Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
INTRODUCTION
1.1
Background Study
these
codes
of
conduct
and
laws,
protection
of
Manual
processes
neither
provide
accurate,
reliable
and
comprehensive data round the clock nor does it help in trend prediction and
decision support. It also results in lower productivity and ineffective
utilization of manpower. The solution to this ever-increasing problem lies in
the effective use of Information Technology. Crime Information System
uses computer-generated records as an interface for integrating and
accessing massive amounts of location-based information.
Crime system allows EFCC personnel to plan effectively for emergency
response, determine mitigation priorities, analyses historical events, and
1
and
enforcement,
more
effectively.
information
about
In
the
the
mission-critical
location
of
nature
crime,
of law
incident,
suspect, or victim is often crucial to determine the manner and size of the
response. Crime information software helps co-ordinate vast amounts
of location-based data from multiple sources. It enables the user to layer
the data and view the data most critical to the particular issue or mission. It
is used by EFCC departments, both large and small, to provide solutions for
crime
analysis,
criminal
tracking,
traffic
an
high-risk
or
potentially
violent
inmates,
and
many
sources including
reports
and
called-for-services,
arrests,
first
information
prosecution as thereafter.
4) The systems will possess features that will enable criminal data to be
purged from the system, updated and queried.
1.3 Significance of the work
a. It exposes the student to different forms of security measures taking
clear detail on how to track a crime case and save the information on
a database for future recommendations
b. Information systems gain their importance by processing the data
from organization inputs to generate information that is useful for
1.4
However, because of lack of time, funding and the scope of the system, the
project was limited to the development and implementation of software
based crime information system for EFCC that will automate the processes
involved in tracking down criminals by EFCC.
1.5
1.6
The project is organized as follows;Chapter one introduces the project; the background of the project is also
discussed. The objectives of the project, its significance, scope, and
constraints are pointed out.
and
system
specification
Chapter
five
covers
software
the
system
bill
of
engineering
measurement
and
evaluation
CHAPTER TWO
LITERATURE REVIEW
2.1 Brief History of the EFCC
The Economic and Financial Crimes Commission (EFCC) is a Nigerian
law enforcement agency that investigates financial crimes such as advance
fee fraud (419 fraud) and money laundering. The EFCC was established in
2003, partially in response to pressure from the Financial Action Task Force
on Money Laundering (FATF), which named Nigeria as one of 23 countries
non-cooperative in the international community's efforts to fight money
laundering. The agency has its head office in Abuja .The preponderance of
economic and financial crimes like Advance Fee Fraud 419 , Money
Laundering, etc has had severe negative consequences on Nigeria, including
decreased Foreign Direct Investments in the country and tainting of Nigerias
national image. The menace of these crimes and the recognition of the
magnitude and gravity of the situation led to the establishment of the
Economic and Financial Crimes Commission (EFCC). The legal instrument
7
backing the Commission is the attached EFCC (Establishment) Act 2002 and
the Commission has high-Ievel support from the Presidency, the Legislature
and key security and law enforcement agencies in Nigeria. The Commission
is empowered to prevent, investigate, prosecute and penalise economic and
financial crimes and is charged with the responsibility of enforcing the
provisions of other laws and regulations relating to economic and financial
crimes.
Function
Responsibility: The Commission shall be responsible fora. The enforcement and the due administration of the provisions of this
Act
b. The investigation of all financial crimes including advance fee fraud,
money laundering, counterfeiting, illegal charge transfers, futures
market fraud, fraudulent encashment of negotiable instruments,
computer credit card fraud, contract scam, etc.
c. The co-ordination and enforcement of all economic and financial
crimes laws and enforcement functions conferred on any other person
or authority.
d. The adoption of measures to identify, trace, freeze, confiscate or seize
proceeds derived from terrorist activities, economic and financial
crimes related offences or the properties the value of which
corresponds to such proceed
e. The adoption of measures to eradicate the commission of economic
and financial crimes
8
II.
III.
IV.
V.
reports
on
person,
functions
and
activities
relating
to
the
all
the
current
10
Power
The Commission has power toa. Cause investigations to be conducted as to whether any person,
corporate body or organization has committed any offence under this
Act or other law relating to economic and financial crimes
b. Cause investigations to be conducted into the properties of any person
if it appears to the commission that the persons lifestyle and extent of
the properties are not justified by his source of income.
