Intergovernmental Service Agreements (IGSA)

The Hidden Data Network: How Law Enforcement Shares Your Information Without You Ever Knowing

I didn’t realize how many systems I was in…

until I tried to get out of one.

That’s when it hits you.

You’re not just dealing with a jail.

You’re dealing with a network.

A system that already knows your name, your history, your charges—

before you even open your mouth.


Scene Setup

County jail intake.

Metal bench.

Fluorescent lights that never turn off.

You’re sitting there thinking this is local.

One county.

One charge.

One system.

It’s not.

By the time you’re booked, your data is already moving.

Across systems you’ve never heard of.

Across agencies you didn’t interact with.

Across jurisdictions you never entered.

All in real time.


The System Layer — Intergovernmental Data Sharing

This isn’t accidental.

It’s built into the system.

Intergovernmental Service Agreements (ISAs) and CJIS user agreements allow federal, state, and local agencies to share criminal justice data instantly.

On paper, it’s coordination.

In practice, it’s a unified data pipeline.

Once you enter it—

you don’t control where your information goes.


⚖️ LAW ANCHOR

Criminal justice data sharing is governed by 28 CFR Part 20 and the FBI’s CJIS Security Policy.

Agencies must sign interagency agreements to access federal systems like NCIC and N-DEx.

These frameworks are administrative—not judicial.

Which means data can move between agencies without the same level of courtroom scrutiny.

That distinction matters.

Because information can influence outcomes long before it’s ever challenged in court.


🧠 FACT CHECK — The Databases Involved

The system runs on interconnected databases:

  • NCIC — warrants, stolen property, missing persons
  • NGI / IAFIS — fingerprints, biometrics, facial recognition
  • N-DEx — incident reports and case-level data
  • NICS — firearm background checks
  • Nlets — interstate data exchange (DMV, criminal records)
  • JABS — federal booking and identity verification

These systems don’t operate independently.

They cross-reference.

They sync.

They build a profile.

In seconds.


Escalation — When Systems Combine

The more systems involved, the less transparent the process becomes.

Federal task forces.

Joint investigations.

Cross-agency data pulls.

At that point, it’s not always clear:

Where the information originated.

Who accessed it.

Or how it’s being used.

And if you’re the one inside the system—

you don’t get to ask.


Legal and Ethical Fault Lines

  • Due process risk — evidence pathways may not be fully disclosed
  • Transparency gaps — agreements and audits often redacted
  • Oversight limits — internal audits dominate enforcement

The system is accountable on paper.

But difficult to audit from the outside.

And nearly impossible to see from the inside.


MANIFESTO MOMENT

You think you’re dealing with one agency.

You’re not.

You’re dealing with a network that already decided who you are—

before you ever get a chance to explain yourself.

And once that data moves—

it doesn’t come back.


Conclusion

Intergovernmental agreements weren’t built to target individuals.

They were built to connect systems.

But when systems connect—

power concentrates.

The real question isn’t whether these databases exist.

It’s this:

Who controls the flow of information—and what happens when you’re on the receiving end of it?