Product & Image Security May-June'10

Page 1

Product & Image Security incorporating Package Print and Converting Volume 14 Number 3

May/June 2010 | Volume 14 Number 3

PackagePrint&ConvertingInternational

incorporating...

SECURE SCRATCH CARD Leader in High Security Scratch Cards (Vouchers) Print Capacity of over 200 million PINs per month

$2

$2

$2

$2

$2

$2

$2

$2

$2

$2

May/June 2010

2OUTE s -ONSEy .9 TOLL &REE s TEL Web: www.Tele-Pak.com s Email: Sales@Tele-Pak.com

O f Se Pr fic cu od ia ri uc l Jo ty t u Fo & I rn un m al da ag of tio e n

s World Wide Shipping s -ULTIPLE 0LANT ,OCATIONS FOR 0RODUCTION 2EDUNDANCY s 3ECURE $ATA -ANAGEMENT $EPARTMENT s Traceability for PINs in Production and Shipping s Years Experience in Secure VOUCHER -ANUFACTURING


Product & Image Security was launched to meet the growing international demand for information concerning the problems of counterfeiting, forgery, product piracy, substitution and diversion as well as retail theft and product tampering. The publication discusses the solutions and technology available to combat these worldwide problems without compromising the security of the technologies reviewed. The magazine constantly features articles relating to high security documents such as currency, identity cards, passports, smart cards and travel tokens. Other areas of coverage are product identification authentication, traceability, brand image protection and security labels, including tags, tickets and packaging seals.

The magazine is targeted towards the retail packaging and high security printing sectors of the market and is distributed to Government Departments, Banks and Financial Institutions as well as end users in manufacturing together with Retailers and Brand Managers. Product & Image Security Magazine is the only way for this expanding, specialised industrial sector to keep abreast of the rapidly changing developments occurring in the wider security print market. With a highly developed reader enquiry service the publication offers a direct response medium to advertisers and news providers who require quick networking and communication in the world of 'Product & Image Security'.

www.productandimagesecurity.co.uk


Contents May-June 2010 4 News The latest Product & Image Security News (continued throughout), includes news about producing tax and duty decals with ink jet personalisation systems and the next generation of secure Green Cards in the U.S. Also included in this issue are items on anti-counterfeiting technologies being introduced in wineries in California and information about the new track and trace initiatives for pharma companies in France.

16 Focus on Technology – The battle for the World Cup kicks off With the Soccer World Cup under way in South Africa, Randall Burgess takes a look at how authentication technologies are being applied to branded merchandise and tickets in an effort to thwart the counterfeiters and forgers.

20 Special Feature – Scratching the surface (Part Two) Nigel Page, telecom airtime specialist, shares know how and answers questions on this important security print segment of the market.

28 One to One – Creating Chaos Our Editor talks to French producer, ProofTag about security applications and successes for their novel Bubble Tag product.

Page 5 31 Court Cases Next year 2D barcodes become obligatory in France for pharmaceutical manufacturers

A day of justice for electronic component manufacturers in China recently sentenced for counterfeiting computer routers and Nintendo files a lawsuit against a repeat piracy offender.

34 Security Card Centre

Page 9 Clydesdale Bank won this year’s ‘Best New Banknote Series’ Award for its family of banknotes celebrating the best of Scotland’s heritage, people and culture.

NBS announce the latest software for NFC encoding and KSW Microtech, a German supplier of secure RFID’s bags a part of the US Green Card Contract.

37 Asian Perspective Stories from India and the wider reaches of the region focus on the effect of counterfeit pharmaceuticals and semiconductors on brand owners and government in general.

38 People & Companies in the News

Page 12

Schreiner’s New York facility passes muster and Document Security Systems, also of New York is awarded patents for Prism in both Canada and Europe.

The U.S. Green Card is the most secure government ID credential available today

41 News Continued

Next Issue July/August 2010 Page 24 Holographic security and track & trace functionality set to foil fraudsters at this month’s Soccer World Cup in South Africa.

• • • • •

Track and trace with printed coding Preview of Intergraf in Barcelona Preview of LabelExpo USA - 2010 in Chicago Banknote & High Security Printing Overt authentication devices

Please contact the Publisher if you would like to contribute to any of these features.

May-June 2010 |1



Editors Foreword Editor & Publisher Jeremy Plimmer DipM., M.C.I.M., M.Inst.Pkg (Elec) jplimmer@productandimagesecurity.co.uk

Asian Correspondent Alan Abrahams

Graphic Designer Ian Curtis, First Sight Graphics Tel: 07977 415061 Email: firstsightgraphics@mac.com www.firstsightgraphics.com

European Head Office: WillisPlimmer Publishing Limited White Cottage 520 Bradgate Road Newtown Linford Leicester LE6 0HB UK www.productandimagesecurity.co.uk UK subscription:

£95

Europe: €140 Rest of the world: $240 Product & Image Security incorporating Package Print and Converting International (Reg. No. 015/887) is published six times per year for $240 per year by WillisPlimmer Publishing Limited, White Cottage, 520 Bradgate Road, Newtown Linford, Leicester, LE6 0HB, UK. Periodicals postage is paid at Rahway, New Jersey and additional mailing entry points. Postmaster: Please send address corrections to: c/o Mercury Airfreight International Ltd, 365 Blair Road, Avenel, NJ 07001. Application to mail at Periodicals Postage Rate is pending at Rahway NI. © Copyright 2009 Product & Image Security incorporating Package Print and Converting International All material published in Product & Image Security incorporating Package Print and Converting International International is copyright and remains the property of the publishers. No material may be reproduced without the written permission of the publishers. The publishers do not necessarily agree with the views expressed by contributors, nor do they accept any responsibility for any errors of interpretation in the subject matter of this publication.

Towards self validating print ith counterfeiters getting ever more sophisticated in their approach to replicate security print, labelling and packing in an attempt to gain advantage, the need to develop more robust systems of defence, that are more difficult to compromise, is an essential task. Gaining advantage for criminals often means that a monetary benefit can be gained such as through manipulating a financial instrument or from replicating branded products in quantity with enough accuracy to succeed in a majority of attempts. In order to manage the risks associated with these attacks effectively, especially in areas where health and safety are concerned, a more rigorous approach to authentication is required to support primary validation features such as optically diffractive films, watermarks and colour change inks. These technologies are often satisfactory mechanisms for experts in authentication to validate, but because of their ubiquitous nature and variety they become subjective rather than objective devices in the eyes of the public. The introduction of NFC (near field communications) tags into consumer products’ packaging is one method of providing unambiguous methods of authentication to the public at large and the technique of mass serialisation linked via cell phones to databases via SMS messaging systems is alternative solution to the problem of providing provenance at source. Developments in printed and organic electronics have recently lead to the ability of producers to embed electronic photographic images that are ‘switchable’ in ID cards, Passports and on consumer packaging. The technology to deliver such devices is complex and the materials involved are

W

intricate enough to be controlled. Such devices are suitable immediately for applications in identity management and indeed prototypes exist that demonstrate how a variety of stored facial images can provide secure confirmation relating to the official holder of an identity document. Such methods of validation provide an ideal mechanism for inexpert evaluation to take place as and when it’s needed. The age of self validating print and self validating products is beginning to emerge.

Jeremy Plimmer, Editor

May-June 2010 |3


News Testing the tipples Top California Winery selects Payne Security’s novel anti-counterfeiting taggant authentication solutions ayne Security, a leading supplier of brand protection, document authentication and personal ID solutions, informed Product & Image Security that its novel anticounterfeiting solution has been selected by one of the ten largest wine producers in the US. This California winery selected Payne Security to protect its finest highvalue wine range, retailing at over $150 a bottle. Payne Security’s proprietary taggant authentication solution is providing the wine producer with a safe, covert security system for reliable product verification and enables the detection of counterfeit products. The wine industry is becoming increasingly aware of the growing counterfeit threat for high-value products. The most common methods of counterfeiting involve the reuse of genuine packaging, with refilling or relabeling common practice. Securing bottles with methods such as laser engraving fails to provide significant protection against counterfeiters as these can be re-filled and it also potentially makes it easier to sell as such bottles can successfully complete an authentication test. Authentication of the cork is also not a favoured option because

P

government regulatory bodies often do not allow any sort of foreign material to be used on it as it comes into contact with the wine and could potentially affect its quality. Payne Security takes an innovative approach to addressing the wine producer’s requirement for ultimate brand protection of its high-value products, working directly with brand owners to engineer a solution to address their specific problem. As with any product protection solution, maximum protection is achieved only if the portion of the product containing the authentication solution is destroyed or permanently altered upon use of the product. One of the features of the Payne Security system is that unlike other technologies, it is not dependant on a response visible to the naked eye, therefore any change is incredibly difficult to detect and can only be verified with a Payne Security handheld reader. This allows brand owners to carry out random authentication checks throughout the distribution chain to facilitate quality assurance and provides dependable distinction of genuine products from counterfeit ones. Neil Ivey, Sales Manager, North America for Payne Security, explains: “The wine industry is under increasing pressure to protect its high-

Testing the closure seal on a wine bottle for the presence of an authentication tag.

value products against counterfeiters. As our taggant authentication solution has been successfully used for many years around the world, across some of the most demanding industries, the wine industry can now take advantage of the advanced security capabilities of this innovative technology.” Payne Security is one of the world’s leading providers of brand protection, document authentication and personal ID solutions, with a large range of products designed to beat counterfeiters and prove personal identity. Reader Enquiry 1

Norway Renews Contract with Gemalto for Biometric ePassport emalto has renewed its multi-year contract to personalise and issue ePassports for Norwegian citizens. The company manages the entire delivery process from the production of the travel document through to personalisation and operated issuance services, which are performed in Gemalto’s Oslo-based secure service centre. Gemalto has deployed ePassports to Norway since 2005, placing the country as a pioneer in nationwide deployments of biometric passports compliant with international standards. "To date we have delivered several million ePassports

G

4| May-June 2010

to the field, with high levels of satisfaction from both citizens and travel authorities," says Mr Lars H. Boehler, Director of the National Police Computing and Material Service. "Gemalto is a reliable partner that we are happy to be working with over the coming years." The new ePassports and issuance solution feature the EAC (Extended Access Control - an International Civil Aviation Organization standard for second-generation ePassports) for increased protection of biometric and privacy sensitive data, as well as innovative security features in the polycarbonate data page. Jacques Seneca, Executive Vice President, Security Business Unit, Gemalto, commented. "We are delighted

with the renewal of this contract, which is the result of many years of strong collaboration between Gemalto and the Norwegian authorities. Norway is one of the earliest adopters of ePassports for nationwide deployment, and we will continue to work closely together to deliver increased protection for Norwegian citizens." Gemalto delivers on the growing demands of billions of people worldwide for mobile connectivity, identity and data protection, credit card safety, health and transportation services, e-government and national security. Reader Enquiry 2


News On the right track Avery Dennison helps pharmaceutical industry comply with new French traceability regulation very Dennison, a recognised industry leader for innovative printing and identification solutions, is making it easier for the pharmaceutical industry to comply with new French traceability regulation. From the 1st January 2011, the AFSSAPS (French Agency of Sanitary Safety and Health Products) will establish an improved coding standard for the French pharmaceutical market, based on Datamatrix bar coding. The new standard is designed to improve the traceability of medicines and ultimately increase consumer safety. Other European states, such as Germany, Spain and Italy, are looking to introduce similar regulations to improve consumer safety. 2D Datamatrix bar codes are able to store large amounts of information (up to 2,300 alphanumeric characters) on a small label. This makes it ideal for small products and for the packaging often used in the pharmaceutical industry. Avery Dennison offers complete solutions for meeting the new regulations, each suited to the individual pharmaceutical manufacturer's

A

requirements and equipment. Avery Dennison can even provide options for existing labellers, compacted independent modules for manufacturers with no available floorspace for new printing hardware or the latest versions of Datamatrix systems. Frédéric Lemaire, Southern Europe manager for Avery Dennison, informed “2010 will be a busy year in preparation for the new Datamatrix standard, both in France and internationally. At Avery Dennison, with our integrated solutions and trusted expertise, we are ready to help every stakeholder reach full compliance.” Valérie Marchand, health sector manager of GS1 France explains further. “Many pharmaceutical manufacturers will be obliged to install new printing systems for applying the Datamatrix marking. It is a necessity to satisfy the new regulation criteria, but the electronic integration of traceability information within the sector as a whole will make it possible to establish a safer and more efficient chain of distribution and for other benefits to be harvested simultaneously”. Avery Dennison is a recognised industry leader

Next year 2D barcodes become obligatory in France for pharmaceutical manufacturers

that develops innovative identification and decorative solutions for businesses and consumers worldwide. The Company’s products include pressure-sensitive labelling materials; graphics imaging media; retail apparel ticketing and branding systems; RFID inlays and tags; office products; speciality tapes; and a variety of specialised labels for automotive, industrial and durable goods applications. Reader Enquiry 3

A cut above the rest Edale launch the VLS-650 dale, the UK-based manufacturer of narrow web printing and converting presses, have announced the launch of their ‘infinitely adjustable sheeter’, the VLS-650. The VLS-650 is a fully servo driven sheet cutter which allows for jumbo rolls of plain or pre-printed material to be fed through, and converted to sheets resulting in a delivery of shingle or deep pile stacks. Although initially launched into the digital market - with installations on a number of AGFA/Dotrix Modular machines in companies worldwide the machine can be run in-line with almost any web fed machinery.

E

One of the many features of the VLS-650 is the capability to process a wide range of substrate types from 80 micron-600 micron, and widths of between 510mm-1,000mm. These materials can be cut into constant or variable lengths, to register, and can respond to varying sheet lengths instantaneously, on the fly without the need to change tooling. This unique ability is achieved through an optical sensor which detects an approaching sheet; the cutting knife is then accelerated to web speed and positioned for the perfect cut. As with all of Edale’s machines, it is of modular design to ensure that a wide range

of options can be added in the future, ensuring flexibility and upgradeability.

Edale VLS-650

Reader Enquiry 4

May-June 2010 |5


News Not too taxing System delivers speedy duty decals tlantic Zeiser Group, a leading supplier of technology modules and system solutions for industrial digital printing, demonstrated how optimised end-to-end system solutions can be created for different sectors and applications through the integration of different modules in a one-stop shop. At IPEX 2010, one of the leading specialist trade fairs for printing, publishing and media, held in Birmingham, Atlantic Zeiser unveiled its integrated Digiline™ Sheet 300 solution for the first time and demonstrated the security printing of customs and excise banderoles. The demonstration was representative of multiple system configurations for the equipment for use in different applications. Based on the off-the-shelf principle of linking a number of specialised units, the system underlined the flexibility of Atlantic Zeiser’s end-to-end solutions. Following close co-operation with leading brand owners and packaging producers, it has been possible to create flexible and scalable systems that are user oriented and increase cost-efficiency through just-in-time production. The increased demand for late-stage adaptation or the overprinting of pre-printed products within printing processes in security

A

printing depends primarily on cost reductions through just-in-time production, short reaction times and minimised standing times for production facilities. As a result, the rapid and high-value printing of variable data and information, such as barcodes, security characteristics, numbering and product content data in various languages, is a common customer requirement. The Digiline™ Sheet 300 on show at IPEX is an example of a special application for the equipment for the security printing sector. Printing customs and excise banderoles on paper formats demands a precise, top-quality and high-speed printing process. This example also shows that in document printing, and with printing flat products, industrial digital printing offers quality and production speeds comparable to offset. The equipment works with two digital Delta 105i inkjet printers, both of which print using environmentally friendly, water-based inks. As a result, there is no dryer module needed. The presented single web application has a resolution of 600 dpi and can print at speeds of up to 120 m/min. Information from a font size of 2 points can be produced. The Digiline™ Sheet Series is used for different applications in security printing, including personalisation, marking and

The quick production of bandaroles, without cumbersome numbering box set up is now available from Atlantic Zeizer

coding webs, and cartons (in flexible mail shots, transpromo prints and packaging printing). Depending on the configuration of the integration module, it is possible to print additional white ink with spot colours or use full-colour printing. In addition, the use of a camera-based verification control as well as an integrated PDF/VT Workflow module is possible. This is supplemented by the fact that the customer can use integration modules for product tracking (Track & Tracing) and for anti-counterfeiting applications that require a database to be built from numbers applied during the print run.

Reader Enquiry 5

Thin protection Security for contactless government ID with KSW Microtec Thinlams® s governments, financial institutions and other high-security conscious institutions require additional security features on their contactless ID documents and cards, KSW Microtec, one of the world’s leading suppliers of RFID components and inlays for secure cards and other form factors, reports an increase in demand for its proven prelaminate Thinlam®. Issuers of highly secure cards and documents of all types, increasingly demand the addition of new security features. In order to achieve this, multiple layers need to be added and large memory security microcontrollers need to be integrated, while maintaining ISO standards for maximum card thickness. KSW¹s polycarbonate inlay Thinlam® is already widely used for this purpose, due to its inherent

A

6| May-June 2010

thinness down to 200µm and proven ability to support the manufacturers of contactless documents with multiple layers and security features. Furthermore, special construction techniques provide a mechanical stability due to KSW’s patented working technology for both the chip and the antenna. The Thinlam® prelaminates maintain the highest durability thanks to the patented chip connection technology, which achieves tighter resonance frequency tolerances. KSW Thinlams® are manufactured without chip modules, ensuring an exceptionally smooth card surface without sink marks. The technology is successfully proven and the Thinlam® guarantees durability and reliability. In addition, as both sides of the card are fully opaque, both the chip and the antenna are visually screened.

Therefore any potential deformation areas on the card are avoided when using KSW’s Thinlam®. Other common restrictions regarding visual card personalisation are eliminated, allowing for new features to be applied above the chip area of the card, if required. Thinlam® is available in polycarbonate, PVC, PET or Teslin® and can also be used for transparent RFID cards due to the excellent optical appearance. KSW’s new thin RFID prelaminates are commonly used manufacturing government ID documents including passports, driver’s licenses and identity cards and are also widely used in the ePayment sector.

Reader Enquiry 6


News A trick up their sleeve Technology opens new market for serialisation of tamper evident closures

otal Brand Security (TBS) have developed a cost-effective high security shrink sleeve concept that can be incorporated into future design work for medium to high volume wines and spirit products. TBS has developed and industrialised the capabilities to produce shrink sleeves that have high security holograms as an integral part of the actual shrink sleeve. Standard holographic shrink sleeves today use individual holograms or customised wallpaper holograms adhered to the inside of shrink sleeves with pressure sensitive or heat activated adhesives. The main problem with these types of sleeves, say TBS, is that they are relatively easy to counterfeit and typically not costeffective for medium to high volumes. In an attempt to address these issues TBS are introducing a technology that utilises partial holographic designs making an attractive looking hologram luxury feel to the sleeve/pack. “This manufacturing technology is state-of-

the-art and almost impossible to replicate. In our estimation it should give at least several years of protection before anything similar could be replicated by counterfeiters -if at all. On the other hand with our industrial capabilities we are able to produce these in large volume at interesting price value ratios making this a technology suitable for protecting a wide range of products”. Adrian Simmons of TBS told Product & Image Security. The sleeves can be numbered using the TBS Security Code® system allowing consumers and/or investigators to authenticate using their mobile phone by sending an SMS text (see illustrations) and receiving an immediate reply that indicates if a product is legitimate, or not. Additional information such as whether in the correct market, results to a “competition” and for example promotions can also be incorporated with this method of authentication. “Wines & Spirits Brands will be provided with all the numbers in a particular shipment and TBS can set up a specialised website

whereby particular rolls or shipments of sleeves can be linked to particular product groups during application on the bottling lines. This can provide detailed specific information when verifying the security code by SMS text”. “As depicted in the example it can also be linked to a competition. This provides a subtle way for Wines & Spirits Brands to obtain a better understanding of where their product is ending up in the marketplace and when it has been bought. For example if codes are being verified in a different country this can be traced by knowing where the consumer was when he authenticated the label. Also individual information about the telephone number and other details of consumers can be logged for marketing purposes”. Adrian concluded.

