Professional Documents
Culture Documents
INVESTIGATION IN NIGERIA
ABSTRACT
This paper analyses the concept of identity database, identity management
as well as its effects in crime investigation in Nigeria. Pieces of evidence have continued
to emerge, demonstrating the extensive efficiency and effectiveness of identity database
in assisting criminal investigations around the world. Therefore, the present study aimed
to determine the awareness level on the prominent role of identity Database on Crime
Investigation in Nigeria. Data generation technique for the study was through the
content analysis of secondary data from books, journals, magazines and web resources.
Concepts related to identity, identity database, identity management, interoperability,
crime, crime investigation, and law enforcement are amply explained in order to polish
their meanings for better comprehension. The study reveals that there is a chaotic
scenario of identity management as Nigeria has suffered great losses through many
forms of economic and financial crimes, human trafficking, and insecurity including
insurgency, militancy and terrorism, because at present, it is difficult to ascertain the
identity of the perpetrators of such security breaches. The study further highlights the
various advantages of identity database, and its positive effect in crime investigation in
Nigeria. The conclusion drawn from the study is that there is need to harmonize identity
related data from public institution that collect such data in order to reduce identity
crisis, aid the law enforcement agencies in crime investigation as well as curbing crime,
guarantee interoperability and derive the full benefits which identity database offers.
KEYWORDS:
Identity, Identity database, Identity management, Interoperability, Crime, crime
investigation, Law enforcement.
INTRODUCTION
Identity can be defined as the name or essential character that identifies somebody
or something; the fact or condition of being the same or exactly alike. Moreover, it can be
said to be the set of the set of characteristics that somebody recognizes as belonging
uniquely to himself or herself and constituting his or her individual personality for life.
Landahl (2007) defines identity as ‘’the collective aspect of the set of characteristics by
Identity management on the other hand, implies a set of data management systems and
procedures that are used to realize the desired outcomes related to identity (NIMC, 2007).
There is a consensus that poor identity management remains one of the greatest
obstacles to development in many nations, particularly the developing ones (Pang & Lips,
2008; Adjei, 2013; Ayamba, 2016). With particular reference to Nigeria, lack of an
effective, organized and centralized identity management system has been recognized as
election irregularities, among others. Thus, it is widely believed that ineffective identity
investigation. The purpose of this exposition, is therefore to begin the discussion of how
intended to examine the scope and frame the elements of potential solution.
DEFINING THE CHALLENGES
The identity management capability gap for national security as well as crime
investigation is a pervasive but solvable problem. The key question remains how advantageous is
it to have a single national system of identifying citizens in order to achieve legitimate business
of government namely: peace and security, law enforcement, intelligence, social and economic
development, etc. At the moment, Nigeria cannot boast of a central national identity repository
and the complimentary system to sustain secure and reliable identity verification and
authentication. That is why it is easy for some Nigerians to obtain identity cards with different
names, which often result in high incidence of identity fraud. To make matters worse,
internal revenue service (FIRS), National population commission (NPC), National Health
insurance scheme (NHIS), Independent national electoral commission (INEC), Federal road
safety commission (FRSC), just to mention a few, hold databases with no practical integrated
access and data sharing option in place to enhance service delivery nor facilitate law enforcement
and security. Some of these institutions have introduced smart card technology into their
schemes. Thus, a reliable system for verification and secure authentication of an individual’s
Unarguably, Nigeria has suffered great losses through many forms of economic and
financial crimes, human trafficking, and insecurity including insurgency, militancy and
security breaches. On November 14, 2016, Interpol, an international law enforcement institution,
agreed to connect the Economic and financial crime commission (EFCC), National Drug
enforcement agency (NDLEA), Nigeria immigration service (NIS), Nigeria customs service
(NCS), National agency for the prohibition of trafficking persons (NAPTIP), National agency for
food, drug Administration control (NAFDAC) to its database tool known as I-24/7. The database
can be used for tracking wanted persons, stolen vehicles, artifacts, missing persons and
The National Identity Management Commission was established in 2007 to not only
provide General Multi-Purpose Card otherwise known as national identity card for all Nigerians,
but to most importantly, provide a centralized national identity database. With such national
identity management system in place, it should be easy for law enforcers to identify perpetrators
of crimes, law breakers and those that breach peace and security in the state. But, most Nigerians
and legal residents that have enrolled in the scheme still do not have proper documentation.
Rather, they carry about different forms of identifications like voter’s card, driver’s license,
international passport, school identity card, work identity card and so on, which are indicative of
disparate databases and unorganized identity ecosystem. Even recently, the National Identity
Management Commission contested the legal right of the Bank Verification Number (BVN)
program in Nigeria to register citizens using biometric information, claiming the dominant role
Thus, if Interpol’s move, for example, to link Nigeria’s security and law enforcement
agencies to its database will have maximum effect, our own identity management problem which
is that of lack of a central identity (data) repository must first be dealt with.
