Presentation on theme: "David Wodi Tukura PhD Detective Commander and Director, Planning, Policy & Statistics, Economic and Financial Crimes Commission, Abuja, Nigeria."— Presentation transcript:
David Wodi Tukura PhD Detective Commander and Director, Planning, Policy & Statistics, Economic and Financial Crimes Commission, Abuja, Nigeria
“ Of the foremost duties enjoined upon the State, the foremost duty is to maintain public law and order and preserve the rule of law. It is one of the most important pillars of good governance as the collapse of public order and the rule of law can erode the faith of the citizens in their government and erode its legitimacy. ICTs can play a pivotal role in transforming the police force from being an oppressive agency of the government to an agency which first and foremost exists to protect lives and the liberty of the common citizens” ICTD Project Newsletter, 2007
“Recently, rapid development in the field of ICT have had a major influence upon police work...For the police, ICT plays a twofold role: New technologies can support police work but also provide new opportunities for offenders to commit crimes” ICT Trends in European Policing 2011 Composite Project.
GOOD GOVERNMENT INTELLIGENCE Instrumentalities of The State to Maintain Public Order PREVENTIONDETERRENCE Good governance effective laws rigorous implementation of laws, socioeconomic development, equity Intelligence Gathering Conflict Resolution Preventive Measures Investigation Prosecution Conviction Punishment POLICE CRIMINAL JUSTICE SYSTEMPRISONS SOURCE:IICTD Project Newsletter: October; 2007: 37
Professional 1. Crime Prevention 2. Crime Detection 3. Law and Order Maintenance 4. Crowd Management 5. Riot Suppression 6. Traffic Management 7. Incident Response 8. Investigation 9. Crime/ Intelligence Analysis 10. Counter-Insurgency
Support Services to Law Enforcement 1. Administration 2. Finance 3. Human Resources 4. Management Technology 5. Procurement 6. Research 7. Medical Services
1. Lack of integrated information systems 2. Poorly collected and imputed data 3. Information Territoriality, i.e. lack of inter- agency information exchange regimes. 4. Poor integration of voice, radio and data communications system. 5. Lack of timeliness of captured data. 6. Severe information security deficits and leakages. 7. Poor in-house communication regimes
1. While law enforcement could be described as a generally conservative enterprise, technological adaptation is not new to the Police and Security Services. In fact, some of the devices in use today were used by the military decades before the public was even aware of they existed. 2. Below are some epoch making adaptations: 1850-1888 1. Samuel Colt invents the multi-shot pistol. The weapon was adopted by the Texas Rangers and police services worldwide. 2. 2. Sans Francisco adopts the use of photography for criminal identification 3. In Albany New York, the Police and Fire Departments adopt the use of the telegraph in 1877. 4. The Washington DC Precinct Police adopt the use of the telephone. 5. Chicago become the first US city adopt Alphonse Bertillon’s techniques for the measurement of the human body, first used in anthropology, for the identification of criminals. The Bertillon method was in use until the development of the finger print system.
1901-1932 1. Scotland Yard adopts fingerprint classification devised by Sir Richard Henry. 2. Edmund Locard setups the first police crime laboratory in Lyon, France. 3. The Pennsylvania State Police adopts the teletype. 4. The Detroit Police begin use of the one-way radio. 5. The Boston Police begin use of the two-way radio. 6. The American Police begin widespread use of the automobile. 7. The proto-type of the polygraph test is developed. 8. The FBI sets up its crime laboratory.
1948-1967 1. Radar is introduced into traffic law enforcement. 2. The American Academy of Forensic Sciences (AAFS) is formed. 3. The New Orleans Police Department installs an electronic data processing machine- a vacuum tube operated calculator with a punch card sorter and collator to summarize arrests and warrants. 4. The first computer assisted dispatching system is installed in the St. Louise Police Department. 5. The National Law Enforcement Telecommunications System for message switching is established.
1967-1970s 1. The FBI establishes the National Crime Information Center (NCIC)-the first national law enforcement computing center. 2. AT&T creates 911 for emergency calls for Police, Fire and emergency services. 3. The 1960s witnesses the invention of riot and crowd management technologies-rubber & plastic bullets; dart guns with tranquillizers; batons with 6000 volt shocking power; strobe lights that confuses persons engaged in disorderly conduct; TASERS (uses electrical currents to disrupt voluntary control of muscles causing neuromuscular incapacitation).
1970s t0 Date 1. Large scale computerization of US Police departments begins. 2. Computer Assisted Dispatch (CAD); Management Information Systems; Centralized Call Collection; Centralized & Integrated Dispatching of Police; Fire and Medical Services. 3. National Institute of Justice (NIJ) adopts Kevlar based body armor. 4. NIJ funds the Newton, Massachusetts Police Department to assess the use of night vision equipment. 5. Rockwell International install fingerprint reader at the FBI in 1979. 6. The Royal Canadian Mounted Police implements first automated fingerprint identification system (AFIS).
7. Introduction of enhanced 911 which allows dispatchers to see on their computer screens the addresses and telephone numbers of callers. 8. Introduction of Oleoresin Capsicum (OC) as a non-lethal instrument of riot control. 9. Police Departments in New York and Chicago start computer programs to map and analyze crime patterns. 10. DNA evidence established by the National Academy of Science (NAS) as reliable instrument for providing criminal evidence. 11. Improvements in crime scene investigation through the use of lights. 12. Use of in car cameras to record events from a patrol car. 13. Use of photo enforcement systems which automatically generate red light violations. 14. Graffiti cameras for taking photos of vandals. Talking cameras which warn intruders.
