1) The document is a dissertation defense presentation by Zems Mathias for their Doctoral degree. It examines the normalcy of crime as a requirement for intelligence analysis in Nigerian law enforcement agencies.
2) It discusses how crimes like terrorism, human trafficking, and money laundering require proactive, scientific approaches that cross jurisdictions. Understanding crime is important for intelligence gathering and analysis.
3) The study aims to analyze the relationship between criminal intelligence and law enforcement practice, internal security, and national security in Nigeria. It examines challenges to intelligence gathering and the importance of sharing information between agencies.
This paper examined technologies being used in crime prevention and detection with a view to
identifying such technologies, legal issues and the challenges involved in the application of these technologies
and attempted to forge an acceptable legal framework for the use of technologies in crime prevention and
detection in Nigeria. Both primary and secondary sources of data were used. Primary sources include books,
journal, publications, dailies, conventions and a host others. Secondary sources include materials sourced from
the internet. The study revealed that though there are quite a good number of technologies for crime prevention
and detection, the major issues involved are the human right abuse and the challenges of training the staff who
are expected to apply these technologies among others. The study concluded that though there is need to
employ sophisticated technologies in view of the alarming rate of crime commission worldwide and particularly
in Nigeria , however, these technologies need to be reviewed to soften the hardship and human right abuses
which are found in the application of the technologies. This can be achieved by putting in place an acceptable
world standard and robust legal framework that would help in the mitigation of hardship and human abuses
that are embedded in the application of the technologies.
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
ABSTRACT: In the past two decades, third world countries such as South Africa have made steadily developments towards combating hacking as a form of Cybercrime. The developments made by the South African Criminal Justice towards the prevention of hacking have been mildly progressive. The Council of Europe Convention on Cybercrime is the treaty that all South African legislation and policy with regard to hacking is required to be in line with this convention. This treaty has also been the cornerstone to first world countries such as the United States, when preventing cybercrime such as hacking. In order for South Africans to have a safe and secure cyberspace that is free from hackers; there needs to be a co-operative system put in place by the South African Criminal Justice System that involves the government, non-profit organizations and the community. A Criminal Justice system that works closely with the community is able to properly guide its members and correctly prosecute the crime of hacking. Therefore, using qualitative secondary data this paper explores the existing measures put in place by the South African Criminal Justice to combat hacking. The findings of this paper indicate that conceptual understanding of this crime (hacking) can play a pivotal role in addressing the manifestation of this crime in a large extent as the nature and extent can be established, the use of technological means also contribute to hacking, this is also linked to individuals (victims) ignorance. For recommendations, the use of technology and conventional method in awareness can help in responding to the scale and consequence of hacking in South Africa.
With the widespread concerns about cyber terrorism and the frequent use of the term
“cyber terrorism” at the present time, many international organisations have made efforts
to combat this threat. Since cyber terrorism is an international crime, local regulations
alone are not able to defend against such attacks; they require a transnational response.
This paper examined technologies being used in crime prevention and detection with a view to
identifying such technologies, legal issues and the challenges involved in the application of these technologies
and attempted to forge an acceptable legal framework for the use of technologies in crime prevention and
detection in Nigeria. Both primary and secondary sources of data were used. Primary sources include books,
journal, publications, dailies, conventions and a host others. Secondary sources include materials sourced from
the internet. The study revealed that though there are quite a good number of technologies for crime prevention
and detection, the major issues involved are the human right abuse and the challenges of training the staff who
are expected to apply these technologies among others. The study concluded that though there is need to
employ sophisticated technologies in view of the alarming rate of crime commission worldwide and particularly
in Nigeria , however, these technologies need to be reviewed to soften the hardship and human right abuses
which are found in the application of the technologies. This can be achieved by putting in place an acceptable
world standard and robust legal framework that would help in the mitigation of hardship and human abuses
that are embedded in the application of the technologies.
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
ABSTRACT: In the past two decades, third world countries such as South Africa have made steadily developments towards combating hacking as a form of Cybercrime. The developments made by the South African Criminal Justice towards the prevention of hacking have been mildly progressive. The Council of Europe Convention on Cybercrime is the treaty that all South African legislation and policy with regard to hacking is required to be in line with this convention. This treaty has also been the cornerstone to first world countries such as the United States, when preventing cybercrime such as hacking. In order for South Africans to have a safe and secure cyberspace that is free from hackers; there needs to be a co-operative system put in place by the South African Criminal Justice System that involves the government, non-profit organizations and the community. A Criminal Justice system that works closely with the community is able to properly guide its members and correctly prosecute the crime of hacking. Therefore, using qualitative secondary data this paper explores the existing measures put in place by the South African Criminal Justice to combat hacking. The findings of this paper indicate that conceptual understanding of this crime (hacking) can play a pivotal role in addressing the manifestation of this crime in a large extent as the nature and extent can be established, the use of technological means also contribute to hacking, this is also linked to individuals (victims) ignorance. For recommendations, the use of technology and conventional method in awareness can help in responding to the scale and consequence of hacking in South Africa.
With the widespread concerns about cyber terrorism and the frequent use of the term
“cyber terrorism” at the present time, many international organisations have made efforts
to combat this threat. Since cyber terrorism is an international crime, local regulations
alone are not able to defend against such attacks; they require a transnational response.
Reasons why the developing field of computer forensics is essential to modern-day law enforcement in fighting cyber crimes (by Lillian Ekwosi-Egbulem).
