IDENTITYTHEFT - fhs

advertisement
Identity Theft
Across
America
INTRODUCTION
Identity theft
occurs
frequently to
people
nation wide.
Each year millions of
people become victims to
identity theft.
Identity theft is when
criminals steal
someone’s personal
information to acquire
money, homes, cars,
and other valuable
possessions.
Internet usage in the
past decade has left
both civilians and
businesses vulnerable
to identity theft.
Online buying
systems, credit
card numbers and
other personal
information are
readily available to
online hackers.
Criminals use this stolen
information for
themselves or sell it for a
price to others.
Identity thieves can usually
obtain personal information
by:
1) Stealing wallets that
contain identification
information, ATM and credit
cards;
2) Stealing bank statements
from your snail mail;
3) Diverting your mail from
its intended recipients by
submitting a change of
address form in the post
office;
4) Rummaging through your
trash for any personal data
and relevant papers;
5) Stealing personal
information from office and
school records
and 6) Intercepting or
obtaining information
transmitted electronically
via the Internet or through
fax
It can be very expensive to
clear your name after an ID
theft.
You could be denied loans,
new credit cards, corporate
benefits and jobs — and,
though very unlikely, you
could even be mistakenly
arrested by the authorities
as a result of crimes
committed in your name.
Identity thieves commonly
open new banking accounts
in your name
They can apply for new
credit cards using your
name and personal
information, make
fraudulent charges, and
leave the bills unpaid.
They may set up telephone
or other utility services in
your name and pay only the
minimum due and then not
pay for it eventually.
Some identity thieves apply
for loans, apartments,
memberships and
mortgages using stolen
identities.
ID Thieves print counterfeit
checks in a victim’s name.
They may take $ from your
bank accounts, put charges
on your credit cards, and
use your checks or credit to
make down payments for
cars, furniture, jewelry, and
other pricey items.
Some victims learn that
thieves have opened many
accounts in their name for a
very long period of time.
Your TASK
Mrs. Wood has just established an
Identity Theft Control Committee in
the hopes of advising Falkville
students and faculty on issues
related to identity theft at the
school and in our community.
She has asked the students in
Forensic Science to serve on this
committee. (This committee will
be affiliated with the Morgan
County Sheriff's Office who is
mandated to follow guidelines of
the Federal Trade Commission
and the US Department of Justice
Your objective is to use your
forensic expertise to:
• Examine and assess the
extent of the identity theft
problem across America.
• Examine the causes of
identity theft.
Develop a policy proposal that
addresses safety techniques
to protect people across
America.
• and to suggest ways to
implement these policies to
assure the safety of people in
our school and community.
The Research Process
Initially, you will be working on the
research process independently. You
will receive a series of questions to
answer. The questions you have may
not be the same as your neighbors. The
answers will be found on links listed on
the Wiki space. The worksheet will be
due at the end of class. You will receive
a grade on this worksheet.
Prepare a Powerpoint
You will then be assigned to work in
groups of three to create a powerpoint
using the answers on your worksheets.
You will be responsible for creating your
own slides based on your answers on
your worksheet. The slides may be
saved on the computer. Your slides
must include information and pictures.
Prepare a Powerpoint
Your group will then put your slides
together into one large powerpoint.
Slides may be transferred to one
computer using my thumb drive. You
may also include a clip of music at the
beginning of your presentation.The
powerpoint will be published on the
Forensic Wiki Space. Your group will
present the powerpoint to the class.
Why Change Policies?
• Evaluating an existing policy or product can
lead to improvements. Car companies, for
example, evaluate the current models’
advantages and disadvantages to make
improvements for next year’s models.
For Example
• Years ago, most public schools had very lax
security policies. Anyone could enter a school
and go anywhere in the building.
• Then, the increase in school violence forced
school officials to examine their existing
security policies. Many schools simply had the
policy of posting a sign at the entrance that all
visitors should report to the office.
• The main advantage to that policy was that the
only cost was the sign. However, the
disadvantage was that there was no way to
enforce it.
• Criminals, vandals or thieves who did not attend
the school could enter without visiting the office.
• Reviewing the advantages and disadvantages of
the security policies led to policy changes.
• Schools now require visitors to enter through the
main doors and sign in or obtain a pass. Some
schools can afford metal detectors and security
guards.
• The policies your group suggests in your
powerpoint should be something that improves
on the current policy.
• It should be worthwhile and founded in fact as
much as possible.
PREPARE A POWER POINT PRESENTAION
Address the following:
•A clear identification of the problem.
•An explanation of the causes of the problem.
•The identification of identity theft found worldwide.
•An explanation of how identity theft affects human health and behavior (physical,
psychological, and social).
•Screening tests for the identification and quantification of identity theft.
•An evaluation of current policies relating to the collection and processing of
physical evidence in cases relating to identity theft.
•An evaluation of the current policies related to identity theft at the federal, state
and local levels.
•The most effective and feasible lab policy.
•The most effective and feasible public policy.
Process:
•For each slide, include appropriate information, graphic(s), and references.
•Present your slideshow.
•Post your slide show on the Forensic Biology website at Bronx Science.
