WEAPON & NLETS

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following is the primary function of the WEAPON system?

  • Linking law enforcement agencies for criminal justice information exchange. (correct)
  • Overseeing the Department of Transportation.
  • Providing access to DMV records only.
  • Managing the WV Governor's Office of Technology.

The WEAPON system is managed by the FBI.

False (B)

What agreement must a WEAPON Terminal Agency sign for system access?

Terminal Agency Agreement

NLETS links together law enforcement, justice, and public safety agencies for the purpose of exchanging ______ data.

<p>critical</p> Signup and view all the answers

Which of the following is NOT a program managed by the FBI's CJIS Division?

<p>West Virginia Automated Criminal History (WATCH). (C)</p> Signup and view all the answers

NCIC is best described as a physical archive of criminal justice documents.

<p>False (B)</p> Signup and view all the answers

What is the purpose of the WATCH system?

<p>Automated West Virginia Criminal History Record Information (CHRI)</p> Signup and view all the answers

WV driver and vehicle information is obtained through the GOT's automated computer system, overseen by the WV ______.

<p>Governor's Office of Technology</p> Signup and view all the answers

What type of message is the AM/Administrative Message sent to the DMV terminal?

<p>A free text message, similar to an email. (D)</p> Signup and view all the answers

The WV Intelligence Exchange (WVIX) operates independently of any privacy regulations.

<p>False (B)</p> Signup and view all the answers

What is the primary goal of the WV Intelligence Exchange (WVIX)?

<p>Facilitating the timely sharing of criminal information and intelligence among law enforcement agencies</p> Signup and view all the answers

WVIX can only collect and maintain criminal intelligence information if there is "______" that the individual or organization is involved in definable criminal activity.

<p>reasonable suspicion</p> Signup and view all the answers

What is the Brady Act's primary requirement for Federal Firearms Licensees (FFLs)?

<p>To request background checks on prospective firearm transferees. (B)</p> Signup and view all the answers

The NICS Index contains information that can always be found in NCIC or III.

<p>False (B)</p> Signup and view all the answers

What is a POC state in the context of NICS?

<p>Point of Contact</p> Signup and view all the answers

If the NICS search yields a match to prohibiting information, the transaction is ______.

<p>denied</p> Signup and view all the answers

According to the information, which of the following would result in a 'deny' message from NICS?

<p>Being under indictment for a crime punishable by imprisonment for a term exceeding one year. (A)</p> Signup and view all the answers

The Interstate Identification Index (III) program operates as a completely centralized system managed solely by the FBI.

<p>False (B)</p> Signup and view all the answers

What type of information is required to support each criminal history record in the III program?

<p>Criminal fingerprint submission</p> Signup and view all the answers

In the III system, the ______ message allows an inquiry using a combination of personal and numeric identifiers.

<p>QH</p> Signup and view all the answers

What identifier is always required in a QR record request message?

<p>FBI or SID Number (C)</p> Signup and view all the answers

Purpose Code A is used for disseminating records for employment screening.

<p>False (B)</p> Signup and view all the answers

Which Purpose Code is used by Governmental Social Service agencies with child protection responsibilities?

<p>Purpose Code C</p> Signup and view all the answers

Purpose Code ______ is used for weapons-related background checks.

<p>F</p> Signup and view all the answers

What must the CJIS Systems Agency (CSA) ensure is maintained on an automated log for NCIC hot file transactions?

<p>The requester and secondary recipient. (B)</p> Signup and view all the answers

It is acceptable to use the III to access a record to be reviewed and/or challenged by the subject of the record.

<p>False (B)</p> Signup and view all the answers

What does ORI stand for?

<p>Originating Agency Identifier</p> Signup and view all the answers

All III transactions must be maintained on an automated log for a period of up to ______ year.

<p>one</p> Signup and view all the answers

Which of the following transactions is used to obtain a specific criminal history record?

<p>QR (D)</p> Signup and view all the answers

When making queries of the III file, the request can be made under any ORI available to the terminal operator.

<p>False (B)</p> Signup and view all the answers

According to the Privacy Act of 1974, what must be included with inquiries and record requests?

<p>Purpose for which the information is to be used</p> Signup and view all the answers

The most commonly used Purpose Codes nationwide are C, J, F, and ______.

<p>D</p> Signup and view all the answers

Which of the following is NOT one of the six NCIC categories for managing records?

<p>Review (C)</p> Signup and view all the answers

Agencies can enter Wanted Persons into NCIC before a decision to arrest has been made.

<p>False (B)</p> Signup and view all the answers

What is the recommended standard inquiry for the Wanted Person File?

<p>QWA</p> Signup and view all the answers

If an individual has an arrest record in West Virginia, a ______ will be returned to the inquiring agency.

<p>State Identification Number</p> Signup and view all the answers

What information does the IQ Query supply?

<p>The individual’s State Criminal History record number. (B)</p> Signup and view all the answers

West Virginia automatically checks for wants and warrants through NCIC when running Criminal History record requests.

<p>False (B)</p> Signup and view all the answers

Information obtained from the III is considered ______.

<p>CHRI</p> Signup and view all the answers

What is the primary function of the WEAPON system?

<p>To link law enforcement agencies for exchanging criminal justice information. (A)</p> Signup and view all the answers

What type of agreement must each WEAPON Terminal Agency sign for system access?

<p>Terminal Agency Agreement</p> Signup and view all the answers

NLETS is now called The International Justice and Public Safety Information Sharing ______.

<p>Network</p> Signup and view all the answers

What is the primary goal of the NLETS system?

<p>To save lives and improve security for Americans. (A)</p> Signup and view all the answers

The NLETS operational site is located in Clarksburg, WV.

