Products Partners

At CFK we understand that financial technology is the highly affected by the digital risks. This is due to the financial benefit to the offenders.

We have engaged most of financial institutions in Africa and most of them are affected the below issues:

1. Cyber fraud

2. Intellectual property theft

3. Identity theft affecting customers and staff

4. Cyber attacks

As a bank partner with us to enjoy some of these services

1. CyberSecurity awareness and training

2. CyberSecurity assessments

3. Digital forensics investigation

4. Documents examination

5. Online brand protection'

Kindly contact us through This email address is being protected from spambots. You need JavaScript enabled to view it. and talk to us today on how we can partner with you

"We deliver on promise"

Forensic document examiners, also often referred to as questioned document examiners, are forensic scientists who are responsible for using a number of scientific processes and methods for examining documents—whether written, typed, or printed—related to a crime scene investigation.

Forensic document examiners, on the other hand, are skilled forensics scientists with a demonstrated expertise in applied questioned document examination. They are handwriting experts, as well as experts in other areas of document examination, including machine printing processes; and obliterated, indented and erased entries.

Definition of a Document

A document may be broadly defined as anything that bears marks, signs, or symbols which have meaning or conveys a message to someone.

  CFK document examiners perform the following:

  •     Examine documents for signs that they have been forged or altered
  •     Compare signatures and handwriting through handwriting analysis to determine the authorship of documents
  •     Examine typed documents and link them to specific machines or computers (printing process examinations)
  •     Decipher the contents of documents that have been partially destroyed or altered
  •     Compare fractured or cut-edge comparisons on a variety of surfaces, including paper and tape
  •     Examine incidents of indented writing
  •     Perform alternate light source examinations to determine ink discrimination, alterations, and/or enhancements

Handwriting Identification

Handwriting identification is based on the principle that, while handwriting within a language tends to be alike to the degree that we can meaningfully read it, there are individual features that distinguish one person's writing from that of another. Just as no two people are exactly alike, the handwritings of no two people are exactly alike in their combination of characteristics. There are, of course, natural variations within the handwriting of each individual. These variations must be closely and carefully studied by the examiner, so that he can distinguish between what is a "variation" and what is a "difference".

The examiner must also be cognizant of the differences between "class characteristics" and "individual characteristics". Class characteristics are those which are common to a group such as a particular writing system, family grouping, foreign language system, or professional group.  Individual characteristics are those which are personal or peculiar letters or letter combinations, which, taken together, would not occur in the writing of another person.

Handwriting identification is a comparison study requiring authenticated specimens of known handwriting from the individual(s) concerned. These are closely compared to the handwriting characteristics exhibited by the questioned writing in order to determine authorship. Like must be compared to like: printing to printing and cursive to cursive, with comparable letters, letter combinations, words, and numerals.


Below are the classes of forgery commonly encountered:

  •     No attempt is made by the forger to imitate the genuine signature of the person purportedly signing the document.
  •     There is an attempt to imitate the genuine signature by some method of tracing of a model signature.
  •     There is a freehand attempt to simulate the genuine signature from a model.
  •     The document and the purported signer are fictitious.
  •     A "cut & paste" job wherein a genuine signature, or copy thereof, is transferred from some authentic source to a fraudulent document.

Other disputed signatures include those which are genuine but which were disguised, or written in some illegible manner, by the writer for the purpose of later deniability; and signatures which, though genuine, the author either has no memory of executing or is unwilling to accept as genuine.

It is possible for the document examiner to identify a document or signature as a forgery, but it is much less common for the examiner to identify the forger. This is due to the nature of handwriting in that, while the forger is attempting to imitate the writing habit of another person, the forger is, at the same time, suppressing his own writing habit, thereby disguising his own writing.

In attempting to either disguise one's own writing or imitate that of another, the briefer the body of writing the easier it is to continue the disguise. As the writing becomes more extended, the greater the probability that one's own subconscious habit will intrude itself into the disguise attempt.