RESOURCES
•TIPS Public Policy Analyst Guidelines
- http://www.maxwell.syr.edu/plegal/TIPS/welcome.html
•Contact Experts in the Field
- The New York State Police Science Laboratory System
• http://www.troopers.state.ny.us/ForSc/ForScindex.html
-Northeastern Association of Forensic Scientists (NEAFS)
•http://www.geocities.com/CapeCanaveral/Lab/5122/labs.htm
-American Academy of Forensic Sciences (AAFS)
•http://www.aafs.org
-American Board of Criminalistics (ABC)
•http://www.criminalistics.com/ABC/abchome.htm
-American Society of Crime Laboratory Directors (ASCLD)
•http://www.ascld.org
PROBLEM REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
•
http://www.identitythefthero.com/id-theft-defined.html
http://www.idtheftcenter.org/facts.shtml
http://www.weprevent.org/weprevent/weprevent/?pg=14618-1462016852
http://www.whitecanyon.com/identity-theft-statistics-ut-09-2003.php
http://www.usps.com/postalinspectors/idthft_ncpw.htm
http://www.fraudcrisis.com/facts.htm
http://crime.about.com/od/issues/a/aa040718.htm
http://media.collegepublisher.com/media/paper563/stills/0664vi6k.jp
g
http://www.ftc.gov/bcp/conline/pubds/credit/idtheft.htm
http://www.idtheftcenter.org/cresources.shtml
http://money.howstuffworks.com/identity-theft2.htm
http://en.wikipedia.org/wiki/identity_theft
http://www.pagetutor.com/misc/idtheft.html
• http://www.thebankofcanton.com/about/id_theft/
PROBLEM REFERENCES
•
•
•
•
•
•
•
•
•
•
•
http://www.consumer.gov/sentinel/idchart.htm
http://news.com.com/2010-1071-958328.html
http://www.ftc.gov
http://www.iwillteachyoutoberich.com/archives/identity_theft.jpg
http://www.infosecwriters.com/texts/php?op=display&id=146
http://www.fightidentitytheft.com/images/lolgo_new_white_small.j
pg
http://dictionary.reference.com/search?q=identity%20theft
http://www.bankrate.com/brm/news/advice/Idtheft/victim.asp
http://usdoj.gov/criminal/fraud/idtheft.html#what%20Ave%20identi
ty%20theft%20and%identity
http://homepage.mac.com/ronsbel/blogs/b380834556/c999324670
/e924405970/
http://www.youngmoney.com/consumer/consumer_fraud/030205_
02
PROBLEM REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
Http://galent.galegroup.com/servlet/scirc?ste=1&docnum=a1293377
18
http://www.insideid.com/idtheft/article.php/3438261
http://www.fraudpractice.com/statistics.htm
http://www.creditinfocenter.com/identity/idtheftstats.shtml
http://www.idaftermath.org/idaftermath.pdf
http://www.rohan.sdsu.edu/faculty/giftfire/chapter07.ppt
http://www.krollworldwide.com
http://www.msnbc.msn.com/id/5763781/
http://www.ed.gov/news/speeches/2003/12/12112003a.html
http://www.zwire.com/site/news.cfm7brd=1574&deptid=532215&new
sid=15483095&newsid=15483095&pag-461&fi=9
http://www.bbbonline.org
http://www.bos.frb.org
CAUSES REFERENCES
•
•
•
•
•
•
•
•
•
<http://www.usdoj.gov/criminal/fraud/idtheft.html>
Bruce, Laura. Protect Yourself From Identity Theft.
<http://homepage.mac.com/ronsbeli/Blogs/B380834556/C9993246
70/E924405970/>
<http://www.ou.edu/oupd/idtheft.htm>
<http://www.pcmag.com/article2/0,4149,1237503,00.asp>
<http://dps.state.az.us/azvictims/identity>
<http://newjerseybrazil.com>
<http://911identityalert.com/product/idlock.jsp>
<http://pcprivacycentral.com/pc_problems.htm>
<http://images.newsfactor.com/images/id/4927/story-identitytheft.jpg>
CAUSES REFERENCES
•
•
•
•
•
•
<http://www.gao.gov/cgi-bin/getrpt?GAO-02-363>
<http://www.pagetutor.com/misc/idtheft.html>
<http://www.consumer.gov/idtheft/con_about.htm>
<http://www.consumer.gov/idtheft/pdf/synovate_report.pdf>
<http://www.usps.com/postalinspectors/iftheft_ncpw.htm>
<http://www.javelin.strategy.com/reports/2005ReportBrochure.pdf.p
df>
• <http://www.scambusters.org>
• <http://policyalmanac.org/crime/archive/identity_thefts.shtml>
• <http://www.econsumer.equifax.com>
CRIME SCENE INVESTIGATION
REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
•
www.nationalnotary.org/idtheft/index.cfm?text=papertrail
http://www.idtheftcenter.org/vg114.shtml
http://howstuffworks.com
http://computer.howstuffworks.com/identity.theft1.htm
http://www.ftc.gov/os/2003/09/synovatereport.pdf
http://www.idtheftcenter.org/idaftermath.pdf
http://www.ftc.gov/bcp/conline/pubs/credit/idtheft.htm\
http://www.idtheftcenter.org/other.shtml
http://www.cbsnews.com/stories/2000/03/15/national/main172187.shtml
www.usdoj.gov/criminal/cybercrime/usamarc2001_3.htm
www.consumer.gov/idtheft
www.senate.gov/galleries/daily/224pro5.html
www.war.org.uk/ecoespionage/resource/cybercrime/ecrime-screneinvestigation.html
CRIME SCENE INVESTIGATION
REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
www.idtheftresource.com
http://www.idtheftcenter.org/vg301.shtml
http://www.hightechcrimecops.org/mission.htm
www.ftc.gov
www.consumer.gov/idtheft
http://www.consumer.gov/idtheft/con_pubs.html
http://www.ftc.gov/bcp/conline/pubs/crdit/idtheftmini.htm
www.columbuspolice.org/fraud/investigativeprocedures_end_criter
ia.html
http://www.chicago.bbb.org/idtheft/txpoof.html
http://www.privacyrights.org/fs/fs/79.htm
http://www.secretservice.gov/financial_crimes.shtml
www.idtheftcenter.org/vg106.shtml
TYPES OF IDENTITY THEFT REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
•
•
http://www.myidfix.com/identity-theft-statistics-us.php
http://www.creditinfocenter.com/identity/IDTheftStats.shtml
http://www.factusa.com/ArticleSidebar.asp?id=41
http://www.identityfraud.com
http://www.idtheftcenter.org/
http://computer.howstuffworks.com/identity-theft1.htm
http://www.ftc.gov/os/2003/09/synovatereport.pdf
http://www.101-identitytheft.com/
http://www.usdoj.gov/criminal/cybercrime/usamarch2001_3.htm
http://www.ftc.gov/bcp/conline/pubs/credit/idtheft.htm\
http://www.cmiftf.org/
http://www.identitytheft.com
http://www.chicago.bbb.org/idtheft
http://www.oag.state.tx.us/newspubs/opeds/200401blues.shtml
TYPES OF IDENTITY THEFT REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
http://www.creditinfocenter/identity/IDTheft
http://www.bos.frb.org
http://www.bullzeye.com/identitytheft/index4
http://www.BBB.com.types_of/~html.
http://www.howstuffworks.com/identity_theftp2.html
http://www.aarp/org/research.frauds-scams/fraud/aresearch-import186-0085.html
http://www.consumer.gov/sentinel/images/charts/idtheft01.pdf
http://www.crypto.wpi.edu/Publications/Documents/WPI_IQP_IdTheft.
