Product Security Technologies the Role of Brand Protection in Packaging and Labels Authentix White Paper

Total Page:16

File Type:pdf, Size:1020Kb

Product Security Technologies the Role of Brand Protection in Packaging and Labels Authentix White Paper WHITE PAPER PRODUCT SECURITY TECHNOLOGIES THE ROLE OF BRAND PROTECTION IN PACKAGING AND LABELS AUTHENTIX WHITE PAPER Introduction Whether you’re the seller or the buyer, chances tries where goods are critical to human health are you have encountered counterfeit products. In have been most active in the struggle, while other fact, it’s commonly reported that over 80 percent industries have been slower to move to brand pro- of all global consumers have unknowingly bought a tection solutions. Many are still plagued with the falsified product at some point. counterfeit problem as distribution continues to go global and visibility of the supply chain becomes There is an ever-growing epidemic of product blurred. Implementing anti-counterfeiting solutions counterfeiting in a multitude of industries. This to detect and deter product fraud is easier than poses a very serious problem in areas such as food once perceived. To disrupt such criminal activity, and beverage, medicines, health and beauty, ap- the following steps are necessary: parel and a host of other consumer products. The 1. Understand the size of the problem effects of this product compromise extend to finan- 2. Understand the risks associated with cial losses to brand owners, and more importantly, high-value branded products add risks to consumer health and safety. These 3. Understand the implications to the organiza- falsified products are often produced without tion regard to the correct ingredients, quality control, 4. Understand brand protection technologies and government oversight in place to help ensure and their role against illicit trade consumer safety and confidence. In some of the more impacted markets, such as the Some brand owners built dedicated infrastructure pharmaceutical industry, counterfeiting is estimat- and resources to combat product fraud decades ed at over $200 billion per year according to the ago. Many of those early adopters have seen a World Health Organization. In fact, estimates are vast improvement in the detection and reduction that over 30 percent of all drugs sold in develop- of counterfeit goods in their supply chain. Indus- ing countries are fakes, putting millions of lives Total latest estimated value of global trade in fake goods1 $1.0-$1.7 Trillion USD FY 2017 seizures in apparel/accessories, the largest category seized 15% within all merchandise2 Amount of estimated losses due to global online counterfeiting in $323 Billion USD 20173 Total losses by luxury brands due to online counterfeiting4 $30.3 Billion USD INTA and ICC report indicates counterfeiting could reach by 20225 $2.3 Trillion USD Estimate of percent of counterfeiting products seized originating in 70%-80% China6 Value of the secure packaging market by 20207 $153.9 Billion USD U.S. Customs and Border Protection seized worth $1.2 billion USD8 34,143 Estimate of global jobs lost due to counterfeit goods by 20229 Over 5.0 Million 2 AUTHENTIX WHITE PAPER AUTHENTIX WHITE PAPER at risk daily. However, whether you sell medical organization will typically not be well- coordinat- devices, cosmetics, tennis shoes, fashion watches ed to combat the counterfeiters due to the lack of or baby formula, there are nefarious parties aiming detectability to find and measure the extent of the to profit from faking the valuable brand goods and problem. In the end, the event becomes a recovery designs you have legitimately built over the years. process that could take months or even years to For instance, not only can counterfeit drugs lead to fully address. dangerous health side effects and even death, but publicly known product compromise can also quick- There is good news, however; your company, or ly erode consumer confidence and the value of the your client (if you are a printer or packaging con- brand and business overnight. verter) can start the process of planning and im- plementing product security solutions right away. For the affected brand owners who are late to With the advances of today’s authentication tech- deploy counterfeit protection in their supply chains, nologies, there are a host of experienced brand it is likely that soon the costs of addressing a coun- protection solution providers with global reach and terfeiting incident will rise and create chaos, finan- resources targeting the first line of defense – pack- cial harm, and devastating consequences for many ages and labels. Many of these companies offer stakeholders in the organization. Often brand own- a myriad of solutions that are quickly deployable. ers are caught unaware and don’t have processes Learn how future incidents can be dealt with faster, and protocols in place to deal with these issues that your customers will be safer, and the financial im- weaken and disrupt their business. Moreover, the pact of an adverse product event can be far more different departments and stakeholders within an controllable and mitigated. The Role of Brand Protection in Security Packaging and Labeling In terms of brand protection