Verified Document

Sharing States Sharing Criminal Information Comment By Essay

¶ … Sharing States Sharing Criminal Information

Comment by Sabina:

States Sharing Criminal Information

Uncle Bob is a resident of California where is has a criminal record. Uncle Bob took his first trip out of state to Miami, Florida where he was pulled over for speeding. When uncle Bob was pulled over the police officer had a lot of information about him, his name, and date of birth, previous offense, height and weight. Uncle Bob was then handcuffed, and put in the back of the police car. In this paper I will explore some methods utilized by the Miami police officer to gain information about uncle Bob, and some possible communication methods available to police officers to gain criminal information.

The Interstate Driver's License Compact allows the 45 states that participate to share information with each other (DUI Laws, 2010). These states share information about Drunk Driving convictions, through a central database that law enforcement officers can access on the road.

The Patriot Act became a law in 2001, allowing different law enforcement agencies in different parts of...

Prior to the Patriot act, there were limitations pertaining to different states and different law enforcement agencies sharing information (Sales, 2010). The Patriot act has now made it easier for different agencies, and different states to share information. It has also made it easier for law enforcement officers to gain access to individuals' information (Larance, 2010). There is now a centralized federal database that all states can access to share information, and gain information.
There are databases that law enforcement agencies utilize to gather information about criminal offenses. The database allows the law enforcement agent to input a driver's license number and retrieve any prior criminal record available in the database. Each state has fusion centers, which was designed to help alleviate the gap in information available to law enforcement agents (Homeland Security, 2007). The main goal of the fusion centers is to help law enforcement officers to get the information they need to better serve and protect.

Law enforcement officers in the state of Florida now have access…

Sources used in this document:
References

DUI Laws (2010). Interstate Driver's License Compact. Retrieved from http://www.1800duilaws.com/dui-info/drivers-licence.asp

Homeland Security (2007). Federal efforts are helping to alleviate some challenges. GAO Reports. 109-115.

Larance, E.R. (2010). Federal Agencies are sharing border and terrorism information with local and tribal law enforcement agencies, but additional efforts are needed. GAO Reports. 1-53

Sales, N.A. (2010). Mending Walls: Information Sharing After the U.S.A. PATRIOT Act. Texas Law Review. 88 (7) 1795-1854
Sember, B. (2010). How U.S. Criminal Records Works. Retrieved from http://people.howstuffworks.com/criminal-record5.htm
Cite this Document:
Copy Bibliography Citation

Related Documents

Information System on Ethical and
Words: 6479 Length: 15 Document Type: Research Paper

They have a moral obligation to the South African people in this area for many reasons. First, they have an obligation to make certain that they can participate in the global economy to give their citizens the same chances for advancement as other nations. Secondly, they have a moral obligation to do everything possible to keep their citizens safe. When one discusses the topic of security in Information and Communication

Framework for Awarding Audit Contracts by US Government Departments...
Words: 15848 Length: 58 Document Type: Term Paper

awarding audit contracts by U.S. government departments and agencies Audit Management Red Rationale for and Objectives of the project main and secondary Desktop or literature search Rationale for Search Methodology LITERATURE/DESKTOP RESEARCH Authoritative sources Desktop Findings Justification for audits Evolving role of auditors Types of audit contracts Understanding the Audit Process Best practices and benchmarking Terminology Case Studies Audit management is a fundamental element in government accountability, control and performance management. Certainly there is justification within the Federal government to conduct audits of contracts for the

Political Science the USA Patriot Act Congress
Words: 1642 Length: 5 Document Type: Term Paper

Political Science The USA Patriot Act Congress passed the U.S.A. PATRIOT Act in response to the terrorists' attacks of September 11, 2001. The Act gives federal officials larger authority to follow and seize communications, both for law enforcement and foreign intelligence gathering reasons. It gives the Secretary of the Treasury with regulatory powers to fight corruption of U.S. financial institutions for foreign money laundering reasons. It seeks to further shut the countries

Controversies in Criminal Justice
Words: 2417 Length: 8 Document Type: Essay

Pelican Bay State Prison: War Zone How does the video you selected support a social structure theory? One social structure theory relates and highlights all the happenings in this video. Social disorganization theory appears to dominate the entire movie. This concept represents social change, lack of social agreement, and social conflict as the main causes of criminal activity and deviance; it is carefully associated with the environmental theory of criminology. Poverty is

Technology Issue in Information Assurance
Words: 3012 Length: 10 Document Type: Term Paper

S. Department of Defense (DOD) uses over two million computers and more than ten thousand local area networks, most of which are linked to, and vulnerable to attack from, users of the larger Internet. (2008, p. 276) These increasing threats correspond to the growing reliance on information systems to manage the entire spectrum of modern commerce and energy resources, making the disruption of a single element in the integrated system a

Risk Identification in Information Security
Words: 5004 Length: 15 Document Type: Thesis

Phishing Spear Phishing and Pharming The following is intended to provide a very brief overview of examples of some the most dangerous and pervasive security risks in the online and networked world. One of the most insidious of identity theft is known as phishing. The term 'phishing' refers to the practice of "fishing for information." This term was originally used to describe "phishing" for credit card numbers and other sensitive information

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now