SlideShare a Scribd company logo
1 of 4
Download to read offline
Cover Story

The Holography Times
Vol. 7, Issue 22

Identity document:
challenges and solutions
By C S Jeena

With today’s technology, document can be easily duplicated and altered.
Document tampering occurs frequently, however, inexpensive color
copiers, scanners, and PC’s have made duplication easy and readily
available. This is happening at an alarming rate, and every business is
vulnerable. In most cases, the targets are government-issued documents
such as passports, driver’s licenses, or national ID cards.
The article highlight the issues related to document counterfeiting and the
importance of hologram in document protection.

Identity documents:

Human beings need some
form of identity document. An
identity document tells a story
about the holder on the subject
of the document. The objective
is to enable other person to
understand more about the
subject and to identify them.
Above all, an identity document
needs to be trustworthy. An
identity document (also called a
piece of identification or ID, or
colloquially as one’s ‘papers’)
is any document which may
be used to verify aspects of a
person’s personal identity. If
issued in the form of a small,
mostly standard-sized card, it is
usually called an identity card
(IC). Countries which do not have
formal identity documents may
require informal documents.
It could be an identity card or
travel documents.

Why have ID’s

In the middle age when people
tend to live in clusters within
village or tribes, personal
documentation
was
not
considered important at all.
Nevertheless, many centuries
ago identification tokens were

8

in forms of animal skin, gems
and stone to seals introduced
to
enable
for
example
representatives of the King
travelling
for
neighbouring
States. Eventually, paper identity
documents emerged as evidence
of someone’s identity, and more
in particular of the bearer’s
position, with the request to
grant safe passage to the bearer.
Mostly, these documents served
as a status symbol for the
privileged rather than a form of
identification.
The need for reliable identity
documents only became imminent
when travel started to become
more popular. The need for proper
identity management became
more obvious and compelling
during World War I, when people
started to realize the need to
establish the identity of everybody
who entered the fighting zone.
In 1920, the League of Nations
organized
an
international
conference in order to work out
common formats for passports
and visa, including the layout,
content and validity. Unfortunately,
the effort was unsuccessful, due to
lack of political will.
www.homai.org
Cover Story

The Holography Times
Vol. 7, Issue 22

Purpose of the identity
document

An identity document has a
number of purposes;
-

“The Federal Trade Commission
estimates that as many as 9
million Americans have their
identities stolen each year.”
-

Proof of identity: These days,
persons are asked to prove
their identity when dealing
with a Bank, entering a
restricted area or completing
an important transactions
such as buying a house etc.
etc. They have no need for
a travel document and only
need a trustworthy identity
document for domestic use.
For example an identity card,
PAN Card, driving license,
social security card, AADHAR
card or medicare card.
Facilitation of travel: A
trustworthy
identification
document
facilitates
international travel because
it provides a proven means
for identification purpose
and guarantees the return of
the bearer to a designated
place.

conditions of stay laid down by
the immigration authorities of
the receiving country or region.
Domestic Document: These
type of document are mainly
intended for various purpose
within the country of origin. Such
as Permanent Account Number
(PAN Card), Driving License,
Voter ID card etc. etc.

Challenges concerning
identity documents

Due to their importance, identity
documents are a continuous
subject of fraudulent and
criminal activities. These include
forged and false documents, false
identity and impersonation and
human trafficking.
i.

Forged
and
false
documents: Identity theft
and ID counterfeiting are
among the fastest growing
types of crime, especially
in highly industrialized
countries. According to FBI
statistics, it is the fastest
growing crime in USA. The
Federal Trade Commission
estimates that as many as
9 million Americans have
their identities stolen each
year. Indeed, just to highlight
the size of the problem, in
April 2012 the European
Parliament estimated that
of the 6.5 million bio-metric
passports in circulation in
France between 500,000
and one million are ‘false’
having been obtained using
counterfeit
documents.
In most cases, the targets
are government - issued
documents
such
as
passports, driver’s licenses,
or national ID cards.

ii.

