Identity Theft Across America INTRODUCTION Identity theft occurs frequently to people nation wide. Each year millions of people become victims to identity theft. Identity theft is when criminals steal someone’s personal information to acquire money, homes, cars, and other valuable possessions. Internet usage in the past decade has left both civilians and businesses vulnerable to identity theft. Online buying systems, credit card numbers and other personal information are readily available to online hackers. Criminals use this stolen information for themselves or sell it for a price to others. Identity thieves can usually obtain personal information by: 1) Stealing wallets that contain identification information, ATM and credit cards; 2) Stealing bank statements from your snail mail; 3) Diverting your mail from its intended recipients by submitting a change of address form in the post office; 4) Rummaging through your trash for any personal data and relevant papers; 5) Stealing personal information from office and school records and 6) Intercepting or obtaining information transmitted electronically via the Internet or through fax It can be very expensive to clear your name after an ID theft. You could be denied loans, new credit cards, corporate benefits and jobs — and, though very unlikely, you could even be mistakenly arrested by the authorities as a result of crimes committed in your name. Identity thieves commonly open new banking accounts in your name They can apply for new credit cards using your name and personal information, make fraudulent charges, and leave the bills unpaid. They may set up telephone or other utility services in your name and pay only the minimum due and then not pay for it eventually. Some identity thieves apply for loans, apartments, memberships and mortgages using stolen identities. ID Thieves print counterfeit checks in a victim’s name. They may take $ from your bank accounts, put charges on your credit cards, and use your checks or credit to make down payments for cars, furniture, jewelry, and other pricey items. Some victims learn that thieves have opened many accounts in their name for a very long period of time. Your TASK Mrs. Wood has just established an Identity Theft Control Committee in the hopes of advising Falkville students and faculty on issues related to identity theft at the school and in our community. She has asked the students in Forensic Science to serve on this committee. (This committee will be affiliated with the Morgan County Sheriff's Office who is mandated to follow guidelines of the Federal Trade Commission and the US Department of Justice Your objective is to use your forensic expertise to: • Examine and assess the extent of the identity theft problem across America. • Examine the causes of identity theft. Develop a policy proposal that addresses safety techniques to protect people across America. • and to suggest ways to implement these policies to assure the safety of people in our school and community. The Research Process Initially, you will be working on the research process independently. You will receive a series of questions to answer. The questions you have may not be the same as your neighbors. The answers will be found on links listed on the Wiki space. The worksheet will be due at the end of class. You will receive a grade on this worksheet. Prepare a Powerpoint You will then be assigned to work in groups of three to create a powerpoint using the answers on your worksheets. You will be responsible for creating your own slides based on your answers on your worksheet. The slides may be saved on the computer. Your slides must include information and pictures. Prepare a Powerpoint Your group will then put your slides together into one large powerpoint. Slides may be transferred to one computer using my thumb drive. You may also include a clip of music at the beginning of your presentation.The powerpoint will be published on the Forensic Wiki Space. Your group will present the powerpoint to the class. Why Change Policies? • Evaluating an existing policy or product can lead to improvements. Car companies, for example, evaluate the current models’ advantages and disadvantages to make improvements for next year’s models. For Example • Years ago, most public schools had very lax security policies. Anyone could enter a school and go anywhere in the building. • Then, the increase in school violence forced school officials to examine their existing security policies. Many schools simply had the policy of posting a sign at the entrance that all visitors should report to the office. • The main advantage to that policy was that the only cost was the sign. However, the disadvantage was that there was no way to enforce it. • Criminals, vandals or thieves who did not attend the school could enter without visiting the office. • Reviewing the advantages and disadvantages of the security policies led to policy changes. • Schools now require visitors to enter through the main doors and sign in or obtain a pass. Some schools can afford metal detectors and security guards. • The policies your group suggests in your powerpoint should be something that improves on the current policy. • It should be worthwhile and founded in fact as much as possible. PREPARE A POWER POINT PRESENTAION Address the following: •A clear identification of the problem. •An explanation of the causes of the problem. •The identification of identity theft found worldwide. •An explanation of how identity theft affects human health and behavior (physical, psychological, and social). •Screening tests for the identification and quantification of identity theft. •An evaluation of current policies relating to the collection and processing of physical evidence in cases