ASSIGNMENT 6 2025
UNIQUE NO. 546965
DUE DATE: 16 MAY 2025
, Forum Assignment Response: Assessment 6 - 546965
After carefully reviewing both articles, it becomes evident that the South African Social
Security Agency (SASSA) has faced deep-rooted challenges over the years. These
challenges involve not only financial mismanagement and corruption but also serious
flaws in its technological infrastructure—especially in relation to how social grants like
the Social Relief of Distress (SRD) grant are managed and distributed.
1. What are the main issues raised in the articles regarding SASSA and the SRD
grant?
The core issues highlighted in the articles revolve around widespread corruption and
systemic weaknesses that have undermined the efficiency and integrity of the social
grant system.
The first article delves into a long-standing scandal involving the unlawful awarding of a
R10-billion contract to Cash Paymaster Services (CPS). This tender was later declared
invalid by the Constitutional Court. Despite the court ruling, accountability has been
slow, and the article stresses how parliamentary oversight remained mostly inactive for
years. It was only in January 2025 that the Portfolio Committee on Social Development
began actively calling for a comprehensive investigation into SASSA’s operations,
following mounting pressure from civil society organizations such as Corruption Watch.
The second article, authored by two first-year students from Stellenbosch University,
sheds light on critical technological vulnerabilities in SASSA’s SRD grant system. The
students discovered that the platform is susceptible to fraud and exploitation. For
instance, they found that automated bots were being used to submit thousands of fake
applications—many of them under the names of individuals who had just turned 18. In
several cases, fraudulent applicants received payments under stolen or fabricated ID
numbers, while genuine applicants were excluded due to system errors or a lack of
verification safeguards. This highlights not only poor cybersecurity infrastructure but
also a failure in basic data validation.