Sleeve will be made from de-metallised holographic material and includes a tear tape

Promotional material can be included in the form of an insert to support advertising campaigns

By adding a scratch panel overlay the promotional material can be utilised to deliver a security code that is validated through SMS messaging or a website

T

Reader Enquiry 7

May-June 2010 |7


News Payments Council and Accenture launch a customer authentication evaluation tool he UK Payments Council and Accenture have launched a new modelling tool to help banks and businesses select authentication technologies for secure customer interactions online. The software tool, which can be loaded onto a PC, identifies the best suited authentication option based upon specified requirements and will help banks and businesses make sense of the sheer variety of customer authentication options on offer. Richard Martin, Business Security Consultant of the Payments Council said: “With now over 60 percent of adults using the internet and phone for managing finances, it has become a way-of-life for customers looking for convenient, time-saving ways of carrying out their daily tasks. However, just as

T

consumers are increasingly using these channels, so too are the fraudsters. “Because there is no one-size fits all approach, we’ve developed a tool and detailed roadmap to identify the benefits, strengths and weaknesses of the vast majority of multi-factor authentication solutions available. We envisage our modelling tool continuing to evolve as it takes into account the growing choice of products, as well as the varied input from other industries.” In conjunction with the launch of the modelling tool, a “Multi-Factor Authentication Security Review” that examines the current authentication debate was published. The review includes the results of a survey on authentication that covers such topics as the types of technology (i.e. devices) that are currently available and what makes a device

effective or ineffective, how it can be graded; how the device can be used in conjunction with other technology solutions; and what the experts think. Floris van den Dool, executive director for the Technology Consulting Security practice at Accenture in Europe, Africa and Latin America, said: “This review reflects comprehensive research and the deep knowledge of experts. We’re confident that the new technology assessment tool and accompanying research will leave banks and businesses better equipped to tackle the security challenges posed by authentication.” The tool, along with the detailed ‘Multi-Factor Authentication Security Review’ is available for purchase at a cost of £500. Reader Enquiry 8

Digimarc and AlpVision Join Forces with Worldwide Strategic License Agreement igimarc Corporation, a leading supplier of digital watermarking technologies and solutions, and AlpVision, an emerging leader in brand protection and anti-counterfeiting solutions headquartered in Switzerland, are joining forces with a worldwide strategic license agreement. The agreement enables Digimarc to benefit from AlpVision’s expertise in brand protection security solutions and provides AlpVision with a gateway to the U.S. market. “We are pleased to partner with AlpVision in support of their efforts to provide brand protection and anti-counterfeiting solutions for customers in pharmaceuticals and other industries,” said Digimarc’s CEO, Bruce Davis. “AlpVision is a leader in commercialising invisible digital marking to detect counterfeiting, and has an impressive list of customers and partners across a wide range of industries. We look forward to working with them in the launch of their U.S.

D

8| May-June 2010

office and marketing initiatives.” “Digimarc’s patent portfolio features a number of very valuable approaches to support our goal of providing novel, innovative technologies, products, and services to our customers in the U.S. and around the world,” said Fred Jordan, CEO of AlpVision. “We look forward to a long, successful relationship with Digimarc, working together to strengthen our position in the market for anti-counterfeiting applications and services.” Digimarc Corporation, based in Beaverton, Oregon, is a leading innovator and provider of enabling technologies that create digital identities for all forms of media and many everyday objects. The embedded digital IDs are imperceptible to humans, but not to computers, networks and devices like mobile phones, which can now use cameras and microphones as sensory inputs to “see, hear and understand” the world around them within the context of their environment. Digimarc has built an extensive intellectual

property portfolio with patents in digital watermarking, content identification and management, media and object discovery to enable ubiquitous computing, and related technologies. Digimarc develops solutions, licenses its intellectual property, and provides development services to business partners across a range of industries. AlpVision S.A is the world's premier developer of digital invisible marking technologies for brand protection. In 2001, the company invented a breakthrough authentication technology. Since then, the solution has been rolled-out worldwide successfully in Forbes 2000 companies belonging to the tobacco and pharmaceutical industries. This enabled AlpVision to reach profitability in 2003, and keep sales and profits growing steadily since then.

Reader Enquiry 9


News Creating a new heritage Innovation to the fore at third IACA currency awards new family of banknotes from Scotland’s Clydesdale Bank was one of the outstanding winners at the International Association of Currency Affairs’ (IACA) Excellence in Currency Awards, sponsored by ‘Currency News’. A high calibre of entries and some very close voting in several categories marked this year’s awards - the third event – the presentation of which took place during the gala dinner on May 12th at the Currency Conference in Buenos Aires, Argentina. The 2010 awards saw the Lifetime Achievement Award go to Roland Tornare, the recently retired director of the Issue Department at the Swiss national Bank (1985 – 2007). His extensive experience in the field of banknote design and involvement in creating the current Swiss banknote series were cited by Currency Conference chairman Richard Haycock, who presented the awards. Clydesdale Bank won the hotly-contested Best New Banknote Series Award for its family of banknotes celebrating the best of Scotland’s heritage, people and culture. The front of each note honours a prominent and innovative Scot while the reverse features one of Scotland’s five World Heritage Sites. The bank designed the new notes to ensure that everyone, including the visually impaired, could use the notes with confidence, while the use of vibrant colours, different sizes, bold fonts, and raised bars to assist in note denomination has been appreciated by the Royal Blind, a foundation devoted to the welfare of blind people. Category runners up were the Central Bank of Armenia for its 100,000 Dram banknote and the Central Bank of the Republic of Turkey for a new series which completed the country’s currency reform started in 2005. Clydesdale’s year-long media communications initiative from the launch of the initial designs right

A

through to the introduction of the notes into circulation earned it the Best Currency Public Education Program. The move ensured its new notes were welcomed by consumers and readily accepted by retailers. The National Bank of Denmark and the Central Bank of the Republic of Turkey were category runners-up. The Best New Coin Series Award went to the Royal Canadian Mint for The Vancouver 2010 Winter Olympic Circulation Collection. In the run up to the Olympics, the Royal Canadian Mint released 12 Vancouver 2010 circulation quarters (25 cents) plus two lucky loonies ($1 coins) - each individual quarter represented a different Olympic Winter sport. Runner up awards went to two new circulation coin series, issued by the Central Bank of the Republic of Turkey and the Reserve Bank of Fiji respectively. Pixel Watermark, a development of ArjoWiggins Security which appeared in the Bank of Mexico’s 200 Peso note commemorating the country’s bicentennial, won the award for the Best New Currency Feature. Printed on paper in a vertical design format and including a multi-tonal watermark in the form of an angel, the wing of which was created with a Pixel™ Watermark, this was the first time such a feature had appeared on a banknote. De La Rue’s Depth Image and Magic Varifeye® (from Louisenthal) were the competitors who both received runner up awards. Voting results were very close in this category. For the first time ever there was a tied result for the Best Currency Website. IACA members voted equally for the European Central Bank and the Central Bank of Chile for the detailed currency information found on their respective websites. While the two sites are very different in their approach and perhaps the resources available for website development, both use

Clydesdale Bank won this year’s ‘Best New Banknote Series’ Award for its family of banknotes celebrating the best of Scotland’s heritage, people and culture.

video and interactive notes to help their public understand the design and security features preset. The Monetary Authority of Singapore was a close runner up. Speaking at the awards, Richard Haycock , Chairman of the IACA said: “I would like to congratulate all this year’s winners and runners-up for their outstanding contribution to the currency industry”. He continued, “All have demonstrated the highest standards of technical expertise and innovation to deliver practical, eye-catching and cost effective currency products, which we as an industry can be proud of. This year’s ceremony has been an unequivocal success and I very much look forward to the continuing high standards being recognised at the next awards, which will undoubtedly be even bigger and better.” The IACA awards were launched in 2007 to promote and recognise excellence in currency production, processing, management and distribution. They are open to any organisation or individual supplying products, services or systems for currency production or management. The IACA awards committee draws up a shortlist of three nominations in each category, and IACA members vote for the winners.

Reader Enquiry 10

May-June 2010 |9


News Checking the checkers New improved Hologram Image Register ologram producers can now protect their designs more quickly and easily following improvements to the International Hologram Manufacturers Association’s (IHMA) Hologram Image Register (HIR). The IHMA represents 90 of the world’s leading hologram producers. The highly secure HIR, established in 1993 and now merged with the Hologram Manufacturers of India’s (HoMAI) Hologram Roster, is the only database of hologram images in the world. It was established in 1993 to help prevent IHMA members from mistakenly copying an existing hologram design already issued in another part of the world. The Register underpins the use of holograms for authentication by enabling members to see if a proposed hologram design, as requested by customers, infringes existing designs. In doing so, it can unearth suspected attempts to source counterfeits. The IHMA claims that it is the only database of a security or authentication feature in use by suppliers of such features. And because the date of first registration of a new hologram

H

is recorded on the Register, it also supports the copyright in that image. Suspected counterfeit holograms can also be compared against genuine ones stored within the Register and, if found to be fake, the producers and customers of the originals can be notified and action taken. The hologram search and register forms have been merged by the IHMA into one easy-to-use, streamlined web browser-based new Hologram Proposal Form which producers can use to make rapid online submissions. This features check boxes and drop-down menus to aid application and improved registration. A search of the register for matching images is undertaken on receipt of the application and the hologram is registered on confirmation that it has been produced. A second procedure, which is initiated in the event of a match being found, is designed to check whether the second registration is legitimate, remains in place. Merger with the Hologram Image Roster ensures that a search of the HIR will avoid the risk of failing to spot a match with a hologram produced in India, which has a large domestic hologram industry. Holograms registered on the

HoMAI database can be re-registered on the HIR. The registration service is now free and will be included as part of IHMA membership. The HIR database is kept off-line to maintain the highest levels of security and is operated by the Counterfeiting Intelligence Bureau of the Commercial Crime Services division of the International Chamber of Commerce. Only authorised staff at the CIB have access – the HIR operation is totally confidential between these and the IHMA member registering holograms. The success of the HIR has been proven over the years, and a growing number of customers commissioning secure holograms require them to be registered on the HIR. Several attempts to make counterfeit holograms have failed because the HIR demonstrated the hologram was already being produced by an IHMA member. Equally, there have been cases of fake holograms reported to the HIR which has then proved useful in demonstrating that they were counterfeit. This has then led to prosecutions and the counterfeiters punished.

Reader Enquiry 11

Read all about it Access announces ultra-compact keyboard with built-in OCR that simplifies ID checks for transaction processing ccess IS, the data input technology company, has recently introduced the AKC110O, an ultra-compact, rugged keyboard with a built in optical character reader (OCR). The AKC110 reads machinereadable passports and visas, ID cards and cheques. An optional magnetic stripe reader (MSR) adds the ability to read credit cards and loyalty cards. Designed for use in bureaus de change, hotels, car rental depots, post offices and retail banks, the keyboard is ideal wherever identities need to be checked for transaction processing.

A

10| May-June 2010

The AKC110-O is programmable using Access’s free SoftProg utility. Special function keys, or groups of keys, can be created for common tasks. When properly designed, this makes data entry faster and more accurate. It also reduces staff training time by simplifying the process. The keyboard measures just 293W x 213D x 40H mm, occupies minimal desk space and features a plug-and-play USB 1.1 interface that provides power and communications when connected to the host IT system. No additional power supply is needed. In addition to standard keyboards, Access

offers a comprehensive customization service. This includes special key colours and legends, software support for integration into IT systems, and the addition of other peripherals including biometic fingerprint readers. All keyboards are built on a rugged steel chassis. Key caps are 2-shot moulded for durability. The keys have 4mm travel and a lifetime of 50 million operations. They meet all major international safety and RF/EMI specifications.

Reader Enquiry 12


News Setting the tone Kalamazoo invests in the latest flash fusion technology due to major growth alamazoo Secure Solutions Limited, the Redditch based UK security print firm, has further established itself as the leader in this niche market following the purchase of the latest Xerox continuous and sheet fed printing technology and the Lawhill Checksure System. Julian Coghlan, Managing Director for Kalamazoo commented. “Kalamazoo has always been passionate about providing our customers with the best possible and most innovative solutions possible. This latest investment will bolster our position as a leading supplier of secure solutions, whether the requirement relates to vouchers, tickets, certificates or any other document which requires a level of security protection.” “Kalamazoo is currently experiencing significant growth and this latest investment will help us to manage and deliver the increased workload with greater security, integrity and efficiency”. He continued.

K

In September 2009 Kalamazoo completed a multi-million Pound investment program which incorporated the successful relocation project with its associated infrastructure investment and the introduction of a new Miyakoshi 8colour Rotary Web Offset Printing Press. “The Miyakoshi has been in operation for six months and has already proven a fantastic return on investment. We have significantly increased our output capacity and improved our make ready and lead-times”, commented Julian. “This latest investment, worth in excess of one million pounds, follows a major win for Kalamazoo in the security print market and will ensure the project is fulfilled with the greatest efficiency, whilst maintaining first-class quality standards. Everything is possible with the new equipment and we are excited by the prospect of developing new product and client relationships.” Kalamazoo has invested in the Xerox CF650, the Nuvera 144MX and the Lawhill Checksure system. These applications utilise the latest

printing technology, such as flash-fusing technology, to ensure the fastest turnaround times, uncompromising reliability, accuracy and flexibility. Robert Whiteside, Chief Executive Officer of Kalamazoo’s parent company, Adare, commented: “The current economic climate makes it even more important to invest in the future of Kalamazoo by providing the company with the technical capabilities and ultimate production facility to position the business strongly in the marketplace and emphasises our commitment to delivering the best solutions to suit customer requirements”. Kalamazoo, part of the Global Marketing and Secure Communication Solutions provider Adare, is a leading international supplier of security printed documents and secure business solutions improving efficiency of customers’ organisations and protecting them from fraud. Reader Enquiry 13

Personal Protection Holographic security added to identity cards volis, a European supplier of personalisation solutions for plastic cards, is extending its offering of laminates for Securion, a system designed to personalise and laminate cards that require foolproof security, from national identity cards to driver’s licenses. Securion personalises and steadfastly provides protection to a wide array of badges, for highly secured access control to fraudproof ID applications such as ID cards, driver’s licenses, health cards, as well as access control badges. The Company offers a one-stop solution to personalise and laminate security badges in a decentralised environment. Available for several years in many parts of the world, Securion seamlessly scales to meet ever-present and growing concerns regarding security and data forgery, while greatly

E

extending the lifespan of any card or secured holograms. badge. Evolis also provides a This compact printer hologram-customisation comes with a new color program to design printing module and a unique, tailor-made and lamination station, enabling fraud-proof laminating dual-sided personalisation. material. This enables 4 levels of The badge is first processed security, from simple holograms Securion enables dual-sided through graphical and electrical to be indentified at a glance, to lamination of standard PVC personalisation. Next, a cards including holographic films holograms that can only be protective film, in the format of a read by highly sophisticated varnish or a patch, is applied by a hot roller machines. over the entire card surface. The process of Securion enables dual-sided lamination of printing and encoding a security badge is, standard PVC cards. The high-quality therefore, carried out in just one single pass. lamination benefits from lab tested and To make this printer even more user-friendly, proven new holographic films, that offer Securion now offers a new tray for rapid perfect adhesive strength on the card, and loading of the lamination film. helps fight further fraud attempts such as To support increasing demand in security alteration. cards, Evolis has extended its offering, with Reader Enquiry 14 new films, from standard varnish to highly

May-June 2010 |11


North America

NEWS Next Generation ‘Green Cards’ Introduced by U.S. Department of Homeland Security LaserCard’s Optical Security Media Provides Core Security on Western Hemisphere Travel Initiative Credential aserCard Corporation has just announced the introduction of the next-generation U.S. Permanent Resident Card ("Green Card") featuring advanced optical security media and, for the first time, a Radio Frequency Identity (RFID) tag for compliance with the Western Hemisphere Travel Initiative (WHTI). Mailing of the new card by the U.S. Department of Homeland Security (DHS) to legal permanent residents began on May 10th. Designed and manufactured by LaserCard, the Green Card is issued to lawful U.S. permanent residents as evidence of their authorisation to live and work in the United States. LaserCard has been shipping quantities of the new card to the DHS for several months under a previously announced contract. LaserCard has supplied the U.S. government’s optical security media-based Green Cards since 1997. Over this time, with more than 20 million cards issued, the digital security of the card has never been compromised. Building on this success, the new card exploits LaserCard’s program of continual innovation which has resulted in progressively enhanced visual and forensic security features. In addition, the card incorporates a RFID tag to provide compliance with the WHTI program, which facilitates legitimate travel and trade at U.S. land borders. The new Green Card is the world’s first implementation of optical security media and RFID on a single card platform. LaserCard and its supplier partners pioneered new construction techniques to ensure a robust and reliable credential with sophisticated, tamperproof features. The card also features an optical security media configuration optimised to meet DHS’s requirement for compliance with International Civil Aviation Organization (ICAO)-standards for ID cards used in travel applications.

