The Files: The NCIC database currently consists of 21 files. There are seven property files containing records of stolen articles, boats, guns, license plates, parts, securities, and vehicles. There are 14 persons files, including: Supervised Release; National Sex Offender Registry; Foreign Fugitive; Immigration Violator; Missing Person; Protection Order; Unidentified Person; Protective Interest; Gang; Known or Appropriately Suspected Terrorist; Wanted Person; Identity Theft; Violent Person; and National Instant Criminal Background Check System (NICS) Denied Transaction. The system also contains images that can be associated with NCIC records to help agencies identify people and property items. The Interstate Identification Index, which contains automated criminal history record information, is accessible through the same network as NCIC.
The NCIC database includes 21 files (seven property files and 14 person files).
Article File: Records on stolen articles and lost public safety, homeland security, and critical infrastructure identification.
Gun File: Records on stolen, lost, and recovered weapons and weapons used in the commission of crimes that are designated to expel a projectile by air, carbon dioxide, or explosive action.
Boat File: Records on stolen boats.
Securities File: Records on serially numbered stolen, embezzled, used for ransom, or counterfeit securities.
Vehicle File: Records on stolen vehicles, vehicles involved in the commission of crimes, or vehicles that may be seized based on federally issued court order.
Vehicle and Boat Parts File: Records on serially numbered stolen vehicle or boat parts.
License Plate File: Records on stolen license plates.
Missing Persons File: Records on individuals, including children, who have been reported missing to law enforcement and there is a reasonable concern for their safety.
Foreign Fugitive File: Records on persons wanted by another country for a crime that would be a felony if it were committed in the United States.
Identity Theft File: Records containing descriptive and other information that law enforcement personnel can use to determine if an individual is a victim of identity theft of if the individual might be using a false identity.
Immigration Violator File: Records on criminal aliens whom immigration authorities have deported and aliens with outstanding administrative warrants of removal.
Protection Order File: Records on individuals against whom protection orders have been issued.
Supervised Release File: Records on individuals on probation, parole, or supervised release or released on their own recognizance or during pre-trial sentencing.
Unidentified Persons File: Records on unidentified deceased persons, living persons who are unable to verify their identities, unidentified victims of catastrophes, and recovered body parts. The file cross-references unidentified bodies against records in the Missing Persons File.
Protective Interest: Records on individuals who might pose a threat to the physical safety of protectees or their immediate families. Expands on the the U.S. Secret Service Protective File, originally created in 1983.
Gang File: Records on violent gangs and their members.
Known or Appropriately Suspected Terrorist File: Records on known or appropriately suspected terrorists in accordance with HSPD-6.
Wanted Persons File: Records on individuals (including juveniles who will be tried as adults) for whom a federal warrant or a felony or misdemeanor warrant is outstanding.
National Sex Offender Registry File: Records on individuals who are required to register in a jurisdiction’s sex offender registry.
National Instant Criminal Background Check System (NICS) Denied Transaction File: Records on individuals who have been determined to be “prohibited persons” according to the Brady Handgun Violence Prevention Act and were denied as a result of a NICS background check. (As of August 2012, records include last six months of denied transactions; in the future, records will include all denials.)
Violent Person File: Once fully populated with data from our users, this file will con