counterfeit - FORECLOSURE FRAUD

Tag Archive | "counterfeit"

Did Chase (or Chase’s lawyer) fake foreclosure evidence AFTER doing the deal w/ Fed & State law enforcers? You decide:

Did Chase (or Chase’s lawyer) fake foreclosure evidence AFTER doing the deal w/ Fed & State law enforcers? You decide:


Thanks to Abigail Field for the title post and thank you to Joe over at BP Investigative Agency for this submission.

According to a Handwriting Expert… yes, documents were forged and altered.

As if Breaking and Entering weren’t enough, add forgery to the lengths JP Morgan Chase will go to take a home.

When foreclosure proceedings began on William Paatalo’s  Montana property in  January 2010, he, like many homeowners, felt emotionally drained and devastated. “ I couldn’t believe how I got to this place.  I had perfect credit in 2008.  I was making payments on three properties through Washington Mutual, but they began to misapply payments to the wrong accounts and even turned off my ‘auto-pay’ feature in an attempt to sabotage my credit and spin me into default.”

  By the time Paatalo discovered the error, his credit had tanked and things started spiraling downward. “It was brutal. My business lines of credit were shut down, and I couldn’t access any of my lines of credit ; WAMU was slow to acknowledge the problem; the credit agencies ignored me; and then I got the foreclosure notices.  It was a living hell. I spent a lot time being angry. “

In the end, Paatalo did what many home owners  are now doing.  He started pushing back.  “I didn’t want to just roll over.  I figured I still had some rights, so I began the painstaking process of researching my loan in hopes I could modify or delay the action.  The Trustee’s sale wasn’t   scheduled until June, so I figured I had a little bit of time to rectify the situation.”

But unbeknownst to Paatalo, Chase, who had acquired WAMU in 2008, took early action.  In March, they broke into his home, changed all the locks, and stole property, including  personal documents and a handgun.  “I was out of town, and when I found out what they had done I was outraged.” 

Paatalo filed a criminal complaint and took additional action. However, law enforcement sat idle as it was perceived to be a “civil matter.”  Tired of being victimized, he began investigating practices in the mortgage industry and uncovered much of what is now known.  In October of 2010 he filed suit against JP Morgan Chase pro se and has been litigating since then. 

But his case, scheduled for trial in September, took a bizarre turn recently.  “I was reading about the class action suit in California Bakenie v. JPMorgan Chase Bank  and I got to wondering if my note might’ve been forged.  So I got a color copy of the note, and in my office I magnified the signatures 800 fold.”

What he found was astounding.  Even to the layman’s eye, the signatures appeared to have been photo-shopped.  In one instance, even the signature line was colored blue.  “I couldn’t believe what I was seeing.  It looked like something a high school kid did. 

 Paatalo sent the document to Dr. Laurie Hoeltzel  in southern California;  a handwriting / document expert with over 20 years of experience.  Her findings verified what Paatalo suspected, the documents had indeed been forged.  “All along Chase has argued on record they hold the note.  Clearly, they do not.  It’s one thing to claim the note entitles them to foreclose, it’s another to commit a felonious act to illegally take a home they are not entitled to.  It’s absolutely appalling.  This is no longer a civil dispute.”

 Paatalo intends to file a criminal complaint against Chase, along with formal Bar complaints against their attorneys . The expert declaration is now in the hands of Montana’s Federal Magistrate Judge Carolyn  Ostby.   How this new information plays out in court is yet to be determined, but Paatalo is sure of one thing.  “Nothing these banks do surprises me anymore.  I can only hope our judicial system has the backbone to hold these people accountable.”

 Addendum:  Paatalo notified Chase of his discovery last week and was attempting to have the evidence surrendered to the court and sequestered.  After all, attorneys have a duty to uphold justice and refrain from assisting in fraud. He was notified today by Chase’s attorney that the documents had been removed from Butte, Montana and are now in Minneapolis, Minnesota.  Paatalo has objected to the transferring of the documents, and Chase’s attempts to withhold evidence of a crime.


Read the handwriting expert’s affidavit below begin at page 5…

[ipaper docId=86007729 access_key=key-2fuvvomrypzyggrt999p height=600 width=600 /]

 

 

© 2010-19 FORECLOSURE FRAUD | by DinSFLA. All rights reserved.



Posted in STOP FORECLOSURE FRAUDComments (1)

As We Were Saying, eMortgage Coming To Your Town?

