0% found this document useful (0 votes)
30 views14 pages

11898380cri3701 Exam

The document is an examination script for a student named Thembelihle Nkosi, covering topics related to crime information management, data integrity, and law enforcement strategies. It includes a declaration of authenticity, structured responses to exam questions, and discussions on the importance of accurate, adequate, relevant, and timely information in policing. Additionally, it addresses the use of predictive mapping and analytical tools in crime prevention and resource allocation for law enforcement agencies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views14 pages

11898380cri3701 Exam

The document is an examination script for a student named Thembelihle Nkosi, covering topics related to crime information management, data integrity, and law enforcement strategies. It includes a declaration of authenticity, structured responses to exam questions, and discussions on the importance of accurate, adequate, relevant, and timely information in policing. Additionally, it addresses the use of predictive mapping and analytical tools in crime prevention and resource allocation for law enforcement agencies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

NAME& SURNAME: THEMBELIHLE NKOSI

STUDENT NUMBER: 11898380

MODULE CODE: CRI3701

MAY/JUNE EXAMINATION

2024

1
Table of Content

Content Page

Declaration ……………………………………………… 3

Question 1 ……………………………………………… 4-7

Question 2 ……………………………………………… 7-10

Question 3 ……………………………………………… 11-12

Question 4 ……………………………………………… 12-14

2
DECLARATION OF AUTHENTICITY

I, __________THEMBELIHLE NKOSI (full name/s and surname),

Student number: 11898380_________________

Identity number: 9804260757089________________________

declare that I am the author of this examination for CRI3701.

I further declare that

• the entire work is my own, original work

• I did not copy somebody else’s work

• I did not copy or adapt someone else’s work to give the impression that it is my

work

I am fully aware that

• if I do not hand in this declaration, the assessment script will not be awarded any

marks for CRI3701.

• if it is found not to be my work, this will be reported to the Dean of Students at

Unisa and

disciplinary steps will be taken against me.

Your signature: _____T. NKOSI________ Date: __15_/05/2024_____ Place:

________VILLA LIZA_____

3
Question 1

Introduction

 Data and information management using several crime information systems to


deter crime. Information gathering (raw data collecting) on a variety of actions is
necessary for policing responsibilities. This data is obtained in diverse methods
and originates from multiple sources. As a result, data gathered for one police
function could need to be connected to data gathered for another, for various
reasons. For the law enforcement agencies to manage police information as a
corporate resource, uniform procedures must be in place at all policing levels. The
South African Police Service's (SAPS) Crime Information Management Centre is
responsible for carrying out this task in South Africa. Additional police enforcement
organizations, separate units of the South African Defence Force’s (SANDF)
military police and (metro) police carry out such Metropolitan this task

Interpretation of information
 The police will use the data from the crime analyst's methodical analysis of crimes
to spot patterns and trends in order to organize and carry out their activities. As
and when suspects are connected to the commission of a crime, this information
will help the detectives identify and apprehend them through the analysis of their
methods and the comparison of evidence gathered from the crime scene, such as
the comparison of the DNA from a blood sample found there with that of the
accused.
Analysis of information
 The methodical examination of disorder and crime issues in order to support law
enforcement in both detecting and preventing crime is known as crime information
analysis. In order to support operational and administrative staff in organizing the
allocation of resources for the prevention and suppression of criminal activity as
well as the investigative process, it is intended to deliver relevant and timely
information regarding crime patterns and trend correlations. Operational planning

4
and criminal investigations both make use of the gathered data. For instance,
based on the quality of the evidence at hand, the person may be detained if the
fingerprints removed from the crime scene match those of the possible suspect, or
the information acquired may be transformed into usable/actionable intelligence to
plan and execute police operations.

The Crime Analysis Unit additionally looks for and analyzes trends, series, and patterns
in crime. These kinds of analysis give the police the knowledge they need to identify
criminals, prevent crime, and make wise deployment decisions. To help police officers in
their patrol job, the Crime Analysis Unit collaborates with other role players to develop
tactical, strategic, and intelligence-related goods. These products provide officers with
information on developing trends, patterns, and crime series. With association charts, link
analysis, and other tools, it also facilitates the investigative role intelligence-related
products.