security applications may go unnoticed until the feature is revealed. -- overt, covert, semi-covert or forensic-- each rep- An example would include a color-shifting ink, as resents a different level of security. This is due to found on many banknotes today. A forensic feature the level of difficulty to identify and duplicate the is only detectable with laboratory equipment. feature, and the complexity of specific detection devices used in authentication. An overt applica- The most utilized type of brand security application tion can be identified by sight. A covert feature is the on-package or on-label approach. Covert uses micro or nano-taggants and can be detected solutions contain some form of taggant in a securi- by using a specialized reader or collection meth- ty ink that is only detectable through a proprietary od. Semi-covert is a visible or semi-visible marking hand-held reader. Products utilizing taggants are which can be seen by the naked eye upon manip- often supplied with this feature in the form of stan- ulation or specialized inspection, but otherwise dard press-ready inks (including over-print varnish- 3 AUTHENTIX WHITE PAPER es and coatings) suitable for direct application or as it is hit or irradiated with light of a different wave- concentrates suitable for blending into plastic for length. In most cases, the emitted light (such as a injection molding, extrusion followed by thermo- laser) is a longer wavelength than the source light forming or blown molding. Additionally, packaging (this is called “down-converting” fluorescence). Flu- or labels can be printed with these security inks orescent inks used for security purposes “glow” in or coatings without having to materially adjust or the IR ranges and are not visible to the naked eye. modify any existing printing equipment or existing This effect is totally reversible and ends once the processes. excitation light source is turned off. Proprietary readers are specifically tuned to look IR fluorescent taggants are the most widely used of for unique optical or other physical elements of a the taggant types due to their high level of security. taggant. These detection devices can be tuned to Standard Type A UV taggants (seen with black light detect multiple special characteristics before inter- sources) are now generally regarded as lower-level nal algorithms make a “yes/no” determination. security, and single-color applied UV marks can be readily located. Such inks are easily sourced on the The most sophisticated optical taggants are usual- open market. However, utilizing highly complex ly from infrared (IR) based fluorescent materials/ UV marks in multiple colors can be an alternative molecules and are detectable by handheld readers. approach to making UV technology much more Fluorescence is the emission of light by matter after secure. Taggants are encoded chemical materials that can be added into inks, coating, films, plastics or other package elements. Similar to a fingerprint, this covert feature is virtually impossible to duplicate. Two types of taggants 1. Optically readable - can be read by a proprietary device 2. Forensic - requires laboratory analysis Continuous Inkjet Covert Ink 4 AUTHENTIX WHITE PAPER AUTHENTIX WHITE PAPER Today’s Product Security Technologies - What You Should Know Traditionally, anti-counterfeiting security solutions authentication data either via the internet can be categorized into five different platforms: or through a proprietary localized database. 1. Overt security - features you can see As decades of experience in the areas of security without devices documents, currency, and product anti-counter- • Holograms feiting efforts have shown, there is no single “silver • Color-shifting inks bullet” technology that can be applied across the • Simple codes board for all products. Usually a multilayered ap- • Watermarks (in paper) proach (as used in currency) is the most effective long-term. Of the five categories of anti-counter- 2. Covert security - features you can see feiting solutions listed, the prevalent technology only with proprietary devices implemented and most often recommended is • Advanced infrared (IR) taggants “on-package” or “on-label” solutions consisting of • Ultraviolet (UV) inks specialized inks or substrate markers. • Complex codes • Laser-activating inks Conversely, direct product chemical or physical • Hidden image technology testing is the least routinely utilized method but • Invisible taggants embedded in is often the last step to forensically determine substrates authenticity if no other method is deployed. It is important to keep all five categories in mind when 3. Semi-covert - features you might not selecting an anti-counterfeiting solution. Your notice until they are pointed out decision should be based on the understanding • Pantographs of the overall risks and objectives of said product • Micro text such as appropriate applications, solution cost and • Metameric inks overall public safety factor. In some cases, a simple • Scrambled indicia color-shifting ink and hidden IR code might be best • Special-effect inks for one product line, while a tamper-evident seal • Coin-reactive inks with an invisible IR ink might be better for anoth- • Thermochromic inks er.
