Article Categories
SSC Global Investigations | Undercover Agents
page-template-default,page,page-id-15589,ajax_fade,page_not_loaded,,side_menu_slide_from_right,hide_top_bar_on_mobile_header,qode-theme-ver-17.2,qode-theme-bridge,qode_header_in_grid,wpb-js-composer js-comp-ver-5.6,vc_responsive

Undercover Agents

There isn’t a day that goes by where businesses aren’t being effected by theft, fraud and labour force disruptors.

Why you need undercover investigators

SSC Investigations is at the forefront of intelligence gathering with our undercover agent service offering combined with Meerkat, our data management and reporting tool.

When do you need an undercover agent?

  • Criminal activity
  • Labour concerns
  • Breaches of security
  • Health and safety
  • Substance abuse

Tier 1 Undercover Agents

Our Tier 1 Undercover Agents enter the workforce as a normal employee who gathers and reports on incidents via Meerkat.

  • These agents are placed based on your workforce demographic.
  • Tier 1 Undercover Agents do not testify during internal hearings or in courts.

Tier 2 Undercover Agents

Our Tier 2 Undercover Agents are placed once Tier 1 Undercover Agents have identified the culprits within your organisation. These agents will verify and take note of criminal behaviour.

  • Tier 2 Undercover Agents can testify during internal hearings or in criminal courts.

Meerkat Integrated Knowledge Platform

Undercover investigators logs priority information to our online reporting tool, Meerkat, instantly. This enables our clients to act on information faster.

Meerkat offers a powerful search facility allowing for the mining of historical data – via a drill down capability – to the exact incident being sought regardless of when it was originally reported and captured. Statistical reports are generated providing graphical representations of trends and patterns based on previously reported data and information captured. By applying analytical data processing to the sourced information in the database, the client is able to identify and select key security risks embedded in the information that can be used to mount effective and focused operations.