CIMIP IN THE NEWS



Published in Boca Raton News, January 29, 2009


Boca Raton biometric pioneer joins with research consortium


By John Johnston, Managing Editor



A Boca Raton based fingerprint biometric identification firm has joined forces with the Utica College based Center for Identity Management and Information Protection (CIMIP) to assist in research-based projects dealing with fingerprint identification and identify theft. ...read full text



Published in Congress Arcuri Press Releases, July 10, 2008 

ARCURI SECURES $360,000 FOR LOCAL CRIME PREVENTION PROJECTS

Washington, DC -- Continuing his commitment to support local law enforcement and reduce crime, U.S. Representative Michael A. Arcuri (D-Utica) announced today that he has secured $360,000 in congressionally-directed funding to fight gang activity in Oneida County and bolster Utica College’s identity theft research program. ...read full text
 

Published in Reuters, February 28, 2008
 

Rebovich to Head UC's Center for Identity Management and Information Protection

Former Research Director for National White Collar Crime Center, Author,
Professor Takes Helm

UTICA, N.Y., Feb. 28 /PRNewswire-USNewswire/ -- Donald Rebovich, Ph.D., associate professor and director of economic crime undergraduate programs, has been named acting executive director of the Center for Identity Management and Information Protection of Utica College (CIMIP). ...read full text


Published in Identity Theft Knowledge Center, December 2007

The Keys to the Kingdom


Before four academics from upstate New York were allowed to set foot in the Secret Service’s Washington, D.C., headquarters to begin their first- of-its kind identity theft study, they had to abide by a few rules. The first: a background check. ...read full text



Published in The Pioneer (Utica College Alumni Magazine), Summer 2006

Identity Crisis


As identity theft becomes a top law enforcement concern, UC launches a unique new partnership to combat this growing threat.


From somewhere in cyberspace, a skilled hacker employs sophisticated “keylogging” software to capture the keystrokes of unsuspecting consumers. Elsewhere, terrorists use stolen identities to purchase tickets on a commercial airline flight. ...read full text