1 |
Isolation and characterization of microsatellite markers for human identification in the vhembe District, Limpopo Province, South AfricaDzhivhuho, Godfrey Azwinndini 16 January 2015 (has links)
MSc (Zoology) / Department of Zoology
|
2 |
The analysis of a cheque to identify crimeKruger, Deidre Jacoba 28 February 2006 (has links)
In this study the main focus of the researcher was to analyse a cheque to identify crime. This study intends to give the forensic investigator a guideline to follow during the analysis of a cheque under investigation. Crimes that could be detected during the analysis of a cheque are fraud, forgery and uttering. Other aspects were also explained to ensure a better understanding of the study, namely: forensic investigation, forensic investigator, identification and crime scenes.
Forensic investigation is a systematic search for the truth with the primary purpose of finding a positive solution to a crime. Forensic investigation is not a game of chance, or based on storybook types of coincidences. Therefore, forensic investigators cannot rely on coincidental success to come their way. It is true that luck sometimes plays a role in forensic investigations, but it is the thorough investigator who creates his/her own opportunities and arrives at the right place at the right time. In order for a forensic investigator to strive for excellence, he/she must have a good knowledge of his/her field of work.
It is important for the forensic investigator to understand that identification plays an important role in forensic investigation. An additional benefit is derived when one can individualise something because it makes the identification much more valuable. All crime scenes should furthermore be managed in such a way that all physical evidence can be collected in order to ensure successful prosecution and conviction in a court of law. It is the belief of the researcher that because cheques are not acknowledged as crime scenes and therefore not properly handled or protected, many investigations fail in court and the accused are acquitted. / Criminology / M. Tech. (Forensic Investigation)
|
3 |
Developing a checklist for examining a fraudulent chequeMeijer, Annelie 28 February 2006 (has links)
My goal in this research was to develop a checklist for examining a cheque for information that can be used to identify, individualise and trace the perpetrator of a crime. A further intent was to share and introduce a number of important concepts, namely forensic investigation, identification, individualisation, the Locard principle and crime scene.
This research will explain that forensic investigation refers to the using of sophisticated investigation techniques to obtain sufficient information to prove the true facts in a court of law. Further, that identification is the collective aspect of the set of characteristics by which an object is definitively recognisable or known, while the individual characteristics establish the individuality of a specific object. To link an individual with a crime scene, many types of evidence may be used and to associate an individual with the performed illegal handling, many types of evidence may be used. These types of evidence are commonly referred to as ”transfer” evidence. This process is also referred to as the ”Locard principle”.
Lastly, a crime scene is explained as a place where a crime has occurred. It is also explained to be a ”laboratory of information” and therefore, during a cheque fraud investigation, the cheque is in most cases the only link to information to trace, identify and individualise the perpetrator. Therefore, the cheque should be treated as a crime scene. If forensic investigators use their knowledge of these concepts together with the checklist, it should enhance their investigation skills and empower them to become better equipped for the challenges they face in identifying, individualising and tracing the perpetrators in order to ensure successful prosecution and conviction. I believe all forensic investigators will benefit from what I have discovered through this research and I am very pleased to be able to introduce this checklist to you. / Criminology / M.Tech. (Forensic Investigation)
|
4 |
The processing of firearms during investigation of a crime scenePillay, Povendran Dorasamy 31 May 2008 (has links)
The study was conducted with the intention of identifying the current procedure
employed by investigators for processing firearms evidence at a crime scene. The
researcher identified shortcomings which prevent firearm evidence being found to be
inadmissible in criminal proceedings. The researcher also analysed other aspects
relating to the processing of firearm evidence at a crime scene, namely: Locard
principle, identification, individualisation and physical integrity.
