SlideShare una empresa de Scribd logo
1 de 34
Welcome!
 ATP Sessions
 Caveon LinkedIn Group
   http://linkd.in/caveon
 Caveon twitter
   http://bit.ly/caveontwitter
 Upcoming Webinar:
   Web Patrol - Who is stealing your Tests?
     Feb 15th 12pm EST
Caveon ATP Sessions
To Catch a Cheat: Building Fraud Detection into Your Exams
Liz Burns, Juniper Networks; Dennis Maynes, Caveon

Gimme Shelter: Weathering the Media Storm of a Cheating Scandal
John Fremer, Caveon; Greg Toppo - USA Today; James Vaselek, LSAC


Developing and Conducting Investigations of Testing Irregularities in High-
Stakes Testing Programs
Steve Addicott, Caveon; John Fremer, Caveon; A. Benjamin Mannes, ABIM

Everything You Need to Know to Implement a Data Forensics Program
Benjamin Mannes, ABIM; Dennis Maynes, Caveon; Aimee Rhodes, CFA
Institute; Jennifer Semko, Baker & McKenzie LLP
Conducting Security Investigations

Dr. John Fremer, Ph.D.
President, Caveon Consulting Services, Caveon

Dr. John F. Olson, Ph.D.
President and Founder, Olson Educational
Measurement & Assessment Services

A. Benjamin Mannes, CPP, SSI, CHS-III
Director of Test Security, American Board of Internal
Medicine
Agenda
 Intros
 Standards for Conducting Security
  Investigations
    John Fremer, Caveon
 Security Investigations of School Test
  Administrators
    John Olson, Olson Educational Measurement &
     Assessment Services
 Investigating Intellectual Property Theft
    Ben Mannes, American Board of Internal Medicine
 Q&A
Standards for Conducting Security Investigations


            Dr. John Fremer, Ph.D.
Overall Caveon Standard #15
   Conducting Security Investigations


The organization or state has a set of procedures in
place for:

   • Determining whether a security investigation is
     warranted,
   • Evaluating the extent of fraudulent activities and the
     damage from them, and
   • Guiding the execution of such investigations.
1. Responsibility for managing the
   security investigation process has been
   clearly defined.

2. Investigation procedures have been
   piloted before they are used
   operationally.
3. Investigation procedures have
   received reviews from the perspective
   of program managers, measurement
   staff, communications staff, and legal
   staff.

4. Sufficient funds have been allocated
   to permit thorough investigations.
5a. Where initial investigations are to be
    conducted by test administrators as is
    often the case with state assessment
    programs, an Investigations Kit has
    been developed.
5b. The Investigations Kit spells out

  • Procedures to be followed,
  • Records to be kept, and
  • Laws and regulations that must be
    followed,
    • such as those protecting
       • the privacy of the test takers and
         administrators, and
       • the confidentiality of test materials.
6. Training materials have been
   developed and can be accessed by
   those who will be conducting
   investigations.

7. Investigation procedures are applied
   consistently across the state or
   organization.
8. Conclusions from the investigation are
   based on solid data and information
   including statistical evidence when
   available.
Security Investigations of
School Test Administrators



   Dr. John Olson, Ph.D.
Overview

Step 1 – Planning and Communications
Step 2 – Preparing for the Investigation
Step 3 – Conducting the Interviews
Step 4 – Summarize Information and
   Write Report on Security Investigation
Lessons Learned
Step 1 -- Planning and communications
with state, district, and/or schools re
the investigation

   Responsibilities for conducting the
    investigation
   Contact person for coordination of activities
   Identification of staff to interview
   Scheduling the interviews
   Materials from state and districts
   Other logistics for security investigation
Step 2 -- Preparing for security investigation

   Review all materials from state/district in
    advance
   Review all existing data, such as DF analyses,
    for flagged schools and teachers
   Develop an interview protocol with a
    standard set of questions to ask school test
    administrators
   Review questions with client (state or
    district) and get approval
Examples of security investigation interview
questions
     Were you provided with test security training? When?
     When did the testing materials arrive? Who signed for them?
     Where were the testing materials stored?
     Who had access to where they were stored?
     Describe the process on testing days.
     Describe how and when the test materials were returned after
      testing was completed.
     Describe the process for administering makeup tests and when this
      occurred.
     Describe how tests are assembled after testing for storage.
     Describe the process for boxing up the tests and shipping back to the
      test vendor.
     Did you observe any irregularities before, during, or after the
      administration of the test?
Step 3 -- Conduct training of interviewers
  and coordinate on process to be used

