SlideShare a Scribd company logo
1 of 4
Download to read offline
Cover Story

The Holography Times
Vol. 7, Issue 22

Identity document:
challenges and solutions
By C S Jeena

With todayā€™s technology, document can be easily duplicated and altered.
Document tampering occurs frequently, however, inexpensive color
copiers, scanners, and PCā€™s have made duplication easy and readily
available. This is happening at an alarming rate, and every business is
vulnerable. In most cases, the targets are government-issued documents
such as passports, driverā€™s licenses, or national ID cards.
The article highlight the issues related to document counterfeiting and the
importance of hologram in document protection.

Identity documents:

Human beings need some
form of identity document. An
identity document tells a story
about the holder on the subject
of the document. The objective
is to enable other person to
understand more about the
subject and to identify them.
Above all, an identity document
needs to be trustworthy. An
identity document (also called a
piece of identification or ID, or
colloquially as oneā€™s ā€˜papersā€™)
is any document which may
be used to verify aspects of a
personā€™s personal identity. If
issued in the form of a small,
mostly standard-sized card, it is
usually called an identity card
(IC). Countries which do not have
formal identity documents may
require informal documents.
It could be an identity card or
travel documents.

Why have IDā€™s

In the middle age when people
tend to live in clusters within
village or tribes, personal
documentation
was
not
considered important at all.
Nevertheless, many centuries
ago identification tokens were

8

in forms of animal skin, gems
and stone to seals introduced
to
enable
for
example
representatives of the King
travelling
for
neighbouring
States. Eventually, paper identity
documents emerged as evidence
of someoneā€™s identity, and more
in particular of the bearerā€™s
position, with the request to
grant safe passage to the bearer.
Mostly, these documents served
as a status symbol for the
privileged rather than a form of
identification.
The need for reliable identity
documents only became imminent
when travel started to become
more popular. The need for proper
identity management became
more obvious and compelling
during World War I, when people
started to realize the need to
establish the identity of everybody
who entered the fighting zone.
In 1920, the League of Nations
organized
an
international
conference in order to work out
common formats for passports
and visa, including the layout,
content and validity. Unfortunately,
the effort was unsuccessful, due to
lack of political will.
www.homai.org
Cover Story

The Holography Times
Vol. 7, Issue 22

Purpose of the identity
document

An identity document has a
number of purposes;
-

ā€œThe Federal Trade Commission
estimates that as many as 9
million Americans have their
identities stolen each year.ā€
-

Proof of identity: These days,
persons are asked to prove
their identity when dealing
with a Bank, entering a
restricted area or completing
an important transactions
such as buying a house etc.
etc. They have no need for
a travel document and only
need a trustworthy identity
document for domestic use.
For example an identity card,
PAN Card, driving license,
social security card, AADHAR
card or medicare card.
Facilitation of travel: A
trustworthy
identification
document
facilitates
international travel because
it provides a proven means
for identification purpose
and guarantees the return of
the bearer to a designated
place.

conditions of stay laid down by
the immigration authorities of
the receiving country or region.
Domestic Document: These
type of document are mainly
intended for various purpose
within the country of origin. Such
as Permanent Account Number
(PAN Card), Driving License,
Voter ID card etc. etc.

Challenges concerning
identity documents

Due to their importance, identity
documents are a continuous
subject of fraudulent and
criminal activities. These include
forged and false documents, false
identity and impersonation and
human trafficking.
i.

Forged
and
false
documents: Identity theft
and ID counterfeiting are
among the fastest growing
types of crime, especially
in highly industrialized
countries. According to FBI
statistics, it is the fastest
growing crime in USA. The
Federal Trade Commission
estimates that as many as
9 million Americans have
their identities stolen each
year. Indeed, just to highlight
the size of the problem, in
April 2012 the European
Parliament estimated that
of the 6.5 million bio-metric
passports in circulation in
France between 500,000
and one million are ā€˜falseā€™
having been obtained using
counterfeit
documents.
In most cases, the targets
are government - issued
documents
such
as
passports, driverā€™s licenses,
or national ID cards.

ii.

How ID are copied/
faked: According to various
Organization,
common
examples of forged and false
documents include;

-

Counterfeit
identity
documents that emulate the

Proof of Nationality: A
travel document not only
certified the nationality of
the holder, but also indicates
whether the holder has the
right to return to the issuing
country or his place of
domicile, through a visa label
or a stamp in the document.

