Forensic science charlie

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556
Across
  1. 1. $27 million - Dollar amount that is written in illegitimate checks every day
  2. 4. forensics - (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media.
  3. 8. vouchers/ WIC coupons, Certain bonds, Postage stamps
  4. 9. questioned documents - Checks, Certificates, Wills, Passports, Licenses, Money, Letters, Contracts, Suicide Notes, Receipts, and Even Lottery Tickets
  5. 13. block - Charlie
  6. 14. documents - Any signature, handwriting, typewriting, or other written mark whose source or authenticity is in dispute of uncertain
  7. 16. Spectroscopy - an analytical technique that measures the mass-to-charge ratio of charged particles.
  8. 18. Pressure - Check for pressure on the downward and upward strokes Compare how capital letters are joined to lowercase letters
  9. 19. documents include: - Checks, employment records, legal agreements, licenses, and wills
  10. 21. chemical wash detection systems that change color when a check is altered
  11. 22. analysis comparison - "Learns" to recognize how a person signs; Evaluates speed, pressure, and rhythm of the signatures; Recognizes forgeries by the detection of even slight differences
  12. 23. - A substance that accelerates the rate of a chemical reaction but is not itself permanently changed by the reaction.
  13. 27. - A technique for separating molecules through their migration on a support medium under the influence of an electrical potential
  14. 29. commonly forged today - Currency/paper money, Traveler's checks
  15. 30. resolution borders that are difficult to copy
  16. 31. - writing over top to smear or make original writing unreadable
  17. 32. as well as around the portrait; When the bill is tilted, the number in the lower right-hand corner makes a color shift from copper to green
  18. 33. testing - also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.
  19. 35. years - maximum prison term for forgery. Forgery is a federal felony
  20. 38. - a branch of bioscience dealing with the study of the form and structure of organisms and their specific structural features.
  21. 40. case of the 1930s - What was the first known case in which handwriting analysis played a role?
  22. 42. consistency /Ratio - What are the overall height, width, and size of the letters?
  23. 45. composition - the individual chemicals that make up a substance
  24. 46. - any prewritten handwriting samples from a suspect(s)
  25. 48. ninety nine - The year the US Court of Appeals determine that handwriting analysis qualifies as a form of expert testimony
  26. 49. Hat Hackers - are a blend of both black hat and white hat activities. Often, grey hat hackers will look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they will report them to the owner, sometimes requesting a small fee to fix the issue. If the owner does not respond or comply, then sometimes the hackers will post the newly found exploit online for the world to see.
  27. 50. color patterns on paper
  28. 51. Security Features in US currency - Portrait stands out and appears raised off the paper; Contains clear red and blue fibers woven throughout the bill; Has clear, distinct border edges; Treasury seal is shown with clear, sharp saw-tooth points; Watermark appears on the right side of the bill in the light; The security thread is evident—a thin embedded vertical strip with the denomination of the bill printed in it; There is minute printing on the security
  29. 52. - making, altering, or falsifying a person's signature or any other aspect of a document with the intent to deceive another
  30. 53. Check Techniques - Directly altering a check; intercepting someone's check, altering it, and cashing it; creating forged checks from scratch; by ordering someone else's checks from a deposit slip.
  31. 56. phosphatase - An enzyme found in high concentration in semen.
Down
  1. 2. signature pads - stores handwriting samples in databases
  2. 3. - any long connecting marks and or swooshes added to letters
  3. 5. hat hackers - usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.
  4. 6. - forgery for material gain
  5. 7. analysis - the examination and comparison of questioned documents with known material
  6. 10. taken to prevent check forgery - Chemically sensitive paper
  7. 11. font size requires more ink and makes alterations more difficult
  8. 12. - any extra caricatures or pictures added to words
  9. 15. - When false documents or other items are copied for the purpose of deception
  10. 17. handwriting - handwriting is difficult to disguise and forge
  11. 20. of documents detection - any changes, erasures, or obliterations that may have occurred
  12. 24. hackers (White hat hackers) - White hat hackers choose to use their powers for good rather than evil. Also known as "ethical hackers," white hat hackers can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking.
  13. 25. accounting, forensic accountancy or financial forensics - the specialty practice area of accounting that describes engagements that result from actual or anticipated disputes or litigation.
  14. 26. and personalized handwriting habits - Similar to fingerprints, every person's handwriting is what it is
  15. 28. Fibers - fiber created from natural materials or by chemical processes, a man-made fiber
  16. 34. Habits (aka. Baseline characteristics) - Does the writing tend to follow a straight line, move downward, or move upward? Is it above or below the line?
  17. 36. - a material that changes the color of reflected or transmitted light as the result of wavelength-selective absorption.
  18. 37. Service - the agency that investigates forgery cases
  19. 39. - a computer or computer system intended to mimic likely targets of cyberattacks. It can be used to detect attacks or deflect them from a legitimate target. It can also be used to gain information about how cybercriminals operate.
  20. 41. - Does the writing tilt to the left or right, or is it straight up and down? Are some letters consistently tilted more or less than others?
  21. 43. - A protein that acts as a catalyst for certain specific reactions.
  22. 44. - Examine the average amount of area between words and letter formation. Are the letters and margins the same/similar? Are the letters equally spaced or crowded?
  23. 47. Chromatography - Dye or ink is applied to filter or chromatography paper placed in a solvent and pigments are separated
  24. 48. Fibers - fiber derived from plants or animals
  25. 53. - A compound capable of donating a hydrogen ion (H+) to another compound.
  26. 54. fibers that glow under different light
  27. 55. Chromatography - a common type of chromatography used in analytical chemistry for separating and analyzing compounds