You are on page 1of 21

IDENTITY DATABASE AND ITS IMPLICATION IN CRIME

INVESTIGATION IN NIGERIA

ABSTRACT
This paper analyses the concept of identity database, identity management
as well as its effects in crime investigation in Nigeria. Pieces of evidence have continued
to emerge, demonstrating the extensive efficiency and effectiveness of identity database
in assisting criminal investigations around the world. Therefore, the present study aimed
to determine the awareness level on the prominent role of identity Database on Crime
Investigation in Nigeria. Data generation technique for the study was through the
content analysis of secondary data from books, journals, magazines and web resources.
Concepts related to identity, identity database, identity management, interoperability,
crime, crime investigation, and law enforcement are amply explained in order to polish
their meanings for better comprehension. The study reveals that there is a chaotic
scenario of identity management as Nigeria has suffered great losses through many
forms of economic and financial crimes, human trafficking, and insecurity including
insurgency, militancy and terrorism, because at present, it is difficult to ascertain the
identity of the perpetrators of such security breaches. The study further highlights the
various advantages of identity database, and its positive effect in crime investigation in
Nigeria. The conclusion drawn from the study is that there is need to harmonize identity
related data from public institution that collect such data in order to reduce identity
crisis, aid the law enforcement agencies in crime investigation as well as curbing crime,
guarantee interoperability and derive the full benefits which identity database offers.

KEYWORDS:
Identity, Identity database, Identity management, Interoperability, Crime, crime
investigation, Law enforcement.
INTRODUCTION

Identity can be defined as the name or essential character that identifies somebody

or something; the fact or condition of being the same or exactly alike. Moreover, it can be

said to be the set of the set of characteristics that somebody recognizes as belonging

uniquely to himself or herself and constituting his or her individual personality for life.

Landahl (2007) defines identity as ‘’the collective aspect of the set of characteristics by

which a thing is definitively recognized or known.’’ A person identity is who he is.

Identity management on the other hand, implies a set of data management systems and

practices that serves to increase confidence in the identity of individuals where

appropriate. It is also said to be a set of principles, practices, policies, processes and

procedures that are used to realize the desired outcomes related to identity (NIMC, 2007).

There is a consensus that poor identity management remains one of the greatest

obstacles to development in many nations, particularly the developing ones (Pang & Lips,

2008; Adjei, 2013; Ayamba, 2016). With particular reference to Nigeria, lack of an

effective, organized and centralized identity management system has been recognized as

a major cause of crime, cases of impersonation, acts of terrorism, ethno-religious crises,

poverty, illegal immigration, financial transaction fraud, ghost workers syndrome,

election irregularities, among others. Thus, it is widely believed that ineffective identity

management as well as absence of an effective organized database is a serious security

challenge in Nigeria. It is further perceived to have caused various loopholes in crime

investigation. The purpose of this exposition, is therefore to begin the discussion of how

identity database can enhance security, particularly law enforcement in Nigeria. It is

intended to examine the scope and frame the elements of potential solution.
DEFINING THE CHALLENGES

The identity management capability gap for national security as well as crime

investigation is a pervasive but solvable problem. The key question remains how advantageous is

it to have a single national system of identifying citizens in order to achieve legitimate business

of government namely: peace and security, law enforcement, intelligence, social and economic

development, etc. At the moment, Nigeria cannot boast of a central national identity repository

and the complimentary system to sustain secure and reliable identity verification and

authentication. That is why it is easy for some Nigerians to obtain identity cards with different

names, which often result in high incidence of identity fraud. To make matters worse,

government agencies notably National pension commission (PENCOM), Federal board of

internal revenue service (FIRS), National population commission (NPC), National Health

insurance scheme (NHIS), Independent national electoral commission (INEC), Federal road

safety commission (FRSC), just to mention a few, hold databases with no practical integrated

access and data sharing option in place to enhance service delivery nor facilitate law enforcement

and security. Some of these institutions have introduced smart card technology into their

schemes. Thus, a reliable system for verification and secure authentication of an individual’s

identity has not been established (NIMC, 2007).

Unarguably, Nigeria has suffered great losses through many forms of economic and

financial crimes, human trafficking, and insecurity including insurgency, militancy and

terrorism, because at present, it is difficult to ascertain the identity of perpetrators of such

security breaches. On November 14, 2016, Interpol, an international law enforcement institution,

agreed to connect the Economic and financial crime commission (EFCC), National Drug
enforcement agency (NDLEA), Nigeria immigration service (NIS), Nigeria customs service

(NCS), National agency for the prohibition of trafficking persons (NAPTIP), National agency for

food, drug Administration control (NAFDAC) to its database tool known as I-24/7. The database

can be used for tracking wanted persons, stolen vehicles, artifacts, missing persons and

transnational criminals. Nigeria has been a member of Interpol since 1959.

The National Identity Management Commission was established in 2007 to not only

provide General Multi-Purpose Card otherwise known as national identity card for all Nigerians,

but to most importantly, provide a centralized national identity database. With such national

identity management system in place, it should be easy for law enforcers to identify perpetrators

of crimes, law breakers and those that breach peace and security in the state. But, most Nigerians

and legal residents that have enrolled in the scheme still do not have proper documentation.

Rather, they carry about different forms of identifications like voter’s card, driver’s license,

international passport, school identity card, work identity card and so on, which are indicative of

disparate databases and unorganized identity ecosystem. Even recently, the National Identity

Management Commission contested the legal right of the Bank Verification Number (BVN)

program in Nigeria to register citizens using biometric information, claiming the dominant role

in identification matters. An agreement was eventually reached to harmonize the databases.

Thus, if Interpol’s move, for example, to link Nigeria’s security and law enforcement

agencies to its database will have maximum effect, our own identity management problem which

is that of lack of a central identity (data) repository must first be dealt with.
METHODOLOGY

Data generation technique for the study was through the content analysis of secondary

data from books, journals, magazines and web resources. Concepts related to identity, identity

management, interoperability and law enforcement are amply explained in order to polish their

meanings for better comprehension. Hence, the study is purely exploratory and the analysis

qualitatively done.

LITERATURE REVIEW

Alubo (2009) asserts that identity is a blend of socio-cultural qualities which an

individual shares, or is presumed to share, with others on the premise of which one group may be

differentiated from others. Identity is a group idea that depends on characteristics which make

people members of a group; such attributes likewise give reactions to the inquiry, "Who am I?"

Identity has a blend of ethnic, religious, gender, class and different layers all of which allude to

the same individual either in self-definition or as characterized by others. Thus, within the

context of this study, identity can be defined as the arrangement of qualities by which a man or

thing is absolutely distinct or known. It can likewise be said to be the mindfulness that an

individual or group has of being an unmistakable, persisting entity.

In his own contribution, Thuan (2007) defines identity management as "the procedure,

strategies and innovations used to oversee the complete lifecycle of client personalities over a

framework and to control client access to the framework assets by associating their rights and

restrictions.” Within the context of this work, identity management can be said to be an
administrative framework that is concerned with identifying people in a system (for example, a

country, a system, or an enterprise) and controlling their access to resources in that system.

Wikipedia (2015) sees law enforcement as any framework by which a few individuals

from society act in a way to implement the law by finding, preventing, rehabilitating, or

sanctioning individuals who disregard the norms and standards of that society. Law enforcement

agencies are institutions set up by law to maintain internal security of the state (Ehindero, 2006).

Within the context of this work, therefore, law enforcement refers to the counteractive action and

discipline of wrongdoings; furthermore, those associations or organizations that exist to

debilitate a wide variety of criminal and non-criminal infringements of norms and standards,

effected through the imposition of penalty or punishment.

Wikipedia (2022) also defines crime as an unlawful act punishable by a state or other

authority. The term crime does not, in modern criminal law have any simple and universally

accepted definition. The most popular view is that crime is a category created by law; in order

words, something is a crime if declared as such by relevant and applicable law. Another

proposed definition is that a crime or offence (or criminal offence) is an act harmful not only to

some individual but also to a community, society, or the state (‘’a public wrong’’). Such acts are

forbidden and punishable by law.

Criminal investigation revolves around the study of facts that are used to inform criminal

trials. A complete criminal investigation can include searching, interviews, interrogations,

evidence collection and preservation, and various methods of investigation. Modern day criminal

investigations commonly employ many modern scientific techniques known collectively as

forensic science. The symbiotic relationship between identity management, Identity database and

criminal investigation cannot be undermined; and there has been growing global sensitivity and
concern with regards to the impact of identity management on national security as well as

criminal investigation. Hence, countries across the globe have adopted different approaches to

set up their identity management system. Al-Khouri (2012) asserts that the rationale behind such

initiatives is to enhance the identity authentication and validation mechanisms in order to reduce

crime, combat terrorism, eliminate identity theft, control immigration, curtail economic fraud,

and provide better service to both citizens and legal residents. The type of identification and the

purposes for which it is used varies from country to country. While some countries have plastic

national identity cards, others simply have electronic national identification number that is

usually issued to citizens and legal immigrants after completion of biometric and demographic

registration processes.