Common identity
documents

An identity card is a generic term
for various cards types such as
social security cards, citizenā€™s
cards, resident cards and
driving licenses. These can be
classified into Travel Document
or Document used for Domestic
purpose.
Travel
Documents:
Travel
document
are
documents
intended for international travel,
such as passports and certificates
of identity, normally come in the
shape of a booklet which can
include a visa sticker and the
www.homai.org

9
Cover Story

The Holography Times
Vol. 7, Issue 22

features and characteristic
of valid IDs issued by
Government. For example,
counterfeit driver license
with an unexpired date.
-

-

ā€œTerrorist group and homegrown
extremists have used counterfeit
IDā€™s to rent cars and trucks,
and to buy chemicals or certain
fertilizers to derive high potency
explosive components. Example
includes 11 September 2001 in
USA and 26 November 2008 in
Mumbai (India).ā€

Valid identity documents,
usually issued in the name of
a fictitious or stolen identity,
obtained through fraudulent
means.
Valid identity documents
have been altered after
issuance to change a name,
photo image, age, or other
biographic descriptor.

Damaged caused by the
duplicate/copies/fake
IDs:

The fake ID can impact National
security, public safety and the
Economy. While counterfeited
ID use for financial gain
harmed common consumer,
the counterfeited Government
IDā€™s can be a serious threat to
national security and economy.
Terrorist group and homegrown
extremists have used counterfeit
IDā€™s to rent cars and trucks,
and to buy chemicals or certain
fertilizers to derive high potency
explosive components. Example
includes 11 September 2001 in
USA and 26 November 2008 in
Mumbai (India).

What can be done?

i. Common
guidelines
for
stronger
card
security: With the lack of
consistent standards across
identification
document,
it is often difficult to give
reasonable assurance of a
given document authenticity.
Improving the security of
identity documents is a matter
of urgent national security.
Most Identity Document
are not designed as secure
documents, and therefore are
no uniform security standards
in place to assist the public
and law enforcement in
the recognition of genuine

10

versus counterfeit identity
documents.
As an essential step, Government
should issue a standard basic
guidelines
for
document
protection security such as;
-

All document must be
incorporated with overt,
covert and forensic security
features;

-

A combination of security
features with other level 2
and level 3 security features to
form a layered approach. (See
table)

-

Specialised and secure card
production materials designed
to prevent counterfeiting and
should be limited to access
and costly to obtain.

-

Use of technology that does
more than verify a bar code.
ID readers must be able to
verify security features as well
as bar codes digitally and nondigitally.

ii. Training for enforcement
officials: Officials involved
in
security
of
various
premises including Army
Personnel and Local Police
should become trained in
basic methods of identity
document authentication, and
have tools available to assist
in differentiating fake IDs
from valid IDs. For example
reference guides to State
Licenses are essential tools for
authentication, as counterfeit
driver licenses are most
often used in States other
than the State from which the
document is counterfeited.

Hologram security:

There are many security features
that can be applied to documents,
both overt and covert and
hologram are among one of the
most effective authentication
measures in the battle against
document
counterfeiting.

www.homai.org
Cover Story

The Holography Times
Vol. 7, Issue 22

Level

Feature

Purpose for usage

1

Overt (visible with naked eyes)

- a visible ā€œpublic recognition featureā€
- Little or no training and no device required.
- Examples such as hologram, optical variable
ink, paper watermark etc.

2

Covert (non-visible with eyes)

- Hidden features.
- Requires some training and simple devide to validate.
- Examples such as UV-ļ¬‚uorescence, micro-text etc.

3

Forensic

- Deeply hidden features.
- Requires specialist knowledge and equipment to validate.
- Examples such as various proprietary taggants, etc.

Table: The use of security features levels

The role of a hologram on a
passport and other identity
documents is principally to
shield against the forgery of
the photograph and personal
data, otherwise known as the
ā€˜variable informationā€™. However,
the ability of the hologram to
provide effective protection lies
in the continuous innovation,
invention and evolution of
holographic techniques. Both
optical effects and material
science techniques have created
authentication devices that are
easily recognised yet difficult
to copy accurately. They can
be safely integrated within the
production process and stand up
to the rigorous demands of being
in use for a period of anything
up to ten years. According to Mr.
Luv D Shriram,General Secretary
& Treasurer (HoMAI), ā€œSecurity
hologram was used in document
protection because it provides
the best visual authentication.
Electronic
authentication
is not possible everywhere
especially in remote areas so it
generate a requirement of an
instant visual authentication
like a security hologram with
advanced levels of security
features for authentication (One
such exampleis Visa / Master
Card which is continuously
www.homai.org

