Document Examination
HOME | Forensic Data & Cyber Threats | Document Examination
In a world where the majority of documents are created, edited and in some cases even signed digitally, it may seem as though the need for document examination may not be immediately clear. However, there are still many circumstances in which organisations may require assistance with the closer inspection of documents, signatures and other written materials.
What is Document Examination?
The process of Document Examination refers to the scientific and expert analysis of documents. This may be performed when there is a need to ascertain whether documents are genuine or fake, to identify unauthorised alterations, additions or deletions, or to confirm whether handwriting belongs to the purported author. It can also be crucial in identifying other evidence contained within the document which has not previously been noted or considered of importance.
When to undertake Document Examination
Document Examination is required when it is necessary to determine how a document was produced, when and by whom it was created, and most commonly, to ascertain whether any changes have been made since its creation.
Document Examination can be useful in a number of circumstances, such as:
- Identifying a fake invoice generated to justify unauthorised expenses claimed by a manager
- Comparing the handwriting on a questioned document with known subject handwriting
- Identifying a will with a false signature;
- Recognising changes to the date on a documents
- Noting the false signature of a director agreeing to a sale of assets or transfer of monies
Regents’ Approach
At Regents, we are able to provide an initial assessment of the subject documents quickly and effectively to ascertain whether further investigation is required. If necessary, we will then conduct a full analysis and provide you with a comprehensive report of the findings.
In addition, we will also advise on the most appropriate ways to store and carry the questioned materials, and any supporting documents that may be associated.
Our analysis focuses on a number of areas, including the confirmation and identification of handwriting and signatures, the analysis of ink and paper products used in the creation of the document, and the detection of any alterations, additions or substitutions made on the document.
Computer Forensics
Mobile Phone Forensics
Cyber Threats
TSCM
Document Examination
Need Professional Advice?
Contact Regents Risk Advisory today for a FREE Consultation, we can help you sort through some difficult questions. Call us at +603 6204 5785 (Malaysia) or +65 6345 5770 (Singapore).
Regents Blog
‘Flash robs’ create new challenge to retailers
Just as Twitter, face book and other social networking sites have allowed dissidents to plot the overthrow of dictators in the Middle East, groups of criminals are utilising these tools to plan coordinated thefts from stores in the USA. `Flash mobs’ was the term given...
Hacking of White House Gmail accounts
The recent announcement by Google that a number of users Gmail accounts have been hacked into has ratchet up the debate on cyber war between China and the US. The importance of this report relates to the fact that these Gmail accounts were held and sued by senior US...
Securing smartphones data
Recent sales figures indicating that worldwide sales for smartphones will increase by 60% and top half a billion units in 2011 confirms what most people already knew; smartphones are no longer just for top executives or city hopping businesspeople. Smartphones –...
Is Speak Asia Online to be trusted?
Despite being the home of software programmers and large scale IT out-sourcing companies, the Indian public has not been exposed to internet sensations, rumours and intrigue to the same extent as countries such as the USA. Until now. The online opinion company Speak...
Skimming cash frauds
Skimming is the term given to the type of fraud whereby cash from a customer is diverted before it enters the victim company. Embezzlement is the more technical term given to this practice and it is also known as an `off-book fraud’. Detecting and proving a skimming...
Gift card vouchers and the link
to money laundering
Gift card vouchers can be the perfect solution for a birthday when you’re not sure which present to buy. Simply pay cash at the store or shopping mall and transfer the same value onto the voucher to be used at the designated outlets. Travellers Cheques have been...