FOR3704 STUDYGUIDE
FOR3704 STUDYGUIDE
FOR3704/1/2023–2025
10034811
InDesign
Revised by : Dr LL Motsepe
CGM_Style
CONTENTS
Page
Introduction to the modulev
Learning unit 1: The forensic investigation of crime, irregularities, and transgressions 1
1.1 LEARNING OUTCOMES 1
1.2 INTRODUCTION1
1.3 LEARNING MATERIAL 2
1.4 LEARNING UNIT OVERVIEW 2
1.5 ACTIVITY 1 2
1.5.1 Feedback3
1.6 CONCLUSION4
1.7 SELF-ASSESSMENT4
Learning unit 2: Principles of investigation 5
2.1 LEARNING OUTCOMES 5
2.2 INTRODUCTION5
2.3 LEARNING MATERIAL 6
2.4 LEARNING UNIT OVERVIEW 6
2.5 ACTIVITY 2 6
2.5.1 Feedback7
2.6 CONCLUSION7
2.7 SELF-ASSESSMENT7
Learning unit 3: Cybercrime, Electronic Communications and Transactions Act 25 of
2002, computer-related activities, commercial crime, sexual offences,
and serious and violent crimes 8
3.1 LEARNING OUTCOMES 8
3.2 INTRODUCTION8
3.3 LEARNING MATERIAL 9
3.4 LEARNING UNIT OVERVIEW 9
3.4.1 Cybercrime9
3.4.2 Electronic Communications and Transactions Act 25 of 2002 10
3.4.3 Computer-related activities 13
3.4.4 Commercial crime 17
3.4.5 Sexual offences 21
3.4.6 Serious and violent crimes 22
3.5 ACTIVITY 3.1 23
3.5.1 Feedback23
3.6 ACTIVITY 3.2 23
3.6.1 Feedback23
3.7 CONCLUSION24
3.8 SELF-ASSESSMENT24
FOR3704/1(iii)
CONTENTS
(iv)
INTRODUCTION TO THE MODULE
Dear student
Welcome to the module Investigation of Selected Crimes and Transgressions: Module
B (FOR3704). This module is at NQF Level 7 and carries 12 credits. It contains very
important information regarding the investigation of selected crimes and transgressions.
You must study all the information in this module to enhance your knowledge and
skills in the use and application of investigation of selected crimes and transgressions.
All the questions asked in the assignments and the examination are based on information
in the prescribed textbook and Tutorial Letter 501. This module is offered online and
you should visit the FOR3704 module site often. Learning is not a spectator sport.
Students do not learn much just by sitting in class listening to teachers, memorising
pre-packaged assignments, and spitting out answers. They must talk about what they
are learning, write about it, relate it to past experiences and apply it to their daily lives.
They must make what they learn part of themselves. On this note, I wish you all the
best on your journey of self-discovery. Remember, with hard work, perseverance and
dedication, anything is possible!
This module aims to identify and conduct investigations of selected crimes and
transgressions and inform students on how to apply the principles of humanising the
law and social responsibility.
FOR3704/1(v)
INTRODUCTION TO THE MODULE
2. LEARNING OUTCOMES
Learning outcomes in this context refer to the result of the learning process. It is what
you are expected to do after the learning process; the knowledge, skills and attitudes
that you have to demonstrate at the end of this module.
3. SYLLABUS
The following knowledge is embedded within the module, and will be assessed directly
or indirectly through assessment of the specific outcomes in terms of the assessment
criteria:
• Cybercrime
o
Cybercrime in terms of the Electronic Communications and Transactions Act,
2002
o Computer-related crimes
(vi)
Introduction to the module
• Digital evidence:
o The nature of digital evidence
o Use of digital evidence
o Sources of digital evidence
o Electronic devices and storage media
o Protected devices and media
o Concealed devices and media
o
Digital evidence in terms of the Electronic Communication and Transaction
Act, 2002
o The admissibility and relevance of digital evidence
o The relationship between digital evidence and digital forensics
o Digital forensics
o The nature of digital forensics
o The digital forensic process
o Pre-examination phase
o Examination phases
o Post-examination phase, each of which follows sequentially
4. ASSESSMENT CRITERIA
It is important to note that you will get assignments to complete during the semester
and write a formal examination. The assignments and examination will assess whether
you have achieved the set learning outcomes for this module.
FOR3704/1(vii)
INTRODUCTION TO THE MODULE
• Dintwe, S. & Zinn, RJ. (eds). 2015. Forensic investigation: legislative principles
and scientific practice. Cape Town: Juta (ISBN: 9780702186479)
This book, published in 2015, is the prescribed study material for this module. You can
purchase the book from Juta and the publication is available at all bookshops around
the country as well as online at https://www.jutaonline.co.za/shop/ in both print and
electronic format.
Introduction
This paragraph gives you a very brief idea of what you will be studying in the particular
unit.
Learning material:
This section indicates which paragraphs have to be studied from the textbook.
Module overview:
Under this heading, each learning unit indicates what content of the module is cov-
ered in the unit. It also refers to the prescribed cases that have to be studied with the
particular unit.
Activity:
The activity given at the end of each learning unit guides you in practising some of the
principles studied in the unit.
Conclusion:
The summary of each unit helps you to remember what you studied in that unit
Self-assessment activity
(viii)
1 LEARNING UNIT 1
1.2 INTRODUCTION
The forensic investigation of crime, irregularities and the transgression process involves
more than mere investigation. Forensic investigation is first recognised as a science.
During an investigation, the natural sciences play a pivotal role in solving crimes or
incidents, for example through DNA analysis, but the human sciences also play a role.
The human sciences include the science of policing, which, in turn, includes the scientific
process, followed by an investigator in the investigation of a crime, incident, irregular-
ity or transgression. For example, a scientific process is followed to analyse the scene
of an incident (which encompasses making use of the natural sciences), and then the
investigator selects the most effective interviewing techniques that suit the personality of
the suspect, witness, or complainant (which encompasses utilising the human sciences).
FOR3704/11
Please read through chapter 1 in the textbook, which explains the basic knowledge and
skills needed when investigating crimes, transgressions, or irregularities.
• terminology
• society and the rules that govern society
• understanding crime investigation
• constitutional foundation for investigations
• purpose and objectives of an investigation/inquiry
• types of investigators
• criminal versus forensic investigation
• the investigation processes
• investigation techniques
• specific characteristics of an investigator
• the modern-day investigation cycles
• self-evaluation checklist for investigators
In the prescribed book, you will be introduced to the investigation of crimes and
transgressions. The concepts of forensic investigation and criminal investigation are
discussed and clarified. The investigation process is explained with specific reference
to the flow of an investigation, the investigator’s tasks and mandate, and the difference
between police and a private investigation. The concept of an investigator is unpacked
specifically about who this person is. What skills, attitudes and characteristics does
such a person need to be successful in what he or she does? The importance of eth-
ics and moral actions is also highlighted. The modern-day investigation cycle and the
value of intelligence-led investigations are also discussed. It is important to be mindful
that police investigations and investigations by private investigators differ in certain
respects. The learning unit concludes with a self-evaluation checklist for investigators.
