SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 2 Issue 3 ǁ July 2017.
w w w . i j m r e t . o r g I S S N : 2 4 5 6 - 5 6 2 8 Page 1
Using Technologies in Crime Prevention and Detection in
Nigeria: Legal Issues and Challenges
Omoleke Muslim
Independent National Electoral Commission (INEC)
Abuja, Nigeria
Abstract – This paper examined technologies being used in crime prevention and detection with a view to
identifying such technologies, legal issues and the challenges involved in the application of these technologies
and attempted to forge an acceptable legal framework for the use of technologies in crime prevention and
detection in Nigeria. Both primary and secondary sources of data were used. Primary sources include books,
journal, publications, dailies, conventions and a host others. Secondary sources include materials sourced from
the internet. The study revealed that though there are quite a good number of technologies for crime prevention
and detection, the major issues involved are the human right abuse and the challenges of training the staff who
are expected to apply these technologies among others. The study concluded that though there is need to
employ sophisticated technologies in view of the alarming rate of crime commission worldwide and particularly
in Nigeria , however, these technologies need to be reviewed to soften the hardship and human right abuses
which are found in the application of the technologies. This can be achieved by putting in place an acceptable
world standard and robust legal framework that would help in the mitigation of hardship and human abuses
that are embedded in the application of the technologies.
Keywords – Crime Detection, Crime Prevention, Legal Issues and Technologies
I. BACKGROUND
The degree and extent of crime commission
generally in the world and particularly in Nigeria
have necessitated the need to look beyond the
conventional methods or traditional means of
preventing and detecting crime. Crime prevention
and detection traditionally include among others
non-scientific methods such as foot patrol,
community policing, swearing before the god of
iron, the use of holy books (Qur‟an and Bible) to
swear, public disgrace such as incarceration and a
host of others.
The history of crime prevention stretches back
for over two hundred years. It has become common
place to understand the problem of crime as it was
set out by the classical literal philosophers in the
18th
century. Their understanding of society is
predicated on a view of humanity where home
being, or the rational man prevailed. According to
[1], the prevention of crime can be analysed in two
ways. First, it was important to ensure that crime
did not pay and that the consequence of committing
crime far outweighed the advantage which accrued
to the law-breaker. Hence, the building of a state
infrastructure of policing, courts and prison became
necessary. Each citizen was expected to fashion
out strategies of countering threat to criminality
consequently, the state and individuals have dual
roles to play in the prevention of crime.
[2] is also of the view that preventing
partnership is critical in achieving preventive goal
of crime. There should be synergy among various
stakeholders including individuals, state
institutions, community based organizations and
others to pool expertise and resources together
purposely to prevent crime from being committed.
This assertion was also established by [3] that
crime prevention is a collaborative work of
different stakeholders.
In the United Kingdom, situational crime
prevention project have moved from the use of
CCTV surveillance system to Technological
advancement that enable national authorities to
record, monitor and scrutinize phone calls,
messages posted on social media. However, a
lingering objection to this is the possibility of
violating human rights especially the secrecy of the
person concerned [4].
The rate of crime commission in Nigeria since
independent has been described as progressively
alarming and came to peak in the last four years
with the activities of Boko Haram, kidnappers,
armed robbers in the Northern and Southern parts
of the country respectively [5]. Several lives and
properties have been lost due to the killing by Boko
Haram, kidnapping, armed robberies, sea pirating
and other related crimes. For example recent
studies have shown that the economy of the states
(Bornu, Yobe, Adamawa and Kano) where Boko
Haram had carried out their nefarious acts has
nose-dived [6].
Technology has been identified as a major
instrument to prevent and detect crime especially in
development countries[7]. Technology within the
context of this paper includes tools, processes, and
techniques [8].
w w w . i j m r e t . o r g I S S N : 2 4 5 6 - 5 6 2 8 Page 13
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 2 Issue 3 ǁ July 2017.
The rate of insurgency in Nigeria has been
giving the incumbent government sleepless night to
the extent that hope is almost lost when it was
discovered that despite all efforts of the Federal
Government to curtail the activities of criminals, it
seems the problem almost defy all logical
solutions.
It is against this backdrop that this paper
attempts to examine the impacts of introducing
modern technologies to combat crime with a view
to identifying possible legal issues and challenges
that may inhibit the operation of these
technologies.
II. Methodology
Both primary and secondary sources of data
collection methods were used. Primary sources
include legislation, treaties, judicial authorities,
convention and a host of others. Secondary sources
on the other hand include books, journal,
publications, dailies and materials sourced from the
internet among others.
III. LITERATURE REVIEW
Literally in this context, the word technology
includes the application of scientific knowledge for
practical purposes or the use of machinery or tools/
techniques for the attainment of a goal/objective.
Below are the various technologies used in crime
prevention.
(a) Technologies Used in Crime Prevention and
Detection
A cursory review of the historical development
of efforts to prevent crime underscores the point
that technology or more precisely technological
innovation has been the driving force leading to
reform of crime prevention and crime control
strategies [9]. The first technology revolution in the
United State that changed the way police were
organized and how they operated centered around
three technological innovations that were
incorporated into policing; the telephone, the two-
way radio and the automobile [10]. Several other
scholars have posited that we are in the beginning
stages of a second technologies revolution, which
will once again dramatically change police
organization and administration [11]. The need for
technological innovation in crime prevention has
also been stressed in Corbertt and Marx as follows:
New technology is inherently attractive to
an industrial society. It’s risky to be
against new technology, however
mysterious its operations or recondite its
underlying engineering. Technical
innovation becomes synonymous with
progress. To be opposed to new
technology is to be a heretic, to be old-
fashioned, backwards resistant to change,
regressive, out of step [11].
In view of the above positions of scholars
on Technologies and Crime prevention and
detection, it is not an overstatement to
