Knowledge (XXG)

National Crime Information Center

Source đź“ť

566: 70:. The purpose of the system was to create a centralized information system to facilitate information flow between the numerous law enforcement branches. The original infrastructure cost is estimated to have been over $ 180 million. In the mid-1990s, the program went through an upgrade from the legacy system to the current NCIC 2000 system. A 1993 137:: Records on unidentified deceased people, living persons who are unable to verify their identities, unidentified victims of catastrophes, and recovered body parts. The file cross-references unidentified bodies against records in the Missing Persons File. 385:"Testimony Before the Subcommittee on Information, Justice, Agriculture and Transportation, Committee on Government Operations, and the Subcommittee on Civil and Constitutional Rights, Committee on the Judiciary, House of Representatives" 105:
Identity Theft File: Records containing descriptive and other information that law enforcement personnel can use to determine if an individual is a victim of identity theft or if the individual might be using a false
1160: 611: 237:
Vehicle File: Records on stolen vehicles (and their license plates), vehicles involved in the commission of crimes, or vehicles that may be taken from the owner by force based on federally issued court
217:
Gun File: Records on stolen, lost, and recovered weapons and weapons that are designed to expel a projectile by air, carbon dioxide, or explosive action and have been used in the commission of crimes.
140:
U.S. Secret Service Protective File: Records containing names and other information on people who are believed to pose a threat to the U.S. president and/or others afforded protection by the
74:
estimate concluded that in addition to the costs of the upgrades, the FBI would need to spend an additional $ 2 billion to update its computer system to allow all users workstation access.
1155: 857: 822: 82:
The NCIC makes available a variety of records to be used for law enforcement and security purposes. The NCIC database includes 21 files: 14 person files and seven property files.
1090: 743: 581: 601: 190: 178: 1145: 852: 817: 264: 51: 27: 172: 725: 384: 1150: 834: 193:
background check. (As of August 2012, records include last six months of denied transactions; in the future, records will include all denials.)
715: 247:
There have also been issues and concerns regarding arrests and seizures pursuant to mistaken beliefs in the existence of warrants and warrantless
95:
File: Records on people—including children—who have been reported missing to law enforcement and there is a reasonable concern for their safety.
828: 771: 633: 616: 186: 596: 1165: 708: 591: 937: 902: 735: 20: 1105: 698: 844: 519: 269: 211:
Article File: Records on stolen articles and lost public safety, homeland security, and critical infrastructure identification.
55: 947: 435:"Probable Cause Based on Inaccurate Computer Information: Taking Judicial Notice of NCIC Operating Policies and Procedures" 703: 510: 231: 359: 1111: 967: 907: 690: 638: 141: 1170: 972: 932: 628: 545: 996: 196:
Violent Person File: Once fully populated with data from the users, this file will contain records of persons with a
458: 952: 912: 720: 655: 550: 811: 527: 439: 392: 334: 1074: 922: 887: 606: 540: 535: 1016: 917: 897: 776: 668: 182: 26: 335:"Testimony Before the United States Senate Subcommittee on Immigration, Border Security, and Washington DC" 1126: 555: 1001: 927: 171:
National Sex Offender Registry File: Records on people who are required to register in a jurisdiction's
134: 164:
File: Records on criminals (including juveniles who may have been tried as adults) for whom a federal
957: 806: 673: 230:
Vehicle and Boat Parts File: Records on serially numbered stolen vehicle or boat parts for which the
