I agree to receive communications from Forensic Technology.

By clicking SUBMIT, you agree to opt into our marketing database and receive emails on our marketing activities. You can opt out at any time by sending us an email at info@ultra-ft.com or clicking the UNSUBSCRIBE link in our emails. Privacy policy


Projectina INTERCEPTTM improves border security by significantly reducing illegal entry without increasing wait times. By automating forensic-level passport authentication, border security agencies are able to identify higher number of fake passports more quickly, block more illegal entries, and collate and share forensic intelligence about passport falsification across border points, among agencies, regions, and even between countries.

Real-time alerts

INTERCEPT Serves the immediate needs of frontline border agents by providing them with real-time alerts so they can resolve issues with questioned travel documents with less delay.

Block illegal entry

Serving to quickly identify travel threats and illegal entry. Allows quick, deep authentication of large numbers of travel documents at secondary lines. Today, only a small percentage of travelers’ documents may be inspected in depth at secondary and central locations.

Intelligence sharing

Serving the central forensic expert communities. INTERCEPT helps identify mass-produced fraudulent travel documents and helps identify patterns of use. Enables systematic, secure reporting and alerts of fraudulent document detections by providing data for intelligence analysis and real-time alerts.

High-resolution images

INTERCEPT acquires high-resolution digital images of the unique forensic patterns found in travel document security features.

Tiled images

Images are collected as a series of high-resolution tiles that capture all forensic details over all fields-of-view.

Forensic patterns

Tiled images are easily shared across networks and are arranged into forensic patterns specific to regions-of-interest for authentication.


An electronic signature is extracted from each forensic pattern and compared against a signature database.

Pulling it all together

The signatures are compared to identify falsified features, to identify trends, and share alerts across networks.

Contact Us

Need to get in touch?

Contact us

Subscribe to our newsletter