1.5 ACTIVITY 1
X is employed as a bookkeeper by the GTI Group. Over two years, X has been transfer-
ring funds from the company account into a fraudulent account he created. You receive
an anonymous tip-off via the whistle-blowing hotline about X’s conduct. Furthermore,
you receive written complaints from employees forwarded to you by the human resource
department alleging that X uses derogatory language when speaking to fellow employ-
ees. You are required to conduct a forensic investigation into the allegations. Outline
how you will investigate the crime, irregularity, or transgression. You must first identify
whether a crime, irregularity or transgression has been committed.
2
LEARNING UNIT 1: The forensic investigation of crime, irregularities, and transgressions
1.5.1 Feedback
Let us look at activity 1:
• fraud
• crimen injuria
• a transgression
The fact that X has been transferring money unlawfully and intentionally, thereby
misrepresenting the company and causing actual loss to the company, is in effect
fraudulent behaviour, which is a criminal offence according to the requirements of
definitional elements for a specific type of crime. In this regard, see the definition of
fraud. Remember that the loss need not be actual loss; potential loss will suffice.
Investigation
See the discussion of the investigation process from page 20 of Dintwe and Zinn and
draw a mind map as to how you will approach the investigation.
A recommended process is set out below. However, you must consider the different
phases of investigation, including whether a company policy and procedure exist in
terms of which X can be investigated with a view to a possible disciplinary inquiry.
• Crimen iniuria/transgression
Crimen iniuria is the unlawful, intentional, and serious impairment of the dignity or
privacy of another.
Investigation:
• Check if any policy exists that deals with the use of derogatory comments. Check
if X was aware of the existence of such a policy. Generally, employment contracts
require employees to familiarise themselves with all company policies and procedures.
These can usually be found on the company intranet or other electronic platforms.
FOR3704/13
The computer terminal that was used to commit the fraudulent acts is also important.
Consequently, the investigation process when dealing with computer crime is an im-
portant activity. During this activity, particular attention must be given to the hard
drive as an exhibit, including CDs and other evidentiary material. See the discussion
in Dintwe and Zinn. When studying the investigation of computer crime, you must
refer to the discussion of the investigation process on pages 20, 21 and 362 in your
prescribed textbook. In using the investigation process specific to the different phases,
you must be able to apply the principles in investigating computer crime. Also, see the
discussion in learning unit 3.
1.6 CONCLUSION
This learning unit is aimed at providing you with concise investigation processes and
the terminology thereof. The forensic investigation of crime, irregularities and the trans-
gression process is covered comprehensively in your prescribed textbook. The various
subtopics as outlined at the beginning of section 1.3 of this learning unit can be found
on pages 1 to 41 in the prescribed textbook. Do not underestimate this learning as you
will need to consult the prescribed book to learn more. In the next learning unit, we
look at the principles of investigation, which include the identification principle.
1.7 SELF-ASSESSMENT
To refresh your memory and to contribute to your understanding, do the following as-
sessment activities. The activities are for your preparations for the summative assessment.
• What are the three objectives of an investigation to consider at the scene of an incident?
• What is the difference between the criminal and forensic investigation? Give examples
to substantiate your answer.
• When can the company institute an investigation regarding an incident?
4
2 LEARNING UNIT 2
2 Principles of investigation
2.2 INTRODUCTION
You need to consult chapter 2 of the prescribed book to understand the principles of
investigation. The forensic investigation of crime, irregularities, and transgressions
is a science. It is, therefore, important that an investigator apply scientific methods,
up-to-date techniques, and logical reasoning during the investigation process. For the
investigator to ensure that a scientific approach is adopted during an investigation, it is
important to be familiar with the principles of investigation.
FOR3704/15
Study pages 45 to 46 of your prescribed book to understand what the Locard exchange
principle means to principles of investigation.
In this learning unit, you will be introduced to the principles of investigation. These
principles talk to the gathering and examination of factual information and evidence
that solve crime investigation-related problems.
2.5 ACTIVITY 2
The term individualisation is often mistaken for identification. However, each principle has
its own set of requirements to accomplish the objective during the forensic investigation
of crime, incident or transgressions.
6
LEARNING UNIT 2: Principles of investigation
2.5.1 Feedback
In a forensic investigation, individualisation and identification are two inalienable
investigation principles that complement each other. One principle has no evidential
value without the other. Individualisation and identification can independently be used
to identify a specific suspect and link that suspect to a particular crime or incident.
Identification entails the act of identifying a person or object.
For more information, study more about these two investigation concepts from pages
45 to 65 of the prescribed material. Although this feedback is brief in this learning unit,
you must find more details about these principles.
2.6 CONCLUSION
This learning unit is covered in chapter 2 of the prescribed book, and the principles
of investigation are covered comprehensively. The various subtopics, which include
individualisation and identification as outlined at the beginning of section 2.2 of this
learning unit, can be found on pages 43 to 66 in your prescribed textbook. Once you
have studied these principles, you should be able to solve crime-related problems during
the investigation by using the techniques to a practical set of facts. The prescribed book
forms the core source of this module, and the examination is based on the application
of these principles of investigation. This wraparound merely provides a framework and
is not a source of comprehending the knowledge.
2.7 SELF-ASSESSMENT
These short-answer questions are appropriate in measuring an understanding of
investigation principles or the ability to solve problems or apply principles. They require
you to consider various factors of the investigation principles to arrive at solutions.
FOR3704/17
3 LEARNING UNIT 3
3.2 INTRODUCTION
Let’s begin with some startling statistics: it took 50 years for the radio to reach 50 mil-
lion people, but it took only five years for the internet to reach the same number of
people – and the number of internet users doubles every 100 days. In short, information
technology (IT) has changed the world. How we communicate has changed forever,
and that has been closely followed by a variety of new ways to commit crime. Initially,
only large organisations and government institutions had access to computers and the
internet. Nowadays, however, the “Net” and personal computers are found in many
households. As the IT world grows, the criminal world exploits this medium. The
word “cybercrime” can frighten any investigator, as it seems to imply that the field of
investigation is intangible.
Computers, information systems, communication devices, and other digital devices are
now used as tools to commit crimes. Moreover, they are the target of criminal activity.
However, potentially, they can also be used to store digital evidence that can prove or
disprove legal issues in dispute. As a result, the forensic-investigation environment has
changed fundamentally. These days, any investigator must be comfortable with obtaining
and collecting digital evidence, must understand how to make use of digital forensics,
and must be able to investigate cybercrime.
8
LEARNING UNIT 3:
3.4.1 Cybercrime
In chapter 11 of the prescribed book, it is explained how criminals have developed
creative new ways to perpetrate crime by integrating highly technical methods with
traditional crimes. Cybercrime is dealt with in detail on page 393 of the prescribed
book. Internationally, these “new” types of crimes challenge law enforcers to meet the
technological demands of investigations into such crimes. Computer crime may involve
traditional criminal activities, such as theft, fraud, forgery and espionage, as well as
a host of newly created offences, including the destruction of data, hacking, and the
interception of data.
In terms of the above explanation, cybercrime would entail all crimes where comput-
ers/computer systems are the object, target or instrument of the crime, or the repository
of evidence related to the crime. A comprehensive definition of cybercrime can be found
on page 394 in your prescribed textbook under section 11.10.2.
