Knowledge (XXG)

Identity document forgery

Source 📝

146: 234: 300:
the ID will be found to be invalid. A simple method of confirming that an ID is genuine is to print a serial number on it unique to the card and stored on a centralized database. If checked, it will quickly become clear that the ID is false; either the number on the ID is not registered for the holder, or no ID has the number at all. Online verification also has the advantage that it allows easy revocation of lost or stolen documents.
49: 345:
large numbers, thus requiring many thousands of people to have authorizing powers, thus creating a longer chain of people who can possibly be exploited. Detection of a "genuine fake" document is also a difficult process; as such a fake is a legitimate document, it will pass any tests for forgery. To detect such fakes, it is necessary to perform a
292:. Magnetic strips may also contain other secret identifying information. Although magnetic strips can also be faked, they provide another barrier to entry for the amateur forger. Other hidden security devices can also be added, including embedded secure cryptoprocessor chips which are designed to be very difficult to forge, and 257:
Fake ID cards can be ordered on the internet and some examples of these include the UK national identification card and a provisional motorcycle licence. There are a number of different types of false documents such as using another person's ID, a genuine document which has been altered, a form of ID
344:
Corruption in the document-issuing process is hard to counter, since as the value of a credential increases, the economic incentives for corruption also increase. This is particularly true in the case of fake ID cards that combine many functions in one document, and for documents which are issued in
311:
or barcode, digitally signed by the document issuer. The digital signature allows for easy authentication of the ID. If the digital signature of a fake ID is checked, it will immediately become evident that the ID is fake, because either the digitally signed copy of the holder's data does not match
299:
Another effective technique is the use of online verification of security information against a central database. In many cases, online verification can detect simple copying of a document by detecting attempted use in multiple places at the same time, or completely false IDs, as the information on
280:
techniques have been used to attempt to enhance the security of ID cards. For example, many modern documents include holograms, which are difficult to replicate without expensive equipment not generally available. Though accurate recreation of these holograms is extremely difficult, using a mixture
332:
The combination of multiple high-security features, biometrics, and well-trained document inspectors with technical assistance can be very effective at preventing forged documents from being easily produced. Instead of acquiring the expensive specialized equipment needed to make fake documents, it
166:
issued by governing bodies are illegally copied and/or modified by persons not authorized to create such documents or engage in such modifications, for the purpose of deceiving those who would view the documents about the identity or status of the bearer. The term also encompasses the activity of
253:
and reading hidden security features within the card. To make forgery more difficult, most modern IDs contain numerous security features that require specialised and expensive equipment to duplicate. School IDs are typically easier to fake, as they often do not have the same level of security
248:
A distinction needs to be made between the different uses of an identity document. In some cases, the fake ID may only have to pass a cursory inspection, such as flashing a plastic ID card for a security guard. At the other extreme, a document may have to resist scrutiny by a trained document
261:
Modern fake ID cards almost invariably carry a picture of the authorized user, a simple and effective form of biometric identification. However, forgery of basic photographic ID cards has become simple in recent years with the availability of low-cost high-resolution printers, scanners and
262:
photo-editing software. Basic fake ID cards are commonly made using an inkjet or laser printer to print a replica document which is then laminated to resemble a real ID card. Most designs are made using computer programs, re-creating scanned copies of a license.
340:
Another simpler way of generating false credentials is to suborn one of the officials involved in the document-issuing process through bribery or intimidation. This may also be combined with the bootstrapping process mentioned above to mount complex attacks.
323:
format, which contains the same information as on the front of the license. Barcodes allow rapid checking of credentials for low-security applications, and may potentially contain extra information which can be used to verify other information on the card.
336:
One way of doing this is to present the document issuing authority with false credentials, which they will then endorse by issuing a new document. In this way, false identities and credentials can be "bootstrapped" over a period of time.
170:
Identity documents differ from other credentials in that they are intended to be usable by only the person holding the card. Unlike other credentials, they may be used to restrict the activities of the holder as well as to expand them.
383:
Buchanan, James D. R.; Cowburn, Russell P.; Jausovec, Ana-Vanessa; Petit, Dorothée; Seem, Peter; Xiong, Gang; Atkinson, Del; Fenton, Kate; Allwood, Dan A.; Bryan, Matthew T. (2005). "'Fingerprinting' documents and packaging".
312:
the data printed on the ID or the (possibly altered) copy of the ID's data is not signed by the document issuer. The effectiveness of this security feature depends on the document issuer keeping the
288:, which contains the similar information to that printed on the card. The data may thus be checked against other data on the card, such as printed information or a machine-readable 206:(used to evade restrictions on entry into a particular country). At the beginning of 2010, there were 11 million stolen or lost passports listed in the global database of 600: 462: 281:
of pigments and base can create a similar shiny multi-colored look that may pass cursory inspection. Another form of document security is UV-light visible ink.
562: 66: 145: 167:
acquiring identity documents from legitimate bodies by falsifying the required supporting documentation in order to create the desired identity.
113: 85: 446: 132: 319:
Many modern credentials now contain some kind of barcode. For example, many U.S. driving licences include a 2-dimensional code in
92: 233: 191: 436: 293: 70: 99: 653: 333:
may be more economical to produce a "genuine fake"⁠ ⁠—⁠ ⁠a legitimate document, but one which contains false information.
537: 470: 81: 316:
used to sign IDs secret, as well as the strength of the cryptographic algorithm used for the ID's digital signature.
269:
or Artisyn, which are paper-like materials that are actually micro-porous plastic sheets. When butterfly pouches and
59: 658: 622: 592: 106: 285: 273:
are applied, the card is then run through a heat laminator, creating a professional-looking ID card.
178:(historically forged or altered as an attempt to conceal the fact that persons desiring to purchase 214: 175: 519: 417: 363: 308: 307:
is another effective method of detecting ID forgery. The ID can include a copy of its data on an
304: 183: 179: 511: 442: 409: 401: 296:
tags⁠ ⁠—⁠ ⁠the two technologies may also be combined, in the case of contactless smart cards.
277: 266: 241: 237: 187: 163: 503: 393: 346: 35: 438:
Playing the Identity Card: Surveillance, Security and Identification in Global Perspective
358: 218: 349:
on the individual in question to confirm the legitimacy of the document's information.
195: 31: 647: 17: 570: 421: 149: 313: 48: 270: 250: 515: 405: 265:
More complex ID cards are now being created by printing on a material called
222: 413: 207: 203: 213:
Such falsified documents can be used for identity theft, age deception,
523: 289: 199: 152: 320: 507: 397: 232: 144: 494:
Turner, J. W. Cecil (1946). ""Documents" in the Law of Forgery".
249:
examiner, who may be equipped with technical tools for verifying
258:
that doesn't exist and a copy of an ID which has been made.
229:
Use scenarios, forgery techniques and security countermeasures
42: 563:"Levels of identity security and groups of secure features" 463:"11 million stolen or lost passports in Interpol database" 174:
Documents that have been forged in this way include
