NYC Cases Show Crooked Cops’ Abuse of FBI Database

NEW YORK (AP) —

It’s billed by the FBI as “the lifeline of law enforcement” — a federal database used to catch criminals, recover stolen property and even identify terrorism suspects.

But authorities say Edwin Vargas logged onto the restricted system and ran names for reasons that had nothing to do with his duties as a New York Police Department detective. Instead, he was accused in May of looking up personal information about two fellow officers without their knowledge.

The allegation against Vargas is one of a batch of corruption cases in recent years against NYPD officers accused of abusing the FBI-operated National Crime Information Center database to cyber-snoop on coworkers, tip off drug dealers, stage robberies and — most notoriously — scheme to abduct a person.

The NCIC database serves 90,000 agencies and gets 9 million entries a day by users seeking information on stolen guns and cars, fugitives, offenders, orders of protection and other subjects, according to an FBI website. The NYPD system — called the “Finest,” as in “New York’s Finest” — also allows access to state criminal and Department of Motor Vehicles records.

How often the database is used for unauthorized purposes is unclear. The NYPD insists that officers are under strict orders to use it only during car stops, ongoing investigations or other police work. The department assigns them log-in names and passwords that allow supervisors to track their usage on desktop computers in station houses or on laptops in patrol cars.

NYPD recruits are warned, “If you misuse or you access information in an inappropriate manner … you are in serious trouble — such as being prosecuted, being fired and also big fines,” a police academy instructor testified at a recent trial.

In addition, an FBI compliance unit conducts spot audits to examine users’ “policies, procedures, and security requirements,” the FBI said in a statement. The FBI also requires each state to have its own audit programs and claims that “malicious misuse is not commonly discovered.”

But both the instructor testifying at the trial and an Internal Affairs Bureau investigator who took the witness stand in an earlier case have conceded that officers can easily circumvent safeguards.

The investigator testified as a government witness at the 2010 trial of an NYPD officer accused of using the database to conduct surveillance of a perfume warehouse in New Jersey before an armed robbery there. He told jurors that officers often do searches while logged in under another officer’s name — either out of neglect or, in this case, intent.

“Unfortunately … it’s not unusual that it happens,” the investigator said.

The instructor, when asked about an officer’s ability to effectively log in anonymously, responded, “I know it occurs. I wouldn’t say it’s common, but I know it does occur.”

The cases aren’t confined to New York. In the last six years, authorities have accused a Memphis police officer of using the NCIC database to leak information to a confidential informant about a watch dealer who the informant believed had stolen a Rolex; a reserve patrolman in Clarkston, Ga., of running names and license plates for drug dealers; a Montgomery County, Md., officer of running checks on cars belonging to a woman who later reported that the vehicles had been vandalized; and a Hartford, Conn., police sergeant of supplying database records to a woman who used them to harass an enemy.

To Read The Full Story

Are you already a subscriber?
Click to log in!