As We Were Saying, eMortgage Coming To Your Town?


Come hungry…close a loan electronically within 15 minutes and with doughnuts. Not like it took any longer the paper route!

Providing all the ‘errors’ and ‘mistakes’ currently happening in foreclosure land, just hope your eNote/eMortgage doesn’t get deleted by accident.

via Housing Wire:

Harry Gardner, president of SigniaDocs, said the perfect infrastructure is one that manages all mortgage documents electronically, but the number of loans in the Mortgage Electronic Registration Systems’ eRegistry is about 200,000, or “a small fraction of mortgages written in the last 10 years.”

“And by eMortgage, we mean truly paperless not some hybrid of some paper and some electronic documentation,” Gardener said. “Ten years ago, we were saying mainstream eMortgage documentation was three to five years away, and I’m happy to say that mainstream eMortgage documentation is now three to five years away.”

continue reading….  Housing Wire

© 2010-19 FORECLOSURE FRAUD | by DinSFLA. All rights reserved.



Posted in STOP FORECLOSURE FRAUDComments (0)

eMortgages, eNotes …Get Ready For The No-DOC Zone

eMortgages, eNotes …Get Ready For The No-DOC Zone


For you to understand the plan the financial institutions have you need to grasp the following. Will MERS patterns continue? Imagine the price you will pay when these files are hacked or manipulated.

Everyone knows by now that MERS was ‘invented’ to keep costs low for the banks, reduce the risk of record-keeping errors and make it easier to keep track of loans for the banks not the borrowers. By these actions, not only has MERS eliminated crucial chain in title documents, has proven in many court cases to assign absolutely nothing because it had no power to negotiate the note but also eliminated an enormous amount of county revenues.

Last week SFF wrote about the latest invention planned to coexist with MERS called SmartSAFE, which will be used for creating, signing, storing, accessing and managing the lifecycle of electronic mortgage documents. According to Wave’s eSignSystems Executive VP Kelly Purcell, “Mortgages are sold several times throughout the life of a loan, and electronic mortgages address the problem of the ‘lost note,’ while improving efficiency in the process.”

This goes a step forward of what MERS can do today.

Will this process eliminate recording paper mortgages/deeds from county records? Eliminate fees that counties in trouble desperately need? THIS IS VERY DANGEROUS.

Still with me? Finally, according to CUinsight, a sample eNote in the form of a MRG Category 1 classified SMARTDoc, was successfully delivered to Xerox’s BlitzDocs eVault, a virtual repository that connects directly to the MERS® eRegistry and eDelivery systems, where it was electronically signed and registered.

Adding the finishing touches to permit MERS access to future eNotes? I say this is the master plan.

Looking forward to what MA John O’Brien, the Essex County register of deeds, NC Register of deeds Jeff Thigpen and NY Suffolk County, former county clerk Ed Romaine’s approach is after they read what they plan on doing to land records. If they thought it was limited to the elimination of recording fees for assignments of mortgage, they are mistaken.

Questions remain as to why replace something that has been working for so long? Why continue with MERS, a system which has failed in many ways? MERS is under investigation for fraud is it not? Why in a time where mortgage fraud is wide spread, will anyone even trust using electronic devices to manage possibly future trillions of dollars worth?

Say farewell to a tradition that has been here for well over 300 years. Eliminating ‘paper’ will put promissory notes and  mortgage related documents in great jeopardy. No computer system in the world is secure [PERIOD].

© 2010-19 FORECLOSURE FRAUD | by DinSFLA. All rights reserved.



Posted in STOP FORECLOSURE FRAUDComments (1)

LQQK ‘MOM’, No paper, Lost Paper, Detroyed and Misfiled Paper…The Next Wave

LQQK ‘MOM’, No paper, Lost Paper, Detroyed and Misfiled Paper…The Next Wave


Before you go down to the “New Device” take a look back when THE FLORIDA BANKER’S ASSOCIATION ADMITTED THAT NOTES ARE DESTROYED:

This is a direct quote from the Florida Banker’s Association Comments to the Supreme Court of Florida files September 30, 2009:

“It is a reality of commerce that virtually all paper documents related to a note and mortgage are converted to electronic files almost immediately after the loan is closed. Individual loans, as electronic data, are compiled into portfolios which are transferred to the secondary market, frequently as mortgage-backed securities.

