forensic document examiner

Archive | forensic document examiner

WHISTLE BLOWER | Report On Fraudulent & Forged Assignments Of Mortgages & Deeds In U.S. Foreclosures

WHISTLE BLOWER | Report On Fraudulent & Forged Assignments Of Mortgages & Deeds In U.S. Foreclosures

Pew family trusts which I am a beneficiary and/or remainderman have maintained
investments in various banks, mutual funds, and other entities that maintain
interests in various shares, mortgage backed securities and/or debt issuances and I
have been a shareholder in many mortgage companies including Fannie Mae,
Bear Stearns, JPMorganChase, Washington Mutual, MGIC, Ocwen and Radian,
many of which are members, owners and shareholders in Mortgage Electronic
Registration Systems, Inc. [MERS].

© 2010 Nye Lavalle, Pew Mortgage Institute
•10675 Pebble Cove Lane • Boca Raton, FL 33498
561/860-7632 •

[ipaper docId=36753239 access_key=key-1xwnf3x33iwj6zod9965 height=600 width=600 /]

© 2010-19 FORECLOSURE FRAUD | by DinSFLA. All rights reserved.

Posted in bear stearns, bogus, chain in title, concealment, conflict of interest, conspiracy, CONTROL FRAUD, corruption, foreclosure, foreclosure fraud, foreclosure mills, foreclosures, forensic document examiner, forensic mortgage investigation audit, forgery, insider, investigation, Law Offices Of David J. Stern P.A., Lender Processing Services Inc., LPS, Max Gardner, MERS, MERSCORP, MORTGAGE ELECTRONIC REGISTRATION SYSTEMS INC., Mortgage Foreclosure Fraud, neil garfield, notary fraud, note, OCC, R.K. Arnold, racketeering, RICO, robo signers, shapiro & fishman pa, STOP FORECLOSURE FRAUD,, trade secrets, Trusts, Violations, Wall Street0 Comments

MERS: Open Letter from Nye Lavalle

MERS: Open Letter from Nye Lavalle

Dear MERS Executives:

As a shareholder in several companies that are MERS Corp owners, I will be sending a report to the board of directors and audit committees of each company in the coming 60 days outlining the plethora of fraudulent representations your company has made via its “certifying officers” to allow the masking of complex trades and financial transactions that assist these corporations that control your corporation to “cook their books.”

As you each know, your prior arguments to me about your policies and practices have been deemed to be incorrect by numerous judges and even state supreme courts that have sided with many of my arguments.

In order to protect the American Public; all land and property owners; the financial markets and investors; our banking system; and the citizens and tax payers of the United States, I ask that you request the disbandment of your company from the board of directors of MERS Corp.  Similar requests will be made by me and other shareholders in each company with shareholder ownership in MERS Corp.

In addition, quite title actions must be initiated in court rooms across America in order to clean up the morass of fraud you have directly helped perpetuate.  I would strongly advise you to preserve and protect every document and communication in your company’s and executive’s personal records (including hard drives and other storage devices) that contain any reference to my name, family, complaints, reports, business dealings, lawsuits, and data related to me in any manner whatsoever.

This information will be the subject of discovery upon ALL YOUR companies (MERS 1 to 3) in upcoming and pending litigation involving your firm.

To that end, please take note of the article below and govern yourselves accordingly!


Federal Judge Sanctions Tech Company Over Handling of E-Discovery

August 27, 2010

A federal judge has sanctioned a leading developer of “flash drive” technology for its mishandling of electronic discovery in what the judge called a “David and Goliath-like” struggle.

Southern District Judge William H. Pauley ruled that he would instruct the jury to draw a negative inference from the fact that SanDisk Corp., a company with a market capitalization of $8.7 billion, had lost the hard drives from laptop computers it issued to two former employees who are the plaintiffs in Harkabi v. Sandisk Corp., 08 Civ. 8230.

SanDisk must be “mortif[ied]” by the ex-employees’ argument that the company, as a leading purveyor of electronic data storage devices, cannot claim that it made an “innocent” mistake in losing the hard-drive data, Pauley wrote.

That argument is on target, the judge concluded, noting that SanDisk’s “size and cutting edge technology raises an expectation of competence in maintaining its own electronic records.”