L

12| May-June 2010

“We worked closely with the U.S. Citizenship and Immigration Service to develop the most physically secure and counterfeitresistant identification credentials available today,” said Bob DeVincenzi, president and CEO of LaserCard. “In 1998, the implementation of LaserCard’s technology on the Green Card effectively put a halt to mass counterfeiting. This new version The U.S. Green Card is the most secure government ID with enhanced visual and physical credential available today security puts a credible copy even further out of the reach of counterfeiters.” High resolution security artwork: ”The security of valuable documents is an resolved at up to 25,000 dots per inch, increasingly important focus for our country. beyond the capability of scanning, copying With its multiple innovations and technology and printing technologies used in replication advances, we see this latest version of the or simulation Green Card as the ID equivalent of the new Large high contrast, high resolution U.S. $100 bill,” continued DeVincenzi. tamperproof cardholder image laser It is anticipated that the next generation card etched onto the optical security media will establish a new level of excellence in world (LaserCard’s Personalised Embedded class credentials. In a study of international HologramHD™) government identity programs, industry In addition, the optical media securely stores analyst firm Frost & Sullivan highlighted the digital information including the cardholder's U.S. Green Card as the most secure photograph, fingerprint, name, digitised government ID credential available today. signature, date of birth and registration Rufus Connell, vice president of the firm’s number. This information cannot be erased or security and identity practice, commented, fraudulently altered and private data can be "Concerns surrounding the legitimacy of ID read only by DHS personnel using a custom cards have heightened the focus of secure reader. governments worldwide on the prevention of LaserCard Corporation, together with its security breaches and large scale subsidiaries, is a leading provider of secure ID counterfeiting. In the case of the original solutions to governments and commercial Green Card, LaserCard's technology clients worldwide. It develops, manufactures, approach has served as a highly effective and integrates LaserCard® optical security solution to this issue. The next generation US media cards, encoders, peripherals, smart Green Card builds on these major security and specialty cards, biometrics, and modular features and raises the bar for secure software. The company’s cards and systems international government ID programs." are used in various applications, including Security Features: The Green Card’s new citizen identification, border security, graphic design includes high resolution offset government service delivery, and facility printing and other visual security features. access. Innovations that further enhance the optical Reader Enquiry 15 security media include:


North America

NEWS Winning Streak for Anti-Counterfeiting Technology Continues JDSU Earns Two More Industry Awards for Breakthrough HoloFuseTM Solution for the Protection of Identity Documents DSU has won two more prestigious industry awards for its breakthrough HoloFuse™ anti-counterfeiting technology. The most recent awards were granted by the International Card Manufacturers’ Association (ICMA) in May and by The Association of Industrial Metallisers, Coaters and Laminators (AIMCAL) in March. HoloFuse was introduced to security printers and document makers in 2009 as a new and highly integrated polycarbonate film that helps protect government-issued identity documents such as passports, national identity documents and driver’s licenses against counterfeiting and tampering. “With HoloFuse, JDSU technology experts

J

developed a completely new way to protect the integrity of high security identity documents,” said Scott Magnacca, Director of Sales for Advanced Optical Technologies at JDSU. “JDSU is honored to receive more industry accolades that recognise our continued commitment to creating solutions that help reduce fraud.” JDSU has won four industry awards for HoloFuse since its inception in May 2009. In November 2009, JDSU received the acclaimed Sesames Award during the annual 2009 CARTES IDentification conference event and also received the 2009 IHMA Excellence in Holography Award from the International Hologram Manufacturer’s Association. HoloFuse is the first solution that helps

prevent counterfeiting efforts by adding secure holographic security features to polycarbonate cards without the use of an adhesive layer, which is currently prone to attack by document forgers. In addition, providing an integrated solution simplifies the manufacturing process for card and identity document makers. The partially transparent and customised hologram within the polycarbonate film includes overt, covert and forensic security features that make it difficult to reproduce. JDSU’s technology also better preserves the hologram, making it brighter and easier to identify.

Reader Enquiry 16

Reader Enquiry 104

May-June 2010 |13


North America

NEWS Code in Camera Graphics Packaging International and Shorewood Packaging, to offer turn-key service to Fortune 500 marketers

global leader in mobile barcode solutions, Scanbuy, has announced an enhancement to its ScanLife Code Management Platform which will revolutionise how marketers use packaging to communicate with consumers. 'ScanLife Packaging Connect' will now allow any product manufacturer to link their existing UPC or EAN barcodes to specific digital information related to the item. Now, in one click on the mobile device, brand owners can provide access to relevant digital content including recipe ideas, product demo videos, coupon offers, social network feeds and much more. In order to facilitate this turnkey solution, Scanbuy is continuing its relationship with Augme Technologies Inc. Augme, will provide a platform that enables brands to quickly and efficiently create fully branded, mobile formatted content to enhance the consumer experience, effectively mobilising product packaging. This complete solution is being immediately offered by Graphic Packaging International and Shorewood Packaging (International Paper) who provide services to some of the leading food, beverage and consumer products companies around the globe. Over the next 12 months, thousands of products will be activated on the ScanLife Packaging Connect system to give cell phone users immediate access to valuable information from recipes to coupon offers. "Barcodes can be found on virtually any package around the world, so this technology gives brands an easy way to deliver information to the consumer whether they are

A

14| May-June 2010

at home or in the store," said Jonathan Bulkeley, Chief Executive Officer of Scanbuy. "While price comparison information is great for certain categories, like consumer electronics, it does not provide value for the thousands of products we use every day. The ScanLife Packaging Connect solution will link our millions of users to content which the brand can control." The ScanLife mobile application was recently upgraded for the major Smartphone platforms, Android, BlackBerry and iPhone, to read one dimensional barcodes like UPC, EAN and ISBN. Consumers can scan product codes on consumer electronics, books, and DVD's to see price comparisons and consumer reviews. ScanLife is already distributed on tens of millions of camera phones globally, and it is the only barcode reader being pre-loaded in countries like the United States, Mexico, and Spain. Marketers can leverage this network of users to reach an audience that is using their mobile device to search for product information. In fact, a recent study by Compete found that 52% of smartphone users are looking up product descriptions in-store. "The integrated offering created by this partnership is a first-of-its-kind application for mobile marketing, which is consistent with the mission of Augme," said Augme CEO Mark Severini. "Scanbuy's market leading mobile scanning capabilities combined with the full power of the AD LIFE platform creates an immediate opportunity for packaging companies to augment the value of their packaging by bringing to life the products they sell for the mobile consumer." A number of consumer brands have already

registered their UPC codes, including DROID by Motorola and independently owned Function Drinks. For example, a consumer can use the ScanLife app to capture the UPC barcode on the DROID package to view a menu of options including product features, photos, a television commercial, and a link to purchase the device via Amazon Mobile. Charlie Brignac, GPI's Marketing Manager for Winning at Retail, said: "For almost 40 years, the UPC has played an integral role in the final stage of a consumer purchase. With the advent of mobile UPC activation, that same well established industry standard now plays a much broader and more interactive role -- assisting the consumer in making final purchase decisions at the point of sale." Some of the most popular new phones come with an autofocus camera, which is needed to read UPC barcodes including the DROID by Motorola, BlackBerry Tour, and iPhone 3GS. People can download the free application from their mobile phones at www.getscanlife.com. The app is also available from Android Market, BlackBerry App World(TM), and Apple's App Store. In addition to 1D barcodes, the ScanLife application also reads popular 2D barcode formats like Datamatrix, EZcode, and QR which are used in printed material like magazines, store displays, and outdoor signage. Thousands of businesses have created accounts to manage their 2D barcode campaigns on the ScanLife Code Management Platform.

Reader Enquiry 17


North America

NEWS Partners in crime fighting Foster+Freeman enhances authentication capabilities with graphic security systems’ patented software ecently, Graphic Security Systems Corporation and Foster+Freeman signed a License Agreement, which authorises combined usage of F+F’s software along with GSSC’s SI (Scrambled Indicia) Digital Decoding technology and IP, becoming an official licensee of GSSC. The software will be used to digitally authenticate VIP, VIPhoto and IPI in all major passports and ID documents worldwide. Foster+ Freeman, a leading U.K. manufacturer of high resolution multi-spectral imaging devices, will offer GSSC’s SI Digital Decoding software in its systems such as the “VSC 6000,” a comprehensive digital imaging platform, which facilitates document examiners with an extensive range of utilities for detecting irregularities on altered and counterfeit documents. The VSC 6000 is equipped with a highresolution colour camera and zoom lens, in addition to a range of viewing filters and multiple illumination sources – from white light

R

to UV and IR, of various wavelengths. Instrument functions are selected and controlled through a simple graphical user interface. “We are always striving to collaborate with the key players in the security and authentication market, to offer our customers innovative solutions for their needs”, explains Scott Perkins, GSSC Chief Operating Officer. “By implementing GSSC’s SI Digital Decoding software, in combination with Foster+Freeman imaging devices, document examiners will be able to authenticate VIPhoto and other common security features in one step”. VIPhoto, which is part of the Scrambled Indicia technology portfolio, developed by Graphic Security Systems Corporation, allows invisible personalised data to be integrated or hidden into a facial photo or background in variable form, making identity documents extremely resistant to tampering or alteration. It is currently in use on multiple ID cards, driver’s licenses and passports, worldwide. With nearly 30 years in the document and

brand protection industry, GSSC offers complete solutions in the area of encoding and authentication using precision optical and digital processes, as well as multifunctional and interoperable mobile verification devices. Established in 1978, Foster+Freeman has become one of the foremost forensic science equipment suppliers in the world, exporting market leading, and in many cases unique products to more than 140 countries. F+F products are designed to assist in finding evidence at scenes of crime and in performing detailed forensic investigations in the laboratory. F+F customers include all major police and forensic science laboratories as well as government agencies, commercial and private organisations such as homeland security, immigration authorities, security printers, lottery companies, insurance companies, university departments and national libraries.

Reader Enquiry 18

3M Introduces New Optically Variable Device Color Floating Image Security Laminate provides overt and covert security M Security Systems have introduced the Colour Floating Image Security Laminate, a new optically variable device (OVD) that offers a high level of overt and covert security. The heat activated laminate can be provided in various formats for use on secure documents such as ID cards, passports and drivers licenses, and will assist customers in enhancing their document authentication measures while helping to provide durable protection and enhance tamper evidence. The Colour Floating Image is a customised image that dramatically moves and appears to “float” above and sink below the surface of the document. The images can incorporate one- or two-colour line art graphics, custom designed for each client. Multiple interdependent layers of overt, covert and forensic security features are incorporated into the laminate to enhance document authentication and

3

protection from counterfeiting. Overt features of the security laminate include its high transparency, matte finish, and silky surface feel, which allows for tactile verification of the document’s authenticity. This combination of overt features allows authorities to quickly and easily verify documents without the use of special tools. Additionally, the laminate’s high clarity allows visibility of print in the document. Covert security features include a kinetic micro text which is embedded within the overt Colour Floating Image feature and can be viewed under 10x magnification. A retro reflective feature is also embedded within the Colour Floating Image feature and can be seen under a focused light source. For an added layer of security, forensic analysis of the component materials can be performed. 3M offers a custom designed combination of these features to each client, and can provide covert and forensic features on a confidential basis.

“The Color Floating Image Security Laminate is an impressive step forward in OVDs,” said Mathias Detjen, Business Manager, 3M Security Systems. “The sophisticated inter-layering of the overt and covert features helps to make documents more difficult to mimic, while still simple to verify in the field.” 3M Security Systems began with security materials and, to the company’s knowledge, after three decades, its technologies have not been successfully counterfeited. Through a strong commitment to research and development, 3M continues to lead the industry with proprietary solutions – security materials, software and high-security print and electronic technologies for secure document and product authentication.

Reader Enquiry 19

May-June 2010 |15


Focus on Technology Special World Cup Feature

The battle for the world cup kicks off by Randall Burgess

The FIFA World Cup Finals in South Africa are happening as we go to press. For the qualifiers dreaming of lifting the trophy in Johannesburg’s sparkling, new Soccer City Stadium in July, the countdown to the kick-off is well underway. Sadly, the same is true for counterfeiters and fraudsters. While the battle among the world’s top players on the pitch begins on June 11, the off-the-pitch brand and product protection battle is already underway. It pits FIFA, sponsors, merchandising partners and teams of IP lawyers on one hand against those who will seek to cash in illegally on the 19th FIFA World Cup. In the lead up to first whistle, Randall Burgess from the International Authentication Association (IAA) explores the problems faced by major sporting events, from counterfeit and sub-standard merchandise through to illegal ticket sales. He also looks at the growing role authentication and anti-counterfeiting technologies are playing in fighting back – and advises how other brand managers can learn valuable lessons. porting events are big business and the spin-off sales from merchandise are worth millions. The FIFA World Cup – the world’s biggest sporting event – typically attracts a global viewing audience of more than 30 billion and is expected to rake in more than £300 million for the organising committee alone. The first corporate sponsorship programme for the World Cup (Spain, 1982) generated $19 million from nine sponsors. This is nothing compared to the sums paid by 15 partners and six official suppliers of the last finals in Germany. Internationally known brands including Adidas, Emirates and Budweiser paid up to $50 million each to supply products and associate their brands with the event. With such riches on offer, it’s little surprise that the World Cup, Olympics and other

S

16| May-June 2010

popular sports (FA Premier League, NFL, NHL to name but a few) are prime targets for brand pirates. Among the multitude of complex problems encountered across these sports are counterfeit, sub-standard and unauthorised merchandise; illegal and black market tickets; improper use of logos and trademarks and ambush marketing. Each of these will be exercising lawyers and customs officials before the finals begin. Licensed merchandise - from replica football kits through to tee-shirts, programmes, scarves and mascots – are among the biggest targets. More than 3million counterfeit products were seized worldwide before and during the 2002 World Cup tournament while organisers of the Beijing Olympics were faced with countless street traders brazenly selling unauthorised merchandise (often mascots) outside key venues.

The situation encountered by the organisers of the 2010 Vancouver Winter Olympics highlights the growing challenge for both organisers and licensees who pay millions for their contracts. Brand police recently uncovered counterfeit shirts emblazoned with the Games’ inukshuk logo being sold across the country by a major retail chain. The shirts, which were counterfeit versions of a product made by an official partner, were supplied to the retail chain by a regular supplier. Counterfeit and unlicensed products are a global phenomenon, affecting small villages and back streets right up to big retail stores in major cities. The dual impact of globalisation and growth of the internet has made the problem considerably more acute – and a major challenge for FIFA and its partners in policing the use of images, logos and goods. With supply chains lengthened, there is


Focus on Technology Special World Cup Feature greater opportunity for counterfeit and unauthorised goods to permeate the market. The edges of once geographically-based markets become blurred and it is increasingly difficult to maintain brand image and security by selling only in premium channels. The rise of the internet has been a particular problem affecting the distribution of tickets for major sporting events. The growth in sites selling tickets has made policing more difficult and posed new and serious security problems on the ground. There is also a burgeoning grey market economy where legitimate goods are produced in unauthorised quantities or diverted to a market in which a retailer has no right to sell them. This was certainly true ahead of the Beijing Olympics when subcontractors working for the company making official mascots supplied goods in unauthorised quantities. Taken together (counterfeits, unauthorised and diverted goods, piracy, IP infringements and ambush marketing) present a complex web for brand managers of major sporting events and their merchandisers to cut through. They threaten revenue streams, erode margins, damage corporate reputations, add extra stress to distributor and retailer relationships and generally open up the opportunity for service and warranty fraud on a grand scale.

Striking back But in spite of the obvious problems FIFA and its partners are fighting back. Millions have been spent enforcing trademarks; tackling IP infringements; anti-counterfeiting drives and working in close alliances with governments and customs and excise departments around the world. FIFA itself was forced to wise up to the IP law after the 1998 World Cup in France when ambush marketing by a non-sponsor obscured coverage given to Adidas. There has been a far more aggressive pursuit of those falling foul of the law since then. FIFA logged 2,000 violations of IP during the 2006 World Cup – including going head-to-head with Korean electronics giant LG, which sponsored a World Cup supplement in a

Holographic security and track & trace functionality set to foil fraudsters at this month’s Soccer World Cup in South Africa.

magazine without permission. It’s a lesson that others have been quick to follow. In 2002, UK soccer club Arsenal took a sole trader to court for selling unofficial goods and passing off the club’s trademark outside its Highbury (London) ground. A clear sign of Premier League clubs flexing their muscles and becoming savvier in protecting and enforcing the integrity of their brands. But it’s in the area of authentication, anticounterfeiting and security features where big sporting brands like FIFA and its partners have flexed their muscles most. They now have in their armoury a growing array of security devices – both sensory and digital to authenticate and identify products, improve inventory control and track and trace goods through the supply chain. A huge amount of time and money has been invested by sportswear manufacturers with a multitude of technologies incorporated on products and packaging from holograms and

security labels to tags, inks, serial numbers and RFID (radio-frequency identification) features. These can be used for on-the-spot identification of replica shirts and linked to online databases capable of tracking and tracing their whereabouts anytime. At the 2006 World Cup in Germany branded labels and swing tags with a holographic decal were produced for every single piece of FIFA branded licensed merchandise. Personalised tags were produced for individual licensees making for easy, intuitive first level recognition. The complexity of this operation is underlined by the fact the 2006 tournament involved 170 licences and the delivery of labels to 400 different locations worldwide. Other major sports are also embracing such technology. Formula One teams protect their identities and official merchandise in this way, while all of America’s major leagues are using labels and tags to varying degrees to protect

May-June 2010 |17


Focus on Technology Special Wold Cup Feature

reputation, brand image and, importantly, revenue streams which annually top several billion dollars. Since sports merchandising spiralled in the 1980s so have these technologies. They are critical in helping licensors protect their brands – stopping counterfeiting and grey market diversion – and also protecting their revenues by helping them to collect royalties from licensees. For the licensee too, there is the benefit of product security and the guarantee that the premium price paid for official merchandise is not undercut. Devices increasingly incorporate more than one security feature. As well as the obvious depth, colour and switching effects of labels and tags, there are secondary features which are less likely to be noticed visually by the consumer to add extra security. Some require a magnifying glass for inspection and are used by in-the-field enforcement teams. Third level features, verifiable only with the aid of sophisticated equipment, are also present. This includes unique serial numbers allotted to individual products and shipments allowing products to be tracked and traced through online portals and databases to the point of delivery. In Germany in 2006, official labels and tags were shipped to approved licensees and factories, with the volumes and serial numbers logged. Enforcement officers could then verify goods by checking their serial number online. This simple and speedy authentication process is an integral element of the system; the easier it is for officials to check, the more chance there is of picking up the fakes. Ticketing is another concern for promoters of sporting events. Here too major steps are being taken in using the latest technology to crackdown on counterfeits; stopping the escalating black market in secondary ticket sales and boosting security inside stadia. Tickets at the 2006 World Cup (3.5 million) and the Beijing Olympics (15 million) included RFID chips (Radio-frequency identification) that allowed the name of the purchaser to be written onto the ticket and then read by scanners at the stadium. While no personal

18| May-June 2010

information was contained on the ticket, a ticket’s serial number was linked to a database detailing information about the ticket holder. Although not fool proof – a high power FIFA official was sent home after passing tickets onto family members – these initiatives have been hailed a success. They could help to tackle the global secondary ticket market, which is estimated to be worth between $2 and $25 billion annually. World Cup tickets for sale on e-bay reached a reported $3000 (average ticket prices were only $180) with no assurance the buyer would be able to enter the stadium. Long-term, contactless smart cards which are already being used by some Premier League football clubs could come to replace paper tickets.

End game The increasingly sophisticated brand protection systems being embraced by sporting brands today create a ‘win-win’ for everyone but the counterfeiters. It’s a lesson in vigilance that’s applicable to all brands and products the world over. For FIFA, other major sporting events, leagues and major clubs, it’s an essential way of protecting brand equity, preserving quality standards and protecting royalties. These are vital to securing investment and sponsorship for future events and developing their product. For licensees, effective brand protection preserves the value of a substantial investment in a licence, product manufacture and marketing. It also protects against the potential damage to reputation and profits caused by counterfeit goods. And, ultimately, it’s the customer at the end of the supply chain benefits considerably. For footy fans – which number billions the world over – whether it’s a serial number, a label, tag or hologram, it’s the guarantee that what is

paid for is genuine. Ultimately, this should be a quality branded product, with a little genuine World Cup or Olympic magic built in. The success of these authentication technologies and strategies in combating the counterfeiters is illustrated clearly by the 3 million plus good seized and the 2,500 IP infringements reported during the last World Cup. This must be reinforced and many sports retailers will certainly be reviewing their authentication and anti-counterfeiting ahead of the World Cup. Alongside this, however, efforts must still be made to influence consumer attitudes. One of the intractable problems in tackling counterfeiting and piracy is the attitude of consumers. Many people are still willing to purchase goods they know are not official or unauthorised. In spite of all the authentication and anticounterfeiting technologies available, educating consumers about the problems of fakes remains paramount. It’s up to brand managers, manufacturers and users of these technologies to explain the benefits and the dangers of turning a blind eye. For without this commitment, the battle is difficult to win and brand protection is less effective.