METHODOLOGY
Data generation technique for the study was through the content analysis of secondary
data from books, journals, magazines and web resources. Concepts related to identity, identity
management, interoperability and law enforcement are amply explained in order to polish their
meanings for better comprehension. Hence, the study is purely exploratory and the analysis
qualitatively done.
LITERATURE REVIEW
individual shares, or is presumed to share, with others on the premise of which one group may be
differentiated from others. Identity is a group idea that depends on characteristics which make
people members of a group; such attributes likewise give reactions to the inquiry, "Who am I?"
Identity has a blend of ethnic, religious, gender, class and different layers all of which allude to
the same individual either in self-definition or as characterized by others. Thus, within the
context of this study, identity can be defined as the arrangement of qualities by which a man or
thing is absolutely distinct or known. It can likewise be said to be the mindfulness that an
In his own contribution, Thuan (2007) defines identity management as "the procedure,
strategies and innovations used to oversee the complete lifecycle of client personalities over a
framework and to control client access to the framework assets by associating their rights and
restrictions.” Within the context of this work, identity management can be said to be an
administrative framework that is concerned with identifying people in a system (for example, a
country, a system, or an enterprise) and controlling their access to resources in that system.
Wikipedia (2015) sees law enforcement as any framework by which a few individuals
from society act in a way to implement the law by finding, preventing, rehabilitating, or
sanctioning individuals who disregard the norms and standards of that society. Law enforcement
agencies are institutions set up by law to maintain internal security of the state (Ehindero, 2006).
Within the context of this work, therefore, law enforcement refers to the counteractive action and
debilitate a wide variety of criminal and non-criminal infringements of norms and standards,
Wikipedia (2022) also defines crime as an unlawful act punishable by a state or other
authority. The term crime does not, in modern criminal law have any simple and universally
accepted definition. The most popular view is that crime is a category created by law; in order
words, something is a crime if declared as such by relevant and applicable law. Another
proposed definition is that a crime or offence (or criminal offence) is an act harmful not only to
some individual but also to a community, society, or the state (‘’a public wrong’’). Such acts are
Criminal investigation revolves around the study of facts that are used to inform criminal
evidence collection and preservation, and various methods of investigation. Modern day criminal
forensic science. The symbiotic relationship between identity management, Identity database and
criminal investigation cannot be undermined; and there has been growing global sensitivity and
concern with regards to the impact of identity management on national security as well as
criminal investigation. Hence, countries across the globe have adopted different approaches to
set up their identity management system. Al-Khouri (2012) asserts that the rationale behind such
initiatives is to enhance the identity authentication and validation mechanisms in order to reduce
crime, combat terrorism, eliminate identity theft, control immigration, curtail economic fraud,
and provide better service to both citizens and legal residents. The type of identification and the
purposes for which it is used varies from country to country. While some countries have plastic
national identity cards, others simply have electronic national identification number that is
usually issued to citizens and legal immigrants after completion of biometric and demographic
registration processes.
Generally, developed countries tend to use identity management schemes for surveillance
and security to a great extent than developing countries (Gelb & Clark, 2013). Security
challenges, nevertheless, drive developing countries into the creation and application of identity
management systems (Identity database). Indonesia, Malaysia and Kenya, to illustrate, cite
(Kenyatta, 2015; King, 2012). Uganda’s National Security and Information Service states that
one of the key services to be added to its forthcoming national identity is “immigration services,”
including border crossings (National Security Information System, 2015). Moroccan national
identity card carries security features that are aimed at “control of migration flows” (Rutherford,
2008). Tanzania’s new identity management system is geared towards smoother coordination
across police, immigration authorities, the country’s revenue service, and other government
agencies by allowing them “to share data and differentiate between Tanzanians, migrants and
refugees” (Makoye, 2013). Instances of national identity cards that double as passports are due to
agreement between East African Community (EAC) member states to allow international travel
among member states. Hence, citizens of Kenya, Tanzania, and Uganda can all travel between
the five-member EAC using only their respective national identity cards. Lastly, as governments
seek to cut down on the ability of extremists and criminals to use cell phones to conduct illegal
and nefarious activities like kidnapping, financial scams, money laundering and so on, some
have turned to using identity cards for mobile phone and SIM registrations (Hickock, 2013). In
Bangladesh, Ghana, Kenya, Pakistan, and Peru, national identity card is now required in order to
In Nigeria, the National Identification Number (NIN) is a must have for every citizen of
sixteen years and above and legal residents who have a stay period of not less than two years. A
lot of other information like home address, next of kin, phone number, and date of birth, place of
birth, parent’s information, DNA information, criminal record, height, marital status and even
Hence, a complete life history of a person can be pulled from the computer (by
authorized government officials) using his national identification number (Omoniyi, 2012).
