U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Group of Simulated Signatures: Their Apparition and Authorship: A Case Study

NCJ Number
186110
Journal
International Journal of Forensic Document Examiners Volume: 5 Dated: December/January 1999 Pages: 441-445
Author(s)
Mohinder Singh; Santokh Singh
Date Published
1999
Length
5 pages
Annotation
This paper describes the techniques of handwriting analysis used in the case of a group of forged signatures.
Abstract
In a case investigated by India's Central Bureau of Investigation, a nationalized bank was defrauded of approximately 1.6 million rupees by using 13 fraudulent demand drafts that favored two fictitious persons who forged the signatures of the bank manager. As many as 17 signatures of the bank manager were forged on the demand drafts. A bank officer was alleged to have simulated the model signatures of his own manager after sufficient practice. This was a distinctive case for a number of reasons. First, due to well-practiced simulation, sufficient lapses may not be left by the forger; second, the number of simulated signatures was sufficiently large to magnify the "lapses" to the level of "sufficiency and suitability"; and third, the suspect could not be compelled to execute "forged" specimen signatures freely and voluntarily for the purpose of comparison, since this would amount to creating evidence against himself. The fact that there were a number of freely written simulations forming a single group proved to be helpful in establishing their range of natural variations, which was found to be similar to the standard writings of the suspect. On the basis of collective consideration of various features, it was possible to fix the authorship of the simulated signatures by comparing them with the similar sample writings of the suspect. The handwriting features that permitted the identification of the suspect as the forger are identified and discussed in this paper. 4 figures and 5 references

Downloads

No download available

Availability