How ID are copied/
faked: According to various
Organization,
common
examples of forged and false
documents include;

-

Counterfeit
identity
documents that emulate the

Proof of Nationality: A
travel document not only
certified the nationality of
the holder, but also indicates
whether the holder has the
right to return to the issuing
country or his place of
domicile, through a visa label
or a stamp in the document.

Common identity
documents

An identity card is a generic term
for various cards types such as
social security cards, citizen’s
cards, resident cards and
driving licenses. These can be
classified into Travel Document
or Document used for Domestic
purpose.
Travel
Documents:
Travel
document
are
documents
intended for international travel,
such as passports and certificates
of identity, normally come in the
shape of a booklet which can
include a visa sticker and the
www.homai.org

9
Cover Story

The Holography Times
Vol. 7, Issue 22

features and characteristic
of valid IDs issued by
Government. For example,
counterfeit driver license
with an unexpired date.
-

-

“Terrorist group and homegrown
extremists have used counterfeit
ID’s to rent cars and trucks,
and to buy chemicals or certain
fertilizers to derive high potency
explosive components. Example
includes 11 September 2001 in
USA and 26 November 2008 in
Mumbai (India).”

Valid identity documents,
usually issued in the name of
a fictitious or stolen identity,
obtained through fraudulent
means.
Valid identity documents
have been altered after
issuance to change a name,
photo image, age, or other
biographic descriptor.

Damaged caused by the
duplicate/copies/fake
IDs:

The fake ID can impact National
security, public safety and the
Economy. While counterfeited
ID use for financial gain
harmed common consumer,
the counterfeited Government
ID’s can be a serious threat to
national security and economy.
Terrorist group and homegrown
extremists have used counterfeit
ID’s to rent cars and trucks,
and to buy chemicals or certain
fertilizers to derive high potency
explosive components. Example
includes 11 September 2001 in
USA and 26 November 2008 in
Mumbai (India).

What can be done?

i. Common
guidelines
for
stronger
card
security: With the lack of
consistent standards across
identification
document,
it is often difficult to give
reasonable assurance of a
given document authenticity.
Improving the security of
identity documents is a matter
of urgent national security.
Most Identity Document
are not designed as secure
documents, and therefore are
no uniform security standards
in place to assist the public
and law enforcement in
the recognition of genuine

10

versus counterfeit identity
documents.
As an essential step, Government
should issue a standard basic
guidelines
for
document
protection security such as;
-

All document must be
incorporated with overt,
covert and forensic security
features;

-

A combination of security
features with other level 2
and level 3 security features to
form a layered approach. (See
table)

-

Specialised and secure card
production materials designed
to prevent counterfeiting and
should be limited to access
and costly to obtain.

-

Use of technology that does
more than verify a bar code.
ID readers must be able to
verify security features as well
as bar codes digitally and nondigitally.

ii. Training for enforcement
officials: Officials involved
in
security
of
various
premises including Army
Personnel and Local Police
should become trained in
basic methods of identity
document authentication, and
have tools available to assist
in differentiating fake IDs
from valid IDs. For example
reference guides to State
Licenses are essential tools for
authentication, as counterfeit
driver licenses are most
often used in States other
than the State from which the
document is counterfeited.

Hologram security:

There are many security features
that can be applied to documents,
both overt and covert and
hologram are among one of the
most effective authentication
measures in the battle against
document
counterfeiting.

www.homai.org
Cover Story

The Holography Times
Vol. 7, Issue 22

Level

Feature

Purpose for usage

1

Overt (visible with naked eyes)

- a visible “public recognition feature”
- Little or no training and no device required.
- Examples such as hologram, optical variable
ink, paper watermark etc.

2

Covert (non-visible with eyes)

- Hidden features.
- Requires some training and simple devide to validate.
- Examples such as UV-fluorescence, micro-text etc.

3

Forensic

- Deeply hidden features.
- Requires specialist knowledge and equipment to validate.
- Examples such as various proprietary taggants, etc.