conclude that technology may play a dominant
role in reducing crime in Nigeria.
Also, modern technologies used in crime
prevention and detection would be categorized
into three (3) for the purpose of this paper
namely: technologies of surveillance and
detection, technologies of blocking and access
control and technologies of restraint.
(b) Technologies Surveillance and
Detection
Important amongst these technologies
include:
Metal Detector Technology: The metal
detectors in airports, office building, schools,
government agencies and prisons help ensure
that no one is bringing weapon into the
premises.
Though metal detectors have been found
useful in public places. stationery metal
detectors, have been found capable of isolating
harmful metal oriented objects, it has been
found that such detectors are capable of
creating prison-like or s:iff environment and
thereby adversely implicate the climate of the
school.
Radar: The term radar was introduced in
1940 by the United State Navy as an acronym
for radio detection and ranging [12]. Radar
when effectively used could prevent or
minimize overspeeding on Nigeria roads.
Furthermore, street lighting has been
discovered to be capable of increasing
visibility, hence improve the chance of
exposing the criminals. Other technologies of
surveillance and detection include but not
limited to Red Light Camera, Closed Circuit
Transmission (CCTV) and Home Alarm
System. CCTV is capable of detecting crimes
and facilitates the identification of offenders.
CCTV has had a very important role in counter
terrorism [13]. It is also useful in traffic
management, hazard management and personal
safety amongst others. However, as useful as
CCTV is, most Local Government in America
do not buy the idea of CCTV, because they are
not convinced that it could reduce crime.
It should however be noted that the
efficiency or otherwise of these technologies is
a function of many factors ranging from proper
deployment, training of officers handling
them, and intelligence gathering to assist in the
utilization of the technology in question.
(c) Technology of Blocking and Access
Control
Various methods or technologies have
been developed which make crime more
difficult to commit by impeding access to a
w w w . i j m r e t . o r g I S S N : 2 4 5 6 - 5 6 2 8 Page 14
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 2 Issue 3 ǁ July 2017.
target. Prominent amongst these technologies
are smarter locking technology which makes it
difficult for vehicles to be stolen, retina
imaging, voice print, hand geometry readers
and other biometric technologies. These
biometric technologies are used for verification
and identification of persons by various
psychological characteristics.
Other technologies of blocking are car
radio or television blocking device, which
makes it impossible for those gadgets to be
operated unless certain codes are entered.
(d) Technologies of
Restraint/Incapacitation
Technologies of incapacitation can be applied
to demoblize vehicle or criminals. A
technology developed to stop a moving vehicle
on high speed is to check excessive speed.
Such technology involve transmitting a short
electromagnetic pulse which can damage the
electronic components of a vehicle‟s ingnition
system and cause it to stop. Another
technology of restraint include a technology
that can identify a fleeing vehicle which is
called the use of lagging system. This would
involve a small adhesive projectile containing
a radio - frequency transmitter which will
permit identification of the vehicle location.
Technologies such as chemical incapacitation,
electrical incapacitation and pharmacological
substances are capable of restraining suspects.
(e) The role of Geospatial Technology
A large geographical area like Nigeria with
about 923, 768 km2
requires more
sophisticated technology like Global (GPS)
and Geographical information system are used
to track the information about a particular area
and movement of suspected criminals with the
available data and video. The technology
enables the police to take action proactively.
IV. LEGAL ISSUES
Most of the legal issues involved in the
application ci technologies to prevent and
detect crime has something to do with human
rights issues and admissibilities of evidence
arising from the application of the
technologies. In Nigeria for example Section
37 of the 1999 Constitution as amended
provides “the privacy of citizen, their homes,
correspondence, telephone conversation and
telegraphic communications is hereby
guaranteed and protected”. Consequently,
installing CCTV in public buildings may
violate the provision of the constitution.
Inapplicable provisions due to antiquated
definition of the elements or words is also part
of the legal issues that should be addressed.
What is however applicable in Nigeria is lack
of relevant laws for the few technologies that
are in existence.
Furthermore, limited duration time for
digital evidence is a serious legal issue
involving the application of new technologies
for crime prevention and detection. Under
normal circumustances, image or evidence
gathered electronically has time durations,
unless and until the duration is extended.
In the matter of truth serum induced
confessions, the application of this technique
which involves injecting a suspect with
hypnotics like sodium pentothal or sodium
amytal raises some legal issues such as
encroachment of an individual‟s rights,
liberties, freedom amongst others. Evidence
resulting from inducement of suspect is
another major setback. Under the Evidence
Act. LFN, 1990. Section 28 provides “A
confession made by an accused person is
irrelevant in a criminal proceeding, if the
making of the confession appears to the court
to have been caused by any inducement threat.
In conclusion, it is observed that the use of
modern technologies for crime prevention and
detection is faced with enormous legal issues.
V. CHALLENGES
Though modern technologies have been
adjudged appropriate to pre eat and detect
crime, some of them have been discovered to
pose serious problems in the acquisition and
deployment of same. For example, it has been
discovered that CCTV does not always provide
the benefits expected of it Major challenges
include poor camera positioning, poorly
maintained equipment, lack of recording
facilities. Conversion of mages into a form that
can easily be used by judges in court is another
challenge. The use of CCTV may eventually
result to intrusion into another person‟s
environment of which the CCTV is not
originally installed to cover. Such intrusion
may be subject of litigation. Other challenges
as may be posed by the introduction of new
technologies include but not limited to:
(1) Training of criminal justice
professionals such as judges, lawyers,
police and a host of others.
(2) Risk in operation form is another
major challenge. For example, some
technologies such as pepper spray,
tear gas, hot water spray could be
harmful to the operators if not
properly handled.
(3) Political leadership - The incumbent
government may not consider it
politically expedient to introduce new
technologies.
w w w . i j m r e t . o r g I S S N : 2 4 5 6 - 5 6 2 8 Page 15
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 2 Issue 3 ǁ July 2017.
(4) Ethical challenge - This include the
look worm attitude of government
officials towards introducing new
technologies. Lack of awareness,