using security hologram as overt
feature since1983).
Conclusion
With the lack of consistent
standards across identification
document, it is often difficult
to give reasonable assurance of
a given document authenticity.
Improving the security of
identity documents is a matter
of urgent national security.
Most Identity Document are not
designed as secure documents,
and therefore are no uniform
security standards in place
to assist the public and law
enforcement in the recognition
of genuine versus counterfeit
identity documents.
Governments and Organizations
should
understand
that
counterfeiters will attempt to
counterfeit the document if it is
least secure document. Therefore,
we request that maximum
security features recommended
by Various Organization should
be implemented for the benefits
of public. These security features
must be practical for document
issuers to implement, easy for the
public to recognize and provide
specific identity features for
law enforcement and forensic
investigators.

11

More Related Content

What's hot

Holoflex: scanning the hologram market - Study by FPS
Holoflex: scanning the hologram market - Study by FPSHoloflex: scanning the hologram market - Study by FPS
Holoflex: scanning the hologram market - Study by FPSFame Per Second
Ā 
The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21The Authentication Times
Ā 
The Holography Times, April 2010, Volume 4, Issue no 10
The Holography Times, April 2010, Volume 4, Issue no 10The Holography Times, April 2010, Volume 4, Issue no 10
The Holography Times, April 2010, Volume 4, Issue no 10The Authentication Times
Ā 
The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Authentication Times
Ā 
The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18The Authentication Times
Ā 
The Holography Times, April 2009, Volume 3, Issue No 6
The Holography Times, April 2009, Volume 3, Issue No 6The Holography Times, April 2009, Volume 3, Issue No 6
The Holography Times, April 2009, Volume 3, Issue No 6The Authentication Times
Ā 
Counterfeiting ā€“ a major threat to the brands
Counterfeiting ā€“ a major threat to the brandsCounterfeiting ā€“ a major threat to the brands
Counterfeiting ā€“ a major threat to the brandsNEW Momentum
Ā 
The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Authentication Times
Ā 
The Authentication Times issue 27 August 2015
The Authentication Times issue 27 August 2015The Authentication Times issue 27 August 2015
The Authentication Times issue 27 August 2015The Authentication Times
Ā 
E-Marketing Case Study: Hepsiburada
E-Marketing Case Study: HepsiburadaE-Marketing Case Study: Hepsiburada
E-Marketing Case Study: HepsiburadaUğurcan Yurtsever
Ā 
The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Authentication Times
Ā 
The Holography Times, January 2014, Volume 8, Issue no 23
The Holography Times, January 2014, Volume 8, Issue no 23The Holography Times, January 2014, Volume 8, Issue no 23
The Holography Times, January 2014, Volume 8, Issue no 23The Authentication Times
Ā 

What's hot (20)

Holoflex: scanning the hologram market - Study by FPS
Holoflex: scanning the hologram market - Study by FPSHoloflex: scanning the hologram market - Study by FPS
Holoflex: scanning the hologram market - Study by FPS
Ā 
Counterfeiting & the ways to tackle this menace in west bengal
Counterfeiting & the ways to tackle this menace in west bengalCounterfeiting & the ways to tackle this menace in west bengal
Counterfeiting & the ways to tackle this menace in west bengal
Ā 
Ht issue 12 201011
Ht issue 12 201011Ht issue 12 201011
Ht issue 12 201011
Ā 
The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21
Ā 
The Holography Times, April 2010, Volume 4, Issue no 10
The Holography Times, April 2010, Volume 4, Issue no 10The Holography Times, April 2010, Volume 4, Issue no 10
The Holography Times, April 2010, Volume 4, Issue no 10
Ā 
The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17
Ā 
The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18
Ā 
The Holography Times, April 2009, Volume 3, Issue No 6
The Holography Times, April 2009, Volume 3, Issue No 6The Holography Times, April 2009, Volume 3, Issue No 6
The Holography Times, April 2009, Volume 3, Issue No 6
Ā 
The Authentication Times Issue 28
The Authentication Times Issue 28The Authentication Times Issue 28
The Authentication Times Issue 28
Ā 
The Authentication Times Issue 29
The Authentication Times Issue 29The Authentication Times Issue 29
The Authentication Times Issue 29
Ā 
Counterfeiting ā€“ a major threat to the brands
Counterfeiting ā€“ a major threat to the brandsCounterfeiting ā€“ a major threat to the brands
Counterfeiting ā€“ a major threat to the brands
Ā 
The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20
Ā 
Untitled
UntitledUntitled
Untitled
Ā 
The Authentication Times issue 27 August 2015
The Authentication Times issue 27 August 2015The Authentication Times issue 27 August 2015
The Authentication Times issue 27 August 2015
Ā 
E-Marketing Case Study: Hepsiburada
E-Marketing Case Study: HepsiburadaE-Marketing Case Study: Hepsiburada
E-Marketing Case Study: Hepsiburada
Ā 
The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22
Ā 
The Holography Times, Vol 8, Issue 24
The Holography Times, Vol 8, Issue 24The Holography Times, Vol 8, Issue 24
The Holography Times, Vol 8, Issue 24
Ā 
Situation of drug counterfeiting in Rajasthan and the ways to tackle this menace
Situation of drug counterfeiting in Rajasthan and the ways to tackle this menaceSituation of drug counterfeiting in Rajasthan and the ways to tackle this menace
Situation of drug counterfeiting in Rajasthan and the ways to tackle this menace
Ā 
The Holography Times, January 2014, Volume 8, Issue no 23
The Holography Times, January 2014, Volume 8, Issue no 23The Holography Times, January 2014, Volume 8, Issue no 23
The Holography Times, January 2014, Volume 8, Issue no 23
Ā 
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
Ā 