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...Gamaliel Olayiwola Fasuyi
This Study focuses on the legal framework prohibiting Cybercrimes in Nigeria. Cybercrime
involves using computers and internet by individuals to commit crime. The people across the globe are technologically transformed to the extent that life
depends on technology. The application of ICT covers every facet of human life and that has led
to the birth of unanticipated rates of crimes coming in a borderless form. The paper examines the
types of cybercrimes prevalent in Nigeria, international conventions approach and other
jurisdictional practices with a view to abreast the application of legal framework of cybercrimes
both in the Nigerian context and international community.
The findings of the paper are that the Nigerian legislations on the subject acknowledge
the existing challenges and are on the right track, but need to be strengthened to achieve the desired
purpose. It further observed that there is no unanimous definition of the concept in all jurisdictions
which add issue to the subject in terms of challenges. The study recommends that the recently signed Nigerian Cybercrimes (Prohibition & Prevention Act) 2015 should be actively enforced
with a view to bringing our legal framework on par with other jurisdictions as well as proffering
other reforms to enhance Cybersecurity in Nigeria.
A Criminological Exploration of Cyber Prostitution within the South African C...AJHSSR Journal
ABSTRACT: This paper reports a systematic review of the studies related to cyber prostitution within the South African (SA) context. Qualitative studies published in peer reviewed journals from 2006 to 2016 were reviewed in order to determine the extent and nature of cyber prostitution within the SA context, impact of cyber prostitution and the measures put in place to combat or deal with cyber prostitution within the South African context. The review revealed that (1) majority of research and interventions tend to focus on street-based prostitution (2) studies on the extent and nature of cyber prostitution within the SAcontext are underrepresented in the research field (3) the negative impacts of cyber prostitution are not clearly determined by existing literature(4) cyber prostitution has become a preferred method of prostitution in modern society for varied motives. Recommendations for further research on cyber prostitution within the SAcontext are also provided.
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
In July 2016, the ATM heist of Taiwan First bank is based on well-known Carberp malware family. The threat of cybercrime is becoming increasingly complex and diverse on putting citizen’s data or money in danger. Cybercrime threats are often originating from trusted, malicious, or negligent insiders, who have excessive access privileges to sensitive data. The analysis of ATM heist threats presents many opportunities for improving the quality and value of digital evidence. This talk will introduce some OSINT methods that can help investigators to perform a cybercrime investigation process in a forensically sound and timely fashion manner. This talk further points out cybercrime investigation, digital forensics, and ICT governance for fighting against cybercrime issues. It requires the sincere examination of all available data volumes at a crime scene or in a lab to present digital evidence in a court of law.
Challenges from the Cyber Domain: Cyber Security and Human RightsAdam David Brown
This paper explores the key tensions between human rights and state-implemented cyber security. It examines three key tensions, attribution versus anonymity, international norms and cyber war.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
My presentation at the IGov2 conference at the University of Oslo, 9 Sept 2014. Gave shorter version at Norwegian Board of Technology hearing on 10 Sept 2014. Related journal article at http://ijlit.oxfordjournals.org/content/early/2014/09/01/ijlit.eau007.abstract
Audio at http://www.jus.uio.no/ifp/english/research/projects/nrccl/internet-governance/events/dag-2-del-2-norrm-mp3.mp3
Where next for the Regulation of Investigatory Powers Act?blogzilla
Talk at Open Tech 2015 on legal reform of UK interception and surveillance laws, including a comparison of the Intelligence and Security Committee and David Anderson reports.
Reasons why the developing field of computer forensics is essential to modern-day law enforcement in fighting cyber crimes (by Lillian Ekwosi-Egbulem).
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...Gamaliel Olayiwola Fasuyi
This Study focuses on the legal framework prohibiting Cybercrimes in Nigeria. Cybercrime
involves using computers and internet by individuals to commit crime. The people across the globe are technologically transformed to the extent that life
depends on technology. The application of ICT covers every facet of human life and that has led
to the birth of unanticipated rates of crimes coming in a borderless form. The paper examines the
types of cybercrimes prevalent in Nigeria, international conventions approach and other
jurisdictional practices with a view to abreast the application of legal framework of cybercrimes
both in the Nigerian context and international community.
The findings of the paper are that the Nigerian legislations on the subject acknowledge
the existing challenges and are on the right track, but need to be strengthened to achieve the desired
purpose. It further observed that there is no unanimous definition of the concept in all jurisdictions
which add issue to the subject in terms of challenges. The study recommends that the recently signed Nigerian Cybercrimes (Prohibition & Prevention Act) 2015 should be actively enforced
with a view to bringing our legal framework on par with other jurisdictions as well as proffering
other reforms to enhance Cybersecurity in Nigeria.
A Criminological Exploration of Cyber Prostitution within the South African C...AJHSSR Journal
ABSTRACT: This paper reports a systematic review of the studies related to cyber prostitution within the South African (SA) context. Qualitative studies published in peer reviewed journals from 2006 to 2016 were reviewed in order to determine the extent and nature of cyber prostitution within the SA context, impact of cyber prostitution and the measures put in place to combat or deal with cyber prostitution within the South African context. The review revealed that (1) majority of research and interventions tend to focus on street-based prostitution (2) studies on the extent and nature of cyber prostitution within the SAcontext are underrepresented in the research field (3) the negative impacts of cyber prostitution are not clearly determined by existing literature(4) cyber prostitution has become a preferred method of prostitution in modern society for varied motives. Recommendations for further research on cyber prostitution within the SAcontext are also provided.
