Across
- 3. Portrait stands out and appears raised off the paper; contains clear red and blue fibers woven throughout the bill; has clear, distinct border edges; treasury seal is shown clear, sharp saw-tooth points; watermark appears on the right side of the bull in the light:the security thread is evident- a thin embedded vertical strip with the denomination of the bill printed in it; there is minute printing on the security threads, as well as around the portrait; when the bill is tilted, the number in the lower right-hand corner makes a color shift from copper to green.
- 6. What was first known case in which handwriting analysis played a role?
- 9. Handwriting is difficult to disguise and forge
- 11. What are the overall height width and size of the letters?
- 12. Also called pen testing or ethical hacking is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit
- 14. When false documents or other items are copied for the purpose of deception
- 15. The agency that investigates forgery cases
Down
- 1. Good tool for including or excluding persons when determining a match
- 2. Any prewritten handwriting samples from a suspect(S)
- 4. currency/paper money, traveler’s checks. Food vouchers/ WIC coupons, certain bonds, postage stamps
- 5. Similar to fingerprints, every person's handwriting is what it is
- 7. The year the us court of appeals determine that handwriting ana;ysiss qualifies as a form of expert testimony
- 8. Chemically sensitive paper large font size requires more ink and makes alterations more difficult high resolution borders that are difficult to copy multiple color patterns on paper embed fibers that glow under different light use chemical wash detection systems that change color when a check is altered
- 10. Maximum prison term for forgery. Forgery is a federal felony
- 13. A computer or computer system intended to mimic likely targets of cyber attacks. It can be used to detect attacks or deflect them from a legitimate target. It can also be used to gain information about how cyber criminals operate
