NAME OF SYSTEM: National Crime Information Center (NCIC) ORIGINATOR: Federal Bureau of Investigation Department of Justice Washington, D.C. 20530 O B J E C T I V E . Through utilization of the latest computer and communication technologies, to design and operate a centralized information and retrieval system that will greatly improve the effectiveness of crime prevention and detection procedures throughout the country. B A C K G R O U N D . The idea of a centralized crime information facility was conceived as a result of law enforcement's growing need for faster receipt of crime information, made imperative by the steadily rising incidence of crime and the increased mobility of criminals. Advances in computer and communication technologies seemed to offer new solutions to these needs. Therefore, the FBI, in conjunction with the Advisory Group to the Committee on Uniform Crime Records, and other local, State and Federal agencies, agreed to exploit these new technologies in their crime fighting efforts. Thus, a series of policy and procedure meetings were held to formulate a program, which led to the establishment of the National Crime Information Center (NCIC). The information center began operations in January 1967. Since that time, due primarily to the support from local police, the system has expanded at a rate far exceeding original expectations. T H E N E W M E T H O D . The new system, located at the FBI Headquarters in Washington, D.C, is designed for the rapid interchange of information among law enforcement agencies, including most States, the District of Columbia, and Canada. The NCIC is an on-line, real-time information retrieval system. 104 Connecting terminals, placed near radio dispatchers, are located throughout the country in police headquarters, sheriffs , offices, State police facilities, and Federal law enforcement agencies. Dispatchers can respond quickly to requests from policemen on the street—an inquiry can usually be answered in less than a minute following the inquiry, if the proper procedure is followed. Presently, about 93 terminals are connected to the information system. This includes pertinent incoming data for storage in the file, in addition to inquiries relating to search requests. The base data stored in the computer memory contains data on such matters as wanted persons; stolen and wanted vehicles and license plates; stolen articles; missing or recovered guns; and stolen or missing stocks, bonds, currency, etc. All items in the above categories are given identifying numbers for searching purposes. The system presently contains 1.8 million records, with an average daily transaction load of 55,000. This volume reflects updating of old records, the entering of new records, and processing of inquiries on suspected crimes or criminals. The system is now averaging 525 positive responses daily to law enforcement officials. These informative responses from the NCIC are considered as guidance only, and investigations are not terminated until confirmation is made with the originating agency. Cooperating agencies are responsible for maintaining the accuracy of their records, updating them when necessary, and purging the records no longer needed. To illustrate how the system works, let us assume that a State trooper notices an abandoned car. He radios the pertinent data to his radio control dispatcher, who passes the information by informal note to a remote terminal or teletype operator. At that point, the operator arranges the information in properly coded transmission sequence for communicating with the NCIC in Washington. The entry procedure includes identifying the station originating the request, the subject file to be interrogated, and last, the coded brief of the search request. At NCIC headquarters the IBM 360 Model 50 computer, with the aid of a sophisticated program, searches its random-access storage unit and— in this example—finds a "match" identifying the abandoned vehicle as one that was reported stolen. W i t h i n minutes, the NCIC terminal keyboard operator teletypes the answer to the requesting police agency, which then arranges to have the car returned to its owner. Information intended as input for the system's data bank storage unit is handled in much the same way as a search request. R E M A R K S . This system is a good example of how computer and communication capabilities have been utilized to meet a growing information problem. The computer's ability to quickly store, retrieve, and manipulate large quantities of randomly filed data, coupled with the capability for fast transmission of information over great distances, has enabled law enforcement officers at remote locations to communicate with the NCIC almost instantaneously. These machine capabilities and the close cooperation of the local, State, and F B I law enforcement bodies will play an increasingly important role in the battle against crime. 105 NATIONAL CRIME INFORMATION CENTER I N P U T PROCESSING STORAGE SEARCH A N D RETRIEVAL Input Information Random Access Storage Radio Call Search Request Local Dispatcher I 360/50 Computer State Terminal 1 1 C Coded Entry Information Terminal Keyboard 1. Input i n f o r m a t i o n m a y o r i g i n a t e with a m o b i l e l a w officer h u n d r e d s of m i l e s f r o m State communication terminals. 2. I n f o r m a t i o n i s p l a c e d in a p p r o p r i a t e f o r m a t and p a s s e d to NCIC in Washington, D. C. , via teletype and l e a s e d w i r e . The N a t i o n a l C r i m e I n f o r m a t i o n C e n t e r c o n t a i n s 1. 8 m i l l i o n r e c o r d s with a d a i l y t r a n s a c t i o n load of 5 5 , 0 0 0 s e a r c h e s . 1. S e a r c h r e q u e s t a c t i o n s follow the s a m e s e q u e n c e a s input i n formation. 2. T e r m i n a l points f r a m e r e q u e s t for c o m p u t e r in s e t f o r m a t . 3. R e t r i e v a l f r o m the o n - l i n e , r e a l t i m e s y s t e m i s in the f o r m of a h a r d copy p r i n t o u t on t e r minal teletype equipment. 106