Viewers also liked

Viewers also liked (20)

Use of holograms as security and authentication devices in india
Use of holograms as security and authentication devices in indiaUse of holograms as security and authentication devices in india
Use of holograms as security and authentication devices in india
Ā 
Counterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-itCounterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-it
Ā 
Is Hologram Packaging the 6th P of marketing?
Is Hologram Packaging the 6th P of marketing?Is Hologram Packaging the 6th P of marketing?
Is Hologram Packaging the 6th P of marketing?
Ā 
Authentication Solutions to stop the Scourge of Spurious Medicines
Authentication Solutions to stop the Scourge of Spurious MedicinesAuthentication Solutions to stop the Scourge of Spurious Medicines
Authentication Solutions to stop the Scourge of Spurious Medicines
Ā 
High tech hologram can uproot tobacco counterfeiting
High tech hologram can uproot tobacco counterfeitingHigh tech hologram can uproot tobacco counterfeiting
High tech hologram can uproot tobacco counterfeiting
Ā 
Steps to identify authentication solutions to curb counterfeiting
Steps to identify authentication solutions to curb counterfeitingSteps to identify authentication solutions to curb counterfeiting
Steps to identify authentication solutions to curb counterfeiting
Ā 
Coded holograms-keeping-the-supply-chain-secure
Coded holograms-keeping-the-supply-chain-secureCoded holograms-keeping-the-supply-chain-secure
Coded holograms-keeping-the-supply-chain-secure
Ā 
Serialization for the pharmaceutical industry an overview
Serialization for the pharmaceutical industry an overviewSerialization for the pharmaceutical industry an overview
Serialization for the pharmaceutical industry an overview
Ā 
Evolution of Polymer Banknotes Pros and Cons
Evolution of Polymer Banknotes Pros and ConsEvolution of Polymer Banknotes Pros and Cons
Evolution of Polymer Banknotes Pros and Cons
Ā 
Brand counterfeiting and solutions for its prevention
Brand counterfeiting and solutions for its preventionBrand counterfeiting and solutions for its prevention
Brand counterfeiting and solutions for its prevention
Ā 
Increasing revenue and curbing illegal liquor in India
Increasing revenue and curbing illegal liquor in IndiaIncreasing revenue and curbing illegal liquor in India
Increasing revenue and curbing illegal liquor in India
Ā 
How to combat electrical and electronic components counterfeiting?
How to combat electrical and electronic components counterfeiting?How to combat electrical and electronic components counterfeiting?
How to combat electrical and electronic components counterfeiting?
Ā 
Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...
Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...
Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...
Ā 
Hologram provides measure to authenticate, identify and arrest counterfeits t...
Hologram provides measure to authenticate, identify and arrest counterfeits t...Hologram provides measure to authenticate, identify and arrest counterfeits t...
Hologram provides measure to authenticate, identify and arrest counterfeits t...
Ā 
Identify fake pesticides with authentication solutions in India
Identify fake pesticides with authentication solutions in IndiaIdentify fake pesticides with authentication solutions in India
Identify fake pesticides with authentication solutions in India
Ā 
How to select authentication solutions according to your needs
How to select authentication solutions according to your needsHow to select authentication solutions according to your needs
How to select authentication solutions according to your needs
Ā 
Holographic tax stamps boost indian excise revenue
Holographic tax stamps boost indian excise revenueHolographic tax stamps boost indian excise revenue
Holographic tax stamps boost indian excise revenue
Ā 
Tax stamp in india an overview
Tax stamp in india an overviewTax stamp in india an overview
Tax stamp in india an overview
Ā 
Counterfeit Auto Parts
Counterfeit Auto PartsCounterfeit Auto Parts
Counterfeit Auto Parts
Ā 
How to combat Auto counterfeiting in India
How to combat Auto counterfeiting in IndiaHow to combat Auto counterfeiting in India
How to combat Auto counterfeiting in India
Ā 

