Vous êtes sur la page 1sur 8

Information Technology for People-Centred Development (ITePED 2011)

DEVELOPMENT OF CRIMINALS RECORD INFORMATION SYSTEM


Daniel E.S. Kawai1, Dogo H. Samson2
1, 2
Department of Mathematical Science,
Faculty of Science, Kaduna State University, Kaduna, Nigeria

ABSTRACT
National security has been a source of concern to all and sundry in Nigeria.
There is the issue of religious crisis in some states of the Northern part of
Nigeria, ritual killings and kidnappings in some states of the South-East and
South-South, sectarian clashes in some states of the South-West, bombings in
Abuja and some states of the federation. In order to reinforce Security and
Justice in Nigeria, and to ensure the security of citizens, it is important to
establish at all levels a concrete and user-friendly system which will enable an
efficient exchange of information on previous convictions of criminals.
Information about previous convictions shall circulate between judges and
prosecutors as well as police authorities. This is essential in order to provide
adequate responses to crime and also to prevent new crimes from being
committed.

Keywords: Crime, Criminal, Criminal Record, Information, Police, Record, Suspect.

1.0 INTRODUCTION Criminal Records Information


The challenges to National security System (CRIS) will assist the police with
in Nigeria are enormous. There is the issue useful information that will help in
of religious crisis in some states of the controlling (apprehend, prosecute, and
northern part of Nigeria, ritual killings and sanction) criminals. The system will provide
kidnappings in some states of the South east infor-mation on criminals such as:
and south south, sectarian clashes in some Names and Aliases used
states of the south west, bombings in Abuja Type of Crimes carried out
and some states of the federation. Mode of operation
The police in the Nigerian state is an Jail terms served
organization set up by the government and Date of last crime
saddled with the responsibility of Mental Status, etc.
maintaining law and order in the society, It has been acknowledged that the
and are also responsible for preventing and nearest we can get to the criminal hap-
solving crimes. The aforementioned issues enings or events is the record kept by the
constitute a threat to national security, and if Police, of crimes reported to them (James
not curtailed, it might escalate to a greater N., 2010a).
proportion that might plunge the country The Nigerian Police Force have a
into confusion. A system of providing the very small number of communication
Nigerian Police with information regarding devices (News Agency of Nigeria, 1992).
criminals and the various activities they had The use of Computers and other commu-
carried out in the (recent) past, will go along nication devices that will help in keeping
way in helping to checkmate crimes and tracks of criminals and the various activities
criminals; and this will also help in they engaged in, is very minimal.
identifying new cases of crimes and All crime rates are computed from
criminals within a given locality. A the police reports, using Nigeria's 1991