Pauley also awarded $150,000 in attorney’s fees to the two plaintiffs, Dan Harkabi and Gidon Elazar, because of delays the company caused in producing their e-mails during the 17 months they worked for SanDisk.

In 2004, the plaintiffs sold a software company they had founded in Israel to SanDisk for $10 million up front. An additional $4 million was to be paid depending on the level of sales SanDisk realized over the next two years on products “derived” from technology developed by the Israeli company. As part of the deal, Harkabi and Elazar moved to New York and began working for SanDisk.

At the end of the two-year period, SanDisk contended the threshold for the Israeli software developers to claim their “earn-out” fee had not been met, and offered them $800,000. When the developers continued to demand the full $4 million, SanDisk ended their employment.

One of the key issues in the suit is whether a SanDisk flash drive called “U3” contained software “derived” from a product the two plaintiffs developed in Israel.

Flash drives are compact data storage devices about the size of a stick of gum used to transport data from one computer to another.

The Israeli company had developed software that could be used to encrypt flash drives so the data would be secured for personal use only. The owner would not be able to transfer copyrighted data such as movies, computer applications, books or other materials.

The two developers claim that SanDisk sold 15 million U3 flash drives. Under their contract, SanDisk had to sell 3.2 million flash drives utilizing an encryption system derived from the product plaintiffs had developed in Israel.

The developers contend that the U3 is derived from the Israeli product. SanDisk disputes any connection.

As the dispute began to heat up in 2007, the developers’ lawyers at the time asked SanDisk to preserve information on their client’s laptops.

SanDisk’s in-house counsel issued a “do-not-destroy” letter, and the two laptops were stored in a secure area for more than a year. But at some point a decision was made to re-issue the two laptops to other employees after the data from the hard drives had been separately preserved.

SanDisk’s response in the initial round of electronic discovery was a declaration from an in-house lawyer that “I have no reason to believe” the April 2007 “do-not-destroy” memo “was not fully complied with.”

SanDisk also produced 1.4 million documents, which it described as “everything” found in response to the developers’ electronic discovery demands. Six weeks later, however, the company acknowledged it was unable to retrieve the data from the laptops’ hard drives. But the two developers created their own software to analyze the 1.4 million documents received in discovery and concluded that much of their e-mail correspondence had not been turned over, according to the opinion.

SanDisk subsequently conceded that it had not turned over all of the developers’ e-mails, but has since begun the process of retrieving the missing e-mails from backup files.

A negative inference with regard to the data on the lost hard drives, Pauley concluded, is warranted because “the undisputed facts reveal a cascade of errors, each relatively minor,” which added to a significant discovery failure.

The loss of the hard-drive data has deprived the two developers of the opportunity to present “potentially powerful evidence” on the key issue of whether the U3 flash drive was derived from encryption software developed by the pair in Israel.

Although the missing e-mails eventually will be available at trial, Pauley concluded, SanDisk should nonetheless pay the developers $150,000 to cover their added legal costs for discovery.

SanDisk’s “misrepresentations” about its initial electronic document production, he wrote, “obscured the deficiencies and stopped discovery in its tracks.”

He added, “But for plaintiffs’ forensic analysis and their counsel’s persistence those deficiencies may not have come to light.”

Charles E. Bachman, of O’Melveny & Myers, who represented SanDisk, said the company would have no comment.

Harkabi and Elazar were represented by Charles A. Stillman and Daniel V. Shapiro of Stillman, Friedman & Shechtman.

© 2010-19 FORECLOSURE FRAUD | by DinSFLA. All rights reserved.

Posted in chain in title, concealment, conflict of interest, conspiracy, CONTROL FRAUD, corruption, discovery, foreclosure, foreclosure fraud, foreclosures, forensic document examiner, forensic mortgage investigation audit, insider, investigation, MERS, MERSCORP, mortgage, MORTGAGE ELECTRONIC REGISTRATION SYSTEMS INC., Mortgage Foreclosure Fraud, notary fraud, note, quiet title, R.K. Arnold, Real Estate, robo signers, sanctioned, securitization, servicers,, Trusts, Wall Street1 Comment

Questioned Document Examination | By E’LYN BRYAN

Questioned Document Examination | By E’LYN BRYAN

posted with written permission from Author

By E’Lyn Bryan


An overview of the basic techniques and technology

AT NO TIME IN HISTORY was crime more rampant than it is today. White-collar crime accounts for more than $140 billion in losses annually. Nearly $20 billion worth of check fraud occurs annually. More than $2 million of worthless checks are passed daily. Telemarketing accounts for $48 billion in fraud, while according to the FBI, Internet fraud as of 2009 had topped $264 million in online losses. A crime wave of this proportion has put the services of competent investigators and certified forensic-document examiners in high demand.