Table: The use of security features levels

The role of a hologram on a
passport and other identity
documents is principally to
shield against the forgery of
the photograph and personal
data, otherwise known as the
‘variable information’. However,
the ability of the hologram to
provide effective protection lies
in the continuous innovation,
invention and evolution of
holographic techniques. Both
optical effects and material
science techniques have created
authentication devices that are
easily recognised yet difficult
to copy accurately. They can
be safely integrated within the
production process and stand up
to the rigorous demands of being
in use for a period of anything
up to ten years. According to Mr.
Luv D Shriram,General Secretary
& Treasurer (HoMAI), “Security
hologram was used in document
protection because it provides
the best visual authentication.
Electronic
authentication
is not possible everywhere
especially in remote areas so it
generate a requirement of an
instant visual authentication
like a security hologram with
advanced levels of security
features for authentication (One
such exampleis Visa / Master
Card which is continuously
www.homai.org

using security hologram as overt
feature since1983).
Conclusion
With the lack of consistent
standards across identification
document, it is often difficult
to give reasonable assurance of
a given document authenticity.
Improving the security of
identity documents is a matter
of urgent national security.
Most Identity Document are not
designed as secure documents,
and therefore are no uniform
security standards in place
to assist the public and law
enforcement in the recognition
of genuine versus counterfeit
identity documents.
Governments and Organizations
should
understand
that
counterfeiters will attempt to
counterfeit the document if it is
least secure document. Therefore,
we request that maximum
security features recommended
by Various Organization should
be implemented for the benefits
of public. These security features
must be practical for document
issuers to implement, easy for the
public to recognize and provide
specific identity features for
law enforcement and forensic
investigators.

11

More Related Content

What's hot

Holoflex: scanning the hologram market - Study by FPS
Holoflex: scanning the hologram market - Study by FPSHoloflex: scanning the hologram market - Study by FPS
Holoflex: scanning the hologram market - Study by FPSFame Per Second
 
The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21The Authentication Times
 
The Holography Times, April 2010, Volume 4, Issue no 10
The Holography Times, April 2010, Volume 4, Issue no 10The Holography Times, April 2010, Volume 4, Issue no 10
The Holography Times, April 2010, Volume 4, Issue no 10The Authentication Times
 
The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Authentication Times
 
The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18The Authentication Times
 
The Holography Times, April 2009, Volume 3, Issue No 6
The Holography Times, April 2009, Volume 3, Issue No 6The Holography Times, April 2009, Volume 3, Issue No 6
The Holography Times, April 2009, Volume 3, Issue No 6The Authentication Times
 
Counterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brandsCounterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brandsNEW Momentum
 
The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Authentication Times
 
The Authentication Times issue 27 August 2015
The Authentication Times issue 27 August 2015The Authentication Times issue 27 August 2015
The Authentication Times issue 27 August 2015The Authentication Times
 
E-Marketing Case Study: Hepsiburada
E-Marketing Case Study: HepsiburadaE-Marketing Case Study: Hepsiburada
E-Marketing Case Study: HepsiburadaUğurcan Yurtsever
 
The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Authentication Times
 
The Holography Times, January 2014, Volume 8, Issue no 23
The Holography Times, January 2014, Volume 8, Issue no 23The Holography Times, January 2014, Volume 8, Issue no 23
The Holography Times, January 2014, Volume 8, Issue no 23The Authentication Times
 

What's hot (20)

Holoflex: scanning the hologram market - Study by FPS
Holoflex: scanning the hologram market - Study by FPSHoloflex: scanning the hologram market - Study by FPS
Holoflex: scanning the hologram market - Study by FPS
 
Counterfeiting & the ways to tackle this menace in west bengal
Counterfeiting & the ways to tackle this menace in west bengalCounterfeiting & the ways to tackle this menace in west bengal
Counterfeiting & the ways to tackle this menace in west bengal
 
