Safety Button
   HOME

TheInfoList



OR:

Tamper-evident describes a device or process that makes unauthorized access to the protected object easily detected. Seals, markings, or other techniques may be tamper indicating.


Tampering

Tampering involves the deliberate altering or adulteration of information, a product, a package, or system. Solutions may involve all phases of product production, distribution, logistics, sale, and use. No single solution can be considered as "tamper proof". Often multiple levels of
security Security is protection from, or resilience against, potential harm (or other unwanted coercion). Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or ...
need to be addressed to reduce the risk of tampering. Some considerations might include: *Identify who a potential tamperer might be and what level of knowledge, materials, tools, etc. might they have. *Identify all feasible methods of unauthorized access into a product, package, or system. In addition to the primary means of entry, also consider secondary or "back door" methods. *Control or limit access to products or systems of interest. *Improve the
tamper resistance Tamperproofing is a methodology used to hinder, deter or detect unauthorised access to a device or circumvention of a security system. Since any device or system can be foiled by a person with sufficient knowledge, equipment, and time, the term " ...
by making tampering more difficult, time-consuming, etc. *Add tamper-evident features to help indicate the existence of tampering. *Educate people to watch for evidence of tampering. *Length of time available for tampering. Particularly in transit, anyone intending to tamper with tamper-evident-protected goods, valuables, cash and confidential documents generally only has a window of opportunity of a few minutes before discovery is likely. This makes it both difficult and unlikely that they will have time to open the packaging, examine or remove the items, and restore the packaging to its original untampered condition.


Seals and signatures

Tamper-evident designs have been a feature of letters since ancient times, often using
wax Waxes are a diverse class of organic compounds that are lipophilic, malleable solids near ambient temperatures. They include higher alkanes and lipids, typically with melting points above about 40 °C (104 °F), melting to give lo ...
, clay, or metal seals to signify that the letter had not been opened since it was written. *
Ancient Roman In modern historiography, ancient Rome is the Roman people, Roman civilisation from the founding of Rome, founding of the Italian city of Rome in the 8th century BC to the Fall of the Western Roman Empire, collapse of the Western Roman Em ...
signet ring A seal is a device for making an impression in Sealing wax, wax, clay, paper, or some other medium, including an Paper embossing, embossment on paper, and is also the impression thus made. The original purpose was to authenticate a document, or ...
s, for example, were unique to the person who owned them, and the ring was pressed into the hot wax seal forming a signature which could not be easily duplicated by somebody attempting to re-seal the letter. *
Letterlocking Letterlocking is the act of folding and securing a written message (such as a letter) on papyrus, parchment, or paper, without requiring it to be contained in an envelope or packet. It is a traditional method of document security that utilizes ...
, including a type called spiral locking, used intricate folding, slitting, and weaving to create the result that any opening attempt would be evident via rips and tears in addition to the breaking of the wax seals. Similar practices continue today, from examples such as
envelope An envelope is a common packaging item, usually made of thin, flat material. It is designed to contain a flat object, such as a letter (message), letter or Greeting card, card. Traditional envelopes are made from sheets of paper cut to one o ...
s to carefully designed packaging for payslips. In modern
contract law A contract is an agreement that specifies certain legally enforceable rights and obligations pertaining to two or more Party (law), parties. A contract typically involves consent to transfer of goods, Service (economics), services, money, or pr ...
, it is common to see each page of a contract individually initialled and numbered, so that any addition or removal of pages can be detected. Meanwhile, most checks have a variety of features to defeat both tampering and duplication (these are often listed on the back of the check). Technicians at the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
developed anti-tamper holograph and prism labels that are difficult to duplicate.