campaign also hinder the
acceptability of the new technology
by the right institutions charged with
check and balance.
VI. LEGAL FRAMEWORK FOR
NEWTECHNOLOGIES
A framework is the structure of particular
system. It is a set of belief, ideas or rule that is
used as the bases for making a judgement [14].
In developed countries like USA and the
United Kingdom, there exists some code of
practice that guide the operations of
technologies for crime prevention and
detection. In Britain for example, there are
primary legislation in place and efforts are
being made to enact more legislations that
would enable the public have confidence in the
use of some of the technologies. In Nigeria, it
is necessary for the authority to evolve a legal
framework for the purposes of addressing legal
issues and challenges that may arise in the
process of using the technologies. Such
framework are suggested below:
(1) Establishment of a department within
the ministry of justice to be headed by
the legal officer to monitor the
operation of the technologies for
detecting and preventing crime,
especially those technologies that are
prone to human right abuses, such as
CCTV, truth serum, tear gas and a
host of others.
(2) The National Assembly should make
laws, that would check the excesses
of operators of the technologies and
enable court 10 make use of evidence
derived from the electronic version of
some of the technologies. Such laws
to be made or enacted could be
incorporated in our Evidence
Act,Police Act, Laws of the
Federation of Nigeria, 2004.
(3) The law empowering the security
agents to use these technologies with
little or no itch should be enacted.
The Nigerian Communication
Commission has produced a legal
draft document which when passed
into law would empower the National
Security adviser and security agencies
to intercept communications for the
purpose of preventing organised
crime.
(4) Training of criminal justice
professionals. especially the police is
important as a rule, so as to avoid
misuse of the technologies.
VII. CONCLUSION
It is a common fact that the rate of‟
criminality is on the increase worldwide, and
their activities are becoming more dangerous
for the society to bear. Criminals have evolved
a new but dangerous techniques of committing
crime, hence, there is need to come out with
innovative ideas inform of applying modern
technologies to deal with the situation.
However, as appropriate as some of these
technologies are especially in advanced
countries, there are fundamental legal issues
and challenges involved in applying the
technologies. These notwithstanding, it is
concluded that there is urgent need for the
government to come out with innovative
technological ideas and legal framework that
would assist in confronting the dangerous acts
and pattern of criminal activities particularly
terrorism in Nigeria.
VIII. RECOMMENDATIONS
The following recommendations have
been suggested regarding the use of
technologies for detecting and preventing
crime in Nigeria:
1. Government of Nigeria should as a
matter of necessity embrace new and
modern technologies to fight
terrorism particularly and criminal
activities in general. This becomes
necessary in view of the great threat
terrorism pose to the government.
2. Establishment of a department within
the Federal Ministry of justice that
would monitor the operation of the
technologies for detecting and
preventing crime, particularly those
technologies that are prone to human
right abuse.
3. The police service commission should
be strengthened to also handle issues
arising from the abuse of the
operation of them technologies.
4. Training of operators of the
technologies within the context of
provisions of laws guiding human
right issues.
5. Public enlightenment concerning the
need to use modern technologies to
combat crime is important, including
testing the technology before use.
6. Maintenance of the technologies to
guarantee efficiency is equally
necessary. The cost of installing
CCTV for example is colossal, hence
w w w . i j m r e t . o r g I S S N : 2 4 5 6 - 5 6 2 8 Page 16
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 2 Issue 3 ǁ July 2017.
it should be maintained to get the best
result out of‟ it.
Handlers and operators of technologies for
crime prevention and detection should he
exposed to national and international seminars
on likely abuses of these modern technologies.
Expectedly, such trainees would ha L‟
mastered the operation of such technologies in
such a manner to reduce the abuses. -
REFERENCES
[1] Garland.D. (2000) „Ideas, Institutions and
situational crime prevention‟ , in A. Von
Hirsch, D. Garland and A.Wakefield (eds)
Ethical and Social perspectives on
Situational crime prevention, Oxford ;Hart
Publishing , pp1-16.
[2] Garland, D. (2001) The Culture of Control,
Oxford: Oxford University Press.
[3] Home Office (1984) Crime Prevention,
Circular 8/1984, London: Home Office
[4] Crawford, A. (1998) Crime Prevention and
Community Safety, Harlow: Longman.
[5] The Economist July 14th, 2012, Lagos.
[6] The Leadership Newspaper, March 26, 2013
(Lagos).
[7] The Punch (Lagos), January, 29th, 2012.
[8] Borgman, 2006, Technology as a Cultural
Force: The Canadian Journal of Sociology
31(3) pp. 351 – 361.
[9] Reichert, KK. “Use of Information
Technology by Law Enforcement”.
Promising Approaches to Addressing Crime
Series. Universityy Pennsylvania, Jerry Lee
Centre of Criminology, Forum on Crime and
Justice 2001.
[10] Harris, C. “Police and Soft Technology:
How Information Technology Contributes to
Police Decision Making” In: Byrne, J. and
Rebovicch, E. (2007) The New Technology
of Crime, Law and Social Control, Monsey,
NY: Criminal Justice Press, 2007, p. 153 –
183.
[11] Corbett, R. and Marx, G. “Crtitique: No
Soul in the New Machine: Technofallacies
in the Electronic Monitoring Movement”.
Justice Quarterly, 1991, 8(3): 359 – 414.
[12] Raymound C. Watson: Radar Origins
worldwide. U.S.A Tafford Publishing. 2009,
pp. 1-2
[13] CCTV helped in the investigation of terrorist
attack in London on 21st
July, 2005.
[14] Oduola I.A „Evaluating the management
practices of R & D organisations in Nigeria
Unpublished Ph.D Thesis faculty of
technology O.A.U, Ile-Ife. 2003.
AUTHOR’S PROFILE
Dr(Barr) Omoleke Muslim was born in Ikire, Irewole Local
Government
area of Osun State, Nigeria. He attended Ife City College
between 1976
and 1980 where he obtained his West African School Certificate
with
Division One. He later proceeded to the University of Ife
between 1981
and 1985 and came out with B.Sc Education/Economics. He
also
acquired the following qualifications from the same university:
Master
of Business Administration (MBA) in 1995, Master of
Philosophy
(M.Phil) in Management and Accounting in 2001 and a Doctor
of
Philosophy degree in Technology Management (Ph.D) in 2010.
Because of his flair for academics, Dr. Omoleke went back to
read
Law at the same university and got his LLB in 2002. He also
read Master
degree in Law (LLM) with Specialization in criminology and
Penology.
Furthermore, he attended The Nigerian Law School, Abuja and
was
called to the Nigerian Bar in 2004.
Dr. Omoleke works with the Independent National Electoral
Commission as a Director of Administration/Administrative
Secretary.
He has attended both Local and International Conferences and
written
many published articles in Local and International Journals.

