CIMIP IN THE NEWS
Published in Boca Raton News, January 29, 2009
Boca Raton biometric pioneer joins with research consortium
By John Johnston, Managing Editor
A Boca Raton based fingerprint biometric identification firm has joined forces with the Utica College based Center for Identity Management and Information Protection (CIMIP) to assist in research-based projects dealing with fingerprint identification and identify theft.
...read full textPublished in Congress Arcuri Press Releases, July 10, 2008 ARCURI SECURES $360,000 FOR LOCAL CRIME PREVENTION PROJECTS
Washington, DC -- Continuing his commitment to support local law enforcement and reduce crime, U.S. Representative Michael A. Arcuri (D-Utica) announced today that he has secured $360,000 in congressionally-directed funding to fight gang activity in Oneida County and bolster Utica College’s identity theft research program. ...read full text
Published in Reuters, February 28, 2008
Rebovich to Head UC's Center for Identity Management and Information Protection
Former Research Director for National White Collar Crime Center, Author,
Professor Takes Helm
UTICA, N.Y., Feb. 28 /PRNewswire-USNewswire/ -- Donald Rebovich, Ph.D., associate professor and director of economic crime undergraduate programs, has been named acting executive director of the Center for Identity Management and Information Protection of Utica College (CIMIP). ...read full text
Published in Identity Theft Knowledge Center, December 2007
The Keys to the Kingdom
Before four academics from upstate New York were allowed to set foot in the Secret Service’s Washington, D.C., headquarters to begin their first- of-its kind identity theft study, they had to abide by a few rules. The first: a background check.
...read full text
Published in The Pioneer (Utica College Alumni Magazine), Summer 2006
Identity Crisis
As identity theft becomes a top law enforcement concern, UC launches a unique new partnership to combat this growing threat.
From somewhere in cyberspace, a skilled hacker employs sophisticated “keylogging” software to capture the keystrokes of unsuspecting consumers. Elsewhere, terrorists use stolen identities to purchase tickets on a commercial airline flight.
...read full text