In the next section, we will explore legislation that is aimed specifically at computer-
related crime.
FOR3704/19
It might surprise you to know that, until 1 August 2002, it would have been difficult
to prove that these actions made the perpetrator guilty of a crime. Admittedly, this
perpetrator stole intellectual property, but didn’t do so for financial gain. So, then, did
the suspect access premises illegally for unlawful purposes? No, the suspect didn’t leave
hir or her own home. Was he or she guilty of breaking and entering? No, the suspect
did not move or remove any tangible object to gain entry. What about theft? No again.
Only tangible items could be stolen and the suspect did not take the information away
from the owner; he or she simply made a copy of it. Until 1 August 2002, therefore,
South Africa did not have any legislation prohibiting crimes such as theft of data or
hacking (illegally accessing computers).
Fortunately, however, the Electronic Communications and Transactions Act (the ECT
Act) 25 of 2002 changed this undesirable situation. The ECT Act constitutes ground
breaking legislation for South Africa since it contains legislation to regulate something
that is not tangible, namely computer data. This might not seem significant, but, be-
fore the ECT Act, the only option investigators had was to try to prosecute offenders
responsible for billions of rand in damage in terms of common law offences.
Each aspect of the new legislation is discussed in detail using examples that an average
person can relate to. In the discussion below, selected sections that you are likely to
encounter in your work environment are quoted. However, it is helpful to read through
the whole ECT Act.
“(1) Subject to the Interception and Monitoring Prohibition Act, 1992 (Act No. 127 of
1992), a person who intentionally accesses or intercepts any data without authority or
permission to do so, is guilty of an offence.”
This means that you are not allowed to read or intercept any data without being duly
authorised to do so. Such provision is causing concern in the business community
since it implies that an employer is not allowed to monitor his/her employees’ e-mails
without their permission. This permission is normally gained using an IT policy. So,
when investigating cases of this type, you would need to obtain a copy of the IT policy
to determine if permission has been obtained.
“(2) A person who intentionally and without authority to do so, interferes with data in
a way which causes such data to be modified, destroyed or otherwise rendered ineffec-
tive, is guilty of an offence.”
In this subsection, crimes such as the deletion and modification of data are prohibited.
We often encounter cases where employees are dismissed/retrenched and, out of vin-
dictiveness, delete all the data on their computers.
“(3) A person who unlawfully produces, sells, offers to sell, procures for use, designs,
adapts for use, distributes or possesses any device, including a computer program or
10
LEARNING UNIT 3:
a component, which is designed primarily to overcome security measures for the protec-
tion of data, or performs any of those acts about a password, access code or any other
similar kind of data with the intent to unlawfully utilise such item to contravene this
section, is guilty of an offence.”
This subsection refers to the creation, selling or possession of, primarily, programs
that assist hackers to break into other computer programs, that is, programs that are
designed to overcome the security features on a particular computer and allow a person
full access to that computer.
“(4) A person who utilises any device or computer program mentioned in subsection
(3) in order to unlawfully overcome security measures designed to protect such data or
access thereto, is guilty of an offence.”
This subsection links up with subsection 3 but prohibits the use of such a program.
“(5) A person who commits any act described in this section with the intent to unlawfully
interfere with access to an information system so as to constitute a denial, including a
partial denial, of service to legitimate users is guilty of an offence.”
This refers to any person who commits any of the acts we have already looked at in
order to render a computer system unusable. This is sometimes also referred to as a
“DOS” or “denial-of-service” attack.
“(1) A person who performs or threatens to perform any of the acts described in section
86, for the purpose of obtaining any unlawful proprietary advantage by undertaking
to cease or desist from such action, or by undertaking to restore any damage caused as
a result of those actions, is guilty of an offence.”
“(2) A person who performs any of the acts described in section 86 for the purpose of
obtaining any unlawful advantage by causing fake data to be produced with the intent
that it be considered or acted upon as if it were authentic, is guilty of an offence.”
The above subsections are self-explanatory. In addition, both an attempt to commit one
of the above crimes and aiding and abetting in the commission thereof are prohibited
in terms of section 88.
As stated earlier on, these are not the only crimes dealt with by this Act. The remainder
of the Act prescribes the requirements for doing business on the internet. It is strongly
recommended that you study the remainder of the Act as well. Among other things,
you will discover the following:
Other legislation that is closely related to this Act is the Regulation of Interception of
Communications and Provision of Communication-related Information Act 70 of 2002.
FOR3704/111
• Hacking
Hackers do what they do for financial gain, or it could simply be for the challenge.
Information obtained in this manner is normally sold or used to extort money from the
lawful owner. It can also be used for espionage purposes. Hacking can be done while
sitting at the target computer or from the other side of the world. An employee who
has legitimate access to data can also commit theft, or alter or destroy data. So, as you
can see, it is not always necessary to hack before the crime is committed.
• Malicious programs
There is a wide range of malicious computer programs available. These programs are
grouped into several categories, for example, viruses, worms, and Trojans. To indicate
what a malicious program is, the following explains more or less what it does:
• A virus is a program that infects a computer. It can cause several problems, such
as making the computer slow, deleting data, annoying the user, or even rendering
the computer useless.
• A worm acts much like a virus but is normally able to spread/reproduce itself. If
a computer has a worm on it and it has e-mail capability, the worm will send itself
to all the contacts on the e-mail list.
• A Trojan is the most dangerous program of all. It is designed to do several things, for
example, collect certain data on your computer or create a backdoor on your computer.
This information is then sent back to the owner of the Trojan.
• A bomb or logic bomb is a program that is installed on a computer and “explodes”
if certain criteria are met. If, for example, you were a systems administrator at
a company, you could plant a bomb and tell it to destroy all data once your name
disappears from the company payroll – in other words, once you’ve been dismissed.
If you have access to the internet, you could do an internet search to find more infor-
mation on the difference between these types of malicious programs, the damage they
cause, and the measures that are available to combat them.
12
LEARNING UNIT 3:
Can you think of a crime in which a computer cannot be used? Let’s consider a few
crimes to see if computers can be used in their commission.
• Murder
• A person kills himself and leaves a suicide note on a computer. But how do we know
that he typed it? It could have been typed by the person who murdered him to make
it look like a suicide.
• Someone locates and corresponds with a hitman over the internet and “contracts” with
him to kill a person. All the evidence of this conspiracy is recorded on the computers
used.
• If a man knows that his wife has to undergo a serious operation and he breaks into
the doctor’s computer records and deletes information that she is allergic to penicillin,
the man could be legally responsible for his wife’s death.
• Vehicle theft/robbery
Here, again, computers can be used to commit a crime. For instance, one of the main
priorities of a car-theft syndicate is to get the stolen vehicle back on the road as a legal
vehicle. The syndicate does this by counterfeiting vehicle documents using a computer,
or it gets an insider at the licensing department to alter the details on the NATIS (com-
puter) system.
• Dealing in drugs
Once again, computers can be used to commit this crime. Many people, for example,
get information off the internet on how to manufacture drugs. There are even explicit
advertisements on the internet for the sale of scheduled medicines by unlicensed phar-
macists. You can even order dagga over the internet and get it delivered to your front
door! Furthermore, drug dealers keep records on computers of all their purchases and
sales, and of how much they owe their suppliers or street peddlers.