Product packaging

Tamper-evident design is perhaps most visible in the process of product
packaging and labeling Packaging is the science, art and technology of enclosing or protecting products for distribution, storage, sale, and use. Packaging also refers to the process of designing, evaluating, and producing packages. Packaging can be described as a co ...
, where it can be vital to know that the product has not been altered since it left the manufacturer. Cans of baby food were among the first high-profile cases, where manufacturers were extorted by persons claiming to have added various
poison A poison is any chemical substance that is harmful or lethal to living organisms. The term is used in a wide range of scientific fields and industries, where it is often specifically defined. It may also be applied colloquially or figurati ...
s to baby food and replaced them on supermarket shelves. The amount of stock which needed to be destroyed (because it was impossible to tell if a given item had been tampered with), and the threat of public fear, meant that tamper-evident design principles had the potential to save a lot of money in the future. Jars of food items soon started appearing with a lid with a metal bubble in the center, commonly known as a "safety button", pulled down by vacuum in the top of the container, which—like the lid of a
Mason jar A Mason jar, also known as a canning jar, preserves jar or fruit jar, is a glass jar used in home canning to food preservation, preserve food. It was named after American tinsmith John Landis Mason, who patented it in 1858. The jar's mouth has a ...
—popped out if the jar had ever been opened and stayed flat if the jar was in pristine condition. These lids would also pop out if the jar was contaminated by potentially dangerous gas-producing bacteria. Customers were advised to never buy a product with a popped lid. In addition to the visible flat "button", an intact lid makes an audible "pop" when opened. Newer jars of food tend to come with a plastic wrap around the edge of the lid, which is removed when opening, although the springy-cap designs are still in common use. Tamper-evident packaging also extends to protect stores; there are some scale labels for meats and deli products that will tear if removed. The 1982
Chicago Tylenol murders The Chicago Tylenol murders were a series of poisoning deaths resulting from drug tampering in the Chicago metropolitan area in 1982. The victims consumed Tylenol-branded acetaminophen (paracetamol) capsules that had been laced with potassium ...
involved over-the-counter medications. Due to
FDA The United States Food and Drug Administration (FDA or US FDA) is a federal agency of the Department of Health and Human Services. The FDA is responsible for protecting and promoting public health through the control and supervision of food ...
regulations, many manufacturers of food and medicine (as well as other products) now use
induction sealing Induction sealing is the process of bonding thermoplastic materials by induction heating. This involves controlled heating an electrically conducting object (usually aluminum foil) by electromagnetic induction, through heat generated in the objec ...
and other special means to help provide evidence of tampering. Break-away components which cannot be reattached are useful. Custom seals,
security tape Security tape (or security label) is a type of adhesive tape used to help reduce shipping losses due to pilfering and theft. It helps reduce tampering or product adulteration. It is often a pressure-sensitive tape or label with special tam ...
s,
label A label (as distinct from signage) is a piece of paper, plastic film, cloth, metal, or other material affixed to a container or product. Labels are most often affixed to packaging and containers using an adhesive, or sewing when affix ...
s, RFID tags, etc. are sometimes added. The still ongoing () opioid abuse epidemic has led to a search for tamper-evident strategies to protect central vascular lines.
Intravenous drug Drug injection is a method of introducing a drug into the bloodstream via a hollow hypodermic needle, which is pierced through the skin into the body (usually intravenously, but also at an intramuscular or subcutaneous, location). Intravenous ...
users often acquire infections of the heart valves (
endocarditis Endocarditis is an inflammation of the inner layer of the heart, the endocardium. It usually involves the heart valves. Other structures that may be involved include the interventricular septum, the chordae tendineae, the mural endocardium, o ...
), liver, bones, lungs, and other organs. Treatment of these infections requires several weeks of intravenous
antibiotic An antibiotic is a type of antimicrobial substance active against bacteria. It is the most important type of antibacterial agent for fighting pathogenic bacteria, bacterial infections, and antibiotic medications are widely used in the therapy ...
s. During treatment such patients may use the central intravenous line or peripherally inserted central line (PICC) to inject unauthorized opioids or other drugs. Evidence exists that applying a tamper-evident device to the central line can deter illicit use of the line. Security packaging is needed to contain evidence of crimes. Items must be kept in an unaltered state until they are submitted in a legal proceeding. Packaging that tears open raggedly or otherwise cannot readily be resealed is sometimes used to help indicate tampering. Often, multiple layers or redundant indicators are used because no single layer or device is "tamper-proof". Consideration should be given to unique custom indicators (which should be changed regularly because these are subject to counterfeiting). People who open secure packaging can look out for signs of tampering, both at the primary means of entrance and at secondary or "back door" locations on a package.