Product & Image Security was launched to meet the growing international demand for information concerning the problems of counterfeiting, forgery, product piracy, substitution and diversion as well as retail theft and product tampering. The publication discusses the solutions and technology available to combat these worldwide problems without compromising the security of the technologies reviewed. The magazine constantly features articles relating to high security documents such as currency, identity cards, passports, smart cards and travel tokens. Other areas of coverage are product identification authentication, traceability, brand image protection and security labels, including tags, tickets and packaging seals.

The magazine is targeted towards the retail packaging and high security printing sectors of the market and is distributed to Government Departments, Banks and Financial Institutions as well as end users in manufacturing together with Retailers and Brand Managers. Product & Image Security Magazine is the only way for this expanding, specialised industrial sector to keep abreast of the rapidly changing developments occurring in the wider security print market. With a highly developed reader enquiry service the publication offers a direct response medium to advertisers and news providers who require quick networking and communication in the world of 'Product & Image Security'.

www.productandimagesecurity.co.uk

Reader Enquiry 105

Reader Enquiry 106

Sometimes what you know is as important as who you know In the world of document and product related crime it is important to understand the issues as well as being able to prescribe the correct countermeasures. Knowing the right people helps too, but as both solutions and solution providers are in a state of perpetual change it’s often difficult to keep abreast of the issues that drive the industry forward. We offer what we believe to be a unique service to the security related print market. The service is focussed on keeping our members up to date and informed about document and product related crime and how these risks can be managed in an effective manner. Through our enquiry hotline, website database, publications, associate conferences and websites we provide our members with up to date information and contacts in a fast changing market. Since information is power—get informed now! Associate membership starts at £375 ($700) Faxback enquiry form +44 1827 281143

Name………………………………………………… Position ………………………………………………… Company Name ………………………………………………. Address ………………………………….. ………………………………………………………………………. Post/Zip ………………………………….. Country …………………………………… Tel ……………………………. Fax …………………………... Product & Image Security Foundation, 81 Houting, Dosthill, Tamworth B77 1PB, U.K. Tel/Fax. +44 1827 281143. www.worldwidesecurityexchange.com/PISFintro.html Reader Enquiry 107

Registered in the UK as a non profit making company. Company Number 4105205


Nigel Page takes a further look at the world of security through the eyes of the airtime reload card producers – and their customers Nigel Page AMIEx

The mobile network airtime reload card, or scratch card to give it its more universal nomenclature, has been an instrumental part of the phenomenal growth of prepaid mobile telephony in the world’s emerging economies over the past decade or so. While technological developments in prepaid systems have now annexed some of this space, the traditional scratch card still has a future. In part one of this special feature, published in the March April edition of Product & Image Security, the author provided a detailed account of how important materials, design and marketing strategy are in this highly specialised sector of the security printing market. In our concluding feature we review the most effective security print devices and manufacturing methods deployed in the air time read card security industry and how important procedures such as distribution, data application and quality testing impact on the needs of this market and of course its customers.

How are airtime reload cards printed & personalised? What production methods are employed? It is possible to produce cards via varying processes and these are very much manufacturer specific. From a card manufacturer’s perspective, in broad terms unpersonalised base stock is

20| May-June 2010

printed using both lithographic and flexographic print disciplines and can be produced on both web and sheet fed presses. The ‘cut single’ ISO card route employed by Atlantic Zeiser ‘Cardline’ type suppliers takes pre-printed and pre-cut base stock and feeds card bodies in single file down a track at high speed, typically 25-30,000 cards per hour. The numbers unique to each card are applied in sequence from a pre-loaded data file and verified by camera prior to the application of the scratch off product further down the line, again under camera supervision. Scratch off in this environment is either label or hot stamp foil. Cards are then collated at the end of this process and advance to the wrapping stage. The labour content in this environment is quite low, thus containing a significant element of cost for the supplier. ISO format cards produced carrying silk screen latex panels are usually personalised in sheet form from lithographic pre-printed base stock. The data panel is usually hit with 2 or more layers of scratch ink and then overprinted with a security pattern, usually bleeding over all 4 edges for additional security. Cards advance to the wrapping stage after checking, cutting and profiling. Labour content in this environment is usually more complex, due to the increased number of production processes involved. However, quality and aesthetics of the finished card stock is usually high. The third broad production process applies to the high speed web fed flexographic process, where card stock can be printed, personalised

and protected in one continuous process, depending on individual machine specifications. While this process tends to favour the nonISO formats, a number of enterprising suppliers of machines in cooperation with card manufacturers have adapted or developed solutions to produce very cost-effective ISO format cards using this production route. One such machine supplier is Edale Limited, based in the UK. Edale’s Head of Sales & Marketing, Jeremy Westcott told ‘Product & Image Security’ during a recent discussion, “Edale supplied its first phonecard production machine into Australia in 2001, and since then we’ve made further installations all over the world, including the emerging markets of Nigeria & Vietnam”. Jeremy continued, “There is a large amount of interest for these systems in the security markets of Africa, India and South East Asia due to the high population density in these parts of the world and low levels of personal


bank account usage. Prepaid scratch cards provide an easy way for people to use their mobile phone with the credit paid for in cash rather than any form of electronic top up more normally seen in the developed world”. The current generation Edale system is capable of producing in excess of 1.2 million cards per shift, with the next generation set to produce more than double this quantity. The addition of special options allows the line speed to be greatly increased as well as improving press-ready set up. “It is no surprise that we have a high level of interest from these markets for this system”, Jeremy added. In line with the third type of production methodology detailed above, the Edale system

works in an entirely flexographic environment for base print and scratch off zones. The variable data is applied by thermal inkjet cartridge technology. This modular system provides great versatility, enabling the press to be adapted to the different levels of security requirements necessary for different customers. Irrespective of manufacturing route deployed, Simon Collins, Technical Director of Praesidium Limited, a consultancy specialising in the telecoms industry, notes that, “A critical part of ensuring security of the product during the manufacturing process is for operators to ensure that stringent security and quality audits are undertaken; the focus being to validate that

manufacturers operate in line with stringent security standards and that practices are actually evidenced to the auditor.” “We at Praesidium have undertaken numerous security audits of prepaid voucher manufacturers globally and we’ve witnessed varying levels of security measures incorporated within the production facilities. The problem is that there are no recognised telecoms industry standards for voucher production and this is where specialist consultancy can support both the vendor and the networks they supply. Our service provides manufacturers with the confidence that their facilities are protecting the interests of their clients and delivers a benchmark on the level

solutions FLEXOGRAPHIC PRINTING

DIGITAL PRINTING

COMMERCIAL SECURITY

SPECIALITY CONVERTING

www.edale.com info@edale.com +44 (O) 1489 56923O

Reader Enquiry 108

May-June 2010 |21


What security features do they carry? Why?

of security standards against the world’s leading manufacturing facilities. We also believe it serves to demonstrate to the network operator that vendors have a defined level of security protection to their prepaid product”. “From a voucher security perspective the manufacturing environment plays a pivotal role in providing end-to-end security management, but industry wide the position varies from vendor to vendor. Irrespective of the level of security incorporated into a voucher’s technical specification and design, it is the level of security control and security protocols within the vendor that ultimately ensures an operator receives a secure product to the highest standards possible”. he continued. If security related processes and controls are weak in any area of the manufacturing process including secure data management, printing and personalisation, this can result in a number of key security risks. For example, this could include the PIN codes being visible during the process and therefore provide potential for compromise. Defective vouchers that aren’t correctly managed out of the process and the duplication of PIN codes are other areas of concern from a security perspective. Potentially, there are a range of manufacturing failings which could result in the operator experiencing security issues or even the manufacture of counterfeit vouchers. Therefore any purchaser of airtime reload cards needs to carefully appraise the suppliers print resources beforehand to ensure all the risks associated with quality failures and copy attacks are mitigated.

22| May-June 2010

As we’ve already discussed, a recharge voucher is effectively a network’s own currency, and therefore needs to be protected from fraudulent or counterfeit activity. Features deployed can be both overt & covert in their nature and there is no ‘silver bullet’ answer as to what is right or wrong. We’ve already discussed key areas such as substrate and scratch off protection, and in truth these areas account for the vast majority of on-card security. It shouldn’t be possible to delaminate, or separate, the board to enable the PIN code to be compromised, and ideally the board should contain a coloured centre to inhibit the passage of high intensity light through the card. The box area onto which the unique data is applied should be protected with a cocktail of inks to create a confusion panel and scratch panels should be specifically opaque enough to provide full integrity. Simple print features like micro-text and UV inks could be employed, but as the card needs to be verified at the point of purchase, often in the hustle and bustle of a city street, these features are not really appropriate for immediate analysis, rather being a back office function and by then it is too late. In real terms, the card must be readily identifiable as legitimate to the consumer, and this means the physical features we’ve already talked about. Overprint on the scratch off area, a holographic hot stamp foil or non generic label are the key areas to focus on. “The first key issue is PIN security”, says Securi-Tech’s Martin Horn. “The second is resistance to copying and counterfeiting, which is achieved by a variety of methods. Overt methods include the use of UV inks or overlaid patterns in UV varnishes. These are primarily to deter simple photo-copying by low-level fraudsters. Covert features include microprinting and other items not visible to the untrained eye. These can then be used by suitably qualified specialists to distinguish genuine from fake cards, in the event of a more

sophisticated mass counterfeiting attempt. However, due to the inherent security of the telecoms operators’ back office billing systems, the opportunity for fraudsters to make significant money from mass-counterfeiting is so diminished in many markets that clients no longer require these extra cost features”. John Drinkwater of Holographic Security Innovations comments, “From a manufacturer’s viewpoint, and assuming all these areas are achievable, much of the security comes from the unique number control and traceability of the cards using the network’s and the manufacturer’s IT, all the way down to single card tracking level if needed”. Praesidium’s Simon Collins sums it up this way, “There are a number of security features which can be incorporated into a voucher’s specification and overall design. However, these usually incur higher production costs and operators’ budgetary constraints, or lack of consideration to security, mean features are not readily incorporated”.

Data transfer, application and integrity control – how are these achieved? Data is the DNA of the scratch card and is where the millions of dollars of airtime revenue are contained. It is provided to the vendor in encrypted form, the complicated algorithms used are a closely guarded secret. Until recently, data files were burned to disk in the country of origin and despatched via any one of a number of international couriers to the manufacturing partner, usually in a separate country. This involved not only delay in receiving the files, but there was also the risk of the package failing to arrive, or arriving in a damaged state. Data files could be corrupted or having missing number ranges and these issues invalidated the data requiring it to be re-sent, causing further delay and re-scheduling of production in extreme cases. Passwords would normally be sent by SMS. More recently, networks have started to deposit data (and artwork files) in sFTP


© KURZ 2010

(secure File Transfer Protocol) sites with secure login procedures hosted by the manufacturer. These ‘electronic mailboxes’ clearly enable real-time transfer of information and accurate and speedy response times from the vendor to any issues encountered with such data receipts. Praesidium’s Simon Collins told us, “The key aspect from a security perspective is that the network operator is assured that the PIN code data is securely encrypted, transferred and managed by the vendor under strict data and information security requirements, normally in line with internationally recognised standards. Auditable controls and processes must be in place at both ends to ensure ‘closed loop’ data management of the PIN

code files”. He continued, “This must encompass the PIN code transfer and encryption process from the operator to the manufacturer, internal transfer to the production environment, storage and destruction processes. There should be a robust re-make procedure in place in the event of card spoilage to avoid duplicates and missing cards from the sequence, and at each relevant point the parties should be able to demonstrate that security is in place and this should be part of any planned auditing”. As stated earlier, it is particularly important to have internationally recognised security credentials and more and more networks will only work with vendors who have these in place.

Card packaging – which methods provide the best security against theft or card attack prior to final consumer use? Before formats changed to include the newer non-ISO card variants, packaging of recharge cards was pretty straightforward. Cards were simply individually flow wrapped in either clear or printed BOPP film, pretty much like a chocolate bar, down commercially available flow wrap lines before being collated and labelled in batches, usually 10 cards per batch and 10 batches per carton. 10 cartons were then further boxed in shipper cartons and labelled before final transit packaging such as pallets or wooden crates. What we basically

The Proven and Secure Choice:

Scratch-off foils from KURZ

KURZ holographic scratch-off foils are the smart way to conceal numbers on prepaid cards. They enable optimal data protection as the code cannot be read through the foil, and any attempt to remove the foil is immediately evident. The barrier to counterfeiting is also high because the holographic foils are equipped with security features used in the brand protection sector. Both overt and covert counterfeit protection elements can be incorporated into the foils. Protect your cards with KURZ‘s wide range of established security technology solutions.

LEONHARD KURZ Stiftung & Co. KG · Schwabacher Str. 482 · 90763 Fuerth/Germany · Phone: +49 911 71 41-0 · www.kurz.de Reader Enquiry 109

May-June 2010 |23


Specialist production equipment, available from Edale, ensures that security issues are addressed when applying scratch coatings.

had was an easy to follow trail of hierarchy (110-100-1000). There were unique variations on a theme, but this was basically the template for card packing. High speed wrapping lines for ISO cards were introduced a few years ago and a range of suppliers developed broadly similar solutions, including Germany’s Atlantic Zeiser & Köra-Packmat as well as Italy’s Ilapak. These solutions enhanced what had gone before, but provided new thinking on card packing. Instead of cards being wrapped individually in ‘candy wrap’, these solutions enabled cards to be fed into fast moving continuous pouches in a ‘string’ configuration before being cut at variable string lengths to suit individual specifications. The strings would then be collated into a ‘z-fold’ single card footprint before being over wrapped and batch labelled. The net effect of this was to radically improve output speeds of finished cards while enhancing the numbers of cards per pallet or crate, thus reducing freight costs. The impact of the newer low cost formats has seen some alternative thinking to these products. Designed to be quick turnaround and high volume, high repeat purchase

24| May-June 2010

products, packaging has adapted to meet through its own retail channel. Super dealers these benchmarks. then feed the remaining secondary, tertiary and In certain cases, the ‘bricks’ of vouchers are beyond network of re-sellers right down to the not wrapped at all, merely sleeved in sequential street vendor. It is at this very level of the supply number and labelled with the number range chain that the dealer must be able to afford to and other key data before being bulk boxed buy the minimum unit of issue or the system and despatched. While the product doesn’t breaks down. Of course, cards can be sold at downscale the data integrity on the voucher any time to a consumer in this process, but the itself, the ‘budget’ nature of the product bigger dealers are more flexible in this regard. dictates a lower specification of packaging. In What we experience in many cases is many cases, the airtime reload value is so significant effort being applied at the small per individual voucher section that it is manufacturing end to ensure robust packaging not worth the fraudster’s time to attempt to and wrap security for this to be obliterated in compromise these cards when the higher the market place. value cards would occupy just as much time in Simon Collins told us, “In our experience the doing so. best type of voucher packaging uses an In other cases, and as evidenced by a ultrasonic seal for individual vouchers. Ideally number of operators, cards are flow wrapped in the traditional way in multiple sheets per pack with individual numbers ,EADER IN (IGH 3ECURITY 3CRATCH #ARDS VOUCHERS of sheets per pack being 0RINT #APACITY OF OVER MILLION 0).S PER MONTH decided by networks individually. In all cases, it is important to understand $2 $2 $2 $2 $2 that the market dictates pack quantities, not manufacturers, as it is all $2 $2 $2 $2 $2 about ‘pack value’ through the supply chain. It is important that integrity is maintained right up until the individual packs s WORLD 7IDE 3HIPPING themselves are broken s -ULTIPLE 0LANT ,OCATIONS FOR 0RODUCTION 2EDUNDANCY open, and at this level the s 3ECURE $ATA -ANAGEMENT $EPARTMENT sub dealer of the sub s TRACEABILITY FOR 0).S IN 0RODUCTION AND 3HIPPING dealer needs to be able s YEARS %XPERIENCE IN 3ECURE VOUCHER -ANUFACTURING to afford to buy his stock. What we need to understand here is that the network can only sell its airtime once. This is to 2OUTE s -ONSEy, NY 10952 4 a select group of ‘super TOLL &REE s Tel: +1-845-426-2300 dealers’ who are Web: www.Tele-Pak.com s Email: 3ALES Tele-Pak.com incentivised with volume discounts or directly Reader Enquiry 110

SECURE SCRATCH CARD


the seal should be as close to the edge of the card as possible, so that when the voucher is removed it shows visible damage to the packet. This prevents the card being removed, compromised and replaced. Additional measures to incorporate the operator’s name and / or logo in the seal can be deployed, although at extra cost”. “Secure tamper-evident tape should be used on transit cartons to prevent tampering during the distribution process and ideally the outer box or pallet should not display the exact contents to avoid opportunistic theft”. As with other areas of this discussion, there is no right or wrong way to look at this. Operators and manufacturers have to constantly balance the security, risk and cost factors in their card programmes and to a degree decisions made by one network versus another will vary, even in the same country.

Card imports – what are the freight implications of transporting high value documents? What can freight companies do to ensure secure transportation from point of manufacturer to the client’s nominated destination? While there is a move to localise supply in many markets, it is inevitable that cards need to be shipped from one country to another where networks continue to specify external suppliers. It isn’t sufficient to expect general carriers to handle this type of product, particularly after all the effort that goes into producing it in a secure environment initially and the onward warehousing and distribution surrounding the product when eventually passed into the operator’s custody. Peter Reynolds, Managing Director of Artac Logistics Ltd, a specialist forwarder of sensitive and valuable freight based in Southern England told ‘Product & Image Security’ during a recent wide ranging conversation, “Artac offers a comprehensive range of airfreight products to meet our customers’ needs, all supported by the latest IT systems and track

and trace facilities. Airport to airport or door to door services, regular consolidations worldwide, urgent express movements, courier services and import customs clearance form part of our day to day activities”. “We currently work with a number of UK security printers and component suppliers, as well as businesses located overseas so we’re fully conversant with the demands of shipping secure freight in ‘closed loop’ situation, including into less stable parts of the world. Whatever the airfreight needs, Artac has the right solution to ensure its clients’ goods are safely transported and delivered on time to their destination through a choice of reliable, cost effective services”. Using charter aircraft can assist with planning, storage, distribution and can prove cost effective. In addition to providing dedicated charter aircraft it can also pay to consider part charters and' empty legs' which can reduce costs.

user’s perspective. “If I was a customer, I’d be wondering if the card was genuine and is my money safe. I’d be concerned if the number had been accessed or used before I bought the card”. “Wearing my industry hat, I’d be proposing tamper evident scratch panels to the network or their suppliers, based around high opacity holographic foil for public recognition security. Labels less so. They can be lifted and the numbers accessed, although I concede that they’re better at preventing over-scratch”. Simon Collins has the following views. “From a user’s position, the risk is mitigated to some degree because if a customer finds that the PIN code has been compromised, or there is an over-scratch issue, then most operators or

What are the main risks associated with using the cards? From a user perspective? From a provider perspective? Former GSM Africa Fraud Forum Chairman and internationally respected fraud expert, Abdul Mia’s view is that it breaks down into two key areas. “For the user it is about theft or loss, and for the network it is about the costs of running a card programme, particularly in production, warehousing and distribution terms”. John Drinkwater thinks along similar lines from the

Reader Enquiry 111

May-June 2010 |25


the point of sale will usually replace the voucher or load the airtime remotely via a customer service centre. However, from a commercial viewpoint this isn’t viewed as good customer PR as subscribers lose confidence quickly in the product, and there are rival networks available”. “The risk for networks”, he continued, “is far higher as a security incident where the PIN code is compromised, or a large number of complaints over security are received would usually mean the network losing faith in the supplying manufacturer and potentially cessation of supply and legal redress. Alternatively, the network could demand the whole production run is undertaken again, or that they’re financially compensated which would be a huge financial exposure for the manufacturer”. From the card manufacturer’s perspective Martin Horn comments “The risks depend on the quality of the card product and the security and reliability of the card manufacturer’s physical and data processes”. To date not a single incident of fraud has been reported by any of our clients in connection with SecuriTech prepaid cards. In addition, our new Tuff Voucher technology significantly reduces the risks associated with over scratch for both the telecoms operators and their consumers”.