73:. Unsourced material may be challenged and removed. 30:"Fake ID" redirects here. For the 2003 film, see 601:Cybersecurity and Infrastructure Security Agency 623:"Journalisten Rambam niet vervolgd voor fraude" 8: 155:employee checking an alleged fake document. 435:Bennett, Colin John; Lyon, David (2008). 133:Learn how and when to remove this message 375: 284:In addition, some documents include a 7: 489: 487: 71:adding citations to reliable sources 254:measures as government-issued IDs. 240:'s fake service card with the name 593:"Understanding Digital Signatures" 25: 47: 34:. For the Joyce Manor song, see 538:"Driver's License Verification" 58:needs additional citations for 1: 27:Fake IDs and their production 82:"Identity document forgery" 675: 29: 160:Identity document forgery 467:Havocscope Black Markets 162:is the process by which 629:(in Dutch). 2013-06-13 245: 194:cards (likely used in 156: 236: 202:the government); and 148: 654:Security engineering 67:improve this article 18:False identification 496:Virginia Law Review 215:illegal immigration 364:Outline of forgery 309:integrated circuit 305:digital signatures 246: 188:birth certificates 184:legal drinking age 164:identity documents 157: 603:. 1 February 2021 278:security printing 238:Lee Harvey Oswald 176:driver's licenses 143: 142: 135: 117: 16:(Redirected from 666: 659:Document forgery 638: 637: 635: 634: 619: 613: 612: 610: 608: 589: 583: 582: 580: 578: 559: 553: 552: 550: 549: 542:www.e-verify.gov 534: 528: 527: 491: 482: 481: 479: 478: 469:. Archived from 459: 453: 452: 432: 426: 425: 380: 347:background check 328:Systemic attacks 138: 131: 127: 124: 118: 116: 75: 51: 43: 36:Fake I.D. (song) 21: 674: 673: 669: 668: 667: 665: 664: 663: 644: 643: 642: 641: 632: 630: 621: 620: 616: 606: 604: 591: 590: 586: 576: 574: 567:thalesgroup.com 561: 560: 556: 547: 545: 536: 535: 531: 508:10.2307/1068683 493: 492: 485: 476: 474: 461: 460: 456: 449: 434: 433: 429: 398:10.1038/436475a 382: 381: 377: 372: 359:ID card printer 355: 330: 231: 219:organized crime 192:Social Security 139: 128: 122: 119: 76: 74: 64: 52: 39: 28: 23: 22: 15: 12: 11: 5: 672: 670: 662: 661: 656: 646: 645: 640: 639: 614: 584: 554: 529: 502:(5): 939–954. 483: 454: 447: 427: 374: 373: 371: 368: 367: 366: 361: 354: 351: 329: 326: 286:magnetic strip 230: 227: 198:schemes or to 196:identity theft 182:are under the 141: 140: 123:September 2019 55: 53: 46: 32:Fake ID (film) 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 671: 660: 657: 655: 652: 651: 649: 628: 624: 618: 615: 602: 598: 594: 588: 585: 572: 568: 564: 558: 555: 543: 539: 533: 530: 525: 521: 517: 513: 509: 505: 501: 497: 490: 488: 484: 473:on 2010-02-03 472: 468: 464: 458: 455: 450: 448:9780415465632 444: 441:. Routledge. 440: 439: 431: 428: 423: 419: 415: 411: 407: 403: 399: 395: 392:(7050): 475. 391: 387: 379: 376: 369: 365: 362: 360: 357: 356: 352: 350: 348: 342: 338: 334: 327: 325: 322: 317: 315: 310: 306: 301: 297: 295: 291: 287: 282: 279: 274: 272: 268: 263: 259: 255: 252: 243: 239: 235: 228: 226: 224: 220: 216: 211: 209: 205: 201: 197: 193: 189: 185: 181: 177: 172: 168: 165: 161: 154: 151: 147: 137: 134: 126: 115: 112: 108: 105: 101: 98: 94: 91: 87: 84: –  83: 79: 78:Find sources: 72: 68: 62: 61: 56:This article 54: 50: 45: 44: 41: 37: 33: 19: 631:. Retrieved 626: 617: 605:. Retrieved 596: 587: 575:. Retrieved 571:Thales Group 566: 557: 546:. Retrieved 544:. March 2019 541: 532: 499: 495: 475:. Retrieved 471:the original 466: 457: 437: 430: 389: 385: 378: 343: 339: 335: 331: 318: 302: 298: 283: 275: 264: 260: 256: 247: 212: 173: 169: 159: 158: 129: 120: 110: 103: 96: 89: 77: 65:Please help 60:verification 57: 40: 314:private key 150:West German 648:Categories 633:2023-04-26 548:2020-02-23 477:2010-12-06 370:References 251:biometrics 93:newspapers 516:0042-6601 406:1476-4687 276:Numerous 271:holograms 223:espionage 204:passports 597:cisa.gov 414:16049465 353:See also 208:Interpol 524:1068683 422:4164867 290:barcode 200:defraud 180:alcohol 153:customs 107:scholar 607:6 June 577:6 June 573:. 2022 522:  514:  445:  420:  412:  404:  386:Nature 321:PDF417 303:Using 267:Teslin 242:Hidell 221:, and 109:  102:  95:  88:  80:  520:JSTOR 418:S2CID 114:JSTOR 100:books 609:2023 579:2023 512:ISSN 443:ISBN 410:PMID 402:ISSN 294:RFID 190:and 86:news 504:doi 394:doi 390:436 186:); 69:by 650:: 627:NU 625:. 599:. 595:. 569:. 565:. 540:. 518:. 510:. 500:32 498:. 486:^ 465:. 416:. 408:. 400:. 388:. 225:. 217:, 210:. 636:. 611:. 581:. 551:. 526:. 506:: 480:. 451:. 424:. 396:: 244:. 136:) 130:( 125:) 121:( 111:· 104:· 97:· 90:· 63:. 38:. 20:)

Index

False identification
Fake ID (film)
Fake I.D. (song)

verification
improve this article
adding citations to reliable sources
"Identity document forgery"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message

West German
customs
identity documents
driver's licenses
alcohol
legal drinking age
birth certificates
Social Security
identity theft
defraud
passports
Interpol
illegal immigration
organized crime
espionage

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.