You are on page 1of 74

CHAPTER ONE

INTRODUCTION
1.1

Background Study

Man by nature is social, gregarious and cannot live in isolation. To maintain


peace and harmony in the society, man has to fashion out conduct and
some laws to govern the conduct of members of the society. When
people appreciate

these

codes

of

conduct

and

laws,

protection

of

lives and properties are guaranteed. Generally tracking is the observing of


persons or objects on the move and supplying a timely ordered sequence
of respective location data to a model e.g. capable to serve for depicting the
motion on a display capability.
The traditional and age-old system of intelligence and criminal record
maintenance has failed to live up to the requirements of the existing crime
scenario.

Manual

processes

neither

provide

accurate,

reliable

and

comprehensive data round the clock nor does it help in trend prediction and
decision support. It also results in lower productivity and ineffective
utilization of manpower. The solution to this ever-increasing problem lies in
the effective use of Information Technology. Crime Information System
uses computer-generated records as an interface for integrating and
accessing massive amounts of location-based information.
Crime system allows EFCC personnel to plan effectively for emergency
response, determine mitigation priorities, analyses historical events, and
1

predict future events. Crime tracking system helps identify potential


suspects to increase investigators suspect base when no leads are evident.
The ability to access and process information quickly while displaying
it in a spatial and visual medium allows agencies to allocate resources
quickly

and

enforcement,

more

effectively.

information

about

In

the
the

mission-critical
location

of

nature
crime,

of law
incident,

suspect, or victim is often crucial to determine the manner and size of the
response. Crime information software helps co-ordinate vast amounts
of location-based data from multiple sources. It enables the user to layer
the data and view the data most critical to the particular issue or mission. It
is used by EFCC departments, both large and small, to provide solutions for
crime

analysis,

criminal

tracking,

traffic

safety, community policing,

Intranet/Internet mapping, and numerous other tasks. Crime information


system helps crime officers determine potential crime sites by examining
complex seemingly unrelated criteria and displaying them all in

an

interface. It also helps them map inmate populations, fixtures, and


equipment to provide for the safety of inmates by separating gang
members, identifying

high-risk

or

potentially

violent

inmates,

and

identifying hazardous locations in an area. It reduces the potential for


internal violence by providing better command and control. Traditionally,
these activities have been supported by paper and pen. Crime officers now
have the ability to immediately generate crime report directly relevant to
the situation at hand. EFCC agencies collect vast amounts of data from
2

many

sources including

reports

and

called-for-services,

arrests,

first

information

daily report. The same information provides a powerful

decision making tool for investigators, supervisors, and administrators.


1.2

Aims and objectives of the work

The project intends to computerize the existing Crime information System at


the EFCC. Specifically, the project will accomplish the following:
1) Design and develop a central database system that would serve as
state wide repository of criminal data. The smaller database system at
the sub-station will be networked to the central database to access
criminal data on cases not handled at the local station. This
database system will be updated by local EFCC office within the state
as well as the headquarters. (acting as a criminal data collection
centers)
2) The central database system will be resident on a server at the
EFCC headquarter and will be linked to both the local EFCC
station and the Central Criminal Registry via a client- server
between station as well as Criminal Justice, the rendering of
Criminal Justice.

3) The database system will capture detailed information about crime


suspect right from the time the crime was reported at the E F C C
down to the point the suspect appears before the court for
3

prosecution as thereafter.

4) The systems will possess features that will enable criminal data to be
purged from the system, updated and queried.
1.3 Significance of the work
a. It exposes the student to different forms of security measures taking
clear detail on how to track a crime case and save the information on
a database for future recommendations
b. Information systems gain their importance by processing the data
from organization inputs to generate information that is useful for
1.4

managing your operations.


Scope of the project

Basically any Crime information System as an integral part of the Criminal


Justice Information System consists of three major sections, that is:

a) The Criminal Identification Division


b) The Magistrate Segment, and
c) The prisons.

However, because of lack of time, funding and the scope of the system, the
project was limited to the development and implementation of software
based crime information system for EFCC that will automate the processes
involved in tracking down criminals by EFCC.

1.5

System block diagram

1.6

Project report organization

The project is organized as follows;Chapter one introduces the project; the background of the project is also
discussed. The objectives of the project, its significance, scope, and
constraints are pointed out.

A brief history of the EFCC and review of literature on Crime information


System are subject matter of Chapter two. Chapter three discusses system
Analysis and design. It deals with detailed investigation and analysis of the
existing system and problem identification. Chapter four covers
design

and

system

specification

Chapter

five

covers

software

the

system

implementation, testing and integration


Chapter six was the summary of findings, limitations of the project,
recommendations,

bill

of

engineering

measurement

and

evaluation

conclusion, bibliography, appendix A and Appendix B of the project.

CHAPTER TWO
LITERATURE REVIEW
2.1 Brief History of the EFCC
The Economic and Financial Crimes Commission (EFCC) is a Nigerian
law enforcement agency that investigates financial crimes such as advance
fee fraud (419 fraud) and money laundering. The EFCC was established in
2003, partially in response to pressure from the Financial Action Task Force
on Money Laundering (FATF), which named Nigeria as one of 23 countries
non-cooperative in the international community's efforts to fight money
laundering. The agency has its head office in Abuja .The preponderance of
economic and financial crimes like Advance Fee Fraud 419 , Money
Laundering, etc has had severe negative consequences on Nigeria, including
decreased Foreign Direct Investments in the country and tainting of Nigerias
national image. The menace of these crimes and the recognition of the
magnitude and gravity of the situation led to the establishment of the
Economic and Financial Crimes Commission (EFCC). The legal instrument
7

backing the Commission is the attached EFCC (Establishment) Act 2002 and
the Commission has high-Ievel support from the Presidency, the Legislature
and key security and law enforcement agencies in Nigeria. The Commission
is empowered to prevent, investigate, prosecute and penalise economic and
financial crimes and is charged with the responsibility of enforcing the
provisions of other laws and regulations relating to economic and financial
crimes.
Function
Responsibility: The Commission shall be responsible fora. The enforcement and the due administration of the provisions of this
Act
b. The investigation of all financial crimes including advance fee fraud,
money laundering, counterfeiting, illegal charge transfers, futures
market fraud, fraudulent encashment of negotiable instruments,
computer credit card fraud, contract scam, etc.
c. The co-ordination and enforcement of all economic and financial
crimes laws and enforcement functions conferred on any other person
or authority.
d. The adoption of measures to identify, trace, freeze, confiscate or seize
proceeds derived from terrorist activities, economic and financial
crimes related offences or the properties the value of which
corresponds to such proceed
e. The adoption of measures to eradicate the commission of economic
and financial crimes
8

f. The adoption of measures which includes coordinated preventive and


regulatory actions, introduction and maintenance of investigative and
control techniques on the prevention of economic and financial related
crimes
g. The facilitation of rapid exchange of scientific and technical information
and the conduct of joint operations geared towards the eradication of
economic and financial crimes
h. The examination and investigation of all reported cases of economic
and financial crimes with a view to identifying individuals, corporate
bodies or groups involve
i. The determination of the extent of financial loss and such other losses
by government, private individuals or organizations
j. Collaborating with government bodies both within and outside Nigeria
carrying on functions wholly or in part analogous with those of the
I.

Commission concerningThe identification, determination, of the whereabouts and activities of

II.

persons suspected of being involved in economic and financial crimes,


The movement of proceeds or properties derived from the commission

III.
IV.

of economic and financial and other related crimes


The exchange of personnel or other experts,
The establishment and maintenance of a system for monitoring
international economic and financial crimes in order to identify

V.

suspicious transactions and persons involved


Maintaining data, statistics, records and

reports

on

person,

organizations, proceeds, properties, documents or other items or


VI.

assets involved in economic and financial crimes


Undertaking research and similar works with a view to determining the
manifestation, extent, magnitude, and effects of economic and
9

financial crimes and advising government on appropriate intervention


measures for combating same
k. Dealing with matters connected with the extradition, deportation and
mutual legal or other assistance between Nigeria and any other
country involving Economic and Financial Crimes
l. The collection of all reports relating suspicious financial transactions,
analyze and disseminate to all relevant Government agency
m. Taking charge of, supervising, controlling, coordinating
responsibilities,

functions

and

activities

relating

to

the

all

the

current

investigation and prosecution of all offenses connected with or relating


to economic and financial crimes
n. The coordination of all existing economic and financial crimes,
investigating units in Nigeria
o. Maintaining a liaison with office of the Attorney-General of the
Federation, the Nigerian Customs Service, the Immigration and Prison
Service Board, the Central Bank of Nigeria, the Nigeria Deposit
Insurance Corporation, the National Drug Law Enforcement Agency, all
government security and law enforcement agencies and such other
financial supervisory institutions in the eradication of economic and
financial crimes
p. Carrying out and sustaining rigorous public and enlightenment
campaign against economic and financial crimes within and outside
Nigeria and
q. Carrying out such other activities as are necessary or expedient for the
full discharge of all or any of the functions conferred on it under this
Act.

