Of Anonymity and Attribution and the Challenges of Controlling Cybercrime in South Africa
Keywords:
Crime; digital innovations; SAPS; virtual spaceAbstract
The advent of the digital age has considerably changed the way we live because of the pervasiveness of human-technology interface. While the myriads of cyber technologies have enhanced the human world, they have also produced undesirable consequences, the major of which is cybercrime. In South Africa, cybercrime is fast becoming an endemic issue, affecting businesses, individuals, and the public sector. The usual narratives about cybercrime control have centred more on the legislative and institutional frameworks rather than the nature of the crime, which is largely intangible. This paper, relying on critical review technique, foregrounds anonymity and attribution as critical factors impeding the effectiveness of cybercrime prosecution. To circumnavigate these challenges, we advocate for improved investigative and cyberspace knowledge (such as the state-of-the-art digital forensics) for the South African Police Service and collaboration with private cybersecurity and computer technology companies. Although difficult given the rapid pace of technological development, these are necessary steps if there will be a rise in the effectiveness of cybercrime control in South Africa.
References
Bele, J. L. (2021). Cryptocurrencies as facilitators of cybercrime. In SHS Web of Conferences (Vol. 111, p. 1005). EDP Sciences.
Boebert, W. E. (2010). A survey of challenges in attribution. In Proceedings of a workshop on Deterring CyberAttacks (pp. 41-54).
Borwell, J., Jansen, J., & Stol, W. (2021). Comparing the victimization impact of cybercrime and traditional crime: Literature review and future research directions. Journal of Digital Social Research, 3(3), 85-110.
Botha, J., & Pieterse, J. (2020). Legal Protections for Vulnerable Internet Users: A Comparative Study of South Africa’s Cybercrimes Bill, Journal of African Law, 64(3), 415-433.
Broadhurst, R. (2010). A new global convention on cybercrime. Pakistan Journal of Criminology, 2(4), 1-10.
Burger, J. (2015). Assessing review mechanisms of SAPS performance. SA Crime Quarterly, 2015(53), 49-58.
Burman, P. (2021). The Impact of POPIA on South African Businesses. South African Journal of Information Technology, 12(2), 45-58.
Chuma, K. G., & Ngoepe, M. (2022). Security of electronic personal health information in a public hospital in South Africa. Information Security Journal: A Global Perspective, 31(2), 179-195.
Coetzee, J. (2004). The Electronic Communications and Transactions Act 25 of 2002: facilitating electronic commerce. Stellenbosch Law Review, 15(3), 501-521.
Dlamini, N., & Mkhize, M. (2021). Public Awareness of Data Protection Rights in South Africa. Journal of Public Administration, 56(2), 213-227.
Dlamini, S., & Mbambo, C. (2019). Understanding policing of cybe-rcrime in South Africa: The phenomena, challenges and effective responses. Cogent Social Sciences, 5(1), 1675404.
Du Toit, D. (2020). The Challenges of Implementing POPIA in South Africa. African Journal of Information Systems, 10(3), 120-135.
Eboibi, F. E. (2020). Concerns of cyber criminality in South Africa, Ghana, Ethiopia and Nigeria: rethinking cybercrime policy implementation and institutional accountability. Commonwealth Law Bulletin, 46(1), 78-109.
Goldsmith, Jack L., & Wu, T. (2006). Who controls the Internet? Illusions of a borderless world. New York: Oxford University Press.
Govender, D., & MacKenzie, J. (2020). Financial and Technological Limitations in Combating Cybercrime in South Africa. Policing: An International Journal of Police Strategies & Management, 43(4), 625-642.
Graham, A. (2023). Cybercrime: Traditional Problems and Modern Solutions. Doctoral dissertation, Open Access Te Herenga Waka-Victoria University of Wellington.
Hansen, L., & Nissenbaum, H. (2009). Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly, 53(4), 1155-1175.
Hassani, H., Xu, H, & Silva, M. The human digitalisation journey: Technology first at the expense of humans? Information, 12(7), 267.
Jogwe, S. (2021). The compliance of Internet of Things devices with the POPI Act. Master’s thesis, University of Johannesburg, South Africa.
Jones, B. (2021). Is Popia Bad Business for South Africa? Comparing the GDPR to Popia and Analyzing Popia’s Impact on Businesses in South Africa. Penn State Journal of Law and International Affairs, 10, 217.
Kwet, M. (2020). Global Data Privacy Trends: South Africa’s POPIA in Context. Journal of Comparative Law & Security Studies, 5(1), 34-49.
Mabeka, N. Q. (2021). An analysis of the implementation of the caselines system in South African courts in the light of the provisions of section 27 of the electronic communications and transactions act 25 of 2002: a beautiful dream to come true in civil procedure. Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad, 24(1).
Mabunda, S. M. (2021). The South African legislative response to cybercrime.
Millard, D., & Bascerano, E. G. (2016). Employers’ statutory vicarious liability in terms of the Protection of Personal Information Act. Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad, 19(1).
Mmabatho Aphane, J. M. (2021). South african police service capacity to respond to cybercrime: challenges and potentials. Journal of Southwest Jiaotong University, 56(4).
Moloi, T. (2022). The Role of the Information Regulator in Enforcing POPIA. South African Law Review, 67(4), 102-115.
Moyo, A. (2024). Cyber criminals hack SA’s Legal Practitioners Fidelity Fund. https://www.itweb.co.za/article/cyber-criminals-hack-sas-legal-practitioners-fidelity-fund/dgp45MaBomLqX9l8.
Moyo, N. & Motloutsi, P. (2021). Challenges in the Investigation and Prosecution of Cybercrime in South Africa. Journal of Information Warfare, 20(2), 45-61.
Mueller, J., & Padayachee, K. (2021). Surveillance, Privacy, and the Cybercrimes Act: A Critical Review. African Journal of Information Security, 5(3), 112-127.
Mulaudzi, T. (2021). The Cybercrimes Act: Enforcement Challenges in South Africa. Journal of Cybersecurity Law, 12(2), 89-102.
Myovella, G., Karacuka, M., & Haucap, J. (2020). Digitalization and economic growth: A comparative analysis of Sub-Saharan Africa and OECD economies. Telecommunications Policy, 44(2), 101856.
Naidoo, R., & Naidoo, R. (2021). Corporate Governance and Data Privacy: Lessons from POPIA. Journal of Corporate Law Studies, 28(3), 55-70.
Naidoo, S. (2024). The effectiveness of detection and prosecution of cybercrime threats against companies in South Africa. https://wiredspace.wits.ac.za/items/e4f2c8c0-6ae8-4360-92a1-24847c04d16b.
Nel, S., & Bezuidenhout, C. (2020). Cybercrime in South Africa: A Public Awareness Perspective, South African Law Review, 37(1), 45-60.
Ngcobo, M. A. T. (2024). Analyzing the use of digital evidence for computer fraud in the Springs policing area, Gauteng Province. https://www.academia.edu/119030682/Analysing_the_use_of_Digital_Evidence_for_Computer_Fraud_in_the_Springs_Policing_Area.
Oreku, G. S., & Mtenzi, F. J. (2017). Cybercrime: Concerns, challenges and opportunities. Information Fusion for Cyber-Security Analytics, 129-153.
Phakathi, S. (2022). Economic Impacts of POPIA Compliance on SMEs in South Africa. Journal of Economic Studies, 47(6), 132-148.
Ramluckan, T., & Mkhonza, S. (2021). Cybercrimes Act: A Lifeline for Victims of Online Harassment and Revenge Porn in South Africa. South African Journal of Information and Communication Technology, 28(2), 34-46.
Redpath, J., & Nagla-Luddy, F. (2015). ‘Unconscionable and irrational’ SAPS human resource allocation. South African Crime Quarterly, 53, 15-26.
Rid, T. (2020). Active measures: The secret history of disinformation and political warfare. Farrar, Straus and Giroux.
Sekati, P. N. M. (2022). Assessing the effectiveness of extradition and the enforcement of extra-territorial jurisdiction in addressing trans-national cybercrimes.
Snail ka Mtuze, S., & Musoni, M. (2023). An overview of cybercrime law in South Africa. International Cybersecurity Law Review, 4(3), 299-323.
Spiezia, F. (2022, May). International cooperation and protection of victims in cyberspace: welcoming Protocol II to the Budapest Convention on Cybercrime. In ERA Forum (Vol. 23, No. 1, pp. 101-108). Berlin/Heidelberg: Springer Berlin Heidelberg.
Statista (2024). Internet usage worldwide - Statistics & Facts. https://www.statista.com/topics/1145/internet-usage-worldwide/#topicOverview.
Theys, M. W. (2020). Exploring compliance with the protection of Personal Information Act: implementation considerations in small software development companies in South Africa. Doctoral dissertation, Cape Peninsula University of Technology.
Van der Merwe, A. (2023). Enforcement Challenges under South Africa’s POPIA. Journal of African Law, 67(1), 89-102.
Wicki-Birchler, D. (2020). The Budapest Convention and the General Data Protection Regulation: acting in concert to curb cybercrime?. International Cybersecurity Law Review, 1(1), 63-72.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Abiodun Omotayo Oladejo, Nontyatyambo Pearl Dastile

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The author fully assumes the content originality and the holograph signature makes him responsible in case of trial.