FOR3704/113
Information about the physical layout of the crime scene is also important.
In all cases where a computer is involved, it is important to try to ascertain the following:
• the physical location of all PCs
• whether there is a network
• the location of the server or server room
• the name and contact details of the systems administrator
• the type of operating system in use
• whether passwords are used and, if so, what they are
• whether encryption is used and, if so, what the encryption keys are
• how many people are on the premises
• how many computers are involved
• who has access to which PC
• whether the PCs are connected to the internet and, if so, which internet service
provider (ISP) is used, and what the usernames and passwords are
• where all backups are stored
14
LEARNING UNIT 3:
Only officials with sufficient knowledge and experience should deal with computers,
peripherals, CDs, DVDs, programs, and so forth, as well as with other technical or
specialised equipment, during searches. Never let the suspect or self-taught experts
touch the computer.
Do not allow any suspect/unauthorised person to disconnect, alter the state of, or use
the computer. Never move a computer while it is switched on. A detailed discussion on
seizing a computer that is switched on can be found in your prescribed textbook
on page 387. Also, see the discussion on seizing a computer that is not powered
on, on page 386.
Keep radios, mobile phones and electrical/magnetic devices and sources away from com-
puter equipment. These include, but are not limited to, your car radio (in the boot next
to the transmitter), electric motors, speakers and magnetic clips. Don’t place the items
near excessive heat or in direct sunlight inside your car. Avoid touching exposed media
(e.g. CDs, DVDs and data tapes) with your bare skin, since the oil on your skin could
damage the media.
FOR3704/115
Avoid touching exposed wires or circuit boards – the static electricity in your body
may destroy the components. Do not place the items in plastic evidence bags or boxes
of foam. These items are full of static electricity and will cause permanent damage.
Treat the items gently: don’t drop or throw them around, and don’t pile heavy objects
on top of them.
Look around and ask the suspect if he/she has the original packing material. (Be cau-
tious to apply the above rules to any items he/she might suggest. Often, suspects care
more about protecting their equipment than anything else. If nothing else is available,
use a paper bag or cardboard box). Tag each wire, cable or other connector before it is
removed, as well as the port from which it is removed, allocating each item a unique
letter or number.
Follow the normal evidence-collection procedure that you would use for any other type
of evidence. Take pictures, and mark and tag items with the locations from which they
were seized. The location of each piece of evidence must be recorded and the exhibit
must be marked. If ten CDs are found at different locations in a room, they must be
packaged separately, since knowing the location could help to solve the crime. If, how-
ever, ten CDs are found in a box, they can be packaged together.
In many instances, storage devices such as CDs have few or no distinguishing features.
The investigator must nevertheless try his/her best to describe the pieces being col-
lected. Where serial numbers are available, they must be recorded.
The exhibit number and case number must be marked on the outside of the exhibit. No
covering letter must be sealed inside the exhibit container. When equipment is seized,
be sure to take all manuals, cables and components that are related to the seized items.
These will probably be required for the analysis.
16
LEARNING UNIT 3:
The commercial arena is probably where computer-related crimes are most often commit-
ted. This is because the whole commercial environment has changed from a paper-based
environment to an electronic environment. This means that transactions and actions
that were previously captured on paper are now captured and stored on computers.
That was the first phase. The second phase, which is currently gaining momentum, is
moving the actual transaction, where goods or services are exchanged for currency,
from a person-to-person environment to the electronic or internet environment. The
consequences of these changes are that, whereas detectives previously had to follow a
paper/money trail to find the culprit, nowadays there is no physical evidence, or clues,
that can be followed. Everything takes place and is stored in cyberspace. So, while
traditional commercial crimes such as fraud, forgery and scams still take place, it has
become much easier to commit these crimes, because computers are so much faster
and superior in carrying out the necessary actions.
Forgery of identity documents (IDs), bank statements, salary slips, shopping invoices,
money, and so forth, can all be done using a computer. But, you may be wondering:
“Why forge things such as bank statements, salary slips and shopping receipts?”
The answer is that criminals use these documents, together with a false ID, to apply
for credit and loans, and then they disappear with the money or the goods.
Another computer-related crime that is also unrivalled in scope is that of piracy (copy-
right infringements). Here we are talking about the pirating of computer software,
music and films.
• Internet/e-mail crimes
The term “internet fraud” generally refers to any type of fraudulent scheme that uses
one or more components of the internet, such as chat rooms, e-mail, message boards
or websites, to fraudulently solicit prospective victims.
In general, the same types of fraudulent schemes that have harmed consumers and
frustrated investors for many years are now appearing online (sometimes with particu-
FOR3704/117
lar refinements that are unique to internet technology). With the explosive growth in
the internet and e-commerce, in particular, online criminals try to present fraudulent
schemes in ways that look, as much as possible, like the goods and services that the vast
majority of legitimate e-commerce merchants offer. In the process, they not only cause
harm to consumers and investors but also undermine consumer confidence in legitimate
e-commerce and the internet. This is very detrimental to South Africa if you consider
the multitude of legitimate business opportunities that the internet and e-commerce
present. A person struggling to make a living from a small, traditional business could
prosper greatly by putting their business on the internet, thereby allowing the whole
world to access their goods or services. However, such opportunities are seriously
jeopardised by unscrupulous operators of fraudulent online schemes.
The following is an example of a type of e-mail message that some people receive quite
often, particularly those less knowledgeable in the use of technology. Suppose you
received a message like this one. What would you make of it? What is going on here?
You may be surprised to receive this e-mail since you do not know me. I was given your name and
e-mail address by a business acquaintance of yours, who assured me that you are a trustworthy person
who might be willing to assist someone who is in desperate need, and so benefit from a lucrative business
opportunity at the same time. I am the son of the late president of the Democratic Republic of Zaire,
President Mobutu Sese Seko (Zaire is now the Democratic Republic of Congo, under the leadership of
the son of Mr Laurent Kabila). I presume you are aware that there is a financial dispute between my
family (the Mobutu) and the present civilian government. This is based on what they believe was bad
and corrupt governance on my late father’s part – may his soul rest in peace. Because they falsely allege
that he was corrupt, they have frozen his bank accounts in Switzerland and North America. This
has placed us, his family, in a difficult position. We still have some funds that rightfully belonged to my
father, but cannot deposit these funds either in our own country or in one of my father’s accounts. We
also live under the threat that the present government might appropriate these funds at any moment. Our
very lives may be in danger. Because of these circumstances, I am humbly asking for your help. I am
proposing that you confidentially allow me to use your bank account in South Africa to deposit thirty
million United States dollars (USD30 000 000). If you are willing to do this, my mother and I have
decided that you may have 20% of these funds. We will also refund any money you may spend on phone
calls or travelling expenses in the course of this transaction. Should you be interested in this transaction,
please reply to this message by sending me your telephone and fax number and e-mail address, and by
providing details of your bank account. Owing to the serious predicament of my family, I am sure you
will understand that all this has to be done with the utmost confidentiality. I am currently in a refugee
camp in the Netherlands but can be reached at [e-mail address]. Please, I need your full support and
cooperation for the success of this transaction. God bless you for your willingness to help a person in need.
