ABSTRACT
This project work intends to automate the existing criminal records of the Nigeria police using Enugu criminal investigating department. The essence was to produce durable criminal records and avoidable lost of criminal records. Structural database management system (DBMS) was used in its development in other to eliminate redundancy in the compilation, its friendliness in responding to the user exhibits and also its reliability and efficiency in tracking down criminals. Another important feature of this system was that it provides user with the facilities for having the hard copies or print out of any relevant
4
document as well as the facilities to communication with the system. Tracking is the observing of persons or objects on the move and supplying a timely ordered sequence of respective location data to a model e.g. capable to serve for depicting the motion on a display capability. The traditional and age-old system of intelligence and criminal record maintenance has failed to live up to the requirements of the existing crime scenario. Manual processes neither provide accurate, reliable and comprehensive data round the clock nor does it help in trend prediction and decision support.
TABLE OF CONTENT
Cover page | ||||||||
Caritas logo | ||||||||
Title page | ||||||||
Certification page- | – | – | – | – | – | – | – | – |
-i | ||||||||
Dedication page- | – | – | – | – | – | – | – | – |
-ii | ||||||||
Acknowledgement- – | – | – | – | – | – | – | – | |
-iii | ||||||||
5 |
Abstract- | – | – | – | – | – | – | – | – | – |
-iv | |||||||||
Table of content- | – | – | – | – | – | – | – | – | |
-v | |||||||||
List of tables – | – | – | – | – | – | – | – | – | |
-x | |||||||||
List of figures – | – | – | – | – | – | – | – | – | |
-xi | |||||||||
List of appendixes- | – | – | – | – | – | – | – | ||
-xii | |||||||||
CHAPTER ONE | |||||||||
INTRODUCTION | |||||||||
1.1 Background of the project- | – | – | – | – | – | – | |||
-1 | |||||||||
1.2 statement of problem- | – | – | – | – | – | – | – | ||
-3 | |||||||||
1.3 purpose of the project- – | – | – | – | – | – | – | |||
-4 | |||||||||
1.4 Justification- | – | – | – | – | – | – | – | – | |
-5 | |||||||||
1.5 scope of the project | – | – | – | – | – | – | – | ||
-5 | |||||||||
1.6 limitation of the project- | – | – | – | – | – | – | |||
-6 | |||||||||
1.7 project report organization- | – | – | – | – | – | – | |||
-6 | |||||||||
1.8 Definition of terms- | – | – | – | – | – | – | – | ||
-7 | |||||||||
6 |
CHAPTER TWO | ||||||||
LITERATURE REVIEW | ||||||||
2.1 | Brief history of Nigeria police- | – | – | – | – | – | ||
-8 | ||||||||
2.2 | Review of natural law theory– | – | – | – | – | – | ||
-11 | ||||||||
2.3 | Review of crime history- | – | – | – | – | – | – | |
-14 | ||||||||
2.4 | Tracking system- | – | – | – | – | – | – | – |
-19 | ||||||||
2.5 | Reasons for the failure of some criminal tracking system- | – | ||||||
-21 | ||||||||
CHAPTER THREE |
SYSTEM ANALYSIS AND DESIGN
3.1 Methodology- | – | – | – | – | – | – | – | – |
-22 | ||||||||
3.2 Data collection- | – | – | – | – | – | – | – | – |
-22 | ||||||||
3.2.1 Methods of Data Collection – | – | – | – | – | – | |||
-23 | ||||||||
3.2.2 Input analysis- – | – | – | – | – | – | – | – | |
-23 | ||||||||
3.2.3 Witness / Suspect Statement Input System- | – | – | – | |||||
-24 | ||||||||
3.2.4 Case File Input System- | – | – | – | – | – | – | ||
-24 |
7
3.2.5 Crime Diary Input System- –
-25
3.2.6 Output Analysis –Â Â Â –Â Â Â Â Â Â Â Â Â Â –
-25
- Crime Register Output System-
-26
- Output System Form CR. 2-
-26
- System Output Form CR.8- –
-27
- System Output Form CR 14-
-27
3.2.11 Charge Sheet – | – | – |
-27 | ||
3.2.12 Files and Records – – | – | |
-27 |
–Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –
–Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –
–Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –
–Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –
–Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –
–Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –
–Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –
–Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –
3.3 | Analysis of the Existing System-Â Â – | – | – | – | – |
-28 | |||||
3.4 | Limitations of the Existing System– – | – | – | – | – |
–31 |
8
3.4.1Justification for the new system– | – | – | – | – | – | ||||
–32 | |||||||||
3.5 System Design–Â – | – | – | – | – | – | – | – | ||
–33 | |||||||||
3.5.1 Output Specification and Design– | – | – | – | – | – | ||||
–33 | |||||||||
3.5.2 Input Design and Specification– | – | – | – | – | – | ||||
–34 | |||||||||
3.6 | Database Design– | – | – | – | – | – | – | – | |
–38 | |||||||||
3.7 | Program Design and Specification – | – | – | – | – | ||||
–43 | |||||||||
3.7.1 Criminal Registration – | – | – | – | – | – | – | |||
–45 | |||||||||
3.7.2 Suspect Registration | – | – | – | – | – | – | – | ||
–.45 | 3.7.3 Report – | – | – | – | – | – | – | – | |
– | – | –45 | |||||||
3.7.4 Change Password | – | – | – | – | – | – | – | ||
–46 | |||||||||
3.7. Complainant Registration – | – | – | – | – | – | – | |||
–46 |
9
3.8 | System Flowcharts– | – | – | – | – | – | – | – |
–46 | ||||||||
3.9 | Top down design– | – | – | – | – | – | – | – |
–48
CHAPTER FOUR
IMPLEMENTATION, TESTING AND INTEGRATION
4.1 Choice of Development Tools- | – | – | – | – | – | ||
-50 | |||||||
4.2 System Requirement- | – | – | – | – | – | – | – |
-51 | |||||||
4.2.1 Software Requirements | – | – | – | – | – | – | |
–51 | |||||||
4.2.2 Hardware Requirements- | – | – | – | – | – | – | |
-51 | |||||||
4.2.3 People Ware (Personal Requirements) – | – | – | – | – | |||
-52 | |||||||
4.3 system Implementation – | – | – | – | – | – | – | |
-52 | |||||||
4.4 Program Flowchart- | – | – | – | – | – | – | – |
-53 |
10
4.5 Testing –Â – | – | – | – | – | – | – | – | – |
-54 | ||||||||
4.5.1Unit testing- | – | – | – | – | – | – | – | – |
-54 | ||||||||
4.5.2 System testing – | – | – | – | – | – | – | – | |
-56 |
CHAPTER FIVE | |||||||||
SUMMARY, CONCLUSION AND RECOMMENDATIONS | |||||||||
5.1 | Summary of findings- – | – | – | – | – | – | – | ||
-57 | |||||||||
5.2 limitations of the study/project – | – | – | – | – | – | ||||
-58 | |||||||||
5.3 | Recommendation- – | – | – | – | – | – | – | ||
-58 | |||||||||
5.4 | BEME (Bill of engineering measurement and evaluatio) – | – | |||||||
-59 | |||||||||
5.5 | Conclusion- | – | – | – | – | – | – | – | – |
-60 | |||||||||
BIBLIOGRAPHY | – | – | – | – | – | – | – | – | |
-61 | |||||||||
11 |
GLOSSARY – | – | – | – | – | – | – | – | – | |
-65 | |||||||||
References- | – | – | – | – | – | – | – | – | – |
-61 | |||||||||
Glossary- | – | – | – | – | – | – | – | – | – |
-65 | |||||||||
Appendix A- | – | – | – | – | – | – | – | — | – |
-66 | |||||||||
Appendix B- | – | – | – | – | – | – | – | – | – |
-76 | |||||||||
Appendix C- | – | – | – | – | – | – | – | – | – |
-78 |
LIST OF TABLES | ||||||||
TABLE 3.1 Criminal file- – | – | – | – | – | – | – | ||
-39 | ||||||||
TABLE 3.2 suspect file- | – | – | – | – | – | – | – | |
-40 | ||||||||
TABLE 3.3 Complainant File – – | – | – | – | – | – | |||
-41 | ||||||||
TABLE 4.1- | – | – | – | – | – | – | – | – |
-54 | ||||||||
TABLE 5.1 BEME- – | – | – | – | – | – | – | – | |
-59 | ||||||||
12 |
LIST OF FIGURES | |||||||
Fig.2.0 organizational structure of Nigeria police- | – | – | – | ||||
-10 | |||||||
Fig 3.1 A sample of Witness/Suspect form- | – | – | – | ||||
-24 | |||||||
Fig 3.2 Information Flow- – | – | – | – | – | – | – | |