10

Power
The Commission has power toa. Cause investigations to be conducted as to whether any person,
corporate body or organization has committed any offence under this
Act or other law relating to economic and financial crimes
b. Cause investigations to be conducted into the properties of any person
if it appears to the commission that the persons lifestyle and extent of
the properties are not justified by his source of income.
ORGANIZATIONAL STRUCTURE OF NIGERIAN EFCC
The organizational structure of Nigeria EFCC which is shows the various
departments the EFCC in Nigeria has starting from the rank of the
inspector general of EFCC down to the rank of the divisional EFCC
command and also their various zone which in total is nine zones.
2.2 Review of Natural-law theory
Justifying the State's use of force to coerce compliance with its laws has
proven a consistent theoretical problem. One of the earliest justifications
involved the theory of natural law. This posits that the nature of the world or
of human beings underlies the standards of morality or constructs them.
Thomas Aquinas wrote in the 13th century: "the rule and measure of human
acts is the reason, which is the first principle of human acts" (Aquinas, ST III, Q.90, A.I). He regarded people as by nature rational beings, concluding
that it becomes morally appropriate that they should behave in a way that
11

conforms to their rational nature. Thus, to be valid, any law must conform to
natural law and coercing people to conform to that law is morally
acceptable. In the 1760s William Blackstone (1979) described the thesis:
"This law of nature, being co-eval with mankind and dictated by God
himself, is of course superior in obligation to any other. It is binding over all
the globe, in all countries, and at all times: no human laws are of any
validity, if contrary to this; and such of them as are valid derive all their
force, and all their authority, mediately or immediately, from this original."
But John Austin (1790), an early positivist, applied utilitarianism in
accepting the calculating nature of human beings and the existence of an
objective morality. He denied that the legal validity of a norm depends on
whether its content conforms to morality. Thus in Austinian terms a moral
code can objectively determine what people ought to do, the law can
embody whatever norms the legislature decrees to achieve social utility, but
every individual remains free to choose what he or she will do.
Similarly, Hart (1961) saw the law as an aspect of sovereignty, with
lawmakers able to adopt any law as a means to a moral end. Thus the
necessary and sufficient conditions for the truth of a proposition of law
simply involved internal logic and consistency, and that the state's
agents used state power with responsibility. Ronald Dworkin (2005) rejects
Hart's theory and proposes that all individuals should expect the equal
respect and concern of those who govern them as a fundamental political
right. He offers a theory of compliance overlaid by a theory of deference
12

(the citizen's duty to obey the law) and a theory of enforcement, which
identifies the legitimate goals of enforcement and punishment. Legislation
must conform to a theory of legitimacy, which describes the circumstances
under which a particular person or group is entitled to make law, and a
theory of legislative justice, which describes the law they are entitled or
obliged to make. Indeed, despite everything, the majority of natural-law
theorists have accepted the idea of enforcing the prevailing morality as a
primary function of the law. This view entails the problem that it makes any
moral criticism of the law impossible: if conformity with natural law forms
a necessary condition for legal validity, all valid law must, by definition,
count as morally just. Thus, on this line of reasoning, the legal validity of
a norm necessarily entails its moral justice. One can solve this problem by
granting some degree of moral relativism and accepting that norms may
evolve

over

time

and,

therefore,

one

can

criticize

the

continued

enforcement of old laws in the light of the current norms. People may
find such law acceptable, but the use of State power to coerce citizens to
comply with that law lacks moral justification. More recent conceptions
of the theory characterize crime as the violation of individual rights.
Since society considers so many rights as natural (hence the term
"right") rather than man-made, what constitutes a crime also counts as
natural, in contrast to laws (seen as man-made). Adam Smith illustrates
this view, saying that a smuggler would be an excellent citizen, "...had not
the laws of his country made that a crime which nature never meant to be
13

so." Natural-law

theory

therefore

distinguishes

between

"criminality"

(which derives from human nature) and "illegality" (which originates


with the interests of those in power). Lawyers sometimes express the two
concepts with

the

phrases

malum

in

se

and

malum

prohibitum

respectively. They regard a "crime malum in se" as inherently criminal;


whereas

"crime malum prohibitum" (the argument goes) counts as

criminal only because the law has decreed it so.


This view leads to a seeming paradox: one can perform an
illegal act without committing a crime, while a criminal act could be
perfectly legal. Many Enlightenment thinkers (such as Adam Smith and
the American Founding Fathers) subscribed to this view to some extent,
and it remains infuential among so-called classical liberals and libertarians
2.3 Review of Crime History
Some Religious communities regard sin as a crime; some may even
highlight the crime of sin very early in legendary or mythological accounts
of origins note the tale of Adam and Eve and the theory of original sin.
What one group considers a crime may cause or ignite war or conflict.
However, the earliest known civilizations had codes of law, containing both
civil and penal rules mixed together, though not always in recorded form.
The Sumerians produced the earliest surviving written codes, Oppenheim
(1964). Urukagina (reigned c .2380 BC2360 BC, short chronology) had an
early code that has not survived; a later king, Ur-Nammu, left the earliest
extant written law-system, the Code of Ur-Nammu (c .2100-2050 BC),
14

which prescribed a formal system of penalties for specific cases in 57


articles. The Sumerians later issued other codes, including the "code of
Lipit-Ishtar". This code, from the 20th century BCE, contains some fifty
articles, and scholars have reconstructed it by comparing several sources.
The Sumerian was deeply conscious of his personal rights and resented any
encroachment on them, whether by his King, his superior, or his equal. No
wonder that the Sumerians were the first to compile laws and law codes.
Kramer (1971) Successive legal codes in Babylon, including the code of
Hammurabi (c. 1790 BC), reflected Mesopotamian society's belief that law
derived from the will of the gods, Skaist (1994). Many states at this time
functioned as theocracies, with codes of conduct largely religious in origin
or reference.
Sir Henry Maine (1861) studied the ancient codes available in his day, and
failed to find any criminal law in the "modern" sense of the word. While
modern systems distinguish between offences against the "State" or
"Community", and offences against the "Individual", the so-called penal law
of ancient communities did not deal with "crimes" (Latin: crimina), but with
"wrongs" (Latin: delicta). Thus the Hellenic laws, Garner: 1987 treated all
forms of theft, assault, rape, and murder as private wrongs, and left action
for enforcement up to the victims or their survivors. The earliest systems
seem to have lacked formal courts.
The Romans systematized law and applied their system across the Roman
Empire. Again, the initial rules of Roman law regarded assaults as a matter
15

of private compensation. The most significant Roman law concept involved


dominion, Daube: (1969). The pater families owned all the family and its
property

