41 |
Developing a checklist for examining a fraudulent chequeMeijer, Annelie 28 February 2006 (has links)
My goal in this research was to develop a checklist for examining a cheque for information that can be used to identify, individualise and trace the perpetrator of a crime. A further intent was to share and introduce a number of important concepts, namely forensic investigation, identification, individualisation, the Locard principle and crime scene.
This research will explain that forensic investigation refers to the using of sophisticated investigation techniques to obtain sufficient information to prove the true facts in a court of law. Further, that identification is the collective aspect of the set of characteristics by which an object is definitively recognisable or known, while the individual characteristics establish the individuality of a specific object. To link an individual with a crime scene, many types of evidence may be used and to associate an individual with the performed illegal handling, many types of evidence may be used. These types of evidence are commonly referred to as ”transfer” evidence. This process is also referred to as the ”Locard principle”.
Lastly, a crime scene is explained as a place where a crime has occurred. It is also explained to be a ”laboratory of information” and therefore, during a cheque fraud investigation, the cheque is in most cases the only link to information to trace, identify and individualise the perpetrator. Therefore, the cheque should be treated as a crime scene. If forensic investigators use their knowledge of these concepts together with the checklist, it should enhance their investigation skills and empower them to become better equipped for the challenges they face in identifying, individualising and tracing the perpetrators in order to ensure successful prosecution and conviction. I believe all forensic investigators will benefit from what I have discovered through this research and I am very pleased to be able to introduce this checklist to you. / Criminology and Security Science / M.Tech. (Forensic Investigation)
|
42 |
Professionalising criminology in South AfricaBeukman, Brenda Ann 30 November 2005 (has links)
This study explores and describes the professional role of the Criminologist in South Africa. National and international research and personal practice are used to demonstrate the role of the South African Criminologist. A qualitative research design supports the exploratory nature of this study. The areas of focus are veracity assessing, criminogenesis, assessment of juveniles, assisting victims of crime through debriefing and compiling victim impact statements and compiling pre-sentence reports. Each of these areas rely on the expert knowledge of the Criminologist and is accompanied by real life case study which is preceded by theoretical explanations and research findings.
The research also highlights the quest for professionalising Criminology in South
Africa by presenting and analysing the formal application for recognition. / Criminology and Security Science / D.Litt. et Phil. (Criminology)
|
43 |
The use of informers during precious medals undercover operationsFlynn, Hendrik Frans 10 1900 (has links)
The research was conducted as a result of the long standing criticism against undercover operations due to the conduct of informers and agents during these operations. Since both undercover operations and informers are controversial issues it may cause serious judicial problems if the system is not applied correctly.
The problem was investigated by means of qualitative research. A thorough literature study and semi-structured interviews were used to gather the required data. Semi-structured interviews were conducted with advocates of the Director of Public Prosecutions Free State and detectives from the Organised Crime Unit of the South African Police Service.
It has been found that undercover operations are an effective manner to address organised crime and especially precious metals related crimes. Undercover operations are an excellent barometer to determine the extent of organised crime. It gives investigators a clear view of the compilation of a syndicate and the roles of leaders, runners and associates. Informers are invaluable sources of information. Without the use of informers it will be virtually impossible to engage in undercover operations, since the police will have no intelligence to engage into an investigation of this nature.
The implications of the findings are that it is the responsibility of investigators, agents and informers to keep the system transparent, fair and acceptable. Their conduct may never violate their mandate and the boundaries of the investigation. Undercover operations are justified when the system is properly administered, structured, controlled and without bias. / Forensic Investigation / M. Tech. (Forensic Investigation)
|
44 |
The value of docket analysis in stranger rape investigations : a case study in Port ElizabethVan der Watt, Marcel 11 1900 (has links)
In this research docket analysis is evaluated as an investigative tool in stranger rape cases. Owing
to the fact that serial rapists mostly reside within the category of stranger rape cases, the
researcher attempted to test the value of docket analysis in the identification of patterns and
similarities among such cases which could be indicative of serial rape activity. A rape matrix was
used as a docket analysis tool to analyse the content of 184 stranger rape cases which was closed
as ‘undetected’. In addition to investigative shortcomings in the case dockets, the researcher
identified 15 stranger rape cases which presented six unique patterns among them. These
identified patterns could be indicative of serial rape activity. / Criminology and Security Science / M.Tech. (Forensic Investigation)
|
45 |
Handwriting as individualisation technique in fraud investigationAschendorf, Cynthia Bernice 21 October 2013 (has links)
The aim of this research is to investigate how handwriting as an individualisation technique in fraud investigation can be used by police detectives, SARS investigators and forensic investigation specialists, who are responsible for the investigation and linking the perpetrator, with a view to criminal prosecution.
