Tips: Protect Against Check 'Washing'

Check washing is a simple, low-tech way to alter a check you have written. It is the chemical erasing of the handwritten parts of a check. The idea is to remove the ink while maintaining the overall appearance of the check and its preprinted items. The concern here is that these chemicals and solvents are readily available everywhere.

Once the “washing” has been accomplished, the payee and/or amount may be altered. Often times, the amount remains the same while only the payee is changed. This allows for it to pass by unnoticed when balancing your bank statement.

Check washing, and check fraud of all kinds, is a growing concern for the banking industry. Attempted check fraud at the nation’s banks has more than doubled in the past three years reaching an estimated $12.2 billion in 2006, according to the latest American Bankers Association Deposit Account Fraud Survey Report.

Actual dollars lost to check fraud was $969 million in 2006, up from the reported $677 million in 2003. In addition to the banking industry, it is a growing concern for the FBI, US Attorneys Office, and the U.S. Postal Service. As this crime frequently stems from stolen mail, the Postal Investigation Service offers rewards of up to $10,000 for information and services leading to the arrest and conviction of any person for mail theft.

The Identity Theft Resource Center offers tips for minimizing your risk of check washing:

  • Do not put outgoing bills in an unattended or unlocked mailbox. If possible, take outgoing mail to your local post office. It is recommended that you not drop your mail after the last pickup of the day.
  • Minimize the number of checks you write. Do your bill paying online on a secure computer. This minimizes the possibility of your checks being stolen through the mailing process. Remember it's your responsibility to know where you are sending your payments online.
  • When writing out checks, use a gel ink pen (preferably black) so the ink will permeate the fibers of the check.
  • Do not leave blank spaces on the payee or amount lines
  • If you receive cancelled checks, shred them. If it is necessary to keep them, store them in a secured, locked location.
  • Review your bank statements immediately. You have a limited time frame in which to report fraudulent transactions. When fraud is detected, it is necessary to report it within 30 days.
  • When possible, have your new checks delivered to your bank.

When ordering new checks, find out what security measures are being used by the manufacturer. These measures may include:

  • Chemical voids -- this is a counter chemical measure to “washing”. This treatment of the check paper causes the word VOID to appear when washing solutions are used.
  • Security inks -- these inks disappear, fade or stain when exposed to check washing chemicals such as bleach, water or other solvents.

Other security measures available, which do not pertain directly to check washing, include:

  • Watermarks -- These marks (visible on one side or both) may be subtle design features not easily detected on the face of the check. This measure is difficult to duplicate and offers protection from photocopying and scanners.
  • Copy Void pantographs -- A background of a check that, when photocopied, changes and the word VOID appears.
  • Microprinting or high resolution graphics -- very fine print or intricate line detail which cannot be reproduced accurately by copiers or scanners.
  • Invisible fibers -- fibers which are embedded in the check and only visible with special lighting.
  • Visible fibers -- fibers readily apparent throughout the check.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.