Our Services

How can we help you?

What we offer

We offer a wide range of services to the market that include the following key areas:

  • Criminal investigations: We collect information or evidence to determine whether a crime has been committed, to identify and apprehend the perpetrator and to provide evidence to support a conviction in court.
  • Investigations in civil matters: We uncover and assemble evidence to support a civil trial involving one party suing another in a matter relating to their rights as citizens, such as damages caused to the plaintiff.
  • Forensic investigations: We gather and analyse physical evidence in order to come to a conclusion about the suspect in a crime. Such evidence includes blood, fluid, fingerprints, waste, hard drives, computers, etc,
  • Fraud and internet scams: We examine deception intended to result in financial gain for the perpetrator to the detriment of the victim. In the cyber space theft occurs in the form of internet scams such as emails attempting to obtain financial information, pop-ups loaded with malware, and social media messages sparking fake romantic relationships to defraud the victim.
  • Forensic accounting: We combine accounting and investigative techniques to discover financial crimes, and explain the nature of a financial crime to a court.
  • Specialist fire investigations: We systematically investigate and analyse the origin and cause of fire-related incidents after the fire has been extinguished, based on specialised fire science.
  • Accident investigations: We determine the root causes of accidents, on-the-job injuries, property damage, and close calls in order to prevent them from occurring again.
  • Insurance fraud investigations: We investigate fraudulent attempts to collect money based on excessive or false claims.
  • Medical/incapacity insurance fraud: We investigate claims where a person makes a false statement, provides wrong information, or withholds facts for the purpose of collecting medical or disability benefits. This includes filing a claim for an injury or illness that does not exist or enjoying benefits from such claim, while being able to continue working.
  • Restraint of trade investigations: We investigate breach of employment contracts providing that an employee, post termination of employment, is restrained from performing similar work in competition with the former employer, for a prescribed period of time.
  • Employee misconduct investigation Prior to commencing a disciplinary process, we investigate employee misconduct, according to The Code of Good Practice: Dismissal (Schedule 8 of the Labour Relations Act, 66 of 1995), which recommends that an investigation be undertaken by an employer to establish whether there are grounds for misconduct which may warrant dismissal.
  • Test purchasing for brand protection, we perform test purchase in online and offline stores to gain insight into the product, the seller and the distribution of products to combat parallel distribution, counterfeiting or other activities that can harm the distribution of their products and the brand itself.
  • Mystery shopping: We visit businesses incognito to assess the availability or quality of products and services or investigate complaints in this regard.
  • Truth verification/Polygraph testing: We perform polygraph testing and use additional truth verification strategies to confirm or disconfirm speculation and rumours, identify culprits and help investigating theft, fraud, corruption and bribery. We do pre-employment testing and general periodic screening to maintain an honest and credible workplace environment, while deterring theft and dishonesty.
  • Cyber investigations: We perform investigations of crime performed via a computer, cell phone or any device which is connected to the internet. The perpetrator may either launch the attack, or act as the victim by receiving the attack from a malicious source. There are various forms of cyber crime:
    • Hard Drive Imagery: We investigate cases where a disk image/copy is made of the entire contents of a storage device, such as a hard drive, DVD, or CD and where the image contains data and structure information.
    • Key words searching: We find and analyse actual search terms that people enter into search engines to gain insight and help inform content- and marketing strategy.
    • Cellphone data recovery from devices where data has been deleted or where components of the device were damaged.
    • Presentation of evidence: We present evidence in real time by availing instant retrieval and display of documents in the court room or to a remote witness.
  • Asset protection: We protect assets by advising or instituting measures to insulate assets from claims of creditors without perjury or tax evasion.
  • Asset tracking: We track physical assets by barcode scanning, or tags using for example GPS, BLE or RFID to broadcast their location. We can also track people who are wearing tags.
  • Witness location: We use proven private investigation techniques to track witnesses whose location is unknown.
  • Custody investigations: We assess the treatment and well-being of children without the parent/guardian knowing about the monitoring, to present a report to court in custody cases.
  • Handwriting analysis: We analyse the physical characteristics and patterns of handwriting to identify the writer and/or compare it to the authentic handwriting to track differences and similarities, in that uncovering fraudulent signatures, amongst other aims.
  • Covert tracking devices: We install covert tracking devices including nano tracking and covert GPS tracking of location and real time movement.
  • Truck inspections of sub contracted companies:We monitor the cargo and movement, including mileage, of subcontracted trucks in order to establish compliance with the contract according to which services are rendered.

