Document integrity: Balancing physical and digital threats

September 23, 2025
Document integrity: Balancing physical and digital threats

Peter Thomas, Managing Director, Smurfit Westrock Security Concepts in an exclusive interview with SJUK outlines how his transition from paper‑printing to security‑printing unearthed the criticality of document integrity, where precision, artistry and layered innovation are vital to fend off ever‑evolving threats.

What initially drew you to this industry and how has that motivation evolved since?

I came from the printing industry, working with paper‑based products, when an opportunity presented itself in the security printing industry.

Once I stepped into this industry, I began to appreciate its complexity and how essential it is – for governments, individuals and businesses.

The products we make aren’t just about aesthetics; they’re about trust. They protect revenue, safeguard brands and avert fraud.

Print security requires both artistry and precision.

On the one hand, everything must look impeccable. On the other, it must function perfectly.

There’s always someone trying to counterfeit or alter what we produce, so anticipating those threats is part of the job.

In short, I chose security printing because the work is meaningful. It’s where design meets science with a particular emphasis on safety and security.

As threats to document security evolve, how do you stay ahead and lead innovation in this field?

Originally our concern was purely with the physical document.

Over time, as technology developed, we’ve had to address both physical and digital security risks.

Scanners, photocopiers, high-resolution imaging – these tools mean that a physical document can now be copied or manipulated much more easily.

In the age of digital transformation, technologies like AI offer many fantastic advantages, yet they also enable new threats – counterfeits, misinformation, digital forgeries, etc.

So there’s a balance to be struck.

To protect people’s documents properly, we need a layered approach. No single security feature is sufficient on its own. You must combine:

  • Overt features – those visible to the naked eye
  • Covert features – hidden attributes requiring special tools or lighting to see
  • Forensic features – features meant for detailed analysis or authentication, often in a lab or official settings

Also, smartphones and cloud technologies have changed the game: Digital or cloud linked validation can complement physical documents.

A document might carry a QR code or digital watermark that links to a secure database, so you can check its authenticity beyond just visual inspection of the paper.

Finally, authorities such as border control or law enforcement need to be aware of and trained in all these layers.

Overt features are for public or frontline verification; covert features require special tools; forensic features are for deep investigation, often in legal or high security contexts.

As Ireland’s largest security printer, what enables SWSC to deliver projects for governments worldwide?

We draw heavily on the reputation built by the Smurfit name.  

Founded in Ireland, the company has been a major name in paper‑based packaging and print for over 50 years, well known both domestically and internationally.

The SWSC team have honed our skills delivering significant and mission critical projects to the Irish Government for almost 5 decades.

Whilst most of our business still originates in Ireland, we are increasingly focused on forming meaningful partnerships abroad and this experience provides a platform for that growth.

Our model is not simply to take business, but to build local capability through knowledge transfer.

We have also built many successful partnerships with international colleagues and in many cases, we take on work for larger clients who may not have the capacity or bandwidth themselves.

We believe the most sustainable model is relationship building.

Doing a single contract might boost the profit in the short term, but by investing in local ecosystems, sharing expertise and developing markets together, everyone benefits in the long run.

How do you build and sustain a strong company culture, especially through periods of change?

Change is inevitable, it’s always happening.

What really matters is being open and transparent with your team and acknowledging that people handle change differently, in pace, in style and in willingness.

It helps to periodically pause – take a breath – and check in: Are we hitting the goals we set and is everyone coming on the journey with us?

Culture doesn’t shift overnight; it’s built over years, through consistent action, leadership that lives its stated values and ongoing communication.

If you want things done the right way, even when no one’s watching, then you’ve got to lead in a way that shows what matters – and trust people will follow because they want to, not because they’re being watched.

What emerging technology or trend is poised to be a game changer in your sector?

I think what’s coming next is the convergence of physical and digital identity.

For quite some time we’ll still have paper or card‑based documents, but increasingly we’ll rely on digital IDs stored on phones or in the cloud.

What matters most is that identity verification becomes airtight – two‑factor, KYC, biometrics – because once everything can be challenged by deepfakes, synthetic voices or AI‑driven spoofing, we need to make sure people are who they say they are.

There’s no denying that AI/machine learning are game‑changers both as enablers and threats.

We’ve already seen tools that can generate convincing voice clonings, manipulated video calls or synthetic documents.

Fraud is becoming more adaptable: Real‑time behavioural anomaly detection, voice cloning, social engineering, identity theft in new forms.

If you don’t have systems in place to detect these, you’ll be vulnerable.

User experience is also critical. These digital identity systems, whatever form they take, must be smooth.

If people carrying IDs or digital credentials struggle or find them awkward, the adoption will lag.

At the same time, the security side can’t slip; you need seamless, strong, privacy‑preserving verification. It’s a balancing act.

Finally, cybersecurity is rapidly evolving into an arms race.

Fraudsters are watching, learning and improvising. They only need to be successful once. That means being proactive: Anticipating AI threats, building multi‑layer defence, collaborating with peers, staying ahead of new attack vectors.

The technologies are amazing; the challenge is keeping ahead of misuse.

Read Next

Security Journal UK

Subscribe Now

Subscribe
Apply
£99.99 for each year
No payment items has been selected yet