 Conduct interviews, either in schools or at a
  central site
   Set the tone for interviews
   Capture responses from each interviewee
    and record them precisely
   Do follow ups to clarify information as
    necessary
 Maintain confidentiality and security of
  information
Step 4 --Summarize Information and
  Write Report on Security Investigation

 Analyze/Summarize all responses
  completely and clearly
 Write up draft report from security
  investigation – be evidence based
 Do internal reviews (expert, legal, etc.)
 Submit draft to client for review
 Revise as necessary (note that report may
  become a public document)
 Submit final report
Lessons Learned from Conducting Test
Security Investigations

   Be prepared
   Approach the interviews with an “innocent
    until proven guilty” approach, but be firm in
    your questioning
   Know the lay of the land and watch out for
    landmines!
   Be wary of the Press and know who to refer
    them to for their questions
Investigating Intellectual Property Theft


          A. Benjamin Mannes
Detection

Internet:
•   Chat Rooms (brain dump websites)
•   Test Preparation Websites
•   Basic searches for your test name in US and International Search Engines
•   Craigslist® and eBay®

Tip line/ Hotline:
•   Tip lines open doors to Private Tutors which are difficult to find online

Private Tutoring
•   Courses taken by a private investigator- some courses provide “brain dump
         questions” to students in their class.
How Cases Begin

 Internet searches
    Internally (Google® Alerts, etc.), Cyveillance®, Caveon Web Patroltm,
     Lexis Nexis®, etc.
    Set-up a fictitious profile
    EBay® , Amazon®, etc.
 Data forensics & Scoring
    Collusion, item exposure, traditional “cheating”, etc.
 Tipline
    Response infrastructure, etc.
 Eligibility & Registration
    Misrepresentation, proxy testing, etc.
 Outside entities
    Vendors, Licensing authorities, schools, societies,
       associations, etc.
Suspect Identification & Selection

• Background investigations
   – Investigative software, web searches, database
     searches, etc.
• Financials
   – Is legal action your best option?
• Associates
   – Who else may be helping your suspect (codefendants)
     or benefitting from cheating?
• Severity of the case
   – Does the severity of the case warrant legal action?
   – Is other action legally defensible?
Gathering Evidence

 Obtaining infringing materials
 Attending courses/engaging in proxy services
 Web history/screen caps
 Conducting interviews
 Identifying co-conspirators
 Applying for & executing warrants/seizure orders
 Analysis of evidence (with legal)
Steps of a successful Investigation
 Once you identify a website you suspect is distributing your
 content and that your organization is willing to go to court:
 Investigate thoroughly

 •Download copies of the infringed content and match it
 to your content.
    •Distinguish if it is an exact match or substantially similar.

 •If the material is in a chat room:
    •Try and gain background information on the
    participants.
    •Search your database for the emails or names they
    provide.
    •Keep copies of all posts made by individuals.
Taking Action
Administrative:
 Invalidation of scores
 Suspension/revocation of certificate(s)
 Restriction from future testing eligibility
 Notification to stakeholders


Legal:
 Civil litigation process (public)
 Civil litigation process (ex parte)
 Notification to law enforcement agencies
 Referral to prosecutors/Attorney General
Administrative Options
 Since Legal Action may be more costly, there
  are a few Administrative Actions that may be
  more cost effective and still get the message
  out that your program takes the violation
  seriously.

    Score cancellations and testing bans
    Press release
    Notify Score/Certification Recipients
Preparing for Court

 If you decide you want to take the issue to court, take the
 necessary steps to ensure you are prepared for court
 •Ensure you have clearly presented your evidence.
        •Side by Sides are extremely easy for the court to read.
 •Screen shots of the sites materials as were present on the
 internet.
 •Video of collusion at the test center
 •Secure copyright documents for all infringed work.
 •If you have sent Cease and Desist Letters, provide copies
   of all of that correspondence to your Legal Counsel.
Adjudications
You may be sued by the people you investigate or
threatened with legal action – so be prepared.

