Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 72

Identity Theft Across

America
The Bronx High School of Science
Forensic Science/ Criminalistics
Web Quest (12th Grade)
Instructor: Mary Villani
INTRODUCTION
Identity theft occurs frequently to people nation wide.
Each year millions of people become victims to criminals who
fraudulently obtain and use their personal information to acquire
money, homes, cars, and other valuable possessions. Internet
usage in the past decade has left both civilians and businesses
particularly vulnerable to identity theft. With the development of
online buying systems, credit card numbers and other personal
information are readily available to online hackers. They either
use this information for themselves or sell it for a price to others,
thus causing identity theft to become a major problem facing
Americans nationwide.
TASK
The President of the United States has just established an Identity Theft
Control Committee in the hopes of advising the House Judiciary Committee
officials on issues related to identity theft in the United States. The
President asks you, a junior forensic investigator, to serve on this
committee (which is in affiliation with the FBI, the Federal Trade
Commission and the Department of Justice), as a member of the forensic
science subcommittee on the spread of identity theft across America. Your
objective is to use your expertise to:
• Examine and assess the extent of the identity theft problem across
America.
• Examine the causes of the problem.
• Develop a policy proposal for the prevention of identity theft across
America.
• Develop a policy proposal that addresses safety techniques to protect
people across America.
• Suggest ways of overseeing the implementation of policies to assure the
safety of people across America.
PROCESS
Follow the six steps of the public policy analyst:
• Define the problem (statistics, case studies, articles by experts,
evidence, internet searches, interviews, surveys). Worksheet #1
and Worksheet #2
•Identify the causes of the problem (statistics, case studies, articles
by experts, evidence, internet searches, interviews, surveys).
Worksheet #3
•Research and evaluate the current policies that address the
problem. Worksheet #4
•Develop public policy solutions. Worksheet #5
•Select the best public policy solution (benefits, cost, the Prince
System). Worksheet #6 Worksheet #7 Worksheet #8 Worksheet #9
Worksheet #10 Worksheet #11 Worksheet #12 Worksheet #13
•Developing a political strategy.Worksheet #14 Worksheet#15
Worksheet #16 Worksheet #17
PREPARE A POWER POINT PRESENTAION
Address the following:
•A clear identification of the problem.
•An explanation of the causes of the problem.
•The identification of identity theft found worldwide.
•An explanation of how identity theft affects human health and behavior (physical,
psychological, and social).
•Screening tests for the identification and quantification of identity theft.
•An evaluation of current policies relating to the collection and processing of
physical evidence in cases relating to identity theft.
•An evaluation of the current policies related to identity theft at the federal, state
and local levels.
•The most effective and feasible lab policy.
•The most effective and feasible public policy.
Process:
•For each slide, include appropriate information, graphic(s), and references.
•Present your slideshow.
•Post your slide show on the Forensic Biology website at Bronx Science.
RESOURCES
•TIPS Public Policy Analyst Guidelines
- http://www.maxwell.syr.edu/plegal/TIPS/welcome.html
•Contact Experts in the Field
- The New York State Police Science Laboratory System
• http://www.troopers.state.ny.us/ForSc/ForScindex.html
-Northeastern Association of Forensic Scientists (NEAFS)
•http://www.geocities.com/CapeCanaveral/Lab/5122/labs.htm
-American Academy of Forensic Sciences (AAFS)
•http://www.aafs.org
-American Board of Criminalistics (ABC)
•http://www.criminalistics.com/ABC/abchome.htm
-American Society of Crime Laboratory Directors (ASCLD)
•http://www.ascld.org
PROBLEM REFERENCES
• http://www.identitythefthero.com/id-theft-defined.html
• http://www.idtheftcenter.org/facts.shtml
• http://www.weprevent.org/weprevent/weprevent/?pg=14618-14620-16852
• http://www.whitecanyon.com/identity-theft-statistics-ut-09-2003.php
• http://www.usps.com/postalinspectors/idthft_ncpw.htm
• http://www.fraudcrisis.com/facts.htm
• http://crime.about.com/od/issues/a/aa040718.htm
• http://media.collegepublisher.com/media/paper563/stills/0664vi6k.jpg
• http://www.ftc.gov/bcp/conline/pubds/credit/idtheft.htm
• http://www.idtheftcenter.org/cresources.shtml
• http://money.howstuffworks.com/identity-theft2.htm
• http://en.wikipedia.org/wiki/identity_theft
• http://www.pagetutor.com/misc/idtheft.html
• http://www.thebankofcanton.com/about/id_theft/
PROBLEM REFERENCES
• http://www.consumer.gov/sentinel/idchart.htm
• http://news.com.com/2010-1071-958328.html
• http://www.ftc.gov
• http://www.iwillteachyoutoberich.com/archives/identity_theft.jpg
• http://www.infosecwriters.com/texts/php?op=display&id=146
• http://www.fightidentitytheft.com/images/lolgo_new_white_small.jpg
• http://dictionary.reference.com/search?q=identity%20theft
• http://www.bankrate.com/brm/news/advice/Idtheft/victim.asp
• http://usdoj.gov/criminal/fraud/idtheft.html#what%20Ave%20identity
%20theft%20and%identity
• http://homepage.mac.com/ronsbel/blogs/b380834556/c999324670/e
924405970/
• http://www.youngmoney.com/consumer/consumer_fraud/030205_02
PROBLEM REFERENCES
