1 / 15

Chapter 12

Chapter 12 . Security Seals and Printing. Security Printing. Money Primary or first level inspection Secondary or Second level inspection Tertiary or Third Level inspection Need to study more closely what causes a person to recognize forged note Kind of like the HCI of preventing forgeries

hei
Download Presentation

Chapter 12

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 12 Security Seals and Printing

  2. Security Printing • Money • Primary or first level inspection • Secondary or Second level inspection • Tertiary or Third Level inspection • Need to study more closely what causes a person to recognize forged note • Kind of like the HCI of preventing forgeries • Security usability

  3. Techniques pages 246 - 247 • Intaglio • Letterpress • Simultan presses • Rubber stamps • Embossing and laminates • Watermarks

  4. Modern Techniques • Optically variable inks • Inks with magnetic or photoacoustic properties • Printing features requiring special equipment to see • Metal threads and foils • Screen traps • Digital copy marks • Unique stock

  5. Technology moves forward • What is expensive and difficult to do today will not be tomorrow • Copying big issue • Check fraud • Alterations • Credit cards • Travel documents

  6. Packaging and Seals • Print on substrate glue to package • Substrate properties • Can use the properties of the substrate to mark and make unique • Problems of glue • You can typically cut the glue and remove seal intact.

  7. Vulnerabilities • Wristband seal • Enemy is customer • Customer applies seal • Seal re-use indistinguishable from failure • Seals can be bought in marketplace • Counterfeit seals can be manufactured • Effective inspection is infeasible

  8. Issues • Peculiarities of threat model • Staff diligence • Random failure • Materials Control • Not protecting the right thing • Cost and Nature of inspection

  9. Evaluation Methodology • How long has the system been used • How widely available are the sealing materials • Will person applying seal be careless or corrupt • Does seal protect right part of product • What are quality issues • Who will spot forged seals • Are the evidential issues • How will seals be disposed of

  10. Discussion articles • Techniques used to protect new US currency especially tactics to spot forgeries at first level • New techniques to prevent check fraud

  11. Past Articles • Site for the treasury’s prevention of counterfeit bills: • http://www.treasury.gov/usss/money_technologies.shtml • They should have stuck to the 1 and 5 dollar counterfeits: • http://www.heraldnet.com/stories/06/02/22/100loc_b4briefs001.cfm • Meter Security • http://www.metering.com/archive/014/25_1.htm • Minimizing Fraud • http://uaelp.pennnet.com/articles/article_display.cfm?article_id=239315 • This is a 5 page PDF about the possibility of this security model making it out in the world, as well as a few examples. • http://csdl2.computer.org/comp/mags/co/2002/04/r4s22.pdf • This is a general overview of bluetooth security, and how it can be used to implement the "Duckling". • http://www.niksula.cs.hut.fi/~jiitv/bluesec.html • Wow check fraud is simple.. • http://msnbc.msn.com/id/7914159/ • http://qchex.com/ • Laser printing fingerprints – • http://www.pcworld.com/news/article/0,aid,118189,00.asp

  12. Nice article on de-incentive to catch • Wal-Mart fruad • http://www.eweek.com/article2/0,1895,1748499,00.asp • How they were caught, what they did: • http://www.eweek.com/article2/0,1895,1748274,00.asp

  13. List of Resources • Counterfeiting • http://www.treasury.gov/usss/money_technologies.shtml • Usable Security • http://usablesecurity.com/

  14. List of Resources • Secure printing • http://www.art.eku.edu/programs/print/tech/colorIntaglio.html • http://www.polestarltd.com/ttg/ttgdetail.html • http://www.sekuworks.com/ • http://dmoz.org/Business/Publishing_and_Printing/Printing/Products/Security/

  15. List of resources • Seals and packaging • http://www.stoffel.com/ • http://www.americancasting.com/ • Walmart scam • http://www.eweek.com/article2/0,1895,1748499,00.asp • http://www.eweek.com/article2/0,1895,1748274,00.asp

More Related