• Have a clear, fair, and firm public adjudications
  process in place before action is taken.
   – Will sanctions need to be monitored?
   – Is there an appellate process?
   – Is there a mechanism for investigative cooperation?
• Is this process managed internally or externally?
• At what point does your board get involved?
Lessons Learned
• Was a security breach (due to a possible
  vulnerability in your policies or infrastructure)
  identified during the incident?
• If so, what can be done to change policies,
  procedures, or technologies to fix it?
• A cost/benefit analysis should be done to
  address the vulnerability identified by the
  incident.
• Are there other ramifications to the
  organization from the incident?
Questions for presenters?
Comments?

Please go to Caveon’s Test Security Group on
    LinkedIn to join and post Comments!
           http://linkd.in/caveon

We appreciate our @Caveon twitter followers
       http://bit.ly/caveontwitter

            Look for us at ATP!
Thank you for Attending
 “Conducting Security Investigations”

     Upcoming Webinar will be
          Feb 15th 12pm EST
Web Patrol – Who’s stealing your Tests?

Más contenido relacionado

Más de Caveon Test Security

Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon Test Security
 
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series -  A Guide to Online Protection Strategies - March 28, ...Caveon Webinar Series -  A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...Caveon Test Security
 
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...Caveon Test Security
 
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217Caveon Test Security
 
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...Caveon Test Security
 
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...Caveon Test Security
 
Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317Caveon Test Security
 
CESP Study Session #1 October 2016
CESP Study Session #1 October 2016CESP Study Session #1 October 2016
CESP Study Session #1 October 2016Caveon Test Security
 
A Tale of Two Cities - School District Webinar #1 Jan 2017
A Tale of Two Cities - School District Webinar  #1 Jan 2017A Tale of Two Cities - School District Webinar  #1 Jan 2017
A Tale of Two Cities - School District Webinar #1 Jan 2017Caveon Test Security
 
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...Caveon Test Security
 
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016Caveon Test Security
 
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...Caveon Test Security
 
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
Caveon Webinar Series -  Conducting Test Security Investigations in School Di...Caveon Webinar Series -  Conducting Test Security Investigations in School Di...
Caveon Webinar Series - Conducting Test Security Investigations in School Di...Caveon Test Security
 
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016Caveon Test Security
 
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Test Security
 
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series -  Will the Real Cloned Item Please Stand Up? finalCaveon Webinar Series -  Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? finalCaveon Test Security
 
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...Caveon Test Security
 
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Test Security
 
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar  - Weathering the Perfect Test Security Storm May 2015 editedCaveon Webinar  - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 editedCaveon Test Security
 
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015Caveon Test Security
 

Más de Caveon Test Security (20)

Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...
 
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series -  A Guide to Online Protection Strategies - March 28, ...Caveon Webinar Series -  A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
 
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
 
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
 
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
 
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
 
Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317
 
CESP Study Session #1 October 2016
CESP Study Session #1 October 2016CESP Study Session #1 October 2016
CESP Study Session #1 October 2016
 
A Tale of Two Cities - School District Webinar #1 Jan 2017
A Tale of Two Cities - School District Webinar  #1 Jan 2017A Tale of Two Cities - School District Webinar  #1 Jan 2017
A Tale of Two Cities - School District Webinar #1 Jan 2017
 
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
 
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
 
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
 
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
Caveon Webinar Series -  Conducting Test Security Investigations in School Di...Caveon Webinar Series -  Conducting Test Security Investigations in School Di...
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
 
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
 
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
 
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series -  Will the Real Cloned Item Please Stand Up? finalCaveon Webinar Series -  Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
 
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
 
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
 
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar  - Weathering the Perfect Test Security Storm May 2015 editedCaveon Webinar  - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
 
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
 

Último

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 

Último (20)

