Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/332258498

A Criminal Database System to Enhance National Security

Article · December 2017

CITATIONS READS

2 2,633

3 authors:

Patrick Ozoh Phd Sakinat Oluwabukonla Folorunso


Osun State University Olabisi Onabanjo University
44 PUBLICATIONS 137 CITATIONS 55 PUBLICATIONS 635 CITATIONS

SEE PROFILE SEE PROFILE

Adepeju Abeke Adigun


Osun State University
23 PUBLICATIONS 29 CITATIONS

SEE PROFILE

All content following this page was uploaded by Patrick Ozoh Phd on 07 April 2019.

The user has requested enhancement of the downloaded file.


https://dx.doi.org/10.4314/jcsia.v25i2.14

THE JOURNAL OF COMPUTER


SCIENCE AND ITS APPLICATIONS
Vol. 25, No 2 December 2018

A CRIMINAL DATABASE SYSTEM TO ENHANCE


NATIONAL SECURITY

Adigun, A.A.1*, Folorunso, S. O.2, Uzoh, P.3,

1Osun State University, Osogbo, Nigeria


Email: fempej2013@gmail.com
2Department of Mathematical Sciences,
Olabisi Onabanjo University, Ago Iwoye, Nigeria
Email: Sekinat.folorunso@oouagoiwoye.edu.ng
3OsunState University, Osogbo, Nigeria
Email: Patrick.ozoh@uniosun.edu.ng

ABSTRACT
National security refers to the security of a nation state, including its citizens, economy, and
institutions, and is regarded as a duty of government. Security is one of the major challenges
faced in Nigeria today as various types of crimes are committed on daily basis. Automatic
Identification of individuals is of utmost importance so as to be able to keep records of
crimes and the criminals involved. This can help in reducing crime rates as well as
mitigating digital terrorism across the country and assisting law enforcement agencies in the
world. The current method used in Nigeria in recording crimes and criminals involved is the
manual method which involved the use of biro and paper. This method is not very effective
as it could be misplaced, destroyed by pest, manipulated by unauthorized individuals, etc.
This paper therefore aims to design a Criminal Database System that could help in
achieving National security in Nigeria. This can help in reducing crime rates as well as
mitigating evidence fraud across the country and assisting law enforcement agencies in the
world.

Keywords: Criminals, Criminal Database Systems, Evidence, National Security, Nigeria.

1.0 INTRODUCTION security, and cyber security. These


The National security refers to the security dimensions correlate closely with elements
of a nation state, including its citizens, of national power. National security is
economy, and institutions, and is regarded as associated primarily with managing physical
a duty of government. National security has threats and with the military capabilities
several dimensions, including economic used for doing so [1]–[3]. Some researchers
security, energy security, physical security, have argued that national security depends
environmental security, food security, border on political security and the equitability of

176
A Criminal Database System to Enhance National Security
Adigun, A.A., Folorunso, S. O., Uzoh, P.

the international order [4]. Environmental designed). In other words, profiled offenders
security refers to the integrity of ecosystems continue to commit new offenses, but are
and the biosphere, particularly in relation to caught much more often than those not in the
their capacity to sustain a diversity of life- database. Security operatives sometime
forms including human life. The security of mistakenly accuse innocent people instead of
ecosystems has attracted greater attention as criminals, illegally charge innocent citizen
the impact of ecological damage by humans with no prior offence, and some cases unable
has grown [5]. A National Database is an to state the right offence of the criminal(s).
important aspect of National security that The more valid information is available, the
helps local, regional, national and less difficult it is to cover up one's tracks
international security in serving the country state official or not [6]. This work is aimed
and people in the nation. The total of at developing a Criminal National Database
125,790 crime cases were reported within that can help in national security by
the year 2016 from the 36 states of Nigeria, identifying repeated offenders, potential
with Lagos contributing 45,385 (36.08%), threats, etc.
Abuja 13,181 (10.48%) and Delta 7,867
(6.25%) crime cases. In 2017, the total of 2.0 RELATED WORKS
134,663 cases was reported. Offence against In this section, existing systems that are
property has the highest number of cases closely related to the proposed system are
reported with 68,579, offence against analyzed.
persons recorded 53,641 while offence [7]designed and implemented a biometrics
against lawful authority recorded the least based crime investigation system for the
with 12,443. Lagos State has the highest Nigerian Police Force (NPF). The software
percentage share of total cases reported with was designed using Visual BASIC
50,975 (37.9%), Abia and Delta State with programming language. Fingerprints patterns
12,408(9.2%) and 7,150(5.3%) cases were used to uniquely identify individuals
recorded respectively. Kebbi State has the which helped in controlling redundancy
lowest percentage share of total cases within the system.
reported with 205(0.2%). Kogi and Bauchi [8]designed an implemented a computerized
States followed with 282(0.20%) and real time (CRMS) for the Nigerian Police
386(0.30%) cases recorded respectively. Force (NPF). The waterfall model of system
Criminal database plays an important role in development was adopted while designing
criminal section of national security. The and implementing the system. The interface
police rightly have the powers to collect of the system was designed using Hypertext
information during criminal investigations Markup Language (HTML), while PHP and
and use this evidence in court. Everyone is MySQL were used to design and implement
affected by crime if not directly, then the database.
indirectly, through the greater security [9]developed a Central National Database
measures that they have to take or pay for based on Entity Relational data model for
and through the terribly negative effects that the unique identification of a person. In
crime has on everyone's psyche. order to identify each person individually
In today’s world of advancing technologies, and uniquely, the authors adopted the use of
more and more information is being a unique code called the National Security
generated, stored and distributed by Code. The authors also highlighted and
electronic means. This requires many discussed the challenges and prospects of
agencies to increase the use of digital creating a Central National Database in
evidence gathering as a frequent or standard Nigeria.
tool in their fight against crime. On average,
criminal database has a large net probative 3.0 SYSTEM DESIGN
effect —it helps identify suspects (as The Criminal Database System was

