Anda di halaman 1dari 11

ABSTRACT

This project work intends to automate the existing criminal records of the Nigeria

police using Enugu criminal investigating Department. The essence is to produce

durable criminal records and minimize avoidable lost of criminal records.

Structural database management system (DBMS) was used in its development in

other to eliminate redundancy in the compilation, its friendliness in responding to

the user exhibits and also its reliability and efficiency in tracking down criminals.

Another important feature of this system is that it provides the user with the

facilities for having the hard copies or print out of any relevant documents as well

as the facilities to communicate with the system.


CHAPTER ONE

1.0 INTRODUCTION

1.1 BACKGROUND OF THE STUDY

Man by nature is social, gregarious and cannot live in isolation. To maintain peace

and harmony in the society, man has to fashion out conduct and enact some laws to

govern the conduct of members of the society. When people appreciate these codes

of conduct and laws, protection of lives and properties are guaranteed.

Aneke (1987) said that the law, which man created employs various branches,

which can be summed up into civil and criminal law. Any individual who

conscientiously violates these laws becomes a crime suspect. A crime suspect

becomes a criminal after being convicted of the crime at the law court. This runs

contrary to an ordinary mans view that any individual who violates societys

established laws is a criminal. Thomas Aquinas wrote in the 13th century: "the rule

and measure of human acts is the reason, which is the first principle of human acts"

(Aquinas, ST I-II, Q.90, A.I). He regarded people as by nature rational beings,

concluding that it becomes morally appropriate that they should behave in a way

that conforms to their rational nature. Hart (1961) saw the law as an aspect of

sovereignty, with lawmakers able to adopt any law as a means to a moral end.
In Nigeria, following colonialism and the resultant capitalism, great importance is

attached to success and relatively less importance is attached to the accepted ways

of achieving success. In this arrangement most people reject the rules of the

games and purse situation where anything goes, norms no longer direct the

behaviour of Nigerians as their reaction is shaped by their position in the social

structure. This breeds criminality in our society as said by Dandison, (1988).

The rich and the well-placed do their own thing via white- collar crime thus graft,

bribery, pen-robbery are all raised to a level of act. While the poor and the

impoverished who could not accept their situation in life and feeling that there is

no legitimate means of social mobility open to them often resort to violent crimes.

The aftermath of the civil unrest and the Nigerian Biafran war cannot be left out.

During the war, individuals were exposed to the use of guns and other

sophisticated weapon. Many started trading on their ability to operate guns to earn

a living. Indeed, a living in disguised.

The ravages of war and political instability have also brought increased crime rate,

untold atrocities, corruption, violence and ethnic strifes. Nigeria has continued to

experience all kinds of crime ranging from capital crimes to simple offences,

which are punishable by law. This fact has reached international acclamation. No
wonder, the ex-president of the United States Bill Clinton extends Drug

Certification to Nigeria on 02/03/2000. In the statement of explanation, Nigeria

was said to have remained the hub of African drug trafficking.

To salvage the image of the country, computers can be used to develop hi-tech

criminal tracking information system that will effectively store criminal

information which can be used to track down identified crime suspects. Such hi-

tech criminal tracking system uses the powers of computers, software engineering

technology and the network technology to function effectively.

To achieve this via the use of computer, a central repository for criminal

information storage can be created and made domicile at the hard disk of a server

computer at the headquarters of security agencies. Then, other computers at

different security agencies can then be connected to this central repository

computer to enable local computers to post and retrieve criminal information.

Connectivity between the central repository computer and the remote (local)

computer is made possible via network topologies. These remote computers at

local or branch security agencies create a local database system which is linked to

the database of the central repository computer via an open database connectivity
technology (ODBC) which enables such local computers to post and access

information using search engines.

The features of relational database management system software provide database

structures that could store numerous information and at the same tie provide

connectivity between database structures.

Criminal Tracking System, which this project work covers, is one of such hi-tech

system that enables security agencies to communicate and share data globally.

1.2 STATEMENT OF PROBLEM

The Enugu State criminal identification Division, which is used as a case study,

has an existing criminal Tracking System, but this system is not automated. The

documentation of criminal records is done on paper and pen. The storage of these

criminal records is not something to write home about.

Case files are dumped in heaps while some are kept on shelves. With the moldy

nature of the state such important documents quickly get dusty and because of lack

of proper storage, some criminal documents are seriously damaged by rats that
feed on them. With this kind of situation, it becomes highly difficult if not

impossible to track down known criminal, access past criminal history of a suspect

and know the status of some concluded cases.