Ht issue 12 201011
Ht issue 12 201011Ht issue 12 201011
Ht issue 12 201011
 
The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21
 
The Holography Times, April 2010, Volume 4, Issue no 10
The Holography Times, April 2010, Volume 4, Issue no 10The Holography Times, April 2010, Volume 4, Issue no 10
The Holography Times, April 2010, Volume 4, Issue no 10
 
The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17
 
The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18
 
The Holography Times, April 2009, Volume 3, Issue No 6
The Holography Times, April 2009, Volume 3, Issue No 6The Holography Times, April 2009, Volume 3, Issue No 6
The Holography Times, April 2009, Volume 3, Issue No 6
 
The Authentication Times Issue 28
The Authentication Times Issue 28The Authentication Times Issue 28
The Authentication Times Issue 28
 
The Authentication Times Issue 29
The Authentication Times Issue 29The Authentication Times Issue 29
The Authentication Times Issue 29
 
Counterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brandsCounterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brands
 
The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20
 
Untitled
UntitledUntitled
Untitled
 
The Authentication Times issue 27 August 2015
The Authentication Times issue 27 August 2015The Authentication Times issue 27 August 2015
The Authentication Times issue 27 August 2015
 
E-Marketing Case Study: Hepsiburada
E-Marketing Case Study: HepsiburadaE-Marketing Case Study: Hepsiburada
E-Marketing Case Study: Hepsiburada
 
The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22
 
The Holography Times, Vol 8, Issue 24
The Holography Times, Vol 8, Issue 24The Holography Times, Vol 8, Issue 24
The Holography Times, Vol 8, Issue 24
 
Situation of drug counterfeiting in Rajasthan and the ways to tackle this menace
Situation of drug counterfeiting in Rajasthan and the ways to tackle this menaceSituation of drug counterfeiting in Rajasthan and the ways to tackle this menace
Situation of drug counterfeiting in Rajasthan and the ways to tackle this menace
 
The Holography Times, January 2014, Volume 8, Issue no 23
The Holography Times, January 2014, Volume 8, Issue no 23The Holography Times, January 2014, Volume 8, Issue no 23
The Holography Times, January 2014, Volume 8, Issue no 23
 
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
 

Viewers also liked

Viewers also liked (20)

Use of holograms as security and authentication devices in india
Use of holograms as security and authentication devices in indiaUse of holograms as security and authentication devices in india
Use of holograms as security and authentication devices in india
 
Counterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-itCounterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-it
 
Is Hologram Packaging the 6th P of marketing?
Is Hologram Packaging the 6th P of marketing?Is Hologram Packaging the 6th P of marketing?
Is Hologram Packaging the 6th P of marketing?
 
Authentication Solutions to stop the Scourge of Spurious Medicines
Authentication Solutions to stop the Scourge of Spurious MedicinesAuthentication Solutions to stop the Scourge of Spurious Medicines
Authentication Solutions to stop the Scourge of Spurious Medicines
 
High tech hologram can uproot tobacco counterfeiting
High tech hologram can uproot tobacco counterfeitingHigh tech hologram can uproot tobacco counterfeiting
High tech hologram can uproot tobacco counterfeiting
 
Steps to identify authentication solutions to curb counterfeiting
Steps to identify authentication solutions to curb counterfeitingSteps to identify authentication solutions to curb counterfeiting
Steps to identify authentication solutions to curb counterfeiting
 
Coded holograms-keeping-the-supply-chain-secure
Coded holograms-keeping-the-supply-chain-secureCoded holograms-keeping-the-supply-chain-secure
Coded holograms-keeping-the-supply-chain-secure
 
Serialization for the pharmaceutical industry an overview
Serialization for the pharmaceutical industry an overviewSerialization for the pharmaceutical industry an overview
Serialization for the pharmaceutical industry an overview
 
Evolution of Polymer Banknotes Pros and Cons
Evolution of Polymer Banknotes Pros and ConsEvolution of Polymer Banknotes Pros and Cons
Evolution of Polymer Banknotes Pros and Cons
 
Brand counterfeiting and solutions for its prevention
Brand counterfeiting and solutions for its preventionBrand counterfeiting and solutions for its prevention
Brand counterfeiting and solutions for its prevention
 
Increasing revenue and curbing illegal liquor in India
Increasing revenue and curbing illegal liquor in IndiaIncreasing revenue and curbing illegal liquor in India
Increasing revenue and curbing illegal liquor in India
 
How to combat electrical and electronic components counterfeiting?
How to combat electrical and electronic components counterfeiting?How to combat electrical and electronic components counterfeiting?
How to combat electrical and electronic components counterfeiting?
 
Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...
Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...
Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...
 
Hologram provides measure to authenticate, identify and arrest counterfeits t...
Hologram provides measure to authenticate, identify and arrest counterfeits t...Hologram provides measure to authenticate, identify and arrest counterfeits t...
Hologram provides measure to authenticate, identify and arrest counterfeits t...
 
Identify fake pesticides with authentication solutions in India
Identify fake pesticides with authentication solutions in IndiaIdentify fake pesticides with authentication solutions in India
Identify fake pesticides with authentication solutions in India
 
How to select authentication solutions according to your needs
How to select authentication solutions according to your needsHow to select authentication solutions according to your needs
How to select authentication solutions according to your needs
 
Holographic tax stamps boost indian excise revenue
Holographic tax stamps boost indian excise revenueHolographic tax stamps boost indian excise revenue
Holographic tax stamps boost indian excise revenue
 
Tax stamp in india an overview
Tax stamp in india an overviewTax stamp in india an overview
Tax stamp in india an overview
 
Counterfeit Auto Parts
Counterfeit Auto PartsCounterfeit Auto Parts
Counterfeit Auto Parts
 
How to combat Auto counterfeiting in India
How to combat Auto counterfeiting in IndiaHow to combat Auto counterfeiting in India
How to combat Auto counterfeiting in India
 

Similar to Identity document challenges and solutions

National Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft ReportNational Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft Reportnationalconsumersleague
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftMartha Brown
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT- Mark - Fullbright
 
An Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaAn Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaTracy Morgan
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSGreg Ewers
 
ID Cards and Privacy- Balancing Security and Personal Information.pdf
ID Cards and Privacy- Balancing Security and Personal Information.pdfID Cards and Privacy- Balancing Security and Personal Information.pdf
ID Cards and Privacy- Balancing Security and Personal Information.pdfmilewits415
 
Identity Theft : A Serious Crime
Identity Theft : A Serious CrimeIdentity Theft : A Serious Crime
Identity Theft : A Serious CrimeTanzim Rizwan
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismREVULN
 
Identity Theft
Identity TheftIdentity Theft
Identity Theftsarakr00
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxdeanmtaylor1545
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxbradburgess22840
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxerlindaw
 
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docxSheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docxmaoanderton
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftElizabeth Dimit
 

Similar to Identity document challenges and solutions (20)

National Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft ReportNational Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft Report
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
 
Child Identity Theft
Child Identity TheftChild Identity Theft
Child Identity Theft
 
An Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaAn Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South Africa
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERS
 
ID Cards and Privacy- Balancing Security and Personal Information.pdf
ID Cards and Privacy- Balancing Security and Personal Information.pdfID Cards and Privacy- Balancing Security and Personal Information.pdf
ID Cards and Privacy- Balancing Security and Personal Information.pdf
 
Identity Theft : A Serious Crime
Identity Theft : A Serious CrimeIdentity Theft : A Serious Crime
Identity Theft : A Serious Crime
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docxSheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
The State of Identity Theft in 2013
The State of Identity Theft in 2013The State of Identity Theft in 2013
The State of Identity Theft in 2013
 

More from Authentication Solution Providers' Association (ASPA)

More from Authentication Solution Providers' Association (ASPA) (20)

Trends and Developments in Tax Stamps in India
Trends and Developments in Tax Stamps in IndiaTrends and Developments in Tax Stamps in India
Trends and Developments in Tax Stamps in India
 