Recommended publications
  • Evaluation of Users' Knowledge and Concerns of Biometric Passport
    data Article Evaluation of Users’ Knowledge and Concerns of Biometric Passport Systems Taban Habibu 1,* , Edith Talina Luhanga 1 and Anael Elikana Sam 2 1 Department of Applied Mathematics and Computational Sciences (AMCS), Nelson Mandela African Institution of Science and Technology (NM-AIST), 447 Arusha, Tanzania; [email protected] 2 Department of Communication Science and Engineering (CoSE), Nelson Mandela African Institution of Science and Technology (NM-AIST), 447 Arusha, Tanzania; [email protected] * Correspondence: [email protected]; Tel.: +255-684765277 Received: 21 March 2019; Accepted: 23 April 2019; Published: 29 April 2019 Abstract: The increase in terrorism and identity fraud has forced governments worldwide to make a combined effort to enhance the security of national borders. Biometric passports are the emergent identity travel document deployed in guaranteeing the safekeeping of the entry point of the border and limiting the usage of counterfeit documents. This study analyzes users’ concerns and threats to the biometric passport delivery system in Uganda, where the first biometric passports are planned for rollout in 2019. We used a mixed approach to compute and articulate the results. Factors impacting fear of technology like disclosure of personal data, improper data transmission, and data abuse were determined. Relevance knowledge of preferred technology such as the personal experience of the technology, data privacy awareness and perceived usefulness was confirmed. Threats and attacks on the technology such as counterfeit and brute-force were identified. It is important for policymakers and security expertise to understand that biometric technologies evoke fears of privacy and public liberties infringements.
    [Show full text]
  • Detecting Forgery: Forensic Investigation of Documents
    University of Kentucky UKnowledge Legal Studies Social and Behavioral Studies 1996 Detecting Forgery: Forensic Investigation of Documents Joe Nickell University of Kentucky Click here to let us know how access to this document benefits ou.y Thanks to the University of Kentucky Libraries and the University Press of Kentucky, this book is freely available to current faculty, students, and staff at the University of Kentucky. Find other University of Kentucky Books at uknowledge.uky.edu/upk. For more information, please contact UKnowledge at [email protected]. Recommended Citation Nickell, Joe, "Detecting Forgery: Forensic Investigation of Documents" (1996). Legal Studies. 1. https://uknowledge.uky.edu/upk_legal_studies/1 Detecting Forgery Forensic Investigation of DOCUlllen ts .~. JOE NICKELL THE UNIVERSITY PRESS OF KENTUCKY Publication of this volume was made possible in part by a grant from the National Endowment for the Humanities. Copyright © 1996 byThe Universiry Press of Kentucky Paperback edition 2005 The Universiry Press of Kentucky Scholarly publisher for the Commonwealth, serving Bellarmine Universiry, Berea College, Centre College of Kentucky, Eastern Kentucky Universiry, The Filson Historical Sociery, Georgetown College, Kentucky Historical Sociery, Kentucky State University, Morehead State Universiry, Transylvania Universiry, University of Kentucky, Universiry of Louisville, and Western Kentucky Universiry. All rights reserved. Editorial and Sales qtJices:The Universiry Press of Kentucky 663 South Limestone Street, Lexington, Kentucky 40508-4008 www.kentuckypress.com The Library of Congress has cataloged the hardcover edition as follows: Nickell,Joe. Detecting forgery : forensic investigation of documents I Joe Nickell. p. cm. ISBN 0-8131-1953-7 (alk. paper) 1. Writing-Identification. 2. Signatures (Writing). 3.
