Security Workshop

  • Home -
  • Security Workshop -
  • Forgery Workshops -
  • Document Forgeries: Security Features in Documents (2 days Workshop)


Document Forgeries: Security Features in Documents (2 days Workshop)

In this aspect of our study, we will reel out the security features of a document. Before we can start accusations, we must understand the nitty-gritty of details of a document. What are the essential things that get a document secured and how do we get to know if such is compromised? I will kick off this segment from the making of security features. This will keep you abreast of the security requirements that put you on the safe side. Once fraudsters get to know that you know your onus in this realm, they will move back and re-launch with other techniques.

In addition, we will top our knowledge up by discussing the characteristics of security features. The main aim of doing this is to help you know whenever there is a compromise of any sort. This will gear you up to ask the right questions and dig deeper to find answers to those begging for one. One thing I want to tell you is that security features cannot be replicated and this has made it very difficult for fraudsters to steal. Of course, the information provided is generic but not too many people know why this is so. Hence, this segment will provide that explanation so as to enlighten you. Basically, what I aim to do in the whole of this chapter is to entrench your knowledge in its very depth about the operations of banking system so to close the loopholes through which criminals creep in to your systems.

As usual, trainees would be served with exercises in multiple folds so as to make them more grounded in what has been taught since the beginning of the chapter. The exercises would cut across the three major areas explicated and this will provide trainees the opportunity to have a firsthand application of the knowledge garnered.

Objective:

  • To give an overview of the types and the development path of security systems
  • To have a clear picture what is Forgery and how it can be done
  • To get to know the types of various security features for documents
  • To understand the production of different security features
  • To learn how to find different security features and what is special about each one
  • To learn how forgery is defined and protected by law in different countries
  • To understand how the process of forging document goes and how are they different from original ones
  • To get to know how modern technologies can help in identifying fraud documents
  • To get to know general techniques of documents examination
  • To understand what can be falsified and what cannot
Workshop Outcome : What you will Learn?

By the end of the Course, the participants should be able to:
• Understand what can be falsified and what cannot be falsified
• Know the correlation between the type of the forge and limitations in forgery
• See the process of fake documents investigation
• Understand the weak and the strong sides of the process
• Know where to put attention to see the forge
• History of technologies development in the process of identifying of fraud documents
• See the development of technologies in the field of identification
• Know hoe technics can help in this type of crime investigation
• Know the process of security features forging
• Know the strong and weak sides of the process of forgery
• See the difference between the original and forged documents from the process of production
• Know the definition of the forgery by the law system of different countries
• Understand how the crime is connected with forge is punished in different countries
• Case Study for the crime investigation in different countries
• Know security features’ characteristics
• Understand the correlation between the types of documentations and the characteristics of security features
• Understand how to define every characteristic in the real life
• Techniques of production of security features
• The process of production of security features
• Understanding the gaps of the process
• Define what security feature is
• Differentiate types of features
• Understand the specific characteristics of every security feature
• Understand which types of features can be applied to which types of documents
• Explain what is a Forgery and the objective of it
• Name and differentiate types of forgery

Module 1 : The historical introduction of Security Systems

First of all, we will take a look on the types and definitions of Security Systems and we will go deeper in two most interesting types for us – Information and Corporate Security. We will see how they appeared and developed till now. This is very important to understand the origin of the concept so you can really know how it works for sure and how to upgrade and use the tools in the modern world. As well, we will study most important Security Concepts from different fields to understand it better and be on the same page with experts.

Module 2 : Definition and types of Forgery

First, there will be explained the meaning of forgery, where it comes from to have a clear picture what should be checked. Then we will move to the different types of forgery with examples and case studies. In this part, we will also see how different types of forgery are being investigated from the law side and what the essential steps to be protected from it are. It will give us the general and further perspective of how to act towards it.

Module 3 : The various security features used in documents

There are different security features used to protect documents, we will get to know what is it and what is the objective of it. In this part, we will first classify documents and see which types and classification can be used in the production of security features. The main point here is the function of each feature and which level of security it can provide and at the same time we will go through some case studies to see how does it look like and the efficiency.

Module 4 : The making of security features

If we want to know how to forge the document, we need to understand how is it protected and how different security features are applied to the document. So based on the type of the document we will see how different features are produced to get deeper into the topic. This is an important part to move to the block 7 and 8.