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
In July 2016, the ATM heist of Taiwan First bank is based on well-known Carberp malware family. The threat of cybercrime is becoming increasingly complex and diverse on putting citizen’s data or money in danger. Cybercrime threats are often originating from trusted, malicious, or negligent insiders, who have excessive access privileges to sensitive data. The analysis of ATM heist threats presents many opportunities for improving the quality and value of digital evidence. This talk will introduce some OSINT methods that can help investigators to perform a cybercrime investigation process in a forensically sound and timely fashion manner. This talk further points out cybercrime investigation, digital forensics, and ICT governance for fighting against cybercrime issues. It requires the sincere examination of all available data volumes at a crime scene or in a lab to present digital evidence in a court of law.
Challenges from the Cyber Domain: Cyber Security and Human RightsAdam David Brown
This paper explores the key tensions between human rights and state-implemented cyber security. It examines three key tensions, attribution versus anonymity, international norms and cyber war.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
My presentation at the IGov2 conference at the University of Oslo, 9 Sept 2014. Gave shorter version at Norwegian Board of Technology hearing on 10 Sept 2014. Related journal article at http://ijlit.oxfordjournals.org/content/early/2014/09/01/ijlit.eau007.abstract
Audio at http://www.jus.uio.no/ifp/english/research/projects/nrccl/internet-governance/events/dag-2-del-2-norrm-mp3.mp3
Where next for the Regulation of Investigatory Powers Act?blogzilla
Talk at Open Tech 2015 on legal reform of UK interception and surveillance laws, including a comparison of the Intelligence and Security Committee and David Anderson reports.
Community Policing and National Security A Study of Selected Local Government...ijtsrd
The rising crime rate, especially violent crime involving terrorism, armed robbery, Fulani herdsmen attack, banditry, ritual murders, political assassinations, ethnic and religious violence, kidnapping, pipe line vandalism, election violence are becoming very serious problem to the Nigerian society. Aristotle Isaac Jacobs "Community Policing and National Security: A Study of Selected Local Government Areas in Bayelsa State, Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38204.pdf Paper URL : https://www.ijtsrd.com/humanities-and-the-arts/social-science/38204/community-policing-and-national-security-a-study-of-selected-local-government-areas-in-bayelsa-state-nigeria/aristotle-isaac-jacobs
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
The study is focused on identity theft and cybersecurity in United States. Hence, the study is aimed at examining the impact of cybersecurity on identity theft in United States using a time series data which covers the period between 2001 and 2021. Trend analysis of complaints of identity theft and cybersecurity over the years was conducted; also, the nature of relationship between the two variables was established. Chi-Square analysis was used to examine the impact of cybersecurity on identity theft in United States. Line graphs were used to analyze the trend in the variable. Time series data was used in the study and the data was obtained from secondary sources; Statista.com, US Federal Trade Commission, Insurance Information Institute and Identitytheft.org. Result from the study revealed that consumers’ complaints on identity theft were on the increase every year. Total spending of the economy (both private and public
sector) on cybersecurity was on continuous increase over the years. More than 100% of spending in 2010 as incurred in 2018. The Chi-Square analysis revealed that cybersecurity does not have significant impact on identity theft. The study recommended that the government increase the level of public awareness to ensure that members of the public protect their personal and other information to ensure that they are not compromised for fraud or identity theft. Organizations also need to invest more in the security system and develop policies that will support the security system. At the country level, international treaties and collaboration should be encouraged to prosecute the fraudsters hiding behind national borders.
Roles, Benefits and Challenges of Forensic Facial Image Comparison and the Ni...ijtsrd
Globalization has not only ushered in tremendous changes in the global economic and political arena, it has turned the world into a global village. This is to the extent that event in one part of the world replicates itself in other parts. Of note is the introduction and use of forensics in criminal justice system which has taken roots in some nations of the world while its advantages are yet to be fully utilized in some developing nations of Africa, particularly in Nigeria. This study therefore argued that forensic science, particularly forensic facial image comparison or identification, is now a common method of technology adopted in the administration of criminal justice as well as in the detection of crimes that would have been ordinarily difficult to unravel. The study, thus, situated the challenges or failures of unravelling some of the crimes, murders and assassinations committed in Nigeria in recent years to underutilization of forensics by the law enforcement agency, i.e., the police, in its investigations. The study sees this as one of the factors that rendered the country’s criminal justice system ineffective in prosecuting an alleged offender and exonerating the innocent. This study adopted the historical and explorative research designs in its methodological component. This means that the study relied on secondary sources of data via textbooks, journal articles, official documents and internet sources for relevant literatures. The study proffered some strategies that would improve forensic techniques, particularly forensic facial image comparison identification, which can be used to boost the criminal justice system in Nigeria. Oluka, Nduka Lucas | Igwe, Elijah Onyedikachi | Ativie, C. Ailende "Roles, Benefits and Challenges of Forensic Facial Image Comparison and the Nigerian Criminal Justice System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30523.pdf Paper Url :https://www.ijtsrd.com/management/randd-management/30523/roles-benefits-and-challenges-of-forensic-facial-image-comparison-and-the-nigerian-criminal-justice-system/oluka-nduka-lucas
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docxvickeryr87
250 words agree or disagree
Week 5 Forum
Maiwand Khyber(Jul 31, 2019 1:01 PM) - Read by: 1
Reply
Organized crime refers to the crime conducted by local, national, or international groupings. These groups are highly centralized enterprises and are run by criminals who are engaged in illegal conduct for profit intention. They have an organized hierarchy, non-ideological motives, and are governed by rules and codes (Jones and Bartlett Learning, n.d.).
