Joel Zlotnick, Elizabeth Gil, Jordan Brough and Troy Eberhardt
In recent years, 3D printing technologies have been increasingly adopted for a wide range of product development and manufacturing applications. More widespread public availability of 3D printing can be anticipated in the future, including in home/office environments. Just as the widespread availability of low-cost inkjet devices permanently changed the counterfeiting landscape in the late 1990s, 3D printing will also be used for criminal activities, including document counterfeiting. Just as digital counterfeiting drove evolution in document design practices and development of new security features, 3D printing and its potential as a counterfeiting threat can be addressed through both anti-counterfeiting technologies and purposeful security design. This paper summarises some capabilities of 3D printing, anticipates counterfeiting applications, and presents strategies to mitigate future counterfeiting risks posed by 3D printing.
The term ‘3D printing,’ also called additive manufacturing, refers to a set of diverse technologies capable of creating objects from metals, plastics or other raw materials without the use of conventional fabrication processes such as drilling, machining, or injection molding. For example, Figures 1 and 2 show a simple object produced by a type of 3D printing called fused filament fabrication, in which spooled polymer raw material is extruded from a heated printhead. Other types of 3D printing have different capabilities and outputs. Compared to conventional manufacturing, advantages of 3D printing can include reduced raw material and energy consumption, rapid and inexpensive prototyping, high potential for customisation, on-demand local production, a small printer footprint, and printing of complex multi-material structures for which no conventional manufacturing pathway even exists. These advantages drive proliferation of 3D printing for many micro and macro applications, including consumer objects, parts and tools, medical, entire buildings, and even 3D printing of 3D printers. Hobbyists have already embraced 3D technology. This paper discusses just a few possible ways this rapidly evolving technology might eventually affect the security document landscape.
3D printing and security documents
Two questions could be asked in relation to security documents: first, can 3D printing contribute to the production of genuine security documents, and second, does 3D printing represent a counterfeiting threat? Possible answers to the first question may seem unrealistic compared to current document issuance practices. For example, imagine an identity card substrate with a window, tactile features and complex internal structure manufactured at issuance locations directly from raw polymer, from a proprietary digital template that prints the card body and personalisation simultaneously. The need to transport and store blank cards, or maintain a centralised factory line for their manufacture, could be eliminated. Just because this and other concepts are theoretically possible does not mean they are practical today or superior to conventional production and issuance workflows. 3D as a tool for genuine document issuance requires its own analysis. Accordingly, this paper will address counterfeiting risks from a theoretical and future-oriented viewpoint, assuming that 3D printers of tomorrow will be superior in both resolution and material handling to those of today.
Counterfeiting applications of 3D printing might be grouped into two categories: augmentation of traditional counterfeiting workflows and direct digital manufacturing of counterfeits or parts of counterfeits. These alternatives will be explored below. The final two sections of this paper outline strategies for mitigation of risks presented by 3D counterfeiting.
Supplementing traditional counterfeiting methods
An important industrial use of 3D printing is the rapid on-demand production of custom tools, molds, and machine parts to support high volume fabrication workflows. The 3D printer does not produce a final product directly, but makes components for an assembly line or machinery that does make the product. In the context of traditional (non-digital) counterfeiting, imagine 3D printing used to manufacture counterfeiting equipment like letterpress numbering elements, intaglio printing plates, watermark dies, embossing devices, stamps, and parts for printing presses. The question is whether 3D printing introduces advantages over existing non-3D traditional counterfeiting processes. This question is complex and cannot be answered comprehensively here, but consider the manufacturing of an intaglio print plate as just one illustrative example.
Traditionally, hand engraving techniques (Figure 3) have provided security designers with a high degree of control over both the width and depth of intaglio lines.
The addition of high-tech digital platemaking techniques allow for even more detail (Figure 4).
In contrast, acid etching of intaglio plates (Figure 5) is popular with counterfeiters because it is easier and cheaper.
However, some control over line quality is lost because acid etching creates an undesirable increase in line width when trying to achieve the same depth created by hand engraving. Additionally, multiple acid etching steps are necessary for the plate to feature varying line depths. Because 3D printing is also a relatively inexpensive technology but potentially offers more control than acid etching, 3D printing might be used for counterfeit intaglio plate manufacture, either now or in a future when 3D printer resolutions have improved. Similar comparisons could be done for other traditional counterfeiting techniques to identify how 3D printing might shine, to the general conclusion that 3D can provide advantages in a variety of circumstances.
