TCIC/NCIC Terminal Operator Handbook Part 1 Texas Department of Public Safety Law Enforcement Support Division Crime Records Service

Size: px
Start display at page:

Download "TCIC/NCIC Terminal Operator Handbook Part 1 Texas Department of Public Safety Law Enforcement Support Division Crime Records Service"

Transcription

1 TCIC/NCIC Terminal Operator Handbook Part 1 Texas Department of Public Safety Law Enforcement Support Division Crime Records Service tcic.training@dps.texas.gov

2 The information provided in this handbook is to be considered sensitive but unclassified material. This handbook shall not be posted to a public website and discretion shall be exercised in sharing the contents of this handbook with individuals and entities who are not engaged in law enforcement or the administration of criminal justice. Revised 1/1/2017 Page 2

3 Table of Contents Table of Contents... 3 TCIC Training Mission Statement:... 7 Classroom Information... 7 Section 1 Definition and Policy... 9 National Crime Information Center CJIS Systems Agency Concept Texas Crime Information Center Terminal Agency Coordinators NCIC System Security CJIS Personnel Security Policy and Procedures CJIS System Access Policy for Applicants or Employees TCOLE Licensed Personnel TLETS Terminal Access Policy Relationship of TCIC/NCIC to TLETS/Nlets TLETS/Nlets System Diagram TCIC/NCIC File Organization Automatic Removal of Records (Retention) Record Responsibility Validation TCIC/TLETS Contact Information Section 2 Inquiry Responsibility System Design General Criteria for Inquiry Vehicle File/License Plate File (QV/ZV) Boat File (QB/ZB) Gun File (QG/ZG) Article File (QA/ZA) Securities File (QS/ZS) Wanted Person File (QW/ZW) Special File Hits Related to Wanted Persons Inquiry Immigration Violator File Foreign Fugitive File NCIC Gang File (QW, QWA, QGG) TX Gang File (QW, QWA, QWE) Known or Appropriately Suspected Terrorist File Protective Interest File Supervised Release File Identity Theft File Threat Against Peace Or Detention Officer Alert File Violent Person File Revised 1/1/2017 Page 3

4 Handgun License File (QW, QGL) NICS Denied Transaction File Protection Order File (QW, QPO) Sex Offender Registration File (QW, QXS) Missing Person File (QM, QW) Person with Information Child Safety Check Alert List TCIC Only Law Enforcement Response to Child Safety Check Alert Foster Home Member Database Texas Only Image File (QII) NCIC ORI File (QO) Section 3 Hit Confirmation Defining a Hit Requesting Hit Confirmation What Does Confirming a Hit Mean? Hit Confirmation Request (YQ) NCIC Number (NIC) Hit Confirmation Priority (PRI) Hit Confirmation Request Number (RNO) Hit Confirmation Response (YR) Hit Confirmation Responsibility Locate Message and Procedure Detained Wanted Person (DW) Document, Document, Document Files That Do Not Require A Hit Confirmation TCIC/TLETS Offline Search Delayed Inquiry Program Section 4 Criminal History Record Information Criminal History Record Information (CHRI) Texas Computerized Criminal History (CCH) NCIC Interstate Identification Index (III) Individual State Repositories III Inquiry Transaction (QH) Purpose Codes for Requesting CCH and III Data Automated Logging of Criminal History Record Information TCIC Responses to QH NCIC Responses to QH III Inquiry Transaction (QR/RAP) Individual State Repositories CHRI Identity Query (IQ) CHRI Full Record Query (FQ) CHRI Additional Information Request (AQ) Revised 1/1/2017 Page 4

5 Response to Manual CCH Request (AR) CHRI Dissemination Secondary Dissemination Storage and Destruction of CHRI CHRI Related Laws Texas Government Code Corrections Tracking System Inquiry (CTSI) TCIC Retesting Policy Attempted Child Abductions - Senate Bill AM For Reporting Attempted Child Abduction (AMACA) TCIC Training Evaluation Form TCIC LTFA Exam Answer Sheet Notes Notes Revised 1/1/2017 Page 5

6 Revised 1/1/2017 Page 6

7 TCIC Training Mission Statement: To provide and facilitate accessible, accurate and quality training to Texas users regarding the policy and procedures, in order to ensure the correct use and benefits of the Texas and National Crime Information Center databases. This handbook is designed to include some of the system s most important features, as well as special information for Texas users and is intended to compliment the more detailed NCIC Operating Manual. Classroom Information Course Descriptions The CJIS Systems Agency (CSA) is required to maintain a policy for training, record-keeping and monitoring of training. TCIC/NCIC training is provided by the TCIC Training Section of the Crime Information Bureau (CIB). The appropriate level of TCIC training is required of persons employed by a criminal justice or law enforcement agency, who access, either by hands on terminal operation or computer generated printout of TCIC/NCIC information. Full Access Operator Training (TCOLE Course # hours): Designed for operators who perform all NCIC/TCIC functions, including inquiry, entry, modification, clearing, canceling, and III functions. Operators must receive this training within the first six months of assignment or employment, regardless of whether these duties are performed on a full-time or part-time basis. In order to comply with federal requirements, operators must recertify within two years of certification or most recent recertification date. Less Than Full Access Operator Training (TCOLE Course # hours): Designed for operators who perform NCIC/TCIC functions at any level lower than full access. Generally, this pertains to inquiry only, including mobile data terminal (MDT) or notebook computer users. Operators must receive this training within the first six months of assignment or employment. In order to comply with federal requirements, operators must recertify within two years of certification or most recent recertification date. Officer Training (TCOLE Course # hours): This training is offered for personnel who receive or contribute to NCIC/TCIC records and do not operate a terminal. Examples would be: sworn peace officers, who do not touch or operate a terminal, federal agents and border patrol agents. No recertification is required. Criminal Justice Practitioner Training: This training is offered for those users who: handle, receive, or receive benefit from the NCIC/TCIC system but do not operate a terminal. Examples would be: Court Clerks, jailers, judges, district or county attorney and adult probation officers. (Course materials are covered in sections 1 and 4 of this handbook.) No recertification required. Revised 1/1/2017 Page 7

8 Exams, Grades and Attendance Exams are given at the end of each course. In order to be eligible for course credit and a certificate, the student must make an average of 75% or higher. It is the responsibility of the student to contact the instructor when an emergency situation arises in order to make arrangements to make up the class (if at all possible). If more than 10% of the class is missed, the student will be dropped from the course. Commissioned peace officers and other qualified individuals that provide a PID number from TCOLE and successfully complete this course will have those training hours forwarded to TCOLE for inclusion on their training record. Student Conduct In order to effectively cover the material, students are expected to report to class on time. As a courtesy, if a student is going to be late, contact the instructor or coordinator. Do not interrupt the class while in session. Wait to enter the room during break or enter when the instructor allows. Be respectful of others and refrain from talking while the instructor is teaching. Food and Drinks Some facilities may prohibit drinks or food in their classroom. Students should follow the guidelines of the host agency. Otherwise, per the instructor s judgment, food and drink may be allowed. Students should clean their workspace prior to leaving class by placing empty containers and paper in appropriate receptacles. Cell Phones and Text Messaging TCIC Training is aware that some students may be on call with their agency or family. Students should take into consideration their peers and place cell phones on silent or vibrate. If a student must take a call or return a text, they should excuse themselves from the class. Text messaging during class or during testing will NOT be tolerated. If this occurs, the instructor will remind the student of the classroom rule when found in violation. If a student continues to text or talk on cell phone during class, the instructor has the discretion to dismiss the student and notify the student s supervisor immediately of the circumstances. Revised 1/1/2017 Page 8

9 Section 1 Definition and Policy By the end of this training session the participant will be able to: Define the function and goal of the National and Texas Crime Information Centers. Explain the Criminal Justice Information Services (CJIS) System Agency concept and the relation between the FBI, Texas DPS and the local agency. Describe the relationship of TCIC/NCIC to TLETS/Nlets. Restate the CJIS Systems Access Policy for personnel access and terminal location. Describe the TCIC/NCIC system design. List the files in TCIC/NCIC and the retention periods for each file. Describe the record responsibility and the validation process. Revised 1/1/2017 Page 9

10 Revised 1/1/2017 Page 10

11 National Crime Information Center The National Crime Information Center (NCIC) was launched on January 27, 1967 with five files and 356,784 records. Currently, NCIC contains over active records in files. During, NCIC averaged transactions per day. (Information can be found at NCIC helps criminal justice professionals apprehend fugitives, locate missing persons, recover stolen property, and identify terrorists. It also assists law enforcement officers in performing their official duties more safely and provides them with information necessary to aid in protecting the general public. The National Crime Information Center (NCIC) is a nationwide computerized information system established as a service to all criminal justice agencies local, state, and federal. The goal of NCIC is to help the criminal justice community perform its duties by providing and maintaining a computerized filing system of accurate and timely documented criminal justice information. For NCIC purposes, criminal justice information is defined as "information collected by criminal justice agencies that are needed for the performance of their legally authorized, required function. This includes wanted person information; missing person information; unidentified person information; stolen property information; criminal history information; information compiled in the course of investigation of crimes that are known or believed on reasonable grounds to have occurred, including information on identifiable individuals; and information on identifiable individuals compiled in an effort to anticipate, prevent, or monitor possible criminal activity." Criminal justice information can be electronic (paperless) or hard copy (paper). The NCIC database can best be described as a computerized filing system of documented criminal justice information concerning crimes and criminals of nationwide interest and a locator file for stolen property, missing and unidentified persons. CJIS Systems Agency Concept The NCIC operates under a shared management concept between the FBI and state and federal users. The Criminal Justice Information Services (CJIS) Advisory Policy Board established a goal of having a single state agency assume responsibility as the CJIS Systems Agency (CSA) by which NCIC System users in that state would access the various systems managed by the FBI CJIS Division. Texas Department of Public Safety (TXDPS) has designated the Law Enforcement Support/Crime Records Service (LES/CRS) as the state s CSA. The CSA is responsible for planning necessary hardware, software, funding, and training for complete access to all FBI CJIS Division data services by all authorized agencies within the state. Revised 1/1/2017 Page 11

12 The Texas Department of Public Safety (TXDPS) has signed a User s Agreement with the FBI setting out the specific responsibilities, in the same manner as each local terminal agency signs a User s Agreement with DPS. NCIC policy is that each local agency will resolve NCIC problems with the CSA, and the CSA will resolve statewide problems with the FBI/NCIC. Texas Crime Information Center The Texas Crime Information Center (TCIC) was established in the early 1970 s after the inception of the National Crime Information Center (NCIC) in In 1987, the TCIC Training and Audit sections were added in response to the NCIC s 1984 nationwide audit requiring each state s CJIS Systems Agency (CSA) to establish training and audit programs. In accordance with NCIC policy the Texas Department of Public Safety (TXDPS) has designated the Law Enforcement Support/Crime Records Service as the state s CSA and the Deputy Assistant Director of Crime Records as the state s CJIS Systems Officer (CSO). TCIC training has established policies that satisfy NCIC mandates and user needs. In addition to NCIC, Texas also maintains a statewide database the Texas Crime Information Center (TCIC); which is located at the TXDPS headquarters in Austin, Texas. It operates under the same policies and goals as NCIC. TXDPS created the TCIC Control Room to assist users with administrative matters and agency support to include, but not limited to: policy decisions, entry requirements, format problems and quality control messages. The TCIC Control Room is available 24 hours a day, 7 days a week at TCIC (8242) or at mnemonic address CRDP. TXDPS maintains a website with NCIC and TCIC information: User ID: tcic2000 Password: DPSTCIC7# (all in capitals) Terminal Agency Coordinators Terminal agencies are required by NCIC policy to designate an individual to function as their primary Terminal Agency Coordinator (TAC). It is recommended that agencies assign an alternate TAC. The Terminal Agency Coordinator is responsible for: Ensuring compliance with TCIC/NCIC policy Acting as the liaison between the local agency and the CSA Being knowledgeable in all aspects of TCIC/NCIC Having the authority to implement and oversee operations which affect the use of TCIC/NCIC Revised 1/1/2017 Page 12

13 NCIC System Security The data stored in the NCIC System and the Interstate Identification Index (III) files are documented criminal justice information and must be protected to ensure correct, legal, and efficient dissemination and use. It is incumbent upon every agency operating an NCIC terminal to implement the necessary procedures to make that terminal secure from any unauthorized use. Any departure from this responsibility warrants the removal of the offending terminal from further NCIC participation. Information can be obtained from NCIC and the III files both directly and indirectly. Direct access is terminal access and dissemination within that terminal agency. Indirect access is nonterminal access outside of an agency with direct access. The individual receiving a request for criminal justice information must ensure that the person requesting the information is authorized to receive the data. Unauthorized request or receipt of NCIC material could result in administrative or criminal proceedings brought against the agencies and/or the individuals involved. Those employees with terminal access or access to any equipment that stores, processes or transmits criminal justice data are required to pass a national fingerprint based background check. City, county and other governmental IT staff under a management control agreement with the criminal justice agency and all contract employees covered by a security addendum are required to have a national fingerprint based background check. CJIS Personnel Security Policy and Procedures Minimum Screening Requirements for Individuals Requiring Access to Criminal Justice Information (CJI): 1. To verify identification, a state and national fingerprint-based record checks shall be conducted within 30 days of assignment for all personnel who have direct access to CJI and those who have direct responsibility to configure and maintain computer systems and networks with direct access to CJI. 2. If a felony conviction of any kind exists, the hiring authority in the local criminal justice agency shall deny access to CJI. However, the hiring authority may ask for a review by the CJIS System Officer (CSO) in extenuating circumstances where the severity of the offense and the time that has passed would support a possible variance. 3. If a record of any other kind exists, access to CJI shall not be granted until the CSO or his/her designee reviews the matter to determine if access is appropriate. 4. If the person appears to be a fugitive or has an arrest history without conviction, the CSO or his/her designee shall review the matter to determine if access to CJI is appropriate. 5. Support personnel, contractors, and custodial workers with access to physically secure locations or controlled areas (during CJI processing) shall be subject to a state and national fingerprint-based record check unless these individuals are escorted by authorized personnel at all times. 6. It is recommended individual background re-investigations be conducted every five years unless Rap Back is implemented. Revised 1/1/2017 Page 13

14 CJIS System Access Policy for Applicants or Employees The CJIS System Access Policy applies to commissioned peace officers, terminal operators and others with network access to CJIS systems as well as an employee who may have access to an area where this information is received, maintained or stored either manually or electronically. In order to establish a practical process for screening in Texas that is consistent with the CJIS Security Policy requirements, TXDPS is applying the criminal history background screening requirements within the Texas Commission on Law Enforcement (TCOLE) licensing rules to persons requesting access to the Texas and national CJIS systems. Offense Felony Conviction Felony Deferred Adjudication Class A Misdemeanor Conviction Class A Misdemeanor Deferred Adjudication Class B Misdemeanor Conviction Class B Misdemeanor Deferred Adjudication Open Arrest for Any Criminal Offense (Felony or Misdemeanor) Family Violence Conviction Original Application for Access Permanent Disqualifier Permanent Disqualifier Permanent Disqualifier Permanent Disqualifier Disqualifier for 10 years Disqualifier for 10 years Disqualifier until Disposition Permanent Disqualifier Revised 1/1/2017 Page 14 Person Who Already has Access Permanent Revocation of Access Suspension of Access for 20 years Suspension of Access for 10 years Suspension of Access for Term of Deferral Suspension of Access for 10 years Suspension of Access for Term of Deferral Maintain Access Pending Court Disposition Permanent Revocation of Access The TXDPS does not need to review every applicant. Local agency administrators may authorize or deny access to the Texas and FBI systems. When the local criminal justice agency is reviewing an individual s criminal history record information, the TXDPS considers a deferred adjudication as though it was a conviction for screening purposes. In instances where there are any questions, please contact the Manager of the Crime Information Bureau. Both Class A and B convictions/deferred adjudications can receive an agency sponsored waiver after 5 years from final disposition providing there are no multiple Class A convictions/deferred adjudications. If approved, agency sponsored waivers are only valid at that agency and cannot transfer with the individual. The agency head must articulate in writing that mitigating circumstances existed with the case and must attest to the value of the individual to the criminal justice community. The request shall also include a statement that the public interest would be served by reducing the denial period. These requests may be sent to tlets@dps.texas.gov or mailed to the following address: Texas Department of Public Safety - Crime Records Service MSC 0233 Attn: Manager, Crime Information Bureau P.O. Box 4143, Austin, Texas

15 TCOLE Licensed Personnel TXDPS will allow access to the Texas and FBI systems when a peace officer, communications officer or corrections officer has a valid active license from the Texas Commission on Law Enforcement (TCOLE). The officer s access will not be revoked as long as the TCOLE license remains valid and active regardless of any criminal history background. TLETS Terminal Access Policy In addition, the computer site and related infrastructures (including police vehicles if they house equipment which provides access to the CJIS network), must have adequate physical security at all times to protect against all unauthorized access to or routine viewing of computer devices, access devices, and printed and stored data. A physically secure location is a criminal justice facility, an area, a room, a group of rooms, or a police vehicle that is/are subject to criminal justice agency management control and which contain hardware, software and/or firmware that provide access to the CJIS network. Law enforcement and criminal justice sensitive facilities and restricted/controlled areas shall be prominently posted and separated from non-sensitive facilities and non-restricted/controlled areas by physical barriers that restrict unauthorized access. Every physical access point to sensitive facilities or restricted areas housing information systems that access, process, or display CJIS data shall be controlled/secured during both working and non-working hours. Blanking the screen of the laptop or MDT by use of a password-protected screensaver is recommended when the officer or operator is away from the terminal. (CJIS Security Policy) The agency shall control physical access by authenticating visitors before authorizing escorted access to the physically secure location (except for those areas designated as publicly accessible). The agency shall escort visitors at all times and monitor visitor activity. (CJIS Security Policy) Revised 1/1/2017 Page 15

16 Relationship of TCIC/NCIC to TLETS/Nlets The Texas Law Enforcement Telecommunications System (TLETS) is a statewide telecommunications network that is composed of computer terminals, interfaces and databases representing city, county, state, federal and military law enforcement and criminal justice agencies in Texas. This network is controlled by a computerized electronic message switching system located at TXDPS headquarters in Austin. The International Justice and Public Safety Network (Nlets) is a secure network and system linking local, state, federal and international agencies together to provide the capability to exchange criminal justice and public safety related information. Entries and inquiries into NCIC/TCIC are available to law enforcement agencies that operate a TLETS/Nlets terminal. Information concerning TLETS/Nlets system description, operation, policy and procedure may be found in the TLETS/Nlets Operating Manual. Data obtained over TLETS/Nlets may only be disseminated to authorized criminal justice agencies. Revised 1/1/2017 Page 16

17 TLETS/Nlets System Diagram Revised 1/1/2017 Page 17

18 TCIC/NCIC File Organization NCIC and TCIC work as one system but are organized into two separate databases with some of the files housed in both. File NCIC TCIC Article Boat X X Boat Stored/Abandoned Child Safety Check Alert Gun Foreign Fugitive Identity Theft X X Interstate Identification Index Immigration Violator Known or Appropriated Suspected Terrorist License Plate X X Missing Person X X National Sex Offender Registry NCIC Gang (TXGang Upload) NICS Denied Transaction File Originating Agency Identifier (ORI) X X Protection Order X X Protective Interest Securities Supervised Release Threat Against Peace or Detention Officer Unidentified Persons X X Violent Person X X Vehicle X X Vehicle Stored/Abandoned Vehicle/Boat Parts X X Wanted Person X X X X X X X X X X X X X X X X X X Revised 1/1/2017 Page 18

19 Automatic Removal of Records (Retention) Each NCIC and TCIC record has been assigned a specific Retention Period or amount of time it will be allowed to remain active in the system. The purpose of a retention period on certain files is to remove records that may become unreliable because of age. Once a record reaches the retention period, it is automatically retired. File Article Boat - Abandoned/Stored Boat - with BHN Boat - without BHN Boat/Vehicle Part Child Safety Check Alert Gun Recovered Gun - Stolen/Lost/Felony Identity Theft Known or Suspected Terrorist License Plate Expiring & Non-Expiring Missing Person National Sex Offender Registry NCIC Gang File NICS Denied Transaction File Protective Interest Protection Order Security - Except Money Orders/Travelers Checks Security - Money Orders/Travelers Checks Supervised Release Threat Against Peace Or Detention Officer TXGang Unidentified Person Vehicle - Abandoned/Stored Vehicle Felony Vehicle - with VIN Vehicle - without VIN Violent Person Want - Temporary Felony Wanted Person Retention Period Year of Entry plus 1 Year One Year from Date of Entry Year of Entry plus 4 Years 90 Days Year of Entry plus 4 Years One Year from Date of Entry Year of Entry plus 2 Years Indefinitely 5 Years (unless designated less by ORI) Indefinitely Year of Entry plus 4 Years Indefinitely Date of Expiration (remains in system indefinitely) 5 years 180 Days Indefinitely Date of Expiration (remains 5 years after expiration) Year of Entry plus 4 Years Year of Entry plus 2 Years Indefinitely Indefinitely 5 years adult (date of determination) 2 years juvenile (date of determination) Indefinitely One Year from Date of Entry 90 Days Year of Entry plus 4 Years 90 Days Indefinitely 48 Hours Indefinitely Agencies are not notified on all retention purges. Purge messages are only received on the following records: temporary felony want, felony vehicle, vehicle records not containing a VIN (Vehicle Identification Number), boat records not containing a BHN (Boat Hull Number), and protective orders (five days before the record expires). Revised 1/1/2017 Page 19

20 Record Responsibility The CSA is responsible for enforcing TCIC/NCIC policy within the state. Stolen and wanted information in the system is the property and responsibility of the local law enforcement agencies that make the record entries. The responsibility for system security and dissemination of information rests with the local agency. Agencies that enter records into TCIC/NCIC are responsible for their accuracy, timeliness and completeness. This includes second party checks, immediate entry or removal of records and packing the record with all information available. Agencies lacking staff support for a second party check should require the officer to check the record s accuracy, as the officer has the primary responsibility for seeking the fugitive or recovering the property. Other than the CSA, only the entering agency can modify, cancel or clear an NCIC or TCIC record. Both NCIC and TCIC have established procedures to help local agencies keep their records accurate, timely and complete. Programs such as computer edits, quality control, automatic removal and validations are useful in assisting local agencies with record maintenance. Validation Record validation is important for every agency participating in the Texas and National Crime Information Center databases. The process requires that agencies ensure that the records entered into TCIC/NCIC are accurate and up to date. All records must be validated sixty to ninety days after entry and annually thereafter as long as the record remains active in the system. On a monthly basis, the NCIC system extracts a portion of all active records on file for validation purposes. The Texas Department of Public Safety - Crime Records Service sends entering agencies a list of their records for review and validation. Validation obliges the entering agency to confirm that the record is complete, accurate and still outstanding or active. Validation is accomplished by reviewing the entry and current supporting documents and by recent consultation with any appropriate complainant, victim, prosecutor, court, nonterminal agency or other appropriate source or individual. In the event the entering agency is unsuccessful in its attempts to contact the victim, complainant, etc., the entering authority must make a determination based on the best information and knowledge available whether or not to retain the entry in the file. Revised 1/1/2017 Page 20

21 TCIC/TLETS Contact Information Area TCIC/TLETS Online Online Retesting for Existing Users Contact Information TCIC/TLETS Training New User Request Form Associate Trainer Report NCIC Operating & Code Manuals TCIC Training Handbook TLETS Operating Manual TXGang Training TCIC Control Room Entry Procedures & Problems Hit Confirmation Problems Record Validations Child Safety Check Alert Entry TCIC Audit Preparing for TCIC Audits TCIC/TLETS User Agreements TCIC System & Quality Control System Management Off Line Searches Requesting New ORI s ORI Validations LP Readers for Patrol Vehicles TXGang Application & Access TLETS New Agency Membership Violations or System Abuse Operations Intelligence Center (OIC) Terminal Troubleshooting Data Circuit Problems CJIS Security Information Terminal Security Reviews User Security Reviews Terminal Moves/Changes TCIC Online User Name: tcic2000 Password: DPSTCIC7# tcic.training@dps.texas.gov tcic.controlroom@dps.texas.gov / Fax (Available 24/7) tcic.audit@dps.texas.gov tcicqc@dps.texas.gov txgang@dps.texas.gov TLETS@dps.texas.gov TLETS / 888-DPS-OIC (Available 24/7) security.committee@dps.texas.gov Revised 1/1/2017 Page 21

22 Revised 1/1/2017 Page 22

23 Section 2 Inquiry Responsibility By the end of this training session the participant will be able to: Define the general criteria for an inquiry. Describe Vehicle file and list the information required to run an inquiry. Describe Boat file and list the information required to run an inquiry. Describe Gun file and list the information required to run an inquiry. Describe Article file and list the information required to run an inquiry. Describe Security file and list the information required to run an inquiry. Describe Wanted Persons file and list the information required to run an inquiry. List the possible files cross-searched with a Wanted Person inquiry. Explain specific files and the criteria for inquiries (Handgun License, Protective Order, Sex Offender Registration and Missing Person/Person with Information). List the procedures required for a positive Child Safety Check Alert and Foster Home Member inquiry hit. Identify the ORI file and the information required to run an inquiry. Revised 1/1/2017 Page 23

24 Revised 1/1/2017 Page 24

25 System Design NCIC and TCIC are designed to allow users the ability to enter, modify, cancel, clear, locate and inquire on stolen property or wanted, missing, and unidentified persons. The purpose of an entry message is to place a new record in a file or to append supplemental information to those already on file. The purpose of a modification message is to add, delete or change a portion of data which are part of a record. A record may be modified only by the agency that entered the record as long as the record is in active status. The purpose of a cancellation message is to remove an entire record or supplemental information from any file. When an initial record is canceled, all supplemental records appended to it are also automatically canceled. A record may be canceled only by the agency that entered the record. The purpose of a clear message is to remove a record due to the location of a missing person, apprehension of a wanted person, if not detained, or recovery of property on file in NCIC. The purpose of a locate message is to indicate (until the originating agency clears the record) that the wanted person has been apprehended or the property has been located. Z inquiry is used for administrative/testing purposes and validation of records and/or review. Q inquiry is used for investigative inquiry transactions. Both Z and Q inquiries are processed exactly the same way. Operators must read the entire or complete return carefully to compare all identifiers. It is the operator s responsibility to make an initial determination in all files if a hit is a good possible identification. General Criteria for Inquiry Mandatory Field is a field that must be completed by the user in order to transmit a transaction form. If a mandatory field is incomplete, an error message is displayed when the user attempts to transmit the form. Required Field is a field that requires that at least one field must be completed by the user in order to transmit a transaction form. If one of the required fields is not completed, an error message is displayed when the user attempts to transmit the form. Conditional Field is a field that unavailable until the primary data field is selected and then it may become mandatory. Additional Field is a field that is used to pack a record with as much information as possible. Users may transmit forms without completing the additional fields, but they must be included to pack the record with all available information. Revised 1/1/2017 Page 25