Similar to Identity document challenges and solutions

National Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft ReportNational Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft Reportnationalconsumersleague
Ā 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftMartha Brown
Ā 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT- Mark - Fullbright
Ā 
An Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaAn Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaTracy Morgan
Ā 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
Ā 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSGreg Ewers
Ā 
ID Cards and Privacy- Balancing Security and Personal Information.pdf
ID Cards and Privacy- Balancing Security and Personal Information.pdfID Cards and Privacy- Balancing Security and Personal Information.pdf
ID Cards and Privacy- Balancing Security and Personal Information.pdfmilewits415
Ā 
Identity Theft : A Serious Crime
Identity Theft : A Serious CrimeIdentity Theft : A Serious Crime
Identity Theft : A Serious CrimeTanzim Rizwan
Ā 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismREVULN
Ā 
Identity Theft
Identity TheftIdentity Theft
Identity Theftsarakr00
Ā 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
Ā 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxdeanmtaylor1545
Ā 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxbradburgess22840
Ā 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxerlindaw
Ā 
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docxSheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docxmaoanderton
Ā 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
Ā 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftElizabeth Dimit
Ā 
The State of Identity Theft in 2013
The State of Identity Theft in 2013The State of Identity Theft in 2013
The State of Identity Theft in 2013nationalconsumersleague
Ā 

Similar to Identity document challenges and solutions (20)

National Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft ReportNational Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft Report
Ā 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
Ā 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
Ā 
Child Identity Theft
Child Identity TheftChild Identity Theft
Child Identity Theft
Ā 
An Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaAn Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South Africa
Ā 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
Ā 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERS
Ā 
ID Cards and Privacy- Balancing Security and Personal Information.pdf
ID Cards and Privacy- Balancing Security and Personal Information.pdfID Cards and Privacy- Balancing Security and Personal Information.pdf
ID Cards and Privacy- Balancing Security and Personal Information.pdf
Ā 
Identity Theft : A Serious Crime
Identity Theft : A Serious CrimeIdentity Theft : A Serious Crime
Identity Theft : A Serious Crime
Ā 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
Ā 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
Ā 
Identity theft
Identity theftIdentity theft
Identity theft
Ā 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
Ā 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
Ā 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
Ā 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
Ā 
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docxSheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
Ā 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
Ā 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Ā 
The State of Identity Theft in 2013
The State of Identity Theft in 2013The State of Identity Theft in 2013
The State of Identity Theft in 2013
Ā 

More from Authentication Solution Providers' Association (ASPA)

More from Authentication Solution Providers' Association (ASPA) (20)

