top of page

Investigating a Major Fraud Scheme

Client Background: A JSE-listed client was facing significant discrepancies in their accounting records.
 

Challenge: The client was experiencing unusual financial activity linked to a manager who was suspected of orchestrating a fraudulent scheme exceeding 400 million Rand. The investigation aimed to uncover the methods used to conceal substantial debt owed to the client.
 

Investigation Methodology: We employed a forensic eDiscovery tool to analyse the email communications of key individuals involved. This approach allowed us to trace the fraudulent activities and identify the modus operandi of the perpetrators. We also undertook a detailed forensic accounting review of journals in the debtors book analysing in excess of 500 000 entries over a three year period. We discovered the fraudulent re-aging or "rolling" of debtors which concealed the loss.

​

Findings: Our investigation revealed a pattern of several hundreds of thousands of journal entries over e period of years designed to obfuscate the true financial state of the organisation.
 

Outcome: We compiled a comprehensive forensic accounting report detailing our findings and recommendations. Additionally, we collaborated closely with the HAWKS to support their ongoing investigation into the case. The client has been able to recover significant amounts of the funds.
 

Impact: Our efforts not only provided the client with clarity on the fraudulent activities but also played a crucial role in facilitating law enforcement action against the perpetrators, reinforcing the integrity of the client’s financial operations.

Case study 1

Uncovering Corruption in Retail Procurement

Client Background: A JSE-listed client facing allegations of corrupt procurement practices.
 

Challenge: The client suspected that a procurement manager was involved in a corrupt
relationship with an overseas supplier wherein millions of Rands were allegedly exchanged
in illicit payments.

 

Investigation Methodology: To investigate the matter thoroughly, we utilised forensic eDiscovery tools to examine the procurement manager’s email communications and to
forensically image his laptop and phone.

 

Findings: Our investigation uncovered a series of backhanded payments and
communications that demonstrated the procurement manager’s collusion with the supplier.
Additionally, our efforts revealed a complex web of corruption, implicating additional family
members in the scheme.

 

Outcome: We compiled a detailed report summarizing our findings, which provided the
client with the evidence needed to take decisive action. The case is currently being actively
pursued by the HAWKS, enhancing the prospects for legal accountability.

 

Impact: Our work not only helped the client address the corruption within their procurement processes but also supported law enforcement efforts in tackling broader issues of fraud and corruption within the industry.

Case study 2

Combating the Theft and Reselling of Fuel

Client Background: A client seeking to address significant product theft issues.
 

Challenge: The client reported ongoing incidents of product theft, with suspicions of
reselling operations being conducted by an employee. The investigation aimed to identify the
perpetrator and understand the extent of the theft.

 

Investigation Methodology: We deployed advanced tracking and surveillance technology
to monitor the movements and behaviour patterns of the suspect. This comprehensive
approach allowed us to pinpoint the locations where stolen product was being delivered for
resale.

 

Findings: Our investigation led to the successful identification of the methods the suspect
was using to steal the product. We caught the suspect in the act with a load of stolen
product. Additionally, we uncovered links to another employee involved in similar illicit
activities.

 

Outcome: Our collaboration with local police resulted in the arrest of the suspect and
provided crucial evidence for further action. The employee plead guilty and was convicted on
a charge of theft.

 

Impact: The findings from our investigation enabled the client to identify and address
significant vulnerabilities in their security systems, ultimately strengthening their operations
against future thefts and enhancing overall integrity.

Case study 3
bottom of page