FSG FORENSIC INVESTIGATORS & AUDITORS | TRACERS | RISK MANAGERS | GUARDS
SA's national litigation, corporate & government private intelligence, private/forensic investigation/auditing, loss & risk management specialists.
FSG  is a LEVEL 4  B-BBEE
Accredited Company

NAVIGATION BAR
EXIT WEBSITE
BACK-HOME PG
BACK-SERVICES PG
BACK-INVEST PG

INVESTIGATION MENU BAR
LITIGATION SUPPORT

PUBLIC PROTECTOR
FINANCIAL CRIME
MISSING PERSONS
FAIPOINT-OUTS
DATABASE INTEL
BCI
SUVEILLANCE
ENTRAPMENTS

HEAD OFFICE DETAILS
Telephone
+27 (0) 86 1000 979
Fax
+27 (0) 86 5168 722
Mobile
+27 (0) 83 7841 523
Postal Address
PO Box 17, Pavilion,
3611, South Africa
Physical Address
7 Cedar Road, Westville,
 3629, South Africa
PSIRA Reg. No.
1144490
Email Address
fohladbn@yebo.co.za


FSG has corporate offices in:
DURBAN
CAPE TOWN
JOHANNESBURG
- and field agents in every Magisterial District in SA.

________________________
 

 

 


UNDERCOVER INVESTIGATORS ('U/I')

Undercover investigations are forensic in the sense that they are conducted in anticipation of a litigation process, the objective of which may be the likes of dismissing employees found guilty of wrongdoing, bringing criminal charges against persons revealed to be responsible for loss by the undercover investigation, and/or litigation to secure recovery of/financial compensation for that which was lost.

It is sometimes the case that the necessary evidence to demonstrate loss and those responsible for loss cannot be obtained without the assistance of infiltrating someone into the loss/risk environment. This is especially relevant for circumstances that indicate that losses occur in the context of highly collusive relationships (eg. within a group of employees in the workplace). The forensic investigator then has two options:

  • The recruitment of persons from within the loss/risk environment as informers. However, this process is:

    • Time consuming. Exhaustive investigation and profiling is required to identify such a potential informant. And then, the co-operation of such an informant can only be secured by either gathering evidence of acts committed by the informant that compromise him/her, or by manufacturing circumstances that compromise the tareted informant and forces his/her unwilling co-operation. Sometimes simple greed is an adequate incentive to create an insider informant, but the integrity of the evidence of such an informant will always be compromised. Rarely, but sometimes, it is possible to identify a potential informant who will co-operate for no other reason than his/her ethics are affronted by the criminal/illegal practices of his/her colleagues. We are the first to admit that the successful, aggressive recruitment of unwilling informants seems far-fetched, but success is really only subject to the recruiting party having the resources to identify or manufacture motivating, circumstances. And it must be recognized that the recruitment of informants is the ‘common fodder’ of expert private and government intelligence operatives who operate in the world of politics, wealthy corporates and wealthy criminal syndicates, where money is not an obstruction. Furthermore, FSG has experience of such manipulations.

    • Operationally complex - and therefore expensive - as the unwilling informant must constantly be monitored because an unwilling informant, with the assistance of counter-intelligence specialists, can thwart the identified or manufactured circumstance that motivates the co-operation of the unwilling informant. Recruiting informants from within the risk/loss environment is consequently risky.

  • Infiltrating a trained undercover investigator into the loss/risk environment:

    • If circumstances permit (for example when a person with vested interests and who has influence in the loss/risk environment is the party that retains FSG). FSG can infiltrate undercover investigators into the loss/risk environment. The role of the undercover investigator is then to monitor, observe and report back to FSG. Successful infiltration is largely a matter of three factors:

      • Creating a sustainable, verifiable cover identity (‘legend’) for the undercover investigator.

      • The tradecraft of the undercover investigator.

      • The skill of the ‘handler’ of the undercover investigator, which skill finds expression in:

        • The handler's knowledge of the risk environment.

        • The capacity of the handler to debrief the undercover investigator.

        • The capacity of the handler to direct the actions of the undercover investigator.

    • It follows that the successful undercover investigator is one who:

      • Has the requisite skills to perform whatever function is implied by his/her ‘legend’. Identifying such a person is the very first step towards the successful infiltration of an undercover investigator.

      • Is an experienced investigator, but more specifically has the personality and skill to work alone in an environment that is intrinsically hostile, where the undercover investigator is protected only by the veil of his/her legend. (However, in reality, the service provider who renders the undercover investigation service will never infiltrate an undercover investigator without first constructing an ‘exit strategy’ in the event that the undercover investigator’s legend is exposed.)

Clients who wish to pursue the infiltration of undercover investigators must recognize several things:

  • Undercover investigation operations are not short-term exercises. It takes time to source an appropriate undercover investigator, it takes time to build a sustainable legend, it takes time to infiltrate an undercover investigator and, most of all, it takes time for the undercover investigator to establish his/her credentials in the loss/risk/undercover environment.

  • For an undercover investigator to establish his/her credentials in the undercover environment it is often necessary for the undercover investigator to first perform acts that indicate that he/she is dishonest in a manner that is overt to his/her colleagues in the undercover environment, but also in a manner that he/she is not caught in the act by a person in authority whose obligation it is to take action against persons engaged in such activities. This is usually what motivates those engaged in the illicit activity that is the subject of the to include the undercover investigator in their illicit activities. But, even this is a process. Those involved in illicit activity in the loss/risk environment will at first limit the involvement of the undercover investigator in their illicit activities, so that the undercover investigator is only gradually included in such activity.

  • Successful undercover investigation services provided by forensic investigators in private practice are time consuming and not inexpensive.

  • For the undercover investigation to be forensic, and for the testimony of an undercover investigator to be credible (remembering the legal principal that the testimony of just one credible witness is sufficient to sway the decision of a court), the undercover investigator has to avoid illegally entrapping the subject/s of an undercover investigation. (Click  HERE to learn about ENTRAPMENTS as an investigative strategy.)

Click HERE to view our undercover investigation services TERMS-CONDITIONS.

Fohla Security CC t/a FSG FORENSIC INVESTIGATORS & AUDITORS | TRACERS | RISK MANAGERS | GUARDS
_________________________________________________________________________________________________________________________________________________________________________