The Enugu State Criminal Identification division takes fingerprint of suspect and

certain individuals contemplating to travel outside the country to the central

Criminal Registry at Alagbo in Lagos State for confirmation of past criminal

records and for documentation too. Such frequent journey puts the life of police

officers in charge at risk knowing that death through accident is inevitable. It also

leads to delay in crime investigation and provides room falsification and

manipulation of results.

1.3 PURPOSE OF THE STUDY

The project intends to automate the existing Criminal Tracking System at the

Enugu State Criminal Division. Specifically, the project will accomplish the

following:

1) Design and develop a central database system that would serve as

statewide repository of criminal data. The smaller database system at the

sub-police station will be hooked up to the central database to access

criminal data on cases not handled at the local station. This database
system will be serviced by local police station within the state as well as

the police headquarters.

2) The central database system will be resident on a server at the police

headquarter and will be linked to both the local police station and the

Central Criminal Registry via a client- server between station as well as

Criminal Justice, the rendering of Criminal Justice. This will also

facilitate the confirmation of fingerprint right there in the office through

the click of the mouse

3) The database system will capture detailed information about crime

suspect right from the time the crime was reported at the police down to

the point the suspect appears before the court for prosecution as

thereafter.

4) The systems will posses features that will enable criminal data to be

purged from the system, updated and queried.

1.4 JUSTIFICATION OF THE STUDY


The development and implementation of a software-based Criminal Tracking

Information System is realistic.

The traditional filling system of documenting criminal records on paper and having

such documents store in shelves or in piles is highly in secured and does not make

such rewards durable.

The effect is that in time to come, past criminal records cannot be called up as an

alicotus (i.e. Criminal evidence) during court proceeding to enable panel of

judges pin down a suspect or a criminal of having committed some criminal acts in

the past. Such past criminal records enable the court of law to know the strength of

punishment to be melted out to such a criminal.

So, lack of preservation and good sorting techniques of criminal records at security

agencies, often times makes it difficult for past criminal records to be traced.

The on-line criminal Tracking System (OCTS) will arrest and address the

aforementioned problems.

The traditional filling system is not well secured and criminal records are not

properly documented. This situation makes it easier for unscrupulous individual, to

sneak out case files or get them burnt thereby bringing the proceedings of a case to

a halt.
The powerful features and capabilities of Microsoft Access 97 will be used to

develop and implement the database structure of system. Microsoft Access being a

relational database management system provides an application development

environment and the needed capabilities to build a complex database. As such is

fitted for this project. Again, Ms-Access support the Open Database Connectivity

(ODBC), which provides communication links between databases.

Visual Basic for Application will be used to design and implement the online

forms that will be used to post data to the database system and report for retrieval

of information from the database system.

1.5 SCOPE OF THE STUDY

Basically any Criminal Tracking System as an integral part of the Criminal Justice

Information System consists of three major sections, that is:

a) Thee Criminal Identification Division

b) The Magistrate Segment, and

c) The prisons.

However, because of lack of time, funding and the scope of the system, the project

was limited to the development and implementation of software base criminal


tracking information system that will automate the processes involved in tracking

down criminals by the State Criminal Identification Divisions.

The project did not cover the Prison and the Magistrate Segment, which could also

be automated. Although the researcher used the Criminal Identification Division of

Enugu police headquarter as a case study, the project is a generic software that can

be customized for use by other state security agencies.

1.6 CONSTRAINTS OF THE STUDY

Some of the constraints encountered during this project design include the

following:

Financial Constraints: The design was achieved but not without some

financial involvements. One had to pay for the computer time. Also the

typing and planning of the work has its own financial involvements.

However, to solve the problems I solicited fund from guardians and

relations.

High level programming Technique: The programming aspect of this

project posed a lot of problematic bugs that took me some days to solve.

Problems such as the ADO, DAO and Jet Engine related run time errors. For

instance, the Ms Access office 2000 edition does not work with VB-6. Jet
Engine unless converted to lower version of Ms ACCESS of office 1997

edition (i.e. version 2.0). Also other technical problem, which requires

semantic and syntactic approaches where encountered as well. In seeking for

the solution to these problems, I acquired more knowledge from well

versed textbooks and programmes.

Few Literature Sources: The topic though seems to be a common term; it

is not a popular topic to surf from the Internet. It had fewer literature

sources. To solve this problem, I applied for the study of the existing

criminal tracking system of the Enugu State Criminal Identification

Division. The application was improved and the study was conducted for

three weeks.

The epileptic nature of power supply cannot be overlooked.

Anda mungkin juga menyukai