ORGANIZATIONAL STRUCTURE OF NIGERIAN EFCC
The organizational structure of Nigeria EFCC which is shows the various
departments the EFCC in Nigeria has starting from the rank of the
inspector general of EFCC down to the rank of the divisional EFCC
command and also their various zone which in total is nine zones.
2.2 Review of Natural-law theory
Justifying the State's use of force to coerce compliance with its laws has
proven a consistent theoretical problem. One of the earliest justifications
involved the theory of natural law. This posits that the nature of the world or
of human beings underlies the standards of morality or constructs them.
Thomas Aquinas wrote in the 13th century: "the rule and measure of human
acts is the reason, which is the first principle of human acts" (Aquinas, ST III, Q.90, A.I). He regarded people as by nature rational beings, concluding
that it becomes morally appropriate that they should behave in a way that
11
conforms to their rational nature. Thus, to be valid, any law must conform to
natural law and coercing people to conform to that law is morally
acceptable. In the 1760s William Blackstone (1979) described the thesis:
"This law of nature, being co-eval with mankind and dictated by God
himself, is of course superior in obligation to any other. It is binding over all
the globe, in all countries, and at all times: no human laws are of any
validity, if contrary to this; and such of them as are valid derive all their
force, and all their authority, mediately or immediately, from this original."
But John Austin (1790), an early positivist, applied utilitarianism in
accepting the calculating nature of human beings and the existence of an
objective morality. He denied that the legal validity of a norm depends on
whether its content conforms to morality. Thus in Austinian terms a moral
code can objectively determine what people ought to do, the law can
embody whatever norms the legislature decrees to achieve social utility, but
every individual remains free to choose what he or she will do.
Similarly, Hart (1961) saw the law as an aspect of sovereignty, with
lawmakers able to adopt any law as a means to a moral end. Thus the
necessary and sufficient conditions for the truth of a proposition of law
simply involved internal logic and consistency, and that the state's
agents used state power with responsibility. Ronald Dworkin (2005) rejects
Hart's theory and proposes that all individuals should expect the equal
respect and concern of those who govern them as a fundamental political
right. He offers a theory of compliance overlaid by a theory of deference
12
(the citizen's duty to obey the law) and a theory of enforcement, which
identifies the legitimate goals of enforcement and punishment. Legislation
must conform to a theory of legitimacy, which describes the circumstances
under which a particular person or group is entitled to make law, and a
theory of legislative justice, which describes the law they are entitled or
obliged to make. Indeed, despite everything, the majority of natural-law
theorists have accepted the idea of enforcing the prevailing morality as a
primary function of the law. This view entails the problem that it makes any
moral criticism of the law impossible: if conformity with natural law forms
a necessary condition for legal validity, all valid law must, by definition,
count as morally just. Thus, on this line of reasoning, the legal validity of
a norm necessarily entails its moral justice. One can solve this problem by
granting some degree of moral relativism and accepting that norms may
evolve
over
time
and,
therefore,
one
can
criticize
the
continued
enforcement of old laws in the light of the current norms. People may
find such law acceptable, but the use of State power to coerce citizens to
comply with that law lacks moral justification. More recent conceptions
of the theory characterize crime as the violation of individual rights.
Since society considers so many rights as natural (hence the term
"right") rather than man-made, what constitutes a crime also counts as
natural, in contrast to laws (seen as man-made). Adam Smith illustrates
this view, saying that a smuggler would be an excellent citizen, "...had not
the laws of his country made that a crime which nature never meant to be
13
so." Natural-law
theory
therefore
distinguishes
between
"criminality"
the
phrases
malum
in
se
and
malum
prohibitum
(including
slaves);
the
pater
enforced
matters
involving
payment
of
monetary
compensation
(modern
"damages")
could
monarchy
emerged
following
the
centralized
the kings of England attempted to assert power over the land and its
peoples, did the modern concept emerge, namely of a crime not only as an
16
offence against the "individual", but also as a wrong against the "State",
Pennington: 1993.
