Identity document forgery is the process by which
identity document
An identity document (abbreviated as ID) is a documentation, document proving a person's Identity (social science), identity.
If the identity document is a plastic card it is called an ''identity card'' (abbreviated as ''IC'' or ''ID card''). ...
s issued by governing bodies are illegally copied and/or modified by persons not authorized to create such documents or engage in such modifications, for the purpose of deceiving those who would view the documents about the identity or status of the bearer. The term also encompasses the activity of acquiring identity documents from legitimate bodies by falsifying the required supporting documentation in order to create the desired identity.
Identity documents differ from other credentials in that they are intended to be usable by only the person holding the card. Unlike other credentials, they may be used to restrict the activities of the holder as well as to expand them.
Documents that have been forged in this way include
driver's license
A driver's license, driving licence, or driving permit is a legal authorization, or the official document confirming such an authorization, for a specific individual to operate one or more types of motorized vehicles—such as motorcycles, ca ...
s (historically forged or altered as an attempt to conceal the fact that persons desiring to purchase
alcohol
Alcohol may refer to:
Common uses
* Alcohol (chemistry), a class of compounds
* Ethanol, one of several alcohols, commonly known as alcohol in everyday life
** Alcohol (drug), intoxicant found in alcoholic beverages
** Alcoholic beverage, an alco ...
are under the
legal drinking age
The legal drinking age is the minimum age at which a person can legally consume alcoholic beverages. The minimum age alcohol can be legally consumed can be different from the age when it can be purchased in some countries. These laws vary betwe ...
);
birth certificate
A birth certificate is a vital record that documents the Childbirth, birth of a person. The term "birth certificate" can refer to either the original document certifying the circumstances of the birth or to a certified copy of or representation ...
s and
Social Security
Welfare spending is a type of government support intended to ensure that members of a society can meet basic human needs such as food and shelter. Social security may either be synonymous with welfare, or refer specifically to social insurance ...
cards (likely used in
identity theft
Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. ...
schemes or to
defraud
In law, fraud is intent (law), intentional deception to deprive a victim of a legal right or to gain from a victim unlawfully or unfairly. Fraud can violate Civil law (common law), civil law (e.g., a fraud victim may sue the fraud perpetrato ...
the government); and
passport
A passport is an official travel document issued by a government that certifies a person's identity and nationality for international travel. A passport allows its bearer to enter and temporarily reside in a foreign country, access local aid ...
s (used to evade restrictions on entry into a particular country). At the beginning of 2010, there were 11 million stolen or lost passports listed in the global database of
Interpol
The International Criminal Police Organization – INTERPOL (abbreviated as ICPO–INTERPOL), commonly known as Interpol ( , ; stylized in allcaps), is an international organization that facilitates worldwide police cooperation and crime cont ...
.
Such falsified documents can be used for identity theft, age deception,
illegal immigration
Illegal immigration is the migration of people into a country in violation of that country's immigration laws, or the continuous residence in a country without the legal right to do so. Illegal immigration tends to be financially upward, wi ...
,
organized crime
Organized crime is a category of transnational organized crime, transnational, national, or local group of centralized enterprises run to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a f ...
, and
espionage
Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information ( intelligence). A person who commits espionage on a mission-specific contract is called an ...
.
Use scenarios, forgery techniques and security countermeasures
A distinction needs to be made between the different uses of an identity document. In some cases, the fake ID may only have to pass a cursory inspection, such as flashing a plastic ID card for a security guard. At the other extreme, a document may have to resist scrutiny by a trained document examiner, who may be equipped with technical tools for verifying
biometrics
Biometrics are body measurements and calculations related to human characteristics and features. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used t ...
and reading hidden security features within the card. To make forgery more difficult, most modern IDs contain numerous security features that require specialised and expensive equipment to duplicate. School IDs are typically easier to fake, as they often do not have the same level of security measures as government-issued IDs.
Fake ID cards can be ordered on the internet and some examples of these include the UK national identification card and a provisional motorcycle licence. There are a number of different types of false documents such as using another person's ID, a genuine document which has been altered, a form of ID that doesn't exist and a copy of an ID which has been made.
Modern fake ID cards almost invariably carry a picture of the authorized user, a simple and effective form of biometric identification. However, forgery of basic photographic ID cards has become simple in recent years with the availability of low-cost high-resolution printers, scanners and photo-editing software. Basic fake ID cards are commonly made using an inkjet or laser printer to print a replica document which is then laminated to resemble a real ID card. Most designs are made using computer programs, re-creating scanned copies of a license.
More complex ID cards are now being created by printing on a material called
Teslin or Artisyn, which are paper-like materials that are actually micro-porous plastic sheets. When butterfly pouches and
holograms are applied, the card is then run through a heat laminator, creating a professional-looking ID card.
