Identity document forgery

West German customs employee checking an alleged fake document.

Identity document forgery is the process by which identity documents issued by governing bodies are illegally copied and/or modified by persons not authorized to create such documents or engage in such modifications, for the purpose of deceiving those who would view the documents about the identity or status of the bearer.[1] The term also encompasses the activity of acquiring identity documents from legitimate bodies by falsifying the required supporting documentation in order to create the desired identity.[2]

Identity documents differ from other credentials in that they are intended to be usable by only the person holding the card. Unlike other credentials, they may be used to restrict the activities of the holder as well as to expand them.

Documents that have been forged in this way include driver's licenses (historically forged or altered as an attempt to conceal the fact that persons desiring to purchase alcohol are under the legal drinking age); birth certificates and Social Security cards (likely used in identity theft schemes or to defraud the government); and passports (used to evade restrictions on entry into a particular country). At the beginning of 2010, there were 11 million stolen or lost passports listed in the global database of Interpol.[3]

Such falsified documents can be used for identity theft, age deception, illegal immigration, organized crime, and espionage.[4]

Use scenarios, forgery techniques and security countermeasures

Lee Harvey Oswald's fake service card with the name Hidell.

A distinction needs to be made between the different uses of an identity document. In some cases, the fake ID may only have to pass a cursory inspection, such as flashing a plastic ID card for a security guard. At the other extreme, a document may have to resist scrutiny by a trained document examiner, who may be equipped with technical tools for verifying biometrics and reading hidden security features within the card. To make forgery more difficult, most modern IDs contain numerous security features that require specialised and expensive equipment to duplicate. School IDs are typically easier to fake, as they often do not have the same level of security measures as government-issued IDs.

Fake ID cards can be ordered on the internet and some examples of these include the UK national identification card and a provisional motorcycle licence. There are a number of different types of false documents such as using another person's ID, a genuine document which has been altered, a form of ID that doesn't exist and a copy of an ID which has been made.

Modern fake ID cards almost invariably carry a picture of the authorized user, a simple and effective form of biometric identification. However, forgery of basic photographic ID cards has become simple in recent years with the availability of low-cost high-resolution printers, scanners and photo-editing software. Basic fake ID cards are commonly made using an inkjet or laser printer to print a replica document which is then laminated to resemble a real ID card. Most designs are made using computer programs, re-creating scanned copies of a license.

More complex ID cards are now being created by printing on a material called Teslin or Artisyn, which are paper-like materials that are actually micro-porous plastic sheets. When butterfly pouches and holograms are applied, the card is then run through a heat laminator, creating a professional-looking ID card.

Numerous security printing techniques have been used to attempt to enhance the security of ID cards. For example, many modern documents include holograms, which are difficult to replicate without expensive equipment not generally available. Though accurate recreation of these holograms is extremely difficult, using a mixture of pigments and base can create a similar shiny multi-colored look that may pass cursory inspection. Another form of document security is UV-light visible ink.[4]

In addition, some documents include a magnetic strip, which contains the similar information to that printed on the card. The data may thus be checked against other data on the card, such as printed information or a machine-readable barcode. Magnetic strips may also contain other secret identifying information. Although magnetic strips can also be faked, they provide another barrier to entry for the amateur forger. Other hidden security devices can also be added, including embedded secure cryptoprocessor chips which are designed to be very difficult to forge, and RFID tags⁠ ⁠—⁠ ⁠the two technologies may also be combined, in the case of contactless smart cards.

Another effective technique is the use of online verification of security information against a central database. In many cases, online verification can detect simple copying of a document by detecting attempted use in multiple places at the same time, or completely false IDs, as the information on the ID will be found to be invalid. A simple method of confirming that an ID is genuine is to print a serial number on it unique to the card and stored on a centralized database.[5] If checked, it will quickly become clear that the ID is false; either the number on the ID is not registered for the holder, or no ID has the number at all. Online verification also has the advantage that it allows easy revocation of lost or stolen documents.

Using digital signatures is another effective method of detecting ID forgery. The ID can include a copy of its data on an integrated circuit or barcode, digitally signed by the document issuer. The digital signature allows for easy authentication of the ID. If the digital signature of a fake ID is checked, it will immediately become evident that the ID is fake, because either the digitally signed copy of the holder's data does not match the data printed on the ID or the (possibly altered) copy of the ID's data is not signed by the document issuer.[6] The effectiveness of this security feature depends on the document issuer keeping the private key used to sign IDs secret,[7] as well as the strength of the cryptographic algorithm used for the ID's digital signature.