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE JULY 25-29, 2011
population census report as its base (total business. Such losses are often written off
population = 88,569,226). Generally, the during stock taking as shortages or
definitions of the crimes are similar to those breakages. There is an enormous amount of
of England. In 1989, there were 928 cases of internal dishonesty which is never
murder reported to the police, at a rate of discovered or which is condoned.
1.07 per 100,000 populations. Attempts are The 'victim' may have been a willing
not included. (The number and rate of partner to the crime and so it 'is unlikely to
reported murders per 100,000 population for be discovered unless a third reports it. This
previous years, are as follows: 984, is the case for many sexual offences against
rate=1.23 (1986); 849, rate=1.04 (1987); and children, and criminal abortion and
838, rate=1.00 (1988)). homosexual offences.
In 1989, there were 69,454 cases of Even where the victim knows an
theft reported to the police, at a rate of 80.82 offence has been committed and has not
per 100,000 populations. Attempts are not consented to it or partaken in it, he or she
included. (The number and rate of reported may decide not to report the offence to the
thefts per 100,000 population for previous police for a variety of reasons. It may be
years are as follows: 68,322, rate=85.57 regarded as too trivial to warrant such a
(1986); 69,767, rate=86.09 (1987); and report. The victim may not wish to become
72,368, rate=86.73 (1988)). involved in the consequence which may
In 1989, there were 1,032 cases of flow from the report, such as interrogation
rape reported to the police, at a rate of 1.20 by the police or being called as a witness.
per 100,000 populations. Attempts are not He may not wish to see proceedings brought
included. Date rape or the rape of a wife by against the offender because he is a child,
her husband is not a crime. (The number and relative, friend, or because he otherwise
rate of reported rapes per 100,000 deems the bringing of such proceeding
population for previous years are as follows: inappropriate for the conduct in question. He
1,238, rate=1.55 (1986); 1,116, rate=1.37 may wish to avoid publicity. He may be too
(1987); and 963, rate=1.15 (1988)). frightened to come forward. He may prefer
In 1989, there were 588 cases to administer a more homely or less drastic
involving drug offenses reported to the remedy (a beating or the sack). The offender
police, at a rate of .68 per 100,000 may simply be asked to pay for the goods or
populations. make restitution and be given a stem
The Nigerian police annual reports warning. This frequently happens in cases of
have no records of crimes according to shoplifting.
regions, states or cities. However, it is There may be no victims, since in
generally known in Nigeria that property some crimes, such as those connected with
crimes are perpetrated more in the Southern drugs, alcohol and obscene publications,
states than in the Northern states. This may society condemns behaviours which involve
be due to greater business activity in the no victim, unless the offender himself is so
South (Nigeria Annual Police Report, 1986 regarded (James N., 2010b).
1989). The police themselves are involved in
Although the police record of crime defining what is criminal in many ways and
is generally acclaimed as being closest to the the result is distortion in the crime figures as
criminal happenings, it is plagued by the reflected in their reports. For instance, there
following problems: are several reasons why the police may
The victim may not be aware that an decide that a matter reported to them as a
offence has been committed. This frequently crime should not be dealt with as such:
happens when employees are dishonest over They may decide that it is not a crime,
deliveries of goods, receiving money and but should be regarded in some other way
thefts by employees within the store or and dealt with accordingly. Thus, a reported

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE JULY 25-29, 2011
theft may be treated as lost property if the protects and supports Ohioans by ensuring
circumstances suggest that theft is unlikely. that adult felony offenders are effectively
An event such as a motor vehicle collision supervised in environments that are safe,
maybe regarded as an accident. Way ward humane, and appropriately secure. In
behaviour may be treated as evidence of a partnership with communities, it aims to
mental or social problem. promote citizen safety and victim reparation.
The police may decide that an offence Through rehabilitative and restorative
is not serious enough to warrant recording. It programming, it seeks to instill in offenders
is important to observe that in Nigeria with, an improved sense of responsibility and the
the high level of illiteracy amongst both the capacity to become law-abiding members of
public and the police and the high level of society.
corruption, it is not unlikely that it is only On September 18, 2008, the Euro-
very few cases that will ever get recorded. In pean Union (EU) Data Protection Supervisor
recent times, with the economic hardship the (EUDPS) adopted an opinion that agrees on
country is going through it is not uncommon the EU Council's proposal to establish an
for the police to complain about lack of electronic European Criminal Records
stationeries in cases which they may wish to Information System (ECRIS). ECRIS
record (James N., 2010c). would be a criminal record database
For crimes to be effectively controlled, available to Member States, and include
police stations, which presently lack a citizens' criminal convictions. Yet, the
records management system (RMS) to aid EUDPS warns on the importance on
their data capturing ability, should have a adopting the appropriate privacy and
RMS where reported crimes, where they supervisory measures to protect the EU
were committed, and involving who, citizens' rights.
amongst other information, will be recorded The ECRIS will be based on a de-
and stored regularly in a data base. The centralized information technology system
police dont have any crime records and consisting on three elements: (1) a
management system. They keep their criminal records database in the Member
records on paper and this doesnt help their States; (2) a common communication infra-
efficiency. The RMS will enable the police structure; and (3) interconnection software.
to have accurate statistics to draw analysis In addition to these elements, other
from, on information of a case, the year a issues are addressed by the ECRIS proposal
crime was committed, who investigated it, approved by the EUDPS. First, an
etc. (Peter N., 2010). operational manual will set the rules for the
exchange of information, including how the
2.0 REVIEW OF LITERATURE offenders will be identified, plus biometric
Over the decade, a lot of research information. Second, collection of statistical
work had been carried out and many data will be required to assess the efficiency
computer programs had been written in of the system and to supervise compliance
order to assist the police with information on with data protection laws. This statistical
criminals and crimes. One of such develop- data includes information such as number of
ment is the Ohio Department of Rehab- requests for access, length of the requests,
ilitation and Correction (www.drc.state.oh. updating process, quality of persons having
us) where the system (database) enables you access to the databases, and security
to search for people who have been breaches cases. Third, "coordination of
convicted in Ohio, and the information is supervision of data processing" is required.
usually about when a person is convicted, Data protection authorities must have
when the person was sentenced or fined, and available appropriate mechanisms to
when the person was released. Ohio coordinate data collection. The final point
Department of Rehabilitation and Correction addressed by ECRIS refers to the use of

