Beruflich Dokumente
Kultur Dokumente
Omoleke Muslim
Independent National Electoral Commission (INEC)
Abuja, Nigeria
Abstract – This paper examined technologies being used in crime prevention and detection with a view to
identifying such technologies, legal issues and the challenges involved in the application of these technologies
and attempted to forge an acceptable legal framework for the use of technologies in crime prevention and
detection in Nigeria. Both primary and secondary sources of data were used. Primary sources include books,
journal, publications, dailies, conventions and a host others. Secondary sources include materials sourced from
the internet. The study revealed that though there are quite a good number of technologies for crime prevention
and detection, the major issues involved are the human right abuse and the challenges of training the staff who
are expected to apply these technologies among others. The study concluded that though there is need to
employ sophisticated technologies in view of the alarming rate of crime commission worldwide and particularly
in Nigeria , however, these technologies need to be reviewed to soften the hardship and human right abuses
which are found in the application of the technologies. This can be achieved by putting in place an acceptable
world standard and robust legal framework that would help in the mitigation of hardship and human abuses
that are embedded in the application of the technologies.
The rate of insurgency in Nigeria has been In view of the above positions of scholars
giving the incumbent government sleepless night to on Technologies and Crime prevention and
the extent that hope is almost lost when it was detection, it is not an overstatement to
discovered that despite all efforts of the Federal conclude that technology may play a dominant
Government to curtail the activities of criminals, it role in reducing crime in Nigeria.
seems the problem almost defy all logical Also, modern technologies used in crime
solutions. prevention and detection would be categorized
It is against this backdrop that this paper into three (3) for the purpose of this paper
attempts to examine the impacts of introducing namely: technologies of surveillance and
modern technologies to combat crime with a view detection, technologies of blocking and access
to identifying possible legal issues and challenges control and technologies of restraint.
that may inhibit the operation of these (b) Technologies Surveillance and
technologies. Detection
Important amongst these technologies
II. Methodology include:
Both primary and secondary sources of data Metal Detector Technology: The metal
collection methods were used. Primary sources detectors in airports, office building, schools,
include legislation, treaties, judicial authorities, government agencies and prisons help ensure
convention and a host of others. Secondary sources that no one is bringing weapon into the
on the other hand include books, journal, premises.
publications, dailies and materials sourced from the Though metal detectors have been found
internet among others. useful in public places. stationery metal
detectors, have been found capable of isolating
III. LITERATURE REVIEW harmful metal oriented objects, it has been
Literally in this context, the word technology found that such detectors are capable of
includes the application of scientific knowledge for creating prison-like or s:iff environment and
practical purposes or the use of machinery or tools/ thereby adversely implicate the climate of the
techniques for the attainment of a goal/objective. school.
Below are the various technologies used in crime Radar: The term radar was introduced in
prevention. 1940 by the United State Navy as an acronym
for radio detection and ranging [12]. Radar
(a) Technologies Used in Crime Prevention and when effectively used could prevent or
Detection minimize overspeeding on Nigeria roads.
A cursory review of the historical development Furthermore, street lighting has been
of efforts to prevent crime underscores the point discovered to be capable of increasing
that technology or more precisely technological visibility, hence improve the chance of
innovation has been the driving force leading to exposing the criminals. Other technologies of
reform of crime prevention and crime control surveillance and detection include but not
strategies [9]. The first technology revolution in the limited to Red Light Camera, Closed Circuit
United State that changed the way police were Transmission (CCTV) and Home Alarm
organized and how they operated centered around System. CCTV is capable of detecting crimes
three technological innovations that were and facilitates the identification of offenders.
incorporated into policing; the telephone, the two- CCTV has had a very important role in counter
way radio and the automobile [10]. Several other terrorism [13]. It is also useful in traffic
scholars have posited that we are in the beginning management, hazard management and personal
stages of a second technologies revolution, which safety amongst others. However, as useful as
will once again dramatically change police CCTV is, most Local Government in America
organization and administration [11]. The need for do not buy the idea of CCTV, because they are
technological innovation in crime prevention has not convinced that it could reduce crime.