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 

'Conducing Security Investigations' Webinar 1-17-2012

  • 1. Welcome!  ATP Sessions  Caveon LinkedIn Group  http://linkd.in/caveon  Caveon twitter  http://bit.ly/caveontwitter  Upcoming Webinar:  Web Patrol - Who is stealing your Tests? Feb 15th 12pm EST
  • 2. Caveon ATP Sessions To Catch a Cheat: Building Fraud Detection into Your Exams Liz Burns, Juniper Networks; Dennis Maynes, Caveon Gimme Shelter: Weathering the Media Storm of a Cheating Scandal John Fremer, Caveon; Greg Toppo - USA Today; James Vaselek, LSAC Developing and Conducting Investigations of Testing Irregularities in High- Stakes Testing Programs Steve Addicott, Caveon; John Fremer, Caveon; A. Benjamin Mannes, ABIM Everything You Need to Know to Implement a Data Forensics Program Benjamin Mannes, ABIM; Dennis Maynes, Caveon; Aimee Rhodes, CFA Institute; Jennifer Semko, Baker & McKenzie LLP
  • 3. Conducting Security Investigations Dr. John Fremer, Ph.D. President, Caveon Consulting Services, Caveon Dr. John F. Olson, Ph.D. President and Founder, Olson Educational Measurement & Assessment Services A. Benjamin Mannes, CPP, SSI, CHS-III Director of Test Security, American Board of Internal Medicine
  • 4. Agenda  Intros  Standards for Conducting Security Investigations  John Fremer, Caveon  Security Investigations of School Test Administrators  John Olson, Olson Educational Measurement & Assessment Services  Investigating Intellectual Property Theft  Ben Mannes, American Board of Internal Medicine  Q&A
  • 5. Standards for Conducting Security Investigations Dr. John Fremer, Ph.D.
  • 6. Overall Caveon Standard #15 Conducting Security Investigations The organization or state has a set of procedures in place for: • Determining whether a security investigation is warranted, • Evaluating the extent of fraudulent activities and the damage from them, and • Guiding the execution of such investigations.
  • 7. 1. Responsibility for managing the security investigation process has been clearly defined. 2. Investigation procedures have been piloted before they are used operationally.
  • 8. 3. Investigation procedures have received reviews from the perspective of program managers, measurement staff, communications staff, and legal staff. 4. Sufficient funds have been allocated to permit thorough investigations.
  • 9. 5a. Where initial investigations are to be conducted by test administrators as is often the case with state assessment programs, an Investigations Kit has been developed.
  • 10. 5b. The Investigations Kit spells out • Procedures to be followed, • Records to be kept, and • Laws and regulations that must be followed, • such as those protecting • the privacy of the test takers and administrators, and • the confidentiality of test materials.
  • 11. 6. Training materials have been developed and can be accessed by those who will be conducting investigations. 7. Investigation procedures are applied consistently across the state or organization.
  • 12. 8. Conclusions from the investigation are based on solid data and information including statistical evidence when available.
  • 13. Security Investigations of School Test Administrators Dr. John Olson, Ph.D.
  • 14. Overview Step 1 – Planning and Communications Step 2 – Preparing for the Investigation Step 3 – Conducting the Interviews Step 4 – Summarize Information and Write Report on Security Investigation Lessons Learned
  • 15. Step 1 -- Planning and communications with state, district, and/or schools re the investigation  Responsibilities for conducting the investigation  Contact person for coordination of activities  Identification of staff to interview  Scheduling the interviews  Materials from state and districts  Other logistics for security investigation
  • 16. Step 2 -- Preparing for security investigation  Review all materials from state/district in advance  Review all existing data, such as DF analyses, for flagged schools and teachers  Develop an interview protocol with a standard set of questions to ask school test administrators  Review questions with client (state or district) and get approval
  • 17. Examples of security investigation interview questions  Were you provided with test security training? When?  When did the testing materials arrive? Who signed for them?  Where were the testing materials stored?  Who had access to where they were stored?  Describe the process on testing days.  Describe how and when the test materials were returned after testing was completed.  Describe the process for administering makeup tests and when this occurred.  Describe how tests are assembled after testing for storage.  Describe the process for boxing up the tests and shipping back to the test vendor.  Did you observe any irregularities before, during, or after the administration of the test?
  • 18. Step 3 -- Conduct training of interviewers and coordinate on process to be used  Conduct interviews, either in schools or at a central site  Set the tone for interviews  Capture responses from each interviewee and record them precisely  Do follow ups to clarify information as necessary  Maintain confidentiality and security of information
