The first task is to establish a customer-specific threat profile.
This should be based on known threats.
Just as important is good collaboration at the security design stage between the customer and supplier.
Above all else this should ensure that the new passport is protected properly against the five main threats.
is the complete reproduction of the document.
This can involve:
Using substitute materials to imitate original documents (paper, polycarbonate)
Scanning a valid document for modification using computer software
Reproduction of background and logos using alternative printing technologies
Final lamination using commercial laminates
Re-creating the document using computer software
Using original material that may be commercially available
is where fraudsters try to change the data in a genuine document.
Typically this includes:
Photo alteration or substitution
Alteration of the biographical data, in the visual or machine readable zone (MRZ)
Deletion of entries on visa/observations pages
Mechanical and chemical erasure of biographical data
Alteration of the personalization data on the data page.
For example, additional marking on top of the existing personalization data, or the application of a thin foil overlay to alter it.
In this case, we're afraid, recycling isn't a good thing.
It involves the creation of fraudulent documents, using material from legitimate documents, and the removal and substitution of entire pages or visas.
How will the fraudsters do this fake passport?
Removing security features from a genuine document for reuse in a falsified one
Using "recycled" genuine passport security features in a new falsification
Interchanging pages between one passport and another
#4 Stolen Passport or ID
This is the theft of an original, genuine blank document. It could take place at any stage of the passport life cycle, from manufacture right through to the point of personalization - during transit or in storage. Fraudulent passports in that case can be very hard to detect because they are genuine documents.
It's obvious, but needs stressing...... the integrity of manufacturing, transportation, storage and accounting of blank documents is critical to the entire security chain.
Using a combination of advanced technologies for personalization forces fraudsters to try and master them all.
To ensure reliable tracking, we recommend numbering all travel documents at the end of the manufacturing process.
Reporting is also key. Interpol shares data on 250,000 stolen or lost Syrian and Iraqi passports, including blank documents.
#5 Genuine document belonging someone else
Examples of this include:
An unauthorized person using a valid genuine passport
Use of registered lost or stolen documents by look-alikes of the real holder
Cloning logical data from a similar looking person
It might appear difficult to address these threats at the document level.
However, the danger of a stolen passport can be minimized by using a high quality personalization technology to additional personalized elements including the repeated occurrence of the holder's portraitin several places in the document.
And don't forget the core benefit of an ePassport.
This allows the identity of the holder to be compared with his/her biometric data (such as finger prints and facial image), as stored in the microcontroller, and the convenient use of databases such as Interpol 's Stolen and Lost Travel Documents database.