Green Card

Latest Generation of Green Cards Among Most Secure IDs Worldwide

Organizations often take one of two approaches to security: reactionary, acting after a crisis to patch a hole, or proactive, taking preventive action before a problem trips them up.

When the U.S. Citizenship and Immigration Services (CIS) last year upgraded the technology in its permanent resident cards, colloquially called "green cards," it took the second path.

“We do not have problems with the old one, but we didn’t want to wait until we had problems; we wanted to stay ahead of any problems,” said Sandra Landis, chief of the integrated document production division at CIS. “It’s always prudent to upgrade the security features of documents that have a long lifecycle in circulation.”

The approximately 750,000 cards issued between 1979 and 1989 have no expiration date, and the generation of cards after that expires after 10 years, making green cards one of the longest-circulating identity documents in the country. According to Lasercard, the company that has manufactured the card’s base component for 14 years, CIS orders between 1.8 and 2 million cards per year.

The new cards, which began circulating in May 2010, boast visual, physical and digital security features, including optical security media (OSM) from Lasercard and an RFID tag. Indeed, just two months after its release, Frost and Sullivan placed the U.S. green card at the top of the list of the most secure government-based identity documents. Report authors described the upgraded card as “among the most physically secure and counterfeit-resistant machine-readable identification cards ever issued.”

The OSM itself has three layers of data protection. The visual level consists of high-resolution security images printed at 24,000 dpi (the average magazine is printed at 300 dpi). This level of detail makes it "virtually impossible for criminals to copy without having access to millions of dollars of printing equipment," according to Stephen Price-Francis, Lasercard’s vice president of marketing.  It also has a personalized embedded hologram that consists of a laser-etched likeness of the cardholder and some biographical information, such as name, gender and card expiration date.  Finally, the OSM contains a hidden image that an inspector can reveal only with a laser light.

The card itself has a second-generation RFID tag that can be read from up to 30 feet away. When sensors at a border crossing detect the presence of the tag, they automatically begin the process of bringing up a cardholder’s file, which makes the border-crossing process more efficient.

The results of the past year testify to the card’s high level of security. Landis said that Immigration and Customs Enforcement, the department that handles the enforcement aspect of the green card program, has yet to detect any attempts at counterfeiting the cards. According to Price-Francis, counterfeiters would have to make a significant capital investment in a multi-year research and development program to come even close to reproducing the card. Instead, said Landis, counterfeiters are focusing their efforts on less-secure generations of cards that were issued before the previous generation.

And the final change CIS made to the card? It’s color. The card had been white but is now green, meaning it once again lives up to its name: The nickname came about in the early years of the program, when cards were actually green. Between 1964 and 2010, though, they sported a variety of colors, including pink and blue. 


About the Author

Laura Williams is content development editor for Security Products magazine.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

Featured Cybersecurity

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3