26 Vehicle File/License Plate File (QV/ZV) For NCIC purposes, a vehicle is any motor-driven conveyance (except a boat) designed to carry its operator. Some examples of vehicles include: Car Truck Motorcycle Construction Equipment Farm/Garden Equipment that the Operator Drives Dune Buggies Golf Carts Go-Carts Riding Lawnmowers Motorized Wheelchairs Aircraft Gliders Blimps Hot Air Balloons Trailers The Vehicle File contains records for stolen vehicles, vehicles used in the commission of a felony or vehicles that a law enforcement agency may seize based on a federally issued court order. Records for felony vehicles and vehicles subject to seizure remain active for 90 days from the date of entry; records for stolen vehicles remain active for the balance of the year of entry plus four years. The License Plate File contains records for stolen passenger automobile plates and special plates such as antique, bus, commercial, farm vehicle, motorcycle, trailer, truck and U.S. Government vehicles. License plate records remain active for the balance of the year of entry plus four years. The Part File contains records for any serially-numbered component from a vehicle or boat, and ownership documentation for a vehicle or boat. Part records remain active for the balance of the year of entry plus four years. Requirements for Inquiry Inquiries can be made using the NIC only or LIC, VIN and OAN either separately or in combinations, such as VIN and OAN or LIC and VIN, etc. However, when making an inquiry using the OAN, the VIN must be used. An inquiry of this type will search the VIN, SER, and OAN Fields of all Vehicle, Boat, and Vehicle/Boat Part File records, as well as the VIN Field of all person records. The LIS and VMA are not required for a vehicle inquiry but should be included to limit the search to records on file containing matching LIS information. NCIC searches felony vehicle records using LIC only. Revised 1/1/2017 Page 26

27 Vehicle Inquiry Transaction (QV/QV-T/ZV) Agency/Case Data Message Key Originating Agency Code (ORI) NCIC Number (NIC) Related Search Hit (RSH) License Plate Data License Plate (LIC) State (LIS) Vehicle Data Vehicle Identification Number (VIN) Make (VMA) Owner Applied Number (VIN) Part Serial Number (VIN) Vehicle Identification Number (VIN) If a VIN is more than eight characters, the NCIC VIN search method uses the last eight characters of the VIN. Complete VINs should be used for inquiry whenever available. A caveat will appear to warn agencies which receive a positive vehicle response that any match(s) is not exact as to all VIN characters. The following will appear at the beginning of the record immediately before the message key translation: RECORD NIC/V IS BASED ON PARTIAL VIN SEARCH - VERIFY ALL DATA BEFORE TAKING FURTHER ACTION BASED ON THIS RECORD License Plate (LIC) If a LIC is more than eight characters, the NCIC LIC search method uses the first eight characters of the LIC. Complete LICs should be used for inquiry whenever available. A caveat will appear to warn agencies which receive a positive vehicle response that any match(s) is not exact as to all LIC characters. The following will appear at the beginning of the message immediately before the message key translation: RECORD NIC/-V IS BASED ON A PARTIAL LIC SEARCH - VERIFY ALL DATA BEFORE TAKING ACTION BASED ON THIS RESPONSE Related Search Hit (RSH) Inquiries may also contain a RSH Field. If the RSH is Y, secondary hit responses will be returned for all linked records. The NCIC System links records when the ORI/OCA (Originating Agency Identifier/Originating Case Number) matches the primary hit response and the dates of entry for those records are within 30 days of each other and the LKI/LKA (Linkage Agency ORI/Linkage Case Number) are the same as ORI/OCA contained in the primary hit response. Revised 1/1/2017 Page 27

28 QV or ZV may result in any of the following responses: Stolen Vehicle Missing Persons Felony Vehicle NCIC Gang Stored/Abandoned Vehicle Protective Order Vehicle/Boat Parts Registered Sexual Offender Located Vehicle Supervised Release Stolen Vehicle Canada Threat Against Peace/Detention License Plate Officer Wanted Person US Secret Service Protective Interest Foreign Fugitive Interpol Immigration Violator Child Safety Check Alert List Known or Appropriately Suspected Violent Person Terrorist No Record Positive Return Example MKE/STOLEN VEHICLE ORI/MD LIC/ABC123 LIS/MD LIY/1999 LIT/PC VIN/2P4555P VYR/1995 VMA/PONT VMO/BON VST/SW VCO/BRO DOT/ OCA/2325 MIS/DENT IN REAR LEFT FENDER OAN/ OPT/IN AS OF NIC/V DTE/ EDT DLU/ EST ORI IS ANY CITY PD MD IMMED CONFIRM RECORD WITH ORI Revised 1/1/2017 Page 28

29 Boat File (QB/ZB) NCIC defines a boat as a vessel for transport by water, constructed to provide buoyancy by excluding water and shaped to give stability and permit propulsion. The Boat File contains records for stolen boats. The NCIC Boat File records remain active for the balance of the year of entry plus four years. Requirements for Inquiry Inquiries can be made by using the REG and/or BHN. Boat Inquiry Transaction (QB/ZB) Agency/Case Data Message Key (MKE) Originating Agency Code (ORI) NCIC Number (NIC) Related Search Hit (RSH) Boat Data Registration Number (REG) Hull Number (BHN) Coast Guard Document Number (REG) Registration Number Complete registration number should be used although it may exceed eight characters. NCIC will search the first eight characters. Boat Hull Number The complete hull serial number should be used if it does not exceed 20 characters. If the hull serial number exceeds 20 characters, the first 20 should be used. NCIC will search the first eight characters. The state of registration cannot be used in an inquiry. Inquiries using QB or ZB using the BHN may result in any of the following responses: Stolen Boat Abandoned/Stored Boat Located Boat No Record Stolen Boat Canada Positive Return Example MKE/STOLEN BOAT ORI/MD REG/MD1235ZZ RES/MD REY/1999 HUL/WD BHN/LBC BYR/1974 PRO/OB BMA/WEL BTY/RUN BLE/17 BCO/RED DOT/ OCA/A222 MIS/BLUE STRIPING NIC/B DTE/ EST DLU/ EST ORI IS ANY CITY PD MD IMMED CONFIRM RECORD WITH ORI Revised 1/1/2017 Page 29

30 Gun File (QG/ZG) NCIC defines a gun as any weapon, including a starter gun, which will or is designed to or may readily be converted to expel a projectile by air, carbon-dioxide or the action of an explosive. Included in this definition are antique guns; cannons; machine guns; pistols; rifles; shotguns; the frame or receiver of any such weapon; any firearm muffler or firearm silencer; destructive devices such as grenades, mines, missiles and rockets; disguised guns such as knife guns, pen guns, belt buckles and cane guns. BB guns are excluded and should be entered in the Article File because the manufacturers of BB guns are not bound by the same statutes as are the manufacturers of the above-mentioned weapons. The Gun File contains records for stolen weapons, recovered (abandoned, seized or found) weapons, lost weapons or weapons that have been used in the commission of a felony. Records for stolen, lost or felony guns remain on file indefinitely. Recovered gun records remain active for the balance of the year of entry plus two years. Requirements For Inquiry Inquiry of the Gun File can be made by using SER, MAK, and CAL; SER and MAK; SER and CAL; or SER only. Inquiry by SER and MAK is preferred as this type of inquiry may limit the search and minimize the number of false positive responses. Inquiries may include the MOD Field, but will not limit the response. Inquiry may be made using the NIC only, if available. Gun Inquiry Transaction (QG/ZG) Agency/Case Data Gun Data Originating Agency Code (ORI) NCIC Number (NIC) Related Search Hit (RSH) Serial Number (SER) Caliber (CAL) Make (MAK) Model (MOD) It is essential that all identifying data in a positive response be compared with the weapon in question before further action is taken. Serial Number In the event that more than one number appears on a weapon, the number on the frame should be inquired on first. If the response is negative, the agency should query the remaining numbers. If the serial number exceeds 20 characters, the rightmost 20 characters should be inquired upon first. If the response is negative, the leftmost characters should be queried. Revised 1/1/2017 Page 30

31 Alphabetic characters appearing between numeric characters (embedded alphabetic characters) in a serial number are not considered for matching purposes since some agencies formerly placed records on file after deleting the embedded alphabetic characters. Thus, a search of serial number 369J257 would retrieve records with serial numbers , 369M257, and 369J257. Letters appearing as a prefix or suffix to the numerics in a serial number are considered in the matching process and, therefore, are not affected by the rule applicable to embedded alphabetic characters. Make An inquiry that contains serial number, a make other than CLT (Colt), REM (Remington), SW (Smith & Wesson) or WIN (Winchester), with a caliber other than 45 or without caliber, will retrieve any record on file with a make other than CLT, REM, SW, or WIN and a matching serial number. Any inquiry that contains serial number, with caliber other than 45 or without caliber, and MAK/CLT, REM, SW, or WIN will retrieve any record on file with a matching serial number and the same make (CLT, REM, SW, or WIN) or MAK/US or USA. Inquiries using QG or ZG may result in any of the following responses: Stolen Gun Recovered Gun Lost Gun Felony Gun Positive Return Example MKE/STOLEN GUN ORI/MD SER/B MAK/REM CAL/308 MOD/MOHAWK TYP/RC DOT/ OCA/ MIS/BBL 28 NIC/G DTE/ EST DLU/ EST ORI IS ANY CITY PD MD IMMED CONFIRM RECORD WITH ORI If data in an inquiry matches that contained in a QC ATTENTION message, the following message will be received: **ATTENTION** IF SER/ IS FOR MAK/SAV, CAL/20, AND TYP/SS, IT IS NOT UNIQUE ACCORDING TO NCIC QUALITY CONTROL. ASCERTAIN CORRECT NUMBER Revised 1/1/2017 Page 31

32 Article File (QA/ZA) NCIC defines a stolen article as any item which does not meet any other file criteria. A stolen article may be entered into this file if a theft report has been made. The Article File contains records for any item valued at $500 or more; Office equipment, television sets and bicycles may be entered regardless of value; records for all property taken, regardless of value, if the aggregate value in one theft exceeds $5000; records for property taken, regardless of value, if the investigation indicates interstate movement of the property; or records for property taken in which the seriousness of the crime indicates that the investigating agency should enter a record for investigative purposes. The NCIC Article File records remain active for the balance of entry plus one year. Records for lost Public Safety, Homeland Security or Critical Infrastructure items of identification (category Q) or equipment (category Z) are also included in the NCIC Article file. Inquiry Requirements An inquiry of the Article File must include TYP and SER and/or OAN. Article Inquiry Transaction (QA/ZA) Agency/Case Data Originating Agency Code (ORI) NCIC Number (NIC) Related Search Hit (RSH) Article Data Type Code (TYP) Serial Number (SER) Owner Applied Number (OAN) Type An inquiry containing TYP/RTELEVI and SER/1234 could retrieve a record which contains TYP/RRADIO and OAN/1234, TYP/RRADIO and SER/1234, or TYP/YOTHER and SER/1234. When an inquiry is made with Type Field category codes of I or Q, both categories will be searched. When an inquiry is made with Type Field category code Y or Z, any record on file with an identical SER or OAN will be returned regardless of the Type Field category code in the record. An inquiry using QA or ZA may result in the following responses: Stolen Article Located Article No Record Revised 1/1/2017 Page 32

33 Positive Return Example MKE/STOLEN ARTICLE ORI/MD TYP/CPROJEC SER/ BRA/E KODA MOD/32S OAN/MD DOT/ OCA/A222 MIS/SLIDE PROJECTOR OPT/IN AS OF NIC/A DTE/ EDT DLU/ EST ORI IS ANY CITY PD MD IMMED CONFIRM RECORD WITH ORI Revised 1/1/2017 Page 33

34 Securities File (QS/ZS) NCIC defines securities as currency, documents or certificates which are generally considered to be evidence of debt or ownership of property, documents which represent subscription rights and other types traded in securities exchanges in the United States, except for commodities futures. This includes postal and other types of money orders, traveler s checks, warehouse receipts, saving certificates and interest coupons on stocks and bonds. The Securities File contains records for securities that were stolen, embezzled, used for ransom or counterfeited. Ransom securities remain active indefinitely. Records for stolen traveler s checks and money orders remain active for the balance of the year of entry plus two years; records for all other stolen, embezzled, or counterfeited securities remain active for the balance of the year of entry plus four years. Inquiry Requirements An inquiry of the Securities File should include TYP, SER, and DEN. ISS should be included for securities other than U.S. Treasury issues and currency. An inquiry may also be made by OWN; OWN and TYP; OWN and OCA; OWN and SOC; or SOC only. Inquiries may be made using the NIC only, if available. Securities Inquiry Transaction (QS/ZS) Agency/Case Data Originating Agency Code (ORI) NCIC Number (NIC) Related Search Hit (RSH) Security Data Type (TYP) Denomination (DEN) Serial Number (SER) Issuer (ISS) Security Issue Date (SDT) Owner (OWN) Originating Case Number (OCA) Social Security Number (SOC) Denomination An inquiry containing BLANK in the DEN will pull only records that are entered with the word BLANK in the DEN. An inquiry containing a face value (e.g., 50 or 28-75) in the DEN could pull records that have a matching DEN or DEN/BLANK. Revised 1/1/2017 Page 34

35 Type An inquiry containing TYP data will limit the search to those security entries having a matching type code or a type code of AO (All other). Use of AO pulls any record having a matching SER and DEN regardless of the TYP code in the record. Furthermore, if the TYP is MO (Money Order) or PM (Postal Money Order), an NCIC search will return hits of both TYP/MO and TYP/PM records. If TYP is PM, the SER Field must be ten characters (the first 10 digits of the serial number). Inquiries using transaction QS or ZS may result in any of the following responses: Stolen Security Missing Person Located Security Wanted Person No Record Positive Return Example MKE/STOLEN SECURITY ORI/MD TYP/BD SER/D30232 DEN/1000 ISS/CON EDISON OWN/POWELL, JOSEPH SDT/M DOT/ OCA/ NIC/S DTE/ EST DLU/ EDT ORI IS ANY CITY PD MD IMMED CONFIRM RECORD WITH ORI Revised 1/1/2017 Page 35

36 Wanted Person File (QW/ZW) NCIC defines a wanted person as an individual (including a juvenile who will be tried as an adult) with an outstanding warrant on file that meets the following criteria: federal warrant, felony or serious misdemeanor warrant class B or above or a probation or parole violator for a federal, felony or serious misdemeanor crime. Juveniles may be entered if they meet the following criteria: charged with the commission of a delinquent act that would be a crime if committed by an adult and who has fled from the state where the act was committed or adjudged delinquent and has escaped from an institution or agency with the legal custody or supervision of such juvenile or who has absconded while on probation or parole. Juvenile status is determined by the laws of the state of residence of the parent, guardian, or agency entitled to legal custody of such juvenile. Temporary Felon A temporary felony want record may be entered to establish a "want" entry when a law enforcement agency needs to take prompt action to apprehend a person (including a juvenile) who has committed, or the officer has reasonable grounds to believe has committed, a felony. This individual may seek refuge by fleeing across jurisdictional boundaries while circumstances prevent the immediate acquisition of a warrant. A temporary felony want record will be automatically retired after 48 hours. Inquiry Requirements An inquiry of the Wanted Person File may be made by name and one or more of the following alphanumeric identifiers: DOB, FBI, MNU, SOC and/or OLN. Additionally, inquiries may be made using vehicle data (LIC, LIS and/or VIN and VMA); NAM and OCA; or NIC only. Person Inquiry Transaction (QW/QW-T/QW-X/QWA/QWE/QWF/QWS/ZW) Agency/Case Data Message Key (MKE) Originating Agency Code (ORI) NCIC Number (NIC) Originating Case Number (OCA) Related Search Hit (RSH) Revised 1/1/2017 Page 36

37 Person Data Name (NAM) Expanded Name Search (ENS) Sex (SEX) Race (RAC) Date of Birth (DOB) Expanded Date of Birth Search (EBS) Social Security Number (SOC) Miscellaneous Number (MNU) FBI Number (FBI) License Number (OLN) License Plate Data License Plate (LIC) State (LIS) Vehicle Data Vehicle ID Number (VIN) Make (VMA) Message Keys QW is designed to limit responses to possible extraditable misdemeanor and all felony records regardless of extradition. QW returns records with EXL codes 1-6, A, B, E, F and code C if from an adjacent state. It is important to note that wanted records with EXL D, misdemeanor nonextraditable warrants will not be returned. QWA (Wanted Person Inquiry All) is designed to return all felony and misdemeanor records regardless of extradition. Note: Not all records in a QWA response may be actionable by the inquiring agency. The information on the return may provide investigative leads. QWE (Wanted Person Inquiry Extraditable) is designed to limit responses to felony and misdemeanor records that are possibly extraditable from the inquiring agency s location. The QWE returns records with EXL Field codes 1, 2, 5, 6, A, B, E, and F and codes 3 and C if the entering agency is from an adjacent state. QWF (Wanted Person Inquiry Felony) is designed to limit responses to only felony records regardless of extradition and will return records with EXL Field codes 1-6. QWS (Wanted Person Inquiry State) is designed to serve states that use NCIC in lieu of a state warrant database. The QWS returns all felony records with an EXL Field code of 1-6, and possible extraditable misdemeanors with an EXL Field code of A, B, E, F and C if the entering agency is from an adjacent state. The QWS also returns non-extraditable misdemeanors with an EXL Field code of D if the entering agency's ORI matches the first two characters of the inquiring agency's ORI. QWX is designed to return on the Exact Name and Date of Birth. Revised 1/1/2017 Page 37

38 Name Matching The technique used in NCIC to match the name in an inquiry with the name in a record on file is called the New York State Identification and Intelligence System (NYSIIS). NYSIIS is used in the Name (NAM), Alias (AKA) and Protected Person Name (PPN) fields of the person files and the Owner (OWN) field of the Securities file where the owner is an individual. When the inquiry includes both NAM and DOB, primary hits are determined by using a phonetic encoding of the last name and an exact match on the date of birth. These search parameters are based on identifiers used in the inquiry. If the last name corresponds to a name within a list of common surnames, the primary hit is further qualified by comparing the first character of the given name to the first character of a given name on a person s record. If the given name corresponds to a list of NCIC nicknames, it is replaced by a corresponding proper name. For example, Bill is replaced by William and Betty is replaced with Elizabeth. If the last name contains a hyphen (-), primary hits are determined by using each hyphenated name part as a last name as well as all combinations of the hyphenated name parts. For example, a surname of Saenz-Parada-Lopez will be searched as Saenz-Parada-Lopez, Saenz-Lopez-Parada, Lopez-Parada-Saenz, Lopez-Saenz-Parada, Parada-Saenz-Lopez, Parada-Lopez-Saenz, Saenz, Parada, and Lopez. Expanded Name Search If the value of ENS is the character "Y" and NAM and DOB are specified, primary hits are determined using each name part as a last name, interchanging the remaining name parts as given names. For example: Bryan, Morgan Lee; Bryan, Lee Morgan; Morgan, Lee Bryan; Morgan, Bryan Lee; Lee, Morgan Bryan and Lee, Bryan Morgan. Sex and Race Sex and race should be included to minimize multiple hits by limiting the scope of the name search. Including sex will cause NCIC to search only those records containing the same SEX code as the SEX code in the inquiry. Also, the inclusion of race in an inquiry can limit the search made by NCIC. Race Field codes and the race codes that will be searched when each is included in an inquiry are the following: o Asian or Pacific Islander (A) all race codes searched o American Indian or Alaskan Native (I) - all race codes searched o Black (B) all race codes searched except W o White (W) - all race codes searched except B o Unknown (U) - all race codes searched Revised 1/1/2017 Page 38

39 Date of Birth An NCIC inquiry containing a DOB will search on the exact date of birth; therefore, additional inquiries may be made varying the year. When the subject of the inquiry uses more than one DOB, the person's name should be checked using each available birth date. NCIC will search for all matching records that contain the exact DOB and a surname that is a phonetic match to the surname in the inquiry. Expanded Date of Birth Search If the value of the EBS Field is the numeric 1, primary hits are determined by NCIC searching the exact month and day and a range of plus or minus 1 year of the input date of birth. If the input value of the EBS Field is the numeric 3, primary hits are determined by an NCIC search of records with the exact month and day, plus or minus 1 year, and records with the month and day of the input date of birth transposed. If the EBS Field is not included or is blank, primary hits are determined by an NCIC search of records with the exact date of birth. Positive QWA Return: 1L01HEADER WA ***MESSAGE KEY QWA SEARCHES ALL NCIC PERSONS FILES WITHOUT LIMITATIONS. MKE/WANTED PERSON EXL/B - LIMITED EXTRADITION SEE MIS FIELD ORI/MD NAM/SMITH,JOHN J SEX/M RAC/W ETN/H POB/TX DOB/ HGT/510 WGT/175 EYE/BRO HAI/BRO SKN/DRK SMT/SC R HND MNU/AS SOC/ OFF/RAPE - GUN DOW/ OCA/ MIS/EXTR EAST OF MISSISSIPPI ONLY ORI IS ANY CITY PD MD NIC/W DTE/ EST DLU/ EST IMMED CONFIRM WARRANT AND EXTRADITION WITH ORI Special File Hits Related to Wanted Persons Inquiry The NCIC and TCIC systems cross-search the following files in response to a Person Inquiry. Wanted Person Protection Order Foreign Fugitive Identity Theft Missing Person Protective Interest Person With Information Property Files NCIC Gang/TXGang Registered Sexual Offender Known or Appropriately Suspected Terrorist Violent Person NICS Denied Transaction Threat Against Peace or Detention Officer Alert Supervised Release Handgun Licensee Immigration Violator Child Safety Check Alert List Revised 1/1/2017 Page 39

40 Immigration Violator File The Immigration Violator File contains records on criminal aliens who have been deported for drug trafficking, firearms trafficking, or serious violent crimes and on foreign-born individuals who have violated some section of the Immigration and Nationality Act. The U.S. Department of Homeland Security s Bureau of Immigration and Customs Enforcement (ICE) is the only agency authorized to enter and maintain records in the Immigration Violator File in one of three categories: the Deported Felon Category, the Absconder Category, or the National Security Entry-Exit Registration System (NSEERS) Category. Deported Felon Category: The Deported Felon Category contains records of previously deported felons who have been convicted and deported for drug trafficking, firearms trafficking, or serious violent crimes. Absconder Category: The Absconder Category contains records of individuals with an outstanding administrative warrant of removal from the United States who have unlawfully remained in the United States. NSEERS Category: The NSEERS Category contains records of individuals with an outstanding administrative warrant for failure to comply with the national security registration requirements. Procedures for Handling a Hit If the inquiry is made on an individual (i.e., traffic stop) and the encountering agency has no other reason for detaining the subject, appropriate procedures will depend upon whether state or local laws permit detainment and/or arrest. When an agency receives a return in response to an NCIC inquiry and the whereabouts of the person inquired upon is known and the person inquired upon appears to be identical with the subject of an ICE record, the agency must confirm the alien's status with the ICE at After confirmation, the ICE will provide direction regarding the arrest/detention of the subject. When an agency receives a record in response to an NCIC inquiry and the whereabouts of the person inquired upon is not known, confirmation is not required by the ICE. Revised 1/1/2017 Page 40

41 Positive Return Deported Felon Category: ***MESSAGE KEY QW SEARCHES WANTED PERSON FILE FELONY RECORDS REGARDLESS OF EXTRADITION AND MISDEMEANOR RECORDS INDICATING POSSIBLE INTERSTATE EXTRADITION FROM THE INQUIRING AGENCY S LOCATION. ALL OTHER NCIC PERSONS FILES ARE SEARCHED WITHOUT LIMITATIONS. WARNING REGARDING FOLLOWING RECORD - SUBJECT OF NIC/N IS A PREVIOUSLY DEPORTED FELON. CONTACT LESC AT (877) FOR IMMEDIATE HIT CONFIRMATION AND AVAILABILITY OF BUREAU OF IMMIGRATION AND CUSTOMS ENFORCEMENT DETAINER. MKE/IMMIGRATION VIOLATION - DEPORTED FELON ORI/VTINS1000 NAM/SMITH, JOHN SEX/M RAC/W ETN/H POB/FN DOB/ HGT/510 WGT/180 EYE/BRO HAI/BRO CTZ/FN SKN/DRK SMT/SC LF ARM SOC/ OFF/SUBJECT IS A DEPORTED CRIMINAL/AGGRAVATED FELON OCA/ASD1234-T MIS/KNOWN AS JOHNNY BOY ORI IS BUREAU OF IMMIGRATION AND CUSTOMS ENFORCEMENT, LAW ENFORCEMENT SUPPORT CENTER (877) NIC/N DTE/ EDT DLU/ EST *****THIS RECORD MAY BE USED ONLY BY CRIMINAL JUSTICE AGENCIES FOR CRIMINAL JUSTICE PURPOSES. *****END OF IMMIGRATION VIOLATOR FILE RESPONSE***** Positive Return Absconder Category: WARNING REGARDING FOLLOWING RECORD - SUBJECT OF NIC/N HAS AN OUTSTANDING ADMINISTRATIVE WARRANT OF REMOVAL FROM THE UNITED STATES. CONTACT LESC AT (877) FOR IMMEDIATE HIT CONFIRMATION AND AVAILABILITY OF BUREAU OF IMMIGRATION AND CUSTOMS ENFORCEMENT DETAINER. MKE/IMMIGRATION VIOLATION - FAILURE TO APPEAR FOR REMOVAL ORI/VTINS1000 NAM/SMITH, JOHN SEX/M RAC/W ETN/H POB/FN DOB/ HGT/510 WGT/180 EYE/BRO HAI/BRO CTZ/FN SKN/DRK SMT/SC LF ARM SOC/ OFF/ALIEN UNLAWFULLY PRESENT DUE TO ORDER OF REMOVAL OR EXCLUSION FROM THE USA OCA/ASD1234-T MIS/KNOWN AS JOHNNY BOY ORI IS BUREAU OF IMMIGRATION AND CUSTOMS ENFORCEMENT, LAW ENFORCEMENT SUPPORT CENTER (877) NIC/N DTE/ EDT DLU/ EST *****THIS RECORD MAY BE USED ONLY BY CRIMINAL JUSTICE AGENCIES FOR CRIMINAL JUSTICE PURPOSES. *****END OF IMMIGRATION VIOLATOR FILE RESPONSE***** Revised 1/1/2017 Page 41