Credit cards, money, stamps, coupons

In
financial Finance refers to monetary resources and to the study and Academic discipline, discipline of money, currency, assets and Liability (financial accounting), liabilities. As a subject of study, is a field of Business administration, Business Admin ...
terms, tamper-evident design overlaps a lot with anti-
forgery Forgery is a white-collar crime that generally consists of the false making or material alteration of a legal instrument with the specific mens rea, intent to wikt:defraud#English, defraud. Tampering with a certain legal instrument may be fo ...
techniques, as ways to detect monetary tokens which are not what they seem.
Postage stamp A postage stamp is a small piece of paper issued by a post office, postal administration, or other authorized vendors to customers who pay postage (the cost involved in moving, insuring, or registering mail). Then the stamp is affixed to the f ...
s, for example, may contain a layer of ultraviolet-reflective ink which changes state under pressure. The impact from a
postmark A postmark is a postal marking made on an envelope, parcel, postcard or the like, indicating the place, date and time that the item was delivered into the care of a postal service, or sometimes indicating where and when received or in transit. ...
ing machine then leaves a UV-visible mark as well as an ink mark which identifies attempts to reuse stamps. In a similar vein, asset-numbering labels on corporate equipment (PCs and the like) are often designed to leave an imprint of either the serial number, or the word "VOID" if the label is peeled off. However, this can easily be defeated by warming up the label using a blow dryer or
heat gun A heat gun is a device used to emit a stream of hot air, usually at temperatures between , with some hotter models running around , which can be held by hand. Heat guns usually have the form of an elongated body pointing at what is to be hea ...
, so it will be more flexible and forgiving to removal (and reapplication). Road tax vignettes and price tags are often tamper-evident in the sense that they cannot be removed in one piece. This makes it difficult to move a vignette from one car to another, or to peel off a price tag from a cheaper article and reapply it to a more expensive one. Money is tamper-evident in the sense that it should be difficult to produce a financial token without authorization, even if starting from a token of lower value. For example, forgers may attempt to clean the ink from a banknote and print the image of a higher-denomination note on it, giving them the carefully guarded "banknote paper" which is otherwise very difficult to obtain. This may be one of the reasons why many countries use banknotes of different size in ascending order of value. A British £5
banknote A banknote or bank notealso called a bill (North American English) or simply a noteis a type of paper money that is made and distributed ("issued") by a bank of issue, payable to the bearer on demand. Banknotes were originally issued by commerc ...
issued by the
Bank of England The Bank of England is the central bank of the United Kingdom and the model on which most modern central banks have been based. Established in 1694 to act as the Kingdom of England, English Government's banker and debt manager, and still one ...
is much smaller than a £50 banknote, and therefore it can't be used to create a £50 note.