 

  • Physical surveillance: We watch the whereabouts, movements and activities of the target person or persons in question; we observe means and patterns of movement and irregularities in such patterns; we identify people who make contact with the target person.
  • Static surveillance:We observe the target person’s activities from a non-mobile location, such as a building, an outdoor area or from a static vehicle.
  • Electronic surveillance:We monitor a home, business, or individual using a variety of devices such as CCTV, legal wiretapping, cameras, digital video equipment, and other electronic, digital, and audio-visual means.
  • Counter surveillance:We undertake measures to prevent or reduce the risk of surveillance. These measures may include electronic methods e.g. technical surveillance counter-measures, detection of surveillance devices, covert listening devices, visual surveillance devices and counter-surveillance software. To this end we may access computing and mobile devices.
  • Covert escorting of VIP’s: We provide a safe environment for the protected VIP for movement and activity by staying in close proximity and monitoring and countering any threat to the safety of the person.

 

  1. Executive protection: Through security and risk mitigation measures we provide close protection to ensure the safety of VIPs or other individuals who may be exposed to elevated personal risk because of their employment, high-profile status, net worth, affiliations or geographical location.
  2. Executive support:
  3. Asset in transit protection: We provide protection for high-value goods while being loaded, transported and delivered.

We deploy, according to our assessment, undercover agents to collect the information needed in securing our clients, their assets and their running concerns. The goal of deployment may for example be the identification of irregular or fraudulent practices, procedural issues or employee non-compliance. We debrief these agents and assist to analyse the information collected to further the aim of their deployment. Undercover agent deployment occurs at various levels as follows:

  • Standard level agents would typically be tasked at a tactical level within warehousing, logistics as well as businesses in the industry with a purpose of maximizing operational management for optimal security.
  • High level agents would typically address strategic issues, e.g. business threats, fraud, theft and corruption at a community level. Such information would be used for long-term planning in the interest of community security.
  • Strategic level agents would typically collect executive information as to advise the decision-making body of the industry. Such information could be used industry wide, exceeding the confines of the business or industry.

 

We avail and install a variety of electronic devices in a law-compliant manner, by which information may be obtained to counter and mitigate the occurrence of crime, fraud, malpractices and irregularities in the workplace, business and industry. We train and advise our clients on the safeguarding and use of these devices and deliver post-installation services as needed and agreed with the client. The following technical surveillance and counter-surveillance measures are available.

  • Covert cameras for visual evidence.
  • Covert audio devices for auditory evidence.
  • Technical surveillance counter measures (TSCM).
  • Data analysis through software-based processing (IBase & Analyst Notebook)
  • Analysis of data recovered from computers, Ipad and cellphones.
  • Cellphone location through realtime movement tracking.
  • Cellphone usage history through network tracing

 

  • Profiling/Lifestyle audit of individuals: We extrapolate information about the characteristics, personality traits, behavior and practices of a person and combine known information with observations and information obtained, to provide a descriptive analysis of the individual. To this end we use an adapted form of the Hartman Personality Profiling colour coding system (blue, black, red and platinum) to identify the motivators for the individual’s behavior and actions.
  • Business profiling: We make a professional summary of a business and its activities to serve as a basis for raising capital, winning investors and informing stakeholders, including clients.
  • Strategic audits on business: We conduct strategic business audits to enable answering of questions about the future of the business through assessing the current business strategy. We assist in identifying current strategic risks and analyse future risks. Subsequently, we advise resource adjustment by mapping the business goals to the available resources.
  • Finger print screening: We use the Automated Fingerprint Identification System (AFIS), whereby fingerprints obtained on a crime scene are checked electronically, directly against the South African Police Services existing criminal database. To this end we use software provided by AFISwitch to allow us to capture fingerprints via specialised software programmes and submit them to check for a possible criminal record.
  • Financial Audit Investigations: We provide expert services to investigate and verify the facts underpinning financial statements submitted for auditing. Financial audit investigation is discretionary, following the compulsory auditing of the books of a business or company and is conducted in situations where there is reason to suspect that the conditions under which statements have been submitted are dubious or fraudulent.
  • Employee background screening: Strictly in accordance with employment laws, we conduct prospective employee background screening in the pre-hiring phase. Such screening aims to verify and confirm the authenticity, truthfulness and reliability of the following:
    • Identification Documents
    • Driver’s License and Public Drivers Permit (PDP)
    • Criminal Record
    • Educational background and qualifications
    • Prior employment records
    • Credit status
    • Integrity testing
    • Identification photos
    • Finger print verification against national criminal records data base

