Preview

National Crime Information Center Research Paper

Good Essays
Open Document
Open Document
781 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
National Crime Information Center Research Paper
National Crime Information Center is a computer database that tracks fourteen different person files and seven kinds of property files and is available for use by numerous law enforcement branches at various levels of government. The computer system is thought to be the most comprehensive investigative tool in determining criminal backgrounds of individuals. This computerized database is in severe need of various types of upgrades that are estimated at $2 billion dollars.

Main Text Multijurisdictional criminal databases are some of the amazing analytical tools used by tribal, local, state, and federal law enforcement and other criminal justice agencies. There are even some foreign entities allowed limited access to the protected database.
…show more content…
Edgar Hoover, FBI director, in 1967. The National Crime Information Center is managed and supported by (CJIS) Criminal Justice Information Services Division. NCIC was created with the primary purpose of creating a flow of information between the many and varied law enforcement branches. There was an upgrade approximately 30 years ago, in the mid 1990’s; this brought the entire system up to the current operating NCIC 2000 system. This system is operational 24 hours a day, 7 days a week, and 365 days a year; always facilitating communications between agencies. The information obtained from NCIC can be used in a variety of ways; but its purpose is to assist authorized agencies in returning stolen property, apprehending fugitives, identifying and locating missing persons as well as a variety of other uses. The astonishment is the amount of information that NCIC tracks. There are in total twenty-one files that NCIC stores information on; seven being on property files, and the remaining fourteen files are on …show more content…
Various other files on foreign persons are quite interminable; they include domestic and foreign possible threats in the form of foreign fugitive files, and U.S. Secret Service Protective files. The Known or Appropriately Suspected Terrorist file is another tedious and in-depth file that records all finite details on foreign parties that may pose a threat. A newer file is the (NICS) National Instant Criminal Background Check system was created for the Brady Handgun Violence Prevention Act and who was denied the ability to purchase a weapon due to their background. This file keeps a “denied transaction list” now includes all denials. This is the act that was introduced and approved after President Reagan was shot, along with this press secretary Jim Brady, a secret service agent, and a police officer in 1981. There have many proposals on improving the use of the NCIC database, even now there are a few privatized databases that are claiming to be the latest and greatest. Undoubtedly is the use of the database being the greatest investigative and policing tool of the 50 years. There is an outcry for necessary updates, and the most reliable information. Initial police reports are based on preliminary investigations and the information entered into NCIC can quickly become obsolete. Therefore a necessary review of all information entered into NCIC should be done by the investigating

You May Also Find These Documents Helpful

  • Satisfactory Essays

    All data received during the background investigation process will be maintained by Triton in secured, confidential files, with restricted access by only those who absolutely need it.…

    • 571 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The documents scanned for the Criminal History Inquiry Unit (CHIU) are a variety of documents, which consist of “Agreements”, “License and /or Contracts”, “Miscellaneous Correspondence” and “User Account Forms”. Consequently, these documents have been submitted by various licensing agencies and/or entities throughout the state. The agency and/or entity are requesting “User” access to the “Secure” website to obtain criminal history information on potential applicant for hire at their agency and/or entity.…

    • 71 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Criminal Investigation today is being conducted with more technology than ever, due to that we can catch the criminals faster or even close a case, but it wasn’t always like that. Criminal Investigations started with the Bow Street Runners which became the first paid detective unit. As the years went by crime around the world stated to increase, due to that more investigation departments stated developing. One of the most significant person to play a role in today’s police investigations was Allan Pinkerton he was the first detective in Chicago. He was part of the Secret Service and he developed techniques that are still being used in today by police work like the undercover work. After the agency in Chicago was established other agencies started growing around the world more strategies on investigating cases were being develop and were being adapted by other countries. In the 1800 and 1900 Forensic science improved in many ways; know they did not only have the finger printing for evidence but also Ballistic, Forensic Dentistry and serology. Not much after that they developed something that is very big now and days, the computer programs. One of the first programs was the Hitman known today as “The Computer Data Base” used to cross reference information and then they have developed other computer programs that are used by different bureau like the FBI, CSI and other police departments. In today’s society mostly everything is done on computers including they can even recreate a crime scene with the correct measurement and statistic and have a better glimpse of what might have happened. With all that said to me criminal investigation have change throughout the years, but not only to be better at conducting a criminal investigation but following the roots left from the founders of criminology making want they stated a better and…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identify one Web resource of official information and one Web resource of unofficial information about the occurrence of delinquency in the United States. Copy and paste the URL addresses into the spaces provided.…

    • 289 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    …. an incident-based reporting system allowing police agencies to collect information on each occurrence of crime.…

    • 1342 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The data has many purposes to many people like city officials who use the data to place emphasis on certain crimes. The data is also important to media and public citizens who use the information to conduct research or shop for homes. Though the information is mostly accurate, the Federal Bureau of Investigations discourages negatively using the information to depict a region, state, county, or city. There are numerous factors that influence the fluctuation of certain crimes in different areas so using common sense to decipher the sociological factors is…