Trends and Developments in Tax Stamps in India
Trends and Developments in Tax Stamps in IndiaTrends and Developments in Tax Stamps in India
Trends and Developments in Tax Stamps in India
Ā 
Covid 19 and counterfeiting
Covid 19 and counterfeitingCovid 19 and counterfeiting
Covid 19 and counterfeiting
Ā 
Food Fraud Authentication and Traceability
Food Fraud Authentication and TraceabilityFood Fraud Authentication and Traceability
Food Fraud Authentication and Traceability
Ā 
Tax stamps role in implementing ideal state excise policy
Tax stamps role in implementing ideal state excise policyTax stamps role in implementing ideal state excise policy
Tax stamps role in implementing ideal state excise policy
Ā 
Overview of anti counterfeiting technologies and Opportunities for India
Overview of anti counterfeiting technologies and Opportunities for IndiaOverview of anti counterfeiting technologies and Opportunities for India
Overview of anti counterfeiting technologies and Opportunities for India
Ā 
Exploring the 5 W's of Counterfeiting
Exploring the 5 W's of Counterfeiting Exploring the 5 W's of Counterfeiting
Exploring the 5 W's of Counterfeiting
Ā 
How to make any serialization program successful
How to make any serialization program successful How to make any serialization program successful
How to make any serialization program successful
Ā 
Cannabis in India & Canada
Cannabis in India & CanadaCannabis in India & Canada
Cannabis in India & Canada
Ā 
Authentication technology / Solutions Empowering Farmers, Industry and Govern...
Authentication technology / Solutions Empowering Farmers, Industry and Govern...Authentication technology / Solutions Empowering Farmers, Industry and Govern...
Authentication technology / Solutions Empowering Farmers, Industry and Govern...
Ā 
Collaborated Solutions Staying ahead of the Counterfeiters
Collaborated Solutions Staying ahead of the CounterfeitersCollaborated Solutions Staying ahead of the Counterfeiters
Collaborated Solutions Staying ahead of the Counterfeiters
Ā 
Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...
Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...
Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...
Ā 
Trends and drivers in tax stamps design
Trends and drivers in tax stamps design Trends and drivers in tax stamps design
Trends and drivers in tax stamps design
Ā 
The Evolution of DOVID's on Banknotes
The Evolution of DOVID's on BanknotesThe Evolution of DOVID's on Banknotes
The Evolution of DOVID's on Banknotes
Ā 
Predicting future banknote designs by a use centered approach dr hans de heij
Predicting future banknote designs by a use centered approach dr hans de heijPredicting future banknote designs by a use centered approach dr hans de heij
Predicting future banknote designs by a use centered approach dr hans de heij
Ā 
Combating illicit tobacco trade; collaborative solutions for India
Combating illicit tobacco trade; collaborative solutions for IndiaCombating illicit tobacco trade; collaborative solutions for India
Combating illicit tobacco trade; collaborative solutions for India
Ā 
How blockchain is strengthening tuna traceability to combat illegal fishing
How blockchain is strengthening tuna traceability to combat illegal fishingHow blockchain is strengthening tuna traceability to combat illegal fishing
How blockchain is strengthening tuna traceability to combat illegal fishing
Ā 
Need of anti counterfeit secured packaging
Need of anti counterfeit secured packagingNeed of anti counterfeit secured packaging
Need of anti counterfeit secured packaging
Ā 
Security features in passport, trends in the last two decades
Security features in passport, trends in the last two decadesSecurity features in passport, trends in the last two decades
Security features in passport, trends in the last two decades
Ā 
Recent trends and developments in currency
Recent trends and developments in currencyRecent trends and developments in currency
Recent trends and developments in currency
Ā 
Recent trends & developments in holographic tax stamp in india
Recent trends & developments in holographic tax stamp in indiaRecent trends & developments in holographic tax stamp in india
Recent trends & developments in holographic tax stamp in india
Ā 

Recently uploaded

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
Ā 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
Ā 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
Ā 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
Ā 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
Ā 
Call Girls in Mehrauli Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Mehrauli Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls in Mehrauli Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Mehrauli Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
Ā 
Call Girls In Connaught Place Delhi ā¤ļø88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ā¤ļø88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ā¤ļø88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ā¤ļø88604**77959_Russian 100% Genuine Escor...lizamodels9
Ā 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
Ā 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
Ā 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
Ā 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Trucks in Minnesota
Ā 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
Ā 
Lucknow šŸ’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow šŸ’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow šŸ’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow šŸ’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
Ā 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
Ā 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
Ā 
VIP Kolkata Call Girl Howrah šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Howrah šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Howrah šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Howrah šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ā¤ļø8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ā¤ļø8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ā¤ļø8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ā¤ļø8860477959 Escorts...lizamodels9
Ā 

Recently uploaded (20)

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
Ā 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
Ā 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Ā 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Ā 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Ā 
Call Girls in Mehrauli Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Mehrauli Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls in Mehrauli Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Mehrauli Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
Ā 
Call Girls In Connaught Place Delhi ā¤ļø88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ā¤ļø88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ā¤ļø88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ā¤ļø88604**77959_Russian 100% Genuine Escor...
Ā 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
Ā 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
Ā 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
Ā 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
Ā 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
Ā 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
Ā 
Lucknow šŸ’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow šŸ’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow šŸ’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow šŸ’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Ā 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
Ā 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
Ā 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
Ā 
VIP Kolkata Call Girl Howrah šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Howrah šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Howrah šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Howrah šŸ‘‰ 8250192130 Available With Room
Ā 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ā¤ļø8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ā¤ļø8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ā¤ļø8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ā¤ļø8860477959 Escorts...
Ā 