The reason “many firms file lost note counts as a standard alternative pleading in the complaint” is because the physical document was deliberately eliminated to avoid confusion immediately upon its conversion to an electronic file. See State Street Bank and Trust Company v. Lord, 851 So. 2d 790 (Fla. 4th DCA 2003). Electronic storage is almost universally acknowledged as safer, more efficient and less expensive than maintaining the originals in hard copy, which bears the concomitant costs of physical indexing, archiving and maintaining security. It is a standard in the industry and becoming the benchmark of modern efficiency across the spectrum of commerce—including the court system.”

Now if there is no issues surrounding what everyone is shouting from their roof tops, then why integrate a new software that was suppose to have been implemented already to “Improves Efficiency & Transparency of Electronic Mortgage Transactions” within MERS itself?

THEY KNOW THEY HAVE A PROBLEM!

Now from SYS-CON on SmartSAFE

“During the foreclosure crisis of the last few years we saw many instances where the original and subsequent paperwork was lost, destroyed or misfiled when loans were bought and sold,” commented Kelly Purcell, Executive Vice President for Wave’s eSignSystems division. “Mortgages are sold several times throughout the life of a loan, and electronic mortgages address the problem of the ‘lost note,’ while improving efficiency in the process.”

This will debut during next week’s MBA National Technology in Mortgage Banking Conference and Expo 2011 (at the Westin Diplomat Resort & Spa in Ft. Lauderdale, Fla.).

Will this be the new system that will eventually take over MERS as MOM?

This one is both “Smart & Safe” <wink>


 

© 2010-19 FORECLOSURE FRAUD | by DinSFLA. All rights reserved.



Posted in STOP FORECLOSURE FRAUDComments (1)

FORM X-17F-1A MISSING/LOST/STOLEN/COUNTERFEIT SECURITIES REPORT

FORM X-17F-1A MISSING/LOST/STOLEN/COUNTERFEIT SECURITIES REPORT


General Rules and Regulations
promulgated
under the
Securities Exchange Act of 1934

Rule 17f-1 — Requirements for Reporting and Inquiry with Respect to Missing, Lost, Counterfeit or Stolen Securities


(a) Definitions. For purposes of this section:

(1) The term reporting institution shall include every national securities exchange, member thereof, registered securities association, broker, dealer, municipal securities dealer, government securities broker, government securities dealer, registered transfer agent, registered clearing agency, participant therein, member of the Federal Reserve System and bank whose deposits are insured by the Federal Deposit Insurance Corporation;

(2) The term uncertificated security shall mean a security not represented by an instrument and the transfer of which is registered upon books maintained for that purpose by or on behalf of the issuer;

(3) The term global certificate securities issue shall mean a securities issue for which a single master certificate representing the entire issue is registered in the nominee name of a registered clearing agency and for which beneficial owners cannot receive negotiable securities certificates;

(4) The term customer shall mean any person with whom the reporting institution has entered into at least one prior securities-related transaction; and

(5) The term securities-related transaction shall mean a purpose, sale or pledge of investment securities, or a custodial arrangement for investment securities.

(6) The term securities certificate means any physical instrument that represents or purports to represent ownership in a security that was printed by or on behalf of the issuer thereof and shall include any such instrument that is or was:

(i) Printed but not issued;

(ii) Issued and outstanding, including treasury securities;

(iii) Cancelled, which for this purpose means either or both of the procedures set forth in Sec. 240.17Ad-19(a)(1); or

(iv) Counterfeit or reasonably believed to be counterfeit.

(7) The term issuer shall include an issuer’s:

(i) Transfer agent(s), paying agent(s), tender agent(s), and person(s) providing similar services; and

(ii) Corporate predecessor(s) and successor(s).

(8) The term missing shall include any securities certificate that:

(i) Cannot be located or accounted for, but is not believed to be lost or stolen; or

(ii) A transfer agent claims or believes was destroyed in any manner other than by the transfer agent’s own certificate destruction procedures as provided in Sec. 240.17Ad-19.

(b) Every reporting institution shall register with the Commission or its designee in accordance with instructions issued by the Commission except:

(1) A member of a national securities exchange who effects securities transactions through the trading facilities of the exchange and has not received or held customer securities within the last six months;

(2) A reporting institution that, within the last six months, limited its securities activities exclusively to uncertificated securities, global securities issues or any securities issue for which neither record nor beneficial owners can obtain a negotiable securities certificate; or

(3) A reporting institution whose business activities, within the last six months, did not involve the handling of securities certificates.