pdf
http://www.fdle.state.fl.us/Publications/Identity_Theft.pdf
http://www.privacyrights.org/fs/fs/t-it.htm
http://www.newyork.bbb.org/identitytheft/typesof.html
http://www.crimeandclues.com/dumpster_diving.htm
TYPES OF IDENTITY THEFT REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
•
http://www.consumer.gov/idtheft/
http://www.idtheftcenter.org/vg114.shtml
http://www.privacyrights.org/fs/fs17a.htm
http://www.cityofmemphis.org/framework.aspx?page=524
http://www.fbi.gov/headlines/idthefth.jpg
http://www.howstuffworks.com
http://www.idtheft.com
http://www.ftc.com
http://www.crimeprevention.com/upload/social-security-numbercard.gif
http://www.privacyrights.org/fs/fs17-it.htm
http://www.tompaine.com/upload/social-security-number-card.gif
http://www.chicago.bbb.org/idtheft/typesof.html
http://www.simmonsfirst.com/images/interior/credit_card_layout4.
gif
TYPES OF IDENTITY THEFT REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
•
http://www.idtheftcenter.org/cresources.html
http://www. equifax.com
http://www.thebankofcanton.com/about/id_theft/
http://www.keeponprospecting.com/portal/idtheft/images/IDT105_11g.jpg
http://www.identitythefthero.com/id-theft-defined.html
http://www.idtheftcenter.org/facts.shtml
http://www. usps.com/postalinspectors/idtheft-ncpw.htm
http://www. usatoday.com/money/perfi/general/2005-01-14shreddercover-x.htm
http://www.crime.about.com/od/issues/a/aa040718.htm
http://www.media.collegepublisher.com/media/paper563/stills/0664
vi6k.jpg
http://www.ftc.gov/conline/pubs/credit/idtheft.htm
http://www.unwantedlinks.com/fraudchart-sm.jpg
http://www.ecommercetimes.com/perl/story/20553.html
PHOTOGRAPHY REFERENCES
•
•
•
•
•
•
•
•
•
http://www.pcmag.com/article2/0,1895,162551,00.asp
http://www3.cnn.com/TECH/computing/9910/11/id.theft.idg/
http://www.forensics-intl.com/art18.html
http://en.wikipedia.org/wiki/Digital_photography#Advantages_of_d
igital:_consumer_cameras
http://www.westchestergov.com/labsresearch/ForensicandTox/fore
nsic/photo/forphotoframeset.htm
http://library.thinkquest.org/04oct/00206/soc_recording_the_crim
e.htm#soc_camera
http://expertpages.com/news/voiceprint_identification.htm
http://www.elmhurst.org/elmhurst/police/generalinfo.asp
http://www.crime-scene-investigator.net/
PHOTOGRAPHY REFERENCES
•
•
•
•
•
•
•
•
•
•
•
http://www.FTC.com
http://www.webopedia.com/TERM/d/digital_photography.html
http://sg.wilkes.edu/PhotoQuest/stories/storyReader$17
http://www.idtheftcenter.org
http://www.ou.edu/oupd/idtheft.htm
http://www.privacyrights.org/identity/htm
http://www.consumer.gov/idtheft
http://www.crime-scene-investigator.net/admissibilityofdigital.html
http://www.wirelessmoments.com/2004/02/third_article_a.html
http://www.techdirt.com/articles/2004/223/1438218_F.html
http://www.newstarget.com/007346.html
PHOTOGRAPHY REFERENCES
•
•
•
•
•
•
•
•
•
•
http://magazines.ivillage.com/goodhousekeeping/consumer/safety
/articles/0,,284526_671911,00.html
http://www.advimagingandanalysis.com/Appnotes/nov98.html
http://www.dol.wa.gov/ds/digfaq.htm
http://www.kenrockwell.com/tech/digital.htm
http://home.earthlink.net/~thekeither/Foorensic/page7.htm
http://www.engadget.com/entry/1234000230053946/
http://en.wikipedia.org/wiki/identity_documents_in_the_United_St
ates
http://www.informit.com/guides/content.asp?g=digitallifestyles&se
qNum=274
http://www.geocities.com/cfpdlab/digital.htm
http://www.digitalphotgraphy-fried.html
VIDEOGRAPHY REFERENCES
•
•
•
•
•
•
•
•
http://urbanlegends.about.com/library/bl_atm_skimmer.htm
http://www.brucekoeing.com/services.php
http://www.dejaview.com/default.asp?page_id=74
http://www.westchestergov.com/labsresearch/ForensicandTox/forensic
/photo/forphotoframeset.htm
http://www.elmhurst.org/elmhurst/police/general info.asp#photo
http://www.gatheringguide.com/event_directory/
ma_massachusetts/vendor_videographers_144.html
http://www.tribuneindia.com/2005/20050630/ punjab1.htm
http://www.crime-scene-investigator.net/video.html
VIDEOGRAPHY REFERENCES
• http://www.legalvideographers.com/about.php
• http://library.thinkquest.org/04oct/00206/soc_
recording_the_crime.htm#soc_videocam
• http://www.cgroup.com/default3.htm
• http://expertpages.com/news/forensic_exam_video tape.htm
• http://www.thefreedictionary.com/videography
• http://ali.apple.com/ali_sites/ali/exhibits/1000019
• http://www.brucekoenig.com/services.php
• http://www.infromit.com/guides/content.asp?g=digitallifestyles&se
qNum=274
• http://www.magazines.ivillage.com/goodhousekeeping/consumer/s
afety/articles/0,,284526_671911,00.html
VIDEOGRAPHY REFERENCES
• http://www.keyscan.ca/English/PDFs/Products_Photo_Badge_.pdf
• http://www.focus.ti.com/docs/apps/catalog/general/applications.jh
tml?templateId=5958&path=templatedata/cm/general/data/teleco
m_accessories_dve
• http://www.lexisnexis.butterworths.co.uk/law/ToolsServices/cr_fore
nsics.htm
• http://www.click2houston.com/news/5333451/detail.html?subid=10
100242
• http://www.tennessean.com/local/archives/05/01/66538663.shtml
• http://www.elmhurst.org/elmhurst/police/generalinfo.asp
• http://www.avdetectives.com
• http://www.covertsciences.com
FINANCIAL INVESTIGATION
REFERENCES
• <http://www.irs.gov/compliance/enforcement/article/0,,id=107515,00.