• Http://galent.galegroup.com/servlet/scirc?ste=1&docnum=a129337718
• http://www.insideid.com/idtheft/article.php/3438261
• http://www.fraudpractice.com/statistics.htm
• http://www.creditinfocenter.com/identity/idtheftstats.shtml
• http://www.idaftermath.org/idaftermath.pdf
• http://www.rohan.sdsu.edu/faculty/giftfire/chapter07.ppt
• http://www.krollworldwide.com
• http://www.msnbc.msn.com/id/5763781/
• http://www.ed.gov/news/speeches/2003/12/12112003a.html
• http://www.zwire.com/site/news.cfm7brd=1574&deptid=532215&newsi
d=15483095&newsid=15483095&pag-461&fi=9
• http://www.bbbonline.org
• http://www.bos.frb.org
CAUSES REFERENCES
• <http://www.usdoj.gov/criminal/fraud/idtheft.html>
• Bruce, Laura. Protect Yourself From Identity Theft.
<http://homepage.mac.com/ronsbeli/Blogs/B380834556/C999324670/
E924405970/>
• <http://www.ou.edu/oupd/idtheft.htm>
• <http://www.pcmag.com/article2/0,4149,1237503,00.asp>
• <http://dps.state.az.us/azvictims/identity>
• <http://newjerseybrazil.com>
• <http://911identityalert.com/product/idlock.jsp>
• <http://pcprivacycentral.com/pc_problems.htm>
• <http://images.newsfactor.com/images/id/4927/story-identity-
theft.jpg>
CAUSES REFERENCES
• <http://www.gao.gov/cgi-bin/getrpt?GAO-02-363>
• <http://www.pagetutor.com/misc/idtheft.html>
• <http://www.consumer.gov/idtheft/con_about.htm>
• <http://www.consumer.gov/idtheft/pdf/synovate_report.pdf>
• <http://www.usps.com/postalinspectors/iftheft_ncpw.htm>
• <http://www.javelin.strategy.com/reports/2005ReportBrochure.pdf.
pdf>
• <http://www.scambusters.org>
• <http://policyalmanac.org/crime/archive/identity_thefts.shtml>
• <http://www.econsumer.equifax.com>
CRIME SCENE INVESTIGATION
REFERENCES
• www.nationalnotary.org/idtheft/index.cfm?text=papertrail
• http://www.idtheftcenter.org/vg114.shtml
• http://howstuffworks.com
• http://computer.howstuffworks.com/identity.theft1.htm
• http://www.ftc.gov/os/2003/09/synovatereport.pdf
• http://www.idtheftcenter.org/idaftermath.pdf
• http://www.ftc.gov/bcp/conline/pubs/credit/idtheft.htm\
• http://www.idtheftcenter.org/other.shtml
• http://www.cbsnews.com/stories/2000/03/15/national/main172187.shtml
• www.usdoj.gov/criminal/cybercrime/usamarc2001_3.htm
• www.consumer.gov/idtheft
• www.senate.gov/galleries/daily/224pro5.html
• www.war.org.uk/ecoespionage/resource/cybercrime/ecrime-screne-
investigation.html
CRIME SCENE INVESTIGATION
REFERENCES
• www.idtheftresource.com
• http://www.idtheftcenter.org/vg301.shtml
• http://www.hightechcrimecops.org/mission.htm
• www.ftc.gov
• www.consumer.gov/idtheft
• http://www.consumer.gov/idtheft/con_pubs.html
• http://www.ftc.gov/bcp/conline/pubs/crdit/idtheftmini.htm
• www.columbuspolice.org/fraud/investigativeprocedures_end_criteria.html
• http://www.chicago.bbb.org/idtheft/txpoof.html
• http://www.privacyrights.org/fs/fs/79.htm
• http://www.secretservice.gov/financial_crimes.shtml
• www.idtheftcenter.org/vg106.shtml
TYPES OF IDENTITY THEFT REFERENCES
• http://www.myidfix.com/identity-theft-statistics-us.php
• http://www.creditinfocenter.com/identity/IDTheftStats.shtml
• http://www.factusa.com/ArticleSidebar.asp?id=41
• http://www.identityfraud.com
• http://www.idtheftcenter.org/
• http://computer.howstuffworks.com/identity-theft1.htm
• http://www.ftc.gov/os/2003/09/synovatereport.pdf
• http://www.101-identitytheft.com/
• http://www.usdoj.gov/criminal/cybercrime/usamarch2001_3.htm
• http://www.ftc.gov/bcp/conline/pubs/credit/idtheft.htm\
• http://www.cmiftf.org/
• http://www.identitytheft.com
• http://www.chicago.bbb.org/idtheft
• http://www.oag.state.tx.us/newspubs/opeds/200401blues.shtml
TYPES OF IDENTITY THEFT REFERENCES
• http://www.creditinfocenter/identity/IDTheft
• http://www.bos.frb.org
• http://www.bullzeye.com/identitytheft/index4
• http://www.BBB.com.types_of/~html.
• http://www.howstuffworks.com/identity_theftp2.html
• http://www.aarp/org/research.frauds-scams/fraud/aresearch-import-186-
0085.html
• http://www.consumer.gov/sentinel/images/charts/idtheft01.pdf
• http://www.crypto.wpi.edu/Publications/Documents/WPI_IQP_IdTheft.pdf
• http://www.fdle.state.fl.us/Publications/Identity_Theft.pdf
• http://www.privacyrights.org/fs/fs/t-it.htm
• http://www.newyork.bbb.org/identitytheft/typesof.html
• http://www.crimeandclues.com/dumpster_diving.htm
TYPES OF IDENTITY THEFT REFERENCES
• http://www.consumer.gov/idtheft/
• http://www.idtheftcenter.org/vg114.shtml
• http://www.privacyrights.org/fs/fs17a.htm
• http://www.cityofmemphis.org/framework.aspx?page=524
• http://www.fbi.gov/headlines/idthefth.jpg
• http://www.howstuffworks.com
• http://www.idtheft.com
• http://www.ftc.com
• http://www.crimeprevention.com/upload/social-security-number-card.gif
• http://www.privacyrights.org/fs/fs17-it.htm
• http://www.tompaine.com/upload/social-security-number-card.gif
• http://www.chicago.bbb.org/idtheft/typesof.html
• http://www.simmonsfirst.com/images/interior/credit_card_layout4.gif
TYPES OF IDENTITY THEFT REFERENCES
• http://www.idtheftcenter.org/cresources.html
• http://www. equifax.com
• http://www.thebankofcanton.com/about/id_theft/
• http://www.keeponprospecting.com/portal/idtheft/images/IDT1-
05_11g.jpg
• http://www.identitythefthero.com/id-theft-defined.html
• http://www.idtheftcenter.org/facts.shtml
• http://www. usps.com/postalinspectors/idtheft-ncpw.htm
• http://www. usatoday.com/money/perfi/general/2005-01-14shredder-
cover-x.htm
• http://www.crime.about.com/od/issues/a/aa040718.htm
• http://www.media.collegepublisher.com/media/paper563/stills/0664
vi6k.jpg
• http://www.ftc.gov/conline/pubs/credit/idtheft.htm