(including

slaves);

the

pater

enforced

matters

involving

interference with any property. The Commentaries of Gaius (written


between 130 and 180 AD) on the Twelve Tables treated furtum (in modern
parlance: "theft") as a tort.
Similarly, assault and violent robbery involved trespass as to the pater's
property (so, for example, the rape of a slave could become the subject of
compensation to the pater as having trespassed on his "property"), and
breach of such laws created a vinculum juris (an obligation of law) that only
the

payment

of

monetary

compensation

(modern

"damages")

could

discharge. Similarly, the consolidated Teutonic laws of the Germanic tribes,


Guterman: (1990) included a complex system of monetary compensations
for what courts would now consider the complete range of criminal offences
against the person, from murder down. Even though Rome abandoned its
Britannic provinces around 400 AD, the Germanic mercenaries who had
largely become instrumental in enforcing Roman rule in Britannia

acquired ownership of land there and continued to use a mixture of


Roman and Teutonic Law, with much written down under the early AngloSaxon Kings, Attenborough: (1963). But only when a more
English

monarchy

emerged

following

the

centralized

Norman invasion, and when

the kings of England attempted to assert power over the land and its
peoples, did the modern concept emerge, namely of a crime not only as an
16

offence against the "individual", but also as a wrong against the "State",
Pennington: 1993.
This idea came from common law, and the earliest conception of a
criminal act involved events of such major significance that the "State" had
to usurp the usual functions of the civil tribunals, and direct a special
law or privilegium against the perpetrator. All the earliest English criminal
trials involved wholly extraordinary and arbitrary courts without any settled
law to apply, whereas the civil (delictual) law operated in a highly
developed and consistent manner (except where a King wanted to raise
money by selling a new form of writ). The development of the idea that
the "State" dispenses justice in a court only emerges in parallel with
or after the emergence of the concept of sovereignty.
In continental Europe, Roman law persisted, but with a stronger influence
from the Christian Church, Vinogradoff (1909). Coupled with the more
diffuse political structure based on smaller feudal units, various different
legal traditions emerged, remaining more strongly rooted in Roman
jurisprudence, but modified to meet the prevailing political climate.
In Scandinavia the effect of Roman law did not become apparent until the
17th century, and the courts grew out of the things the assemblies of the
people. The people decided the cases (usually with largest freeholders
dominating). This system later gradually developed into a system with a
royal judge nominating a number of the most esteemed men of the parish
as his board, fulfilling the function of "the people" of yore. From the Hellenic
17

system

onwards,

the

policy

rationale

for

requiring

the payment of

monetary compensation for wrongs committed has involved the avoidance


of feuding between clans and families. If compensation could mollify
families' feelings, this would help to keep the peace. On the other hand,
the institution of oaths also played down the threat of feudal warfare. Both
in archaic Greece and in medieval Scandinavia, an accused person
walked free if he could get a sufficient number of male relatives to swear
him unguilty. (Compare the United Nations Security Council, in which the
veto power of the permanent members ensures that the organization
does not become involved in crises where it could not enforce its decisions.)
These means of restraining private feuds did not always work, and
sometimes prevented the fulfillment of justice. But in the earliest times the
"state" did not always provide an independent policing force. Thus criminal
law grew out what 21st-century lawyers would call torts; and, in real terms,
many acts and omissions classified as crimes actually overlap with civil-law
concepts.
The development of sociological thought from the 19th century onwards
prompted some fresh views on crime and criminality, and fostered the
beginnings of criminology as a study of crime in society. Nietzsche noted a
link between crime and creativity in The Birth of Tragedy he asserted:
"The best and brightest that man can acquire he must obtain by crime". In
the 20th century Michel Foucault in Discipline and Punish made a study of
criminalization as a coercive method of state control.
18

2.4 Crime Systems


According to the Oxford Dictionary, a crime system detects someone or
something by tracking the marks, signs or information left behind. It could
be an electronic gadget or a software that uses previous information fed to it
to say the state of a particular matter.
According to Professors Inyiama write-up Artificial Intelligence (2003),
expert systems that are forms of information systems use either a
knowledge base or a database structures as brain box. The knowledge
base or the database structures of tracking system stores and records
information about the progress or development of a particular event and
these information captured can be accessed in the course of time According
to a lecture material presented by CPL 56T LAZARUS. U. UME (1990) to
the EFCC College, a crime is defined as a wrong doing which affects the
interest

of

the

community

as

whole

and

which

the offender is

punished. Some of these offences according to him range from simple


offences,

indictable

offence,

felony,

misdemeanor,

EFCC

needs

information in other to combat crime. It is the duty of the EFCC to bring


such offender to book. Through the statement of offence, an accused is
charged in a trial before a court.
According to SIR Robert MARK (1982), in his book titled policing a
perplex society states that politicians makes laws, EFCC enforce them,
Lawyers man the trial and prison deals with convicted offenders. According
19

to Professor TAMUNO T.M. (204) in his book titled EFCC in modern Nigeria,
stated that crime Act section 24 authorizes any E F C C officer and any
person whom he may call to assist in arrest with or without warrant in the
following cases. Any person found committing any simple offences, felony,
misdemeanor, or whom he reasonably suspects of having committed or
about to commit any felony, misdemeanor, breach of peace. The above also
stated that section 10,26,27, 28 and 30 of the criminal procedure code
authorities states that any officer has the power to arrest with or without
order from the magistrate, power to serve summons, power to release
suspects on bail, power to take finger prints etc.

CHAPTER THREE
SYSTEM DESIGN AND METHODOLOGY
3.1 Meaning of methodology
20

Methodology is the study of how to perform scientific research. It is the


part of any analysis or research that is used to find to find out about the type
of data that is to be maintained, how it is found and how it is recorded. To
achieve these SSADM was used which means structured system analysis
and design methodology which is an internationally accepted software
engineering model mainly used in most result oriented analysis. With this
structured

system

analysis

and

design

methodology

which

is

an

internationally accepted software engineering model, I was able to achieve a


wonderful and a successful software design and database design which was
one of my main purpose of embarking on this project.

According to Bennett (2002) defined methodology as a set of general


principles that guide a practitioner or manager to the choice of the particular
method suited to a specific task or project. According to Whitten (2001)
maintained that a system development methodology is a very formal and
precise system development process that defines a set of activities, method,
best practices, deliverables and automated tools for system developers and
project managers used in developing and maintaining most or all information
systems and software. There are different kinds of system development
methodology such as build and fixed model, Spiral Model, Waterfall, Object
Oriented, Top-down, bottom-up, Stepwise Refinement etc.

In view of this

build and fixed model is the one of the worst model for project development
because the project is built without specification and lacks design steps.
Spiral model is one of the software development processes which combine
the design and prototyping in stages together to gain the advantage of top
down

and

bottom-up

approaches

(Barry,

1986).

Rapid

prototyping

determines and identify the design faws and obtaining feedback during
process (Frederick, 1975). Waterfall model: This is a software development
process which follows a sequential approach. This approach steadily fows
downwards like a waterfall which includes the phase of conception, initiation,
21

analysis and design (Winston, 1970). But for this project work, waterfall
model is adopted because it is simple and easy to understand, use and work
well for smaller projects where requirements are very well understood,
secondly, each phase has specific deliverables and a review process and
completed one at a time.
System design methods are a discipline within the software development
industry which seeks to provide a framework for activity and the capture,
storage, transformation and dissemination of information so as to enable the
development of computer systems that are fit for purpose.

3.2 Types of methodology


Waterfall Model
Waterfall approach was first Process Model to be introduced and followed
widely in Software Engineering to ensure success of the project. In "The
Waterfall" approach, the whole process of software development is divided
into

separate

process

phases.

The

phases

in

Waterfall

model

are:

Requirement Specifications phase, Software Design, Implementation and


Testing & Maintenance. All these phases are cascaded to each other so that
second phase is started as and when defined set of goals are achieved for
first phase and it is signed off, so the name "Waterfall Model". All the
methods and processes undertaken in Waterfall Model are more visible.

3.1.1 Waterfall Model


Waterfall approach was first Process Model to be introduced and followed
widely in Software Engineering to ensure success of the project. In "The
Waterfall" approach, the whole process of software development is divided
into

separate

process

phases.

The
22

phases

in

Waterfall

model

are:

Requirement Specifications phase, Software Design, Implementation and


Testing & Maintenance. All these phases are cascaded to each other so that
second phase is started as and when defined set of goals are achieved for
first phase and it is signed off, so the name "Waterfall Model". All the
methods and processes undertaken in Waterfall Model are more visible.

Requirement gathering/analysis

System design

Implementation

Testing
System deployment
Maintenance

Fig 3.1: diagrammatic representation of the waterfall model


The stages of "The Waterfall Model" are:
a) Requirement Analysis & Definition:
All possible requirements of the system to be developed are captured in this
phase. Requirements are set of functionalities and constraints that the enduser (who will be using the system) expects from the system. The
requirements are gathered from the end-user by consultation, these
requirements

are

analyzed

for

their

validity

and

the

possibility

of

incorporating the requirements in the system to be development is also

23

studied. Finally, a Requirement Specification document is created which


serves the purpose of guideline for the next phase of the model.

b) System & Software Design:


Before a starting for actual coding, it is highly important to understand what
we are going to create and what it should look like? The requirement
specifications from first phase are studied in this phase and system design is
prepared.

