might have access to or reasons to become involved with computer crime. Evidence and records in computer crimes can be easily lost or destroyed, so investigators have to move cautiously throughout their search. The general principles of investigating cyber crime is similar to those for other crimes. The nature of the crime will determine if the crime falls under the local, state, or the federal level.
When a computer is seized as evidence, care must be undertaken to ensure that data is not lost. Many cyber criminals will booby-trap the computer. For example, touching a certain key on the keyboard, or even switching the computer on and off, could set the trap in motion and destroy evidence. If a cyber crime takes place in a large organization, an undercover operation may be set up. It is important to determine exactly what type of computer crime has been committed and if it was committed by an employee or someone from the outside. Some large companies and banks are reluctant to prosecute cyber criminals simply for the fact that it may damage their reputation.
Environmental
Crimes
According
to Gary Winston, Assistant State Attorney and head of the environmental crimes
division of the Florida State Attorney’s Office in
Analytical techniques can detect minute quantities of pollution in soil, air, and water. Pollution detection and control typically combine remote sensing with automated and manual testing. Detecting pollution is only half the challenge. To stop it, it must be traced back to a source, which tends to be much more difficult. Sometimes, pollutants can be elusive, and much more difficult to track.
Environmental forensics uses investigative tools from fields as varied as chemistry, epidemiology, toxicology, biology, geology, history, and statistics. Forensics is rekindling the curiosity in environmental science. With the growth in this field, forensics is building techniques for identifying appropriate solutions into the diagnosis of a problem. Experts have established sources of pollutants and determined who is responsible. Chemical fingerprinting can be used to trace contaminants back to a source, especially with techniques for petroleum and lead contamination.
Environmental forensics has been referred to as a toolbox of techniques that lets you “think outside the box.” Forensics helps you select the appropriate tests to acquire the appropriate data in order to make a more informed risk management decision. Environmental forensics has drawn the most attention to lawsuits where polluters pay for damages. Environmental forensics is currently also being used to determine potential liabilities. Before purchasing land with an industrial history, many companies are commissioning forensic assessments of sites before they buy, to see what legal and health risks may exist.
The field of environmental forensics is expected to grow, even on an international level. With the requirements of increasing environmental regulations and costlier litigation, this field is stepping up to meet the demand.
One of the
most well-known cases of an oil spill is the 1989 Exxon Valdez oil spill. Even
today, water samples with chemical fingerprinting are being used to see to what
extent the
https://www.fisheries.noaa.gov/feature-story/lingering-oil-exxon-valdez-spill
Document
Forgery
The writing
habits we learned as young children are hard to shake off or disguise. We are used to holding a pen or pencil a
certain way, shaping letters, and spacing lines and words. These qualities are what make handwriting
such a useful diagnostic tool when it comes to questioned documents. This is the branch of forensics concerned
with comparing and verifying ransom notes, forged contracts and wills, fake
passports and ID, as well as other kinds of written and printed material –
mostly found on paper. Whenever the
source of authenticity of a document is in question, that document is deemed to
be a questioned document.
When looking at handwriting, forensic document examiners look for individual characteristics that concentrate in four areas: form, line quality, arrangement, and content. When we think about the form of writing, you would consider the shape of individual letters, their slant, relative sizes, and how each is connected to the next. Trademarks, or the use of unusual characteristics, are also examined. Also analyzed are similarities of punctuation, grammar, spelling, phrasing, and vocabulary. Examiners also work to:
· Determine if a document is authentic or if it was produced by the person who supposedly produced it
· Determine if a document was produced when it was supposed to have been produced
· Assess if a document has been altered in any way
· Compare handwriting, signatures, and typewritten or photocopied documents
· Expose damaged or obliterated writing
The forensic document examiners use all of their skills, experience, and several microscopic, photographic, and chemical analytic methods to solve these problems.
We already know that no two people write alike, even though their styles may be similar. A person’s writing style is unique and is a result of unconscious automatic actions. A person doesn’t think about how they write, but what they write. And you do not write the same way twice. Right now .... stop .... and write your signature ten times. Compare the results. Each signature is slightly different. Now, try holding the paper against the wall or using different writing instruments such as a pencil, pen, marker, etc. Your handwriting may be different each time, and also affected by your position and your writing utensil.
Our handwriting styles change as we age. Factors that can affect changes include disease or stroke, arthritis, fatigue, stress, impaired vision, hand or arm injuries, and intoxication with drugs or alcohol may dramatically change your handwriting.
A forensics handwriting examiner needs several standards, or writing samples, to get a feel for a person’s writing style. If no usable non-requested standards (samples that already exist and are known to be authentic) are available, the examiner requests the suspect to provide a writing sample. This establishes a requested standard. Non-requested writings provide several advantages. The most important is that the samples reveal the writer’s true writing habits and may reveal words and phrases that the writer frequently uses. A major disadvantage is that they must also be authenticated. If they can’t be directly related to the writer, they do not have much value to the examiner.