This article is intended to educate and assist attorneys or investigators when they are speaking with attorneys, judges, or clients about cases that involve questioned documents. There are numerous types of cases where a document or handwriting evidence may be involved as a result of being found either at the crime scene or at the center of a civil suit.

A competent investigator is cognizant of all the clues at a crime scene. Items such as credit-card receipts, legal papers, canceled checks, personal notes, leases, and other types of documents and writing may hold the clues to the motive. The observant investigator will call attention to these documents. An investigator who does not think along those lines may miss the subtle clues that could be found on even the smallest scrap of paper, on a blank writing pad (that might reveal “invisible” indented writing), or among the personal belongings of a victim.

Crimes involving fraud, larceny, forged wills, death threats, identity theft, ransom notes, poison-pen letters, “other-hand” disguised writing, traced signatures, assisted deathbed signatures, altered medical records, fingerprint examination, ink and paper analysis, watermarks, contrived faxes, “cut-and-pasted” signatures on legal documents, anachronisms (chronological errors, such as paper or ink that did not exist simultaneously), disputed pre- and post-nuptial agreements, and auto-pen signatures are examples of the types of cases that are filed in our courts every day. An investigator should be aware of the fact that any documents or written material found at the crime scene may hold clues to solving the case, whether it is written on paper, walls, a car door, or a mirror. Questioned documents or writing can be typed, written in blood, lipstick, ink, pencil, or body fluids.

Most documents are written with non-violent, white-collar criminal intent. Others are written with darker purposes in mind: murder, stalking, kidnapping, and suicide. In questioned-document investigations—as in any investigation—it is the duty of the document examiner to remove the shadow of doubt. The examiner, if possible, will determine—without prejudice—if the document is authentic or forged, original or altered. The document examiner is an advocate of the courts. Examiners do not have clients; they represent the justice system. As a result, the examiner cannot become emotionally involved or empathetic. Upon initial contact, the examiner must disclose a non-fiduciary relationship to the person who retains the examiner’s services.

A well-trained document examiner knows to examine all the physical features of a questioned document, not just the questioned signature. There are dozens of components to consider when examining a signature or a document. Characteristics to consider include the writing medium used and the surface it is written upon, the age of the paper or ink, and watermarks.

There are deletions, alterations, inclusions, and other aspects that must be considered, as well. The evaluation of letter formations, pen strokes, pen pressure, spacing, letter height, relation to the baseline, and slant are all part of the evaluation process.

When a document is typewritten, there are other problems to consider. Was a page added after the fact? Is the page a copy? Did someone possibly apply “white out” on the original, type over it, and then make a copy so that it looks like an original? Was another typewriter used to make the forgery or the added page? And what about a computer-generated document? Are the pages all from the same ream of paper? With technology such as infrared and ultraviolet light sources, these questions can be answered.

On a daily basis, document examiners are faced with a multitude of questioned-document problems. The most common cases, for example, involve forged checks, forged wills, graffiti, credit-card fraud, leases, deeds, contracts to purchase items—including homes, cars, and businesses—mortgage fraud, disguised writing, and poison-pen letters (hate letters). With the improved technology of printers and copiers, forging and counterfeiting is rampant through the use of “cut and paste” and “lifting signatures”.

It is well known that the field of digital science is constantly evolving. As new technology becomes available, the document examiner must stay on top of the latest state-of-the-art and work to anticipate the ways criminals may use new technology to their advantage. The certified forensic document examiner must utilize all the latest techniques and technology that science has to offer when examining questioned documents. When investigating digital crimes—crimes such as forged passports, driver’s licenses, computer-generated documents, and digital images inserted into other items—document examiners are referred to as digital-crime investigators.

