Summary of FBI Computer Systems, Komputer, More Hacking

[ Pobierz całość w formacie PDF ]
>From the Illumi-Net BBS Decatur, GAConspiracy Theory Conference 404-377-1141Summary of FBI Computer SystemsBy Ralph HarveyThis article is reprinted from Full Disclosure. Copyright (c) 1986Capitol Information Association. All rights reserved. Permission is herebygranted to reprint this article providing this message is included in itsentirety. Full Disclosure, Box 8275, Ann Arbor, Michigan 48107. $15/yr.The FBI maintains several computer systems. The most common of which iscall NCIC (National Crime Information Computer). NCIC maintains a database ofinformation about such things as stolen cars, stolen boats, missing persons,wanted persons, arrest records. It provides quick access to these records byState, Local and Federal law enforcement agencies. NCIC is directly linkedwith the Treasury Department's TECS computer and many State computer systems.According to William H. Webster, Director of the FBI:When a police officer stops a car and is uncertain about who he's going tomeet when he gets out, he can plug into this system [NCIC] and in a matter ofa few seconds he can find out whether that person is a fugitive or theautomobile is stolen. Incidentally, we receive almost 400,000 inquires ofthis nature each day in the NCIC system.When an agency determines that a subject is a fugitive, it supplies the FBIcomputer with as much of the following information as possible: 1) Name andcase number; 2) Alias; 3) Race; 4) Sex; 5) Height; 6) Weight; 7) Color ofhair; 8) Color of eyes; 9) Description of any identifying scars, marks andtattoos; 10) Date of birth; 11) Place of birth; 12) Social Security Number;13) Passport Number; 14) Last known address; 15) Nationality; 16) If anaturalized U.S. Citizen, date, place, and certificate number; 17)Occupation; 18) The criminal violation with which subject is charged; 19)Date of warrant; 21) Type of warrant -- Bench, Magistrate, etc.; 22) Agencyholding warrant; 23) Any information as to whether the subject is considereddangerous, is known to own or currently possess firearms, has suicidaltendencies, or has previously escaped custody; 24) Driver's license number,year of expiration and State issued; 25) License number of vehicle, aircraftor vessel subject owns or is known to use, include the year and State; 26)Description of vehicle, aircraft or vessel subject owns or is known to use;27) Associates of the subject*1; 28) FBI number; 29) Name and telephone ofthe person to contact when subject is apprehended.One of the major problems with the system is that the agency that submits anentry is responsible for keeping it up to date. Once an entry has been made,there is little motivation for the originating agency to ``waste'' its timekeeping it up to date, so many entries become incorrect with the passage oftime.Another FBI computer system is their Investigative Support InformationSystem (ISIS). This system is only used to provide support for majorinvestigations that require the handling of a large volume of complexinformation. It is limited to handling a maximum of 20 cases at a time.The ISIS system was used during the investigation of the murder of FederalJudge John Wood in San Antonio, Texas. In this case, the FBI entered 300,000pieces of information, including 6,000 interviews, hotel registrationinformation from every hotel in the area, etc. The accused, while on trial,claimed he was several hundred miles away. The FBI cross referenced his name& known alias with the hotel registration database and got a match. Contactwith the hotel employees resulted in a positive identification and convictionof the subject.The FBI has a system called the Organized Crime Information Systems (OCIS)of which director William Webster is ``particularly proud.'' The system wasstarted in 1980 in Detroit, Michigan and is one of their most sophisticatedcomputers. The system is now functions in over 40 locations.The OCIS system allows agents in different field offices to share andanalyze information collected in each other's areas. This system was used toidentify some of the United States citizens who were released from Cubanprisons in 1984 that had criminal histories in the United States. An OCISlink was recently opened in Rome, where it's used to support druginvestigations.The OCIS system was used in the major Sicilian mafia heroin investigation,commonly referred to as ``The Pizza Connection.'' According to Webster,``OCIS support ranged from direct assistance in collating information forTitle III court-authorized wiretaps to the analysis of the case for grandjury presentation.''Currently under development is the Field Office Information ManagementSystem (FOIMS). The purpose of this system is to fully automate theadministrative and record keeping functions of the field and resident offices.*1 One of the basic freedoms in this country is the First Amendment right tofreedom of association. The Privacy Act was enacted to stop governmentinvasions of privacy, and includes a provision specifically prohibiting thecollection of information on the exercise of First Amendment activities. [ Pobierz całość w formacie PDF ]

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • monka.htw.pl