(c) Reporting requirements–

(1) Stolen securities.

(i) Every reporting institution shall report to the Commission or its designee, and to a registered transfer agent for the issue, the discovery of the theft or loss of any securities certificates where there is substantial basis for believing that criminal activity was involved. Such report shall be made within one business day of the discovery and, if the certificate numbers of the securities cannot be ascertained at that time, they shall be reported as soon thereafter as possible.

(ii) Every reporting institution shall promptly report to the Federal Bureau of Investigation upon the discovery of the theft or loss of any securities certificate where there is substantial basis for believing that criminal activity was involved.

(2) Missing or lost securities. Every reporting institution shall report to the Commission or its designee, and to a registered transfer agent for the issue, the discovery of the loss of any securities certificate where criminal actions are not suspected when the securities certificate has been missing or lost for a period of two business days. Such report shall be made within one business day of the end of such period except that:

(i) Securities certificates lost, missing, or stolen while in transit to customers, transfer agents, banks, brokers or dealers shall be reported by the delivering institution by the later of two business days after notice of non-receipt or as soon after such notice as the certificate numbers of the securities can be ascertained.

(ii) Where a shipment of retired securities certificates is in transit between any transfer agents, banks, brokers, dealers, or other reporting institutions, with no affiliation existing between such entities, and the delivering institution fails to receive notice of receipt or non-receipt of the certificates, the delivering institution shall act to determine the facts. In the event of non-delivery where the certificates are not recovered by the delivering institution, the delivering institution shall report the certificates as lost, stolen, or missing to the Commission or its designee within a reasonable time under the circumstances but in any event within twenty business days from the date of shipment.

(iii) Securities certificates considered lost or missing as a result of securities counts or verifications required by rule, regulation or otherwise (e.g., dividend record date verification made as a result of firm policy or internal audit function report) shall be reported by the later of ten business days after completion of such securities count or verification or as soon after such count or verification as the certificate numbers of the securities can be ascertained.

(iv) Securities certificates not received during the completion of delivery, deposit or withdrawal shall be reported in the following manner:

(A) Where delivery of the securities certificates is through a clearing agency, the delivering institution shall supply to the receiving institution the certificate number of the security within two business days from the date of request from the receiving institution. The receiving institution shall report within one business day of notification of the certificate number;

(B) Where the delivery of securities certificates is in person and where the delivering institution has a receipt, the delivering institution shall supply the receiving institution the certificate numbers of the securities within two business days from the date of request from the receiving institution. The receiving institution shall report within one business day of notification of the certificate number;

(C) Where the delivery of securities certificates is in person and where the delivering institution has no receipt, the delivering institution shall report within two business days of notification of non-receipt by the receiving institution; or

(D) Where delivery of securities certificates is made by mail or via draft, if payment is not received within ten business days, the delivering institution shall confirm with the receiving institution the failure to receive such delivery; if confirmation shows non-receipt, the delivering institution shall report within two business days of such confirmation.

(3) Counterfeit securities. Every reporting institution shall report the discovery of any counterfeit securities certificate to the Commission or its designee, to a registered transfer agent for the issue, and to the Federal Bureau of Investigation within one business day of such discovery.

(4) Transfer agent reporting obligations. Every transfer agent shall make the reports required above only if it receives notification of the loss, theft or counterfeiting from a non-reporting institution or if it receives notification other than on a Form X-17F-1A or if the certificate was in its possession at the time of the loss.

(5) Recovery. Every reporting institution that originally reported a lost, missing or stolen securities certificate pursuant to this Section shall report recovery of that securities certificate to the Commission or its designee and to a registered transfer agent for the issue within one business day of such recovery or finding. Every reporting institution that originally made a report in which criminality was indicated also shall notify the Federal Bureau of Investigation that the securities certificate has been recovered.

(6) Information to be reported. All reports made pursuant to this Section shall include, if applicable or available, the following information with respect to each securities certificate:

(i) Issuer;

(ii) Type of security and series;

(iii) Date of issue;

(iv) Maturity date;

(v) Denomination;

(vi) Interest rate;

(vii) Certificate number, including alphabetical prefix or suffix;

(viii) Name in which registered;

(ix) Distinguishing characteristics, if counterfeit;

(x) Date of discovery of loss or recovery;

(xi) CUSIP number;

(xii) Financial Industry Numbering System (”FINS”) Number; and

(xiii) Type of loss.

