Hologram provides measure to authenticate, identify and arrest counterfeits to curb illegal mining
1. Security hologram provides
measure to authenticate,
identify and arrest
counterfeits to curb illegal
mining
Presented by:
Chander S Jeena
Hologram Manufacturers Association of India
PDI conference, IIC, New Delhi, Date: April 5, 2012
2. Presentation flow
Introduction - HOMAI
Illegal mining – how it started
Modus Operandi / Problem
Recommendation by Govt / Current status
Current usage by some States
Why hologram have been used
Conclusion
3. HOMAI - Introduction
Hologram Manufacturers Association of India, formed in 1998 is
World 2nd and Asia’s only association representing holography
We are allied with IHMA (International Hologram
Manufacturers Association). More than 130 leading global
companies are part of our association, design, produce &
manufacture high security anti-counterfeiting solutions under
strict code of conduct of HOMAI & IHMA.
We as a responsible association actively participate & working
with Counterfeit Intelligence Bureau (CIB), UK and Interpol
and all HOMAI member register their hologram with CIB
In India more than 10,000 brands use our high end
security products to fight against counterfeiting.
4. Security Holograms providing authentication,
identification and arresting counterfeit
Illegal mining how it started
Iron Ore Monthly Price - US Dollars per Metric Ton
192.05
172.05
Price increase
152.05
Rising
US Dollars per metric ton
more than 150 times
132.05 global
112.05 iron-ore
92.05 prices
72.05 driven by
52.05 demand
32.05
12.05
Text
Apr-02
Apr-03
Apr-04
Apr-05
Apr-06
Apr-07
Apr-08
Apr-09
Apr-10
Apr-11
Dec-02
Dec-03
Dec-04
Dec-05
Dec-06
Dec-07
Dec-08
Dec-09
Dec-10
Dec-11
Aug-02
Aug-03
Aug-04
Aug-05
Aug-06
Aug-07
Aug-08
Aug-09
Aug-10
Aug-11
Text
Source: indexmondi.com
5. Security Holograms providing authentication,
identification and arresting counterfeit
Modus operandi
Need of
Illegal miners solution
started
misuing / faking
bulk permits and Differentiate
trip sheets between fake
and genuine
document
And difficult to
With these fake Miners
copy
permits illegal exported
miners do the illegally with & tampering
lethal faking
excavation shipping bill /
Text
resulting loss of Text
without these
revenue bills
6. Security Holograms providing authentication,
identification and arresting counterfeit
Steps recommended
by Centre Current situation
To curb this problem, Five States, Uttar
Centre suggested to Pradesh, Jharkhand,
start the process of Gujarat, Karnataka and
registration of end Orissa have reported to
users, use of satellite have started use of
imagery to track down hologram in their
illegal mining, hologram- transport permits
marking of transport
Source: PIB
permit, etc.
Text
Text
7. Security Holograms providing authentication,
identification and arresting counterfeit
How they are using
•Director of Mines and Geology procures the High Security Holograms
from the reputed hologram manufactures which are produced in high
Step security environment. Each hologram carries various security features
1 including numbering to track and trace.
•The Director of Mines and Geology – has a centralized system
Step to issue the Holograms from his office
2
•Based on the need, the Deputy Directors/Senior Geologists from the
Step respective States placed their requirement of Holograms to the Director
of Mines and Geology who in turn issue the Holograms after receipt of
3 signature of receiving official.
Step •A stock issuing register is maintained in the concerned section in the
4 Office of the Director of Mines and Geology.
Step •The Deputy Directors – the receiver of Holograms has to maintain a stock
register by entering the Hologram Serial Number, date of issue, etc. and he
5 finally issues to the Stock Yard Text
owner.
Text
The Stock Yard owner’s responsibility begins here by accurately using in
dispatches and maintaining records.
8. Security Holograms providing authentication,
identification and arresting counterfeit
Why security hologram has been used
1. Provide multi-layered security features
Level 3 Conforms to the level
(Forensic of security features
features)
for authentication
Level 2
suggested by
(Covert features,
hidden INTERPOL
information)
Level 1
Text
(Overt features,
Text
visual authentication)
9. Security Holograms providing authentication,
identification and arresting counterfeit
Why security hologram has been used
2. Provide convenience of Authentication
Security level Security Hologram Assisting / Inspection level
features
Level When the secured
1 OVERT document will
be viewed by officer’s at various
points during inspection
Level When the secured document will
2
be subject to inspection by
COVERT /
senior officials
Level When the secured document is
3 FORENSIC subject to forensic
examination / in case of fraud
10. Security Holograms providing authentication,
identification and arresting counterfeit
Why security hologram has been used
3. Other benefits
• Proven track record in deterring counterfeiters
• Provide tamper evident solution
• Easy to recognize / difficult to get copied
• Easy to verify (visually and by machine)
• Easy to apply and incorporate
• It has been used because industry is doing
continuous R&D
11. Security Holograms providing authentication,
identification and arresting counterfeit
Conclusion
The USP of security hologram is that it carries overt, covert and
forensic security features which make it’s an optimal solution for
identification & authentication.
That is the reason it has been used by more than 100 Bank
authorities in 150 bank denomination, passports, visa etc.
In India more than 19 States Excise Department, all Electoral
Department, Pharma & Automobile sector are using it as an tools to
authenticate.
No reason why it cannot be taken up as an industry initiative against
counterfeit.
12. Holograms providing authentication, identification
and arresting counterfeit
Thank You
For more information, please contact
HOMAI at info@homai.org
Text
Text