Generally, developed countries tend to use identity management schemes for surveillance

and security to a great extent than developing countries (Gelb & Clark, 2013). Security

challenges, nevertheless, drive developing countries into the creation and application of identity

management systems (Identity database). Indonesia, Malaysia and Kenya, to illustrate, cite

terrorism as a motivation behind the development of their identity management programs

(Kenyatta, 2015; King, 2012). Uganda’s National Security and Information Service states that

one of the key services to be added to its forthcoming national identity is “immigration services,”

including border crossings (National Security Information System, 2015). Moroccan national

identity card carries security features that are aimed at “control of migration flows” (Rutherford,

2008). Tanzania’s new identity management system is geared towards smoother coordination

across police, immigration authorities, the country’s revenue service, and other government

agencies by allowing them “to share data and differentiate between Tanzanians, migrants and

refugees” (Makoye, 2013). Instances of national identity cards that double as passports are due to
agreement between East African Community (EAC) member states to allow international travel

among member states. Hence, citizens of Kenya, Tanzania, and Uganda can all travel between

the five-member EAC using only their respective national identity cards. Lastly, as governments

seek to cut down on the ability of extremists and criminals to use cell phones to conduct illegal

and nefarious activities like kidnapping, financial scams, money laundering and so on, some

have turned to using identity cards for mobile phone and SIM registrations (Hickock, 2013). In

Bangladesh, Ghana, Kenya, Pakistan, and Peru, national identity card is now required in order to

buy a cell phone or swap SIM cards.

In Nigeria, the National Identification Number (NIN) is a must have for every citizen of

sixteen years and above and legal residents who have a stay period of not less than two years. A

lot of other information like home address, next of kin, phone number, and date of birth, place of

birth, parent’s information, DNA information, criminal record, height, marital status and even

employment record of people are tied to the number.

Hence, a complete life history of a person can be pulled from the computer (by

authorized government officials) using his national identification number (Omoniyi, 2012).

Although numerous studies have been conducted on the impact of identity management program

across the world (example Al-Khouri (2012); Anderson, Biscaye, Coney, Ho, Hutchinson,

Neidhardt & Reynolds (2016); Ayamba (2016)), researchers are just beginning to focus attention

on its role in effective public administration, with special reference to the law enforcement

context. Indeed, this work represents the first serious attempt to do so in the Nigerian context.
FUNCTIONS LINKED TO IDENTITY DATABASE: ITS IMPLICATION

IN CRIME INVESTIGATION, LAW ENFORCEMENT AND NATIONAL

SECURITY PUTTING NIGERIA INTO CONTEXT.

As long as we persist with a 17th century notion of national sovereignty, an 18th century

judiciary and 19th century law enforcement, the 21st century will belong to organized crime.’’

(Jeffrey Robinson)

In recent times, the admissibility of DNA evidence is widely used in numerous courts

around the world. Its underpinning science is consistent, reproducible, accurate, and founded on

authenticated technology and techniques for the generation, comparison, and interpretation of a

DNA profile. Identity databases have proved to be an indispensable tool in preventing

miscarriages of justice and deterring offenders from further criminal activity. To achieve a

momentous decrease in the rate at which crimes are committed, and credible detection rates, a

switch from the traditional ‘reactive’ model of crime investigation to a modern model of

investigation is vital. The use of DNA to trace crime suspects has been a prominent improvement

in policing, and when DNA databases are efficiently put to use, it overwhelmingly aids the

conviction of culprits and exoneration of the innocent.

Central to effective secondary uses of identity information for other functions such as law

enforcement, national security and surveillance is an efficient civic registration system, a

regulatory framework that encourages institutional collaboration, clear policies and guidelines

that provide assurance of citizens' privacy and cost effective application systems (Adjei, 2013).