177
The Journal of Computer Science and its Applications Vol. 25 No 2, December 2018

developed with the primary purpose of easy developed and adequately tested using the
identification of criminals and related cases unit testing approach. The database was
so as to improve security of citizens and that developed to allow collection of digital
of the nation as well. The system was evidences gathered by the criminal
designed using web design technologies; investigator. The database was integrated
which are PHP, JavaScript, CSS and HTML. with the developed website content and
The database was designed using the sanity check was conducted to ensure data
MySQL database management system. This integrity.
system was deployed in the Tomcat server
using the WAMP package. Each of the web Fig. 1 shows the architectural framework
pages were first design and coded before overviewing the functionality of the National
been linked together. The images used as test security database in the cloud computing
data were edited using CorelDraw. The system and Fig. 2 explains the algorithmic
waterfall development approach was movement of the user interface design with
adopted. This model allowed each stage to the PHP code as web-based interface viewed
be completed and successfully tested before with browser. The use case diagram of the
moving on to the development of the next system was depicted in Fig. 3.
stage. The website contents were first

USER

CLOUD COMPUTING
SYSTEM

Fig. 1: Architectural diagram of the developed system.

178
A Criminal Database System to Enhance National Security
Adigun, A.A., Folorunso, S. O., Uzoh, P.

Fig. 2: Flowchart of the developed system

179
The Journal of Computer Science and its Applications Vol. 25 No 2, December 2018

Fig. 3: Use Case diagram of the developed system.

4.0 IMPLEMENTATION and update criminal record of suspected


The developed system allows user submit criminals based on evidence gathered. This
registration data as the point of registration. system allows easy access to these records
These data are validated from the client’s and can use details of suspected criminals to
side (web browser) to ensure that data verify and conclude and gather evidences
integrity is preserved. Individual’s name, criminal investigations. For example,
Alias, Mobile number, associated mobile fingerprints from crime scenes can be run on
number of close relatives and associates, the database to identify print owner. Also,
address (home and business), Date and place facial recognition could be used to determine
of birth, Country of citizenship, Citizenship personal details. Figures below are
status, Gender, Telephone number(s), E-mail screenshots from the developed system. Fig.
address, Place of employment and 4 shows the registration page, Fig. 5 shows
employment history, Family lineage, Civil or the page where further details will be
criminal history information, facial image, provided. Fig. 6 shows the login page for the
fingerprints and signature are collected at the admin where details can be checked and
point of registration. Upon successful digital evidence be crossed checked.
registration, admin can login to view details

180
A Criminal Database System to Enhance National Security
Adigun, A.A., Folorunso, S. O., Uzoh, P.

Fig. 4: Registration page of the developed system.

Fig. 5: Page to collect further information.

181
The Journal of Computer Science and its Applications Vol. 25 No 2, December 2018

Fig. 6: login page for the criminal investigator.

[2] UKCabinetOffice, “National Security


5.0 CONCLUSION Strategy and Strategic Defence and
National security database plays an Security Review,” 2015.
important role in criminal section. The [3] USWhiteHouse, “National Security
database system needs to continue evolving Strategy,” 2015.
to reflect changes in the national security [4] P. Rogers, Losing control : global
and its policies. The National Database of security in the twenty-first century,
National security is an integral part of a 3rd ed. London: Pluto Press, 2010.
network that links local, regional, national [5] UnitedNationsGeneralAssembly,
and international security in serving the “Resolution adopted by the General
country and people in the nation. This paper Assembly on 20 December 2010,”
has explored a method of reducing pressure 2010.
on security service officers and those with [6] D. Fowora, O. Kalesanwo, O.
power to abuse it. With available valid Awodele, and V. Joshua,
information, it makes it less difficult to cover “Implications of Over-The-Top ( OTT
up one's tracks; state official or not, and ) Services on National Security,” vol.
perhaps enabling reduction in crime rate and 8, no. 9, pp. 15–21, 2017.
thus save governments’ resources. National [7] A. Falaye, N. Adama, and F.
security DB provides a form of security that Agemerien, “Design And
anyone with a need to identify, locate and Implementation Of Crime
obtain data can work with. Investigation System Using Biometric
Approach,” Pacific J. Sci. Technol.,
6.0 REFERENCES vol. 14, no. 2, pp. 242–253, 2013.
[8] O. Awodele, E. Onuiri, O. Olaore, O.
[1] S. Government, “The National Sowunmi, and A. Ugo-Ezeaba, “A
Security Strategy: Sharing a common Real-Time Crime Records
project,” 2013. Management System For National

182
A Criminal Database System to Enhance National Security
Adigun, A.A., Folorunso, S. O., Uzoh, P.

Security Agencies,” Eur. J. Comput.


Sci. Inf. Technol., vol. 3, no. 2, pp. 1–
12, 2015.
[9] J. Onakoya, F. Adebayo, and O.
Owolabi, “Creation of Central
National Database in Nigeria:
Challenges and Prospects,” Inf.
Knowl. Manag., vol. 3, no. 12, pp. 6–
13, 2013.

183

View publication stats

You might also like