42 Positive Return NSEERS Category: WARNING REGARDING FOLLOWING RECORD - SUBJECT OF NIC/N HAS AN OUTSTANDING ADMINISTRATIVE WARRANT OF ARREST FOR IMMIGRATION VIOLATIONS FOR FAILURE TO COMPLY WITH NATIONAL SECURITY REGISTRATION. CONTACT LESC AT (877) FOR IMMEDIATE HIT CONFIRMATION AND AVAILABILITY OF BUREAU OF IMMIGRATION AND CUSTOMS ENFORCEMENT DETAINER. MKE/IMMIGRATION VIOLATION - NATIONAL SECURITY REGISTRATION ORI/VTINS1000 NAM/SMITH, JOHN SEX/M RAC/W ETN/H POB/FN DOB/ HGT/510 WGT/180 EYE/BRO HAI/BRO CTZ/FN SKN/DRK SMT/SC LF ARM SOC/ OFF/SOUGHT FOR VIOLATION OF NATIONAL SECURITY REGISTRATION OCA/ASD1234-T MIS/KNOWN AS JOHNNY BOY ORI IS BUREAU OF IMMIGRATION AND CUSTOMS ENFORCEMENT, LAW ENFORCEMENT SUPPORT CENTER (877) NIC/N DTE/ EDT DLU/ EST *****THIS RECORD MAY BE USED ONLY BY CRIMINAL JUSTICE AGENCIES FOR CRIMINAL JUSTICE PURPOSES. *****END OF IMMIGRATION VIOLATOR FILE RESPONSE***** Revised 1/1/2017 Page 42

43 Foreign Fugitive File The Foreign Fugitive File established July 1, 1987, contains information on persons wanted in connection with offenses committed outside the United States. There are two types of records in the Foreign Fugitive File: Canadian records and International Criminal Police Organization (INTERPOL) records. Canadian records contain information on persons wanted for violations of the Criminal Code of Canada based upon Canada-wide warrants. INTERPOL records contain information on persons wanted by authorities in other countries. The Royal Canadian Mounted Police (RCMP) is the only authorized Canadian agency that can enter and update Canadian records. A user receiving a Canadian record in response to an inquiry is advised in a caveat that the fugitive is wanted on a Canadian warrant and no arrest can be executed in the United States solely on that basis. The caveat further directs the inquiring agency to contact the RCMP to initiate the process of obtaining a U.S. extradition warrant (3184 Warrant), as authorized by Title 18, USC, Section INTERPOL records contain information entered for foreign countries by the United States National Central Bureau (USNCB) of INTERPOL, which is housed in the U.S. Department of Justice. The National Central Bureau of any country may issue a wanted flyer, known as a Red Notice, for a fugitive wanted within its respective country. The Red Notice requests the arrest of the fugitive with the intention that extradition will occur. In addition to the fugitive's physical description, the Red Notice contains details of the charge(s), warrant information and prior criminal history information. Red Notices are distributed to the National Central Bureaus in all INTERPOL member countries. Upon receipt of a Red Notice, the USNCB reviews the information and enters an NCIC Foreign Fugitive File record if the entry criteria are met. Any agency making an inquiry on a foreign fugitive will be advised that the fugitive cannot be arrested solely upon the NCIC Foreign Fugitive File record and to contact the USNCB/INTERPOL. The USNCB is responsible for confirming that the foreign arrest warrant is still outstanding, determining whether the foreign country will proceed with extradition and notifying other U.S. Department of Justice officials to have a U.S. arrest warrant issued. Revised 1/1/2017 Page 43

44 Positive Return: ***MESSAGE KEY QW SEARCHES WANTED PERSON FILE FELONY RECORDS REGARDLESS OF EXTRADITION AND MISDEMEANOR RECORDS INDICATING POSSIBLE INTERSTATE EXTRADITION FROM THE INQUIRING AGENCY S LOCATION. ALL OTHER NCIC PERSONS FILES ARE SEARCHED WITHOUT LIMITATIONS. WARNING - DO NOT ARREST BASED UPON THIS FOREIGN FUGITIVE RECORD. MKE/FUGITIVE FROM A FOREIGN COUNTRY ORI/DCINTER00 NAM/SMITH, JOHN SEX/M RAC/W ETN/H POB/CR DOB/ HGT/510 WGT/175 EYE/BRO HAI/BRO SKN/DRK OFF/KIDNAP ADULT FOR RANSOM DOW/ OCA/RN-1234 MIS/WARRANT ISSUED BY COSTA RICA ORI IS INTERPOL U.S. DOJ WASHINGTON DC NIC/W DTE EDT DLU/ EST REPEAT - DO NOT ARREST BASED UPON NCIC RECORD WITH NIC/W FUGITIVE FROM A FOREIGN COUNTRY - IMMEDIATELY CONTACT INTERPOL, U.S. DOJ, NLETS ORI/DCINTER00, OR TEL NO. (555) ALSO, IF THE SUBJECT IS NOT A U.S. CITIZEN, CONTACT THE NEAREST OFFICE OF THE U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT NO NCIC WANT SOC/ Revised 1/1/2017 Page 44

45 NCIC Gang File (QW, QWA, QGG) The NCIC Gang File has been designed to provide identifying information about violent criminal gangs and members of those gangs to law enforcement personnel. This information serves to warn law enforcement officers of the potential danger posed by violent individuals and to promote the exchange of information about gangs and members to facilitate criminal investigations. Because the Gang File information is based, in part, on investigative information not previously subject to independent judicial review, strict adherence to policy on the security, use and dissemination of Gang File information is necessary. Security Gang File information is exclusively for the use of criminal justice agencies for criminal justice purposes and should never be disseminated to any noncriminal justice agency. The security measures afforded to criminal history record information as set out in the CJIS Security Policy should be followed with respect to the Gang File and the information contained therein. The Group Reference Capability (GRC) provides information about gangs. This capability can be accessed by an individual QGG inquiry. Positive Return- Does not require hit confirmation MKE/CRIMINAL GANG GNG/CRIPS*WADC SGP/ROLLING 50S*WADC CONTACT AGENCIES: CA SGT JACOBS, GANG UNIT CAFBILA00 SA L PEREZ MD GANG UNIT DATE FIRST ENTRY/ TTO/TAT L CHK TEARDROP TTO/TAT R CHK DAGGER DRS/BLACK CHISOX CAP DRS/BLUE BANDANNA DRS/BRITISH KNIGHTS SNEAKERS HND/CIR THUMB AND RING FNGR GTI/BK GTI/50S MIS/PROFESS TO ATTACK POLICE ON ANY CONTACT AGENCIES LISTED FOR FURTHER INFORMATION ON THIS GANG The Group Member Capability (GMC) provides information in a format similar to Wanted Person File records about individual members of gangs. This capability can be accessed by the automatic cross-search with all files searched by a QW, QWA, QW-X, QWE, QWF, QWS or ZW inquiry (or any related transaction such as an entry which generates an inquiry). Revised 1/1/2017 Page 45

46 Positive Return: DOES NOT FURNISH GROUNDS FOR THE SEARCH AND SEIZURE OF ANY INDIVIDUAL, VEHICLE, OR DWELLING MKE/CRIMINAL GANG MEMBER - CAUTION CMC/05 - VIOLENT TENDENCIES ORI/MD NAM/SMITH, STEVE SEX/M RAC/W ETN/H POB/MD DOB/ HGT/601 WGT/209 EYE/BLU HAI/BRO FBI/ CTZ/US SKN/ALB SMT/SC R HND FPC/121011C01159TTCI13TT MNU/MD SOC/ OLN/ OLS/MD OLY/1995 GNG/CRIPS*WADC SGP/ROARING 50S*WADC ECR/BD DOP/ OCA/ LKI/MD LKA/MD-2255 MIS/KNOWN TO CARRY TEC 9, TTO IS TEARDROP LIC/ABC123 LIS/MD LIY/1993 LIT/PC VIN/2627HL VYR/1988 VMA/CHEV VMO/CEL VST/4D VCO/BLU ORI IS HARPERS FERRY PD MD DOB/ AKA/BEBETO, X AKA/JONES, JOHN AKA/LEON, JOSE NIC/T DTE/ EST DLU/ EST NO NCIC RECORD VIN/2ADF36BLIG Revised 1/1/2017 Page 46

47 TX Gang File (QW, QWA, QWE) The TxGang file is a statewide gang database provided to all criminal justice agencies in Texas. Gang members who are entered into the database are automatically uploaded to the NCIC Gang File (although they are NOT sent to TCIC), which means wanted queries or multi-purpose queries using a NAM/DOB combo on those individuals will generate a Caution: Gang member return from NCIC. The return is merely meant to give the officer situational awareness (similar to a Sex Offender return) and is not, by itself, an actionable item. It is not probable cause to arrest, search or detain. Positive Return- Does not require hit confirmation MKE/CRIMINAL GANG MEMBER - CAUTION ORI/TXDPS0000 NAM/MEMBER,GANG SEX/M RAC/W DOB/ GNG/TXGANG*SWTX SGP/SEE MIS FIELD*SWTX ECR/EF DOP/NONEXP OCA/1 MIS/CRIPS TXDPS0000 TX ST OPRTNS CNTR AUSTIN DNA/N ORI IS TEXAS STATE OPERATIONS CENTER AUSTIN NIC/T DTE/ EDT DLU/ EDT Gang Name (GNG) Due to NCIC Gang file rules, all will be listed as TXGANG*SWTX (State Wide Texas) with the actual gang name is listed in the MIS field. Subgroup (SGP) Some gangs are subgroups of others, although due to NCIC Gang file structure this will always be listed as SEE MIS FIELD*SWTX Entry Criteria (ECR) The defining criteria used to enter the gang member ranges from self-confession or judicial finding, to tattoos and dress. Only a portion of the TxGang file is uploaded to NCIC. Agencies desiring further information may access the TxGang web-based databank or directly contact the entering agency with information provided in the NCIC return. There is no charge to inquire or enter into TxGang and it is accessible via the internet to any interested criminal justice agency. Each agency must submit an agency agreement with each user submitting an individual application. Any questions or concerns about the database or requests for access should be directed to: txgang@dps.texas.gov. Revised 1/1/2017 Page 47

48 Known or Appropriately Suspected Terrorist File The Terrorist Screening Center (TSC) was established to consolidate the Federal Government s approach to terrorism screening and to provide the appropriate and lawful use of terrorist information in the overall screening process. This was created after the Homeland Security Directive-6 was signed in September The TSC alone has the authority to enter and update a record for an individual who has been nominated as a known or appropriately suspected terrorist subject to the TSC. DO NOT advise the individual that they may be on a terrorist watch list. Unauthorized disclosure of terrorist watch list information is PROHIBITED. There are four different Handling Codes utilized by the TSC for KST File records. Based upon the Handling Code in the hit return, the receiving agency should adhere to the information and direction within the caveat. The following caveat examples do not include the correct telephone number for the TSC. The correct telephone number will be in the caveat and the hit response. Handling Code 1 Records ***LAW ENFORCEMENT SENSITIVE INFORMATION*** WARNING - APPROACH WITH CAUTION THIS INDIVIDUAL IS ASSOCIATED WITH TERRORISM AND IS THE SUBJECT OF AN ARREST WARRANT, ALTHOUGH THE WARRANT MAY NOT BE RETRIEVABLE VIA THE SEARCHED IDENTIFIERS. IF AN ARREST WARRANT FOR THE INDIVIDUAL IS RETURNED IN YOUR SEARCH OF NCIC, DETAIN THE INDIVIDUAL PURSUANT TO YOUR DEPARTMENT'S PROCEDURES FOR HANDLING AN OUTSTANDING WARRANT, AND IMMEDIATELY CONTACT THE TERRORIST SCREENING CENTER (TSC) AT (866) XXX-XXXX FOR ADDITIONAL DIRECTION. IF AN ARREST WARRANT FOR THE INDIVIDUAL IS NOT RETURNED, USE CAUTION AND IMMEDIATELY CONTACT THE TSC AT (866) XXX-XXXX FOR ADDITIONAL DIRECTION. WITHOUT OTHERWISE EXTENDING THE SCOPE OR DURATION OF THE ENCOUNTER. IF YOU ARE A BORDER PATROL OFFICER IMMEDIATELY CALL THE NTC. UNAUTHORIZED DISCLOSURE OF TERRORIST WATCHLIST INFORMATION IS PROHIBITED. DO NOT ADVISE THIS INDIVIDUAL THAT THEY MAY BE ON A TERRORIST WATCHLIST. INFORMATION THAT THIS INDIVIDUAL MAY BE ON A TERRORIST WATCHLIST IS PROPERTY OF THE TSC AND IS A FEDERAL RECORD PROVIDED TO YOUR AGENCY THAT MAY NOT BE DISSEMINATED OR USED IN ANY PROCEEDING WITHOUT THE ADVANCE AUTHORIZATION OF THE TSC. Revised 1/1/2017 Page 48

49 ***LAW ENFORCEMENT SENSITIVE INFORMATION*** MKE/POSSIBLE TERRORIST ORGANIZATION MEMBER CAUTION CONTACT THE TERRORIST SCREENING CENTER XXX-XXXX CMC/70 - SUICIDAL ORI/DCTSC0100 NAM/SMITH, JOHN SEX/M RAC/U ETN/N POB/JO DOB/ HGT/604 WGT/202 EYE/BRO HAI/BLK CTZ/US MNU/AR SOC/ GNG/INTRNTL XTMST*IFBI SGP/HANDLING CODE 1*IFBI ECR/H DOP/NONEXP OCA/ MIS/USPER; NC DNA/N ORI IS FBI TERRORIST SCREENING CENTER 866 XXX-XXXX IMN/I IMT/M NIC/T DTE/ EDT DLU/ EDT Handling Code 2 Records ***LAW ENFORCEMENT SENSITIVE INFORMATION*** WARNING - APPROACH WITH CAUTION THIS INDIVIDUAL IS OF INVESTIGATIVE INTEREST TO LAW ENFORCEMENT REGARDING ASSOCIATION WITH TERRORISM AND THERE MAY BE A DETAINER AVAILABLE FROM THE DEPARTMENT OF HOMELAND SECURITY FOR THIS INDIVIDUAL. IMMEDIATELY CONTACT THE TERRORIST SCREENING CENTER (TSC) AT (866) XXX-XXXX OR, IF YOU ARE A BORDER PATROL OFFICER, IMMEDIATELY CALL THE NTC TO ASCERTAIN IF A DETAINER IS AVAILABLE FOR THE INDIVIDUAL AND TO OBTAIN ADDITIONAL DIRECTION. PLEASE QUESTION THIS INDIVIDUAL TO ASSIST THE TSC IN DETERMINING WHETHER THE INDIVIDUAL ENCOUNTERED IS THE SUBJECT OF A DETAINER WITHOUT OTHERWISE EXTENDING THE SCOPE OR DURATION OF THE ENCOUNTER. UNAUTHORIZED DISCLOSURE OF TERRORIST WATCHLIST INFORMATION IS PROHIBITED. DO NOT ADVISE THIS INDIVIDUAL THAT THEY MAY BE ON A TERRORIST WATCHLIST. INFORMATION THAT THIS INDIVIDUAL MAY BE ON A TERRORIST WATCHLIST IS PROPERTY OF THE TSC AND IS A FEDERAL RECORD PROVIDED TO YOUR AGENCY THAT MAY NOT BE DISSEMINATED OR USED IN ANY PROCEEDING WITHOUT THE ADVANCE AUTHORIZATION OF THE TSC. Revised 1/1/2017 Page 49

50 ***LAW ENFORCEMENT SENSITIVE INFORMATION*** MKE/POSSIBLE TERRORIST ORGANIZATION MEMBER CAUTION CONTACT THE TERRORIST SCREENING CENTER XXX-XXXX CMC/70 - SUICIDAL ORI/DCTSC0100 NAM/SMITH, JOHN SEX/M RAC/U ETN/N POB/JO DOB/ HGT/604 WGT/202 EYE/BRO HAI/BLK CTZ/US MNU/AR SOC/ GNG/INTRNTL XTMST*IFBI SGP/HANDLING CODE 2*IFBI ECR/H DOP/NONEXP OCA/ MIS/USPER; NC DNA/N ORI IS FBI TERRORIST SCREENING CENTER 866 XXX-XXXX IMN/I IMT/M NIC/T DTE/ EDT DLU/ EDT Handling Code 3 Records ***LAW ENFORCEMENT SENSITIVE INFORMATION*** DO NOT ADVISE THIS INDIVIDUAL THAT THEY MAY BE ON A TERRORIST WATCHLIST. CONTACT THE TERRORIST SCREENING CENTER (TSC) AT (866) XXX-XXXX DURING THIS ENCOUNTER. IF THIS WOULD EXTEND THE SCOPE OR DURATION OF THE ENCOUNTER CONTACT THE TSC IMMEDIATELY THEREAFTER. IF YOU ARE A BORDER PATROL OFFICER IMMEDIATELY CALL THE NTC. ATTEMPT TO OBTAIN SUFFICIENT IDENTIFYING INFORMATION DURING THE ENCOUNTER, WITHOUT OTHERWISE EXTENDING THE SCOPE OR DURATION OF THE ENCOUNTER, TO ASSIST THE TSC IN DETERMINING WHETHER OR NOT THE NAME OR IDENTIFIER(S) YOU QUERIED BELONGS TO AN INDIVIDUAL IDENTIFIED AS HAVING POSSIBLE TIES WITH TERRORISM. DO NOT DETAIN OR ARREST THIS INDIVIDUAL UNLESS THERE IS EVIDENCE OF A VIOLATION OF FEDERAL, STATE OR LOCAL STATUTES. UNAUTHORIZED DISCLOSURE IS PROHIBITED. INFORMATION THAT THIS INDIVIDUAL MAY BE ON A TERRORIST WATCHLIST IS THE PROPERTY OF THE TSC AND IS A FEDERAL RECORD PROVIDED TO YOUR AGENCY ONLY FOR INTELLIGENCE AND LEAD PURPOSES. THIS RECORD, AND ANY INFORMATION CONTAINED WITHIN IT, MAY NOT BE DISCLOSED OR USED IN ANY PROCEEDING WITHOUT THE ADVANCE AUTHORIZATION OF THE TSC. Revised 1/1/2017 Page 50

51 WARNING - APPROACH WITH CAUTION ***LAW ENFORCEMENT SENSITIVE INFORMATION*** ***DO NOT ADVISE THIS INDIVIDUAL THAT THEY ARE ON A TERRORIST WATCHLIST*** MKE/POSSIBLE TERRORIST ORGANIZATION MEMBER CAUTION CONTACT THE TERRORIST SCREENING CENTER XXX-XXXX CMC/70 - SUICIDAL ORI/DCTSC0100 NAM/SMITH, JOHN SEX/M RAC/U ETN/N POB/JO DOB/ HGT/604 WGT/202 EYE/BRO HAI/BLK CTZ/US MNU/AR SOC/ GNG/INTRNTL XTMST*IFBI SGP/HANDLING CODE 3*IFBI ECR/H DOP/NONEXP OCA/ MIS/USPER; NC DNA/N ORI IS FBI TERRORIST SCREENING CENTER 866 XXX-XXXX IMN/I IMT/M NIC/T DTE/ EDT DLU/ EDT Handling Code 4 Records ***LAW ENFORCEMENT SENSITIVE INFORMATION*** DO NOT ADVISE THIS INDIVIDUAL THAT THEY MAY BE CONSIDERED A PERSON WHO MAY BE OF NATIONAL SECURITY INTEREST. CONTACT THE FEDERAL BUREAU OF INVESTIGATION (FBI) AT (866) XXX- XXXX DURING THIS ENCOUNTER. IF THIS WOULD EXTEND THE SCOPE OR DURATION OF THE ENCOUNTER, CONTACT THE FBI IMMEDIATELY THEREAFTER. IF YOU ARE A BORDER PATROL OFFICER IMMEDIATELY CALL THE NTC. ATTEMPT TO OBTAIN SUFFICIENT IDENTIFYING INFORMATION DURING THE ENCOUNTER, WITHOUT OTHERWISE XTENDING THE SCOPE OR DURATION OF THE ENCOUNTER, TO ASSIST THE FBI IN DETERMINING WHETHER OR NOT THE NAME OR IDENTIFIER(S) YOU QUERIED BELONGS TO AN INDIVIDUAL IDENTIFIED AS A FORMER MILITARY DETAINEE. DO NOT DETAIN OR ARREST THIS INDIVIDUAL UNLESS THERE IS EVIDENCE OF A VIOLATION OF FEDERAL, STATE, OR LOCAL STATUTE(S). UNAUTHORIZED DISCLOSURE IS PROHIBITED. INFORMATION THAT THIS INDIVIDUAL MAY BE A PERSON WHO MAY BE OF NATIONAL SECURITY INTEREST IS THE PROPERTY OF THE FBI AND IS A FEDERAL RECORD PROVIDED TO YOUR AGENCY ONLY FOR INTELLIGENCE AND LEAD PURPOSES. THIS RECORD, AND ANY INFORMATION CONTAINED WITHIN IT, MAY NOT BE DISCLOSED OR USED IN ANY PROCEEDING WITHOUT THE ADVANCE AUTHORIZATION OF THE FBI. Revised 1/1/2017 Page 51

52 WARNING APPROACH WITH CAUTION ***LAW ENFORCEMENT SENSITIVE INFORMATION*** ***DO NOT ADVISE THIS INDIVIDUAL THAT THEY ARE ON A TERRORIST WATCHLIST*** MKE/POSSIBLE TERRORIST ORGANIZATION MEMBER CAUTION CONTACT THE TERRORIST SCREENING CENTER XXX-XXXX CMC/70 SUICIDAL ORI/DCTSC0100 NAM/SMITH, JOHN SEX/M RAC/B ETN/N POB/JO DOB/ HGT/604 WGT/202 EYE/BRO HAI/BLK CTZ/US MNU/AR SOC/ GNG/INTRNTL XTMST*IFBI SGP/HANDLING CODE 4*IFBI ECR/H DOP/NONEXP OCA/ MIS/USPER; NC DNA/N ORI IS FBI TERRORIST S SCREENING CENTER (866) XXX-XXXX IMN/I IMT/M NIC/T DTE/ EDT DLU/ EDT Revised 1/1/2017 Page 52

53 Protective Interest File The Protective Interest File (PIF) has been designed to aid law enforcement agencies in their protective mission. Only law enforcement agencies with a protective mission as specified within municipal, state or federal statutes, regulations or other appropriate legal authority may enter and update records in the PIF. A record may be entered into the PIF for an individual for whom, based on its law enforcement investigation, the authorized agency reasonably believes may pose a threat to the physical safety of a protectee or their immediate family. A record entered into the PIF will assist agencies in determining the threatener s location and may provide the record owner with information related to the threatener s criminal activity. When an agency receives a record in response to an NCIC inquiry and (1) the whereabouts of the person inquired upon is known and (2) the person inquired upon appears to be identical with the subject of one or more of the records, the agency must contact the ORI of the record possibly identical with the person in question to confirm the record information prior to taking official action based on the record information. Positive Return- Does not require hit confirmation WARNING-DO NOT ARREST OR DETAIN BASED SOLELY UPON THIS INFORMATION. MKE/POTENTIALLY DANGEROUS THREAT TO U.S. SECRET SERVICE PROTECTEE CMC/05 - VIOLENT TENDENCIES ORI/DCSS802Q1 NAM/SMITH, JOHN J SEX/M RAC/W ETN/H POB/TX DOB/ HGT/510 WGT/175 EYE/BRO HAI/BRO FBI/ CTZ/US SKN/DRK SMT/SC R HND FPC/121011CO141159TTCI13 MNU/AS SOC/ OLN/ OLS/MD OLY/1999 DTT/ OCA/ MIS/KNOWN TO THREATEN PRESIDENT LIC/ABC123 LIS/MD LIY/2000 LIT/PC VIN/2Y27H5LI00009 VYR/1975 VMA/PONT VMO/VEN VST/2D VCO/BLU ORI IS U.S. SECRET SERVICE INTELLIGENCE DIV WASHINGTON NIC/K DTE/ DLU/ *****REPEAT-DO NOT ARREST OR DETAIN BASED SOLELY UPON THIS INFORMATION ***CALL COLLECT U.S. SECRET SERVICE HEADQUARTERS, TEL NO WHICH HAS BEEN NOTIFIED OF THIS TRANSACTION. THIS RECORD IS FOR CRIMINAL JUSTICE AGENCIES FOR CRIMINAL JUSTICE PURPOSES. ***DO NOT DISSEMINATE OR USE FOR LICENSING AND EMPLOYMENT PURPOSES***** Revised 1/1/2017 Page 53

54 Supervised Release File Local, state and federal supervision officers may enter records in NCIC for subjects who are put under specific restrictions during their probation, parole, supervised release sentence or pretrial sentencing. Positive Return- Does not require hit confirmation ***MESSAGE KEY QW SEARCHES WANTED PERSON FILE FELONY RECORDS REGARDLESS OF EXTRADITION AND MISDEMEANOR RECORDS INDICATING POSSIBLE INTERSTATE EXTRADITION FROM THE INQUIRING AGENCY S LOCATION. ALL OTHER NCIC PERSONS FILES ARE SEARCHED WITHOUT LIMITATIONS. WARNING - DO NOT ARREST BASED ON THIS INFORMATION MKE/PROBATION OR SUPERVISED RELEASE STATUS ORI/VA013123G NAM/SMITH, JOHN J SEX/M RAC/W ETN/H POB/TX DOB/ HGT/510 WGT/175 EYE/BRO HAI/BRO FBI/123456A CTZ/US SKN/DRK SMT/SC R HD FPC/121011CO141159TTCI13 MNU/AS SOC/ OLN/ OLS/MD OLY/2000 OOC/ROBBERY OCA/ MIS/SUBJECT ON PAROLE MAY NOT LEAVE THE AREA PROHIBITED TO MIS/FREQUENT BARS LIC/ABC123 LIS/VA LIY/1999 LIT/PC VIN/2F37Z7P VYR/1977 VMA/PONT VMO/LEM VST/2D VCO/WHI DPE/ SCI/VA123456J LOC/ANY COUNTY VA PAROLE OFFICE DSS/ SON/FITZPATRICK, JOHN SOT/ ARI/VA INC/VA STATE PENITENTIARY DOA/ ORI IS ANY CITY PAROLE OFFICE VA IMN/I IMT/M NIC/C DTE/ EDT DLU/ EST REPEAT - PROBATION OR SUPERVISED RELEASE STATUS RECORD - DO NOT ARREST BASED ON THIS INFORMATION - PLEASE CONTACT SUPERVISING AGENCY VIA NLETS, TELEPHONE OR TO ADVISE OF CONTACT WITH SUPERVISED INDIVIDUAL. PLEASE BE ADVISED THAT SUPERVISING AGENCY MAY NOT BE OPERATIONAL 24/7. NO NCIC WANT VIN/ABC123DEF ***VERIFY VIN/ABC123DEF ; IT DOES NOT CONFORM TO VIN STANDARDS FOR 1981 AND LATER VEHICLES. Revised 1/1/2017 Page 54