-30 | |||||||
Fig 3.3 login page– | – | – | – | – | – | – | – |
–43 | |||||||
Fig 3.4 main menu- – | – | – | – | – | – | – | – |
-44 | |||||||
Fig 3.5 system flow chart- – | – | – | – | – | – | – | |
-46 |
13
Fig 3.6 Top down design– | – | – | – | – | – | – |
–48 | ||||||
Fig 4.1 program flow chart- | – | – | – | – | – | – |
-53 |
LIST OF APPENDIXES | ||||||||
APPENDIX A- | – | – | – | – | – | – | – | – |
-66 | ||||||||
APPENDIX B- | – | – | – | – | – | – | – | – |
-76 | ||||||||
APPENDIX C- | – | – | – | – | – | – | – | – |
-78 |
14
CHAPTER ONE
INTRODUCTION
- Background of The Study
Man by nature is social, gregarious and cannot live in isolation. To maintain peace and harmony in the society, man has to fashion out conduct and some laws to govern the conduct of members of the society. When people appreciate these codes of conduct and laws, protection of lives and properties are guaranteed.
Generally tracking is the observing of persons or objects on the move and supplying a timely ordered sequence of respective location data to a model e.g. capable to serve for depicting the motion on a display capability.
The traditional and age-old system of intelligence and criminal record maintenance has failed to live up to the requirements of the existing crime scenario. Manual processes neither provide accurate, reliable and comprehensive data round the clock nor does it help in trend prediction and decision support. It also results in lower productivity and ineffective utilization of manpower. The solution to this ever-increasing problem lies in the effective use of Information Technology. Crime Tracking Information System uses computer-generated records as an interface for integrating and accessing massive amounts of location-based information.
15
Crime tracking system allows police personnel to plan effectively for emergency response, determine mitigation priorities, analyses historical events, and predict future events. Crime tracking system helps identify potential suspects to increase investigators suspect base when no leads are evident. The ability to access and process information quickly while displaying it in a spatial and visual medium allows agencies to allocate
resources quickly and mo-critical‘eeffectin law enforcement, information about the location of a crime, incident,
suspect, or victim is often crucial to determine the manner and size of the response. Crime tracking software helps co-ordinate vast amounts of location-based data from multiple sources. It enables the user to layer the data and view the data most critical to the particular issue or mission.
It is used world over by police departments, both large and small, to provide solutions for crime analysis, criminal tracking, traffic safety, community policing, Intranet/Internet mapping, and numerous other tasks.
Crime tracking system helps crime officers determine potential crime sites by examining complex seemingly unrelated criteria and displaying them all in an interface. It also helps them map inmate populations, fixtures, and equipment to provide for the safety of inmates by separating gang members, identifying high-risk or potentially violent inmates, and identifying hazardous locations in an area. It reduces the potential for internal violence
16
by providing better command and control. Traditionally, these activities have been supported by paper and pen. Police officers now have the ability to immediately generate crime report directly relevant to the situation at hand. Police agencies collect vast amounts of data from many sources including called-for-services, arrests, first information reports and daily report. The same information provides a powerful decision making tool for investigators, supervisors, and administrators.