html>
• <http://www.akaku.org/graphics/forms_paper_stack.jpg>
• <http://www.secretservice.gov/financial_crimes.shtml#Financial>
• <http://www.fbi.gov/publications/financial/fcs_report052005/fcs_rep
ort052005/fcs_report052005.html#e1>
• <http://www.interfire.org/res_file/fin_outl.asp#whatfin>
• <http://www.stats.bls.gov/oco>
• <http://www.policedhiefmagazine.org/magazine/index.cfm?fuseaction
=display_arch&article_id538&issue_id=32005>
• <http://www.idtheftcenter.org/alerts/shtml>
FINANCIAL INVESTIGATION
REFERENCES
• <http://www.myidfix.com/identity_theft_statistics_us.php?oscid=bZ
Z300399ca9a2f89144e1cf3c74f366>
• <http://www.bbbonline.org/IDTheft/safetyQuit.asp>
• <http://www.dfwresources.net/idtheft_intro.htm>
• <http://www.idtheftcenter.org/alerts/shtml>
• <http://www.myidfix.com/identity_theft_statistics_us.php?oscid=bZ
Z300399ca9a2f89144e1cf3c74f366>
• <http://www.dfwresources.net/idtheft_intro.htm>
• <http://www.ur.das.state.or.us/hrsd/class/5235.htm>
• <http://www.privacyrights.org/identity.html>
• <http://www.protiviti.com/portal/site/prous/index>
• <http://www.financialpi.com>
FINANCIAL INVESTIGATION
REFERENCES
•
•
•
•
•
•
•
•
<http://www.elderoptionsoftexas.com>
<http://www.ftc.gov/os/1999/04/identitythefttestimony.htm>
<http://www.netsafe.org.nz/fraud/fraud_default.aspx>
<http://www.Ou.edu/oupd/idtheft.htm>
<http://www.sercretservice.gov/financial_crimes.shtml>
<http://www.insideid.com/idtheft/article.php/11748_348261_2>
<http://www. Insideid.com/idtheft/article.php/3438261>
<http://www.
Dhs.gov/dhspublic/interapp/press_release/press_release_0206.xm
l>
• <http://www.sec.gov/investor/pubs/onlinebrokerage.htm>
VOICE EXAMINATION REFERENCES
•
•
•
•
•
•
•
•
•
•
•
Http://www.expertpages.com/news/voiceprint_identification.htm
http://www.brucekoenig.com/service.php
http://www.newstarget.com/007346.html
http://caeaudio.com/forensicmethod.html
http://expertpages.com/news/voice_forensic_tool.htm
http://www.idtheft.org
http://fightidentitytheft.com
http://www.identitytheftspy.com/2005/05/voice_recogniti.html
http://www.digimarc.com/docs/wp_colocasestudy.pdf
http://www.rohan.sdsu.edu/~ling354/voicerecognition.html
http://www.businessweek.com/technology/content/apr2005/tc2005
0420_1036_tc024.htm
VOICE EXAMINATION REFERENCES
•
•
•
•
•
•
•
•
•
•
Http://www.ou.edu/oupd/idtheft.htm
http://www.consumer.gov/idtheft.htm
http://www.forensic-int.com/art18.html
http://www.infomit.com/guides.content.asp?g=digitallifestyles&seq
Num=274
http://magazines.ivillage.com/goodhousekeeping/consumer/safety
/articles/0,,284526_671911,00.html
http://www.keyspan.ca/English/PDFs/Products_Photo_Badge.pdf
http://www.voicedoctor.net/diagnose/vcb.html
http://www.allayurveda.com/diagnosis_exeight.htm
http://www.nidcd.nih.gov/health/voice/vocalabuse.asp
http://www.legallanguage.com/forensic/Spectrographic.htm
VOICE EXAMINATION REFERENCES
• Http://www.victimsassistanceofamerica.org/howto-contactmartha.cfm
• http://www.identitytheftspy.com/prevention/
• http://digimarc.com/secureid/about.asp
• http://www.voicevault.com/itf.php
• http://www.idtheftcenter.org
• http://www.tradeharbor.com/TH_Website2/vss.html
• http://www.yahoo.com/voiceenhancement.htm
• http://en.wikipedia.org/wiki/identity_documents_in_the_United_St
ates
• http://www.cyberdriveillinois.com/press/2004/may/040510d1.html
• http://www.dol.wa.gov/ds/digfag.htm
DOCUMENT EXAMINATION
REFERENCES
• Http://en.wkipedia.org/wki/Main_page
• http://www.iiiweb.net/go/forensic-services/questioned-documentexamination
• http://faculty.ncwc.edu/toconnor/425/425let05.htm
• http://www.myhandwriting.com/experts/#List%20of%20Analysts
• http://eslu.cse.ogi.edu
• http://www.springer.com
• http://www.documentlab.com/s_oblif.gif
• http://www.fbig.ca/forger.html
• http://qdewill.com/problems.htm
• http://www.swafde.org/faq.html
• http://www.4n6.com/alt.htm
DOCUMENT EXAMINATION
REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
http://en.wikipedia.org/wiki/Questioned_document_examination
http://www.fbigov/hq/lab/fsc/backissu/april2000/swgdoc6.htm
http://www.ice.gov/graphics/news/factsheets/061704det_FS.htm
http://www.swafde.org/faq.html
http://www.documentlab.com/services.htm
http://forensic.to/webhome/qdewill/
http://www.samanagement.co.za/document_examination.htm
http:// www.vision.caltech.edu/mariomu/research/sigverif/s066f.gif
http://www.forensic-evidence.com/site/ID/ID_Biometric_jarvis.html
http://www.usdoj.gov/criminal/fraud/idtheft.html
http://identitytheftinfo.blogspot.com/
http://www.abfde,org/fde.htm
DOCUMENT EXAMINATION
REFERENCES
• http://www.grc.nasa.gov/WWW/epbranch/surtxt/surfacetitles.htm#
Atomic_Oxygen
• http://www.ntu.edu.sg/home/asgleedham/currentresearch.htm
• http://www.aafs.org/default.asp?section id=resources&page
id=choo sing a career#QD
• http://www.abfde.org/faqs.htm#categories
• http://www.hk-lawyer.com/2000-6/June00-92.htm
• http://www.docexaminer.com/?gclid=CNLu4Z_y-YECFQcpGgodJCuBlw
• http://www.wyomingbankers.com/pdfs/Fraud_Prevention_Basics.pd
f#search=‘document%20examination%20%20identity%20theft’
• http://www.iptm.org/psi/crim.htm#033109
• http://docev.co.uk/areas_alterations.html
COMPUTER DATA RECOVERY REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
http://www.disklabs.com/data-recovery.asp
http://www.disklabs.com/computer-forensics-introduction.asp
http://netsecurity.about.com/od/newsandeditorial1/a/aaidenttheft.htm
http://www.have.sandiego.edu/~lsolum/colloquia/kerrdigitalworld.doc
http://www.73.com/data-recovery/article-10-Computer-DataRecovery.html