This idea came from common law, and the earliest conception of a
criminal act involved events of such major significance that the "State" had
to usurp the usual functions of the civil tribunals, and direct a special
law or privilegium against the perpetrator. All the earliest English criminal
trials involved wholly extraordinary and arbitrary courts without any settled
law to apply, whereas the civil (delictual) law operated in a highly
developed and consistent manner (except where a King wanted to raise
money by selling a new form of writ). The development of the idea that
the "State" dispenses justice in a court only emerges in parallel with
or after the emergence of the concept of sovereignty.
In continental Europe, Roman law persisted, but with a stronger influence
from the Christian Church, Vinogradoff (1909). Coupled with the more
diffuse political structure based on smaller feudal units, various different
legal traditions emerged, remaining more strongly rooted in Roman
jurisprudence, but modified to meet the prevailing political climate.
In Scandinavia the effect of Roman law did not become apparent until the
17th century, and the courts grew out of the things the assemblies of the
people. The people decided the cases (usually with largest freeholders
dominating). This system later gradually developed into a system with a
royal judge nominating a number of the most esteemed men of the parish
as his board, fulfilling the function of "the people" of yore. From the Hellenic
17
system
onwards,
the
policy
rationale
for
requiring
the payment of
of
the
community
as
whole
and
which
the offender is
indictable
offence,
felony,
misdemeanor,
EFCC
needs
to Professor TAMUNO T.M. (204) in his book titled EFCC in modern Nigeria,
stated that crime Act section 24 authorizes any E F C C officer and any
person whom he may call to assist in arrest with or without warrant in the
following cases. Any person found committing any simple offences, felony,
misdemeanor, or whom he reasonably suspects of having committed or
about to commit any felony, misdemeanor, breach of peace. The above also
stated that section 10,26,27, 28 and 30 of the criminal procedure code
authorities states that any officer has the power to arrest with or without
order from the magistrate, power to serve summons, power to release
suspects on bail, power to take finger prints etc.
CHAPTER THREE
SYSTEM DESIGN AND METHODOLOGY
3.1 Meaning of methodology
20
system
analysis
and
design
methodology
which
is
an
In view of this
build and fixed model is the one of the worst model for project development
because the project is built without specification and lacks design steps.
Spiral model is one of the software development processes which combine
the design and prototyping in stages together to gain the advantage of top
down
and
bottom-up
approaches
(Barry,
1986).
Rapid
prototyping
determines and identify the design faws and obtaining feedback during
process (Frederick, 1975). Waterfall model: This is a software development
process which follows a sequential approach. This approach steadily fows
downwards like a waterfall which includes the phase of conception, initiation,
21
analysis and design (Winston, 1970). But for this project work, waterfall
model is adopted because it is simple and easy to understand, use and work
well for smaller projects where requirements are very well understood,
secondly, each phase has specific deliverables and a review process and
completed one at a time.
System design methods are a discipline within the software development
industry which seeks to provide a framework for activity and the capture,
storage, transformation and dissemination of information so as to enable the
development of computer systems that are fit for purpose.
separate
process
phases.
The
phases
in
Waterfall
model
are:
separate
process
phases.
The
22
phases
in
Waterfall
model
are:
Requirement gathering/analysis
System design
Implementation
Testing
System deployment
Maintenance
are
analyzed
for
their
validity
and
the
possibility
of
23
System
Design
helps
in
specifying
hardware
and
system
c) Implementation:
On receiving system design documents, the works divided in modules/units
and actual coding is started. The system is first developed in small programs
called units.
d) Unit Testing:
After the system has been developed in small programs called units, which
are integrated in the next phase. Each unit is tested for its functionality; this
is referred to as Unit Testing. Unit testing mainly verifies if the modules/units
meet their specifications.
25
advantage
of
waterfall
development
is
that
it
allows
for
Disadvantages
The disadvantage of waterfall development is that it does not allow for much
refection or revision. Once an application is in the testing stage, it is very
difficult to go back and change something that was not well-thought out in
the concept stage. Alternatives to the waterfall model include joint
application development (JAD), rapid application development (RAD), synch
and stabilize, build and fix, and the spiral model.
