FBI fingerprint expert at work
The database is fed by more than 86,000 agencies.
A man was arrested in Florida for loitering. Police fingerprinted him and electronically submitted his prints to the FBI’s fingerprint database. Within five minutes, Florida police were notified that their loitering suspect was wanted in California on murder charges. California officials were also notified.
Our Integrated Automated Fingerprint Identification System responds quickly to requests like this 24 hours a day, 365 days a year, to help our local, state, and federal partners—and our own investigators—solve and prevent crime and apprehend criminals and terrorists.
IAFIS houses some 56 million criminal prints (plus nearly 250 million civil prints) submitted by more than 86,000 criminal justice agencies. Included in our criminal database are fingerprints from 73,000 known and suspected terrorists processed by the U.S. or by foreign law enforcement agencies who work with us.
IAFIS keeps communities safe. There’s no better way to illustrate how IAFIS works than to show how it’s been used. Other recent cases:
* Texas Rangers reported four suspicious individuals along a remote part of the U.S.-Mexico border to the U.S. Customs and Border Protection. Customs took the four into custody and, after determining they were in the U.S. illegally, took their fingerprints and sent them electronically to IAFIS. Lo and behold, there was a hit: one of the men was wanted on murder charges in North Carolina.
* In Virginia, a federal program giving credentials to transportation workers sent a potential employee’s prints to IAFIS. Good thing—the man was wanted by Miami authorities for murder (suffice to say he didn’t get the job!)
* Police in New York City arrested an individual on assault charges. His prints were sent to IAFIS, which sent back word that the man was wanted not only by local authorities in Pennsylvania on murder charges but also by the FBI on unlawful flight charges.
IAFIS’ expanded use. We’re taking part in a pilot project that allows near real-time sharing of prints and other information in IAFIS and the Department of Homeland Security’s Automated Biometric Identification System, or IDENT. This means not only do the FBI and agencies like Customs and Border Protection have the benefit of each other’s biometric information, but also that local, state, and federal agencies using IAFIS have access to certain immigration data relevant to their cases.
We’ve already seen some successes. For example, Border Patrol agents working at a port of entry along the California-Mexico border encountered a man coming from Mexico claiming to be a U.S. citizen but who said he left his alien card at home. Suspicious, the agents fingerprinted the man and sent his prints to the joint IDENT/IAFIS program, which informed them that he was wanted by Los Angeles police on murder, rape, and burglary charges.
What’s ahead for our fingerprint operations? Our Next Generation Identification System will incorporate additional biometrics, like iris and facial imaging and palm prints, to enhance identification of terrorists and criminals even more. Says Tom Bush, who heads our Criminal Justice Information Services Division that manages IAFIS, “IAFIS has been a fantastic tool in support of criminal justice and the war on terror—NGI will give us bigger, better, and faster capabilities, and lead us into the future.”
Source : IAFIS website
CATCHING TERRORISTS AND CRIMINALS
![CATCHING TERRORISTS AND CRIMINALS](http://tempek.ga/img/nophoto-s.png)
Langganan:
Posting Komentar (Atom)
Sosial Media
Paling Dibaca
-
Switching power supply, seperti dalam skema, dengan keluaran tegangan 12 volt, maksimal 10 ampere. Rangkaian powe suply ini menggunakan tra...
-
Berdasarkan Surat Keputusan Kapolri No. Pol. : Skep/756/X/2005, tentang Pengesahan Pemakaian Logo Densus 88 Anti Teror, tanggal 18 Oktober 2...
-
Gas air mata , istilah yang digunakan untuk menyebut gas kimia yang digunakan untuk melumpuhkan dengan menyebabkan iritasi pada mata da...
-
WinFax PRO 10.0.3 adalah sebuah perangkat lunak untuk manajemen faks terkemuka dikgususkan bagi untuk usaha kecil. Perangkat lunak ini mempu...
-
(ANTARA) - Mabes Polri Polri belum menganggap perlu untuk meminta bukti rekaman percakapan yang diduga merupakan upaya kriminalisasi pimpina...
-
Carrier Operated Squelch or Carrier Operated Switch (COS) formerly known as Carrier Operated Relay (COR). Functions a COR like a control in ...