http://www.popularmechanics.com/technology/computers/1279241.ht
ml
http://www.pctechbytes.com/
http://www.essdatarecovery.com/
http://computer.howstuffworks.com/question578.htm
http://www.essentialrecovery.com/protect_personal_info.html
http://en.wikipedia.org/wiki/Salvage_Data
http://www.icsworld.com/computer_forensic_investigation_services.a
sp
COMPUTER DATA RECOVERY REFERENCES
• http://www.computeruser.com/articles/2205,1,1,1,0501,03.html
• http://www.fraudaid.com/security_products/articles_information/identity_
theft.htm
• http://www.goarticles.com/cgi_bin/showa.cgi?c=83363
• http://www.insideid.com/idtheft/article.php/11784_3438261_6
• www.fraudaid.com/security_products/articles_information/identity_theft
• http://www.microsoft.com/athome/security/spyware/spywareremove.mspx
• http://www.intellirecovery.com/data_recovery_services.html
• http://www.internetfraud.usdoj.gov/
• www.dataexcorp.com/html/cybercrimenews.htm
• http://www.datarecovery.net
• www.ftc.gov/bcp/conline/pups/credit/idtheft.htm
• http://www.krollontrack.com/
COMPUTER DATA RECOVERY REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
•
http://www.flashbackdata.com/computer-forensics/
www.datarecovery.net
http://www.usdoj.gov/criminal/fraud/Internet/htm#
http://www.ontrack.com/
http://www.fraud.org/
http://www.wikipedia.org
http://www.datarecovery.net/
http://www.databankservices.com/common_evidence.html
http://www.harddriverecovery.org/computer-data-recovery.html
http://www.ou.edu/oupd/idtheft.htm
http://www.netsafe.org.nz/fraud/fraud_default.aspx
http://www.privacyrights.org/identity.htm
http://www.actionfront.com
COMPUTER FRAUD REFERENCES
•Http://www.fraud.org/graphics/1999graphs/initialcontact.gif
•Http://www.antiphishing.org/
•Http://www.archives.cnn.com/2000/tech/computing/03/20/net.identit
y.theft.idg/
•Http://www.linus.socs.uts.edu.au/~jim/cit2/cit299/legal/images/graph.jpg
•Http://www.wtpdmorris.org/News/phishing/links.gif
•Http://www.windowsecurity.com/img/upl/image00610610.jpg
•Http://www.archives.cnn.com/2000/tech/ptech/II/30/internetshopping/story.computer.ideas.2.jpg
•Http://www.istockphoto.com/imageindex/26121/62274/
•Http://www.infotech.com/upload/20030514-01.gif
•Http://www.e-jaz.com.au/media/2003/QBR/200302Catch.htm
•Http://www.internetfraud.usdoj.gov
•Http://www.cnn.com/…/story.computer.ideas.2.jpg
COMPUTER FRAUD REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
Http://www.cimsgts.com/images/data-flowing-from-computer.jpg
Http://www.universalprocessing.com/images/Credit1.jpg
Http://www.webopedia.com/term/p/phishing.htm
Http://www.losspreventionmagazine.com/archives_view
Http://www.dailytimes.com.pk/default.asp?page=story
Http://www.fbi.gov/majcases/fraud/internetschemes.htm
Http://www.internet-fraud.com/internet-fraud/
Http://www.fraud.org/internet/intset.htm
Http://www.images.google.com/imgres?imgurl=
Http://www.cmu.edu/police/images
Http://www.images.google.com/imgres?imgurl=
Http://www.elderoptionsoftexas.com
Http://www.internetfraud.usdog.gov/
Http://www.fraud.org/graphics/1999graphs/contactbytype.gif
COMPUTER FRAUD REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
•
Http://www.universalprocessing.com/images/credit1.jpg
Http://www.scmagazine.com/uk/news/article/530336/majority-worldworried-internet-fraud
Http://www.twincities.com/mid/twincities/13259174.htm
Http://www.nlcnet.org/internetscramfactsheet.html
Http://www.fraud.org
Http://www.esadkihs.com/fihforpic2
Http://www.ifccfbi.gov/index.asp
Http://www.fraud.org/internet/inttip/inttip.htm
Http://www.usdoj.gov/criminal/fraud/index.htm
Http://www.pcppress.co.yu/arhiva/images/broj/62/36_ada-computers.jpg
Http://www.fbi.gov/publications/financial/fcs_report052005/fes_report052
005.htm#el
Http://www.internetfraud.usdoj.gov/#What%20Is%20Internet%20Fraud
Http://www.fraudaid.com/security_products/articles_information/identity_
theft.htm
FINGERPRINT REFERENCES
• http://www.techworld.com/applications/features/index.cfm?Feature
ID=1954
• http://www.cityofmemphis.org/framework.aspx?page=524
• http://www.epic.org/privacy/biometrics/testimony_071802.html
• http://www.identicatorinc.com/IdentityTheft.pdf
• http://www.geocites.com/evilsnack/idtheft.htm
• http://www.sciencedaily.com/releases/2005/03/050322135157.htm
• http://www.interpol.int/Public/Forensic/Ifss/meeting13/specialpres
entation.pdf
• http://www.cnn.com/2004/TECH/ptech/02/10/digital.evidence.ap/
• http://www.money.cnn/2005/07/19/pf/security_biometrics/
FINGERPRINT REFERENCES
• http://www.fdeservices.com
• http://www.iiiweb.net/go/forensic-services/questioned-documentexamination
• http://www.forensic.to/webhome/qdewill/
• http://www.samanagement.co.za/document_examination.htm
• http://www.cariboo.bc.ca/cpj/identitytheft.html
• http://www.forensic-evidence.com/site/ID/ID_Biometric_jarvis.html
• http://www.usdoj.gov/criminal/fraud/idtheft.html
• http://www.nolo.com/article.cfm/objeftID/6BC35DBC
• http://www.atsnn.com/story/111839.html
• http://www.privacyrights.org/identity.html
FINGERPRINT REFERENCES
•
•
•
•
•
•
•
•
•
http://www.onin.com/fp/fphistory.html
http://www.latent-prints.com/
http://www.faculty.ncwc.edu/toconnor/315/315lect05.htm
http://www.forensic-evidence.com/site/ID/havvard_2000.html
http://www.search.yahoo.com/search?p=fingerprint+evidence+refer
ences&fr=FP-tab-web-t&toggle=1&cop=&ei=UTF-8
http://www.biometricaccess.com/products/wp_finge.htm
http://www.accessexcellence.org/RC/AB/BA/DNA_Fingerprinting_Ba
sics.html
http://www.caag.state.ca.us/idtheft/general.htm