Three major types of organized crime include gang criminality, racketeering, and syndicate crime. Gang criminals are usually engaged in local offense like robbery, vehicle theft, kidnapping, ransom, and murder. They are hardened criminals who are dangerous to society. Racketeering is an activity in which the criminal gang is involved in extorting money from legitimate as well as illegitimate businesses by the use of intimidation. It consists in selling adulterated commodities, deceiving people, selling spurious drugs, and so forth. Racketeers usually don’t take away all profits and share it with the owners of businesses. In return, they want fixed money from the owners of illegal activities and allow prostitution, liquor selling, and gambling to continue unabated. Syndicate crime refers to the furnishing of unlawful goods and services by organized criminal groups, often known as mafia. Illegal products include liquor and drugs, while illicit services involve trafficking of girls, gambling, and so forth.
Several groups as The Cosa Nostra, The Russian mafia, The Mexican drug cartels, and The Asian Organized Crime Groups have been considered as criminal groups involved in the organized crime at national and transnational levels. International criminal groups operate under various structures with stable hierarchies and network. They try to influence government policies by using corrupt as well as legitimate methods (The United States Department of Justice, 2015).
With changing industrial contours, organized crime has also shifted from traditional ways to tech-savvy crimes (example: cybercrime). It has exploited technological advancements and communication strategies to expand cross-border. This high-tech realm has made many crimes an international threat rather than a local danger. Today, these crimes are conducted by nimble and loosely structured groups that have a global reach. Refined telephone networks have fostered rapid communication, thereby revolutionizing the illicit commerce (Bjelopera & Finklea, 2012).
While technology has facilitated the growth of organized crime, challenges posed by technological advancements in tracking and investigating organized crime need special mention. Investigation of cases has become difficult because of the sophisticated screening options as firewalls. In a drug investigation case that was carried out jointly by the United States and Colombian authorities, it was found that the presence of the firewall made it intricate for authorities to reach them.
Digital technology has transformed organizational life. Developments in communications, and in information storage and retrieval, to name just two areas, have greatly enhanced the efficiency with which legitimate organizations operate. Unfortunately, the benefits of digital technology are not lost on criminal organizations, which exploit digital technology to enhance the efficiency and effectiveness of their own operations. This paper will discuss the organized criminal exploitation of digital technology, by looking at a number of illustrative cases from Asia and around the world. It will discuss the various types of “conventional†organized crime that can be facilitated by digital technology, as well as terrorism, which itself can be regarded as a special kind of organized criminal activity. One fundamental question that the paper will seek to address is whether the activities of Asian organized crime have become substantively different as a result of technology, or whether traditional organized criminal activities in Asia are merely being conducted on a more efficient and effective basis. The paper will note the transnational nature of much organized criminal activity, and will discuss mechanisms for the control of organized crime in the digital age. Dr. S. Krishnan | Mr Harsh Pratap | Ms Sakshi Gupta "Organised Crime in the Digital Age" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41185.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41185/organised-crime-in-the-digital-age/dr-s-krishnan
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Running head: CRIME ANALYSIS 1
CRIME ANALYSIS TECHNOLOGY 2
Crime analysis is a function that usually involves the systemic analysis in identifying as well as analyzing the crime patterns and trends. Crime analysis is very important for law enforcement agencies as it helps law enforcers effectively deploy the available resources in a better and effective manner, which enables them to identify and apprehend suspects. Crime analysis is also very significant when it comes to arriving at solutions devised to come up with the right solution to solve the current crime problem and issues as well as coming up with the right prevention strategies. Since the year 2014, crime rates in the USA have increased steadily as per a study done by USAFacts, which is a non-partisan initiative (Osborne & Wernicke, 2013). With this increase in crime rates, which has majorly resulted in massive growth in technology, it is essential to come up with better means and ways of dealing with the increased crime rates. With the current advancement in technology, better law enforcement tools developed, which has enabled better crime deterrence in better and efficient ways. All this has been facilitated by the efforts of crime analysts who have come up with better tools and thus enabling the law enforcers to better deal with the crimes (Osborne & Wernicke, 2013). In this paper, I will consider the application of crime analysis technology and techniques in fighting crimes. Application of crime analysis technology and techniques used to make crime analysis more accurate and efficient.
Currently, the two technological tools that are used in predictive policing software have enabled security agencies to effectively use predictive policing ("Crime Analysis: Fighting Crime with Data," 2017). Application of this software has enabled better crime prevention as with data obtained in the previous crimes have been used to predict possible future severe crimes in a specific area.
Through the adoption and use of crime analysis, law enforcement agencies have been able to fight against crimes as when compared with the past effectively. The use of crime analysis comes at the right time, where there has been an increase in crime rates in the current digital error. In a survey done by Wynyard group in 2015, the study revealed that for every 10 law enforcement officials 9 of them believe that the use of current technology in crime analysis has had positive effects in helping the agencies in solving crimes as they can identify essential links and trends in crimes ("Crime Analysis: Fighting Crime with Data," 2017). In the same way, other sectors have benefited from data analysis with spreadsheets, databases, and mapping, law enforcers have been able to use data analysis to come up with a better decision. Crime analysis ha ...
