PROJECT: HOW THE BANKS, FIC, HAWKS, AFU, AND NPA HUNT THE MONEY (PART 3)
- 21 hours ago
- 7 min read
PLEASE SHARE THIS PUBLIC DOCUMENT
THE PUBLIC OFTEN ASKS: HOW DO AUTHORITIES ACTUALLY TRACE STOLEN TENDER MONEY?
One of the most important questions in public procurement corruption matters is this:
If the money is moved through companies, relatives, false invoices, proxies, and multiple accounts —
how do investigators still find it?
The answer is simple:
Financial crime investigators do not rely on one dramatic “smoking gun.”
They build a financial pattern.
In South Africa, tender-related money laundering is often exposed through the combined work of:
Banks;
The Financial Intelligence Centre (FIC);
The Hawks (Directorate for Priority Crime Investigation);
The Asset Forfeiture Unit (AFU);
and the National Prosecuting Authority (NPA).
Each plays a different but vital role.
1. HOW BANKS DETECT SUSPICIOUS TENDER MONEY MOVEMENT:
Banks are often the first line of defence in money-laundering detection.
Under FICA, banks are legally required to:
identify clients;
verify customer information;
monitor account activity;
keep records;
report suspicious and unusual transactions;
and report certain cash transactions.
WHAT BANKS LOOK FOR IN TENDER-RELATED MATTERS:
Banks may flag:
large incoming payments from government departments or municipalities;
money that rapidly leaves the account shortly after arrival;
multiple transfers to unrelated companies;
payments inconsistent with the customer’s normal business profile;
vague or unusual payment references;
split transactions designed to avoid attention;
large payments to family members or private individuals;
unusual cross-border transfers;
and accounts suddenly handling values far beyond their historic activity.
WHY THIS MATTERS:
A company may appear legitimate on paper, but if:
it receives R20 million from a municipal contract;
then transfers funds within hours or days to multiple “consultants,” “facilitators,” or connected individuals;
and there is no clear commercial explanation, the bank may treat that pattern as suspicious.
2. HOW THE FINANCIAL INTELLIGENCE CENTRE (FIC) BUILDS FINANCIAL INTELLIGENCE:
The Financial Intelligence Centre (FIC) is not the police.
It is South Africa’s central financial intelligence body.
Its role is to:
receive suspicious transaction reports;
analyse unusual financial movement;
identify linked accounts and patterns;
and provide intelligence to law enforcement and prosecuting authorities.
WHAT FIC OFTEN IDENTIFIES:
FIC may detect:
structured transfers;
repeated movement between linked accounts;
sudden unexplained wealth;
unusual cash movement;
transactions involving politically exposed persons;
multiple companies with connected beneficiaries;
suspicious third-party payments;
and hidden relationships between entities.
WHY FIC IS SO IMPORTANT:
FIC often sees the broader picture.
A single bank may only see one account or one client relationship.
FIC may identify:
linked accounts across institutions;
patterns across multiple companies;
financial layering;
and transaction behaviour that suggests concealment.
This financial intelligence often becomes a major foundation for later criminal investigation.
3. HOW THE HAWKS TRACE THE CRIMINAL SCHEME:
The Hawks (Directorate for Priority Crime Investigation) are often central in major corruption, organised crime, and public procurement investigations.
Once suspicious financial activity is identified, the Hawks may investigate:
how the tender was awarded;
whether procurement rules were manipulated;
whether there was collusion or kickbacks;
which companies received the money;
who controlled those companies;
who instructed the payments;
and whether false invoices or false services were used to disguise the money.
HOW THE HAWKS BUILD THE CASE:
The Hawks often combine:
bank records;
company registration records (CIPC);
tender documents;
bid evaluations;
invoices;
payment schedules;
phone records;
electronic communications;
witness statements;
lifestyle evidence;
and asset tracing.
WHAT THEY ARE REALLY LOOKING FOR:
They are often asking:
Did the work actually happen?
Was the pricing inflated?
Was the tender manipulated?
Were false invoices created?
Were the subcontractors real?
Were the parties connected?
Who truly benefited?
4. HOW THE ASSET FORFEITURE UNIT (AFU) FREEZES AND SEIZES THE MONEY:
The Asset Forfeiture Unit (AFU), operating under the National Prosecuting Authority, is one of the most powerful tools in financial crime cases.
Using POCA, AFU can apply to:
freeze bank accounts;
restrain property;
seize vehicles;
attach houses, farms, businesses, and luxury assets;
and pursue confiscation of assets linked to criminal proceeds.
WHY AFU IS SO FEARED IN CORRUPTION CASES:
AFU does not wait for public sympathy or excuses.
If investigators can show there are reasonable grounds that:
assets were bought with criminal proceeds;
accounts contain tainted funds;
or property is linked to unlawful activity, AFU can move to stop those assets from disappearing.
WHY THIS MATTERS:
In many tender corruption matters, the stolen money does not remain in one bank account for long.
It is often quickly converted into:
houses;
vehicles;
farms;
business interests;
shares;
luxury goods;
or moved through multiple entities.
