Test Fraud Threats

BY DAVID FOSTER | CEO | CAVEON TEST SECURITY

Types of Test Theft

Table 1

Types of Theft
Brief Description

Explanation of Risk 

Stealing Actual Test Files from Test Administration Servers

Stealing Test Booklets during Shipping or Storage

Stealing Questions through Digital Still or Video Photography

In some testing sectors, it is routine to steal an entire test file including all item text, other resources (e.g., graphics, video, audio, etc.) and answers. The theft occurs before or after a scheduled exam administration after the files have been downloaded to a testing center’s server. The thieves penetrate IT security procedures through weak user access policies and procedures, and by decrypting (if the files are encrypted) the stolen files.

For paper‐and‐pencil tests, test booklets are shipped to testing locations and stored locally, perhaps in a locked file cabinet or room. Individuals may remove the booklets from the shipping container prior to storage, or may have access to the locked cabinet or room. Booklets may be stolen after test administration as booklets are returned to the storage are and prepared for return shipping.the stolen files.

Test questions can be captured as they are displayed during a test, whether on a screen or a booklet. The thief may use a high‐resolution digital camera, cell phone camera, or one of the high‐quality so‐called “spy” cameras (hidden in glasses, pens, watches, etc.). These cameras are able to store video of and then transmit the content of exams.

The theft of test files is a most dangerous type of theft because it provides the exact content of the questions and the answers. Once the method of theft is established, stealing any test file is routine, with virtually no risk of detection. The theft of test booklets provide the exact items, informing exact, but improper test preparation activities.

This is a relatively manual capture of questions, which is easy to do and accurate. The hidden nature of the devices make detection by proctors very difficult, if not impossible. No answer key is captured.

Stealing Questions by Automatically Digitally Recording Test Content

Memorizing Questions to Be Recalled Later

Transcribing Questions Verbally

Manipulation of Test Administration Rules

Obtaining Test Content from a Program Insider

This could happen simply by using Copy and Paste commands, or, with more difficulty, the entire test session, including all test questions, can be captured with a single automated procedure by using a TIVO‐like recording system connected to one of the computer’s output ports.

Test takers memorize questions to be recalled at a later time. If part of an organized effort each may be “assigned” a particular subset of the question content. Mark‐and‐Review features of testing systems allow the thieves to “gather” their assigned items and concentrate their efforts.

Thieves use oral or written recordings of test item content during the exam. This may involve audio recording devices, text recording devices such as cell phones, or notepads/scratch paper. Thieves can also use two‐way radios or cell phones to capture and transmit the content of the questions.

This type of theft could take many forms. A test taker violates retake rules so that the test can be taken many times to make sure that all of the items can be completely harvested. A testing center may schedule an exam for a “phantom” test taker in order to access the files downloaded to its servers.

An employee or contractor of a testing program, with access to some or all of the items, provides the items to confederates, usually for gain (e.g., money, revenge, etc).

The Copy/Paste method is effective if no restrictions are placed on the testing system. The TIVO‐like method requires technical skills, especially as the items are recorded, stored, and transferred to other media (such as a document). No answer key is captured. The probability of detection by proctors is low once the equipment is in place.

The method needs no technology, but is difficult to do for tests designed to prevent or control item exposure. It also results in inaccuracies in the item content. No answer key is captured. Probability of detection is low.

This theft process may require further transcription into digital format for broader distribution. Inaccuracies will occur throughout the process. Depending on the training and vigilance of the proctors, this type of theft can be detected.

A testing center can control when and how they are able to capture test content, being able to meet their specific market needs.

The content will be accurate and damaging to a program. This type of fraud is rare and the risk of detection and criminal punishment is high.

Test fraud threats and cameras

Types of Cheating

Table 2

Types of Cheating
Brief Description

Explanation of Risk 

Using Pre‐Knowledge of Test Content

Colluding with an Expert While Taking the Test

Using Inappropriate or Non‐Authorized Test Aids

Using a Proxy Test Taking Service

Using Friends or Acquaintances for Proxy Test Taking

Hacking into a Database to Change a Score

Manipulation of Test Administration Rules

Copying the Answers from Another Test Taker while Both Tests Are Being Taken

Test taker obtains a copy of test questions and answers prior to the exam. These may be obtained from websites selling the exact questions, or from forums and chat sessions where some or many of the exams are discussed. This method of cheating depends on successful prior harvesting of the test content

With the help of the testing center personnel, experts in the tested content assist the test taker during the exam. These helpers may be actual teachers, instructors, or simply knowledgeable individuals. In some cases it may involve communication with the test taker via technologies such as cell phones or two‐way radios.

Test takers use aids during the exam, such as cheat‐sheets, cell phones, headphones, programmable calculators, etc. Test takers may be able to access the Internet and its resources during the exam. These devices and resources contain test questions/answers or simply useful information about the subject matter being tested.

It isn’t difficult to find a company or person offering proxy testing services to take the test for you. The services may even be located in another country. There is no need to attend the test session at all. These services often guarantee a high or passing score.

For a smaller price, or even as a favor, a friend or acquaintance may take the test on behalf of the cheater

Exploiting weak user access systems, hackers can gain unauthorized access to a program’s test results database or scoring system. Once in the system they are able to change lower scores to higher ones, or simply delete the records.

This method of cheating takes many forms. Low‐performing students may be required to stay home on testing days. Test administrators may ask students to mark answers in a test booklet, which can be verified or changed by a proctor, before transferring them to answer sheets. Item timing rules can be overlooked allowing students more time. Overall average scores can be raised by removing the possibility of low scores or by changing low scores to high scores. Probability of detection is high.

Even for a computerized test, it is possible to copy answers from a nearby test taker. Questions may not utilize randomization features making this method of cheating more effective.

The content is highly accurate and easily obtained. Actual cheating is very difficult to detect, and impossible to detect by test administrators and proctors.

This type of cheating is not easily detected and reported because it often involves collusion with testing center personnel. High scores are assured.

Test taker is able to access resources to cheat during the test. The use of these resources is very effective and they are designed to be difficult to detect. The resources may be helpful but not very accurate. A high score may not be assured.

This method of cheating has the assurance of a high score, but it is expensive. Professional proxy test taking is difficult to detect as it involves collusion of testing center personnel.

This type of cheating is difficult to detect and is able to take advantage of weak authentication procedures. There is no assurance of a high score.

It is a difficult process to access a program’s systems, requiring strong technical IT skills and knowledge. The probability of detection is moderate to high, with the threat of serious consequences.

It is difficult to change test administration procedures without risk of detection. Test takers and other test administrators may be alerted to the changes, particularly when procedures are clearly stated and have been established for years.

This type of cheating carries a low risk and is mostly ineffective today with technology‐based tests because most current computerized tests are designed such that test takers do not see the same questions nor are they in the same order.

The threat of cheating on exams

READY TO TALK TO AN EXAM SECURITY EXPERT?

Reach out and tell us about your organization’s needs today!