1.0 Introduction
The authentication of arms monitoring instrumentation has taken on new importance because of the conditions of host-supply and the use of information barriers required for observation of sensitive nuclear arms. The end of the cold war has resulted in unprecedented arms control agreements and transparency initiatives between the US and the countries of the former Soviet Union to reduce the number of nuclear weapons and to safeguard the dismantled fissile materials. Following the breakup of the Soviet Union, the US Congress enacted the Cooperative Threat Reduction (CTR) Program – originally called the Nunn-Lugar Initiative to assist former Soviet Union countries in enhancing the safety, security, control, accounting, and centralization of nuclear weapons and fissile materials (Geelhood et al., 2000). The US Department of Energy, through the MPC & A Program, and the US Defense Threat Reduction Agency, through the Fissile Material Control Program, commonly work toward the CTR goals.
Bilateral non-proliferation and arms-control agreements and negotiations held between the US and the Russian Federation (RF) are leading to the joint disposition of nuclear weapons material and the deactivation and decommissioning of production and processing facilities. A new population of material is being stored that has originated from the nuclear weapons programs, which will place new requirements upon information security and authentication beyond those of the traditional safeguards process. The plutonium and highly enriched uranium (HEU) material from these efforts will ultimately be processed into reactor fuel or be buried with highly radioactive waste. Agreements generally involve some level of transparency, where a Monitoring Party enters a Host Party facility to gain confidence that the conditions of the agreement are being satisfied.
1.1 Historical Background
A computer based nuclear arms proliferation and control system is a system that enables the police force to utilize the computer system (hardware and software) to record arms information and also to investigate or to find out those that proliferate nuclear arms across boarders and within the country. According to Nicole (2009), the methods of detection of arms proliferation employed are dictated by the nature of the arms movement across state borders and the procedures permitted by the legal system. Most monitoring begins with careful, objective observations that are then assembled, collated, and matched against applicable law. If there is reason to assume that arms are ferried across borders, further investigations are undertaken using scientific methods and techniques. Technological advances have been incorporated into arms proliferation investigation as well; for example, analyzing trace clues from where the arms are trafficked from and where it is heading to and other findings like where the arms are concealed. Most countries all over the world make use of arms proliferation software that also serves as an investigation system to monitor inflow and outflow of arms from the borders and . The system is a comprehensive database of illicit arms cathead away and tracked to its destination. This is possible because the database can be queried based on different criteria such as type of arms, name of manufacturer, country from where it was ferried, destination country etc. When a crime is committed with illicit arm, the law enforcement agency such as the police force use the name of suspects to match with their arm possession database so as to get the address of suspects and other related information that will facilitate questioning. In most cases a DNA database is also maintained of every individual so that blood samples and hair strands can be analyzed and matched with the database and if it exists the offender can be apprehended. However, attempting to carry out investigation without the computer system could be very hectic.
Technological advancement brings about development considering the fact that the computer system is fast and accurate. In addition, it can store large volume of information thereby eliminating the need to record information traditionally with flat files. The Law enforcement agency such as the police force has recognized the benefits of the computer system and they have adopted it to facilitate their operations such as investigation of crimes. Information that would have ordinarily required much time can be achieved in few seconds using the computer system. It is very important that computers are applied in crime investigation as it will save time and make the job faster. As an authentic measure to showcase and implement the application of computers in police investigation, this research work is carried out.
1.2 Statement of Problem
Law enforcement agencies are faced with the challenges of inability to investigate cases of illicit arms bearing by unauthorized persons properly. At many times it is difficult to catch the suspects and also the wrong persons may be arrested because of the basis and technique adopted for investigation and monitoring. On a very common note, there is no computerized illicit arm bearing system that will enable the police to confirm past proliferation, get information of suspects and also to query the records based on different criteria so as to track down barons. The manual method adopted to investigate cases of proliferation takes time and keeps cases pending and even neglected with time. Consequently, the perpetrators of the crime are not apprehended at the end of the day thereby making the police force investigation ineffective.
1.3 Aim and Objectives of the Study
The aim of the study is to design and implement tracking nuclear arm proliferation system with the following objectives:
1.4 Significance of the Study
The significance of the study is that it will provide a system that will aid police investigation. In addition, it will also bring to light the application of computers in police investigation. Also, the police force will find useful information in this research material that will enable them to handle the investigation of cases at an international standard that is globally acceptable.
1.5 Scope of the Study
This study covers Design and implementation of illicit arms proliferation record management system using, The Nigeria Police Force, Awka Command as a case study. It examines all relevant areas of police investigation technology in use in the modern world such as computer forensics.
1.6 Definition of Terms
Police – A civil organization whose members are given special legal powers by the government and whose task is to maintain public order and to solve and prevent crimes
Investigation – An examination or inquiry into something, especially a detailed one that is undertaken officially, or the act of undertaking an examination.
Crime – An action prohibited by law or a failure to act as required by law
DNA – A nucleic acid molecule in the form of a twisted double strand double helix that is the major component of chromosomes and carries genetic information.
Surveillance – Continual observation of a person or group, especially one suspected of doing something illegal
CCTV – (Closed Circuit Television), a system used for broadcasting TV signals captured from security cameras
Forensics – The application of a broad spectrum of sciences and technologies to investigate and establish facts of interest in relation to criminal of civil law.