System

Design

helps

in

specifying

hardware

and

system

requirements and also helps in defining overall system architecture. The


system design specifications serve as input for the next phase of the model.

c) Implementation:
On receiving system design documents, the works divided in modules/units
and actual coding is started. The system is first developed in small programs
called units.

d) Unit Testing:
After the system has been developed in small programs called units, which
are integrated in the next phase. Each unit is tested for its functionality; this
is referred to as Unit Testing. Unit testing mainly verifies if the modules/units
meet their specifications.

e) Integration & System Testing:


As specified above, the system is first divided in units which are developed
and tested for their functionalities. These units are integrated into a
complete system during Integration phase and tested to check if all
modules/units coordinate between each other and the system as a whole
24

behaves as per the specifications. After successfully testing the software, it is


delivered to the customer.

25

f) Operations & Maintenance:


This phase of "The Waterfall Model" is virtually never ending phase (Very
long). Generally, problems with the system developed (which are not found
during the development life cycle) come up after its practical use starts, so
the issues related to the system are solved after deployment of the system.
Not all the problems come in picture directly but they arise time to time and
needs to be solved; hence this process is referred as Maintenance.

Advantages and Disadvantages of Waterfall Model


Advantages
The

advantage

of

waterfall

development

is

that

it

allows

for

departmentalization and managerial control. A schedule can be set with


deadlines for each stage of development and a product can proceed through
the development process like a car in a carwash, and theoretically, be
delivered on time. Development moves from concept, through design,
implementation, testing, installation, troubleshooting, and ends up at
operation and maintenance. Each phase of development proceeds in strict
order, without any overlapping or iterative steps.

Disadvantages
The disadvantage of waterfall development is that it does not allow for much
refection or revision. Once an application is in the testing stage, it is very
difficult to go back and change something that was not well-thought out in
the concept stage. Alternatives to the waterfall model include joint
application development (JAD), rapid application development (RAD), synch
and stabilize, build and fix, and the spiral model.

26

3.2 Research Methodology


In order to achieve the goal and objective of this project, the methodology of
this research is summarized under the following headings;
a. Method of data collection
b. The technical perspective
Data Collection
Data collection can be defined as any collection of data either by interview
method or by reference to written text which enables the software developer
to have the necessary information required in the development of a
particular software and also to enable him update his database. The data
may be in the form of text, numbers, or encoded graphics. The method of
data collection used for the success of this project.

3.2.1 Method of Data Collection

a Interview Method
b Reference to written text
a) Interview Method
This was done between the researcher and some of the officers of the
EFCC. Information on criminal charges and trial was gathered.

b) Reference to Written Text


Reference was also made to some existing documents and case files in the
EFCC. Some materials were also downloaded from internet for the purpose
of reviewing the work.
27

Input Analysis
The various system inputs include the following input systems.
i Witness /Suspect Statement
ii Case File and
iii

Crime Diary

28

i) Witness / Suspect Statement Input System

Statement Form Format

THE

STATEMENT OF WITNESS / SUSPECT

STATION
---------------------------------------PROVIN
CE
---------------------------------------NAME -----------------------------------NATIONALITY

/TRIBE

-----------------------AGE
----------------------------------------------OC
CUPATION
----------------------------------RELIGION
----------------------------------------ADDRE
SS ----------------------------------------

The investigating officer now reads the cautionary word


thus In the case of accused person the form caution
will be given and the

fact

recorded

here is

manuscripts I.. Male / female having


been duly cautioned in.. language that I
am not obliged to say anything wish to do so what ever
I say shall be taken down in writing and may be given in
evidence.

Voluntarily

elect

29

to

state

as

follows

Fig 3.2 a sample of Witness/Suspect form

The sample of Witness/Suspect form in fig 3.1 is used to capture


witness, complainant and suspect statement in Nigeria EFCC.
ii) Case file Input system
Immediately a criminal in convicted, a case file is open for the criminal. A
case file input system documents the following: i. An extract form the crime diary i.e. the fact of the case the
complain lodge
ii. The statement of (witnesses)
iii. The statement of the suspect or accused.

iii) Crime Diary Input System


This system captured all the complain or cases lodge before the EFCC
counter. It contains the brief fact of criminals matters. It captures the
following attributes of criminals records kept at the EFCC. They are: Case file serial number and time
Cross reference of a criminal case.
Details of entry of the witness / suspect.

30

Output Analysis
The system output includes: i. Crime Registered
ii. FORM CR.2
iii. FORM CR.8
iv. FORM CR.14
v. CHARGE SHEET.
i. Crime register output system
This is a very big exercise book where all cases reported to the EFCC, both
tried and as well as cases yet to be tried in the court are captured
and registered. Each case file is given a number and this identity number
given is entered into the crime register. The crime register contains the
following fields (attributes).
ID numbers /Date
Date / time crime scene
Offense and chapter of the law
Name of suspect
Name of investigating officer
Esx (state C.I.D) i.e. the office or department where the case in
originated.
Time of case entry
Complainant
Remarks i.e. state the position of the case.

ii. Output system form CR. 2


This is an output form hardcopy of the particulars of conviction. This is
31

generated after court has decided criminal matter and it is usually kept at
the central criminal register at Alagbo Lagos State.

iii. System output form CR.8


This output form 5 used by the superintendent of EFCC in charge of the
supervisees old place to inform the superintendent of EFCC in charge of
new peace, the supervisees intention to move to his place.

iv. System output form CR 14


This is used by the registrar when he discovers that there is previous
conviction.
v. Charge Sheet
This is an output that contains offence committed/ date of court hearing.

vi. Files and records


The crime information kept in the EFCC are categorized into two Namely:crime prevention records and criminal records.
i) Crime Prevention Records.
This consists of records like
Duty roster
Station routine diary
Register of habitual criminals
32

The register of persons sentenced


Supervision.

33

ii) Criminal Records


This include;
Station crime and incident diary
Register of arrest (newly apprehended person)
Register of sudden and unnatural death
Charge Register (of felonies and misdemeanors).
Register of simple offences
Register of lost, stolen and recovered property.
Register court processes
Register of missing person.

3.3 Analysis of the Existing System


In analyzing the system of policy, the federal investigation and intelligence
bureau (FIIB) will be used. It deals with the detection and investigation of
criminal offences. Information brought to the EFCC could be on an offence
that has already been committed or about a crime, the commission of which
is being contemplated or planned. Information of this nature could get to the
EFCC by any of the following ways:
i)

An injured or aggrieved person,

ii) Some public spirited individual


iii) Professional confidential informants, and
iv) Chance conversation overhead by EFCC that an offence has been or
is going to be committed (members, 1982) With genuine information
the EFCC are able to capture some highly organized gangs as
well as recover stolen property.
Such information are brought to the knowledge of the EFCC in form of
complain or petition lodged against a suspect by a complainant. The crime
34

informant might walk down to the station or have a call made to the EFCC.
The EFCC having received the information group the case into groups and
treat them separately so that a particular unit handles a particular group
of crime complain made. With the case of those involving crime the
suspect will be arrested and detained. The suspect will be given a suspect
form under investigation to fill in which the suspect data will be captured
and the suspect will write statement. All these data will be written in they
record book and kept in the archives. The suspect will be detained in the
counter or cell as the case may be, while the divisional crime officer assigns
an investigating EFCC officer (IPO) the investigation to be conducted. Bailing
as the case may be, maybe granted to the suspect depending on the
seriousness of the case.
If bail is granted the suspect will be expected to report to the EFCC on a
daily

bases

whenever

needed.