Although numerous studies have been conducted on the impact of identity management program
across the world (example Al-Khouri (2012); Anderson, Biscaye, Coney, Ho, Hutchinson,
Neidhardt & Reynolds (2016); Ayamba (2016)), researchers are just beginning to focus attention
on its role in effective public administration, with special reference to the law enforcement
context. Indeed, this work represents the first serious attempt to do so in the Nigerian context.
FUNCTIONS LINKED TO IDENTITY DATABASE: ITS IMPLICATION
As long as we persist with a 17th century notion of national sovereignty, an 18th century
judiciary and 19th century law enforcement, the 21st century will belong to organized crime.’’
(Jeffrey Robinson)
In recent times, the admissibility of DNA evidence is widely used in numerous courts
around the world. Its underpinning science is consistent, reproducible, accurate, and founded on
authenticated technology and techniques for the generation, comparison, and interpretation of a
miscarriages of justice and deterring offenders from further criminal activity. To achieve a
momentous decrease in the rate at which crimes are committed, and credible detection rates, a
switch from the traditional ‘reactive’ model of crime investigation to a modern model of
investigation is vital. The use of DNA to trace crime suspects has been a prominent improvement
in policing, and when DNA databases are efficiently put to use, it overwhelmingly aids the
Central to effective secondary uses of identity information for other functions such as law
regulatory framework that encourages institutional collaboration, clear policies and guidelines
that provide assurance of citizens' privacy and cost effective application systems (Adjei, 2013).
National identity management programmes have been purposed to serve a wide range of
functions, including financial services, law enforcement, health, and agriculture. In addition,
identity management programmes can be valuable in elections, facilitating government social
transfers, surveillance and security, aiding civil service administration, and supporting other
confidence and strengthens national security. It helps tackle people trafficking, illegal working
and immigration. It also helps protect citizens from the risk of identity fraud, and ensures easier
and more convenient access to public services. Under Nigeria’s national identity management
system, the National Identity Management commission (NIMC) is expected to create, operate
and manage the national identity database which will serve as a central source of identity
stakeholders and strategic partners like the Immigration, Road Safety, Customs, Central Bank,
Pension Commission, Population Commission, Electoral Commission, Police, and several others.
The national identity database is based on the use of fingerprint biometrics to uniquely and
unambiguously identify each individual and thereafter issue a unique identification number to
each verified individual, which would be common across the other databases. Through this
scheme, other databases would be harmonized with the national identity database to achieve an
integrated identity-base system (NIMC, 2015). For an institution like the Federal Road Safety
Commission (FRSC), harmonization of its database with NIMC’s database could bring about
improvement in road safety by keeping unauthorized drivers off the road. This is because
reliance on a central national identity infrastructure will facilitate easy verification for
uniqueness of the applicant in the database and by so doing reduce turn-around time needed for
the processing of licenses. It can also guarantee the availability of traffic violation history to all
announced that from January 2018, the National Identification Number (NIN) will be a
mandatory requirement or perquisite for application for international passport (The Nation
Newspaper, 2017). Persons without NIN will not be issued Nigerian passports from the effective
date (same applies to renewals). Any foreigner, non-Nigerian (legal) resident in Nigeria will not
get his permit renewed until he has a NIN. To achieve this, National Identification Numbers
further facilitate the job of the Nigeria Immigration Service in the following ways:
i. Fast and reliable clearance on border checks which will in turn eliminate bottleneck
situations.
Prison managers like the Nigeria Prisons Service could derive the following benefits from
vi. Instant access to information about offender population and facility use.
vii. Provision of intelligent information used to identify security risks and criminal
activities.