Using crime information management systems the management of crime and criminal
activity through the use of the crime information management system, which gathers
crime information for policing purposes like CAS. Considering that, the police information
system defines the procedure for handling police data management system (ISMS).
Which is a high-level document that sets out the principles applicable to information
management within the police, indicating the following:

 The person responsible for the information that is held by the police
 The purpose of collecting and holding information, for example collecting crime
information for statistical reasons.
 The controls to ensure the integrity and security of the police information held by
other departments. To ensure for example that the value of the information is not
compromised by divulging it to criminal elements.
 the available training on the management of police information
 arrangements for receiving records and monitoring record keeping
 how the police comply with national and local security policy and standards

Surveillance methods and systems

5
In the event that the authorities must gather evidence of crimes over time to verify
that there is, in fact, criminal activity occurring. They could engage in surveillance,
which is the methodical gathering of data via surreptitious observation. After that,
the data will be analyzed and evaluated so that it may be used to create the
strategy or plan that must be developed to address the illegal conduct. This will
make it possible for the police to swiftly detect new issues, including home
invasions, and to act swiftly by implementing the proper policing technique.
Crime information management
Sorting data from irrelevant material and preserving, protecting, and authenticating
information are the steps involved in managing crime information. The following
actions must be taken by the police to make sure they maintain the data they have
about home invasions based on their surveillance:
Sorting data and unrelated material: They must classify the information they have
gathered so that data is separated from unrelated material before a case is looked
into. This is done in order to concentrate on the actual problems at hand. The
Crime Information Management Centre and SAPS Crime Intelligence, which are
in charge of this function, perform sifting procedures prior to before a case is
analysed.
Information protection: To prevent information from being compromised, it is
crucial to make sure that the authority structure in place is appropriate for
accessing the obtained data. Making ensuring that no unauthorized person can
access or view the data kept on the computer by using security measures including
labelling files with lists of authorized users, requiring a password in order to access
the data, limiting who is able to alter the computer system, etc.
Information safeguarding: Since revealing sensitive information can seriously harm
a company, law enforcement must establish and uphold a program that will
successfully safeguard sensitive information by:
 Classification and storage: When sensitive data is generated, the operator needs
to designate a classification for the data, specifying whether it is secret, for private,
internal, or public use.

6
Documents that are sensitive must always be kept under lock and key, and they
should never be left alone. Operators need to employ robust encryption on network
drives and in databases when storing sensitive data digitally. When kept in
unsecure areas like hotel rooms, sensitive files must also be encrypted.
Transportation, distribution and destruction - Once a document is removed from
storage, it must be kept in the physical possession of an authorised employee.
When transporting sensitive documents the police will have to ensure that they are
protected from view by unauthorised personnel and documents that are
transported off-site should be sealed in an envelope. Encryption should be an
absolute requirement when transporting sensitive documentation

Conclusion

 In conclusion, it is evident that it is extremely dangerous to base policing judgments


or operations on faulty information; unreliable information is essentially anything,
which has not been thoroughly questioned, and quality regulated. Information is
essential to many operations, whether they are carried out in a law enforcement
setting or as part of the services provided by a public sector organization. Of
services all the way to the final citizen. 202Before beginning an operation, law
enforcement organizations must make a crucial distinction between data and
information. Operators must also make sure that data is protected in accordance
with national laws and policies, without infringing on the constitutionally guaranteed
rights of suspected or accused offenders.

Question 2

2.1 Introduction

 The most significant asset that law enforcement organizations must safeguard is
information integrity. It is what corrupt police officers use to betray their colleagues
and their profession, and it is what most criminals desire to gain. In addition to

7
combating corruption, police officers must make sure that any material used for
crime prevention activities or goals satisfies the following requirements:
correctness, sufficiency, and relevance. Dependability and timely recording. The
purpose of this study unit is to clarify these ideas and emphasize how crucial
information integrity is to law enforcement.

2.2 Accuracy

 Error-ridden police data and information could undermine efforts to combat crime
and increase the number of victims who become repeat offenders. Because police
operations and tactics will be based on inaccurate information, they will not be able
to address the current state of crime. For instance, the information provides the
wrong time and location where most robberies occur. Common mistakes made by
police, which are typically reflected in crime statistics, include typos in street
numbers and victim or victim names. Erroneous documentation of the criminal act
may also result in the creation of deceptive tactics. This may make it more
challenging for the police to apprehend robberies in their community.

Victim reporting also affects data and information accuracy. If victims wait to report the
crime, they could forget important details like the kind of property taken and the accurate
description of the perpetrator. Supervisors and commanders must thus carry out some
sort of verification procedure to guarantee that the data and information recorded in the
systems are true. For example, they must confirm that the business that has allegedly
been robbed is, in fact, located on the street that the complainant has identified.

