CSI...Computers, Science, & Investigations
You just entered the school building, and something doesn't seem quite right. After meeting with some of your friends and teachers down the hall, you realize your school is a crime scene. Furthermore, it is up to you and your team of investigators to piece together the clues and solve the mystery.
Using science and technology, investigators will spend the day...
gathering information with high-tech tools (QR codes, iPods, web tools, etc.), applying forensic evidence techniques (handwriting analysis, fingerprinting, etc.), and using technology to record and report the day's events. The goal: solve the case of the missing laptop.
If you are looking for a an unforgettable day where science, technology, logic, problem-solving, creativity, and teamwork come together, this camp is for you!
Using science and technology, investigators will spend the day...
gathering information with high-tech tools (QR codes, iPods, web tools, etc.), applying forensic evidence techniques (handwriting analysis, fingerprinting, etc.), and using technology to record and report the day's events. The goal: solve the case of the missing laptop.
If you are looking for a an unforgettable day where science, technology, logic, problem-solving, creativity, and teamwork come together, this camp is for you!
Planning:
We have a crime, and we need investigators. To recruit investigators, send home flyers and applications.
To set the scene for the crime (missing laptop), the mobile cart is located in the hallway with a laptop missing and signs of tampering. Evidence cards are labeled and placed in appropriate places, and the school's surveillance camera appears to be unhooked for scheduled maintenance. Mystery music (Pink Panther, James Bond, Mission Impossible) is playing in background.
Three distinct areas are used during the camp day - briefing room, forensic tech lab, and forensic science lab. Each room is decorated and stocked with needed supplies. An agenda keeps us on track to solve the mystery by the end of the day.
We have a crime, and we need investigators. To recruit investigators, send home flyers and applications.
To set the scene for the crime (missing laptop), the mobile cart is located in the hallway with a laptop missing and signs of tampering. Evidence cards are labeled and placed in appropriate places, and the school's surveillance camera appears to be unhooked for scheduled maintenance. Mystery music (Pink Panther, James Bond, Mission Impossible) is playing in background.
Three distinct areas are used during the camp day - briefing room, forensic tech lab, and forensic science lab. Each room is decorated and stocked with needed supplies. An agenda keeps us on track to solve the mystery by the end of the day.
Arrival activities
Students enter the building and are faced with an obvious crime scene. They are directed to the forensics tech lab where they are asked to brush up on their logic and problem solving skills (http://forensics.rice.edu/ - Rice University's CSI Web Adventures).
Students also get photos taken for investigator badges.
Students enter the building and are faced with an obvious crime scene. They are directed to the forensics tech lab where they are asked to brush up on their logic and problem solving skills (http://forensics.rice.edu/ - Rice University's CSI Web Adventures).
Students also get photos taken for investigator badges.
Case Briefing
Students are called to the briefing room where the police chief is waiting with an important message. The chief cannot make it in person but "calls in" to brief the team on the case. (Voki)
Students are called to the briefing room where the police chief is waiting with an important message. The chief cannot make it in person but "calls in" to brief the team on the case. (Voki)
Students Become Investigators
Students need permission to gather evidence from a crime scene, so they must create official badges. Students use the pictures taken earlier and a badge template for this task.
Case files are also provided as a way to collect information throughout the day. The only document in the case file at this point is an evidence based conclusions page. (Note: to make case files, folders can be run through most copiers or simply paste the printed document to the front of file folder.)
Investigators will go through evidence gathering techniques throughout the day, but before they begin they receive training on the iPod and the necessary apps that will be used.
Students need permission to gather evidence from a crime scene, so they must create official badges. Students use the pictures taken earlier and a badge template for this task.
Case files are also provided as a way to collect information throughout the day. The only document in the case file at this point is an evidence based conclusions page. (Note: to make case files, folders can be run through most copiers or simply paste the printed document to the front of file folder.)
Investigators will go through evidence gathering techniques throughout the day, but before they begin they receive training on the iPod and the necessary apps that will be used.
A Closer Look at the Crime Scene
The crime scene has four different types of evidence, each fitting a specific forensic evidence segment that will be explored during the day - fingerprinting, handwriting analysis, substance analysis, and footprints. Each type is labeled A, B, C, or E. (Note: Witness accounts make up evidence "D" and are not actually found at crime scence.)
The crime scene has four different types of evidence, each fitting a specific forensic evidence segment that will be explored during the day - fingerprinting, handwriting analysis, substance analysis, and footprints. Each type is labeled A, B, C, or E. (Note: Witness accounts make up evidence "D" and are not actually found at crime scence.)
Investigators take time to photograph the crime scene.