962: 942: 623: 47: 251:
based on inaccurate NCIC information. Queries for immigration status have also been shown to have
181:(NICS) Denied Transaction File: Records on people who have been determined to be classified as a " 645: 224: 223:
Securities File: Records on serially numbered stolen, embezzled, used for ransom, or counterfeit
128: 98:
Foreign Fugitive File: Records on people wanted by another country for a crime that would be a
1058: 1028: 503: 274: 121: 154:
Known or Appropriately Suspected Terrorist File: Records on known or appropriately suspected
1038: 252: 67: 117:
authorities have deported and aliens with outstanding administrative warrants of removal.
755: 248: 165: 92: 308: 58:(FBI) and is interlinked with federal, tribal, state, and local agencies and offices. 1139: 1095: 1006: 862: 197: 1100: 1053: 1048: 1033: 796: 496: 488: 294: 434: 1043: 1023: 801: 663: 114: 110: 980: 892: 680: 483: 363: 1011: 155: 411: 161: 43: 882: 131:
or released on their own recognizance or during pre-trial sentencing.
99: 127:
Supervised Release File: Records on people on probation, parole, or
200:
history and persons who have previously threatened law enforcement.
220:
License Plate File: Records on stolen license plates and vehicles.
25: 459:"MPI Report Shows Database Errors Plague Immigration Enforcement" 612:
Child Abduction and Serial Murder Investigative Resources Center
148: 492: 71: 46:
for tracking crime-related information. The NCIC has been an
66:
The NCIC database was created in 1967 under FBI director
19:"NCIC" redirects here. For the athletic conference, see 1161:
Missing people organizations based in the United States
823:
Integrated Automated Fingerprint Identification System
120:
Protection Order File: Records on people against whom
1121: 1083: 1067: 989: 871: 843: 789: 764: 734: 689: 654: 580: 573: 526: 168:or a felony or misdemeanor warrant is outstanding. 602:National Center for the Analysis of Violent Crime 179:National Instant Criminal Background Check System 16:US central database of crime-related information 818:Computer and Internet Protocol Address Verifier 360:"Under fire FBI vows to meet database deadline" 109:Immigration Violator File: Records on criminal 1156:Law enforcement databases in the United States 744:Criminal Justice Information Services Division 406: 404: 402: 265:Criminal Justice Information Services Division 52:Criminal Justice Information Services Division 504: 8: 577: 511: 497: 489: 412:"National Crime Information Center (NCIC)" 102:if it were committed in the United States. 50:tool since 1967. It is maintained by the 835:National Incident-Based Reporting System 1146:Government agencies established in 1967 726:Weapons of Mass Destruction Directorate 716:High-Value Detainee Interrogation Group 286: 829:Law Enforcement National Data Exchange 333:Kirkpatrick, Michael D. (2003-11-13). 617:Violent Criminal Apprehension Program 414:. fbi.gov. U.S. Department of Justice 362:. Gcn.com. 1997-03-31. Archived from 187:Brady Handgun Violence Prevention Act 7: 709:Communications Exploitation Section 214:Boat File: Records on stolen boats. 938:FBI Victims Identification Project 903:Rod Blagojevich corruption charges 315:. U.S. Department of Justice. 2014 14: 772:Information and Technology Branch 749:National Crime Information Center 634:Special Weapons and Tactics Teams 484:National Crime Information Center 234:may have been altered or removed. 