Physical security

Tamper-evident physical devices are common in sensitive computer installations. For example,
network Network, networking and networked may refer to: Science and technology * Network theory, the study of graphs as a representation of relations between discrete objects * Network science, an academic field that studies complex networks Mathematics ...
cabling can be run down transparent conduits and switches can be located in glass-fronted cabinets, allowing for any unusual device attached to the network tending to stand out in plain view. Despite the easy availability of miniature (hardware) key loggers, tamper-evident design is not often used in
personal computer A personal computer, commonly referred to as PC or computer, is a computer designed for individual use. It is typically used for tasks such as Word processor, word processing, web browser, internet browsing, email, multimedia playback, and PC ...
s. While transparent computer cases and keyboards are common, they are mainly used for the decorative effect rather than security. Many PCs do have a switch to detect opening of the case, and this provides a visual notification when the computer is next turned on that the case has recently been opened. In any case, it has long been possible to complicate the task of tampering with electronic devices by sealing them with tamper-evident tape or
sealing wax Sealing wax is a wax material of a seal (emblem), seal which, after melting, hardens quickly (to paper, parchment, ribbons and wire, and other material), forming a bond that is difficult to break without noticeable tampering. Wax is used to verify ...
. Alternatively, radio-controlled alarm-devices (which transmit a silent alarm) can be installed, or cases can be glued shut in such a manner that tampering attempts will distort or fracture the casing.
Fire alarm A fire alarm system is a building system designed to detect, alert occupants, and alert emergency forces of the presence of fire, smoke, carbon monoxide, or other fire-related emergencies. Fire alarm systems are required in most commercial buil ...
s and other emergency switches are typically non-reversible, using a piece of glass which must be broken to activate the alarm. For example,
panic button A panic alarm is an electronic device that can easily be activated to request help during an emergency where danger to persons or property exists. It is designed to contact assistance quicker, easier, and simpler (in some cases, less conspicuo ...
s in
burglar alarm A security alarm is a system designed to detect intrusions, such as unauthorized entry, into a building or other areas, such as a home or school. Security alarms protect against burglary (theft) or property damage, as well as against intruders. ...
systems might require a plastic key to reset the switch. In very much the same manner as with fire alarms, many emergency handles and levers, or handles that are not meant to be opened regularly, are enclosed in a thin metal or plastic security seal. The seal is thin, so as not to prevent the handle from being used (in due time), but only to alert maintenance/security personnel that the handle was indeed used. Many times, large sea-going shipping containers have such a metal ring or seal attached to them at the source port. After traveling at sea (and perhaps by land as well), the containers reach their destination, where each container is checked to have the seal properly in place (against a list of doublets - container/seal). In
police The police are Law enforcement organization, a constituted body of Law enforcement officer, people empowered by a State (polity), state with the aim of Law enforcement, enforcing the law and protecting the Public order policing, public order ...
work, tamper-evident techniques must often be used to guard access to evidence, providing means of storing items and samples in a way which can be used to prove that they were not altered after their collection. Special tamper-evident evidence bags are available, to be used following a strict protocol. Video recordings can be protected to some degree against tampering by recording a
timestamp A timestamp is a sequence of characters or encoded information identifying when a certain event occurred, usually giving date and time of day, sometimes accurate to a small fraction of a second. Timestamps do not have to be based on some absolu ...
. Anti-Tamper Radio (ATR) systems use wireless communication to detect and respond to unauthorized access attempts in high-security environments. These systems integrate RF sensors to monitor critical infrastructure, military assets, and secure facilities. ATR can detect tampering by analyzing signal disruptions, movement, or interference, automatically triggering alerts or countermeasures. This technology is increasingly used in defense applications and supply chain security to enhance tamper-evident protection.
Security seal Security seals are tamper-evident mechanisms that seal valuable material in a room, cabinet, vehicle, or other storage facility. One common use is to seal cargo in transit shipping containers in a way that provides tamper evidence and some lev ...
s are commonly employed on devices such as
electronic voting Electronic voting is voting that uses electronic means to either aid or handle casting and counting ballots including voting time. Depending on the particular implementation, e-voting may use standalone '' electronic voting machines'' (also ...
machines in an attempt to detect tampering. However, testing by
Argonne National Laboratory Argonne National Laboratory is a Federally funded research and development centers, federally funded research and development center in Lemont, Illinois, Lemont, Illinois, United States. Founded in 1946, the laboratory is owned by the United Sta ...
and others demonstrates that some existing seals can be quickly defeated by a trained person using low-tech methods. They offer ideas on countermeasures, and are exploring the promising option of "anti-evidence" seals. To prevent gas and electricity meters from being interfered with to show lower chargeable readings, they may be sealed with a lead or plastic seal with a government marking, typically fixed to a wire that passes through part of the meter housing. The meter cannot be opened without cutting the wire or damaging the seal.