http://www.epic.org/privacy/biometrics/testimony_071802.html
FEDERAL POLICY REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
•
http://www.oag.state.ny.us/consumer/tips/id_theft_victim.html
http://www.whitehouse.gov/news/releases/2004/07/20040715-3.html
http://www.ftc.gov/foia/privacy_act.htm
http://en.wikipedia.org/wiki/health_insurance_portability_and_accountability_act
http://www.usdoj.gov/criminal/fraud/idtheft.html#what’s%20the%20department%20
of%20justice%20doing%20about
http://www.consumer.gov/idtheft/con_steps.htm
http://www.ssa.gov/pubs/idtheft.htm
http://www.bankofinternet.com/quickhelp/preventing_identity_theft.asp
http://www.ncjrs.org/spotlight/identity_theft/summary.html
whitehouse.gov/identity
http://www.bad-credit-rx.com/identity_theft.html
http://www.consumer.gov/idtheft/id_laws_privacy.htm
http://www.whitehouse.gov/news/releases/2004/07/20040715-3.html
FEDERAL POLICY REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
•
http://www.fbi.gov/page2/oct04/preventidt102104.htm
http://www.newyork.bbb.org/
http://www.senate.gov/~schumer/schumerwebsite/pressroom/special_reports/ident
ity%20theft%20report.pdf
http://www.fbi.gov/page2/oct04/preventidt102104.htm
http://www.whitehouse.gov/news/releases/2004/07/20040715-3
http://www.llrx.com/features/idtheft.htm
http://www.gov/org/identitytheft
http://www.internetnews.com
http://www.whitehouse.gov/news/release/2004/07120040715-3.html
http://www.encarta.com
http://google.com/federalpolicyburea.edu
http://www.cga.ct.gov/2004/rpt/2004-R/0641.htm
http://www.llrx.com/features/idtheftguide.htm
STATE POLICY
•http://www.ag.ca.gov/idtheft/tips.htm
•http://www.consumersunion.org/pub/care_financial_services/000144.html
•http://www.consumer.state.ny.us/pdf/id_theftpamphlet.pdf
•http://www.ago.state.co.us/idtheft/lehelp.cfm
•http://assembly.state.ny.us/leg/?bn=A04254
•http://info.sen.ca.gov/pub/0102/bill/sen/sb_1351_1400/sb_1386_bill_20020926_chaptered.html
•http://www.texas.gov/policies/idtheft/a
•http://www.texas.gov/image1
•http://www.privacyprotection.ca.gov/
•http://www.dos.state.ny.os/coog/csogwww.html
•http://www.health.state.ny.us/nysdoh/phferum/ppp.about.htm
•http://www.california.gov/losangelos/policies/id/theft/policy
•http://www.la.gov/police.lapd
•http://www.boston.com/news/local/new_hampshire/articles/2005/10/16/more_insurer
s_offering_identity_theft_policies/
•http://www.assembly.state.ny.us/leg/?by=k&qs=+identity+theft
STATE POLICY
•
•
•
•
•
•
•
•
•
•
•
http://www.egov.cityofchicago.org/city/webportal/portaldeptcategoryaction.do?bv_s
essionid=@@@@1547864447.1141025515@@@@&BV_engineID=cccfaddgmjddkjhcefe
celldffhdfgn.0&deptcategoryoid=_536890496&contenttype=coc_editorial&topchann
elname=Dept&entityname=consumer+services&deptmaincategoryOID=_536889065
http://www.consumer.gov/idtheft/id_laws_privacy.htm
http://www.ftc.gov/bcp/conline/pubs/crdit/idtheftmini.htm#introduction
http://www.ftc.gov/bcp/conline/pubs/credit/idtheftmini.pdf
http://www.fbi.gov/page2/oct04/preventidt102104.htm
http://www.newyork.bbb.org/
http://www.senate.gov/~shumer/schumerwebsite/pressroom/special_reports/identi
ty%20theft%20report.jdf
http://www.senatorfarley.com/press_archive_story.asp?id=3167
http://www.oag.state.ny.us/consumer/tips/identity_theft_pamphlet.pdf
http://www.assembly.state.ny.us/leg/?bn=S03492
http://www.senatornozzolio.com/constituent_services_story.asp?id=15
STATE POLICY
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
http://www.leginfo.ca.gov
http://www.privacyprotection.ca.gov
http://www.legis.state.gov.us/legis/2001_02/fultext/sb475.htm
http://www.llrx.com/features/idtheft.htm
http://www.oag.state.ny.us/consumer/tips/identitytheft.htm
http://www.consumeraffairs.com/news041/2005
http://www.consumer.gov/idtheft/law_laws_state_criminal.htm
http://www.securitystate.ny.us/entitiesof_provision.html
http://www.consumer.gov/idtheft/id_laws_privacy.htm
http://www.mass.gov/idtheft.htm
http://www.oag.state.ny.us/consumer/consumerissues.html
http://www.privacyprotection.ca.gov/lawenforcement/laws.htm#five
http://www.ncsl.org/programs/lis/privacy/idt-01legis.htm
http://www.californiastateidfraud.org
www.ny.gov/identitytheft
www.illinois.gov/identitytheft
LOCAL POLICY REFERENCES
• http://www.ny.gov/governor/press/02/oct9_02.htm
• http://www.ftc.gov/bcp/workshops/idtheft/charts-update.pdf
• http://www.senate.gov/~schumer/SchumerWebsite/pressroom/press
_releases/PR01342.html
• http://www.lapdonline.org/bldg_safer_comms/prevention/identity.ht
m
• http://www.nyccouncil.info/media/reports.cfm
• http://www.nyc.gov/html/initiatives/campus.shtml
• http://www.senate.gov/~schumer/SchumerWebsite/pressroom/press
_releases/PR02155.html
• http://www.identitytheft911.com/company/press/press200502lapfcu.h
tm
• http://www.nationalnotary.org/idtheft/index.cfm?Text_papertrail
• http://www.sandiego.gov/mayor/messages/identitytheft.shtml
• http://www.newyork.bbb.org/
LOCAL POLICY REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
•
http://www.gothamgazette.com/article/tech/20040415/19/950
http://www.grolier.com
http://www.bcpl.net/policies
http://www.consumer.gov/idtheft/id_laws_privacy.htm
http://www.nyccouncil.info/search/searchlook2.cfm?SEARCH=STRING
http://egov.cityofchicago.org/city/webportal/home.do
http://101-identitytheft.com/identity-theft-new-york.htm
http://www.ncsl.org/programs/lis/privacy/idt-statutes.htm
http://www.lacity.org/atty/atycpl.htm
http://www.miami.gov/identitytheft
http://www.california.gov/Losangeles/identitytheft
http://www.ftc.gov/bcp/workshps/idtheft/reporttext.htm
http://www.bizjournals.com/boston/stories/2003/09/08/focus7.html
LOCAL POLICY REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
http://www.cit.policies.gov/seattle
http://www.nycidfraud.org
http://www.floridaidtheft.org
http://www.ci.la.ca.us/
http://www.nyc.gov/html/records/pdf/govpub/1874idtheft/pdf
http://www.miamidade.gov/csd/Idtheft.asp
http://www.miamidade.gov/csd/ID_Theft_brochure.asp
http://www.chicagotribune.com/business/chi0512310060dec31,1,1644957.story?coll=chi-business-hed
http://www.govtech.net
http://www.phoenix.gov/police/idtheft_biz.html
http://www.gothamgazette.com/article/searchlight/20050511/203/1
414
http://www.dca.ca.gov/whats_new/consumerleaders.htm
DEPARTMENT OF EDUCATION REFERENCES
•http://www.nycenet.edu
•http://www.ed.gov/news/speeches/2003/12/12112003a.html
•http://www.nycenet.edu/default.aspx
•http://www.nycenet.edu/NR/rdonlyres/F1F68208-CEAF-445E-BAA42CE17902E36A/5625/Booklet2005_Booklet2004.pdf
•http://www.nycenet.edu/Administration/Offices/FinanceandAdministr
ation?DIIT/WebServices/WebDevelopmentPosting/default.htm
•http://www.bxscience.edu/student_resources.jsp
•http://www.fraudwatchinternational.com/identitytheft/types.shtml
•www.nycenet.edu/parents/PDFs/DisciplineCode.pdf
•http://www.nycenet.edu/Offices/DHR/MostPopularClicks/Fingerprinti
ng.htm/
•http://www.ed.gov/about/offices/list/oig/misused/srespons.html
•www.depted.com
•http://www.ed.gov/about/offices/list/oig/misused/index.html
•http://www.ed.gov/idtheft
DEPARTMENT OF EDUCATION REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
•
•
www.consumers.gov/idtheft/con_resolve.htm
www.ed.gov/misused
http://usny.nysed.gov/lawsregs/edres.html
http://www.ed.gov/about/offices/list/oig/misused/victim.html
http://www.securitymanagement.com/library/001035.html
boe.edu/identitytheft/policy
http://www.findarticles.com/p/articles/mi_m2194/is_3_73/ai_n600
6613#continue
http://polcomp.rutgers.edu/identity.shtml
http://www.kheaa.com/policy.html
http://www.op.nysed.gov/subart4.htm
www.uft.org/privacy/
www.nycenet.edu/parents/essentials/school+safety/default.htm
http://www.bths.edu/artsfest/images/NYC-Official-Logo-BW.gif
http://www.educause.edu/LibraryDetailPage/666?ID=MAC0422
CITATIONS
(for images)
http://www.identitytheft911.com/assets/img/home/hm_img_collage.jpg
http://der-tellerrand.de/images/print.jpg
http://cnnstudentnews.cnn.com/interactive/tech/0211/identity.
protection/bground.identity.theft.jpg
http://www.crime-research.org/news/2003/img/Lico.jpg
SEARCH ENGINES

Alta Vista
•
www.altavista.com

Excite
•
www.excite.com

ERIC
•
www.ERIC.com

Entire Web
•
www.entireweb.com

Google
•
www.google.com

San Diego State University Library
•
www.SanDiegoStateUniversity/Library.com

Specialized Search Engines
•
www.SpecializedSearchEngines.com

Yahoo
•
www.Yahoo.com

Clip Art
•
www.ArtClipArt.com
EVALUATION
Your grade will be determined according to the following scale:
• PowerPoint Presentation. (35%) Your PowerPoint presentation will consist of
10-15 slides. Use the guidelines outlined in the PowerPoint presentation
section of this quest as your guide. Make certain that your audience can
navigate easily from slide to slide. Your final slide must identify your class, list
the names of the students in the class and generate an MLA style list of the
sources you used throughout your previous slides. Be certain that each of your
slides is thoroughly designed and well prepared to make a positive visual
impact on the audience. Use qualitative and quantitative information. All kinds
of photographs, graphs, drawings, etc., can be presented. Be certain to gather
information from multiple sources and to synthesize the information well. Also,
utilize this information to succinctly state the problem, identify the causes of
the problem and formulate a clearly stated conclusion regarding the best
policy for forensic investigators and the public in general regarding identity
theft in America.
Written Reports (35%) You will be required to write mini research reports. In
order to do this, you will have to search the Internet for appropriate articles,
synthesize, analyze and draw conclusions from the information you have
collected. All information submitted must be appropriately documented and
must include the appropriate graphics to illustrate the content and conceptual
understanding behind the investigation.
Oral Evaluation (15%) You will serve as a guest speaker for all of the forensic
science classes at The Bronx High School of Science. Your oral PowerPoint
presentation will be graded on your familiarity with the topic, clarity of concepts,
use of visual aids, how well you held the audience’s attention, audibility and
grammar.
Bibliography (15%) Use the MLA format to correctly attribute information to all
rightful sources.
GRADING POLICY
Range: 1= Poor, 5= Excellent
Written Research Projects
Scoring
Facts and information from multiple
internet sources
Synthesis of information from multiple
references
Analysis of information
Conclusions drawn from the results of
the investigation
Written clearly and succinctly
12345
12345
12345
12345
12345
GRADING POLICY
Grammar
Understanding of scientific concepts
Understanding of public policy
Policy evaluation and design
Bibliography
12345
12345
12345
12345
12345
GRADING POLICY
Oral Presentation
Scoring
State the purpose of your project.
Provide supporting information.
Present information clearly and succinctly.
Clarity of concepts.
Effective use of PowerPoint slides.