55 Identity Theft File The Identity Theft File will serve as a means for law enforcement to "flag" stolen identities and identify the imposter when encountered by law enforcement. When an identity theft victim becomes aware that his/her identity has been stolen and reports the incident to law enforcement, the agency's handling of the identity theft case should parallel the criteria as outlined in this chapter. The police officer should complete an incident report and collect pertinent information from the victim to create a victim profile that is entered into the Identity Theft File. The agency enters the information only after the victim signs a consent waiver. The waiver states that the victim provides permission for the information to be entered in the Identity Theft File. It also acknowledges that the victim may withdraw the consent by providing a written request to the entering agency. At that time, the record will be canceled from the Identity Theft File. The profile should include information such as the victim's name, date of birth, Social Security number and the type of identity theft. In addition, a password is established either by the victim or the police officer and entered into the Identity Theft File. The password will identify the person as the victim and should be provided to the victim when the police report is filed. (The victim should retain the password to use during any potential future police encounters.) Agencies may also enter a mugshot of the victim into NCIC. The mugshot may be used as an additional form of identification for the victim. When the mugshot is retrieved, it must clearly specify that the mugshot is that of the victim and not that of the offender. During a subsequent encounter by law enforcement, including routine traffic stops, a person query into NCIC will automatically search the Identity Theft File and, if positive, generate a response to the inquiring agency. The officer will receive a response listing the victim profile, including the password, thereby providing the officer with the information necessary to verify that the person encountered is the victim or that the person may be using a false identity. The officer should be cognizant that the individual should not be arrested or detained based solely upon the information provided in the positive response from the Identity Theft File. The response should be considered along with additional information or circumstances surrounding the encounter before the officer takes action. Information on deceased persons may also be entered into the Identity Theft File. If a police officer becomes aware of a deceased person s identity being stolen, that information can be entered into the file noting that the person is deceased. Revised 1/1/2017 Page 55

56 Positive Return- Does not require hit confirmation WARNING - THE IDENTITY OF THE SUBJECT IDENTIFIED IN THIS RECORD HAS BEEN REPORTED STOLEN. REVIEW THE VICTIM PROFILE AND USE CAUTION IN VERIFYING THE IDENTITY OF THIS PERSON. THE PASSWORD INCLUDED IN THIS RESPONSE HAS BEEN ASSIGNED TO THE IDENTITY THEFT VICTIM. VERIFY THAT THE SUBJECT OF INQUIRY CAN CONFIRM THE PASSWORD. MKE/IDENTITY THEFT PERSON ORI/MD NAM/SMITH, JOHN J SEX/M RAC/W ETN/H POB/MD DOB/ HGT/601 WGT/202 EYE/BRO HAI/BRO CTZ/US SKN/ALB SMT/SC R HND DOP/ FPC/121011CO141159TTCI13 MNU/AS SOC/ OLN/M C OLS/MD OLY/2004 OCA/ MIS/IDENTITY HAS BEEN USED IN CREDIT CARD FRAUD PWD/ TOPGUN IDT/CFRD DOT/ ORI IS ANY CITY PD NIC/J DTE/ EDT DLU/ EDT *****WARNING - STANDING ALONE, NCIC IDENTITY THEFT FILE INFORMATION DOES NOT FURNISH GROUNDS FOR THE SEARCH AND SEIZURE OF ANY INDIVIDUAL, VEHICLE, OR DWELLING.***** IMMED CONFIRM IF THIS PERSON IS THE VICTIM OR PERPETRATOR Revised 1/1/2017 Page 56

57 Threat Against Peace Or Detention Officer Alert File This file was created to establish a database to collect threat information to help protect peace officers/detention officers and to provide rapid, statewide access to information about threats made against peace officers/detention officers. This file is intended to be an alert for any officer(s) at risk due to a recorded threat by a known individual. A person who threatens a peace officer (as assigned by Section 1.07, Penal Code) can be entered into this file at the discretion of the entering agency. The threat consists of an individual s expression of intent to inflict serious bodily injury or death on a peace officer/detention officer and not be from an anonymous source. A record entered in this file indicates a potentially dangerous individual, not necessarily a wanted person. An officer or agency may only use an officer threat alert to take reasonable action to protect the officer or citizens. Positive Return- Does not require hit confirmation **************************************************************** ****CAUTION - SUBJECT KNOWN TO **** **** HAVE THREATENED PEACE OFFICERS **** **DO NOT SEARCH, DETAIN, OR ARREST BASED SOLELY ON THIS RECORD** **************************************************************** WARNING - THE FOLLOWING RECORD CONTAINS EXPIRED LICENSE PLATE DATA. USE CAUTION, CONTACT ENTERING AGENCY TO CONFIRM STATUS ***** MKE/THREAT AGAINST PEACE OR DETENTION OFFICER - CAUTION CMC/00 - ARMED AND DANGEROUS ORI/TX NAM/JONES,JOHN JAMES SEX/M RAC/W POB/NY DOB/ HGT/602 WGT/185 EYE/HAZ HAI/BRO FBI/551555CA9 CTZ/US FPC/AA6616POCOAAPI11PI14 MNU/OA-TX SOC/ OLN/ OLS/TX OLY/2017 DTM/ THR/DISAGREES WITH POLICE AUTHORITY THT/VERBAL THREAT MADE IN PERSON OCA/ MIS/JONES COMES OFF AS BEING OVERLY FRIENDLY TOWARDS LAW MIS/ENFORCEMENT BUT HAS FOUGHT WITH FIREFIGHTER AND OTHER MIS/SUBJECTS WHERE A WEAPON WAS DISCHARGED SHORTLY THEREAFTER- MIS/UNKNOWN IF SUBJECT FIRED THE SHOTS/DURING ARREST EVENT, MIS/THREAT STATEMENT INCLUDED "YOU WONDER WHY PEOPLE WANT TO MIS/SHOOT YOU" AND THAT HE WAS "GOING TO SHOOT Y'ALL" MIS/REFERENCING OFFICERS/SUBJECT IS KNOWN TO CARRY PISTOL IN MIS/VEHICLE/ CONTACT DETECTIVE HAMSEY AT OR SGT MIS/HITCHELL AT FOR FURTHER DETAILS LIC/BHT7414 LIS/TX LIY/2015 LIT/PC VIN/5J6YH28388L VYR/2008 VMA/HOND VMO/ELE VST/4D VCO/BLK Revised 1/1/2017 Page 57

58 DNA/N AKA/JONES,JOHN AKA/JONES,JOHN J AKA/JONES,JON JAMES AKA/JONES,JON J HOM/CURRENT ADDRESS HOM/ADD SOUTH LAMAR RD NUSTIN, TX TIC/TT DTE/ DLU/ ORI IS NAVIS CO SO NUSTIN Revised 1/1/2017 Page 58

59 Violent Person File The Violent Person File (VPF) was designed to alert law enforcement officers that an individual they are encountering may have the propensity for violence against law enforcement, with at least one of the following criteria: 1. Offender has been convicted for assault or murder/homicide of a law enforcement officer, fleeing, resisting arrest or any such statute which involves violence against law enforcement. 2. Offender has been convicted of a violent offense against a person to include homicide and attempted homicide. 3. Offender has been convicted of a violent offense against a person where a firearm or weapon was used. 4. A law enforcement agency, based on its official investigatory duties, reasonably believes that the individual has seriously expressed his or her intent to commit an act of unlawful violence against a member of the law enforcement or criminal justice community. Positive Return- Does not require hit confirmation WARNING-THE SUBJECT IN THIS RECORD HAS BEEN IDENTIFIED AS A VIOLENT OFFENDER. THE SUBJECT HAS A CRIMINAL HISTORY OF ASSAULTING LAW ENFORCEMENT OFFICERS. USE CAUTION IN APPROACHING THIS INDIVIDUAL. DO NOT ARREST OR DETAIN BASED SOLELY UPON THIS INFORMATION. MKE/VIOLENT PERSON CMC/05 - VIOLENT TENDENCIES ORI/VASP01000 NAM/SMITH, JOHN J SEX/M RAC/W POB/TX DOB/ HGT/510 WGT/175 EYE/BRO HAI/BRO FBI/ CTZ/US SKN/DRK SMT/SC R HND FPC/121011CO141159TTCI13 MNU/AS SOC/ OLN/ OLS/MD OLY/1999 VPC/1-ASSAULT ON LAW ENFORCEMENT OCA/ MIS/KNOWN TO THREATEN POLICE OFFICERS LIC/ABC123 LIS/MD LIY/2000 LIT/PC VIN/2Y27H5LI00009 VYR/1975 VMA/PONT VMO/VEN VST/2D VCO/BLU ORI IS VA STATE POLICE ROANOKE OFFICE NIC/L DTE/ DLU/ Revised 1/1/2017 Page 59

60 Handgun License File (QW, QGL) When a handgun license is issued, it is also entered into the TCIC Handgun License file by TXDPS. This file is searched each time a wanted person inquiry is made using transaction QW. A direct inquiry into the file is also available using transaction QGL. CWQ searches other states handgun licenses through Nlets. Effective January 1st, 2016, House Bill 910 goes into effect and authorizes individuals to obtain a license to openly carry a handgun in the same places that allow the licensed carrying of a concealed handgun. Individuals who currently hold a valid CHL license may continue to carry with the valid existing license. A separate license will NOT be required to open carry. For further information regarding the Texas Handgun Program, contact the Handgun Section at or from the Texas Department of Public Safety s website at Query Handgun License (QGL) Agency/Case Data Message Key (MKE) Originating Agency Code (ORI) Person Data Gun License Number (GLN) OLN/TID Social Security Number (SOC) Name (NAM) Sex (SEX) Race (RAC) Date of Birth (DOB) Positive Return *** WARNING - THE FOLLOWING IS A TCIC HANDGUN LICENSE. THE EXISTENCE OF THIS RECORD IS AN INDICATOR THAT THE SUBJECT HAS BEEN LICENSED TO CARRY A HANDGUN UNDER TEXAS LAW, AND NO ACTION IS REQUIRED. PLEASE REVIEW THE RECORD FOR THE CURRENT STATUS OF THIS LICENSE. *** MKE/LICENSE TO CARRY HANDGUN ORI/TX NAM/FUDD,ELMER EARL SEX/M RAC/W DOB/ HGT/402 WGT/100 EYE/HAZ HAI/BLK SOC/ OLN/ OLS/TX STS/LICENSED-ACTIVE EXP/ ACT/SEMI-AUTOMATIC GLN/ NOA/N HOM/ADD GUN AVE PISTOL CITY, TX TIC/TL DTE/ DLU/ ORI IS DEPT OF PUBLIC SAFETY TCIC NCIC CONTROL CSA Revised 1/1/2017 Page 60

61 NICS Denied Transaction File The National Instant Criminal Background Check System (NICS) is used by Federal Firearms Licensees to instantly determine whether a perspective buyer is eligible to buy firearms. The NICS Denied Transaction File (NDTF) contains records for individuals who have been denied as result of an NICS check during the last 180 days. NDTF records are entered and canceled through an interface between NCIC and NICS. The NDTF is also searched in during the entry/modification of other NCIC person files (except Unidentified Persons). NICS Denied Transaction File Inquiry (QND) Agency/Case Data NCIC Number (NIC) NICS Transaction Number (NTN) Person Data Name (NAM) Date of Birth (DOB) Sex (SEX) Race (RAC) Social Security Number (SOC) Miscellaneous Number (MNU) Positive Return 1L01HEADER WA ***** NOTICE: DO NOT DETAIN OR ARREST BASED ON THIS HIT. THE DATE OF NATIONAL INSTANT CRIMINAL BACKGROUND CHECK SYSTEM (NICS) DENIAL (DND) PROVIDED IN THIS RECORD IS THE DATE THE SUBJECT WAS DENIED BY THE NICS FROM THE PURCHASE/POSSESSION OF A FIREARM PURSUANT TO STATE AND/OR FEDERAL LAW. HOWEVER, IT IS POSSIBLE THIS SUBJECT MAY NO LONGER BE PROHIBITED FROM PURCHASING/POSSESSING FIREARMS. MKE/NICS DENIED TRANSACTION FILE ORI/WVNICS000 NAM/SMITH, JOHN J SEX/M RAC/W POB/RI DOB/ HGT/511 WGT/230 CTZ/US SOC/ SOP/NV SOR/NV DND/ NTN/ABC NIC/E DTE/ EDT DLU/ EDT *** THE INFORMATION DISPLAYED IN THIS RECORD IS A POSSIBLE MATCH TO THE INDIVIDUAL QUERIED. THIS MATCH IS BASED ON NAME AND DESCRIPTIVE DATA ONLY. NO LAW ENFORCEMENT ACTION SHOULD BE INITIATED BASED SOLELY ON THIS INFORMATION. Revised 1/1/2017 Page 61

62 Protection Order File (QW, QPO) The Protection Order File (POF) contains court orders that are issued to prevent acts of domestic violence against a person or to prevent a person from stalking, intimidating or harassing another person. Orders are issued by both civil and criminal state courts. The types of protection orders issued and the information contained in them vary from state to state. Protection orders include: Any injunction, restraining order or any other order issued by a civil or criminal court for the purpose of preventing violent or threatening acts or harassment against, sexual violence or contact or communication with or physical proximity to another person. This includes any temporary and final orders issued by civil or criminal courts whether obtained by filing an independent action or as a pendente lite order in another proceeding. Pendente Lite--During the proceeding or litigation; in a manner contingent on the outcome of litigation. (Black's Law Dictionary, 8th ed. 2004)This is true as long as any civil order was issued in response to a complaint, petition or motion filed by or on behalf of a person seeking protection and any support, child custody or visitation provisions, orders, remedies or relief issued as part of a protection order, restraining order or stay away injunction pursuant to local, state, tribal or territorial law authorizing the issuance of protection orders, restraining orders or injunctions for the protection of victims of domestic violence, dating violence, sexual assault or stalking. Additionally, reasonable notice and opportunity to be heard must be given to the person against whom the order is sought. In the case of ex parte orders, notice and opportunity to be heard must be provided within the time required by state laws, and in any event within reasonable time after the order is issued, sufficient to protect the respondent's due process rights. Ex Parte orders should be entered as temporary protection order records. Ex Parte--Done or made at the instance and for the benefit of one party only, and without notice to, or argument by, any person adversely interested; of or relating to court action taken by one party without notice to the other, usually for temporary or emergency relief. (Black's Law Dictionary, 8th ed. 2004) Revised 1/1/2017 Page 62

63 Military Protection Order A Military Protection Order that serves the same general purpose of a court-issued protection order issued in a civilian court qualifies for entry. It is issued by a commissioned officer as a lawful order under Title 10, United States Code (U.S.C.), Article 90, assaulting or willfully disobeying superior commissioned officer, of the Uniform Code of Military Justice (UCMJ 10 [U.S.C. Chapter 47]). It would be entered with PCO 08 with the following in the MISC field: THIS IS A MILITARY PROTECTIVE ORDER AND MAY NOT BE ENFORCEABLE BY NON-MILITARY AUTHORITIES. IF SUBJECT IS IN POSSIBLE VIOLATION OF THE ORDER, ADVISE THE ENTERING AGENCY (MILITARY LAW ENFORCEMENT). Hit confirmation would not be required, as NCIC policy only requires hit confirmation when taking official action based on the order. However, local, state, federal and tribal authorities would be aware of the military protective order which would enhance officer safety and could then notify the entering agency (military law enforcement) that would take appropriate action. Protection Order Inquiry Transaction (QPO) Agency/Case Data Originating Agency Code (ORI) NCIC Number (NIC) Originating Case Number (OCA) Protection Order Number (PNO) Related Search Hit (RSH) Person Data Name (NAM) Expanded Name Search (ENS) Sex (SEX) Race (RAC) Date of Birth (DOB) Expanded Date of Birth Search (EBS) Social Security Number (SOC) Miscellaneous Number (MNU) FBI Number (FBI) License Number (OLN) License Plate Data License Plate (LIC) State (LIS) Vehicle Data Vehicle ID Number (VIN) Make (VMA) Revised 1/1/2017 Page 63

64 Positive Return MKE/PROTECTION ORDER ORI/MD NAM/SMITH, JOHN J SEX/M RAC/W ETN/H POB/MD DOB/ HGT/510 WGT/175 EYE/BRO HAI/BRO FBI/416249J4 CTZ/US SKN/FAR SMT/SC L EAR FPC/121011CO141159TTCI13 MNU/AS SOC/ OLN/N OLS/MD OLY/1995 PNO/PO12345 BRD/N ISD/ EXP/ CTI/MD056013J PPN/SMITH, JANE L PSX/F PPR/W PPB/ PSN/ PCO/01 - THE SUBJECT IS RESTRAINED FROM ASSAULTING, THREATENING, ABUSING, HARASSING, FOLLOWING, INTERFERING, OR STALKING THE PROTECTED PERSON AND/OR THE CHILD OF THE PROTECTED PERSON OCA/ MIS/100 FEET FROM RESIDENCE EXCEPT WHEN PICKING UP CHILDREN FOR MIS/VISITATION LIC/ABC123 LIS/MD LIY/2000 LIT/PC VIN/2G2PM37A2G VYR/1992 VMA/DODG VMO/INT VST/4T VCO/BLK ORI IS ANNAPOLIS POLICE DEPARTMENT MD NIC/H DTE EDT DLU/ EDT ****WARNING - THE FOLLOWING IS AN EXPIRED NCIC PROTECTION ORDER RECORD. DO NOT SEARCH, DETAIN, OR ARREST BASED SOLELY ON THIS RECORD. CONTACT ENTERING AGENCY TO CONFIRM STATUS AND TERMS OF PROTECTION ORDER***** MKE/EXPIRED PROTECTION ORDER ORI/MD NAM/SMITH, JOHN J SEX/M RAC/W ETN/H POB/MD DOB/ HGT/510 WGT/175 EYE/BRO HAI/BRO FBI/123456A SKN/FAR SMT/SC L EAR FPC/121011CO141159TTCI13 MNU/AS SOC/ PNO/PO33333 BRD/N ISD/ EXP/ CTI/MD010023D PPN/SMITH, RITA R PSX/F PPR/W PPB/ PSN/ PCO/01 - THE SUBJECT IS RESTRAINED FROM ASSAULTING, THREATENING, ABUSING, HARASSING, FOLLOWING, INTERFERING, OR STALKING THE PROTECTED PERSON AND/OR THE CHILD OF THE PROTECTED PERSON OCA/ MIS/SUBJECT IS PROHIBITED FROM CONTACTING PROTECTED PERSON AND MUST MIS/VACATE RESIDENCE ORI IS ANNAPOLIS POLICE DEPARTMENT MD NIC/H DTE EDT DLU/ EDT Revised 1/1/2017 Page 64

65 Sex Offender Registration File (QW, QXS) State law requires TXDPS to maintain a central database of sex offender registration information. Persons under supervision as of September 1, 1997 for an offense that occurred on or after September 1, 1970 are required to register as a sex offender. This file is cross-searched by a QW inquiry which retrieves active records only. Sex Offender Registration records remain active until they are cleared or canceled by TXDPS or when Expiration of Registration Date (ERD) is reached. Inquiries made using the QXS transaction will retrieve all Sexual Offender Registry File records including active, inactive and expired. A QXS inquiry will allow criminal justice agencies to view limited information on registered sex offenders via TLETS. Additional information can be viewed on the DPS secure website at Agencies wishing to have access to the secure Sex Offender Registry website should contact the Sex Offender Registration unit at Certain information in this database is considered public information and is available on the DPS public website at Sex Offender Registry Inquiry (QXS) Agency/Case Data Originating Agency Code (ORI) Originating Case Number (OCA) Person Data Name (NAM) Expanded Name Search (ENS) Sex (SEX) Race (RAC) Date of Birth (DOB) Extended Date of Birth Search (EBS) Social Security Number (SOC) FBI Number (FBI) Miscellaneous Number (MNU) License Number (OLN) Related Search Hit (RSH) License Plate Data License Plate (LIC) State (LIS) Vehicle Data Vehicle ID Number (VIN) Make (VMA) Revised 1/1/2017 Page 65

66 Boat Data Boat Hull Number (BHN) Registration Number (REG) Zip Code Inquiry Data Zip Code (ZIP) Sex Offender Status (SOS) Positive Return *** SEX OFFENDER REGISTRY INFORMATION *** THE SUBJECT IDENTIFIED IN THE FOLLOWING RECORDS WITH TIC/TX IS REGISTERED AS A CONVICTED SEX OFFENDER. DO NOT SEARCH, DETAIN, OR ARREST BASED SOLELY ON THIS RECORD. ADDITIONAL INFORMATION REGARDING SUBJECT MAY BE AVAILABLE FROM THE INTERSTATE IDENTIFICATION INDEX. MKE/SEXUAL OFFENDER ORI/TX NAM/LAST,FIRST MIDDLE SEX/M RAC/B POB/TX DOB/ HGT/510 WGT/154 EYE/BRO HAI/BRO FBI/000000K00 CTZ/US SKN/DRK SMT/TAT CHEST SOC/ ORD/ ERD/NONEXP SXP/N CRR/SEX ASSAULT CON/ JUV/N AOV/13 SCV/F OCA/ MIS/SEXUAL ASSAULT CHILD THIRD STREET DNA/Y DLO/TEXAS DEPT OF PUBLIC SAFETY CODIS LAB ORI TXDPS6900 ADD/01 RESIDENCE (LAST KNOWN) SNU/0000 SNA/THIRD STREET CTY/NORMANGEE STA/TX ZIP/77871 COU/LEON TNO/ TNT/H HOME AKA/LAST,FIRST AKA/LAST,FIRST M AKA/LAST,MIDDLE SMT/SC L KNEE SMT/SC R KNEE SMT/TAT LF ARM SMT/TAT RF ARM SOC/ NIC/X TIC/TX DTE/ DLU/ ORI IS LEON CO SO CENTERVILLE *****END OF SEX OFFENDER REGISTRY INFORMATION***** **THIS MESSAGE IS FROM THE TCIC 2000 SYSTEM** Revised 1/1/2017 Page 66

67 Missing Person File (QM, QW) The NCIC Missing Person File was implemented in Records in the Missing Person File are retained indefinitely, until the individual is located or the record is canceled by the entering agency. The Missing Person File contains records for individuals reported missing who: Have a proven physical or mental disability Are missing under circumstances indicating that they may be in physical danger Are missing after a catastrophe Are missing under circumstances indicating their disappearance may not have been voluntary Are not declared emancipated as defined by the laws of their state of residence and do not meet the above criteria Do not meet any of the above criteria but for whom there is a reasonable concern for their safety or under the age of 21 and declared emancipated by the laws of their state of residence Adam Walsh Child Protection and Safety Act of 2006 The Adam Walsh Child Protection and Safety Act (2006) ensures that no law enforcement agency removes a missing person entry from NCIC based solely on the age of the missing person and requires that any relevant information be entered within two hours of receipt by the entering agency. Missing Juvenile - High Risk Factor The High Risk Factor filed (HRF) is used for juveniles under 18 years of age who are: reported missing four or more times in a 24-month time period reported missing two or more times in a 24-month time period and in the foster care system determined to be at risk of human trafficking, sexual assault, exploitation, abuse or neglectful supervision Positive Return High Risk Factor MKE/MISSING PERSON JUVENILE ORI/TX NAM/MONTANA, HANNAH SEX/F RAC/B POB/TX DOB/ DOE/ HGT/507 WGT/230 EYE/BRO HAI/BLK FBI/XHA7T2CPN CTZ/US SKN/LBR MNU/OA-TX SOC/ MNP/MP DLC/ OCA/ MIS/HIGH RISK FOSTER CARE LAST SEEN WEARING BLACK CLOTHING MPC/RUNAWAY HRF/HIGH RISK FOSTER CARE DNA/N AKA/MONTANA,MILEY NIC/M TIC/TM DTE/ DLU/ ORI IS PHOUMONT PD Revised 1/1/2017 Page 67

68 Suzanne s Law Federal and Texas law require law enforcement agencies to enter missing persons under age 21 within two hours of the agency receiving the minimum data required for entry. The Missing Person record should be entered under the most appropriate category. The age of emancipation in Texas is still 18. Positive Return Missing Person Endangered MKE/MISSING PERSON ENDANGERED ORI/TX NAM/SMITH,JOHN J SEX/M RAC/W DOB/ HGT/510 WGT/175 EYE/BRO HAI/BRO FBI/416249J4 SMT/SC L EAR MNU/AS SOC/ OLN/N OLS/MD OLY/1995 MNP/MP DLC/ OCA/ MIS/MISSING UNDER SUSPICIOUS CIRCUMSTANCES POSSIBLY ENDANGERED DNA/N AKA/SMITH,JON J AKA/SMITH,JONATHAN J SMT/SC FHD SOC/ NIC/M TIC/TM DTE/ DLU/ ORI IS ANNA POLICE DEPARTMENT TX Person with Information Person with Information data may be appended to a Missing Person File (MPF) record entered using MKE/EME (Endangered) or EMI (Involuntary) with the following conditions: 1. The missing person was last seen under circumstances that pose a risk to the safety of that person. 2. There is a substantial likelihood that the PWI has relevant information about the missing person that could result in the recovery of the missing person. 3. Entering identifying information concerning the PWI into the MPF record could assist the appropriate law enforcement agency to identify and interview the PWI, and that the resulting information could assist in the recovery of the missing person. 4. The PWI cannot be located and time is of the essence. 5. There is no prohibition under the investigating agency s state law on the publication of information concerning the identity of a person for whom a warrant has not been obtained. 6. The identity of the PWI has been disclosed to the general public through an Amber Alert or other formal notification. Revised 1/1/2017 Page 68

69 Positive Response (with supplemental PWI records): *****PERSON WITH INFORMATION ASSOCIATED WITH NIC/M ***** *****DO NOT ARREST OR DETAIN BASED ON PERSON WITH INFORMATION HIT***** MKE/MISSING PERSON ENDANGERED ORI/MD NAM/JONES, SARAH SEX/F RAC/W ETN/H POB/MD DOB/ DOE/ HGT/402 WGT/065 EYE/BRO HAI/BRO SKN/FAR SMT/SC R HND SOC/ MNP/CA DLC/ OCA/EXAMPLE1 MIS/LAST SEEN WEARING BLUE PANTS AND PINK SHIRT MPC/ABDUCTED BY A NON-CUSTODIAL PARENT LIC/555W555 LIS/VA LIY/2012 LIT/PC VIN/1Q87H2N VYR/2001 VMA/FORD VMO/TAU VST/4D VCO/BLK BLT/OPOS FPA/N BXR/P DNA/N ORI IS ANY CITY PD MD PIN/ADAMS, RANDY PIX/M PIR/W PIE/H PIB/ PGH/511 PWG/195 PEY/BRO PHA/BRO PSK/LGT PSM/SLVR TOOTH PSS/ PMI/PERSON WITH INFORMATION IS NON-CUSTODIAL PARENT OF MISSING CHILD, CHILD PMI/MAY BE USING A TAN GRACO CAR SEAT, PLEASE CONTACT DET FRIDAY AT THE ORANGE PMI/CO PD WHEN PERSON WITH INFORMATION IS ENCOUNTERED PIB/ PIB/ PAK/MARKS, RANDY PSM/SC L ANKL PSM/TAT L WRS PSS/ PSS/ PIN/HARDY, MARY PIX/F PIR/W PIE/H PIB/ PGH/502 PWG/115 PEY/BRO PHA/BRO PSK/LGT PSM/MOLE FHD PSS/ PMI/PERSON WITH INFORMATION IS GIRLFRIEND OF NON-CUSTODIAL PARENT OF MISSING PMI/CHILD, CHILD MAY BE USING A TAN GRACO CAR SEAT, PLEASE CONTACT DET FRIDAY AT PMI/THE ORANGE CO PD WHEN PERSON WITH INFORMATION IS ENCOUNTERED PIB/ PAK/ADAMS, MARY PSM/TAT LW LIP PSM/TAT L ANKL PSS/ NIC/M DTE/ EDT DLU/ EDT ***REPEAT - DO NOT ARREST OR DETAIN BASED ON PERSON WITH INFORMATION HIT*** Revised 1/1/2017 Page 69

70 Child Safety Check Alert List TCIC Only This file was created to help the Department of Family and Protective Services (DFPS) locate a family for purposes of investigating a report of child abuse or neglect in accordance with Texas Family Code If DFPS is unable to locate a family for purposes of investigating a report of child abuse or neglect and has exhausted all means available for locating the family, DFPS may seek assistance from law enforcement. At the request of DFPS, The Department of Public Safety TCIC Control Room shall place the alleged offender and victim into the TCIC Child Safety Check Alert List. Law Enforcement Response to Child Safety Check Alert When a law enforcement agency receives a TCIC hit regarding the Child Safety Check Alert List, the officer must determine if the subject is the one who is alleged to have abused or neglected a child or the child listed on the alert list who is the subject of a report of child abuse or neglect the department is attempting to investigate. The statute applicable to this TCIC record does not grant right to detain the child or the alleged offender. Peace officer authorities already exist for such interdiction by the peace officer when a child is judged to be endangered. If the law enforcement officer determines that the circumstances described by Family Code exist, the officer may take possession of the child without a court order as authorized by that section. If the circumstances described by Family Code do not exist, the officer shall inquire as to the well-being of the child or children of concern noted in the record, request the child and/or family s current residential address and report that information to the DFPS at Positive Return - Child Safety Check Alert List: *****WARNING - THE FOLLOWING IS A CHILD SAFETY CHECK ALERT RECORD. DO NOT SEARCH, DETAIN, OR ARREST BASED SOLELY ON THIS RECORD. ***** *****THE PERSON(S) WITHIN THE RECORD(S) MAY BE SOUGHT BY CHILD PROTECTIVE SERVICES TO VERIFY THE SAFETY/WELL BEING OF A CHILD. IN ACCORDANCE WITH ARTICLES , AND OF THE TEXAS FAMILY CODE, WHERE THERE IS A MATCH ON EITHER THE CHILD OR THE ALLEGED OFFENDER, THE OFFICER SHALL REQUEST INFORMATION FROM THE PERSON OR THE CHILD REGARDING THE CHILD'S WELL-BEING AND CURRENT RESIDENCE. LAW ENFORCEMENT AGENCIES MUST REPORT THOSE DETAILS TO THE TEXAS DEPARTMENT OF FAMILY AND PROTECTIVE SERVICES AT ***** MKE/CHILD SAFETY CHECK ALERT - CAUTION ORI/TX ISD/ CTD/PAMS COURT Revised 1/1/2017 Page 70

71 OCA/PAMS0607 CPN/ FAMILY'S LAST KNOWN ADDRESS/12345 CONGRESSIONAL BLVD AUSTIN, TX COUNTY - WILLIAMSON **PRIMARY CHILD VICTIM INFORMATION FOLLOWS:** 85 - HEMOPHILIAC NAM/SAFETY,MODIFY SEX/F RAC/W DOB/ TYPE OF ABUSE/04 - ABANDONMENT SMT/CRIP L HND OLN/ OLS/AS OLY/2015 LIC/ALA8787 LIS/AL LIY/2011 LIT/PC VIN/ VYR/1932 VMA/DODG VST/4D VCO/WHI/BLU SUPPLEMENTAL INFORMATION ON PRIMARY CHILD VICTIM: DOB/ DOB/ AKA/VOLUME,TURN DOWN SMT/CRIP L LEG OLN/ OLS/MS OLY/2009 LIC/NYKIDS LIS/TX LIY/2009 PC VIN/ VYR/1930 VMA/ACUR VMO/CL VST/4D VCO/BLU **ADDITIONAL CHILD VICTIM INFORMATION FOLLOWS:** 60 - ALLERGIES NAM/VOLUME,DAMSEL SEX/F RAC/W PPE/N DOB/ HGT/301 WGT/100 EYE/BLU HAI/BRO TYPE OF ABUSE/08 - REFUSAL TO ACCEPT PARENTAL RESPONSIBILITIY SMT/SC UR ARM MNU/OA SOC/ OLN/ OLS/AL OLY/2002 LIC/KIDS362 LIS/TX LIY/2000 LIT/PC VIN/ VYR/1925 VMA/GMC VST/2D VCO/GRN/BLU **PRIMARY ALLEGED OFFENDER INFORMATION FOLLOWS:** 40 - INTERNATIONAL FLIGHT RISK 80 - MEDICATION REQUIRED 00 - ARMED AND DANGEROUS 55 - ALCOHOLIC 20 - KNOWN TO ABUSE DRUGS NAM/VOLUME,DADS LOUD SEX/M RAC/B PPE/H DOB/ HGT/505 WGT/190 EYE/BRO HAI/BRO SMT/CRIP L HND MNU/PI SOC/ OLN/ OLS/AK OLY/2000 Revised 1/1/2017 Page 71

72 VIN/ VYR/1930 VMA/STRN VMO/300 VST/4D VCO/PNK SUPPLEMENTAL INFORMATION ON PRIMARY OFFENDER: DOB/ AKA/VOLUME,RADIO BLAST MNU/OA OLN/ OLS/ID OLY/2010 LIC/MYKIDS LIS/TX LIY/2009 PC VIN/ VYR/1922 VMA/FORD VST/4D VCO/WHI MIS/CHILD SAFETY RECORD DEMONSTRATION AND EXAMPLE TIC/TY DTE/ DLU/ ORI IS DEPT OF PUBLIC SAFETY TCIC NCIC CONTROL CSA ** TEST** THIS RESPONSE IS FROM THE TCIC TEST SYSTEM. Revised 1/1/2017 Page 72

73 Foster Home Member Database Texas Only Senate Bill 723 was created in response to the December 2006 death of Katherine Francis, a 6 year old child residing in a foster home in Desoto, Texas. The 14 year old biological son of the foster parents was charged with her murder. During the investigation, the Department of Family and Protective Services (DFPS) learned that law enforcement had responded to numerous calls at the foster home, to include the time during which foster children were residing in the home. The purpose of this bill is to facilitate a report from law enforcement to DFPS each time a member of a foster home is involved in a family violence allegation or incident. To accomplish this, DFPS maintains an up-to-date database that lists all the addresses for foster homes in the state of Texas. Law enforcement agencies in Texas can search this database through TLETS to determine if anyone involved in a family violence allegation or incident matches the address of a foster home. Procedures by the Responding Law Enforcement Officer When investigating a family violence allegation or responding to a disturbance call that may involve family violence, the responding law enforcement officer(s) should: 1. Respond to call: Collect all pertinent information for all persons involved, including the home addresses and zip codes of all persons involved, and any details about the allegation or incident. 2. Search the Foster Home Database (QFA): Search the foster home database either before or after responding to the call, this would include all persons involved in a family violence allegation or incident. 3. In order to query into the DPS system for possible foster home address matches, the following information is required: the street number and the zip code or the zip code only for the foster home location. 4. After reviewing the return and verifying the information, report the incident of a family violence or disturbance call that may involve a foster family or residence within 24 hours to: DFPS Abuse Hotline: DFPS Website: Revised 1/1/2017 Page 73

74 5. The following information is needed by the DFPS to determine response timeframes by their investigative field staff: a. Agency home number (available in the TCIC return) b. Name, date of birth, and social security numbers of all persons involved in the family violence allegation or incident c. Specific details of the incident to include injuries to children d. Location/Address of the incident e. Response by law enforcement or any criminal action taken f. Report or incident number 6. The DFPS Abuse Hotline staff may ask additional questions. Upon completion of a phone call to the DFPS Abuse Hotline, the staff will generate a report with a Call ID number. 7. If information is submitted online, a confirmation number is sent upon receipt of the report. Once the online report is processed by the DFPS Abuse Hotline staff, an will be sent to the reporter with a Call ID number. Query Foster Home Address (QFA) Agency/Case Data Originating Agency Code (ORI) Foster Home Address Data Building/House Number (SNU) Zip Code (ZIP) Positive Return Example THE ADDRESS(ES) SHOWN BELOW MAY BE THE LOCATION OF A FOSTER HOME IN TEXAS. REVIEW THE RESULTS BELOW TO VERIFY THE ADDRESS. WHERE THERE IS A MATCH ON THE ADDRESS, LAW ENFORCEMENT AGENCIES MUST REPORT THE DETAILS OF ANY INVESTIGATION OF FAMILY VIOLENCE OR ANY RESPONSE TO A DISTURBANCE CALL THAT INVOLVED FAMILY VIOLENCE THAT OCCURRED AT THIS ADDRESS OR THAT INVOLVED A PERSON WHO RESIDES AT THIS ADDRESS TO THE TEXAS DEPARTMENT OF FAMILY AND PROTECTIVE SERVICES. IN ACCORDANCE WITH ARTICLES 5.04, CODE OF CRIMINAL PROCEDURE, AND CHAPTER 42 HUMAN RESOURCES CODE, THIS REPORT MUST BE MADE WITHIN 24 HOURS OF THE BEGINNING OF THE INVESTIGATION OR RECEIPT OF THE DISTURBANCE CALL. REPORT VIA TELEPHONE AT OR ADDRESS/HC 3 BOX 2011 CITY/CENTER POINT STATE/TX ZIP/ AGENCY HOME NUMBER/ CAPS ID/ CPA#/ CPA NAME/TEXAS DEPT OF FPS REG 08 Revised 1/1/2017 Page 74

75 ADDRESS/PO BOX 848 ADDRESS/647 CENTER POINT DRIVE CITY/CENTER POINT STATE/TX ZIP/78010 AGENCY HOME NUMBER/ CAPS ID/ CPA#/ CPA NAME/Methodist Childrens Home ADDRESS/PO BOX 5 CITY/CENTER POINT STATE/TX ZIP/ AGENCY HOME NUMBER/ CAPS ID/ CPA#/ CPA NAME/TEXAS DEPT OF FPS REG 08 ***** DO NOT ARREST BASED SOLELY UPON THIS INFORMATION ***** Image File Images that are associated with NCIC records can assist in identifying the person or property associated with that record. When the image is entered, the NCIC Number (NIC) of the record must be included with the image transaction. The Image Indicator field (IND) must be Y to return an image. Image Inquiry Transaction Return All Images (QII) Agency/Case Data Originating Agency Identifier (ORI) NCIC Number (NIC) Image Data Image Indicator (IND) Image Inquiry Transaction Return Image Requested (QII) Agency/Case Data Originating Agency Identifier (ORI) Image Data Image NIC Number (IMN) Image Indicator (IND) Revised 1/1/2017 Page 75

76 NCIC ORI File (QO) This file contains the agency name, address and phone number assigned to the ORI on file. ORI Inquiry Transaction (QO) Agency/Case Data Originating Agency Code (ORI) ORI to be Entered (ORI) Revised 1/1/2017 Page 76

77 Section 3 Hit Confirmation By the end of this training session the participant will be able to: Define an NCIC/TCIC hit and the importance of confirming a hit. List the hit confirmation levels of priority and define substantive response. Describe the steps in confirming a hit. Explain the use for Detained Wanted Person file. List the files that do not require hit confirmation. State the criteria for an Off-line Search and the possible search fields. Define the Delayed Inquiry program. Revised 1/1/2017 Page 77

78 Revised 1/1/2017 Page 78

79 Defining a Hit A hit can be defined as when an agency receives a positive response from NCIC and sometimes TCIC, to indicate that identifiers used in an inquiry located a potential record on file, to include: a missing person, wanted person or a stolen property record that could be taken into police custody until such time as it can be returned to its lawful owner. When a positive response/ hit is received an immediate confirmation with the agency that entered the record in the system is necessary. This confirmation ensures the validity of the hit before an inquiring agency commits to an arrest or a seizure of property is made. And in turn, the entering agency has the duty to respond promptly with the necessary confirmation and other pertinent details. Procedures identified as a Hit Confirmation have been established to provide uniformity and a general understanding of documentation procedures for all agencies utilizing the system, as well as ensuring the integrity of the process should it be called into question later. It is also important to note that a NCIC hit alone is not probable cause to arrest, but indicates that a stolen property report, missing person report, or warrant, etc. may have been filed. A hit could be only one element comprising sufficient legal grounds for probable cause to arrest. Requesting Hit Confirmation Any agency receiving a hit confirmation request to an NCIC inquiry must confirm that record before the inquiring agency is able to take official action in regards to the person and/or property based upon the NCIC record. Examples of actions that can be taken may include the following: Arresting a Wanted Person Detaining a Missing Person Seizing Stolen Property Charging a Subject with Violating a Protection Order Additionally, an agency detaining an individual on local charges where the individual appears identical to the subject of the wanted person record and is within the geographical area of extradition must confirm the hit. Revised 1/1/2017 Page 79

80 What Does Confirming a Hit Mean? Confirming a hit means the inquiring agency contacting the agency that entered the record to: Ensure that the person or property inquired upon is identical to the person or property identified in the record. Ensure that the warrant, missing person report or theft report is still outstanding. Obtain a decision regarding: o Extradition of a wanted person (when applicable). o Transportation of a wanted person (when applicable). o Information regarding the return of the missing person to the appropriate authorities. o Information regarding the return of stolen property to its rightful owner. o Information regarding the terms and conditions of a protective order. Determine if the entering agency wants the record to be located when the missing person was identified by partial body parts. This step is critical because it can help to prevent a false arrest or improper seizure of property. When sending the request for confirmation agencies must exchange all identifiers and information that insures correct identification. Hit Confirmation Request (YQ) To send a request for confirmation agencies will use transaction format YQ to the entering agency, as they are the owner of the hit/record. The YQ format accommodates in-state mnemonic addresses as well as out of state ORI s. Agency /Case Data Originating Agency Code (ORI) Destination ORI (DRI) Device Mnemonic (MNE) Originating Case Number (OCA) NCIC Number (NIC) Type (RTY) Confirmation Request No (RNO) Priority (PRI) Photo Needed (PIC) Requestor Name (RNA) Requestor Agency (RAG) Phone Number (PHO) Extension (EXT) Alternate Phone (PH2) Fax Number (FAX) Revised 1/1/2017 Page 80

81 Person Data Name (NAM) Date of Birth (DOB) Sex (SEX) License Plate Data License Plate (LIC) Plate State (LIS) Plate Year (LIY) Plate Type (LIT) Vehicle Data Vehicle ID Number (VIN) Year of Manufacture (VYR) Make (VMA) Article Data Serial Number (SER) Type Code (TYP) Brand Code (BRA) Boat Data Registration Number (REG) Hull Number (BHN) Manufacture (BMA) Gun Data Serial Number (SER) Caliber (CAL) Make (MAK) Model (MOD) Part Data Serial Number (SER) Brand (BRA) Category (CAT) Security Data Serial Number (SER) Type (TYP) Denomination (DEN) Remarks (REM) Revised 1/1/2017 Page 81

82 NCIC Number (NIC) The NCIC Number (NIC) should be included on any out of state hit confirmation requests or responses. Hit Confirmation Priority (PRI) Priority 1: Urgent: The hit must be confirmed within 10 minutes. In those instances where the hit is the only basis for detaining a suspect or the nature of a case requires urgent confirmation of a hit, priority 1 should be specified. Priority 2: Routine: The hit must be confirmed within 1 hour. Generally, this priority will be used when the person is being held on local charges, property has been located under circumstances where immediate action is not necessary, or an urgent confirmation is not required. Hit Confirmation Request Number (RNO) Place the number 1 in the Hit Confirmation Request Number field (RNO) to indicate it is the first time the inquiring agency is contacting the entering agency. The entering agency, upon receipt of a hit confirmation request, must furnish a substantive response within the designated timeframe: Positive Confirmation Negative Confirmation Notice of the specified amount of time necessary to confirm or reject the hit Every agency, having records entered into the system under their ORI, must be able to provide hit confirmation for all records on a 24-hour basis, either at their own agency or through a written agreement with another agency. If a substantive response is not received within the time limit specified in the first request, use YQ to send a second request to the entering agency placing 2 in the RNO field. This will generate a message to the state CSA and the entering agency. If the entering agency is a Texas agency, the TCIC Control Room will call to determine how long it will be before the hit confirmation can be obtained. The Control Room will then advise the inquiring agency of the circumstances involving the confirmation. If the entering agency is out of state, the Control Room will make contact with the out-of-state CSA and request their assistance. It is up to the out of state CSA to contact the entering out of state agency. Revised 1/1/2017 Page 82

83 If a substantive response is not received within the time limit specified in the second request, use the YQ message format to send a third request to the entering agency. Enter the number 3 in the RNO field. This will cause the message to be sent automatically to the entering agency, the appropriate state CSA, and the FBI/NCIC. When all of the above steps have been completed, no further action needs to be taken by the requesting agency. The TCIC Control Room will continue to contact the entering agency and the requesting agency until the hit has been resolved. After hit confirmation has been obtained, the requesting agency must notify the Control Room of the time the confirmation was received and whether or not the hit was valid. Hit Confirmation Response (YR) When the entering agency locates all of the corroborating documentation, the inquiring agency should be informed of the findings using the TLETS/Nlets transaction format YR even if the initial request for confirmation was sent as an administrative message. Agency /Case Data Originating Agency Code (ORI) Destination ORI (DRI) Device Mnemonic (MNE) Originating Case Number (OCA) NCIC Number (NIC) Type (RTY) Confirmation (CON) Hours to Confirm (HRS) Confirming Person s Name (CNA) Confirming Agency Name (CAG) Phone Number (PHO) Extension (EXT) Fax Number (FAX) Person Data Name (NAM) Sex (SEX) License Plate Data Date of Birth (DOB) License Plate (LIC) Plate State (LIS) Plate Year (LIY) Plate Type (LIT) Revised 1/1/2017 Page 83

84 Vehicle Data Vehicle ID Number (VIN) Year of Manufacture (VYR) Make (VMA) Article Data Serial Number (SER) Type Code (TYP) Brand Code (BRA) Boat Data Gun Data Part Data Registration Number (REG) Hull Number (BHN) Manufacture (BMA) Serial Number (SER) Caliber (CAL) Make (MAK) Model (MOD) Serial Number (SER) Brand (BRA) Category (CAT) Security Data Serial Number (SER) Type (TYP) Denomination (DEN) Remarks (REM) Delayed Response This allows the agency to delay the actual hit confirmation by advising a specific amount of time before they will be able to reply. It is not the intent of this provision to allow agencies to enter records they cannot confirm on a 24-hour basis. Policy mandates that agencies must have access to all files of records that document a TCIC/NCIC entry. If an agency advises that it will be until the next morning before they can confirm the hit, contact TCIC Control Room and follow-up will occur regarding the need for 24-hour hit confirmation. Revised 1/1/2017 Page 84

85 Phone Confirmation TLETS/Nlets is the recommended network for hit-confirmation. Even if the initial confirmation is handled via telephone, the YQ/YR format should be used for documentation. Nlets has created an inquiry (YQ) and response (YR) format just for hit confirmations in an effort to assist agencies document probable cause. Hit Confirmation Responsibility Responsibilities for the hit confirmation process are shared between the agency that received the hit and the agency that enters the record. Every agency, upon taking a person into custody, identifying a missing person or recovering property and after confirming the hit, must place a locate on the corresponding NCIC record(s). Exception: If the missing person has been positively identified by partial body parts, the locating agency should determine if the entering agency wants the record to be located. The record may remain in NCIC for future positive identification in the event additional body parts are subsequently recovered. Locate Message and Procedure The purpose of a locate message is to indicate (until the originating agency clears the record) that the wanted person has been apprehended or the property has been recovered, etc. All records on file for the found missing person, apprehended wanted person, or recovered property must be located to ensure that they are in the correct status before the record is cleared from NCIC by the entering agency. If the locating agency intends to hold the individual on local charges, the locate transaction should indicate detention by placing DETN in the Extradition field. If the locating agency does not have cause to hold the individual and the hit confirmation response indicates the wanting agency will come get the subject, the locate transaction should indicate Extradition (or Transportation) by placing EXTR in the Extradition field. NOEX is used in the locate message when; the locating agency is within the extradition/transportation limitations; however, the entering agency makes the decision at the time of confirmation that the subject will not be extradited or transported. A locate message cannot be used by the agency that entered the record in NCIC unless the apprehending agency incorrectly places a locate or fails to place a locate on a wanted person record. In that case, the ORI of record may place a locate on its own record with the requirement that they place a detainer on that record. Revised 1/1/2017 Page 85

86 Detained Wanted Person (DW) Detainer information may be appended only to NCIC Wanted Person File records in located status. When an inquiring agency receives a positive response, confirms that the subject is identical, the warrant is outstanding and extradition is authorized, the inquiring agency must perform a locate transaction to place the record in located status. If the locating agency intends to hold the individual on local charges, the locate transaction should indicate detention by placing DETN in the Extradition field. The agency of the record should append any detainer information to the record within 5 days of the locate transaction. Appending a detainer will allow the record to remain in NCIC until extradition can occur. Document, Document, Document... When an inquiry on an individual or property yields a valid positive hit, a paper or electronic copy showing the inquiry and the record(s) on file should be retained for use in documenting probable cause for the detention of a missing person, arrest of the wanted person, or seizure of the property. The documentation may also prove valuable in a civil suit alleging a false arrest, a false imprisonment, a civil rights violation, or an illegal seizure of property. The operator should note on the paperwork how, when, and to whom the information was given, initial and date the inquiry, and forward the printout to the officer or agency for retention in the case file. This procedure establishes the chain of evidence for the communication, should the arresting officer need to substantiate actions in a judicial proceeding. The printout should be retained for as long as there remains any possibility that the defendant will challenge the arrest, search or any other law enforcement action taken because of the information contained in the printout and should be retained until all possible levels of appeals are exhausted or the possibility of a civil suit is no longer anticipated. Files That Do Not Require A Hit Confirmation To further enhance officer safety NCIC allows for the entry of certain file categories that do not require a confirmation. The purpose of the files is to give officers as much information as possible should they encounter a person who has been placed in one of these file categories. Do not arrest based on these returns the records are specifically entered from authorized reporting agencies in an effort to protect the lives of officers and members of the community. Some file categories require additional information to be shared with the entering entity if the identifiers used in the inquiry returns a potential hit. These files include: Threat Against Peace Officer or Detention Officer Alert File Violent Person File Identity Theft File Criminal Gang File Known or Appropriately Suspected Terrorist File Supervised Release File Convicted Sexual Offender Registry File Protective Interest File NICS Denied Transaction File Revised 1/1/2017 Page 86

87 TCIC/TLETS Offline Search An off-line search is a special technique used to get information from the NCIC and TCIC computers which cannot be obtained with an online inquiry. Some examples would be: partial numeric identifiers, manual name checks, or inquiries using personal descriptors or vehicle make/model information. Reasons for an Offline Search: Determine if any agency made an inquiry on a particular individual or item of property Substantiate or discredit an alibi Place an individual near the scene of a crime or across the country Track the route of an individual (Example: suspects, witnesses, runaways) Determine if a record for a person or item of property was previously entered into NCIC and subsequently removed. This capability provides a powerful investigative tool for law enforcement officials in dealing with possible misuse of TLETS, official misconduct and criminal investigations. All messages, database inquiries and other transactions sent over the TLETS network are logged at TXDPS and archived daily. In addition, portions of each TCIC and computerized criminal history (CCH) inquiries and responses are saved on a separate file. The CCH transaction logs are on file for 2004 to current; while TCIC transaction logs are on file for 2006 to current. TLETS searches are limited to 1/1/2012 and after; any requests with prior dates may contain incomplete records. TCIC searches are limited to 12/8/2009 with incomplete records from 10/20/2006 to 12/7/2009 resulting in possible multiple sets from TCIC, NCIC and TLETS. Any requests with a date prior to 2006, as well as any requests performed by users outside the state of Texas, will automatically result in contact with NCIC, increasing the turn-around time for the request. While there is no fee for the searches, they are limited to ongoing investigations. Texas agencies must contact TCIC QC Analysts at TCICQC@dps.texas.gov to conduct an offline search and may also request additional information. Offline Search Requests to the TXDPS must be in writing and include: The nature of the investigation including the specific offense involved. Major felonies will take priority over lesser offenses. Specify the time period to be searched. DPS reserves the right to shorten the time frame requested, if the request could negatively impact DPS resources. Search Criteria: Acceptable searchable elements include full name and date of birth, driver's license or DPS ID card numbers, vehicle license numbers, vehicle identification numbers, serial numbers, owner applied identification numbers, or message keys used in a transaction. Contact Information: Include name, phone number and address of the person to contact with the search results. Revised 1/1/2017 Page 87

88 Delayed Inquiry Program A delayed hit inquiry is an administrative message ($.H) that is sent to the ORI of record when an inquiry, enter, or modify transaction results in a hit response. When an NCIC record is entered or modified, the Delayed Inquiry Program extracts descriptive data and conducts an unsolicited search of NCIC s daily transaction logs. The search identifies and lists any inquiries made within five-days prior to the record s entry or modification. Once a possible match is made, NCIC contacts the appropriate agencies using a $.H message, which provides agencies with phone numbers and record descriptors so that they may contact each other to determine the value of the data and follow-up any leads. The success of the Delayed Inquiry Program relies upon both agencies sharing information to develop leads. This program can help investigators recover stolen property, identify suspects involved in thefts, and provide leads in the location of fugitives or missing persons. For instance, a vehicle can be stolen days prior to the discovery of the theft, and the opportunity to recover the vehicle or arrest the subject. Revised 1/1/2017 Page 88

89 Section 4 Criminal History Record Information By the end of this training session the participant will be able to: Identify the sources of criminal history record information (CHRI). Recognize that criminal justice agencies can only inquire into CHRI from NCIC/TCIC. List the required fields for a QH inquiry into Texas CCH and NCIC III. Explain the common purpose codes used for requesting CCH and III data. Recognize the importance of the Operator, Requestor, Attention, and Reason for Inquiry fields in the QH and QR inquires. Describe the possible TCIC/NCIC responses and resulting actions needed from a QH. Restate that CHRI returns are confidential and not to be given to noncriminal justice personnel. Explain CHRI logging and secondary dissemination procedures. Identify the only methods of CHRI storage and destruction. Obey the CHRI related laws and list the possible sanctions for violations. Revised 1/1/2017 Page 89

90 Revised 1/1/2017 Page 90

91 Criminal History Record Information (CHRI) This section will cover Criminal History Access: Texas Computerized Criminal History files (CCH) FBI Interstate Identification Index files (NCIC III) Individual State Repositories using IQ, FQ, and AQ Criminal history information obtained from the Texas CCH or FBI III files is confidential and subject to restrictions on the use and dissemination. Effective September 1, 1997, Government Code (further described in this handbook) provides citizens access to Texas only conviction and deferred adjudication records of an offender; however, this pertains to records obtained directly from the DPS, not from local agencies using TLETS. Non-criminal justice agencies authorized by Texas Statute to receive criminal history record information must obtain this information directly from DPS, not from a local criminal justice or law enforcement agency through TLETS. Texas Computerized Criminal History (CCH) Computer Criminal History (CCH) files are records of Texas arrests stored at Crime Record Service (CRS) of TXDPS in Austin. These records are compiled from arrest fingerprint cards, prosecution and disposition information from courts, probation and parole reports and Texas Department of Criminal Justice (TDCJ) receiving reports. Local agencies can only inquire into the CCH files. All Texas CCH record entries and updates are performed by CRS. These updates are performed 24 hours a day 7 days a week. All records are based on information submitted to LES/CRS by local Texas agencies. The accuracy, timeliness, and completeness of the records are dependent upon the accuracy, timeliness, and completeness of its contributors. CRS will only enter information which it has received from the record source. Errors found on CCH records must be reported to the Error Resolution Unit (Assistance Line) at (512) The Juvenile Justice Information System (JJIS) is a statewide database comprised of custody, pre-adjudication and post-adjudication events on juvenile offenders. Local law enforcement agencies are required, within ten days of the arrest, to report qualifying arrests to TXDPS if the juvenile is referred to a probation officer. Criminal history inquiries on juveniles can be made using the same inquiry formats ( QH or RAP ) as used for adult record inquiries. The policy governing dissemination of JJIS records is the same as that for adult records. Questions concerning the Texas CCH records can be referred to the TCIC Control Room at the Mnemonic address of CRDP" or or TCIC (8242). Revised 1/1/2017 Page 91

92 NCIC Interstate Identification Index (III) The Interstate Identification Index (III) Program provides for the exchange of criminal history record information and functions as part of the Integrated Automated Fingerprint Identification System (IAFIS). The III provides a means of conducting national criminal history record searches for criminal justice and other purposes as specified by existing local, state and/or federal laws. Each criminal history record is supported by a criminal fingerprint submission. The criminal history inquiry (QH) allows authorized agencies to determine the existence of a criminal history record for a subject. The criminal history record request (QR) is used to retrieve the criminal history from the FBI and III/National Fingerprint File (NFF) participating states. When the FBI receives an online request for a record supported by a III participating state, the III automatically sends a message through the NCIC System to the participating state's computer system. The state responds directly to the requesting agency over the International Justice and Public Safety Information Sharing Network (Nlets). The FBI's CJIS Division responds to requests for records of federal and foreign offenders; for persons arrested in non-iii states, the District of Columbia and U.S. Territories; and for criminal arrests that III states are unable to support. The Privacy Act of 1974 requires that the FBI's CJIS Division maintain an audit trail of the purpose of each disclosure of a criminal history record and the recipient of that record. Therefore, all III QH and QR transactions must include the purpose for which the criminal history record information is to be used. In addition to the purpose code requirement for each III transaction, all users are required to provide the reason for all III transactions upon request by CJIS System managers/representatives, CSA representatives and local agency administrators. While the purpose code provides some lead information, it only provides a minimal audit trail. Requiring the reason for all III transactions assists in ensuring that they are run for authorized purposes and that purpose codes are correctly used. Individual State Repositories Each state has its own criminal history repository and should not be used as substitute for III. It should be used as a secondary inquiry after one has inquired into III and received a No Record response, or one has received a record, but feels that there may be additional data in the state files. Revised 1/1/2017 Page 92

93 III Inquiry Transaction (QH) The QH searches the III using an individual's personal identifiers (NAM, SEX, RAC, DOB) and assigned SOC, MNU, SID and FBI. The QH is used to determine if an index record for a person's criminal history record is in the III. Agency/Case Data Originating Agency Code (ORI) Purpose Code (PUR) Requestor (REQ) Operator (OPR) Reason for Inquiry (RFI) Person Data Name (NAM) Date of Birth (DOB) Sex (SEX) Race (RAC) Social Security Number (SOC) Miscellaneous Number (MNU) State Identification Number (SID) FBI Number/UCN (FBI) Revised 1/1/2017 Page 93

94 Purpose Codes for Requesting CCH and III Data Purpose Code Purpose Code C Description Criminal justice purposes as defined under the administration of criminal justice is the detection, apprehension, detention, pretrial release, post-trial release, prosecution, adjudication, correctional supervision, or rehabilitation of accused persons or criminal offenders. Members of Jury Pools* Recent review of the FBI policy regarding criminal history record information has caused a reversal in DPS policy which previously prohibited accessing/reviewing the background of citizens summoned for jury pool. On-Line criminal history background checks (via TLETS) may be conducted on persons summoned as a jury pool member for interview for a criminal trial, but NOT for those summoned for civil trial. Local agencies are not allowed to perform TLETS CCH inquiries for jury lists of persons not yet summoned for interview for criminal trial jury service. Common Uses Criminal Investigations Confinement Facility Visitors Private/Defense Attorney (with Writ of Discovery) Wrecker Drivers (performing duties for law enforcement) Witnesses Potential Jury Member * Contractual Custodial Help (within a law enforcement agency) Purpose Code J Purpose Code D Purpose Code F Criminal justice applicant screening at any criminal justice agency. It does not include applicants at other city or county departments, such as the tax office, water department, city legal department, or fire department for fire fighter applicants, etc. Domestic/family violence and stalking purposes. Restricted to use by civil or criminal courts only and ORI must end with letter J or D. Used by criminal justice agencies for the purpose of (a) issuing firearms-related permits and explosives permits pursuant to state law, regulation, or local ordinance; (b) returning firearms to their lawful owners; and (c) enforcing federal and state law prohibiting certain persons with criminal records from possessing firearms, in circumstances in which firearms have been pawned. Applicants for Employment (within a law enforcement) Employee Evaluations (including continuous law employment) Family Members (of potential law enforcement or criminal justice applicants) Domestic Violence Returning Firearm to Lawful Owner Firearm-related Permits NCIC data CANNOT be used for any licensing purposes. Revised 1/1/2017 Page 94

95 Automated Logging of Criminal History Record Information Automated logging occurs when an operator completes the ORI, Operator, Requestor, and/or Attention fields in QH/QR inquiries. TCIC/NCIC automatically records these fields as well as the reason requested and identifiers used in the inquiry. ORI Field This is a mandatory field. If the requestor is from another agency, that agency's ORI is to be used. If a terminal agency is not authorized to use the other agency's ORI, include that agency's name in the REQ field, in addition to the requestor's identifying information. Operator, Requestor and Attention Fields Requestor, Operator and Attention fields must be a unique identifier for the named person and should be specific to that person for the period of one year. The local agency must be able to look at the transaction and readily identify the person named within these fields. This procedure is to enhance compliance with the NCIC Operating Manual and CJIS Security Policy, Interstate Identification Index (III) chapter, section 2.1, paragraph 4: The Privacy Act of 1974 requires the FBI to maintain an audit trail of the purpose of each disclosure of a criminal history record and the recipient of that record. The person named in the Requestor or Attention fields must be capable of stating exactly why the specific criminal history inquiry was performed. Typically, the data within the Requestor and Attention fields will include officer information, where the Operator field will identify the person who actually typed the inquiry. The best practice would be Title/Rank First Name Last Name but, using the person s full first and last name in any of these fields is acceptable. If the name is common or not unique within the agency, then additional information would be appropriate within the field(s), such as a badge, radio, or employee number. If the CHRI request is due to a request from an outside agency, also include the name (or ORI) of the other agency in these fields. Examples: REQ: Donna Sawyer ATTN: Donna Sawyer REQ: Tom Brown #33570 ATTN: Tom Brown #33570 REQ: Thomas Mitchell, THP Trooper ATTN: Thomas Mitchell, THP Trooper If the operator is requesting the CHRI in order to pack the record then they must identify themselves in the Requestors/Attention fields, as well as the Operator fields. Revised 1/1/2017 Page 95

96 Reason for Inquiry (RFI) The Reason for Inquiry field (RFI) is a mandatory field that allows a seventy-five characters of text that can further describe the purpose for the criminal history inquiry. Specifically type why the agency is running CHRI transaction. Examples of CHRI reason(s) for Inquiry: Arrest Include type of arrest: DWI, Assault, etc. Booking Classification Burglary Investigation DL Fraud Investigation Homicide Investigation Job Title or Number (when running purpose code J ) Missing Person Investigation, Entry or Validation Protective Orders Entry or Validation TLETS Security Review Traffic Stop Warrant Arrest, Entry or Validation A numerical reference will enable your agency to readily locate supporting documentation that validates a CHRI inquiry. Examples include: Arrest Number Case Number Protective Order Number Call-for-Service Number * CAD (Computer Aided Dispatch) Sequence Number * *Could be used in the event the inquiry is not documented by a case report. Remember, you want enough information in the RFI field that anyone, at any time can locate a reason and/or documentation to substantiate the CHRI transaction. QH Person Data The QH searches the III and Texas CCH using an individual's personal identifiers (NAM, SEX, RAC, DOB) and assigned SOC, MNU, SID, and FBI. The QH is used to determine if an index record for a person's criminal history record is in the III or Texas CCH. When running a Criminal History inquiry QH the following criteria apply: NCIC Search Name Complete name Sex Searches same sex only Race Searches all races (A, B, I, W, U) DOB Date of birth (+/- 3 years) TCIC Search Name Complete name Sex Searches same sex only Race White searches all except Black Black searches all except White DOB Searches year of birth Revised 1/1/2017 Page 96

97 Because of the soundex system, the TCIC/NCIC systems may provide hits on subjects who are not the same as the person stated in the inquiry. Additionally, CCH and III use different soundex routines that can result in different name based responses from the two different systems. It is the inquiring agency's responsibility to insure that the return received is for the person whose record was requested. Compare all the identifiers in the record. All returns over the telecommunications system are considered possible identifications only. Conclusive identification is possible only by fingerprint comparison. TCIC Responses to QH Positive Summary Response - provides the requestor with the following: The Individual's Name(s) Physical Descriptors Numeric Identifiers The identity of the database(s) maintaining Criminal History Record Information Guidance on how to obtain the record(s) by running a QR/RAP The following caveats may be also included in a positive summary response: Above the NAME field may indicate SUBJECT IS DECEASED ; the Date of Death (DOD) will be displayed in the Identification comments field It could be listed is SUBJECT IS REGISTERED AS A SEX OFFENDER appears below the header The Sex Offender file record may be obtained using transaction QXS. However, not all sex offenders will have a complete CCH record. The fact that an individual has a Texas SID number does not mean they have a complete Texas CCH record. When a registered sex offender moves to Texas from another state, the sex offender is assigned a Texas SID number based upon fingerprints. SINGLE SOURCE SUBJECT - NO NCIC RESPONSE Single-State indicates that III has only the Texas CCH record for the subject. Not all Texas CCH records are indexed in III. Multi-Source - indicates that NCIC shows a record for the subject in at least one other state in addition to the record in Texas. No Record TCIC -The inquiry identifiers were unable to match any record in the CCH database. Note: It is possible that the subject may have a record under other identifiers. It is advisable to inquire using other identifiers, if known. A fingerprint search is necessary for positive identification. Revised 1/1/2017 Page 97

98 Two to Five Possible Hits - If the identifiers in the inquiry match between two and five records in the CCH, identification information on the matching records will be transmitted to the terminal over TLETS. It is the responsibility of the inquiring agency to look through the possibilities and determine if there is a match. When a match is found, a QR inquiry by State Identification number (SID) should be the next step in obtaining the record. More Than Five Possible Hits Request a manual search. The identifiers of the inquiry matched more than five records in the CCH files. Use transaction MCCH to prompt CRS to search the files. (It could be possible that CRS will not find a record matching the subject.) Complete Record Not Computerized Request a manual search. The inquiry identifiers matched one record on file which has not been completely computerized. When the criminal history records were converted from the manual files to the computerized files not all of the records were computerized. The most active records and identification information became completely computerized; however, the less active records were not computerized. In addition, fingerprint cards of poor quality with no classification remained out of the system. Use transaction MCCH to request a manual search. Keep in mind that a CCH record is only current upon receipt. This is a real-time system and records are constantly being updated and can change at any time. NCIC Responses to QH The III uses an interface with the NCIC Wanted Person file to provide wanted person data. When this is present, the operator should use transaction QWA to obtain the complete wanted person record. Additional caveats that could be included in an NCIC III response: Subject has a record in the NCIC Convicted Sexual Offender Registry File; a sex offender notice is appended to the criminal history record in III. The sex offender data will display on the FBI record response from the FBI's CJIS Division. Each sex offender notice contains an NCIC number (NIC) that is included in the sex offender data appended to the III and displayed in the FBI record. Record recipients can use the NIC to query the NCIC Convicted Sexual Offender Registry File to obtain the complete sex offender record. Participating state has caused a record subject s SID to be flagged as deceased, the word Deceased will be appended to the SID. Records can be deleted either permanently (record established in error or subject reached 99 years of age) or temporarily (internal corrections needed and record will be reentered). These records will indicate Record No Longer on File. Contact the FBI III Help Line at No Record Response This does not mean that there is absolutely no criminal history record on the individual. Therefore, if an agency receives a no record response, the agency may send a fingerprint submission to the FBI for further searching. In addition, there may be records at the local or state level for which arrest fingerprint submissions are not on file with the FBI. Revised 1/1/2017 Page 98

99 Example of No Record Return NL01HEADERXXXX01234 VAVSP0000 NO IDENTIFIABLE RECORD IN THE NCIC INTERSTATE IDENTIFICATION INDEX (III) FOR NAM/SAMPLE,MICHAEL.SEX/M.RAC/W.DOB/ PUR/C. Example of Single Matching Record Return 7L01HEADERXXXX01234 VAVSP0000 THIS NCIC INTERSTATE IDENTIFICATION INDEX RESPONSE IS THE RESULT OF YOUR INQUIRY ON NAM/TEST,T J SEX/M RAC/W DOB/ PUR/C NAME FBI NO. INQUIRY DATE TEST,THOMAS JOSEPH /12/01 SEX RACE BIRTHDATE HEIGHT WEIGHT EYES HAIR BIRTH PLACE PHOTO M W 1962/08/ BLU BRO PENNSYLVANIA N FINGERPRINT CLASS PATTERN CLASS RS WU RS WU RS WU RS WU LS LS WU WU RS LS LS WU RS RS WU WU ALIAS NAMES TEST,TOM OTHER SCARS-MARKS- BIRTH DATES TATT00S SOCIAL SECURITY MISC NUMBERS 1962/11/25 TAT R ARM AS MISC COMMENTS-PA SINGLE-SOURCE TEST RECORD IDENTIFICATION DATA UPDATED 1990/11/07 THE CRIMINAL HISTORY RECORD IS MAINTAINED AND AVAILABLE FROM THE FOLLOWING: PENNSYLVANIA - STATE ID/PA THE RECORD(S) CAN BE OBTAINED THROUGH THE INTERSTATE IDENTIFICATION INDEX BY USING THE APPROPRIATE NCIC TRANSACTION. Revised 1/1/2017 Page 99

100 Multiple Matching Record Return 3L01HEADERXXXX01234 VAVSP0000 THIS NCIC INTERSTATE IDENTIFICATION INDEX MULTIPLE RESPONSE IS THE RESULT OF YOUR INQUIRY ON NAM/SAMPLE,JOHN SEX/M RAC/W DOB/ PUR/C NAME FBI NO. INQUIRY DATE SAMPLE,JOHN PATRICK /12/01 SEX RACE BIRTH DATE HEIGHT WEIGHT EYES HAIR BIRTH PLACE PHOTO M W 1957/12/ BLU BRO MICHIGAN N FINGERPRINT CLASS PATTERN CLASS PO PM 14 CO 09 RS LS WU WU LS RS WU WU RS WU XX LS WU WU WU LS RS RS WU WU WU ALIAS NAMES SAMPLE,PATRICK OTHER SCARS-MARKS- BIRTH DATES TATTOOS SOCIAL SECURITY MISC NUMBERS 1957/11/25 TAT R ARM AS /10/25 TAT CHEST AS MISC COMMENTS-PERSON IS DIABETIC-THIS IS AN FBI TEST RECORD IDENTIFICATION DATA UPDATED 1984/04/23 THE CRIMINAL HISTORY RECORD IS MAINTAINED AND AVAILABLE FROM THE FOLLOWING: FLORIDA - STATE ID/FL FBI - FBI/ END - 1ST NCIC III RECORD FOR MULTIPLE RESPONSE NAME FBI NO. INQUIRY DATE SAMPLE,JAMES /12/01 SEX RACE BIRTH DATE HEIGHT WEIGHT EYES HAIR BIRTH PLACE PHOTO M W 1958/12/ BRO RED GEORGIA N FINGERPRINT CLASS PATTERN CLASS AA TT 21 PM 22 RS LS WU WU LS RS WU WU RS WU RS LS WU WU LS RS WU WU RS WU MISC COMMENTS-THIS IS AN FBI TEST RECORD IDENTIFICATION DATA UPDATED 1984/04/24 THE CRIMINAL HISTORY RECORD IS MAINTAINED AND AVAILABLE FROM THE FOLLOWING: MICHIGAN - STATE ID/MI END - LAST NCIC III RECORD FOR MULTIPLE RESPONSE THE RECORD(S) CAN BE OBTAINED THROUGH THE INTERSTATE IDENTIFICATION INDEX BY USING THE APPROPRIATE NCIC TRANSACTION. END Revised 1/1/2017 Page 100

101 III Inquiry Transaction (QR/RAP) To obtain a specific criminal history record via the III, a QR containing either the subject's FBI or SID Number is used. The FBI or SID Number may be obtained from a positive response to a QH, matching fingerprints or from other sources available to the inquiring agency. The III responds with either a positive response (indicating that a record is available via the III) or a negative response (indicating that a record may exist but is not indexed in the III). A positive QR response will provide the complete criminal history record (also known as a rap sheet) of the subject based on the FBI or SID Number used in the QR. When a record is available via the III, the III will send the requester an initial response providing a listing of the states/agencies responsible for providing CHRI. The III will also notify each state/agency that maintains a portion of the subject's record to respond to the requester with the CHRI contained in its criminal history database. These records will be provided via the Nlets. Agency/Case Data Originating Agency Code (ORI) Purpose Code (PUR) Attention of Recipient (ATN) Reason for Inquiry (RFI) Person Data FBI Number (FBI) State Identification Number (SID) Revised 1/1/2017 Page 101

102 Example of a Detailed Return This record is based only on the FBI number in your request Because additions or deletions may be made at any time, a new copy should be requested when needed for subsequent use. (US; ) All arrest entries contained in this FBI record are based on finger- print comparisons and pertain to the same individual. (US; ) The use of this record is regulated by law. It is provided for official use only and may be used only for the purpose requested. (US; ) ************************ IDENTIFICATION ************************ Subject Name(s) KILLER, COPY CAT KILLER, CC (AKA) KIL, COPY (AKA) KILLER, CAT (AKA) Subject Description FBI Number State Id Number DOC Number Social Security Number Driver's License Number Miscellaneous Numbers 3217 Alien Registration Unknown 3218 Marine Corps Serial Unknown Sex Race Skin Tone Female Black Bro Height Weight Date of Birth 5'05" 140 Pounds Hair Color Eye Color Fingerprint Pattern Brown ( ) Brown ( ) TT LS LS WU RS WU RS WU RS Scars, Marks, and Tattoos Code Description, Comments, and Images NCIC SC L KNEE ; SCAR ON LEFT KNEE (WVFBINF00) NCIC SC HEAD ; SCAR ON HEAD (WVFBINF00) Blood Type Medical Condition Place of Birth Citizenship Ethnicity TX US Marital Status Employment Dog Catcher Residence Fingerprint Images Palmprint Images Religion Revised 1/1/2017 Page 102

103 Photo Images Type Other Arresting agency has photo associated with arrest date of 1997/07/11 (DCFBIIIIZ) DNA Data Caution Information Caution WANTED - CONFIRM THAT WANT IS STILL OUTSTANDING. AGENCY- FBI CLEVELAND (OHFBICV00) WANTED-NCIC #W MULDER,FOX X CONSPIRACY TO OBSTRUCT ALIENS CASE#X234789XX DATE OF WARRANT 01/05/1998 NOTIFY OHFBICV00 FBI CLEVELAND OHIO (FBI; ) *********************** CRIMINAL HISTORY *********************** =========================== Cycle 001 =========================== Tracking Number Earliest Event Date Arrest Date Arrest Case Number A Arresting Agency DCFBIIIIZ Subject's Name KILLER, COPY CAT Offender Id Number Arrest Type ADULT Charge Charge Number 1 Charge Sequence 1 Charge Tracking Number Charge Case Number Agency DCFBIIIIZ Offense Date Charge Description BANK ROBBERY Statute 3331 NCIC Offense Code State Offense Code Counts 1 Severity Unknown Inchoate Charge Enhancing Factor Reducing Factor Disposition Unknown Comment Revised 1/1/2017 Page 103

104 Individual State Repositories Each state has its own criminal history repository and should not be used as substitute for III. An inquiry should be made into the Individual state repository only as a secondary inquiry after a QH inquiry has returned a No Record response, or one has received a record, but feels that there may be additional data in the state files. CHRI Identity Query (IQ) IQ Response(s) will be returned and the requestor will select the desired record and submit an FQ. Agency/Case Data Originating Agency Code (ORI) Nlets State Code (DRI) Attention of Recipient (ATN) Purpose Code (PUR) Reason for Inquiry (RFI) Person Data Name (NAM) Date of Birth (DOB) Sex (SEX) Race (RAC) Social Security Number (SOC) Miscellaneous Number (MNU) Canadian Person Data Name (NAM) Date of Birth (DOB) Sex (SEX) Request Additional Records (RAR) Revised 1/1/2017 Page 104

105 CHRI Full Record Query (FQ) The SID must be used to obtain the rap sheet or criminal history on a subject. Agency/Case Data Originating Agency Code (ORI) Nlets Destination Code (DRI) Attention of Recipient (ATN) Purpose Code (PUR) Reason for Inquiry (RFI) Person Data State Identification Number (SID) Canadian Identification Number (FPS) Mailing Address Data Department Postal Address (DPT) Building Postal Address (BLD) Address (ADR) City and State Postal Address (CIS) Zip Code (ZIP) Revised 1/1/2017 Page 105

106 CHRI Additional Information Request (AQ) If the requestor would like additional information the requestor can use the (AQ) screen. The AQ Query will be used to request supplemental information not available through the normal IQ/FQ or to request information from a local agency. This is a general free-form request for CHRI when all required data is not available. TLETS users may occasionally receive a directed request from another state for CHRI related information addressed to a specific local agency in Texas. If you receive a CHRI related request in the form of an Nlets message type "AQ" inquiry, then you MUST reply to that request using the Nlets message type "AR" response. To request supplemental information including requests for mailed records, photos, fingerprint cards, dispositions, special handling of the inquiry, inquiry when only partial DOB is known, etc., use transaction form AQ. Agency/Case Data Originating Agency Code (ORI) Destination ORI/Region Code (DRI) Attention of Recipient (ATN) Purpose Code (PUR) Reason for Inquiry (RFI) Person Data Name (NAM) Date of Birth (DOB) Sex (SEX) Race (RAC) Social Security Number (SOC) State Identification Number (SID) Message Text (TXT) Response to Manual CCH Request (AR) AR is used to respond to a manual CHRI request if an agency attempts to request any CHRI related information by sending an administrative message (Nlets message type "AM") you must not provide CHRI to that requestor. It is recommended that your agency send an administrative message back to them requesting they resubmit their request using the prescribed Nlets CHRI formats. (For further information reference the TLETS/Nlets User manual). Agency/Case Data Originating Agency Code (ORI) Destination ORI (DRI) Attention of Recipient (ATN) Purpose Code (PUR) Message Text (TXT) Revised 1/1/2017 Page 106

