New Jersey follows FBI footsteps with customized NCIC 2000 apps

New Jersey follows FBI footsteps with customized NCIC 2000 apps

New Jersey is customizing its access to the FBI's new National Crime Information Center 2000 to accommodate the state's law enforcement agencies.

New Jersey is a leader in the development of NCIC 2000 applications at the state level, FBI and New Jersey State Police officials said.

'Our entire application was developed just based on the model that [the FBI] issues from NCIC 2000,' said Sgt. First Class Wayne Eveland, the FBI's point of contact for NCIC in the Garden State.

New Jersey used existing software as a starting point, he said.

'We took Harris Corp. software, which the FBI was releasing, and basically broke it completely apart and rewrote it into a 32-bit application,' Eveland said.

Police officials developed the system using Microsoft Visual Basic Version 6. The State Police will issue the application to local New Jersey law enforcement agencies.

'Use of fingerprints, mug shots and images will enable positive identification on the street level once we have full implementation,' Eveland said. The central office connects with local law enforcement agencies via TCP/IP. The local offices generally use Pentium III computers.

The central office houses the New Jersey version of the NCIC 2000 on an IBM mainframe running OS/390.

The police department is currently working on a Web-based front end, said First Sgt. James Bshada of the New Jersey State Police.

Tough enough

The New Jersey State Police department's most immediate goal, within the next year and a half, is to install ruggedized touch-screen notebook computers in all state police vehicles. So far, 1,000 state police vehicles have the notebooks, Eveland said.

New Jersey expects to spend nearly $10 million on NCIC 2000 implementation over the next three years for its 700 local agencies, with 6,000 to 7,000 end users gaining access to the system, Eveland said.

'Shruti Dat'


  • automated processes (Nikolay Klimenko/

    How the Army’s DORA bot cuts manual work for contracting professionals

    Thanks to robotic process automation, the time it takes Army contracting professionals to determine whether prospective vendors should receive a contract has been cut from an hour to just five minutes.

  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

Stay Connected