Law Enforcement Information Systems Overview
45 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of the OFS code when registering an offender?

  • To identify the offender's specific offense.
  • To determine the offender's risk level.
  • To track offenders affiliated with federal agencies. (correct)
  • To indicate the offender's state of residence.
  • Where can guidelines be found for entering additional statuses as a supplemental record to a NSOR record?

  • Section 1 of this chapter.
  • Section 8 of this chapter. (correct)
  • Section 18 of this chapter.
  • Section 20 of this chapter.
  • What should the JUV field contain if an offender was convicted as an adult, regardless of age?

  • A blank field should be left
  • A "Y"
  • An "N" (correct)
  • The offender's age must be specified in a number format
  • What does the TIR field represent?

    <p>The federal tier level as defined in Public Law 109-248, Section 111. (D)</p> Signup and view all the answers

    According to the provided text, what defines a 'tier I sex offender'?

    <p>A sex offender who is not a tier II or tier III sex offender. (A)</p> Signup and view all the answers

    What primary function does WVIX serve?

    <p>To link officers from different agencies with relevant criminal information. (B)</p> Signup and view all the answers

    What type of information is included in a WVIX criminal intelligence report?

    <p>A wide-ranging background to support an investigation. (B)</p> Signup and view all the answers

    What specific federal regulation does WVIX adhere to in order to protect individual privacy rights?

    <p>29 CFR Part 23, US Department of Justice Criminal Intelligence Systems Operating Policies (C)</p> Signup and view all the answers

    Which of the following best describes the type of data used by WVIX?

    <p>Research from law enforcement and open-source databases. (D)</p> Signup and view all the answers

    What is the primary task WVIX is responsible for regarding criminal information sharing?

    <p>To promptly share criminal information among law enforcement, whilst respecting privacy. (D)</p> Signup and view all the answers

    What is the minimum requirement for WVIX to collect and maintain criminal intelligence information about an individual or organization?

    <p>Reasonable suspicion of criminal involvement. (A)</p> Signup and view all the answers

    What does the Brady Act require Federal Firearms Licensees (FFLs) to do?

    <p>Request background checks on prospective firearm purchasers. (D)</p> Signup and view all the answers

    How is the National Instant Criminal Background Check System (NICS) accessed by FFLs?

    <p>Through telephone or other electronic means. (C)</p> Signup and view all the answers

    What is the primary responsibility of every agency regarding NCIC records?

    <p>To remove records as soon as they are no longer valid. (D)</p> Signup and view all the answers

    How quickly should NSOR records be removed following receipt of information by the entering agency, according to the CJIS audit?

    <p>Within 3 days. (D)</p> Signup and view all the answers

    What does the validation process for an NCIC record primarily ensure?

    <p>The record is complete, accurate, and still outstanding or active. (B)</p> Signup and view all the answers

    What is the key source of information for the validation of NSOR records?

    <p>The jurisdiction's registry. (D)</p> Signup and view all the answers

    What does the CJIS audit confirm regarding NSOR record criteria for entry?

    <p>That records meet the NCIC entry criteria. (C)</p> Signup and view all the answers

    According to the content, how quickly should information be modified once it is available?

    <p>As soon as possible after the information is available. (C)</p> Signup and view all the answers

    How quickly should NSOR records be modified after the entering agency receives the information, according to the CJIS audit?

    <p>Within 3 days. (C)</p> Signup and view all the answers

    What header should agencies use when entering test records into NCIC?

    <p>TN01 (D)</p> Signup and view all the answers

    When is an ORI ending in 'D' used?

    <p>Exclusively in domestic violence or stalking cases within civil or criminal courts. (C)</p> Signup and view all the answers

    Which statement accurately describes the usage of an ORI ending in ‘H’?

    <p>It is used exclusively for QH inquiries under the Housing Opportunity Extension Act of 1996, with no paper trail provided. (C)</p> Signup and view all the answers

    What is the primary purpose of an NCIC Query III 'QH' form?

    <p>To determine if an individual has a criminal history record and then obtain the full CHRI record if one exists. (D)</p> Signup and view all the answers

    When making a query, under whose ORI should it be made?

    <p>Under the ORI of the inquiring agency, which might not always be the weapon terminal agency ORI. (B)</p> Signup and view all the answers

    What is one combination of fields required for a III QR inquiry to obtain a specific criminal history record?

    <p>The purpose for the inquiry, the requesting officer's name, the terminal operator’s name and the FBI or State Identification Record number. (A)</p> Signup and view all the answers

    A state criminal history record is sent through which system?

    <p>NLETS (National Law Enforcement Telecommunications System). (A)</p> Signup and view all the answers

    How will a criminal history record from the FBI be returned?

    <p>Automatically by NCIC. (C)</p> Signup and view all the answers

    If assistance needed in clarifying information on a criminal history record provided from a state, what should be checked?

    <p>The state's Criminal History Help File. (C)</p> Signup and view all the answers

    What defines a tier II sex offender?

    <p>An offender whose offenses are punishable by imprisonment for more than 1 year and involve serious offenses against minors. (B)</p> Signup and view all the answers

    Which of the following offenses would classify an individual as a tier II sex offender?

    <p>Sex trafficking a minor. (C)</p> Signup and view all the answers

    What action would NOT classify an offender as tier III?

    <p>Attempting to solicit a minor for sexual performance. (B)</p> Signup and view all the answers

    Which of these is NOT a criterion for being classified as a tier III sex offender?