Comparative Ink Analysis

The newest technology today is found in comparative ink analysis equipment. One very useful forensic tool in pen-formula differentiation is ink analysis that involves the determination of chemicals specific to certain types of compounds. One method used to identify a certain kind of ballpoint-pen ink is called thin-layer chromatography. The process involves using an ultraviolet-visible photodiode array detector that allows for the dye components to be rapidly separated.

A standard is a known authentic sample from which comparisons are made. The United States Secret Service and the Internal Revenue Service (IRS) jointly maintain the International Ink Library. This collection includes more than 9,500 inks, dating from the 1920s. New inks are chemically tested and added to this database on a regular basis. This reference serves as a great resource for the detection of fraudulent signatures and documents.

In the comparison of inks, chemical analysis can be useful in a number of cases, such as medical charts, tax evasion, insurance fraud, altered checks, counterfeiting, and other types of forgeries or frauds. A 2004 article from the Associated Press referenced ink-comparison evidence as one piece of evidence that assisted in the high-profile conviction of Martha Stewart. Examination of the ink on a document showed that an entry was made at a different time, possibly as an attempt to cover up insider-trading violations.

Aging Papers and Inks

The age of paper and ink can provide important clues when attempting to verify and authenticate a document. A key example was the Hitler Diaries case from the 1980s—one that involved purported diaries written by Adolf Hitler. The document examiner in the case unknowingly compared forged writing to the writing of the diaries. Taking the authentication and investigation one step further, the diaries were sent to a laboratory where the paper and ink was analyzed. It was proven conclusively that the document could not have been written by Hitler, since there were chemical compounds discovered in the paper of the book’s cover that were not available when Hitler was alive. The age of paper can be determined according to the additives and chemicals or by watermarks. The Hitler Diaries, as well as many other questioned historical papers, have been debunked, while others have been authenticated.

Two new methods of determining the relative age of ballpoint inks has recently come to the forefront in forensic-document examination. Studies have shown that different inks have different drying times. The new method for analyzing the drying time of ink is done by chemical analysis. Unfortunately, this is a destructive process.

These new developments are extremely important when examining ledger or medical-record entries. It has been established that the longer ink has been on a sheet of paper, the slower it will dissolve in the various solvents used to analyze them. It is now possible to identify the age of ink to within a six-month period. This new process of dating the age of inks has had dramatic impact on the examination and detection of backdated documents. Many malpractice cases have been won due to the analysis of ink on questioned medical records.

Infrared Comparisons

Infrared-imaging equipment and infra-red photography have given the document examiner an exciting new world of technology for investigating cases. Although this is not a new concept, the technology has been refined and taken to mind-boggling new heights.

The mechanics behind infrared are quite simple. The human eye perceives the reflected portion of the light spectrum. But there is much more of the spectrum that the human eye cannot see. For instance, when we see a rainbow, we are not seeing all the colors that exist. We see only red, orange, yellow, green, blue, indigo and violet. The colors on each side of the rainbow that we cannot see with the naked eye are the ultraviolet (UV) and infrared (IR) areas. The instruments we need to convert UV and IR wavelengths of the light spectrum into visible images for the human eye are called video spectral comparators and forensic imaging spectrometers. This equipment is used for non-destructive analysis of questioned documents in the presence of seemingly equal but physically different features of writing. With IR and UV, we can see “through” writing that has been blacked out or obscured by “white out”, as well as scribbled-out writing.

With split-screen and overlay software, direct visual comparison can be made of several individual images. Erased elements or chemically altered characters can be easily detected with IR and UV technology. The exceptional sensitivity and broad spectral range can detect even the slightest differences in similar inks, not seen by the unaided eye. This equipment is at the highest level of authentication technology available today.

Obliterated, faded, or altered writing can also be detected with IR and UV analysis. In a recent case handled by the IRS, the IRS claimed the defendant could not prove an expense he had written off for office equipment because the receipt had faded. The paper was old and the writing was “invisible”. Under an IR filter, the “blank” receipt luminesced, showing writing that was outside the wavelength of visible light to the naked eye.

Electrostatic Detection Apparatus

Another valuable piece of equipment to the document examiner is an electrostatic detection apparatus (ESDA). With an ESDA and specialized infra-red side-lighting photographic techniques, the characteristic indentations found in writing may prove that the writing was traced. In addition, when the top page of a pad that has been written on is removed, the “blank” writing underneath can be processed with an ESDA to show the writing by the indentations on the pages below. Research performed by the John Jay College of Criminal Justice in New York City indicates that an ESDA can recover indented impressions from documents that were written up to 60 years earlier.

The technology behind the ESDA is fairly simple: To develop the indentations on paper, the indented paper is placed in a high-humidity device and transferred onto a bronze vacuum plate. The page is then carefully covered with a Mylar (transparent, non-conducting) film. The page is then electrically charged so that toner will adhere to the impressions when applied to the Mylar covering. The final step is to pour the toner on the Mylar. This process develops the page containing the various indentations.

An example of the use of an ESDA in a recent case involved a bust on a PCP drug lab. Although there was no paper evidence at the scene of the raid, the telephone book at the scene was analyzed and, in the end, it held the incriminating evidence—only visible by use of the ESDA. An astute investigator noticed a telephone book on the counter where the drugs were being processed. On the cover of the phone book were slight indentations that appeared to be writing. The indentations were restored by ESDA and the writing was compared to that of the known chief chemist of the PCP lab. The writing the ESDA retrieved was the chemical formulas, written by the chief chemist. Busted!

As an investigator, you need to think outside the parameters of visible evidence. Evidence to solve your case may be right in front of you and may easily go unnoticed. In this case of the PCP lab, the real incriminating evidence was truly invisible. If not for the trained eye of the investigator, the case may have been dismissed for lack of solid evidence that could link the suspect with the actual manufacturer of the drugs.

As an advocate of the court, the document examiner is relied upon to dispel any doubts about a questioned document. Sometimes, the examiner simply will not be able to render an opinion on certain documents. In those instances, the document examiner’s letter of opinion will state an explicit explanation.

From murder scenes where notes are left behind, to kidnappings, to white-collar crimes such as forged checks, document examiners, investigators, and the technology they utilize prove to be a formidable team.

Questioned documents are a global issue. As investigators, you must be cognizant of the technologically advanced level of the criminals we face today. We must use all of the intelligence, the technology, and the resources available to educate ourselves on the topic of continually evolving criminal minds.

About the Author

E’lyn Bryan is a court-qualified and certified document examiner through the National Questioned Document Association. She offers presentations and training sessions for businesses and law-enforcement agencies on questioned-document examination. She is the current president of the South Florida Investigators Association and a member of the World Association of Detectives. She can be reached by phone at: 561-361-0007 or by e-mail at:

Litigation Support
Forensic Document Examiners Inc.
div. of Forensic Bureau of Investigations Inc.
President of South Florida Investigators Association
Instructor of Forensic Document Examination to Law Enforcement
National Association of Document Examiners
World Association of Detectives
Gold Coast Forensics Association
Florida Association of Private Investigators
Member of South County Bar Association
Forensic Expert Witness Association


© 2010-19 FORECLOSURE FRAUD | by DinSFLA. All rights reserved.

Posted in bogus, CONTROL FRAUD, forensic document examiner, forgery, investigation, notary fraud, robo signers, STOP FORECLOSURE FRAUD1 Comment

EXTRA! EXTRA! Read All about the misconduct of Lender Processing Services f/k/a FIDELITY a/k/a LPS

EXTRA! EXTRA! Read All about the misconduct of Lender Processing Services f/k/a FIDELITY a/k/a LPS

“LPS’ characterization of itself as a stranger to this bankruptcy case is unsupported by the evidence. There is a very live case or controversy concerning the conduct of Fidelity in this bankruptcy case.”

“Lawyers must not allow the interests or dictates of a client to control their professional judgment.”

Source: FRAUD DIGEST Lynn Szmoniak ESQ.

[ipaper docId=29739244 access_key=key-1pj6pzjbutdq5i5vvixh height=600 width=600 /]

© 2010-19 FORECLOSURE FRAUD | by DinSFLA. All rights reserved.

Posted in assignment of mortgage, foreclosure, foreclosure fraud, foreclosure mills, foreclosures, forensic document examiner, MERS, MERSCORP, MORTGAGE ELECTRONIC REGISTRATION SYSTEMS INC.0 Comments

Advertise your business on


Please Support Me!

All Of These Are Troll Comments