relating to identity theft. •An evaluation of the current policies related to identity theft at the federal, state and local levels. •The most effective and feasible lab policy. •The most effective and feasible public policy. Process: •For each slide, include appropriate information, graphic(s), and references. •Present your slideshow. •Post your slide show on the Forensic Biology website at Bronx Science. RESOURCES •TIPS Public Policy Analyst Guidelines - http://www.maxwell.syr.edu/plegal/TIPS/welcome.html •Contact Experts in the Field - The New York State Police Science Laboratory System • http://www.troopers.state.ny.us/ForSc/ForScindex.html -Northeastern Association of Forensic Scientists (NEAFS) •http://www.geocities.com/CapeCanaveral/Lab/5122/labs.htm -American Academy of Forensic Sciences (AAFS) •http://www.aafs.org -American Board of Criminalistics (ABC) •http://www.criminalistics.com/ABC/abchome.htm -American Society of Crime Laboratory Directors (ASCLD) •http://www.ascld.org PROBLEM REFERENCES • • • • • • • • • • • • • http://www.identitythefthero.com/id-theft-defined.html http://www.idtheftcenter.org/facts.shtml http://www.weprevent.org/weprevent/weprevent/?pg=14618-1462016852 http://www.whitecanyon.com/identity-theft-statistics-ut-09-2003.php http://www.usps.com/postalinspectors/idthft_ncpw.htm http://www.fraudcrisis.com/facts.htm http://crime.about.com/od/issues/a/aa040718.htm http://media.collegepublisher.com/media/paper563/stills/0664vi6k.jp g http://www.ftc.gov/bcp/conline/pubds/credit/idtheft.htm http://www.idtheftcenter.org/cresources.shtml http://money.howstuffworks.com/identity-theft2.htm http://en.wikipedia.org/wiki/identity_theft http://www.pagetutor.com/misc/idtheft.html • http://www.thebankofcanton.com/about/id_theft/ PROBLEM REFERENCES • • • • • • • • • • • http://www.consumer.gov/sentinel/idchart.htm http://news.com.com/2010-1071-958328.html http://www.ftc.gov http://www.iwillteachyoutoberich.com/archives/identity_theft.jpg http://www.infosecwriters.com/texts/php?op=display&id=146 http://www.fightidentitytheft.com/images/lolgo_new_white_small.j pg http://dictionary.reference.com/search?q=identity%20theft http://www.bankrate.com/brm/news/advice/Idtheft/victim.asp http://usdoj.gov/criminal/fraud/idtheft.html#what%20Ave%20identi ty%20theft%20and%identity http://homepage.mac.com/ronsbel/blogs/b380834556/c999324670 /e924405970/ http://www.youngmoney.com/consumer/consumer_fraud/030205_ 02 PROBLEM REFERENCES • • • • • • • • • • • • Http://galent.galegroup.com/servlet/scirc?ste=1&docnum=a1293377 18 http://www.insideid.com/idtheft/article.php/3438261 http://www.fraudpractice.com/statistics.htm http://www.creditinfocenter.com/identity/idtheftstats.shtml http://www.idaftermath.org/idaftermath.pdf http://www.rohan.sdsu.edu/faculty/giftfire/chapter07.ppt http://www.krollworldwide.com http://www.msnbc.msn.com/id/5763781/ http://www.ed.gov/news/speeches/2003/12/12112003a.html http://www.zwire.com/site/news.cfm7brd=1574&deptid=532215&new sid=15483095&newsid=15483095&pag-461&fi=9 http://www.bbbonline.org http://www.bos.frb.org CAUSES REFERENCES • • • • • • • • • <http://www.usdoj.gov/criminal/fraud/idtheft.html> Bruce, Laura. Protect Yourself From Identity Theft. <http://homepage.mac.com/ronsbeli/Blogs/B380834556/C9993246 70/E924405970/> <http://www.ou.edu/oupd/idtheft.htm> <http://www.pcmag.com/article2/0,4149,1237503,00.asp> <http://dps.state.az.us/azvictims/identity> <http://newjerseybrazil.com> <http://911identityalert.com/product/idlock.jsp> <http://pcprivacycentral.com/pc_problems.htm> <http://images.newsfactor.com/images/id/4927/story-identitytheft.jpg> CAUSES REFERENCES • • • • • • <http://www.gao.gov/cgi-bin/getrpt?GAO-02-363> <http://www.pagetutor.com/misc/idtheft.html> <http://www.consumer.gov/idtheft/con_about.htm> <http://www.consumer.gov/idtheft/pdf/synovate_report.pdf> <http://www.usps.com/postalinspectors/iftheft_ncpw.htm> <http://www.javelin.strategy.com/reports/2005ReportBrochure.pdf.p df> • <http://www.scambusters.org> • <http://policyalmanac.org/crime/archive/identity_thefts.shtml> • <http://www.econsumer.equifax.com> CRIME SCENE INVESTIGATION REFERENCES • • • • • • • • • • • • • www.nationalnotary.org/idtheft/index.cfm?text=papertrail http://www.idtheftcenter.org/vg114.shtml http://howstuffworks.com http://computer.howstuffworks.com/identity.theft1.htm http://www.ftc.gov/os/2003/09/synovatereport.pdf http://www.idtheftcenter.org/idaftermath.pdf http://www.ftc.gov/bcp/conline/pubs/credit/idtheft.htm\ http://www.idtheftcenter.org/other.shtml http://www.cbsnews.com/stories/2000/03/15/national/main172187.shtml www.usdoj.gov/criminal/cybercrime/usamarc2001_3.htm www.consumer.gov/idtheft www.senate.gov/galleries/daily/224pro5.html www.war.org.uk/ecoespionage/resource/cybercrime/ecrime-screneinvestigation.html CRIME SCENE INVESTIGATION REFERENCES • • • • • • • • • • • • www.idtheftresource.com http://www.idtheftcenter.org/vg301.shtml http://www.hightechcrimecops.org/mission.htm www.ftc.gov www.consumer.gov/idtheft http://www.consumer.gov/idtheft/con_pubs.html http://www.ftc.gov/bcp/conline/pubs/crdit/idtheftmini.htm www.columbuspolice.org/fraud/investigativeprocedures_end_criter ia.html http://www.chicago.bbb.org/idtheft/txpoof.html http://www.privacyrights.org/fs/fs/79.htm http://www.secretservice.gov/financial_crimes.shtml www.idtheftcenter.org/vg106.shtml TYPES OF IDENTITY THEFT REFERENCES • • • • • • • • • • • • • • http://www.myidfix.com/identity-theft-statistics-us.php http://www.creditinfocenter.com/identity/IDTheftStats.shtml http://www.factusa.com/ArticleSidebar.asp?id=41 http://www.identityfraud.com http://www.idtheftcenter.org/ http://computer.howstuffworks.com/identity-theft1.htm http://www.ftc.gov/os/2003/09/synovatereport.pdf