Many modern credentials now contain some kind of barcode. For example, many U.S. driving licences include a 2-dimensional code in PDF417 format, which contains the same information as on the front of the license. Barcodes allow rapid checking of credentials for low-security applications, and may potentially contain extra information which can be used to verify other information on the card.

Systemic attacks

The combination of multiple high-security features, biometrics, and well-trained document inspectors with technical assistance can be very effective at preventing forged documents from being easily produced. Instead of acquiring the expensive specialized equipment needed to make fake documents, it may be more economical to produce a "genuine fake"⁠ ⁠—⁠ ⁠a legitimate document, but one which contains false information.

One way of doing this is to present the document issuing authority with false credentials, which they will then endorse by issuing a new document. In this way, false identities and credentials can be "bootstrapped" over a period of time.[8]

Another simpler way of generating false credentials is to suborn one of the officials involved in the document-issuing process through bribery or intimidation. This may also be combined with the bootstrapping process mentioned above to mount complex attacks.

Corruption in the document-issuing process is hard to counter, since as the value of a credential increases, the economic incentives for corruption also increase. This is particularly true in the case of fake ID cards that combine many functions in one document, and for documents which are issued in large numbers, thus requiring many thousands of people to have authorizing powers, thus creating a longer chain of people who can possibly be exploited. Detection of a "genuine fake" document is also a difficult process; as such a fake is a legitimate document, it will pass any tests for forgery. To detect such fakes, it is necessary to perform a background check on the individual in question to confirm the legitimacy of the document's information.

See also

References

  1. ^ Buchanan, James D. R.; Cowburn, Russell P.; Jausovec, Ana-Vanessa; Petit, Dorothée; Seem, Peter; Xiong, Gang; Atkinson, Del; Fenton, Kate; Allwood, Dan A.; Bryan, Matthew T. (2005). "'Fingerprinting' documents and packaging". Nature. 436 (7050): 475. doi:10.1038/436475a. ISSN 1476-4687. PMID 16049465. S2CID 4164867.
  2. ^ Bennett, Colin John; Lyon, David (2008). Playing the Identity Card: Surveillance, Security and Identification in Global Perspective. Routledge. ISBN 9780415465632.
  3. ^ "11 million stolen or lost passports in Interpol database". Havocscope Black Markets. Archived from the original on 2010-02-03. Retrieved 2010-12-06.
  4. ^ a b Turner, J. W. Cecil (1946). ""Documents" in the Law of Forgery". Virginia Law Review. 32 (5): 939–954. doi:10.2307/1068683. ISSN 0042-6601. JSTOR 1068683.
  5. ^ "Driver's License Verification". www.e-verify.gov. March 2019. Retrieved 2020-02-23.
  6. ^ "Levels of identity security and groups of secure features". thalesgroup.com. Thales Group. 2022. Retrieved 6 June 2023.
  7. ^ "Understanding Digital Signatures". cisa.gov. Cybersecurity and Infrastructure Security Agency. 1 February 2021. Retrieved 6 June 2023.
  8. ^ "Journalisten Rambam niet vervolgd voor fraude". NU (in Dutch). 2013-06-13. Retrieved 2023-04-26.

Read other articles:

Questa voce o sezione sugli argomenti nobiltà e storia di famiglia non cita le fonti necessarie o quelle presenti sono insufficienti. Commento: Totale assenza di fonti Puoi migliorare questa voce aggiungendo citazioni da fonti attendibili secondo le linee guida sull'uso delle fonti. Segui i suggerimenti del progetto di riferimento. Lo stemma attuale della monarchia greca. La linea di successione al trono di Grecia segue un criterio di preferenza degli eredi maschi. Il Regno di Grecia t...

 

SaintsMenodora, Metrodora, and NymphodoraMartyrsBornBithynia in Asia Minor(modern-day Anatolia, Turkey)Diedc. AD 305–311Asia Minor(modern-day Turkey)Venerated inCatholic ChurchEastern Orthodox ChurchCanonizedPre-CongregationFeastSeptember 10 or September 23 Menodora, Metrodora, and Nymphodora (died c. AD 305–311) are virgin martyrs venerated by the Roman Catholic and Eastern Orthodox churches. According to tradition, the three women were sisters from Bithynia in...

 

Sporting event delegationSyria at the2015 World Aquatics ChampionshipsFlag of SyriaFINA codeSYRNational federationSyrian Arab Swimming and Aquatic Sports Federationin Kazan, RussiaCompetitors4 in 2 sportsMedals Gold 0 Silver 0 Bronze 0 Total 0 World Aquatics Championships appearances197319751978198219861991199419982001200320052007200920112013201520172019202220232024 Syria competed at the 2015 World Aquatics Championships in Kazan, Russia from 24 July to 9 August 2015. Open water swimming Main...

