fraudulent document

See: forgery
Mentioned in ?
References in periodicals archive ?
The discussions covered advanced passenger information/passenger name record, enhanced information sharing, sharing of watchlists/access to databases, biometric screening, fraudulent document training, and increased capability for internet/social media monitoring.
Additionally, the bureau said, the USDHS vowed to train BI personnel on biometric screening, and fraudulent document training, as well as internet and social media monitoring.
Using a real-time connection to Interpol, immigration control has instant access to terrorist watch-lists, no-fly lists, fraudulent document lists and other critical information.
The referendum, when it comes, will be a fraudulent document, and will never achieve the backing of all the people.
Rajapakse has been summoned before the Bribery or Corruption Commission on Friday over a fraudulent document filed by former Health Minister Tissa Attanayake in an attempt to criticize President Maithripala Sirisena and Prime Minister Ranil Wickremesinghe in the run-up to the Jan.
With a fraudulent document in play, the foreclosure becomes illegal.
Pakistani Khalid Mahmood, 30, was stopped at John Lennon airport when officials spotted his fraudulent document.
Kennedy said as part of IMAGE, ICE and the US Citizenship and Immigration Services (USCIS) are providing CHEP education and training on hiring procedures, fraudulent document detection, use of the E-Verify employment eligibility verification program and anti-discrimination procedures.
The group toured the post's visa unit, seeing biometric collection and visa procedures and the VSU's high-tech fraudulent document examiner.
Immediate indefeasibility proposes that once a fraudulent document becomes registered, it cannot be annulled.
The officers find no further evidence at Jimmy's house when they search it but, as news reaches Bob of the fraudulent document, will this be the end of the matter?
Specifically, they explored avenues for improving capacity building for post-blast investigations, financial crime prevention, container security and fraudulent document detection, participants said.