AFU’s role is to stop criminals from enjoying the proceeds of corruption while criminal proceedings unfold.
5. HOW THE NPA BUILDS THE PROSECUTION:
The National Prosecuting Authority (NPA) ultimately uses the evidence gathered to decide whether criminal prosecution should follow.
In tender-related money laundering matters, the NPA may consider charges involving:
money laundering under POCA;
fraud;
corruption;
theft;
racketeering;
forgery or uttering (where applicable);
contraventions of procurement rules;
and conspiracy-related offences, depending on the facts.
WHAT PROSECUTORS MUST PROVE:
The prosecution usually does not need a dramatic confession.
Instead, they build a financial pattern showing:
money came from a suspicious or tainted tender source;
the funds moved in ways that made no genuine business sense;
false documentation was used;
linked parties were involved;
assets were acquired from those proceeds;
and the accused knew, or ought reasonably to have known, the funds were unlawful.
THE KEY PRINCIPLE:
In many cases, the strongest evidence is: A lawful-looking payment with no lawful commercial explanation afterward.
THE MOST IMPORTANT TYPES OF EVIDENCE IN TENDER LAUNDERING CASES:
Investigators and prosecutors often rely on the following:
BANK RECORDS:
when money entered;
how fast it moved out;
who received it;
whether the transfers matched real business activity.
FIC INTELLIGENCE:
suspicious transaction reports;
structured transfer patterns;
linked accounts;
unusual financial behaviour.
CIPC RECORDS:
who owns the companies;
whether directors overlap;
whether shelf companies were used;
whether entities are linked behind the scenes.
TENDER AND PROCUREMENT RECORDS:
what the State paid for;
whether the bid was manipulated;
whether delivery actually happened;
whether the pricing was inflated.
INVOICES AND CONTRACT DOCUMENTS:
false service descriptions;
duplicate billing;
inflated values;
non-existent work.
PHONE RECORDS AND COMMUNICATIONS:
contact before or after payments;
coordination between officials and suppliers;
instructions to move money.
LIFESTYLE EVIDENCE:
sudden luxury purchases;
expensive travel;
unexplained wealth;
major asset acquisitions inconsistent with declared income.
WITNESS TESTIMONY:
former employees;
bookkeepers;
accountants;
insiders;
whistle-blowers;
officials;
bank staff.
WHY THIRD-PARTY PAYMENTS ARE SO IMPORTANT:
One of the most misunderstood issues in tender corruption is the use of third parties.
A suspect may say:
“The money did not come to me.”
“It went to another company.”
“It was paid to my relative.”
“It was a loan.”
“It was consulting income.”
But investigators ask the critical questions:
Who controlled the company?
Who instructed the payment?
Who benefited from the money?
Who bought the asset?
Who used the property?
Who had the real power over the funds?
This is why:
relatives,
friends,
shelf companies,
connected directors,
and proxy entities
often become central in proving concealment.
Tender-related money laundering is not exposed by luck.
It is uncovered through disciplined, structured, professional investigation.
In South Africa:
banks detect suspicious movement;
the FIC analyses financial intelligence;
the Hawks investigate the procurement scheme and money trail;
the AFU freezes and seizes assets;
and the NPA builds the prosecution.
The public must understand that money laundering is rarely proven by one dramatic moment. It is usually proven through:
patterns;
timing;
linked transactions;
false invoices;
proxy companies;
asset purchases;
and the absence of any real commercial explanation.
When a lawful-looking payment cannot be honestly explained, the financial trail often tells the truth.
If you suspect corruption, procurement fraud, extortion, suspicious public-fund transactions,
or the concealment of criminal proceeds, contact Mr. Mike Bolhuis of Specialised Security Services (SSS)
and his Specialist Investigators, who remain committed to exposing organised criminal conduct, protecting victims,
and pursuing the truth through professional, disciplined investigation.
RELEVANT SSS PROJECTS:
Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Channel.
This channel is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.
How to Join the WhatsApp Channel:
1. Make sure you have the latest version of WhatsApp on your device.
2. Click on the link below to join the Mike Bolhuis Daily Projects WhatsApp Channel:
3. Follow the prompts to join the channel.
4. Make sure you click on "Follow", then click on the "bell"-icon (🔔)
CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.
ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.
Regards,
Mike Bolhuis
Specialist Investigators into
Serious Violent, Serious Economic Crimes & Serious Cybercrimes
PSIRA Reg. 1590364/421949
Mobile: +27 82 447 6116
E-mail: mike@mikebolhuis.co.za
Fax: 086 585 4924
Follow us on Facebook to view our projects -
EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.
STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.
POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here: https://mikebh.link/fntdpv
SSS TASK TEAM:

Copyright © 2015- PRESENT | Mike Bolhuis Specialised Security Services | All rights reserved.
Our mailing address is:
Mike Bolhuis Specialised Security Services
PO Box 15075 Lynn East
Pretoria, Gauteng 0039
South Africa
Add us to your address book
THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.