26
a Interview Method
b Reference to written text
a) Interview Method
This was done between the researcher and some of the officers of the
EFCC. Information on criminal charges and trial was gathered.
Input Analysis
The various system inputs include the following input systems.
i Witness /Suspect Statement
ii Case File and
iii
Crime Diary
28
THE
STATION
---------------------------------------PROVIN
CE
---------------------------------------NAME -----------------------------------NATIONALITY
/TRIBE
-----------------------AGE
----------------------------------------------OC
CUPATION
----------------------------------RELIGION
----------------------------------------ADDRE
SS ----------------------------------------
fact
recorded
here is
Voluntarily
elect
29
to
state
as
follows
30
Output Analysis
The system output includes: i. Crime Registered
ii. FORM CR.2
iii. FORM CR.8
iv. FORM CR.14
v. CHARGE SHEET.
i. Crime register output system
This is a very big exercise book where all cases reported to the EFCC, both
tried and as well as cases yet to be tried in the court are captured
and registered. Each case file is given a number and this identity number
given is entered into the crime register. The crime register contains the
following fields (attributes).
ID numbers /Date
Date / time crime scene
Offense and chapter of the law
Name of suspect
Name of investigating officer
Esx (state C.I.D) i.e. the office or department where the case in
originated.
Time of case entry
Complainant
Remarks i.e. state the position of the case.
generated after court has decided criminal matter and it is usually kept at
the central criminal register at Alagbo Lagos State.
33
informant might walk down to the station or have a call made to the EFCC.
The EFCC having received the information group the case into groups and
treat them separately so that a particular unit handles a particular group
of crime complain made. With the case of those involving crime the
suspect will be arrested and detained. The suspect will be given a suspect
form under investigation to fill in which the suspect data will be captured
and the suspect will write statement. All these data will be written in they
record book and kept in the archives. The suspect will be detained in the
counter or cell as the case may be, while the divisional crime officer assigns
an investigating EFCC officer (IPO) the investigation to be conducted. Bailing
as the case may be, maybe granted to the suspect depending on the
seriousness of the case.
If bail is granted the suspect will be expected to report to the EFCC on a
daily
bases
whenever
needed.
When
the
investigation
has
been
35
a) Insufcient Equipment
Almost
all
EFCC
units
in
the
country
lack
equipment
such
as
facilitate
the fighting
of
crime
because
good
and
36
screen.
The new system uses the Microsoft access file; following the particular
information needed by the detectives through the monitor or printer derives
a report. The report is well formatted outlining the titles and readability
facilities to help in decision-making.
The reports derived are narrowed to four types due to time constraint. They
are: Criminal details
Suspect details
Complainant details
Crime and nature.
It is necessary to know that there is report for each derived and each of them
can be reached by clicking on reports in the main menu, and by clicking on
the very file name beneath the report. Below are some of the reports
generated.
a) Criminal registration
b) Suspect registration
c) Complainant registration
Criminal Registration
This form consists of data like
3.6
Database Design
40
This table consists of the necessary information that enables Nigeria EFCC
to keep track of all the necessary informations that will enable them keep
track of all the suspects using the necessary information supplied in the table
above.
Complainant File
This table consists of the necessary information that enables Nigeria EFCC
to keep track of all the necessary informations that will enable them keep
track of all the complainants and their complaints using the necessary
information supplied in the table above and it is called the complainant form.
This contains personal information about the complainant and his /her
complains about a suspect.
41
42
3.7.3 Report
This is the program that outlines the information concerning the criminal on
group of criminal involved in a crime. It also applies to the suspect and
complainant reports.
3.7.4 Change Password
The program allows the viewer to view on the number of users that have
access to the package. It allows the adage of another user, removes
an authorized viewer by deleting and corrects the identity of a user
by updating.
44
45
46
CHAPTER FOUR
SOFTWARE DESIGN AND SYSTEM SPECIFICATION
4.1 Design Standard
The system designed made use of top-down design in processing data.
Access to information is made through the home page. All the sub systems in
the program perform a specified task. Each module is tested before the final
integration and testing of the whole system.
database
access,
data
transmission
via
networks,
database
security, database retrieval online, multi user network access, online data
capture, etc.