There are no reliable methods of predicting from the writing whether the author was male or female, or right-handed or left-handed.

Identification of Typewriters and Checkwriters

With regard to typewriters, questions arise as to whether a series of documents were prepared on the same typewriter; what make/model of typewriter was used; or when was the typed document produced?

Typewriters are identifiable as to make and model by means of class characteristics such as manual/electric, fabric ribbon/carbon film ribbon, typebars/daisywheel/ball element, typeface design, and so on. Machines may acquire individualizing characteristics to varying degrees due to use or misuse, damage, and general wear. The degree of success in a given case will vary with the type of machine with which the examiner is faced.

Check writers, also known as check protectors, may be identified as to manufacturer by its mechanism and typeface design, and individualized by accidental characteristics resulting from damage and wear and tear.

Identification of Indented Writing

Indented writing is an imprint which may be left on the underlying pages when the top sheet of paper is written upon. This impression of the writing is influenced by pen pressure and thickness of the paper. Indented writing is very useful as a form of connecting evidence, such as tying a robbery note to a writing pad recovered from a suspect. Classically, indented writing was identified and deciphered by means of low angle oblique light and photography. More recently, an instrument known as an Electrostatic Detection Apparatus, or ESDA, is now used to produce a visual image of the indented writing on transparency film. This procedure is non-destructive, and rather non-detectable.

Collecting the Known and Unknown

When conducting examinations, forensic document examiners must have known specimens to which they compare the material in question. These samples may come from any number of known sources, such as a particular ink manufacturer or machine.

In cases involving handwriting, samples are usually divided into two types: requested writing specimens and collected writing specimens. Requested specimens are writings dictated by the investigator to the writer. These specimens are created under carefully controlled conditions, with the writer being closely monitored. Collected writing specimens, however, are writings that were completed by the subject prior to the investigation. Good sources of writing specimens may include items such as cancelled checks, letters, diaries, signed receipts, medical records, real estate contracts, tax records or other signed legal documents.

Talk to us today for exceptional services in handwriting analysis and documents examination

Our Products Partners

We have partnered locally, regionally and globally with products provider to ensure that we serve you better within the highest of standards. Some of our partners are listed below:

Access Data

American Board of Forensic Document Examiners


Oxygen Softwares

Our core values are:

  • Integrity in what we undertake
  • Professionalism in all our endeavor with the client
  • Respect to all entities under which we relate during a project execution
  • Flexibility to handle a single project in different ways.
  • Quality assurance in the products/solutions we offer.


CFK News Scroller

CFK associates is a pan African consulting firm with its headquarter in Nairobi Kenya. We are leaders in digital risks and investigations in the region. We have strong network of associates specializing in different areas of profession.

Our vision is to be the leader and set pace in digital forensics in Africa

Our mission is to provide our clients with world class experience through service provision.

Our slogan: "We deliver on promise"

What is Digital Forensics?

Digital forensics is the scientific process of capturing (imaging) and analyzing information stored in any electronic format, for the purpose of investigating allegations, to find the truth, with no predisposition as to the outcome. It is a highly technical discipline requiring a combination of unique skills relating to computer technology and software, formal investigative experience (law enforcement), proper evidence handling methods, and judgment. Computer forensics can be the key to:

  • Learning the truth
  • Taking appropriate action based on the facts
  • Winning the case.

At CFK we specialize in the listed services:

  • Digital Forensics (Computers and Mobile devices)
  • CyberSecurity Strategies and Management
  • Inappropriate Data Duplication
  • Private Investigation of Cellphone/Mobile Phone
  • Cyber Fraud and Money Laundering Investigation
  • Documents examination
  • Industrial Espionage
  • Online Brand Protection
  • Internal Corporate Investigation
  • Breach of Contract
  • Computer Break-ins
  • Digital Pornography
  • Inappropriate Internet Usage
  • Internet Abuse
  • Inappropriate Email Usage

Area of operation

We operate in the whole of Africa through our extensive network of associates who represents us in their respective countries