AHL ice hockey team Worcester SharksCityWorcester, MassachusettsLeagueAmerican Hockey League (AHL)ConferenceEastern ConferenceDivisionAtlantic DivisionFounded1996Operated2006–2015Home arenaDCU CenterColorsPacific teal, Black, White, Burnt Orange       Owner(s)San Jose Sports & Entertainment Enterprises (Hasso Plattner, Governor)MediaWorcester Telegram & GazetteWTAG AM 580 & FM 94.9Charter TV3AffiliatesSan Jose Sharks(2006–2015)Franchise history1996–2001Ke...

 

← Het Tet Yod → Fenisia Ibrani Aram Suryani Arab ט ܛ ط Alfabetturunan Yunani Latin Kiril Θ - Ѳ Representasi fonemik: tˤ Urutan dalam alfabet: 9 Nilai huruf/Gematria: 9 Tet (Ṭēth, juga Teth) adalah huruf ke-9 dalam banyak aksara Semit, termasuk abjad Fenisia, abjad Aram, abjad Ibrani Tet ט, abjad Suryani ܛ dan abjad Arab Ṭāʾ/Thoʾ ط; merupakan huruf ke-9 dalam urutan abjadi dan ke-16 dalam bahasa Arab modern. Nilai suaranya adalah /tˤ/, salah satu konsonan emfatik Semit. ...

 

French jet trainer aircraft CM.170 Magister A Magister of the Belgian Air Force Role Jet trainerType of aircraft National origin France Manufacturer Fouga, merged with Potez, merged with Sud-Aviation, merged with Aérospatiale First flight 23 July 1952 Introduction 1956 Status Retired; continues as civilian-owned warbirds Primary users French Air ForceIsraeli Air Force German Air Force Finnish Air Force Number built 929 total Air Fouga: 576 Heinkel-Messerschmitt: 194IAI: 36 Valmet: 62 Va...

Marine Fighter Attack Squadron 134VMFA-134 InsigniaActive1 March 1943 - 30 April 194615 April 1958 – 1 April 2007CountryUnited StatesAllegianceUnited States of AmericaBranchUnited States Marine CorpsTypeFighter/AttackRoleClose air supportAir interdictionAerial reconnaissancePart ofInactiveNickname(s)SmokeMotto(s)Smoke'em if you got'emTail CodeMFEngagementsWorld War IIOperation Iraqi FreedomAircraft flownAttackDouglas A-4 Skyhawk (1971-1983)BomberGrumman TBF Avenger (1943-46)FighterGru...

 

في نظرية الاحتمال، تُشكِّل مبرهنات النِّهاية المركزية أو نظرية الحد المركزي[1] (بالإنجليزية: Central limit theorem)‏ مجموعة نتائج لنظريّة الاحتمالات تنص أن مجموع عدة متغيرات عشوائية مستقلة و ومتشابهة التوزع، يميل إلى التوزع حسب توزيع احتمالي معين.[2][3][4] أهم هذه الم...

 

Period of Japanese history (1868–1912) Meiji era明治時代October 23, 1868 – July 30, 1912Emperor Meiji (1872)LocationJapanIncluding Meiji Constitution First Sino-Japanese War Eight-Nation Alliance Russo-Japanese War Monarch(s)MeijiKey eventsMeiji RestorationChronology Keiō Taishō Part of a series on theHistory of Japan ListPaleolithicbefore 14,000 BCJōmon14,000 – 1000 BCYayoi 1000 BC – 300 ADKofun 300 AD – 538 ADAsuka 538 – 710Nara 710 – 794Hei...

1973 Toyota Celica - liftback pertama di dunia - yang dalam hal ini adalah hatchback bergaya fastback.[1][2][3] Liftback adalah variasi dari hatchback dengan garis atap miring antara 45 hingga 5 derajat. Desain hatchback tradisional biasanya memiliki kemiringan 90 hingga 46 derajat pada bak truk atau pintu belakang. Jadi liftback pada dasarnya adalah hatchback dengan atap yang lebih landai, mirip dengan sedan/saloon. Beberapa liftback mungkin juga memiliki tampilan yan...

 

Referendum costituzionale in Croazia del 2013Stato Croazia Data1º dicembre 2013 TipoReferendum abrogativo Modifica costituzionale consistente nell'introdurre una disposizione che stabilisce che il matrimonio è contratto tra un uomo e una donna Sì    66,28% No    33,72% Affluenza37,90% Distribuzione del voto Il referendum costituzionale in Croazia del 2013 si è tenuto il 1º dicembre e aveva ad oggetto l'introduzione nella Costituzione di una previsione che stabi...