<p>False (B)</p> Signup and view all the answers

Name one type of data exchanged through NLETS.

<p>Motor vehicle data</p> Signup and view all the answers

The FBI's CJIS Division is located in ______, WV.

<p>Clarksburg</p> Signup and view all the answers

Which of the following programs is NOT managed by the FBI's CJIS Division?

<p>West Virginia Automated Criminal History (WATCH) (A)</p> Signup and view all the answers

The NCIC is a local information system for West Virginia only.

<p>False (B)</p> Signup and view all the answers

What is the main goal of NCIC?

<p>To help the criminal justice community perform its duties</p> Signup and view all the answers

The WATCH system's database stores records on subjects arrested in ______.

<p>West Virginia</p> Signup and view all the answers

What type of checks are commonly known as STATE CIB checks?

<p>WATCH system checks (B)</p> Signup and view all the answers

The WV Governor's Office of Technology (GOT) oversees the Division of Homeland Security.

<p>False (B)</p> Signup and view all the answers

Through which agency is WV driver and vehicle information obtained?

<p>WV Governor's Office of Technology (GOT)</p> Signup and view all the answers

The AM/Administrative Message uses the ______ (Originating Agency Identifier) as an email address.

<p>ORI</p> Signup and view all the answers

What is the primary function of the West Virginia Intelligence Exchange (WVIX)?

<p>To serve as a centralized statewide depository and exchange for criminal information and intelligence. (C)</p> Signup and view all the answers

Participation in WVIX is limited to state law enforcement agencies only.

<p>False (B)</p> Signup and view all the answers

What level of suspicion is required for WVIX to collect and maintain criminal intelligence information?

<p>Reasonable suspicion</p> Signup and view all the answers

Gun Control Act of 1968. The NICS Index includes individuals who have been determined to be federally prohibited from possessing a ______ and the disqualifying information may not be available through the NCIC or III systems.

<p>firearm</p> Signup and view all the answers

According to the Brady Act, how long does the NICS Section have to reach a final decision after a potentially prohibiting record match?

<p>Three business days (B)</p> Signup and view all the answers

If the NICS does not make a final decision within the allowed time frame, the FFL must deny the firearm transfer.

<p>False (B)</p> Signup and view all the answers

What should an FFL do for background checks in a POC (Point of Contact) state?

<p>Contact a state-designated agency</p> Signup and view all the answers

The NICS checks available records in the National Crime Information Center (NCIC), the Interstate Identification Index (III), and the NICS ______.

<p>Index</p> Signup and view all the answers

Match the following criteria with their corresponding implications for a NICS background check:

<p>Conviction of a crime punishable by imprisonment exceeding one year = Deny Under indictment for a crime punishable by imprisonment exceeding one year = Deny Fugitive from justice = Deny No match found in databases = Proceed</p> Signup and view all the answers

What is the primary function of the III Program?

<p>To provide for the decentralized interstate exchange of criminal history record information (CHRI). (B)</p> Signup and view all the answers

Only federal agencies can access the III system.

<p>False (B)</p> Signup and view all the answers

What information must support each criminal history record in the III?

<p>A criminal fingerprint submission</p> Signup and view all the answers

In sole-source participating states, the arresting agency submits fingerprint images to the ______ for processing and assignment of a SID Number.

<p>State Identification Bureau (SIB)</p> Signup and view all the answers

Fifty-one State Identification Bureaus are responsible for providing their state’s available criminal records. Agencies in all states have direct access to which of the following?

<p>III (D)</p> Signup and view all the answers

The NFF Program centralizes record keeping responsibility for state offenders at the FBI.

<p>False (B)</p> Signup and view all the answers

Name one of the two (2) basic inquiry messages provided by the III.

<p>QH inquiry message</p> Signup and view all the answers

The QR record request message must always include either the FBI or ______ Number of the record’s subject.

<p>SID</p> Signup and view all the answers

What is Purpose Code C used for in III transactions?

<p>Criminal Justice (B)</p> Signup and view all the answers

Purpose Code D ORIs (those issued to civil courts) are allowed access to III for any purpose.

<p>False (B)</p> Signup and view all the answers

What federal law mandates the FBI to maintain an audit trail of the purpose of each disclosure of a criminal history record?

<p>The Privacy Act of 1974</p> Signup and view all the answers

Each agency is assigned an Originating Agency Identifier (ORI) by the FBI CJIS Staff. The ______ identifies the agency that is the owner of the record that has been placed in NCIC.

<p>ORI</p> Signup and view all the answers

Match the Message Keys (MKEs) with their descriptions:

<p>QWA = Returns all felony and misdemeanor records regardless of extradition QWE = Limits the responses to felony and misdemeanor records that are possibly extraditable from the inquiring agencies location QWF = Limits responses to felony records only - - regardless of extradition. QWS = Is designed to serve states that use NCIC rather than a state warrant database</p> Signup and view all the answers

Which of the following files is NOT automatically cross-searched when inquiring on the Wanted Person File?

<p>Stolen Vehicle (B)</p> Signup and view all the answers

Which of the following is the primary function of the WEAPON system in West Virginia?

<p>Exchanging criminal justice information among law enforcement agencies. (C)</p> Signup and view all the answers

NLETS exclusively shares information within the United States.

<p>False (B)</p> Signup and view all the answers

Which FBI division, located in Clarksburg, WV, manages the NCIC and IAFIS programs?

<p>CJIS Division</p> Signup and view all the answers

The primary goal of the ________ system is to help the criminal justice community perform its duties by providing accurate and timely criminal justice information.