http://www.101-identitytheft.com/ http://www.usdoj.gov/criminal/cybercrime/usamarch2001_3.htm http://www.ftc.gov/bcp/conline/pubs/credit/idtheft.htm\ http://www.cmiftf.org/ http://www.identitytheft.com http://www.chicago.bbb.org/idtheft http://www.oag.state.tx.us/newspubs/opeds/200401blues.shtml TYPES OF IDENTITY THEFT REFERENCES • • • • • • • • • • • • http://www.creditinfocenter/identity/IDTheft http://www.bos.frb.org http://www.bullzeye.com/identitytheft/index4 http://www.BBB.com.types_of/~html. http://www.howstuffworks.com/identity_theftp2.html http://www.aarp/org/research.frauds-scams/fraud/aresearch-import186-0085.html http://www.consumer.gov/sentinel/images/charts/idtheft01.pdf http://www.crypto.wpi.edu/Publications/Documents/WPI_IQP_IdTheft. pdf http://www.fdle.state.fl.us/Publications/Identity_Theft.pdf http://www.privacyrights.org/fs/fs/t-it.htm http://www.newyork.bbb.org/identitytheft/typesof.html http://www.crimeandclues.com/dumpster_diving.htm TYPES OF IDENTITY THEFT REFERENCES • • • • • • • • • • • • • http://www.consumer.gov/idtheft/ http://www.idtheftcenter.org/vg114.shtml http://www.privacyrights.org/fs/fs17a.htm http://www.cityofmemphis.org/framework.aspx?page=524 http://www.fbi.gov/headlines/idthefth.jpg http://www.howstuffworks.com http://www.idtheft.com http://www.ftc.com http://www.crimeprevention.com/upload/social-security-numbercard.gif http://www.privacyrights.org/fs/fs17-it.htm http://www.tompaine.com/upload/social-security-number-card.gif http://www.chicago.bbb.org/idtheft/typesof.html http://www.simmonsfirst.com/images/interior/credit_card_layout4. gif TYPES OF IDENTITY THEFT REFERENCES • • • • • • • • • • • • • http://www.idtheftcenter.org/cresources.html http://www. equifax.com http://www.thebankofcanton.com/about/id_theft/ http://www.keeponprospecting.com/portal/idtheft/images/IDT105_11g.jpg http://www.identitythefthero.com/id-theft-defined.html http://www.idtheftcenter.org/facts.shtml http://www. usps.com/postalinspectors/idtheft-ncpw.htm http://www. usatoday.com/money/perfi/general/2005-01-14shreddercover-x.htm http://www.crime.about.com/od/issues/a/aa040718.htm http://www.media.collegepublisher.com/media/paper563/stills/0664 vi6k.jpg http://www.ftc.gov/conline/pubs/credit/idtheft.htm http://www.unwantedlinks.com/fraudchart-sm.jpg http://www.ecommercetimes.com/perl/story/20553.html PHOTOGRAPHY REFERENCES • • • • • • • • • http://www.pcmag.com/article2/0,1895,162551,00.asp http://www3.cnn.com/TECH/computing/9910/11/id.theft.idg/ http://www.forensics-intl.com/art18.html http://en.wikipedia.org/wiki/Digital_photography#Advantages_of_d igital:_consumer_cameras http://www.westchestergov.com/labsresearch/ForensicandTox/fore nsic/photo/forphotoframeset.htm http://library.thinkquest.org/04oct/00206/soc_recording_the_crim e.htm#soc_camera http://expertpages.com/news/voiceprint_identification.htm http://www.elmhurst.org/elmhurst/police/generalinfo.asp http://www.crime-scene-investigator.net/ PHOTOGRAPHY REFERENCES • • • • • • • • • • • http://www.FTC.com http://www.webopedia.com/TERM/d/digital_photography.html http://sg.wilkes.edu/PhotoQuest/stories/storyReader$17 http://www.idtheftcenter.org http://www.ou.edu/oupd/idtheft.htm http://www.privacyrights.org/identity/htm http://www.consumer.gov/idtheft http://www.crime-scene-investigator.net/admissibilityofdigital.html http://www.wirelessmoments.com/2004/02/third_article_a.html http://www.techdirt.com/articles/2004/223/1438218_F.html http://www.newstarget.com/007346.html PHOTOGRAPHY REFERENCES • • • • • • • • • • http://magazines.ivillage.com/goodhousekeeping/consumer/safety /articles/0,,284526_671911,00.html http://www.advimagingandanalysis.com/Appnotes/nov98.html http://www.dol.wa.gov/ds/digfaq.htm http://www.kenrockwell.com/tech/digital.htm http://home.earthlink.net/~thekeither/Foorensic/page7.htm http://www.engadget.com/entry/1234000230053946/ http://en.wikipedia.org/wiki/identity_documents_in_the_United_St ates http://www.informit.com/guides/content.asp?g=digitallifestyles&se qNum=274 http://www.geocities.com/cfpdlab/digital.htm http://www.digitalphotgraphy-fried.html VIDEOGRAPHY REFERENCES • • • • • • • • http://urbanlegends.about.com/library/bl_atm_skimmer.htm http://www.brucekoeing.com/services.php http://www.dejaview.com/default.asp?page_id=74 http://www.westchestergov.com/labsresearch/ForensicandTox/forensic /photo/forphotoframeset.htm http://www.elmhurst.org/elmhurst/police/general info.asp#photo http://www.gatheringguide.com/event_directory/ ma_massachusetts/vendor_videographers_144.html http://www.tribuneindia.com/2005/20050630/ punjab1.htm http://www.crime-scene-investigator.net/video.html VIDEOGRAPHY REFERENCES • http://www.legalvideographers.com/about.php • http://library.thinkquest.org/04oct/00206/soc_ recording_the_crime.htm#soc_videocam • http://www.cgroup.com/default3.htm • http://expertpages.com/news/forensic_exam_video tape.htm • http://www.thefreedictionary.com/videography • http://ali.apple.com/ali_sites/ali/exhibits/1000019 • http://www.brucekoenig.com/services.php • http://www.infromit.com/guides/content.asp?g=digitallifestyles&se qNum=274 • http://www.magazines.ivillage.com/goodhousekeeping/consumer/s afety/articles/0,,284526_671911,00.html VIDEOGRAPHY REFERENCES • http://www.keyscan.ca/English/PDFs/Products_Photo_Badge_.pdf • http://www.focus.ti.com/docs/apps/catalog/general/applications.jh tml?templateId=5958&path=templatedata/cm/general/data/teleco m_accessories_dve • http://www.lexisnexis.butterworths.co.uk/law/ToolsServices/cr_fore nsics.htm • http://www.click2houston.com/news/5333451/detail.html?subid=10 100242 • http://www.tennessean.com/local/archives/05/01/66538663.shtml • http://www.elmhurst.org/elmhurst/police/generalinfo.asp • http://www.avdetectives.com • http://www.covertsciences.com