• http://www.unwantedlinks.com/fraudchart-sm.jpg
• http://www.ecommercetimes.com/perl/story/20553.html
PHOTOGRAPHY REFERENCES
• http://www.pcmag.com/article2/0,1895,162551,00.asp
• http://www3.cnn.com/TECH/computing/9910/11/id.theft.idg/
• http://www.forensics-intl.com/art18.html
• http://en.wikipedia.org/wiki/Digital_photography#Advantages_of_d
igital:_consumer_cameras
• http://www.westchestergov.com/labsresearch/ForensicandTox/fore
nsic/photo/forphotoframeset.htm
• http://library.thinkquest.org/04oct/00206/soc_recording_the_crim
e.htm#soc_camera
• http://expertpages.com/news/voiceprint_identification.htm
• http://www.elmhurst.org/elmhurst/police/generalinfo.asp
• http://www.crime-scene-investigator.net/
PHOTOGRAPHY REFERENCES
• http://www.FTC.com
• http://www.webopedia.com/TERM/d/digital_photography.html
• http://sg.wilkes.edu/PhotoQuest/stories/storyReader$17
• http://www.idtheftcenter.org
• http://www.ou.edu/oupd/idtheft.htm
• http://www.privacyrights.org/identity/htm
• http://www.consumer.gov/idtheft
• http://www.crime-scene-investigator.net/admissibilityofdigital.html
• http://www.wirelessmoments.com/2004/02/third_article_a.html
• http://www.techdirt.com/articles/2004/223/1438218_F.html
• http://www.newstarget.com/007346.html
PHOTOGRAPHY REFERENCES
• http://magazines.ivillage.com/goodhousekeeping/consumer/safety/arti
cles/0,,284526_671911,00.html
• http://www.advimagingandanalysis.com/Appnotes/nov98.html
• http://www.dol.wa.gov/ds/digfaq.htm
• http://www.kenrockwell.com/tech/digital.htm
• http://home.earthlink.net/~thekeither/Foorensic/page7.htm
• http://www.engadget.com/entry/1234000230053946/
• http://en.wikipedia.org/wiki/identity_documents_in_the_United_States
• http://www.informit.com/guides/content.asp?
g=digitallifestyles&seqNum=274
• http://www.geocities.com/cfpdlab/digital.htm
• http://www.digitalphotgraphy-fried.html
VIDEOGRAPHY REFERENCES
• http://urbanlegends.about.com/library/bl_atm_skimmer.htm
• http://www.brucekoeing.com/services.php
• http://www.dejaview.com/default.asp?page_id=74
• http://www.westchestergov.com/labsresearch/ForensicandTox/forensic
/photo/forphotoframeset.htm
• http://www.elmhurst.org/elmhurst/police/general info.asp#photo
• http://www.gatheringguide.com/event_directory/
ma_massachusetts/vendor_videographers_144.html
• http://www.tribuneindia.com/2005/20050630/ punjab1.htm
• http://www.crime-scene-investigator.net/video.html
VIDEOGRAPHY REFERENCES
• http://www.legalvideographers.com/about.php
• http://library.thinkquest.org/04oct/00206/soc_
recording_the_crime.htm#soc_videocam
• http://www.cgroup.com/default3.htm
• http://expertpages.com/news/forensic_exam_video tape.htm
• http://www.thefreedictionary.com/videography
• http://ali.apple.com/ali_sites/ali/exhibits/1000019
• http://www.brucekoenig.com/services.php
• http://www.infromit.com/guides/content.asp?
g=digitallifestyles&seqNum=274
• http://www.magazines.ivillage.com/goodhousekeeping/consumer/s
afety/articles/0,,284526_671911,00.html
VIDEOGRAPHY REFERENCES
• http://www.keyscan.ca/English/PDFs/Products_Photo_Badge_.pdf
• http://www.focus.ti.com/docs/apps/catalog/general/applications.jhtml?
templateId=5958&path=templatedata/cm/general/data/telecom_access
ories_dve
• http://www.lexisnexis.butterworths.co.uk/law/ToolsServices/cr_forensics
.htm
• http://www.click2houston.com/news/5333451/detail.html?
subid=10100242
• http://www.tennessean.com/local/archives/05/01/66538663.shtml
• http://www.elmhurst.org/elmhurst/police/generalinfo.asp
• http://www.avdetectives.com
• http://www.covertsciences.com
FINANCIAL INVESTIGATION
REFERENCES
• <http://www.irs.gov/compliance/enforcement/article/0,,id=107515,00.
html>
• <http://www.akaku.org/graphics/forms_paper_stack.jpg>
• <http://www.secretservice.gov/financial_crimes.shtml#Financial>
• <http://www.fbi.gov/publications/financial/fcs_report052005/fcs_rep
ort052005/fcs_report052005.html#e1>
• <http://www.interfire.org/res_file/fin_outl.asp#whatfin>
• <http://www.stats.bls.gov/oco>
• <http://www.policedhiefmagazine.org/magazine/index.cfm?
fuseaction=display_arch&article_id538&issue_id=32005>
• <http://www.idtheftcenter.org/alerts/shtml>
FINANCIAL INVESTIGATION
REFERENCES
• <http://www.myidfix.com/identity_theft_statistics_us.php?
oscid=bZZ300399ca9a2f89144e1cf3c74f366>
• <http://www.bbbonline.org/IDTheft/safetyQuit.asp>
• <http://www.dfwresources.net/idtheft_intro.htm>
• <http://www.idtheftcenter.org/alerts/shtml>
• <http://www.myidfix.com/identity_theft_statistics_us.php?
oscid=bZZ300399ca9a2f89144e1cf3c74f366>
• <http://www.dfwresources.net/idtheft_intro.htm>
• <http://www.ur.das.state.or.us/hrsd/class/5235.htm>
• <http://www.privacyrights.org/identity.html>
• <http://www.protiviti.com/portal/site/prous/index>
• <http://www.financialpi.com>
FINANCIAL INVESTIGATION
REFERENCES
• <http://www.elderoptionsoftexas.com>
• <http://www.ftc.gov/os/1999/04/identitythefttestimony.htm>
• <http://www.netsafe.org.nz/fraud/fraud_default.aspx>
• <http://www.Ou.edu/oupd/idtheft.htm>
• <http://www.sercretservice.gov/financial_crimes.shtml>
• <http://www.insideid.com/idtheft/article.php/11748_348261_2>
• <http://www. Insideid.com/idtheft/article.php/3438261>
• <http://www.
Dhs.gov/dhspublic/interapp/press_release/press_release_0206.x
ml>
• <http://www.sec.gov/investor/pubs/onlinebrokerage.htm>
VOICE EXAMINATION REFERENCES
• Http://www.expertpages.com/news/voiceprint_identification.htm
• http://www.brucekoenig.com/service.php
• http://www.newstarget.com/007346.html
• http://caeaudio.com/forensicmethod.html
• http://expertpages.com/news/voice_forensic_tool.htm