The
choice
PHP
programming
language
was
made
to enable
us
achieves the above set objectives. Moreover, PHP editor is very user
friendly and enables the design of an interface that can be modified
47
in
the
was
machine
was
also
used
to
ensure
perfect
4.2
System Requirement
MYSQL Database
PHP editor integrated development environment
48
has
the
overall
charge
over
controls all the other computer operators. The system administrator has
some rights computer operators do not have.
new
system
was
implemented
using
Microsoft
Visual
Basic
50
Main Menu
Case file
Query
Report
Exit
Select menu option
Yes
Option 1?
No
Yes
Option 2?
No
Yes
Option 3?
No
No
Option 4?
Yes
Stop
51
The structure of the Program fow chart in fig 4.1 above describes the
directional path in which user links from page to page. The flow chart has the
home page as the roof page which is the first page encountered in opening
the portal. The home page then links to the case file registration, query,
report and exit. The file registration comprises of the suspect registration,
criminal
registration,
system
access
52
e.t.c.
report
comprises
of
the
CHAPTER FIVE
SYSTEM IMPLEMENTATION
password not included) and if not, returns the user to the logon page with an
access denied message. If the user is authenticated, the Isuser_In_Role
method further checks if that name entered has authority to access the
resource requested. It does this by checking the access rule if the users role
can access the resource requested for. If it comes out with booken true,
then the user is given access and the page or resource requested for opens
and if it comes out with booken false, the user is returned to the logon
page with an access denied message. This procedure helps to ensure that a
user does not log in as an administrator and vice-versa thereby viewing
resources that are not meant to. It is also important to note that the
authentication ticket issued to an authenticated user remains active until the
user logs out or the session expires.
Direct Changeover
In this method the old system is completely replaced by the new system in
one move. This may be avoidable where the two systems are substantially
different, where the new system is a real time system, or when an extra staff
to oversee its parallel running is unobtainable. This method is comparatively
cheap but is risky. Program corrections are difficult while the system has to
remain operational. The new system should be introduced during stack
periods and in large systems. It may be introduced, as an application,
allowing several months between each stage to ensure all problems are
cleared up before the whole system becomes operational.
54
Parallel Changeover
In this method , both the manual and computerized system are operated
concurrently for sufficiently long period and their outputs compared
periodically and possible discrepancies reconciled on the new system until all
users are satisfied .The old system is discontinued when discrepancies are
seen to have seized arising. It has the advantage of having an old system to
fall back on, in case the new system fails. The disadvantage is the cost of
running two systems side by side, both of which will achieve similar result.
Phase Changeover
Here, the changeover starts with a department or branch. The effect of the
new system in the sample department or branch is observed before some
other department or branch which may be more sensitive can adapt to the
new system.
Pilot Changeover
In this case, some transactions that are very complex are operated using
parallel changeover and in other remaining existing system in application,
direct changeover is used. The researcher recommends the parallel
changeover to avoid drastic problems that may arise due to failure of a
newly developed system.
5.3 Software Testing
This defines the test requirement, which the software should meet and it is
progressively integrated into complete package. The process of test plan is
concerned with providing that a package produces correct and expected
result for all possible input data.
55
For this software testing, we have three basic testing that should be
adopted :
a. Module Testing
b. Integrated testing and
c. System testing
Module Testing
In this design we have many modules which when triggered up at certain
events perform a specific function. So, module testing involves testing of
each of the modules in software to verify that they meet their respective
objective module
properly fows into and out of the program module under test.
System Testing
Before bringing and data processing system into use, it is of vital importance
that the system is both comprehensive within its intended limits and fully
56
correct. So, each routine must have been written according to specification
and tested to complete satisfaction. Also bags must have been removed
completely and the program run produced exactly what is required of it.
Component
quantity
Name
Unit
Total
cost
quanti
Tomb print
24,500
Tomb print
1000
software
3
Web cam
1500
Visual basic
1500
2000
software
5
Laptop charger
TOTAL
describes the
equipments used in the design of the project, the quantity used and the
cost of each quantity in addition of the total quantity.
57
to
tracking
down
58
hardened
criminals,
habotual
(Data
Base
Management
System)
support
and eliminates
59
6.3 Recommendation
Efforts have been made to design and develop software that support
network. But there are still areas that may be considered as a further and
important area to improve on, and my suggestion go thus.
