Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Fake IDs, Real Risks

By Diane Ritchey
September 1, 2009
With ISA’s CCSS software, a visitor to a school enters his name and other information, then clicks a button to have his photo take and receive a visitor’s badge. The system can also automatically check out people, especially frequent visitors like mentors, at a predetermined time if they have forgotten to do so.


The business of fake identification cards has – thanks to the Internet, federal employment mandates and homeland security needs – taken on a new identity.
     
Anyone with a credit card, shipping address and PayPal can load up a shopping cart icon with new and used card printers, software, supplies, state driver’s license templates and even holograms. While some Web-based vendors call them novelty IDs, with tongue firmly in cheek, other fake ID sellers are more literal: “No one can touch the quality of our fake IDs!” one site says.
     
But for government, military and businesses seeking tamper-resistant identification cards and badges, the fake ID underground is no laughing matter.
     
There’s also an inherent underground fake ID business at some U.S. colleges and universities. New Hampshire’s State Liquor Enforcement Investigator Brandon Neudecker knows the challenge. Last month, Neudecker was presented the National Liquor Law Enforcement Association’s Liquor Law Enforcement Agent of the Year Award at the organization’s annual conference in Dallas. He was honored for busting three fake ID operations. Not surprisingly, two of the ID mills operated at the University of New Hampshire.
     
Another case under investigation involves hundreds of fake IDs as well as cooperation with the U.S. Attorney’s Office and the U.S. Secret Service.
     
The stakes get higher when it comes to fraudulent IDs and identity documents for employment verification.
     
It was the topic recently of the Immigration, Refugees and Border Security Subcommittee of the Senate Judiciary Committee. Its chairman, Senator Charles Schumer, said, “In the past, our employment verification laws had placed employers between a rock and a hard place. Employers had been required to make subjective determinations about identity documents provided by employees in order to determine whether the employee is legally able to work in the United States.
     
“Employers who accept all credible documents in good faith may still be targeted by U.S. Immigration and Customs Enforcement for turning a blind eye towards illegal immigrants in their workplace,” Schumer said. “Furthermore, when employers have to make on-the-spot subjective decisions about who is qualified to work and who is not, they can face potential lawsuits from employees who are actually U.S. citizens but who were wrongfully profiled as illegal immigrants.”
     
The committee and Congress are looking for a new system that relies upon non-forgeable identification. And many Senators, on both sides of the aisle, are not friendly with E-Verify. See the March 2009 issue of Security magazine for more on E-Verify.
     
Schumer said, “It’s an example of a half-hearted and flawed system. Under the current E-Verify system, an employer merely verifies whether the name, date of birth, Social Security number, and citizenship status given by a potential employee match the exact same information contained in the Social Security Administration’s database along with other government databases.” Instead, what’s needed is a specific and unique biometric identifier…a fingerprint, an enhanced biometric picture, or other mechanism.
     
Ordinary thieves are getting a leg up on their petty theft colleagues with computer and Web-enabled fake ID and document creation tools.
     
For example, a man in Florida allegedly used his home computer and high-grade printers to create fake checks, according to the Florida Department of Law Enforcement. He also produced fake Florida driver’s licenses and business ID cards. He or a helper would put two-and-two fakes together – a bad check tied to a phony ID – and cash out at Publix, Wal-Mart or a local bank.
     
Ironically, investigators are using photo IDs off the forged IDs to track down the forger’s helpers.
     
While it is estimated that he made about $300,000 before getting caught, other fake ID episodes can be life or death situations.
     
A case in point is the use of state driver’s licenses and passports to go through airport security to board a plane. Based on recommendations of the 9/11 Commission, legislation established the Real ID program to increase security and standardize state-issued IDs. Real ID, still to be implemented, is under attack in some states and by some members of Congress. But Stewart Baker, former assistant secretary in the Department of Homeland Security, supports Real ID and recently testified that “for terrorists, travel documents are as important as weapons. The federal government should set standards for the issuance of birth certificates and sources of identification, such as driver’s licenses.”
     
A recent incident spotlighted the trouble with identification cards when a woman and her daughter allegedly managed to pass TSA and security checkpoints using someone else’s ID. The incident turned out to be a faked kidnapping but “it could have been a lot worse than that, if the person using the fake ID went on the plane to cause harm to people. It could have been a much more disastrous result,” said U.S. Congressman Rob Andrews.
     
No matter the type of ID forgery or theft, it’s apparent that the business of fake IDs is getting more sophisticated. Investigators from the California Department of Motor Vehicles recently busted a counterfeiting operation and seized professional card printers, laminators, fraudulent California state seals, fraudulent DMV logos, laminating sheets, card stocks, phony California and Texas driver’s licenses, computers, ledgers and other evidence of document manufacturing equipment.
     
However, technology is catching up. There are devices that read and verify the validity of all types of state driver’s licenses, military IDs and U.S. passports. Much of such advantages are emerging from government and military needs.
     
For example, the Intellicheck Mobilisa Defense ID system is a mobile, hand-held device that can be used at checkpoints and retail stores to verify a driver’s licenses and also quickly run background checks all in a matter of seconds. The device is currently being used in various military checkpoints.
     
The security-enabled holograms built into ID cards, currency and tax stamps are another fake-fighting approach.
     
In one example, holograms in tax stamps help battle the illicit trade in cigarettes and alcohol, the two most smuggled and counterfeited products worldwide. Tax stamps are used to collect excise duties. And the cost is not just a financial one to governments. The damage caused by counterfeiting to a company’s brand reputation, loss of sales and market capitalization can be incalculable.
     
So the market for tax stamp holograms is the second largest after banknotes, according to Philip Hudson, chairman of the International Hologram Manufacturers Association. An estimated 124 billion tax stamps are issued annually for cigarettes while alcoholic drinks account for 12 billion. About 60 billion of the total features
a hologram.
     
A number of U.S. states now have rather simple holograms within their driver’s licenses. And enterprise identification cards and badges at times include a hologram.


Enterprise-Wide Visitor Management

In many organizations, visitors and contractors are still being asked to sign a paper visitor log. However, this tried and true system is also unsecure: the names can be illegible or false, in an emergency it would be difficult to determine who is in the building, and information on who has visited the company is available for everyone to see. 
     
Such was the case for Navistar International Corp. a manufacturer of heavy-duty trucks, midsized trucks, school buses, diesel engines and replacement parts. The company initially installed a single SVM (Secure Visitor Management) implementation in its Chicago corporate headquarters. After a few years, the company’s security department deployed visitor management on a enterprise basis.
     
According to Navistar security executive Michael Scribner, “We decided to upgrade to the latest version and ‘go enterprise’ at the same time. We went from being a corporate headquarters – only customer to 12 sites and manufacturing facilities in one upgrade cycle.”
     
The manufacturing facilities were particularly in need of Enterprise Visitor Management since they lacked any sort of standard for Visitor Management beyond simply having guards collect drivers’ licenses (and not even always doing that).
     
Each of Navistar’s SVM licenses are linked to a single, enterprise-wide database so that visitor information can be tracked and managed across the entire enterprise.
     
“Because we use a SQL database it’s very easy for us to set up a new site,” said Scribner. “We can quickly get updates enterprise-wide. We track and report on daily and monthly visitors, check-in and check-out times and other information our enterprise needs to more effectively manage our visitors and our security.”
     
For Navistar’s field locations, it is particularly important to know who is in what building at what times. According to Scribner, “we knew which employees were where and when, but we didn’t have much information about visitors and couldn’t go back in time to figure it out. When we finished our enterprise-wide deployment our upper management was shocked to learn that we have more than 140,000 visitors per year – and are approaching visitor number 500,000 to be badged by EasyLobby.”
     
Navistar also uses the system to flag former employees and vendors, a feature which has been particularly useful for managing visits by former employees with sensitive jobs.
     
Our premises are safer and, because our people feel safer, they are more productive,” Scribner said. “We actually set up a contest for our security guards to see who could become most proficient at checking visitors in – it was a great way to get our people proficient, and resulted in some true productivity gains, not to mention enhancing our security.”
     
Scribner said that NaviStar will soon use the system in its in South America, Europe and Asia facilities.


Keeping Schools Safe

As scary as it sounds, schools are not exempt from fake identification. Unfortunately, many schools visitor control is just a sign-in sheet on a clipboard. ISA’s CCSS software has worked in the Willitt Co., Kentucky school district, to database all visitors’ pertinent information, including a photo for positive ID. It also prints a custom label that all visitors wear.
     
Susan Jenkins, technology integration specialist at the school district, said, “At first our people were a little resistant to new technology and are not very tech savvy, however, they have quickly learned how to use the software and like it. It cuts down on fraudulent ID problems.” In addition, she added, “Our volunteer Coordinators love the option to have our volunteers quickly and easily check in and the option to run the reports every month.”
     
A school administrator can change badge categories, add two different tracking features for each badge and run reports. Some of the optional features include up to seven different visitor categories, a student module to track students leaving early and arriving late, a frequent visitor list for quick check-in, a driver’s license scanner for new visitor verification, a camera for positive ID, and a Radio Frequency Identification (RFID) reader for frequent visitors or staff automatic check in.
     
The software also has a predator check feature that enables the administrator to access the U.S. Department of Justice’s sexual predator database and assure new visitors are not a registered child sexual offender.
     
The software also has a student module that allows schools to easily track tardy and early dismissal students so schools no longer have to keep separate logs. Parents click on the Student button, fill in their child’s name and reason, and then click to log the record and take their photo. The photo gives school proof of who picked up or dropped off the child.


5 Ways to Eliminate Fraudulent IDs

What visitor management techniques are best? According to John Murzycki at EasyLobby:
  1. You want to be able to fully automate the entire process when using a visitor registration system.
  2. Your visitor control software should be easy to install, easy to learn and easy to use.
  3. Your visitor control software should have the ability to capture a signature or take a photo if they don’t have a license to scan. You should also be able to enter any other information such as the “category” of visitor, name of the person being visited, and reason for the visit (all presented as a drop down list to choose from).
  4. Print a customized visitor badge - Your visitor badge software should add a time and date stamp to the visitor record for the check in time, and print the badge that you had specified for that visitor category (visitor ID badges can look different from contractor badges, etc.)
  5. Access and Analyze - Visitor monitoring software should be able to look up and sort visitors and visits by a variety of criteria.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Card Printers Make IDs On Site and On Demand

    See More
  • ATMskimming

    How to Mitigate the Risks of ATM Skimming

    See More
  • Facilities Open Doors to Custom Access

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!