The National Crime Information Center
NCIC
TCIC
Texas Criminal Information Center
NLETS
The international Justice and Public Safety
... [Show More] Network
TLETS
Texas Law Enforcement Telecommunications System
Who is responsible for all the records entered into the system?
local law enforcement
Who enforces policy and procedure within the State of Texas?
CSA-DPS
When was NCIC launched & how many files/ records did it have?
Launched January 27, 1967 with 5 files & over 300,000 records
How many files and records does NCIC currently have?
11.7 million active records and 21 files
In 2011 the NCIC processed ____________ transactions per day
7.9 million
The goal of the NCIC is to help the criminal justice community to preform its duties by providing and maintaining a computerized filing system of _________________ and ________________ documented criminal justice information.
accurate & timely
TxDPS has designated the Law Enforcement Support/ ______________________________________ (LES/CRS) division as the state's CSA
Crime Records Service
Agencies must conduct a fingerprint based record check to verify identification within ___________ days of assignment for direct access or direct responsibility of networks
30
What are permanent disqualifiers for the system access policy? (5 total)
Felony Conviction
Felony Deferred Adjunction
Class A Misdemeanor conviction
Class A Misdemeanor Deferred Adjudication
Family Violence
What are the 10 year disqualifiers for the system access policy? (2 total)
Class B misdemeanor conviction
Class B misdemeanor deferred adjudication
Terminal Access Policy
Law Enforcement and criminal Justice sensitive facilities and restricted/controlled areas shall be ______________________ posted and separated from non-sensitive and non-restricted/controlled areas by ________________ that restrict unauthorized access
prominently & physical barriers
Relationship of TCIC/NCIC to TLETS/NLETS
(The international justice and public safety network)
Data obtained over the TLETS/NLETS may only be disseminated to _______________________________________________________ agencies
authorized criminal justice
Automatic Removal of Records
Each record in the database is assigned a specific retention period. For example, temporary Felony Warrants are automatically removed after ____ hours
48
Record Responsibility
Agencies lacking staff support for a ____________ party check should require the ____________ assigned to the case to check the record for accuracy
second & Officer
Transaction Codes
Enter a Gun:____
G
Transaction Codes
Query a Vehicle: ______ or _________
ZV or QV
Transaction codes
Modify a stolen security: ______
MS
VIN searches are based on the last _____ characters of the VIN
8
__________________ alphabetic characters in a serial number are not considered for matching purposes
embedded
Querying the wanted person file will _________________ many files and may result in a response from NCIC/ TCIC
cross-search
Wanted Person Query responses
wanted person
immigration violator
foreign fugitive
NCIC gang member
TX gang member
Known or appropriately suspected terrorist
protective interest
supervised release
identity theft victim
threat against peace or detention officer
concealed handgun license
protective order
registered sex offender
missing person
person with information
child safety check alert
The child safety check alert was designed to help the department of family and protective services locate a family for the purpose of investigating a report of _______ or ___________ and inquire as to the welfare of a child
abuse & neglect
Incidents of confirmed family ___________________ at a foster home must be reported within _______ hours to the DFPS ___________________________ or via ________________________
violence, 24, phone hotline, email
True or False
Boat registration information cannot be obtained online.
False
What are two of the files that are automatically checked when querying a wanted person
concealed handgun file and registered sex offender
How does NCIC define motor vehicle
Motor driven conveyance designed to carry its operator except for a boat
How does NCIC define an article
Any item that does not meet any other file criteria: $500-$5000, interstate movement, serious criminal investigation
True or False
The concealed handgun license is a confirmable file
False, its non confirmable
A TCIC/NCIC hit is alone does not constitute __________ cause- it is ONE element comprising sufficient legal grounds to:
-arrest a wanted person
-detain a missing person
-seize stolen property
-charge a subject with violating a protective order
probable
The entering agency must furnish a _______________________ within the designated time frame
-positive confirmation
-negative confirmation
-specified amount of time necessary to confirm or reject the hit
substantive response
Priority 1- 'U' for Urgent
Hit must be confirmed by the entering agency within _______________
10 minutes
Priority 2- 'R' for routine
Hit must be confirmed by the entering agency within ___________
1 hour
An entering agency must be able to confirm/verify their records __________________ a day
24 hours
After confirming a Hit, a _______________ must be placed o the record by an agency who has fulfilled the following:
-taking a person into custody
-identified a missing person
-recovered stolen property
locate
Uses a special technique to get information from NCIC/TCIC which cannot be obtained with an online inquiry. Examples are:
Partial numeric identifiers
manual name checks
inquires using personal descriptions
inquires using vehicle makes/models
True or False
A TCIC/NCIC hit alone is not probable cause to arrest/detain an individual or seize stolen property
False
True or False
When confirming a warrant the priority code "R" stands for regular
False
True or False
All records in TCIC/NCIC DO NOT have to be available for confirmation on a 24 hour basis
False
True or False
Agencies are required to extradite on all warrants throughout the United States
False
True or False
Off-line Searches for TCIC can go back 10 years
True
The __________________________________ (CRS) division at DPS stores criminal histories or adult arrest complied from:
arrest fingerprint cards
court prosecution and deposition information
probation and parole reports
Texas Department of Criminal Justice (TDCJ) reports
Juvenile Justice Information System (JJIS)
Criminal Records Service
Purpose Code 'J' is used for
Applicants for employment
Employee evaluations
family members
The following is a partial list of those considered NOT AUTHORIZED to receive Criminal history information
Defense attorneys (without court order)
military recruiters
news media
private investigators
private citizens and employers
Texas Government code ____________________ provides a penalty for unauthorized obtaining use or disclosure of criminal history record information.
-Violation is a class B misdemeanor
-violation disclosed under remuneration or promise thereof is a 2nd degree felony
411.085
Any unauthorized obtaining, use or disclosure of criminal history record information can result in penalties against the __________ and the _______________
person & agency
The ultimate sanction available to TCIC is the _____________ of the offending terminals from the law enforcement agency
removal
True or False
Criminal History's can be sent to pagers
True
Where can individuals purchase a copy of their criminal history
DPS Crime Record Service
How many states currently participate in NCIC III?
50
What are TWO acceptable methods that DPS recognizes for destroying CHRI?
shredding & burning
What are three computerized criminal history files that are available
Triple III
CHRI
State Repository
The National Instant Criminal Background Check System (NICS) is used by Federal Firearms Licensees to instantly determine whether a prospective buyer is eligible to buy firearms. The NICS Denied Transaction File (NDTF) contains records for individuals who have been denied during the last ___________ days
180
Designed to alert law enforcement officers that an individual they are encountering may have the ____________________ against law enforcement.
propensity for violence
TX Family Code 85.025(c) states that if a person who is the subject of a protective order is confined or imprisoned on the date of the order would expire, the period for which the order is effective is extended to expire on _________________ of the date the person is released from confinement or imprisonment.
1st anniversary
Investigators should query the Foster Home Database using transaction code _________ and the home's street number or zip code
TQ
The Image File (QII) can assist in identifying the ___________ or ____________. The Image Indicator (IND) field must be a ________ to return the image
person, property, Y [Show Less]