Stolen BB guns or Paintball guns are entered into this file
What is Article?
Livestock are entered into this NCIC file
What is Article?
This type of report is required to enter securities into NCIC
What is a Theft Report?
Only this agency can enter, modify, or cancel records in this file
What is the United States Secret Service?
An abandoned, seized, recovered, or found weapon is entered as this kind of weapon.
What is Recovered?
The minimum value of an object reported stolen to be entered into the Article file
What is $500?
Identifiable securities entered into NCIC have been this
What is Stolen, Embezzled, or counterfieited
The Protective Interest file is designed to protect this and other authorized persons
Who is the President of the United States?
Knife guns, pen guns, cane guns, and belt buckle guns are this type of gun.
What is Disguised?
This type of report is required to enter an article into the Article file
What is a Theft report?
TRUE or FALSE:
Silver certificates, Treasury issued bills, and postal money orders can be entered into what file
What is Securities.
The US Secret Service can be advised of ___________ _____________ relating to persons that pose a threat to the President or other protected individuals.
What is criminal activity?
The MIS field contains shotgun gauge information when entering this kind of gun
What is Rifle-Shotgun combination?
Two fields required the query the Article file
What is TYP (type) and SER/OAN (Serial Number/ Owner Applied Number?
TRUE or FALSE:
Personal notes, Credit Cards, and Lottery tickets can be entered into the Securities file
What is False?
TRUE or FALSE
This file does NOT return sounded or similarity hits.
TRUE
Fields or combination of fields used to query the gun file
What is Serial Number, SN and Caliber, SN and Make, SN and Make and Caliber, and NIC Number?
Items that CANNOT be entered into the Article file
What is Credit cards, bank drafts, ATM cards, and checks of any kind?
The Identity Theft File contains records for victims of identity theft with descriptive and other information that law enforcement personnel can use to determine if an individual is a victim of identity theft or if the individual may be using a _____________.
What is fake identity?