The document discusses identity cards in Brazil, which contain personal information and security features to prevent fraud. It describes a case where identity cards were altered by erasing printed text, photos, and signatures, and replacing them. Forensic examination found evidence of the erasures. As a result, transparent protective film was added to identity cards to prevent such alterations.
Relatório de Vistoria na casa na situada na Rua de São Francisco, 26 - Carmo - Olinda, em 01/02/2013. O imóvel foi interditado em 05/02/2013.
Mais informações:
http://carnaval.olinda.pe.gov.br/noticias/casa-da-devassa-e-interditada-nesta-terca-feira-em-olinda
Relatório de Vistoria na casa na situada na Rua de São Francisco, 26 - Carmo - Olinda, em 01/02/2013. O imóvel foi interditado em 05/02/2013.
Mais informações:
http://carnaval.olinda.pe.gov.br/noticias/casa-da-devassa-e-interditada-nesta-terca-feira-em-olinda
I-Talents đã giúp hàng ngàn người Việt Nam tiếp cận công nghệ này,Và tất cả mọi người đã vô cùng hài lòng với nền tảng công nghệ của Giáo Sư Lin Jui Pin. Bằng sáng chế của Gs Lin được Mỹ cấp chứng nhận từ năm 2008, mã sáng chế US7406186. Một công nghệ phân tích vô cùng TUYỆT VỜI và đã được I-Talents ứng dụng hơn 6 năm nay.
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
In this paper, wepresenta novel solution to detect forgery and fabrication in passports and visas using cryptography and QR codes. The solution requires that the passport and visa issuing authorities obtain a cryptographic key pair and publish their public key on their website. Further they are required to encrypt the passport or visa information with their private key, encode the ciphertext in a QR code and print it on the passport or visa they issue to the applicant.
The issuing authorities are also required to create a mobile or desktop QR code scanning app and place it for download on their website or Google Play Store and iPhone App Store. Any individual or immigration authority that needs to check the passport or visa for forgery and fabrication can scan its QR code, which will decrypt the ciphertext encoded in the QR code using the public key stored in the app memory and displays the passport or visa information on the app screen. The details on the app screen can be compared with the actual details printed on the passport or visa. Any mismatch between the two is a clear indication of forgery or fabrication.
Discussed the need for a universal desktop and mobile app that can be used by immigration authorities and consulates all over the world to enable fast checking of passports and visas at ports of entry for forgery and fabrication.
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
In this paper, we present a novel solution to detect forgery and fabrication in passports and visas using
cryptography and QR codes. The solution requires that the passport and visa issuing authorities obtain a
cryptographic key pair and publish their public key on their website. Further they are required to encrypt
the passport or visa information with their private key, encode the ciphertext in a QR code and print it on
the passport or visa they issue to the applicant.
The issuing authorities are also required to create a mobile or desktop QR code scanning app and place it
for download on their website or Google Play Store and iPhone App Store. Any individual or immigration
authority that needs to check the passport or visa for forgery and fabrication can scan its QR code, which
will decrypt the ciphertext encoded in the QR code using the public key stored in the app memory and
displays the passport or visa information on the app screen. The details on the app screen can be
compared with the actual details printed on the passport or visa. Any mismatch between the two is a clear
indication of forgery or fabrication.
Discussed the need for a universal desktop and mobile app that can be used by immigration authorities and
consulates all over the world to enable fast checking of passports and visas at ports of entry for forgery
and fabrication.
Multi purpose ID : A Digital Identity to 134 Crore IndiansRishabh Garg
Multipurpose ID is a combination of a Techno Smart Card carrying a twenty-digit universal identification number to record all purposeful information of an individual and a touch screen Smart Cell Phone for electronic surveillance. Both the units can work separately or together. Such a unique system would replace all possible documents procured by an individual during his life time.
Apart from saving human resources, time, money and administrative complexities, the stack of files and papers in offices would also be reduced to fractional level. No Xerox, no documentation, no verification and no long queues for day-to-day pursuits. Just go for one click and the entire details of an individual would be available, that too fully genuine.
The Nation would have a red letter day as the change will shape billion lives and bring respite to administrative machinery and public that has crumpled under the red tapism.
PPT On Biometrics Technology for Engineering student. It contains all the basic of Biometrics. Contents are taken from different sources. I Presented it in 5th semester of B.tech. It is a nice project for engineering students. from Fingerprint to the vein scanning process and voice recognization pattern are explained in a short way.
Biometrics is the most secure and suitable authentication tool. It is the automated method of recognizing a person based on a physiological or behavioral characteristic. Biometric authentication is used in computer Science for verifying human identity.
