Upload
hei
View
26
Download
0
Embed Size (px)
DESCRIPTION
Chapter 12. Security Seals and Printing. Security Printing. Money Primary or first level inspection Secondary or Second level inspection Tertiary or Third Level inspection Need to study more closely what causes a person to recognize forged note Kind of like the HCI of preventing forgeries - PowerPoint PPT Presentation
Citation preview
Chapter 12
Security Seals and Printing
Security Printing
MoneyPrimary or first level inspectionSecondary or Second level inspectionTertiary or Third Level inspection
Need to study more closely what causes a person to recognize forged noteKind of like the HCI of preventing forgeriesSecurity usability
Techniques pages 246 - 247
IntaglioLetterpressSimultan pressesRubber stampsEmbossing and laminatesWatermarks
Modern Techniques
Optically variable inks Inks with magnetic or photoacoustic properties Printing features requiring special equipment
to see Metal threads and foils Screen traps Digital copy marks Unique stock
Technology moves forward
What is expensive and difficult to do today will not be tomorrow
Copying big issueCheck fraud
AlterationsCredit cardsTravel documents
Packaging and Seals
Print on substrate glue to packageSubstrate properties
Can use the properties of the substrate to mark and make unique
Problems of glueYou can typically cut the glue and remove
seal intact.
Vulnerabilities
Wristband sealEnemy is customerCustomer applies sealSeal re-use indistinguishable from failureSeals can be bought in marketplaceCounterfeit seals can be manufacturedEffective inspection is infeasible
Issues
Peculiarities of threat modelStaff diligenceRandom failureMaterials ControlNot protecting the right thingCost and Nature of inspection
Evaluation Methodology
How long has the system been used How widely available are the sealing materials Will person applying seal be careless or
corrupt Does seal protect right part of product What are quality issues Who will spot forged seals Are the evidential issues How will seals be disposed of
Discussion articles
Techniques used to protect new US currency especially tactics to spot forgeries at first level
New techniques to prevent check fraud
Past Articles
Site for the treasury’s prevention of counterfeit bills: http://www.treasury.gov/usss/money_technologies.shtml
They should have stuck to the 1 and 5 dollar counterfeits: http://www.heraldnet.com/stories/06/02/22/100loc_b4briefs001.cfm
Meter Security http://www.metering.com/archive/014/25_1.htm
Minimizing Fraud http://uaelp.pennnet.com/articles/article_display.cfm?article_id=239315
This is a 5 page PDF about the possibility of this security model making it out in the world, as well as a few examples.
http://csdl2.computer.org/comp/mags/co/2002/04/r4s22.pdf This is a general overview of bluetooth security, and how it can be used to implement the
"Duckling". http://www.niksula.cs.hut.fi/~jiitv/bluesec.html
Wow check fraud is simple.. http://msnbc.msn.com/id/7914159/ http://qchex.com/
Laser printing fingerprints – http://www.pcworld.com/news/article/0,aid,118189,00.asp
Nice article on de-incentive to catch
Wal-Mart fruad http://www.eweek.com/article2/0,1895,1748499,00.asp How they were caught, what they did: http://www.eweek.com/article2/0,1895,1748274,00.asp
List of Resources
Counterfeitinghttp://www.treasury.gov/usss/money_techno
logies.shtmlUsable Security
http://usablesecurity.com/
List of Resources
Secure printinghttp://www.art.eku.edu/programs/print/tech/c
olorIntaglio.htmlhttp://www.polestarltd.com/ttg/ttgdetail.htmlhttp://www.sekuworks.com/http://dmoz.org/Business/
Publishing_and_Printing/Printing/Products/Security/
List of resources
Seals and packaginghttp://www.stoffel.com/http://www.americancasting.com/
Walmart scamhttp://www.eweek.com/
article2/0,1895,1748499,00.asphttp://www.eweek.com/
article2/0,1895,1748274,00.asp