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE JULY 25-29, 2011
automatic translations. Automatic trans- 2.1 Categories of individuals covered
lation systems will be carefully reviewed by the system:
and codified to assure accuracy. A. Wanted Persons
National Crime Information Center B. Individuals who have been
(NCIC) of Criminal Justice Information charged with serious and/or
Services (CJIS) Division, located at significant offenses:
Clarksburg, West Virginia USA, is a C. Missing Persons
computerized index of criminal justice D. Individuals designated by the
information (i.e. criminal record history U.S. Secret Service as posing a
information, fugitives, stolen properties and potential danger to the
missing persons). It is available to Federal, President and/or other
state, and local law enforcement and other authorized protectees.
criminal justice agencies and is operational E. Members of Violent Criminal
24 hours a day, 365 days a year. Gangs
Purpose: The purpose for maintaining the F. Members of Terrorist
NCIC system is to provide a computerized Organizations
database for ready access by a criminal G. Unidentified Persons
justice agency making an inquiry and for
prompt disclosure of information in the 2.2 Categories of records in the system
system from other criminal justice agencies A. Stolen Vehicle File
about crimes and criminals. This B. Stolen License Plate File.
information assists authorized agencies in C. Stolen Boat File.
criminal justice and related law enforcement D. Stolen Gun File
objectives, such as apprehending fugitives, E. Stolen Article File.
locating missing persons, locating and F. Securities File
returning stolen property, as well as in the G. Wanted Person File
protection of the law enforcement officers H. Foreign Fugitive File: Identifi-
encountering the individuals described in the cation data regarding persons
system. who are fugitives from foreign
Access Constraints: All records in NCIC countries.
are protected from unauthorized access Uses: Data in NCIC files is exchanged with
through appropriate administrative, physical, and for the official use of authorized
and technical safeguards. These safeguards officials of the Federal Government, the
include restricting access to those with a States, cities, penal and other institutions,
need to know to perform their official duties, and certain foreign governments. The data is
and using locks, alarm devices, passwords, exchanged through NCIC lines to Federal
and/or encrypting data communications. criminal justice agencies, criminal justice
Use Constraints: Users of the NCIC system agencies in the 50 States, the District of
will be restricted to only those privileges Columbia, Puerto Rico, U.S. Possessions
necessary to perform an authorized task(s). and U.S. Territories. Additionally, data
Agency Program: The FBI is authorized to contained in the various "want files," i.e.,
acquire, collect, classify and preserve the stolen vehicle file, stolen license plate
identification, criminal identification, crime, file, stolen gun file, stolen article file,
and other records and to exchange such wanted person file, securities file, boat file,
information with authorized entities. and missing person data may be accessed by
Sources of Data: Data contained in NCIC is the Royal Canadian Mounted Police.
provided by the FBI, federal, state, local and
foreign criminal justice agencies, and 3.0 MATERIALS/METHODS
authorized courts. The data used in the construction of
the database were obtained from the