• http://www.idtheft.org
• http://fightidentitytheft.com
• http://www.identitytheftspy.com/2005/05/voice_recogniti.html
• http://www.digimarc.com/docs/wp_colocasestudy.pdf
• http://www.rohan.sdsu.edu/~ling354/voicerecognition.html
• http://www.businessweek.com/technology/content/apr2005/tc20050420
_1036_tc024.htm
VOICE EXAMINATION REFERENCES
• Http://www.ou.edu/oupd/idtheft.htm
• http://www.consumer.gov/idtheft.htm
• http://www.forensic-int.com/art18.html
• http://www.infomit.com/guides.content.asp?
g=digitallifestyles&seqNum=274
• http://magazines.ivillage.com/goodhousekeeping/consumer/safety/arti
cles/0,,284526_671911,00.html
• http://www.keyspan.ca/English/PDFs/Products_Photo_Badge.pdf
• http://www.voicedoctor.net/diagnose/vcb.html
• http://www.allayurveda.com/diagnosis_exeight.htm
• http://www.nidcd.nih.gov/health/voice/vocalabuse.asp
• http://www.legallanguage.com/forensic/Spectrographic.htm
VOICE EXAMINATION REFERENCES
• Http://www.victimsassistanceofamerica.org/howto-contact-martha.cfm
• http://www.identitytheftspy.com/prevention/
• http://digimarc.com/secureid/about.asp
• http://www.voicevault.com/itf.php
• http://www.idtheftcenter.org
• http://www.tradeharbor.com/TH_Website2/vss.html
• http://www.yahoo.com/voiceenhancement.htm
• http://en.wikipedia.org/wiki/identity_documents_in_the_United_State
s
• http://www.cyberdriveillinois.com/press/2004/may/040510d1.html
• http://www.dol.wa.gov/ds/digfag.htm
DOCUMENT EXAMINATION
REFERENCES
• Http://en.wkipedia.org/wki/Main_page
• http://www.iiiweb.net/go/forensic-services/questioned-document-
examination
• http://faculty.ncwc.edu/toconnor/425/425let05.htm
• http://www.myhandwriting.com/experts/#List%20of%20Analysts
• http://eslu.cse.ogi.edu
• http://www.springer.com
• http://www.documentlab.com/s_oblif.gif
• http://www.fbig.ca/forger.html
• http://qdewill.com/problems.htm
• http://www.swafde.org/faq.html
• http://www.4n6.com/alt.htm
DOCUMENT EXAMINATION
REFERENCES
• http://en.wikipedia.org/wiki/Questioned_document_examination
• http://www.fbigov/hq/lab/fsc/backissu/april2000/swgdoc6.htm
• http://www.ice.gov/graphics/news/factsheets/061704det_FS.htm
• http://www.swafde.org/faq.html
• http://www.documentlab.com/services.htm
• http://forensic.to/webhome/qdewill/
• http://www.samanagement.co.za/document_examination.htm
• http:// www.vision.caltech.edu/mariomu/research/sigverif/s066f.gif
• http://www.forensic-evidence.com/site/ID/ID_Biometric_jarvis.html
• http://www.usdoj.gov/criminal/fraud/idtheft.html
• http://identitytheftinfo.blogspot.com/
• http://www.abfde,org/fde.htm
DOCUMENT EXAMINATION
REFERENCES
• http://www.grc.nasa.gov/WWW/epbranch/surtxt/surfacetitles.htm#Ato
mic_Oxygen
• http://www.ntu.edu.sg/home/asgleedham/currentresearch.htm
• http://www.aafs.org/default.asp?section id=resources&page id=choo
sing a career#QD
• http://www.abfde.org/faqs.htm#categories
• http://www.hk-lawyer.com/2000-6/June00-92.htm
• http://www.docexaminer.com/?gclid=CNLu4Z_y-YECFQcpGgodJCuBlw
• http://www.wyomingbankers.com/pdfs/Fraud_Prevention_Basics.pdf#s
earch=‘document%20examination%20%20identity%20theft’
• http://www.iptm.org/psi/crim.htm#033109
• http://docev.co.uk/areas_alterations.html
COMPUTER DATA RECOVERY REFERENCES
• http://www.disklabs.com/data-recovery.asp
• http://www.disklabs.com/computer-forensics-introduction.asp
• http://netsecurity.about.com/od/newsandeditorial1/a/aaidenttheft.htm
• http://www.have.sandiego.edu/~lsolum/colloquia/kerrdigitalworld.doc
• http://www.73.com/data-recovery/article-10-Computer-Data-Recovery.html
• http://www.popularmechanics.com/technology/computers/1279241.html
• http://www.pctechbytes.com/
• http://www.essdatarecovery.com/
• http://computer.howstuffworks.com/question578.htm
• http://www.essentialrecovery.com/protect_personal_info.html
• http://en.wikipedia.org/wiki/Salvage_Data
• http://www.icsworld.com/computer_forensic_investigation_services.asp
COMPUTER DATA RECOVERY REFERENCES
• http://www.computeruser.com/articles/2205,1,1,1,0501,03.html
• http://www.fraudaid.com/security_products/articles_information/identity_
theft.htm
• http://www.goarticles.com/cgi_bin/showa.cgi?c=83363
• http://www.insideid.com/idtheft/article.php/11784_3438261_6
• www.fraudaid.com/security_products/articles_information/identity_theft
• http://www.microsoft.com/athome/security/spyware/spywareremove.mspx
• http://www.intellirecovery.com/data_recovery_services.html
• http://www.internetfraud.usdoj.gov/
• www.dataexcorp.com/html/cybercrimenews.htm
• http://www.datarecovery.net
• www.ftc.gov/bcp/conline/pups/credit/idtheft.htm
• http://www.krollontrack.com/
COMPUTER DATA RECOVERY REFERENCES
• http://www.flashbackdata.com/computer-forensics/
• www.datarecovery.net
• http://www.usdoj.gov/criminal/fraud/Internet/htm#
• http://www.ontrack.com/
• http://www.fraud.org/
• http://www.wikipedia.org
• http://www.datarecovery.net/
• http://www.databankservices.com/common_evidence.html
• http://www.harddriverecovery.org/computer-data-recovery.html
• http://www.ou.edu/oupd/idtheft.htm
• http://www.netsafe.org.nz/fraud/fraud_default.aspx
• http://www.privacyrights.org/identity.htm
• http://www.actionfront.com
COMPUTER FRAUD REFERENCES
•Http://www.fraud.org/graphics/1999graphs/initialcontact.gif
•Http://www.antiphishing.org/
•Http://www.archives.cnn.com/2000/tech/computing/03/20/net.identit
y.theft.idg/
•Http://www.linus.socs.uts.edu.au/~jim/cit2/cit2-
99/legal/images/graph.jpg
•Http://www.wtpdmorris.org/News/phishing/links.gif
•Http://www.windowsecurity.com/img/upl/image00610610.jpg
•Http://www.archives.cnn.com/2000/tech/ptech/II/30/internet-