- Statement of Problem
The Nigerian Police, which is used as a case study, has an existing criminal Tracking System, but this system is not automated. The documentation of criminal records is done on paper and pen. The storage of these criminal records is not something to write home about.
Case files are dumped in heaps while some are kept on shelves. With the moldy nature of the state such important documents quickly get dusty and because of lack of proper storage, some criminal documents are seriously damaged by rats that feed on them. With this kind of situation, it becomes highly difficult if not impossible to track down known criminal, access past criminal history of a suspect and know the status of some concluded cases.
17
- Purpose of the project
The project intends to computerize the existing Criminal Tracking System at
the Nigerian Police. Specifically, the project will accomplish the following:
- Design and develop a central database system that would serve as statewide repository of criminal data. The smaller database system at the sub-police station will be networked to the central database to access criminal data on cases not handled at the local station. This database system will be updated by local police station within the state as well as the police headquarters. (acting as a criminal data collection centers)
- The central database system will be resident on a server at the police headquarter and will be linked to both the local police station and the Central Criminal Registry via a client- server between station as well as Criminal Justice, the rendering of Criminal Justice.
- The database system will capture detailed information about crime suspect right from the time the crime was reported at the police down to the point the suspect appears before the court for prosecution as thereafter.
- The systems will posses features that will enable criminal data to
- be purged from the system, updated and queried.
18
- Justification
Implementation of a crime information system by the Nigerian police will help the police and the masses to get useful information on individuals with crime records. The system developed will among other things:
- Maintain a database of all crime records
2. | Enable a quick search on the database to retrieve crime  information | |
3. | Enable Nigerian police to track previous crimes committed | by  a |
suspect |
- Make crime control easier for the police
- Scope of the project
Basically any Criminal Tracking System as an integral part of the Criminal Justice Information System consists of three major sections, that is:
- The Criminal Identification Division
- The Magistrate Segment, and
- The prisons.
However, because of lack of time, funding and the scope of the system, the project was limited to the development and implementation of software – base criminal tracking information system that will automate the processes involved in tracking down criminals by the Nigerian Police.
19
- Limitation of the Project
Due to time and financial constraint, I was unable to visit few of the police stations in Nigeria to gather information on the existing crime information system. Few police stations were visited and the information gathered from the officers in charge forms the basis for the design of the new system.
The project did not cover the Prison and the Magistrate Segment, which could also be automated.
1.7Â Project Report Organization
The project is organized as follows;-
Chapter one introduces the project; the background of the project is also discussed. The objectives of the project, its significance, scope, and constraints are pointed out.
A brief history of the Nigerian police and review of literature on Criminal Tracking System are subject matter of Chapter two.
Chapter three discusses system Analysis and design. It deals with detailed investigation and analysis of the existing system and problem identification.
20
Chapter four covers the system implementation, testing and integration Chapter five was the summary of findings, limitations of the project, recommendations, bill of engineering measurement and evaluation conclusion, bibliography, appendix A and Appendix B of the project.
- Definition of Terms
Crime: A normative definition views crime as deviant behavior that violates prevailing norms – cultural standards prescribing how humans ought to behave normally
Criminalization: One can view criminalization as a procedure deployed by society as a pre-emptive, harm-reduction device, using the threat of punishment as a deterrent to anyone proposing to engage in the behavior causing harm.
FIIB: Federal Investigation and Intelligence Bureau
IGP: Inspector General of Police
ABSTRACT
This project work intends to automate the existing criminal records of the Nigeria police using Enugu criminal investigating department. The essence was to produce durable criminal records and avoidable lost of criminal records. Structural database management system (DBMS) was used in its development in other to eliminate redundancy in the compilation, its friendliness in responding to the user exhibits and also its reliability and efficiency in tracking down criminals. Another important feature of this system was that it provides user with the facilities for having the hard copies or print out of any relevant
4
document as well as the facilities to communication with the system. Tracking is the observing of persons or objects on the move and supplying a timely ordered sequence of respective location data to a model e.g. capable to serve for depicting the motion on a display capability. The traditional and age-old system of intelligence and criminal record maintenance has failed to live up to the requirements of the existing crime scenario. Manual processes neither provide accurate, reliable and comprehensive data round the clock nor does it help in trend prediction and decision support.