Covid 19 and counterfeiting
Covid 19 and counterfeitingCovid 19 and counterfeiting
Covid 19 and counterfeiting
 
Food Fraud Authentication and Traceability
Food Fraud Authentication and TraceabilityFood Fraud Authentication and Traceability
Food Fraud Authentication and Traceability
 
Tax stamps role in implementing ideal state excise policy
Tax stamps role in implementing ideal state excise policyTax stamps role in implementing ideal state excise policy
Tax stamps role in implementing ideal state excise policy
 
Overview of anti counterfeiting technologies and Opportunities for India
Overview of anti counterfeiting technologies and Opportunities for IndiaOverview of anti counterfeiting technologies and Opportunities for India
Overview of anti counterfeiting technologies and Opportunities for India
 
Exploring the 5 W's of Counterfeiting
Exploring the 5 W's of Counterfeiting Exploring the 5 W's of Counterfeiting
Exploring the 5 W's of Counterfeiting
 
How to make any serialization program successful
How to make any serialization program successful How to make any serialization program successful
How to make any serialization program successful
 
Cannabis in India & Canada
Cannabis in India & CanadaCannabis in India & Canada
Cannabis in India & Canada
 
Authentication technology / Solutions Empowering Farmers, Industry and Govern...
Authentication technology / Solutions Empowering Farmers, Industry and Govern...Authentication technology / Solutions Empowering Farmers, Industry and Govern...
Authentication technology / Solutions Empowering Farmers, Industry and Govern...
 
Collaborated Solutions Staying ahead of the Counterfeiters
Collaborated Solutions Staying ahead of the CounterfeitersCollaborated Solutions Staying ahead of the Counterfeiters
Collaborated Solutions Staying ahead of the Counterfeiters
 
Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...
Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...
Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...
 
Trends and drivers in tax stamps design
Trends and drivers in tax stamps design Trends and drivers in tax stamps design
Trends and drivers in tax stamps design
 
The Evolution of DOVID's on Banknotes
The Evolution of DOVID's on BanknotesThe Evolution of DOVID's on Banknotes
The Evolution of DOVID's on Banknotes
 
Predicting future banknote designs by a use centered approach dr hans de heij
Predicting future banknote designs by a use centered approach dr hans de heijPredicting future banknote designs by a use centered approach dr hans de heij
Predicting future banknote designs by a use centered approach dr hans de heij
 
Combating illicit tobacco trade; collaborative solutions for India
Combating illicit tobacco trade; collaborative solutions for IndiaCombating illicit tobacco trade; collaborative solutions for India
Combating illicit tobacco trade; collaborative solutions for India
 
How blockchain is strengthening tuna traceability to combat illegal fishing
How blockchain is strengthening tuna traceability to combat illegal fishingHow blockchain is strengthening tuna traceability to combat illegal fishing
How blockchain is strengthening tuna traceability to combat illegal fishing
 
Need of anti counterfeit secured packaging
Need of anti counterfeit secured packagingNeed of anti counterfeit secured packaging
Need of anti counterfeit secured packaging
 
Security features in passport, trends in the last two decades
Security features in passport, trends in the last two decadesSecurity features in passport, trends in the last two decades
Security features in passport, trends in the last two decades
 
Recent trends and developments in currency
Recent trends and developments in currencyRecent trends and developments in currency
Recent trends and developments in currency
 
Recent trends & developments in holographic tax stamp in india
Recent trends & developments in holographic tax stamp in indiaRecent trends & developments in holographic tax stamp in india
Recent trends & developments in holographic tax stamp in india
 

Recently uploaded

Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 

Recently uploaded (20)

Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 

Identity document challenges and solutions

  • 1. Cover Story The Holography Times Vol. 7, Issue 22 Identity document: challenges and solutions By C S Jeena With today’s technology, document can be easily duplicated and altered. Document tampering occurs frequently, however, inexpensive color copiers, scanners, and PC’s have made duplication easy and readily available. This is happening at an alarming rate, and every business is vulnerable. In most cases, the targets are government-issued documents such as passports, driver’s licenses, or national ID cards. The article highlight the issues related to document counterfeiting and the importance of hologram in document protection. Identity documents: Human beings need some form of identity document. An identity document tells a story about the holder on the subject of the document. The objective is to enable other person to understand more about the subject and to identify them. Above all, an identity document needs to be trustworthy. An identity document (also called a piece of identification or ID, or colloquially as one’s ‘papers’) is any document which may be used to verify aspects of a person’s personal identity. If issued in the form of a small, mostly standard-sized card, it is usually called an identity card (IC). Countries which do not have formal identity documents may require informal documents. It could be an identity card or travel documents. Why have ID’s In the middle age when people tend to live in clusters within village or tribes, personal documentation was not considered important at all. Nevertheless, many centuries ago identification tokens were 8 in forms of animal skin, gems and stone to seals introduced to enable for example representatives of the King travelling for neighbouring States. Eventually, paper identity documents emerged as evidence of someone’s identity, and more in particular of the bearer’s position, with the request to grant safe passage to the bearer. Mostly, these documents served as a status symbol for the privileged rather than a form of identification. The need for reliable identity documents only became imminent when travel started to become more popular. The need for proper identity management became more obvious and compelling during World War I, when people started to realize the need to establish the identity of everybody who entered the fighting zone. In 1920, the League of Nations organized an international conference in order to work out common formats for passports and visa, including the layout, content and validity. Unfortunately, the effort was unsuccessful, due to lack of political will. www.homai.org
  • 2. Cover Story The Holography Times Vol. 7, Issue 22 Purpose of the identity document An identity document has a number of purposes; - “The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.” - Proof of identity: These days, persons are asked to prove their identity when dealing with a Bank, entering a restricted area or completing an important transactions such as buying a house etc. etc. They have no need for a travel document and only need a trustworthy identity document for domestic use. For example an identity card, PAN Card, driving license, social security card, AADHAR card or medicare card. Facilitation of travel: A trustworthy identification document facilitates international travel because it provides a proven means for identification purpose and guarantees the return of the bearer to a designated place. conditions of stay laid down by the immigration authorities of the receiving country or region. Domestic Document: These type of document are mainly intended for various purpose within the country of origin. Such as Permanent Account Number (PAN Card), Driving License, Voter ID card etc. etc. Challenges concerning identity documents Due to their importance, identity documents are a continuous subject of fraudulent and criminal activities. These include forged and false documents, false identity and impersonation and human trafficking. i. Forged and false documents: Identity theft and ID counterfeiting are among the fastest growing types of crime, especially in highly industrialized countries. According to FBI statistics, it is the fastest growing crime in USA. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Indeed, just to highlight the size of the problem, in April 2012 the European Parliament estimated that of the 6.5 million bio-metric passports in circulation in France between 500,000 and one million are ‘false’ having been obtained using counterfeit documents. In most cases, the targets are government - issued documents such as passports, driver’s licenses, or national ID cards. ii. How ID are copied/ faked: According to various Organization, common examples of forged and false documents include; - Counterfeit identity documents that emulate the Proof of Nationality: A travel document not only certified the nationality of the holder, but also indicates whether the holder has the right to return to the issuing country or his place of domicile, through a visa label or a stamp in the document. Common identity documents An identity card is a generic term for various cards types such as social security cards, citizen’s cards, resident cards and driving licenses. These can be classified into Travel Document or Document used for Domestic purpose. Travel Documents: Travel document are documents intended for international travel, such as passports and certificates of identity, normally come in the shape of a booklet which can include a visa sticker and the www.homai.org 9