    [Show full text]
  • Tackling Counterfeit with ISO and IEC Standards
    counterfeit Tackling counterfeit with IEC and ISO standards Tackling counterfeit with IEC and ISO standards In Roman times it was wine, in mediaeval times it was textiles and weapons, today it is everything from personal computers to potency pills. Counterfeit goods are nothing new, but with globalization, the Internet and increased movement of goods, the fakes business is booming. The global value of counterfeit goods was estimated as being worth between USD 923 billion and USD 1.13 trillion in 2016 alone 1), costing millions of jobs and funding further abuses such as corruption and violence. Counterfeit affects virtually every country in the world, fuels illegal activities and harms you and your family. Aircraft, automotive parts, medicines, toys, electronic equipment, clothing and foodstuffs are just some of the products tarnished by the counterfeit industry. IEC and ISO have dedicated committees working on standards and solutions to help combat counterfeit and provide increased confidence to consumers. These include standards that test for authenticity, provide guidelines to measure the competency of testing laboratories and provide quality and minimum safety guidelines. For electric and electronic goods, the IEC offers testing and certifica- tion services that assist in quality and supply chain management, ensuring that suppliers deliver authentic parts and end products are safe to use. 1) Global Financial Integrity Tackling counterfeit with IEC and ISO standards – 1 What exactly are counterfeit goods ? The World Trade Organization (WTO) defines product counterfeiting as the “ unauthorized representation of a registered trademark carried on goods identical or similar to goods for which the trademark is registered, with a view to deceiving the purchaser into believing that he/she is buying the origi- nal goods ”.
    [Show full text]
  • Countering Counterfeits
    Countering Counterfeits: The Real Threat of Fake Products How Fake Products Harm Manufacturers, Consumers and Public Health—and How to Solve This Problem Amid an unprecedented global health crisis, manufacturers have stepped up and taken the lead, working together and with national, state and local governments to fight the spread of COVID-19. Manufacturers deliver day-to-day necessities, lifesaving medical innovations and products that improve people’s lives in countless ways. While the pandemic has demonstrated anew the importance of American innovation and ingenuity, it has also revealed a serious threat: counterfeit products that put lives and livelihoods at risk. Counterfeiting is not a new problem; it has harmed manufacturers, American workers and consumers for years. But the problem is getting worse, and the COVID-19 pandemic has shown just how dangerous inaction can be. As part of the nation’s critical response effort, manufacturers have been supplying health care workers and other Americans on the front lines of this crisis with vital goods, including personal protective equipment, hospital beds, ventilators, hand sanitizers, cleaning supplies and other critical health care and safety products. But while manufacturing men and women work long hours to ramp up production of desperately needed products to fight the spread of this deadly illness, counterfeiters have exploited the crisis to peddle fake tests, dangerous vaccines and ineffective protective gear. These counterfeits are harming American citizens and hindering manufacturers’ efforts to protect their workers and communities. The prevalence of counterfeits in the COVID-19 response has brought new urgency to this long-simmering issue. So the National Association of Manufacturers is leading the charge against fake and counterfeit goods, bringing together diverse stakeholders and driving innovative policy solutions to address these issues once and for all and to ensure the long-term success of our sector and the safety and security of the people who rely on our products.