FINANCIAL INVESTIGATION REFERENCES • <http://www.irs.gov/compliance/enforcement/article/0,,id=107515,00. html> • <http://www.akaku.org/graphics/forms_paper_stack.jpg> • <http://www.secretservice.gov/financial_crimes.shtml#Financial> • <http://www.fbi.gov/publications/financial/fcs_report052005/fcs_rep ort052005/fcs_report052005.html#e1> • <http://www.interfire.org/res_file/fin_outl.asp#whatfin> • <http://www.stats.bls.gov/oco> • <http://www.policedhiefmagazine.org/magazine/index.cfm?fuseaction =display_arch&article_id538&issue_id=32005> • <http://www.idtheftcenter.org/alerts/shtml> FINANCIAL INVESTIGATION REFERENCES • <http://www.myidfix.com/identity_theft_statistics_us.php?oscid=bZ Z300399ca9a2f89144e1cf3c74f366> • <http://www.bbbonline.org/IDTheft/safetyQuit.asp> • <http://www.dfwresources.net/idtheft_intro.htm> • <http://www.idtheftcenter.org/alerts/shtml> • <http://www.myidfix.com/identity_theft_statistics_us.php?oscid=bZ Z300399ca9a2f89144e1cf3c74f366> • <http://www.dfwresources.net/idtheft_intro.htm> • <http://www.ur.das.state.or.us/hrsd/class/5235.htm> • <http://www.privacyrights.org/identity.html> • <http://www.protiviti.com/portal/site/prous/index> • <http://www.financialpi.com> FINANCIAL INVESTIGATION REFERENCES • • • • • • • • <http://www.elderoptionsoftexas.com> <http://www.ftc.gov/os/1999/04/identitythefttestimony.htm> <http://www.netsafe.org.nz/fraud/fraud_default.aspx> <http://www.Ou.edu/oupd/idtheft.htm> <http://www.sercretservice.gov/financial_crimes.shtml> <http://www.insideid.com/idtheft/article.php/11748_348261_2> <http://www. Insideid.com/idtheft/article.php/3438261> <http://www. Dhs.gov/dhspublic/interapp/press_release/press_release_0206.xm l> • <http://www.sec.gov/investor/pubs/onlinebrokerage.htm> VOICE EXAMINATION REFERENCES • • • • • • • • • • • Http://www.expertpages.com/news/voiceprint_identification.htm http://www.brucekoenig.com/service.php http://www.newstarget.com/007346.html http://caeaudio.com/forensicmethod.html http://expertpages.com/news/voice_forensic_tool.htm http://www.idtheft.org http://fightidentitytheft.com http://www.identitytheftspy.com/2005/05/voice_recogniti.html http://www.digimarc.com/docs/wp_colocasestudy.pdf http://www.rohan.sdsu.edu/~ling354/voicerecognition.html http://www.businessweek.com/technology/content/apr2005/tc2005 0420_1036_tc024.htm VOICE EXAMINATION REFERENCES • • • • • • • • • • Http://www.ou.edu/oupd/idtheft.htm http://www.consumer.gov/idtheft.htm http://www.forensic-int.com/art18.html http://www.infomit.com/guides.content.asp?g=digitallifestyles&seq Num=274 http://magazines.ivillage.com/goodhousekeeping/consumer/safety /articles/0,,284526_671911,00.html http://www.keyspan.ca/English/PDFs/Products_Photo_Badge.pdf http://www.voicedoctor.net/diagnose/vcb.html http://www.allayurveda.com/diagnosis_exeight.htm http://www.nidcd.nih.gov/health/voice/vocalabuse.asp http://www.legallanguage.com/forensic/Spectrographic.htm VOICE EXAMINATION REFERENCES • Http://www.victimsassistanceofamerica.org/howto-contactmartha.cfm • http://www.identitytheftspy.com/prevention/ • http://digimarc.com/secureid/about.asp • http://www.voicevault.com/itf.php • http://www.idtheftcenter.org • http://www.tradeharbor.com/TH_Website2/vss.html • http://www.yahoo.com/voiceenhancement.htm • http://en.wikipedia.org/wiki/identity_documents_in_the_United_St ates • http://www.cyberdriveillinois.com/press/2004/may/040510d1.html • http://www.dol.wa.gov/ds/digfag.htm DOCUMENT EXAMINATION REFERENCES • Http://en.wkipedia.org/wki/Main_page • http://www.iiiweb.net/go/forensic-services/questioned-documentexamination • http://faculty.ncwc.edu/toconnor/425/425let05.htm • http://www.myhandwriting.com/experts/#List%20of%20Analysts • http://eslu.cse.ogi.edu • http://www.springer.com • http://www.documentlab.com/s_oblif.gif • http://www.fbig.ca/forger.html • http://qdewill.com/problems.htm • http://www.swafde.org/faq.html • http://www.4n6.com/alt.htm DOCUMENT EXAMINATION REFERENCES • • • • • • • • • • • • http://en.wikipedia.org/wiki/Questioned_document_examination http://www.fbigov/hq/lab/fsc/backissu/april2000/swgdoc6.htm http://www.ice.gov/graphics/news/factsheets/061704det_FS.htm http://www.swafde.org/faq.html http://www.documentlab.com/services.htm http://forensic.to/webhome/qdewill/ http://www.samanagement.co.za/document_examination.htm http:// www.vision.caltech.edu/mariomu/research/sigverif/s066f.gif http://www.forensic-evidence.com/site/ID/ID_Biometric_jarvis.html http://www.usdoj.gov/criminal/fraud/idtheft.html http://identitytheftinfo.blogspot.com/ http://www.abfde,org/fde.htm DOCUMENT EXAMINATION REFERENCES • http://www.grc.nasa.gov/WWW/epbranch/surtxt/surfacetitles.htm# Atomic_Oxygen • http://www.ntu.edu.sg/home/asgleedham/currentresearch.htm • http://www.aafs.org/default.asp?section id=resources&page id=choo sing a career#QD • http://www.abfde.org/faqs.htm#categories • http://www.hk-lawyer.com/2000-6/June00-92.htm • http://www.docexaminer.com/?gclid=CNLu4Z_y-YECFQcpGgodJCuBlw • http://www.wyomingbankers.com/pdfs/Fraud_Prevention_Basics.pd f#search=‘document%20examination%20%20identity%20theft’ • http://www.iptm.org/psi/crim.htm#033109 • http://docev.co.uk/areas_alterations.html COMPUTER DATA RECOVERY REFERENCES • • • • • • • • • • • • http://www.disklabs.com/data-recovery.asp http://www.disklabs.com/computer-forensics-introduction.asp http://netsecurity.about.com/od/newsandeditorial1/a/aaidenttheft.htm http://www.have.sandiego.edu/~lsolum/colloquia/kerrdigitalworld.doc http://www.73.com/data-recovery/article-10-Computer-DataRecovery.html http://www.popularmechanics.com/technology/computers/1279241.ht ml http://www.pctechbytes.com/ http://www.essdatarecovery.com/ http://computer.howstuffworks.com/question578.htm http://www.essentialrecovery.com/protect_personal_info.html