TABLE OF CONTENT
Cover page | ||||||||
Caritas logo | ||||||||
Title page | ||||||||
Certification page- | – | – | – | – | – | – | – | – |
-i | ||||||||
Dedication page- | – | – | – | – | – | – | – | – |
-ii | ||||||||
Acknowledgement- – | – | – | – | – | – | – | – | |
-iii | ||||||||
5 |
Abstract- | – | – | – | – | – | – | – | – | – |
-iv | |||||||||
Table of content- | – | – | – | – | – | – | – | – | |
-v | |||||||||
List of tables – | – | – | – | – | – | – | – | – | |
-x | |||||||||
List of figures – | – | – | – | – | – | – | – | – | |
-xi | |||||||||
List of appendixes- | – | – | – | – | – | – | – | ||
-xii | |||||||||
CHAPTER ONE | |||||||||
INTRODUCTION | |||||||||
1.1 Background of the project- | – | – | – | – | – | – | |||
-1 | |||||||||
1.2 statement of problem- | – | – | – | – | – | – | – | ||
-3 | |||||||||
1.3 purpose of the project- – | – | – | – | – | – | – | |||
-4 | |||||||||
1.4 Justification- | – | – | – | – | – | – | – | – | |
-5 | |||||||||
1.5 scope of the project | – | – | – | – | – | – | – | ||
-5 | |||||||||
1.6 limitation of the project- | – | – | – | – | – | – | |||
-6 | |||||||||
1.7 project report organization- | – | – | – | – | – | – | |||
-6 | |||||||||
1.8 Definition of terms- | – | – | – | – | – | – | – | ||
-7 | |||||||||
6 |
CHAPTER TWO | ||||||||
LITERATURE REVIEW | ||||||||
2.1 | Brief history of Nigeria police- | – | – | – | – | – | ||
-8 | ||||||||
2.2 | Review of natural law theory– | – | – | – | – | – | ||
-11 | ||||||||
2.3 | Review of crime history- | – | – | – | – | – | – | |
-14 | ||||||||
2.4 | Tracking system- | – | – | – | – | – | – | – |
-19 | ||||||||
2.5 | Reasons for the failure of some criminal tracking system- | – | ||||||
-21 | ||||||||
CHAPTER THREE |
SYSTEM ANALYSIS AND DESIGN
3.1 Methodology- | – | – | – | – | – | – | – | – |
-22 | ||||||||
3.2 Data collection- | – | – | – | – | – | – | – | – |
-22 | ||||||||
3.2.1 Methods of Data Collection – | – | – | – | – | – | |||
-23 | ||||||||
3.2.2 Input analysis- – | – | – | – | – | – | – | – | |
-23 | ||||||||
3.2.3 Witness / Suspect Statement Input System- | – | – | – | |||||
-24 | ||||||||
3.2.4 Case File Input System- | – | – | – | – | – | – | ||
-24 |
7
3.2.5 Crime Diary Input System- –
-25
3.2.6 Output Analysis –Â Â Â –Â Â Â Â Â Â Â Â Â Â –
-25
- Crime Register Output System-
-26
- Output System Form CR. 2-
-26
- System Output Form CR.8- –
-27
- System Output Form CR 14-
-27
3.2.11 Charge Sheet – | – | – |
-27 | ||
3.2.12 Files and Records – – | – | |
-27 |
–Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –
–Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –
–Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –
–Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –
–Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –
–Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –
–Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –
–Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –Â Â Â Â Â Â Â Â Â Â –
3.3 | Analysis of the Existing System-Â Â – | – | – | – | – |
-28 | |||||
3.4 | Limitations of the Existing System– – | – | – | – | – |
–31 |
8
3.4.1Justification for the new system– | – | – | – | – | – | ||||
–32 | |||||||||
3.5 System Design–Â – | – | – | – | – | – | – | – | ||
–33 | |||||||||
3.5.1 Output Specification and Design– | – | – | – | – | – | ||||
–33 | |||||||||
3.5.2 Input Design and Specification– | – | – | – | – | – | ||||
–34 | |||||||||
3.6 | Database Design– | – | – | – | – | – | – | – | |