In order for investigators to be successful in their investigation of cases involving
firearms, it is imperative for investigators to have a clear understanding of the basic
concepts surrounding firearm evidence processing. It is the strong belief of the
researcher that because of improper handling, contamination and lack of integrity
pertaining to firearm evidence, such evidence is being found to be inadmissible in
criminal proceedings. This negative impact has a roll over effect on the conviction
rate for serious crime. / Criminology / M. Tech. (Forensic Invesigation)
|
5 |
Enhancing the validity of the SAPS gold fingerprinting database through improved sample-collection techniquesCrundwell, Gordon Rhodes 30 April 2008 (has links)
This study's main focus was to analyse the methodology used by gold mines when obtaining reference samples required for gold fingerprinting analysis. Such methodology is also regulated by legislation in that in terms of the Precious Metals Act 37 of 2005 sect 22(1), "Any producer or any person who imports precious metals must submit to the Forensic Science Laboratory (FSL) of the South African Police Service (SAPS) such specimens of any precious metals produced or imported by him or her as may be prescribed". The gold mines are producers of precious metals, specifically gold, and they are therefore required to submit reference samples, which are then used by the SAPS FSL to maintain a database of gold samples. This database can then be used for comparison purposes during the forensic science of gold fingerprinting.
The supporting regulations of the Precious Metals Act, Section 19 stipulate seven requirements for the submission of reference samples and this study intends to give guidelines to security officials employed on the gold mines of South Africa to ensure that these requirements are met and that the validity of the SAPS gold fingerprint database is enhanced through improved sample-collection techniques.
The use of gold fingerprinting is part of the forensic investigation process used when trying to establish the origin of gold confiscated as an exhibit during police and mining security crime operations and recoveries, and this allows for victim identification in the resultant criminal trial and proper disposal of recovered gold-bearing materials that are recovered.
It is important for the mine security official responsible for reference sample collection to keep in mind that the methodology used when obtaining these samples could be challenged in court and that, therefore, definitive guidelines should be followed to ensure that the most representative samples are collected and that the collection and handing over of samples meet chain of evidence requirements. / Criminology / M.Tech (Forensic Investigation)
|
6 |
The psychological effects experienced by computer forensic examiners working with child pornographyWhelpton, Juliette 02 1900 (has links)
Convergence of technology has made access to the Internet faster, easier and cheaper. Criminals, including paedophiles, child abusers and pornography traders make use of this technology to commit criminal offences. Computer Forensic Examiners (CFEs) are members of the Cyber Crime Unit, a professional, specialised unit of the South African Police Service (SAPS) who are responsible for computer forensic examination including the investigation of child pornographic images. The aim of the study was to seek understanding on what psychological effects the CFEs experienced when working with the images and was conducted from within the social constructionism and the narrative frameworks. The images had a severe impact on the CFEs as was clearly uncovered in the stories of six CFEs who participated in this study. The participants' stories were recorded and transcribed after which the application of thematic content analysis found that the participants all suffered similar negative effects. These findings were integrated with the findings of a focus group as well as with the findings of a similar study that was conducted during the same time by the Crimes against Children Research Center at the University of New Hampshire and resulted in identifying symptoms of trauma and stress experienced by the CFEs. Based on these results recommendations regarding the support for the CFEs were made. / Psychology / M.A. (Psychology)