Module 5 : Learn to look for security features’ characteristics

Before finding something, you need to know where to look and what to look for. Every security feature has some specific characteristic, by which you can determine and understand how it works and where is it located. So knowing this information gives you the light, which guides you through the process of investigation.

Module 6 : Punishment for Forgery by Law in different countries

We live according to the law and it says what is right and what is wrong. So here we learn how the law defines the forgery and classifies it in different countries and as well, what is the punishment in different countries for this crime. Can you get in the prison for something in one country, while in another you will just pay a fine?

Module 7 : How forgers forge documents

We will get to know the most common techniques and ways of forging documents. This module will answer several questions: who can forge documents, what he|she will need for it, what are the most common ways to do it and how often does it happen. We will see the whole picture from the other side of the process.

Module 8 : Machines in identifying fraud documents

In the previous chapter we got to know how machines can help to forge documents and now we will see how technologies can help with the opposite part. Moving forging documents to investigation of this crime we will see the technological progress from cases of investigation of this crime in the past to how it transformed with the new machines and how do they help law enforcement officers to execute their job and how is it important.

Module 9 : Examination Techniques

After pointing on the technological progress, we will overview the whole general process of examining documents and checking them for security features or their copies. What are the exact steps? What are the most common techniques? What does examination include?

Module 10 : Limitations in forgeries

Here we will have the brief overview of what can be falsified and what cannot, so we will know what are the limitations of this process and which things need more attention than others.

Conclusion : Reflection

During the course, the student receives information using several different techniques:
The programmed instruction, which visually provided information, thereby simplifying the process of learning and understanding the past information.
The group discussion allowed to fix the studied material and structure it. Thanks to Individual and team exercises trainees consolidated their knowledge, identified their weaknesses in this topic and received instructions for working with them. After role-playing lessons, students are able to put into practice the knowledge gained and to reflect on their actions in the light of this knowledge. The discussions held both individually and in group plans allowed the participants to better understand the behavior of criminals, raise new questions on this topic and critically interpret it. It also confirmed the relevance of this information. Case studies, simulations and small projects allowed students to link real-life situations with the material they received and sped up the process of studying. The attestation assessed how well the participants learned the material, revealed weaknesses in students' knowledge, allowed us to evaluate the effectiveness of the educational program. Based on the attestation, the students themselves develop a further strategy for the study, consolidation and application of this topic.

Who Should Attend : Participants

• Anyone who has ever interacted with another person!
• HR Managers involved with Hiring process and Interviews
• Entrepreneurs, Business people, Salespersons
• Managers and Supervisors
• Employers
• Employees
• Security Officers
• Enforcement Officers
• Home Affair's Officers

Methodology : Learning

This will be a two-day course, conducted formally and the following methodologies will be applied:
• Presentation
• Group Discussion
• Individual and team exercises
• Videos
• Role-playing
• Case studies

Master Trainer : Alan Elangovan

Alan Elangovan is a teacher, mentor, trainer, security expert and behavioral analyst. He has occupied his space as a trainer in Singapore for the past thirty years. Still, the fire of his intellectual acumen rages in every sector of the country. His services have been employed by both new and old companies and he has always exemplified the perfect definition of balance. Alan is not a hunger-driven trainer. As a way of enhancing his skills and expertise in his chosen field, Alan has been to Australia, Germany and Denmark for specialized training sessions. Anytime he teaches, he portrays universality and standard.

After revolutionizing many firms in Singapore, the news of his prowess spreads to other neighboring Asian nations and in 2005, he became an international trainer. Indonesia, Malaysia, Bhutan and Cambodia are some of his usual training nations. To demonstrate how charming his training sessions are, many of his trainees have had the course to travel down to Singapore moments when his itineraries are filled up. The continuous flow of classes he conducts for people from all over the world has unarguably enhanced the quality of his delivery and also increased his knowledge. He does not jump into areas where he knows he does not have a perfect mastery of its subject matter.

His classes do center on public speaking, behavioral analysis, security, crisis management in the corporate world, enhancement of employees’ productivity, control of emotions and other germane issues tailored towards the improvement of our world. He is no doubt the perfect trainer for any of your professional needs.