(7) Forms. Reporting institutions shall make all reports to the Commission or its designee and to a registered transfer agent for the issue pursuant to this section on Form X-17F-1A. Reporting institutions shall make reports to the Federal Bureau of Investigation pursuant to this Section on Form X-17F-1A, unless the reporting institution is a member of the Federal Reserve System or a bank whose deposits are insured by the Federal Deposit Insurance Corporation, in which case reports may be made on the form required by the institution’s appropriate regulatory agency for reports to the Federal Bureau of Investigation.

(d) Required inquiries.

(1) Every reporting institution (except a reporting institution that, acting in its capacity as transfer agent, paying agent, exchange agent or tender agent for an equity issue, or registrar for a bond or other debt issue, compares all transactions against a shareholder or bondholder list and a current list of stop transfers) shall inquire of the Commission or its designee with respect to every securities certificate which comes into its possession or keeping, whether by pledge, transfer or otherwise, to ascertain whether such securities certificate has been reported as missing, lost, counterfeit or stolen, unless:

(i) The securities certificate is received directly from the issuer or issuing agent at issuance;

(ii) The securities certificate is received from another reporting institution or from a Federal Reserve Bank or Branch;

(iii) The securities certificate is received from a customer of the reporting institution; and

(A) Is registered in the name of such customer or its nominee; or

(B) Was previously sold to such customer, as verified by the internal records of the reporting institution;

(iv) The securities certificate is received as part of a transaction which has an aggregate face value of $10,000 or less in the case of bonds, or market value of $10,000 or less in the case of stocks; or

(v) The securities certificate is received directly from a drop which is affiliated with a reporting institution for the purposes of receiving or delivering certificates on behalf of the reporting institution.

(2) Form of inquiry. Inquiries shall be made in such manner as prescribed by the Commission or its designee.

(3) A reporting institution shall make required inquiries by the end of the fifth business day after a securities certificate comes into its possession or keeping, provided that such inquiries shall be made before the certificate is sold, used as collateral, or sent to another reporting institution.

(e) Permissive reports and inquiries. Every reporting insitution may report to or inquire of the Commission or its designee with respect to any securities certificate not otherwise required by this section to be the subject of a report or inquiry. The Commission on written request or upon its own motion may permit reports to and inquiries of the system by any other person or entity upon such terms and conditions as it deems appropriate and necessary in the public interest and for the protection of investors.

(f) Exemptions. The following types of securities are not subject to paragraphs (c) and (d) of this section:

(1) Security issues not assigned CUSIP numbers;

(2) Bond coupons;

(3) Uncertificated securities;

(4) Global securities issues; and

(5) Any securities issue for which neither record nor beneficial owners can obtain a negotiable securities certificates.

(g) Recordkeeping. Every reporting institution shall maintain and preserve in an easily accessible place for three years copies of all Forms X-17F-1A filed pursuant to this section, all agreements between reporting institutions regarding registration or other aspects of this section, and all confirmations or other information received from the Commission or its designee as a result of inquiry.


FORM X-17F-1A MISSING.LOST.STOLEN.COUNTERFEIT

[ipaper docId=43548756 access_key=key-1qi1zzc20m0t0fpvpzes height=600 width=600 /]

© 2010-19 FORECLOSURE FRAUD | by DinSFLA. All rights reserved.



Posted in STOP FORECLOSURE FRAUDComments (1)

Questioned Document Examination | By E’LYN BRYAN

Questioned Document Examination | By E’LYN BRYAN


posted with written permission from Author

By E’Lyn Bryan

QUESTIONED DOCUMENT EXAMINATION

An overview of the basic techniques and technology

AT NO TIME IN HISTORY was crime more rampant than it is today. White-collar crime accounts for more than $140 billion in losses annually. Nearly $20 billion worth of check fraud occurs annually. More than $2 million of worthless checks are passed daily. Telemarketing accounts for $48 billion in fraud, while according to the FBI, Internet fraud as of 2009 had topped $264 million in online losses. A crime wave of this proportion has put the services of competent investigators and certified forensic-document examiners in high demand.

