FOR3701
ASSIGNMENT 2 SEMESTER 1 2025
UNIQUE NO.
DUE DATE: 24 APRIL 2025
,FOR3701 – Assignment 2 (Semester 1, 2025)
Module Title: Forensic Methods and Techniques: Module A
Unique Number: [Insert Unique Number]
Due Date: 24 April 2025
Question 1
1.1 Locard's Exchange Principle and Application (4 marks)
Locard’s Exchange Principle explains that whenever two objects or people come into
contact, they will exchange materials. This means that a suspect will leave something
behind at the scene and take something from it as well. It is a key idea in forensic
investigations.
In this case, the BMW X1 and Audi A4 should be carefully examined for any transferred
materials. Investigators might find fibres, hair, or fingerprints left by suspects inside the
vehicles. At the same time, the suspects may carry away items like fibres from the car
seats or small particles from the vehicle.
1.2 Types of Evidence Transferred (4 marks)
Examples of trace evidence that could be exchanged between the suspects and the
vehicles include:
Fingerprints on doors, steering wheels, or dashboards.
DNA evidence, such as hair, sweat, blood, or skin cells.
Clothing fibres left behind on seats or floors.
Gunshot residue (GSR) if weapons were fired, which might be found on the
suspects or inside the car.
, 1.3 Applying the Lochner Principle to Cell Phones (10)
The Lochner Principle suggests that electronic devices, like cell phones, store vast
amounts of user activity data that can be examined to reconstruct past events. In this
case, the recovered cell phones can be examined for:
Call and message history: If the suspect communicated with the gang before
the heist, this would contradict his claim of being coerced.
Location data/GPS: Cell tower pings and GPS records can show whether he
met with the suspects prior to the crime.
Social media or messaging apps: Planning or coordinating messages, possibly
on WhatsApp or Telegram, may be retrieved.
Photos, videos or voice notes: Any media shared or saved that pertains to the
crime.
Search history and browsing activity: This can indicate premeditation or
research related to the robbery.
By analysing this digital evidence, investigators can determine whether the suspect had
prior knowledge or was complicit in planning the crime.
In-text reference: (Marais & Van Rooyen, 2022)
Question 2
2.1 Static vs Mobile Surveillance (4)
Static surveillance involves monitoring a fixed location over time to observe activities
or individuals. Investigators remain in a single place, often hidden, and watch for
patterns.
ASSIGNMENT 2 SEMESTER 1 2025
UNIQUE NO.
DUE DATE: 24 APRIL 2025
,FOR3701 – Assignment 2 (Semester 1, 2025)
Module Title: Forensic Methods and Techniques: Module A
Unique Number: [Insert Unique Number]
Due Date: 24 April 2025
Question 1
1.1 Locard's Exchange Principle and Application (4 marks)
Locard’s Exchange Principle explains that whenever two objects or people come into
contact, they will exchange materials. This means that a suspect will leave something
behind at the scene and take something from it as well. It is a key idea in forensic
investigations.
In this case, the BMW X1 and Audi A4 should be carefully examined for any transferred
materials. Investigators might find fibres, hair, or fingerprints left by suspects inside the
vehicles. At the same time, the suspects may carry away items like fibres from the car
seats or small particles from the vehicle.
1.2 Types of Evidence Transferred (4 marks)
Examples of trace evidence that could be exchanged between the suspects and the
vehicles include:
Fingerprints on doors, steering wheels, or dashboards.
DNA evidence, such as hair, sweat, blood, or skin cells.
Clothing fibres left behind on seats or floors.
Gunshot residue (GSR) if weapons were fired, which might be found on the
suspects or inside the car.
, 1.3 Applying the Lochner Principle to Cell Phones (10)
The Lochner Principle suggests that electronic devices, like cell phones, store vast
amounts of user activity data that can be examined to reconstruct past events. In this
case, the recovered cell phones can be examined for:
Call and message history: If the suspect communicated with the gang before
the heist, this would contradict his claim of being coerced.
Location data/GPS: Cell tower pings and GPS records can show whether he
met with the suspects prior to the crime.
Social media or messaging apps: Planning or coordinating messages, possibly
on WhatsApp or Telegram, may be retrieved.
Photos, videos or voice notes: Any media shared or saved that pertains to the
crime.
Search history and browsing activity: This can indicate premeditation or
research related to the robbery.
By analysing this digital evidence, investigators can determine whether the suspect had
prior knowledge or was complicit in planning the crime.
In-text reference: (Marais & Van Rooyen, 2022)
Question 2
2.1 Static vs Mobile Surveillance (4)
Static surveillance involves monitoring a fixed location over time to observe activities
or individuals. Investigators remain in a single place, often hidden, and watch for
patterns.