Computer systems

In
cryptographic Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More gen ...
terminology,
cryptographic hash function A cryptographic hash function (CHF) is a hash algorithm (a map (mathematics), map of an arbitrary binary string to a binary string with a fixed size of n bits) that has special properties desirable for a cryptography, cryptographic application: ...
s and cryptographic signatures are used to add a tamper-evident layer of protection to document, often referred to as an
electronic signature An electronic signature, or e-signature, is data that is logically associated with other data and which is used by the signatory to sign the associated data. This type of signature has the same legal standing as a handwritten signature as long as ...
. Hardware-encrypted full disk drives utilise tamper-evident cases, so when it is retrieved the owner can be assured that the data has not been compromised, thus preventing costly further actions such as notifying the data owners.Nationwide wrote to all customers
/ref> The document, email, or file to be protected is used to generate a signed
hash Hash, hashes, hash mark, or hashing may refer to: Substances * Hash (food), a coarse mixture of ingredients, often based on minced meat * Hash (stew), a pork and onion-based gravy found in South Carolina * Hash, a nickname for hashish, a canna ...
, a number generated from the contents of the document. Any change to the document, no matter how trivial, such as changing a single
bit The bit is the most basic unit of information in computing and digital communication. The name is a portmanteau of binary digit. The bit represents a logical state with one of two possible values. These values are most commonly represented as ...
from a 1 to a 0, will cause it to have a different hash, which will make the signature invalid. To alter a document while purposely maintaining the same hash, assuming the hash function and the program implementing it are properly designed, is extremely difficult .


See also

* Active packaging *
Chicago Tylenol murders The Chicago Tylenol murders were a series of poisoning deaths resulting from drug tampering in the Chicago metropolitan area in 1982. The victims consumed Tylenol-branded acetaminophen (paracetamol) capsules that had been laced with potassium ...
*
Hardware-based full disk encryption Hardware-based full disk encryption (FDE) is available from many hard disk drive (HDD/ SSD) vendors, including: Hitachi, Integral Memory, iStorage Limited, Micron, Seagate Technology, Samsung, Toshiba, Viasat UK, and Western Digital. The ...
* Ink tag * * Package pilferage *
Packaging Packaging is the science, art and technology of enclosing or protecting products for distribution, storage, sale, and use. Packaging also refers to the process of designing, evaluating, and producing packages. Packaging can be described as a coo ...
*
Sealing wax Sealing wax is a wax material of a seal (emblem), seal which, after melting, hardens quickly (to paper, parchment, ribbons and wire, and other material), forming a bond that is difficult to break without noticeable tampering. Wax is used to verify ...
*
Security printing Security printing is the field of the printing industry that deals with the printing of items such as banknotes, cheques, passports, tamper-evident labels, security tapes, product authentication, stock certificates, postage stamps, and identity c ...
*
Security seal Security seals are tamper-evident mechanisms that seal valuable material in a room, cabinet, vehicle, or other storage facility. One common use is to seal cargo in transit shipping containers in a way that provides tamper evidence and some lev ...
*
Tamperproofing Tamperproofing is a methodology used to hinder, deter or detect unauthorised access to a device or circumvention of a security system. Since any device or system can be foiled by a person with sufficient knowledge, equipment, and time, the term " ...


References


External links


FDA Compliance Policy Guides – CPG Sec. 450.500 Tamper-Resistant Packaging Requirements for Certain Over-the-Counter Human Drug Products
*"Improving Tamper-Evident Packaging: Problems, Tests and Solutions", Jack L. Rosette, 1992
"Tamper Evident Microprocessors", Adam Waksman and Simha Sethumadhavan, 2010
* {{Packaging Packaging Security