Finally, through programs such as Project Genesius and Operation Genesius, law enforcement agencies partner with private sector printing equipment suppliers to combat counterfeiting. It is unclear how this mission might change in a future where parts for printing devices, or even entire printing devices, could be 3D printed instead of purchased.
Digital counterfeiting in 3D
The previous section explored potential uses of 3D printing to supplement traditional counterfeiting workflows, but 3D printing could also be used for direct counterfeiting of documents. The scope of possibilities is broad, and could include anything from basic tactile feature simulations to 3D counterfeiting of entire plastic card bodies. The following example illustrates how UV-cured inkjet, just one of many diverse 3D printing technologies, has already been used for simulation of tactile features on counterfeit identity cards otherwise manufactured using non-3D processes.
For decades, counterfeiters have simulated texture features using thermography (Figure 6), dry embossing (Figure 7), and other analogue methods; use of ultraviolet (UV)-cured inkjet is a more recent development.
The printing mechanism of UV-cured inkjet is similar to conventional inkjet, but the ink formulations and drying mechanisms are different. Conventional inkjet inks are typically water- and/or solvent-based, and dry by absorption and evaporation. In UV-cured inkjet, the liquid ink is exposed to UV illumination immediately after printing, causing the droplets to harden into a microscopic tactile structure.
As above, the question is whether UV-cured inkjet provides counterfeiters with new capabilities when compared to conventional analogue methods of texture simulation. Because UV-cured inkjet produces textured graphics in a single printing step (Figure 8), it eliminates registration errors that occur when printed graphics and texture are simulated in two separate steps (for example, the misalignment of the image and embossing in Figure 7).
Further, UV-cured inkjet can print tactile layers that are clear (Figure 9) or even white (Figure 10), which are not possible with conventional 2D inkjet.
However, UV-cured inkjet is similar to 2D inkjet in that it relies on CMYK (cyan, magenta, yellow and black) to simulate spot colours (Figure 11), so CMYK UV-cured inkjet could still be detected in counterfeits by looking for a pattern of coloured dots.
Looking past the simulation of tactile features alone, UV-cured inkjet is likely not suitable for counterfeiting more complex 3D objects, such as a complete card body. However, other 3D printing technologies may eventually have the potential to simulate entire plastic card documents, including artwork, personalisation, tactile features, windows, complex multicolour substrates and even polymer passport data page hinge fabrics. Also consider the future potential of 3D printing to simulate a complete security paper substrate, including texture, security fibres, a security thread and a watermark image, all manufactured in one pass from a single device.
Though these potential applications for 3D printing should not be trivialised, these attacks are likely not feasible, practical, or economical at the current time and are presented mainly to stimulate thought about future possibilities. The complexity of genuine document design and production should be maximised to counter the inherent limitations of 3D printing technologies. Many security design strategies and existing optical, physical, and chemical security features, already employed to combat conventional counterfeiting, are likely to be equally effective against 3D counterfeiting. The reasons include both physical and conceptual limitations of 3D printing.
Designing to exploit physical limitations of 3D
Generally, many security design practices are defined by the limitations of various traditional and digital counterfeiting methods. Consider one common security design practice that only exists because it exploits an inherent limitation of digital counterfeiting technologies. Microprinting (Figure 12) is often included in security artwork specifically because most inkjet and toner devices have difficulty replicating small details (Figure 13). Given this knowledge, how can security design practices exploit the weaknesses of 3D printing hardware capabilities?
Just as most inkjet printers can only print from four ink cartridges simultaneously, 3D printers only print with a limited number of raw materials simultaneously (spools of plastic filament of various colours, for example). Sophisticated 3D printers can integrate the output of five or more such spools into a single cohesive object, but many security documents contain far more than five colours/materials, including substrate components, ink colours in visible and UV, and more. Complete simulation of a security document containing a variety of components of different colours and diverse optical, physical, and chemical properties using just a few 3D materials would be challenging, and of very limited quality. Counterfeiters using 3D printing might find shortcuts to simulate colour, just as inkjet counterfeiters use CMYK halftones to simulate spot colour line art. However, a document with many complex security features can force counterfeiters to merge 3D printing with entirely different technologies to simulate colour shifting effects, optically variable devices, UV features, etc. For this reason, counterfeiters may find it difficult or impossible to rely on 3D printing alone.