We draw up a summary with a synopsis of the facts of a legal case for the benefit of the party conducting the case in court. The watching brief implies that a case is observed without active participation in it. The following conditions qualify or legal watch and brief:

  • It is conducted with the assistance of an ex Commercial Crime Prosecutor.
  • We have a team of advocates to assist in the presentation of legal opinion and to oversee criminal charges. 
  • In our legal watch and brief we maintain continued interaction with Department of Justice, SAPS, Special Investigations Unit and Asset Forfeit Unit.

 

  • Transcribing record audio and/or visual material: We transcribe and/or translate recordings of conversations, meetings and other encounters in order to render a documented report of the interaction or event.
  • Translating African languages to Afrikaans or English.

 

  • We conduct security vulnerability assessments to identify, quantify and prioritise or rank the vulnerabilities in systems such as technology systems, energy or water supply systems, transportation or communication systems. The process followed, is systematic in itself and is conducted in phases as follows:
    • Phase 1: Defining specific aspects of vulnerability
    • Phase 2: Measuring the extent of vulnerability
    • Phase 3: Analysing the nature and gravity of the vulnerability
    • Phase 4: Improving the vulnerability resistance capacity
    • Phase 5: Controlling vulnerability levels at an acceptable level

 

Client Testimonials

Client Photo
Viv Brandon Supply Chain Manager (Retired)

I have used Ferlio Investigators for several years in the past. I have always found them to provide exceptional service. Their commitment to ensuring that their customers needs are met in every way with integrity, discretion and confidentiality is exemplary. I highly recommend their services.

Client Photo
Anonymous Law industry

I have been working with Ferlio and its team now for the past 14 years and have never been disappointed with the service levels, effort, skills and speed at which they operate. I would recommend them any day to assist others in the fight against crime.

Client Photo
Anonymous Pharmaceutical Industry

I have dealt with Ferlio group of investigators for a number of years and have requested on numerous occasions for them to do tracking and tracing, either individual or business related. I have never experienced a no help attitude from any one of his staff. He also supplied me with undercover agents in different capacities and their reporting is from the best I ever experienced, valuable and usable.

Client Photo
Anonymous Logistics Industry

Ferlio is a company that understands the logistics industry, associated challenges and required mitigations & solutions. Ferlio have always dealt with request in a most professional manner and always applies confidentiality to the highest level. Ferlio has access to various & very reliable recourse to ensure correct and verified feedback supplied.

Client Photo
Anonymous Mining Industry

Having worked with Ferlio Group of Investigators for some 8 years now, I have found that the commitment to professional service offering is commendable. Their support and timely advice is held in high regard.

Client Photo
Adv. George Barnes (FP), SA CFCI

I have worked with Mr Stompie Ferreira on several cases and found him to be passionate, honest and knowledgeable. I will never hesitate to recommend Mr Stompie Ferreira.

Client Photo
Oakley Group Management

It is a privilege to confirm that Ferlio Group of Investigators is rendering a professional investigating and screening service to the Oakley Group of companies with distinction over the last decade. The 24/7 availability of senior and support staff renders then unique and reliable in a very volatile environment. The Management of Oakley Group trust that the relationship will continue for years to come

Client Photo
Anonymous Electrical Manufacturing

Ferlio has assisted greatly from where we started with a suspicion up to where we finally got rid of the bad apples in our business. We extended our horizons on other problem areas with similar success. Our eyes were opened. They are efficient, cost effective and excel every time in their deliverables. They are truly a professional team and are always easily reachable. Thank you Ferlio, together we will go a long way.

Expert Team

Stompie Profile

Stompie Ferreira

Profiler / Investigator

Certified Fraud Examiner (CFE)

International Association of Financial Crimes Investigator (IAFCI)

Dominique Profile

Dominique Stapelberg

Profiler / Investigator

Certified Fraud Examiner (CFE)

International Association of Financial Crimes Investigator (IAFCI)