shopping/story.computer.ideas.2.jpg
•Http://www.istockphoto.com/imageindex/26121/62274/
•Http://www.infotech.com/upload/20030514-01.gif
•Http://www.e-jaz.com.au/media/2003/QBR/200302Catch.htm
•Http://www.internetfraud.usdoj.gov
•Http://www.cnn.com/…/story.computer.ideas.2.jpg
COMPUTER FRAUD REFERENCES
• Http://www.cimsgts.com/images/data-flowing-from-computer.jpg
• Http://www.universalprocessing.com/images/Credit1.jpg
• Http://www.webopedia.com/term/p/phishing.htm
• Http://www.losspreventionmagazine.com/archives_view
• Http://www.dailytimes.com.pk/default.asp?page=story
• Http://www.fbi.gov/majcases/fraud/internetschemes.htm
• Http://www.internet-fraud.com/internet-fraud/
• Http://www.fraud.org/internet/intset.htm
• Http://www.images.google.com/imgres?imgurl=
Http://www.cmu.edu/police/images
• Http://www.images.google.com/imgres?imgurl=
Http://www.elderoptionsoftexas.com
• Http://www.internetfraud.usdog.gov/
• Http://www.fraud.org/graphics/1999graphs/contactbytype.gif
COMPUTER FRAUD REFERENCES
• Http://www.universalprocessing.com/images/credit1.jpg
• Http://www.scmagazine.com/uk/news/article/530336/majority-world-worried-
internet-fraud
• Http://www.twincities.com/mid/twincities/13259174.htm
• Http://www.nlcnet.org/internetscramfactsheet.html
• Http://www.fraud.org
• Http://www.esadkihs.com/fihforpic2
• Http://www.ifccfbi.gov/index.asp
• Http://www.fraud.org/internet/inttip/inttip.htm
• Http://www.usdoj.gov/criminal/fraud/index.htm
• Http://www.pcppress.co.yu/arhiva/images/broj/62/36_ada-computers.jpg
• Http://www.fbi.gov/publications/financial/fcs_report052005/fes_report052005.htm
#el
• Http://www.internetfraud.usdoj.gov/#What%20Is%20Internet%20Fraud
• Http://www.fraudaid.com/security_products/articles_information/identity_theft.ht
m
FINGERPRINT REFERENCES
• http://www.techworld.com/applications/features/index.cfm?
FeatureID=1954
• http://www.cityofmemphis.org/framework.aspx?page=524
• http://www.epic.org/privacy/biometrics/testimony_071802.html
• http://www.identicatorinc.com/IdentityTheft.pdf
• http://www.geocites.com/evilsnack/idtheft.htm
• http://www.sciencedaily.com/releases/2005/03/050322135157.htm
• http://www.interpol.int/Public/Forensic/Ifss/meeting13/specialpres
entation.pdf
• http://www.cnn.com/2004/TECH/ptech/02/10/digital.evidence.ap/
• http://www.money.cnn/2005/07/19/pf/security_biometrics/
FINGERPRINT REFERENCES
• http://www.fdeservices.com
• http://www.iiiweb.net/go/forensic-services/questioned-document-
examination
• http://www.forensic.to/webhome/qdewill/
• http://www.samanagement.co.za/document_examination.htm
• http://www.cariboo.bc.ca/cpj/identitytheft.html
• http://www.forensic-evidence.com/site/ID/ID_Biometric_jarvis.html
• http://www.usdoj.gov/criminal/fraud/idtheft.html
• http://www.nolo.com/article.cfm/objeftID/6BC35DBC
• http://www.atsnn.com/story/111839.html
• http://www.privacyrights.org/identity.html
FINGERPRINT REFERENCES
• http://www.onin.com/fp/fphistory.html
• http://www.latent-prints.com/
• http://www.faculty.ncwc.edu/toconnor/315/315lect05.htm
• http://www.forensic-evidence.com/site/ID/havvard_2000.html
• http://www.search.yahoo.com/search?
p=fingerprint+evidence+references&fr=FP-tab-web-
t&toggle=1&cop=&ei=UTF-8
• http://www.biometricaccess.com/products/wp_finge.htm
• http://www.accessexcellence.org/RC/AB/BA/DNA_Fingerprinting_Basic
s.html
• http://www.caag.state.ca.us/idtheft/general.htm
• http://www.epic.org/privacy/biometrics/testimony_071802.html
FEDERAL POLICY REFERENCES
• http://www.oag.state.ny.us/consumer/tips/id_theft_victim.html
• http://www.whitehouse.gov/news/releases/2004/07/20040715-3.html
• http://www.ftc.gov/foia/privacy_act.htm
• http://en.wikipedia.org/wiki/health_insurance_portability_and_accountability_act
• http://www.usdoj.gov/criminal/fraud/idtheft.html#what’s%20the%20department
%20of%20justice%20doing%20about
• http://www.consumer.gov/idtheft/con_steps.htm
• http://www.ssa.gov/pubs/idtheft.htm
• http://www.bankofinternet.com/quickhelp/preventing_identity_theft.asp
• http://www.ncjrs.org/spotlight/identity_theft/summary.html
• whitehouse.gov/identity
• http://www.bad-credit-rx.com/identity_theft.html
• http://www.consumer.gov/idtheft/id_laws_privacy.htm
• http://www.whitehouse.gov/news/releases/2004/07/20040715-3.html
FEDERAL POLICY REFERENCES
• http://www.fbi.gov/page2/oct04/preventidt102104.htm
• http://www.newyork.bbb.org/
• http://www.senate.gov/~schumer/schumerwebsite/pressroom/special_reports/ident
ity%20theft%20report.pdf
• http://www.fbi.gov/page2/oct04/preventidt102104.htm
• http://www.whitehouse.gov/news/releases/2004/07/20040715-3
• http://www.llrx.com/features/idtheft.htm
• http://www.gov/org/identitytheft
• http://www.internetnews.com
• http://www.whitehouse.gov/news/release/2004/07120040715-3.html
• http://www.encarta.com
• http://google.com/federalpolicyburea.edu
• http://www.cga.ct.gov/2004/rpt/2004-R/0641.htm
• http://www.llrx.com/features/idtheftguide.htm
STATE POLICY
•http://www.ag.ca.gov/idtheft/tips.htm
•http://www.consumersunion.org/pub/care_financial_services/000144.html
•http://www.consumer.state.ny.us/pdf/id_theftpamphlet.pdf
•http://www.ago.state.co.us/idtheft/lehelp.cfm
•http://assembly.state.ny.us/leg/?bn=A04254
•http://info.sen.ca.gov/pub/01-
02/bill/sen/sb_1351_1400/sb_1386_bill_20020926_chaptered.html
•http://www.texas.gov/policies/idtheft/a
•http://www.texas.gov/image1
•http://www.privacyprotection.ca.gov/
•http://www.dos.state.ny.os/coog/csogwww.html
•http://www.health.state.ny.us/nysdoh/phferum/ppp.about.htm