Techno Smart Card : Digital ID for Every IndianRishabh Garg
Digital ID with Electronic Surveillance System is a combination of Multipurpose ID Card, carrying a twenty-digit unique identification number to record the entire life time data of a citizen, and a Smart Mobile Phone for Electronic Surveillance. Both the units can work separately or together. Such a unique Techno-Smart Device would replace all possible documents - Birth Certificates, Aadhar, Passport, Driving License, PAN, Insurance, Bank Account Numbers ................
Thus, the present innovation would make the life of every individual on Earth free from redundant documentation and would serve as a rescue from practice of forged identity, deception and corruption.
Facial Feature Recognition Using Biometricsijbuiiir1
Face recognition is one of the few biometric methods that possess the merits of both high accuracy and low intrusiveness. Biometric requires no physical interaction on behalf of the user. Biometric allows to perform passive identification in a one to many environments. Passwords and PINs are hard to remember and can be stolen or guessed; cards, tokens, keys and the like can be misplaced, forgotten, purloined or duplicated; magnetic cards can become corrupted and unreadable. However individuals biological traits cannot be misplaced, forgotten, stolen or forged.
Identity theft and ID counterfeiting are among the fastest growing types of crime, especially in highly industrialized
countries. According to FBI statistics, it is the fastest
growing crime in USA. The Federal Trade Commission
estimates that as many as 9 million Americans have
their identities stolen each year. The article highlight the issues related to document counterfeiting and the
importance of hologram in document protection.
The future of digital identity initial perspectiveFuture Agenda
Our interconnected digital world has started to make a mockery of traditional forms of identification. Being asked to produce ‘two forms of ID; at least one from each of the two following lists’ already seems hopelessly anachronistic in a world of automated password-managers, RFID-driven payments systems, and bio-metric authenticators on our mobile phones. The idea of having a single digital identity (Digital ID) that can replace the need to hold a plethora of cards and documents, from your passport and driving license to your library card and even your CV, is not only one whose time has come, it is one that is all but presumed to exist already. Although it doesn’t quite yet.
This ‘initial perspective’ is intended to provide a provocation for thinking and deeper discussion about the impending implementation, and future, of Digital Identity and its role and value in society.
In addition, we are also undertaking a set of 5 expert workshops across 4 continents in Q4 2018 (London, Singapore, Sydney, San Francisco and Brussels). If you are interested in joining, we would welcome your feedback and contribution to help build a richer view. Do let us know.
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...ijait
Advancements in technology have created the possibility of greater assurance of proper travel document ownership, but some concerns regarding security and effectiveness remain unaddressed. Electronic passports have known a wide and fast deployment all around the world since the International Civil
Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific
country and limit the use of counterfeit documents by more accurate identification of an individual. This paper analyses the face, fingerprint, palmprint and iris biometric e-passport design. This papers focus on privacy and personal security of bearers of e-passports, the actual security benefit countries obtained by
the introduction of e-passports using face, fingerprint, palmprint and iris recognition systems. Researcher analyzed its main cryptographic features; the face fingerprint, palmprint and iris biometrics currently used with e-passports and considered the surrounding procedures. Researcher focused on vulnerabilities since anyone willing to bypass the system would choose the same approach. On the contrary, solely relying on them may pose a risk that did not exist with previous passports and border controls. The paper also provides a security analysis of the e-passport using face fingerprint, palmprint and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.
XXIII Congresso Nacional de Criminalística - divulgaçãoDenise Rivera
Entre 08 e 12 de novembro de 2015 será realizado, na cidade de Búzios – RJ, o XXIII CONGRESSO NACIONAL DE CRIMINALÍSTICA, o VI CONGRESSO INTERNACIONAL DE PERÍCIAL CRIMINAL, o IV CONGRESSO MILITAR DE CRIMINALÍSTICA que proporcionará uma oportunidade ímpar de conhecer o que há de mais moderno na área de criminalística.
More Related Content
Similar to Identity card erasures and alterations - a real case
I-Talents đã giúp hàng ngàn người Việt Nam tiếp cận công nghệ này,Và tất cả mọi người đã vô cùng hài lòng với nền tảng công nghệ của Giáo Sư Lin Jui Pin. Bằng sáng chế của Gs Lin được Mỹ cấp chứng nhận từ năm 2008, mã sáng chế US7406186. Một công nghệ phân tích vô cùng TUYỆT VỜI và đã được I-Talents ứng dụng hơn 6 năm nay.