    • 639 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Information sharing has help our country’s safety, no boundaries on information sharing has given rise to large information centers on United State citizens, where possible threats can be weeded out. In the pass the shortcomings of information sharing was not because of legal boundaries, but because agencies were weary of sharing what they knew.…

    • 956 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    This paper will explain how technology affects the communication capabilities of specialized databases in the criminal justice system. It will provide the definition, history of these specialized databases and provide the comparison of three different specialized databases, which are: Automatic Fingerprint Identification System (AFIS), Facial Recognition, and Iris Scan. Included in this paper will be the Biometrics that has occurred throughout the years. Then there will the positive and negative effects of the new technologies on communication within the criminal justice system. Finally, I will discuss which new specialized techniques that I might use and why.…

    • 1728 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    20150505CRM1300A mod 1 4

    • 2282 Words
    • 8 Pages

    The most publicized data concern offenses recorded by the police, which are available for a…

    • 2282 Words
    • 8 Pages
    Best Essays
  • Better Essays

    Fred is drunk and driving his dad’s car. Fred is a 21 year old student at Columbia College. Fred rams into a parked car at 10th and Rogers. Thinking no one saw him; Fred moves his car and parks it on an adjacent lot. He sprints to his dorm room in Miller Hall. A neighbor saw the wreck and Fred running to the dorm. Police are called and they arrive ten minutes after the wreck. The officers see several empty beer cans and a bottle of tequila (half full) in the front seat. The tags are traced to Fred’s dad, who is called by police. Dad says that Fred is a student at Columbia College. Police run Fred's record and determine that he has two prior DWIs within the past five years. The third DWI in 10 years is a felony. Police contact Columbia College security who leads them to Fred’s dorm. Fred is passed out, so security lets them in. The officers smell intoxicants, give Fred some Field Sobriety tests (he fails) and confirm that he was driving the car. Fred is arrested for DWI. It is his third offense, a felony under Missouri law. Fred is given a breath test, which registers at .13 on the scale. During the processing of his arrest paperwork, the officers search Fred’s possessions which he brought to the station, and a small quantity of cocaine is found in Fred’s pocket. Fred is charged with DWI, leaving the scene, and possession of cocaine. What issues do you see? How should they be resolved? (50 points)…

    • 6313 Words
    • 26 Pages
    Better Essays
  • Powerful Essays

    The Evolution the job is exacting. The police are asked to control crime, maintain order, and provide an intricate array of services, from responding to emergency 911 calls to regulating the flow of traffic. On occasion, they must perform remarkable feats of criminal investigation, quell rowdy crowds and violent offenders, and put their lives on the line. Much of the time, police resources are limited. It is estimated that the workload crime imposes on the police has increased fivefold since 1960. Their resources have not kept pace with their workload. To do their job, police frequently have looked to technology for enhancing their effectiveness. The police, with crime laboratories and radio networks, made early use of technology, but most police departments could have been equipped 30 or 40 years ago as well as they are today. The Crime Commission in response to rapidly rising crime rates and urban disorders. The Commission advocated federal government funding for state and local criminal agencies to support their efforts. It called for what soon became the 911 system for fielding emergency calls and recommended that agencies acquire computers to automate their functions. But even with the start-up help of hundreds of millions of dollars in early federal assistance, computerization came slowly. Only in recent years have many agencies found the use of information technology significantly helpful. Examples include fingerprinting databases, computerized crime mapping, and records management systems doing everything from inventorying property and cataloging evidence to calculating solvability factors. Of all criminal justice agencies, the police traditionally have had the closest ties to science and technology, but they have called on scientific resources primarily to help in the solution of specific serious…

    • 1398 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Contraband In Prisons

    • 977 Words
    • 4 Pages

    This research seeks to understand what intelligence models or combination of models would efficiently work to effectively detect, deter, and prevent terrorist activities and organized criminal activity within the U.S. prison system. Each of the listed specialized units has an area of intelligence they cover. This could be from local gangs to terrorist organizations. In addition to gathering intelligence, the ability to properly analyze and share this information should be at the forefront of every…

    • 977 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    To get a better understanding of the creation of this “super agency” details need to be giving about the agencies that will take part. The details will show history, how the agency works and how the agency affects counter-terrorism and intelligence gathering. The first agency that will be discussed is the FBI. The FBI originated in 1908 when Attorney General Charles J. Bonapart selected special agents to be the sole investigative force of the Department of Justice (Department of Justice). The FBI responsibilities include criminal law enforcement, domestic counterterrorism, and domestic…

    • 2750 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    In the 1960s, due to a rising number of burglaries in rural and suburban areas, law enforcement officials around the country began searching for a crime prevention program which would allow private citizens to play a role in the fight against crime. The National Sheriff’s Association, or NSA, set the bar for such a program when they introduced a concept they called the National Neighborhood Watch Program (NNWP) (National Crime Prevention Council).…

    • 1540 Words
    • 7 Pages
    Better Essays
  • Good Essays

    A new multi-agency body called the National Cyber Coordination Centre (NCCC) is expected to carry out real-time assessment of cyber security threats and send out alerts for action to law enforcement agencies.…

    • 850 Words
    • 3 Pages
    Good Essays