1
Reference
1. Aquinas, Thomas. (1988). On Law, Morality and Politics. 2nd edition.
Indianapolis: Hackett Publishing Co. ISBN 0-87220-663-7
2. Attenborough, F. L. (ed. and trans.) (1922). The Laws of the Earliest
English Kings. Cambridge: Cambridge University Press. Reprint March
2006. The Lawbook Exchange, Ltd. ISBN 1-58477-583-1
3. Blackstone, William. (17651769). Commentaries on the Law of
England: A Facsimile of the First Edition of 1765-1769, Vol. 1. (1979).
Chicago: The University of Chicago Press. ISBN 0-226-05538-8
4. Blythe, James M. (1992). Ideal Government and the Mixed Constitution
in the Middle Ages. Princeton: Princeton University Press. ISBN 0-69103167-3
5. Cohen, Stanley (1985). Visions of Social Control: Crime, Punishment,
and Classification. Polity Press. ISBN 0-7456-0021-2
6. Daube, David. (1969). Roman Law: Linguistic, Social and Philosophical
Aspects. Edinburgh: Edinburgh University Press. ISBN 0-85224-051-1
7. Driver, G. R. & Mills, John C. (19521955). The Babylonian Laws. 2 Vols.
Oxford: Oxford University Press. ISBN 0-19-825110-6
8. Dworkin, Ronald. (2005). Taking Rights Seriously. Harvard University
Press. ISBN 0-674-86711-4
9. Foucault, Michel (1975). Discipline and Punish: the Birth of the Prison,
New York: Random House.
61
10.
Law in the Germanic Kingdoms of Western Europe from the Fifth to the
Eleventh Century. New York: P. Lang. ISBN 0-8204-0731-3
14.
Kern, Fritz. (1948). Kingship and Law in the Middle Ages. Reprint
19.
Websites:
a. https://efccnigeria.org
b. www.appolice.gov.in
c. www.cyberabadpolice.gov.in
d. www.met.police.uk
62
e. www.ci.minneapolis.mn.us
BIBLIOGRAPHY
Kings.
Cambridge:
Cambridge
University
Press.
James
Constitution
M.
in
University Press.
5. Cohen, Stanley
(1992).
the
Ideal
Middle
Government
Ages.
(1985). Visions
and
the
Mixed
Princeton:
Princeton
Social
Control:
of
Social
and
Ronald.
(2005).
Taking
Rights
Seriously.
Harvard
University Press.
9. Foucault, Michel (1975). Discipline and Punish: the Birth of the
Prison, New York: Random House.
10.
Gagarin, Michael (1989) Early
Greek
and
63
Law
Society
(Reprint
in
ed.)
Classical
Daniel.
(2002).
"Optimal
Their
1600: Sovereignty
and
Rights
in
the
Western
Legal
Tradition.
64
GLOSSARY
using
the
threat
as
pre-emptive,
harm-reduction
65
APPENDIX A
SOURCE CODE
Index Code
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Online crime information system for EFCC</title>
<style type="text/css">
body {
margin-left: 0px;
margin-top: 0px;
margin-right: 0px;
margin-bottom: 0px;
}
#apDiv1 {
position: absolute;
left: 451px;
top: 57px;
width: 515px;
height: 89px;
z-index: 1;
font-size: 24px;
}
#ggg {
font-size: 34px;
}
#ggff {
color: #9D4F00;
66
}
#ggg {
color: #9D4F00;
}
#gfer {
color: #D76B00;
}
a:link {
color: #930;
}
a:visited {
color: #900;
}
a:hover {
color: #930;
}
a:active {
color: #930;
}
</style>
<script type="text/javascript" src="js/stscode.js"></script>
</head>
<body>
<div id="apDiv1">
<p id="ggg"><span id="ggff">Crime Information System</span>
<span id="ggg">For EFCC</span></p>
</div>
<table
width="824"
border="1"
align="center"
cellspacing="1" bordercolor="#FF0000">
<tr>
67
cellpadding="1"
<td
height="145"
colspan="2"
valign="top"> <img
src="images_007.jpg" width="138" height="142" /></td>
</tr>
<tr>
<td
colspan="2"> | <a
href="index.php"> Home </a> |
<a
href="want.php">Wanted </a> |
<a
href="report.php"> Report
</a> | <a
Login</a>
Crime
href="login.php">Staff
| <a
href="admin_login.php">Admin</a></td>
</tr>
<tr>
<td width="263" height="556" valign="top"><p> </p>
<p>
<u
id="gfer">Mission Statement</u><br />
<br />
To rid Nigeria of Economic and Financial Crimes and to effectively
coordinate the domestic effort of the global fight against money
laundering and terrorist financing.