  • 3. Cover Story The Holography Times Vol. 7, Issue 22 features and characteristic of valid IDs issued by Government. For example, counterfeit driver license with an unexpired date. - - “Terrorist group and homegrown extremists have used counterfeit ID’s to rent cars and trucks, and to buy chemicals or certain fertilizers to derive high potency explosive components. Example includes 11 September 2001 in USA and 26 November 2008 in Mumbai (India).” Valid identity documents, usually issued in the name of a fictitious or stolen identity, obtained through fraudulent means. Valid identity documents have been altered after issuance to change a name, photo image, age, or other biographic descriptor. Damaged caused by the duplicate/copies/fake IDs: The fake ID can impact National security, public safety and the Economy. While counterfeited ID use for financial gain harmed common consumer, the counterfeited Government ID’s can be a serious threat to national security and economy. Terrorist group and homegrown extremists have used counterfeit ID’s to rent cars and trucks, and to buy chemicals or certain fertilizers to derive high potency explosive components. Example includes 11 September 2001 in USA and 26 November 2008 in Mumbai (India). What can be done? i. Common guidelines for stronger card security: With the lack of consistent standards across identification document, it is often difficult to give reasonable assurance of a given document authenticity. Improving the security of identity documents is a matter of urgent national security. Most Identity Document are not designed as secure documents, and therefore are no uniform security standards in place to assist the public and law enforcement in the recognition of genuine 10 versus counterfeit identity documents. As an essential step, Government should issue a standard basic guidelines for document protection security such as; - All document must be incorporated with overt, covert and forensic security features; - A combination of security features with other level 2 and level 3 security features to form a layered approach. (See table) - Specialised and secure card production materials designed to prevent counterfeiting and should be limited to access and costly to obtain. - Use of technology that does more than verify a bar code. ID readers must be able to verify security features as well as bar codes digitally and nondigitally. ii. Training for enforcement officials: Officials involved in security of various premises including Army Personnel and Local Police should become trained in basic methods of identity document authentication, and have tools available to assist in differentiating fake IDs from valid IDs. For example reference guides to State Licenses are essential tools for authentication, as counterfeit driver licenses are most often used in States other than the State from which the document is counterfeited. Hologram security: There are many security features that can be applied to documents, both overt and covert and hologram are among one of the most effective authentication measures in the battle against document counterfeiting. www.homai.org
  • 4. Cover Story The Holography Times Vol. 7, Issue 22 Level Feature Purpose for usage 1 Overt (visible with naked eyes) - a visible “public recognition feature” - Little or no training and no device required. - Examples such as hologram, optical variable ink, paper watermark etc. 2 Covert (non-visible with eyes) - Hidden features. - Requires some training and simple devide to validate. - Examples such as UV-fluorescence, micro-text etc. 3 Forensic - Deeply hidden features. - Requires specialist knowledge and equipment to validate. - Examples such as various proprietary taggants, etc. Table: The use of security features levels The role of a hologram on a passport and other identity documents is principally to shield against the forgery of the photograph and personal data, otherwise known as the ‘variable information’. However, the ability of the hologram to provide effective protection lies in the continuous innovation, invention and evolution of holographic techniques. Both optical effects and material science techniques have created authentication devices that are easily recognised yet difficult to copy accurately. They can be safely integrated within the production process and stand up to the rigorous demands of being in use for a period of anything up to ten years. According to Mr. Luv D Shriram,General Secretary & Treasurer (HoMAI), “Security hologram was used in document protection because it provides the best visual authentication. Electronic authentication is not possible everywhere especially in remote areas so it generate a requirement of an instant visual authentication like a security hologram with advanced levels of security features for authentication (One such exampleis Visa / Master Card which is continuously www.homai.org using security hologram as overt feature since1983). Conclusion With the lack of consistent standards across identification document, it is often difficult to give reasonable assurance of a given document authenticity. Improving the security of identity documents is a matter of urgent national security. Most Identity Document are not designed as secure documents, and therefore are no uniform security standards in place to assist the public and law enforcement in the recognition of genuine versus counterfeit identity documents. Governments and Organizations should understand that counterfeiters will attempt to counterfeit the document if it is least secure document. Therefore, we request that maximum security features recommended by Various Organization should be implemented for the benefits of public. These security features must be practical for document issuers to implement, easy for the public to recognize and provide specific identity features for law enforcement and forensic investigators. 11