A major advantage to requested writing samples is that no one questions their authenticity. The examiner watches the person write his or her name. They can even dictate what the individual writes, even a passage taken from a questioned document, so that the two samples can be compared. There are several disadvantages that accompany a requested writing sample. This causes some people to become nervous and causes them to concentrate too much on the writing process, which can lead to uncharacteristic changes. This makes the examination process much more difficult. A suspect may also try to disguise his or her handwriting style on purpose. A good way to get around this problem is to have the suspect write a good deal of material. It is easier to alter your style when writing short passages verses writing several pages.
When the examiner compares the samples between two handwritten documents, they look for similar points and points of differences while assessing the following features:
No single feature makes an accurate comparison, so examiners look for all these features when comparing documents. Based on findings, an examiner might say that the documents: absolutely match, match with a high probability, probably match, or do not match. Not every examination ends with an answer. On occasion they may say that they cannot make a determination based on the samples. Fortunately for the officials, most criminals aren’t that clever. Many criminals misspell in the documents, and forensic examiners use these mistakes to their advantage.
The FBI maintains the National Fraudulent Check File, the Bank Robbery Note File, and the Anonymous Letter File. Examiners are able to compare documents in question with these files. High-tech files, like the Forensic Information System for Handwriting (FISH), are also in existence. FISH contains scanned and digitalized documents that officials can compare with and stack up against other similar documents. Forensic document examiners visually check any matches. By double-checking samples, the possibility of mistakes is eliminated.
It is left up to a judge or jury if a document was altered or written by someone other than the stated author, for the purpose to defraud. Even the most talented forgers leave behind evidence of their efforts. Examiners don’t just inspect with the naked eye, but also with the microscope. A common form of forgery is called freehand simulation. This is the attempt to copy a signature or handwriting sample, and tracing involves placing another document over an original signature and tracing its lines. An examiner can identify defects in the writing because of the unnatural feel of the forger. Perfectly matching another person’s handwriting is not easy to do. Some common clues that give away forged writings include:
Another form of writing is called disguised writing. Disguised writing is a deception, where the writer attempts to disguise their handwriting. Many ransom notes are written this way.
Often times, forgers will try to remove, add, or change parts of written documents for a variety of reasons. Those reasons might be for financial gain and even to creating an alibi. Some alterations may be as small as changing a date or as complex as attempting to rewrite or erase signatures or portions of documents. These changes are called erasures, obliterations, and alterations. Forensic investigators use the following investigative tools:
Being able to expose the erasure marks is important because even if the examiner can’t see the original words or marks, they will at least know that someone altered the document, which may be proof of a crime and make documents null and void.
Sometimes criminals think they can destroy a document by burning it; however, many times there are enough fragments left over to identify the document. Handling charred pieces of paper is extremely difficult because they will crumble easily. The examiner can spray the paper with a solution of polyvinyl acetate in acetone in order to stiffen the paper and make handling easier. Next they treat the treated pages in a solution of alcohol, chloral hydrate, and glycerin and photograph them. They can also place the pages between two photographic plates and place them in a dark room for two weeks. They then develop the plates, which may reveal handwriting.
Often times, a forger will add words or marks to further alter the document. One of the most common ways is to change the amount of a check or date on a contract or will. These changes can be detected by looking for slight changes in the color of the ink, line thickness, pen pressure, and double lines.
Over-writing, is another way to forge. This is not done by erasing anything, but rather adding to or overwriting a part of the document. If the same type of ink is used both times, it can be very difficult to uncover. However, most forgers do not have access to the pen or ink that was originally used.
To the human eye, it may seem that two inks can be identical; however, under UV or infrared light, they may appear to be quite different. If lighting techniques do not provide any help in determining the forgery, the examiner may have to examine the chemical contents of the inks to show that they are quite different.
In the movies you have probably seen someone write a ransom note or threatening comments and then tear the page from a tablet. Underneath, indentations may be found that will expose the writing. The movement of a pen over a page will indent the page underneath along the path of the pen, creating what is called indented writing. On TV, they often use a pencil and rub the paper to expose the handwriting. Actually, this may destroy the evidence. On occasion, angling light over the paper will reveal indentations. When it does, a photograph is taken. A more sensitive method is the use of an electrostatic detection apparatus (ESDA), which can often uncover indented writing several pages below the original page. The examiner, when using ESDA, will place a Mylar sheet over the page to protect it. They will then place both on a porous metal plate. A vacuum pulls the Mylar tightly against the page. Then an electric wand is passed over the sheet and the page producing static electricity. The charge will be the greatest in the indentations. When black toner is poured or sprayed over the surface, similar to what is used in copy machines, it attaches itself to the surface in proportion to the degree of charge and reveals the indented writing.
On occasion, the forensic document examiner will need to determine if pages have been added to a document or if the document was actually created at a particular time. In these cases, the examiner may have to analyze the paper and ink that were used to create the document. Most types of paper are made of wood and cotton, and have chemical additives that will affect its opacity, color, brightness, strength, and durability.