|
7 |
An exploration of the chasm in the protection of classified information in South African government departmentsMahlatsi, Lehlohonolo Wonderboy 08 1900 (has links)
The chasm in the protection of classified information in South African government indicates that all the departments have at their disposal information that is to some extent sensitive in nature and obviously requires security measures. This study shows that government officials who in their official duties come to contact with classified information are either vulnerable or are implementing the security controls incorrectly. It is also clear that in the absence of a comprehensive statutory framework, the government departments’ classified information has resulted in an unstable and inconsistent classification and declassification environment. The statutory framework would, in addition to other things, address the rising threat of espionage and antagonistic activities, the selling of information and the protection of critical records in government, without hindering the constitutional rights of citizens to access information. This would create a system of valuable informantion and clarify which information requires security measures with respect to the protection of classified information. / Kgaohanao e tshireletsong ya tlhahisoleseding e sireleditsweng ke mmuso wa Afrika Borwa e supa hore mafapha ohle a ona a na le tlhahisoleseding eo, ka ho hong, e leng ya sephiri mme e hloka maemo a tshireletso. Boithuto bona bo bontsha hore bahlanka ba mmuso bao, tshebetsong ya bona ya semmuso, ba teanang le tlhahisoleseding ya sephiri, ba kotsing hobane ba sebedisa ditaelo tsa polokeho ka mokgwa o fosahetseng. Ho boetse ho hlakile hore, bosikong ba moralo o phethahetseng wa semolao, disistimi tse sa sebetseng hantle tsa mafapa a mmuso tsa tlhahisoleseding ya sephiri di bakile tikoloho e sa tsitsang hape e sa hlophiswang ya tlhophiso le tloso ya tlhophiso ya tlhahisoleseding. Moralo wa semolao, hara tse ding, o ka sebetsana le phephetso e eketsehang ya bohlwela le diketsahalo tse ding tse belaetsang tse jwalo ka thekiso ya tlhahisoleseding, mme o sireletse direkote tsa mmuso tsa bohlokwa ntle le ho hatakela tokelo ya Molaotheo ya baahi ya phihlello ho tlhahisoleseding. Hona ho ka theha sistimi ya tlhahisoleseding ya bohlokwa le ho hlakisa hore na ke tlhahisoleseding efe e hlokang maemo a tshireletso ha ho tluwa ntlheng polokeho ya tlhahisoleseding ya sephiri. / Umsantsa okhoyo ekukhuseleni ulwazi olukhethekileyo kurhulumente woMzantsi Afrika ubonisa ukuba onke amaSebe anolwazi analo olunokuba nkenenkene, kwaye oludinga ukhuseleko. Esi sifundo sibonisa ukuba asesichengeni amagosa karhulumente aye athi apha ekusebenzeni kwawo, adibane nolwazi olukhethekileyo, ngoba azisebenzisa gwenxa iindlela zokulawula ukhuseleko. Kukwacaca ukuba, ekubeni kungekho sikhokelo namigaqo isemthethweni, iinkqubo ezingasebenzi kakuhle zamaSebe karhulumente, ulwazi olukhethekileyo aluhlelwa ngendlela eyiyo kwaye lufumaneka kwiimeko ezingaluphathi ngokukhetheka. Ubukho besikhokelo nemigaqo yokhuseleko lolwazi inganceda ekunqandeni isoyikiso esikhulu sobhukuqo mbuso nezinye iziganeko ezikrokrisayo, ezifana nokuthengiswa kolwazi, Esi sikhokelo singanceda nasekukhuseleni iingxelo zikarhulumente ezinkenenkene ngaphandle kokucinezela amalungelo abemi okufumana ulwazi njengoko uvuma uMgaqo Siseko. Oku kuya kuvelisa inkqubo yolwazi olunexabiso kwaye kuya kucacisa ukuba loluphi ulwazi oludinga imimiselo yokhuseleko malunga nokukhuselwa kolwazi olukhethekileyo. / Criminology and Security Science / M. Tech. (Forensic Investigation)
|
8 |
The processing of firearms during investigation of a crime scenePillay, Povendran Dorasamy 31 May 2008 (has links)
The study was conducted with the intention of identifying the current procedure
employed by investigators for processing firearms evidence at a crime scene. The
researcher identified shortcomings which prevent firearm evidence being found to be
inadmissible in criminal proceedings. The researcher also analysed other aspects
relating to the processing of firearm evidence at a crime scene, namely: Locard
principle, identification, individualisation and physical integrity.
In order for investigators to be successful in their investigation of cases involving
firearms, it is imperative for investigators to have a clear understanding of the basic
concepts surrounding firearm evidence processing. It is the strong belief of the
researcher that because of improper handling, contamination and lack of integrity
pertaining to firearm evidence, such evidence is being found to be inadmissible in
criminal proceedings. This negative impact has a roll over effect on the conviction
rate for serious crime. / Criminology and Security Science / M. Tech. (Forensic Invesigation)
|
9 |
Enhancing the validity of the SAPS gold fingerprinting database through improved sample-collection techniquesCrundwell, Gordon Rhodes 30 April 2008 (has links)
This study's main focus was to analyse the methodology used by gold mines when obtaining reference samples required for gold fingerprinting analysis. Such methodology is also regulated by legislation in that in terms of the Precious Metals Act 37 of 2005 sect 22(1), "Any producer or any person who imports precious metals must submit to the Forensic Science Laboratory (FSL) of the South African Police Service (SAPS) such specimens of any precious metals produced or imported by him or her as may be prescribed". The gold mines are producers of precious metals, specifically gold, and they are therefore required to submit reference samples, which are then used by the SAPS FSL to maintain a database of gold samples. This database can then be used for comparison purposes during the forensic science of gold fingerprinting.
The supporting regulations of the Precious Metals Act, Section 19 stipulate seven requirements for the submission of reference samples and this study intends to give guidelines to security officials employed on the gold mines of South Africa to ensure that these requirements are met and that the validity of the SAPS gold fingerprint database is enhanced through improved sample-collection techniques.
The use of gold fingerprinting is part of the forensic investigation process used when trying to establish the origin of gold confiscated as an exhibit during police and mining security crime operations and recoveries, and this allows for victim identification in the resultant criminal trial and proper disposal of recovered gold-bearing materials that are recovered.
It is important for the mine security official responsible for reference sample collection to keep in mind that the methodology used when obtaining these samples could be challenged in court and that, therefore, definitive guidelines should be followed to ensure that the most representative samples are collected and that the collection and handing over of samples meet chain of evidence requirements. / Criminology and Security Science / M.Tech (Forensic Investigation)
|
10 |
The use of blood pattern analysis to reconstruct a crime sceneWiid, Antoinette Bedelia 02 1900 (has links)
The success or failure of any criminal investigation often depends on the recognition of physical evidence left at a crime scene and the proper analysis of that evidence. Crime scenes that involve bloodshed often contain a wealth of information in the form of blood patterns, the location, and its cause. Any criminal investigation has specific tasks, from the time when the crime is reported to the reconstruction of crime scenes. A lot of work needs to be done. Once the investigation starts at the crime scene, BPA needs to be done at the crime scene and the investigating officer must identify this evidential tool. The investigating officer should not necessarily have specialised training in blood pattern analysis, but rather know when to use these experts at their bloody crime scenes. With the interviews and docket analysis done, the researcher found that this was a problem as the investigating officers, either had no knowledge on the subject of BPA or very little knowledge on this research.
The purpose of this study was to determine the use of BPA to CSR, and for the investigating officer to realise that it is not just a bloody crime scene, but also contains a wealth of evidence. The researcher had two research questions. Once the investigating officer follows the objectives of criminal investigation, they should be able to have a strong case against the perpetrators. How could BPA be used in the reconstructing of a crime scene? The researcher wanted to bring it to the investigating officers’ attention that it is not just a bloody crime scene, but rather that it contains a wealth of evidence, which can give them a perspective of the movement of both the victim and perpetrator during the commencement of the crime. Regardless of the lack of knowledge of BPA, it is proposed that investigating officers are to be informed, either through station lectures or by yearly refresher workshops and courses of the evidential tool of BPA. When the bloody crime scene is reconstructed with the use of BPA, an insight of what transpired at the crime scene will help them to finalise their cases.
For recommendations, it is proposed that investigating officers are to be trained in more in depth courses in criminal investigation as well as crime scene reconstruction and evidence collection using FSL. / Criminology and Security Science / M.Tech. (Forensic Investigation)
|
Page generated in 0.1192 seconds