More Related Content

What's hot

Navigating Indonesia's Information Highway
Navigating Indonesia's Information HighwayNavigating Indonesia's Information Highway
Navigating Indonesia's Information HighwayICT Watch
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Adriana Dvorsak
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile LawJacqueline Fick
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethicssyed ahmed
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomySettapong_CyberSecurity
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01lbadeniji
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinetAlex Taremwa
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...JohnGacinya
 
2014-10-24 USAID_Liberia_ICTDeskReview_Final_63pp
2014-10-24 USAID_Liberia_ICTDeskReview_Final_63pp2014-10-24 USAID_Liberia_ICTDeskReview_Final_63pp
2014-10-24 USAID_Liberia_ICTDeskReview_Final_63ppOliver Dziggel
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossierYury Chemerkin
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 

What's hot (18)

Navigating Indonesia's Information Highway
Navigating Indonesia's Information HighwayNavigating Indonesia's Information Highway
Navigating Indonesia's Information Highway
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile Law
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethics
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...
 
2014-10-24 USAID_Liberia_ICTDeskReview_Final_63pp
2014-10-24 USAID_Liberia_ICTDeskReview_Final_63pp2014-10-24 USAID_Liberia_ICTDeskReview_Final_63pp
2014-10-24 USAID_Liberia_ICTDeskReview_Final_63pp
 
Russia and cybercrime
Russia and cybercrimeRussia and cybercrime
Russia and cybercrime
 
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga EbodeCTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossier
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Internet governance
Internet governanceInternet governance
Internet governance
 

Similar to Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues and Challenges

Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...SP. Zems Mathias, PhD.
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
 
Outline D
Outline DOutline D
Outline Dbutest
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
 
Modern trends in police force
Modern trends in police forceModern trends in police force
Modern trends in police forceK J Singh
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensicsijcsa
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Cameron Brown
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Kangai Maukazuva, CGEIT
 
Developing a Crime Mapping GIS System For Law Enforcement: A Case Study of Ow...
Developing a Crime Mapping GIS System For Law Enforcement: A Case Study of Ow...Developing a Crime Mapping GIS System For Law Enforcement: A Case Study of Ow...
Developing a Crime Mapping GIS System For Law Enforcement: A Case Study of Ow...Editor IJCATR
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docxhealdkathaleen
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docxtodd271
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docxbriancrawford30935
 
Technology helps people in implementing privacy in their day today l.pdf
Technology helps people in implementing privacy in their day today l.pdfTechnology helps people in implementing privacy in their day today l.pdf
Technology helps people in implementing privacy in their day today l.pdfaparnaagenciestvm
 

Similar to Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues and Challenges (20)

Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
Uddin
UddinUddin
Uddin
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
Outline D
Outline DOutline D
Outline D
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
Cybercrime Surveillance.docx
Cybercrime Surveillance.docxCybercrime Surveillance.docx
Cybercrime Surveillance.docx
 
Modern trends in police force
Modern trends in police forceModern trends in police force
Modern trends in police force
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensics
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 
Developing a Crime Mapping GIS System For Law Enforcement: A Case Study of Ow...
Developing a Crime Mapping GIS System For Law Enforcement: A Case Study of Ow...Developing a Crime Mapping GIS System For Law Enforcement: A Case Study of Ow...
Developing a Crime Mapping GIS System For Law Enforcement: A Case Study of Ow...
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docx
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docx
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
 
Technology helps people in implementing privacy in their day today l.pdf
Technology helps people in implementing privacy in their day today l.pdfTechnology helps people in implementing privacy in their day today l.pdf
Technology helps people in implementing privacy in their day today l.pdf
 

More from International Journal of Modern Research in Engineering and Technology

More from International Journal of Modern Research in Engineering and Technology (20)

Numerical Simulations of the Bond Stress-Slip Effect of Reinforced Concrete o...
Numerical Simulations of the Bond Stress-Slip Effect of Reinforced Concrete o...Numerical Simulations of the Bond Stress-Slip Effect of Reinforced Concrete o...
Numerical Simulations of the Bond Stress-Slip Effect of Reinforced Concrete o...
 