When

the

investigation

has

been

concluded, the details of the investigation will be documented on the crime


diary booklet by the investigating EFCC officer, and then the suspect will be
charged and arrayed in the court where the judge will hear and give the final
verdict. The suspect or accused will be referred to as a criminal if after
the court hearing the suspect is found guilty... But in some cases both
parties i.e. the complainant and the accused might agree to settle out of
court.
3.4 Limitations of the Existing System
Due to the manual means being used by the Nigerian EFCC force, in
keeping information about crime and entering records of it into record books
instead of it being in form of data input into computer storage system,
problems arise and there problems have plagued the Nigerian EFCC force
and affected the policing system in the country. Some of these problems
areumerated below.

35

a) Insufcient Equipment
Almost

all

EFCC

units

in

the

country

lack

equipment

such

as

computer system. If these systems are provided, there will be good


report generated, communication links among different EFCC units
(when networked) and this in-turn will enhance decision Making and
ultimately

facilitate

the fighting

of

crime

because

good

and

valuable information yields good results.

(b) Keeping Of Record Books For Different Cases That Come


In Daily.
This presents a lot of problems to the policing system because the
record books are always voluminous and in trying to keep all these,
some vital information might be lot. This also makes the office look
very clumsy and untidy since most files are covered with dust.

(c) Loss of Important Information


Due to damages that occur on record book and file, when pages
are lost, some vital information is also lost.
(d) Inaccuracy Due to the manual method of handling information a
lot of human error are noticed in processed information.
(e) Time lapses Due to the manual method, there is always a slow
response- time when the law court requires information about
particular cases.
(f) Insecurity
There can be no proper security of information.

36

3.4.1 Justification for the New System


The new system will help sanities crime tracking system in Nigeria. The
software will be of immense benefit to government. The software will
among other things:
1. Facilitate crime tracking system
2. Information management
3. Trial
4. Fast retrieval of documents

3.5 System Design


System design is the process of designing a new system after sorting out the
problems in the existing system. It includes the design of a proposed system
after a documented study of the current manual operation and system
requirement in the establishment.
However the success of this phase depends on the actualization of the
system study stage. The significance of the new system is identified in the
system analysis phase.

3.5.1 Output Specification and Design


The sequence of the report is one of the important features that should be
concluded. This is emphasized because it forms the basis of the detective
decision. It aims at providing the Nigerian EFCC force with adequate,
effective, well documented up-to- date and formatted output to help as a tool
in planning and decision making / based on the statistical findings of the
investigation. There are methods of generating reports in the new package.

HARDCOPY This is a process of printing from the printer to paper, and


SOFTCOPY It is the process of displaying an output on the computer
37

screen.
The new system uses the Microsoft access file; following the particular
information needed by the detectives through the monitor or printer derives
a report. The report is well formatted outlining the titles and readability
facilities to help in decision-making.
The reports derived are narrowed to four types due to time constraint. They
are: Criminal details
Suspect details
Complainant details
Crime and nature.
It is necessary to know that there is report for each derived and each of them
can be reached by clicking on reports in the main menu, and by clicking on
the very file name beneath the report. Below are some of the reports
generated.

3.5.2 Input Design and Specification


It is also necessary to denote that data inputted in the computer for
processing determines what the output will be. Screen designs are generally
or basically made for data entry or capture. Since data are captured from a
hardcopy form, the sequence of data capture should be identical to the
hardcopy form made for data collection. They may be a machine duplicate
form. The screen design for data entry can be imputed in for screen
consisting of a menu. When you choose an option, a screen will be
displayed for you to carry out the operation or work that your want.

The new system is composed mainly of three forms of input sequence,


they are: 38

a) Criminal registration
b) Suspect registration
c) Complainant registration
Criminal Registration
This form consists of data like

Fig 3.2: screenshot of crime registration form

3.6

Database Design

The most important step in information processing is input process and


output process, between both is the storage. Data can be store to
be processed later on the output from processes of input data can be stored
for later use. Invariably, it is necessary at this stage to design various files
39

that will be used by programs for data storage.


The design of files include
The definition of data and length of records field
The index key(s) of each file, if any
The file name used for this new system is CRIME and it comprises of
TABLES with the following filenames: Criminal
Suspect
Complainant
Crime etc.

TABLE 3.1: Criminal File


This table consists of the necessary information that enables Nigeria EFCC
to keep track of all the necessary informations that will enable them also to
keep track of the correct and unique identity of an individual caught in the
act of committing a particular crime.
TABLE 3.2 Suspect File

40

This table consists of the necessary information that enables Nigeria EFCC
to keep track of all the necessary informations that will enable them keep
track of all the suspects using the necessary information supplied in the table
above.

Complainant File
This table consists of the necessary information that enables Nigeria EFCC
to keep track of all the necessary informations that will enable them keep
track of all the complainants and their complaints using the necessary
information supplied in the table above and it is called the complainant form.
This contains personal information about the complainant and his /her
complains about a suspect.

3.7 Program Design and Specification


It is very important to outline the structure of the proposed system. The task
is divided into several sub-tasks, which come together to give the solution to
the problem. Below is a description of the process that are carried out when
the package is run.

41

Fig 3.3: screen shot of the system homepage


Fig 3.3 login page
The login page which is shown in fig 3.4 is a program that allow access to
the entire program when the users identification and password have been
entered correctly, access to the package is allowed, likewise of options are
not correctly entered, assess is denied.

42

Fig 3.4: screenshot of the system login page

3.7.1 Criminal Registration


This program allows the user to enter all the necessary data (information)
concerning a criminal and control all other operations that can be performed
on the criminal data entry. It is made up of options like add, delete update,
search for a particular criminal data etc. and returns control to the main
menu.

3.7.2 Suspect Registration


This program allows the users to enter all the data necessary about a
suspect and also all operations that can be carried out on the suspect data
entry. It is made up of options like add, delete update, search for
searching for particular suspect information. It also returns control to the
main menu.
43

3.7.3 Report
This is the program that outlines the information concerning the criminal on
group of criminal involved in a crime. It also applies to the suspect and
complainant reports.
3.7.4 Change Password
The program allows the viewer to view on the number of users that have
access to the package. It allows the adage of another user, removes
an authorized viewer by deleting and corrects the identity of a user
by updating.

3.7.5 Complainant Registration


This program allows the users to enter the necessary data about a suspect.

44

3.8 system flow chart

Fig 3.5 system flow chart


The system flow chart which is fig 3.9 shows how data is been transfer
from the user to the system, processed, displays the report, stores it in a
disk storage and gives out the output. Input data is the data from the user,
input from the keyboard is the media through which the data is being
typed and is transferred to the CPU were the data is being processed and
the report shown as well. The processed data is stored in a disk storage,
and back to the CPU which supplies the output to an output media which
now displays the output

3.9 Top down design

45

Fig 3.6 Top down design


The top down design shows how the entire project is designed. This
figure describe all the design carried out in this project, it started from
main menu where you see the File menu, Report, Query, Help and Quit.
Under file you will see the suspect registration, criminal registration,
complainant registration, crime catalog, change password and exit. The
under the report you will see suspect list, complainant list, criminal list,
crime and nature and finally exit. Under query you will see query by Name,
by ID, by Sex, Exit. Under help you see the software developer, user guide
and Exit. Finally you will see quit.

46

CHAPTER FOUR
SOFTWARE DESIGN AND SYSTEM SPECIFICATION
4.1 Design Standard
The system designed made use of top-down design in processing data.
Access to information is made through the home page. All the sub systems in
the program perform a specified task. Each module is tested before the final
integration and testing of the whole system.

4.2 Output Specification and Design


The output from the new program is designed in such a way that it conveys
meaningful information to the users. The design of the outputs is done using
web page report formats and grid controls.

4.3 Input Specification and Design


The input forms are designs generally based on the necessary data that
needs to be entered into the system. The data are captured through the
keyboard and stored on a magnetic disk in an access database.

4.4 Choice of Development Tools


So many programming languages were considered in the cause of designing
this software. A lot of factors were put into consideration which includes
online

database

access,

data

transmission

via

networks,

database

security, database retrieval online, multi user network access, online data
capture, etc.
The

choice

PHP

programming

language

was

made

to enable

us

achieves the above set objectives. Moreover, PHP editor is very user
friendly and enables the design of an interface that can be modified
47

programmatically. Also MYSQL database is a robust database that can


guarantee database integrity and database protection, PHP editor
used

in

the

was

development of this software. This is because the

programming language has the advantage of easy development, fexibility,


and it has the ability of providing the developer/programmer with possible
hints and it produces a graphical user interface. Macrome dia Fireworks
was used in the design of the software to enable me get good and required
graphics. Tomb

print

machine

was

also

used

to

ensure

perfect

workability of this project, that is to ensure that individuals that committed


crimes are captured with their perfect and unique identity.