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
In this paper, wepresenta novel solution to detect forgery and fabrication in passports and visas using cryptography and QR codes. The solution requires that the passport and visa issuing authorities obtain a cryptographic key pair and publish their public key on their website. Further they are required to encrypt the passport or visa information with their private key, encode the ciphertext in a QR code and print it on the passport or visa they issue to the applicant.
The issuing authorities are also required to create a mobile or desktop QR code scanning app and place it for download on their website or Google Play Store and iPhone App Store. Any individual or immigration authority that needs to check the passport or visa for forgery and fabrication can scan its QR code, which will decrypt the ciphertext encoded in the QR code using the public key stored in the app memory and displays the passport or visa information on the app screen. The details on the app screen can be compared with the actual details printed on the passport or visa. Any mismatch between the two is a clear indication of forgery or fabrication.
Discussed the need for a universal desktop and mobile app that can be used by immigration authorities and consulates all over the world to enable fast checking of passports and visas at ports of entry for forgery and fabrication.
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
In this paper, we present a novel solution to detect forgery and fabrication in passports and visas using
cryptography and QR codes. The solution requires that the passport and visa issuing authorities obtain a
cryptographic key pair and publish their public key on their website. Further they are required to encrypt
the passport or visa information with their private key, encode the ciphertext in a QR code and print it on
the passport or visa they issue to the applicant.
The issuing authorities are also required to create a mobile or desktop QR code scanning app and place it
for download on their website or Google Play Store and iPhone App Store. Any individual or immigration
authority that needs to check the passport or visa for forgery and fabrication can scan its QR code, which
will decrypt the ciphertext encoded in the QR code using the public key stored in the app memory and
displays the passport or visa information on the app screen. The details on the app screen can be
compared with the actual details printed on the passport or visa. Any mismatch between the two is a clear
indication of forgery or fabrication.
Discussed the need for a universal desktop and mobile app that can be used by immigration authorities and
consulates all over the world to enable fast checking of passports and visas at ports of entry for forgery
and fabrication.
Multi purpose ID : A Digital Identity to 134 Crore IndiansRishabh Garg
Multipurpose ID is a combination of a Techno Smart Card carrying a twenty-digit universal identification number to record all purposeful information of an individual and a touch screen Smart Cell Phone for electronic surveillance. Both the units can work separately or together. Such a unique system would replace all possible documents procured by an individual during his life time.
Apart from saving human resources, time, money and administrative complexities, the stack of files and papers in offices would also be reduced to fractional level. No Xerox, no documentation, no verification and no long queues for day-to-day pursuits. Just go for one click and the entire details of an individual would be available, that too fully genuine.
The Nation would have a red letter day as the change will shape billion lives and bring respite to administrative machinery and public that has crumpled under the red tapism.
PPT On Biometrics Technology for Engineering student. It contains all the basic of Biometrics. Contents are taken from different sources. I Presented it in 5th semester of B.tech. It is a nice project for engineering students. from Fingerprint to the vein scanning process and voice recognization pattern are explained in a short way.
Biometrics is the most secure and suitable authentication tool. It is the automated method of recognizing a person based on a physiological or behavioral characteristic. Biometric authentication is used in computer Science for verifying human identity.
Techno Smart Card : Digital ID for Every IndianRishabh Garg
Digital ID with Electronic Surveillance System is a combination of Multipurpose ID Card, carrying a twenty-digit unique identification number to record the entire life time data of a citizen, and a Smart Mobile Phone for Electronic Surveillance. Both the units can work separately or together. Such a unique Techno-Smart Device would replace all possible documents - Birth Certificates, Aadhar, Passport, Driving License, PAN, Insurance, Bank Account Numbers ................
Thus, the present innovation would make the life of every individual on Earth free from redundant documentation and would serve as a rescue from practice of forged identity, deception and corruption.
Facial Feature Recognition Using Biometricsijbuiiir1
Face recognition is one of the few biometric methods that possess the merits of both high accuracy and low intrusiveness. Biometric requires no physical interaction on behalf of the user. Biometric allows to perform passive identification in a one to many environments. Passwords and PINs are hard to remember and can be stolen or guessed; cards, tokens, keys and the like can be misplaced, forgotten, purloined or duplicated; magnetic cards can become corrupted and unreadable. However individuals biological traits cannot be misplaced, forgotten, stolen or forged.
Identity theft and ID counterfeiting are among the fastest growing types of crime, especially in highly industrialized
countries. According to FBI statistics, it is the fastest
growing crime in USA. The Federal Trade Commission
estimates that as many as 9 million Americans have
their identities stolen each year. The article highlight the issues related to document counterfeiting and the
importance of hologram in document protection.