–38 | |||||||||
3.7 | Program Design and Specification – | – | – | – | – | ||||
–43 | |||||||||
3.7.1 Criminal Registration – | – | – | – | – | – | – | |||
–45 | |||||||||
3.7.2 Suspect Registration | – | – | – | – | – | – | – | ||
–.45 | 3.7.3 Report – | – | – | – | – | – | – | – | |
– | – | –45 | |||||||
3.7.4 Change Password | – | – | – | – | – | – | – | ||
–46 | |||||||||
3.7. Complainant Registration – | – | – | – | – | – | – | |||
–46 |
9
3.8 | System Flowcharts– | – | – | – | – | – | – | – |
–46 | ||||||||
3.9 | Top down design– | – | – | – | – | – | – | – |
–48
CHAPTER FOUR
IMPLEMENTATION, TESTING AND INTEGRATION
4.1 Choice of Development Tools- | – | – | – | – | – | ||
-50 | |||||||
4.2 System Requirement- | – | – | – | – | – | – | – |
-51 | |||||||
4.2.1 Software Requirements | – | – | – | – | – | – | |
–51 | |||||||
4.2.2 Hardware Requirements- | – | – | – | – | – | – | |
-51 | |||||||
4.2.3 People Ware (Personal Requirements) – | – | – | – | – | |||
-52 | |||||||
4.3 system Implementation – | – | – | – | – | – | – | |
-52 | |||||||
4.4 Program Flowchart- | – | – | – | – | – | – | – |
-53 |
10
4.5 Testing –Â – | – | – | – | – | – | – | – | – |
-54 | ||||||||
4.5.1Unit testing- | – | – | – | – | – | – | – | – |
-54 | ||||||||
4.5.2 System testing – | – | – | – | – | – | – | – | |
-56 |
CHAPTER FIVE | |||||||||
SUMMARY, CONCLUSION AND RECOMMENDATIONS | |||||||||
5.1 | Summary of findings- – | – | – | – | – | – | – | ||
-57 | |||||||||
5.2 limitations of the study/project – | – | – | – | – | – | ||||
-58 | |||||||||
5.3 | Recommendation- – | – | – | – | – | – | – | ||
-58 | |||||||||
5.4 | BEME (Bill of engineering measurement and evaluatio) – | – | |||||||
-59 | |||||||||
5.5 | Conclusion- | – | – | – | – | – | – | – | – |
-60 | |||||||||
BIBLIOGRAPHY | – | – | – | – | – | – | – | – | |
-61 | |||||||||
11 |
GLOSSARY – | – | – | – | – | – | – | – | – | |
-65 | |||||||||
References- | – | – | – | – | – | – | – | – | – |
-61 | |||||||||
Glossary- | – | – | – | – | – | – | – | – | – |
-65 | |||||||||
Appendix A- | – | – | – | – | – | – | – | — | – |
-66 | |||||||||
Appendix B- | – | – | – | – | – | – | – | – | – |
-76 | |||||||||
Appendix C- | – | – | – | – | – | – | – | – | – |
-78 |
LIST OF TABLES | ||||||||
TABLE 3.1 Criminal file- – | – | – | – | – | – | – | ||
-39 | ||||||||
TABLE 3.2 suspect file- | – | – | – | – | – | – | – | |
-40 | ||||||||
TABLE 3.3 Complainant File – – | – | – | – | – | – | |||
-41 | ||||||||
TABLE 4.1- | – | – | – | – | – | – | – | – |
-54 | ||||||||
TABLE 5.1 BEME- – | – | – | – | – | – | – | – | |
-59 | ||||||||
12 |
LIST OF FIGURES | |||||||
Fig.2.0 organizational structure of Nigeria police- | – | – | – | ||||
-10 | |||||||
Fig 3.1 A sample of Witness/Suspect form- | – | – | – | ||||
-24 | |||||||
Fig 3.2 Information Flow- – | – | – | – | – | – | – | |
-30 | |||||||
Fig 3.3 login page– | – | – | – | – | – | – | – |
–43 | |||||||
Fig 3.4 main menu- – | – | – | – | – | – | – | – |
-44 | |||||||
Fig 3.5 system flow chart- – | – | – | – | – | – | – | |
-46 |
13
Fig 3.6 Top down design– | – | – | – | – | – | – |
–48 | ||||||
Fig 4.1 program flow chart- | – | – | – | – | – | – |
-53 |
LIST OF APPENDIXES | ||||||||
APPENDIX A- | – | – | – | – | – | – | – | – |
-66 | ||||||||
APPENDIX B- | – | – | – | – | – | – | – | – |
-76 | ||||||||
APPENDIX C- | – | – | – | – | – | – | – | – |
-78 |
14
CHAPTER ONE
INTRODUCTION
- Background of The Study
