151 |
Significance of bank records analysis as a technique in tracing fraud suspectsMyeza, Nkosinathi Wonderboy 12 1900 (has links)
Text in English / The research attempts to establish the significance of bank records analysis as a technique in tracing fraud suspects. The purposes of conducting this research was to establish the current approach by the investigators of the SAPS in respect of bank records analysis in tracing fraud suspects; to explore and report on the findings of national and international literature in an attempt to find new information thereby improving the current method of bank records analysis and its specific use in tracing fraud suspects; and to make new information, in the form of written articles and this dissertation, available to the SAPS to be considered for inclusion in the training curriculum for their investigators.
In collecting data, the researcher used literature study, interviews with individual participants and case dockets analysis. Essentially, the recommendations were drawn from the conclusions of the data obtained. These recommendations may offer solutions to the problem identified. / Criminology and Security Science / M. Tech. (Forensic Investigation)
|
152 |
The value of the automated fingerprint identification system as a technique in the identification of suspectsMokwele, Madimetja Edward 02 1900 (has links)
This research is concerned with the value of the Automated Fingerprint Identification System (AFIS) as a technique in the identification of suspects. A problem was identified in the withdrawal of cases where suspects had been identified by means of fingerprints. The study attempted to determine the value of AFIS in the identification of suspects, to find new knowledge that could improve the situation and suggest ways to apply this knowledge to enhance the performance of AFIS experts, criminal investigators and the prosecution in a court of law. The study adopted a multi-method approach to data collection, with the researcher using a literature review, docket analysis and interviews with AFIS experts from Limpopo Province as his sources of data.
The results of the study showed that AFIS is a valuable system for the identification of fingerprints in that it is fast and accurate but that in South Africa AFIS experts encounter a number of challenges with the system. The main challenges identified were the potential for the system to be attacked by computer hackers; the slowness of creating an SAPS 69 record, particularly when dealing with prints of poor quality; which leads to cases being closed where AFIS experts’ evidence is not tested/accepted; and the fact that in South Africa AFIS is not applied across government departments, which would allow a more comprehensive database.
On the basis of these findings, the study recommends that steps be taken to improve the quality of prints taken at crime scenes, that attention be paid to speeding up the process of dealing with the relevant SAPS 69 records, that investigators and prosecutors be informed about the AFIS process and that the AFIS database be extended to include the fingerprints of all South Africans and immigrants to the country. Lastly, the study suggests that the databases of government departments such as Home Affairs, Public Works Roads & Transport and Safety Security & Liaison (Traffics) be combined to form one national database. / Police Practice / M. Tech. (Forensic Investigation)
|
153 |
Vetting as a technique to investigate employment fraud in the City of JohannesburgMahalefa, Andries 01 1900 (has links)
The research study covers the following topic “Vetting as a Technique to Investigate Employment Fraud in the City of Johannesburg Metropolitan”. The researcher intends to evaluate the current procedures which are used in the process of forensic vetting as employment fraud investigation method in CoJ. Furthermore, to build the ground work for potential future innovation, problem solving, decision making and proper planning of the use of forensic vetting as employment fraud investigation method.
The researcher applied the qualitative approach throughout the research because qualitative involves interaction between the researcher and the subject that was identified as a problem that concerned CoJ
The researcher had selected ten (10) forensic investigators to partake in this study. The total population to be interviewed and collect data from was considerable and appropriate for evaluating forensic vetting as an employment fraud investigation method. The researcher used purposive sampling to choose the participants for this research.
It was found that every individual within an organ of the State must be subjected to the vetting process. It was further found that the institutions in governmental, organs of the State and private spheres must adopt the forensic vetting practice to minimize fraudulent activities in their organizations. / Department of Police Practice / M. Tech. (Forensic Investigation)
|
154 |
The analysis of a cheque to identify crimeKruger, Deidre Jacoba 28 February 2006 (has links)
In this study the main focus of the researcher was to analyse a cheque to identify crime. This study intends to give the forensic investigator a guideline to follow during the analysis of a cheque under investigation. Crimes that could be detected during the analysis of a cheque are fraud, forgery and uttering. Other aspects were also explained to ensure a better understanding of the study, namely: forensic investigation, forensic investigator, identification and crime scenes.