<p>NCIC</p> Signup and view all the answers

Match the following systems with their descriptions:

<p>WEAPON = Computerized message switching system for law enforcement in West Virginia WATCH = Automated West Virginia Criminal History Record Information files NLETS = International information-sharing network for law enforcement and public safety NCIC = Nationwide computerized information system for criminal justice agencies</p> Signup and view all the answers

WVIX strives to produce investigative leads, develop suspect profiles, and:

<p>exploit links between individuals and/or organizations. (D)</p> Signup and view all the answers

The NICS Index contains information that is always found in the NCIC and III databases.

<p>False (B)</p> Signup and view all the answers

What is the process FFLs in non-POC states must follow to initiate a NICS background check?

<p>Contact the FBI CJIS Division's NICS Section</p> Signup and view all the answers

The Brady Act allows _________ business days for the NICS Section to gather information needed to render a final decision on a firearm transfer.

<p>three</p> Signup and view all the answers

Match each of the following prohibitive criteria with its description under NICS:

<p>Fugitive from justice = An individual who has fled to avoid prosecution or confinement after conviction Unlawful user of controlled substance = An individual with a documented history of substance abuse Adjudicated as a mental defective = An individual determined by a lawful authority to be impaired due to mental condition Dishonorable discharge = An individual dismissed from the military under dishonorable conditions</p> Signup and view all the answers

What does the Interstate Identification Index (III) program primarily provide for?

<p>Decentralized interstate exchange of criminal history record information. (A)</p> Signup and view all the answers

In NFF states, the FBI remains the primary source for state criminal history records of arrests.

<p>False (B)</p> Signup and view all the answers

What information must always be included in a QR record request message?

<p>FBI or SID Number</p> Signup and view all the answers

Purpose Code ________ is used for official duties in connection with the administration of criminal justice.

<p>C</p> Signup and view all the answers

Match the following Purpose Codes with their descriptions:

<p>Purpose Code J = Criminal Justice Employment Purpose Code F = Weapons-Related Background Checks Purpose Code D = Domestic Violence and Stalking Purpose Code X = Exigent Procedures</p> Signup and view all the answers

Who assigns the Originating Agency Identifier (ORI) used in NCIC?

<p>The FBI CJIS Staff. (B)</p> Signup and view all the answers

A Locate message in NCIC should only be placed on files if the 'hit' has been confirmed to be valid.

<p>True (A)</p> Signup and view all the answers

What is the recommended standard inquiry (Message Key) for the Wanted Person File that returns all felony and misdemeanor records regardless of extradition?

<p>QWA</p> Signup and view all the answers

An Identity Query (MKE/IQ) conducted through the WATCH system will return a State Identification Number (SID or SIR) if the individual has an _________ record in West Virginia.

<p>arrest</p> Signup and view all the answers

Match each NCIC file type to its classification as either CHRI ('restricted data') or Hot File:

<p>Gang File = CHRI Wanted Person File = Hot File National Sex Offender Registry file = CHRI Article File = Hot File</p> Signup and view all the answers

Flashcards

WEAPON System

A computerized message switching system linking law enforcement agencies in West Virginia for exchanging criminal justice information. It serves as the point of entry for NLETS and NCIC.

NLETS

An international network linking law enforcement, justice, and public safety agencies to exchange critical data. It connects to all states and various federal and international systems.

CJIS Division

FBI's division managing programs like IAFIS, N-DEx, LEO, NCIC, NICS, and UCR, providing services to the criminal justice community.

NCIC

A nationwide computerized information system for criminal justice agencies, maintaining a computerized filing system of documented criminal justice information.

Signup and view all the flashcards

WATCH System

Automated West Virginia Criminal History Record Information files, storing records on subjects arrested in WV, managed by the WV State Police.

Signup and view all the flashcards

WV GOT

Oversees the Department of Transportation, Division of Motor Vehicles. WV driver and vehicle information is obtained through its automated computer system.

Signup and view all the flashcards

WVIX

A centralized statewide depository and exchange for criminal information and intelligence to bring together officers from different agencies.

Signup and view all the flashcards

NICS

A national system that checks records in NCIC, III, and the NICS Index to determine if prospective transferees are disqualified from receiving firearms.

Signup and view all the flashcards

Interstate Identification Index (III)

Provides for decentralized interstate exchange of criminal history record information; functions as part of the FBI’s CJIS Division’s IAFIS.

Signup and view all the flashcards

QH Inquiry

Used to determine if an individual has a criminal history record in the III. Response includes identity of the database with criminal history.

Signup and view all the flashcards

QR Message

Used to obtain a specific criminal history record. Requires either the FBI or SID Number of the record’s subject.

Signup and view all the flashcards

Originating Agency Identifier (ORI)

Identifies the agency that owns the record in NCIC; assigned by the FBI CJIS Staff. It is 9 characters long, starts with the state code.

Signup and view all the flashcards

NCIC Entry

Places a new record into the NCIC system, using the requesting agency’s ORI, once sufficient information has been obtained.

Signup and view all the flashcards

NCIC Modify

Adds, corrects, or deletes data in an existing NCIC record; responsibility of the non-terminal agency to provide corrected information.

Signup and view all the flashcards

NCIC Locate

Indicates the person or property has been located or apprehended; sent when an NCIC "hit" is confirmed as valid.

Signup and view all the flashcards

NCIC Cancel

Removes a record from the NCIC file when the record is based on a false or fictitious report, or a warrant was dismissed.

Signup and view all the flashcards

Full Record Query (FQ)

Is used when the full record for state criminal history is needed. Requires a State Identification Number (SID or SIR)

Signup and view all the flashcards

CHRI

Criminal Justice Information (CJI) that requires controls for access, use and dissemination. Information obtained from III is CHRI.