http://en.wikipedia.org/wiki/Salvage_Data http://www.icsworld.com/computer_forensic_investigation_services.a sp COMPUTER DATA RECOVERY REFERENCES • http://www.computeruser.com/articles/2205,1,1,1,0501,03.html • http://www.fraudaid.com/security_products/articles_information/identity_ theft.htm • http://www.goarticles.com/cgi_bin/showa.cgi?c=83363 • http://www.insideid.com/idtheft/article.php/11784_3438261_6 • www.fraudaid.com/security_products/articles_information/identity_theft • http://www.microsoft.com/athome/security/spyware/spywareremove.mspx • http://www.intellirecovery.com/data_recovery_services.html • http://www.internetfraud.usdoj.gov/ • www.dataexcorp.com/html/cybercrimenews.htm • http://www.datarecovery.net • www.ftc.gov/bcp/conline/pups/credit/idtheft.htm • http://www.krollontrack.com/ COMPUTER DATA RECOVERY REFERENCES • • • • • • • • • • • • • http://www.flashbackdata.com/computer-forensics/ www.datarecovery.net http://www.usdoj.gov/criminal/fraud/Internet/htm# http://www.ontrack.com/ http://www.fraud.org/ http://www.wikipedia.org http://www.datarecovery.net/ http://www.databankservices.com/common_evidence.html http://www.harddriverecovery.org/computer-data-recovery.html http://www.ou.edu/oupd/idtheft.htm http://www.netsafe.org.nz/fraud/fraud_default.aspx http://www.privacyrights.org/identity.htm http://www.actionfront.com COMPUTER FRAUD REFERENCES •Http://www.fraud.org/graphics/1999graphs/initialcontact.gif •Http://www.antiphishing.org/ •Http://www.archives.cnn.com/2000/tech/computing/03/20/net.identit y.theft.idg/ •Http://www.linus.socs.uts.edu.au/~jim/cit2/cit299/legal/images/graph.jpg •Http://www.wtpdmorris.org/News/phishing/links.gif •Http://www.windowsecurity.com/img/upl/image00610610.jpg •Http://www.archives.cnn.com/2000/tech/ptech/II/30/internetshopping/story.computer.ideas.2.jpg •Http://www.istockphoto.com/imageindex/26121/62274/ •Http://www.infotech.com/upload/20030514-01.gif •Http://www.e-jaz.com.au/media/2003/QBR/200302Catch.htm •Http://www.internetfraud.usdoj.gov •Http://www.cnn.com/…/story.computer.ideas.2.jpg COMPUTER FRAUD REFERENCES • • • • • • • • • • • • Http://www.cimsgts.com/images/data-flowing-from-computer.jpg Http://www.universalprocessing.com/images/Credit1.jpg Http://www.webopedia.com/term/p/phishing.htm Http://www.losspreventionmagazine.com/archives_view Http://www.dailytimes.com.pk/default.asp?page=story Http://www.fbi.gov/majcases/fraud/internetschemes.htm Http://www.internet-fraud.com/internet-fraud/ Http://www.fraud.org/internet/intset.htm Http://www.images.google.com/imgres?imgurl= Http://www.cmu.edu/police/images Http://www.images.google.com/imgres?imgurl= Http://www.elderoptionsoftexas.com Http://www.internetfraud.usdog.gov/ Http://www.fraud.org/graphics/1999graphs/contactbytype.gif COMPUTER FRAUD REFERENCES • • • • • • • • • • • • • Http://www.universalprocessing.com/images/credit1.jpg Http://www.scmagazine.com/uk/news/article/530336/majority-worldworried-internet-fraud Http://www.twincities.com/mid/twincities/13259174.htm Http://www.nlcnet.org/internetscramfactsheet.html Http://www.fraud.org Http://www.esadkihs.com/fihforpic2 Http://www.ifccfbi.gov/index.asp Http://www.fraud.org/internet/inttip/inttip.htm Http://www.usdoj.gov/criminal/fraud/index.htm Http://www.pcppress.co.yu/arhiva/images/broj/62/36_ada-computers.jpg Http://www.fbi.gov/publications/financial/fcs_report052005/fes_report052 005.htm#el Http://www.internetfraud.usdoj.gov/#What%20Is%20Internet%20Fraud Http://www.fraudaid.com/security_products/articles_information/identity_ theft.htm FINGERPRINT REFERENCES • http://www.techworld.com/applications/features/index.cfm?Feature ID=1954 • http://www.cityofmemphis.org/framework.aspx?page=524 • http://www.epic.org/privacy/biometrics/testimony_071802.html • http://www.identicatorinc.com/IdentityTheft.pdf • http://www.geocites.com/evilsnack/idtheft.htm • http://www.sciencedaily.com/releases/2005/03/050322135157.htm • http://www.interpol.int/Public/Forensic/Ifss/meeting13/specialpres entation.pdf • http://www.cnn.com/2004/TECH/ptech/02/10/digital.evidence.ap/ • http://www.money.cnn/2005/07/19/pf/security_biometrics/ FINGERPRINT REFERENCES • http://www.fdeservices.com • http://www.iiiweb.net/go/forensic-services/questioned-documentexamination • http://www.forensic.to/webhome/qdewill/ • http://www.samanagement.co.za/document_examination.htm • http://www.cariboo.bc.ca/cpj/identitytheft.html • http://www.forensic-evidence.com/site/ID/ID_Biometric_jarvis.html • http://www.usdoj.gov/criminal/fraud/idtheft.html • http://www.nolo.com/article.cfm/objeftID/6BC35DBC • http://www.atsnn.com/story/111839.html • http://www.privacyrights.org/identity.html FINGERPRINT REFERENCES • • • • • • • • • http://www.onin.com/fp/fphistory.html http://www.latent-prints.com/ http://www.faculty.ncwc.edu/toconnor/315/315lect05.htm http://www.forensic-evidence.com/site/ID/havvard_2000.html http://www.search.yahoo.com/search?p=fingerprint+evidence+refer ences&fr=FP-tab-web-t&toggle=1&cop=&ei=UTF-8 http://www.biometricaccess.com/products/wp_finge.htm http://www.accessexcellence.org/RC/AB/BA/DNA_Fingerprinting_Ba sics.html http://www.caag.state.ca.us/idtheft/general.htm http://www.epic.org/privacy/biometrics/testimony_071802.html FEDERAL POLICY REFERENCES • • • • • • • • • • • • • http://www.oag.state.ny.us/consumer/tips/id_theft_victim.html http://www.whitehouse.gov/news/releases/2004/07/20040715-3.html http://www.ftc.gov/foia/privacy_act.htm http://en.wikipedia.org/wiki/health_insurance_portability_and_accountability_act http://www.usdoj.gov/criminal/fraud/idtheft.html#what’s%20the%20department%20 of%20justice%20doing%20about http://www.consumer.gov/idtheft/con_steps.htm http://www.ssa.gov/pubs/idtheft.htm http://www.bankofinternet.com/quickhelp/preventing_identity_theft.asp