top of page

PROJECT: THE 5 METHODS USED TO LAUNDER PUBLIC MONEY (PART 2)

  • 5 hours ago
  • 6 min read

PLEASE SHARE THIS PUBLIC DOCUMENT

HOW TENDER MONEY IS LAUNDERED, THE RED FLAGS, AND THE CRIMINAL CONSEQUENCES

HOW TENDER MONEY IS COMMONLY LAUNDERED IN SOUTH AFRICA

HOW IS TENDER MONEY ACTUALLY LAUNDERED IN PRACTICE:

  • When public money is stolen through tenders, the goal is usually to break the visible link between the original State payment and the person who ultimately benefits.

  • A common South African pattern often looks like this:

1. THE TENDER IS INFLATED, MANIPULATED OR FRAUDULENTLY AWARDED:

  • A company receives a government contract at a grossly inflated price, or is paid for work never fully done.

  • Example: A department pays R50 million for work realistically worth R15 million.

2. THE MAIN CONTRACTOR QUICKLY MOVES THE MONEY:

  • The tender-winning company pays:

    • “subcontractors,”

    • “consultants,”

    • “project managers,”

    • “facilitators,”

    • or shelf companies.

  • Some of these entities may exist largely on paper only, serving as financial buffers instead of real service providers.

3. FAMILY MEMBERS, PROXIES AND ASSOCIATES ARE USED:

  • Funds may then be transferred to:

    • relatives;

    • friends;

    • politically connected insiders;

    • trusted associates;

    • or proxy companies.

  • This creates distance between the original payment and the real beneficiary.

4. THE MONEY IS CONVERTED INTO ASSETS:

  • Instead of leaving the money in one account, it is often quickly converted into:

    • houses;

    • luxury vehicles;

    • farms;

    • designer goods;

    • shares;

    • high-value electronics;

    • or foreign currency.

5. SPLIT TRANSACTIONS AND CASH MOVEMENT ARE USED:

  • Large amounts are often divided into smaller transfers to:

    • reduce immediate suspicion;

    • avoid attention;

    • and complicate financial tracing.

6. LEGITIMATE-LOOKING BUSINESSES ARE USED AS CHANNELS:

  • Funds may move through:

    • construction firms;

    • security companies;

    • transport businesses;

    • consulting entities;

    • restaurants;

    • supply businesses.

  • These businesses may create invoices that make the transfers appear lawful.

7. FALSE EXPLANATIONS ARE CREATED AFTERWARDS:

  • Once investigators begin asking questions, illegal proceeds are often explained as:

    • a loan;

    • director’s fees;

    • consulting income;

    • management fees;

    • commission;

    • repayment of a debt.

  • These are common attempts to create a lawful paper explanation for an unlawful transfer.

THE FIVE MOST COMMON MONEY-LAUNDERING METHODS IN MUNICIPAL AND PROVINCIAL TENDER CORRUPTION:

1. SHELL COMPANIES AND LAYERED SUBCONTRACTING:

  • A tender-winning company pays several entities that appear to be subcontractors, suppliers, or consultants, but some may exist largely on paper.

  • RED FLAGS:

    • shared directors;

    • shared addresses;

    • shared phone numbers;

    • shared accountants;

    • no staff;

    • no real equipment;

    • no operational footprint.

2. FAKE INVOICES FOR SERVICES NEVER DELIVERED:

  • Money is paid for:

    • advisory work;

    • logistics support;

    • transport;

    • project management;

    • facilitation;

    • equipment hire;

    • “emergency procurement.”

  • But the service either never happened or was grossly inflated.

  • WHY THIS MATTERS:

    • A false invoice creates a lawful-looking explanation for an unlawful transfer.

3. SPLITTING PAYMENTS INTO MANY SMALLER TRANSFERS:

  • Instead of one large suspicious payment, money is broken into smaller amounts across:

    • personal accounts;

    • family accounts;

    • related business accounts;

    • small companies.

  • PURPOSE:

    • To reduce immediate suspicion and make tracing more difficult.

4. BUYING ASSETS THROUGH THIRD PARTIES:

  • Tender proceeds are quickly converted into:

    • houses;

    • luxury vehicles;

    • farms;

    • expensive electronics;

    • designer goods;

    • other high-value assets.

  • But the asset may be registered in:

    • a spouse’s name;

    • a sibling’s name;

    • a friend’s name;

    • a company’s name.

5. USING RELATIVES OR INSIDERS AS "CLEAN" RECIPIENTS:

  • A politically exposed person often does not receive the money directly.

  • Instead:

    • a relative gets a “loan”;

    • an associate gets “consulting fees”;

    • a connected company receives unexplained payments;

    • a trusted insider becomes the financial buffer.

