Tips: Protect Against Check 'Washing'

Check washing is a simple, low-tech way to alter a check you have written. It is the chemical erasing of the handwritten parts of a check. The idea is to remove the ink while maintaining the overall appearance of the check and its preprinted items. The concern here is that these chemicals and solvents are readily available everywhere.

Once the “washing” has been accomplished, the payee and/or amount may be altered. Often times, the amount remains the same while only the payee is changed. This allows for it to pass by unnoticed when balancing your bank statement.

Check washing, and check fraud of all kinds, is a growing concern for the banking industry. Attempted check fraud at the nation’s banks has more than doubled in the past three years reaching an estimated $12.2 billion in 2006, according to the latest American Bankers Association Deposit Account Fraud Survey Report.

Actual dollars lost to check fraud was $969 million in 2006, up from the reported $677 million in 2003. In addition to the banking industry, it is a growing concern for the FBI, US Attorneys Office, and the U.S. Postal Service. As this crime frequently stems from stolen mail, the Postal Investigation Service offers rewards of up to $10,000 for information and services leading to the arrest and conviction of any person for mail theft.

The Identity Theft Resource Center offers tips for minimizing your risk of check washing:

  • Do not put outgoing bills in an unattended or unlocked mailbox. If possible, take outgoing mail to your local post office. It is recommended that you not drop your mail after the last pickup of the day.
  • Minimize the number of checks you write. Do your bill paying online on a secure computer. This minimizes the possibility of your checks being stolen through the mailing process. Remember it's your responsibility to know where you are sending your payments online.
  • When writing out checks, use a gel ink pen (preferably black) so the ink will permeate the fibers of the check.
  • Do not leave blank spaces on the payee or amount lines
  • If you receive cancelled checks, shred them. If it is necessary to keep them, store them in a secured, locked location.
  • Review your bank statements immediately. You have a limited time frame in which to report fraudulent transactions. When fraud is detected, it is necessary to report it within 30 days.
  • When possible, have your new checks delivered to your bank.

When ordering new checks, find out what security measures are being used by the manufacturer. These measures may include:

  • Chemical voids -- this is a counter chemical measure to “washing”. This treatment of the check paper causes the word VOID to appear when washing solutions are used.
  • Security inks -- these inks disappear, fade or stain when exposed to check washing chemicals such as bleach, water or other solvents.

Other security measures available, which do not pertain directly to check washing, include:

  • Watermarks -- These marks (visible on one side or both) may be subtle design features not easily detected on the face of the check. This measure is difficult to duplicate and offers protection from photocopying and scanners.
  • Copy Void pantographs -- A background of a check that, when photocopied, changes and the word VOID appears.
  • Microprinting or high resolution graphics -- very fine print or intricate line detail which cannot be reproduced accurately by copiers or scanners.
  • Invisible fibers -- fibers which are embedded in the check and only visible with special lighting.
  • Visible fibers -- fibers readily apparent throughout the check.

Featured

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.