PROJECT: HOW PUBLIC MONEY IS STOLEN, HIDDEN, AND DISGUISED THROUGH SOUTH AFRICA’S TENDER SYSTEM (PART 1)
- 2 days ago
- 7 min read
PLEASE SHARE THIS PUBLIC DOCUMENT
Money laundering within South Africa’s tender and public procurement space remains one of the most destructive financial crimes affecting the country today. This is not merely a technical financial issue hidden in bank records, invoices,
and boardroom decisions — it is a crime that directly destroys service delivery, drains public resources,
and deepens poverty across the country.
When public money is stolen through manipulated tenders and then laundered through companies, relatives, associates,
false invoices, layered transactions, and asset purchases, the ultimate victims are ordinary South Africans.
The money that should have built roads, repaired infrastructure, improved policing, funded clinics, supported schools, and strengthened municipalities is instead diverted into private hands through corruption and concealment.
The recent evidence heard before the Madlanga Commission, including testimony by Mr. Suliman Carrim, has again placed public attention on alleged money flows and transactions between Mr. Vusimuzi “Cat” Matlala, Mr. Morgan Maumela, and Mr. Suliman Carrim.
These financial movements raise serious questions that are often central in public procurement investigations:
Why did the money move?
Who really benefited?
What was being concealed?
Was there a lawful commercial reason for the transaction?
Or was the movement of funds part of a broader pattern of money laundering and tender corruption?
Specialised Security Services (SSS) believes it is essential to educate the public on:
why money flows and transactions move in tender-related matters;
what is being concealed when funds are moved through multiple accounts and entities;
how money laundering functions in the public procurement space;
and why these patterns often point to corruption, fraud, and organised criminal conduct.
WHAT IS MONEY LAUNDERING?
Money laundering is the process of making “dirty money” appear “clean.”
In simple terms, it means taking money or assets derived from criminal activity and moving, disguising, converting, transferring, or investing them so they appear legitimate.
The phrase became widely recognised in legal and financial discussions during the 1970s, especially during investigations into the Watergate scandal in the United States.
However, the concept is much older and is often linked to organised crime structures that used cash businesses to mix illegal funds with lawful income.
The reason it is called “laundering” is simple: It is the process of washing criminal proceeds so that they appear lawful.
THE SOUTH AFRICAN DEFINITION OF MONEY LAUNDERING:
In South Africa, money laundering means any act that hides, disguises, transfers, converts, uses, or assists in dealing with money or assets that originate from unlawful activities so that they appear legitimate.
A person may commit money laundering when they knowingly:
receive or possess proceeds of crime;
transfer money to hide where it came from;
invest illegal money into businesses, property, vehicles, or luxury assets;
structure transactions to avoid detection;
or help another person conceal criminal proceeds.
This is a crucial point for the public to understand: A person does not need to be the original thief, corrupt official, or fraudster to be charged with money laundering.
If a person knowingly:
receives the money;
moves the money;
uses the money;
hides the money;
or allows their company or bank account to be used to disguise criminal proceeds; they may themselves become criminally liable.
This is why:
third-party payments;
proxy companies;
family members;
friends;
business associates;
and shelf companies, become highly important in corruption and tender investigations.
WHY TENDER MONEY IS ESPECIALLY DANGEROUS:
Tender-related money laundering is particularly dangerous because the original payment often comes from a lawful source — the State itself.
At first glance, the payment may appear legitimate because it came from:
a municipality;
a provincial department;
a state-owned entity;
or another public institution.
However, the criminality is often hidden inside the transaction itself, through:
inflated pricing;
false billing;
kickbacks;
collusion;
non-delivery;
emergency procurement abuse;
duplicate invoicing;
and politically connected manipulation.
This is what makes tender corruption so dangerous: The payment may look lawful on paper, but the underlying procurement process and the movement of the money afterwards often expose the crime.
WHY MONEY IS MOVED IN TENDER CORRUPTION CASES:
When public money is stolen through tenders, the purpose of moving that money is usually not merely to spend it.
The real purpose is often to:
hide where the money came from;
hide who really benefited;
hide who controlled the money;
break the direct link between the State payment and the final beneficiary;
and create layers of false explanations that make the money appear lawful.
In many cases, investigators are not just asking: “Where did the money go?”
They are asking: “Why was the money moved in this way, and what is the transaction really trying to conceal?”
WHAT IS BEING CONCEALED WHEN MONEY IS MOVED THROUGH THIRD PARTIES?