What forensic testing takes place? Is this done internally or via external laboratories? From the author’s experience, forensic testing procedures are deployed right across the spectrum of the industry from card manufacturers with in-house laboratory facilities through to personnel specifically employed by networks in Revenue Assurance and Fraud departmental positions and on to 3rd party specialists and consultancies. Reputable manufacturers in the main have at

26| May-June 2010

least some in-house facilities and in certain cases they work with specialist consultancies to ‘health check’ the internal results. Such tests can include abrasion testing, sophisticated light show through tests at various points on the UV and IR spectrum, climate testing and so on. Jannie Bester from Pro Scripto again, “I’ve been doing vulnerability assessments on physical recharge cards for the past seven years, and during this period I’ve assessed many thousands of cards for various networks, card manufacturers, and card component suppliers worldwide”. “We look at opacity, scratch off characteristics, counterfeit vulnerability, covert security features and mechanical access to the PIN code. We assess according to the ‘reasonable man’ test and this doesn’t involve expensive equipment, but rather cost-effective equipment available to the reasonable man”. “I’ve also developed a custom scoring system to measure recharge card technical compliance with the network’s specifications, and during the past seven years, I’ve also developed forensic methodology to examine counterfeit vouchers and gather forensic technical detail for expert forensic document examination evidence regarding authenticity issues”. As a former GSM Africa Fraud Forum Chairman, Abdul Mia remains keen to see some standards across the industry implemented by the GSMA, similar to the SAS scheme (SIM Accreditation Scheme). “I’m very passionate about this”, he said, “and I’ve tried for a long time to introduce something similar into the recharge card area. But the problem with this is that there are too many players in the market, and markets like Nigeria have regulations as to who can and can’t produce cards for the local networks. This makes it difficult to implement some decent regulations, but I still believe there is scope for this. Some efforts have been made and there is some headway, but there is still a long way to go to get this right”.

Quality testing of prepaid vouchers for manufacturers and networks is a key area of work for the external testing business. Service should be aimed at providing manufacturers with a benchmark relating to the security and quality standards of their own product with those offered by other leading suppliers. The following provides an indication of the testing procedures necessary: • Artwork review – to determine the colours used, positioning of the diffusion panel and the ease with which counterfeiting could occur. • Voucher body – evaluation of the actual material being used and the specification – plastic, paper, thickness and opacity. • Physical protection – assessing the physical protection of the PIN code relating to numbering, spacing, scratch off panel integrity and ‘remove and replace’ type attack opportunities. • Specific testing – subjecting the vouchers to a number of specific tests involving: light sources of varying intensity and wavelength; heat, steam and cold in varying conditions; solvents and adhesives; inherent security measures (specific product features); scratch panel adhesion and quality; brute force attacks. • PIN code printing – assessing printing effectiveness to identify how many PIN code digits can be identified based on the various testing scenarios from partial to full reveal. • Production quality – assessing the production quality to determine consistency within the product being produced. • External packaging – evaluation of the external packaging to test against the feasibility for ‘remove, compromise and replace’ techniques”. John Drinkwater concurred with our other experts’ views on what the industry should be testing for, although he had this to add to the debate. “Most plants have developed their own tests to use internally, but most major networks tend to use outside technical specialists occasionally”.


“There are some outside testing forensic agencies offering services in this area to varying standards although it is important they remain impartial between techniques and suppliers to avoid distorting the market. It is also important that they use techniques that reflect ‘real world’ challenges in the market place”.

What is the future for prepaid airtime reload cards? As we’ve seen from earlier comments, the physical card has been a mainstay of prepaid recharge for many years and our experts see no reason for that to change for some years to come. Until infrastructures in some of the developing world catch up with more advanced economies, then the scratch card will continue to play its part. The unquenchable thirst for mobile communications in these parts of the world shows no sign of slowing down, and while other technologies nibble away at its place at the table and the format may evolve and change, no other method of recharge can offer the depth of marketing opportunities for networks to tap into their customers’ requirements. We’ve not even fully considered what other applications the physical card may have. In cash based economies and where other services are required, such as power and water, there may be additional opportunities for the scratch card in these utility areas. After all, the mobile phone when all is said and done is another utility service. It is just that the fruit in this area hangs much lower for providers. Martin Horn’s view is worth noting. “Secure scratch cards still fill many slots in the airtime distribution model which cannot be adequately serviced by other methods, especially in developing markets. At this stage, overall card volumes are still growing; particularly in the case of low denomination values. As telecoms operators increasingly use micro-recharge offerings to penetrate deeper into these markets, the numbers of scratch cards they use continues to grow. As a consequence, the

telecoms operators also seek to control their costs by continuing to drive unit card prices lower”. “I therefore foresee a scenario where lower volume scratch card manufacturers might cease to be viable, especially given the significant security, IT and quality-related overheads necessary to produce reliable scratch card products. Therefore, some fall-out and/or consolidation amongst the scratch card manufacturers could well occur”. Abdul Mia concludes, “prepaid airtime reload cards will be in developing markets for a long time to come”. Jannie Bester of Pro Scripto Document Examination CC based in Pretoria concurs with this view, telling us, “Recharge vouchers have a good few years of life left yet”. And the view of the author? I hope so...it’s where I earn my living.

Nigel Page AMIEx has approaching 25 years sales experience, and since 2004 has sold prepaid recharge cards into the African market for BemroseBooth Limited, a UK based security printer. Following a short break, during which this article was conceived, nurtured and delivered, Nigel has now joined Germany’s Cairon Group GmbH (www.cairon.com) as International Sales Manager and can be contacted at n.page@cairon.com

Pro Scripto Document Examination CC Ledwaba Office Park Suite 1, 873 Church Street Arcadia, Pretoria South Africa Tel: +27 12 430 6499 Mobile: +27 83 273 3410 Email: proscrip@mweb.co.za

Peter Reynolds Managing Director Artac Logistics Limited Anglia Cargo Terminal Priors Way Coggeshall Essex CO6 1TL United Kingdom Mobile: +44 7713 506 565 Tel: +44 1376 566 000 Fax: +44 1376 564 442 Mail: pr@artac.com / freight@artac.com Website: www.artac.com

Dr John Drinkwater Holographic Security Innovations The Hub IQ Farnborough Fowler Avenue Farnborough Hampshire GU14 7JF United Kingdom Tel + 44 1252 625614; Cell + 44 7825 261730 & +44 7988 749454 Email: john.drinkwater@holographicinnovations.com www.holographic-innovations.com

Pietro Saia Senior Consultant Praesidium Services Davidson House Forbury Square Reading Berkshire RG1 3EU United Kingdom Tel: +44 118 900 1054 Fax: +44 118 900 1055 Mobile: +44 7958 693 858 Email: pietro.saia@praesidium.com / admin@praesidium.com Web: www.praesidium.com

May-June 2010 |27


One to One Creating chaos Could artificial randomisation be the key to product and document security?

Artificial chaos is like an extreme state of disorder, a concept that is familiar to us all at one time on another. Parents who return to a room after the children have been playing will be greeted by the vista of discarded toys scattered about at random.

ikewise, take a pinch of sugar and fling it on a tabletop and it will create a different pattern every time. Now try to re-create that pattern – exactly; and you understand the process behind artificial randomisation. During the last Security Document Word Conference in London, our Editor talked with Christian Guichard of Prooftag about what makes artificial randomisation such an attractive feature for securing sensitive documents and products against counterfeit attacks. “Our product displays the application of what we term ‘the first deployment of visible manufacturable chaos”. Says Christian Guichard, Director of International Development of Prooftag™. The product produced by Prooftag involves the indiscriminate infusion of bubbles into a plastic tag. The bubbles are similar in size to those you can see in a fizzy drink, or a glass of sparkling wine for that matter. The ‘Bubble Tag’ is the result of a chaotic self-generation of bubbles, in various layers, within a transparent polymer. There are no technical means of reproducing these threedimensional bubble codes as it is impossible to regenerate features with identical shapes, sizes and positions of the original within a counterfeit material. The process depends upon its ‘randomisation’ for security, and systems that

L

28| May-June 2010

Bubble Tag is used to protect an ID Card

are difficult or impossible to replicate have stronger potential since they provide such a highly complex authentication device, that the effort required to ‘breach’ the system is more expensive than the anticipated gain in doing so. “Classic authentication technologies are mass-produced and can therefore be massreproduced. Only technologies that cannot be reproduced by their own manufacturers can provide the assurance of efficient protection against forgery.” Christian added.

Previously employed by the French security label and decal supplier Fasver, Christian joined Prooftag last year to strengthen their international marketing effort. The Company was formed in France in 2004 by Novatec in order to exploit a feature that was originally identified as an imperfection in the production of rigid transparent plastic material. The spontaneous, accidental generation of bubbles in the polymer was recognised as a unique signature that had applications in product protection. Prooftag is


One to One

CHATEAUX Canon-la-Gaffelière has deployed Bubble Tag to thwart counterfeit and refill attacks

the exclusive licensee for the product and now boasts a number of applications in brand protection as well as document security. The manufacturing process involves a ‘reactor’ more than an extrusion system. PVC and a specific formula of polymer are fed into a tunnel and the bubbles form naturally in the substrate through the injection of air. The output is a clear plastic sheet between 350 microns and 800 microns in thickness. The higher depth material is required for fabrication in credit and ID card applications. Sheets of product are then cut into ‘labels’ and combined with tamper evident resins to form a self adhesive label. Tamper evidence is important since this prevents authentic tags being re-circulated from discarded waste packaging after products have been used. After creating the random bubble code the ‘feature’ is enrolled into a database. Each bubble is digitally mapped and its position recorded by exposing the label to direct light

beamed at a number of different angles. Each beam reflects an image at each exposure, creating a three dimensional series of ‘bright spots’ that can be used to generate a template. This template is of course unique to each label and forms its own product biometric that can be used later for authentication. During enrolment each series of ‘bubble features’ is given a unique reference number or identifier which may include a 2D barcode. The reference number acts as a signpost to the bubble template stored in the database. Once the ‘bubble tags’ and reference numbers are enrolled they can be linked to other data and act as certification tokens for products and documents. In ID systems for instance the unique bubble pattern can be stored in template structure within a chip and in this form each document carries its own authentication biometric. By linking this ‘document biometric’ to a physical holder’s

biometric you produce a document that is impossible to counterfeit since the bubble tag, once enrolled cannot be reproduced in a form that would be recognised by the system. In these highly secure ID system applications it is necessary to validate the tags in real-time using hand held readers that are linked through private networks or via the internet to secure databases that can confirm the authenticity of the token being presented. In brand protection applications where lower levels of security are acceptable the first level of control may be carried out visually. Since the Bubble Tag image can be stored in an online database as a picture file registered under the unique identification number printed on the tag, it is accessible via a PC, a PDA, or a mobile phone with an Internet connection. The number printed near the Bubble Tag gives access to the image stored in the database and allows a discrete visual comparison. This mode of control is extremely

May-June 2010 |29


One to One

Bubble Tag label showing authentication detail in close up

simple and it is reported that more than 99.5% of people who have tested it are able to carry out a visual comparison in less than 5 seconds. It is not necessary to make a full comparison. It is easier to make a comparison through similarities than by differences. For this, users are advised to choose a unique characteristic of the Bubble Tag and find this characteristic on the image. To assist this process the image can be visually broken down into quartiles and the bubble size, shape and position compared initially in one quartile only to make the process even easier for visual verification. “Tags are available in a variety of form factors so that they are compatible with each application. In brand protection programs they can be supplied on rolls as self adhesive disc shaped decals or as metallised self adhesive labels. For identity applications the tags can be integrated into ID cards or polycarbonate machine readable passport data pages”. Christian continues. “Prooftag has gained impressive early traction as an authentication technology in a short space of time. More than a dozen systems have been deployed in the last year or so ranging from anti-counterfeiting programs to protect premier wine products in the USA and France through to security document systems in the Ivory Coast and Benin. We have also installed a gem stone

30| May-June 2010

verification system in Switzerland that organises certificates of authenticity through the Swiss Institute of Gemmology”. He added. Last July a Californian vineyard chose Prooftag to protect the provenance of its 2007 vintage Montelena Cabernet Sauvignon. This follows the success of the product in a number of other great wineries in France such as Domaine Ponsot who will protect vintages (on bottling) from 2007 onwards with tamperproof bubble tags fixed to the bottle closure. Likewise Grand Crus wines from the Bordeaux region bottled by Neipperg, which introduced traceability and authentication in the form of a serialised 2D barcode linked to a unique ‘bubble tag’ label, will also be secured. The fine wine industry, whilst at risk from fakes and refilling attacks, has resisted the introduction of sophisticated authentication methods for a number of years. Up to recently though it’s fair to say the fakes have been pretty poor imitations, only fooling novice collectors. However an increase in prices during the last decade and the popularity of vintage wine has led to experienced collectors being duped into spending serious amounts of money on rare vintages. “A great Burgundy can fetch €500 a bottle and for a rare favoured vintage €1800 can be paid. That’s €300 a glass! At these prices you

want to be certain of the provenance of a wine especially if you plan to lay it down for drinking years from now. Finding it’s a fake when you come to drink it on a special occasion would be a disaster. The advantage of Bubble Tag is that it provides a reliable solution compared with traditional visible coding which has the disadvantage of being easily copied”. Christian stated. “We now have the products of 28 Châteaux and Estates protected by Prooftag and one Cognac producer is also using our system. Together they account for over 4 million bottles protected by Prooftag”. He concluded. It’s fair to say that the success of Prooftag, in a relatively short period of time has been impressive. It goes to prove that you can live in chaos - and off fresh air - as long as it comes in the form of tiny bubbles.

Reader Enquiry 21


Court Cases Day of Justice More than $143 Million in Seizures from traffickers in Counterfeit Network Hardware peration Network Raider, a domestic and international enforcement initiative targeting the illegal distribution of counterfeit network hardware manufactured in China, has resulted in 30 felony convictions and more than 700 seizures of counterfeit Cisco network hardware and labels with an estimated retail value of more than $143 million. The results of the operation were announced by Assistant Attorney General Lanny A. Breuer of the Criminal Division, Assistant Director Gordon Snow of the FBI’s Cyber Division, Assistant Secretary John Morton of U.S. Immigration and Customs Enforcement (ICE) and Commissioner Alan Bersin of U.S. Customs and Border Protection (CBP). In addition to the convictions and seizures, according to the CBP there has been a 75 percent decrease in seizures of counterfeit network hardware at U.S. borders from 2008 to 2009. In addition, nine individuals are facing trial and another eight defendants are awaiting sentencing. This operation was a joint initiative by the FBI, ICE and CBP working with the U.S. Attorneys’ Offices around the country, the Criminal Division’s Computer Crime and Intellectual Property Section and the National Intellectual Property Rights Coordination Center. Through aggressive investigation and prosecution, the initiative sought to protect computer networks and the nation’s IT infrastructure from failures associated with counterfeit network hardware, including network routers, switches, network cards, and devices that protect firewalls and secure communications that have been intercepted both domestically and abroad. As a part of this joint initiative, Ehab Ashoor, 49, a Saudi Citizen who resides in Sugarland, Texas, was sentenced in the Southern District of Texas to 51 months in prison and ordered to pay $119,400 in restitution to Cisco Systems. A federal jury found Ashoor guilty on Jan. 22, 2010, of charges related to his trafficking in

O

counterfeit Cisco products. According to evidence presented at trial, Ashoor purchased counterfeit Cisco Gigabit Interface Converters (GBICs) from an online vendor in China with the intention of selling them to the U.S. Department of Defense for use by U.S. Marine Corps personnel operating in Iraq. The computer network for which the GBICs were intended is used by the U.S. Marine Corps to transmit troop movements, relay intelligence and maintain security for a military base west of Fallujah, Iraq. The case was investigated by ICE and the Defense Criminal Investigative Service and was prosecuted by the U.S. Attorney’s Office for the Southern District of Texas.

In total, ICE and CBP seized more than 94,000 counterfeit Cisco network components and labels with a total estimated retail value of more than $86 million

On Jan. 25, 2010, in the Central District of California, Yongcai Li, 33, a resident of China, was sentenced to 30 months in prison and ordered to pay $790,683 in restitution to Cisco Systems Inc., as a result of his conviction for trafficking in counterfeit Cisco computer products. Li carried out the scheme while doing business as Gaoyi Tech, a company located in Shenzhen, China. Li procured counterfeit Cisco products in China in response to orders and then shipped the products to the United States. Li was arrested by FBI agents in January 2009 while visiting Las Vegas and was prosecuted in Los Angeles. This case was investigated by the FBI and prosecuted by the U.S. Attorney’s Office for the Central District of California. "Trafficking in counterfeit computer components is a problem that spans the globe and impacts most, if not all, major network equipment manufacturers. As this operation demonstrates, sustained cooperation between law enforcement and

the private sector is often a critical factor in disrupting and dismantling criminal organisations that threaten our economy and endanger public safety," said Assistant Attorney General Breuer. "Through the IP Task Force, and with recently announced additional resources, we are intensely focused on bringing to justice those who engage in piracy and counterfeiting." To date, ICE agents have seized counterfeit Cisco products having an estimated retail value of more than $35 million. ICE investigations have led to eight indictments and felony convictions to date. CBP has made 537 seizures of counterfeit Cisco network hardware since 2005, and 47 seizures of Cisco labels for counterfeit products. In total, ICE and CBP seized more than 94,000 counterfeit Cisco network components and labels with a total estimated retail value of more than $86 million during the course of the operation. "These cases involve greedy businessmen hocking counterfeit and substandard hardware to any buyer - whether it could affect the health and safety of others in a hospital setting or the security of our troops on the battlefield," said John Morton, Assistant Secretary of Homeland Security for ICE. "They pose a triple threat to our nation by stealing from our economy, threatening U.S. jobs and potentially putting the safety of our citizens at risk." "Operation Network Raider is an outstanding example of cooperation between CBP and its law enforcement partners to combat counterfeiting that threatens our economy," said CBP Commissioner Alan Bersin. "Protecting businesses against these threats is a top priority for CBP, and we are committed to continuing our work with law enforcement and the private sector to ensure the safety and security of the American people." The FBI, building upon its earlier success in Operation Cisco Raider, worked closely with law enforcement partners including ICE, Defense Criminal Investigative Service,

May-June 2010 |31


Court Cases General Services Administration, Department of Interior, Internal Revenue Service and the Royal Canadian Mounted Police. During the last four years as part of Operation Network Raider and Cisco Raider, the FBI has executed 36 search warrants seizing counterfeit network components with an estimated retail value of more than $7 million. "Individuals who break the law by attempting to profit from counterfeit technology do the marketplace great harm," said FBI Assistant Director Gordon M. Snow. "This case illustrates how effectively the private sector and law enforcement organizations work together to combat fraudulent goods and preserve the integrity of U.S. computer networks and infrastructure." To date, international enforcement efforts have resulted in five convictions

internationally, including one in Canada and four in China. Foreign investigations have led to seizures in France, China and Canada totalling $17 million worth of counterfeit networking equipment. U.S. law enforcement authorities continue to work with China’s Ministry of Public Security (MPS) to combat the manufacture and export of counterfeit network hardware from China. This ongoing work is being facilitated by the IP Criminal Enforcement Working Group of the U.S. - China Joint Liaison Group for law enforcement, which is co-chaired by the Criminal Division and the MPS. The Working Group is dedicated to increasing cooperation in intellectual property enforcement efforts and pursuing more joint IP criminal investigations with China. The global nature of the problem of trafficking in counterfeit electronics is further

reflected in seizures of counterfeit semiconductor devices. From November 2007 to present, CBP and ICE have made more than 1,300 seizures involving 5.6 million counterfeit semiconductor devices. Semiconductors are used extensively in modern products and their proper functioning is critical to the safe and reliable operation of electronics in the aerospace, military, automotive, communications, industrial and consumer electronics sectors. More than 50 seized counterfeit shipments were falsely marked as military or aerospace grade devices. Shipments of seized semiconductors were affixed with counterfeit trademarks from 87 North American, Asian and European semiconductor companies and were destined for importers in the United States and 15 other countries.

Nintendo Files Lawsuit against Repeat Piracy Offender Legal Action Reflects Global Efforts to Combat Video Game Piracy

n the ongoing fight against video game piracy worldwide, Nintendo of America Inc. has filed a civil lawsuit against the owner of multiple websites that sell illegal video game copiers. Nintendo filed suit on May 11 in the Western District of Washington against the owner of NXPGAME of Queens, New York. Nintendo investigated a website owned by NXPGAME and found that it was selling illegal video game copiers that enable the user to download, play and distribute illegal copies of Nintendo DS™ and Nintendo DSi™ video game software. After multiple letters and telephone calls from Nintendo’s legal counsel, the owner agreed to cease selling game copiers and closed his website. Shortly thereafter, the owner launched an identical business at a different website address, and redirected people who visited his old site to the new one to purchase illegal game copiers. Despite the repeated attempts to get

I

32| May-June 2010

NXPGAME Inc. to cease its illegal activities, the company and its owner continue to operate multiple websites that sell illegal game copiers. Nintendo asserts that NXPGAME is wilfully infringing on the company’s intellectual property rights. Additionally, one of the company’s websites uses Nintendo registered trademarks and

“Using game copiers to play unauthorized downloaded games is illegal and it’s wrong”

violates Nintendo’s copyrights. “Using game copiers to play unauthorised downloaded games is illegal and it’s wrong,” said Jodi Daugherty, Nintendo of America’s senior director of Anti-Piracy. “Piracy is especially harmful to smaller developers. When their creative works are stolen and copied illegally, some companies find it difficult to survive economically.”

Internet piracy hurts Nintendo, as well as the businesses of more than 1,400 video gamedevelopment companies that depend on legitimate sales of games for their survival. “I love gaming and I spent years of hard work and a significant personal financial investment to make my video game dream a reality,” said Alex Neuse, CEO of Gaijin Games, the developer of the BIT.TRIP series of games available on the WiiWare™ service. “But I estimate that more than 70 percent of our games that are in the hands of the public have been copied illegally. Every download that is made illegally is another blow against new and original games. Put simply, if you enjoy a company’s games, paying for them helps to ensure that they will continue to make products you’ll like. Piracy especially hurts small independent developers who don’t command the sales figures/profits that the bigger companies do; and that ultimately hurts not only developers but all gamers.”


Court Cases This lawsuit follows the 2009 Nintendo v. Chan case, in which a U.S. District Court in Los Angeles confirmed that game copiers violate the Digital Millennium Copyright Act and are deemed illegal in the United States. The U.S. District Court ruled that devices such as the R4 copier infringe on Nintendo’s intellectual property rights. In that case, the court ordered Chan and the three major websites that he operated to stop selling the illegal devices immediately. Game copiers are designed to connect to

the Nintendo DS, Nintendo DS Lite and Nintendo DSi hand-held systems and circumvent the technological protection measures embedded in the system. This infringes on Nintendo’s intellectual property rights. These game copiers are then used to copy and play illegal Nintendo game files offered unlawfully via the Internet. Illegal copying of video game software is an international problem that continues to plague the video game industry. Companies such as Nintendo, various law-enforcement

authorities and trade organisations like the Entertainment Software Association continue to take aggressive steps to prevent the proliferation of these devices on a global scale, and similar results are being achieved in many countries. Since 2009, Nintendo has supported almost 1,500 legal actions (including customs seizures, lawenforcement actions and civil proceedings) in more than 20 countries that have resulted in the confiscation of more than 422,000 video game copiers.

International smuggling ring used Baltimore as port of entry n international counterfeiting ring smuggled tens of millions of dollars worth of fake Coach handbags, Nike sneakers, Gucci shoes and Cartier watches into the United States though the Port of Baltimore, federal authorities said recently in announcing the indictment of the ring's members. In the culmination of a two-year undercover investigation, a federal grand jury in Baltimore indicted nine people in a scheme to bring the bogus goods, made in Malaysia and China, into the country. In a related investigation, London police also arrested six suspects and collected fake Versace, Ralph Lauren, Gucci and Nike clothes, shoes and other items, in what officials said is among the largest seizures ever of counterfeit goods in England. “This was not a mom-and-pop organisation,” said John Morton, a U.S. Immigration and Customs assistant secretary, at a news conference. “This was organised crime on a grand scale. Millions were made by crooks, millions were lost by legitimate U.S. companies.” Authorities said the ring planned to expand

A

to counterfeit drugs next, and last September, one of the defendants sent a sample of counterfeit Viagra to a business in Maryland in hopes of finding a market. The Maryland business, which purported to import and export products without paying taxes and customs duties, was actually part of the government’s undercover operation. Officials won’t say how they first got wind of the ring. But when a container filled with 10,000 pairs of counterfeit Nike sneakers entered the Baltimore port in May 2008, undercover Immigration and Customs Enforcement officers who had infiltrated the ring were there to receive it, according to court papers. The next month, the undercover officers delivered the sneakers to defendants in Brooklyn and were paid a $25,000 smuggling fee in cash. The shipping containers kept coming, court papers say. First, thousands more Nike sneakers. Then, in January 2009, a container arrived with 25,000 fake Coach bags. That April, about 10,000 pairs of bogus Coach and Gucci shoes arrived. In total, the ring smuggled in 500,000 fake

Coach bags, 120,00 pairs of counterfeit Nike shoes, 10,000 pairs of bogus Gucci and Coach shoes and 500 counterfeit Cartier watches, the indictment alleges. The undercover officers were paid a smuggling fee for the deliveries. But they also were given tens of thousands of dollars of additional cash, and instructions to wire that money to accounts in Malaysia or a company in Asia. That cash was “laundered” through the undercover business, authorities said. The fake items were headed to New York or New Jersey, where they would make their way onto the streets, into stores or to Internet sales sites. "Most people don’t think twice about the Nike sneakers, Coach handbags, Gucci shoes and Cartier watches sold on the streets, in stores and over the Internet that aren’t what they appear to be," said U.S. Attorney Rod J. Rosenstein. But he said supporting the counterfeit market cheats U.S. companies and employees. The defendants face charges including conspiracy to smuggle goods into the United States, trafficking in counterfeit goods and money laundering.

May-June 2010 |33


The Security Card Centre HDFC Bank Kicks off Commercial Migration of EMV Credit Cards DFC Bank, one of India’s premier banks, has become one of the first Indian banks to supply credit cards compliant with the global EMV standard to its premium-segment customers nationwide. The 500,000 smart cards for the commercial launch phase that will run until March 2011 are being supplied by the Indian subsidiary of security technology specialists Giesecke & Devrient (G&D). This initiative significantly boosts the Indian subcontinent’s migration to EMV, from standard magnetic stripe formats to chipbased smart cards. These cards are based on complex and advanced technology and will provide the highest standard of security. This further enhances the security of electronic payment systems. HDFC Bank has started its migration to the EMV standard with credit and forex prepaid smart-card products on the Visa platform. HDFC Bank also plans to issue EMV smart debit cards in the near future. Going forward, these smart cards will also serve as a multiapplication platform. Applications being considered include a customer loyalty program and an electronic purse. Announcing this migration plan, Mr. A. Rajan, Group Head-Operations, HDFC Bank said: “We want to offer our customers the benefit of modern, secure EMV cards and safeguard them from fraudulent skimming and misuse of their credit cards.” He added, “As a leading credit-card issuer in India with more than 4.8 million cardholders, HDFC Bank fulfils the needs of all customer segments from individual users through small and medium enterprises to large corporations by offering a wide product range in both Visa and MasterCard® versions. Our bank has been a pioneer in leveraging technology for card transaction security, customer service and operational efficiency. Throughout the time we have been dealing with G&D, we have

H

34| May-June 2010

always valued them as an innovative and reliable partner for payment systems and we are happy to entrust them with this vital project of EMV migration.” Mr. Parag Rao, Executive Vice President and Head – Credit Cards, HDFC Bank stated, “EMV cards offer the highest level of security to our customers especially against data compromise at the point New secure EMV cards issued in India of sale.” He further said, offer safeguards from fraudulent skimming and misuse “HDFC Bank is initially targeting its premium customers by offering to international standard for chip-based upgrade existing signature-based cards to payment systems originally developed by the smart cards. We will also focus on customers three organisations Europay International who frequently travel overseas. The bank aims (now MasterCard Europe), MasterCard and to issue over 500,000 smart credit cards to Visa. customers by March 2011.” HDFC Bank was set up in 1995, promoted The HDFC Bank is also one of the leading by the Housing Development Finance players in the “merchant acquiring” business Corporation (HDFC), India's leading housing in the Indian market and has already finance company. HDFC Bank is one of India's equipped a substantial proportion of its premier banks providing a wide range of deployed POS terminals to accept EMV smart financial products and services to its 19 cards. million customers across hundreds of Indian “G&D has been working intensively on EMV cities. Its multiple distribution channels include migration in many countries. In India, HDFC a pan-Indian network of branches, ATMs, Bank has given us a head start in the EMV phone banking, online banking and mobile migration business. Thanks to the experts at banking services. Within a relatively short our Indian subsidiary, we have been in a span of time, the bank has emerged as a position to provide complete EMV project leading player in retail banking, wholesale consulting and operations support for HDFC banking, and treasury operations, its three Bank,” confirms Axel Deininger, Head of the principal business segments. Payment division at G&D. The bank’s distinctive competitive strength India ranks as one of the world’s fastest- lies in the use of technology and the ability to growing markets for cards. Some 270 million deliver world-class service with rapid payment cards are estimated to be in response times. Over the last 16 years, the circulation in India as of December 2009, and bank has steadily gained market share in its the annual growth rates in this area lie at over target customer franchises while maintaining 25 percent. About seventy percent of Indian healthy profitability and asset quality. cash dispensers and point-of-sale (POS) As of March 31, 2010, the bank has a terminals are already equipped to operate distribution network with 1,725 branches and with EMV cards. EMV is the name of the 4,232 networked ATMs in 779 cities.


The Security Card Centre INSIDE Contactless MicroPass Shipments Top 200 Million Units Strong Growth Continues for Contactless Payment Card Deployments eaffirming its position as the dominant supplier of contactless payment platforms globally, INSIDE Contactless, a leading provider of advanced, open-standard contactless chip technologies, says that shipments of its award-winning MicroPass® intelligent payment platform have surpassed the 200 million unit mark, with production volume doubling in the 18 months since reaching 100 million units in November 2008. Since its introduction at CARTES 2005 in Paris, the MicroPass platform has become regarded as the gold standard for contactless payments, and has made steady gains in new applications, in new form factors and new markets as the use of contactless technology becomes more widespread. MicroPass is available from all major bank card brand certified manufacturers in North America and now powers more contactless bank cards than any other core technology available in the market. “Our shipments of MicroPass platforms have surged since late 2009, with multiple issuers

R

converting major portfolios to contactless cards powered by MicroPass,” said Charles Walton, executive vice president for INSIDE Contactless. “Contactless chip technology is inevitable for the payments industry, providing increased security for payment transactions and enabling Near Field Communication mobile phone payments.” According to Walton, the versatility of INSIDE’s MicroPass platform has enabled it to expand into new applications, new form factors and new markets. This includes the MicroPass 4003-S core prelam technology, which powers sticker products for contactless payments on mobile phones and other devices, the EMV-compliant MicroPass 6000 dual-interface platform, the MicroPass 5100 platform for lightweight ICAO ID cards and documents and MicroPass 4001 and 5001 for transit, access control and other markets. The rapid deployment growth of MicroPass from zero to 200Mu shipped in less than 5 years is unprecedented in the contactless market, and attributable to the low power, flexible core architecture, extensive application suite, and strong card manufacturing partner

community that has developed around MicroPass. Last year, INSIDE opened a new operational facility in Bangkok, Thailand to increase its production capacity to meet an anticipated demand of up to 500 million MicroPass contactless payment microprocessors annually. Consumers enjoy added convenience, speed and ease of use afforded by contactless payments, while issuers and merchants enjoy faster transaction times, increased spending per transaction, lower operational costs and penetration into the cash payment market. The MicroPass intelligent payment platform is designed to power open standard contactless and dual-interface bank card payments along with other value-added applications in all global regions. Based upon a RISC architecture and optimised to the demanding requirements of contactless transactions, each of the MicroPass family of products is designed to meet the demands of issuer organizations in the bank card and mobile payments, transit, ID and access control markets.

Green credentials Strong alliance boosts companies’ reach into high security government ID projects SW Microtec AG, a supplier of RFID components and inlays for secure credentials, is supplying LaserCard Corporation, a provider of secure ID solutions, with innovative, custom-designed KSW Thinlams® for the new contactless U.S. Permanent Resident Card (Green Card). The U.S. Department of Homeland Security (DHS) began issuing the new card on May 11, 2010. The new card’s innovative structure is a technological success resulting from the companies’ strong collaborative alliance. KSW developed a customized RFID Thinlam®

K

optimised to uniquely match the physical characteristics of LaserCard’s credential platform. Thinlam® with a thickness down to 270µm is commonly used manufacturing government ID documents including passports, driver’s licenses as well as identity cards and are also widely used in the epayment sector. The next generation Green Card utilises LaserCard’s tamper-proof and highly counterfeit resistant optical security media as its key visual and physical security feature and the integrated RFID tag to provide compliance with the Western Hemisphere Travel Initiative.

The Radio Frequency Identification (RFID) capability allows officers at borders and ports of entry to read the card from a distance and compare it immediately to file data. The optical security media enables authorities and inspection agents to make a confident judgment about card authenticity and visual identification of the cardholder even when electronic readers are not available. The combined technologies set a new, higher standard for international government ID card programs. “KSW’s trend-setting RFID technology for ultrathin pre-laminates and inlays based on

May-June 2010 |35


The Security Card Centre polycarbonate and LaserCard’s optical media based identity cards, widely recognised as being the most secure, ensure optimum solutions for customers in the high-security ID market,” said Thomas Hitzer, CEO of KSW Microtec. Building on their complementary expertise, advanced technologies and specialisation in high security identity programs, the two companies are gaining wide recognition in the global ID security industry. Chris Dyball, chief operating officer of

LaserCard Corporation said, “The winning combination of LaserCard’s expertise in secure identity credential solutions and KSW Microtec’s experience in the production of RFID components for high-security applications assured the development of a rugged, reliable credential, designed to meet and exceed our customer’s requirements. We see significant opportunities in the further collaboration of our companies.” KSW Microtec AG, with its headquarters in

Germany, is a leading supplier of RFID (Radio Frequency Identification) components for applications such as eTicketing, ePayment, Asset Management, access control and high security. KSW combines successful high-end wafer processing, extremely efficient assembly technology and far-reaching expertise in design. KSW has earned itself a leading position on the market as one of the most efficient, and simultaneously most flexible, producers of RFID components.

NBS Technologies announces its latest software application to personalise NFCenabled devices for the Payment Industry Developed by its in-house software group, UbiQ Software, NBS Technologies releases its latest application to support the personalization of NFC-enabled devices. BS Technologies Inc., a provider of hardware and software solutions for card personalisation, secure ID, EMV® compliance/migration, smart card and semiconductor equipment solutions for financial institutions, governments, and corporations worldwide, has announced the addition of a Near Field Communications (”NFC”) application to its tried and tested suite of personalisation software, UbiQPersoMaster™. NFC technology is a short-range wireless connectivity technology built upon existing contactless technology which can be built in to a variety of devices. NFC is both a “read” and “write” technology and provides communication between two NFC-compatible devices when they are brought within four centimetres of one another: a simple wave or touch can establish an NFC connection. NFC-enabled transactions are inherently secure because the transmission range is so short. The underlying layers of NFC technology follow universally implemented ISO, ECMA, and ETSI standards. NBS’s UbiQPersoMaster software application is aimed at the personalization of NFC devices to enable secure financial transactions.

N

36| May-June 2010

“We felt that our foray into NFC-enabled personalisation was a logical step for UbiQ Software, since we have had extensive success within the card personalisation software business. It’s very exciting,” says Ron Stephenson, Director, UbiQ Software, “This new application allows your mobile phone to also be your credit card - it makes your cell phone almost the only thing you need to carry with you - a truly multi-purpose device for consumers.” Financial institutions utilising this application can effectively personalise a customer’s NFCenabled mobile phone with their credit card information – similar to the current contactless credit card, a customer’s mobile phone is now waved in front of the NFC-enabled POS terminal and the purchase registers on the customer’s account. NBS’ most recent implementation of UbiQPersoMaster’s NFC personalization software application was through a partnership with one of the world’s largest credit card companies. The project included the personalization of NFC-enabled cell phones to allow for credit card transactions – the application proved to be both easy to implement and very robust. NBS has also successfully developed and

tested an NFC-enabled RFID device, which is inserted into the phone post-issuance. The issuance of an NFC enabled RFID device allows for larger batch production of personalised devices which can be sent to bureaus and provides attractive cost efficiencies. Either option takes advantage of the same UbiQPersoMaster software application allowing for standardization and ease of maintenance. This NFC personalisation application is also an available solution for instant issuance at the branch level using NBS’ Xpressi branch and instant issuance software, also developed UbiQ Software. A simple contactless reader/writer device is all that is required. The NFC phone needs only to be placed near the reader/write to allow personalisation. Device authentication is utilised along with end-to-end encryption to ensure data integrity and security. “The allure of convenience and ease of use for consumers and businesses alike will surely drive the demand for this new technology and we expect NBS to be at the forefront of NFC personalization application development.” said Ron Stephenson. NBS will continue to work with its technology partners to bring this solution to the masses.