<p><a
</p>
href="http://www.dhtml-menu-builder.com"
style="display:none;visibility:hidden;">Javascript
DHTML
Image
Web
align="justify"
style="margin-left:55px;margin-
by false pretence.</p>
</div>
</div>
<p> </p>
<p><br/>
</p>
<div>
<h2>Oil Thief Bags 4 Years Jail Term</a></h2>
<div>
<div>
<p><img src="JAILED-PRISON-BOSS-FRIDAY-I.jpg" alt=""
align="left" border="0" margin-right="15px" /></p>
<p
right:25px;">Justice
Harcourt, on Thursday 26
<p> </p></td>
</tr>
<tr>
<td colspan="2" align="center"> Developed By Odoh
Onyekachi Jude ESUT/2009/106402</td>
</tr>
</table>
</body>
</html>
Code For Login
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Online crime information system for EFCC</title>
<style type="text/css">
body {
margin-left: 0px;
margin-top: 0px;
margin-right: 0px;
margin-bottom: 0px;
}
#apDiv1 {
position: absolute;
left: 451px;
top: 57px;
width: 515px;
height: 89px;
z-index: 1;
70
font-size: 24px;
}
#ggg {
font-size: 34px;
}
#ggff {
color: #9D4F00;
}
#ggg {
color: #9D4F00;
}
#gfer {
color: #D76B00;
}
a:link {
color: #930;
}
a:visited {
color: #900;
}
a:hover {
color: #930;
}
a:active {
color: #930;
}
</style>
<link
href="SpryAssets/SpryValidationTextField.css"
rel="stylesheet"
type="text/css" />
<script type="text/javascript" src="js/stscode.js"></script>
<script
src="SpryAssets/SpryValidationTextField.js"
71
type="text/javascript"></script>
</head>
<body>
<div id="apDiv1">
<p id="ggg"><span id="ggff">Crime Information System</span>
<span id="ggg">For EFCC</span></p>
</div>
<table
width="824"
border="1"
align="center"
cellpadding="1"
cellspacing="1" bordercolor="#FF0000">
<tr>
<td
height="145"
valign="top"> <img
src="images_007.jpg" width="138" height="142" /></td>
</tr>
<tr>
<td> | <a
href="index.php"> Home </a> |
<a
href="want.php">Wanted </a> |
<a
href="report.php"> Report
</a> | <a
Crime
href="login.php">Staff
Login</a> | </td>
</tr>
<tr>
<td height="284" valign="top"><p> </p>
<p> </p>
<p><br/>
</p>
<form
action="staff.php"
id="form1">
72
method="post"
name="form1"
<table align="center">
<tr valign="baseline">
<td nowrap="nowrap" align="right">Username:</td>
<td><span id="sprytextfield1">
<input type="text" name="username" value="" size="32" />
<span
class="textfieldRequiredMsg">required.</span></span></td>
</tr>
<tr valign="baseline">
<td nowrap="nowrap" align="right">Password:</td>
<td><span id="sprytextfield2">
<input type="password" name="password" value=""
size="32" />
<span
class="textfieldRequiredMsg">
required.</span></span></td>
</tr>
<tr valign="baseline">
<td nowrap="nowrap" align="right"> </td>
<td><input type="submit" value=" Staff Login" /></td>
</tr>
</table>
</form>
<p> </p></td>
</tr>
<tr>
<td align="center"> Developed By Odoh Onyekachi Jude
ESUT/2009/106402</td>
</tr>
</table>
<script type="text/javascript">
var sprytextfield1 = new Spry.Widget.ValidationTextField("sprytextfield1",
73
74