Building an integrated vertical chain - a factor for sustainable construction
Building an integrated vertical chain - a factor for sustainable constructionBuilding an integrated vertical chain - a factor for sustainable construction
Building an integrated vertical chain - a factor for sustainable construction
 
Applicability Study on the Optical Remote Sensing Techniques in a River
Applicability Study on the Optical Remote Sensing Techniques in a RiverApplicability Study on the Optical Remote Sensing Techniques in a River
Applicability Study on the Optical Remote Sensing Techniques in a River
 
There is Always A Better Way: The Argument for Industrial Engineering
There is Always A Better Way: The Argument for Industrial EngineeringThere is Always A Better Way: The Argument for Industrial Engineering
There is Always A Better Way: The Argument for Industrial Engineering
 
Study on the LandCover Classification using UAV Imagery
Study on the LandCover Classification using UAV ImageryStudy on the LandCover Classification using UAV Imagery
Study on the LandCover Classification using UAV Imagery
 
Comparative Analysis between Five Level Conventional and Modified Cascaded H-...
Comparative Analysis between Five Level Conventional and Modified Cascaded H-...Comparative Analysis between Five Level Conventional and Modified Cascaded H-...
Comparative Analysis between Five Level Conventional and Modified Cascaded H-...
 
Cytotoxicity Studies of TiO2/ZnO Nanocomposites on Cervical Cancer Cells
Cytotoxicity Studies of TiO2/ZnO Nanocomposites on Cervical Cancer CellsCytotoxicity Studies of TiO2/ZnO Nanocomposites on Cervical Cancer Cells
Cytotoxicity Studies of TiO2/ZnO Nanocomposites on Cervical Cancer Cells
 
Investigation of Performance Properties of Graphene Coated Fabrics
Investigation of Performance Properties of Graphene Coated FabricsInvestigation of Performance Properties of Graphene Coated Fabrics
Investigation of Performance Properties of Graphene Coated Fabrics
 
Effects of bagasse ash additive on the physiochemical and biological paramete...
Effects of bagasse ash additive on the physiochemical and biological paramete...Effects of bagasse ash additive on the physiochemical and biological paramete...
Effects of bagasse ash additive on the physiochemical and biological paramete...
 
Production and Analysis of Bioresin From Mango (Mangifera Indica) Kernel Oil
Production and Analysis of Bioresin From Mango (Mangifera Indica) Kernel OilProduction and Analysis of Bioresin From Mango (Mangifera Indica) Kernel Oil
Production and Analysis of Bioresin From Mango (Mangifera Indica) Kernel Oil
 
Particle Swarm Optimization Algorithm Based Window Function Design
Particle Swarm Optimization Algorithm Based Window Function DesignParticle Swarm Optimization Algorithm Based Window Function Design
Particle Swarm Optimization Algorithm Based Window Function Design
 
Computed Tomography Image Reconstruction in 3D VoxelSpace
Computed Tomography Image Reconstruction in 3D VoxelSpaceComputed Tomography Image Reconstruction in 3D VoxelSpace
Computed Tomography Image Reconstruction in 3D VoxelSpace
 
Antimicrobial Activity of Capsicum Essential Oil of Peppers
Antimicrobial Activity of Capsicum Essential Oil of PeppersAntimicrobial Activity of Capsicum Essential Oil of Peppers
Antimicrobial Activity of Capsicum Essential Oil of Peppers
 
Design of Window Function in LABVIEW Environment
Design of Window Function in LABVIEW EnvironmentDesign of Window Function in LABVIEW Environment
Design of Window Function in LABVIEW Environment
 
A study of the temporal flow of passenger and cargo transport in a Brazilian ...
A study of the temporal flow of passenger and cargo transport in a Brazilian ...A study of the temporal flow of passenger and cargo transport in a Brazilian ...
A study of the temporal flow of passenger and cargo transport in a Brazilian ...
 
Determination of Linear Absorption Coefficient for Different Materials
Determination of Linear Absorption Coefficient for Different MaterialsDetermination of Linear Absorption Coefficient for Different Materials
Determination of Linear Absorption Coefficient for Different Materials
 
Evaluation of Naturally Occurring Radionuclide in Soil Samples from Ajiwei Mi...
Evaluation of Naturally Occurring Radionuclide in Soil Samples from Ajiwei Mi...Evaluation of Naturally Occurring Radionuclide in Soil Samples from Ajiwei Mi...
Evaluation of Naturally Occurring Radionuclide in Soil Samples from Ajiwei Mi...
 
Kinematics Modeling and Simulation of SCARA Robot Arm
Kinematics Modeling and Simulation of SCARA Robot ArmKinematics Modeling and Simulation of SCARA Robot Arm
Kinematics Modeling and Simulation of SCARA Robot Arm
 
Air and Moisture Permeability of Textiles
Air and Moisture Permeability of TextilesAir and Moisture Permeability of Textiles
Air and Moisture Permeability of Textiles
 
Strength and durability assessment of concrete substructure in organic and hy...
Strength and durability assessment of concrete substructure in organic and hy...Strength and durability assessment of concrete substructure in organic and hy...
Strength and durability assessment of concrete substructure in organic and hy...
 