107 CHRI Dissemination Only authorized criminal justice personnel may receive criminal history record information. The following are examples of authorized personnel: Corrections Officers District/County Prosecutors and Magistrates Federal Law Enforcement Agents Peace Officers (Section 1.07, Penal Code) Probation and Parole Officers The following are examples of those that would be considered not authorized: Defense Attorneys (without a court order - *Michael Morton Act) Military Recruiters News Media Private Investigators Private Citizens and Employers * Michael Morton Act Morton was convicted in 1987 and sentenced to life in prison for the murder of his wife. He was exonerated in 2011 after DNA testing connected another man to the brutal crime. In their investigation, Morton's lawyers discovered that the prosecutor in the original case had withheld critical evidence that could have pointed to the real killer and spared Morton the quarter-century he spent behind bars. Since his exoneration, Morton has lobbied lawmakers to pass legislation that would prevent others from suffering the same fate. Under Senate Bill 1611, prosecutors will be required to turn over evidence to defendants accused of crimes and to keep a record of the evidence they disclose. The landmark 1963 U.S. Supreme Court ruling in Brady v. Maryland already requires prosecutors to give defendants information that is material either to guilt or to punishment. The Morton Act requires disclosure of evidence regardless of its materiality to guilt or punishment. It is the first significant reform to Texas discovery laws since However, a court order must still be granted for the defense to view or gain custody of the criminal history record information. Revised 1/1/2017 Page 107

108 Secondary Dissemination Secondary dissemination occurs when CHRI is released to an authorized source outside the requesting agency. All secondary disseminations must be logged. However, if the REQ or ATN field properly identifies the requestor and agency names, manual logging is optional but highly recommended. These logs shall be maintained for at least twelve months. Storage and Destruction of CHRI When CHRI is stored, agencies shall establish appropriate administrative, technical and physical safeguards to ensure the security and confidentiality of the information. These records shall be stored for extended periods only when they are key elements for the integrity and/or utility of case files and/or criminal record files. CHRI shall be securely disposed of when no longer required, using formal procedures. Formal procedures for the secure disposal or destruction of physical media shall minimize the risk of sensitive information compromise by unauthorized individuals. Physical media shall be destroyed by shredding or incineration. Agencies shall ensure the disposal or destruction is witnessed or carried out by authorized personnel. Revised 1/1/2017 Page 108

109 CHRI Related Laws The Security Clearance Information Act (Public Law ): States that the local law enforcement agencies must release to the Department of Defense, Office of Personnel Management, and Central Intelligence Agency conviction and non-conviction data when the request is to determine eligibility for access to classified information or assignment or retention in sensitive national security duties. This refers to the local agency s records only, not information obtained through TCIC/NCIC using TLETS/Nlets. The Housing Opportunity Program Extension Act of 1996 (Public Law ): Allows for III inquiry under the authority of the Housing Opportunity Extension Act of The use of this purpose code (PUR/H) is limited to QH transactions for Public Housing Authorities (PHA) assigned an ORI ending with the letter Q. The PHA will use the results of the QH response in deciding if a fingerprint based search should be required and should not be used as the basis for disqualification, lease enforcement or eviction. Texas Government Code : Allows citizens to obtain Texas conviction and/or deferred adjudication records of an offender directly from the DPS, not from the local agency. Citizens can contact the Criminal History Inquiry Unit, or access the information electronically via the Internet at web address: For further information, contact the Criminal History Inquiry Unit at Texas Government Code : Allows the DPS Crime Records Service to disseminate criminal history information to the person who is the subject of the criminal history record information. Agencies receiving such requests from citizens should direct them to the Crime Records Service Criminal History Inquiry Unit at There is a fee charged for this service. Texas Government Code : Provides a penalty for unauthorized obtaining, use, or disclosure of criminal history record information. Under Subsection (a), such a violation is a Class B misdemeanor. If used, obtained, or disclosed for remuneration or the promise of remuneration, under Subsection (c), such an offense is a felony of the second degree. Revised 1/1/2017 Page 109

110 Texas Government Code The statute cited on this page is included in the primary law governing the Texas Department of Public Safety, which is found in Chapter 411 of the Texas Government Code. This statute is part of the changes made to Chapter 411 as a result of the passage of the DPS Sunset Bill by the 1993 Regular Session of the Texas Legislature. All provisions of this bill became effective on September 1, GC UNAUTHORIZED OBTAINING, USE, OR DISCLOSURE OF CRIMINAL HISTORY RECORD INFORMATION: PENALTY. a. A person commits an offense if the person knowingly or intentionally: 1. obtains criminal history record information in an unauthorized manner, uses the information for an unauthorized purpose or discloses the information to a person who is not entitled to the information; 2. provides a person with a copy of the person s criminal history record information obtained from the department; or 3. violates a rule of the department adopted under this subchapter. b. An offense under Subsection (a) is a Class B misdemeanor, except as provided by Subsection (c). c. An offense under Subsection (a) is a felony of the second degree if the person: 1. obtains, uses, or discloses criminal history record information for remuneration or for the promise of remuneration; or 2. employs another person to obtain, use or disclose criminal history record information for remuneration or for the promise of remuneration. d. The department shall provide a copy of this section to: 1. each person who applies for access to criminal history record information maintained by the department; and 2. each private entity that purchases criminal history record information from the department. Additionally, the ultimate sanction available to TCIC management for enforcement of system policy is to discontinue system access to NCIC and TCIC criminal history record information. Revised 1/1/2017 Page 110

111 Corrections Tracking System Inquiry (CTSI) Agencies authorized to access the CCH files may also make inquiries over TLETS regarding custody data on individuals who are currently or were formerly supervised by the TDCJ. This data includes demographics, sentencing, offense, and parole information. Individuals in the database include inmates, probationers, and parolees. This information may be obtained using transaction CTSI and is available for criminal justice purposes only. Certain data fields contain confidential information that is protected by state or federal legislation. The only purpose code authorized is PUR: C. Inquiries of the CTSI will require the subject s Texas SID number and all fields are mandatory. Agency/Case Data Originating Agency Code (ORI) State ID Number (SID) Attention (ATN) Positive Return SID/TX PUR/C.ATN/WHISENHUNT SUE. TEXAS DEPARTMENT OF CRIMINAL JUSTICE CORRECTIONS TRACKING SYSTEM-OFFENDER DATA OFFENDER STATUS: ID-ACTIVE STATE READY DATE: SID#: TDCJID#: FBI#: AB2 NAME: DEBARDS,BEHIND DOB: 08/14/1978 ALIAS: ALIAS DOB: RACE:B SEX: M HAIR: BLK EYE: BRO SKIN: MBR HGT:5'09 WGT: 235 SMT1: TAT CHEST SMT2: TAT BACK SMT3: *MORE SMT* CITIZENSHIP: US POB: TX/227 MARITAL STATUS: S CITY: STATE: ZIP: - OFFENSE OF RECORD: COUNTY/COURT: TRAVIS/427 OFFENSE TRACKING#: X/001 SENTENCE: YEARS: 3 MONTHS: 0 DAYS: 0 COUNTY CAUSE#: D-1-DC LEGISLATIVE#: 82 DATE RECEIVED AT TDCJID: 03/23/2016 TDCJID UNIT ASSIGNED: EAST TEXAS IS PAROLE ELIGIBILITY DATE: 01/01/0001 ICC: COUNTY RELEASED TO: DATE OF RELEASE: REL TYPE: HALFWAY HOUSE LOC: PAROLE REG/DIST: OFFICER: PAROLE STATUS: REASON: PAROLE VIOLATION WARRENTS: MRI: IN: TDCJ 43 AT 28NOV :30:24 OUT: M304 4 AT 28NOV :30:24 Revised 1/1/2017 Page 111

112 For further assistance or information regarding inmates, probationers, parolees, and revocation warrants, contact the TDCJ-Parole Division in Austin at the appropriate number: Inmate Status: Probation Information: Parole Information: Revocation or Pre-revocation Warrants: TCIC Retesting Policy TCIC/NCIC Training Policy states that operators who operate a terminal are required to attend classroom training and then must re-certify every two years or re-attend classroom training. To take a recertification test or register for other TCIC/NCIC or TLETS/Nlets course go to: Use your OMNIXX user ID and password to sign on. Revised 1/1/2017 Page 112

113 Attempted Child Abductions - Senate Bill 742 During the 83 rd Legislative session, Senate Bill 742 was enacted and amended Article 63 of the Code of Criminal Procedure. This bill requires the Texas Missing Person Clearinghouse to collect information on attempted child abductions. Reporting requirements from law enforcement agencies are defined in article (CCP), A law enforcement officer or local law enforcement agency reporting an attempted child abduction to the clearinghouse shall make the report by use of the TLETS or a successor system of telecommunication used by law enforcement agencies and operated by the Department of Public Safety. Upon receiving a report of attempted child abduction, an agency shall immediately but not to exceed eight hours after receiving the report, submit the information to the Texas Missing Person Clearinghouse. TLETS has created a specific administrative message format designed for this reporting requirement; however agencies can submit an administrative message to the clearinghouse for this purpose, as long as, all required information is included in the message. This administrative message shall be sent to the TLETS group MPCA, which will be distributed to devices within the Texas Missing Persons Clearinghouse and Texas Joint Crime Information Center (TxJCIC). AM For Reporting Attempted Child Abduction (AMACA) Agency/Case Data Reporting Agency ORI (RRI) Reporting Agency (AGY) Contact Person (ACN) Phone Number (PHO) Originating Case Number (OCA) Attempted Abduction Event Information Date of Event (DAT) Time of Event (TME) Street Number (SNU) Street Name (SNA) City Name (CTY) State (STA) Zip Code (ZIP) Method of Operation Used to Lure Child (MOU) Revised 1/1/2017 Page 113

114 Victim and Witness Information Victim Name (NAM) Age (AGE) Sex (SEX) Race (RAC) Date of Birth (DOB) Witness Name (WNM) Witness Contact Information Address/Phone/ /etc. (WCI) Suspect Information Sex (SSX) Race (SRC) Estimated Age (SAG) Estimated Height (HGT) Estimated Weight (WGT) Scars, Marks and Tattoos (SMT) Identifying Information (IDT) Additional Descriptive Information - Clothing Description/Facial Hair/Glasses (DSC) Vehicle Information **if only PARTIAL PLATE information is known, include the consecutive digits in the LIC field, place an X in the Is this a Partial Plate? box, and state which part is known in the REMARKS field.** License Plate (LIC) License State (LIS) Is this a Partial Plate? Vehicle ID Number (VIN) Vehicle Year ((VYR) Vehicle Make (VMA) Vehicle Model (VMO) Vehicle Style (VST) Vehicle Color (VCO) Identifying Marks on Vehicle (IDM) Revised 1/1/2017 Page 114

115 TCIC Training Evaluation Form The purpose of this critique is to provide information for an assessment of the course. TCIC Less Than Full Access Course TCOLE Course # 3807 Date: Location: Instructor: Please rate the course on a scale of 1 5, with 1 being strongly disagree and 5 being strongly agree. Mark the most appropriate response. Strongly Disagree Strongly Agree The instructor(s) was well prepared for course. 2. The course material was clearly articulated and organized. 3. The course material is useful for my job related duties. 4. I would recommend someone else attend this course. 5. Subjects were well covered. Please provide your comments and assessment of the course: Revised 1/1/2017 Page 115

TEXAS DEPARTMENT OF PUBLIC SAFETY 5805 NORTH LAMAR BOULEVARD POST OFFICE BOX 4087, AUSTIN, TX /

TEXAS DEPARTMENT OF PUBLIC SAFETY 5805 NORTH LAMAR BOULEVARD POST OFFICE BOX 4087, AUSTIN, TX / TEXAS DEPARTMENT OF PUBLIC SAFETY 5805 NORTH LAMAR BOULEVARD POST OFFICE BOX 4087, AUSTIN, TX 78773-0252 512/424-2365 THOMAS A. DAVIS, JR. DIRECTOR DAVID McEATHRON ASST. DIRECTOR SCHOOL CONTRACTOR DOCUMENT

More information

CENTRAL CRIMINAL RECORDS EXCHANGE RICHMOND, VIRGINIA SPECIAL REPORT JANUARY 15, 2001

CENTRAL CRIMINAL RECORDS EXCHANGE RICHMOND, VIRGINIA SPECIAL REPORT JANUARY 15, 2001 CENTRAL CRIMINAL RECORDS EXCHANGE RICHMOND, VIRGINIA SPECIAL REPORT JANUARY 15, 2001 AUDIT SUMMARY The findings and recommendations within this report highlight the need for criminal justice agencies to

More information

FBI officials have estimated

FBI officials have estimated Vol. 2, No. 8 November 2003 Sharing criminal history record information: the Interstate Identification Index By Eric Grommon, ICJIA Research Assistant and Christine Devitt, ICJIA Research Analyst FBI officials

More information

TITLE 20: CORRECTIONS, CRIMINAL JUSTICE, AND LAW ENFORCEMENT CHAPTER II: DEPARTMENT OF STATE POLICE

TITLE 20: CORRECTIONS, CRIMINAL JUSTICE, AND LAW ENFORCEMENT CHAPTER II: DEPARTMENT OF STATE POLICE 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 TITLE 20: CORRECTIONS, CRIMINAL JUSTICE, AND LAW ENFORCEMENT CHAPTER II: DEPARTMENT

More information

LOCAL ENFORCEMENT RESPONSE TO ILLEGAL IMMIGRATION : GENERAL GUIDELINES

LOCAL ENFORCEMENT RESPONSE TO ILLEGAL IMMIGRATION : GENERAL GUIDELINES PRINCE WILLIAM COUNTY POLICE DEPARTMENT MANUAL OF GENERAL ORDERS General Order: 45.01 Effective: DRAFT Number of Pages: 4 LOCAL ENFORCEMENT RESPONSE TO ILLEGAL IMMIGRATION : GENERAL GUIDELINES A. The purpose

More information

AOM CHAPTER S 105. CJIS WorkStations. Table of Contents

AOM CHAPTER S 105. CJIS WorkStations. Table of Contents AOM CHAPTER S 105 CJIS WorkStations Table of Contents I. INTRODUCTORY DISCUSSION II. POLICY III. SYSTEM ACCESS IV. PROVISIONS V. CORI VI. INTERSTATE IDENTIFICATION INDEX VII. NCIC FILES POLICY COMPLIANCE

More information

Other Transactions Codes as of 6/02/2008. Press CTRL + F to prompt search field.

Other Transactions Codes as of 6/02/2008. Press CTRL + F to prompt search field. Other Transactions s as of 6/02/2008 Press CTRL + F to prompt search field. OTHER TRANSACTIONS CODES TABLE OF CONTENTS 1--BENEFITS AND EFFECTIVENESS DATA 1.1 REASON FOR PROPERTY RECORD REMOVAL (RPP) FIELD

More information

Signed, SEALED, Delivered:

Signed, SEALED, Delivered: Signed, SEALED, Delivered: Understanding the New Juvenile Sealing Laws Dawson Juvenile Law Conference Horseshoe Bay, Texas Objective To provide an overview of the 2017 legislative changes affecting juvenile

More information

ILLINOIS REGISTER RULES PUBLISHED BY JESSE WHITE SECRETARY OF STATE OF GOVERNMENTAL AGENCIES

ILLINOIS REGISTER RULES PUBLISHED BY JESSE WHITE SECRETARY OF STATE OF GOVERNMENTAL AGENCIES ILLINOIS REGISTER RULES OF GOVERNMENTAL AGENCIES Index Department Administrative Code Division 111 E. Monroe St. Springfield, IL 62756 217-782-7017 www.cyberdriveillinois.com Printed on recycled paper

More information

DEPARTMENT OF ARKANSAS STATE POLICE ARKANSAS CONCEALED HANDGUN CARRY LICENSE RULES

DEPARTMENT OF ARKANSAS STATE POLICE ARKANSAS CONCEALED HANDGUN CARRY LICENSE RULES TABLE OF CONTENTS DEPARTMENT OF ARKANSAS STATE POLICE ARKANSAS CONCEALED HANDGUN CARRY LICENSE RULES CHAPTER 1. Title; Authority Rule 1.0 Title Rule 1.1 Authority; Purpose Rule 1.2 Definitions Rule 1.3

More information

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY POLICY AND PROCEDURE # 105 SUBJECT: Identity Theft EFFECTIVE DATE: 16 June 2006 PAGE 1 OF 8 REVIEW DATE: 30 November 2017 APPROVED: CHANGE

More information

LOCAL ENFORCEMENT RESPONSE TO ILLEGAL IMMIGRATION: GENERAL GUIDELINES

LOCAL ENFORCEMENT RESPONSE TO ILLEGAL IMMIGRATION: GENERAL GUIDELINES PRINCE WILLIAM COUNTY POLICE DEPARTMENT MANUAL OF GENERAL ORDERS General Order: 45.01 I Effective: 0110112017 1 Number of Pages: 4 LOCAL ENFORCEMENT RESPONSE TO ILLEGAL IMMIGRATION: GENERAL GUIDELINES

More information

H 7688 S T A T E O F R H O D E I S L A N D

H 7688 S T A T E O F R H O D E I S L A N D ======== LC000 ======== 01 -- H S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 01 A N A C T RELATING TO COURTS AND CIVIL PROCEDURE--COURTS -- EXTREME RISK PROTECTION ORDERS

More information

Application of Policy. All applicants for general student employment in a security sensitive position.

Application of Policy. All applicants for general student employment in a security sensitive position. Policies of the University of North Texas 05.007 Criminal History Background Checks for Student Employment Applicants Chapter 5 Human Resources Policy Statement. The University of North Texas is committed

More information

The entering agency is to utilize the miscellaneous field to identify any pertinent information pertaining to the record.

The entering agency is to utilize the miscellaneous field to identify any pertinent information pertaining to the record. 4 WANTED, MISSING, COP FILE, AND DOTS 4.1 INTRODUCTION The infmation contained in the LEADS Warrant and Wanted Persons File (W&W), the NCIC Wanted and Missing Persons and Unidentified Persons Files is

More information

PROFESSIONAL APPLICATION Main and Mitchell Road P. O. Box 288 Booker, TX Ph: (806)

PROFESSIONAL APPLICATION Main and Mitchell Road P. O. Box 288 Booker, TX Ph: (806) BOOKER INDEPENDENT SCHOOL DISTRICT PROFESSIONAL APPLICATION Main and Mitchell Road P. O. Box 288 Booker, TX 79005 Ph: (806) 658-4501 We consider applicants for all positions without regard to race, color,

More information

The NICS Improvement Amendments Act: State Estimates of Available Records Information Collection

The NICS Improvement Amendments Act: State Estimates of Available Records Information Collection The NICS Improvement Amendments Act: State Estimates of Available Records Information Collection I. INTRODUCTION This form has been developed pursuant to the National Instant Criminal Background Check

More information

Criminal History Overview. Law Enforcement Records Management Association 2016 Meeting

Criminal History Overview. Law Enforcement Records Management Association 2016 Meeting Law Enforcement Records Management Association 2016 Meeting Michigan State Police Criminal History Section OUR GOAL Build, Maintain, and Disseminate Accurate, Timely, and Complete Criminal History Records

More information

STATE OF ILLINOIS ILLINOIS STATE POLICE ADAM WALSH CHILD PROTECTION ACT USER AGREEMENT BETWEEN THE ILLINOIS STATE POLICE AND

STATE OF ILLINOIS ILLINOIS STATE POLICE ADAM WALSH CHILD PROTECTION ACT USER AGREEMENT BETWEEN THE ILLINOIS STATE POLICE AND STATE OF ILLINOIS ILLINOIS STATE POLICE ADAM WALSH CHILD PROTECTION ACT USER AGREEMENT BETWEEN THE ILLINOIS STATE POLICE AND The Illinois State Police (hereinafter ISP ) acting as the state central repository

More information

Criminal Justice Information Center. Functional Analysis & Records Disposition Authority

Criminal Justice Information Center. Functional Analysis & Records Disposition Authority Criminal Justice Information Center Functional Analysis & Records Disposition Authority Presented to the State Records Commission July 27, 2000 Table of Contents Functional and Organizational Analysis

More information

Connecticut Informational Guide for Noncriminal Justice Use of Criminal History Record Information (CHRI)

Connecticut Informational Guide for Noncriminal Justice Use of Criminal History Record Information (CHRI) Connecticut Informational Guide for Noncriminal Justice Use of Criminal History Record Information (CHRI) This document is designed to guide criminal justice and noncriminal justice agencies, with access

More information

Uploading Protective Orders into TCIC/NCIC. The Last Step in the Process

Uploading Protective Orders into TCIC/NCIC. The Last Step in the Process Uploading Protective Orders into TCIC/NCIC The Last Step in the Process Today we will walk you through the process of getting a protective order uploaded into the Texas and National databases used by law

More information

Point of Contact (POC): District s contact person when SDDCI sends out Audit information, the contact person when an onsite Audit is scheduled.

Point of Contact (POC): District s contact person when SDDCI sends out Audit information, the contact person when an onsite Audit is scheduled. BACKGROUND CHECKS FILE: GCDB The School District is committed to the selection of quality staff and to providing a safe environment for students and staff. As part of that commitment, the district will

More information

Am. Sub. H.B. 49 As Passed by the Senate AGOCD15

Am. Sub. H.B. 49 As Passed by the Senate AGOCD15 CC6262 Am. Sub. H.B. 49 As Passed by the Senate AGOCD15 moved to amend as follows: In line 46 of the title, after "2953.25," insert "2953.32, 2953.37, 2953.38, 2953.53," In line 248 of the title, after

More information

C. When firearms or weapons are used in the commission of a crime or in the possession of a person at the time of their arrest.

C. When firearms or weapons are used in the commission of a crime or in the possession of a person at the time of their arrest. DEPARTMENTAL GENERAL ORDER Rev. 21 May 01 H-9 Index as: Ref: CALEA Standard 84.1.7 Disposal of Firearms and Miscellaneous Weapons Firearms Disposal Weapons Disposal DISPOSAL OF FIREARMS AND MISCELLANEOUS

More information

INVESTIGATIONS OF STUDENTS AT PUBLIC SCHOOLS

INVESTIGATIONS OF STUDENTS AT PUBLIC SCHOOLS INVESTIGATIONS OF STUDENTS AT PUBLIC SCHOOLS INDEX CODE: 1705 EFFECTIVE DATE: 09-06-17 Contents: I. School Resource Officers II. Arrests/Questioning/Removal of Students on School Premises During School

More information

LEGAL PROCESS WRITTEN DIRECTIVE: 14.3 EFFECTIVE DATE: REVISION DATE:

LEGAL PROCESS WRITTEN DIRECTIVE: 14.3 EFFECTIVE DATE: REVISION DATE: LEGAL PROCESS WRITTEN DIRECTIVE: 14.3 EFFECTIVE DATE: 09-15-1995 REVISION DATE: 04-11-2016 Contents I. Purpose II. Policy III. Definitions IV. Documentation V. Service/Execution of Criminal Documents VI.

More information

OKLAHOMA DEPARTMENT OF PUBLIC SAFETY OKLAHOMA LAW ENFORCEMENT TELECOMMUNICATIONS SYSTEMS

OKLAHOMA DEPARTMENT OF PUBLIC SAFETY OKLAHOMA LAW ENFORCEMENT TELECOMMUNICATIONS SYSTEMS ..~ is OKLAHOMA DEPARTMENT OF PUBLIC SAFETY OKLAHOMA LAW ENFORCEMENT TELECOMMUNICATIONS SYSTEMS TERMINAL USER AGREEMENT Tbis document constitutes an agreement between the Oklahoma Department of Public

More information

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 5.17

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 5.17 PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 5.17 Issued Date: 05-10-82 Effective Date: 05-10-82 Updated Date: 11-20-00 SUBJECT: WANTED PERSONS 1. POLICY *7 A. In all cases where the perpetrator has been identified,

More information

SEARCH Resolutions Essential Elements and Actions for Implementing a Nationwide Criminal History Program (May 21, 1979)

SEARCH Resolutions Essential Elements and Actions for Implementing a Nationwide Criminal History Program (May 21, 1979) SEARCH Resolutions 74-01 National Computerized Criminal History System (December 13, 1974) Resolution numbering: The first two numbers refer to the year the Resolution was passed; the second two numbers

More information

REPORTING REQUIREMENT GUIDE FOR JUSTICE COURTS 2017 Edition

REPORTING REQUIREMENT GUIDE FOR JUSTICE COURTS 2017 Edition TEXAS JUSTICE COURT TRAINING CENTER REPORTING REQUIREMENT GUIDE FOR JUSTICE COURTS 2017 Edition Funded by a grant from the Texas Department of Transportation Texas Justice Court Training Center in conjunction

More information

2016 CCH UPDATES AND ENHANCEMENTS

2016 CCH UPDATES AND ENHANCEMENTS 2016 CCH UPDATES AND ENHANCEMENTS Cheryl Payton Georgia Crime Information Center CCH/Identification Program Manager cheryl.payton@gbi.ga.gov 440-270-8388 CCH Enhancements Effective July 20,2016 http://gcicweb.gbi.state.ga.us

More information

REPORTING REQUIREMENT GUIDE FOR JUSTICE COURTS

REPORTING REQUIREMENT GUIDE FOR JUSTICE COURTS 2015 edition TJCTC In conjunction with the Texas Department Of Transportation Presents REPORTING REQUIREMENT GUIDE FOR JUSTICE COURTS The Texas Justice Court Training Center is a division of Texas State

More information

INTERPOL s Rules on the Processing of Data

INTERPOL s Rules on the Processing of Data OFFICE OF LEGAL AFFAIRS INTERPOL s Rules on the Processing of Data [III/IRPD/GA/2011] REFERENCES 51st General Assembly session, Resolution AG/51/RES/1, adopting the Rules on International Police Cooperation

More information

HOUSE OF REPRESENTATIVES STAFF ANALYSIS REFERENCE ACTION ANALYST STAFF DIRECTOR

HOUSE OF REPRESENTATIVES STAFF ANALYSIS REFERENCE ACTION ANALYST STAFF DIRECTOR HOUSE OF REPRESENTATIVES STAFF ANALYSIS BILL #: CS/HB 1363 Organized Criminal Activity SPONSOR(S): Gonzalez and others TIED BILLS: IDEN./SIM. BILLS: REFERENCE ACTION ANALYST STAFF DIRECTOR 1) Safety &

More information

MACCAC AGENTS CONFERENCE 2018

MACCAC AGENTS CONFERENCE 2018 MACCAC AGENTS CONFERENCE 2018 AGENDA BCA MNJIS Overview New MN Criminal History System (CHS) Overview Demo National Data Exchange (NDEx) Probation Client Notifications Integrated Search System (ISS) MINNESOTA

More information

SEALING OF JUVENILE RECORDS

SEALING OF JUVENILE RECORDS SEALING OF JUVENILE RECORDS Presented by Stacey L. Brownlee Gregg Co. DA s Office stacey.brownlee@co.gregg.tx.us (903) 237-2526 2526 As of the 1 st of October with the Texas Attorney General s Office stacey.brownlee@oag.state.tx.us

More information

.01 PURPOSE: The purpose of this policy is to establish guidelines for handling incidents that involve domestic violence.