Signup and view all the flashcards

Additional Query (AQ)

Used to obtain aliases, previous employers, additional descriptive information of an individual from law enforcement agencies.

Signup and view all the flashcards

AR

Used to respond to an AQ, providing additional information or advising that there is no additional information on the individual.

Signup and view all the flashcards

Administrative Message (AM)

A free text message form used to check the status of an AQ request or other administrative communications.

Signup and view all the flashcards

Study Notes

WEAPON (West Virginia Automated Police Network)

  • Computerized message switching system
  • Links state, local, & federal law enforcement agencies in West Virginia
  • Exchanges criminal justice information
  • Entry point for NLETS and NCIC
  • Provides interstate access and critical data on persons/property
  • Managed by WV State Police
  • Sets security standards, system access, service availability, and system discipline
  • Terminal Agency Agreement required for system access for each WEAPON Terminal office
  • User Agency Agreement necessary for each Non-Terminal Agency with a Terminal Agency

NLETS (National Law Enforcement Telecommunications System)

  • Now called The International Justice and Public Safety Information Sharing Network
  • International, virtual, information-sharing network
  • Links law enforcement, justice, and public safety agencies
  • Exchanges critical data
  • Primary goal is to save lives and improve U.S. security
  • Link to all states, federal, and international systems
  • Utilizes high-speed secure network
  • Primary operational site is in Phoenix, Arizona
  • Data exchanged includes motor vehicle info, driver data, Canadian "hot file" records, Immigration and Naturalization Services (INS) databases, and state criminal history records

CJIS (Criminal Justice Information Services Division)

  • Located at the FBI complex in Clarksburg, WV
  • Managed by the FBI
  • Consists of six programs:
  • Integrated Automated Fingerprint Identification System (IAFIS)
  • Law Enforcement National Data Exchange Program (N-DEx)
  • Law Enforcement Online (LEO)
  • National Crime Information Center (NCIC)
  • Interstate Identification Index (III)
  • National Instant Criminal Background Check system (NICS)
  • Uniform Crime Reporting Program (UCR)

NCIC (National Crime Information Center)

  • Nationwide, computerized information system
  • Provides service to all criminal justice agencies
  • Goal is to assist the criminal justice community by providing a computerized filing system of timely documented criminal justice information
  • Computerized index of documented criminal justice information
  • Concerns crimes and criminals of nationwide interest
  • Locator file for missing and unidentified persons

WATCH (West Virginia Automated Criminal History)

  • Automated WV Criminal History Record Information (CHRI) files
  • Managed by the WV State Police, Criminal Identification Bureau (CIB), Criminal Records Section
  • Database stores records on subjects arrested in West Virginia
  • Requires submission of a fingerprint card upon arrest
  • Commonly known as STATE CIB checks

WV GOT (WV Governor's Office of Technology)

  • Oversees the Department of Transportation, Division of Motor Vehicles
  • Provides WV driver and vehicle information
  • Data is obtained through the GOT’s automated computer system

DMV (Division of Motor Vehicles)

  • WEAPON terminal located in Kanawha City
  • One transaction sent to the DMV terminal is the AM/Administrative Message
  • AM is a free text message
  • Originating Agency Identifier (ORI) serves as an email address
  • Messages can be sent to five destinations, ORIs or State/Regional codes

West Virginia Intelligence Exchange (WVIX)

  • Centralized statewide depository and exchange for criminal information and intelligence
  • Serves as a link between officers from different agencies or areas
  • Designed to share data about individuals/organizations involved in criminal activity
  • Wide-ranging background to augment the efficiency and effectiveness of investigations
  • Adheres to US Department of Justice Criminal Intelligence Systems Operating Policies, 29 Code of Federal Regulations (CFR) Part 23
  • Products draw comparisons, make links, and provide crossover information
  • Produces investigative leads, develop suspect profiles, and exploit links
  • Tasked with facilitating the timely sharing of criminal information and intelligence
  • Conforms to the privacy and constitutional rights of individuals
  • Participation is open to federal, state, county and local law enforcement or criminal justice agencies
  • There are over 250 participating agencies
  • Information can be submitted in person, via mail, telephone, facsimile, or by using WVIX’s VPN Internet connect
  • WVIX can only collect and maintain criminal intelligence information if there is “reasonable suspicion” that the individual or organization is involved in definable criminal activity or enterprise

National Instant Criminal Background Check System (NICS Index)

  • Mandated by the Brady Handgun Violence Prevention Act of 1993 (Brady Act)
  • Requires Federal Firearms Licensees (FFLs) to request background checks on prospective firearm transferees
  • Attorney General required to establish NICS, effective November 30, 1998
  • FFLs contact NICS to determine if firearm transfer violates Section 922 (g) or (n) of Title 18, United States Code (U.S.C.), or state law
  • A national system that checks records in the NCIC, III, and the NICS Index
  • Determines if prospective transferees are disqualified from receiving firearms
  • NICS Index contains data from local, state, tribal, and federal agencies
  • Data regards persons prohibited from receiving firearms under federal law
  • Prohibiting information may not be found in NCIC or III