The Police as a major law enforcement institution in Nigeria charged with the
duty to detect and investigate crime stands to gain a lot from a central national identity
In countries like the United States of America and the United Kingdom, the
security agencies deploy forensic approach in investigations and this usually produces
good results, no matter how long it takes. However, this approach to crime fighting is
only possible where there are available biometric records that can be readily pulled from
a repository or database. Most crimes are committed with the aid of telephone calls, and
these calls are made at locations and with the aid of communication masts. Each caller
has an identity, time and duration of call and each mast is configured with a unique
identification stating their location. With the centrality of citizens’ identity data, the
police can easily collaborate with NIMC and the mobile network service providers in
order to dig deep into crimes, identify the associates, apprehend them, prosecute them
The need for implementation of a robust criminal profiling network in our polity
have been brought to the fore on several occasion. The most recent happening occurred in
the infamous BRT murder case of one Ayanwole oluwabamise a 22 year old lady whose
killer was at large, with the aid of criminal profiling and forensic background check of
public transport drivers through National identity management commission (NIMC) the
Nigeria to establish and verify a person’s identity with greater accuracy. This has
increased benefits for national security, law enforcement, border management and service
delivery outcomes. The utility of biometric systems can be enhanced through the ability,
where reasonably necessary, to share biometric data between agencies and to verify data
• improving Nigeria’s identity security by establishing unique identity records that are
more stable, more durable and less susceptible to interference or duplication than those
• combating criminal and other national security threats by enhancing the ability of law
back of the envelope estimated that the marginal cost of averting each crime suggests that
DNA databases are considerably more economical relative to other common law
enforcement tools.
CONCLUSION
This paper has essayed an overarching view of identity database research, setting out
distinctive perspectives of identity management systems that facilitate crime investigation, law
enforcement, security and surveillance. From all indications and from whichever perspective one
looks at it, there is in Nigeria a scenario of chaotic identity management where each institution
that collects identity related data manages its own, and there is no effective synergy to coordinate
the identity management platforms which are scattered all over. This, arguably, aggravates crime
commission as well as causes delay in the criminal justice system. In light of this, it became very
necessary to make some recommendations to improve the knowledge and support the
Based on the findings of the importance of having an effective and reliable identity
communities on the advantages of registering for NIN as well as the effective role it
ii. Personal information provided by individuals should only be used for legitimate and
specified/approved purposes.
iii. Given the concerns about possible abuse or misuse of information by security
to what they may need for specific purposes at a particular time. The security
agencies should also be enjoined to use the information for specific purposes only.
iv. There should be enlightenment for security personnel about the need to respect
privacy of individuals and not to misuse or abuse the information available to them.
vi. Only specified responsible officers should have access to the information database.
vii. There should be adequate encryption of the information in the database and protecting
privacy, with appropriate sanctions for breaches, to guide the operations and
activities.
REFERENCES
Anderson, C.L, Biscaye, P., Coney, S., Ho, E., Hutchinson, B., Neidhardt, M. and
Nigeria. A Thesis Submitted in Partial Fulfillment of the Requirement for the Degree
and Implementation. International Journal for Humanities and Social Science Studies,
3(1), 2287.
DeLoine, W. H. and McLean, E. R., (2003). The DeLoine and McLean Model of
DeLoine, W.H. and McLean, E.R. (2008). Measuring Information Systems Success:
Ehindero, S. (2006). The Role of the Police as Law Enforcement Agency in the
Promotion and Sustainability of Participatory Democracy and the Rule of Law: The
Journey So Far. Being paper presented during Inspector General of Police’s visit to
Kwara State Police Command for a workshop on Police and Participatory Democracy
Revolution. CGD Working Paper 315. Washington, DC: Center for Global
http://www.cgdev.org/content/publications/detail/1426862.
Geertz, C. (1963). Old Societies and New States: The Quest for Modernity in Asia
Register (NPF) and Governance. The Centre for Internet & Society.
http://allafrica.com/stories/201503111566.html.
advancedadopter-of-eidcredentials.
Landahl, D. (2007). Identity Crisis: Defining the Problem and Framing a Solution for
http://www.trust.org/item/20130227092500-jm6av/.
http://www.nimc.gov.ng/sites/default/files/MANDATORY%20USE%20OF %20NIN
%20Draft0.pdf
NSIS (2015). National Security Information System, Uganda. Retrieved 20th July,
43-48.
University of Wellington.
Schaupp, L. C., Fan, W. and Belanger, F. (2006) “Determining success for different
The Nation Newspaper (2017). Federal Government makes NIN mandatory for
http://thenationonlineng.net/fg-makes-nin-mandatory-passportissuance-2018/
Thuan, V. D. (2007). The Ambiguity of Identity. Telektronikk. 103(2), 3-4.
Udunze, B. (2015). $55m Biometric Budget: CBN, NIMC at war over control of
BVN scheme. The Sun Newspaper. Retrieved 10th October, 2017 from
http://sunnewsonline.com/new/55m-biometric-budget-cbn-nimc-atwarover-control-
of-bvn-scheme/>
Wang, T.V. (2003). The Debate over a National Identification Card. The Century
Foundation Homeland Security Project, Issue in Brief. Retrieved 14th October, 2017
from http://tcf.org/publications/pdfs/pb284/National_ID_Card.pdf.