Skip to main content

Currently Skimming:

Summary
Pages 1-4

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 1...
... The most significant threat is represented by nonprofessional, independent individuals with limited, if any, traditional counterfeiting skills. These opportunist, casual counterfeiters pose a particularly onerous risk to the integrity of currency, given the diffuse nature of their counterfeiting activities, which are enabled by affordable, highly capable, advanced reprographic and digital technology.
From page 2...
... In general, these features employ technologies that are not being developed for currency applications, although several that are in use in other cur rencies are suggested, since they can be more quickly implemented to provide an added measure of deterrence for a period of time. In order to refine the list of potential features, the committee found it helpful to describe the counterfeiting threat by means of a basic analytical model that maps the flow of counterfeit currency from its production to its removal from circulation.
From page 3...
... • The addition of high-technology optical devices that produce dramatic visual effects -- examples are hybrid diffractive optical variable devices, refractive microoptic arrays, and subwavelength optical elements. • The local alteration of the tactile feel of the banknote, passively or ac tively -- examples are chemical sensors, e-substrate, NiTi shape memory and superelastic responsive materials, tactilely active electronic features, tactile variant substrate, and thermoresponsive optically variable devices.
From page 4...
... The committee generated so many new feature concepts that a structured development process would be necessary -- for example, adapting an existing technology- and product-development process to the specific task of currency design and production. Development priority would take many factors into ac count, such as the estimated deterrent effectiveness against a projected threat, the need for a balanced mix of features to provide a layered defense against the range of threats, ensuring a high degree of recognizability by the different types of cash handlers, and the estimated time line and implementation cost.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.