National identity management programmes have been purposed to serve a wide range of

functions, including financial services, law enforcement, health, and agriculture. In addition,
identity management programmes can be valuable in elections, facilitating government social

transfers, surveillance and security, aiding civil service administration, and supporting other

functions such as travelling across jurisdictions (International Telecommunications Union,

2016). Generally, a sound national identity management system improves public

confidence and strengthens national security. It helps tackle people trafficking, illegal working

and immigration. It also helps protect citizens from the risk of identity fraud, and ensures easier

and more convenient access to public services. Under Nigeria’s national identity management

system, the National Identity Management commission (NIMC) is expected to create, operate

and manage the national identity database which will serve as a central source of identity

verification and authentication. The verification infrastructure will be available to the

stakeholders and strategic partners like the Immigration, Road Safety, Customs, Central Bank,

Pension Commission, Population Commission, Electoral Commission, Police, and several others.

The national identity database is based on the use of fingerprint biometrics to uniquely and

unambiguously identify each individual and thereafter issue a unique identification number to

each verified individual, which would be common across the other databases. Through this

scheme, other databases would be harmonized with the national identity database to achieve an

integrated identity-base system (NIMC, 2015). For an institution like the Federal Road Safety

Commission (FRSC), harmonization of its database with NIMC’s database could bring about

improvement in road safety by keeping unauthorized drivers off the road. This is because

reliance on a central national identity infrastructure will facilitate easy verification for

uniqueness of the applicant in the database and by so doing reduce turn-around time needed for

the processing of licenses. It can also guarantee the availability of traffic violation history to all

relevant authorities, thereby increasing driver accountability.


The Nigeria Immigration Service on August 1st, 2017

announced that from January 2018, the National Identification Number (NIN) will be a

mandatory requirement or perquisite for application for international passport (The Nation

Newspaper, 2017). Persons without NIN will not be issued Nigerian passports from the effective

date (same applies to renewals). Any foreigner, non-Nigerian (legal) resident in Nigeria will not

get his permit renewed until he has a NIN. To achieve this, National Identification Numbers

(NIN) and passport numbers will be harmonized.

A central national identity database could

further facilitate the job of the Nigeria Immigration Service in the following ways:

i. Fast and reliable clearance on border checks which will in turn eliminate bottleneck

situations.

ii. Reduction in trans-border crime and illegal immigration.

iii. It guarantees better security screening.

iv. It facilitates quick processing of travel documents for citizens.

v. It can help eliminate fraudulent application and duplicate passport issuance.

Prison managers like the Nigeria Prisons Service could derive the following benefits from

harmonizing its biometric data with the national identity database:

i. Elimination of duplicate booking entries in prisons.

ii. Elimination of identity fraud.

iii. Identification of the inmates’ visitors.

iv. Tracking of inmates’ movement while in prison and on parole.


v. Safeguarding of the public by ensuring the release or freeing of the right person.

vi. Instant access to information about offender population and facility use.

vii. Provision of intelligent information used to identify security risks and criminal

activities.

The Police as a major law enforcement institution in Nigeria charged with the

duty to detect and investigate crime stands to gain a lot from a central national identity

database such as the repository developed by the National Identity Management

Commission, because such a system results in unique identification of a person or

persons in a particular place and time.

In countries like the United States of America and the United Kingdom, the

security agencies deploy forensic approach in investigations and this usually produces

good results, no matter how long it takes. However, this approach to crime fighting is

only possible where there are available biometric records that can be readily pulled from

a repository or database. Most crimes are committed with the aid of telephone calls, and

these calls are made at locations and with the aid of communication masts. Each caller

has an identity, time and duration of call and each mast is configured with a unique

identification stating their location. With the centrality of citizens’ identity data, the

police can easily collaborate with NIMC and the mobile network service providers in
order to dig deep into crimes, identify the associates, apprehend them, prosecute them

and bring them to justice.

The need for implementation of a robust criminal profiling network in our polity

have been brought to the fore on several occasion. The most recent happening occurred in

the infamous BRT murder case of one Ayanwole oluwabamise a 22 year old lady whose

killer was at large, with the aid of criminal profiling and forensic background check of

public transport drivers through National identity management commission (NIMC) the

suspect was identified and arrested.

Thus, biometric systems are currently used by a range of government agencies in

Nigeria to establish and verify a person’s identity with greater accuracy. This has

increased benefits for national security, law enforcement, border management and service

delivery outcomes. The utility of biometric systems can be enhanced through the ability,

where reasonably necessary, to share biometric data between agencies and to verify data

against other agency holdings. Enhancing the interoperability of biometric systems

between government agencies in Nigeria has a range of potential benefits, including:

• improving Nigeria’s identity security by establishing unique identity records that are

more stable, more durable and less susceptible to interference or duplication than those

based on biographical or other forms of personal information;

• combating criminal and other national security threats by enhancing the ability of law

enforcement agencies to identify persons of interest;


• facilitating greater online service delivery by providing agencies with increased

confidence in enrolment and authentication processes; and

• generating operational or cost efficiencies through sharing information and expertise in

the development and implementation of biometric systems, including developing

standards, systems evaluation, capability development and joint procurement.

