You are on page 1of 12

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED BIOLOGICAL

VERIFICATION SYSTEM FOR CRIME CONTROL


(A CASE STUDY OF IMO STATE POLICE COMMAND)

TABLE OF CONTENTS

TITLE PAGE

APPROVAL PAGE

DEDICATION

ACKNOWLEDGEMENT

TABLE OF CONTENTS

LIST OF TABLES

LIST OF FIGURES

ABSTRACT

CHAPTER ONE

INTRODUCTION

1.1. INTRODUCTION

1.2. BACKGROUND OF THE STUDY

1.3. STATEMENT OF PROBLEM

1.4. AIM AND OBJECTIVES OF THE STUDY

1.5. SIGNIFICANCE OF THE STUDY

1.6. SCOPE OF THE STUDY

1.7 LIMITATIONS OF THE STUDY

1.8. DEFINITION OF TERMS

CHAPTER TWO

REVIEW OF RELATED LITERATURE


2.1. INTRODUCTION

2.2. CRIME

2.3. TYPES OF CRIMES

2.3.1. NORMAL CRIME

2.3.2 POLITICAL-ECONOMIC CRIME

2.3.3. RIOTOUS CRIME

2.4. FACTORS LEADING TO CRIME

2.4.1. ORDINARY FACTORS

2.4.1.1 GEOGRAPHICAL

2.4.1.2 SOCIOLOGICAL

2.4.1.3 PHYSIOLOGICAL AND ATMOSPHERIC

2.4.2 SPECIFIC FACTORS

2.4.2.1 FAMILY CIRCUMSTANCES

2.4.2.2. A RUINED FAMILY

2.4.2.3 THE SIZE OF THE FAMILY

2.4.2.4 DISCONTENTEDNESS IN THE FAMILY

2.4.2.5. FALLEN FAMILY

2.4.2.6 ABSENCE OF ORDERLINESS IN THE FAMILY

2.4.2.7 THE MOVIES

2.4.2.8 FINANCIAL CONDITIONS

2.4.2.9 REGIONAL VARIANCE

2.4.2.10 RELIGIOUS RADICALISM

2.5. THE CRIMINAL INVESTIGATION PROCESS


2.6. ELECTRONIC CRIME REPORTING PLATFORMS

2.7. LIMITATIONS OF EXISTING E-CRIME REPORTING PLATFORMS

2.8. JUSTICE SYSTEM IN NIGERIA

CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN

3.1. INTRODUCTION

3.2. DETAILED ANALYSIS OF THE EXISTING SYSTEM

3.2.1. PROBLEMS OF THE EXISTING SYSTEM

3.3. RESEARCH METHODOLOGY

3.4. OBJECTIVE OF THE NEW SYSTEM

3.4.1. FEASIBILITY STUDY

3.4.2. TECHNICAL FEASIBILITY

3.4.3. OPERATIONAL FEASIBILITY

3.4.4. ECONOMIC FEASIBILITY

3.5.1. DATAFLOW DIAGRAM

3.5.2. MODULARITY

3.5.3. SYSTEM FLOWCHART

3.5.4. PROGRAM FLOWCHART

3.6. SYSTEM DESIGN

3.6.1. OUTPUT DESIGN SPECIFICATION

3.6.2. INPUT DESIGN SPECIFICATION

3.6.4. SECURITY DESIGN SPECIFICATION

CHAPTER FOUR
IMPLEMENTATION, RESULT AND DISCUSSION

4.1. INTRODUCTION

4.2. SOFTWARE DEVELOPMENT TOOLS AND JUSTIFICATION

4.3. SYSTEM REQUIREMENTS

4.3.1. SOFTWARE REQUIREMENTS

4.3.2. HARDWARE REQUIREMENTS

1.3.3. PEOPLE REQUIREMENTS

1.4. IMPLEMENTATION DETAILS

4..4.1. CODING

4.4.2. END USER TRAINING AND MANUAL

4.4.3. FILE CONVERSION

4.4.4. CHANGEOVER PROCEDURE

4.4.5. COMMISSIONING

4.4.6. MAINTENANCE DETAILS

4.5. RESULTS

4.6. SYSTEM TESTING

4.7. DISCUSSION

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

5.1. SUMMARY

5.2. CONCLUSION

5.3. RECOMMENDATION

REFERENCES
APPENDIX I

APPENDIX II

CHAPTER ONE

INTRODUCTION

1.1 INTRODUCTION

The traditional and age-old system of intelligence and criminal record maintenance has failed to

live up to the requirements of the existing crime scenario. Manual processes neither provide

accurate, reliable and comprehensive data round the clock nor does it help in trend prediction and

decision support. It also results in lower productivity and ineffective utilization of manpower.

The solution to this ever-increasing problem lies in the effective use of Information Technology.

Computerized Biological Verification System for crime control uses computer-generated records

as an interface for integrating and accessing massive amounts of location-based information.