4.2

System Requirement

In order to realize this project, the following software and hardware


components were used:

4.2.1 Software Requirement


The software requirements includes: A window 98, Window XP, Vista, or Window 7

MYSQL Database
PHP editor integrated development environment

48

4.2.2 Hardware Requirements


In the cost of the design, the software developed needed the following
hardware for an effective and efficient operation of the new system.
1 Intel Computer System.
2 At least 1GB RAM.
3 Enhanced keyboard.
4 At least 40GB hard disk.
5 E.G.A/V.G.A, a coloured monitor
6 An uninterruptible power supply (UPS) units
7. LaserJet or DeskJet printer.
8. Tomb print machine
9. web cam

4.2.3 People Ware (Personal Requirements)


For the safety of information, they should be limitation to the number of
people who would have access to this new system to be implemented by the
Nigerian EFCC or any branch of the EFCC force. These include computer
operators, the technical maintenance staff and system administrations. The
system administrator

has

the

overall

charge

over

the system and

controls all the other computer operators. The system administrator has
some rights computer operators do not have.

4.3 System Implementation


Implementation is the realization of an application, or execution of a plan,
idea, model, design, specification, standard, algorithm, or policy.
The

new

system

was

implemented

using

Microsoft

Visual

Basic

programming language. This is because the programming language has the


49

advantage of easy development, flexibility, and it has the ability of


providing the developer/programmer with possible hints and it produces a
graphical user interface.

50

4.4 Program Flowchart


Start

Main Menu
Case file
Query
Report
Exit
Select menu option

Yes

Option 1?

Call Case Form

No
Yes

Option 2?

Call Query Program

No

Yes

Option 3?

Call Report module

No
No

Option 4?
Yes
Stop

Fig 4.1 program flow chart.

51

The structure of the Program fow chart in fig 4.1 above describes the
directional path in which user links from page to page. The flow chart has the
home page as the roof page which is the first page encountered in opening
the portal. The home page then links to the case file registration, query,
report and exit. The file registration comprises of the suspect registration,
criminal

registration,

system

access

complainant list, suspect list etc.

52

e.t.c.

report

comprises

of

the

CHAPTER FIVE
SYSTEM IMPLEMENTATION

5.1 System Implementation


System implementation is a collection of inter-dependent physical devices
together with their programming which provides the functionality and
performance for which the system was designed. It covers all the activities
necessary to set the system that has been analyzed and designed to be fully
functional to the users.

Authentication and Authorization


The software is incorporated making most of the pages secured or protected
which demands only approved users gaining access to such pages. The
secured pages comprises of the Map pages, the user pages and the
administrator page. The software utilized the PHP membership to validate
and store user credentials which help manage user authentication.
Authentication is the process of inputting a user name and password to gain
access to a specified secured page. The software also utilizes the PHP role
management to manage authorization allowing the ability to specify the
resources users are allowed to access. It enables the treatment of group of
users as a unit by assigning users to specific roles and creating access rules
for them. When a user requests for a protected resource, take for instance,
the staff page, the website will redirect the user to logon page where he has
to enter the required credentials, usually a name and password. The
Customers validate user method in the code-behind file checks the name
entered and compares it will all the names in the membership store, when it
finds a match, it compare the password entered with the password of the
match found in the store. If they are both the same, it attaches an
authentication ticket to the response that represents the use credentials (the
53

password not included) and if not, returns the user to the logon page with an
access denied message. If the user is authenticated, the Isuser_In_Role
method further checks if that name entered has authority to access the
resource requested. It does this by checking the access rule if the users role
can access the resource requested for. If it comes out with booken true,
then the user is given access and the page or resource requested for opens
and if it comes out with booken false, the user is returned to the logon
page with an access denied message. This procedure helps to ensure that a
user does not log in as an administrator and vice-versa thereby viewing
resources that are not meant to. It is also important to note that the
authentication ticket issued to an authenticated user remains active until the
user logs out or the session expires.

5.2 Change over Process


This is the process of changing from the manual system to computerized
system. When the entire procedure obtained in an organization is converted
to automatic electronic mode. There are many methods of change over
which include:

Direct Changeover
In this method the old system is completely replaced by the new system in
one move. This may be avoidable where the two systems are substantially
different, where the new system is a real time system, or when an extra staff
to oversee its parallel running is unobtainable. This method is comparatively
cheap but is risky. Program corrections are difficult while the system has to
remain operational. The new system should be introduced during stack
periods and in large systems. It may be introduced, as an application,
allowing several months between each stage to ensure all problems are
cleared up before the whole system becomes operational.
54

Parallel Changeover
In this method , both the manual and computerized system are operated
concurrently for sufficiently long period and their outputs compared
periodically and possible discrepancies reconciled on the new system until all
users are satisfied .The old system is discontinued when discrepancies are
seen to have seized arising. It has the advantage of having an old system to
fall back on, in case the new system fails. The disadvantage is the cost of
running two systems side by side, both of which will achieve similar result.

Phase Changeover
Here, the changeover starts with a department or branch. The effect of the
new system in the sample department or branch is observed before some
other department or branch which may be more sensitive can adapt to the
new system.

Pilot Changeover
In this case, some transactions that are very complex are operated using
parallel changeover and in other remaining existing system in application,
direct changeover is used. The researcher recommends the parallel
changeover to avoid drastic problems that may arise due to failure of a
newly developed system.
5.3 Software Testing
This defines the test requirement, which the software should meet and it is
progressively integrated into complete package. The process of test plan is
concerned with providing that a package produces correct and expected
result for all possible input data.

55

For this software testing, we have three basic testing that should be
adopted :
a. Module Testing
b. Integrated testing and
c. System testing

Module Testing
In this design we have many modules which when triggered up at certain
events perform a specific function. So, module testing involves testing of
each of the modules in software to verify that they meet their respective
objective module

testing were carried out to ensure that information

properly fows into and out of the program module under test.

The Integration Test


So far, the various modules have been tested and each proved efficiency as
an entity. (i.e. module). Though sometimes, the modules can perform their
respective functions but when put together, they can function together. So
this test therefore checks that when the modules are integrated they can
combine to perform their respective functions. Hence, integration testing
was done to entire program structure to uncover errors associated with
interfacing. These errors were debugged to produce desired results. The
essence of integration testing is to ascertain that these modules do not lose
their efficiency and reliability. The Integration involved the main form which
serves as coordinator and driver for other module.

System Testing
Before bringing and data processing system into use, it is of vital importance
that the system is both comprehensive within its intended limits and fully
56

correct. So, each routine must have been written according to specification
and tested to complete satisfaction. Also bags must have been removed
completely and the program run produced exactly what is required of it.

5.4 BEME (Bill of engineering measurement and evaluation)

Table 5.1 Bill of Engineering Measurement and Evaluation


S/N

Component

quantity

Name

Unit

Total

cost

quanti

Tomb print

24,500

Tomb print

1000

software
3

Web cam

1500

Visual basic

1500

2000

software
5

Laptop charger

TOTAL

The table above which is the bill of engineering

describes the

equipments used in the design of the project, the quantity used and the
cost of each quantity in addition of the total quantity.
57

CHAPTER SIX: SUMMARY, CONCLUSION AND RECOMMENDATIONS

6.1 Summary of findings


It is very important that Nigeria EFCC should know the level of crime in the
country. This will help the EFCC to know whether to put in more effort in
their fight against crime or not. The reliability and efficiency of this project
correct those weakness that are found in the existing method of tracking
criminals. The achievements recorded by this design can be summarized as
follows.
1

The design provides prompt and accurate criminal records to


the EFCC and as at when due. This with the EFCC can evaluate
the true nature of criminal cases. Handled in the court.