189:and were denied as a result of a 36:National Crime Information Center 21:North Central Illinois Conference 597:Critical Incident Response Group 564: 42:) is the United States' central 1151:Federal Bureau of Investigation 592:Criminal Investigative Division 520:Federal Bureau of Investigation 270:Interstate Identification Index 56:Federal Bureau of Investigation 948:High-Value Interrogation Group 309:"NCIC: History and Milestones" 147:Gang File: Records on violent 1: 736:Science and Technology Branch 1112:FBI Law Enforcement Bulletin 1106:FBI–Apple encryption dispute 968:Special Intelligence Service 908:FBI files on Michael Jackson 699:Counterintelligence Division 341:. U.S. Department of Justice 933:FBI Special Advisor Program 1187: 1166:Criminal records databases 953:Joint Terrorism Task Force 913:FBI files on Elvis Presley 721:Terrorist Screening Center 582:Criminal, Cyber, Response, 158:in accordance with HSPD-6. 18: 974:U.S. v. Scheinberg et al. 812:Combined DNA Index System 704:Counterterrorism Division 562: 440:Fordham Urban Law Journal 151:groups and their members. 923:FBI search of Mar-a-Lago 691:National Security Branch 639:Hazardous Devices School 607:Behavioral Analysis Unit 135:Unidentified Person File 898:FBI method of profiling 669:Behavioral Science Unit 629:Crisis Negotiation Unit 1091:FBI portrayal in media 656:Human Resources Branch 433:Hand, Patrick (1982). 391:. 1993. Archived from 31: 1002:Delf A. 'Jelly' Bryce 928:FBI Silvermaster File 173:sex offender registry 29: 997:Harry "Skip" Brandon 958:Lindbergh kidnapping 963:Ruby Ridge standoff 888:Bridgman Convention 777:Intelligence Branch 756:Laboratory Division 624:Hostage Rescue Team 584:and Services Branch 461:. December 16, 2005 185:" according to the 142:U.S. Secret Service 48:information sharing 1171:Forensic databases 918:FBI Miami shootout 129:supervised release 32: 1133: 1132: 1059:Joseph D. Pistone 1029:Joseph L. Gormley 785: 784: 275:Restraining order 124:have been issued. 122:protection orders 1178: 1075:FBI Headquarters 674:National Academy 578: 568: 567: 513: 506: 499: 490: 471: 470: 468: 466: 455: 449: 448: 430: 424: 423: 421: 419: 408: 397: 396: 381: 375: 374: 372: 371: 356: 350: 349: 347: 346: 330: 324: 323: 321: 320: 305: 299: 298: 291: 198:violent criminal 183:forbidden person 1186: 1185: 1181: 1180: 1179: 1177: 1176: 1175: 1136: 1135: 1134: 1129: 1117: 1079: 1063: 1039:J. Edgar Hoover 985: 876: 874: 867: 858:Deputy Director 839: 781: 760: 730: 685: 650: 583: 569: 565: 560: 522: 517: 480: 475: 474: 464: 462: 457: 456: 452: 432: 431: 427: 417: 415: 410: 409: 400: 383: 382: 378: 369: 367: 358: 357: 353: 344: 342: 332: 331: 327: 318: 316: 307: 306: 302: 295:"NCIC Turns 50" 293: 292: 288: 283: 261: 253:false positives 245: 80: 68:J. Edgar Hoover 64: 24: 17: 12: 11: 5: 1184: 1182: 1174: 1173: 1168: 1163: 1158: 1153: 1148: 1138: 1137: 1131: 1130: 1125: 1123: 1119: 1118: 1116: 1115: 1108: 1103: 1098: 1093: 1087: 1085: 1081: 1080: 1078: 1077: 1071: 1069: 1065: 1064: 1062: 1061: 1056: 1051: 1046: 1041: 1036: 1031: 1026: 1021: 1020: 1019: 1009: 1004: 999: 993: 991: 987: 986: 984: 983: 978: 970: 965: 960: 955: 950: 945: 940: 935: 930: 925: 920: 915: 910: 905: 900: 895: 890: 885: 879: 877: 872: 869: 868: 866: 865: 860: 855: 849: 847: 841: 840: 838: 837: 832: 826: 820: 815: 809: 804: 799: 793: 791: 787: 786: 783: 782: 780: 779: 774: 768: 766: 765:Other branches 762: 761: 759: 758: 753: 752: 751: 740: 738: 732: 731: 729: 728: 723: 718: 713: 712: 711: 701: 695: 693: 687: 686: 684: 683: 678: 677: 676: 671: 660: 658: 652: 651: 649: 648: 646:Cyber Division 643: 642: 641: 636: 631: 626: 621: 620: 619: 614: 609: 594: 588: 586: 575: 571: 570: 563: 561: 559: 558: 553: 548: 543: 538: 532: 530: 524: 523: 518: 516: 515: 508: 501: 493: 487: 486: 479: 478:External links 476: 473: 472: 450: 425: 398: 395:on 2001-11-01. 