Tribes get access to national crime databases

Tribes get access to national crime databases

Ten Native American tribes will get access to national crime information databases used by local, state and federal law enforcement agencies across the country as they help evaluate the Tribal Access Program for National Crime Information.

For the tribes selected to participate in the evaluation, TAP will provide a state-of-the-art biometric/biographic computer workstation that will be able to process finger and palm prints, take mugshots and submit records to national databases. The tribes will also be able to access the FBI’s Criminal Justice Information Service systems for criminal and civil purposes.  TAP will provide specialized training and assistance. 

“This innovative program will allow an unprecedented sharing of critical information between tribal, state and federal governments, information that could help solve a crime or even save someone’s life,” said Deputy Attorney General Sally Quillian Yates.  “This initial phase of TAP will help us understand the information gaps and the best ways to use this service to strengthen public safety in Indian country.”

The initial phase of the program will focus on assisting tribes that have law enforcement agencies. In the future, the department will address the needs of the remaining tribes and find a long-term solution.

The feedback phase is part of effort the Justice Department began earlier this year to help Native American Tribal police access to national criminal databases in an effort to help with investigations and crime prevention.

About the Author

Derek Major is a former reporter for GCN.


  • Records management: Look beyond the NARA mandates

    Records management is about to get harder

    New collaboration technologies ramped up in the wake of the pandemic have introduced some new challenges.

  • puzzled employee (fizkes/

    Phish Scale: Weighing the threat from email scammers

    The National Institute of Standards and Technology’s Phish Scale quantifies characteristics of phishing emails that are likely to trick users.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.