In the same light, forensic identity databases constitute a central investigative

resource in modern-day criminal justice systems. According to Jakovsi, et al. (2017),

back of the envelope estimated that the marginal cost of averting each crime suggests that

DNA databases are considerably more economical relative to other common law

enforcement tools.

CONCLUSION

This paper has essayed an overarching view of identity database research, setting out

distinctive perspectives of identity management systems that facilitate crime investigation, law

enforcement, security and surveillance. From all indications and from whichever perspective one

looks at it, there is in Nigeria a scenario of chaotic identity management where each institution

that collects identity related data manages its own, and there is no effective synergy to coordinate

the identity management platforms which are scattered all over. This, arguably, aggravates crime

commission as well as causes delay in the criminal justice system. In light of this, it became very

necessary to make some recommendations to improve the knowledge and support the

establishment of a reliable identity database for criminal investigation in Nigeria.


RECOMMENDATION

Based on the findings of the importance of having an effective and reliable identity

database system in Nigeria, the following recommendations were made:

i. There should be enlightenment campaigns at all levels, especially in rural

communities on the advantages of registering for NIN as well as the effective role it

plays in combatting crime in the society.

ii. Personal information provided by individuals should only be used for legitimate and

specified/approved purposes.

iii. Given the concerns about possible abuse or misuse of information by security

agencies, access to information in the database by security agencies should be limited

to what they may need for specific purposes at a particular time. The security

agencies should also be enjoined to use the information for specific purposes only.

iv. There should be enlightenment for security personnel about the need to respect

privacy of individuals and not to misuse or abuse the information available to them.

v. There should be limitation of institutions/agencies that may have access to personally

identifiable information in the database.

vi. Only specified responsible officers should have access to the information database.

vii. There should be adequate encryption of the information in the database and protecting

the database with password.


viii. NIMC should, in collaboration with other stakeholders, establish standards of

privacy, with appropriate sanctions for breaches, to guide the operations and

activities.

REFERENCES

Adjei, J. K. (2013). A Case for Implementation of Citizen Centric National Identity

Management Systems: Crafting a Trusted National Identity Management Policy. (1st

ed.) Institute for Electronic System, Aalborg University.

Al-Khouri, A. (2012). E-voting in United Arab Emirates Federal National Council

Elections. Information and Knowledge Management Journal, 2(6), 25-84.

Anderson, C.L, Biscaye, P., Coney, S., Ho, E., Hutchinson, B., Neidhardt, M. and

Reynolds, T. (2016). Review of National Identity Programmes. Evans School of

Public Policy Analysis and Research, University of Washington. Retrieved 18 TH

August, 2017 from https://docgo.org/revie-of-nationalidentity-programs

Ayamba, I.A. (2016). An Evaluation of the National Identity Management Policy in

Nigeria. A Thesis Submitted in Partial Fulfillment of the Requirement for the Degree

of Master of Science in Public Administration (Public Policy), Department of Public

Administration, and University of Calabar.


Ayamba, I.A. (2016). National Identity Management in Nigeria: Policy Dimensions

and Implementation. International Journal for Humanities and Social Science Studies,

3(1), 2287.

Bacova, V. (1998). The Construction of National Identity: Primordialism and

Instrumentalism. Journal of Human Affairs, 8(1), 29-43.

Crompton, M. (2004). User-centric Identity Management: An Oxymoron or the Key

to getting Identity Management right? Information Policy, 15(4), 291- 297.

DeLoine, W. H. and McLean, E. R., (2003). The DeLoine and McLean Model of

Information Systems Success: A Ten-Year Update. Journal of Management

Information Systems, 19(4), 9–30.

DeLoine, W.H. and McLean, E.R. (2008). Measuring Information Systems Success:

Models, Dimensions, Measures, and Interrelationships. European Journal of

Information Systems, 17(2), 236-263.

Ehindero, S. (2006). The Role of the Police as Law Enforcement Agency in the

Promotion and Sustainability of Participatory Democracy and the Rule of Law: The

Journey So Far. Being paper presented during Inspector General of Police’s visit to

Kwara State Police Command for a workshop on Police and Participatory Democracy

in Nigeria, Wednesday 13th December, 2006.


