Compatible with every major AI agent and IDE
What is the FBI Crime Data Explorer MCP Server?
Connect to the FBI Crime Data Explorer (CDE) to retrieve comprehensive law enforcement statistics directly through natural language. This server provides access to the Uniform Crime Reporting (UCR) program's extensive datasets.
What you can do
- National Estimates — Retrieve estimated crime totals for the entire United States across specific year ranges.
- State Summaries — Fetch detailed offense data (violent crime, property crime, etc.) for any specific US state.
- Agency-Level Data — Query statistics reported by specific local, county, or state law enforcement agencies using their unique ORI identifier.
- Victim Demographics — Analyze NIBRS data to see breakdowns of victims by age, race, and sex for various offenses.
How it works
- Subscribe to this server
- Enter your FBI CDE API Key
- Start querying public safety data from Claude, Cursor, or any MCP client
Who is this for?
- Data Analysts & Researchers — quickly pull structured crime data for academic or professional reports.
- Journalists — verify crime statistics and trends for specific regions or agencies instantly.
- Policy Makers — evaluate the impact of safety initiatives using official historical data.
Built-in capabilities (4)
Retrieve crime data for a specific law enforcement agency
Retrieve national crime estimates
Retrieve NIBRS victim demographic data
Retrieve crime statistics for a specific state
Why LangChain?
LangChain's ecosystem of 500+ components combines seamlessly with FBI Crime Data Explorer through native MCP adapters. Connect 4 tools via Vinkius and use ReAct agents, Plan-and-Execute strategies, or custom agent architectures. with LangSmith tracing giving full visibility into every tool call, latency, and token cost.
- —
The largest ecosystem of integrations, chains, and agents. combine FBI Crime Data Explorer MCP tools with 500+ LangChain components
- —
Agent architecture supports ReAct, Plan-and-Execute, and custom strategies with full MCP tool access at every step
- —
LangSmith tracing gives you complete visibility into tool calls, latencies, and token usage for production debugging
- —
Memory and conversation persistence let agents maintain context across FBI Crime Data Explorer queries for multi-turn workflows
FBI Crime Data Explorer in LangChain
FBI Crime Data Explorer and 4,000+ other MCP servers. One platform. One governance layer.
Teams that connect FBI Crime Data Explorer to LangChain through Vinkius don't need to source, host, or maintain individual MCP servers. Every tool call runs inside a hardened runtime with credential isolation, DLP, and a signed audit chain.
Raw MCP | Vinkius | |
|---|---|---|
| Server catalog | Find and host yourself | 4,000+ managed |
| Infrastructure | Self-hosted | Sandboxed V8 isolates |
| Credential handling | Plaintext in config | Vault + runtime injection |
| Data loss prevention | None | Configurable DLP policies |
| Kill switch | None | Global instant shutdown |
| Financial circuit breakers | None | Per-server limits + alerts |
| Audit trail | None | Ed25519 signed logs |
| SIEM log streaming | None | Splunk, Datadog, Webhook |
| Honeytokens | None | Canary alerts on leak |
| Custom domains | Not applicable | DNS challenge verified |
| GDPR compliance | Manual effort | Automated purge + export |
Why teams choose Vinkius for FBI Crime Data Explorer in LangChain
The FBI Crime Data Explorer MCP Server runs on Vinkius-managed infrastructure inside AWS — a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts. All 4 tools execute in hardened sandboxes optimized for native MCP execution.
Your AI agents in LangChain only access the data you authorize, with DLP that blocks sensitive information from ever reaching the model, kill switch for instant shutdown, and up to 60% token savings. Enterprise-grade infrastructure, zero maintenance.

* Every MCP server runs on Vinkius-managed infrastructure inside AWS - a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts optimized for native MCP execution. See our infrastructure
How Vinkius secures
FBI Crime Data Explorer for LangChain
Every tool call from LangChain to the FBI Crime Data Explorer MCP Server is protected by DLP redaction, cryptographic audit chains, V8 sandbox isolation, kill switch, and financial circuit breakers.
Frequently asked questions
How do I find data for a specific local police department?
You can use the get_agency_summarized tool. You will need the agency's 9-character ORI (Originating Agency Identifier) to retrieve their specific reported statistics.
What kind of demographic information is available for crime victims?
The get_nibrs_victim_demographics tool allows you to filter victim data by age, race, or sex for specific offenses in states that support NIBRS reporting.
Can I compare crime trends over multiple years?
Yes. Tools like get_national_estimates and get_state_summarized accept start_year and end_year parameters to provide data across a historical range.
How does LangChain connect to MCP servers?
Use langchain-mcp-adapters to create an MCP client. LangChain discovers all tools and wraps them as native LangChain tools compatible with any agent type.
Which LangChain agent types work with MCP?
All agent types including ReAct, OpenAI Functions, and custom agents work with MCP tools. The tools appear as standard LangChain tools after the adapter wraps them.
Can I trace MCP tool calls in LangSmith?
Yes. All MCP tool invocations appear as traced steps in LangSmith, showing input parameters, response payloads, latency, and token usage.
MultiServerMCPClient not found
Install: pip install langchain-mcp-adapters
Explore More MCP Servers
View all →
Geometry Calculator
3 toolsCompute exact Euclidean distances, 2D areas, and 3D volumes completely local. A zero-latency geometry engine for autonomous AI agents.

Mattermark
10 toolsStartup and venture capital data via Mattermark — search companies, investors, and funding rounds.

Hudu
10 toolsManage IT documentation, assets, and passwords via Hudu API.

JWT & Base64 Decoder
2 toolsStop hallucinating Base64 translations. Instantly decode complex JWT tokens into readable headers and payloads with exact expiration mathematics.