Asian Perspective Survey reveals shocking results BIS cites Asia as primary source of counterfeit electronic components nstances of counterfeit electronic components continue to rise despite increased efforts at both corporate and governmental levels to fight this crime. According to the U.S. Bureau of Industry and Security, fake parts persist in threatening the health of the industry supply chain. Incidents of parts counterfeiting reported by component suppliers, including companies in the semiconductor sector, shot up "dramatically" to 9,356 in 2008, up about 142 percent, from 3,868 in 2005, according to the Bureau, which said China, Taiwan, the Philippines, Malaysia and India were identified as the primary sources of counterfeit products by suppliers surveyed recently. "The number of counterfeit incidents encountered by original component manufacturers (OCMs) shows the seriousness of the counterfeiting issue”. The Bureau said in a recent report. "OCMs that experienced counterfeits most frequently cited parts brokers as a source of counterfeit parts, followed by independent distributors and Internet-exclusive suppliers."

I

In 2007, the U.S. Defence Department commissioned the Bureau of Industry and Security's Office of Technology Evaluation, part of the Commerce Department, to conduct a survey of the electronic industrial base following concerns rising incidents of component counterfeiting could endanger the military equipment supply chain. The Bureau subsequently surveyed five segments of the U.S. electronic supply chain, including component vendors, distributors and brokers, circuit board assemblers, contractors and subcontractors and agencies of the DoD. The survey of 387 companies and organisations revealed extensive problems in the electronic industry supply chain and showed counterfeiters are targeting discrete products as well as microcircuits with "fake non-working parts" or "working copies of the original designs." Some counterfeit parts were also "new products re-marked as higher grade product," the Bureau said, adding that many of the new parts would work "but not at the desired level of functionality." "The majority of counterfeit parts are being

discovered because they are returned as defective, exhibit poor performance, or have incorrect markings or physical appearance," the Bureau said in is report. "A significant number of counterfeit incidents were uncovered because the customer suspected the parts were counterfeit." Counterfeiters are lured by the easy profit they can make from pouring fake or substandard products into the supply chain and also because it is often very easy to introduce their counterfeit products into the system. Many manufacturers, for instance, have limited resources for testing returned parts while OEMs who buy from the secondary markets often have no way of identifying counterfeit products until customers returned finished equipment because they either failed or performed below expectations. Furthermore, "Sixty seven percent of OCMs producing discrete components and 33 percent of OCMs producing microcircuit products do not maintain databases on either the counterfeit parts encountered or the incidents reported to them," the Bureau recorded.

Fake Pharma clamp down in Madras n a move to wipe out the menace of the illegal pharmaceutical trade across India’s Tamil Nadu region, Chief Minister M Karunanidhi recently instructed senior officials of both the Health and Police departments to take severe action against all those involved in the manufacturing and distribution of expired and spurious drugs. "The Chief Minister asked officials to deal firmly with defaulters - medical firms as well as medical shops selling such drugs or other inter-state gangs and take stringent action against them," a recent state government press release informed. The authorities are cracking down following the demise of a three-year-old girl in Chennai (Madras) after consuming an expired drug. In a high profile meeting attended by senior ministers of the government, the chief minister summed up the situation and stressed that more stringent measures be deployed to unearth and

I

dismantle rackets that involved pharmaceutical fraud, the effects of which were flourishing in both small and big towns in the region. Manufacturing and trading in adulterated and substandard drugs continues to pose a major threat to public health, and Karunanidhi expressed the urgent need to create further awareness among the public on the issue. Taking a tough stand he stated that no leniency will be displayed to anyone found violating the rules. Health Secretary V K Subburaj stated, “Further, the police should find any inter-State links in this regard. Steps will be taken to cancel the licences of the pharmaceutical outlets that sell spurious drugs, and life sentences will be imposed on such persons found to be guilty of fraudulent trading in fake or remarked pharmaceutical products.” Following the official agreement of the chief minister, 25 special teams have been constituted to conduct raids across the state.

Officers of the civic body have been alerted to monitor the movement of pharma products across the city. About 15 major stockists are now under review and are being monitored. The Drug Control Authority of Tamil Nadu also carried out surprise raids in 300 pharmaceutical locations consisting of medical shops and other small companies across the State. Two shops were sealed in Chennai. “Though controlling the drugs and verifying the expiry dates are solely handled by the Controller of Drugs, the civic body’s health department will look into the issue under the Public Health Act,” an official said. Seven people have been arrested in connection with repackaging and selling expired drugs in Chennai. Two of the accused confessed to picking discarded drugs from the garbage dumping yard at Kodungaiyur and then selling them to medical stores after re-labelling them with fake expiry dates.

May-June 2010 |37


People & Companies in the News Quality on Both Sides of the Atlantic Schreiner MediPharm L.P. Passes Certification Audits chreiner MediPharm has announced that its U.S. operation Schreiner MediPharm L.P. in Blauvelt, New York, has achieved another milestone. The facility has successfully completed audits confirming its compliance with international standards and processes. The certifications demonstrate that the U.S. site now officially operates according to the same quality and environmental management as well as occupational health and safety standards as all other Schreiner Group locations. Innovation, Quality, Performance and Enthusiasm – Schreiner Group’s new production plant in the United States lives the same corporate values as the German parent group. The certification of the facility according to the international ISO 9001 (Quality Management System), ISO 14001 (Environmental Management System) and OHSAS 18001 (Occupational Health and Safety System) standards has provided important proof of this commitment. The certifications which have now also been awarded to the U.S. facility give customers assurance that they can count on a reliable quality supplier who uses the same processes and standards worldwide. The facilities thus provide customers with tested reliability as respective backup production sites within the scope of global risk management.

S

Schreiner’s New York production facility passes US certification audits for Pharma labels

38| May-June 2010

A C Labels bought by the Mercian Labels Group arcode labelling specialists A C Labels have been acquired by the Mercian Labels Group in an assets and goodwill deal, securing the long term supply of variable data barcode labels and the highly regarded A C Labels brand. "A C Labels has a fantastic reputation in the marketplace as a market leader in complex variable information labelling." said Dr Adrian Steele, Managing Director of Mercian Labels, adding "We are establishing a new operation in Derby (UK) specifically to serve this demand, and are delighted with both the support shown from the client base for the acquisition, and

B

also the opportunity to acquire the brand of A C Labels. This new subsidiary of the Mercian Labels Group complements our other speciality companies in manufacturing tamper evident security labels, Label Lock security seals and short run digital, hotfoil and flexographic labelling." The new company will continue to manufacture complex constructions of self adhesive labels including variable data and barcodes, serving the medical, pharma and logistics marketplaces, and is now involved in ensuring a seamless transition for existing customers of AC Labels and to secure and expand the prospects of the business in Derby.

Unisys Sells Check and Cash Automation Equipment Business nisys Corporation has sold its check and cash automation equipment and related U.S. maintenance, printer and direct supply business to a new company formed by Marlin Equity Partners, a California-based private investment firm. The new company has been named Burroughs Payment Systems, Inc. The sale includes the manufacturing and office facility located in Plymouth, Michigan. Unisys is a worldwide information technology company. They provide a portfolio of IT services, software, and technology that solves critical problems for clients. Unisys

U

specialise in helping clients secure their operations, increase the efficiency and utilization of their data centres, enhance support to their end users and constituents, and modernise their enterprise applications. To provide these services and solutions, they bring together offerings and capabilities in outsourcing services, systems integration and consulting services, infrastructure services, maintenance services, and high-end server technology. With approximately 26,000 employees, Unisys serves commercial organisations and government agencies throughout the world.


People & Companies in the News Federal Signal Completes Acquisition of Sirit ederal Signal Corporation, a leader in environmental, safety and transportation solutions, and Sirit Inc. a provider of radio frequency identification technology, have announced that Federal Signal has completed the acquisition of Sirit. "Completing the acquisition of Sirit opens the way to exciting possibilities for Federal Signal," said William Osborne, Federal Signal's President and Chief Executive Officer. "The strategic rationale for bringing Sirit together with Federal Signal's Diamond Consulting Services, PIPS and newly acquired VESystems businesses is compelling. We will now be well positioned to offer comprehensive Intelligent Transport Systems solutions as well as best-inclass individual products and services allowing Federal Signal to capitalise on robust global market trends and deliver enhanced value to our stockholders. "On behalf of the Board of Directors and

F

management team, we welcome Sirit's talented employees to the Federal Signal team and look forward to working with them to achieve a quick and seamless integration," Mr. Osborne concluded. "Our merger with Federal Signal is a great opportunity for our employees and the future of Sirit," said Norbert Dawalibi, President and Chief Executive Officer of Sirit. "On behalf of Sirit's Board of Directors and management team, we are deeply appreciative of the support of hard-working employees throughout this process. Joining the Federal Signal family is the right fit for Sirit and we look forward to rapidly integrating our operations and capitalizing on the power of this combination." Harnessing the power of Sirit's enablingRFID technology, customers are able to more rapidly bring high quality RFID solutions to the market with reduced initial engineering costs. Sirit's products are built on more than 16 years of RF domain expertise addressing multiple

frequencies (LF/HF/UHF), multiple protocols and are compliant with global standards. Sirit's broad portfolio of products and capabilities can be customised to address new and traditional RFID market applications including Supply Chain & Logistics, Cashless Payment (including Electronic Tolling), Access Control, Automatic Vehicle Identification, Inventory Control & Management, Asset Tracking and Product Authentication. Federal Signal Corporation enhances the safety, security and well-being of communities and workplaces around the world. Founded in 1901, Federal Signal is a leading global designer and manufacturer of products and total solutions that serve municipal, governmental, industrial and institutional customers. Headquartered in Oak Brook, Ill., with manufacturing facilities worldwide, Federal Signal operates three groups: Safety and Security Systems, Environmental Solutions and Fire Rescue.

Document Security Systems, Inc. Awarded New European and Canadian Digital Prism Technology Patents Addition of new patents adds to Company's IP portfolio which now consists of 14 patents and another 57 patent applications in process ocument Security Systems, Inc. specialises in the development and manufacturing of products and packaging containing optical deterrent and authentication technologies that help prevent counterfeiting and brand fraud from the use of desktop scanners and copiers. The Company has just been issued nine new patents covering seven European Countries and Canada. All patents are associated with DSS's new digital "Prism" authentication and anticounterfeiting technology which was recently highlighted as a "Covert security technology

D

for plastic smart cards" on page 39 of a comprehensive industry white paper by Imperial Capital entitled, "Anti-Counterfeiting & Brand Protection�. In addition to "Smart Cards," Prism also can protect labels, packaging, documents, currency and vital records. Michael Caton, Chief Technology Officer of Document Security Systems, Inc., stated, "Based on our testing, Prism technology is the most powerful anti-scanning technology on the market. That's important because according to the U.S. Secret Service, scanning is the most prevalent method used by counterfeiters. Prism

has never been captured by any scanning device regardless of the resolution which makes it 100% effective as an inexpensive authentication technology for all brand owners. The technology is inexpensive since it is easily applied in the traditional or digital print production process and it does not require expensive, slow, hardware and software addons like competitors are offering." Patrick White, CEO, stated, "I am really proud of the innovation of our engineers and our legal team at Harter Secrest & Emery LLP for their excellent work on our valuable and growing intellectual property portfolio."

May-June 2010 |39


People & Companies in the News Scientific Games Inaugurates New Press in Montreal Press Adds Capacity of up to 8 Billion Tickets per Year cientific Games has made known the inauguration of a new stateof-the-art in-line printing press "MP1" at its 140,000 square foot Montreal, Quebec facility. The press, designed and custom-built to the Company's specifications, will be capable of producing up to 8 billion (2" x 4" equivalents) instant tickets per year, increasing the facility's previous annual capacity of approximately 3 billion units. This inauguration was commemorated with a ribbon cutting ceremony attended by the Minister of Finance of Quebec, Mr. Raymond Bachand; President and CEO of Loto-Quebec, Mr. Alain Cousineau; and the Chairman of Scientific Games, Mr. A. Lorne Weil. "Scientific Games has been driving results for lotteries for almost 40 years through innovation and partnership with customers around the world," said Lorne Weil, Chairman of Scientific Games. "From the introduction of the first secure instant lottery ticket in 1974, to the debut of this new state of the art printing

S

press, Scientific Games has consistently been at the forefront of delivering business solutions to help lotteries responsibly increase sales and net revenue for good causes." "We were very proud and honoured Scientific Games selected us for the initial press run to acknowledge our two organisations' 40-year business partnership," added Alain Cousineau, President and CEO of Loto-Quebec. "Over the years, LotoQuebec has greatly benefited from the consistent quality of the billions of tickets produced in Montreal by one of the finest printers in the world." "Scientific Games has been a great partner and a respected corporate citizen of Quebec over the years. The investment in this new press of approximately $20 million CAD is a great example how Scientific Games continues to exhibit tremendous commitment to Quebec's employment, technological and economic growth," said the Minister of Finance of Quebec, Raymond Bachand. Integral to the new press installation,

Scientific Games is also advancing two complementary initiatives as part of the Company's corporate sustainability program. The facility will now use water-based inks only, which will eliminate solvents, chemicals and hazardous waste treatment and removal processes. Also, a new shredder, already installed and operational, will allow for the recycling of paper waste, instead of having to send it to a landfill for disposal. Scientific Games Corporation is the leading integrated supplier of instant tickets, systems and services to lotteries worldwide, a leading supplier of fixed odds betting terminals and systems, Amusement and Skill with Prize betting terminals, interactive sports betting terminals and systems, and wagering systems and services to pari-mutuel operators. It is also a licensed pari-mutuel gaming operator in Connecticut, Maine and the Netherlands and is a leading supplier of prepaid phone cards to telephone companies. Scientific Games' customers are in the United States and more than 60 other countries.

Databac strengthens UK sales team with two key appointments D specialist Databac has appointed Alain Picard as Sales & Marketing Manager. Reporting to Managing Director Charles Balcomb, Picard will head up the UK sales team and will be responsible for the continued growth of Databac’s share of the European identification solutions market. The team has also been enriched with the addition of Matthew Thomas in technical sales and support. Picard comes from Midwich / Synergix, where he successfully created and ran the company’s auto ID division. Prior to that, he was vertical marketing manager EMEA at Zebra Technologies. He said: “Databac is recognised as a leading authority in ID solutions in the UK and across Europe.

I

40| May-June 2010

I will be working hard to develop Databac’s business to the next level, by marketing its ID innovations, particularly focusing on contactless and biometric technologies, while strategically expanding its reseller community.” Thomas joins Databac from Nortech Control Systems where he managed key accounts as product manager, RFID readers. At Databac, he will report to Picard, concentrating on UK business development. Databac Managing Director Charles Balcomb comments. “Our sales team has never been stronger. Alain Picard is a great motivator and has a glowing track record in fostering partnerships. His experience will help us sharpen up our reseller network. He will also define sales and marketing strategies to bring

our own auto ID solutions to market as they develop to meet and anticipate market demand, such as data capture via PDA, for ID on the move and event management.” He also welcomed Matthew Thomas. “Matthew is that rare thing: a great sales professional with real technical expertise. He joins the team in an area where Databac excels; customised solutions for specialist applications. His experience with LEGIC technology will also help in our capacity as sole UK manufacturer of LEGIC credentials. “With the appointment of Alain and Matthew, both experts in their fields, Databac has gained two valuable assets.”


News Kodit Launch High Performance Label into Fire and Rescue Services ire and Rescue services within the UK have all been challenged with improving their performance in the overall management of operational assets. A number of services have sought the help of Kodit in this task. Kodit has built a significant expertise in the labelling and auditing of operational equipment within Fire and Rescue providing accurate asset register information for direct use or for upload into other systems. Over the course of this work Kodit evaluated a number of label designs and types for their suitability. This culminated in a series of tests being conducted by Wiltshire Fire and Rescue on behalf of the entire Southwest region. This evaluation work which involved adhesion, immersion in oil and water and

F

abrasion testing identified that a specific material was proven to be significantly better than any other label product. This label incorporates two materials in one assembly providing a protective over laminate layer and significant wear resistance. In addition, Kodit have introduced a novel printing technique that enables the various FRS organisations to provide up to 8 colour bar combinations providing a highly visible key identifying if an asset belongs to a specific appliance or indeed a station. This colour coding has already proven significant in reducing the time taken to repatriate ‘lost’ equipment and this in turn has significantly reduced ‘off the run’ time and costs associated with incomplete equipment inventory. This highly specialised label is now generally available for use and application.

Reader Enquiry 25

Fingertip controls Polish Passport Offices use Verifinger for Biometric Passport Application, Generation and Issuance Processes eurotechnology, a provider of highprecision biometric identification technologies such as VeriFinger, was selected to be the fingerprint verification engine for Poland's new biometric passport system. Now implemented in more than 130 passport offices throughout the country, VeriFinger provides reliable 1:1 fingerprint verification at each stage of the passport application, generation and issuance process. Passport producer Polish Security Printing Works (Polska Wytwornia Papierow Wartosciowych S.A. or PWPW) selected the VeriFinger Software Development Kit (SDK) for its combination of high accuracy, very fast matching and the flexibility to work with a wide variety of programming languages and software platforms. Competitive pricing and flexible licensing options from Neurotechnology enabled PWPW to quickly obtain, develop and implement the VeriFinger technology in the new biometric passport system.

N

"Poland's biometric passport verification is a very important and practical use for our VeriFinger technology," said Dr. Algimantas Malickas, CEO of Neurotechnology. "We are pleased that Polish Security Printing Works explored the advantages provided by VeriFinger and decided to implement it for this project." All new biometric passports issued by the Polish government are equipped with a contactless microprocessor chip that stores the passport holder's biometric fingerprint information. VeriFinger is used in two stages of the passport issuance process: Application - When an applicant provides a fingerprint image, VeriFinger is used to provide a quality score that determines if the image quality is high enough for use in the biometric passport chip. Final Verification and Issuance - When the applicant comes in to receive his or her passport, the applicant enrolls the same set of ingerprints and VeriFinger is used to compare the new fingerprint images with those contained in the passport chip. If the match is verified, the new biometric passport is

issued to the applicant. VeriFinger SDK fingerprint identification technology is available for the development of PC- and Webbased solutions on Microsoft Windows, Linux and Mac OS X platforms. VeriFinger supports multiple scanners and programming languages and works with databases of unlimited size, assuring system performance with fast, reliable fingerprint matching in 1-to-1 and 1-to-many modes. The VeriFinger algorithm has been incorporated in more than 1000 end-user product brands in 98 countries over the past 11 years. VeriFinger includes a NIST MINEX- certified algorithm which consistently has won Fingerprint Verification Competition (FVC) and FpVTE awards since 2000. VeriFinger is capable of fast matching with high reliability and is highly tolerant of rolled and flat fingerprint captures as well as translation, rotation and deformation of the fingerprint image.