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE JULY 25-29, 2011
Criminal Investigation Department (CID) of The system is a Database Manage-
the Nigeria Police at Gabasawa Division in ment System (DBMS) that will contain
Kaduna State. No mention of names were available records of criminals, and a
made of criminals either dead or live in the procedure that contains some query to the
discussions, except the use references such database so as to access some specific
as a certain Mr. X, or a certain Mr. Y, to records. It is imperative to state, only the
describe the activities and mode of system administrator has the right to modify
operations of some criminals that have (add, edit) records. He/She must also receive
records. Also no photographs or finger a high level clearance before he/she can
prints were shown to me, but the manual modify any record.
mode of capturing the finger prints on paper A DBMS is a system software pack-
was described to me. Therefore, provisions age that helps the use of integrated
were made in designing the CRIS to capture collection of data records and files known as
photographs and finger prints in the records databases. It allows different user applic-
of the criminals. ation programs to easily access the same
database (wikipedia).
3.1 Methodology Queries allow the user to describe
The methodology used is the desired data, leaving the DBMS responsible
Structured System and Design Metho- for planning, optimizing, and performing the
dology, since it is an acceptable software physical operations necessary to produce
engineering principle for the design of that result as it chooses.
software. A feasibility study of the manual A query includes a list of columns to be
method of accessing criminals record was included in the final result immediately
taken. Analysis was made to discover areas following the SELECT keyword. An
of weaknesses and the objectives of the asterisk ("*") can also be used to specify that
proposed system and its design was the query should return all columns of the
implemented. The manual method consisted queried tables. SELECT is the most
of: complex statement in Structured Query
asking the criminal if he/she had ever Language (SQL), with optional keywords
committed a crime before and clauses that include:
if yes, he/she is asked by the police, The FROM clause which indicates the
about the police he/she was taken to table(s) from which data is to be
the criminal is then asked if he/she retrieved. The FROM clause can include
was prosecuted in court, or was optional JOIN sub-clauses to specify the
released on bail at the police station rules for joining tables.
if the criminal was once booked in The WHERE clause includes a
the same police station, then a search comparison predicate, which restricts the
is made for the file, otherwise a new rows returned by the query. The
case is opened for the criminal. WHERE clause eliminates all rows from
the result set for which the comparison
3.3 Objectives predicate does not evaluate to True.
The main objective of CRIS is to The GROUP BY clause is used to
assist the Nigeria police in their bid to solve project rows having common values into
crimes with timely and useful information a smaller set of rows. GROUP BY is
about criminals and/or their mode of often used in conjunction with SQL
operations so as to nib in the bud criminal aggregation functions or to eliminate
activities in a given locality. duplicate rows from a result set. The
WHERE clause is applied before the
3.4 System design GROUP BY clause.
The HAVING clause includes a

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE JULY 25-29, 2011
predicate used to filter rows resulting 4.2 Results
from the GROUP BY clause. Because it The results showed that the process
acts on the results of the GROUP BY was automated and the sample forms
clause, aggregation functions can be showed the input and output for the CRIS.
used in the HAVING clause predicate.
The ORDER BY clause identifies which
columns are used to sort the resulting
data, and in which direction they should
be sorted (options are ascending or
descending). Without an ORDER BY
clause, the order of rows returned by an
SQL query is undefined. (wikipedia)

4.0 OPERATING SYSTEM AND


PROGRAMMING PLATFORM

Windows Vista, Microsoft SQL


Server and VB.NET programming langu- Fig 1. Welcome Screen
ages were used to implement the database
and the application package respectively.

4.1 Implementation
This refers to the development,
deployment (installation and testing) of all
the system components. This involves the Fig 2. Login Screen
transformation of ideas such as algorithms,
flowcharts, computer run chart,
programming language used, etc. into real
process flow of information. The system
operates as follows:
1. A welcome screen
2. Login screen (used to enter username
and password)
3. Select an option
(a) Criminals in a locality (location
has to be specified)
(b) Crime Type (e.g. burglary, car Fig 3. Options Dialog
snatching, rape, etc.)
(c) Criminals Record Search
(suspects Identification number
must be specified)
(d) Criminals Search by description
(gender, height, eye color, skin
color, etc.)
4. Click OK after the selection
5. The search procedure executes and
display the results found.
6. The police can now use the
information as is applicable.

