Forensic Science Questioned Documents: Part 3

Slides:



Advertisements
Similar presentations
PRESENTED BY PAYTON FAKER JAWS, JANUARY 22, 2015.
Advertisements

Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: Describe 12 types of handwriting characteristics.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptography & Encryption Secret Codes & The Advance of Technology Copyright © 2008 by Helene G. Kershner.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
A Glimpse of the History of Cryptography Cunsheng Ding Department of Computer Science HKUST, Hong Kong, CHINA.
A Glimpse of the History of Cryptography
Cryptography & Encryption Secret Codes & The Advance of Technology.
ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.
The Dollar Congress adopted the dollar as the money unit of the United States in 1785.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Cryptography Week-6.
Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Encryption: A Brief History Author: Margery Waldron.
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: describe 12 types of handwriting characteristics.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Secret Codes.  A code is a system of symbols, letters, words, or signals that are used instead of ordinary words and numbers to send messages or store.
 Morse code is a method of communication that relies on the transmitting of an alphabet constructed from dots and dashes.
Using Inverse Matrices in Real Life
Currency Counterfeiting Documents 3. History of Counterfeiting One of the oldest crimes known During US Civil War, 1/3 to 1/2 of all US currency was counterfeit.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Unit 3 Day 4. Warm-Up 1.Write the Now/Next Function Rule for3, -9, 27, -81, … 2.Write the Input/Output Function Rule for the table to the right: 3.In.
Questioned Document Examination Part II. Other Responsibilities The Document Examination Unit not only examines questioned documents, but works with other.
© A+ Computer Science - Codes and ciphers have existed for hundreds of years. People have always had the need to hide secrets.
Forensic Science: Fundamentals & Investigations, Chapter 10 1 Introduction Document analysts examine and compare questioned documents with known material.
INDUSTRIAL REVOLUTION COMMUNICATION Grace Cepeda, Kerry Locke, Isaac Case, Bobby Garcia, & Sidney Mendoza.
1 Questioned Document and Handwriting Examination.
All rights Reserved Cengage/NGL/South-Western © 2016.
What does Julius Ceasar have in common with the transmission of modern digital signals?
CRYPTOGRAPHY. DEFINITION Cryptography is the science of writing in secret code The earliest documented use began around 2,000 B.C in Egypt (Hieroglyphics)
The Internet Book Chapter 5 3 The World Was Once Digital 150 years ago, telegraph messages were sent from one town to another. –Using audible clicks.
1 Forensic Science Questioned Documents Document Analysis.
Counterfeit Currency Detective AnDrea Scott City of LaGrange Police Department.
Forensic Science: Fundamentals & Investigations, Chapter 10 1 Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you.
Handwriting Analysis, Forgery & Counterfeiting. Document Analysis The examination and comparison of questioned documents with known material Questioned.
Week 3. Day 1 – Meet the Word Part “Divide and Conquer” Day 1.
Questioned Document and Handwriting Examination
Cryptography – Test Review
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: Describe 12 types of handwriting characteristics.
Key words: Cryptography | Binary | Cipher
Warm-up 1. Find A-1 , A = 2. Solve AX = B when B =
Cryptology in the U.S.—Then and Now
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: Describe 12 types of handwriting characteristics.
The Federal Reserve.
Campbell R. Harvey Duke University and NBER
Intro to Document Analysis
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
Counterfeiting EHS Forensic Science.
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
Applications of Inverse Matrices
Warm-Up List 5 features of genuine U.S. Currency that are not found on counterfeit currency.
Steganography ETPRO 2010.
LO: Use logic and frequency analysis to read and write in code.
Cryptography “The Secret Code Language”
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: describe 12 types of handwriting characteristics.
Substitution Codes By Sarah Bonnell.
Cryptography Cryptography is derived from the Green word ‘kryptos’
Counterfeiting Forensic Science.
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: describe 12 types of handwriting characteristics.
Technology Used in Handwriting Analysis
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: Describe 12 types of handwriting characteristics.
WORLD OF WONDERS : THE ENIGMA MACHINE
Documentation Analysis
Modern Cryptography.
Presentation transcript:

Forensic Science Questioned Documents: Part 3

Counterfeiting Forging money is known as counterfeiting. This is one of the oldest crimes. During the Civil War, when all banks issued their own currency, approximately one-third of money was counterfeit. This was a threat to the U.S. economy. So in 1863, the United States adopted a national currency. Counterfeiting

Counterfeiting (cont.) The adoption of the national currency really did not curtail the amount of counterfeiting. In 1865, the Secret Service was created to investigate and stop counterfeiting. Although counterfeiting is not as pervasive as it once was, it is still a common crime. The latest technology has made it much easier to copy and counterfeit money. In 1996, the U.S. government began to add new features to money. Counterfeiting (cont.)

Counterfeiting (cont.) Some of these features include: A watermark Color shifting ink Off-center portrait Randomly disbursed red and blue fibers in the paper Microprinting Counterfeiting (cont.)

Other Responsibilities The Document Examination Unit not only examines questioned documents, but works with other areas that link to forgery and fraud. One such area is Cryptology or Cryptography. Cryptography comes from the Greek words kryptos (secret) and graphos (writing).  Codes and ciphers are examples of cryptography.

Codes Codes use symbols or groups of letters to represent words or phrases. Codes may be as easy as the non- secret SOS distress code or so secretive that both sender and receiver need a Code Book.

Morse Code In 1838, Samuel Morse invented Morse Code. Morse Code is not really a code, but an electro-magnetic telegraph system that uses a system of dots and dashes. However, codes were sent in Morse Code format and then decoded. Morse Code was a very important message system during World War I.

Listen to a Morse Code Message. What does it say? Create your own Morse Code Message: http://morsecode.scphillips.com/jtranslator.html

The Enigma During World War II, the Germans used the Enigma machine. This machine could put a message into code in over 150 MILLION MILLION MILLION different ways. The Germans believed that the Enigma was invincible, but eventually the code was broken by the Allies. https://www.youtube.com/watch?v=Hb44bGY2KdU The Enigma

Colossus - “The Bomb” Colossus was the machine that helped to break the Enigma code. Colossus was the world’s first programmable computer.

Ciphers In a cipher one letter is replaced with another by either a simple or a complex scheme

Ciphers Knowing English Letter Frequency helps to break a cipher. E is the most commonly used letter.

Codes or secret messages may be written with invisible ink. The author uses ordinary paper, but the writing will disappear when the ink dries. Invisible Ink

Retrieving the Message Seeing the invisible message depends on the type of ink used. UV light, heat, chemical developers or a combination of these will reveal the hidden message. Retrieving the Message