New Jersey follows FBI footsteps with customized NCIC 2000 apps

New Jersey follows FBI footsteps with customized NCIC 2000 apps

New Jersey is customizing its access to the FBI's new National Crime Information Center 2000 to accommodate the state's law enforcement agencies.

New Jersey is a leader in the development of NCIC 2000 applications at the state level, FBI and New Jersey State Police officials said.

'Our entire application was developed just based on the model that [the FBI] issues from NCIC 2000,' said Sgt. First Class Wayne Eveland, the FBI's point of contact for NCIC in the Garden State.

New Jersey used existing software as a starting point, he said.

'We took Harris Corp. software, which the FBI was releasing, and basically broke it completely apart and rewrote it into a 32-bit application,' Eveland said.

Police officials developed the system using Microsoft Visual Basic Version 6. The State Police will issue the application to local New Jersey law enforcement agencies.

'Use of fingerprints, mug shots and images will enable positive identification on the street level once we have full implementation,' Eveland said. The central office connects with local law enforcement agencies via TCP/IP. The local offices generally use Pentium III computers.

The central office houses the New Jersey version of the NCIC 2000 on an IBM mainframe running OS/390.

The police department is currently working on a Web-based front end, said First Sgt. James Bshada of the New Jersey State Police.

Tough enough

The New Jersey State Police department's most immediate goal, within the next year and a half, is to install ruggedized touch-screen notebook computers in all state police vehicles. So far, 1,000 state police vehicles have the notebooks, Eveland said.

New Jersey expects to spend nearly $10 million on NCIC 2000 implementation over the next three years for its 700 local agencies, with 6,000 to 7,000 end users gaining access to the system, Eveland said.

'Shruti Dat'

inside gcn

  • IoT security

    A 'seal of approval' for IoT security?

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above