Recently uploaded

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 

Recently uploaded (20)

Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 

Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues and Challenges

  • 1. International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 2 Issue 3 ǁ July 2017. w w w . i j m r e t . o r g I S S N : 2 4 5 6 - 5 6 2 8 Page 1 Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues and Challenges Omoleke Muslim Independent National Electoral Commission (INEC) Abuja, Nigeria Abstract – This paper examined technologies being used in crime prevention and detection with a view to identifying such technologies, legal issues and the challenges involved in the application of these technologies and attempted to forge an acceptable legal framework for the use of technologies in crime prevention and detection in Nigeria. Both primary and secondary sources of data were used. Primary sources include books, journal, publications, dailies, conventions and a host others. Secondary sources include materials sourced from the internet. The study revealed that though there are quite a good number of technologies for crime prevention and detection, the major issues involved are the human right abuse and the challenges of training the staff who are expected to apply these technologies among others. The study concluded that though there is need to employ sophisticated technologies in view of the alarming rate of crime commission worldwide and particularly in Nigeria , however, these technologies need to be reviewed to soften the hardship and human right abuses which are found in the application of the technologies. This can be achieved by putting in place an acceptable world standard and robust legal framework that would help in the mitigation of hardship and human abuses that are embedded in the application of the technologies. Keywords – Crime Detection, Crime Prevention, Legal Issues and Technologies I. BACKGROUND The degree and extent of crime commission generally in the world and particularly in Nigeria have necessitated the need to look beyond the conventional methods or traditional means of preventing and detecting crime. Crime prevention and detection traditionally include among others non-scientific methods such as foot patrol, community policing, swearing before the god of iron, the use of holy books (Qur‟an and Bible) to swear, public disgrace such as incarceration and a host of others. The history of crime prevention stretches back for over two hundred years. It has become common place to understand the problem of crime as it was set out by the classical literal philosophers in the 18th century. Their understanding of society is predicated on a view of humanity where home being, or the rational man prevailed. According to [1], the prevention of crime can be analysed in two ways. First, it was important to ensure that crime did not pay and that the consequence of committing crime far outweighed the advantage which accrued to the law-breaker. Hence, the building of a state infrastructure of policing, courts and prison became necessary. Each citizen was expected to fashion out strategies of countering threat to criminality consequently, the state and individuals have dual roles to play in the prevention of crime. [2] is also of the view that preventing partnership is critical in achieving preventive goal of crime. There should be synergy among various stakeholders including individuals, state institutions, community based organizations and others to pool expertise and resources together purposely to prevent crime from being committed. This assertion was also established by [3] that crime prevention is a collaborative work of different stakeholders. In the United Kingdom, situational crime prevention project have moved from the use of CCTV surveillance system to Technological advancement that enable national authorities to record, monitor and scrutinize phone calls, messages posted on social media. However, a lingering objection to this is the possibility of violating human rights especially the secrecy of the person concerned [4]. The rate of crime commission in Nigeria since independent has been described as progressively alarming and came to peak in the last four years with the activities of Boko Haram, kidnappers, armed robbers in the Northern and Southern parts of the country respectively [5]. Several lives and properties have been lost due to the killing by Boko Haram, kidnapping, armed robberies, sea pirating and other related crimes. For example recent studies have shown that the economy of the states (Bornu, Yobe, Adamawa and Kano) where Boko Haram had carried out their nefarious acts has nose-dived [6]. Technology has been identified as a major instrument to prevent and detect crime especially in development countries[7]. Technology within the context of this paper includes tools, processes, and techniques [8].
  • 2. w w w . i j m r e t . o r g I S S N : 2 4 5 6 - 5 6 2 8 Page 13 International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 2 Issue 3 ǁ July 2017. The rate of insurgency in Nigeria has been giving the incumbent government sleepless night to the extent that hope is almost lost when it was discovered that despite all efforts of the Federal Government to curtail the activities of criminals, it seems the problem almost defy all logical solutions. It is against this backdrop that this paper attempts to examine the impacts of introducing modern technologies to combat crime with a view to identifying possible legal issues and challenges that may inhibit the operation of these technologies. II. Methodology Both primary and secondary sources of data collection methods were used. Primary sources include legislation, treaties, judicial authorities, convention and a host of others. Secondary sources on the other hand include books, journal, publications, dailies and materials sourced from the internet among others. III. LITERATURE REVIEW Literally in this context, the word technology includes the application of scientific knowledge for practical purposes or the use of machinery or tools/ techniques for the attainment of a goal/objective. Below are the various technologies used in crime prevention. (a) Technologies Used in Crime Prevention and Detection A cursory review of the historical development of efforts to prevent crime underscores the point that technology or more precisely technological innovation has been the driving force leading to reform of crime prevention and crime control strategies [9]. The first technology revolution in the United State that changed the way police were organized and how they operated centered around three technological innovations that were incorporated into policing; the telephone, the two- way radio and the automobile [10]. Several other scholars have posited that we are in the beginning stages of a second technologies revolution, which will once again dramatically change police organization and administration [11]. The need for technological innovation in crime prevention has also been stressed in Corbertt and Marx as follows: New technology is inherently attractive to an industrial society. It’s risky to be against new technology, however mysterious its operations or recondite its underlying engineering. Technical innovation becomes synonymous with progress. To be opposed to new technology is to be a heretic, to be old- fashioned, backwards resistant to