Running head: CRIME ANALYSIS 1
CRIME ANALYSIS TECHNOLOGY 2
Crime analysis is a function that usually involves the systemic analysis in identifying as well as analyzing the crime patterns and trends. Crime analysis is very important for law enforcement agencies as it helps law enforcers effectively deploy the available resources in a better and effective manner, which enables them to identify and apprehend suspects. Crime analysis is also very significant when it comes to arriving at solutions devised to come up with the right solution to solve the current crime problem and issues as well as coming up with the right prevention strategies. Since the year 2014, crime rates in the USA have increased steadily as per a study done by USAFacts, which is a non-partisan initiative (Osborne & Wernicke, 2013). With this increase in crime rates, which has majorly resulted in massive growth in technology, it is essential to come up with better means and ways of dealing with the increased crime rates. With the current advancement in technology, better law enforcement tools developed, which has enabled better crime deterrence in better and efficient ways. All this has been facilitated by the efforts of crime analysts who have come up with better tools and thus enabling the law enforcers to better deal with the crimes (Osborne & Wernicke, 2013). In this paper, I will consider the application of crime analysis technology and techniques in fighting crimes. Application of crime analysis technology and techniques used to make crime analysis more accurate and efficient.
Currently, the two technological tools that are used in predictive policing software have enabled security agencies to effectively use predictive policing ("Crime Analysis: Fighting Crime with Data," 2017). Application of this software has enabled better crime prevention as with data obtained in the previous crimes have been used to predict possible future severe crimes in a specific area.
Through the adoption and use of crime analysis, law enforcement agencies have been able to fight against crimes as when compared with the past effectively. The use of crime analysis comes at the right time, where there has been an increase in crime rates in the current digital error. In a survey done by Wynyard group in 2015, the study revealed that for every 10 law enforcement officials 9 of them believe that the use of current technology in crime analysis has had positive effects in helping the agencies in solving crimes as they can identify essential links and trends in crimes ("Crime Analysis: Fighting Crime with Data," 2017). In the same way, other sectors have benefited from data analysis with spreadsheets, databases, and mapping, law enforcers have been able to use data analysis to come up with a better decision. Crime analysis ha.
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxtawnyataylor528
Kathryn E. Scarborough
Eastern Kentucky University
Marc Rogers
Purdue University
Kelli Frakes
Eastern Kentucky University
Cristina San Martin
Purdue University
KKaatthhrryynn EE.. SSccaarrbboorroouugghh, PPhh..DD.., professor at the Department of Safety, Security, and Emergency
Management at Eastern Kentucky University, earned her Ph.D. in criminal justice from Sam Houston State
University. She also has an MA in applied sociology with a certificate in women’s studies from Old
Dominion and Norfolk State Universities, and a BS in criminal justice from the University of Southern
Mississippi. Prior to her teaching at Eastern Kentucky University, she was a police officer in Portsmouth,
Virginia, a United States Navy Hospital Corpsman/Emergency Medical Technician, and a chemical depen-
dency technician. In addition to her faculty role, Dr. Scarborough is Director for Research, Evaluation and
Testing for the Justice and Safety Center. Her current teaching and research interests include criminal
investigation, law enforcement technology, cyber crime and security, and police administration.
In her role as director for research, testing and evaluation, she has oversight of more than
70 projects funded by the Department of Homeland Security, the National Institute of Justice/Office of
Science and Technology, the State of Kentucky, and the Department of Defense. She also serves as project
director or codirector of the following projects: National Study on Criminal Investigation, the Digital
Evidence Assessment of Local and State Law Enforcement Organizations, the Rural Cyber Crime
Response and Prevention Team project, Cyber PAAL, and the ASIS International Security Trends project.
MMaarrcc RRooggeerrss,, PPhh..DD.., CISSP, CCCI, is the Chair of the Cyber Forensics Program in the Department of
Computer and Information Technology at Purdue University. He is an associate professor and also a
research faculty member at the Center for Education and Research in Information Assurance and
Security (CERIAS). Dr. Rogers was a senior instructor for (ISC)2, the international body that certifies
information system security professionals (CISSP), is a member of the quality assurance board for
(ISC)2’s SCCP designation, and is Chair of the Law, Compliance and Investigation Domain of interna-
tional Common Body of Knowledge (CBK) committee. He is a former police detective who worked in
the area of fraud and computer crime investigations. Dr. Rogers sits on the editorial board for several
professional journals and is a member of various national and international committees focusing on dig-
ital forensic science and digital evidence. He is the author of numerous book chapters, and journal pub-
lications in the field of digital forensics and applied psychological analysis. His research interests
include applied cyber forensics, psychological digital crime scene analysis, and cyber terrorism.
Chapter 24
Digital Evidence
477
M24_SCHM8860_01_SE_C24.QXD 2/4/08 ...
ARTIFICIAL INTELLIGENCE MODELS FOR CRIME PREDICTION IN URBAN SPACESmlaij
This work presents research based on evidence with neural networks for the development of predictive
crime models, finding the data sets used are focused on historical crime data, crime classification, types of
theft at different scales of space and time, counting crime and conflict points in urban areas. Among some
results, 81% precision is observed in the prediction of the Neural Network algorithm and ranges in the
prediction of crime occurrence at a space-time point between 75% and 90% using LSTM (Long-ShortSpace-Time). It is also observed in this review, that in the field of justice, systems based on intelligent
technologies have been incorporated, to carry out activities such as legal advice, prediction and decisionmaking, national and international cooperation in the fight against crime, police and intelligence services,
control systems with facial recognition, search and processing of legal information, predictive
surveillance, the definition of criminal models under the criteria of criminal records, history of incidents in
different regions of the city, location of the police force, established businesses, etc., that is, they make
predictions in the urban context of public security and justice. Finally, the ethical considerations and
principles related to predictive developments based on artificial intelligence are presented, which seek to
guarantee aspects such as privacy, privacy and the impartiality of the algorithms, as well as avoid the
processing of data under biases or distinctions. Therefore, it is concluded that the scenario for the
development, research, and operation of predictive crime solutions with neural networks and artificial
intelligence in urban contexts, is viable and necessary in Mexico, representing an innovative and effective
alternative that contributes to the attention of insecurity, since according to the indices of intentional
homicides, the crime rates of organized crime and violence with firearms, according to statistics from
INEGI, the Global Peace Index and the Government of Mexico, remain in increase.
Artificial Intelligence Models for Crime Prediction in Urban Spacesmlaij
This work presents research based on evidence with neural networks for the development of predictive crime models, finding the data sets used are focused on historical crime data, crime classification, types of theft at different scales of space and time, counting crime and conflict points in urban areas. Among some results, 81% precision is observed in the prediction of the Neural Network algorithm and ranges in the prediction of crime occurrence at a space-time point between 75% and 90% using LSTM (Long-ShortSpace-Time). It is also observed in this review, that in the field of justice, systems based on intelligent technologies have been incorporated, to carry out activities such as legal advice, prediction and decisionmaking, national and international cooperation in the fight against crime, police and intelligence services, control systems with facial recognition, search and processing of legal information, predictive surveillance, the definition of criminal models under the criteria of criminal records, history of incidents in different regions of the city, location of the police force, established businesses, etc., that is, they make predictions in the urban context of public security and justice. Finally, the ethical considerations and principles related to predictive developments based on artificial intelligence are presented, which seek to guarantee aspects such as privacy, privacy and the impartiality of the algorithms, as well as avoid the processing of data under biases or distinctions. Therefore, it is concluded that the scenario for the development, research, and operation of predictive crime solutions with neural networks and artificial intelligence in urban contexts, is viable and necessary in Mexico, representing an innovative and effective alternative that contributes to the attention of insecurity, since according to the indices of intentional homicides, the crime rates of organized crime and violence with firearms, according to statistics from INEGI, the Global Peace Index and the Government of Mexico, remain in increase.
Similar to Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Nigerian Law Enforcement Agencies. (20)
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Orkestra
UIIN Conference, Madrid, 27-29 May 2024
James Wilson, Orkestra and Deusto Business School
Emily Wise, Lund University
Madeline Smith, The Glasgow School of Art
Have you ever wondered how search works while visiting an e-commerce site, internal website, or searching through other types of online resources? Look no further than this informative session on the ways that taxonomies help end-users navigate the internet! Hear from taxonomists and other information professionals who have first-hand experience creating and working with taxonomies that aid in navigation, search, and discovery across a range of disciplines.
Acorn Recovery: Restore IT infra within minutesIP ServerOne
Introducing Acorn Recovery as a Service, a simple, fast, and secure managed disaster recovery (DRaaS) by IP ServerOne. A DR solution that helps restore your IT infra within minutes.
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
f you offer a service on the web, odds are that someone will abuse it. Be it an API, a SaaS, a PaaS, or even a static website, someone somewhere will try to figure out a way to use it to their own needs. In this talk we'll compare measures that are effective against static attackers and how to battle a dynamic attacker who adapts to your counter-measures.
About the Speaker
===============
Diogo Sousa, Engineering Manager @ Canonical
An opinionated individual with an interest in cryptography and its intersection with secure software development.
This presentation by Morris Kleiner (University of Minnesota), was made during the discussion “Competition and Regulation in Professions and Occupations” held at the Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found out at oe.cd/crps.
This presentation was uploaded with the author’s consent.
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Nigerian Law Enforcement Agencies.
1. A DISSERTATION FINAL
Defence Presentation
Zems Mathias, Doctoral Candidate.
Date: 21st November, 2015
Venue: BE-GREAT UNIVERSITY COLLEGE
HOMELAND SECURITY AND DEFENCE
Accra, Ghana.
All Rights Reserved
I
2. Normalcy of Crime as A Requirement for Intelligence
Analysis: Case Study of Nigerian Law Enforcement Agencies.
By Zems, Mathias
A DISSERTATION
Submitted to the Graduate College of the University of America
Murrieta, CA. USA in Accordance with the Requirements
For the Award of Doctorate Degree of Philosophy
(Ph.D.) in Intelligence and Security Studies,
(Criminal Intelligence).
Advisory Committee
Prof. Ngboawaji, Daniel Nte, Nigeria
Prof. Sanjay, Kumar, New Delhi, India
Dr. Solomon, Okwendi Minnesota, USA
II
3. I. It is pertinent to note that, law enforcement agents across
the world are currently facing several challenges of policing
their respective countries and communities. One of the
critical challenges is the increasing globalization of
criminality in the form of transnational organized crimes
that threaten the fabric of national, global economic
development and political stability, (Ericson, 2007; Ejiofor,
2012). Among such crimes are terrorism, human
trafficking, corruption and money laundering, narco-
terrorism, skyjacking, hijacking, kidnapping, genocide,
militia attack, arms smuggling, cyber terrorism and trade in
fake and substandard pharmaceutical and industrial
products, (Bandura & Walter, 1977; Reid, 2000; Conklin,
2007), etc.
INTRODUCTION
1
4. These crimes, pose three challenges which include:
First, these crimes require proactive measures rather than
reactive approach which is the traditional policing model because
when they occur, the consequences are often devastating.
Second, the prevention of these crimes requires scientific
knowledge, including intelligence analytical process which is
beyond local and national jurisdictions.