Warmest regards
You will be able to check your answers for the above activity by working through the
following sections, which describe some of the main types of fraudulent schemes that
are perpetrated by means of electronic communication.
18
LEARNING UNIT 3:
These schemes typically offer expensive items such as Cartier watches and comput-
ers, and collectables such as Teletubbies and Beanie Babies, which are likely to attract
many prospective customers. Such schemes induce their victims to send money for the
promised items but then deliver either nothing or only an item of far less value than
that promised (e.g. counterfeit or altered goods). An example of such a scheme under
investigation in South Africa involves the offer of accommodation to international guests.
This was a very popular scheme during the 2002 World Summit. What happened was
that the criminals would advertise accommodation on the internet. The unsuspecting
visitor would then pay the deposit in advance, only to discover once he/she arrived in
the country that the “hotel” concerned never existed. By that time, the internet site had
been closed down and the deposit paid was never recovered.
Fraudulent schemes often use the internet to advertise business opportunities that will
allow individuals to earn thousands of rand a month through “work-at-home” ventures.
These schemes typically require the individuals to pay some money upfront, but then fail
to deliver the materials or information that will be needed to make the work-at-home
opportunity a potentially viable business.
Some fraudulent internet schemes also involve identity theft, that is, the wrongful acqui-
sition and use of someone else’s personal data in a way that involves fraud or deception,
typically for economic gain.
A person (such as the person who calls himself “Joseph Mobutu Sese Seko” in the activ-
ity), or a group of people, pretends to have a large sum of money in his/her/their pos-
session. Usually, they suggest that this money was obtained in suspicious circumstances
or that, for some or other reason, they cannot openly deposit the money into their bank
account. They, therefore, need another person to provide a bank account into which
the money can be deposited. They then usually promise the person who is willing to let
their bank account be used in this way a significant share of the money. In fact, all they
really want are the details of the person’s bank account. Having obtained these details,
they then use this information to illegally withdraw money from that person’s account.
Now, you would think that any person with a bit of common sense would realise that
this is a scam. Nevertheless, many educated people fall prey to this scam, lured by the
prospect of easy money. In the past, syndicates would send their request to potential
victims using letters or faxes, and detectives were then able to trace them via telephone
numbers as well as fingerprints on the letters. Nowadays, however, they send e-mail
messages from any internet cafe to people whose e-mail addresses they have obtained.
FOR3704/119
They often train a homeless person or “runner” to send e-mails and then hand such
person a stiffy containing the scam letter. Even if you could trace the e-mail very
quickly (which is impossible), you would only ever catch a person who was paid, say,
R20 to send an e-mail.
• Phishing
A typical phishing e-mail will appear to come from a legitimate organisation such as a
bank and will state that the organisation requires the recipient of the e-mail to verify
their account information. For example, it may state that the person’s account could
have been compromised and that the bank needs to check their security details. The
e-mail will usually have a spoofed header and will be designed to resemble that of the
real organisation. The recipient is thereby tricked into providing the information, which
is then sold and/or used in committing identity theft. Although typically used to gain
financial information, phishing may be used to gain access to any account information
which may be useful to the offender. There are several ways in which phishing e-mails
may capture personal information. The least sophisticated is simply to ask the recipient to
respond via e-mail or fax. For example, an e-mail may contain a document that appears
to be from the tax department asking the person to provide their details and return
by fax within seven days, failing which the recipient will not gain certain tax benefits.
20
LEARNING UNIT 3:
There are different types of card fraud, ranging from counterfeit-card fraud to lost-or-
stolen card fraud. Lost-or-stolen card fraud is more an opportunistic fraud type and
can be controlled through precautionary measures being adopted by cardholders, whilst
counterfeit-card fraud involves several technological fraud types such as skimming.
• Skimming
Skimming is a process whereby the genuine data on a card’s magnetic strip is electroni-
cally copied onto another without the legitimate cardholder’s knowledge.
There are two main categories of card skimming. The first involves “handheld skim-
ming”, which is when a handheld skimmer (a card reader that can store information in
memory) is utilised by criminals to skim (record) the data on credit and debit cards, after
which counterfeit cards are produced to complete actual transactions with the informa-
tion on the card. This type of skimming normally occurs at retail outlets, particularly at
bars, restaurants and petrol stations, where a corrupt employee skims a customer’s card
before handing it back. Often, cardholders are unaware of the fraud until they receive
their bank statements or alerts via their cellphones or computers.
The second type of skimming is card skimming using an automated teller machine
(ATM).
• Child pornography
The internet is an ideal medium for the pornographic industry: it is audiovisual and al-
lows the whole world access to a site. It can be used to distribute pictures, soundtracks,
videos, and even full-length films. These are some of the main reasons why pornography
is one of the biggest industries on the internet – a person cannot surf the internet for
even half an hour without stumbling onto a pornographic site.
Part of this industry is dedicated to child pornography, bestiality, and violence against
women and children. You may wonder what is harmful about possessing a picture of a
naked child. The fact of the matter is that the material is not normally of an innocent
nature and children are being exploited and violated to fulfil the perverted needs of
paedophiles. There are some sites where subscribers can interact with a host in real
time. On these sites, you can instruct the host to perform various acts with women or
children, or rape them, mutilate them or kill them. Women and children are abducted
or bought on the black market for this purpose.
FOR3704/121
Another area of grave concern to many parents is that of chat rooms. Paedophiles often
frequent chat rooms intended for children and teenagers, pretending to be children
or teenagers themselves who are experiencing the same problems any typical child or
teenager can relate to. These paedophiles might spend a couple of months befriending
a child in this chat room before suggesting that they meet in person. The outcome of
such a meeting is fairly obvious. Every parent of a so-called runaway child should be
questioned to see if that child spent any time on the internet before their disappearance;
it may just be that the child didn’t run away, but was abducted following a meeting such
as described in the above scenario.
• Invasion of privacy
• Malicious e-mails
E-mail can be used to distribute false or damaging information about a person. Can
you imagine the shock of seeing the face of your wife, daughter or even yourself pasted
on a pornographic image? This is especially disturbing for well-known figures such as
sportspeople, politicians or other celebrities.
In the second form, a businessperson might be contacted via e-mail and made a very
lucrative business offer. During the negotiations, they are invited to South Africa for
some other reason. On arriving at the airport, they are met so that they can be “trans-
ported to their hotel”. They never arrive at their hotel, but are instead kidnapped and
held for ransom. Very often, even if the ransom is paid, the person (hostage) is still killed.
In conclusion, it should be noted that the formula to build a nuclear bomb, as well as
various other deadly chemical weapons, can be found on the internet. When a youngster
is arrested for threatening to detonate a bomb, their parents might be disbelieving and
remark, for example: “How did my son or daughter know how to build a bomb? They
never mixed with that crowd. They kept to themselves and spent most of their time
surfing the internet.” Well, that’s the answer! Although this problem might not be preva-
lent in South Africa at present, there is a possibility that it could increase in the future.
22
LEARNING UNIT 3:
Here are some ideas about just one of the crimes mentioned in the above activity, namely
robbery. In the case of a bank robbery, for example, the robbers could have used software
to reconstruct the layout of the bank. They could have stored, on their computer, time-
tables indicating the changing of guards, the times of cash deliveries and pickups, and
a list of employees. They could also have saved their plans and action steps for robbing
the bank on their computer, or they could have e-mailed each other about the robbery.