Forensic investigation is a systematic search for the truth with the primary purpose of finding a positive solution to a crime. Forensic investigation is not a game of chance, or based on storybook types of coincidences. Therefore, forensic investigators cannot rely on coincidental success to come their way. It is true that luck sometimes plays a role in forensic investigations, but it is the thorough investigator who creates his/her own opportunities and arrives at the right place at the right time. In order for a forensic investigator to strive for excellence, he/she must have a good knowledge of his/her field of work.
It is important for the forensic investigator to understand that identification plays an important role in forensic investigation. An additional benefit is derived when one can individualise something because it makes the identification much more valuable. All crime scenes should furthermore be managed in such a way that all physical evidence can be collected in order to ensure successful prosecution and conviction in a court of law. It is the belief of the researcher that because cheques are not acknowledged as crime scenes and therefore not properly handled or protected, many investigations fail in court and the accused are acquitted. / Criminology / M. Tech. (Forensic Investigation)
|
155 |
Developing a checklist for examining a fraudulent chequeMeijer, Annelie 28 February 2006 (has links)
My goal in this research was to develop a checklist for examining a cheque for information that can be used to identify, individualise and trace the perpetrator of a crime. A further intent was to share and introduce a number of important concepts, namely forensic investigation, identification, individualisation, the Locard principle and crime scene.
This research will explain that forensic investigation refers to the using of sophisticated investigation techniques to obtain sufficient information to prove the true facts in a court of law. Further, that identification is the collective aspect of the set of characteristics by which an object is definitively recognisable or known, while the individual characteristics establish the individuality of a specific object. To link an individual with a crime scene, many types of evidence may be used and to associate an individual with the performed illegal handling, many types of evidence may be used. These types of evidence are commonly referred to as ”transfer” evidence. This process is also referred to as the ”Locard principle”.
Lastly, a crime scene is explained as a place where a crime has occurred. It is also explained to be a ”laboratory of information” and therefore, during a cheque fraud investigation, the cheque is in most cases the only link to information to trace, identify and individualise the perpetrator. Therefore, the cheque should be treated as a crime scene. If forensic investigators use their knowledge of these concepts together with the checklist, it should enhance their investigation skills and empower them to become better equipped for the challenges they face in identifying, individualising and tracing the perpetrators in order to ensure successful prosecution and conviction. I believe all forensic investigators will benefit from what I have discovered through this research and I am very pleased to be able to introduce this checklist to you. / Criminology / M.Tech. (Forensic Investigation)
|
156 |
Professionalising criminology in South AfricaBeukman, Brenda Ann 30 November 2005 (has links)
This study explores and describes the professional role of the Criminologist in South Africa. National and international research and personal practice are used to demonstrate the role of the South African Criminologist. A qualitative research design supports the exploratory nature of this study. The areas of focus are veracity assessing, criminogenesis, assessment of juveniles, assisting victims of crime through debriefing and compiling victim impact statements and compiling pre-sentence reports. Each of these areas rely on the expert knowledge of the Criminologist and is accompanied by real life case study which is preceded by theoretical explanations and research findings.
The research also highlights the quest for professionalising Criminology in South
Africa by presenting and analysing the formal application for recognition. / Criminology / D.Litt. et Phil. (Criminology)
|
157 |
The processing of firearms during investigation of a crime scenePillay, Povendran Dorasamy 31 May 2008 (has links)
The study was conducted with the intention of identifying the current procedure
employed by investigators for processing firearms evidence at a crime scene. The
researcher identified shortcomings which prevent firearm evidence being found to be
inadmissible in criminal proceedings. The researcher also analysed other aspects
relating to the processing of firearm evidence at a crime scene, namely: Locard
principle, identification, individualisation and physical integrity.
