There isn’t a day that goes by where businesses aren’t being effected by theft, fraud and labour force disruptors.
Why you need undercover investigators
SSC Investigations is at the forefront of intelligence
gathering with our undercover agent service offering combined with Meerkat, our
data management and reporting tool.
you need an undercover agent?
Breaches of security
Health and safety
Tier 1 Undercover Agents
Our Tier 1 Undercover Agents enter the workforce as a normal employee who gathers and reports on incidents via Meerkat.
These agents are placed based on your workforce demographic.
Tier 1 Undercover Agents do not testify during internal hearings or in courts.
Tier 2 Undercover Agents
Our Tier 2 Undercover Agents are placed once Tier 1 Undercover Agents have identified the culprits within your organisation. These agents will verify and take note of criminal behaviour.
Tier 2 Undercover Agents can testify during internal hearings or in criminal courts.
Edward Phillips, Senior Manager Undercover Agents
With more than twenty years’ experience in the intelligence environment
Edward Phillips is your go-to guy when it comes to all matters to do with SSC
Investigations’ Undercover Agents department. As the senior manager of the
department he will be able to answer any questions you may have. Should you
wish to meet with him urgently, contact Edward on 079 911 2800 or email@example.com.
Meerkat Integrated Knowledge Platform
Undercover investigators logs priority information to our online
reporting tool, Meerkat, instantly. This enables our clients to act on information
Meerkat offers a powerful search facility allowing for the mining of historical data – via a drill down capability – to the exact incident being sought regardless of when it was originally reported and captured. Statistical reports are generated providing graphical representations of trends and patterns based on previously reported data and information captured. By applying analytical data processing to the sourced information in the database, the client is able to identify and select key security risks embedded in the information that can be used to mount effective and focused operations.