RED FLAGS THE PUBLIC AND INVESTIGATORS SHOULD WATCH FOR:

  • The following warning signs often appear in tender-related money laundering cases:

    • large payments made shortly after a government tender payout;

    • money rapidly leaving an account with no clear business purpose;

    • vague invoice descriptions such as “consulting,” “facilitation,” or “logistics support”;

    • payments to newly formed companies with little or no business history;

    • companies sharing directors, addresses, or contact details;

    • unexplained payments to relatives or associates of politically exposed persons;

    • major asset purchases shortly after State-linked payments;

    • “loans” or “director’s fees” used as after-the-fact explanations;

    • and lawful-looking payments with no real commercial substance.

THE CRIMINAL CONSEQUENCES IN SOUTH AFRICA:

  • Money laundering is a serious criminal offence.

  • A conviction can lead to:

    • substantial fines;

    • confiscation of assets;

    • restraint and forfeiture orders;

    • seizure of houses, vehicles, businesses, farms, and luxury goods;

    • blacklisting from future procurement opportunities;

    • serious reputational destruction;

    • and lengthy imprisonment.

  • In serious cases involving large-scale corruption and organised concealment, imprisonment may be severe and can extend to up to 30 years, depending on the charges and surrounding offences.

  • Most importantly, A person may face prosecution even if they did not steal the original money themselves.

  • If they knowingly:

    • received it;

    • moved it;

    • disguised it;

    • used it;

    • or allowed their account or company to be used; they may still face serious criminal liability.

WHY THIS CRIME HARMS EVERY SOUTH AFRICAN:

  • Tender-related money laundering is not simply an accounting problem.

  • It is:

    • a corruption crime;

    • a fraud-enabling crime;

    • an organised financial crime;

    • a concealment crime;

    • and a direct attack on service delivery.

  • When money meant for:

    • clinics;

    • schools;

    • roads;

    • policing infrastructure;

    • emergency services;

    • housing projects;

    • municipal services;

    • water systems

  • is stolen and then laundered, communities are left with:

    • collapsing infrastructure;

    • delayed projects;

    • unsafe living conditions;

    • increased poverty;

    • broken public trust;

    • and deeper social harm.

  • The public must understand that in many tender corruption matters, the movement of money is not random.

  • It is often carefully designed to:

    • hide the source of public funds;

    • hide the real beneficiary;

    • hide who controlled the money;

    • and destroy the evidence trail.

  • In many cases, the most dangerous transaction is not the one that looks obviously criminal.

  • It is the one that appears lawful on paper, but has NO lawful commercial explanation afterwards.


  • In PART 3, Specialised Security Services (SSS) will explain how:

    • banks detect suspicious transactions;

    • the Financial Intelligence Centre (FIC) analyses financial intelligence;

    • the Hawks investigate procurement-linked laundering;

    • the Asset Forfeiture Unit (AFU) freezes and seizes assets;

    • and the National Prosecuting Authority (NPA) builds cases to prosecute those involved.


If you suspect corruption, procurement fraud, suspicious financial flows, or the concealment of public funds,

contact Mr. Mike Bolhuis of Specialised Security Services (SSS) and his Specialist Investigators, who remain committed to exposing organised criminal conduct, protecting victims, and pursuing the truth through professional, disciplined investigation.

INITIAL SSS PROJECT:

Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Channel.

This channel is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.


How to Join the WhatsApp Channel:

1. Make sure you have the latest version of WhatsApp on your device.

2. Click on the link below to join the Mike Bolhuis Daily Projects WhatsApp Channel:

3. Follow the prompts to join the channel.

4. Make sure you click on "Follow", then click on the "bell"-icon (🔔)

CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.

ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.

Regards,

Mike Bolhuis

Specialist Investigators into

Serious Violent, Serious Economic Crimes & Serious Cybercrimes

PSIRA Reg. 1590364/421949

Mobile: +27 82 447 6116

Fax: 086 585 4924

Follow us on Facebook to view our projects -


EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.


STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.


POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here: https://mikebh.link/fntdpv

SSS TASK TEAM:

Copyright © 2015- PRESENT | Mike Bolhuis Specialised Security Services | All rights reserved.


Our mailing address is:

Mike Bolhuis Specialised Security Services

PO Box 15075 Lynn East

Pretoria, Gauteng 0039

South Africa

Add us to your address book


THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.

CONTACT US

Pretoria, 75 Wapad, Leeuwfontein Estate, Roodeplaat, 0186, South Africa

​​

E-mail: mike@mikebolhuis.co.za
Mobile: 082 447  6116
International: +27 82
447 6116
Fax: 086 585 4924

  • Instagram
  • Facebook
  • YouTube
  • TikTok
chat with mike bolhuis on whatsapp

Thanks for submitting!

Copyright © mikebolhuis.co.za

MLB DIENSTE CC Reg: 1995/036819/23

PSIRA Reg: 1590364/421949

Web design by Mike Bolhuis Cybercrime Unit

bottom of page