In order for investigators to be successful in their investigation of cases involving
firearms, it is imperative for investigators to have a clear understanding of the basic
concepts surrounding firearm evidence processing. It is the strong belief of the
researcher that because of improper handling, contamination and lack of integrity
pertaining to firearm evidence, such evidence is being found to be inadmissible in
criminal proceedings. This negative impact has a roll over effect on the conviction
rate for serious crime. / Criminology / M. Tech. (Forensic Invesigation)
|
158 |
Enhancing the validity of the SAPS gold fingerprinting database through improved sample-collection techniquesCrundwell, Gordon Rhodes 30 April 2008 (has links)
This study's main focus was to analyse the methodology used by gold mines when obtaining reference samples required for gold fingerprinting analysis. Such methodology is also regulated by legislation in that in terms of the Precious Metals Act 37 of 2005 sect 22(1), "Any producer or any person who imports precious metals must submit to the Forensic Science Laboratory (FSL) of the South African Police Service (SAPS) such specimens of any precious metals produced or imported by him or her as may be prescribed". The gold mines are producers of precious metals, specifically gold, and they are therefore required to submit reference samples, which are then used by the SAPS FSL to maintain a database of gold samples. This database can then be used for comparison purposes during the forensic science of gold fingerprinting.
The supporting regulations of the Precious Metals Act, Section 19 stipulate seven requirements for the submission of reference samples and this study intends to give guidelines to security officials employed on the gold mines of South Africa to ensure that these requirements are met and that the validity of the SAPS gold fingerprint database is enhanced through improved sample-collection techniques.
The use of gold fingerprinting is part of the forensic investigation process used when trying to establish the origin of gold confiscated as an exhibit during police and mining security crime operations and recoveries, and this allows for victim identification in the resultant criminal trial and proper disposal of recovered gold-bearing materials that are recovered.
It is important for the mine security official responsible for reference sample collection to keep in mind that the methodology used when obtaining these samples could be challenged in court and that, therefore, definitive guidelines should be followed to ensure that the most representative samples are collected and that the collection and handing over of samples meet chain of evidence requirements. / Criminology / M.Tech (Forensic Investigation)
|
159 |
Processing of information for prosecution purposesVan der Merwe, C. J. (Christoffel Johannes) 31 May 2008 (has links)
The purpose of the research was to establish action steps than can assist the criminal investigator in the processing of information into evidence for prosecution purposes, by focusing on the basic principles of criminal investigation from where information sources could be utilised to their full potential in the search for the truth.
The researcher evaluated the current methods that investigators within the SAPS use and read extensively on the topic in international literature sources. The research used an empirical research design because of the limited information available, and a qualitative research approach which enabled real-life observations. Simple random sampling was used to interview 30 experienced investigators each with more than five years experience and purposive sampling was used to identify five expert respondents who had more than 30 years' investigation experience. Data was obtained from their real-life experiences and data was further collected through case studies of case dockets. / Criminology / M.Tech. (Forensic investigation)
|
160 |
The use of informers during precious medals undercover operationsFlynn, Hendrik Frans 10 1900 (has links)
The research was conducted as a result of the long standing criticism against undercover operations due to the conduct of informers and agents during these operations. Since both undercover operations and informers are controversial issues it may cause serious judicial problems if the system is not applied correctly.
The problem was investigated by means of qualitative research. A thorough literature study and semi-structured interviews were used to gather the required data. Semi-structured interviews were conducted with advocates of the Director of Public Prosecutions Free State and detectives from the Organised Crime Unit of the South African Police Service.
It has been found that undercover operations are an effective manner to address organised crime and especially precious metals related crimes. Undercover operations are an excellent barometer to determine the extent of organised crime. It gives investigators a clear view of the compilation of a syndicate and the roles of leaders, runners and associates. Informers are invaluable sources of information. Without the use of informers it will be virtually impossible to engage in undercover operations, since the police will have no intelligence to engage into an investigation of this nature.
The implications of the findings are that it is the responsibility of investigators, agents and informers to keep the system transparent, fair and acceptable. Their conduct may never violate their mandate and the boundaries of the investigation. Undercover operations are justified when the system is properly administered, structured, controlled and without bias. / Forensic Investigation / M. Tech. (Forensic Investigation)
|
Page generated in 0.1019 seconds