Third, the acquisition of fundamental knowledge for the policing
of these crimes requires dynamic engagement, synergic approach
and or partnership among security and intelligence agencies as
well as between law enforcement agencies and critical non-law
enforcement stakeholders within and across nations.
It is in this context that, it is often stated that contemporary major
sophisticated crimes require transnational network and
intelligence-led policing, (Donnestein, 1995; Ratcliff, 2009).
INTRODUCTION CONT’D
2
5. The original purpose of this dissertation is to provide a concise analysis
of the normalcy of crime in society, and its overall view. It is imperative
to note that crime is present not only, in the majority of societies of one
particular species, but in all societies of all types. There is no society
that is not confronted with the problem of crimes and criminality. All
societies have some level of crime and deviance. This is because crimes
represent an important force of social cohesion that is why crime is
useful in other words, “criminality as a means of perceiving deviance
defines normality.” Therefore, in the mechanical societies, crime is
considered to be normal, (Durkheim,1897; Darrow 1972; Merton, 1965;
Mathias, 2009).
At this stage, it is the study of law enforcement through the deployment
of scientific intelligence to ensure safety of lives and property, (Zems,
2013), and in any looming violence or criminal activities, the law
enforcement are empowered to use skill and resources to restore sanity,
as embodied in the Nigerian constitution (1999) of the Federal Republic
of Nigeria (promulgation) Decree (1979) as amended (2011) and
Nigeria Police Acts (1943/1967 as amended in (1999).
INTRODUCTION CONT’D
3
6. There is no gainsaying the fact that law enforcement agencies in
Nigeria face monumental challenges, (Alemika, 1993a; Ahire, 1999;
Odekunle, 1979; Mathias, 2009). However, it is imperative that there
is a pertinent need for personnel of these agencies to objectively
study the nature and dynamic of crime with a view to understanding
the linkage of this peculiar knowledge as aid to properly access
crime and criminality within the frame work of intelligence and
product assessment, (Burt, 1983; Linda, 2003; Mathias, 2013).
Other factors which alternates credible information and criminal
intelligence sharing include; inherent tendency to hoard information,
cultural issues report and jurisdiction and issues of patriotism
especially in multi ethnic countries and transitional democracies such
as Nigeria, (Brown, 2007; Carter, 2009; Nte, 2013; Zems, 2013;
Inter-agency Assessment Co-ordination group’ (n.d).
STATEMENT OF THE PROBLEM
4
7. Within the framework of the apparent monumental challenges
facing the law enforcement and intelligence agencies in the world
albeit Nigeria. This study seeks to find the key answers to such
key fundamental questions as how normal are crime in the
society? How does the study of the normalcy of crime equip law
enforcement agencies in the gathering and management of
information and criminal intelligence? What are the key factors
that promote or otherwise the job of criminal intelligence
management in Nigeria. Answers to these questions will provide
critical insights into the nature and dynamics of the study of the
normalcy of crime as key catalyst to the understanding of criminal
intelligence management in Nigeria.
STATEMENT OF THE PROBLEM CONT’D
5
8. OBJECTIVE OF THE STUDY
The overall aims and objectives of this study are as follows:
i. To highlight the history of law enforcement agencies, the
case of Nigerian and the international perspective and its
respective functions.
ii. To analyze the normalcy of crime in society, this is a
requisite for law enforcement, intelligence gathering and
investigations
iii. To analyze crime as a learning behavior and as a lead for
intelligence analytical processes.
iv. To establish the significance of criminal intelligence as a
prerequisite for the provision of public safety and internal
security in Nigeria.
v. To establish the challenges facing the process of criminal
intelligence gathering and management by Nigerian law
enforcement intelligence agencies.
6
9. vi. To examine the relevance of criminal intelligence in
the protection of Nigeria’s national security and or defence.
vii. To evaluate the challenges facing the gathering and
management of criminal intelligence information by
Nigeria’s national security and defence agencies.
viii. To highlight how we study crime, how we explain crime
and how we determine what is criminal and non-criminal,
as an aid to intelligence assessments.
ix. To highlight the concepts, functions and importance of
crime in the society.
x. To illustrate the roles of intelligence in law enforcement,
intelligence gathering and crime correlation.
OBJECTIVE OF THE STUDY CONT’D
7
10. xi. To evaluate functions, sources of information for law
enforcement and importance of intelligence agencies.
xii. To examine the goals and objectives of understanding
crime, its strategies for law enforcement intelligence in
crime management and control.
xiii. To outline the qualities of good investigations.
xiv. To establish that crime binds the society together.
xv. To discuss undercover and surveillance investigations
as an integral part of intelligence and investigative
processes.
xiv. To identify the merits of intelligence-led policing as a
tool in fighting crime.
OBJECTIVE OF THE STUDY CONTI’D
8
11. RESEARCH HYPOTHESES
The following hypotheses were put forward for test by the study:
Hypotheses No 1:
Ho: Criminal intelligence has no significant relationship with
law enforcement practice
H1: Criminal intelligence has significant relationship with law
enforcement practice.
Hypothesis No 2
Ho: Criminal intelligence has no significant relationship with the
efforts at providing internal security in a country.
H1: Criminal intelligence has significant relationship with the
efforts at providing internal security in a country.
Hypothesis No 3:
Ho: Criminal intelligence has no significant relationship with the
efforts at providing national security or defence in Nigeria.