http://www.ncjrs.org/spotlight/identity_theft/summary.html whitehouse.gov/identity http://www.bad-credit-rx.com/identity_theft.html http://www.consumer.gov/idtheft/id_laws_privacy.htm http://www.whitehouse.gov/news/releases/2004/07/20040715-3.html FEDERAL POLICY REFERENCES • • • • • • • • • • • • • http://www.fbi.gov/page2/oct04/preventidt102104.htm http://www.newyork.bbb.org/ http://www.senate.gov/~schumer/schumerwebsite/pressroom/special_reports/ident ity%20theft%20report.pdf http://www.fbi.gov/page2/oct04/preventidt102104.htm http://www.whitehouse.gov/news/releases/2004/07/20040715-3 http://www.llrx.com/features/idtheft.htm http://www.gov/org/identitytheft http://www.internetnews.com http://www.whitehouse.gov/news/release/2004/07120040715-3.html http://www.encarta.com http://google.com/federalpolicyburea.edu http://www.cga.ct.gov/2004/rpt/2004-R/0641.htm http://www.llrx.com/features/idtheftguide.htm STATE POLICY •http://www.ag.ca.gov/idtheft/tips.htm •http://www.consumersunion.org/pub/care_financial_services/000144.html •http://www.consumer.state.ny.us/pdf/id_theftpamphlet.pdf •http://www.ago.state.co.us/idtheft/lehelp.cfm •http://assembly.state.ny.us/leg/?bn=A04254 •http://info.sen.ca.gov/pub/0102/bill/sen/sb_1351_1400/sb_1386_bill_20020926_chaptered.html •http://www.texas.gov/policies/idtheft/a •http://www.texas.gov/image1 •http://www.privacyprotection.ca.gov/ •http://www.dos.state.ny.os/coog/csogwww.html •http://www.health.state.ny.us/nysdoh/phferum/ppp.about.htm •http://www.california.gov/losangelos/policies/id/theft/policy •http://www.la.gov/police.lapd •http://www.boston.com/news/local/new_hampshire/articles/2005/10/16/more_insurer s_offering_identity_theft_policies/ •http://www.assembly.state.ny.us/leg/?by=k&qs=+identity+theft STATE POLICY • • • • • • • • • • • http://www.egov.cityofchicago.org/city/webportal/portaldeptcategoryaction.do?bv_s essionid=@@@@1547864447.1141025515@@@@&BV_engineID=cccfaddgmjddkjhcefe celldffhdfgn.0&deptcategoryoid=_536890496&contenttype=coc_editorial&topchann elname=Dept&entityname=consumer+services&deptmaincategoryOID=_536889065 http://www.consumer.gov/idtheft/id_laws_privacy.htm http://www.ftc.gov/bcp/conline/pubs/crdit/idtheftmini.htm#introduction http://www.ftc.gov/bcp/conline/pubs/credit/idtheftmini.pdf http://www.fbi.gov/page2/oct04/preventidt102104.htm http://www.newyork.bbb.org/ http://www.senate.gov/~shumer/schumerwebsite/pressroom/special_reports/identi ty%20theft%20report.jdf http://www.senatorfarley.com/press_archive_story.asp?id=3167 http://www.oag.state.ny.us/consumer/tips/identity_theft_pamphlet.pdf http://www.assembly.state.ny.us/leg/?bn=S03492 http://www.senatornozzolio.com/constituent_services_story.asp?id=15 STATE POLICY • • • • • • • • • • • • • • • • http://www.leginfo.ca.gov http://www.privacyprotection.ca.gov http://www.legis.state.gov.us/legis/2001_02/fultext/sb475.htm http://www.llrx.com/features/idtheft.htm http://www.oag.state.ny.us/consumer/tips/identitytheft.htm http://www.consumeraffairs.com/news041/2005 http://www.consumer.gov/idtheft/law_laws_state_criminal.htm http://www.securitystate.ny.us/entitiesof_provision.html http://www.consumer.gov/idtheft/id_laws_privacy.htm http://www.mass.gov/idtheft.htm http://www.oag.state.ny.us/consumer/consumerissues.html http://www.privacyprotection.ca.gov/lawenforcement/laws.htm#five http://www.ncsl.org/programs/lis/privacy/idt-01legis.htm http://www.californiastateidfraud.org www.ny.gov/identitytheft www.illinois.gov/identitytheft LOCAL POLICY REFERENCES • http://www.ny.gov/governor/press/02/oct9_02.htm • http://www.ftc.gov/bcp/workshops/idtheft/charts-update.pdf • http://www.senate.gov/~schumer/SchumerWebsite/pressroom/press _releases/PR01342.html • http://www.lapdonline.org/bldg_safer_comms/prevention/identity.ht m • http://www.nyccouncil.info/media/reports.cfm • http://www.nyc.gov/html/initiatives/campus.shtml • http://www.senate.gov/~schumer/SchumerWebsite/pressroom/press _releases/PR02155.html • http://www.identitytheft911.com/company/press/press200502lapfcu.h tm • http://www.nationalnotary.org/idtheft/index.cfm?Text_papertrail • http://www.sandiego.gov/mayor/messages/identitytheft.shtml • http://www.newyork.bbb.org/ LOCAL POLICY REFERENCES • • • • • • • • • • • • • http://www.gothamgazette.com/article/tech/20040415/19/950 http://www.grolier.com http://www.bcpl.net/policies http://www.consumer.gov/idtheft/id_laws_privacy.htm http://www.nyccouncil.info/search/searchlook2.cfm?SEARCH=STRING http://egov.cityofchicago.org/city/webportal/home.do http://101-identitytheft.com/identity-theft-new-york.htm http://www.ncsl.org/programs/lis/privacy/idt-statutes.htm http://www.lacity.org/atty/atycpl.htm http://www.miami.gov/identitytheft http://www.california.gov/Losangeles/identitytheft http://www.ftc.gov/bcp/workshps/idtheft/reporttext.htm http://www.bizjournals.com/boston/stories/2003/09/08/focus7.html LOCAL POLICY REFERENCES • • • • • • • • • • • • http://www.cit.policies.gov/seattle http://www.nycidfraud.org http://www.floridaidtheft.org http://www.ci.la.ca.us/ http://www.nyc.gov/html/records/pdf/govpub/1874idtheft/pdf http://www.miamidade.gov/csd/Idtheft.asp http://www.miamidade.gov/csd/ID_Theft_brochure.asp http://www.chicagotribune.com/business/chi0512310060dec31,1,1644957.story?coll=chi-business-hed http://www.govtech.net http://www.phoenix.gov/police/idtheft_biz.html http://www.gothamgazette.com/article/searchlight/20050511/203/1 414 http://www.dca.ca.gov/whats_new/consumerleaders.htm DEPARTMENT OF EDUCATION REFERENCES •http://www.nycenet.edu •http://www.ed.gov/news/speeches/2003/12/12112003a.html •http://www.nycenet.edu/default.aspx •http://www.nycenet.edu/NR/rdonlyres/F1F68208-CEAF-445E-BAA42CE17902E36A/5625/Booklet2005_Booklet2004.pdf •http://www.nycenet.edu/Administration/Offices/FinanceandAdministr ation?DIIT/WebServices/WebDevelopmentPosting/default.htm •http://www.bxscience.edu/student_resources.jsp •http://www.fraudwatchinternational.com/identitytheft/types.shtml •www.nycenet.edu/parents/PDFs/DisciplineCode.pdf •http://www.nycenet.edu/Offices/DHR/MostPopularClicks/Fingerprinti ng.htm/ •http://www.ed.gov/about/offices/list/oig/misused/srespons.html •www.depted.com •http://www.ed.gov/about/offices/list/oig/misused/index.html •http://www.ed.gov/idtheft DEPARTMENT OF EDUCATION REFERENCES • • • • • • • • • • • • • • www.consumers.gov/idtheft/con_resolve.htm www.ed.gov/misused http://usny.nysed.gov/lawsregs/edres.html http://www.ed.gov/about/offices/list/oig/misused/victim.html http://www.securitymanagement.com/library/001035.html boe.edu/identitytheft/policy http://www.findarticles.com/p/articles/mi_m2194/is_3_73/ai_n600 6613#continue http://polcomp.rutgers.edu/identity.shtml http://www.kheaa.com/policy.html http://www.op.nysed.gov/subart4.htm www.uft.org/privacy/ www.nycenet.edu/parents/essentials/school+safety/default.htm http://www.bths.edu/artsfest/images/NYC-Official-Logo-BW.gif http://www.educause.edu/LibraryDetailPage/666?ID=MAC0422 CITATIONS (for images) http://www.identitytheft911.com/assets/img/home/hm_img_collage.jpg http://der-tellerrand.de/images/print.jpg http://cnnstudentnews.cnn.com/interactive/tech/0211/identity. protection/bground.identity.theft.jpg http://www.crime-research.org/news/2003/img/Lico.jpg SEARCH ENGINES Alta Vista • www.altavista.com Excite • www.excite.com ERIC • www.ERIC.com Entire Web • www.entireweb.com Google • www.google.com San Diego State University Library • www.SanDiegoStateUniversity/Library.com Specialized Search Engines • www.SpecializedSearchEngines.com Yahoo • www.Yahoo.com Clip Art • www.ArtClipArt.com EVALUATION Your grade will be determined according to the following scale: • PowerPoint Presentation. (35%) Your PowerPoint presentation will consist of 10-15 slides. Use the guidelines outlined in the PowerPoint presentation section of this quest as your guide. Make certain that your audience can navigate easily from slide to slide. Your final slide must identify your class, list the names of the students in the class and generate an MLA style list of the sources you used throughout your previous slides. Be certain that each of your slides is thoroughly designed and well prepared to make a positive visual impact on the audience. Use qualitative and quantitative information. All kinds of photographs, graphs, drawings, etc., can be presented. Be certain to gather information from multiple sources and to synthesize the information well. Also, utilize this information to succinctly state the problem, identify the causes of the problem and formulate a clearly stated conclusion regarding the best policy for forensic investigators and the public in general regarding identity theft in America. Written Reports (35%) You will be required to write mini research reports. In order to do this, you will have to search the Internet for appropriate articles, synthesize, analyze and draw conclusions from the information you have collected. All information submitted must be appropriately documented and must include the appropriate graphics to illustrate the content and conceptual understanding behind the investigation. Oral Evaluation (15%) You will serve as a guest speaker for all of the forensic science classes at The Bronx High School of Science. Your oral PowerPoint presentation will be graded on your familiarity with the topic, clarity of concepts, use of visual aids, how well you held the audience’s attention, audibility and grammar. Bibliography (15%) Use the MLA format to correctly attribute information to all rightful sources. GRADING POLICY Range: 1= Poor, 5= Excellent Written Research Projects Scoring Facts and information from multiple internet sources Synthesis of information from multiple references Analysis of information Conclusions drawn from the results of the investigation Written clearly and succinctly 12345 12345 12345 12345 12345 GRADING POLICY Grammar Understanding of scientific concepts Understanding of public policy Policy evaluation and design Bibliography 12345 12345 12345 12345 12345 GRADING POLICY Oral Presentation Scoring State the purpose of your project. Provide supporting information. Present information clearly and succinctly. Clarity of concepts. Effective use of PowerPoint slides. How well presenter held the audience’s attention The organization of facts and information Policy decisions and solutions 12345 12345 12345 12345 12345 12345 Bibliography 12345 12345 12345 GRADING POLICY PowerPoint Presentation Minimum of fifteen slides. Visual impact of slides. Easy navigation from slide to slide. Use of qualitative and quantitative information. Clear and succinct presentation. Scoring 12345 12345 12345 12345 12345 GRADING POLICY Use of multiple sources. Appropriate graphics to illustrate the content and conceptual understandings. Identification of the problem and the cause of the problem. Policy and policy solutions. Bibliography. 