    [Show full text]
  • The Illicit Trafficking of Counterfeit Goods and Transnational
    The Illicit Traffi cking of Counterfeit Goods and Transnational Organized Crime The Illicit Trafficking of Counterfeit Goods and licit trafficking of counterfeit goods is often perceived as a ‘lesser Transnational Organized Crime crime’, the consequences can be quite serious, with the costs go- ing far beyond just the illegal copying of products. As a global, multibillion dollar crime, organized criminal groups have not hesitated to cash in on the trade in counterfeit goods. In Financial flows: The illicit trafficking many parts of the world, international, regional and national law of counterfeit goods and the link to enforcement authorities have uncovered intricate links between money laundering this crime and other serious offences including illicit drugs, money laundering and corruption.1 Some estimates put the counterfeit The illicit trafficking of counterfeit goods offers criminals a com- business at well in excess of $250 billion a year and hundreds of plementary source of income and a way through which they can billions more, if pirated digital products and domestic counterfeit launder money.9 Additionally, monies received from the sale of sales are included.2 counterfeit products can be channelled towards the further pro- duction of fake goods or other illicit activities. Criminals also feed The involvement of organized criminal groups in the production fake goods into the legitimate supply chain which provides them and distribution of counterfeit goods has been documented by with ‘clean’ money. Not only does this present a challenge
    [Show full text]
  • Tips, Tools and Techniques an Overview of Counterfeit Document
    Counterfeit Fraud Prevention – Tips, Tools and Techniques An Overview of Counterfeit Document Fraud and the Methods Available to Detect & Deter it. Sean Trundy, COO UVeritech, Inc. 1743 South Grand Ave., Glendora, CA 91740 www.fraudfighter.com 800.883.8822 Contents Introduction 3 Counterfeit Fraud 4 Counterfeit Currency 4 The Modern Face of Currency Counterfeiting 5 Currency Counterfeiting on the Rise 7 Types of Counterfeit Dollars 8 Counterfeit Negotiable Instruments 11 Money Orders 11 Cashier’s Checks (Official Checks) 12 Traveler Checks 13 Treasury Checks 13 Personal Checks 14 Store Coupons and Store Currency 14 Credit Cards, Gift Cards and Stored Value Cards 15 Counterfeit Fraud Losses 17 The Multiplier Effect 17 Detecting Counterfeit Instruments 18 Visible / Physical Document Inspection 18 Color Shifting Ink 18 Holographic Images 19 Thermal Ink 19 Intaglio Printing 20 Watermarks 20 Covert Feature Detection 21 InfraRed Printing 22 Magnetic Character Printing 23 Ultraviolet Inks 23 Scientific Analysis 25 Pattern Matching 25 Data Compare 26 Tools for Counterfeit Document Detection 27 Visible Review Aids 27 Magnifier/Jeweler’s Loop 27 Infra-Red Viewers 28 Magnetic Ink Detector Devices 29 UV Lights 30 Advanced Analysis Devices 31 Machine Readable Character Reading Devices 31 Data Compare Devices 32 Pattern Matching Devices 33 Hybrid Pattern Match/Data Compare Devices 33 Multi-Layered Approach to Fraud Detection 35 Conclusions 37 2 Introduction Worldwide financial losses resulting from counterfeiting have been significantly on the rise. Growth trends for criminal fraud of almost every type have shown a steady and consistent pat- tern of year-over-year increases. This is particularly true when one looks at recent behavior associated with the use of forged documents.
    [Show full text]
  • Counterfeit.Pdf
    January 2000 Contents Preface ...................................................................................................... vii Executive Summary .................................................................................. ix Findings Regarding Currency Abroad ....................................................................... ix The Introduction of the 1996-Series New Currency Design (NCD).............................x Findings Regarding Counterfeiting..............................................................................x Innovations to Combat Counterfeiting...................................................................... xii Conclusions and Recommendations.......................................................................... xii 1 Introduction........................................................................................... 1 1.1 Design of the Audit Plan ...................................................................................1 1.2 International Demand for the U.S. Dollar..........................................................3 1.3 The Difficulty of Measuring the Extent of International Counterfeiting............5 1.4 Organization of the Remainder of the Report ....................................................5 2 The New Currency Design: Introduction, Distribution, and Results. 6 2.1 Overview: Goals, Programs, and Results...........................................................6 2.2 Introducing the New Currency Design ..............................................................7
    [Show full text]
  • Do Counterfeits Promote Genuine Products?