2.3 Adequacy

Information and data When something is adequate, it means that you have all the
knowledge you need to make an educated choice about a certain crime incidence.
Because the developed plan is based on what the police know, the effectiveness of crime
prevention measures depends on the quality of the information obtained. The amount of
information available regarding the issue determines how best to respond in a particular
situation. For instance, the house robbery spade is a certain location and time of day

8
when they typically occur. In order to create a successful crime prevention program and
obtain sufficient information, the following actions are advised:

 Analyse the problem and consider a range of possible measures


 Identify people who will implement these measures
 Document the implementation process
 Monitor changes in the crime situation over a period of time
 Prior to starting a new program, assess the previous one's efficacy. For instance,
if frequent patrols in a specific region at a specific time are very successful in
addressing the difficult crimes there, there is no need to alter that approach—
rather; it only has to be sustained.

2.4 Relevancy

 Whatever information is required for policing purposes, in general, must be


relevant. In order to aid in the development of the necessary strategy, the material
gathered should be pertinent in helping to comprehend the intricacy of the crime
under investigation. The requirement to gather data pertinent to the crime under
investigation—for instance, break-ins is being made. Because nearly all digital
evidence is susceptible to challenge, computer forensic investigators must adhere
to a strict protocol. This means that any information pertaining to the suspect must
be pertinent, and law enforcement organizations must always abide by these
criteria.

2.5 Reliability

In addition to tips from law enforcement colleagues, criminal informants, anonymous


sources, or crime information systems, good citizens may also report suspicious
behaviour to the police. The more trustworthy the information source, the less of an
independent police investigation is required to confirm the accuracy of the tip or incident.
For instance, it may be less necessary to conduct a thorough investigation to identify the
vehicle used if the make and registration number of the vehicle used to transport stolen
items are well known and accurately recorded. To make sure the information is
trustworthy before acting, law enforcement officials should do the following:

9
 Corroborate as much of the informants’ information as possible
 Determine how, where, when and under what circumstances the informant
obtained the information.
 Analyse the use of the informants’ information in past criminal cases that led to
arrests, convictions, seizures, and so forth.
 Provide/reveal statements informants made
 Identify the informant if it is safe to do so.
 Ensure that the system was in good condition at the time it was used for a particular
purpose
 Ensure that the operator is conversant with the workings of the system

2.6 Timely Recorded

 As precisely and fully as you can in your own words, write down the data or
information you plan to employ. If you would like to quote straight from your source,
you must do so between quotation marks and exactly as it appears in the source.
For instance, the victim described how one of the criminals during the home
invasion yelled, "Empty the save and put everything in the back."

After a criminal case is reported, it must be handled right away. For this reason, police
officers are constantly ready to help in an emergency. This arrangement is crucial,
particularly in situations of rape where it is necessary to examine the victim very away to
prevent the destruction of evidence. The victim can more accurately describe the events
leading up to the incident without missing any crucial details when information is promptly
recorded. For instance, failing to notice that one of the robbers had a ripped balaclava on.

Conclusion

It is clear that making decisions or taking action based on information which is not reliable
is very risky and that information which has not been quality controlled is inherently
unreliable. Information is the lifeblood of a host of processes, whether these take place in
a commercial business environment or as a part of a public sector organisation’s delivery
of services through to the end-user citizen.
10
Question 3

In the event that a security breach results in a major negative impact, commanders may
also designate a moderate value as a possible impact. A significant negative
consequence is one that could result from the compromise of availability, confidentiality,
or integrity.

(a) The organisation to perform its primary functions in a significantly reduced capacity:

(b) Significant damage to organisational assets;

(c) Significant financial loss; or

(d) Significant harm to individuals, but not loss of life or life-threatening injuries.

If achieving the security goal might result in a serious or disastrous consequence, then a
high level (value) could be indicated as a possible impact. A severe or catastrophic
adverse effect is one in which the loss of availability, integrity, or confidentiality could
result in one of the following: (a) the organization's inability to carry out its core duties; (b)
significant harm to its assets; (c) significant financial loss; or (d) severe or catastrophic
harm to individuals that involves death or serious life-threatening injuries. According to
these requirements, commanders, operators, and supervisors must have a top secret
security clearance at the very least as prescribed by the MISS.