Reader Enquiry 26

May-June 2010 |41


Advertisers Index Arconvert Insert

Page 17 Payne

Artac Logistics Limited

Page 27 Praesidium Services

Diary

Outside Back Cover Page 27

Inside Back Cover Product & Image Security Foundation

Edale

Page 21

Eskay

Page 13 Securitech

Hologram Co Rako

Page 19

Pro Scripto Document Examination CC Page 27

tele•pak Inc.

Page 25 Front Cover & Page 24

Holographic Security Innovations Page 27 WillisPlimmer Publishing Ltd Kurz

Page 23

Inside Front Cover

Vandagraf

Page 2

Buyers Guide Anti-Counterfeit/Security Labels

Security Products Holographic Foils & Laminates Self Adhesive Labels

H O L O G R A M

I N D U S T R I E S

HIGH SECURITY HOLOGRAMS IDENTITY DOCUMENTS FIDUCIARY DOCUMENTS

G

T IA

C

MANUFA

INT ION ERN

A

AL HOLO

N TIO

AM R

C

ERS ASSO

Astor Rd, Eccles New Rd Salford, Manchester, M50 1BB Tel: +44(0)161 789 8131 info@apiholographics.com

BRAND PROTECTION

R TU

API Holographics

Tél. : +33 (0)1 64 76 31 00 www.hologram-industries.com sales@hologram-industries.com

LEONHARD KURZ Stiftung & Co. KG

www.apigroup.com

Turning technologies into solutions

Machine-readable security system applied by using: *All standard printing methods *Thermal transfer ribbons *Heat transfer labels (heat seal) *Ink jet printers on your production line Tamper evident tapes and labels for tracking and securing packages.

Tel: +972-(0)4-6176677; Fax: +972-(0)4-6176688

42| May-June 2010

Page 19

We are a High Security Printer: certified through VPGI-Certificaat in accordance with Intergraf CWA Standards in June 2005.

Witte safemark GmbH Sendener Stiege 4, D-48163 Münster Tel. +49 (0) 2536/991-100 safemark@witte-group.de

Fax: +49 (0) 2536/991-196 www.witte-group.de


Buyers Guide Banknote and Security Printing

De La Rue Security Print De La Rue House Jays Close Basingstoke Hampshire RG22 4BS Tel: +44 (0)1256 605000 Fax: +44 (0)1256 605196

De La Rue web: www.delarue.com e-mail: security.printing@uk.delarue.com

Anti-Diversion / Track Trace

Bacon&Bacon associates

Turning technologies into solutions

Machine-readable security system applied by using: *All standard printing methods *Thermal transfer ribbons *Heat transfer labels (heat seal) *Ink jet printers on your production line

Integrated security design and intaglio print. Intaglio latent image for brand protection Telephone: +44 (0) 1434 683953 Email: info@baconandbacon.co.uk

Brand Protection

We are a High Security Printer: certified through VPGI-Certificaat in accordance with Intergraf CWA Standards in June 2005.

Tamper evident tapes and labels for tracking and securing packages.

Tel: +972-(0)4-6176677; Fax: +972-(0)4-6176688 Witte safemark GmbH Sendener Stiege 4, D-48163 Münster Tel. +49 (0) 2536/991-100 safemark@witte-group.de

Authentication

Digital Solutions for Brand Protection and Document Security

Rue du clos 12 - 1800 Vevey - Switzerland www.alpvision.com - Tel: +41 21 948 64 64 TAMPER EVIDENT FILMS & LAMINATES • • • •

Fax: +49 (0) 2536/991-196 www.witte-group.de

Counterfeit Detection Equipment

Fluorescent Detection Systems Holly House, Maidenhead Road Wokingham RG40 5RR, United Kingdom Telephone +44 (0) 1344 483563 Fax no. +44 (0) 1344 485175 e-mail dwardsafetrainingsystems@compuserve.com website: www.safetrainingsystems.com

Protection of travel documents Overt & covert technologies Tamper evident RFID Unique solutions for brand protection

Surface Monitoring Fluorimeters Pocket Sized Fluorescent detection systems Bespoke Applications for Fluorescent detection

Tel : + 33 04 67 87 66 99 E.mail : fasver@fasver.comWeb: www.fasver.com.

De La Rue Security Print De La Rue House Jays Close Basingstoke Hampshire RG22 4BS Tel: +44 (0)1256 605000 Fax: +44 (0)1256 605196

De La Rue web: www.delarue.com e-mail: security.printing@uk.delarue.com

May-June 2010 |43


Buyers Guide Creative Services

Digital Watermarking

Support your presence in this specialist print market by advertising in Product & Image Security & Package Print & Converting International. www.productandimagesecurity.co.uk

Document Security

First Sight Graphics Graphic Design Specialists www.firstsightgraphics.com Email: firstsightgraphics@mac.com â„Ą 01245 462491 or 07977 415061

Holographic Mastering Systems Diecutting Technology

S I T E C H Added value!

Large format, high-speed, security hologram mastering systems Holograms/Holographics

www.sitech.co.uk Tel: + 44 (0)1932 569 392 Info@sitech.co.uk

Hologram Applicators Security Products Holographic Foils & Laminates Self Adhesive Labels

The best for the label, envelope and printing industries! Kocher + Beck GmbH + Co. Telefon +49(0)7127-9785-0 Fax +49(0)7127-9785 55 info@kocher-beck.de www.kocher-beck.de

Kocher + Beck USA L.P. Phone +1-913-544-0550 Fax +1-913-544-0551 info@kocher-beck.com www.kocher-beck.com

Kocher + Beck UK LTD Phone +44(0)1530-812400 Fax +44(0)1530-815055 sales@kocher-beck.co.uk www.kocher-beck.com

Kocher + Beck Russia Phone +7(495)6600228 Fax +7(495)6600229 info@kocher-beck.com www.kocher-beck.com

44| May-June 2010

API Holographics Astor Rd, Eccles New Rd Salford, Manchester, M50 1BB Tel: +44(0)161 789 8131 info@apiholographics.com www.apigroup.com


Buyers Guide Holographic Security Solutions

LEONHARD KURZ Stiftung & Co. KG

Ink Duct Systems Hot Stampings Foils Holographic Equipment

Auerstrasse 38, CH-9442 Berneck Switzerland Tel: +41 71 747 12 60 Fax: +41 71 747 12 70 Email: info@apsystems.ch Web: apsystems.ch

The Complete Solution All holographic processing systems, electroforming, recombination, narrow web and wide web soft and hard embossers ESKAY HOLOGRAPHICS LTD Units 9 & 10, Optrex Business Park Rotherwick, Nr Hook Hants RG27 9AY, UK Tel: + 44 (0) 1256 760077 Fax: + 44 (0) 1256 763111 Website: www.eskayholographics.com

ID Security

Holographic Films Holographic Hot Stamping Machinery

Crown Roll Leaf The Ultimate in ID & Document Security 91, Illinois Ave. Paterson NJ 07503 Tel: (973) 742-4200 Fax: (973) 742-0219 (800) 631-3831 www.crownrollleaf.com

Holographic Foils

Security Products

Foil stamping machines, sheet fed

Magnetic Strips, Tapes & Foils

Holographic Foils & Laminates Self Adhesive Labels

API Holographics Astor Rd, Eccles New Rd Salford, Manchester, M50 1BB Tel: +44(0)161 789 8131 info@apiholographics.com www.apigroup.com

Foil stamping machines, web fed Hologram-application machines for security printing Gietz AG Mooswiesstrasse 20 9200 Gossau Switzerland

Tel: + 41 71 388 22 22 Fax: + 41 71 388 22 23 Email: info@gietz.ch www.gietz.ch

Crown Roll Leaf The Ultimate in ID & Document Security 91, Illinois Ave. Paterson NJ 07503 Tel: (973) 742-4200 Fax: (973) 742-0219 (800) 631-3831 www.crownrollleaf.com

May-June 2010 |45


Buyers Guide Pigments & Inks for Security

Materials For Product & Image Security

'Intelligent Solutions for Impact with Security' G.B.C. (Speciality Chemicals) Limited The Old Fire Station, Browns Lane, Charlbury, Oxfordshire OX7 3QW United Kingdom Tel: +44 (0)1608 813088

Fax: +44 (0)1608 813089

www.luminova.co.uk e-mail: info@gbcspecs.co.uk

Rotary Tool, Inserts, Modules & Systems

Label Presses and Equipment

TOTA L P E R F O R M A N C E

Q Q Q Q Q Q Q Q Q Q

Process Development Laser Technology Cut & Place Scoring & Grooving Sealing & Embossing Gluing & Bonding Ultrasonic Welding Cutting Punching Collating

Schober GmbH Werkzeug- und Maschinenbau contact@schober-gmbh.de · www.schober-gmbh.de

Security Assurance

TOTAL SOLUTIONS FOR NARROW WEB PRINTING PRESSES

20-22 Elmedalsvej • DK-4200 Slagelse • Denmark Phone +45 58 50 11 66 • Fax +45 58 50 50 60 www.nilpeter.com IN-LINE FLEXO PRINTING & CONVERTING PRESSES COMPACT CENTRAL IMPRESSION FLEXO PRINTING PRESSES

Security Labelling Narrow web & wide web embossers

SINGLE COLOUR FLEXO CONVERTERS VIDEO WEB INSPECTION SYSTEMS

A safe and sound combination:

HIGH SPEED ROTARY FABRIC PRINTING PRESSES FABRIC LABEL CUTTING & FOLDING EQUIPMENT Kendryl Park, Chapel Lane Bingham, Nottingham NG13 8GF Tel: ++44(0)1949 836223 Fax: ++44(0)1949 836542 e-mail: admin@focuslabel.com www.focuslabel.com

46| May-June 2010

The Complete Solution All holographic processing systems, electroforming, recombination, narrow web and wide web soft and hard embossers ESKAY HOLOGRAPHICS LTD Units 9 & 10, Optrex Business Park Rotherwick, Nr Hook Hants RG27 9AY, UK Tel: + 44 (0) 1256 760077 Fax: + 44 (0) 1256 763111 Website: www.eskayholographics.com

Solutions for product and document protection Bruckmannring 22 · 85764 Ober schleissheim/Germany Phone +49 89 31584-5428 · info@schreiner-prosecure.com www.schreiner - prosecure.com


Buyers Guide Security Packaging Materials

A unit of

The first name in ink testing equipment For further information contact:

RK PrintCoat Instruments Ltd Tele: +44 (0)1763 852187 Fax: +44 (0)1763 852502 sales@rkprint.com www.rkprint.com

Coating & Laminating | Deep Dyeing | Release Liners | Vacuum Coating CPFilms Inc.

P.O. Box 5068 Martinsville, VA 24115 phone 1-888-273-4567 (CPF-ILMS) or 276-627-3332 fax 276-627-3500 www.cpfilms.com European Sales +44-(0)-2392-219112 An ISO9001 Registered Company

Security Papers

Security Inks

LUMINESCENCE Manufacturers of specialist and security inks The Fairway, Bush Fair, Harlow, Essex CM18 6NG, UK TELEPHONE: +44 (0)1279 456400 FACSIMILE: +44 (0)1279 421142 sales@luminescence.co.uk E-MAIL:

DREWSEN SECURITY PAPERS PROSECURA – BUILT IN SECURITY SOLUTIONS

81a Marlowes, Hemel Hempstead Hertfordshire HP1 1LF Tel: 0044 (0) 1442 236 933 Fax: 0044 (0) 1442 245 766 info@drewsen.co.uk • www.Drewsen.com

SECURITY INKS UV CURABLE & AQUEOUS

Rad-Cure Corporation 973.808.1002 9 Audrey Place 973.808.6886 Fax Fairfield. NJ 07004 www.radcure.com radcuresales@radcure.com

Security Solutions

Security Films & Foils

Our security concepts are just as thorough But less obvious Serving the World with Security Solutions Website www.3M.com/security

May-June 2010 |47


Buyers Guide Transponder Processing Systems

UV Curing

HONEYWELL LUMINESCENT MATERIALS Honeywell’s Lumilux® luminescent materials protect sensitive documents and valuable brands.

For information: lumiluxEU@honeywell.com

UV Lamps Metal Halide Lamps Direct from the manufacturer 200% tested for absolute reliability Worldwide Distribution Expert technical support Over 8,000 types available Cert. No: FM 28564

Equipment supplier for industrial production of: • e-NID cards • driver's licences • dual interface cards • e-passport (CP and HP version) • e-visa sticker MELZER maschinenbau GmbH www.melzergmbh.com

Heraeus Amba Ltd., Banbury, UK Tel: +44 (0)1295 272 666 www.heraeusamba.com Email: ambalamps@heraeus.com

Contact:Andreas Sasinski sales@melzergmbh.com

ISO 9001 : 1994

Reg. No. 39254

Self Adhesive Materials

MONARCH INSTRUMENTS Supplier of great variety of security products ranging from TAMPERmark™ Void / Checkerboard, Destructible PE. FLEXcon Europe Ltd The Netherlands

Tel: + 31 294 491 800 Fax: + 31 294 430 887

FLEXcon Europe Ltd Scotland

Tel: + 44 1592 663200 Fax: + 44 1592 663201

Production Equipment for … … the World of Smart Products Smart Tags Smart Labels Smart Tickets

www.FLExcon.com Email: Europeinfo@FLEXcon.com Providing Solutions In Pressure-Sensitive Films

Slitting and Rewinding Machines

Smart Tickets

Ashe Converting Equipment Ransomes Industrial Park, Ipswish, Suffolk IP3 9RR Tel: +44(0)1473 710912 • Fax: +44(0)1473 719137 www.ashe.co.uk <http://www.ashe.co.uk Email: sales@ashe.co.uk

48| May-June 2010

competence

UV

in

UV equipment, UV lamps, UV meters sales@melzergmbh.com +49 (0) 2336/9292-80

hoenlegroup.com

High Speed: up to 24,000 tested Tickets/h Leading manufacturer of Slitting and rewinding equipment, established 27 years a range of standard machines covers most requirements for general converters, although a flourishing special purpose machine capability ensures the most demanding applications can be accomplished.


Diary 2010

To include your event in this Diary or order a Banner advertisement to enhance promotion of the event please contact our sales team. www.productandimagesecurity.co.uk

Europe

America’s

12th - 13th May 2010 Retail Cards and payments Crowne Plaza Hotel, St. James, London, U.K. Details: www.smi-online.co.uk 12th - 13th May 2010 ACG Spring Conference ‘Pearls of Wisdom’ Crewe Hall, Cheshire, U.K. Details: www.a-cg.com 18th - 25th May 2010 IPEX 2010 NEC, Birmingham, U.K. Details: www.ipex.org 14th - 15th June 2010 2nd Tax Stamp Forum London, U.K. Details: www.reconnaissance-intl.com 21st - 22nd June 2010 Contactless Cards & Payments Marriott Regents Park, London, U.K. Details: www.smi-online.co.uk 28th - 29th September 2010 RFID Europe Churchill College, Cambridge, U.K. Details: www.idtechex.com/rfideurope 13th - 15th October 2010 XXIVth International Security Printer’s Conference & Exhibition Barcelona, Spain. Details: www.intergraf.eu 16th - 18th November 2010 ID World International Congress, Milan, Italy. Details: www.idworldevents.com 7th - 9th December 2010 CARTES & IDentification 2010 Paris Nord Villepinte, France. Details: www.cartes.com 4th - 6th April 2011 Security Document World, QE II Conference Centre, Westminster, London, UK. Details: www.securitydocumentworld.com 3rd - 16th May 2012 Drupa Messe Düsseldorf Germany Details: www.drupa.com

13th - 16th May 2010 The Packaging and Converting Executive Forum Miami, USA. Details: www.paceforum.com 19th - 21st May 2010 IACC Annual Spring Conference Boston, Mass, U.S.A. Details: www.iacc.org 14th - 15th September 2010 Product Authentication & Security Summit Greater New York, USA Details info@reconnaissance-intl.com 14th - 16th September 2010 LabelExpo USA Rosemont, Chicago, ILL., U.S.A. Details: www.labelexpo-americas.com 19th - 23rd September 2010 Imaging Supplies Coalition Conference On Counterfeiting Biscayne Marriott Hotel and Marina Miami, Florida, U.S.A. Details: www.isc-inc.org 19th - 23rd September 2010 NIP 26 International Conference On Digital Printing Technologies Austin, Texas, U.S.A. Details: www.imaging.org 4th - 5th October 2010 PABS 10 Product Authentication & Brand Protection Conference Hyatt Rosemont Hotel Chicago, IL, U.S.A. Details: www.awa-bv.com 24th - 26th February 2011 Graphics of the America’s Orange County Convention Center Florida, USA. Details: www.bpc-security.com Q1 2011 ID World New York Details: www.idworldevents.com

Middle East - Asia 3rd - 4th May 2010 ID World – Abu Dhabi The new annual EMEA Summit Details: www.idworldevents.com 25th - 27th October 2010 South China Label Show Guangzhou, China Details: www.southchinalabelshow.com 14th - 16th November 2010 Holopack-Holoprint Holography: The Threats and Opportunities Kuala Lumpur, Malaysia Details: info@reconnaissance-int.com November 2010 9th Asian High Security Printing Conference Kuala Lumpur, Malaysia Details: www.cross-conferences.com 8th - 11th December 2010 Labelexpo India Pragati Maidan New Delhi Details: www.labelexpo-india.com


3( /,$.3 ) /' (. /.# (.$ .$)( -)&/.$)( &, 3 # &* - /, )0 , '$&&$)( ) /' (.- 1),& 1$ # & . -. , (" )! (. ", 5 - /,$.3 )0 ,& 3- /$& - )( .#$- * $", )' $($(" -$'*&$ $.3 1$.# )'*& 2$.3 .) *,). . - /, .# & . -. " ( , .$)( )! * --*),.- ( , -

3( /,$.3 # - .# 0 ,3 & . -. (.$ )/(. ,! $. ( (.$ !, / . #()&)"3 ( %()1& " .) /- $. $( .# , & 1),& $.# )0 ,. )0 ,. ( !), (-$ . #($ & **,) # - 1 ( # &* *,). . ) /' (.- 1$.# '/&.$ & 3 , . #()&)"3 .) *,)0$ .# 2 . & 0 & )! )'*& 2$.3 3)/ , +/$,

4 #$( !$&' * --*),. )0 ,& 3-

4 "" (. . #()&)"3

4 3 , -' ,. , 4 , )'*)( (.-

4 $ ,). 2. 0$-$ & ( 4 - #)&)", *#$ ( )&)/, -#$!. . #()&)"3

4 --*),. & '$( . -

111 * 3( - /,$.3 )'

4 /,$.3 *,$(.

- & - * 3 ( - /,$.3 )'


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.