Identity document challenges and solutions

  • 1. Cover Story The Holography Times Vol. 7, Issue 22 Identity document: challenges and solutions By C S Jeena With todayā€™s technology, document can be easily duplicated and altered. Document tampering occurs frequently, however, inexpensive color copiers, scanners, and PCā€™s have made duplication easy and readily available. This is happening at an alarming rate, and every business is vulnerable. In most cases, the targets are government-issued documents such as passports, driverā€™s licenses, or national ID cards. The article highlight the issues related to document counterfeiting and the importance of hologram in document protection. Identity documents: Human beings need some form of identity document. An identity document tells a story about the holder on the subject of the document. The objective is to enable other person to understand more about the subject and to identify them. Above all, an identity document needs to be trustworthy. An identity document (also called a piece of identification or ID, or colloquially as oneā€™s ā€˜papersā€™) is any document which may be used to verify aspects of a personā€™s personal identity. If issued in the form of a small, mostly standard-sized card, it is usually called an identity card (IC). Countries which do not have formal identity documents may require informal documents. It could be an identity card or travel documents. Why have IDā€™s In the middle age when people tend to live in clusters within village or tribes, personal documentation was not considered important at all. Nevertheless, many centuries ago identification tokens were 8 in forms of animal skin, gems and stone to seals introduced to enable for example representatives of the King travelling for neighbouring States. Eventually, paper identity documents emerged as evidence of someoneā€™s identity, and more in particular of the bearerā€™s position, with the request to grant safe passage to the bearer. Mostly, these documents served as a status symbol for the privileged rather than a form of identification. The need for reliable identity documents only became imminent when travel started to become more popular. The need for proper identity management became more obvious and compelling during World War I, when people started to realize the need to establish the identity of everybody who entered the fighting zone. In 1920, the League of Nations organized an international conference in order to work out common formats for passports and visa, including the layout, content and validity. Unfortunately, the effort was unsuccessful, due to lack of political will. www.homai.org
  • 2. Cover Story The Holography Times Vol. 7, Issue 22 Purpose of the identity document An identity document has a number of purposes; - ā€œThe Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.ā€ - Proof of identity: These days, persons are asked to prove their identity when dealing with a Bank, entering a restricted area or completing an important transactions such as buying a house etc. etc. They have no need for a travel document and only need a trustworthy identity document for domestic use. For example an identity card, PAN Card, driving license, social security card, AADHAR card or medicare card. Facilitation of travel: A trustworthy identification document facilitates international travel because it provides a proven means for identification purpose and guarantees the return of the bearer to a designated place. conditions of stay laid down by the immigration authorities of the receiving country or region. Domestic Document: These type of document are mainly intended for various purpose within the country of origin. Such as Permanent Account Number (PAN Card), Driving License, Voter ID card etc. etc. Challenges concerning identity documents Due to their importance, identity documents are a continuous subject of fraudulent and criminal activities. These include forged and false documents, false identity and impersonation and human trafficking. i. Forged and false documents: Identity theft and ID counterfeiting are among the fastest growing types of crime, especially in highly industrialized countries. According to FBI statistics, it is the fastest growing crime in USA. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Indeed, just to highlight the size of the problem, in April 2012 the European Parliament estimated that of the 6.5 million bio-metric passports in circulation in France between 500,000 and one million are ā€˜falseā€™ having been obtained using counterfeit documents. In most cases, the targets are government - issued documents such as passports, driverā€™s licenses, or national ID cards. ii. How ID are copied/ faked: According to various Organization, common examples of forged and false documents include; - Counterfeit identity documents that emulate the Proof of Nationality: A travel document not only certified the nationality of the holder, but also indicates whether the holder has the right to return to the issuing country or his place of domicile, through a visa label or a stamp in the document. Common identity documents An identity card is a generic term for various cards types such as social security cards, citizenā€™s cards, resident cards and driving licenses. These can be classified into Travel Document or Document used for Domestic purpose. Travel Documents: Travel document are documents intended for international travel, such as passports and certificates of identity, normally come in the shape of a booklet which can include a visa sticker and the www.homai.org 9