  • 19. Step 4 --Summarize Information and Write Report on Security Investigation  Analyze/Summarize all responses completely and clearly  Write up draft report from security investigation – be evidence based  Do internal reviews (expert, legal, etc.)  Submit draft to client for review  Revise as necessary (note that report may become a public document)  Submit final report
  • 20. Lessons Learned from Conducting Test Security Investigations  Be prepared  Approach the interviews with an “innocent until proven guilty” approach, but be firm in your questioning  Know the lay of the land and watch out for landmines!  Be wary of the Press and know who to refer them to for their questions
  • 21. Investigating Intellectual Property Theft A. Benjamin Mannes
  • 22. Detection Internet: • Chat Rooms (brain dump websites) • Test Preparation Websites • Basic searches for your test name in US and International Search Engines • Craigslist® and eBay® Tip line/ Hotline: • Tip lines open doors to Private Tutors which are difficult to find online Private Tutoring • Courses taken by a private investigator- some courses provide “brain dump questions” to students in their class.
  • 23. How Cases Begin  Internet searches  Internally (Google® Alerts, etc.), Cyveillance®, Caveon Web Patroltm, Lexis Nexis®, etc.  Set-up a fictitious profile  EBay® , Amazon®, etc.  Data forensics & Scoring  Collusion, item exposure, traditional “cheating”, etc.  Tipline  Response infrastructure, etc.  Eligibility & Registration  Misrepresentation, proxy testing, etc.  Outside entities  Vendors, Licensing authorities, schools, societies, associations, etc.
  • 24. Suspect Identification & Selection • Background investigations – Investigative software, web searches, database searches, etc. • Financials – Is legal action your best option? • Associates – Who else may be helping your suspect (codefendants) or benefitting from cheating? • Severity of the case – Does the severity of the case warrant legal action? – Is other action legally defensible?
  • 25. Gathering Evidence  Obtaining infringing materials  Attending courses/engaging in proxy services  Web history/screen caps  Conducting interviews  Identifying co-conspirators  Applying for & executing warrants/seizure orders  Analysis of evidence (with legal)
  • 26. Steps of a successful Investigation Once you identify a website you suspect is distributing your content and that your organization is willing to go to court: Investigate thoroughly •Download copies of the infringed content and match it to your content. •Distinguish if it is an exact match or substantially similar. •If the material is in a chat room: •Try and gain background information on the participants. •Search your database for the emails or names they provide. •Keep copies of all posts made by individuals.
  • 27. Taking Action Administrative:  Invalidation of scores  Suspension/revocation of certificate(s)  Restriction from future testing eligibility  Notification to stakeholders Legal:  Civil litigation process (public)  Civil litigation process (ex parte)  Notification to law enforcement agencies  Referral to prosecutors/Attorney General
  • 28. Administrative Options  Since Legal Action may be more costly, there are a few Administrative Actions that may be more cost effective and still get the message out that your program takes the violation seriously.  Score cancellations and testing bans  Press release  Notify Score/Certification Recipients
  • 29. Preparing for Court If you decide you want to take the issue to court, take the necessary steps to ensure you are prepared for court •Ensure you have clearly presented your evidence. •Side by Sides are extremely easy for the court to read. •Screen shots of the sites materials as were present on the internet. •Video of collusion at the test center •Secure copyright documents for all infringed work. •If you have sent Cease and Desist Letters, provide copies of all of that correspondence to your Legal Counsel.
  • 30. Adjudications You may be sued by the people you investigate or threatened with legal action – so be prepared. • Have a clear, fair, and firm public adjudications process in place before action is taken. – Will sanctions need to be monitored? – Is there an appellate process? – Is there a mechanism for investigative cooperation? • Is this process managed internally or externally? • At what point does your board get involved?
  • 31. Lessons Learned • Was a security breach (due to a possible vulnerability in your policies or infrastructure) identified during the incident? • If so, what can be done to change policies, procedures, or technologies to fix it? • A cost/benefit analysis should be done to address the vulnerability identified by the incident. • Are there other ramifications to the organization from the incident?
  • 33. Comments? Please go to Caveon’s Test Security Group on LinkedIn to join and post Comments! http://linkd.in/caveon We appreciate our @Caveon twitter followers http://bit.ly/caveontwitter Look for us at ATP!
  • 34. Thank you for Attending “Conducting Security Investigations” Upcoming Webinar will be Feb 15th 12pm EST Web Patrol – Who’s stealing your Tests?