3.5.1 Feedback
Section 87 of the ECT Act deals with computer-related extortion, fraud and forgery.
Read sec 87(1)-(2) of this Act.
3.6.1 Feedback
Concerning question 1 of the activity, the suspect will be guilty of hacking into the
system and stealing the formulae (section 86(1)). Further investigation would probably
also reveal that the suspect will be guilty in terms of section 86(3) or (4), that is, of
creating or using programs to gain access to the system.
In answering question 2 above, you most probably made a long list of aspects, and we
will be considering them all as we continue. Therefore, as you work through the fol-
lowing sections, think about how you can revise your answer to question 2 to make it
more complete.
A detailed discussion on digital evidence about the ECT Act can be found on page 378
in your prescribed textbook. You must pay attention to section 15(3) of the Act, which
sets out the guidelines for a South African court when assessing the evidential
weight of digital evidence.
FOR3704/123
3.7 CONCLUSION
Computer crime is a fast-growing area of crime. More and more criminals are exploit-
ing the speed, convenience and anonymity of the internet to commit a diverse range
of criminal activities that know no borders. This learning unit has introduced you to
various legislative principles that help combat such crimes or prosecute the perpetra-
tors. Furthermore, various computer-related crimes and the investigation thereof have
been covered. A detailed discussion on digital forensics and cybercrime is to be found
in your prescribed textbook on pages 361 to 396.
3.8 SELF-ASSESSMENT
• When did the Electronic Communications and Transactions Act (the ECT Act) 25
of 2002 come into effect?
• How can you keep records in an electronic format?
• How can a computer be useful in the investigation of a murder case?
• Why is using expert services to collect computer-related evidence at the scene of
the incident significant?
24
4 LEARNING UNIT 4
4 Organised crime
4.2 INTRODUCTION
A single definition of organised crime has resulted in controversy among different
persons and countries. This can be attributed to the fact that different persons and
countries approach certain aspects of organised crime by using different methodologies.
However, the essential characteristics of the term “organised crime” are that it denotes
a process or method of committing crimes, not a distinct type of crime itself, nor even
a distinct type of criminal. Organised crime, therefore, involves the cooperation of
several persons and groups in which the main objective is premised on professional or
syndicated crime. Organised crime is committed by a coalition of crime groups bound
together by political and economic necessity.
The draft United Nations Framework Convention against Organized Crime of 1975 and
subsequent protocols, for example, resolution 53/111 of 9 December 1998, resolution
54/126 of 17 December 1999 and resolution 54/129 of 17 December 1999, stated that,
for the conventions, “organised crime” meant group activities involving three or more
persons, with hierarchical links or personal relationships which enabled their leaders to
earn profits or to control territories or markets, internal or foreign, through violence,
intimidation or corruption, both in furthering criminal activity and in infiltrating le-
gitimate economy, in particular through;
FOR3704/125
The draft conventions also stated that the term “organised crime” covered commissions
of an act by a member of a group as part of the criminal activity of such an organisation.
We have now established that organised crime is not only committed within a country’s
borders but is also an international phenomenon that reaches across borders and has
become a global problem. The emergence of organised crime in South Africa and the
rate at which it was increasing required the revision of legislation or the introduction of
new legislation to combat the sharp increase in organised crime. Furthermore, South
Africa’s common law and legislation had failed to keep pace with international measures
aimed at addressing organised crime. Also, the conventional criminal-law measures and
penalties were inadequate to combat and deter organised crime. This reality resulted in
the promulgation of the Prevention of Organised Crime Act (121 of 1988).
26
LEARNING UNIT 4: Organised crime
The Prevention of Organised Crime Act (hereafter “Organised Crime Act”) introduces
laws that operate against organised crime and gang activities, with a special focus on
money laundering and racketeering or illegal business activities. In the fight against
organised crime, the Organised Crime Act also introduces some changes to pre-existing
laws, such as the Drugs and Drug Trafficking Act and the Proceeds of Crime Act. The
Organised Crime Act also assists law enforcement in apprehending not only the criminal
“foot soldier”, but also the leaders of racketeering syndicates, and in cutting off their
income by confiscating or forfeiting their assets in terms of the money-laundering of-
fences created by such Act, particularly in terms of Chapters 5 and 6 of the Act.
Chapters 5 and 6 of the Organised Crime Act provide for a civil remedy ensuring the
preservation, seizure and forfeiture of property which is derived from unlawful activi-
ties or is connected to the commission, or suspected commission, of an offence. The
Act enables the National Director of Public Prosecutions to take property when, on a
balance of probabilities, it appears that the property is either the proceeds of unlawful
activities or was the instrumentality of an offence. The task of seizing and bringing
about the forfeiture of property is the work of the Asset Forfeiture Unit.
FOR3704/127
The AFU sees its role as reclaiming what has been wrongfully obtained by criminals. It
recovers losses suffered by victims of crime and takes the profit out of crime. If there is
a direct victim of a crime, money from the asset forfeiture goes to the victim. If there
is no victim of the crime, the money goes into the Criminal Asset Recovery Account.
You will now be introduced to the crimes of racketeering and money laundering, crimes
which the Organised Crime Act was designed to address.
Common law crimes such as fraud, extortion, bribery and corruption may also constitute
racketeering activities. The term “racketeering” is not defined in the Organised Crime
Act, but a pattern of racketeering activities can result in a criminal act. This confusion
has resulted in various explanations of the concept. For example, De Koker argues that
racketeering was originally an American term for the organised blackmailing by busi-
nesses through intimidation and violence, which has since been used globally as a term
linked to organised crime which is perpetrated by organised crime groups.
• National Director of Public Prosecutions v Mcasa and Another 2000 (1) SACR 263 (Tk)
• National Director of Public Prosecutions v Alexander and Others 2001 (2) SACR 1 (T)
• National Director of Public Prosecutions v RO Cook Properties (Pty) Ltd
Racketeering activities as dealt with in the Organised Crime Act focus on the enterprise
and objects rather than on the perpetrator.
It is therefore important that you are familiar with the characteristics of an enterprise.
The characteristics of an enterprise were set out in United States v Turkette 452 US 576
(1981) and are:
• differentiation of roles and tasks
• a system of command
• a commonly shared goal or purpose
28
LEARNING UNIT 4: Organised crime
Let us now look at the sections in the Organised Crime Act that address racketeering.
Chapter 2 of the Act includes provisions that make it a crime to engage in racketeering.
Any person who (a)(i) receives or retains any property derived, directly or indirectly,
from a pattern of racketeering activity; and (ii) knows or ought reasonably to have
known that such property is so derived; and (iii) uses or invests, directly or indirectly,
any part of such property in the acquisition of any interest in, or the establishment or
operation or activities of, any enterprise; within the Republic or elsewhere, shall be
guilty of an offence.
Any person who (b)(i) receives or retains any property, directly or indirectly, on behalf
of any enterprise; and (ii) knows or ought reasonably to have known that such property
derived or is derived from or through a pattern of racketeering activity; within the
Republic or elsewhere, shall be guilty of an offence.
The accused must have received or retained the property on behalf of an enterprise.
