Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Identity Management

How Enterprises are Detecting Expert Fake IDs

Security officer with credentials
Woman at ID maker
Hospital
Security officer with credentials
Woman at ID maker
Hospital
August 1, 2012

Do you have $200 and a computer? You could have an expert-proof fake ID in your mailbox within a few weeks.

New fake licenses and IDs are a burgeoning business in China and other overseas forgery operations, and the level of sophistication and detail in the mail-order cards has Homeland Security officials and State Motor Vehicles Agencies worried that digital security systems might not be able to catch them.

Digital holograms are replicated, PVC plastic identical to that found in credit cards is used, and ink that appears only under ultraviolet light is stamped onto the cards, according to news source USA Today. Buyers’ new cards come personalized with their state, address, name and photo of choice. After filling out the form, someone from the website will send a money-order request.

The cost of ID documents differs from website to website, and also depends on the level of complexity. For a driver’s license, $75 to $200 will get a fraudster a new identity. Five hundred dollars will produce a very authentic-looking passport.

Officials are especially disturbed by the ease of receiving such a document, which could open the door for incomprehensible havoc in the hands of terrorists.

In response, the Transportation Security Administration is testing machines at the head of security lines to scan any of the 1,300 types of U.S. government-issued IDs.

A pilot program is being used at three U.S. airports, including the George Bush Intercontinental Airport in Houston. Thirty machines will enhance the TSA’s current method of identification verification – a hassled officer equipped with no more than a hand-held black light or magnifying glass.

While the machines will not replace the officer, they will scan the ID for visible and invisible elements, such as barcodes or chips. The TSA agent will then visually verify that the traveler’s ID matches the boarding pass and his or her appearance.

The problem is – will this new generation of fake IDs fool the trained eye and the machine?

Aside from the TSA, the Federal Aviation Administration is also working to secure the skies. Government regulations continue to step up security demands at federal agencies, requiring ID cards to support multiple identity assurance factors and to be validated at various points of entry into a location. Unfortunately, because of the cost and infrastructure that typically accompanies security upgrades, these federal agencies must wait months if not years to implement new programs. The FAA is no different, but FAA HSPD-12 Program Manager Craig Auguston had other ideas.

As part of its security requirements, the FAA must validate Personal Identification Verification cards at checkpoints within its facilities. But when 5,000 people come into the Washington D.C. FAA headquarters every day, the old standard of visual verification by security personnel was neither efficient nor effective. The guards had no way of telling if the card was authentic, revoked or if the employee had access rights to a particular part of the building, according to a report. With the possibility of such easily-procured fake IDs, would a visually-verified badge be any more difficult to reproduce?

“The project needed to provide guards the ability to validate PIV cards at FAA facilities where the gates did not have PIV card readers,” Auguston says. “We also wanted a mobile solution for backup and for roaming guards to be able to validate secure areas, such as parking garages.”

A need to integrate with the current P2000 security management database from integrator Johnson Controls led Auguston to choose software from Codebench, which together enables roaming security guards to use mobile handheld devices in FAA parking garages and entry points that needed to be secured but lacked the stationary PIV readers.

In addition to mobility, the readers can verify an employee’s access rights on the spot. Security personnel are using them to verify digital certificates, revocation status and access rights, all while keeping an audit trail of every card checked into the system, resulting in additional accountability and cost-savings over installation and infrastructure.

But sometimes, visual authentication is all you need for a single, specific task.

At Sheridan High School in Sheridan, Wyo., hard-working students can earn the privilege to eat lunch off-campus, but Ryan Schasteen, the Technology Integrations Manager for the school district, needed an easy, hands-off way to make sure that only the worthy students got fast food.

“I needed a user-friendly system, because I’m not the one administering it,” he says. “One of our secretaries had to be able to pull information out of our student database and print a card on the spot, and I wanted to get an all-in-one solution. We got ID Flow software, card printers, everything, and after setting up the templates and protocols, I don’t have to mess with it.”