How NICS Works

  • States can implement a state-based NICS program
  • Such states serve as a point of contact (POC) between the NICS and the state’s FFLs
  • FFLs in POC states contact a state-designated agency for background checks
  • FFLs in non-POC states contact the FBI CJIS Division’s NICS Section for background checks
  • Partial-POC states process handgun checks while the FBI processes long gun checks
  • NICS background checks conduct a name search for matching records in three national databases:
  • NCIC (wanted persons and protection orders)
  • III (criminal history records)
  • NICS Index (prohibited persons as defined in the Gun Control Act of 1968)
  • Searches applicable databases of the Department of Homeland Security’s U.S. Immigration and Customs Enforcement (ICE) on all non-U.S. citizens
  • Most NICS checks are determined within seconds or minutes
  • Transaction proceeds if the NICS does not match any records in the databases searched
  • Transaction is denied if the search yields a valid match to prohibiting information
  • NICS Section must reach out to judicial and/or law enforcement agencies for information needed to render a final decision if the search matched to any potentially prohibiting records
  • The Brady Act allows three business days for this
  • FFL has the option to legally transfer the firearm if the information is not obtained within the three-business-day timeframe
  • A deny message indicates the subject matched with a similar name and/or descriptive features located on a criminal history record with prohibitive criteria
  • The prohibitive criteria:
  • Conviction of a crime punishable by imprisonment for a term exceeding one year
  • Under indictment for a crime punishable by imprisonment for a term exceeding one year
  • Fugitive from justice
  • Unlawful user of or addicted to any controlled substance
  • Adjudicated as a mental defective or committed to a mental institution
  • Illegally or unlawfully in the United States
  • Discharged from the Armed Forces under dishonorable conditions
  • Renounced U.S. citizenship
  • Subject to a court order restraining harassment, stalking, or threatening an intimate partner or child
  • Convicted of a misdemeanor crime of domestic violence

Interstate Identification Index (III) Program & National Fingerprint File (NFF) Program

  • III Program provides decentralized interstate exchange of criminal history record information (CHRI)
  • Functions as part of the FBI’s CJIS Division’s Integrated Automated Fingerprint Identification System (IAFIS)
  • Conducts national criminal history record searches for criminal justice and other purposes
  • Any authorized criminal justice agency may access the III
  • Each criminal history record is supported by a criminal fingerprint submission
  • Arresting agency submits fingerprint images to the State Identification Bureau (SIB) for processing and assignment of a SID Number
  • The SIB updates its state file and sends the arrest information to the FBI
  • FBI establishes a new record in the III and creates an index of the subject’s descriptors if no prior FBI record is on file
  • III automatically sends a message through the NCIC to the participating state’s computer system when the FBI receives an online request for a record supported by a III participating state
  • The state responds directly to the requesting agency of Nlets
  • The FBI’s CJIS Division responds to requests for records:
  • Federal and foreign offenders
  • Persons arrested in non-III states
  • District of Columbia
  • U.S. Territories
  • Criminal arrests that III states are unable to support
  • Fifty-one State Identification Bureaus are responsible for providing their state’s available criminal records
  • Agencies in all states have direct access to III
  • NFF Program is a decentralized system
  • Replaces the FBI’s record-keeping responsibility for state offenders
  • Makes state repositories primarily responsible for record dissemination and maintenance
  • An NFF state submits a single fingerprint image for each offender to the FBI to identify the offender at the national level
  • State uses arrest fingerprint images and related disposition and expungement documents for subsequent arrests to update its own records
  • State repositories become the only sources of state criminal history records for these arrests purposes

QH and QR Messages

  • Two basic inquiry messages for III
  • QH inquiry message
  • QR record request message
  • QH inquiry message, also referred to as a name search
  • Allows an inquiry using a combination of personal and numeric identifiers
  • Name (NAM)
  • Sex (SEX)
  • Race (RAC)
  • Date of Birth (DOB)
  • Social Security Number (SOC)
  • FBI Number (FBI)
  • State identification number (SID)
  • QR record request message, referred to as a criminal history record request
  • Must always include either the FBI or SID Number of the record’s subject

Purpose Codes

  • All III inquiry and record request messages must include the purpose for which the criminal history record information (CHRI) is to be used
  • All users are required to provide the reason for the III transaction
  • Assists in ensuring that III transactions are run for authorized purposes and that purpose codes are used correctly

Purpose Code A--Administrative File Maintenance

  • Used by authorized participating state agencies to retrieve records for internal review
  • Responses cannot be disseminated for any other purpose
  • Allows a state to review CHRI, want, and sex offender registry notifications in the III for that state

Purpose Code C--Criminal Justice

  • Used for official duties in connection with the administration of criminal justice
  • Authorized uses of Purpose Code C in relation to criminal justice facility security:
  • Vendors or contractors at the criminal justice agency who are not involved with the actual administration of criminal justice at the criminal justice agency
  • Volunteers at a criminal justice agency who are not involved with the actual administration of criminal justice at the criminal justice agency
  • Confinement facility visitors
  • Inmates of a confinement facility
  • Inmate mail
  • Participants of law enforcement-sponsored firearms training classes held at a public firing range that are handling firearms, and individuals attending firearms training events held at law enforcement facilities
  • Used by Governmental Social Service agencies with child protection responsibilities and the National Center for Missing and Exploited Children to access FBI criminal history record information under Section 151 of the Adam Walsh Child Protection and Safety Act of 2006 (Public Law 109-248)

Purpose Code D--Domestic Violence and Stalking

  • Used when the III transaction is for use by officials of civil or criminal courts in domestic violence or stalking cases
  • Civil courts may be issued ORIs containing a D in the ninth position
  • ORIs ending in D are limited to QH and QR transactions for Purpose Code D
  • Used by criminal justice agencies for the purposes of:
  • Returning firearms to their lawful owners
  • Enforcing federal and state laws prohibiting certain persons with criminal records from possessing firearms in circumstances in which firearms have been pawned

Purpose Code J--Criminal Justice Employment

  • Used when the III transaction involves employment with a criminal justice agency
  • Also used for the screening of employees of other agencies over which the criminal justice agency is required to have management control
  • Such screening may include the use of III on friends, relatives, and associates of the employee or applicant, unless restricted or prohibited by state statute, state common law, or local ordinance

