OneDOJ

Last updated

OneDOJ is a central database that allows local law enforcement in the United States to search and read federal criminal cases. This database holds records on cases, criminal investigations, criminal history, and personal details of other persons. [1]

Contents

Software

The software took about 18 months to develop. In 2006 it had about 1,000,000 entries, and was expected to triple by 2009. [2] The software was inspired by the September 11th terrorist attack on the United States of America. [3] A memo that came out December 21, 2006 urged officials to put an aggressive plan into action to bring this database alive and current. In addition a committee was created to speed up the development of this database. [4] since the development, local agencies can request access to this database, which will allow them to view federal, and other state police files. Many federal agencies contribute to this database which include the Drug Enforcement Administration, Federal Bureau of Investigation, Bureau of Prisons, ATF, and various other local agencies. This database also allows agencies to keep ownership of their files. [5]

Criticism

The OneDOJ has run into some criticism. One person from the Civil Liberties Union said, "Raw police files or FBI reports can never be verified and can never be corrected." Another concern is files and reports entered may have information on a person who hasn't been accused, arrested or charged. [2]

Security concerns

Many civil liberty organizations are concerned that the database is a privacy threat. The database includes information about suspects in federal cases, that local agencies get full access to. [1] Another security concern was brought up, because false information could be entered into the database, possibly diminishing the person's record, or giving the police a false lead. [4] Officials say that all the information that is in the OneDOJ is already in another database that has a chance of being leaked, and the database is just making it easier for local agencies to come together to solve a crime. [1] Part of the fear may come from a congressional committee giving the Department of Justice a "D" on computer security in 2007. [3]

Related Research Articles

Surveillance Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information, such as Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

Telephone tapping is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on the telephone line. Legal wiretapping by a government agency is also called lawful interception. Passive wiretapping monitors or records the traffic, while active wiretapping alters or otherwise affects it.

Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

Identity theft Deliberate use of someone elses identity, usually as a method to gain a financial advantage

Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964. Since that time, the definition of identity theft has been statutorily defined throughout both the U.K. and the United States as the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits, and perhaps to cause other person's disadvantages or loss. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources.

The Communications Assistance for Law Enforcement Act (CALEA), also known as the "Digital Telephony Act," is a United States wiretapping law passed in 1994, during the presidency of Bill Clinton.

Freedom of Information Act (United States) US statute regarding access to information held by the US government

The Freedom of Information Act (FOIA), 5 U.S.C. § 552, is a federal freedom of information law that requires the full or partial disclosure of previously unreleased information and documents controlled by the United States government upon request. The act defines agency records subject to disclosure, outlines mandatory disclosure procedures, and defines nine exemptions to the statute. The act was intended to make U.S. government agencies' functions more transparent so that the American public could more easily identify problems in government functioning and put pressure on Congress, agency officials, and the president to address them.

National Crime Information Center US central database of crime-related information

The National Crime Information Center (NCIC) is the United States' central database for tracking crime-related information. The NCIC has been an information sharing tool since 1967. It is maintained by the Criminal Justice Information Services Division (CJIS) of the Federal Bureau of Investigation (FBI) and is interlinked with federal, tribal, state, and local agencies and offices.

Lawful interception (LI) refers to the facilities in telecommunications and telephone networks that allow law enforcement agencies with court orders or other legal authorization to selectively wiretap individual subscribers. Most countries require licensed telecommunications operators to provide their networks with Legal Interception gateways and nodes for the interception of communications. The interfaces of these gateways have been standardized by telecommunication standardization organizations.

The USA PATRIOT Act was passed by the United States Congress in 2001 as a response to the September 11, 2001 attacks. It has ten titles, each containing numerous sections. Title II: Enhanced Surveillance Procedures granted increased powers of surveillance to various government agencies and bodies. This title has 25 sections, with one of the sections containing a sunset clause which sets an expiration date, December 31, 2005, for most of the title's provisions. This was extended twice: on December 22, 2005 the sunset clause expiration date was extended to February 3, 2006 and on February 2 of the same year it was again extended, this time to March 10.

Investigative Data Warehouse (IDW) is a searchable database operated by the FBI. It was created in 2004. Much of the nature and scope of the database is classified. The database is a centralization of multiple federal and state databases, including criminal records from various law enforcement agencies, the U.S. Department of the Treasury's Financial Crimes Enforcement Network (FinCEN), and public records databases. According to Michael Morehart's testimony before the House Committee on Financial Services in 2006, the "IDW is a centralized, web-enabled, closed system repository for intelligence and investigative data. This system, maintained by the FBI, allows appropriately trained and authorized personnel throughout the country to query for information of relevance to investigative and intelligence matters."