This article is intended to educate and assist attorneys or investigators when they are speaking with attorneys, judges, or clients about cases that involve questioned documents. There are numerous types of cases where a document or handwriting evidence may be involved as a result of being found either at the crime scene or at the center of a civil suit.

A competent investigator is cognizant of all the clues at a crime scene. Items such as credit-card receipts, legal papers, canceled checks, personal notes, leases, and other types of documents and writing may hold the clues to the motive. The observant investigator will call attention to these documents. An investigator who does not think along those lines may miss the subtle clues that could be found on even the smallest scrap of paper, on a blank writing pad (that might reveal “invisible” indented writing), or among the personal belongings of a victim.

Crimes involving fraud, larceny, forged wills, death threats, identity theft, ransom notes, poison-pen letters, “other-hand” disguised writing, traced signatures, assisted deathbed signatures, altered medical records, fingerprint examination, ink and paper analysis, watermarks, contrived faxes, “cut-and-pasted” signatures on legal documents, anachronisms (chronological errors, such as paper or ink that did not exist simultaneously), disputed pre- and post-nuptial agreements, and auto-pen signatures are examples of the types of cases that are filed in our courts every day. An investigator should be aware of the fact that any documents or written material found at the crime scene may hold clues to solving the case, whether it is written on paper, walls, a car door, or a mirror. Questioned documents or writing can be typed, written in blood, lipstick, ink, pencil, or body fluids.

Most documents are written with non-violent, white-collar criminal intent. Others are written with darker purposes in mind: murder, stalking, kidnapping, and suicide. In questioned-document investigations—as in any investigation—it is the duty of the document examiner to remove the shadow of doubt. The examiner, if possible, will determine—without prejudice—if the document is authentic or forged, original or altered. The document examiner is an advocate of the courts. Examiners do not have clients; they represent the justice system. As a result, the examiner cannot become emotionally involved or empathetic. Upon initial contact, the examiner must disclose a non-fiduciary relationship to the person who retains the examiner’s services.

A well-trained document examiner knows to examine all the physical features of a questioned document, not just the questioned signature. There are dozens of components to consider when examining a signature or a document. Characteristics to consider include the writing medium used and the surface it is written upon, the age of the paper or ink, and watermarks.

There are deletions, alterations, inclusions, and other aspects that must be considered, as well. The evaluation of letter formations, pen strokes, pen pressure, spacing, letter height, relation to the baseline, and slant are all part of the evaluation process.

When a document is typewritten, there are other problems to consider. Was a page added after the fact? Is the page a copy? Did someone possibly apply “white out” on the original, type over it, and then make a copy so that it looks like an original? Was another typewriter used to make the forgery or the added page? And what about a computer-generated document? Are the pages all from the same ream of paper? With technology such as infrared and ultraviolet light sources, these questions can be answered.

On a daily basis, document examiners are faced with a multitude of questioned-document problems. The most common cases, for example, involve forged checks, forged wills, graffiti, credit-card fraud, leases, deeds, contracts to purchase items—including homes, cars, and businesses—mortgage fraud, disguised writing, and poison-pen letters (hate letters). With the improved technology of printers and copiers, forging and counterfeiting is rampant through the use of “cut and paste” and “lifting signatures”.

It is well known that the field of digital science is constantly evolving. As new technology becomes available, the document examiner must stay on top of the latest state-of-the-art and work to anticipate the ways criminals may use new technology to their advantage. The certified forensic document examiner must utilize all the latest techniques and technology that science has to offer when examining questioned documents. When investigating digital crimes—crimes such as forged passports, driver’s licenses, computer-generated documents, and digital images inserted into other items—document examiners are referred to as digital-crime investigators.

Comparative Ink Analysis

The newest technology today is found in comparative ink analysis equipment. One very useful forensic tool in pen-formula differentiation is ink analysis that involves the determination of chemicals specific to certain types of compounds. One method used to identify a certain kind of ballpoint-pen ink is called thin-layer chromatography. The process involves using an ultraviolet-visible photodiode array detector that allows for the dye components to be rapidly separated.

A standard is a known authentic sample from which comparisons are made. The United States Secret Service and the Internal Revenue Service (IRS) jointly maintain the International Ink Library. This collection includes more than 9,500 inks, dating from the 1920s. New inks are chemically tested and added to this database on a regular basis. This reference serves as a great resource for the detection of fraudulent signatures and documents.