Other Uses

  • Used for initial background checks of agency personnel
  • Noncriminal justice agencies involved with administering criminal justice on behalf of the criminal justice agency
  • Vendors or contractors who are involved with the administration of criminal justice for the criminal justice agency
  • Volunteers at the criminal justice agency who are involved with the administration of criminal justice for the criminal justice agency

Purpose Code X--Exigent Procedures

  • Used when a QH is made during an emergency situation when the health and safety of a specified group may be endangered
  • A QR may be used to review the individual's record following a QH
  • Fingerprints must accompany all requests for background checks for exigent purposes
  • Delayed submission of fingerprints to the FBI must occur within the agreed-upon timeframe
  • Purpose Code X must be used by agencies authorized under an approved statute to receive criminal history record information preceding the delayed submission of fingerprints or by law enforcement agencies servicing the record needs of such agencies
  • Purpose Code X must be pre-approved before it can be used
  • WV does not have a state statute providing authority to use Purpose Code X

Security of III Information

  • Authorization to obtain records via III is governed by federal laws and state statutes approved by the U.S. Attorney General, applicable to NCIC users
  • Operators shall use the terminal for authorized purposes only
  • Copies of III data obtained from terminal devices must be afforded security to prevent unauthorized access or use
  • III records shall be maintained in a secure records environment
  • Retention of records may be for extended periods only when the III records are key to the integrity/utility of the case files/criminal record files in which they are retained
  • Final destruction shall be accomplished in a secure manner to preclude unauthorized access/use when retention is no longer required
  • III records should be properly destroyed when the record is no longer current
  • A new copy should be required for each subsequent use, as additions or deletions may be made at any time
  • III shall not be used to access a record to be reviewed or challenged by the subject of the record
  • Record requests for this purpose must be submitted in writing to the FBI CJIS Division or to the state of record
  • The CJIS Systems Agency (CSA) shall ensure that all NCIC hot file transactions (both QH/QR) which access NCIC through the state system be maintained on an automated log
  • The log must clearly identify the requester and the secondary recipient

Records Provided by the FBI

  • The FBI provides records of:
  • Federal and foreign offenders
  • Persons arrested in U.S. Territories
  • Criminal arrests that III participants are unable to provide

Originating Agency Identifier (ORI)

  • Most records are placed directly into the NCIC system by an originating agency
  • The agency who holds the warrant, missing person report, or theft report; registration information on sex offender, person on supervised release, etc.
  • Each agency is assigned an Originating Agency Identifier (ORI) by the FBI CJIS Staff
  • Identifies the agency that is the owner of the record that has been placed in NCIC
  • 9 characters in length
  • The first 2 characters represent the state followed by 7 characters

Logging of III Transactions

  • All III transactions must be maintained on an automated log for up to one year
  • The automated log must clearly identify the operator of the III transactions as well as the authorized receiving agency
  • Terminal Operator’s name
  • Requesting Agency’s ORI
  • Requesting officer’s name (do not use a Unit Number)
  • The terminal agency must be able to identify the individual requester and/or secondary recipient of the data by the unique identifier that is logged

Inquiry of the III File

  • Four transactions used to inquire of the III file:
  • QH
  • QR
  • ZR
  • QWI
  • A QH is used to determine if an individual has a criminal history record in the III
  • The III response will provide one of the following:
  • Single matching index record
  • Multiple matching index records
  • No record responses
  • The response will include information regarding the identity of the database(s) maintaining the criminal history record information
  • A QR is used to obtain a specific criminal history record
  • Only the FBI or SID Fields can be used to identify the record being requested
  • A QR response will provide the criminal history record for the FBI or SID Number provided
  • The response may include portions of the record from the FBI and/or one or more III states
  • A ZR is used to determine if a record for a particular FBI or SID Number is available through the III
  • The response will advise whether the record is on file
  • A QWI performs a check of NCIC person files (QWA) and simultaneously conducts a III QH transaction
  • The NCIC and III Systems will return positive and/or negative responses independently
  • Queries must be made under the ORI of the inquiring agency, which is not always the WEAPON terminal agency ORI
  • The III QH inquiry must contain one of the following combinations:
  • Mandatory fields are denoted by a red asterisk on the forms
  • Name, Sex, Race, and Date of Birth
  • Name, Sex, Race, Date of Birth, and Social Security Number
  • Name, Sex, Race, Date of Birth, and Miscellaneous Number
  • Name and Social Security Number (SOC)
  • Name and MNU (Miscellaneous Number)
  • State Identification Number (SID) or Name and State Identification Number (SID)
  • FBI or State Identification Number (SID)
  • Use of either identifier limits the scope of the search and eliminates multiple record responses

Purpose Codes & Reasons for III Records and State Criminal History Records

  • The Privacy Act of 1974 requires the FBI to maintain an audit trail of the purpose of each disclosure of a criminal history record
  • Therefore, inquiries and record requests must include the purpose for which the information is to be used
  • The purposes for which an agency may use CIB and III and the appropriate codes for use in West Virginia are:
  • C - Criminal Justice: Used for official duties in connection with the administration of criminal justice (criminal investigations) and site security
  • J - Criminal Justice Employment: Used when the III transaction involves employment with a criminal justice agency or the screening of employees of other agencies, over which the criminal justice agency maintains management control
  • F - Weapons-related Check: Used when the III transaction involves weapons-related background checks authorized by the state, for firearms-related permits and explosives permits pursuant to state law, regulation or local ordinance; returning firearms to the lawful owners; and enforcing federal and state law prohibiting certain persons with criminal records from possessing firearms in circumstances in which firearms have been pawned
  • D - Domestic Violence And Stalking: Used by civil or criminal courts in domestic violence or stalking cases; ORIs ending in D (those issued to civil courts) are not allowed access to III for any other purpose
  • H - Housing: Used when the III inquiry is made under the authority of the Housing Opportunity Extension Act of 1996; limited to the QH inquiry only and no paper trail is given to the housing authority
  • X - Exigent Circumstances: Used for the emergency placement of children with surrogate care providers; the social services agency must submit fingerprints to the CIB for processing within 5 business days of using this for III transactions and sealed records are excluded from the response
  • The most commonly used PUR nationwide are C, J, F and D