    Do Counterfeits Promote Genuine Products? Boonghee Yoo Associate Professor Department of Marketing and International Business Frank G. Zarb School of Business Hofstra University Hempstead, New York 11549 Email: [email protected] Seung-Hee Lee Assistant Professor Department of Clothing and Textiles College of Human Ecology Sungshin Women’s University Seoul, South Korea Email: [email protected] Correspondence Address: Dr. Boonghee Yoo Associate Professor Department of Marketing and International Business Frank G. Zarb School of Business Hofstra University Hempstead, New York 11549 Phone: (516) 463-4242 Fax: (516) 463-4834 E-mail: [email protected] As of October 6, 2005 The authors would like to thank James W. Gentry (University of Nebraska-Lincoln) and Jiwoong Shin (Yale University) for their valuable comments on an earlier version of this paper, and acknowledge that this research was supported by a Summer Research Grant from the Frank G. Zarb School of Business, Hofstra University. Authors’ draft. Do not cite without permission. Do Counterfeits Promote Genuine Products? ABSTRACT As counterfeiting activity continues to thrive around the world, firms manufacturing genuine items work hard to discourage counterfeiting and protect their revenues. But the authors suggested the possibility that firms might benefit from counterfeits. The purpose of this research was to investigate the extent to which counterfeit items function as a promotion to increase sales of genuine items. Based on survey data from five luxury fashion product categories, Study 1 strongly confirmed that both consumers of counterfeit and genuine items generally prefer genuine items to counterfeits, that consumers of genuine items do not have a stronger intention to buy counterfeits than nonconsumers of genuine items, and that consumers of counterfeits also have a stronger purchase intention for the genuine items than nonconsumers of counterfeits.
    [Show full text]
  • Counterfeit Products
    8 COUNTERFEIT PRODUCTS 8 COUNTERFEIT PRODUCTS as excessively high. In 2007, the Organization for Economic Co-operation and Development tenta- Product counterfeiting is a form of consumer fraud: tively estimated the value of counterfeit and pirated a product is sold, purporting to be something that goods that are traded internationally at 2% of the it is not. This is different from the crime of copy- world trade in goods, or US$176 billion, in 2007.4 right violation, which involves the unauthorized This estimate appears to have a stronger evidential transfer of licensed material, such as the sharing of base, but was released with substantial caveats due music or video files electronically.1 Product coun- to the lack of comprehensive data. terfeiting is typically an organized group activity, because the manufacturing of goods takes people The production and trafficking of counterfeit goods and time, and the goal is invariably profit. Many is often portrayed as a matter of intellectual prop- jurisdictions take the offence quite seriously, for erty theft, and through this prism it garners little reasons described below. As a result, most product sympathy. Many otherwise law-abiding citizens counterfeiting would be considered organized crime think nothing of buying a knock-off version of a under the Convention. designer article. Though many are aware that the loss of income reduces the incentives for creativity, Lesser goods have been passed off as high-quality the impact seems too remote and the victims too merchandise since the dawn of organized com- affluent for many people to give the matter a second merce, but the practice has taken on new meaning thought.