In the comparison of inks, chemical analysis can be useful in a number of cases, such as medical charts, tax evasion, insurance fraud, altered checks, counterfeiting, and other types of forgeries or frauds. A 2004 article from the Associated Press referenced ink-comparison evidence as one piece of evidence that assisted in the high-profile conviction of Martha Stewart. Examination of the ink on a document showed that an entry was made at a different time, possibly as an attempt to cover up insider-trading violations.

Aging Papers and Inks

The age of paper and ink can provide important clues when attempting to verify and authenticate a document. A key example was the Hitler Diaries case from the 1980s—one that involved purported diaries written by Adolf Hitler. The document examiner in the case unknowingly compared forged writing to the writing of the diaries. Taking the authentication and investigation one step further, the diaries were sent to a laboratory where the paper and ink was analyzed. It was proven conclusively that the document could not have been written by Hitler, since there were chemical compounds discovered in the paper of the book’s cover that were not available when Hitler was alive. The age of paper can be determined according to the additives and chemicals or by watermarks. The Hitler Diaries, as well as many other questioned historical papers, have been debunked, while others have been authenticated.

Two new methods of determining the relative age of ballpoint inks has recently come to the forefront in forensic-document examination. Studies have shown that different inks have different drying times. The new method for analyzing the drying time of ink is done by chemical analysis. Unfortunately, this is a destructive process.

These new developments are extremely important when examining ledger or medical-record entries. It has been established that the longer ink has been on a sheet of paper, the slower it will dissolve in the various solvents used to analyze them. It is now possible to identify the age of ink to within a six-month period. This new process of dating the age of inks has had dramatic impact on the examination and detection of backdated documents. Many malpractice cases have been won due to the analysis of ink on questioned medical records.

Infrared Comparisons

Infrared-imaging equipment and infra-red photography have given the document examiner an exciting new world of technology for investigating cases. Although this is not a new concept, the technology has been refined and taken to mind-boggling new heights.

The mechanics behind infrared are quite simple. The human eye perceives the reflected portion of the light spectrum. But there is much more of the spectrum that the human eye cannot see. For instance, when we see a rainbow, we are not seeing all the colors that exist. We see only red, orange, yellow, green, blue, indigo and violet. The colors on each side of the rainbow that we cannot see with the naked eye are the ultraviolet (UV) and infrared (IR) areas. The instruments we need to convert UV and IR wavelengths of the light spectrum into visible images for the human eye are called video spectral comparators and forensic imaging spectrometers. This equipment is used for non-destructive analysis of questioned documents in the presence of seemingly equal but physically different features of writing. With IR and UV, we can see “through” writing that has been blacked out or obscured by “white out”, as well as scribbled-out writing.

With split-screen and overlay software, direct visual comparison can be made of several individual images. Erased elements or chemically altered characters can be easily detected with IR and UV technology. The exceptional sensitivity and broad spectral range can detect even the slightest differences in similar inks, not seen by the unaided eye. This equipment is at the highest level of authentication technology available today.

Obliterated, faded, or altered writing can also be detected with IR and UV analysis. In a recent case handled by the IRS, the IRS claimed the defendant could not prove an expense he had written off for office equipment because the receipt had faded. The paper was old and the writing was “invisible”. Under an IR filter, the “blank” receipt luminesced, showing writing that was outside the wavelength of visible light to the naked eye.

Electrostatic Detection Apparatus

Another valuable piece of equipment to the document examiner is an electrostatic detection apparatus (ESDA). With an ESDA and specialized infra-red side-lighting photographic techniques, the characteristic indentations found in writing may prove that the writing was traced. In addition, when the top page of a pad that has been written on is removed, the “blank” writing underneath can be processed with an ESDA to show the writing by the indentations on the pages below. Research performed by the John Jay College of Criminal Justice in New York City indicates that an ESDA can recover indented impressions from documents that were written up to 60 years earlier.

The technology behind the ESDA is fairly simple: To develop the indentations on paper, the indented paper is placed in a high-humidity device and transferred onto a bronze vacuum plate. The page is then carefully covered with a Mylar (transparent, non-conducting) film. The page is then electrically charged so that toner will adhere to the impressions when applied to the Mylar covering. The final step is to pour the toner on the Mylar. This process develops the page containing the various indentations.