The future of digital identity initial perspectiveFuture Agenda
Our interconnected digital world has started to make a mockery of traditional forms of identification. Being asked to produce ‘two forms of ID; at least one from each of the two following lists’ already seems hopelessly anachronistic in a world of automated password-managers, RFID-driven payments systems, and bio-metric authenticators on our mobile phones. The idea of having a single digital identity (Digital ID) that can replace the need to hold a plethora of cards and documents, from your passport and driving license to your library card and even your CV, is not only one whose time has come, it is one that is all but presumed to exist already. Although it doesn’t quite yet.
This ‘initial perspective’ is intended to provide a provocation for thinking and deeper discussion about the impending implementation, and future, of Digital Identity and its role and value in society.
In addition, we are also undertaking a set of 5 expert workshops across 4 continents in Q4 2018 (London, Singapore, Sydney, San Francisco and Brussels). If you are interested in joining, we would welcome your feedback and contribution to help build a richer view. Do let us know.
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...ijait
Advancements in technology have created the possibility of greater assurance of proper travel document ownership, but some concerns regarding security and effectiveness remain unaddressed. Electronic passports have known a wide and fast deployment all around the world since the International Civil
Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific
country and limit the use of counterfeit documents by more accurate identification of an individual. This paper analyses the face, fingerprint, palmprint and iris biometric e-passport design. This papers focus on privacy and personal security of bearers of e-passports, the actual security benefit countries obtained by
the introduction of e-passports using face, fingerprint, palmprint and iris recognition systems. Researcher analyzed its main cryptographic features; the face fingerprint, palmprint and iris biometrics currently used with e-passports and considered the surrounding procedures. Researcher focused on vulnerabilities since anyone willing to bypass the system would choose the same approach. On the contrary, solely relying on them may pose a risk that did not exist with previous passports and border controls. The paper also provides a security analysis of the e-passport using face fingerprint, palmprint and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.
XXIII Congresso Nacional de Criminalística - divulgaçãoDenise Rivera
Entre 08 e 12 de novembro de 2015 será realizado, na cidade de Búzios – RJ, o XXIII CONGRESSO NACIONAL DE CRIMINALÍSTICA, o VI CONGRESSO INTERNACIONAL DE PERÍCIAL CRIMINAL, o IV CONGRESSO MILITAR DE CRIMINALÍSTICA que proporcionará uma oportunidade ímpar de conhecer o que há de mais moderno na área de criminalística.
Apresentação aperj - estrutura da períciaDenise Rivera
Apresentação - Perícia Oficial - Peritos Criminais e Legistas do Estado do Rio de Janeiro - Polícia Técnico-Científica - APERJ - Associação dos Peritos Oficiais do Estado do Rio de Janeiro
Manifestacao durante audiencia publica na alerjDenise Rivera
TEXTO DO DR. JOÃO BATISTA DAMASCENO - JUIZ DE DIREITO DO TJRJ E MEMBRO DA ASSOCIAÇÃO JUÍZES PARA A DEMOCRACIA / AJD - ANÁLISE DA POLÍTICA DE SEGURANÇA PÚBLICA DO RIO DE JANEIRO
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Identity card erasures and alterations - a real case
1. IDENTITY CARD – BRASIL
ADULTERATION – A REAL CASE
Denise Gonçalves de Moraes Rivera
Perita Criminal Grafotécnica
Instituto de Criminalística Carlos Éboli (ICCE)
Rio de Janeiro / Brasil
Definition
The identity card — diversely named in Portuguese
cédula de identidade (identity bill) cartão/carteira de identidade
(identity card) or "RG" (from Registro Geral, General Registry),
depending on the state — is the national official identity
document in Brazil. It contains the name, the birthdate, the
names of the parents, the signature and the thumbprint of the
bearer. Other national documents can, by law, be used as an
identity card, such as the Brazilian driver's license, a Passaport,
for minors, the birth certificate.
Issue
Because of its need for most civil activities, it is
practically compulsory to all citizens who have attained the age of
majority (18 in Brazil) to have an RG card and number issued,
although bearing it at all times is optional but not uncommon.
Minors can also have one issued, but if the citizen is under 16 at
the time of appliance, it will expire at their 18th birthday, making
it necessary to issue another.
Identity cards are issued by the state governments, but
can be used nationwide. It is interesting to note that there is no
legal restriction to having more than one identity card, provided
that each is issued by a different state.
1
2. The documents required for the issue of an identity
card depend on whether the person is single or married. For
single persons, it is the birth certificate (the original one or a
certified copy), for those married, it is the marriage certificate. If
the person wants, the CPF can be printed on it too.
The Law No. 7116 of 08.29.1983 ensured the validity of
identity cards across the country, standardizing the national
model of the same.