Man by nature is social, gregarious and cannot live in isolation. To maintain peace and harmony in the society, man has to fashion out conduct and some laws to govern the conduct of members of the society. When people appreciate these codes of conduct and laws, protection of lives and properties are guaranteed.
Generally tracking is the observing of persons or objects on the move and supplying a timely ordered sequence of respective location data to a model e.g. capable to serve for depicting the motion on a display capability.
The traditional and age-old system of intelligence and criminal record maintenance has failed to live up to the requirements of the existing crime scenario. Manual processes neither provide accurate, reliable and comprehensive data round the clock nor does it help in trend prediction and decision support. It also results in lower productivity and ineffective utilization of manpower. The solution to this ever-increasing problem lies in the effective use of Information Technology. Crime Tracking Information System uses computer-generated records as an interface for integrating and accessing massive amounts of location-based information.
15
Crime tracking system allows police personnel to plan effectively for emergency response, determine mitigation priorities, analyses historical events, and predict future events. Crime tracking system helps identify potential suspects to increase investigators suspect base when no leads are evident. The ability to access and process information quickly while displaying it in a spatial and visual medium allows agencies to allocate
resources quickly and mo-critical‘eeffectin law enforcement, information about the location of a crime, incident,
suspect, or victim is often crucial to determine the manner and size of the response. Crime tracking software helps co-ordinate vast amounts of location-based data from multiple sources. It enables the user to layer the data and view the data most critical to the particular issue or mission.
It is used world over by police departments, both large and small, to provide solutions for crime analysis, criminal tracking, traffic safety, community policing, Intranet/Internet mapping, and numerous other tasks.
Crime tracking system helps crime officers determine potential crime sites by examining complex seemingly unrelated criteria and displaying them all in an interface. It also helps them map inmate populations, fixtures, and equipment to provide for the safety of inmates by separating gang members, identifying high-risk or potentially violent inmates, and identifying hazardous locations in an area. It reduces the potential for internal violence
16
by providing better command and control. Traditionally, these activities have been supported by paper and pen. Police officers now have the ability to immediately generate crime report directly relevant to the situation at hand. Police agencies collect vast amounts of data from many sources including called-for-services, arrests, first information reports and daily report. The same information provides a powerful decision making tool for investigators, supervisors, and administrators.
- Statement of Problem
The Nigerian Police, which is used as a case study, has an existing criminal Tracking System, but this system is not automated. The documentation of criminal records is done on paper and pen. The storage of these criminal records is not something to write home about.