15. Thermal imaging for the location of suspects; missing persons. Locating disturbed surfaces; indoor marijuana growing operations; concealed bodies; objects and scanning imprints not available to the ordinary eye. 16. Criminal Investigation Records systems used in criminal investigations for making sense out of disparate data. 17. Lasers-laser spectroscopy devices can determine the chemical composition of a substance within seconds. 18. Automatic License Plate Recognition (ALPR)-this technology enables officers to check thousands of license plate numbers to determine if vehicles are stolen, registered or if the drivers are wanted.
19. Video sunglasses- these allow law enforcement officers video whatever is in view. Could have a memory of up to 32 gigabytes. 20. Wrist phones- allow the officer to transmit on- going conversations via a GSM network without raising suspicion. Camera pens-allows the discrete generation of footage. 21. CCTV- electronic surveillance that allows the capturing of events in real time. Credits: I wish to acknowledge the paper “Use of ICT and Scientific Aids in Policing” by O.M. Oyeobu; First Point Consulting Limited for the information of Policing Technology; 20 th October, 2010.
Anti-Terrorism Technology 1. Magnetometers 2. 2. X-rays 3. Continuous Wave Devices. 4. Pulse Field Detectors 5. Chemiluminescence (generation of electromagnetic radiation as light by the release of energy from a chemical reaction)) 6. Backscattering Technology (the reflection of waves, particles and signals back to the direction from they came) 7. Computed Tomography ( uses computed processed x-rays to produce tomographic images or slices of specific areas of the object of interest)
The Situation 1. Security issues rank among the most pressing need of Nigerians today. 2. Terrorism; armed robbery; organized crime; trafficking in persons especially women and children; inter- communal and inter-ethnic violence impact negatively on the lives of many Nigerians. 3. The proverbial “village” with its characteristic Acadian innocence and tranquility can now be found only in books, novels and Nollywood. The village is now the war-camp of ethnic militia and kidnappers. 4. The families of Nigeria’s politicians and noveau rich are now huddled in Abuja in the hope that there is more security in the FCT than in their own ancestral homes.
6. Open borders, the free flow of people, goods, information and capital while being globalization forces also provides opportunities for criminals. 7. In Nigeria, through globalized terrorism, a rag tag movement of simple minded religious fanatics, within a space of ten years developed linkages that put to test the operational capacity of the best equipped military in the West African sub-region. 8. The area of economic and financial crimes which I am more familiar, over 50% of our work is connected with crimes using the internet of some form of ICT technology.
1. Policing and security are very complex activities requiring the integration of multiple data sources. 2. The nature of law enforcement and security information is such that errors in storage and transmission could have devastating consequences. 3. There is only one way out: The Law enforcement and security communities must START THINKING STRATEGICALLY! 4. The era of the lone ranging police Department or clandestine 007 spy belongs only to the movies. 5. Criminals have become strategic thinkers! 6. The leadership of the law enforcement and security organs MUST adopt strategic thinking if they are succeed in the 21 st Century
“Today, Five years after 9/11, Law enforcement is no much further ahead in its ability to connect the dots than it was in the year 2000. Many efforts are underway to standardize law enforcement information, provide the infrastructure for wide spread sharing of information, enact legislation to permit information sharing and warehouse data and deploy technologies such as data mining, link analysis and other analytic techniques” Source: Charles Hill, Thomas Cowper and Andreas Olligshlaeger
“Our criminals and terrorist adversaries are already beginning to understands the advantages of network centric models over traditional hierarchical “ Source: Charles Hill, Thomas Cowper and Andreas Olligshlaeger
1. There is the need to develop software that would promote INTERGRATED DATA BASES AND SYSTEMS across law enforcement agencies; security departments; the armed forces, regulatory bodies and the entire criminal justice system. 2. New interfaces between systems must be developed in such a way that previously unrelated information can be combined and used to support INTELLIGENCE LED POLICING. 3. Professional bodies like ISPON must take up the challenge of developing the infrastructure of collaboration and integration.
Source:David Tukura: Re-Tooling Law Enforcement; ISPON Paper; Calabar; 2013
Such software will enable the following: 1. Automation of internal law enforcement processes and communication. You will be surprised that even in the law enforcement and security professions, internal breakdown in communication is common. 2. Automation of inter-agency communication. Such software should enable law enforcement; security; regulatory; judicial and penal systems communicate automatically with minimal human interference. 3. Software should also enable expert analytical usage. The system should have residual capacity to empower research, good internal administration; organizational support; planning and crime prevention.
4. Such software should also enable law enforcement and security agency interface with the public. The agencies should have ICT resources that would empower citizens information sharing with the agencies through lodging of complaints on human rights violations. 5. Such software should enable real-time intelligence gathering. The nature of cyber criminality; terrorism, money laundering and trans-border crimes some time requires that law enforcement agencies have “real-time” information and intelligence. This way, sensors; electronic and human surveillance systems can directly interface central intelligence stations. Such software would make the policeman as mobile and versatile as the criminal. 6. This presentation cannot be complete without the mention of biometrics. The dearth of biometric data systems in Nigeria has put criminals well ahead of law enforcement and security. This is an area where ISPON can make tangible contributions to making Nigeria secure and safe. Thank You!!!!