Verification which is the process of establishing the truth, accuracy, or validity of something, we

often get verified on having access to bank accounts, entering a protected site, logging into a

computer and in police station base on crime Unfortunately, passport, keys, access cards and

Personal Identification Numbers (PINs) can easily be forgotten, compromised, shared or

observed. Such deficiencies of conventional personal identification techniques have caused

major problems to all concerned. For example, hackers often disrupt computer networks, credit

card fraud is estimated at billions dollars per year worldwide. Therefore, robust, reliable and

foolproof personal identification solutions must be sought in order to address the deficiencies of

the conventional techniques, something that could verify that someone is physically the person
he/she claims to be. A biological verification system is a unique, measurable characteristic or

trait of a human being for automatically recognized or verifying identity.

Crime tracking system allows police personnel to plan effectively for emergency response,

determine mitigation priorities, analyze historical events, and predict future events. Crime

tracking system helps identify potential suspects to increase investigators suspect base when no

leads are evident. The ability to access and process information quickly while displaying it in a

spatial and visual medium allows agencies to allocate resources quickly and more effectively. In

the ‘mission-critical’ nature of law enforcement, information about the location of a crime,

incident, suspect, or victim is often crucial to determine the manner and size of the response.

Crime tracking software helps co-ordinate vast amounts of location-based data from multiple

sources. It enables the user to layer the data and view the data most critical to the particular issue

or mission. It is used world over by police departments, both large and small, to provide

solutions for crime analysis, criminal tracking, traffic safety, community policing,

Intranet/Internet mapping, and numerous other tasks.

Crime tracking system helps crime officers determine potential crime sites by examining

complex seemingly unrelated criteria and displaying them all in an interface. It also helps them

map inmate populations, fixtures, and equipment to provide for the safety of inmates by

separating gang members, identifying high-risk or potentially violent inmates, and identifying

hazardous locations in an area. It reduces the potential for internal violence by providing better

command and control. Traditionally, these activities have been supported by paper and pen.

Police officers now have the ability to immediately generate crime report directly relevant to the

situation at hand. Police agencies collect vast amounts of data from many sources including
called-for-services, arrests, first information reports and daily report. The same information

provides a powerful decision making tool for investigators, supervisors, and administrators.

In this chapter, the study will be discussing the following sub headings; the background of study,

statement of the problem, the aim and objectives of the study, significance, scope and limitations

of the study as well as the definitions of technical terminologies used in the study.

1.2 BACKGROUND OF STUDY

Crime which is an offence that merits community condemnation and punishment, usually by way

of fine or imprisonment. This is different from a civil wrong (a tort), which is an action against

an individual that requires compensation or restitution. Criminal offences are normally

prosecuted by the State or the Commonwealth, whereas it is usually up to an individual to take a

civil action to court. It is also possible for an individual to begin criminal proceedings, but this is

very rare. Some matters, such as assault, can be both crimes and civil wrongs at the same time.

The police can prosecute for assault and the victim can take civil action to recover money (or

some other kind of compensation) for any injury suffered.

Personal identification is ever present in our daily lives. For example we often have to prove our

identity for getting access to bank accounts, entering a protected site, withdrawing cashing from

an ATM machine, logging into a computer, and so on. Conventionally, we identity ourselves and

gain access by physically carrying passports, keys, access cards or by remembering passwords,

secret codes, and Personal Identification numbers (PINs). Unfortunately, passport, keys, access

cards can be lost, duplicated, stolen, or forgotten; and password, secret codes and Personal

Identification Numbers (PINs) can easily be forgotten, compromised, shared or observed. Such

deficiencies of conventional personal identification techniques have caused major problems to all
concerned. For example, hackers often disrupt computer networks, credit card fraud is estimated

at billions dollars per year worldwide. Therefore, robust, reliable and foolproof personal

identification solutions must be sought in order to address the deficiencies of the conventional

techniques, something that could verify that someone is physically the person he/she claims to

be. A biological verification system is a unique, measurable characteristic or trait of a human

being for automatically recognized or verifying identity. By using a biological identification, the

individual verification can be done by doing the statistical analysis of biological characteristic.

This measurable characteristic can be physical, e.g. eye, face, finger image and hand, or

behavioral, e.g. signature and typing rhythm. Besides bolstering security, the systems also

enhance user convenience by alleviating the need to design and remember multiple complex

passwords.

In spite of the fact that automatic recognition systems based on fingerprints have been used by

law enforcement agencies worldwide for over 40years, biological recognition continues to

remain a very difficult pattern of recognition problem. Therefore, a proper system design is

needed to verify a person quickly and automatically (Uludag et al 2004). In this project, a

biological system is proposed for human verification i.e. authenticating the identity of an

individual. The software uses human features for verification process. Biological verification

system authorizes humans. It covers issues such as how users are given an identity, the

protection of that identity and the technologies supporting that protection, the term identity is a

more abstract concept that will always be difficult to define in way that satisfies everyone. It is a

concept that is fluid and contextual depending on a number of factors including culture. Thus the

term management is appended to “identity” to indicate that there is technological and best

practice framework around a somewhat intractable philosophical concept. Digital identity can be
interpreted as the codification of identity names and attributes of a physical instance in a way

that facilitates processing. In each organization there is normally a role or department that is

responsible for managing the scheme of digital identities of their staff and their own objects.

These represented by object identities or object identifiers. 

Historically, fingerprints have been used as the most authoritative method of authentication, but

recent court cases in the US and elsewhere have raised fundamental doubt about fingerprint

reliability. Outside of the legal system as well, fingerprint have been shown to be easily spoof

able, with British Telecom’s top computer-security official noting that “few” fingerprint readers

have not already been tricked by one spoof or another Hybrid or two-tired authentication

methods offers a compelling solution, such as private keys encrypted by fingerprint inside of a

USB device. In a computer data context, cryptographic methods have been developed which are

currently not spoof able if and only if the originator’s key has not been compromised. That the

originator (or anyone other than an attacker) knows (or doesn’t know) about a compromise is

irrelevant. It is not known whether these cryptographically based authentication methods are

provably secure since unanticipated mathematical development may make them vulnerable to

attack in future. If that were to occur, it may call into question much of the authentication in the

past. In particular, a digitally signed contract may be questioned when a new attack and the

cryptography underlying the signature is discovered.

Imo State Police command is saddled with the responsibility of eradicating crime, protecting

life/property of the masses, inculcating good moral standards, and enforcement of law. Statistics

shows that the commission receives approximately two hundred to three hundred suspects per

day ranging from rape, cybercrime, Arm rubbery, Murder and etc. These criminals are been

arraigned/prosecuted at the station or awaiting trials. These have posed a lot of stress/challenges
to the police officers due to the manual method of verifying criminals on the other hand.

Further investigation shows that sometimes the suspects stay all day/months without been tried

or verified, for instance whenever a suspect/ex-convict is arraigned in the custody for trial the

commission starts afresh to try the suspect again which is more tedious. What constitutes these

problems are; lack of automated system for verification, limited man power, and poor knowledge

of crime investigation.

It is against this background that the researcher decided to embark on this study with the aim of

designing biological verification system that can be used to reduce identified challenges in the

existing system.

The new system will provide a medium whereby statistical analysis of biological characteristic

can be used to detect a criminal, this measurable characteristic can be physical, e.g. eye, face,

finger image and hand, or behavioral, e.g. signature and typing rhythm. Besides bolstering

security, the systems also enhance user convenience by alleviating the need to design and

remember multiple complex features.

1.3STATEMENTS OF PROBLEM

Problems encountered in the existing system are as follows:

1. In the existing system the command officers pass through stress in process of crime

verification.

2. The manual process of crime verification in the existing system is prone to time wastage

3. In the existing system there is Poor storage of data in times of retrieving a suspect

information

1.4. AIM AND SPECIFIC OBJECTIVES OF STUDY


The main aim of this study the Design and Implementation of Biological Verification System for

Imo state police command. In achieving this aim the following specific objectives will be

accomplished through the design of a system

1. Reduce the amount of stress the command officers pass through during crime

verification

2. To ensure speed and accurate crime verification by using characteristic can be physical,

e.g. eye, face, finger image for verification

3. To Ensure easy retrieval of criminal record in case of loss of data

1.5 SIGNIFICANCE OF STUDY

The new system when completed and implemented will enable the commission and similar

organization to improve in their mode of operation in terms of security. Besides, the study will

serve as a reference material to subsequent researchers in related topics.

1.6 SCOPE OF STUDY

This research will only concentrate on using behavioral characteristics in crime verification for

Imo state police command

1.7 LIMITATIONS OF THE STUDY

In the course of the project work, certain constraints restrained the researcher from achieving the

set out objectives;

Time constraint: Due to tedious academic activities like practical, assignment submission/

defense and exam preparation, the researcher was unable to complete the project requirement

process.
Inadequate funds: Due to inadequate funds, the researcher was unable to purchase the sublime

editor which could be used to make the programming process faster; therefore the researcher

bought a cheaper editor which delayed the programming process

1.8 DEFINITION OF TERMS

For easier understanding of unfamiliar words used in the research work, their meanings are as

follows;

CCTV: Closed Circuit Television, a system used for broadcasting TV signals captured from

security cameras

CRIME: an action prohibited by law or a failure to act as required by law

DN: A nucleic acid molecule in the form of a twisted double strand double helix that is the major

component of chromosomes and carries genetic information.

FORENSICS – is the application of a broad spectrum of sciences and technologies to

investigate and establish facts of interest in relation to criminal of civil law.

INVESTIGATION: an examination or inquiry into something, especially a detailed one that is

undertaken officially, or the act of undertaking an examination.

POLICE: a civil organization whose members are given special legal powers by the government

and whose task is to maintain public order and to solve and prevent crimes

RISK: a risk is a possible event which could cause a loss. 

SECURITY: security is the condition of being protected against or loss

SURVEILANCE: continual observation of a person or group, especially one suspected of doing

something illegal

THREAT: threat is a method of triggering a risk event that is dangerous.

VULNERABILITY: a weakness in a target that can potentially

You might also like