With the design record keeping within the EFCC station by


means of an online access, it becomes very easier for the
EFCC

to

tracking

down
58

hardened

criminals,

habotual

criminal, suspects sinder EFCC supervision and copy of finger


print of all persons convicted of all offence. This will be made
possible by the method of data storeage, which
DBMS

(Data

Base

Management

System)

support

and eliminates

redundancy) that dominates the manual and other existing


method.
3

It provides users with an orgainsed approach and accesss to


database which supports some data encryption.

59

6.2 limitations of the study/project


Due to time and financial constraint, I was unable to visit few of the EFCC in
Nigeria to gather information on the existing crime information system. Few
EFCC s were visited and the information gathered from the officers in
charge forms the basis for the design of the new system.
The project did not cover the Prison and the Magistrate Segment, which
could also be automated.

6.3 Recommendation
Efforts have been made to design and develop software that support
network. But there are still areas that may be considered as a further and
important area to improve on, and my suggestion go thus.
1

There is the need for the magistrate segments and prison


record to be automated.

2 The development of DNA database stores criminal fingerprint


6.4 Conclusion
Most people guilty of embezzlement do not have criminal histories.
Embezzlers tend to have a gripe against their employer, have financial
problems, or simply an inability to resist the temptation of a loophole they
have found. Screening and background checks on perspective employees
can help in prevention; however, many laws make some types of screening
difficult or even illegal. Fired or disgruntled employees sometimes sabotage
their company's computer system as a form of "payback". This sabotage
may take the form of a logic bomb, a computer virus, or creating general
havoc.
Some EFCC stations have developed measures in an attempt to combat and
prevent crime. EFCC sometimes implement security measures such as
60

cameras, fingerprint records of crimes, and background checks. Not only do


these methods help prevent crime, but they help EFCC to keep track of
crimes and maintain a database of crime records.

Reference
1. Aquinas, Thomas. (1988). On Law, Morality and Politics. 2nd edition.
Indianapolis: Hackett Publishing Co. ISBN 0-87220-663-7
2. Attenborough, F. L. (ed. and trans.) (1922). The Laws of the Earliest
English Kings. Cambridge: Cambridge University Press. Reprint March
2006. The Lawbook Exchange, Ltd. ISBN 1-58477-583-1
3. Blackstone, William. (17651769). Commentaries on the Law of
England: A Facsimile of the First Edition of 1765-1769, Vol. 1. (1979).
Chicago: The University of Chicago Press. ISBN 0-226-05538-8
4. Blythe, James M. (1992). Ideal Government and the Mixed Constitution
in the Middle Ages. Princeton: Princeton University Press. ISBN 0-69103167-3
5. Cohen, Stanley (1985). Visions of Social Control: Crime, Punishment,
and Classification. Polity Press. ISBN 0-7456-0021-2
6. Daube, David. (1969). Roman Law: Linguistic, Social and Philosophical
Aspects. Edinburgh: Edinburgh University Press. ISBN 0-85224-051-1
7. Driver, G. R. & Mills, John C. (19521955). The Babylonian Laws. 2 Vols.
Oxford: Oxford University Press. ISBN 0-19-825110-6
8. Dworkin, Ronald. (2005). Taking Rights Seriously. Harvard University
Press. ISBN 0-674-86711-4
9. Foucault, Michel (1975). Discipline and Punish: the Birth of the Prison,
New York: Random House.
61

10.

Gagarin, Michael (1989) [1986]. Early Greek Law (Reprint ed.).

Berkeley: University of California Press. ISBN 0-520-06602-2.


11.

Garner, Richard. (1987). Law and Society in Classical Athens.

London: Palgrave Macmillan. ISBN 0-312-00856-2


12.

Garoupa, Nuno & Klerman, Daniel. (2002). "Optimal Law

Enforcement with a Rent-Seeking Government". American Law and


Economics Review Vol. 4, No. 1. pp116140.
13.

Guterman, Simeon L. (1990). The Principle of the Personality of

Law in the Germanic Kingdoms of Western Europe from the Fifth to the
Eleventh Century. New York: P. Lang. ISBN 0-8204-0731-3
14.

Hart, H.L.A. (1961). The Concept of Law. 2nd revised edition

(1997). Oxford: Oxford University Press. ISBN 0-19-876123-6


15.

Hart, H.L.A. (1972). Law, Liberty and Morality. Stanford: Stanford

University Press. ISBN 0-8047-0154-7


16.

Kern, Fritz. (1948). Kingship and Law in the Middle Ages. Reprint

edition (1985), Westport, Conn.: Greenwood Press.


17.

Kramer, Samuel Noah. (1971). The Sumerians: Their History,

Culture, and Character. Chicago: University of Chicago. ISBN 0-22645238-7


18.

Maine, Henry Sumner. (1861). Ancient Law: It

19.

Websites:
a. https://efccnigeria.org
b. www.appolice.gov.in
c. www.cyberabadpolice.gov.in
d. www.met.police.uk
62

e. www.ci.minneapolis.mn.us
BIBLIOGRAPHY

1. Aquinas, Thomas. (1988). On Law, Morality and Politics. 2nd


edition. Indianapolis: Hackett Publishing Co.
2. Attenborough, F. L. (ed. and trans.) (1922). The Laws of the Earliest
English

Kings.

Cambridge:

Cambridge

University

Press.

Reprint March 2006. The Lawbook Exchange, Ltd.


3. Blackstone, William. (1769). Commentaries on the Law of England:
A Facsimile of the First Edition of 1765-1769, Vol. 1. (1979).
Chicago: The University of Chicago Press.
4. Blythe,

James

Constitution

M.
in

University Press.
5. Cohen, Stanley

(1992).
the

Ideal

Middle

Government
Ages.

(1985). Visions

and

the

Mixed

Princeton:

Princeton

Social

Control:

of

Crime, Punishment, and Classification. Polity Press.


6. Daube, David. (1969). Roman Law: Linguistic,

Social

and

Philosophical Aspects. Edinburgh: Edinburgh University Press.


7. Driver, G. R. & Mills, John C. (1955). The Babylonian Laws. 2 Vols.
Oxford: Oxford University Press.
8. Dworkin,

Ronald.

(2005).

Taking

Rights

Seriously.

Harvard

University Press.
9. Foucault, Michel (1975). Discipline and Punish: the Birth of the
Prison, New York: Random House.
10.
Gagarin, Michael (1989) Early

Greek

Berkeley: University of California Press


11.
Garner, Richard. (1987). Law

and

63

Law

Society

(Reprint
in

ed.)

Classical

Athens. London: Palgrave Macmillan.


12.
Garoupa, Nuno & Klerman,

Daniel.

(2002).

"Optimal

Law Enforcement with a Rent-Seeking Government". American


Law and Economics Review
13.
Guterman, Simeon L. (1990). The Principle of the Personality
of Law in the Germanic Kingdoms of Western Europe from the Fifth
to the Eleventh Century. New York: P. Lang.
14.
Hart, H.L.A. (1961). The Concept of Law. 2nd revised edition
(1997). Oxford: Oxford University Press.
15.
Kern, Fritz. (1948). Kingship and Law in the Middle Ages.
Reprint edition (1985), Westport, Conn.: Greenwood Press.
16.
Kramer, Samuel Noah. (1971). The Sumerians:

Their

History, Culture, and Character. Chicago: University of Chicago


17.

Maine, Henry Sumner. (1861). Ancient Law: Its Connection

with the Early History of Society, and Its Relation to Modern


Ideas.
18.
Reprint edition (1986). Tucson: University of Arizona Press.
19.
Oppenheim, A. Leo (and Reiner, Erica as editor). (1964).
Ancient Mesopotamia: Portrait of a Dead Civilization. Revised edition
(September 15, 1977). Chicago: University of Chicago Press.
20.

Pennington, Kenneth. (1993). The Prince and the Law, 1200

1600: Sovereignty

and

Rights

in

the

Western

Legal

Tradition.

Berkeley: University of California Press.


21.

Polinsky, A. Mitchell. (1980). "Private versus Public


Enforcement of

Fines". The Journal of Legal Studies

64

GLOSSARY

Gregarious: Man being Friendly and Sociable


Crime: A normative definition views crime as deviant behavior that
violates prevailing norms cultural standards prescribing how humans
ought to behave normally Criminalization: One can view criminalization as
a procedure deployed by society
device,

using

the

threat

as

pre-emptive,

harm-reduction

of punishment as a deterrent to anyone

proposing to engage in the behavior causing harm.