An example of the use of an ESDA in a recent case involved a bust on a PCP drug lab. Although there was no paper evidence at the scene of the raid, the telephone book at the scene was analyzed and, in the end, it held the incriminating evidence—only visible by use of the ESDA. An astute investigator noticed a telephone book on the counter where the drugs were being processed. On the cover of the phone book were slight indentations that appeared to be writing. The indentations were restored by ESDA and the writing was compared to that of the known chief chemist of the PCP lab. The writing the ESDA retrieved was the chemical formulas, written by the chief chemist. Busted!

As an investigator, you need to think outside the parameters of visible evidence. Evidence to solve your case may be right in front of you and may easily go unnoticed. In this case of the PCP lab, the real incriminating evidence was truly invisible. If not for the trained eye of the investigator, the case may have been dismissed for lack of solid evidence that could link the suspect with the actual manufacturer of the drugs.

As an advocate of the court, the document examiner is relied upon to dispel any doubts about a questioned document. Sometimes, the examiner simply will not be able to render an opinion on certain documents. In those instances, the document examiner’s letter of opinion will state an explicit explanation.

From murder scenes where notes are left behind, to kidnappings, to white-collar crimes such as forged checks, document examiners, investigators, and the technology they utilize prove to be a formidable team.

Questioned documents are a global issue. As investigators, you must be cognizant of the technologically advanced level of the criminals we face today. We must use all of the intelligence, the technology, and the resources available to educate ourselves on the topic of continually evolving criminal minds.

About the Author

E’lyn Bryan is a court-qualified and certified document examiner through the National Questioned Document Association. She offers presentations and training sessions for businesses and law-enforcement agencies on questioned-document examination. She is the current president of the South Florida Investigators Association and a member of the World Association of Detectives. She can be reached by phone at: 561-361-0007 or by e-mail at: bocaforensic@aol.com

Litigation Support
Forensic Document Examiners Inc.
div. of Forensic Bureau of Investigations Inc.

www.FloridaDocumentExaminer.com
President of South Florida Investigators Association
Instructor of Forensic Document Examination to Law Enforcement
National Association of Document Examiners
World Association of Detectives
Gold Coast Forensics Association
Florida Association of Private Investigators
Member of South County Bar Association
Forensic Expert Witness Association

561.361.0007


© 2010-19 FORECLOSURE FRAUD | by DinSFLA. All rights reserved.



Posted in bogus, CONTROL FRAUD, forensic document examiner, forgery, investigation, notary fraud, robo signers, STOP FORECLOSURE FRAUDComments (1)

MUST READ |Yellow Dots of Mystery, on your “original promissory note”

MUST READ |Yellow Dots of Mystery, on your “original promissory note”


Via: Brian K. Korte, Esq.

http://www.signaturemachine.com/products/demo_page.htm

http://www.signaturemachine.com/forms/PDF/GW_MAX_T2.pdf

The information here shows the manner in which a promissory note and mortgage is photocopied and presented to the court as an original. Most of the notes “may” actually be photocopies, the UCC does not provide for photocopies. Lawyers are now bringing in experts to look at all the notes we found using our microscopes.

Attention Homeowners buy a microscope for under $20.00 and find the dots on the fake promissory note, read on and understand how we were have been duped, its a fake note, counterfeit.

5th grade enotes (3)

Power and Control (3)

The Condensed Potomac Two Step (3)

Article 9 by JMcguire (3)

Precision and Detail (1)

5th grade enotes fan fred (1)

UCC 9308 d Collateral does not follow security Instrument for Real estate (1)

What We Know Imaginary Electronic Promissory Notes (2)

FLORIDA BANKER’S ASSOCIATION – LOST NOTES 09-1460_093009_Comments (FBA)1 062710 (2)

suspense account (1)

Esign Trillion Dollar FUBAR (1)

The Mortgage Fraud Envelope (2)

Chain of endorsements visual five star 041910 James McGuire (2)

IAAC (1)

Paper-Electronic Process (3)

IGWTIGWT (1)

Illusion (1)

Chains (1)

MERS-Bifurcation-Negotiable-Instrument-Security-Instrument (1)

Simplicity (1)

Avatar image source: w2.eff.org

© 2010-19 FORECLOSURE FRAUD | by DinSFLA. All rights reserved.



Posted in foreclosure, foreclosure fraud, foreclosures, forgery, noteComments (1)


Advert

Archives

Please Support Me!







Write your comment within 199 characters.

All Of These Are Troll Comments