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE JULY 25-29, 2011
Fig 8. Criminals mode of operation
Fig 4. List of Criminals in an area

Fig 5. Crime Type

Fig 6. Criminals Record Search


Fig 9. Information Form about a Criminal

5.0 DISCUSSION, CONCLUSION


AND RECOMMENDATIONS
5.1 Discussion
A database and a query embedded in
a procedure in VB.NET was used to develop
a CRIS that will help in issues relevant to
tackling National Security Challenges. The
results obtained from CRIS compares
favorably and efficiently with searches for
criminal records carried out by human under
Fig 7. Criminal Search by Description similar conditions. From the sample output
shown, this system can be used by the
Nigeria Police to handle problems of
investigation and crime control. A verdict
can be arrived at in good time if this
information is readily available.
5.2 Conclusion

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE JULY 25-29, 2011
The automated system that has been James. N. (2010b). Recording of Crime in
developed will facilitate the keeping of Nigeria: Problems and Prospects
records of criminals for future references. If retrieved on 23/05/2011 from
adopted, it will be difficult for criminals to http://dspace.unijos.edu.ng/bitstream
elude the authorities. And it will be easier /10485/187/1/22%20%20RECORDI
for the authorities to apprehend and convict NG%20OF%20CRIME%20IN%20N
criminals. This system if hosted on the IGERIA.pdf pp 9.
Internet and linked to PDAs (Personal James. N. (2010c). Recording of Crime in
Digital Assistants) or mobile phones of the Nigeria: Problems and Prospects
Nigeria Police personals, it will help in retrieved on 23/05/2011 from
addressing the challenges facing our http://dspace.unijos.edu.ng/bitstream
National Security as a nation. /10485/187/1/22%20%20RECORDI
NG%20OF%20CRIME%20IN%20N
5.3 Recommendations IGERIA.pdf pp 10-11.
The government should adopt the News Agency of Nigeria: Nigeria News
system and implement it for all the other Update, December 8, 1992.
government security agencies in Nigeria (i.e. Nigerian Police Annual Reports 1986-1989.
Military, Para-Military, and the Judiciary). Ohio Department of Rehabilitation and
This will go a long way in helping to Correction retrieved on 21/3/2011
combat crime in Nigeria. from http://www.drc.ohio.gov/
Where necessary, the government Peter N. (2010). Crime mapping for
should mandate the Nigeria Police to issue effective policing retrieved on
from time to time alerts and warnings 24/05/2011 from
regarding the movements or presence of http://www.gbooza.com/group/crime
some notorious criminals in the society. /forum/topics/crime-mapping-for-
effective#axzz1NGw1881w
6.0 REFERENCES Structured Query Language retrieved on
Criminal Records Ohio Information 15/03/2011 from http://en.wikipedia.
System retrieved on 10/02/2011 org/wiki/SQL
from The European Union will have a Criminal
http://society.ezinemark.com/criminal- Record Information System retrie-
records-ohio-information-system- ved on 20/03/2011 from http://www.
171e851d4ae.html ibls.com/internet_law_news_portal_
Criminal record system in Canada view.aspx?s=latestnews&id=2152.
retrieved on 12/02/2011 from
http://www.articlesbase.com/criminal-
articles/criminal-record-systems-in-
canada-1389193.html
Database management system retrieved on
13/03/2011 from
http://en.wikipedia.org/wiki/Databas
e_management_system
James. N., 2010a Recording of Crime in
Nigeria: Problems and Prospects
retrieved on 23/05/2011 from
http://dspace.unijos.edu.ng/bitstream
/10485/187/1/22%20%20RECORDI
NG%20OF%20CRIME%20IN%20N
IGERIA.pdf pp 5.

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE JULY 25-29, 2011

Vous aimerez peut-être aussi