John Walsh Describes N-DEx
Television host John Walsh describes the FBI's National Data Exchange, or N-DEx.
Hi, I’m John Walsh, host of The Hunt on CNN and for 25 years the host of America’s Most Wanted on Fox, but what you might not know is that I’m an advocate for victims of crime and the cofounder for the National Center for Missing and Exploited Children.
I have spent years advocating for victims’ rights, fighting crime, and working to put criminals behind bars.
Like my efforts with NCMEC, the FBI has worked to make a better way to share critical investigative information. Information that can … and has… led to case closures, apprehensions, and the prevention of crime.
Many regions and agencies maintain their own methods of sharing information. The National Data Exchange, or N-DEx, is designed to complement these systems and link them on a nationwide scale.
N-DEx makes it possible to search hundreds of millions of records in just one place, providing law enforcement with a national tool to investigate … identify … locate … and apprehend those running from justice.
How it works. Agencies from across the country electronically submit investigative information to N-DEx, making it accessible to the criminal justice community. You can then leverage that information to uncover leads … form connections … and close cases.
With new records submitted daily, N-DEx has demonstrated tremendous value.
A New Mexico casino robbery solved after an N-DEx record led to collaboration between local, regional, tribal, and federal agencies. A Texas Ten Most Wanted fugitive … a sex offender … brought to justice after records across the country were linked. Multiple warrants issued … suspects located … and cases closed.
N-DEx is available free of charge for law enforcement personnel today. I really encourage everybody to participate. N-DEx could hold the missing pieces to your next investigation.
- 09.04.2018 — Facebook Live Event: An Inside Look at Physical Fitness
- 09.03.2018 — Smithsonian Assists FBI in Minnesota Ruby Slippers Case
- 08.30.2018 — Protected Voices: Information Security (InfoSec)
- 08.30.2018 — Protected Voices: Wi-Fi
- 08.30.2018 — Protected Voices: Social Engineering
- 08.30.2018 — Protected Voices: Virtual Private Networks
- 08.30.2018 — Protected Voices: Safer Campaign Communications
- 08.30.2018 — Protected Voices: Router Hardening
- 08.30.2018 — Protected Voices: Patching, Firewalls, and Anti-Virus Software
- 08.30.2018 — Protected Voices: Passwords
- 08.30.2018 — Protected Voices: Incident Response
- 08.30.2018 — Protected Voices: Have You Been Hacked?
- 08.30.2018 — Protected Voices: Cloud-Based Services
- 08.30.2018 — Protected Voices: Browser and App Safety
- 08.29.2018 — Seattle Detective Describes Sex Trafficker David Delay's Methods
- 08.29.2018 — Seattle Special Agent Describes David Delay Sex Trafficking Case
- 08.29.2018 — Seattle Sex Trafficking Survivor Shares Her Story
- 08.28.2018 — Apply for the FBI Honors Internship Program
- 08.03.2018 — Unexpected Agents at the FBI
- 08.03.2018 — FBI Special Agent Careers – Law Enforcement