home *** CD-ROM | disk | FTP | other *** search
- Summary of FBI Computer Systems
-
- By Ralph Harvey
-
- This article is reprinted from Full Disclosure. Copyright (c) 1986 Capitol
- Information Association. All rights reserved. Permission is hereby granted to
- reprint this article providing this message is included in its entirety. Full
- Disclosure, Box 8275, Ann Arbor, Michigan 48107. $15/yr.
- The FBI maintains several computer systems. The most common of which is call
- NCIC (National Crime Information Computer). NCIC maintains a database of
- information about such things as stolen cars, stolen boats, missing persons,
- wanted persons, arrest records. It provides quick access to these records by
- State, Local and Federal law enforcement agencies. NCIC is directly linked
- with the Treasury Department's TECS computer and many State computer systems.
- According to William H. Webster, Director of the FBI:
- When a police officer stops a car and is uncertain about who he's going to
- meet when he gets out, he can plug into this system [NCIC] and in a matter of a
- few seconds he can find out whether that person is a fugitive or the automobile
- is stolen. Incidentally, we receive almost 400,000 inquires of this nature each
- day in the NCIC system.
- When an agency determines that a subject is a fugitive, it supplies the FBI
- computer with as much of the following information as possible: 1) Name and
- case number; 2) Alias; 3) Race; 4) Sex; 5) Height; 6) Weight; 7) Color of hair;
- 8) Color of eyes; 9) Description of any identifying scars, marks and tattoos;
- 10) Date of birth; 11) Place of birth; 12) Social Security Number; 13) Passport
- Number; 14) Last known address; 15) Nationality; 16) If a naturalized U.S.
- Citizen, date, place, and certificate number; 17) Occupation; 18) The criminal
- violation with which subject is charged; 19) Date of warrant; 21) Type of
- warrant -- Bench, Magistrate, etc.; 22) Agency holding warrant; 23) Any
- information as to whether the subject is considered dangerous, is known to own
- or currently possess firearms, has suicidal tendencies, or has previously
- escaped custody; 24) Driver's license number, year of expiration and State
- issued; 25) License number of vehicle, aircraft or vessel subject owns or is
- known to use, include the year and State; 26) Description of vehicle, aircraft
- or vessel subject owns or is known to use; 27) Associates of the subject*1; 28)
- FBI number; 29) Name and telephone of the person to contact when subject is
- apprehended.
- One of the major problems with the system is that the agency that submits an
- entry is responsible for keeping it up to date. Once an entry has been made,
- there is little motivation for the originating agency to ``waste'' its time
- keeping it up to date, so many entries become incorrect with the passage of
- time.
- Another FBI computer system is their Investigative Support Information System
- (ISIS). This system is only used to provide support for major investigations
- that require the handling of a large volume of complex information. It is
- limited to handling a maximum of 20 cases at a time.
- The ISIS system was used during the investigation of the murder of Federal
- Judge John Wood in San Antonio, Texas. In this case, the FBI entered 300,000
- pieces of information, including 6,000 interviews, hotel registration
- information from every hotel in the area, etc. The accused, while on trial,
- claimed he was several hundred miles away. The FBI cross referenced his name &
- known alias with the hotel registration database and got a match. Contact with
- the hotel employees resulted in a positive identification and conviction of the
- subject.
- The FBI has a system called the Organized Crime Information Systems (OCIS) of
- which director William Webster is ``particularly proud.'' The system was
- started in 1980 in Detroit, Michigan and is one of their most sophisticated
- computers. The system is now functions in over 40 locations.
- The OCIS system allows agents in different field offices to share and analyze
- information collected in each other's areas. This system was used to identify
- some of the United States citizens who were released from Cuban prisons in 1984
- that had criminal histories in the United States. An OCIS link was recently
- opened in Rome, where it's used to support drug investigations.
- The OCIS system was used in the major Sicilian mafia heroin investigation,
- commonly referred to as ``The Pizza Connection.'' According to Webster, ``OCIS
- support ranged from direct assistance in collating information for Title III
- court-authorized wiretaps to the analysis of the case for grand jury
- presentation.''
- Currently under development is the Field Office Information Management System
- (FOIMS). The purpose of this system is to fully automate the administrative and
- record keeping functions of the field and resident offices.
-
- *1 One of the basic freedoms in this country is the First Amendment right to
- freedom of association. The Privacy Act was enacted to stop government
- invasions of privacy, and includes a provision specifically prohibiting the
- collection of information on the exercise of First Amendment activities.
-
- Downloaded From P-80 Systems - [304]/744/2253
-