From a tactical and strategic standpoint, law enforcement can benefit greatly from the
capacity to anticipate the locations of future criminal incidents. Predictive mapping can
assist a police force in deployment efforts, allowing for more effective patrol allocation
and faster reaction times. This is from the standpoint of traditional policing. Effective
deployment tactics are critical to a functioning police force because, even with the growing
focus on proactive policing, responding to calls for assistance remains the fundamental
component of police operations.

The advent of more approachable analytical software, such as GIS, has made this easier.
A common acknowledgement is that GIS is a useful analytical tool for identifying and
analyzing crime issues as well as developing and evaluating crime prevention initiatives.

11
A more accurate scanning of high-crime regions can improve problem-oriented
enforcement activities from a proactive perspective by allowing for the examination of
both previous crime distributions and future concentration projections. Therefore, police
officers can direct intervention efforts to extremely specific geographic locations and use
predictive mapping to help identify criminal concerns. Not only may predictive mapping
help identify more promising areas for intervention emphasis, but it may also enhance the
execution of those initiatives.

One common objection leveled at efforts to prevent crime is that the intervention is
unsuccessful because crime is simply relocated, usually geographically. However,
effective crime prevention initiatives take into account the possibility of displacement and
design interventions accordingly. Predictive mapping, then, can assist law enforcement
in anticipating displacement hotspots and may result in the focus of the intervention in a
larger geographic area to lessen the likelihood of it happening. Predictive mapping can
also be used to increase an intervention's potential "halo" or "diffusion of benefits," which
means that it will help areas other than those that were specifically targeted. This spillover
effect can be strengthened by using predictive mapping to assist identify those desirable
targets.

Question 4

The National Crime Prevention Strategy is essentially a long-term initiative designed to


change the criminal justice system's ability to handle crime and to create circumstances
that will lessen possibilities and motivation for crime. Nonetheless, the National Crime
Prevention Strategy is built upon a continuous action plan that is being carried out by
several agencies.

The SAPS, SANDF, National Intelligence Coordination Committee, and the Departments
of Justice, Correctional Services, and Welfare are all involved in the current and ongoing
actions. Every one of these organizations has an active criminal justice program. The

12
previously listed priority crimes are the focus of the department's operations. Among the
initiatives that are currently in progress are:

 Tackling gun-related crimes by working across agencies to strengthen gun laws,


track smuggling routes and networks, collaborate with neighbouring states,
strengthen regulations on state-owned weapons, and limit the illegal importation
of firearms. Additionally, specific initiatives have been started to reduce the
possession of illegal firearms and increase deterrence in dealing with persons
charged with firearm related crimes.
 Targeted intelligence gathering relating to organized crime syndicates is being
applied to organized crime. Close departmental cooperation between institutions
focusing on various aspects of organized crime has been prioritized, as these
syndicates engage in a variety of criminal activities. Among the activities centred
on certain organized crime-related challenges is the introduction of a novel
strategy built on community cooperation. Additionally, strategies to address
gangsterism in some gang-ridden communities have been established.
 A variety of strategies are being used to combat white collar crime, such as laws
to prevent money laundering, more police-business collaboration, and corporate
initiatives to create private sector codes of conduct.
 The introduction of victim help centers, which provide interdisciplinary services to
victims of these crimes, and the creation of specialized police units to investigate
crimes against children are two ways that gender violence and crimes against
children are receiving special attention. Furthermore, specialized courts that
safeguard minor witnesses have been set up around the nation, with the
assistance of prosecutors who specialize in these matters in certain regions. There
are numerous official and non-official education and awareness campaigns to help
kids deal with abuse and to increase public knowledge of gender-based crimes.
 A task committee appointed by the President is addressing violence in KwaZulu
Natal that is related to intergroup conflict. This team is in charge of organizing all
intelligence collection activities and coming up with fixes in places where violence
is a major problem. The goal of sector policing-based operational methods is to
maximize the number of police officers stationed in affected areas. Furthermore,

13
an intelligence task team is providing assistance the Cabinet Committee on Taxi
Violence and special police units are addressing this issue.
 The creation of police anti-corruption squads at the national and provincial levels
is an attempt to combat corruption within the criminal justice system. Public
complaints will be accepted and handled by the soon-to-be-established
Independent Complaints Directorate. In the Department of Justice, corruption
investigations are in progress, and control mechanisms are being put in place to
stop police docket theft. These initiatives are being supplemented by intelligence
initiatives meant to reveal additional government corruption.

14

You might also like