-
Introduction This guide is primarily written for those who are new to HF tube-type amps, or anyone who wishes to get the most out a Linear a...
-
Do you have an interest in converting one of these, this ATX PS board has leads for +5 (RED), -5 (WHITE), +12 (YELLOW), -12 (BLUE) volts, Gr...
-
Salah satu peralatan standar teknisi radio komunikasi adalah “ RF Dummy Load ”. RF Dummy Load adalah sebuah resistor murni dengan besaran i...
-
KEPUTUSAN KEPALA KEPOLISIAN NEGARA REPUBLIK INDONESIA No. Pol. : Kep / 37 / X /2008 Tentang PROGRAM KERJA AKSELERASI TRANFORMASI...
Timeline
-
▼
2009
(563)
-
▼
Mei
(60)
- PUSAT INFORMASI KRIMINAL NASIONAL
- DNS Speedy
- Setting Modem Speedy
- Penggelapan Mobil Rental Dibongkar
- Penipuan lewat telepon
- Simple Carrier Operated Relay
- Convert ATX swithing for Power Suply Ham Radio
- Universal Radio Interface Box
- Repeater Build Up
- Hercules tragedy in Magetan
- Kenwood HF Radio Telephone TK80
- Email Senkom
- Fasilitas dan Kontribusi Komlek
- Sejarah Berdirinya Komlek Polri
- Visi dan Misi Komlek
- VISI dan MISI
- KOMUNIKASI DAN ELEKTRONIKA: Kenwood TK-80
- Tragedi jatuhnya Hercules di Magetan
- RSUD jangan tolak pasien miskin
- Kunjungan Jusuf Kalla ke Jawa Tengah
- Hasil Operasi Jaran Candi 2009 Polresta Tegal
- Mantan Anggota Dewan ditemukan Tewas di Sawah
- Mantan Kapolres Tegal Didesak Dipecat
- Rumah Dokter disatroni perampok bersenjata api mainan
- Jumlah Korban Tewas Oplosan Menjadi 22 Orang
- Polisi Tidak Kebal Hukum
- 9 Nyawa Melayang gara-gara Miras Oplosan
- Upacara PTDH Briptu Kurniawan
- ASPARI tewas tertabrak KA Kamandanu
- AO-51 Operating Modes April 27 - May 31
- DataTraveler Generation 2 (G2)
- Penangkapan Pembunuh Kasmuti al Kisut
- BTL seri V digelar Sat Lantas Polresta Pekalongan
- Kasus Penganiayaan Tukri bin Samatun
- Seven Transformation Pack's, untuk windows XP
- Praperadilankan Polisi, Kombes Wiliardi Tunggu Has...
- Posting Blog di Facebook
- Hasil Operasi Jaran Candi di Polres Pekalongan
- Truk Tronton N-8759-UA Menghantam rumah di Batang
- Taking Legible Fingerprints
- CATCHING TERRORISTS AND CRIMINALS
- 30-YEAR-OLD MURDER SOLVED
- SBY Ingatkan Pentingnya Harmonisasi
- Suara Sah Hanya 104 Juta
- Jakarta - KPU telah menyelesaikan rekapitulasi pe...
- HATI-HATI DENGAN PENIPUAN MELALUI INTERNET
- INTERPOL's six priority crime areas
- Media invitation for 38th INTERPOL European Region...
- Loko Anjlog Di Brebes, Sabtu 9/5
- Pekalongan Peringkat 4 Jateng dalam Kasus Narkoba
- Sat Narkoba Polresta Pekalongan Lacak Kasus Sabu M...
- Oknum Polisi Diduga Otak Pelaku Perampokan
- Tahanan Rutan yang kabur berhasil ditangkap
- Rampas Ponsel, Enam ABG Ditangkap
- Lebih Dari 170 Juta Nomor Seluler Akan Terima SMS ...
- SEKILAS BHAYANGKARI
- Tanah Bergerak di Bumijawa
- Pemborong Gedung Futsal Diperiksa
- Antasari Masuk Sel Polda Metro
- Constitution of the International Amateur Radio Union
-
▼
Mei
(60)
Formulir Kontak
Diberdayakan oleh Blogger.
EmoticonEmoticon