The fraud threat is within

July 2017 Security Services & Risk Management

South African businesses are buckling under the cost of crime during tough economic times, but the perpetrators are often where companies least expect to find them.

Reg Horne.
Reg Horne.

“The threat comes from within,” warns Reg Horne, managing director of Justicia Investigations. He notes that businesses often spend large amounts on security to combat external threats without putting in place systems to counter internal ones.

“Yes, you need visible security. But it will not matter if you have three or 20 security guards. If you do not know where the problem is, the threat remains.”

“Currently, on-the-ground investigators have noted two interesting trends. The problem is not large corporate frauds, but the ever growing number of smaller crimes that are constantly adding up. And these are usually perpetrated by employees further down the line and not by top management as might be expected.”

Justicia’s experiences at the coalface echo the findings of two important studies. The first is the 2016 PricewaterhouseCoopers (PwC) Global Economic Crime Survey which not only showed that commercial crime was on the rise, but had reached crisis proportions in this region. More than two out of three (69%) South African companies reported having been victims of crime during the 24 months preceding the survey. At double the global average of 36%, this positioned South Africa as the top country reporting economic crime.

The second, the 2016 ACFE Global Fraud Study, not only indicated increased fraud but highlighted that the majority of cases involved employees. Embezzlement, theft by an accountant, bookkeeper or manager who diverts income and then covers it up, was flagged as a particular threat.

Horne says that recent Justicia cases, which have included the disappearance of large amounts of fertiliser between storage facilities at an agricultural processing company, the presentation of signed delivery notes for oil that had never arrived at its destination but had been sold off to a syndicate en route, the diversion of supplier payments to the banking account of an accountant’s relative and the ‘sale’ of fabrics from a clothing company warehouse were just the tip of the iceberg.

“Unfortunately, cases like this are happening daily. Businesses need to fight back to survive. Right now, they’re under siege from their own staff as well as from opportunists who know how to exploit employees when times are difficult,” he observes.

Horne adds that, even when the various schemes are engineered by crime syndicates, they are more often than not carried out by middle management and employees in positions of trust, such as those receiving or despatching goods, supervising logistics facilities, doing the accounts and controlling security.

This, too, was echoed by the PwC survey which noted that the number of crooked senior management had more than halved whilst middle management appeared to have taken centre stage with 39% of fraud being perpetrated by internal actors at this level. It also noted that more than half of internal perpetrators (52%) had been employed for between three and 10 years and were not only likely to be familiar with any controls, but may even have helped put them in place.

Many fraudulent schemes are often only detected by accident when losses have accumulated over longer periods. This is particularly true during tough times as companies tend to keep a closer eye on cash flow and look inward to better manage processes in order to cut costs.

The only way to catch those who know the ropes extremely well is through intelligence driven prevention. The only way to prosecute them effectively is to bring in experts.

“In a lot of instances, the organisation has the case in hand but doesn’t know how to take it to the next level. It requires skill to get the correct evidence that not only enables a company to dismiss an employee, but also to present the correct, admissible evidence to secure a conviction in court,” he says.

“Our operations team has the experience and skill required to understand each unique situation and assess which tools would be best suited to solving the problem. Our investigators are well versed in the Criminal Procedures Act and work with the SAPS or independently in gathering admissible evidence, compiling a docket and leading evidence in court.”

For more information, contact Justicia Investigations, 0860 00 5111, www.justicia.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
From digital transformation to digital sovereignty
Security Services & Risk Management IoT & Automation
As cyberthreats grow, data regulations tighten, and AI becomes central to economic competitiveness, countries are recognising the need to control and protect their own digital assets.

Read more...
The age of Lean 4.0: Orchestrating intelligence and efficiency
Security Services & Risk Management
The convergence of Lean principles and AI (what we now call Lean 4.0) is no longer a theoretical exercise; it is the defining operational paradigm for survival and growth in a complex, data-intensive economy.

Read more...
Risks of open-source intelligence escalating in crime
Security Services & Risk Management Residential Estate (Industry) Smart Home Automation
CMS estimates that open-source intelligence has played a role in 20 - 30% of robberies over the past 12 months. In cybercrime, global research consistently shows that many offences rely on some form of open-source data exploitation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.