A further intent was to share and introduce a number of important concepts, namely: criminal investigation, identification, individualisation, fraud, evidence and handwriting. The research will explain the sophisticated investigation techniques used to obtain sufficient information to prove the true facts in a court of law. Identification is the collective aspect of the set of characteristics by which an object is definitively recognisable or known, while the individual characteristics establish the individuality of a specific object. Many types of evidence may be used to link an individual with a crime scene, and associate that individual with the performed illegal handling.
It also explained that during a cheque/document fraud investigation, it is in most cases the only link to information to trace, identify and individualise the perpetrator, and to obtain a handwriting specimen. It is also discussed how to eliminate a person being a writer of a document, and how to collect, package and mark a disputed document during the investigation. If the investigators use their knowledge of these concepts, it should enhance their investigative skills, and empower them to be become better equipped for the challenges they face in identifying, individualising and linking the perpetrators, in order to ensure successful prosecution and conviction. / Police Practice / M.Tech. (Forensic Investigation)
|
46 |
Interviewing child victims : improve communication and understand child behaviourMasango, Kate Iketsi 02 1900 (has links)
This research investigates the communication abilities of children who are exposed to criminal investigations because a crime was committed against them or they have witnessed a crime happening to another person. The study also determines how crime detectives can maximise their efforts in obtaining evidence from such children with the help of an interview as a technique to elicit information.
The aim of the research was to understand the behaviour of children, so that more effective investigative interviews can be undertaken with child victims. The researcher wanted to identify the communication challenges associated with obtaining information from child victims and possible ways to overcome such challenges. It was found that the developmental stages of children, the manner in which interviewers/investigators conduct themselves during child interviews and the amount of knowledge possessed by interviewers to elicit information in a legally defensible manner are central to child victim interviews. / Criminology and Security Science / M. Tech. (Forensic Investigation)
|
47 |
The role of the investigator in the prosecution processNkashe, Manyedi Solomon 05 1900 (has links)
The process of investigation, which begins when a crime is reported and ends after a suspect has been convicted or discharged by a court of law, is a mammoth task which requires cooperation between various stakeholders, such as investigators and prosecutors. The purpose of this study was to determine the role of the specialized commercial crime investigators in the prosecution process. The study evaluated and explored the status of the current roles played by these investigators with the intention of recommending changes that could improve investigator practice. Two research questions were posed. First, the researcher endeavoured to find answers to a question regarding what the prosecution process entails. Secondly, the researcher sought to establish the roles of the specialised commercial crime investigator in the prosecution process. It was envisaged that the answers to these questions could be obtained from specialised commercial crime investigators and prosecutors deployed in the commercial crimes courts. On this basis two samples were chosen, with nine investigators from the Gauteng North office of the Specialised Commercial Crimes Unit and four prosecutors from the Specialised Commercial Crimes Court in Gauteng North. Some of the findings were that the investigators in trying to fulfil their roles of investigations have an adverse impact on the investigation and successful prosecution of offenders, which in turn lead to recidivism and apathy among the communities being served by the police and the
justice system in general. The image of the police, particularly that of the commercial crime investigators, is often negated and the justice system is portrayed as a failure in addressing the problem of crime. The conclusions drawn from the data were that the roles of investigators in the prosecution process are mandatory as they are legislated rather that persuasive and that investigators cannot rely on prosecutors to handle all aspects of investigation once a case has been handed over to the prosecution. Apart from a lack of knowledge about these roles, it was established that some investigators deliberately ignore their roles in this relationship. It is proposed that dedicated training should be afforded to investigators and prosecutors above their existing training, with a focus on how to take part in the prosecution process. Investigators should be informed that their responsibilities in the prosecution process are a result of legislation and that failure to satisfy the legislation will carry adverse consequences for the investigation itself, the prosecution and the other stakeholders. / Criminal and Procedural Law / M.Tech. (Forensic Investigations)
|
48 |
The value of first report statements in the investigation of rapeHumbulani, Vhulahani 02 1900 (has links)
In this research, the first report statement is evaluated, in order to establish whether the information contained in the first report statement is considered during rape investigations. The researcher explored how investigators and public prosecutors utilise the first report statements in order to ensure an effective criminal justice system.