The types and amounts of each of these additives will vary among manufacturers and paper types. Chemical testing will distinguish one type of paper and manufacturer from another. A watermark is another distinguishing characteristic. This is a translucent design on the paper that you can see by holding the page up to a light. By doing so, you can identify the manufacturer, the date of its production, and often for whom the paper was manufactured. Forgers have difficulty producing watermarks because with a true watermark, you will be able to spot it easier because there are fewer fibers than on the rest of the page. A forged mark is an added image that has a fiber density equal to the rest of the page. For more information about watermarking, visit these sites:
http://www.motherbedford.com/watermarks/Watermark1J.htm
http://research.microsoft.com/~hoppe/water.pdf
http://www.watermarks.info/indexi.htm
Often, the key to determining authenticity of a document lies in the ink that the writer used. Inks may appear to be identical physically, however, chemically they are very different. This distinction aids the identifier in determining if the same ink was used for each page or word and may even help determine if a particular ink even existed at the time the document was prepared.
There is one nondestructive method of ink comparison called microspectrophotometry. This process enables the examiner to accurately determine if the colors of the two inks match by comparing their light transmission, absorption, and reflective characteristics. Another method for comparing ink samples is thin-layer chromotography (TLC), which is described below:
The respective size of the molecules will determine how far along the strip the inks will migrate. This process separates the inks into bands. If two different inks are used on the document, there will be different distinct bands. The U.S. Secret Service Forensics Services Division Questioned Document Branch maintains an extensive ink reference database which is located at the Ink Library. They maintain an extensive database of the TLC patterns of commercial inks. In recent years, more manufacturers have begun adding fluorescent-dye tags to their products so that identification is easier. The tags are changed annually so that forensics can more easily determine the year that the product was manufactured.
Other clues concerning the origin of a document other than pen and paper are left behind. Typewriters, printers, and copy machines can leave distinguishing marks on typed or copied papers. Typewriters are frequently used to write threatening letters, ransom, and extortion notes. If a typewriter has been used, the examiner tries to determine the make and model of the typewriter as well as matching up the note with a suspect typewriter, if there is one available. Of course, there is a database available with typefaces used in various models, both new and old. Recently, typewriters have given way to computers. Printers vary so little that distinguishing one from another is quite difficult. When searching typewritten documents, the examiner looks for misaligned or damaged letters, abnormal spacing before or after certain letters, and variations in the pressure applied to the page by some letters. They also look at the ribbon for additional information.
Copy machines duplicate images from one page to another through a complex series of events. Examiners can sometimes match a photocopied document to a particular copy machine because the mechanisms may leave marks on a page. The machine glass or camera lens may have scratches or defects that mark every page that it produces. Often these marks will appear on the photocopied page.
Document
Authenticity Experiment
Experiment adapted from Forensics Teachers A-Z Resource Guide,
Examiners use chromatography to match unknown substances with known substances. With the use of a mass spectrometer, a device that measures light absorption, examiners take chemical fingerprints. These fingerprints help examiners identify the substances. If they find an exact match, they try to locate the manufacturer.
This experiment uses chromatography to determine which ink was used to write a document. Paper chromatography is used to separate ink mixtures. Water carries the pigment up the paper by capillary action, an attractive force between the water molecules and the paper fibers. The ink separates into a rainbow pattern, but not all black inks leave the same patterns. Investigators may use individual color patterns to identify a particular brand of pen.
Materials:
Procedure:
1. Think about how examiners determine the authenticity of a document. What can
you determine about the paper and the ink? Are there any identifying marks that
are unique that could help determine the writer of the document? Could there be
fingerprints on the paper? What kind of pen might have been used to write the
document? What can you tell about the ink? Are all black inks the same? If the
ink is a mixture of pigments, how can the pigments be separated?
2. Set out the six water-soluble black markers, plastic cups, tape, ruler, the precut
coffee-filter strips, watch or clock, and magnifying glass. Make sure that you
know which marker is used on which strip of paper.
3. Have a partner write a short document using one of the markers. The marker used
by your partner should remain a secret until the end of the experiment. Without your knowledge, your partner should make a black dot three centimeters from the end of the coffee-filter strip and lower the strip into 2 cm of water so it doesn’t reach the black dot. Your partner should show you the strip and tell you that this is a sample of the ink used in the document.
4. Make a black dot 3 cm from the end of each strip of coffee-filter paper. Fill each
clear plastic cup with 2 cm of water. One at time, lower the strip so that it touches
the water but doesn’t reach the black dot.
5. Use your stopwatch or clock to determine how long it takes the pigments to
separate on each strip of paper and move up. Measure the distance in cm.
6. Design a data table or graph to keep track of your results. Include space for each
filter strip sample and important information about each pen (such as pen # 1, etc.).
7. Have your partner show you his/her strip that matches the document. Examine
his/her strip against yours and make a match.
8. You will answer questions about your experiment in the unit question section.
Unit
Extension
Explore the following forensic careers:
Document Examiner
Environmentalist
Computer Specialist
Conclusion
This unit introduced crimes without corpses. Topics of discussion included, art and currency forgery, music piracy, environmental crimes, cyber-crime, and questioned documents. These types of crimes are dominated by greed, rather than anger and violence. However, they continue to be prevalent crimes within our society. Because these crimes are becoming more sophisticated, forensic examiners and investigators must implement more inventive solutions to crime solving.