    [Show full text]
  • Determining the Difference Between Counterfeit & Luxury Products
    University of Arkansas, Fayetteville ScholarWorks@UARK Apparel Merchandising and Product Development Apparel Merchandising and Product Development Undergraduate Honors Theses 12-2018 Determining the Difference Between Counterfeit & Luxury Products Brooke Burnside Follow this and additional works at: https://scholarworks.uark.edu/ampduht Part of the Fashion Design Commons Recommended Citation Burnside, Brooke, "Determining the Difference Between Counterfeit & Luxury Products" (2018). Apparel Merchandising and Product Development Undergraduate Honors Theses. 8. https://scholarworks.uark.edu/ampduht/8 This Thesis is brought to you for free and open access by the Apparel Merchandising and Product Development at ScholarWorks@UARK. It has been accepted for inclusion in Apparel Merchandising and Product Development Undergraduate Honors Theses by an authorized administrator of ScholarWorks@UARK. For more information, please contact [email protected], [email protected]. Determining the Difference Between Counterfeit & Luxury Products 1 Determining the Difference Between Counterfeit & Luxury Products Brooke Burnside University of Arkansas Determining the Difference Between Counterfeit & Luxury Products 2 Table of Contents I. Abstract……………………………………………………………………………………3 II. Acknowledgments…………………………………………………………………………4 III. Introduction………………………………………………………………………………..5 IV. Literature Review………………………………………………………………………….7 V. Development Plan……………………………….…………………………………….....10 VI. Materials & Design Process……………………………………………………….……..11 VII. Results & Discussion…………………………………………………………………….14
    [Show full text]
  • Combating Trafficking in Counterfeit and Pirated Goods Report to the President of the United States
    Combating Trafficking in Counterfeit and Pirated Goods Report to the President of the United States January 24, 2020 Office of Strategy, Policy & Plans Table of Contents Table of Contents ............................................................................................................................ 2 1. Executive Summary ................................................................................................................ 4 2. Introduction ............................................................................................................................. 7 3. Overview of Counterfeit and Pirated Goods Trafficking ..................................................... 10 4. Health and Safety, Economic, and National Security Risks ................................................. 16 5. How E-Commerce Facilitates Counterfeit Trafficking ......................................................... 20 6. Private Sector Outreach and Public Comment ...................................................................... 24 7. Immediate Action by DHS and Recommendations for the USG ......................................... 26 8. Private Sector Best Practices ................................................................................................ 34 9. Conclusions ........................................................................................................................... 41 10. Appendix A: The IPR Center ...............................................................................................
    [Show full text]
  • Criminal Law: Forgery and Counterfeit Currency Report
    The Law Commission (LAW COM. No. 55) , CRIMINAL LAW REPORT ON FORGERY AND COUNTERFEIT CURRENCY Laid before Parliament by the Lord High Chancellor pursuant to section 3 (2) of the Law Commissions Act 1965 Ordered by The House of Commons to be printed 17th July 1973 LONDON HER MAJESTY’S .STATIONERY OFFICE 68p net 320 The Law Commission was set up by section 1 of the Law Commissions Act 1965 for the purpose of promoting the reform of the law. The Commissioners are- The Honourable Mr. Justice Cooke, Chairman. Mr. Claud Bicknell, O.B.E. Mr. A. L. Diamond. Mr. Derek Hodgson, Q.C. Mr. N. S. Marsh,-.C. The Secretary of the Commission is Mr. J. M. Cartwright Sharp, and its offices are at Conquest House, 37-38 John Street, Theobald’s Road, London, WClN 2BQ. ii CONTENTS Paragraph Page 1. INTRODUCTION . 1-3 1 II. PRESENT LAW. 4-8 4 Forgery . 4-7 4 Connected offences 8 5 -- III. GENERAL APPROACH . 9-1 8 6 Conclusion . 17 9 Currency . 18 9 IV. THE SUBJECT MATTER OF FORGERY 19-27 10 Present law . 19 10 Possible solutions . 20-22 10 Instruments . 23 11 Recordings . 24-25 12 Seals and dies . 26 13 Conclusion . 27 14 V. THE MENTAL ELEMENT. 28-37 14 Present law . 28-3 1 14 Re-statement of the present law . 32-36 16 Conclusion . 37 18 VI. THE ACT OF FORGERY . 3 8-40 19 Present law . 38 19 Making copies . 39 19 Conclusion . 40 19 W. THE FALSITY OF THE INSTRUMENT 41-45 19 Present law .
    [Show full text]