  • 3. Cover Story The Holography Times Vol. 7, Issue 22 features and characteristic of valid IDs issued by Government. For example, counterfeit driver license with an unexpired date. - - ā€œTerrorist group and homegrown extremists have used counterfeit IDā€™s to rent cars and trucks, and to buy chemicals or certain fertilizers to derive high potency explosive components. Example includes 11 September 2001 in USA and 26 November 2008 in Mumbai (India).ā€ Valid identity documents, usually issued in the name of a fictitious or stolen identity, obtained through fraudulent means. Valid identity documents have been altered after issuance to change a name, photo image, age, or other biographic descriptor. Damaged caused by the duplicate/copies/fake IDs: The fake ID can impact National security, public safety and the Economy. While counterfeited ID use for financial gain harmed common consumer, the counterfeited Government IDā€™s can be a serious threat to national security and economy. Terrorist group and homegrown extremists have used counterfeit IDā€™s to rent cars and trucks, and to buy chemicals or certain fertilizers to derive high potency explosive components. Example includes 11 September 2001 in USA and 26 November 2008 in Mumbai (India). What can be done? i. Common guidelines for stronger card security: With the lack of consistent standards across identification document, it is often difficult to give reasonable assurance of a given document authenticity. Improving the security of identity documents is a matter of urgent national security. Most Identity Document are not designed as secure documents, and therefore are no uniform security standards in place to assist the public and law enforcement in the recognition of genuine 10 versus counterfeit identity documents. As an essential step, Government should issue a standard basic guidelines for document protection security such as; - All document must be incorporated with overt, covert and forensic security features; - A combination of security features with other level 2 and level 3 security features to form a layered approach. (See table) - Specialised and secure card production materials designed to prevent counterfeiting and should be limited to access and costly to obtain. - Use of technology that does more than verify a bar code. ID readers must be able to verify security features as well as bar codes digitally and nondigitally. ii. Training for enforcement officials: Officials involved in security of various premises including Army Personnel and Local Police should become trained in basic methods of identity document authentication, and have tools available to assist in differentiating fake IDs from valid IDs. For example reference guides to State Licenses are essential tools for authentication, as counterfeit driver licenses are most often used in States other than the State from which the document is counterfeited. Hologram security: There are many security features that can be applied to documents, both overt and covert and hologram are among one of the most effective authentication measures in the battle against document counterfeiting. www.homai.org
  • 4. Cover Story The Holography Times Vol. 7, Issue 22 Level Feature Purpose for usage 1 Overt (visible with naked eyes) - a visible ā€œpublic recognition featureā€ - Little or no training and no device required. - Examples such as hologram, optical variable ink, paper watermark etc. 2 Covert (non-visible with eyes) - Hidden features. - Requires some training and simple devide to validate. - Examples such as UV-ļ¬‚uorescence, micro-text etc. 3 Forensic - Deeply hidden features. - Requires specialist knowledge and equipment to validate. - Examples such as various proprietary taggants, etc. Table: The use of security features levels The role of a hologram on a passport and other identity documents is principally to shield against the forgery of the photograph and personal data, otherwise known as the ā€˜variable informationā€™. However, the ability of the hologram to provide effective protection lies in the continuous innovation, invention and evolution of holographic techniques. Both optical effects and material science techniques have created authentication devices that are easily recognised yet difficult to copy accurately. They can be safely integrated within the production process and stand up to the rigorous demands of being in use for a period of anything up to ten years. According to Mr. Luv D Shriram,General Secretary & Treasurer (HoMAI), ā€œSecurity hologram was used in document protection because it provides the best visual authentication. Electronic authentication is not possible everywhere especially in remote areas so it generate a requirement of an instant visual authentication like a security hologram with advanced levels of security features for authentication (One such exampleis Visa / Master Card which is continuously www.homai.org using security hologram as overt feature since1983). Conclusion With the lack of consistent standards across identification document, it is often difficult to give reasonable assurance of a given document authenticity. Improving the security of identity documents is a matter of urgent national security. Most Identity Document are not designed as secure documents, and therefore are no uniform security standards in place to assist the public and law enforcement in the recognition of genuine versus counterfeit identity documents. Governments and Organizations should understand that counterfeiters will attempt to counterfeit the document if it is least secure document. Therefore, we request that maximum security features recommended by Various Organization should be implemented for the benefits of public. These security features must be practical for document issuers to implement, easy for the public to recognize and provide specific identity features for law enforcement and forensic investigators. 11