Want better user experience? Login or Signup

DESIGN AND IMPLEMENTATION OF CYBER-CRIME MANAGEMENT SYSTEM (A CASE STUDY OF EFCC, ENUGU)


Project topic for Computer Science department

CHAPTER ONE

Introduction

1.1 Background to the Study

Cyber-Crime Management System is simply an information system designed to facilitate the storage, organization and retrieval of Cyber-Crime data on the go.  Google internet network. However, amazingly, the first cybercrime has been documented early in 1820. A group of employees of Joseph-Marie Jacquard tried to sabotage the “loom Jacquard” invented.

The cybercrime, commonly known that depends on network and modern computer was found after the development of modern computer and internet. The first virus program called Creeper, made in 1971 by Bob Thomas who has no intention of conducting any criminal activities. Since then, countless malicious software is made.

The traditional and age-old system of intelligence and criminal record maintenance has failed to live up to the requirements of the present crime scenario. Manual processes neither provide accurate, reliable and comprehensive data round the clock nor does it help in trend prediction and decision support.  It also results in lower productivity and ineffective utilization of manpower.

Recent years it is observed that there is an increasing use of computers within EFCC, not just in general administration (e.g. payroll, personnel, e-mail, general office, suites, etc.), computers are tools that to assist the core business activity of policing (preventing and solving) crime related problems. Increasing crime rates and the greater awareness of modern criminals puts a strain on existing methods and techniques. There is therefore a clear need for the application of advanced software technologies in order to make the best use of limited resources.

A better and scalable solution which leverages advance software technologies to this ever increasing problem is a Cyber-Crime Management System. This system uses computer-generated records stored in an information system, as an interface for integrating and accessing massive amounts of location-based information in real time.

Cyber-Crime Management System allows EFCC personnel to plan effectively for emergency response, determine mitigation priorities, analyses historical events, and predict future events. Cyber-Crime Management System aids identification of potential suspects, increases investigators suspect base.

The ability to access and process information quickly while displaying it in a spatial and visual medium, allows agencies to allocate resources quickly and more effectively.  In their mission, critical nature of law enforcement, information about the location of a crime, incident, suspect, or victim is often crucial to determine the manner and size of the response. 

Cyber-Crime management software hues to co-ordinate vast amounts of location-based data from multiple sources and the accessibility of this information at any time.  It enables a user to the data and view the data most critical to the particular issue or mission. It is used all over the world by Cyber-Crime departments, both large and small, to provide solutions for crime analysis, criminal management, traffic safety, Intranet/Internet mapping, and numerous other tasks.

According to Deepak (2011), Cyber-Crime Management System helps crime officers to determine potential crime sites on the Google, by examining complex seemingly unrelated criteria and displaying them all in an inter-face.  It also helps them map inmate populations, fixtures, and equipment to provide for the safety of inmates by separating gang members, identifying computer-related offences (money laundering) and  identifying hazardous locations in an area. It reduces the potential for internal violence by providing better command and control.

Traditionally, these activities have been supported by some book register or paper and pen, which are usually prone to destruction in various manner.

This profession-alas is basically possible when the EFCC is equipped with the necessary; tools that have the ability to quickly generate crime report directly relevant to the situation at hand and aid police agencies collect vast amounts of data from many sources including called-for-services, arrests, first information reports and daily report.

1.2 Statement of the Problem

The outcome of this research work will be useful to cyber crime investigators by helping them to detect the identity and location of a cyber criminal. This will ease further investigation and possible prosecution of the criminals.

If the Cyber User Identification and Crime Detection System (CUICDS) designed in this study is put into use, it will scare cyber users from indulging in criminal acts. This is because it is common knowledge that once a criminal is identified, it is easier to prosecute him to serve as a deterrent to others, and once criminals know that they can be easily detected, they are scared of indulging in crimes.  

The implementation of the CUICDS will also give confidence of data and information security to Internet users as well as to individuals and organizations who host their valuable data and information in the cyberspace.

This study will also open a new horizon of research for network security researchers to explore on how to detect and combat cyber crime through the cyber user identification approach.

The findings of this research will also help governments of various nations on how to promulgate legislations on the combat of cyber crime and the prosecution of cyber criminals.

1.3 Motivation

Cyber-Crime Management Systems as it is now has so many problems and excesses associated with it both for EFCC officers and other security agencies. These problems have led to the loss of huge resources. It has also resulted in a situation where by the EFCC find it difficult to provide a reliable evidence and comprehensive report on crime.

Suspects are wrongly detained for a long time on crimes they know nothing about, due to lack of valid reports and evidence. The current situation which may be likened as trying to force a Carmel through the eye of a needle is very unpleasant for both parties. Having seen all these problems and excesses associated with current state of affairs in the EFCC, much is left to be desired and there is a great room for improvement. So, something be done to remedy the situation.

1.4 Aims and Objectives

These research aims at the design and implementation of a Cyber-Crime Management System. The specific objectives are:

  • To design a Cyber-Crime Management System.
  • To implement a Cyber-Crime Management System.

1.5 Significance of the Study

Implementation of a Cyber-Crime Management System for EFCC help the police and the masses to get useful information on individuals with crime records. The system developed among other things helps to:

  • Maintain a database of all crime records.
  • Enable a quick search on the database to retrieve cyber-crime  information.
  • Provide real time information on specific criminal activity.
  • Enable EFCC to track previous crimes committed by a suspect.
  • Make crime control easier for EFCC.

1.6 Project Report Organization

The project is organized into five distinct chapters as follows:-

Chapter One Introduction states the background of the research, the problem which is being tackled, the motivation behind the study, aims and objectives, purpose of the research, significance of study, the organization of the work, and finally, the definition of terms.

Chapter Two: Literature Review deals with the review of related literature and some of the previous efforts made in the field. It consists of the brief history of EFCC and a review on Criminal Cyber-Crime Management System.

Chapter Three: Research MethodologyThe methodology of conducting the research is stated here. It deals with detailed investigation and analysis of the existing system and design of the proposed system.

Chapter Four: this hardware and software requirement, the data source for the project and algorithms used in the implementation of the project.

Chapter Five: Discussion and Conclusionthis chapter brings the research to conclusion. It states the limitations of the project and the recommendations. Also, it summarizes the research and the result derived from conducting the study.

1.7 Definition of Terms

Crime:  A  normative  definition  views  crime  as  deviant  behavior  that violates  prevailing norms -  cultural  standards  prescribing  how  humans ought to behave normally.

Criminalization: One can view criminalization as a procedure deployed by society as a pre-emptive, harm-reduction device, using the threat of punishment as a deterrent to anyone proposing to engage in the behavior causing harm.

EFCC: This is an acronym for Economic and Financial Crimes Commission. It is a commission created by an act of the National Assembly in 2002 and was amended in 2004. It is charged with the responsibility of investigating and enforcement of all laws against economic and financial crimes.

NFIU: The crime of deceiving somebody in order to collect money or goods illegally. It also means a person who pretends to have qualities and abilities, skills etc that he or she does not really have to deceive others.

FIIB: Federal Investigation and Intelligence Bureau

NFIU: Nigeria Financial Intelligent unit (NFIU).

ANN: Artificial neural network.

Synchronize: The coordination of events to operate a system.

Real time: level of computer responsiveness that a user senses as sufficiently immediate or that enables the computer to keep up with some external process.


To get the complete material - Download Here

Other topics you might be interested in: