News

Reports: Crime Database Has Been Misused By NYPD Officers Multiple Times

'Unfortunately, It's Not Unusual That It Happens,' Investigator Says
View Comments
NYPD (file / credit: Mario Tama/Getty Images)

NYPD (file / credit: Mario Tama/Getty Images)

NEW YORK (CBSNewYork/AP) — Multiple NYPD officers have been charged with corruption in recent years, on allegations that they misused the FBI-operated National Crime Information Center to snoop on other officers, or even to get information on people they might rob.

In the most recent high-profile case in May, Detective Edwin Vargas, 42, was accused inappropriately accessing the NCIC to get information about at least two NYPD officers.

He was also of paying an email hacking service more than $4,000 to get the passwords and usernames of 43 e-mail accounts between March 2011 and October 2012, according to court papers. Of the 30 people targeted, 19 were current NYPD officers — including his ex-girlfriend — one was a retired NYPD officer, and one is on the NYPD’s administrative staff, prosecutors said.

The NCIC database serves 90,000 agencies and gets 9 million entries a day by users seeking information on stolen guns and cars, fugitives, sex offenders, orders of protection and other subjects, according to an FBI website. The NYPD system — called the “Finest,” as in “New York’s Finest” — also allows access to state criminal and Department of Motor Vehicles records.

How often the database is used for unauthorized purposes is unclear. The NYPD insists that officers are under strict orders to use it only during car stops, ongoing investigations or other police work. The department assigns them login names and passwords that allow supervisors to track their usage on desktop computers in station houses or on laptops in patrol cars.

NYPD recruits are warned that “if you misuse or you access information in an inappropriate manner — you are in serious trouble — such as being prosecuted, being fired and also big fines,” a police academy instructor testified at the trial of Gilbert Valle, who was convicted in March in a bizarre plot to kidnap, cook and cannibalize women.

In addition, an FBI compliance unit conducts spot audits to examine users’ “policies, procedures, and security requirements,” the FBI said in a statement. The FBI also requires each state to have its own audit programs and claims that “malicious misuse is not commonly discovered.”

But both the instructor testifying at the Valle trial and an Internal Affairs Bureau investigator who took the witness stand in an earlier case have conceded that officers can easily circumvent safeguards.

The investigator testified as a government witness at the 2010 trial of an NYPD officer accused of using the database to conduct surveillance of a perfume warehouse in New Jersey before an armed robbery there. He told jurors that officers often do searches while logged in under another officer’s name _ either out of neglect or, in this case, intent.

“Unfortunately — it’s not unusual that it happens,” the investigator said.

The instructor, when asked about an officer’s ability to effectively log in anonymously, responded, “I know it occurs. I wouldn’t say it’s common, but I know it does occur.”

At a trial where Valle was convicted in March, prosecutors alleged that the officer used the database _ sometimes accessing it while riding in a patrol car with his supervising sergeant _ to help compile dossiers on women that listed their birthdates, addresses, heights and weights. None of the women were harmed, but prosecutors alleged he went as far as to show up on one woman’s block after striking an agreement to kidnap her for $5,000 for a New Jersey man who wanted to rape and kill her.

In another database abuse case last year, federal authorities charged NYPD patrolman Jose Tejada with being a member of a crew that posed as police officers while staging more than 100 robberies of drug traffickers that netted more than 250 kilograms of cocaine and $1 million in cash.

Tejada “ran the names of coconspirators through law enforcement databases to determine whether there were active warrants in the names of the coconspirators,” prosecutors said in court papers. “In connection with these searches, Tejada advised coconspirators whether they could re-enter the United States without being arrested by law enforcement authorities.”

New Yorkers weighed in on the issue Sunday, telling 1010 WINS’ Gary Baumgarten that abuse is just too tempting with so much data at so many people’s fingertips.

“It goes with a lot of other things they do – stop-and-frisk – and sort of a general lack of respect for New Yorkers,” one man said.

Cops who allegedly use a national crime data system to check up on other officers, or even to get information on people they might rob.

The cases aren’t confined to New York. In the last six years, authorities have accused a Memphis police officer of using the NCIC database to leak information to a confidential informant about a watch dealer who the informant believed had stolen a Rolex; a reserve patrolman in Clarkston, Ga., of running names and license plates for marijuana dealers; a Montgomery County, Md., officer of running checks on cars belonging to a woman who later reported that the vehicles had been vandalized; and a Hartford, Conn., police sergeant of supplying database records to a woman who used them to harass her ex-boyfriend’s new girlfriend.

Check Out These Other Stories From CBSNewYork.com:

(TM and © Copyright 2013 CBS Radio Inc. and its relevant subsidiaries. CBS RADIO and EYE Logo TM and Copyright 2013 CBS Broadcasting Inc. Used under license. All Rights Reserved. This material may not be published, broadcast, rewritten, or redistributed. The Associated Press contributed to this report.)

View Comments