A government database collects information for various reasons, including climate monitoring, securities law compliance, geological surveys, patent applications and grants, surveillance, national security, border control, law enforcement, public health, voter registration, vehicle registration, social security, and statistics.

Unreported missing describes persons who cannot be found, yet have not been or cannot be reported as missing persons to law enforcement, specifically the National Crime Information Center database of missing persons in the United States. The term applies whether the missing person is a child or an adult.

Information technology law concerns the law of information technology, including computing and the internet. It is related to legal informatics, and governs the digital dissemination of both (digitalized) information and software, information security and electronic commerce aspects and it has been described as "paper laws" for a "paperless environment". It raises specific issues of intellectual property in computing and online, contract law, privacy, freedom of expression, and jurisdiction.

California Department of Justice Statewide investigative law enforcement agency

The California Department of Justice is a statewide investigative law enforcement agency and legal department of the California executive branch under the elected leadership of the California Attorney General (AG) which carries out complex criminal and civil investigations, prosecutions, and other legal services throughout the US state of California. The Department is equivalent to the State Bureau of Investigation in other states.

Project Gunrunner is a project of the U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) intended to stem the flow of firearms into Mexico, in an attempt to deprive the Mexican drug cartels of weapons.

eTrace

eTrace is an Internet-based firearm trace request submission system, developed by the United States' federal government, Bureau of Alcohol, Tobacco, Firearms and Explosives, that provides for the electronic exchange of traced firearm data in a secure internet-based environment. Participating law enforcement agencies with access to the internet can acquire 24/7 real-time capabilities to electronically submit firearm trace requests, monitor the progress of traces, retrieve completed trace results, and to query firearm trace related data in Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) firearms registration database at the National Tracing Center. Firearms tracing is the systematic tracking of the movement of a firearm from its creation by the manufacturer or its introduction into U.S. commerce by the importer, through the distribution chain to the first retail purchase. Release 4.0, a bilingual version of eTrace was deployed in December, 2009 for the benefit of Spanish-speaking countries.

Secure Communities is an American deportation program that relies on partnership among federal, state, and local law enforcement agencies. U.S. Immigration and Customs Enforcement (ICE), the interior immigration enforcement agency within the Department of Homeland Security, is the program manager.

The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) is a program of the United States Government used to collect and share reports of suspicious activity by people in the United States. The Nationwide SAR Initiative (NSI) builds on what law enforcement and other agencies have been doing for years — gathering information regarding behaviors and incidents associated with criminal activity — but without the customary restrictions on collecting data on individuals in the absence of reasonable suspicion or probable cause. The program has established a standardized process whereby SARs can be shared among agencies to help detect and prevent terrorism-related criminal activity. This process is in direct response to the mandate to establish a "unified process for reporting, tracking, and accessing [SARs]" in a manner that rigorously protects the privacy and civil liberties of Americans, as called for in the 2007 National Strategy for Information Sharing (NSIS), which in turn was authorized by the Intelligence Reform and Terrorism Prevention Act of 2004. Reports of suspicious behavior noticed by local law enforcement or by private citizens are forwarded to state and major urban area fusion centers as well as DHS and the FBI for analysis. Sometimes this information is combined with other information to evaluate the suspicious activity in greater context. The program is primarily under the direction of the US Department of Justice.

The Canadian Police Information Centre is the central police database where Canada's law enforcement agencies can access information on a number of matters. It is Canada's only national law enforcement networking computer system ensuring officers all across the country can access the same information. There are approximately 3 million files generated each year and is the responsibility of the originating agency to ensure the data integrity of each file.

Criminal records in the United States contain records of arrests, criminal charges and the disposition of those charges. Criminal records are compiled and updated on local, state, and federal levels by government agencies, most often law enforcement agencies. Their primary purpose is to present a comprehensive criminal history for a specific individual.

References

  1. 1 2 3 Eggen, Dan (2006-12-26). "Justice Dept. Database Stirs Privacy Fears". The Washington Post. Retrieved 2009-09-30.
  2. 1 2 Skillings, Jonathan (2006-12-26). "'OneDOJ' to rule them all?". CNet. Retrieved 2009-09-30.
  3. 1 2 Beiser, Vince (2007-04-24). "One Database Under the Law". Wired . Retrieved 2009-10-01.
  4. 1 2 Weiss, Todd (2007-01-08). "DOJ pushes to broaden data sharing: agency will use central database to make crime info widely available.(NEWS)". Computerworld. Access my Library. Retrieved 2009-10-01.
  5. Hitch, Vance (April 2007). "OneDOJ: The Storefront for Federal Law Enforcement Information". Police Chief Magazine. Retrieved 2009-09-30.