•http://www.california.gov/losangelos/policies/id/theft/policy
•http://www.la.gov/police.lapd
•http://www.boston.com/news/local/new_hampshire/articles/2005/10/16/more_insurer
s_offering_identity_theft_policies/
•http://www.assembly.state.ny.us/leg/?by=k&qs=+identity+theft
STATE POLICY
• http://www.egov.cityofchicago.org/city/webportal/portaldeptcategoryaction.do?
bv_sessionid=@@@@1547864447.1141025515@@@@&BV_engineID=cccfaddgmjddkjh
cefecelldffhdfgn.0&deptcategoryoid=_536890496&contenttype=coc_editorial&topch
annelname=Dept&entityname=consumer+services&deptmaincategoryOID=_5368890
65
• http://www.consumer.gov/idtheft/id_laws_privacy.htm
• http://www.ftc.gov/bcp/conline/pubs/crdit/idtheftmini.htm#introduction
• http://www.ftc.gov/bcp/conline/pubs/credit/idtheftmini.pdf
• http://www.fbi.gov/page2/oct04/preventidt102104.htm
• http://www.newyork.bbb.org/
• http://www.senate.gov/~shumer/schumerwebsite/pressroom/special_reports/identi
ty%20theft%20report.jdf
• http://www.senatorfarley.com/press_archive_story.asp?id=3167
• http://www.oag.state.ny.us/consumer/tips/identity_theft_pamphlet.pdf
• http://www.assembly.state.ny.us/leg/?bn=S03492
• http://www.senatornozzolio.com/constituent_services_story.asp?id=15
STATE POLICY
• http://www.leginfo.ca.gov
• http://www.privacyprotection.ca.gov
• http://www.legis.state.gov.us/legis/2001_02/fultext/sb475.htm
• http://www.llrx.com/features/idtheft.htm
• http://www.oag.state.ny.us/consumer/tips/identitytheft.htm
• http://www.consumeraffairs.com/news041/2005
• http://www.consumer.gov/idtheft/law_laws_state_criminal.htm
• http://www.securitystate.ny.us/entitiesof_provision.html
• http://www.consumer.gov/idtheft/id_laws_privacy.htm
• http://www.mass.gov/idtheft.htm
• http://www.oag.state.ny.us/consumer/consumerissues.html
• http://www.privacyprotection.ca.gov/lawenforcement/laws.htm#five
• http://www.ncsl.org/programs/lis/privacy/idt-01legis.htm
• http://www.californiastateidfraud.org
• www.ny.gov/identitytheft
• www.illinois.gov/identitytheft
LOCAL POLICY REFERENCES
• http://www.ny.gov/governor/press/02/oct9_02.htm
• http://www.ftc.gov/bcp/workshops/idtheft/charts-update.pdf
• http://www.senate.gov/~schumer/SchumerWebsite/pressroom/press_rel
eases/PR01342.html
• http://www.lapdonline.org/bldg_safer_comms/prevention/identity.htm
• http://www.nyccouncil.info/media/reports.cfm
• http://www.nyc.gov/html/initiatives/campus.shtml
• http://www.senate.gov/~schumer/SchumerWebsite/pressroom/press_rel
eases/PR02155.html
• http://www.identitytheft911.com/company/press/press200502lapfcu.htm
• http://www.nationalnotary.org/idtheft/index.cfm?Text_papertrail
• http://www.sandiego.gov/mayor/messages/identitytheft.shtml
• http://www.newyork.bbb.org/
LOCAL POLICY REFERENCES
• http://www.gothamgazette.com/article/tech/20040415/19/950
• http://www.grolier.com
• http://www.bcpl.net/policies
• http://www.consumer.gov/idtheft/id_laws_privacy.htm
• http://www.nyccouncil.info/search/searchlook2.cfm?SEARCH=STRING
• http://egov.cityofchicago.org/city/webportal/home.do
• http://101-identitytheft.com/identity-theft-new-york.htm
• http://www.ncsl.org/programs/lis/privacy/idt-statutes.htm
• http://www.lacity.org/atty/atycpl.htm
• http://www.miami.gov/identitytheft
• http://www.california.gov/Losangeles/identitytheft
• http://www.ftc.gov/bcp/workshps/idtheft/reporttext.htm
• http://www.bizjournals.com/boston/stories/2003/09/08/focus7.html
LOCAL POLICY REFERENCES
• http://www.cit.policies.gov/seattle
• http://www.nycidfraud.org
• http://www.floridaidtheft.org
• http://www.ci.la.ca.us/
• http://www.nyc.gov/html/records/pdf/govpub/1874idtheft/pdf
• http://www.miamidade.gov/csd/Idtheft.asp
• http://www.miamidade.gov/csd/ID_Theft_brochure.asp
• http://www.chicagotribune.com/business/chi-
0512310060dec31,1,1644957.story?coll=chi-business-hed
• http://www.govtech.net
• http://www.phoenix.gov/police/idtheft_biz.html
• http://www.gothamgazette.com/article/searchlight/20050511/203/1414
• http://www.dca.ca.gov/whats_new/consumerleaders.htm
DEPARTMENT OF EDUCATION REFERENCES
•http://www.nycenet.edu
•http://www.ed.gov/news/speeches/2003/12/12112003a.html
•http://www.nycenet.edu/default.aspx
•http://www.nycenet.edu/NR/rdonlyres/F1F68208-CEAF-445E-BAA4-
2CE17902E36A/5625/Booklet2005_Booklet2004.pdf
•http://www.nycenet.edu/Administration/Offices/FinanceandAdministr
ation?DIIT/WebServices/WebDevelopmentPosting/default.htm
•http://www.bxscience.edu/student_resources.jsp
•http://www.fraudwatchinternational.com/identitytheft/types.shtml
•www.nycenet.edu/parents/PDFs/DisciplineCode.pdf
•http://www.nycenet.edu/Offices/DHR/MostPopularClicks/Fingerprinti
ng.htm/
•http://www.ed.gov/about/offices/list/oig/misused/srespons.html
•www.depted.com
•http://www.ed.gov/about/offices/list/oig/misused/index.html
•http://www.ed.gov/idtheft
DEPARTMENT OF EDUCATION REFERENCES
• www.consumers.gov/idtheft/con_resolve.htm
• www.ed.gov/misused
• http://usny.nysed.gov/lawsregs/edres.html
• http://www.ed.gov/about/offices/list/oig/misused/victim.html
• http://www.securitymanagement.com/library/001035.html
• boe.edu/identitytheft/policy
• http://www.findarticles.com/p/articles/mi_m2194/is_3_73/ai_n6006613#continue
• http://polcomp.rutgers.edu/identity.shtml
• http://www.kheaa.com/policy.html
• http://www.op.nysed.gov/subart4.htm
• www.uft.org/privacy/
• www.nycenet.edu/parents/essentials/school+safety/default.htm
• http://www.bths.edu/artsfest/images/NYC-Official-Logo-BW.gif
• http://www.educause.edu/LibraryDetailPage/666?ID=MAC0422
CITATIONS
(for images)
http://www.identitytheft911.com/assets/img/home/hm_img_collage.jpg

