Category Archives: Digital Documents

 ICFECI: The Best Digital Forensic Service Provider

A mix of competence, skill, knowledge, integrity, and reliability is what you will get once you put your trust in what ICFECI does. In a world where digital evidence gets increasingly sought after, they will help you get the help you need in a manner most professional. With a list of credentials and positive reviews Dan James, the founder is the man who mobilizes a team that works night and day just to collect data that helps prove your case. He is a certified cell phone examiner and fraud examiner. Most importantly, he deals with computer and cell phone forensics, criminal investigations, federal rules of criminal procedure as well as criminal justice services. Thus, if you have a case related to any of these, Dan’s company is a necessary additive to your legal team.

Computer and cell phone forensics: the company does everything as per Title 18, USC, Sec 3006A. Mind you; forensic science has proven quite steadfast in helping solve cold cases within short periods of time. Other than the mainstream child pornography and corruption, drug-related cases and sex violations; ICFECI goes further to provide unique solutions as pertains to alleged fraud cases linked to securities, tax evasion, mortgage, misrepresentation, healthcare and email scams.

Criminal investigations: other than being the only organization of its kind in northern Texas, the company boasts a well-equipped computer lab. It, therefore, has the capability of transforming complex data extracted from computers and mobile devices into simpler, easily interpretable formats presentable in courts of law.

Federal rules of criminal procedure: other than collecting, analyzing and summarizing data for use by the courts of law, the company goes ahead to provide experts as witnesses if need be. They are committed to ensuring that clients get fully represented in line with what the law provides. They can go as far as providing conducting interrogations and discreet surveillance. All in a bid to help acquit you from any accusations leveled against you.


Here is a summarized list of what ICFECI offers to its wide range of clients.
Computer and cell phone forensic examinations.
Consultancy on sex crimes, child pornography, assault, murder, and crime of violence.
Certified fraud examinations in the healthcare, insurance and tax centers.
While collar frauds, Ponzi schemes, civil frauds, bank frauds, and criminal litigation cases.
Criminal Justice Act services where applicable.

However, what matters most is the manner in which your case gets handled. In collaboration with your defense team, the experts involved have only one goal in mind. Theirs is to come up with compelling, yet reasonable evidence. The technique has been proven to work as cases, which almost seemed unsolvable got brought to conclusive ends in favor of clients. You too can solve a case with their help, just like others did. Furthermore, if you do not trust the reviews, you can always put your confidence in the resources and highly self-trained individuals who have known nothing but mining data most of their lives.

Introduction to Digital Documents

With the influx of digital expertise, the character and perpetration of white collar crime is undergoing stern change. Unfortunately, this has brought down some decisive security vulnerabilities that put digital credentials at menace. In the space of just 40 years we have gone from the Selectric — arguably the most technologically advanced typewriter of its day — to the computer age. A document creation system that had just two parts in 1961 (typewriter and element) can now have multiple components — some based in software and some in hardware.

We live in the Information Age, a time when information is being generated, published, and stored at an ever-increasing rate, and computers play an integral role in all three of these activities. Digital images are misused for plentiful reasons with and without a criminal intent. Images are cropped, rotated and compacted to make them fit for a document. In the days before imaging software became so widely accessible, creating adjustments to image data in the darkroom mandated considerable endeavor and proficiency. But now with the help of Photoshop it is very simple, and consequently tempting, to adjust or modify digital image files. Therefore, stating the genuineness of a document is becoming more and more difficult these days since scanners, printers and computers are good enough to generate fraud documents.

A number of clues can be used for detection of manipulation by visual assessment, like discrepancies in lighting, intensity levels, color distributions, edges, noise patterns and compression artifacts in the conversion among the tampered and original parts of the questioned image. The availability of powerful digital image processing programs, such as Photoshop, makes it comparatively easy to generate digital forgeries from one or numerous images. Cases of manipulated hard and soft copies of documents are frequently encountered due to their large acceptance in both business and legal matters. These types of forgeries have become remarkably frequent position in today’s scenario. Which is why, it is necessary for the forensic document examiners (FDE’s) to evaluate the authenticity of the digitized and hard copied documents and reveal evidence of manipulation if present. Therefore, it is also essential for the forensic document examiners to stay abreast of the latest scientific advancement in the field so that they can meet the challenges of the future and address new forms of evidence.

This article provides a boiled-down version of what is believed to be the most important information for those engaged in the forensic exami­nation of computer-generated documents.

The Pre-Examination Evaluation

The examination of digitally prepared documents should begin with the same pre­cautions and care that would be prudent with any type of examination. The pre-examination evaluation of digital documents is no different than document examinations of any type.

Examination Procedures

The well-established principle that documents should be thoroughly scru­tinized on both sides, corner to corner, is just as valid for modern, computer-generated documents as it has been since the dawn of forensic document examination.

Is the Document an Original or a Copy?