Example Abbreviations

  • AR: Arrest
  • CO: Corrections
  • CT: Court Related
  • CI: Criminal Investigation
  • DV: Domestic Violence
  • DI: Drug Interdiction
  • EP: Emergency Child Placement
  • EC: Employment w/ CJA
  • GI: General Investigation
  • GP: Gun Permit
  • GR: Gun Release
  • JL: Jail
  • MI: Misuse
  • PP: Probation/Parole
  • PH: Public Housing
  • RC: Record Completeness
  • SS: Site Security
  • TS: Traffic Stop
  • TR: Training
  • UK: Unknown
  • VL: Validation

NCIC

  • Contains records on people, property, known terrorists, and gangs
  • There are six files that are inquiry only
  • 22 NCIC files are:
  • Article
  • Boat
  • Foreign Fugitive File
  • Gang File
  • Gun File
  • Identity Theft File
  • Image File
  • Immigration Violator File
  • Interstate Identification Index File
  • Known or Appropriately Suspected Terrorist File (KST)
  • License Plate File
  • Missing Person File
  • National Sexual Offender File
  • Originating Agency Identifier File
  • Protective Interest File
  • Protection Order File
  • Securities File
  • Supervised Release File
  • Unidentified Person File
  • Vehicle/Boat Part File
  • Vehicle File
  • Wanted Person File
  • Known or Appropriately Suspected Terrorist (KST) file records are entered into NCIC by the Threat Screening Center (TSC)
  • For Hit Confirmation on TSC records, the number to all is 1-802-872-6020

NCIC Categories

  • Entry: Places a new record into the NCIC system and all NCIC entries must be made using the requesting agency’s ORI
  • Modify: Modification of a message adds, corrects, or deletes a portion of data that is part of the NCIC record
  • Locate: Places a locate notification to the entering agency indicating that the person or property has been located or apprehended
  • Inquiry: Inquiries are made into the NCIC files using the minimum data and an inquiry determines if a record has been entered into the NCIC system (NCIC Hit)
  • Cancel: Cancels the record from the NCIC file; used when the record that has been entered is based upon a false or fictitious theft report
  • Clear: The clear message is to indicate the location of a missing person, apprehension of the wanted person, or recovery of property on file in NCIC has been determined by officials
  • NCIC responds in two ways, Positive (NCIC HIT) and Negative (NO RECORD NCIC)

NCIC Wanted Person File

  • Agencies that enter Wanted Persons into NCIC may only do so once the following conditions are met:
  • A decision to arrest or authorize arrest has been made and
  • A decision has been made regarding extradition of the Wanted Person

Inquiry on the Wanted Person Record

  • MKE’s (Message Keys) for inquiry:
  • QW/ZW limits responses to possible extraditable misdemeanor and felony records regardless of extradition
  • QWA returns all felony and misdemeanor records regardless of extradition and this is the recommended standard inquiry, and the default setting on the WEAPON System
  • QWE limits the responses to felony and misdemeanor records that are possibly extraditable from the inquiring agencies location
  • QWF limits responses to felony records only regardless of extradition
  • The Wanted Person File inquiry will also automatically cross-search Foreign Fugitive File, Missing Person File, Violent Gang File, Known or Suspected Terrorist File, Protection Order File, Immigration Violator File, Convicted Sexual Offender Registry, Supervised Release, Identity Theft, and U. S. Secret Service Protective Files
  • If vehicle identifiers are used in the inquiry, the Vehicle, Boat, Vehicle/Boat Part, and License plate files are also searched

State Criminal History Record Information (IQ/FQ MKE’s)

  • WATCH System provides automated WV criminal history record information on subjects who have been arrested in West Virginia, providing a fingerprint card has been submitted on the individual’s arrest
  • There are two types of queries available through the WATCH System:
  • Identity Query (Message Key IQ): Searches the automated criminal history record index and determines if the individual has a criminal history record on file through a particular state
  • Full Record Query (MKE/FQ) transaction: A SID (or SIR) number is then used to obtain the full state criminal history record through the

Additional Key Points

  • When these records are no longer needed by the requesting agency or officer, they must be destroyed by shredding
  • When CIBs are performed as part of an NCIC entry on Wanted and Missing Persons records, the record becomes a part of the supporting documentation and must be placed in the agency’s case file
  • The forms will mark the required fields with a RED ASTERISK, indicating the required field all formatted screens
  • When sending an inquiry out of state, the two-character state code must be placed in front of the SID/SIR number
  • The ATN (Attention) field must be filled with the requesting officer’s name, or an identifying number that will be used for at least one year and is associated with the requester and its mandatory Automated III Logging as required by FBI/NCIC
  • The NLETS HELP file for State Criminal History Records (CIB’s) may be accessed in the Forms Menu; NLETS Administrative Message, Query HELP File

Explanation of Fields Found on a WV IR Response

  • The IQ Query will supply the individual’s State Criminal History record number and include the identifying information entered by the terminal operator
  • Review this information to verify that the individual is the same as the person you inquired upon
  • Records may contain Sex Offender, Felony Convictions, Domestic Violence Charge(s) and Domestic Violence Conviction information