    <p>Committing abusive sexual contact against a minor who is 14 years old. (C)</p> Signup and view all the answers

    What additional factor differentiates tier II offenses from tier I?

    <p>The severity of the offenses committed. (B)</p> Signup and view all the answers

    Which of the following scenarios would increase someone's classification to tier III?

    <p>Having a previous classification as a tier I sex offender. (B)</p> Signup and view all the answers

    Which of the following activities pertains to tier II offenses?

    <p>Production of child pornography. (A)</p> Signup and view all the answers

    Which tier classification involves the use of a minor in a sexual performance?

    <p>Tier II. (B)</p> Signup and view all the answers

    What happens when a QXS transaction does not include MNU, SOC, or OLN?

    <p>It will not cause a cross-search of any other file. (D)</p> Signup and view all the answers

    Which types of inquiries will automatically cross-search the NSOR?

    <p>Wanted Person and Vehicle inquiries. (A)</p> Signup and view all the answers

    When should a NSOR record be cleared?

    <p>When an offender relocates and another jurisdiction registers them. (A)</p> Signup and view all the answers

    What is an Image Indicator (IND) used for in QXS inquiries?

    <p>To specify whether to return an image if available. (A)</p> Signup and view all the answers

    What occurs when a NSOR record is cleared?

    <p>It loses any supplemental information attached. (A)</p> Signup and view all the answers

    Which of the following records cannot be cleared?

    <p>Expired records. (A)</p> Signup and view all the answers

    Which ORI has the authority to clear a NSOR record?

    <p>The ORI that entered the record. (A)</p> Signup and view all the answers

    What is a consequence of clearing a record containing an FBI Number?

    <p>The FBI is notified for removal of the flag. (B)</p> Signup and view all the answers

    Study Notes

    West Virginia Automated Police Network (WEAPON)

    • WEAPON is a computerized message switching system connecting state, local, and federal law enforcement.
    • It's the entry point for NLETS and NCIC, enabling interstate information sharing and access to data on persons and property.
    • The West Virginia State Police manages and maintains WEAPON, including system standards, access, and discipline.
    • Each WEAPON terminal agency signs a Terminal Agency Agreement, and non-terminal agencies sign a User Agency Agreement with a terminal agency.

    NLETS (National Law Enforcement Telecommunications System)

    • Now called the International Justice and Public Safety Information Sharing Network.
    • Links state, local, and federal law enforcement agencies for critical data exchange.
    • Aims to enhance security and save lives for Americans.
    • Employs a high-speed, secure frame relay network.
    • Primarily based in Phoenix, Arizona.
    • Exchanging various data types, including motor vehicle details, driver information, Canadian "hot file" records, INS databases, and state criminal history data.

    CJIS (Criminal Justice Information Services Division)

    • Part of the FBI headquartered in Clarksburg, West Virginia.
    • Manages several programs, including IAFIS (Integrated Automated Fingerprint Identification System), N-DEx (National Data Exchange), LEO (Law Enforcement Online), NCIC (National Crime Information Center), III (Interstate Identification Index), NICS (National Instant Criminal Background Check system), and UCR (Uniform Crime Reporting Program).

    NCIC (National Crime Information Center)

    • A nationwide, computerized information system serving criminal justice agencies.
    • Provides a computerized index of documented criminal justice information, including crimes and criminals of national interest and missing/unidentified persons.

    WATCH (West Virginia Automated Criminal History)

    • The automated West Virginia Criminal History Record Information (CHRI) files managed by the State Police Criminal Identification Bureau.
    • Tracks individuals arrested in West Virginia, storing records including fingerprint submissions.

    WV GOT (Governor's Office of Technology) / DMV (Division of Motor Vehicles)

    • GOT oversees the DMV.
    • DMV obtains West Virginia driver and vehicle information through the GOT's automated system.

    WV Intelligence Exchange (WVIX)

    • A centralized statewide repository for criminal information and intelligence.
    • Links together officers from different agencies for efficient investigations of criminal activity.
    • Adheres to the US Department of Justice Criminal Intelligence Systems Operating Policies.

    National Instant Criminal Background Check System (NICS Index)

    • A national system for checking records in NCIC, III, and the NICS Index to determine whether firearm transfers are legal.
    • Prohibits the transfer of firearms to individuals barred from possessing them under federal or state law.

    Interstate Identification Index (III) Program & National Fingerprint File (NFF)

    • Decentralized interstate exchange of criminal history record information (CHRI).
    • Part of the FBI's IAFIS (Integrated Automated Fingerprint Identification System).

    Purpose Codes for CIB and III Transactions

    • Details authorized purposes for accessing criminal history records and state criminal history records.
    • Purpose Codes include Criminal Justice, Employment, Weapons-related Checks, Domestic Violence, Housing, and Exigent Procedures.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Weapons Manual PDF

    Description

    Explore the intricacies of the West Virginia Automated Police Network (WEAPON) and the National Law Enforcement Telecommunications System (NLETS). This quiz provides insights into how these systems facilitate critical information exchange among law enforcement agencies to enhance public safety. Test your knowledge on their functions, agreements, and impact.

    More Like This

    Range Weapon Systems Quiz
    3 questions
    FLAME Mk-II Launcher Overview
    16 questions
    West Virginia Law Enforcement Networks
    42 questions
    Use Quizgecko on...
    Browser
    Browser