New 5 Euro Note Unveiled

Wikipedia says: The five euro note (€5) is the lowest value euro banknote and has been used since the introduction of the euro (in its cash form) in 2002. The note is used in the 22 countries which have it as their sole currency (with 20 legally adopting it); with a population of about 332 million. It is the smallest note measuring 120 … Continue reading

The (Il)Legality of Scanning Currency

Reproductions of money: Federal laws don’t ban reproducing images of United States currency, but they do restrict how you can legally display those reproductions. According to the Counterfeit Detection Act of 1992, Public Law 102-550, Section 411 of Title 31 of the Code of Federal Regulations, you can make and display color reproductions of bills … Continue reading

Security Printing Risks

from Warner, Richard D. and Richard M. Adams II, Introduction to Security Printing. (Pittsburge: PIA/GATF Press, 2005). There are a number of risks involved in the security printing process, which must be managed by the printer. The security printer and supplier have a responsibility to operate under best practices in order to ensure the safety, health, … Continue reading

Marketing and Pricing Security Products

from Warner, Richard D. and Richard M. Adams II, Introduction to Security Printing. (Pittsburge: PIA/GATF Press, 2005). Promotion: A reputation for security is built over years. It starts by changing internal business processes, procedures, and culture. Staff should be informed of the importance of security and trained to enable smooth implementation of secure storage, auditing, and … Continue reading

What does it take to be a security printer?

from Warner, Richard D. and Richard M. Adams II, Introduction to Security Printing. (Pittsburge: PIA/GATF Press, 2005). A carefully customized security system should incorporate the following attributes: It should respond to the threats the customer is facing. The supplier therefore needs to have a comprehensive understanding of the type of counterfeits that are found in the … Continue reading

Prepress, Press, and Postpress Operations for Security Printing

from Warner, Richard D. and Richard M. Adams II, Introduction to Security Printing. (Pittsburge: PIA/GATF Press, 2005). “Prepress for security printing involves the use of fine-line patterns that are usually continuous-tone rather than bitmapped or half-toned. Colors are generally spot or trademarked colors that are spectrally or colorimetrically matched rather than being process color. The guilloche, … Continue reading

Security Printing Inks

from Warner, Richard D. and Richard M. Adams II, Introduction to Security Printing. (Pittsburge: PIA/GATF Press, 2005). There are two types of security printing inks. Anti-duplication inks are meant to prevent, you guessed it, unauthorized copying. They are usually a covert security feature. Anti-alteration inks are an overt feature, and they are used to indicate when … Continue reading

Making Security Paper

from Warner, Richard D. and Richard M. Adams II, Introduction to Security Printing. (Pittsburge: PIA/GATF Press, 2005). Security printing papers must be a suitable substrate for the many security devices that will be embedded in or printed on them. Rag pulp is used to produce currency paper. It’s made from cotton fiber, and produces the highest … Continue reading

Security Printing Overview

from Warner, Richard D. and Richard M. Adams II, Introduction to Security Printing. (Pittsburge: PIA/GATF Press, 2005). Security printing: “the process of converting printed products using limited-access materials and supplies along with unique or specialized technologies and a multiplicity of printing processes to produce security end products under secure operating procedures and manufacturing/distribution protocols.” Security end … Continue reading

Currency Security Technologies

Some definitions for technologies, processes, and other terms involved in the security printing industry. See here for the individual trademarked names that have been given to different proprietary versions of these technologies. The substrate is the material that is being printed on, typically paper. Overt security devices are meant to be easily seen by the naked eye; … Continue reading