Explanation of Fields That May Appear on the WV Identity Query Response

  • Matched Record: This will supply a SID (State Identification number) or SIR (State Identification Record) number that is unique to each individual
  • Bail Bond Enforcer Status/Active: This field provides law enforcement agencies with notification that the subject is what is commonly known as a “bounty hunter” and these individuals must notify the State Police, via fax or letter of the dates they are in the area, the individuals name and the charges against the individual

Other Key Fields

  • Concealed Weapon Permit: Notifies law enforcement, and other authorized users that the individual is licensed to carry a concealed weapon; this also provides the expiration date, county of issue, and whether or not the subject is a licensed firearms dealer (LFD), and the status of the license (expired/valid, etc.)
  • Sex Offender Registration Information: This field provides the starting and ending dates of registration, as well as the county of registration for the offender
  • FIFS – Felony Identification Firearms Sales: This field notifies law enforcement, and other authorized users, if the individual has a felony arrest
  • NCIC hits may be received when running Criminal History record requests, the state of West Virginia does not automatically check for wants and warrants through NCIC
  • It is noted on the West Virginia CIB Full Record Response (FQ) that “The inquiring agency should run an NCIC check to verify wanted status."

Criminal History Record Information (CHRI)

  • Criminal History Record Information (CHRI), sometimes informally referred to as “restricted data”, is a subset of Criminal Justice Information (CJI)
  • Due to its sensitive nature controls are required for the access, use and dissemination of CHRI
  • Information obtained from the III is considered CHRI and the following files shall also be protected as CHRI:
  • Gang File
  • Known or Appropriately Suspected Terrorist File
  • Convicted Persons on Supervised Release File
  • Immigration Violator file
  • National Sex Offender Registry file
  • Historical Protection Order File of the NCIC
  • Identity Theft File
  • The remaining NCIC files are considered “hot files”

Purpose Codes and Reasons for State Criminal History and III Records

  • The Privacy Act of 1974 requires the FBI to maintain an audit trail of the purpose of each disclosure of a criminal history record
  • Therefore, inquiries and record requests must include the purpose for which the information is to be used
  • The purposes for which an agency may use CIB and III and the appropriate codes for use in West Virginia are:
  • C - Criminal Justice: Used for official duties in connection with the administration of criminal justice (criminal investigations) and site security
  • J - Criminal Justice Employment: Used when the III transaction involves employment with a criminal justice agency or the screening of employees of other agencies, over which the criminal justice agency maintains management control
  • F - Weapons-related Check: Used when the III transaction involves weapons-related background checks authorized by the state; may be used when returning firearms to the lawful owners; and enforcing federal and state law prohibiting certain persons with criminal records from possessing firearms (officer is on a traffic stop), or in circumstances in which firearms have been pawned
  • D - Domestic Violence And Stalking: Used by civil or criminal courts in domestic violence or stalking cases; ORIs ending in D (those issued to civil courts) are not allowed access to III for any other purpose
  • H - Housing: Used when the III inquiry is made under the authority of the Housing Opportunity Extension Act of 1996; limited to QH inquiries only and no paper trail is given to the housing authority
  • X - Exigent Procedures: Used for the emergency placement of children with surrogate care providers and the social services agency must submit fingerprints to the CIB for processing within 15 business days of using this for III transactions while sealed records are excluded from the response WV recognizes purpose codes, C, J, F, AND D, for state Criminal History record checks

Additional Recommendations

  • Place in the Attention field (ATN), following the requesting officer’s name, the reason for the inquiry immediately following the requestor’s name
  • CIB – Criminal Identification Bureau
  • The CIB, criminal records section, houses criminal history record information, sex offender, and concealed weapon information for West Virginia; Criminal History Record Information (CHRI) is obtained through the automated WATCH system
  • There are three types of transactions (AQ, AR, and AM) used to obtain non-automated information from the CIB

AQ-Additional Query

  • The AQ is used to obtain aliases, previous employers, additional descriptive information, scars, marks, tattoos, other social security numbers, dates of birth, etc.; These inquiries may be sent to individual law enforcement agencies, in state or out of state, or directly to the CIB
  • Mandatory fields for AQ’s are marked with a RED asterisk within the MESSENGER forms

AR – Additional History Response

  • The responding agency uses the AR to send the requested additional information to the inquiring agency or to advise the requesting agency that they have no additional information on the individual
  • Mandatory fields for AR’S are marked with a RED asterisk within the MESSENGER forms although the "Message Free Text field" on the AR form is a required field (Even if there is no red asterisk.)

AM - Administrative Message

  • The AM is used to check the status of the request sent to any agency, possibly inquiring when the agency will respond to the AQ message, or to the status of the request
  • The AM message is also a free text message form; The Forms Menu also has AM messages that are used to send messages to the DMV for certified copies of driving license records and the WVBRDCAST messages on missing/wanted persons, and stolen property

Driver’s License and Registration Queries

  • WV driver and vehicle information is housed by the Department of Transportation, Division of Motor Vehicles
  • There are six automated transactions available through this system:
  • DQ (Drivers License Query)
  • KQ (Drivers License History Query)
  • DNQ (Driver by Name Only Query)
  • RQ (Registration Query)
  • BQ (Boat Query)
  • DQ (Mexican Commercial Drivers License Query)
  • WV inquiries may also be run from the Quick Query Bar as well
  • A terminal operator should always use the individuals name and date of birth so that NCIC is checked

Vehicle Registration Queries

  • Registration Query transactions can be run by License Plate Number or VIN
  • Out of state queries must include the LIT/ and LIY/ fields

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Use Quizgecko on...
Browser
Browser