• Cellphones are valuable commodities in correctional centres as they enable inmates to keep in touch with their family and to keep their criminal networks active on the outside. Read the article published from p22 in Servamus: December 2021 to see how they get them into their cells.

  • Some people will do anything to get money – even murder their own family – like former Const Ndlovu. Our article published from p27 in Servamus: December 2021 deals with the realities of insurance fraud – especially in tough economic times.

  • 1
  • 2
  • 3
  • 4

By Annalise Kempen

Whenever the term “forensics” is used, one is reminded about the Locard exchange principle of “every contact leaves a trace” which states that no perpetrator can leave a crime scene without leaving some trace. In the physical world, it would refer to physical evidence such as fingerprints, bullets or blood (https://www.eviscan.com/en/locards-exchange-principle/). The question is whether forensic experts will be able to apply the same principle to the digital world to find digital or electronic evidence.

Digital forensics, investigations and evidence
The term “digital forensics” has only been recognised in the 1990s, even though there is evidence that the first computer-related crime was reported in the late seventies. Irrespective of whether one prefers to use the term “computer forensics” or “digital forensics”, this branch of forensic science focuses on the recovery and investigation of material found in digital devices as it relates to cybercrime. The definition has further been expanded to include the investigation of any devices that have the capacity to store digital data (EC-Council, Nd).

As a matter of interest, the term “digital” is used to refer to information that is stored electronically, the reason is because the information is broken into digits - binary units of ones (1) and zeros (0) that are saved and retrieved using a set of instructions, referred to as code or software. Anything that is stored electronically, ranging from photographs to videos and documents, can be created and saved using this code. In its online document “A simplified guide to digital evidence”, the NFSTC (2013) explains that finding and exploiting evidence saved in this way is a growing area of forensics which constantly changes as technology evolves.

The American National Institute of Justice (2008) defines “digital evidence” as information and data of value to an investigator that is stored on, received or transmitted by an electronic device. This type of evidence can be acquired once electronic devices are seized and secured for analysis and can be latent or hidden, such as fingerprints or DNA; cross international borders; can be altered, damaged or destroyed with very little effort and can be time sensitive (NFSTC, 2013). According to Lochner and Zinn (2015), digital evidence consists of magnetic fields and electronic pulses that can be collected and analysed using special techniques and software. Dr Brian Carrier, who leads the digital forensics team at Basis Technology in the USA, explains that digital evidence is data that supports or refutes a hypothesis that was formulated during the investigation. This is a general notion of evidence and may include data that may not be court admissible because it was not properly or legally acquired (Carrier, 2006).

It is also important to distinguish between a digital investigation and digital forensic or computer investigations and experts. The latter refers to an expert who can testify about the forensic analysis process and information that could be retrieved from digital devices in a court of law. Lochner and Zinn (2015) argue that a computer or digital forensic expert combines the elements of law and computer science to collect and analyse data from computer systems, computer networks and storage devices in a way that is admissible as evidence in a court of law or during disciplinary proceedings.

Dr Brian Carrier describes a digital forensic investigation as a special case of a digital investigation where the procedures and techniques that are used will allow the results to be entered into a court of law. He uses the example of where an investigation may be started to answer a question about whether or not illegal digital images exist on a computer.

**************************

[This is only an extract of an article published in Servamus: October 2021. If you are interested in reading the rest of the article, send an e-mail to: This email address is being protected from spambots. You need JavaScript enabled to view it. to find out what you need to do. Other aspects that we address in the article is involving digital forensic investigators during investigation and steps of digital forensics.]

Servamus - December 2021

"On Monday 1 November 2021 I hugged every member of my immediate family, us all in tears, as I said goodbye to board a flight."
By Annalise Kempen
What guarantee do we have that when we enter a doctor's consulting room that the person wearing the stethoscope around their neck has really qualified as a medical practitioner?
Compiled by Annalise Kempen
In an ideal world, the community would pay serious attention to awareness campaigns to ensure that they mitigate their risk of falling victim to crime.
By Annalise Kempen
A topic that is seldom under discussion in higher education and academic circles is academic corruption and fraud.
By Kotie Geldenhuys

Pollex - December 2021

Read More - Minister of Police and NDPP v Mr Ranshaw Bagley, Case no: CA 18/2020, dated 11 May 2021, High Court Makhanda (Grahamstown) (ECG)
Picture the following scenario: Mr Ranshaw Bagley (hereinafter referred to as “Ranshaw”), who is a member of the South African Police Service (“the SAPS”) (rank unknown), is minding his own business on a Saturday morning at his house in MT Croix in Gqeberha (Port Elizabeth).
Read More - [Mr] DT v [Ms] BT 2021 (3) SACR 668 (FB)
Mr DT and Ms BT are husband and wife. Ms BT, however, absconded the marital home as the couple was involved in a hostile divorce at the time.
Relevant, applicable legal provisions Section 35 of the National Road Traffic Act 93 of 1996 (“the NRTA”), as amended by the National Road Traffic Amendment Act 64 of 2008, provides as stated infra. Note however that, in subsection (3) of section 35 the words that are highlighted, were inserted by means of the Amendment Act 64 of 2008, and that words in square brackets are inserted by Pollex:

Letters - December 2021

NAME: W/O L Zandberg STATION: Pretoria Central Magistrates’ Court
It is with a sad and heavy heart that we learnt of the sudden passing of our dear Sgt M Walter Nxumalo on 7 October 2021.
December Magazine Cover

Servamus' Mission

Servamus is a community-based safety and security magazine for both members of the community as well as safety and security practitioners with the aim of increasing knowledge and sharing information, dedicated to improving their expertise, professionalism and service delivery standards. It promotes sound crime management practices, freedom of speech, education, training, information sharing and a networking platform.