H1: Criminal intelligence has significant relationship with the
efforts at providing national security or defence in Nigeria.9
12. There is no doubt that in the course of this study a number of interesting findings
were made. Some of these findings could be highlighted as follows:
1. There is significant relationship between criminal intelligence and law
enforcement agency activity aimed at preventing, detecting and prosecuting
crimes based on established laws of the land.
2. Criminal intelligence has significant relationship with the efforts aimed at
providing internal security as abundantly or express enunciated in various
constitutions and relevant statutes in Nigerian for example.
3. Criminal intelligence has significant relationship with the efforts at
providing national security or defence as this is abundantly or expressly
exemplified in matters concerning espionage and activities of Interpol
across the world.
4. Both undercover/or surveillance investigation and espionage have proved
to be a two double-edged sword that is capable of yielding very vital
results on one hand and spelling doom for the detectives involved if not
carefully handled, on the other hand.
5. The recent introduction of electronic devices such as CCTV system has
significantly enhanced surveillance as a tool for gathering criminal intelligence.
SUMMARY OF MAJOR FINDINGS
10
13. 6. The recent introduction of internet has posed significant
challenge to criminal intelligences gathering as a potent tool
in the hands of laws enforcement experts.
7. Sharing of information and criminal intelligence report on the
part of sister law enforcement agencies has significant impact
on their ability to wage war against crimes in the society.
8. The recent rise in terrorism or domestic insurgency in parts of
Nigeria is a potent threat to both internal and national security.
9. Lack of authority to immediately affect arrest or prosecute
offenders has significant impact on the capability of private
security outfit to provide internal security in Nigerian.
10.The existence of such international organization and
institutions like the UN Security Council, ICJ, ICC, WTO, AU,
Interpol etc has significant national security and defence in
across the world.
SUMMARY OF MAJOR FINDINGS CONT’D
11
14. CONCLUSION
The Nigerian law enforcement agency must realize that the arena has changed
in significant ways when speaking of intelligence, intelligence-Led Policing
crime analysis and how they relate to terrorism, organized and transnational
crimes. Gone are the days when two very important facets of law enforcement
could function in two different worlds. Now more than ever they must blend
together so that relevant, accurate timely, and actionable intelligence is
available to law enforcement.
The Intelligence-Led Policing (ILP), (Baker, 2012) is an emerging paradigm
shift for law enforcement that appears to have some real merit. It is a proactive
rather than a reactive approach to modern policing. Intelligence- Led Policing
can be referred to as a philosophy, business model or a theory, which focuses
on the collection and analysis of crime and social data to support on‐going
investigations, as well as identify criminals, crime trends and patterns.
Intelligence-Led Policing supports law enforcement leadership in efficiently
and logically managing their personnel and assets, (Smith, 1997, Porter, 1997).
12
15. In information and intelligence report sharing, we all have an inherent tendency
to hoard information, to protect it, and to guard against its use. A surprising
amount of information was known about the terrorists of September 11, some of
who were on official watch lists. Nonetheless that information and intelligence
report was not shared or collected and analyzed timely and accurately, so that it
could have prevented the horrific, devastating and lethal attack on the WTO
building.
Also, in Nigeria there are countless evidence of intelligence failure arising from
non-sharing of information and intelligence report by the four major law
enforcement intelligence agencies and the intelligence community. The result is
the appropriate successful and destabilizing lethal attacks by the dreaded Boko
Haram across the country.
This dissertation has boldly made an attempt to examine the perennial problems of
normalcy of crime; it also provided the root causes and answer to the question of
what the role of government should be in fighting crimes.
The need to re-position the Nigerian law enforcement agency, itself has been
elaborated, and it also recommends what it considers appropriate for the effective
management and control of crime by the law enforcement agencies through the
deployment of intelligence-led policing.
CONCLUSION CONT’D
13
16. RECOMMENDATIONS
Based on the findings of this study, the following recommendations have become
expedient:
1. Owing to the great importance of criminal intelligence to law enforcement
agency as an activity aimed at curbing crimes in society, government whose
greatest responsibility it is to provide security, law, order and peace to its citizens
should strive on intelligence gathering aspect of the duties of its law enforcement
agencies. This no doubt calls for greater political will to adequately fund
governments’ law enforcement agencies.
2. All law enforcement agencies be it public or private should not only ensure
that well trained or experienced persons are recruited into their respective
employs but also give private attention to the issue of training and retraining of
their staff both at home and overseas.
3. To fortify its capacity to deal with national insecurity, Nigeria as a nation
should always strengthen its membership of such international organizations like
the United Nations, African Union, ECOWAS, Interpol organization etc.
14
17. 4. Every law enforcement agency in Nigeria such as the Nigeria police, DSS, NIA,
DIA, intelligence community and private security outfit etc should develop the
ability and readiness to share and exchange its information and criminal
intelligence report with any of its sister agency for purpose of providing
enhanced internal or national security in the country.
5. The justice system in Nigeria should be overhauled to pave way for speedy
prosecution of criminal cases by the nation’s law enforcement agents who toil
day in and day out to collect information and criminal intelligence only to suffer
undue delay in court, while prosecuting their apprehended criminals. Such
speedy trial of criminal cases would no doubt boost the morale of the said
criminal intelligence officers in performing their duties.
6. The Nigeria police itself require to be given a new image that befits the
democratic system. The paucity of equipment and general poor condition under
which it operate must be considered for improvement. The present number and
strength of the force is rather inadequate, money to be allocated for recruitment,
training and retraining. Also training and retraining is needed to provide a new
orientation to the police in order to cope with the modern challenges of high
degree of social disorder in the country.
RECOMMENDATIONS CONT’D
15