Article Categories
SSC Global Investigations | Undercover Agents
15589
page-template-default,page,page-id-15589,ajax_fade,page_not_loaded,,side_menu_slide_from_right,hide_top_bar_on_mobile_header,qode-theme-ver-17.2,qode-theme-bridge,qode_header_in_grid,wpb-js-composer js-comp-ver-5.6,vc_responsive
 

Undercover Agents

There isn’t a day that goes by where businesses aren’t being effected by theft, fraud and labour force disruptors.

Why you need undercover investigators

SSC Investigations is at the forefront of intelligence gathering with our undercover agent service offering combined with Meerkat, our data management and reporting tool.

When do you need an undercover agent?

  • Criminal activity
  • Labour concerns
  • Breaches of security
  • Health and safety
  • Substance abuse

Tier 1 Undercover Agents

Our Tier 1 Undercover Agents enter the workforce as a normal employee who gathers and reports on incidents via Meerkat.

  • These agents are placed based on your workforce demographic.
  • Tier 1 Undercover Agents do not testify during internal hearings or in courts.

Tier 2 Undercover Agents

Our Tier 2 Undercover Agents are placed once Tier 1 Undercover Agents have identified the culprits within your organisation. These agents will verify and take note of criminal behaviour.

  • Tier 2 Undercover Agents can testify during internal hearings or in criminal courts.

Edward Phillips, Senior Manager Undercover Agents

With more than twenty years’ experience in the intelligence environment Edward Phillips is your go-to guy when it comes to all matters to do with SSC Investigations’ Undercover Agents department. As the senior manager of the department he will be able to answer any questions you may have. Should you wish to meet with him urgently, contact Edward on 079 911 2800 or edward@sscinfo.co.za.

Meerkat Integrated Knowledge Platform

Undercover investigators logs priority information to our online reporting tool, Meerkat, instantly. This enables our clients to act on information faster.

Meerkat offers a powerful search facility allowing for the mining of historical data – via a drill down capability – to the exact incident being sought regardless of when it was originally reported and captured. Statistical reports are generated providing graphical representations of trends and patterns based on previously reported data and information captured. By applying analytical data processing to the sourced information in the database, the client is able to identify and select key security risks embedded in the information that can be used to mount effective and focused operations.