change, regressive, out of step [11]. In view of the above positions of scholars on Technologies and Crime prevention and detection, it is not an overstatement to conclude that technology may play a dominant role in reducing crime in Nigeria. Also, modern technologies used in crime prevention and detection would be categorized into three (3) for the purpose of this paper namely: technologies of surveillance and detection, technologies of blocking and access control and technologies of restraint. (b) Technologies Surveillance and Detection Important amongst these technologies include: Metal Detector Technology: The metal detectors in airports, office building, schools, government agencies and prisons help ensure that no one is bringing weapon into the premises. Though metal detectors have been found useful in public places. stationery metal detectors, have been found capable of isolating harmful metal oriented objects, it has been found that such detectors are capable of creating prison-like or s:iff environment and thereby adversely implicate the climate of the school. Radar: The term radar was introduced in 1940 by the United State Navy as an acronym for radio detection and ranging [12]. Radar when effectively used could prevent or minimize overspeeding on Nigeria roads. Furthermore, street lighting has been discovered to be capable of increasing visibility, hence improve the chance of exposing the criminals. Other technologies of surveillance and detection include but not limited to Red Light Camera, Closed Circuit Transmission (CCTV) and Home Alarm System. CCTV is capable of detecting crimes and facilitates the identification of offenders. CCTV has had a very important role in counter terrorism [13]. It is also useful in traffic management, hazard management and personal safety amongst others. However, as useful as CCTV is, most Local Government in America do not buy the idea of CCTV, because they are not convinced that it could reduce crime. It should however be noted that the efficiency or otherwise of these technologies is a function of many factors ranging from proper deployment, training of officers handling them, and intelligence gathering to assist in the utilization of the technology in question. (c) Technology of Blocking and Access Control Various methods or technologies have been developed which make crime more difficult to commit by impeding access to a
  • 3. w w w . i j m r e t . o r g I S S N : 2 4 5 6 - 5 6 2 8 Page 14 International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 2 Issue 3 ǁ July 2017. target. Prominent amongst these technologies are smarter locking technology which makes it difficult for vehicles to be stolen, retina imaging, voice print, hand geometry readers and other biometric technologies. These biometric technologies are used for verification and identification of persons by various psychological characteristics. Other technologies of blocking are car radio or television blocking device, which makes it impossible for those gadgets to be operated unless certain codes are entered. (d) Technologies of Restraint/Incapacitation Technologies of incapacitation can be applied to demoblize vehicle or criminals. A technology developed to stop a moving vehicle on high speed is to check excessive speed. Such technology involve transmitting a short electromagnetic pulse which can damage the electronic components of a vehicle‟s ingnition system and cause it to stop. Another technology of restraint include a technology that can identify a fleeing vehicle which is called the use of lagging system. This would involve a small adhesive projectile containing a radio - frequency transmitter which will permit identification of the vehicle location. Technologies such as chemical incapacitation, electrical incapacitation and pharmacological substances are capable of restraining suspects. (e) The role of Geospatial Technology A large geographical area like Nigeria with about 923, 768 km2 requires more sophisticated technology like Global (GPS) and Geographical information system are used to track the information about a particular area and movement of suspected criminals with the available data and video. The technology enables the police to take action proactively. IV. LEGAL ISSUES Most of the legal issues involved in the application ci technologies to prevent and detect crime has something to do with human rights issues and admissibilities of evidence arising from the application of the technologies. In Nigeria for example Section 37 of the 1999 Constitution as amended provides “the privacy of citizen, their homes, correspondence, telephone conversation and telegraphic communications is hereby guaranteed and protected”. Consequently, installing CCTV in public buildings may violate the provision of the constitution. Inapplicable provisions due to antiquated definition of the elements or words is also part of the legal issues that should be addressed. What is however applicable in Nigeria is lack of relevant laws for the few technologies that are in existence. Furthermore, limited duration time for digital evidence is a serious legal issue involving the application of new technologies for crime prevention and detection. Under normal circumustances, image or evidence gathered electronically has time durations, unless and until the duration is extended. In the matter of truth serum induced confessions, the application of this technique which involves injecting a suspect with hypnotics like sodium pentothal or sodium amytal raises some legal issues such as encroachment of an individual‟s rights, liberties, freedom amongst others. Evidence resulting from inducement of suspect is another major setback. Under the Evidence Act. LFN, 1990. Section 28 provides “A confession made by an accused person is irrelevant in a criminal proceeding, if the making of the confession appears to the court to have been caused by any inducement threat. In conclusion, it is observed that the use of modern technologies for crime prevention and detection is faced with enormous legal issues. V. CHALLENGES Though modern technologies have been adjudged appropriate to pre eat and detect crime, some of them have been discovered to pose serious problems in the acquisition and deployment of same. For example, it has been discovered that CCTV does not always provide the benefits expected of it Major challenges include poor camera positioning, poorly maintained equipment, lack of recording facilities. Conversion of mages into a form that can easily be used by judges in court is another challenge. The use of CCTV may eventually result to intrusion into another person‟s environment of which the CCTV is not originally installed to cover. Such intrusion may be subject of litigation. Other challenges as may be posed by the introduction of new technologies include but not limited to: (1) Training of criminal justice professionals such as judges, lawyers, police and a host of others. (2) Risk in operation form is another major challenge. For example, some technologies such as pepper spray, tear gas, hot water spray could be harmful to the operators if not properly handled. (3) Political leadership - The incumbent government may not consider it politically expedient to introduce new technologies.
  • 4. w w w . i j m r e t . o r g I S S N : 2 4 5 6 - 5 6 2 8 Page 15 International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 2 Issue 3 ǁ July 2017. (4) Ethical challenge - This include the look worm attitude of government officials towards introducing new technologies. Lack of awareness, campaign also hinder the acceptability of the new technology by the right institutions charged with check and balance. VI. LEGAL FRAMEWORK FOR NEWTECHNOLOGIES A framework is the structure of particular system. It is a set of belief, ideas or rule that is used as the bases for making a judgement [14]. In developed countries like USA and the United Kingdom, there exists some code of practice that guide the operations of technologies for crime prevention and detection. In Britain for example, there are primary legislation in place and efforts are being made to enact more legislations that would enable the public have confidence in the use of some of the technologies. In Nigeria, it is necessary for the authority to evolve a legal framework for the purposes of addressing legal issues and challenges that may arise in the process of using the technologies. Such framework are suggested below: (1) Establishment of a department within the ministry of justice to be headed by the legal officer to monitor the operation of the technologies for detecting and preventing crime, especially those technologies that are prone to human right abuses, such as CCTV, truth serum, tear gas and a host of others. (2) The National Assembly should make laws, that would check the excesses of operators of the technologies and enable court 10 make use of evidence derived from the electronic version of some of the technologies. Such laws to be made or enacted could be incorporated in our Evidence Act,Police Act, Laws of the Federation of Nigeria, 2004. (3) The law empowering the security agents to use these technologies with little or no itch should be enacted. The Nigerian Communication Commission has produced a legal draft document which when passed into law would empower the National Security adviser and security agencies to intercept communications for the purpose of preventing organised crime. (4) Training of criminal justice professionals. especially the police is important as a rule, so as to avoid misuse of the technologies. VII. CONCLUSION It is a common fact that the rate of‟ criminality is on the increase worldwide, and their activities are becoming more dangerous for the society to bear. Criminals have evolved a new but dangerous techniques of committing crime, hence, there is need to come out with innovative ideas inform of applying modern technologies to deal with the situation. However, as appropriate as some of these technologies are especially in advanced countries, there are fundamental legal issues and challenges involved in applying the technologies. These notwithstanding, it is concluded that there is urgent need for the government to come out with innovative technological ideas and legal framework that would assist in confronting the dangerous acts and pattern of criminal activities particularly terrorism in Nigeria. VIII. RECOMMENDATIONS The following recommendations have been suggested regarding the use of technologies for detecting and preventing crime in Nigeria: 1. Government of Nigeria should as a matter of necessity embrace new and modern technologies to fight terrorism particularly and criminal activities in general. This becomes necessary in view of the great threat terrorism pose to the government. 2. Establishment of a department within the Federal Ministry of justice that would monitor the operation of the technologies for detecting and preventing crime, particularly those technologies that are prone to human right abuse. 3. The police service commission should be strengthened to also handle issues arising from the abuse of the operation of them technologies. 4. Training of operators of the technologies within the context of provisions of laws guiding human right issues. 5. Public enlightenment concerning the need to use modern technologies to combat crime is important, including testing the technology before use. 6. Maintenance of the technologies to guarantee efficiency is equally necessary. The cost of installing CCTV for example is colossal, hence
  • 5. w w w . i j m r e t . o r g I S S N : 2 4 5 6 - 5 6 2 8 Page 16 International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 2 Issue 3 ǁ July 2017. it should be maintained to get the best result out of‟ it. Handlers and operators of technologies for crime prevention and detection should he exposed to national and international seminars on likely abuses of these modern technologies. Expectedly, such trainees would ha L‟ mastered the operation of such technologies in such a manner to reduce the abuses. - REFERENCES [1] Garland.D. (2000) „Ideas, Institutions and situational crime prevention‟ , in A. Von Hirsch, D. Garland and A.Wakefield (eds) Ethical and Social perspectives on Situational crime prevention, Oxford ;Hart Publishing , pp1-16. [2] Garland, D. (2001) The Culture of Control, Oxford: Oxford University Press. [3] Home Office (1984) Crime Prevention, Circular 8/1984, London: Home Office [4] Crawford, A. (1998) Crime Prevention and Community Safety, Harlow: Longman. [5] The Economist July 14th, 2012, Lagos. [6] The Leadership Newspaper, March 26, 2013 (Lagos). [7] The Punch (Lagos), January, 29th, 2012. [8] Borgman, 2006, Technology as a Cultural Force: The Canadian Journal of Sociology 31(3) pp. 351 – 361. [9] Reichert, KK. “Use of Information Technology by Law Enforcement”. Promising Approaches to Addressing Crime Series. Universityy Pennsylvania, Jerry Lee Centre of Criminology, Forum on Crime and Justice 2001. [10] Harris, C. “Police and Soft Technology: How Information Technology Contributes to Police Decision Making” In: Byrne, J. and Rebovicch, E. (2007) The New Technology of Crime, Law and Social Control, Monsey, NY: Criminal Justice Press, 2007, p. 153 – 183. [11] Corbett, R. and Marx, G. “Crtitique: No Soul in the New Machine: Technofallacies in the Electronic Monitoring Movement”. Justice Quarterly, 1991, 8(3): 359 – 414. [12] Raymound C. Watson: Radar Origins worldwide. U.S.A Tafford Publishing. 2009, pp. 1-2 [13] CCTV helped in the investigation of terrorist attack in London on 21st July, 2005. [14] Oduola I.A „Evaluating the management practices of R & D organisations in Nigeria Unpublished Ph.D Thesis faculty of technology O.A.U, Ile-Ife. 2003. AUTHOR’S PROFILE Dr(Barr) Omoleke Muslim was born in Ikire, Irewole Local Government area of Osun State, Nigeria. He attended Ife City College between 1976 and 1980 where he obtained his West African School Certificate with Division One. He later proceeded to the University of Ife between 1981 and 1985 and came out with B.Sc Education/Economics. He also acquired the following qualifications from the same university: Master of Business Administration (MBA) in 1995, Master of Philosophy (M.Phil) in Management and Accounting in 2001 and a Doctor of Philosophy degree in Technology Management (Ph.D) in 2010. Because of his flair for academics, Dr. Omoleke went back to read Law at the same university and got his LLB in 2002. He also read Master degree in Law (LLM) with Specialization in criminology and Penology. Furthermore, he attended The Nigerian Law School, Abuja and was called to the Nigerian Bar in 2004. Dr. Omoleke works with the Independent National Electoral Commission as a Director of Administration/Administrative Secretary. He has attended both Local and International Conferences and written many published articles in Local and International Journals.