TABLE OF CONTENTS
TITLE PAGE …………………………………………………………………………… i
CERTIFICATION PAGE .……………………………………………………………… ii
APPROVAL PAGE …………………………………………………………………….. iii
DEDICATION …………………………………………………………………………. iv
ACKNOWLEDGEMENT ……………………………………………………………… v
ABSTRACT ……………………………………………………………………………. vi
TABLE OF CONTENT ………………………………………………………………… vii
LIST OF FIGURES …………………………………………………………………… viii
LIST OF TABLES ……………………………………………………………………… ix
CHAPTER 1: Introduction ……………………………………………………………… 1
- Introduction………………………………………………..………………………… 1
1.1Statement of problem…………………………………………………………………. 3
1.2 Objectives ……………………………………………………………………………. 5
1.3 Significance of the project …………………………………………………………… 5
CHAPTER 2: Literature Review ………………………………………………………… 6
- Introduction …………………………………………………………………………… 6
2.1Theoritical background ……………………………………………………………… 2.2
Review of Related Literature…………………………………………………………….. 7
2.3Summary……………………………………………………………………………….. 17
CHAPTER 3: System Analysis and Design ……………………………………………… 19
- Introduction …………………………………………………………………………. 19
3.1Describe the existing system ………………………………………………………… 21
3.2Analysis of the proposed system…………………………………………………….. 21
3.3Design of the proposed system………………………………………………………. 24
CHAPTER 4: System Implementation
- Introduction…………………………………………………………………………. 26
4.1Chioce of development Environment…………………………………………………. 26
4.2Implementation of Architecture……………………………………………………… 26
4.3Software Testing……………………………………………………………………… 27
4.4Documentation………………………………………………………………………. 31
4.4.1User Manual……………………………………………………………………….. 31
4.4.2Source code listing…………………………………………………………………. 32
CHAPTER 5: Summary and Conclusion
- Summary…………………………………………………………………………….. 33
5.1Conclusion…………………………………………………………………………… 34
5.2Recommendation……………………………………………………………………. 35
Reference………………………………………………………………………………… 36
Appendices………………………………………………………………………………. 38
ABSTRACT
Reducing the risks of nuclear war, limiting the spread of nuclear weapons, and reducing global nuclear weapons stockpiles are key national and international security goals. They are pursued through a variety of international arms control, non-proliferation, and counterterrorism treaties and agreements. The legally binding and political commitments, together with the institutional infrastructure that supports them, work to establish global norms of behaviour and have limited the spread of weapons of mass destruction. This project tends to proffer solutions on how to identify, track and mop-up nuclear arms entering Anambra State using technology to monitor the nefarious activities of arms smugglers. A top down hypothesis approach was applied with the statistics of weapons already tracked. Java Script language was used to code the software.
CHAPTER ONE
INTRODUCTION
1.0 Introduction
The authentication of arms monitoring instrumentation has taken on new importance because of the conditions of host-supply and the use of information barriers required for observation of sensitive nuclear arms. The end of the cold war has resulted in unprecedented arms control agreements and transparency initiatives between the US and the countries of the former Soviet Union to reduce the number of nuclear weapons and to safeguard the dismantled fissile materials. Following the breakup of the Soviet Union, the US Congress enacted the Cooperative Threat Reduction (CTR) Program – originally called the Nunn-Lugar Initiative to assist former Soviet Union countries in enhancing the safety, security, control, accounting, and centralization of nuclear weapons and fissile materials (Geelhood et al., 2000). The US Department of Energy, through the MPC & A Program, and the US Defense Threat Reduction Agency, through the Fissile Material Control Program, commonly work toward the CTR goals.
Bilateral non-proliferation and arms-control agreements and negotiations held between the US and the Russian Federation (RF) are leading to the joint disposition of nuclear weapons material and the deactivation and decommissioning of production and processing facilities. A new population of material is being stored that has originated from the nuclear weapons programs, which will place new requirements upon information security and authentication beyond those of the traditional safeguards process. The plutonium and highly enriched uranium (HEU) material from these efforts will ultimately be processed into reactor fuel or be buried with highly radioactive waste. Agreements generally involve some level of transparency, where a Monitoring Party enters a Host Party facility to gain confidence that the conditions of the agreement are being satisfied.