The researcher made use of (a) an empirical design, because of the limited information available on the research topic, and (b) a qualitative research approach – which enabled real-life observations. Simple random sampling was used to select 28 investigators of rape and sexual offence related cases, four (4) prosecutors attached to sexual offences courts, and one (1) advocate from Gauteng North High Court. Data was obtained through interviews, a literature study, and case docket analysis. / Police Practice / M.Tech. (Forensic Investigations)
|
49 |
Management of security information in the security industryGovender, Doraval 06 1900 (has links)
Incidents, threats and vulnerabilities have the potential to negatively affect an organisation’s assets. Information on these incidents, threats and vulnerabilities are important to security. It is therefore necessary for this security information to be effectively and efficiently managed, so that correct decisions may be made on the implementation of security risk control measures. This study explored the management of security information in the security industry by undertaking the following:
• establishing the “status quo” of the collection and analysis of security
information and the implementation of security risk control measures in practice;
• identifying the nature and extent of problems experienced in the collection and analysis of security information and the implementation of security risk control measures; and the
• discovery of a new Security Information Management Model (SIMM).
Mixed methods research was used to study the management of security information in the security industry. The explorative research design was used for this purpose. Semi-structured and focus group interviews were conducted with senior security managers and operational security officers, respectively. The grounded theory research design was used to analyse the qualitative data in order to generate a substantive grounded theory. The theory is that security officers operate without a standardised framework to manage security information.
The data from the semi-structured and the focus group interviews were used to design a questionnaire to conduct a survey using the quantitative approach. The non-experimental research design was used to conduct this self-administered questionnaire survey. The data from this questionnaire survey helped validate and confirm the substantive grounded theory. The study found that there was the need for a Security Information Management Model to manage security information in the security industry. Based on this finding the researcher recommended a new Security
Information Management Model for the management of security information in the security industry. / Criminology and Security Science / D. Litt. et Phil. (Criminology)
|
50 |
The psychological effects experienced by computer forensic examiners working with child pornographyWhelpton, Juliette 02 1900 (has links)
Convergence of technology has made access to the Internet faster, easier and cheaper. Criminals, including paedophiles, child abusers and pornography traders make use of this technology to commit criminal offences. Computer Forensic Examiners (CFEs) are members of the Cyber Crime Unit, a professional, specialised unit of the South African Police Service (SAPS) who are responsible for computer forensic examination including the investigation of child pornographic images. The aim of the study was to seek understanding on what psychological effects the CFEs experienced when working with the images and was conducted from within the social constructionism and the narrative frameworks. The images had a severe impact on the CFEs as was clearly uncovered in the stories of six CFEs who participated in this study. The participants' stories were recorded and transcribed after which the application of thematic content analysis found that the participants all suffered similar negative effects. These findings were integrated with the findings of a focus group as well as with the findings of a similar study that was conducted during the same time by the Crimes against Children Research Center at the University of New Hampshire and resulted in identifying symptoms of trauma and stress experienced by the CFEs. Based on these results recommendations regarding the support for the CFEs were made. / Psychology / M.A. (Psychology)
|
Page generated in 0.1792 seconds