GRADED A+
b The National Crime Information Center - NCIC
TCIC - Texas Criminal Information Center
NLETS - The international Justice and Public Safety Network
TLETS - Texas Law Enforcement Telecommunications System
Who is responsible for all the records entered into the system? - local law enforcement
Who enforces policy and procedure within the State of Texas? - CSA-DPS
When was NCIC launched & how many files/ records did it have? - Launched January 27, 1967 with 5
files & over 300,000 records
How many files and records does NCIC currently have? - 11.7 million active records and 21 files
In 2011 the NCIC processed ____________ transactions per day - 7.9 million
The goal of the NCIC is to help the criminal justice community to preform its duties by providing and
maintaining a computerized filing system of _________________ and ________________ documented
criminal justice information. - accurate & timely
TxDPS has designated the Law Enforcement Support/ ______________________________________
(LES/CRS) division as the state's CSA - Crime Records Service
Agencies must conduct a fingerprint based record check to verify identification within ___________ days
of assignment for direct access or direct responsibility of networks - 30
What are permanent disqualifiers for the system access policy? (5 total) - Felony Conviction
Felony Deferred Adjunction
Class A Misdemeanor conviction
Class A Misdemeanor Deferred Adjudication
Family Violence
What are the 10 year disqualifiers for the system access policy? (2 total) - Class B misdemeanor
conviction
Class B misdemeanor deferred adjudication
Terminal Access Policy
, Law Enforcement and criminal Justice sensitive facilities and restricted/controlled areas shall be
______________________ posted and separated from non-sensitive and non-restricted/controlled areas
by ________________ that restrict unauthorized access - prominently & physical barriers
Relationship of TCIC/NCIC to TLETS/NLETS
(The international justice and public safety network)
Data obtained over the TLETS/NLETS may only be disseminated to
_______________________________________________________ agencies - authorized criminal
justice
Automatic Removal of Records
Each record in the database is assigned a specific retention period. For example, temporary Felony
Warrants are automatically removed after ____ hours - 48
Record Responsibility
Agencies lacking staff support for a ____________ party check should require the ____________
assigned to the case to check the record for accuracy - second & Officer
Transaction Codes
Enter a Gun:____ - G
Transaction Codes
Query a Vehicle: ______ or _________ - ZV or QV
Transaction codes
Modify a stolen security: ______ - MS
VIN searches are based on the last _____ characters of the VIN - 8
__________________ alphabetic characters in a serial number are not considered for matching
purposes - embedded
Querying the wanted person file will _________________ many files and may result in a response from
NCIC/ TCIC - cross-search
Wanted Person Query responses - wanted person
immigration violator
foreign fugitive
NCIC gang member
TX gang member
Known or appropriately suspected terrorist