Questioned Document Examination Part II. Other Responsibilities The Document Examination Unit not only examines questioned documents, but works with other.

Slides:



Advertisements
Similar presentations
Inventions of Thomas Jefferson By Aaron Levett. Why an Inventor? Many of you know Thomas Jefferson as just that rich republican guy who was our 3 rd president.
Advertisements

Origin and Nature of the Allied Cryptographic Advantage During World War II By Grant Musick.
Kaiti Pullano. Operation Ajax The Aftermath The CIA.
PRESENTED BY PAYTON FAKER JAWS, JANUARY 22, 2015.
Spies By Jake and Dominic What is a Spy? A spy is someone who works secretly for one government or military to obtain information about troop movement,
Is it Science?. The beginning The father of the US polygraph machine was Doctor William Marston He designed the first device that measured blood pressure.
The Midnight Visitor Robert Arthur
Detecting Deception Chapter 11. Detecting Deception  Lying & deception as a consistent feature of human behavior  “Santa Claus”  People in general.
Cryptography & Encryption Secret Codes & The Advance of Technology Copyright © 2008 by Helene G. Kershner.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Red Scare The Red Scare began in September 1945, and escalated into a general fear of Communist subversion of the united States. subversion–an effort to.
Chapter 17 Law and Terrorism.
TRUTHFULNESS Truthfulness vs. deception Earning future trust by accurately reporting past facts.
Franklin Delano Roosevelt. Roosevelt’s Life ► Born: January 30, 1882 ► Governor of NY: ► 32 nd President: ► Died: April 12, 1945 ►
Korean War, The Space Race, The Arms Race Korean War: Many Americans believed their government had not done enough to prevent the fall of China to Communism.
By: Paige Reinhardt.  Began as the Office of Strategic Services (OSS)  Formed during WWII to coordinate espionage  Established in 1947 when President.
A Glimpse of the History of Cryptography
Cryptography & Encryption Secret Codes & The Advance of Technology.
Watergate The downfall of President Richard M. Nixon.
ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.
The Truth About Lie Detectors Brittany Smith May 1, 2006.
By: Anthony Harris, Latoya Ware, Amber Merritt, and Rashad Riley.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Cryptography Week-6.
Spies Like Us (CIA v KGB)
Section 3.6: An Introduction to Cryptography
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
12-4: More Technological Advances September 20, 2010.
 What are they? How can we decide?. A primary source is an original object or document; first-hand information. Primary source is material written or.
Alan Turing and Code Breaking
Chapter 17: Foreign Policy and National Defense
BELLRINGER:.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Encryption: A Brief History Author: Margery Waldron.
ECE Lecture 1 Security Services.
Secret Codes.  A code is a system of symbols, letters, words, or signals that are used instead of ordinary words and numbers to send messages or store.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
 Morse code is a method of communication that relies on the transmitting of an alphabet constructed from dots and dashes.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Context Foreign graduate students in the US 2x / week lesson This lesson immediately follows a live lecture.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
1 Chapter 14 - Intelligence Operations. 2 Why did the Intelligence Fail to Precipitate Appropriate Action? Pearl Harbor The Japanese had already.
1-6 Variables and Equations Objective: Identify and solve open sentences.
The Cold War at Home Chapter 18 Section 3. Fear of Communism In 1947 President Truman set up the Federal Employee Loyalty program. The purpose of this.
 CplyBknI&safety_mode=true&persist_saf ety_mode=1 CplyBknI&safety_mode=true&persist_saf.
Primary and Secondary Sources
Espionage World War I. What is Espionage? Intelligence activity that denotes the work of secret organizations whose task is to gather information by covert.
Watergate. The Pentagon Papers The Pentagon Papers Published by the New York Times in 1971 Published by the New York Times in 1971 Classified Defense.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
American Government Chapter 12: The Bureaucracy. What is Bureaucracy? A large organization that is structured hierarchically to carry out specific functions.
INDUSTRIAL REVOLUTION COMMUNICATION Grace Cepeda, Kerry Locke, Isaac Case, Bobby Garcia, & Sidney Mendoza.
Forensic Science Questioned Documents
The Red Scare. Beginning of the Red Scare Began in Sept 1945 Igor Gouzenko defected (gave up his allegiance) from the Soviet Union Documents he owned.
 The Red Scare  General fear of Communist subversion into government agencies through infiltration  Subversion: Effort to secretly weaken a society.
CRYPTOGRAPHY. DEFINITION Cryptography is the science of writing in secret code The earliest documented use began around 2,000 B.C in Egypt (Hieroglyphics)
US Government and Politics September 23, The Executive Branch The executive branch of the federal government is a bureaucracy, an organization of.
Summer Bridge 2011 /Freshman Seminar By: William Sears & Jonathan Suits.
Cryptography – Test Review
Forensic Science Questioned Documents: Part 3
Cryptology in the U.S.—Then and Now
SEMINAR TOPIC LIE DETECTOR PRESENTED BY: RAHUL KHARE.
Communicating through dots and dashes
Applications of Inverse Matrices
The Inferior Courts.
The History and Technology of the Enigma Cipher Machine
Presentation transcript:

Questioned Document Examination Part II

Other Responsibilities The Document Examination Unit not only examines questioned documents, but works with other areas that link to forgery and fraud. One such area is Cryptology or Cryptography. Cryptography comes from the Greek words kryptos (secret) and graphos (writing). Codes and ciphers are examples of cryptography.

Codes Codes use symbols or groups of letters to represent words or phrases. Codes may be as easy as the non- secret SOS distress code or so secretive that both sender and receiver need a Code Book.

Morse Code In 1838, Samuel Morse invented Morse Code. Morse Code is not really a code, but an electro-magnetic telegraph system that uses a system of dots and dashes. However, codes were sent in Morse Code format and then decoded. Morse Code was a very important message system during World War I.

Morse Code Listen to a Morse Code Message. What does it say?Morse Code Message

The Enigma During World War II, the Germans used the Enigma machine. This machine could put a message into code in over 150 MILLION MILLION MILLION different ways. The Germans believed that the Enigma was invincible, but eventually the code was broken by the Allies.

Colossus Colossus was the machine that helped to break the Enigma code. Colossus was the world’s first programmable computer.

Ciphers In a cipher one letter is replaced with another by either a simple or a complex scheme

Ciphers Knowing English Letter Frequency helps to break a cipher. E is the most commonly used letter.

Invisible Ink Codes or secret messages may be written with invisible ink. The author uses ordinary paper, but the writing will disappear when the ink dries.

Retrieving the Message Seeing the invisible message depends on the type of ink used. UV light, heat, chemical developers or a combination of these will reveal the hidden message.

Espionage On September 22 nd, 1776 Nathan Hale was the first American captured and executed for spying As President, Washington established a fund for secret or covert missions

Civil War Many of the most successful spies were women Cushman received an honorary major’s commission from Lincoln

WWI 1917 Federal espionage law was passed Intelligence in WWI focused on code breaking and intercepting communications

Pearl Harbor The bombing of Pearl Harbor blamed on major intelligence failure Led to OSS/CIA

OSS Office of Strategic Services was America’s first intelligence agency By 1945, agents scattered throughout the world Donovan, head of OSS, had plans to expand agency that were leaked to newspaper Country panicked, Roosevelt died and Truman eliminated the OSS in 1945

CIA Central Intelligence Agency created as part of the National Security Act of 1947 Confidential and covert so successes rarely known and publicized Failures were exposed Korean War

Mission To serve as “the eyes and ears of the nation and at times its hidden hand” Number of employees is classified Budget is not released Considered on of the top 50 employers for new college graduates

Polygraph Testimony In many fraud investigations, the suspect is asked to take a polygraph or “lie detector” test. These tests are very controversial and the results are not considered reliable.

How does a Polygraph Work? Lying is a defend mechanism to avoid trouble. It is not always obvious that someone is lying. A polygraph is an instrument that measures physiological reactions.

The Measurements 4 to 6 sensors are attached to the body. Multiple signals are gathered from each sensor and recorded. These recordings are the measurements of heart rate, blood pressure, respiratory rate and electro-dermal activity.

The Questions The participant is asked 3 to 4 simple questions to establish “norms”. These questions would give baseline readings for the “truth”. Then the participant will be asked other questions that involve the incident as well as control questions.

The Results Results are subjective and may be misinterpreted as: False positive- truthful person decided to be deceptive. False negative- deceptive person decided to be truthful. False positives occur more.

“Beating” a Polygraph Ways that people try to trick the device include: Taking sedatives Applying antiperspirant to their fingertips Placing tacks in their shoes Biting their tongue, lip or cheek

The Court Many states do not allow any polygraph testimony. Other states allow the testimony with stipulations (both parties agree to admit the results as evidence).