How well presenter held the audience’s
attention
The organization of facts and information
Policy decisions and solutions
12345
12345
12345
12345
12345
12345
Bibliography
12345
12345
12345
GRADING POLICY
PowerPoint Presentation
Minimum of fifteen slides.
Visual impact of slides.
Easy navigation from slide to slide.
Use of qualitative and quantitative
information.
Clear and succinct presentation.
Scoring
12345
12345
12345
12345
12345
GRADING POLICY
Use of multiple sources.
Appropriate graphics to
illustrate the content and
conceptual understandings.
Identification of the problem
and the cause of the problem.
Policy and policy solutions.
Bibliography.
12345
12345
12345
12345
12345
GRADING POLICY
Determination of Grades:
40- 50 = A
30- 39 = B
20- 29 = C
10- 19 = D
Below 10 = F
Timeframe:
• Mini research reports collected bimonthly up to and including
March 7, 2006.
• Slide show due May 30, 2006.
• Oral presentations for all forensic science classes due on June 2,
2006.
• PowerPoint presentation posted online June 2, 2006.
HIGH SCHOOL SCIENCE
PERFORMANCE STANDARDS
Scientific Connections and Applications
– Demonstrates an understanding of big ideas and unifying concepts.
– Demonstrates an understanding of the impact of technology.
– Demonstrates an understanding of the impact of science.
• Scientific Thinking
– Frames question to distinguish cause and effect, and identified or
control variables.
– Uses concepts for Science Standards to explain a variety of
observations and phenomena.
– Uses evidence from reliable sources to develop descriptions,
explanations, and models; and makes appropriate adjustments and
improvements.
HIGH SCHOOL SCIENCE
PERFORMANCE STANDARDS
Proposes, recognizes, analyzes, considers, and critiques alternative
explanations; and distinguishes between fact and opinion.
– Identifies problems; proposes and implements solutions; and evaluates
the accuracy, design, and outcomes of investigations.
– Works individually and in teams to collect and share information and
ideas.
• Scientific Tools and Technologies
– Uses technology and tools to observe and measure objects, organisms,
and phenomena, directly, indirectly, and remotely, with appropriate
consideration of accuracy and precision.
– Records and stores data using a variety of formats.
– Collects and analyzes data using concepts and techniques in
Mathematics Standard 4.
HIGH SCHOOL SCIENCE
PERFORMANCE STANDARDS
– Acquires information from multiple sources.
– Recognizes and limits sources of bias in data.
• Scientific Communication
– Represents data and results in multiple ways.
– Argues from evidence.
– Critiques published materials.
– Explains a scientific concept or procedure to other students.
– Communicates in a form suited to the purpose and the audience.
• Scientific Investigation
– Demonstrates scientific competence by completing fieldwork.
– Demonstrates scientific competence by completing secondary
research.
HIGH SCHOOL MATH
PERFORMANCE STANDARDS
• Number and Operation Concepts
– Use addition, subtraction, multiplication, division, exponentiation, and
root- extraction.
– Represent numbers in various forms and graph them.
– Compare numbers using order relations, differences, ratios, proportions,
percents, and proportional change.
– Recognize and respect basic number patterns.
• Function and Algebra Concepts
– Make predictions by interpolating or extrapolating.
• Statistics and Probability Concepts
– Organize, analyze, and display single- variable data appropriately.
– Organize, analyze, and display two- variable data appropriately.
HIGH SCHOOL MATH
PERFORMANCE STANDARDS
– Use sampling techniques to draw references.
– Understand that making inferences from a sample involves uncertainty
and that the role of statistics is to estimate the size of that uncertainty.
– Formulate hypotheses to answer a question and use data to test
hypotheses.
– Interpret representation of data, compare distribution of data, and
critique conclusions.
– Explore questions of experimental design, control groups, and
responsibility.
– Create and use models of probability and understand the role of
assumptions.
• Problem Solving and Reasoning
– Formulation.
– Implementation.
HIGH SCHOOL MATH
PERFORMANCE STANDARDS
– Conclusion.
– Mathematical reasoning.
• Mathematical Skills and Tools
– Carry out numerical calculations and symbol manipulations effectively.
– Make and use rough sketches, schematic diagrams, or precise scale
diagrams.
– Create and interpret graphs of many kinds.
– Use technology to create graphs of spreadsheets.
– Use tools in solving problems.
– Know standard methods to solve basic problems and use these
methods in approaching more complex problems.
HIGH SCHOOL MATH
PERFORMANCE STANDARDS
• Mathematical Communication
– Be familiar with basic mathematical terminology, standard
notation and use of symbols, common conventions for
graphing, and general features of effective mathematical
communication styles.
– Use mathematical representations with appropriate accuracy.
– Organize work and present mathematical procedures and
results correctly.
– Communicate logical arguments clearly, showing sensibility
and validity.
• Putting Mathematics to Work
– Data study.
HIGH SCHOOL ENGLISH LANGUAGE
ARTS PERFORMANCE STANDARDS
• Reading
– Read and comprehend informational materials.
•Writing
– Produce a report of information.
• Speaking, Listening, and Viewing
– Participate in one- to- one conferences with the teacher.
– Participate in group meetings.
– Prepare and deliver an individual presentation.
• Conventions, Grammar, and Usage of the English Language
HIGH SCHOOL ENGLISH LANGUAGE
ARTS PERFORMANCE STANDARDS
– Independently and habitually demonstrate an
understanding of the rules of the English language in
written and oral work.
– Analyze and subsequently revise work to improve its clarity
and effectiveness.
• Literature
– Respond to non- fiction documents with an eye to
strategies common to effective functional documents.
– Produce functional documents appropriate to audience
and purpose.
HIGH SCHOOL APPLIED LEARNING
PERFORMANCE STANDARD
• Problem Solving
– Design a Product, Service, or System: Identify needs that
could be met by new products, services, or systems and
create solutions for meeting them.
– Improve a System: Develop an understanding of the way
systems of people, machines, and processes work;
troubleshoot problems in their operation and devise
strategies for improving their effectiveness.
• Communication Tools and Techniques
– Develop a multi- media presentation.
• Information Tools and Techniques
HIGH SCHOOL APPLIED LEARNING
PERFORMANCE STANDARDS
– Gather information to assist in completing project
work.
– Use online sources to exchange information for
specific purposes.
– Use word processing software to produce a multi- page
document.
• Learning and Self- Management Tools and Techniques
– Review one’s progress in completing work activities
and adjust priorities.
• Tools and Techniques for Working with Others
– Participate in the establishment and operation of selfdirected work teams.
Download