Exploring the Challenges of Forensic Technology in Responding to Identity Document Theft in Polokwane Policing Area, South Africa
DOI:
https://doi.org/10.6000/1929-4409.2020.09.62Keywords:
Challenges, Forensic technology, Identity Document theft, Preventative measures, South African Police Service, South Africa, VictimsAbstract
This study explores the challenges of forensic technology in responding to Identity Document (ID) theft as an approach used by the South African Police Service (SAPS) in the Polokwane policing area. This study further evaluates the availability of technological and conventional resources to respond to this scourge, as well as the capabilities of the SAPS to utilise the available [lack of forensic technology] resources to respond best to ID theft. This was done by analysing preventative measures, associated with these challenges, as faced by SAPS and other relevant stakeholders on responding to this crime in the Polokwane Central Business District (CBD), Bendor Park, and Flora Park, coupled with the number of stores situated in the business sectors of these selected areas. For this study, the researchers adopted a quantitative research approach with 90 respondents in the identified areas. This study established that the secretive nature of ID theft makes it difficult for the relevant stakeholders (Not limited to the local SAPS, Businesses, and Public members as presented by this study) to effectively respond to this scourge. Negatively, the forefront gatekeepers to respond to this crime are mainly SAPS Constables with less training to investigates ID theft properly. Thus, find themselves being more reactive than proactive, which contributes to the difficulty of locating potential perpetrators in the process of conventional investigations applications. Furthermore, ID thieves utilise advanced technological resources (I.e. Computer hacking software), as opposed to SAPS which does not have systems nor capacity to effectively respond to this crime. The limited resources at the disposal of SAPS also renders its effort in responding to this crime inadequate. For recommendations; significant emphases should be directed on the promotion of public awareness through public education for the use of forensic technology as an investigative and identification tool of responding to ID theft. The intensive training of SAPS officials and inter-governmental corroboration between SAPS, Department of Home Affairs (DHA), and other relevant stakeholders in understanding this technology are highly advised.
References
Albrecht, C., Albrecht, C, and Tzafrir, S. 2011. How to protect and minimise consumer risk to identity theft. Journal of Financial Crime, 18(4): 405- 414. https://doi.org/10.1108/13590791111173722 DOI: https://doi.org/10.1108/13590791111173722
Allison, SFH. 2003. A case study of identity theft. Masters of Arts Dissertation. United States: University of South Florida.
Angelopoulou, O. 2007. ID Theft: A computer forensics’ investigation framework. Perth Western Australia: Edith Cowan University.
Angelopoulou, O., Thomas, P., Xynos, K, and Tryfonas, T. 2007. Online ID theft techniques, investigation, and response. International. Journal of Electronic Security and Digital Forensics, 1(1):76-88. https://doi.org/10.1504/IJESDF.2007.013594 DOI: https://doi.org/10.1504/IJESDF.2007.013594
Beetar, M. 2014. SA companies’ fraud stats lead the world. Available at: http://www.bdlive.co.za/business/2014/12/10/sa-companies-fraud-stats-lead-the-world.
Burger, J. 2007. Strategic Perspectives on Crime and Policing in South Africa. Hartfield: Van Schaik Publishers.
Buskovick, D. 2013. Financial crime and identity theft: Law enforcement response, challenges, and resource needs. The United States. Report of Minnesota Law Enforcement Identity Theft Survey, Minnesota Department of Public Safety.
Department of the Treasury. 2005. The Use of Technology to Combat Identity Theft. Report on the study conducted pursuant to section 157 of the Fair and Accurate Credit Transactions Act of 2003. Available at: https://www.hsdl.org/?view&did=482322.
De Vos, AS., Strydom, H., Fouché, CB and Delport, CSL. 2011. Research at Grass Roots, for the social science and human service professions. Hartfield: Van Schaik Publisher.
Federal Trade Commission [Online]. 2007. The President’s Identity Theft Task Force: Combating identity theft – Strategic plan. Available at: https://www.ftc.gov/sites/default/files/ documents/reports/combating-identity-theft-strategic-plan/strategicplan.pdf.
Heller, I. 2008. How the internet has expanded the threat of financial identity theft, and what congress can do to fix the problem? Kansas Journal of Law & Public Policy, 1(9), 83-107.
Holt, TJ and Turner, MG. 2012. Examining Risks and Protective: Factors of On-Line Identity Theft. An Interdisciplinary Journal, 33(4): 308-323. https://doi.org/10.1080/01639625.2011.584050 DOI: https://doi.org/10.1080/01639625.2011.584050
International Association of Chiefs of Police. Sa. A Forensic Approach to Effective Identity Theft Investigations. Available at: http://www.theiacp.org/investigateid/pdf/appendices/A-Forensic-Approach-to-Effective-Identity-Theft-Investigations.pdf.
Leedy, PD and Ormrod, JE. 2005. Practical research: planning and design. New Jersey, Upper Saddle River: Merrill.
McLoughlin, C. (carolm@safps.org.za). 2015. ID theft Statistics. [E-mail to:] Mr. Rakololo WM (moyahabo.rakololo@gmail.com) August 5.
Newman, GR and McNally, MM. 2005. Identity theft literature review. United States: Department of Justice.
Robinson, N., Graux, H., Parrilli, DM., Klautzer, L and Valeri, L. 2011. Comparative study on legislative and non-legislative measures to combat identity theft and identity related crime: final report. United Kingdom: Rand Europe.
Smith, T. 2013. Identity theft. Available at: http://www.bowman. co.za/eZines/Custom/ ...
South African Police Service. 2014. About the Forensic Science Laboratory. Available at: https://www.saps.gov.za/faqdetail. php?fid=6#questiion.
South African Police Service. 2010. Strategic Plan 2010 to 2014. Available at: http://www.saps.gov.za.
Welman, JC and Kruger, SJ. 2001. Research methodology for the business and administration sciences. New York: Oxford University Press.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Policy for Journals/Articles with Open Access
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are permitted and encouraged to post links to their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
Policy for Journals / Manuscript with Paid Access
Authors who publish with this journal agree to the following terms:
- Publisher retain copyright .
- Authors are permitted and encouraged to post links to their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work .