Forensics 2
Across
- 3. Checks, certificates, wills, passports, etc.
- 4. Portrait appears raised, security thread, etc.
- 14. Handwriting is difficult to disguise or forge
- 16. Any changes, erasures, or obliterations that may have occurred
- 17. Computer system used to mimic likely targets of cyber attacks
- 22. What are the height, width, and size of the letters?
- 24. Year the Court of Appeals validated handwriting analysis as a form of expert testimony
- 25. The specialty in forensics that analyzes accounting methods in disputes or litigation
Down
- 1. Agency that investigates forgery cases
- 2. Every person's handwriting is unique
- 3. "Learns" to recognize how a person signs
- 5. Any prewritten handwriting samples from a suspect
- 6. What was the first known case in which handwriting analysis played a role?
- 7. Stores handwriting samples in databases
- 8. Checks, employment records, licenses, wills, etc.
- 9. When false documents or other items are copied for the purpose of deception
- 10. Directly altering a check, intercepting another person's check, etc.
- 11. Amount that is written in illegitimate checks every day
- 12. Writing over top to smear or make original writing unreadable
- 13. Tool for including or excluding persons when determining a match
- 15. Paper money, postage stamps, traveler's checks, etc.
- 18. Chemically sensitive paper, multiple color patterns on paper, etc.
- 19. Examination of questioned documents with known material
- 20. Practice of finding vulnerabilities that hackers could exploit
- 21. Making, altering, or falsifying any document or signature
- 23. Forgery for material gain
- 24. Maximum prison sentence for forgery