Designing to disrupt prepress workflows in 3D
Barriers to counterfeiting include not only the technological barriers described above, but also conceptual and design barriers such as understanding how a genuine document is constructed or how counterfeiters simulate or replicate artwork. Complex design can help deter even sophisticated traditional counterfeiters that possess strong graphic arts skills. This is true not just for 2D artwork, but also for 3D aspects of a document’s construction. An example using offset and intaglio printing will be illustrated and then extrapolated for security design suggestions relevant to 3D printing.
Complex design features like offset line artwork (Figure 14) and offset security halftones (Figure 15) can be tedious to replicate accurately, but offset cannot print ink layers of different heights, so the artwork in Figures 14 and 15 can only be produced in 2D.
In contrast, intaglio engravings can be of varying depth, allowing an intaglio plate to print a range of ink layer heights, and therefore a range of visible colour saturations. Unlike the offset in Figures 14 and 15, the intaglio in Figures 16 and 17 appears to have more than one ink colour because the designer also customised plate engraving depth and ink layer height, not just 2D artwork.
For a high quality intaglio counterfeit, the counterfeiter would have to replicate both the line artwork (2D) and multiple engraving depths (3D), which is harder than counterfeiting the 2D art alone. Counterfeiting of 3D intaglio artwork using a 2D offset process is likely to negatively affect the tonal range of the image, the integrity of the line artwork, or both.
The above comparison is a specific example of a more general concept, which is designing in 3D as well as 2D. Access to 3D printing technology is not the same as the ability to reverse engineer a document to produce the 3D digital models required to drive a 3D printer. Though document issuers can neither control proliferation of 3D printing technology nor completely prevent its use in counterfeiting, security documents can be made conceptually challenging to reverse engineer, minimising the potential of 3D printing for counterfeiting. For each facet of a genuine document’s production, this can be achieved in numerous ways and is not limited to the example of intaglio described above. Using an identity card substrate as one example, contemporary strategies already include distribution of visible and UV art throughout multiple substrate layers, multicoloured substrate layers (Figure 18), multilayer windows (Figure 19) and visually complex tactile features (Figure 20), all of which increase the challenge of reverse engineering the 3D card structure in addition to its 2D artwork.
The impact of 3D printing on the counterfeiting environment has been minimal to date, and its full potential may not be realised until improved generations of 3D printing devices are more widely available. In the future, 3D printing technologies might either play a supporting role in existing counterfeiting workflows or could also be used for direct simulation of security document components and features. Just as with any other material or technology available to counterfeiters, 3D printing should be viewed within the context and limitations inherent to counterfeiting workflows. The counterfeiting threat posed by a new technology can be addressed through security design practices that merge genuine document components, manufacturing processes, and personalisation technologies such that these elements become inseparable from one another, and which link physical manufacturing and artwork re-origination problems so that counterfeiters cannot solve these separately.
MORE ABOUT THE AUTHORS
Joel Zlotnick is employed by the US Department of State, Bureau of Consular Affairs, Counterfeit Deterrence Laboratory as a physical scientist. He conducts research on how design strategies can help maximise the security value of printing technologies and security features, and develops training programmes on counterfeit detection.
Elizabeth Gil is employed by the Homeland Security Investigations Forensic Laboratory as a forensic document examiner. Elizabeth divides her time between conducting examinations on travel and identification documents and testing security documents for vulnerabilities.
Jordan Brough is employed by the Homeland Security Investigations Forensic Laboratory as a forensic document examiner, specialising in adversarial analysis and counterfeit deterrence. Jordan spends his time examining suspect documents and consulting with United States security document designers.
Troy Eberhardt is employed by the US Immigration & Customs Enforcement Homeland Security Investigations Forensic Laboratory. He supervises the Research and Development Section at the laboratory, which specialises in identifying and mitigating vulnerabilities within travel documents.
1 MakerBot Industries. (2019). Thingiverse. [Accessed April 26, 2019].
2 Michael Petch. (2017). 3D Printing Industry (3DPI). [Accessed April 26, 2019].
3 Pfohl, M. and Martel, A. (2019). 3Dnatives. [Accessed April 26, 2019].
4 RepRap contributors. (2019). RepRap. [Accessed April 26, 2019].
5 Metropolitan Police Service (MPS). (2018). Project Genesius. [Accessed April 26, 2019].
6 U.S. Immigration and Customs Enforcement. (2018). ICE. [Accessed April 26, 2019].