.01 PURPOSE: The purpose of this policy is to establish guidelines for handling incidents that involve domestic violence. FREDERICK POLICE DEPARTMENT GENERAL ORDER Section 5: Special Populations Order Number: 510 Topic: Issued by: Chief of Police Approved: 12/03/18 Review: Annually in October by Criminal Investigation Division

More information

OREGON ADMINISTRATIVE RULES OREGON DEPARTMENT OF FISH AND WILDLIFE DIVISION 600 CRIMINAL HISTORY CHECK AND FITNESS DETERMINATION RULES

OREGON ADMINISTRATIVE RULES OREGON DEPARTMENT OF FISH AND WILDLIFE DIVISION 600 CRIMINAL HISTORY CHECK AND FITNESS DETERMINATION RULES DIVISION 600 CRIMINAL HISTORY CHECK AND FITNESS DETERMINATION RULES 635-600-0000 Statement of Purpose and Statutory Authority Purpose: These rules provide for the Department s acquisition of information

More information

Number August 31, 2017 IMMEDIATE POLICY CHANGE GJ-14, VICTIMS BILL OF RIGHTS DO-1, INTAKE PROCESS

Number August 31, 2017 IMMEDIATE POLICY CHANGE GJ-14, VICTIMS BILL OF RIGHTS DO-1, INTAKE PROCESS The Briefing Board Number 17-35 August 31, 2017 IMMEDIATE POLICY CHANGE GJ-14, VICTIMS BILL OF RIGHTS DO-1, INTAKE PROCESS All employees are required to read these policy changes to ensure they are familiar

More information

The National Crime Information Center A Review and Evaluation August 3, 2005

The National Crime Information Center A Review and Evaluation August 3, 2005 The National Crime Information Center A Review and Evaluation August 3, 2005 Statement of Purpose This report was prepared on behalf of the National Association of Professional Background Screeners (NAPBS)

More information

Privacy Impact Assessment. April 25, 2006

Privacy Impact Assessment. April 25, 2006 for the Immigration and Customs Enforcement (ICE) General Counsel Electronic Management System (GEMS) April 25, 2006 Contact Point William C. Birkett Chief, Knowledge Management Division Office of the

More information

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2009 HOUSE DRH10820-LH-6A (11/13) Short Title: Limited Hunting Privilege/Nonviolent Felons.

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2009 HOUSE DRH10820-LH-6A (11/13) Short Title: Limited Hunting Privilege/Nonviolent Felons. H GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 0 HOUSE DRH-LH-A (/) D Short Title: Limited Hunting Privilege/Nonviolent Felons. (Public) Sponsors: Referred to: Representative Haire. 1 0 1 A BILL TO BE ENTITLED

More information

CHAPTER Committee Substitute for Senate Bill No. 1552

CHAPTER Committee Substitute for Senate Bill No. 1552 CHAPTER 2018-86 Committee Substitute for Senate Bill No. 1552 An act relating to juvenile justice; amending s. 320.08058, F.S.; allowing the Department of Highway Safety and Motor Vehicles to distribute

More information

RECORD RESTRICTION. Superior Court Clerks Conference April 30, 2014

RECORD RESTRICTION. Superior Court Clerks Conference April 30, 2014 RECORD RESTRICTION Superior Court Clerks Conference April 30, 2014 "Restrict," "restricted," or "restriction" means that the criminal history record information of an individual relating to a particular

More information

ICAOS Rules. General information

ICAOS Rules. General information ICAOS Rules General information Effective Date: March 01, 2018 Introduction The Interstate Commission for Adult Offender Supervision is charged with overseeing the day-to-day operations of the Interstate

More information

NC General Statutes - Chapter 14 Article 52A 1

NC General Statutes - Chapter 14 Article 52A 1 Article 52A. Sale of Weapons in Certain Counties. 14-402. Sale of certain weapons without permit forbidden. (a) It is unlawful for any person, firm, or corporation in this State to sell, give away, or

More information

Appendix 4B Training Memo: Receiving and Processing Warrants in Domestic Violence Crimes

Appendix 4B Training Memo: Receiving and Processing Warrants in Domestic Violence Crimes Appendix 4B Training Memo: Receiving and Processing Warrants in Domestic Violence Crimes Procedures for receiving and checking in warrants 1. All criminal court warrants are entered by the Second Judicial

More information

What Is Expungement?...1 When Can I File For Expungement?...2 Case Information...3 Petitions For Expungement...4 What Do the Dispositions Mean and

What Is Expungement?...1 When Can I File For Expungement?...2 Case Information...3 Petitions For Expungement...4 What Do the Dispositions Mean and Expungement Information About Removing Criminal Records from Public Access in Maryland Table of Contents What Is Expungement?...1 When Can I File For Expungement?...2 Case Information...3 Petitions For

More information

GREENVILLE POLICE DEPARTMENT POLICY AND PROCEDURES MANUAL

GREENVILLE POLICE DEPARTMENT POLICY AND PROCEDURES MANUAL GREENVILLE POLICE DEPARTMENT POLICY AND PROCEDURES MANUAL Chapter 84 Date Initially Effective: 07/30/94 Date Revised: 02/08/18 Property and Evidence Control By the Order Of: Mark Holtzman, Chief of Police

More information

S 2492 SUBSTITUTE A ======== LC005022/SUB A ======== S T A T E O F R H O D E I S L A N D

S 2492 SUBSTITUTE A ======== LC005022/SUB A ======== S T A T E O F R H O D E I S L A N D 01 -- S SUBSTITUTE A ======== LC000/SUB A ======== S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 01 A N A C T RELATING TO COURTS AND CIVIL PROCEDURE--COURTS -- EXTREME RISK

More information

RECORDS CONTROL: CRIMINAL HISTORY CHECK GUIDELINES

RECORDS CONTROL: CRIMINAL HISTORY CHECK GUIDELINES PRINCE WILLIAM COUNTY POLICE DEPARTMENT MANUAL OF GENERAL ORDERS General Order: 19.03 Effective: 06/18/2018 Supersedes: 01/01/2016 Number of Pages: 6 RECORDS CONTROL: CRIMINAL HISTORY CHECK GUIDELINES

More information

SEX OFFENDER REGISTRATION AND DISSEMINATION POLICY

SEX OFFENDER REGISTRATION AND DISSEMINATION POLICY Truro Police Department SEX OFFENDER REGISTRATION AND DISSEMINATION POLICY Policy Number: Effective Date: June 1, 2000 REFERENCE: Revised Date: Sept 15, 2005 Accreditation Standards: Mass. Gen. Law: Chap.

More information

STATE OF OKLAHOMA. 1st Session of the 54th Legislature (2013) AS INTRODUCED

STATE OF OKLAHOMA. 1st Session of the 54th Legislature (2013) AS INTRODUCED STATE OF OKLAHOMA 1st Session of the th Legislature () HOUSE BILL AS INTRODUCED By: Cleveland An Act relating to crimes and punishments; amending O.S., Section 0., as amended by Section, Chapter, O.S.L.

More information

Department of Legislative Services

Department of Legislative Services Department of Legislative Services Maryland General Assembly 2000 Session HB 279 FISCAL NOTE House Bill 279 Judiciary (The Speaker, et al.) (Administration) Responsible Gun Safety Act of 2000 This Administration

More information

JUVENILE LITIGATION PARALEGAL

JUVENILE LITIGATION PARALEGAL JUVENILE LITIGATION PARALEGAL Drafted by Maddie Vines, formerly the Division Manager and Paralegal, Office of the District Attorney for the 4th Judicial District Juvenile Prosecution Unit and Special Assignments

More information

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY. EFFECTIVE DATE: 1 January 1999 PAGE 1 OF 12

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY. EFFECTIVE DATE: 1 January 1999 PAGE 1 OF 12 MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY POLICY AND PROCEDURE # 77 SUBJECT: Investigative Division EFFECTIVE DATE: 1 January 1999 PAGE 1 OF 12 REVIEW DATE: 30 November 2017 APPROVED:

More information

TEXARKANA, TEXAS POLICE DEPARTMENT GENERAL ORDERS MANUAL. Amended Date June 1, 2017

TEXARKANA, TEXAS POLICE DEPARTMENT GENERAL ORDERS MANUAL. Amended Date June 1, 2017 Effective Date February 1, 2008 Reference Amended Date June 1, 2017 Distribution All Personnel City Manager City Attorney TPCA Best Practices Recognition Program Reference Review Date January 1, 2018 Pages

More information

Senate Bill 1008 Ordered by the Senate February 8 Including Senate Amendments dated February 8

Senate Bill 1008 Ordered by the Senate February 8 Including Senate Amendments dated February 8 th OREGON LEGISLATIVE ASSEMBLY--00 Special Session A-Engrossed Senate Bill 00 Ordered by the Senate February Including Senate Amendments dated February Printed pursuant to Senate Interim Rule. by order

More information

TEXARKANA, TEXAS POLICE DEPARTMENT GENERAL ORDERS MANUAL. TPCA Best Practices Recognition Program Reference Family Violence

TEXARKANA, TEXAS POLICE DEPARTMENT GENERAL ORDERS MANUAL. TPCA Best Practices Recognition Program Reference Family Violence Effective Date February 1, 2008 Reference Amended Date Distribution All Personnel City Manager City Attorney TPCA Best Practices Recognition Program Reference Review Date January 1, 2017 Pages 5 This Operations

More information

OKLAHOMA SELF-DEFENSE ACT

OKLAHOMA SELF-DEFENSE ACT OKLAHOMA SELF-DEFENSE ACT TITLE 21, OKLAHOMA STATUTES, SECTION 1290.1 et seq. and related statutes. All statutory provisions are effective November 1, 2015. OKLAHOMA STATE BUREAU OF INVESTIGATION SELF-DEFENSE

More information

Fennimore Police Department Evidence, Contraband and Recovered Property Issue Date: 04/11/2014. Last Updated: 12/07/2017

Fennimore Police Department Evidence, Contraband and Recovered Property Issue Date: 04/11/2014. Last Updated: 12/07/2017 Fennimore Police Department Evidence, Contraband and Recovered Property Issue Date: 04/11/2014 Last Updated: 12/07/2017 Total Pages: 10 Policy Source: Chief of Police Special Instructions: Amends All Previous

More information

The Process. Ten federal disqualifiers United States Code Section 922. State Law defines state disqualifiers Florida Statute 790.

The Process. Ten federal disqualifiers United States Code Section 922. State Law defines state disqualifiers Florida Statute 790. The Process Florida Department of Law Enforcement (FDLE) Conducts required background checks for Federal Firearm Licensees to determine the potential transferee s eligibility to receive the firearm. Ten

More information

The purpose of this General Order is to establish a uniform policy and procedure for the use of our automatic license plate reader (ALPR) system.

The purpose of this General Order is to establish a uniform policy and procedure for the use of our automatic license plate reader (ALPR) system. August 16, 2011 18-2011 Automatic License Plate Reader (ALPR) System G.O. #9-11 NJ Attorney General s Directive 2010-5 Captain Thomas Ulrich 14 PURPOSE: The purpose of this General Order is to establish

More information

PC: , 457.1, 872, CVC: (C) TITLE 8: INMATE RELEASE I. PURPOSE:

PC: , 457.1, 872, CVC: (C) TITLE 8: INMATE RELEASE I. PURPOSE: STANISLAUS COUNTY SHERIFF S DEPARTMENT NUMBER: 2.05.11 RELATED ORDERS: PC: 1192.7, 457.1, 872, 667.5 ADULT DETENTION DIVISION CHAPTER 2: BOOKING, CLASSIFICATION, PROPERTY, & RELEASE INMATE RELEASE SUBJECT:

More information

THE GENERAL ASSEMBLY OF PENNSYLVANIA SENATE BILL

THE GENERAL ASSEMBLY OF PENNSYLVANIA SENATE BILL PRINTER'S NO. 0 THE GENERAL ASSEMBLY OF PENNSYLVANIA SENATE BILL No. Session of 01 INTRODUCED BY BARTOLOTTA, RESCHENTHALER, SCARNATI, YAW, HUTCHINSON, STEFANO, WARD, YUDICHAK, WAGNER, DiSANTO, VOGEL, WHITE,

More information

NEW BRUNSWICK POLICE DEPARTMENT POLICY & PROCEDURES

NEW BRUNSWICK POLICE DEPARTMENT POLICY & PROCEDURES NEW BRUNSWICK POLICE DEPARTMENT POLICY & PROCEDURES VOLUME: 5 CHAPTER: 12 # OF PAGES: 14 SUBJECT: AUTOMATED license PLATE READERS BY THE ORDER OF: Anthony A. Caputo Police Director Effective Date: April

More information

Chief of Police: Review Date: July 1

Chief of Police: Review Date: July 1 Directive Type: General Order Effective Date 05-17-2016 General Order Number: 05.09 Subject: Legal Process and Court Appearances Amends/Supersedes: Section 05, Chapter 09, Legal Process, revised 2008 Distribution:

More information

IMPORTANT NOTICE. 12/22/10 Resident Alien Instructions

IMPORTANT NOTICE. 12/22/10 Resident Alien Instructions IMPORTANT NOTICE As of April 30, 2012, all lawful permanent resident aliens (green card holders) are eligible to apply for a Massachusetts resident license to carry (LTC) firearms or firearms identification

More information

THE PRIVACY ACT OF 1974 (As Amended) Public Law , as codified at 5 U.S.C. 552a

THE PRIVACY ACT OF 1974 (As Amended) Public Law , as codified at 5 U.S.C. 552a THE PRIVACY ACT OF 1974 (As Amended) Public Law 93-579, as codified at 5 U.S.C. 552a Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, that

More information

FIREARMS LICENSING POLICY AND PROCEDURES

FIREARMS LICENSING POLICY AND PROCEDURES Winchester Police Department Peter F. MacDonnell Chief of Police 30 Mt. Vernon Street, Winchester, MA 01890 (781)729.1212 fax(781)721.4621 www.winchesterpd.org FIREARMS LICENSING POLICY AND PROCEDURES

More information

CHAPTER 74 LEGAL PROCESS

CHAPTER 74 LEGAL PROCESS CHAPTER 74 LEGAL PROCESS Salisbury University Police Department 74.1 Records 74.1.1 Information Regarding Each Item of Legal Process 74.1.2 Record of Service of Documents 74.1.3 Procedures for Maintaining

More information

TABLE OF CONTENTS SHORT TITLE... 1 DEFINITIONS... 1 AUTHORITY TO ISSUE LICENSE... 1 UNLAWFUL CARRY... 1 TERM OF LICENSE AND RENEWAL...

TABLE OF CONTENTS SHORT TITLE... 1 DEFINITIONS... 1 AUTHORITY TO ISSUE LICENSE... 1 UNLAWFUL CARRY... 1 TERM OF LICENSE AND RENEWAL... TABLE OF CONTENTS SHORT TITLE... 1 DEFINITIONS... 1 AUTHORITY TO ISSUE LICENSE... 1 UNLAWFUL CARRY... 1 TERM OF LICENSE AND RENEWAL... 1 PROHIBITED AMMUNITION... 2 CONSTRUING AUTHORITY OF LICENSE... 2

More information

LORAIN METROPOLITAN HOUSING AUTHORITY. APPLICANT SCREENING PROCESS Revised July 2017

LORAIN METROPOLITAN HOUSING AUTHORITY. APPLICANT SCREENING PROCESS Revised July 2017 LORAIN METROPOLITAN HOUSING AUTHORITY APPLICANT SCREENING PROCESS Revised July 2017 After verification of all pertinent data required determining eligibility, applicants shall be notified of their eligibility/ineligibility.

More information

The University of Texas System System Administration Internal Policy

The University of Texas System System Administration Internal Policy 1. Title 2. Policy Criminal Background Checks Sec. 1 Sec. 2 Purpose and Policy Statement. The University of Texas System Administration is committed to promoting the safety and security of personnel and

More information

Immigration and Customs Enforcement (ICE) Secure Communities (SC)

Immigration and Customs Enforcement (ICE) Secure Communities (SC) Immigration and Customs Enforcement (ICE) Secure Communities (SC) Standard Operating Procedures (SOP) Distributed for adoption by participating county and local law enforcement agencies Table of Contents

More information

(d) "Incarceration" and "confinement" do not include electronic home monitoring.

(d) Incarceration and confinement do not include electronic home monitoring. Minn. Stat. 243.166 OFFENDERS. (2012) REGISTRATION OF PREDATORY Subd. 1a. Definitions. (a) As used in this section, unless the context clearly indicates otherwise, the following terms have the meanings

More information

State of New Jersey OFFICE OF THE ATTORNEY GZNEP.A~ DEPARTMENT OF LAW AND PUBLIC SAFETY PO Box 080 TRENTON, NJ DIRECTIVE NO.

State of New Jersey OFFICE OF THE ATTORNEY GZNEP.A~ DEPARTMENT OF LAW AND PUBLIC SAFETY PO Box 080 TRENTON, NJ DIRECTIVE NO. CHRIS CHRISTIE Governor KIM GUADAGNO Lieutenant Governor State of New Jersey OFFICE OF THE ATTORNEY GZNEP.A~ DEPARTMENT OF LAW AND PUBLIC SAFETY PO Box 080 TRENTON, NJ 08625-0080 PAULA T. Dow Attorney

More information

TEXAS BOARD OF PARDONS AND PAROLES FULL PARDON APPLICATION INSTRUCTIONS

TEXAS BOARD OF PARDONS AND PAROLES FULL PARDON APPLICATION INSTRUCTIONS STEP 1: TEXAS BOARD OF PARDONS AND PAROLES FULL PARDON APPLICATION INSTRUCTIONS BEFORE YOU BEGIN, you must have the following documents to complete the application. 1. Offense reports for all arrests,

More information

West Rusk County Consolidated Independent School District P.O. Box 168 New London, TX Telephone (903) Fax (903)

West Rusk County Consolidated Independent School District P.O. Box 168 New London, TX Telephone (903) Fax (903) West Rusk County Consolidated Independent School District P.O. Box 168 New London, TX 75682 Telephone (903) 392-7850 Fax (903) 392-7866 Employment Application for Service and Support Personnel We consider

More information

Criminal Background Checks Myths and Misunderstandings

Criminal Background Checks Myths and Misunderstandings Criminal Background Checks Myths and Misunderstandings Benefits U September 8, 2010 Kerry Creach and Sue Lauberth Missouri State Highway Patrol Criminal Justice Information Services (CJIS) Division Background

More information

Petition for Expunction of Criminal Records (Charges Dismissed or Quashed)

Petition for Expunction of Criminal Records (Charges Dismissed or Quashed) Cause Number: The Clerk s Office provides this number when the Petition is filed) Ex Parte: In the District Court of: Court Number Leave Court Number blank. The Clerk s Office provides the Court number

More information

CITY OF CLYDE HILL CRIMINAL HISTORY RECORDS INFORMATION POLICY Adopted by Resolution No.

CITY OF CLYDE HILL CRIMINAL HISTORY RECORDS INFORMATION POLICY Adopted by Resolution No. CITY OF CLYDE HILL CRIMINAL HISTORY RECORDS INFORMATION POLICY Adopted by Resolution No. RCW Chapter 10.97, also known as the Criminal Records Privacy Act, governs the dissemination of criminal history

More information

SENATE BILL 645. E4, E1, E2 0lr0590 CF HB 820 By: Senator Frosh Introduced and read first time: February 5, 2010 Assigned to: Judicial Proceedings

SENATE BILL 645. E4, E1, E2 0lr0590 CF HB 820 By: Senator Frosh Introduced and read first time: February 5, 2010 Assigned to: Judicial Proceedings SENATE BILL E, E, E 0lr00 CF HB By: Senator Frosh Introduced and read first time: February, Assigned to: Judicial Proceedings A BILL ENTITLED AN ACT concerning 0 Firearm Safety Act of FOR the purpose of

More information

State of North Carolina Department of Correction Division of Prisons

State of North Carolina Department of Correction Division of Prisons State of North Carolina Department of Correction Division of Prisons POLICY AND PROCEDURE Chapter: G Section:.0100 Title: Issue Date: 02/09/07 Supersedes: 11/02/04 Outstanding Charges/ Detainers.0101 GENERAL

More information

Truro Police Department LEGAL PROCESS. Policy Number: OPS-8.01 Effective Date: January 25, 2001 REFERENCE:

Truro Police Department LEGAL PROCESS. Policy Number: OPS-8.01 Effective Date: January 25, 2001 REFERENCE: Truro Police Department LEGAL PROCESS Policy Number: Effective Date: January 25, 2001 REFERENCE: Accreditation Standards: 74.1, 74.12, 74.2.1, 74.3.1, 74.3.2 Mass. Gen. Law: Chap. 94C, Sec. 47, & 209A,

More information

H.B. 976 May 21, 2018 HOUSE PRINCIPAL CLERK

H.B. 976 May 21, 2018 HOUSE PRINCIPAL CLERK H GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 01 HOUSE BILL DRH0-MLa-B H.B. May 1, 01 HOUSE PRINCIPAL CLERK D Short Title: Extreme Risk Protection Orders. (Public) Sponsors: Referred to: Representatives

More information

STATE BUREAU OF INVESTIGATION PROCEDURE 12 POLICY AND PROCEDURE MANUAL JULY 1, 2002 ARREST PROCEDURES

STATE BUREAU OF INVESTIGATION PROCEDURE 12 POLICY AND PROCEDURE MANUAL JULY 1, 2002 ARREST PROCEDURES ARREST WARRANTS A. Bureau Agents should not routinely obtain arrest warrants in cases in which they are only assisting local law enforcement agencies in the investigation. Agents may obtain warrants as

More information

CITY OF ONALASKA POLICE DEPARTMENT

CITY OF ONALASKA POLICE DEPARTMENT CITY OF ONALASKA POLICE DEPARTMENT Policy: Arrest Procedures Policy # 17 Pages: 13 Approved by F & P Committee: 04/02/11 Approved by Common Council: 04/08/11 Initial Issue Date: 01/31/98 Revised dates:

More information

CREATING AN ARREST ALERT SYSTEM IN YOUR JURISDICTION:

CREATING AN ARREST ALERT SYSTEM IN YOUR JURISDICTION: CREATING AN ARREST ALERT SYSTEM IN YOUR JURISDICTION: A WORKSHOP FOR PROSECUTORS AND OTHER PLANNERS This project was supported by Grant No. 2013-DB-BX-0043 awarded by the Bureau of Justice Assistance.

More information

Conversion of National Incident Based Reporting System (NIBRS) Data to Summary Reporting System (SRS) Data

Conversion of National Incident Based Reporting System (NIBRS) Data to Summary Reporting System (SRS) Data U.S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Division Uniform Crime Reporting (UCR) Program Conversion

More information

1) Applicants will no longer be required to obtain fingerprints from their local police departments;

1) Applicants will no longer be required to obtain fingerprints from their local police departments; June 1, 2009 RE: Application for Non-resident Temporary License to Carry Firearms Dear Applicant: Beginning August 1 st, 2009, all new and renewal non-resident temporary licenses to carry firearms (LTC)

More information

SEX OFFENDER MANAGEMENT

SEX OFFENDER MANAGEMENT SEX OFFENDER MANAGEMENT SAMPLE POLICY This project was supported by a grant administered by the New York State Division of Criminal Justice Services. Points of view in this document are those of the author

More information

Title 4A Criminal Code Chapter 2 Registration for Convictions from Swinomish Tribal Court

Title 4A Criminal Code Chapter 2 Registration for Convictions from Swinomish Tribal Court Sec. Title 4A Criminal Code Chapter 2 Registration for Convictions from Swinomish Tribal Court 4A-02.010 4A-02.020 4A-02.030 4A-02.040 4A-02.050 4A-02.060 4A-02.070 4A-02.080 4A-02.090 4A-02.100 4A-02.110

More information

This policy outlines the process and procedures to be considered and followed by members when making an arrest.

This policy outlines the process and procedures to be considered and followed by members when making an arrest. CHAPTER: 1.9 Page 1 of 7 NEW ORLEANS POLICE DEPARTMENT OPERATIONS MANUAL CHAPTER: 1.9 TITLE: ARRESTS EFFECTIVE: REVISED: PURPOSE This policy outlines the process and procedures to be considered and followed

More information

STATE OF NEW JERSEY. SENATE, No th LEGISLATURE

STATE OF NEW JERSEY. SENATE, No th LEGISLATURE SENATE, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED APRIL, 0 Sponsored by: Senator BRIAN P. STACK District (Hudson) Senator SANDRA B. CUNNINGHAM District (Hudson) SYNOPSIS Requires Secretary of State

More information

State of North Carolina Department of Public Safety Prisons

State of North Carolina Department of Public Safety Prisons State of North Carolina Department of Public Safety Prisons Chapter: C Section:.1500 Title: Inmate Release Procedures Issue Date 09/12/2016 Supersedes: 04/27/16 POLICY & PROCEDURES.1501 GENERAL The following

More information

GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND

GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND GENERAL ORDER DISTRICT OF COLUMBIA Title Court Appearance Notifications Series / Number GO PCA 701.06 Effective Date August 2, 2005 Distribution Rescinds General Order 701.06 (Court Appearance Notifications)

More information

General Schedules - Executive Branch Retention Schedules

General Schedules - Executive Branch Retention Schedules Retention Schedules AR1 # Create Date 94-494 2:27:06 94-501 2:27:06 05-446 2:27:06 94-493 2:27:06 16969 2:27:06 Department Division Section Subsection Title Schedule Superseded 05-447 2:27:06 16968 2:27:06

More information

Table of Contents. September, 2016 LIBRS Specifications, Rel

Table of Contents. September, 2016 LIBRS Specifications, Rel Table of Contents Table of Contents... 1-3 Segment Layouts... 5 Submission Header (00) *** Modified (New Data Elements) ***... 7 Administrative (10)... 8 Administrative Modification (11)... 9 Offense (20)...

More information