http://der-tellerrand.de/images/print.jpg

http://cnnstudentnews.cnn.com/interactive/tech/0211/identity.
protection/bground.identity.theft.jpg

http://www.crime-research.org/news/2003/img/Lico.jpg
 Alta Vista
SEARCH ENGINES
• www.altavista.com

 Excite

• www.excite.com

 ERIC

• www.ERIC.com

 Entire Web

• www.entireweb.com

 Google

• www.google.com

 San Diego State University Library

• www.SanDiegoStateUniversity/Library.com

 Specialized Search Engines

• www.SpecializedSearchEngines.com

 Yahoo

• www.Yahoo.com

 Clip Art

• www.ArtClipArt.com
EVALUATION
Your grade will be determined according to the following scale:
• PowerPoint Presentation. (35%) Your PowerPoint presentation will consist of
10-15 slides. Use the guidelines outlined in the PowerPoint presentation
section of this quest as your guide. Make certain that your audience can
navigate easily from slide to slide. Your final slide must identify your class, list
the names of the students in the class and generate an MLA style list of the
sources you used throughout your previous slides. Be certain that each of your
slides is thoroughly designed and well prepared to make a positive visual
impact on the audience. Use qualitative and quantitative information. All kinds
of photographs, graphs, drawings, etc., can be presented. Be certain to gather
information from multiple sources and to synthesize the information well. Also,
utilize this information to succinctly state the problem, identify the causes of
the problem and formulate a clearly stated conclusion regarding the best
policy for forensic investigators and the public in general regarding identity
theft in America.
Written Reports (35%) You will be required to write mini research reports. In
order to do this, you will have to search the Internet for appropriate articles,
synthesize, analyze and draw conclusions from the information you have
collected. All information submitted must be appropriately documented and
must include the appropriate graphics to illustrate the content and conceptual
understanding behind the investigation.
Oral Evaluation (15%) You will serve as a guest speaker for all of the forensic
science classes at The Bronx High School of Science. Your oral PowerPoint
presentation will be graded on your familiarity with the topic, clarity of concepts,
use of visual aids, how well you held the audience’s attention, audibility and
grammar.
Bibliography (15%) Use the MLA format to correctly attribute information to all
rightful sources.
GRADING POLICY
Range: 1= Poor, 5= Excellent
Written Research Projects Scoring
Facts and information from multiple 12345
internet sources
Synthesis of information from multiple 12345
references
Analysis of information 12345
Conclusions drawn from the results of 12345
the investigation
Written clearly and succinctly 12345
GRADING POLICY
Grammar 12345
Understanding of scientific concepts 12345
Understanding of public policy 12345
Policy evaluation and design 12345
Bibliography 12345
GRADING POLICY
Oral Presentation Scoring
State the purpose of your project. 1 2 3 4 5
Provide supporting information. 12345
Present information clearly and succinctly. 1 2 3 4 5
Clarity of concepts. 1 2 3 4 5
Effective use of PowerPoint slides. 1 2 3 4 5
How well presenter held the audience’s 12345
attention
The organization of facts and information 1 2 3 4 5
Policy decisions and solutions 12345
Bibliography 1 2 3 4 5
GRADING POLICY
PowerPoint Presentation Scoring
Minimum of fifteen slides. 12345
Visual impact of slides. 12345
Easy navigation from slide to slide. 12345
Use of qualitative and quantitative 12345
information.
Clear and succinct presentation. 12345
GRADING POLICY
Use of multiple sources. 12345
Appropriate graphics to 12345
illustrate the content and
conceptual understandings.
Identification of the problem 12345
and the cause of the problem.
Policy and policy solutions. 12345
Bibliography. 12345
GRADING POLICY
Determination of Grades:
40- 50 = A
30- 39 = B
20- 29 = C
10- 19 = D
Below 10 = F
Timeframe:
• Mini research reports collected bimonthly up to and including March 7, 2006.
• Slide show due May 30, 2006.
• Oral presentations for all forensic science classes due on June 2, 2006.
• PowerPoint presentation posted online June 2, 2006.
HIGH SCHOOL SCIENCE
PERFORMANCE STANDARDS
Scientific Connections and Applications
– Demonstrates an understanding of big ideas and unifying concepts.
– Demonstrates an understanding of the impact of technology.
– Demonstrates an understanding of the impact of science.
• Scientific Thinking
– Frames question to distinguish cause and effect, and identified or
control variables.
– Uses concepts for Science Standards to explain a variety of
observations and phenomena.
– Uses evidence from reliable sources to develop descriptions,
explanations, and models; and makes appropriate adjustments and
improvements.
HIGH SCHOOL SCIENCE
PERFORMANCE STANDARDS
Proposes, recognizes, analyzes, considers, and critiques alternative
explanations; and distinguishes between fact and opinion.
– Identifies problems; proposes and implements solutions; and evaluates
the accuracy, design, and outcomes of investigations.
