TITLE

We'll Call You

PUB. DATE
March 1974
SOURCE
New Republic;3/16/74, Vol. 170 Issue 11, p10
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Focuses on a piece written by columnist Lowell Ponte about the computer network of the U.S. Federal Bureau of Investigation (FBI). Function of the computer system; Limitation of the open-door policy to FBI fingerprint files; Computerized Criminal History of the FBI; Political subversives collected by the Army in the 1960s; Possibility of opening the criminal record history for review.
ACCESSION #
10199481

 

Related Articles

  • How the FBI Blew It. Knorr, Eric // InfoWorld;3/21/2005, Vol. 27 Issue 12, p45 

    This article addresses issues pertaining to the unsatisfactory performance of the information technology (IT) infrastructure project of the U.S. Federal Bureau of Investigation (FBI) as of March 2005. Some FBI agents ruefully refer to the trilogy project, a massive initiative to modernize the...

  • FBI Youth. Partch, Jackie; Ishizuka, Kathy // School Library Journal;Oct2005, Vol. 51 Issue 10, p68 

    Reviews the Web site FBI Youth from the U.S. Federal Bureau of Investigation.

  • Modernization of Computers Still a Way Away at FBI. Paige, Sean // Insight on the News;8/5/2002, Vol. 18 Issue 28, p8 

    Comments on the slow pace of the modernization of computer systems at the U.S. Federal Bureau of Investigation (FBI). Amount allotted for technology upgrades at the FBI; Impact on the ability of the FBI to solve the cases related to the September 11, 2001 terrorist attacks.

  • FBI Is Implementing Key Acquisition Methods on Its New Case Management System, but Related Agencywide Guidance Needs to Be Improved. Hite, Randolph C. // GAO Reports;9/23/2008, p36 

    The article focuses on the implementation of the acquisition methods on the U.S. Federal Bureau of Investigation's (FBI) case management system. In order to test if the methods are effective, the Government Accountability Office (GAO) reviewed FBI's Sentinel policies and procedures. Based on the...

  • Logging on to cyber-crime. Regan, Tom // Christian Science Monitor;7/08/99, Vol. 91 Issue 155, p16 

    Focuses on the problem of electronic fraud and other cyber crimes. Difficulty in catching such discreet criminals; Costs to AT&T and MCI because of customers whose modems had been hijacked by Internet scam artists; How computers are changing the face of crime; No physical danger and fewer...

  • Statement on the Federal Bureau of Investigation's Uniform Crime Report. Clinton, William J. // Weekly Compilation of Presidential Documents;5/15/2000, Vol. 36 Issue 19, p1030 

    Presents the text of a statement given by United States (US) President Bill Clinton on May 7, 2000 which deals with the 1999 statistics crime report released by the US Federal Bureau of Investigation.

  • FBI Uses Billboards To Try to Nab Suspect In Gay-Related Murders.  // Advocate;11/25/82, Issue 356, p11 

    Reports on the effort of the U.S. Federal Bureau of Investigation to revive a stalled search for a man accused of two gay-related murders. Use of a billboard to search the criminal.

  • In their jeans. Cohen, Philip // New Scientist;02/21/98, Vol. 157 Issue 2122, p5 

    Focuses on a method being used by the Federal Bureau of Investigation (FBI) to capture criminals, which involves the type of jeans worn. Reference to some of the issues addressed at a meeting of the American Academy of Forensic Sciences; How the process is expected to work.

  • FBI TURNING POINTS: 10 CRITICAL CASES. J.K. // American Heritage;Aug/Sep2002, Vol. 53 Issue 4, p35 

    Focuses on the critical cases investigated by the U.S. Federal Bureau of Investigation. Radicals suspected at the Palmer Raids; Arrest of bank robber John Dillinger; Accusation against Alger Hiss.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics