Crime Reporting System Using PHP and Mysql
Crime Reporting System Using PHP and Mysql
INTRODUCTION
1.0 OVERVIEW
The automated police record keeping system can help in storing the
records related to the criminals, cases, complaint record, and case history
and so on. This can allow a person to enter or delete the records if
necessary. All these records can be maintained in a single database.
Security is maintained so as to ensure that only the authorized users will
have access to the system. This application will be one of the useful
projects that the police can rely on. This website can help in getting the
information of the criminals of many years back. It can also help in
minimizing most of the work of the police.
1
accurate records of all criminal activity, investigations, arrests, case files,
and administrative procedures. A police department's ability to make
decisions, carry out legal procedures, and prepare for the future all depend
on its ability to maintain current record and keep case recorded up to date,
Unfortunately, a lot of police departments continue to use antiquated,
manual record-keeping procedures that are rife with errors, inefficiencies,
and security vulnerabilities. By offering a more dependable, effective, and
safe way to manage records, an automated record-keeping system can help
with these issues. This study investigates the issues with the way police
departments now retain records and the requirement for an automated
solution. (Muhammad et. Al. 2012).
3
1.4 SIGNIFICANCE OF THE STUDY
5
iv. Data Analytics: The process of looking for trends, correlations, and
patterns in big datasets. In the context of police record-keeping, data
analytics is used to discover crime patterns, anticipate criminal
behavior, and make data-driven decisions for resource allocation and
crime prevention.
v. Predictive Policing: A method of law enforcement prediction that
makes use of statistical models, machine learning, and data analysis to
identify possible fraud. Police departments can more efficiently
allocate resources and carry out proactive crime prevention strategies
with the use of predictive policing.
vi. Centralized Database: A single, cohesive database that combines
information from several departments or sources. A centralized
database would include all crime-related information for a police force
in one place, making it simple for authorized staff to access, retrieve,
and analyze the information.
vii. Role-Based Access Control (RBAC): A security measure that limits
information access according to the job of the person inside the
company. RBAC makes sure that only individuals with the proper
authorization can view sensitive crime records and carry out certain
tasks according to their jobs in an automated record-keeping system.
viii. Audit Trail: A running log of all the operations and exchanges that
take place inside the system. To ensure accountability and
transparency, an audit trail is used in automated record-keeping
systems to monitor who has accessed or edited documents, when, and
what changes have been done.
ix. Data Migration: data transfer: the act of moving data between
systems or formats. Moving current criminal records from manual or
outdated systems to the new digital platform is known as data
6
migration, and it is a necessary step in the implementation of a new
automated record-keeping system.
x. Interagency Collaboration: the exchange of information and
collaboration between various law enforcement departments or
agencies in order to enhance response to crime and coordination.
Interagency cooperation is facilitated by automated record-keeping
systems because they offer a safe and effective platform for
exchanging pertinent crime data.
xi. Scalability: The capacity of a system to expand to meet growth or to
manage increasing volumes of work or data. Scalability is a
requirement for an automated record-keeping system in order to handle
growing amounts of crime data and add new features as needed.
This project is organized into six chapters, starting with the Introduction,
which provides the background, objectives, scope, and significance of the
study. The Literature Review explores existing research, current trends,
and gaps in police record-keeping systems. System Analysis and Existing
System Characterization evaluates the limitations of the current methods
and assesses the feasibility of a proposed solution. The System Design and
Development chapter outlines the technical requirements, architecture, and
implementation of the automated system. System Testing and Evaluation
focuses on the methods, results, and performance analysis of the new
system. Finally, the Conclusion and Recommendations summarize the
findings, highlight the system’s impact, and suggest areas for future
research and improvements. Supporting sections include preliminary
pages, references, and appendices for supplementary materials.
7
CHAPTER TWO:
LITERATURE REVIEW
In the past, law enforcement organizations have stored crime reports, case
files, and other vital data using manual or semi-automated record-keeping
systems, which frequently involve paper-based procedures or basic
databases. Manual systems require a lot of work and are prone to data loss,
duplication, and errors. Some police agencies implemented computer-
based systems over time to increase the effectiveness of data management.
Unfortunately, data silos and fragmentation resulted from these systems'
frequent stand-alone nature and lack of connection with other departmental
or interagency systems. (Gaines and Kappeler, 2011). Pointed out that
disjointed data management systems make it more difficult for police
agencies to coordinate and communicate effectively, which lowers their
capacity to solve crimes quickly. A move toward more complexes,
automated, and interconnected systems is required due to the shortcomings
of old systems. These contemporary systems seek to deliver improved data
analytics capabilities to support decision-making, facilitate effective
information retrieval, and combine data from several sources. (albert el.
2009).
8
2.1 MOST CURRENR WORKS WITH REFERENCE
Recent advancements in technology have paved the way for more efficient,
secure, and intelligent record-keeping systems in law enforcement:
9
systems by ensuring that only authorized personnel can access or
modify sensitive records. According to García-Ballesteros et al.
(2020), biometric solutions such as fingerprint and facial recognition
provide a higher level of security compared to traditional password-
based systems.
v. Artificial Intelligence (AI) and Natural Language Processing
(NLP):
AI and NLP technologies enable automated data entry,
classification, and retrieval, significantly reducing manual labor and
errors. These technologies can analyze large volumes of
unstructured data, such as incident reports and witness statements, to
extract actionable insights (Dodge, 2021).
10
ii. Software and Tools: The system makes use of contemporary
technology stacks, including PostgreSQL or MySQL for database
administration, Django or Java Spring for the backend, and React or
Angular for the frontend. Because of their widespread use, stability,
and comprehensive documentation, these tools make it possible to
integrate the system with current technologies.
iii. Data management: For police records, effective data retrieval and
storage are crucial. Because relational databases like PostgreSQL
and MySQL can manage massive amounts of structured data and
guarantee seamless access and query execution, they are technically
viable for this task.
iv. Technical Skills: Professionals with expertise in database
administration, cyber security, and software development are needed
for the system's development and implementation. The police IT
department can meet these skill needs with the right hiring and
training, or it can be outsourced if needed.
11
necessary for officers and administrators. To guarantee operational
readiness, training sessions, user guides, and continuing assistance
will be crucial.
iii. Workflow Integration: The technology streamlines and automates
previously manual operations by aligning with police workflows for
handling cases, arrests, complaints, and reports. The solution
enhances data access and accuracy by combining these activities,
which benefits daily operations.
iv. Maintenance and Support: To manage updates, debug problems,
and offer user help, ongoing technical support will be required. If
properly trained, the police IT department can handle this, or it can
be outsourced to a reputable IT service provider.
12
iv. Maintenance Costs: Long-term costs include system maintenance,
data backup, and security updates. These are ongoing but manageable
expenses that ensure system reliability and data integrity.
v. Cost-Benefit Analysis: While there is a substantial initial
investment, the benefits—such as faster record retrieval, reduced
paper-based storage, enhanced data security, and improved efficiency
—are significant. Over time, the system is expected to reduce
operational costs by automating tasks and reducing paper use.
13
CHAPTER THREE:
SYSTEM ANALYSIS
3.0 OVERVIEW
i. Paper-Based System:
Manual Data Entry: Officers spend significant time recording
data manually, which increases the likelihood of errors.
Storage Issues: Storing physical records demands substantial
space, and retrieval is often time-consuming.
Data Loss: Paper records are prone to damage or loss due to
fire, flooding, or mishandling.
ii. Semi-Digital Systems:
Fragmentation: Many departments use stand-alone software
that lacks integration with other systems, leading to data silos.
Limited Accessibility: Accessing records requires physical
presence at a workstation, restricting efficiency.
14
Outdated Technologies: Legacy systems lack the functionality
required for modern policing, such as data analytics and mobile
access.
i. Data Handling:
Centralized Paper Archives: Data is often stored in large filing
cabinets, which are difficult to organize and retrieve efficiently.
Digital Databases with Limited Functionality: Older RMS
platforms offer basic search and retrieval features but fail to
support advanced analytics or real-time access.
ii. Integration Capabilities:
Limited or no integration with other departments or external
systems such as judicial platforms, which hampers collaborative
efforts in case management.
iii. Security Measures:
Minimal Cyber security Features: Many digital systems lack
modern encryption protocols or multi-factor authentication,
exposing sensitive data to potential breaches.
Physical Record Security: Paper records are stored in locked
cabinets, but this approach is insufficient against disasters or
unauthorized access.
iv. Accessibility and Usability:
Paper systems and outdated software are neither user-friendly
nor accessible remotely, limiting officers' ability to work
efficiently in the field.
15
3.1.3 IDENTIFIED LIMITATIONS OF THE CURRENT SYSTEM
Key Components:
i. Actors:
Reporter: Individual reporting the incident.
Police Officer: Person collecting and entering data.
Admin: Person retrieving data and generating reports.
ii. Processes:
Manual Data Collection: Incident details collected manually.
Data Entry: Information entered into a legacy database.
Storage System: Legacy database storing police records.
Report Generation: Data retrieved and compiled into reports
manually.
iii. Data Flow:
Data flows from the reporter to the officer, then into the
database, and is later retrieved for administrative purposes.
16
Start
Incident reported
Initial validation
Data valid?
Yes No
Data entry into legacy system Request additional information
Key components:
i. Actors:
Reporter: Submits incident details.
17
Officer: Collects data manually and submits it for entry.
Admin: Retrieves stored data and compiles reports.
ii. Processes:
Manual Data Collection: Incident details are collected in
physical forms or notes.
Data Entry: Notes are converted into digital entries in a legacy
database.
Storage: Legacy database stores records for future retrieval.
Data Retrieval: Admin requests and retrieves stored records.
Report Compilation: Retrieved data is manually processed
into reports.
iii. Data Flow:
Data moves from the reporter to storage and back to the admin
through retrieval and report generation.
18
Police REPORTER
ADMIN
Officer
19
The feasibility study for the new automated police record-keeping system
confirms its technical, operational, and financial viability. Technically, the
system leverages existing infrastructures like cloud platforms, AI, and
modern databases to ensure scalability and efficiency. Operationally, its
user-friendly interface, real-time data sharing, and seamless integration
with police workflows support adoption and effectiveness. Financially, the
initial investment in hardware and software is justified by long-term cost
savings through reduced administrative work, minimized errors, and
enhanced productivity. Overall, the system's alignment with current
policing needs and its compliance with data protection laws make it a
feasible and sustainable solution for modernizing police record
management.
Key components:
i. Actors:
Reporter: Submits incident reports.
Officer: Completes data entry digitally after validation.
Admin: Requests and generates reports.
System: Automates processes and integrates data from external
systems (CAD, cameras).
ii. Processes:
Data Collection: The reporter submits an incident report,
which is converted into a digital form.
Data Validation & Entry: The officer validates and enters
data into the system.
Data Storage: The validated data is stored in a centralized,
secure database.
Data Retrieval: Admin requests data from the database.
20
Report Generation: Automated reports are generated based on
retrieved data.
System Integration: The system integrates data from external
sources, like CAD and cameras, to provide a unified view for
officers.
start
end
21
Fig. 3.3 new system flow chart
22
3.3.2 NEW SYSTEM DATA FLOW DIAGRAM
Key Components:
i. Actors:
Admin: add staff, view case, assign staff
CID: view case, report to the admin.
NCO: add case, report to admin.
ii. Processes:
Add staff Module: add new staff or existing staff
View case module: view case type and report to admin.
Add case module: add case either fraud, murder or theft.
Assign staff: Assign staff to handle case either CID or FIR.
Report generation module: generates report after viewing
cases.
iii. Data Flow:
Data flows from reporters through various modules for
validation, processing, and storage, with final outputs
accessible to administrators or FIR.
23
Log in
Report to
View case investigate
admin
24
These requirements collectively aim to enhance operational efficiency and
data reliability while reducing manual workload.
26
CHAPTER FOUR:
SYSTEM DESIGN
4.0 OVERVIEW
Key components:
i. Classes:
User: Base class representing system users (reporters,
officers, administrators).
Incident: Represents incident reports with attributes like
description and location.
Database: Handles CRUD (Create, Read, Update, Delete)
operations for data storage.
Report: Manages report generation and sharing
functionalities.
IntegrationAPI: Facilitates interaction with external systems.
ii. Relationships:
Inheritance: Reporter, Officer, and Administrator inherit
from the User class.
Associations:
Incident is linked to User for creation and updates.
Incident is stored in the Database.
Administrator generates Report using Database records.
iii. Functions:
Each class has methods for its respective functionalities, such
as submitIncident(), storeRecord(), or generateReport().
28
Incident
User
Database
User id: string
Name: string Store record(): Boolean
Email: string Retrieve record(): list
Role: string Update record(): Boolean
Delete record(): Boolean
Login(): Boolean
CID
FIR Administrator
CID id: string
FIR ID: string Generate report():
Submitted case(): Update Boolean
Manage staffs(): Boolean
Boolean case():
View cases()
boolean
Report
Generate(): string
Share(): Boolean
29
Key components:
i. Actors:
ii. Interactions:
Key components:
1. Start:
2. Incident Validation:
31
3. Data Processing:
4. Verification:
5. Report Generation:
6. External Integration:
7. End:
32
Fig. 3.4 activity diagram
33
4.1.4 USE CASE DIAGRAM
i. Actors:
ii. Description:
34
investigate
View case
Assign staff
NCO
ADMIN
View staff
Give feedback
Add case
CID
Generate report
4.2.1 ER DIAGRAM
Add staffs
NCO
ADMIN
36
4.2.2 DATA BASE TABLES
37
currently assigned
This table is used to store CID information when then log into the system,
and it also stores assigned cases and assigned officer for those cases.
38
-- User Table
);
-- Incident Table
39
This statement above represents the SQL statement used in the admin login
page
The “ CREATE TABLE” statement will create the admin table in the
database.
The user interface (UI) for the Automated Police Record-Keeping System
is designed to be intuitive and role-specific, ensuring streamlined
interactions for reporters, officers, administrators, and external agencies. It
features a responsive dashboard tailored to each user role, allowing
reporters to submit incidents easily, officers to review and update cases,
and administrators to generate reports and monitor system activities. Key
UI elements include user-friendly forms for incident reporting, detailed
case management views for officers, and advanced data visualization tools
for administrators to analyze trends. Secure login pages, role-based access
controls, and integration points for external agency collaboration ensure a
seamless, efficient, and secure user experience.
41
Fig. 4.6 home page (view cases)
42
4.4 SYSTEM PACKAGING AND DEPLOYMENT
43
CHAPTER FIVE:
5.0 OVERVIEW
44
5.1.1 BLACKBOX TESTING
i. Objectives
FIR Submission:
User Authentication:
Expected Output:
45
Case Assignment:
Expected Output:
Status Updates:
Expected Output:
46
Expected Output: A report (e.g., PDF, Excel) is generated
with accurate data.
Access Control:
Expected Output:
Test
Case ID Scenario Input Expected Output
FIR created
Valid details for a new successfully with
TC001 FIR Submission FIR unique ID and status.
Error message:
Access restricted Unauthorized user "Insufficient
TC010 functionality attempting action privileges."
Manual Testing:
The changeover plan ensures a smooth transition from the existing system
to the new Automated Police Record-Keeping System. It involves four
phases:
CHAPTER SIX:
6.0 SUMMARY
49
The automated police record-keeping system is designed to streamline and
enhance the management of crime-related data, ensuring efficiency,
accuracy, and security in law enforcement operations. The system provides
key functionalities such as FIR filing, case assignment, status tracking, and
report generation, allowing for centralized storage and easy access to
records. It supports multiple user roles, including police officers,
investigators, and administrators, with role-based access control to ensure
data security and confidentiality. The system eliminates the inefficiencies
of manual processes, reduces errors, and enables faster decision-making
through advanced search, filtering, and reporting capabilities. It also
integrates data validation, workflow automation, and secure authentication
mechanisms to safeguard sensitive information. By leveraging modern
technology, this system empowers law enforcement agencies to improve
operational effectiveness, manage caseloads efficiently, and deliver better
services to the public.
6.1 RECOMMENDATION
6.1.1 PERFORMANCE
50
The performance of the automated police record-keeping system is a
critical factor in ensuring its reliability, scalability, and usability in a real-
world law enforcement environment. Below is an outline of key
performance considerations:
6.1.3 Scalability
6.2 CONCLUSION
REFERENCES:
Ainin, S., & Mohezar, J. N. (2008). Online record keeping system for
police department. Kuala Lumur: Kamal-Raj.
52
Asad, A., & N.K, A. M. (2012). Design and Developing record keeping for
Iraqi police department . International Jornal of Scientific
Knowledge, 50-62.
kumar, N., & A.Gopikrishna. (2015). A Robust and Secure Online record
keeping system International journal of computer science, 159.
APPENDIX
<!DOCTYPE html>
<?php
include 'constants.php';
54
?>
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=devidev-
width, initial-scale=1.0, maximum-scale=1.0, user-
scalable=no">
<meta http-equiv="X-UA-Compatible"
content="IE=edge">
<title><?php echo @$title; ?></title>
<nav class=" nim-menu navbar navbar-default
navbar-fixed-top">
<div class="container">
<div class="navbar-header">
<button type="button"
class="navbar-toggle collapsed" data-
toggle="collapse"
data-target="#bs-example-
navbar-collapse-1">
<span class="sr-
only">Toggle navigation</span>
<span
class="icon-bar"></span>
<span
class="icon-bar"></span>
<span
class="icon-bar"></span>
</button>
<a class="navbar-brand"
href="index.php"><?php echo $title[0]; ?><span
class="themecolor">
55
<?php echo
$title[1]; ?></span><?php for ($i = 2; $i <
strlen($title); $i++) echo $title[$i]; ?></a>
</div>
<li><a href="#home"
class="page-scroll">
<h3>Home</h3>
</a></li>
<li><a href="#two"
class="page-scroll">
<h3>About</h3>
</a></li>
<li><a
href="library/sample.pdf" class="page-scroll">
<h3><Map
class="com"></Map></h3>
</a></li>
<li><a
href="pro/signin.php" class="page-scroll">
<h3>Passenger
Portal</h3>
</a></li>
<li><a
href="pro/adminsignin.php" class="page-scroll">
<h3>Admin</h3>
</a></li>
</ul>
</div>
56
<!-- /.navbar-collapse -->
</nav>
57
APPENDIX B
SNAPSHOTS
58
Fig. 6.3 NCO home page
59