12345 12345 12345 12345 12345 GRADING POLICY Determination of Grades: 40- 50 = A 30- 39 = B 20- 29 = C 10- 19 = D Below 10 = F Timeframe: • Mini research reports collected bimonthly up to and including March 7, 2006. • Slide show due May 30, 2006. • Oral presentations for all forensic science classes due on June 2, 2006. • PowerPoint presentation posted online June 2, 2006. HIGH SCHOOL SCIENCE PERFORMANCE STANDARDS Scientific Connections and Applications – Demonstrates an understanding of big ideas and unifying concepts. – Demonstrates an understanding of the impact of technology. – Demonstrates an understanding of the impact of science. • Scientific Thinking – Frames question to distinguish cause and effect, and identified or control variables. – Uses concepts for Science Standards to explain a variety of observations and phenomena. – Uses evidence from reliable sources to develop descriptions, explanations, and models; and makes appropriate adjustments and improvements. HIGH SCHOOL SCIENCE PERFORMANCE STANDARDS Proposes, recognizes, analyzes, considers, and critiques alternative explanations; and distinguishes between fact and opinion. – Identifies problems; proposes and implements solutions; and evaluates the accuracy, design, and outcomes of investigations. – Works individually and in teams to collect and share information and ideas. • Scientific Tools and Technologies – Uses technology and tools to observe and measure objects, organisms, and phenomena, directly, indirectly, and remotely, with appropriate consideration of accuracy and precision. – Records and stores data using a variety of formats. – Collects and analyzes data using concepts and techniques in Mathematics Standard 4. HIGH SCHOOL SCIENCE PERFORMANCE STANDARDS – Acquires information from multiple sources. – Recognizes and limits sources of bias in data. • Scientific Communication – Represents data and results in multiple ways. – Argues from evidence. – Critiques published materials. – Explains a scientific concept or procedure to other students. – Communicates in a form suited to the purpose and the audience. • Scientific Investigation – Demonstrates scientific competence by completing fieldwork. – Demonstrates scientific competence by completing secondary research. HIGH SCHOOL MATH PERFORMANCE STANDARDS • Number and Operation Concepts – Use addition, subtraction, multiplication, division, exponentiation, and root- extraction. – Represent numbers in various forms and graph them. – Compare numbers using order relations, differences, ratios, proportions, percents, and proportional change. – Recognize and respect basic number patterns. • Function and Algebra Concepts – Make predictions by interpolating or extrapolating. • Statistics and Probability Concepts – Organize, analyze, and display single- variable data appropriately. – Organize, analyze, and display two- variable data appropriately. HIGH SCHOOL MATH PERFORMANCE STANDARDS – Use sampling techniques to draw references. – Understand that making inferences from a sample involves uncertainty and that the role of statistics is to estimate the size of that uncertainty. – Formulate hypotheses to answer a question and use data to test hypotheses. – Interpret representation of data, compare distribution of data, and critique conclusions. – Explore questions of experimental design, control groups, and responsibility. – Create and use models of probability and understand the role of assumptions. • Problem Solving and Reasoning – Formulation. – Implementation. HIGH SCHOOL MATH PERFORMANCE STANDARDS – Conclusion. – Mathematical reasoning. • Mathematical Skills and Tools – Carry out numerical calculations and symbol manipulations effectively. – Make and use rough sketches, schematic diagrams, or precise scale diagrams. – Create and interpret graphs of many kinds. – Use technology to create graphs of spreadsheets. – Use tools in solving problems. – Know standard methods to solve basic problems and use these methods in approaching more complex problems. HIGH SCHOOL MATH PERFORMANCE STANDARDS • Mathematical Communication – Be familiar with basic mathematical terminology, standard notation and use of symbols, common conventions for graphing, and general features of effective mathematical communication styles. – Use mathematical representations with appropriate accuracy. – Organize work and present mathematical procedures and results correctly. – Communicate logical arguments clearly, showing sensibility and validity. • Putting Mathematics to Work – Data study. HIGH SCHOOL ENGLISH LANGUAGE ARTS PERFORMANCE STANDARDS • Reading – Read and comprehend informational materials. •Writing – Produce a report of information. • Speaking, Listening, and Viewing – Participate in one- to- one conferences with the teacher. – Participate in group meetings. – Prepare and deliver an individual presentation. • Conventions, Grammar, and Usage of the English Language HIGH SCHOOL ENGLISH LANGUAGE ARTS PERFORMANCE STANDARDS – Independently and habitually demonstrate an understanding of the rules of the English language in written and oral work. – Analyze and subsequently revise work to improve its clarity and effectiveness. • Literature – Respond to non- fiction documents with an eye to strategies common to effective functional documents. – Produce functional documents appropriate to audience and purpose. HIGH SCHOOL APPLIED LEARNING PERFORMANCE STANDARD • Problem Solving – Design a Product, Service, or System: Identify needs that could be met by new products, services, or systems and create solutions for meeting them. – Improve a System: Develop an understanding of the way systems of people, machines, and processes work; troubleshoot problems in their operation and devise strategies for improving their effectiveness. • Communication Tools and Techniques – Develop a multi- media presentation. • Information Tools and Techniques HIGH SCHOOL APPLIED LEARNING PERFORMANCE STANDARDS – Gather information to assist in completing project work. – Use online sources to exchange information for specific purposes. – Use word processing software to produce a multi- page document. • Learning and Self- Management Tools and Techniques – Review one’s progress in completing work activities and adjust priorities. • Tools and Techniques for Working with Others – Participate in the establishment and operation of selfdirected work teams.