Gelb, A., & Clark, J. (2013). Identification for Development: The Biometrics

Revolution. CGD Working Paper 315. Washington, DC: Center for Global

Development. Retrieved 13th August, 2017 from

http://www.cgdev.org/content/publications/detail/1426862.

Geertz, C. (1963). Old Societies and New States: The Quest for Modernity in Asia

and Africa. Glencoe: The Free Press.

Hickok, E. (2013) Unique Identification Scheme (UID) & National Population

Register (NPF) and Governance. The Centre for Internet & Society.

Kenyatta, U. (2015). Kenya: President’s Speech at the Launch of the Integrated

Population Registration System. Retrieved 19th July 2017 from

http://allafrica.com/stories/201503111566.html.

King, R. (2012). Indonesia: Most Advanced Adopter of E-ID Credentials. Retrieved

2nd June, 2017 from http://www.biometricupdate.com/201211/indonesia-most-

advancedadopter-of-eidcredentials.

Landahl, D. (2007). Identity Crisis: Defining the Problem and Framing a Solution for

Terrorism Incidence Response. Homeland Security Affairs, 1(3), 1-28.


Makoye, K. (2013) Tanzania launches new ID cards to combat election fraud.

Thomson Reuters Foundation. Retrieved 8th September, 2017 from

http://www.trust.org/item/20130227092500-jm6av/.

Miller, D. (2000). Citizenship and National Identity. Oxford: Blackwell.

Moen, W.E. (2000). Mapping the Interoperability Landscape for Networked

Information Retrieval. Proceedings of the First ACM+IEEE Joint Conference on

Digital Libraries, Roanoke, VA, June 2000.

NIMC (2007). National Policy and Institutional Framework for an Identity

Management System for Nigeria.

NIMC (2015). Regulation on the Mandatory Use of the National Identification

Number (NIN) (NIMC Publication). Retrieved on 17th, 2017 from

http://www.nimc.gov.ng/sites/default/files/MANDATORY%20USE%20OF %20NIN

%20Draft0.pdf

NSIS (2015). National Security Information System, Uganda. Retrieved 20th July,

2017 from http://nsis.go.ug/.

Obi, E. U. (2006). National Identification Policy for Nigeria: An Action Agenda.

Retrieved 10th June, 2017 from www.dawodu.com/obi6.htm.


Obiunu, J.J. and Ebunu, O.R. (2013). Counselling for National Security and Nation

Building. Research Journal in Organizational Psychology & Educational Studies, 2(2)

43-48.

O'Brien, J. A. and Marakas, G. M., (2010). Management Information Systems.

Boston: McGraw Hill.

Omoniyi, T. (2012). National Identity Number: A rainbow of views. Monday, 02

April. Daily Trust Online.

Pang, C. and Lips, M. (2008). Identity Management in Information Age

Government: Exploring Concepts, Definitions, Approaches and Solutions. Victoria

University of Wellington.

Rutherford, M. (2008). Morocco issues biometric ID cards. CNET. Retrieved 30th

August, 2017 from http://www.cnet.com/news/morocco-issuesbiometric-id-cards/.

Schaupp, L. C., Fan, W. and Belanger, F. (2006) “Determining success for different

website goals", in the Proceedings of the 39th Hawaii International Conference on

System Sciences (HICSS), Kauai, Hawaii, 1- 10.

The Nation Newspaper (2017). Federal Government makes NIN mandatory for

passport issuance from 2018. Retrieved 18th October, 2017 from

http://thenationonlineng.net/fg-makes-nin-mandatory-passportissuance-2018/
Thuan, V. D. (2007). The Ambiguity of Identity. Telektronikk. 103(2), 3-4.

Udunze, B. (2015). $55m Biometric Budget: CBN, NIMC at war over control of

BVN scheme. The Sun Newspaper. Retrieved 10th October, 2017 from

http://sunnewsonline.com/new/55m-biometric-budget-cbn-nimc-atwarover-control-

of-bvn-scheme/>

Wang, T.V. (2003). The Debate over a National Identification Card. The Century

Foundation Homeland Security Project, Issue in Brief. Retrieved 14th October, 2017

from http://tcf.org/publications/pdfs/pb284/National_ID_Card.pdf.

Wikipedia (2015). www.en.m.wikipedia.org/wiki/Law-enforcement. Young, I. M.

(1990). Justice and the Politics of Difference. Princeton, N.J.:

You might also like