FIIB: Federal Investigation and Intelligence Bureau
IGP: Inspector General of EFCC
DIG: Deputy Inspector General
FCID: Force Criminal Investigation Department (FCID) is the highest
investigation arm of the Nigeria EFCC NPF.
Tracking: A tracking systems detects someone or something by tracking
the marks, signs or information left behind .It could be an electronic gadget
or software that uses previous information fed to it to say the state of a
particular matter.
EFCC: This is an agency of a community or government that is responsible
for maintaining public order and preventing and detecting crime. The basic
EFCC missionpreserving order by enforcing rules of conduct.

65

APPENDIX A
SOURCE CODE
Index Code
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Online crime information system for EFCC</title>
<style type="text/css">
body {
margin-left: 0px;
margin-top: 0px;
margin-right: 0px;
margin-bottom: 0px;
}
#apDiv1 {
position: absolute;
left: 451px;
top: 57px;
width: 515px;
height: 89px;
z-index: 1;
font-size: 24px;
}
#ggg {
font-size: 34px;
}
#ggff {
color: #9D4F00;
66

}
#ggg {
color: #9D4F00;
}
#gfer {
color: #D76B00;
}
a:link {
color: #930;
}
a:visited {
color: #900;
}
a:hover {
color: #930;
}
a:active {
color: #930;
}
</style>
<script type="text/javascript" src="js/stscode.js"></script>
</head>
<body>
<div id="apDiv1">
<p id="ggg"><span id="ggff">Crime Information System</span>
<span id="ggg">For EFCC</span></p>
</div>
<table

width="824"

border="1"

align="center"

cellspacing="1" bordercolor="#FF0000">
<tr>
67

cellpadding="1"

<td

height="145"

colspan="2"

valign="top">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img
src="images_007.jpg" width="138" height="142" /></td>
</tr>
<tr>
<td

colspan="2">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|&nbsp;<a

href="index.php">&nbsp;Home&nbsp;</a>&nbsp;|
&nbsp;&nbsp;&nbsp;<a
href="want.php">Wanted&nbsp;</a>&nbsp;&nbsp;&nbsp;|
&nbsp;&nbsp;<a

href="report.php">&nbsp;Report

</a>&nbsp;&nbsp;|&nbsp;&nbsp;<a
&nbsp;Login</a>

Crime

href="login.php">Staff

&nbsp;&nbsp;|&nbsp;&nbsp;&nbsp;<a

href="admin_login.php">Admin</a></td>
</tr>
<tr>
<td width="263" height="556" valign="top"><p>&nbsp;</p>
<p>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<u
id="gfer">Mission Statement</u><br />
<br />
To rid Nigeria of Economic and Financial Crimes and to effectively
coordinate the domestic effort of the global fight against money
laundering and terrorist financing.
<p><a

</p>

href="http://www.dhtml-menu-builder.com"

style="display:none;visibility:hidden;">Javascript

DHTML

Image

Web

Scroller Powered by dhtml-menu-builder.com</a>


<script type="text/javascript" src="js/scroller.js"></script></p></td>
<td width="548" valign="top"><h2>raud: Top Prison Boss Bags
Seven Years Jail Term</a></h2>
<div>
<div>
68

<p><img src="JAILED-GODFREY-OBIOHA.jpg" alt="" width="152"


height="149" align="left" border="0" /></p>
<p
right:25px;">The

align="justify"

style="margin-left:55px;margin-

Economic and Financial Crimes Commission on Friday,

November 28, 2014,


Justice J.J Majebi of

secured the conviction of a top prison officer as


the Kogi State High Court, Okene, convicted and

sentenced Joseph Friday

Idachaba, Deputy Controller of Prisons, to

seven years imprisonment for

offences bordering on obtaining money

by false pretence.</p>
</div>
</div>
<p>&nbsp;</p>
<p><br/>
</p>
<div>
<h2>Oil Thief Bags 4 Years Jail Term</a></h2>
<div>
<div>
<p><img src="JAILED-PRISON-BOSS-FRIDAY-I.jpg" alt=""
align="left" border="0" margin-right="15px" /></p>
<p
right:25px;">Justice

align="justify" style="margin-left:55px;marginA. Onyetenu of the Federal High Court, Port

Harcourt, on Thursday 26

November, 2014 convicted and sentenced

one Godfrey Obioha to a four-year


The court also ordered the

jail term without an option of fine.

forfeiture of a Mercedes Benz truck with

registration number: AG 601 ABA, to the Federal Government.</p>


</div>
<p>&nbsp;</p>
</div>
<div></div>
</div>
69

<p>&nbsp;</p></td>
</tr>
<tr>
<td colspan="2" align="center"> Developed By &nbsp;&nbsp;Odoh
Onyekachi Jude ESUT/2009/106402</td>
</tr>
</table>
</body>
</html>
Code For Login
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Online crime information system for EFCC</title>
<style type="text/css">
body {
margin-left: 0px;
margin-top: 0px;
margin-right: 0px;
margin-bottom: 0px;
}
#apDiv1 {
position: absolute;
left: 451px;
top: 57px;
width: 515px;
height: 89px;
z-index: 1;
70

font-size: 24px;
}
#ggg {
font-size: 34px;
}
#ggff {
color: #9D4F00;
}
#ggg {
color: #9D4F00;
}
#gfer {
color: #D76B00;
}
a:link {
color: #930;
}
a:visited {
color: #900;
}
a:hover {
color: #930;
}
a:active {
color: #930;
}
</style>
<link

href="SpryAssets/SpryValidationTextField.css"

rel="stylesheet"

type="text/css" />
<script type="text/javascript" src="js/stscode.js"></script>
<script

src="SpryAssets/SpryValidationTextField.js"
71

type="text/javascript"></script>
</head>
<body>
<div id="apDiv1">
<p id="ggg"><span id="ggff">Crime Information System</span>
<span id="ggg">For EFCC</span></p>
</div>
<table

width="824"

border="1"

align="center"

cellpadding="1"

cellspacing="1" bordercolor="#FF0000">
<tr>
<td

height="145"

valign="top">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img
src="images_007.jpg" width="138" height="142" /></td>
</tr>
<tr>
<td>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|&nbsp;<a
href="index.php">&nbsp;Home&nbsp;</a>&nbsp;|
&nbsp;&nbsp;&nbsp;<a
href="want.php">Wanted&nbsp;</a>&nbsp;&nbsp;&nbsp;|
&nbsp;&nbsp;<a

href="report.php">&nbsp;Report

</a>&nbsp;&nbsp;|&nbsp;&nbsp;<a

Crime

href="login.php">Staff

&nbsp;Login</a> &nbsp;&nbsp;|&nbsp;&nbsp;&nbsp;</td>
</tr>
<tr>
<td height="284" valign="top"><p>&nbsp;</p>
<p> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p>
<p><br/>
</p>
<form

action="staff.php"

id="form1">
72

method="post"

name="form1"

<table align="center">
<tr valign="baseline">
<td nowrap="nowrap" align="right">Username:</td>
<td><span id="sprytextfield1">
<input type="text" name="username" value="" size="32" />
<span
class="textfieldRequiredMsg">required.</span></span></td>
</tr>
<tr valign="baseline">
<td nowrap="nowrap" align="right">Password:</td>
<td><span id="sprytextfield2">
<input type="password" name="password" value=""
size="32" />
<span

class="textfieldRequiredMsg">

required.</span></span></td>
</tr>
<tr valign="baseline">
<td nowrap="nowrap" align="right">&nbsp;</td>
<td><input type="submit" value=" Staff Login" /></td>
</tr>
</table>
</form>
<p>&nbsp;</p></td>
</tr>
<tr>
<td align="center"> Developed By &nbsp;&nbsp;Odoh Onyekachi Jude
ESUT/2009/106402</td>
</tr>
</table>
<script type="text/javascript">
var sprytextfield1 = new Spry.Widget.ValidationTextField("sprytextfield1",
73

"none", {validateOn:["blur", "change"]});


var sprytextfield2 = new Spry.Widget.ValidationTextField("sprytextfield2",
"none", {validateOn:["blur", "change"]});
</script>
</body>
</html

74

You might also like