– Works individually and in teams to collect and share information and
ideas.
• Scientific Tools and Technologies
– Uses technology and tools to observe and measure objects, organisms,
and phenomena, directly, indirectly, and remotely, with appropriate
consideration of accuracy and precision.
– Records and stores data using a variety of formats.
– Collects and analyzes data using concepts and techniques in
Mathematics Standard 4.
HIGH SCHOOL SCIENCE
PERFORMANCE STANDARDS
– Acquires information from multiple sources.
– Recognizes and limits sources of bias in data.
• Scientific Communication
– Represents data and results in multiple ways.
– Argues from evidence.
– Critiques published materials.
– Explains a scientific concept or procedure to other students.
– Communicates in a form suited to the purpose and the audience.
• Scientific Investigation
– Demonstrates scientific competence by completing fieldwork.
– Demonstrates scientific competence by completing secondary research.
HIGH SCHOOL MATH
PERFORMANCE STANDARDS
• Number and Operation Concepts
– Use addition, subtraction, multiplication, division, exponentiation, and
root- extraction.
– Represent numbers in various forms and graph them.
– Compare numbers using order relations, differences, ratios, proportions,
percents, and proportional change.
– Recognize and respect basic number patterns.
• Function and Algebra Concepts
– Make predictions by interpolating or extrapolating.
• Statistics and Probability Concepts
– Organize, analyze, and display single- variable data appropriately.
– Organize, analyze, and display two- variable data appropriately.
HIGH SCHOOL MATH
PERFORMANCE STANDARDS
– Use sampling techniques to draw references.
– Understand that making inferences from a sample involves uncertainty
and that the role of statistics is to estimate the size of that uncertainty.
– Formulate hypotheses to answer a question and use data to test
hypotheses.
– Interpret representation of data, compare distribution of data, and
critique conclusions.
– Explore questions of experimental design, control groups, and
responsibility.
– Create and use models of probability and understand the role of
assumptions.
• Problem Solving and Reasoning
– Formulation.
– Implementation.
HIGH SCHOOL MATH
PERFORMANCE STANDARDS
– Conclusion.
– Mathematical reasoning.
• Mathematical Skills and Tools
– Carry out numerical calculations and symbol manipulations effectively.
– Make and use rough sketches, schematic diagrams, or precise scale
diagrams.
– Create and interpret graphs of many kinds.
– Use technology to create graphs of spreadsheets.
– Use tools in solving problems.
– Know standard methods to solve basic problems and use these
methods in approaching more complex problems.
HIGH SCHOOL MATH
PERFORMANCE STANDARDS
• Mathematical Communication
– Be familiar with basic mathematical terminology, standard notation
and use of symbols, common conventions for graphing, and
general features of effective mathematical communication styles.
– Use mathematical representations with appropriate accuracy.
– Organize work and present mathematical procedures and results
correctly.
– Communicate logical arguments clearly, showing sensibility and
validity.
• Putting Mathematics to Work
– Data study.
HIGH SCHOOL ENGLISH LANGUAGE
ARTS PERFORMANCE STANDARDS
• Reading
– Read and comprehend informational materials.
•Writing
– Produce a report of information.
• Speaking, Listening, and Viewing
– Participate in one- to- one conferences with the teacher.
– Participate in group meetings.
– Prepare and deliver an individual presentation.
• Conventions, Grammar, and Usage of the English Language
HIGH SCHOOL ENGLISH LANGUAGE
ARTS PERFORMANCE STANDARDS
– Independently and habitually demonstrate an
understanding of the rules of the English language in
written and oral work.
– Analyze and subsequently revise work to improve its clarity
and effectiveness.
• Literature
– Respond to non- fiction documents with an eye to
strategies common to effective functional documents.
– Produce functional documents appropriate to audience
and purpose.
HIGH SCHOOL APPLIED LEARNING
PERFORMANCE STANDARD
• Problem Solving
– Design a Product, Service, or System: Identify needs that could be
met by new products, services, or systems and create solutions
for meeting them.
– Improve a System: Develop an understanding of the way systems
of people, machines, and processes work; troubleshoot problems
in their operation and devise strategies for improving their
effectiveness.
• Communication Tools and Techniques
– Develop a multi- media presentation.
• Information Tools and Techniques
HIGH SCHOOL APPLIED LEARNING
PERFORMANCE STANDARDS
– Gather information to assist in completing project work.
– Use online sources to exchange information for specific
purposes.
– Use word processing software to produce a multi- page
document.
• Learning and Self- Management Tools and Techniques
– Review one’s progress in completing work activities and adjust
priorities.
• Tools and Techniques for Working with Others
– Participate in the establishment and operation of self- directed
work teams.

You might also like