 

1985 single by Uncanny X-Men50 YearsSingle by Uncanny X-Menfrom the album 'Cos Life Hurts ReleasedMay 1985StudioPlatinum Studios, MelbourneGenrepop, Pop-rock, Soft rockLength4:06LabelMushroom RecordsSongwriter(s) Brian Mannix Ron Thiessen Producer(s) Red Pinko Sims Uncanny X-Men singles chronology The Party (1983) 50 Years (1985) Still Waiting (1985) 50 Years is a song by Australian Rock-pop group Uncanny X-Men. The song was released in May 1985 as the second single from the band's debut stu...

Presa y embalse de Nurek Vista de la presaUbicación geográficaContinente Asia CentralCuenca Río Amu DaryaCoordenadas 38°22′16″N 69°20′54″E / 38.37121, 69.34823Ubicación administrativaPaís  TayikistánDivisión Khatlon y Región bajo subordinación republicanaDatos generalesPropietario Barqi TojikObras 1961-80Inauguración 1972PresaNombre Presa de NurekTipo artificialAltura 304 mLong. de coronación 700 mCuerpo de aguaLongitud 70 kmSuperficie 98-106 km²Volu...

 

У этого термина существуют и другие значения, см. Кисловодск (значения). СтанцияКисловодскМинеральные Воды — КисловодскСеверо-Кавказская железная дорога 43°54′09″ с. ш. 42°43′14″ в. д.HGЯO Регион ж. д. Минераловодский Оператор РЖД Дата открытия 1894[1] Тип пассажир...

 

Head of government of Albania Prime Minister of of Republic of AlbaniaKryeministri i ShqipërisëIncumbentEdi Ramasince 11 September 2013StyleHis Excellency (diplomatic)TypeHead of governmentMember ofCouncilParliamentResidenceKryeministriaSeatTiranaAppointerPresidentwith Parliament confidenceTerm lengthFour years,renewableConstituting instrumentConstitutionInaugural holderIsmail QemaliFormation4 December 1912; 111 years ago (1912-12-04)DeputyDeputy Prime MinisterSalaryL...

Questa voce o sezione sull'argomento edizioni di competizioni calcistiche non cita le fonti necessarie o quelle presenti sono insufficienti. Puoi migliorare questa voce aggiungendo citazioni da fonti attendibili secondo le linee guida sull'uso delle fonti. Segui i suggerimenti del progetto di riferimento. Questa voce sull'argomento edizioni di competizioni calcistiche inglesi è solo un abbozzo. Contribuisci a migliorarla secondo le convenzioni di Wikipedia. La stagione 1968-1969 �...

 

In Old ArizonaPoster rilis teatrikalSutradaraIrving CummingsRaoul WalshProduserWinfield SheehanDitulis olehTom BarryPemeranWarner BaxterEdmund LoweDorothy BurgessSinematograferArthur EdesonAlfred HansenPenyuntingLouis R. LoefflerDistributorFox Film CorporationTanggal rilisPenayangan perdana: 25 Desember 1928 (1928-12-25) Perilisan umum:20 Januari 1929 (1929-01-20)Durasi95 menitNegaraAmerika SerikatBahasaInggrisPendapatankotor$1.3 juta[1] In Old Arizona adalah sebuah film Bar...

 

Part of a series on theCulture of Uganda History Early (pre-1894) Egyptian rule British rule (1894–1962) Early independence (1962–1971) Idi Amin (1971–1979) Uganda–Tanzania War Third Republic Uganda since 1986 People Languages folklore Cuisine Religion Music Media Radio Television Cinema Sport Monuments World Heritage Sites Symbols Flag Coat of arms National anthem Uganda portalvte The music of Uganda is broad and diverse, ranging from traditional indigenous music to Ugandan vers...

Si ce bandeau n'est plus pertinent, retirez-le. Cliquez ici pour en savoir plus. Cet article ne cite pas suffisamment ses sources (janvier 2016). Si vous disposez d'ouvrages ou d'articles de référence ou si vous connaissez des sites web de qualité traitant du thème abordé ici, merci de compléter l'article en donnant les références utiles à sa vérifiabilité et en les liant à la section « Notes et références ». En pratique : Quelles sources sont attendues ? C...

 

1986 1993 Élections législatives de 1988 dans le Bas-Rhin 9 sièges de députés à l'Assemblée nationale 5 et 12 juin 1988 Corps électoral et résultats Inscrits au 1er tour 618 313 Votants au 1er tour 384 434   62,17 %  14,8 Votes exprimés au 1er tour 384 434 Inscrits au 2d tour 401 072 Votants au 2d tour 249 332   62,17 % Votes exprimés au 2d tour 241 889 Union du Rassemblement et du Centre Liste Rassemblement pour la Répub...