1.1 Historical Background
A computer based nuclear arms proliferation and control system is a system that enables the police force to utilize the computer system (hardware and software) to record arms information and also to investigate or to find out those that proliferate nuclear arms across boarders and within the country. According to Nicole (2009), the methods of detection of arms proliferation employed are dictated by the nature of the arms movement across state borders and the procedures permitted by the legal system. Most monitoring begins with careful, objective observations that are then assembled, collated, and matched against applicable law. If there is reason to assume that arms are ferried across borders, further investigations are undertaken using scientific methods and techniques. Technological advances have been incorporated into arms proliferation investigation as well; for example, analyzing trace clues from where the arms are trafficked from and where it is heading to and other findings like where the arms are concealed. Most countries all over the world make use of arms proliferation software that also serves as an investigation system to monitor inflow and outflow of arms from the borders and . The system is a comprehensive database of illicit arms cathead away and tracked to its destination. This is possible because the database can be queried based on different criteria such as type of arms, name of manufacturer, country from where it was ferried, destination country etc. When a crime is committed with illicit arm, the law enforcement agency such as the police force use the name of suspects to match with their arm possession database so as to get the address of suspects and other related information that will facilitate questioning. In most cases a DNA database is also maintained of every individual so that blood samples and hair strands can be analyzed and matched with the database and if it exists the offender can be apprehended. However, attempting to carry out investigation without the computer system could be very hectic.
Technological advancement brings about development considering the fact that the computer system is fast and accurate. In addition, it can store large volume of information thereby eliminating the need to record information traditionally with flat files. The Law enforcement agency such as the police force has recognized the benefits of the computer system and they have adopted it to facilitate their operations such as investigation of crimes. Information that would have ordinarily required much time can be achieved in few seconds using the computer system. It is very important that computers are applied in crime investigation as it will save time and make the job faster. As an authentic measure to showcase and implement the application of computers in police investigation, this research work is carried out.
1.2 Statement of Problem
Law enforcement agencies are faced with the challenges of inability to investigate cases of illicit arms bearing by unauthorized persons properly. At many times it is difficult to catch the suspects and also the wrong persons may be arrested because of the basis and technique adopted for investigation and monitoring. On a very common note, there is no computerized illicit arm bearing system that will enable the police to confirm past proliferation, get information of suspects and also to query the records based on different criteria so as to track down barons. The manual method adopted to investigate cases of proliferation takes time and keeps cases pending and even neglected with time. Consequently, the perpetrators of the crime are not apprehended at the end of the day thereby making the police force investigation ineffective.
1.3 Aim and Objectives of the Study
The aim of the study is to design and implement tracking nuclear arm proliferation system with the following objectives:
- To develop a database system that can be used to record arms proliferations across national and international borders with much emphasis on Anambra State Police Command, Awka.
- To implement a system that can be used to easily find existing arms around.
- To develop a system that can aid investigation of culprits by querying the database based on specific criteria
- To present a system that will provide reports instantly of existing records when needed.
1.4 Significance of the Study
The significance of the study is that it will provide a system that will aid police investigation. In addition, it will also bring to light the application of computers in police investigation. Also, the police force will find useful information in this research material that will enable them to handle the investigation of cases at an international standard that is globally acceptable.
1.5 Scope of the Study
This study covers Design and implementation of illicit arms proliferation record management system using, The Nigeria Police Force, Awka Command as a case study. It examines all relevant areas of police investigation technology in use in the modern world such as computer forensics.
1.6 Definition of Terms
Police – A civil organization whose members are given special legal powers by the government and whose task is to maintain public order and to solve and prevent crimes
Investigation – An examination or inquiry into something, especially a detailed one that is undertaken officially, or the act of undertaking an examination.
Crime – An action prohibited by law or a failure to act as required by law
DNA – A nucleic acid molecule in the form of a twisted double strand double helix that is the major component of chromosomes and carries genetic information.
Surveillance – Continual observation of a person or group, especially one suspected of doing something illegal
CCTV – (Closed Circuit Television), a system used for broadcasting TV signals captured from security cameras
Forensics – The application of a broad spectrum of sciences and technologies to investigate and establish facts of interest in relation to criminal of civil law.
DISCLAIMER: All project works, files and documents posted on this website, UniProjectTopics.com are the property/copyright of their respective owners. They are for research reference/guidance purposes only and some of the works may be crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a reference/citation/guidance purpose only and not copy the work word for word (verbatim). The paper should be used as a guide or framework for your own paper. The contents of this paper should be able to help you in generating new ideas and thoughts for your own study. UniProjectTopics.com is a repository of research works where works are uploaded for research guidance. Our aim of providing this work is to help you eradicate the stress of going from one school library to another in search of research materials. This is a legal service because all tertiary institutions permit their students to read previous works, projects, books, articles, journals or papers while developing their own works. This is where the need for literature review comes in. “What a good artist understands is that nothing comes from nowhere. All creative work builds on what came before. Nothing is completely original.” - Austin Kleon. The paid subscription on UniProjectTopics.com is a means by which the website is maintained to support Open Education. If you see your work posted here by any means, and you want it to be removed/credited, please contact us with the web address link to the work. We will reply to and honour every request. Please notice it may take up to 24 – 48 hours to process your request.