The program, provided by Jolly Technology, keeps track of the 900 high school students’ information and auto-fills it into a pre-set template that changes every semester.

“Students have to earn the right for an open lunch, and the students who have earned that privilege have the ID card as their pass in and out of the building,” Schasteen says. “We reprint all of the cards on a new template when the semester changes to prevent students from reusing the previous semester’s privileges.” 

And while open lunch isn’t necessarily the same societal problem as underage drinking, identity theft or terrorism, the next generation of fake ID makers in the U.S. isn’t quite as sophisticated.

“Of course the students all want to leave for lunch, so the first semester this year, our monitors who check the badges as students leave and come back noticed a few IDs that were a bit off,” Schasteen says. “We found out that there was a student who made around five or six fake cards that were pretty easy to detect once we knew what we were looking for.

“Second semester, we found that another person had done a much better job of creating cards to the point where it was very difficult to tell that they were fake,” he says. “In making the card creation and dismissal process as easy as possible – we don’t want to bottleneck kids getting out for lunch with scanners – it isn’t a very difficult system to bypass with some student creativity. So we’re going to invest in some holographic cardstock to help deter the ability of students to easily produce fake IDs.”

While holographic image printers are available, Schasteen notes, it doesn’t make sense to spend so much money on a problem that currently affects 12 to 15 enterprising students.

“The biggest concern is what price point makes sense for the violations we’re seeing,” he says.

But getting off-campus privileges revoked isn’t the only threat facing people who order fake IDs. To add insult to injury, some of the fraudsters have reported identity theft and hundreds of thousands of dollars of debt in their names after buying from the Chinese forgers.

Using Badging Programs to Improve Efficiency and Legibility in Healthcare

At Tampa General Hospital, RF IDeas HID Prox Readers are everywhere and are used for just about everything – accessing electronic medical records, medication dispersal, attendance tracking and automatic badge deactivation on a predetermined date, which comes in handy for rotating med students.

In a hospital of more than 7,000 employees, access control and authentication is the key to keeping an accurate audit of who worked with whom and which nurse doled out the medication. In the last five years, the number of specific access groups, each with unique requirements within the organization, has grown from 24 to 118 groups, leading to tighter facility security and faster investigative capabilities.

“The biggest thing is our ability to disable someone’s access,” says Chris Hendrickx, Security Analyst at TGH. “Access needs are determined based on a job code, so nurses have access to the medication cabinets while, say, janitors don’t. But some jobs have an expiration date, like our single-semester students.”

Tampa General gets 60 to 100 new students every six months, and all of the badges are set to expire at the end of the teaching period. Within an hour of a card expiring or being disabled after a termination, that employee’s system access is revoked as well.

With the electronic medical records (EMR), nurses and other practitioners can keep track of patients’ records and treatment without the need for a handwriting translator after the doctor scrawls down a prescription.

 "We wanted to leverage our existing fleet of multifunction devices throughout the organization to complement the existing EMR program,” says Barry Pope, IT Manager, Health Information Management Applications, at Tampa General. “We scan outside documents into the system, such as personal records, living wills, state regulatory forms, to keep them associated with the record.

“There’s a general lack of electronic exchange in healthcare, but that’s the normal state right now that they’re working to change. We add those external documents to our internal records because they’re part of our patient’s care.”

By using their access badge, the physicians in the hospital can go through a patient’s ongoing record by scanning a barcode.

“It’s a strategic advantage to our hospital,” Pope says. “There’s a regulatory impetus behind using electronic records systems; it’s better for patient care; it’s better auditing; legibility improves; and with the RFID cards accessing it, it’s just very convenient.”

KEYWORDS: badging system counterterrorism enterprise security identity (ID) management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • id-card-access-control-freepik

    How visitor management, access control and security innovations are reshaping the look and feel of work in enterprises

    See More
  • How Connected Are You to the Security Business? - Security Magazine

    How Connected Are You to the Business?

    See More
  • Security

    How do enterprises use video surveillance?

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!