376: 351: 325: 300: 285: 284: 282: 279: 278: 277: 272: 267: 260: 257: 249:probable cause 244: 241: 240: 239: 235: 228: 221: 218: 215: 212: 205:Property files 202: 201: 194: 176: 169: 159: 152: 145: 138: 132: 125: 118: 107: 103: 96: 93:Missing Person 79: 76: 63: 60: 54:(CJIS) of the 15: 13: 10: 9: 6: 4: 3: 2: 1183: 1172: 1169: 1167: 1164: 1162: 1159: 1157: 1154: 1152: 1149: 1147: 1144: 1143: 1141: 1128: 1127:Hogan's Alley 1124: 1120: 1114: 1113: 1109: 1107: 1104: 1102: 1099: 1097: 1094: 1092: 1089: 1088: 1086: 1082: 1076: 1073: 1072: 1070: 1066: 1060: 1057: 1055: 1052: 1050: 1047: 1045: 1042: 1040: 1037: 1035: 1032: 1030: 1027: 1025: 1022: 1018: 1017:"Deep Throat" 1015: 1014: 1013: 1010: 1008: 1007:Sibel Edmonds 1005: 1003: 1000: 998: 995: 994: 992: 988: 982: 979: 977: 975: 971: 969: 966: 964: 961: 959: 956: 954: 951: 949: 946: 944: 941: 939: 936: 934: 931: 929: 926: 924: 921: 919: 916: 914: 911: 909: 906: 904: 901: 899: 896: 894: 891: 889: 886: 884: 881: 880: 878: 870: 864: 863:Special agent 861: 859: 856: 854: 851: 850: 848: 846: 842: 836: 833: 830: 827: 824: 821: 819: 816: 813: 810: 808: 805: 803: 800: 798: 795: 794: 792: 788: 778: 775: 773: 770: 769: 767: 763: 757: 754: 750: 747: 746: 745: 742: 741: 739: 737: 733: 727: 724: 722: 719: 717: 714: 710: 707: 706: 705: 702: 700: 697: 696: 694: 692: 688: 682: 679: 675: 672: 670: 667: 666: 665: 662: 661: 659: 657: 653: 647: 644: 640: 637: 635: 632: 630: 627: 625: 622: 618: 615: 613: 610: 608: 605: 604: 603: 600: 599: 598: 595: 593: 590: 589: 587: 585: 579: 576: 572: 557: 554: 552: 549: 547: 544: 542: 539: 537: 534: 533: 531: 529: 528:Field offices 525: 521: 514: 509: 507: 502: 500: 495: 494: 491: 485: 482: 481: 477: 460: 454: 451: 447:(3): 497–510. 446: 442: 441: 436: 429: 426: 413: 407: 405: 403: 399: 394: 390: 386: 380: 377: 366:on 2008-05-25 365: 361: 355: 352: 340: 336: 329: 326: 314: 310: 304: 301: 296: 290: 287: 280: 276: 273: 271: 268: 266: 263: 262: 258: 256: 254: 250: 242: 236: 233: 232:serial number 229: 226: 222: 219: 216: 213: 210: 209: 208: 206: 199: 195: 192: 188: 184: 180: 177: 174: 170: 167: 163: 162:Wanted Person 160: 157: 153: 150: 146: 143: 139: 136: 133: 130: 126: 123: 119: 116: 112: 108: 104: 101: 97: 94: 91: 90: 89: 87: 83: 77: 75: 73: 69: 61: 59: 57: 53: 49: 45: 41: 37: 28: 22: 1110: 1101:Junior G-Men 1054:Clyde Tolson 1049:Peter Strzok 1034:Wesley Grapp 976:(10 Cr. 336) 973: 748: 574:Organization 463:. Retrieved 453: 444: 438: 428: 418:December 27, 416:. Retrieved 393:the original 388: 379: 368:. Retrieved 364:the original 354: 343:. Retrieved 338: 328: 317:. Retrieved 312: 303: 289: 246: 204: 203: 86:Person files 85: 84: 81: 65: 39: 35: 33: 1044:David Icove 1024:Helen Gandy 873:Methods and 802:Bureaupedia 115:immigration 1140:Categories 981:Waco siege 893:COINTELPRO 875:activities 790:Technology 681:FBI Police 546:Cincinnati 370:2012-01-14 345:2014-06-29 319:2014-06-29 281:References 225:securities 156:terrorists 1068:Buildings 1012:Mark Felt 807:Carnivore 551:Cleveland 106:identity. 30:NCIC seal 943:Guardian 853:Director 259:See also 243:Validity 44:database 1084:Related 831:(N-DEx) 825:(IAFIS) 814:(CODIS) 664:Academy 541:Buffalo 536:Atlanta 389:eff.org 339:fbi.gov 313:fbi.gov 166:warrant 78:Records 62:History 990:People 883:Abscam 797:Airtel 465:6 July 297:. FBI. 238:order. 111:aliens 100:felony 1122:Other 1096:G-Man 845:Ranks 556:Tampa 113:whom 467:2020 420:2017 191:NICS 149:gang 40:NCIC 34:The 72:GAO 1142:: 445:10 443:. 437:. 401:^ 387:. 337:. 311:. 255:. 207:: 88:: 512:e 505:t 498:v 469:. 422:. 373:. 348:. 322:. 227:. 175:. 144:. 38:( 23:.

Index

North Central Illinois Conference

database
information sharing
Criminal Justice Information Services Division
Federal Bureau of Investigation
J. Edgar Hoover
GAO
Missing Person
felony
aliens
immigration
protection orders
supervised release
Unidentified Person File
U.S. Secret Service
gang
terrorists
Wanted Person
warrant
sex offender registry
National Instant Criminal Background Check System
forbidden person
Brady Handgun Violence Prevention Act
NICS
violent criminal
securities
serial number
probable cause
false positives

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