Case files are dumped in heaps while some are kept on shelves. With the moldy nature of the state such important documents quickly get dusty and because of lack of proper storage, some criminal documents are seriously damaged by rats that feed on them. With this kind of situation, it becomes highly difficult if not impossible to track down known criminal, access past criminal history of a suspect and know the status of some concluded cases.
17
- Purpose of the project
The project intends to computerize the existing Criminal Tracking System at
the Nigerian Police. Specifically, the project will accomplish the following:
- Design and develop a central database system that would serve as statewide repository of criminal data. The smaller database system at the sub-police station will be networked to the central database to access criminal data on cases not handled at the local station. This database system will be updated by local police station within the state as well as the police headquarters. (acting as a criminal data collection centers)
- The central database system will be resident on a server at the police headquarter and will be linked to both the local police station and the Central Criminal Registry via a client- server between station as well as Criminal Justice, the rendering of Criminal Justice.
- The database system will capture detailed information about crime suspect right from the time the crime was reported at the police down to the point the suspect appears before the court for prosecution as thereafter.
- The systems will posses features that will enable criminal data to
- be purged from the system, updated and queried.
18
- Justification
Implementation of a crime information system by the Nigerian police will help the police and the masses to get useful information on individuals with crime records. The system developed will among other things:
- Maintain a database of all crime records
2. | Enable a quick search on the database to retrieve crime  information | |
3. | Enable Nigerian police to track previous crimes committed | by  a |
suspect |
- Make crime control easier for the police
- Scope of the project
Basically any Criminal Tracking System as an integral part of the Criminal Justice Information System consists of three major sections, that is:
- The Criminal Identification Division
- The Magistrate Segment, and
- The prisons.
However, because of lack of time, funding and the scope of the system, the project was limited to the development and implementation of software – base criminal tracking information system that will automate the processes involved in tracking down criminals by the Nigerian Police.
19
- Limitation of the Project
Due to time and financial constraint, I was unable to visit few of the police stations in Nigeria to gather information on the existing crime information system. Few police stations were visited and the information gathered from the officers in charge forms the basis for the design of the new system.
The project did not cover the Prison and the Magistrate Segment, which could also be automated.
1.7Â Project Report Organization
The project is organized as follows;-
Chapter one introduces the project; the background of the project is also discussed. The objectives of the project, its significance, scope, and constraints are pointed out.
A brief history of the Nigerian police and review of literature on Criminal Tracking System are subject matter of Chapter two.
Chapter three discusses system Analysis and design. It deals with detailed investigation and analysis of the existing system and problem identification.
20
Chapter four covers the system implementation, testing and integration Chapter five was the summary of findings, limitations of the project, recommendations, bill of engineering measurement and evaluation conclusion, bibliography, appendix A and Appendix B of the project.
- Definition of Terms
Crime: A normative definition views crime as deviant behavior that violates prevailing norms – cultural standards prescribing how humans ought to behave normally
Criminalization: One can view criminalization as a procedure deployed by society as a pre-emptive, harm-reduction device, using the threat of punishment as a deterrent to anyone proposing to engage in the behavior causing harm.
FIIB: Federal Investigation and Intelligence Bureau
IGP: Inspector General of Police
DIG: Deputy Inspector General
FCID: Force Criminal Investigation Department (FCID) is the highest investigation arm of the Nigeria Police NPF.
DIG: Deputy Inspector General
FCID: Force Criminal Investigation Department (FCID) is the highest investigation arm of the Nigeria Police NPF.
This material content is developed to serve as a GUIDE for students to conduct academic research
A1Project Hub Support Team Are Always (24/7) Online To Help You With Your Project
Chat Us on WhatsApp » 09063590000
DO YOU NEED CLARIFICATION? CALL OUR HELP DESK:
09063590000 (Country Code: +234)
YOU CAN REACH OUR SUPPORT TEAM VIA MAIL: [email protected]
09063590000 (Country Code: +234)