The property must have been received or retained within the Republic or elsewhere.
Any person who (c)(i) uses or invests any property, directly or indirectly, on behalf of
any enterprise or in the acquisition of any interest in, or the establishment or operation
or activities of any enterprise; and (ii) knows or ought reasonably to have known that
FOR3704/129
Any person who (d) acquires or maintains, directly or indirectly, any interest in or con-
trol of any enterprise through a pattern of racketeering activity; within the Republic or
elsewhere, shall be guilty of an offence.
Any person who (e) whilst managing or employed by or associated with any enterprise,
conducts or participates in the conduct, directly or indirectly, of such enterprise’s af-
fairs through a pattern of racketeering activity; within the Republic or elsewhere, shall
be guilty of an offence.
Any person who (e) manages the operation or activities of an enterprise and who knows
or ought reasonably to have known that any person, whilst employed by or associated
with that enterprise, conducts or participates in the conduct, directly or indirectly, of
such enterprise’s affairs through a pattern of racketeering activity; within the Republic
or elsewhere, shall be guilty of an offence.
30
LEARNING UNIT 4: Organised crime
The accused must have managed the operations or activities of the enterprise directly
or indirectly.
The accused must have known or ought reasonably to have known that any person,
whilst employed by or associated with the enterprise, was conducting or participating
in the conduct, directly or indirectly, of such enterprises affairs through a pattern of
racketeering activity.
Section 3 states that, on conviction, such a person will be liable to a fine not exceeding
R1 million, or to imprisonment for a period up to imprisonment for life.
Conspiracy, attempt or incitement are inchoate crimes. “Inchoate crimes” can be defined
as acts which are committed in anticipation of the commission of the principal crime.
The inchoate crime not covered in this subsection is incitement.
To understand the various subsections of section 2, it should be noted that the common
theme of such subsections is the enterprise and object rather than the perpetrator.
4.5.1 Feedback
The following points will help you understand the characteristics specific to organ-
ised crime: (They will also provide you with the necessary understanding to complete
activity 1.)
• corruption
• violence
• sophistication
• structure
• discipline
• multiple enterprises
• involvement in legitimate enterprises
FOR3704/131
4.6.1 Feedback
The sections that follow will provide some guidelines that will help you to check your
answers for this activity.
Secondly, the existence of a legitimate legal entity can be proved by the company charter.
Thirdly, the elements of each offence need to be proved through the evidence produced.
Finally, determine who we are targeting. Remember that we are prosecuting the accused
for the collective activities of the enterprise.
After an investigation, you must understand and consider what the requirements are
if you intend to charge an accused person for racketeering. The following points are
guidelines for consideration:
• The accused
• The enterprise:
separate from the accused
the vehicle which the syndicate used to commit the crimes
• The offences
pattern of racketeering activities
p
redicate offences (A predicate offence is a crime that is a component of a
more serious criminal offence. For example, generating unlawful funds is the
main offence and money laundering is the predicate offence. Generally, the
term “predicate offence” is used in reference to underlying money laundering
and/or the financing of terrorist activity.)
32
LEARNING UNIT 4: Organised crime
4.7 CONCLUSION
“Racketeering” refers to carrying on a business, or business activities, in an illegal
manner or by using illegal means. Sometimes, the entire business itself is illegal, such
as drug trafficking, child pornography, or human trafficking. In other cases, however,
the business itself may be legal, but the tactics or practices used in the business are
illegal, such as extortion or money laundering. Several crimes may be part of an illegal
enterprise, such as theft, embezzlement, bribery, counterfeiting, and kidnapping.
When many people hear the term “racketeering”, they frequently think of the Mafia. The
Mafia has certainly been involved in some of the more infamous cases of racketeering
in many countries, but it is hardly the only group that has been guilty of the crime.
The organisation was famous for its protection schemes during the mid-20th century.
Protection racketeering involved forcing businesses to pay money to the organisation
for “protection”, which amounts to extortion according to the criminal law of most
countries. Interestingly, in most cases, the victims of a protection scheme were paying
money to the organisation to protect the business from being harmed by the same
organisation.
4.8 SELF-ASSESSMENT
• Why would a single definition of organised crime be controversial among different
persons and countries?
• How can the enactment of the Prevention of Organised Crime Act 121 of 1998 assist
in curbing organised crime in South Africa?
• When can the National Director of Public Prosecutions seize someone’s property?
• Who is responsible to reclaim the assets wrongfully obtained?
• What is the function of the Asset Forfeiture Unit?
FOR3704/133
5 LEARNING UNIT 5
5 Money laundering
5.2 INTRODUCTION
According to the 2009 Annual Report of the United Nations Office on Drugs and Crime
(UNODC), money laundering can be defined as the method through which criminals
disguise the illegal origins of their wealth and protect their asset bases to avoid suspicion
on the part of law enforcement and prevent leaving a trail of incriminating evidence.
It concludes that money laundering empowers corruption and organised crime. The
term “money laundering” in South African criminal law currently refers to several dif-
ferent offences that can be committed in terms of the Prevention of Organised Crime
Act 121 of 1998 (“Organised Crime Act”). Money laundering has been described or
defined in different ways. For this learning unit, the definition of money laundering
will be documented as stated in section 1 of the Financial Intelligence Centre Act 38
of 2001 (FICA), which defines money laundering as follows:
34
LEARNING UNIT 5: Money laundering
FOR3704/135
• Firstly, sections 4, 5 and 6 of the Organised Crime Act create the offences of money
laundering.
• Secondly, the Financial Intelligence Centre Act (FICA) creates controls over
institutions that can facilitate money-laundering transactions. (The FICA embodies
both means of prevention (aimed at preventing the offence) and reactive means (in
the form of criminal sanctions).
Let us now explore the offences of money laundering in sections 4, 5 and 6 of the
Organised Crime Act.
• Section 4
Section 4 of the Organised Crime Act is dedicated to money laundering. The section
describes the offence of money laundering as follows:
(a) enters into any agreement or engages in any arrangement or transaction with
anyone in connection with that property, whether such agreement, arrangement
or transaction is legally enforceable or not; or
(i) performs any other act in connection with such property, whether it is per-
formed independently or in concert with any other person, which has or is
likely to have the effect –
(ii) of concealing or disguising the nature, source, location, disposition or move-
ment of the said property or the ownership thereof or any interest which
anyone may have in respect thereof; or
(iii) of enabling or assisting any person who has committed or commits an offence,
whether in the Republic or elsewhere –
(bb) to remove or diminish any property acquired directly, or indirectly, as a result of
the commission of an offence, shall be guilty of an offence.
36
LEARNING UNIT 5: Money laundering
• The act from which the proceeds were derived or received must have been unlawful.
• Such unlawful act must have constituted a predicate offence that gave rise to the
proceeds derived, received or retained in connection therewith.
• Such activity must have happened in the Republic or elsewhere.
• Receipt or retention of property must have taken place.
• Property must have been derived directly or indirectly from a pattern of racketeering
activity.
• The accused must have known or should reasonably have known that the property
was derived from the crime.
• The accused must have used or invested such property.