Numerous
security printing
Security printing is the field of the printing industry that deals with the printing of items such as banknotes, cheques, passports, tamper-evident labels, security tapes, product authentication, stock certificates, postage stamps, and identity c ...
techniques have been used to attempt to enhance the security of ID cards. For example, many modern documents include holograms, which are difficult to replicate without expensive equipment not generally available. Though accurate recreation of these holograms is extremely difficult, using a mixture of pigments and base can create a similar shiny multi-colored look that may pass cursory inspection. Another form of document security is UV-light visible ink.
In addition, some documents include a
magnetic strip
The term digital card can refer to a physical item, such as a memory card on a camera, or, increasingly since 2017, to the digital content hosted
as a virtual card or cloud card, as a digital virtual representation of a physical card. They shar ...
, which contains the similar information to that printed on the card. The data may thus be checked against other data on the card, such as printed information or a machine-readable
barcode
A barcode or bar code is a method of representing data in a visual, Machine-readable data, machine-readable form. Initially, barcodes represented data by varying the widths, spacings and sizes of parallel lines. These barcodes, now commonly ref ...
. Magnetic strips may also contain other secret identifying information. Although magnetic strips can also be faked, they provide another barrier to entry for the amateur forger. Other hidden security devices can also be added, including embedded secure cryptoprocessor chips which are designed to be very difficult to forge, and
RFID
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder called a tag, a radio receiver, and a transmitter. When tri ...
tags — the two technologies may also be combined, in the case of contactless smart cards.
Another effective technique is the use of online verification of security information against a central database. In many cases, online verification can detect simple copying of a document by detecting attempted use in multiple places at the same time, or completely false IDs, as the information on the ID will be found to be invalid. A simple method of confirming that an ID is genuine is to print a serial number on it unique to the card and stored on a centralized database. If checked, it will quickly become clear that the ID is false; either the number on the ID is not registered for the holder, or no ID has the number at all. Online verification also has the advantage that it allows easy revocation of lost or stolen documents.
Using
digital signatures is another effective method of detecting ID forgery. The ID can include a copy of its data on an
integrated circuit
An integrated circuit (IC), also known as a microchip or simply chip, is a set of electronic circuits, consisting of various electronic components (such as transistors, resistors, and capacitors) and their interconnections. These components a ...
or barcode, digitally signed by the document issuer. The digital signature allows for easy authentication of the ID. If the digital signature of a fake ID is checked, it will immediately become evident that the ID is fake, because either the digitally signed copy of the holder's data does not match the data printed on the ID or the (possibly altered) copy of the ID's data is not signed by the document issuer. The effectiveness of this security feature depends on the document issuer keeping the
private key
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
used to sign IDs secret,
as well as the strength of the cryptographic algorithm used for the ID's digital signature.
Many modern credentials now contain some kind of barcode. For example, many U.S. driving licences include a 2-dimensional code in
PDF417
PDF417 is a stacked linear barcode format used in a variety of applications such as transport, identification cards, and inventory management. "PDF" stands for ''Portable Data File'', while "417" signifies that each pattern in the code consis ...
format, which contains the same information as on the front of the license. Barcodes allow rapid checking of credentials for low-security applications, and may potentially contain extra information which can be used to verify other information on the card.
Systemic attacks
The combination of multiple high-security features, biometrics, and well-trained document inspectors with technical assistance can be very effective at preventing forged documents from being easily produced. Instead of acquiring the expensive specialized equipment needed to make fake documents, it may be more economical to produce a "genuine fake" — a legitimate document, but one which contains false information.
One way of doing this is to present the document issuing authority with false credentials, which they will then endorse by issuing a new document. In this way, false identities and credentials can be "bootstrapped" over a period of time.
Another simpler way of generating false credentials is to suborn one of the officials involved in the document-issuing process through bribery or intimidation. This may also be combined with the bootstrapping process mentioned above to mount complex attacks.
Corruption in the document-issuing process is hard to counter, since as the value of a credential increases, the economic incentives for corruption also increase. This is particularly true in the case of fake ID cards that combine many functions in one document, and for documents which are issued in large numbers, thus requiring many thousands of people to have authorizing powers, thus creating a longer chain of people who can possibly be exploited. Detection of a "genuine fake" document is also a difficult process; as such a fake is a legitimate document, it will pass any tests for forgery. To detect such fakes, it is necessary to perform a
background check
A background check is a process used by an organisation or person to verify that an individual is who they claim to be, and check their past record to confirm education, employment history, and other activities, and for a criminal record. The fr ...
on the individual in question to confirm the legitimacy of the document's information.
See also
*
ID card printer
A printer is a peripheral machine which makes a durable representation of graphics or text, usually on paper. While most output is human-readable, bar code printers are an example of an expanded use for printers. Different types of printer ...
*
Outline of forgery
The following outline is provided as an overview and topical guide to forgery:
Forgery – process of making, adapting, or imitating objects, statistics, or documents with the intent to deceive.
Types of forgery
* Archaeological forgery
* A ...
References
{{Authority control
Security engineering
Document forgery