Suspect List
Although the surveillance camera by the crime scene was down for maintenance, surveillance camera #2 captured footage that allows investigators to create a suspect list. Investigators request eight suspects' employee files from the school office and add to case file. Each suspect's employee files includes a picture, a fingerprint, a QR code (with link to suspects' biographical information), and additional information to be completed in handwriting (for handwriting analysis). The important part of planning is to make sure the suspect bios are specifically created to fit evidence and allow for elimination of suspects until the "criminal" is determined.
Although the surveillance camera by the crime scene was down for maintenance, surveillance camera #2 captured footage that allows investigators to create a suspect list. Investigators request eight suspects' employee files from the school office and add to case file. Each suspect's employee files includes a picture, a fingerprint, a QR code (with link to suspects' biographical information), and additional information to be completed in handwriting (for handwriting analysis). The important part of planning is to make sure the suspect bios are specifically created to fit evidence and allow for elimination of suspects until the "criminal" is determined.
Forensic Evidence Labs
For each forensic lab, investigators go through training and complete a sample investigation before they transfer their newly acquired knowledge and skills to evidence found at this crime scene. After each lab, students consult their suspect list and employee files; and based on the evidence, eliminate suspects.
Fingerprints (Evidence A) -
Training - Lab Sheet - Classification Guide
Hands-on Training - lifted print from mirror and identified type of print; completed fingerprint chart with own prints
Fingerprint Tag Example (used to link the prints lifited from the crime scene to suspects)
Using evidence based conclusions, eliminate suspect(s) based on fingerprint from the crime scene.
For each forensic lab, investigators go through training and complete a sample investigation before they transfer their newly acquired knowledge and skills to evidence found at this crime scene. After each lab, students consult their suspect list and employee files; and based on the evidence, eliminate suspects.
Fingerprints (Evidence A) -
Training - Lab Sheet - Classification Guide
Hands-on Training - lifted print from mirror and identified type of print; completed fingerprint chart with own prints
Fingerprint Tag Example (used to link the prints lifited from the crime scene to suspects)
Using evidence based conclusions, eliminate suspect(s) based on fingerprint from the crime scene.
Handwriting (Evidence B) -
Training - handwriting analysis guide - handwriting analysis ID - handwriting analysis traits
Hands-on Training - using handwriting samples, identify who wrote the note - handwriting analysis practice
Using evidence based conclusions, eliminate suspect(s) based on writing found on scrap of paper at crime scene.
Training - handwriting analysis guide - handwriting analysis ID - handwriting analysis traits
Hands-on Training - using handwriting samples, identify who wrote the note - handwriting analysis practice
Using evidence based conclusions, eliminate suspect(s) based on writing found on scrap of paper at crime scene.
Substance Identification (Evidence C)
Training - investigators learn that a substance can be determined by looking at various characteristics
Hand-on Training - using a powder analysis chart, identify sugar, salt, baking soda and cornstarch
Using evidence based conclusions, eliminate suspect(s) based on substance found at crime scene
Training - investigators learn that a substance can be determined by looking at various characteristics
Hand-on Training - using a powder analysis chart, identify sugar, salt, baking soda and cornstarch
Using evidence based conclusions, eliminate suspect(s) based on substance found at crime scene
Witness Account (Evidence D)
A pre-recorded witness account was downloaded onto the iPods identifying the type of car seen leaving the crime. Using evidence based conclusions, eliminate suspect(s) based on cars driven by each suspect (suspect bios).
A pre-recorded witness account was downloaded onto the iPods identifying the type of car seen leaving the crime. Using evidence based conclusions, eliminate suspect(s) based on cars driven by each suspect (suspect bios).
Footprints (Evidence E)
Training - Footprint Analysis Lab
Hands-on Training - practice identifying types of shoe prints; estimate height based on length of own prints
Using evidence based conclusions, eliminate suspect(s) based on height/length of foot connection.
Training - Footprint Analysis Lab
Hands-on Training - practice identifying types of shoe prints; estimate height based on length of own prints
Using evidence based conclusions, eliminate suspect(s) based on height/length of foot connection.
Case Solved!
By eliminating suspects after each forensic lab, investigators solved the crime. The final task was to write the case report and submit it to the chief. Each investigator created his/her own own Weebly web site detailing the events of the day. Sample Case Report
By eliminating suspects after each forensic lab, investigators solved the crime. The final task was to write the case report and submit it to the chief. Each investigator created his/her own own Weebly web site detailing the events of the day. Sample Case Report
Our "criminal" - Mrs. Jennifer - appeared at the end of the day. When the investigators began questionning her, she explained that it was all a misunderstanding. She had taken the laptop to use in a workshop and was in the process of returning it.
Take Home
Each investigator left with a completed case file. Part of the file was a qr code card with QR codes linking to the investigator's case report web site as well as flickr photos from the day. URLs were provided as well.
Each investigator left with a completed case file. Part of the file was a qr code card with QR codes linking to the investigator's case report web site as well as flickr photos from the day. URLs were provided as well.