This is a question that may seem trivial to a new FDE, but daunting to the experienced practitioner. It may be difficult to deter­mine if the evidence is an original machine-printed document or a machine copy. Modern computer technology can blur how we define an original vs. a copy as well as the physical distinctions between an original and a copy. For instance, it is possible for multiple original versions of the same electronic docu­ment to be printed on different printers. This occurs daily in the modern world when e-mail attachments are printed out by the recipients. A preparer sends a policy change to individual employees in branch offices, who then print out the text on their machines. Each can lay claim to having an original document, even though some originals may have been printed on inkjet printers and some on laser printers. From a forensic standpoint, the problem is that the same machine that was used to print an original document may later be used to copy it. Original machine printed documents can have machine-rendered sig­natures. Several companies can take one’s original signatures and convert them into True Type fonts. Because these signatures are scalable fonts, they can be smoothly resized, bolded, and italicized to give them visually different appear­ances. A toner or inkjet signature appearing on a document, therefore, is not necessarily proof that the document itself is a reproduction.

Can the Printing Technology Be Identified?

It is a common practice for document examiners to step through their examinations attempting to first determine class characteristics, followed by efforts to ascertain more individual, identifiable features. Following this formula, the starting point for an examination of a computer-generated document will usually involve a micro­scopic examination of the printed text in order to determine the most general type of evidence — what technology was used to print the document.

The classifications that can be made from visual (microscopic) examinations will initially revolve around three basic determinations: Has the document been printed (1) in black and white or color, (2) using an impact or non-impact process, or (3) with toner, wet ink, or other medium?

Has More Than One Technology Been Used to Prepare the Document?

In some instances it may not be possible (without chemical or instrumental analysis) to determine much beyond the technology that was used to produce a computer-generated document. Depending on how the document was allegedly produced, however, this may be all that is necessary to resolve the issue. The two types of cases where this information can be of considerable importance are reinsertion and page substitution. In the first situation, a document is placed back into a printer after the parties have signed and agreed to the terms in the document. If a questioned passage is printed with a different type of printer than the surrounding text, it can be considered proof that the document was changed by reinsertion. An example of this occurred in a patent case, in which all of the unquestioned text had been printed on a dot matrix printer while the questioned assignment of the patent had been inserted with an inkjet printer at the bottom of a page that began with dot matrix printing. In the second type of case (page substitution), one or more pages of the original document are removed and different ones are inserted. This situation arises frequently in probate matters where the signature page of a will is left intact, but the preceding pages are replaced. Depending on what stories the various parties tell concerning the creation of a questioned document, merely being able to determine that more than one printer technology was used may be sufficient to resolve the litigation.

Is there Evidence that One or More Pages are Prepared Differently than the Others or that Text has been Altered

If there is a possibility that alteration has taken place, features such as font changes, formatting, paper type, etc., must be considered. In the case of computer printing technology there are several approaches that one can take to help determine if text (or entire pages) have been added, removed, or altered. The first step should be an attempt to determine if the same printing technology was used throughout the document.

In this regard, literally everything that is printed on the document should be examined, including the printing process used to prepare the letterhead.

Even if only one technology was used to create a document there may be evidence that passages were created on different machines. In some cases it may be possible to make this determination non-destructively; in other instances only destructive testing such as ink and toner analyses will provide definitive evidence in this regard.

Assessing Alignment, Spacing, and Copy Distortion

Various measurement techniques can be employed, including glass or plastic measuring templates or the use of scanning and graphics software. Regardless of the method employed, the FDE must be cognizant of any distortion, linear or otherwise, that may be present. This is especially true for multi-generation or fax copies, in which it is not uncommon to see the text baseline undulate across the page. In such circumstances, only very general measurements can be made. To properly assess any distortion present, multiple line mea­surements should be made. It would be a mistake to focus solely on the entry in question relative to the lines immediately above and below. Differences in line and margin spacing are only relevant if the surrounding text is consistently spaced.

Whether evaluating a facsimile reproduction, photocopy, or computer-generated text, Adobe Photoshop® or other similar software can be a valuable tool in assessing line ori­entation. The document is scanned into Photoshop, where the measurement tool is used in concert with the Rotate Arbitrary function to bring the document to a right angle based on a selected line of text. Once this is done, the same set of tools is used to obtain information about each line’s orientation.

Digital Manipulation Detection Methods

Various methods have been proposed to detect alteration done in computer generated documents which include automatically detecting and localizing duplicated regions in digital images, pixel- based techniques that detect statistical anomalies introduced at the pixel level, format-based techniques that leverage the statistical correlations introduced by a specific lossy compression scheme, camera-based techniques that exploit artifacts introduced by the camera lens, sensor, or on-chip post processing, physically based techniques that explicitly model and detect anomalies in the three-dimensional interaction between physical objects, light, and the camera and geometric-based techniques that make measurements of objects in the world and their positions relative to the camera.


It is safe to say that just as the technological methods used to create modern documents continue to change, so the forensic examination of computer-generated documents will continue to evolve. For instance, many laboratories around the world are currently doing research to determine if an analysis of toners, inkjet inks, and other media can be individ­ualized to a particular manufacturer. Devices used by the electronic printing industry itself to determine output quality and image banding are beginning to see their way into the forensic arena as identification tools.

As we can see a new field is emerging for forensic document examination in which not only the knowledge or experience in document examination but also good knowledge of modern computers and materials used to prepare computer generated documents is needed. This is because of the effect of computers in almost every aspect of our lives and their use in daily routine. Thus a fusion of computerized technology and documents is needed to deliver the justice in the modern times.

Shabnampreet Kaur
Research Fellow
Department of Forensic Science,
Punjabi University, Patiala