Longinus Ezejichiji (PhD)


There is a need to make use of smarter policing model such as intelligence led policing in reduction of technological enhanced crimes in Nigeria. Intelligence led policing concentrates on prolific and persistent offenders, this stem from the realization that a relatively small percentage of the population is responsible for committing crime. Intelligence led policing targets these groups in order to deter them from committing crime. This paper adopted qualitative method; an in-depth interview was used to elicit information from twelve carefully selected officials from the Nigeria Police, law enforcement and security agencies including officials from NAFDAC, EFCC, Nigerian Custom, Immigration and State Security. These participants were drawn from four Nigeria main cities including Lagos, Abuja, Port Harcourt and Uyo. Literature on intelligence-led policing and technology were consulted in order to get deeper knowledge concerning the advancement in methods of criminalities brought by technological innovations. This paper focuses on the use of intelligence led policing to reduce technological enhanced crimes. The finding indicates gross manifestations of technological enhanced crimes in Nigeria. Part of the recommendations from this paper includes but not limited to the combination of intelligence-led policing strategies and techniques as useful tools in combating technological enhanced crime. Holistic suggestions to improve the training of the criminal justice and intelligence officials on the implementation of Intelligence led policing in Nigeria was made in this paper.


Intelligence-led Policing, Technological Enhanced Crimes; Intelligence led policing Strategies and Techniques, Policing Paradigm and reduction of Crime

Full Text:



Abrahamson, D., and Good man, D. (2014) Impediments to information and knowledge sharing within policing: A study of three Canadian Policing Organization. Sage 4 (1):1-77.

Braga, A., Andrew, P., and David, H. (2004) The effect of hot spot policing on crime: an updated systematic review and meta-analysis. Justice Quarterly 31(4):633-663.

Chainey, S. (2012) Improving the explanatory content of analysts’ products, using hypothesis testing. Policing: A Journal of Public Policy and Practice 6(2):108-121.

Christopher, S. (2004) A practitioner’s perspective of UK strategic intelligence in strategic criminal intelligence. Sydney: Federal Press.

Clark, R. V. (2012) Technology criminology and crime science. European Journal on Criminal Policy and Research 7(1):3-7.

Cornish, V. (2011) Policing and prevention of terrorism. West Port Conn: Prager Security International.

David, C. (2009) The law enforcement intelligence functions state and tribal agencies. 3rd ed. Washington, DC: Office of the Community Oriented Policing Services.

Denning, D. (2012) Policing cyber hate, cyber threats and cyber terrorism. Imran, A. & Brian, A. (editors) Burlington: Ashgate Publishing Company.

Don Weatherburn, L. (2004) Policing of crime threats and terrorism. Burlington: Ashgate Publishing Company.

Eck, J. C., Edward, R., and Maguire. (2006) When is a bologna sandwich better than sex, a defense of small case evaluation? Journal of Experimental Criminology 2(2):345-362.

Eric, Y. (2011) Modeling strategic relationship for process reengineering. New York: MIT Press.

Grazioli, A.M., and Jarvenpa., J. (2013) Information about Phishing Methods. New York: Harper Collins.

Heuer, R. J. (2009) The evolution of structured analytical techniques. Washington DC: National Research Committee.

Jackson, J.E. (2012) Information security management hand book. Boston: Allyn&Abcon.

Kowalski, R.M., and Susan.P. (2013) Electronic bulling among middle school student. 5th ed. Clemens: Elsevier Publishing.

Mattew, L. L., Lawrence, A. A., and Micheal., A.M. (2013) Child pornography and likelihood of contact abuse: comparison between child sexual offenders and non-contact offenders. Liverpool: University of Liverpool Press

Mcneil, J.R. (2012) Complementary method in education research. Judith, L. Green Gregory, L. & Patricia, B.E. (editors) Colorado: Lawrence Erlbaum.

Peter, K. (2011) Glitch and error in digital culture. London: University of Minneapolis press.

Pollits, M. M. (2012) Cyber terrorism fact and fancy. Washington, DC: FBI Laboratory.

Ratcliffe, J. H., and Guidetti. A. (2008) State police investigative structure and the adoption of intelligence led policing. An International Journal of Police Strategies and Management 31(1):109-128.

Ratcliffe, J. H. (2016) Intelligence led policing: criminology and sociology. 2nded. New York: Routledge.

Reiner, R. (2010) The politics of the police. 4th ed. Oxford.Oxford University Press.

Ready, M. C., and Young., D. (2015) The technical collection of intelligence. 4th ed. London: Sage.

Schultz, E.E. (2013) Fighting malicious code. New York: Elsevier.

Sullivan, D. (2011) Information system and information technology practice. London: Cambridge University Press.

Taylor, B. Parezen, A., and Ratcliffe., J. H. (2015) Can we predict long-term community crime problem? The estimation of ecological continuity to model risk heterogeneity. Journal of Research in Crime and Delinquency 52(5):635-657.


  • There are currently no refbacks.







Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.