The model of this Identity Card is printed by American
Bank Note Company or By Casa da Moeda do Brasil.
Security Features
The ID card has the following dimensions: 10.2 cm x
6.8 cm and is made of paper filigree, printed in intaglio and offset,
in green, with numismatic background.
Mandatory elements of ID:
a) Arms of the Republic and the inscription "Federal Republic
of Brazil."
b) Name and Arms of the Federation printed on the face
containing the photo and fingerprint identified.
c) Identification of the Issuer Authority.
d) General Registry of Issuer Authority, place and date of
dispatch.
e) Name, affiliation, place and date of birth of identified,
containing a summary, data of birth certificate or marriage
presented.
f) 3x4 Photo, signature and right thumbprint identified
(captured and digitized in the document).
g) Signature of the officer Authority consignor (usually by
mechanical seal).
h) The term "Valid throughout the national territory" and the
reference to Law 7116 of 08.29.1983.
From October 2001 identity cards began to be issued
by the General Department of Civil Identification (DETRAN-DIC).
2
3. The ID cards have pictures (photo, thumbprint and signature)
digitized graphics and other security devices that significantly
reduce the possibility of adulteration or forgery.
In the reverse of the ID are printed in two-dimensional barcode,
the photo, the fingerprint and the signature of the identified,
allowing certification of identity "offline" based on a comparison of
the digital codes of the thumbs of the individual with the digital
collected live in "live scanners."
Text that complements the person identified data is
produced by laser printing process.
The ID can not be plasticized, being wrapped in clear
plastic envelope.
The application of UV reveals the characters printed
with reagent ink.
3
4. Alterations Detected
In 2007 began to occur frauds with use of identity
cards that visually did not exhibit any trace of adulteration.
In an operation of the judicial police several identity
cards were apprehended and sent to Laboratory of Forensic
Document Examination of Criminalistic Institut Carlos Éboli
(ICCE).
Closer examination revealed the adulteration by
erasure of the text printed in laser, using soft rubber. Such
operation caused no considerable damage to the fibers of the
paper support.
After deleting the text, the signature and the photo of
the person identified, this ID served as a basis for fraudulent ID,
with new data printing and photo identification (false). Therefore,
the document was ready to be accepted in most financials
institutions.
a) One Identity Card in the adulteration process, when removed
the original photo, signature and holder’s information.
b) Another Identity Card after alteration:
4
5. The forger did not bother to suppress the data printed
on the back of the document, since only the issuer Authority
(DETRAN-DIC) has the necessary equipment to convert the two-
dimensional barcodes in images.
The application of UV allowed the visualization of
traces of erasures, using soft rubber without causing major
damage to the surface of the paper support.
The image magnification allows visualization of traces
of deleted text.
5
6. Remnants
of
Original
Text
In the case illustrated above the real signature was
deleted by erasing, after that replaced by the signature we can
see.
Identity card alterated, where all text, photo and
signature were erased.
6
7. Same identity card view with UV application:
The identity card in name of Dayzelane Nardoim Costa
was adulterated with removal of all the printing and
photography's carrier. These traces were detected with the
application of UV light.
It should be clarified that the images converted to
digital format, printed on the back of the document, require
equipment suitable for conversion. Such equipment exists only in
the ranks of DETRAN (responsible for issuing the document). This
shows a security element useless because it can't be verified by
anyone.
Furthermore, although this identity card has a lot of
security features, what makes it very expensive, a common
7
8. rubber can erase all text, photo and signature printed on it,
without any trace of this alteration.
In Conclusion
Having analyzed and found the security hole of this
document, a report was sent to the president of DETRAN,
suggesting the application of transparent plastic, high
adhesiveness, in order to protect the data that identifies the
bearer of the identity card.
This suggestion was accepted and from 2007 all
Identity Cards came to be made with transparent protective film.
Abbreviations:
DETRAN – DIC: DEPARTAMENTO DE IDENTIFICAÇÃO CIVIL
(Civil Identification Department)
CPF: CADASTRO DE PESSOA FÍSICA
The Cadastro de Pessoas Físicas (CPF) – Portuguese for
Natural Persons Register – is a number attributed by the
Brazilian revenue agency (Receita Federal – Federal Revenue)
to both Brazilians and resident aliens who pay taxes or take
part, directly or indirectly, in activities that provide revenue
for any of the dozens of different types of taxes existing in
Brasil.
Denise Rivera – Perita Grafotécnica / Handwriting Expert
Rio de Janeiro / Brasil
Email: denise.rivera@ig.com.br
Blog: deniseriveraperitablogspot.com.br
Phone: 5521-8123-8606.
8