Abstract
The author provides an overview of an investigation where the perpetrator was identified through writing analysis.
Downloads
Download data is not yet available.
The author provides an overview of an investigation where the perpetrator was identified through writing analysis.