• Section 5
Section 5 of the Organised Crime Act deals with concealing or disguising criminal
property and reads as follows:
(a) the retention or the control by or on behalf of the said another person of the
proceeds of unlawful activities is facilitated; or
(b) the said proceeds of unlawful activities are used to make funds available to the
said other person or to acquire property on his or her behalf or to benefit him or
her in any other way, shall be guilty of an offence.
This element is replaced in section 5 of the Organised Crime Act with the following:
Such proceeds must be used to make funds available to the said other person or to
acquire property on his or her behalf or to benefit him or her in any other way.
You must understand that section 5 of the Organised Crime Act creates the offence of
assisting another person to benefit from the proceeds of unlawful activities. Section 5
does not seek to punish the person who obtained the proceeds of unlawful activities
but looks at the conduct of persons other than the initial perpetrator.
• Section 6
Section 6 deals with the acquisition, possession or use of the proceeds of unlawful
activities. This section states the following:
FOR3704/137
property and who knows or ought reasonably to have known that it is or forms part
of the proceeds of unlawful activities of another person shall be guilty of an offence.
The analysis of this section indicates that it is conduct that constitutes the crime or
which contravenes any law. The activities targeted by section 6 are the acquisition, use or
possession of the proceeds of unlawful activity. The offence under section 6 is committed
in respect of the proceeds of the activities of another person. The accused must acquire,
use or have possession of the proceeds of the criminal activities of another person.
(1) placement
(2) layering
(3) integration
5.4.3.1 Placement
This is the movement of cash from its unlawful source and its placement in traditional
financial institutions, casinos, shops, bureaux de change, and other businesses, both
nationally and internationally.
The process of placement can be carried out in many ways, including the following:
(1) Currency smuggling: This is the illegal physical movement of currency and
monetary instruments out of a country.
(2) Bank complicity: This occurs when a financial institution, such as a bank, is
owned or controlled by unscrupulous individuals suspected of conniving with
drug dealers and other organised crime groups.
(3) Currency exchanges: In some transitional economies, the liberalisation of foreign-
exchange markets provides room for currency movements. As a result, laundering
schemes can benefit from such a policy.
5.4.3.2 Layering
Layering is the process of separating the proceeds of criminal activity from their origin
through the use of many different techniques to layer the funds. These techniques include
5.4.3.3 Integration
This is the movement of previously laundered money into the economy mainly through
the banking system. In this way, such monies appear to be normal business earnings.
Some of the methods of integration include the following:
(1) Property deals: The sale of property to integrate laundered money back into the
economy is a common practice among criminals. For instance, many criminal
38
LEARNING UNIT 5: Money laundering
groups use shell companies to buy property; hence the proceeds from the sale
would be considered legitimate.
(2) Front companies and false loans: Front companies that are incorporated in
countries with corporate-secrecy laws enable criminals to lend themselves their
own laundered proceeds by way of legitimate transaction.
(3) Foreign-bank complicity: Money laundering using known foreign banks
entails a higher order of sophistication and presents a very difficult target for law
enforcement. The willing assistance of the foreign banks is frequently protected
against scrutiny by law enforcement, especially as a result of banking laws and
regulations of other sovereign countries.
(4) False import/export invoices: The use of false invoices by import/export com-
panies has proven to be a very effective way of integrating illicit proceeds back
into the economy. This involves the overvaluation of entry documents to justify
the funds later deposited in domestic banks and/or the value of funds received
from exports.
Examples of businesses that are ideal for laundering cash may include
• banks
• casinos and bookmakers
• nightclubs
• car dealerships
• retail outlets
• businesses dealing in high-value commodities and luxury goods
FOR3704/139
The FICA was later amended by the Protection of Constitutional Democracy against
Terrorist and Related Activities Act 33 of 2004 and the Financial Intelligence Centre
Amendment Act 11 of 2008. The aims of the FICA can be summarised as follows:
Section 29 of the FICA imposes a duty to disclose suspicious and unusual transactions.
Information regarding these transactions is forwarded to the Financial Intelligence
Centre (FIC). The FIC falls under the National Treasury, which receives all reports
filed by businesses and employees of businesses in terms of the FICA. The reports are
then analysed and disseminated to the relevant authorities.
40
LEARNING UNIT 5: Money laundering
(1) process, analyse and interpret information disclosed to it, and obtained by it, in
terms of the FICA
(2) inform, advise and cooperate with investigating authorities, supervisory bodies,
the South African Revenue Service and the intelligence services
(3) monitor and give guidance to accountable institutions, supervisory bodies and
other persons regarding the performance and compliance by them with their duties
and obligations in terms of the FICA or any directive made in terms of the FICA
(4) retain the information referred to above in the first bulleted point in the manner
and for the period required by the FICA
(5) annually review the implementation of the FICA and submit a report thereon to
the Minister
(6) implement a registration system in respect of all accountable institutions and
reporting institutions
(7) supervise and enforce compliance with the FICA or any directive made in terms
of FICA by accountable institutions, reporting institutions and other persons to
whom the provisions of the FICA apply, that
a
re not regulated or supervised by a supervisory body in terms of the FICA or
any other law
are regulated or supervised by a supervisory body in terms of the FICA or
any other law, if that supervisory body fails to enforce compliance despite any
recommendation of the FIC made in terms of section 44(b)
The FICA also gives rise to a duty on the part of all businesses, and every employee
of a business, to report a transaction with the business if it is known to involve, or is
suspected of involving, the proceeds of a crime or tax evasion or if it does not have an
apparent lawful or business purpose, that is, to report so-called “suspicious and unusual
transactions”. The FICA creates additional duties for two specific groups of institutions,
called “accountable institutions” and “reporting institutions”. Institutions which are
classified as accountable institutions are listed in Schedule 1 of the FICA.
This schedule lists, among others, attorneys, banks, brokers, insurers, estate agents and
trustees. Reporting institutions are listed in Schedule 3 of the FICA.
FOR3704/141
5.5.1 Feedback
The Financial Intelligence Centre Act 38 of 2001 (also known as FICA), read in conjunc-
tion with the Prevention of Organised Crime Act 121 of 1998 (abbreviated as POCA),
are the major developments in support of the Constitution for purposes of prevent-
ing, combating and investigating crime in South Africa. In terms of FICA, financial
institutions, particularly the banks, are compelled to prevent the means criminals use
to launder the benefits of their criminal activities and to control and report suspicious
transactions of money laundering.
5.6 CONCLUSION
South Africa has a comprehensive framework for controlling money laundering. There
is evidence that the Prevention of Organised Crime Act has already had a noticeable
impact on laundering methods in practice, for example in cases such as S v Dustigar (Case
no. CC6/2000; Durban and Coast Local Division) and S v Caswell (Case no. 27/87/98;
Regional Court, Cape Town). There are also positive indications that the South African
money-laundering control system will have an impact on current trends. Important
steps have already been taken by the South African government to ensure that the FIC
can operate effectively, and both government and the financial sector have committed
themselves to combating money laundering.
5.7 SELF-ASSESSMENT
• What is money laundering?
• How many stages does money laundering entail?
• Which legislation was created to prevent and combat organised crime such as money
laundering?
• What are the objectives of the Financial Intelligence Centre?
This concludes the study of the basic principles of investigation of selected crimes and
transgressions. We trust that you have enjoyed this module and wish you the luck with
the rest of your studies
Dr L Motsepe
42