When money is transferred through multiple people or companies, investigators usually look at what is being hidden.
In tender-related money laundering, these transactions often conceal:
1. THE ORIGIN OF THE MONEY:
The launderer tries to hide that the funds originally came from:
corruption;
fraud;
tender kickbacks;
theft of public funds;
or manipulated procurement.
2. THE REAL BENEFICIARY:
The person receiving the money first is often not the person who ultimately benefits.
The first recipient may be:
a relative;
a friend;
a business associate;
an employee;
or a connected company.
3. THE CONTROL OF THE MONEY:
Even when money sits in another person’s account, the real suspect may still control:
where it goes;
what is purchased;
who gets paid;
and how the funds are disguised.
4. THE CRIMINAL RELATIONSHIP BETWEEN THE PARTIES:
Moving money through several entities helps hide:
who is linked to whom;
who instructed whom;
which companies are connected;
and whether a public official, contractor, and intermediary are working together.
5. THE PAPER TRAIL:
Every transfer creates another layer:
another invoice;
another company;
another “consulting fee”;
another “loan”;
another false explanation.
This makes the matter more complex — but it also often creates a pattern of deception.
THE LEGAL FRAMEWORK - POCA AND FICA:
South Africa’s anti-money-laundering system is built around two key laws:
The Prevention of Organised Crime Act (POCA)
The Financial Intelligence Centre Act (FICA)
These laws work together, but they serve different purposes.
1. POCA – THE CRIMINAL LAW WEAPON:
The Prevention of Organised Crime Act (POCA) makes it a criminal offence to:
hide or disguise proceeds of unlawful activity;
assist another person to benefit from criminal proceeds;
acquire, use, or possess property derived from crime;
enter into transactions that help conceal illegal money.
Important POCA sections:
Section 4 – General money laundering offence.
Section 5 – Assisting another person to benefit from criminal proceeds.
Section 6 – Acquiring, using, or possessing property derived from crime.
POCA also allows the State to:
freeze bank accounts;
restrain property;
seize vehicles, houses, businesses, farms, and luxury assets;
and confiscate assets linked to criminal proceeds.
2. FICA – THE DETECTION SYSTEM:
The Financial Intelligence Centre Act (FICA) is the system that helps detect suspicious financial movement.
Banks and accountable institutions must:
identify clients (KYC);
keep records;
verify source of funds where necessary;
report suspicious transactions;
report unusual cash movement.
This is why:
banks;
attorneys;
accountants;
estate agents;
financial advisers;
and other accountable institutions, play a major role in detecting financial crime before or during investigations.
Tender-related money laundering is not a victimless “paper crime.” It is a form of organised financial concealment that often follows:
corruption;
fraud;
kickbacks;
procurement manipulation;
and the theft of public funds.
The movement of money is often designed to:
hide the source;
hide the real beneficiary;
hide the criminal relationship between parties;
and destroy the financial trail.
In PART 2, Specialised Security Services (SSS) will explain:
how tender money is commonly laundered in South Africa;
the five most common laundering methods in municipal and provincial corruption matters;
the red flags the public should watch for;
and the criminal consequences for those who knowingly participate.
If you suspect corruption, procurement fraud, extortion, or suspicious financial activity linked to public funds,
contact Mr. Mike Bolhuis of Specialised Security Services (SSS) and his Specialist Investigators, who remain committed to exposing organised criminal conduct and protecting the public through professional, disciplined investigation.
Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Channel.
This channel is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.
How to Join the WhatsApp Channel:
1. Make sure you have the latest version of WhatsApp on your device.
2. Click on the link below to join the Mike Bolhuis Daily Projects WhatsApp Channel:
3. Follow the prompts to join the channel.
4. Make sure you click on "Follow", then click on the "bell"-icon (🔔)
CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.
ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.
Regards,
Mike Bolhuis
Specialist Investigators into
Serious Violent, Serious Economic Crimes & Serious Cybercrimes
PSIRA Reg. 1590364/421949
Mobile: +27 82 447 6116
E-mail: mike@mikebolhuis.co.za
Fax: 086 585 4924
Follow us on Facebook to view our projects -
EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.
STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.
POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here: https://mikebh.link/fntdpv
SSS TASK TEAM:

Copyright © 2015- PRESENT | Mike Bolhuis Specialised Security Services | All rights reserved.
Our mailing address is:
Mike Bolhuis Specialised Security Services
PO Box 15075 Lynn East
Pretoria, Gauteng 0039
South Africa
Add us to your address book
THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.