also been stressed in Corbertt and Marx as follows: It should however be noted that the
New technology is inherently attractive to efficiency or otherwise of these technologies is
an industrial society. It’s risky to be a function of many factors ranging from proper
against new technology, however deployment, training of officers handling
mysterious its operations or recondite its them, and intelligence gathering to assist in the
underlying engineering. Technical utilization of the technology in question.
innovation becomes synonymous with (c) Technology of Blocking and Access
progress. To be opposed to new Control
technology is to be a heretic, to be old- Various methods or technologies have
fashioned, backwards resistant to change, been developed which make crime more
regressive, out of step [11]. difficult to commit by impeding access to a
target. Prominent amongst these technologies of relevant laws for the few technologies that
are smarter locking technology which makes it are in existence.
difficult for vehicles to be stolen, retina Furthermore, limited duration time for
imaging, voice print, hand geometry readers digital evidence is a serious legal issue
and other biometric technologies. These involving the application of new technologies
biometric technologies are used for verification for crime prevention and detection. Under
and identification of persons by various normal circumustances, image or evidence
psychological characteristics. gathered electronically has time durations,
Other technologies of blocking are car unless and until the duration is extended.
radio or television blocking device, which In the matter of truth serum induced
makes it impossible for those gadgets to be confessions, the application of this technique
operated unless certain codes are entered. which involves injecting a suspect with
(d) Technologies of hypnotics like sodium pentothal or sodium
Restraint/Incapacitation amytal raises some legal issues such as
Technologies of incapacitation can be applied encroachment of an individual‟s rights,
to demoblize vehicle or criminals. A liberties, freedom amongst others. Evidence
technology developed to stop a moving vehicle resulting from inducement of suspect is
on high speed is to check excessive speed. another major setback. Under the Evidence
Such technology involve transmitting a short Act. LFN, 1990. Section 28 provides “A
electromagnetic pulse which can damage the confession made by an accused person is
electronic components of a vehicle‟s ingnition irrelevant in a criminal proceeding, if the
system and cause it to stop. Another making of the confession appears to the court
technology of restraint include a technology to have been caused by any inducement threat.
that can identify a fleeing vehicle which is In conclusion, it is observed that the use of
called the use of lagging system. This would modern technologies for crime prevention and
involve a small adhesive projectile containing detection is faced with enormous legal issues.
a radio - frequency transmitter which will
permit identification of the vehicle location. V. CHALLENGES
Technologies such as chemical incapacitation, Though modern technologies have been
electrical incapacitation and pharmacological adjudged appropriate to pre eat and detect
substances are capable of restraining suspects. crime, some of them have been discovered to
(e) The role of Geospatial Technology pose serious problems in the acquisition and
A large geographical area like Nigeria with deployment of same. For example, it has been
about 923, 768 km2 requires more discovered that CCTV does not always provide
sophisticated technology like Global (GPS) the benefits expected of it Major challenges
and Geographical information system are used include poor camera positioning, poorly
to track the information about a particular area maintained equipment, lack of recording
and movement of suspected criminals with the facilities. Conversion of mages into a form that
available data and video. The technology can easily be used by judges in court is another
enables the police to take action proactively. challenge. The use of CCTV may eventually
result to intrusion into another person‟s
IV. LEGAL ISSUES environment of which the CCTV is not
Most of the legal issues involved in the originally installed to cover. Such intrusion
application ci technologies to prevent and may be subject of litigation. Other challenges
detect crime has something to do with human as may be posed by the introduction of new
rights issues and admissibilities of evidence technologies include but not limited to:
arising from the application of the (1) Training of criminal justice
technologies. In Nigeria for example Section professionals such as judges, lawyers,
37 of the 1999 Constitution as amended police and a host of others.
provides “the privacy of citizen, their homes, (2) Risk in operation form is another
correspondence, telephone conversation and major challenge. For example, some
telegraphic communications is hereby technologies such as pepper spray,
guaranteed and protected”. Consequently, tear gas, hot water spray could be
installing CCTV in public buildings may harmful to the operators if not
violate the provision of the constitution. properly handled.
Inapplicable provisions due to antiquated (3) Political leadership - The incumbent
definition of the elements or words is also part government may not consider it
of the legal issues that should be addressed. politically expedient to introduce new
What is however applicable in Nigeria is lack technologies.