top of page
griffin jd.jpg

PROJECT: THE ROLE OF CYBERCRIME IN KIDNAPPINGS

  • isabels39
  • May 21
  • 4 min read

PLEASE SHARE THIS PUBLIC DOCUMENT

In today's digital age, the nature of crime has evolved.

While many still associate cybercrimes with scams and fake social media accounts, its reach extends far deeper,

impacting even the planning and execution of serious crimes such as kidnappings.

LISTEN TO THE FOLLOWING INTERVIEWS WITH MR. ANTHONY BOUCHER AS GUEST SPEAKER.

MR. BOUCHER IS THE HEAD OF THE SSS SPECIALIST CYBERCRIME TEAM.



CYBERCRIME: MORE THAN JUST ONLINE SCAMS

  • Cybercrime is no longer limited to phishing emails or fake profiles.

  • Criminals now use digital tools and platforms to plan, coordinate, and carry out crimes with alarming precision.

  • Before a kidnapping occurs, perpetrators often engage in extensive digital surveillance.

  • They gather information about their targets using messages, calls, photos, videos, and social media content.

  • In many cases, the same systems used by law enforcement to uphold security are exploited by criminals to track and monitor victims.

SURVEILLANCE AND DATA GATHERING:

  • Kidnappers may use corrupt contacts to gain access to road cameras and tracking systems to monitor the daily routines and movements of their intended target.

  • They collect personal data—addresses, contact details, bank accounts, asset records, and firearm ownership—well before an abduction occurs. This detailed reconnaissance allows them to assess risk and plan the operation thoroughly.

  • Social media is a primary source of intelligence.

  • Public profiles often reveal addresses, workplaces, vehicles, lifestyle habits, and connections.

  • Photos and videos may unintentionally disclose sensitive background information, making users vulnerable to targeted attacks.

THE IMPORTANCE OF PREPAREDNESS:

  • Despite the prevalence of these threats, very few individuals are adequately prepared for the possibility of abduction.

  • Key steps include:

    • EMERGENCY ALERTS:

      • Have a way to notify someone immediately if you are in danger.

      • Pre-programmed emergency apps or alert systems can save critical time.

    • TRUSTED CONTACTS:

      • Designate someone who knows how to act in an emergency—who to contact, what information to provide, and how to remain calm under pressure.

    • ACCESS TO CRITICAL INFORMATION:

      • Ensure a trusted person can access your passwords, tracking systems, banking details, and other digital assets.

      • Without this, even trained investigators are delayed by privacy laws and security protocols.

    • DIGITAL CONTINGENCY PLANS:

      • Remember that in a crisis, your phone may be confiscated or destroyed.

      • Systems should be in place that do not rely on the victim’s response.

CHALLENGES IN THE RECOVERY PROCESS:

  • When a kidnapping occurs, authorities and security professionals often face delays owing to data protection barriers.

  • Without a case number or court order, critical information from banks, cell phone providers, or tracking companies may be inaccessible.

  • This loss of time may be fatal.

  • Moreover, criminals are increasingly tech-savvy.

  • They know how to disable tracking, avoid cameras, and remove SIM cards to remain undetected.

  • In such cases, conventional self-defence tools are rendered useless if the crime is digitally executed and remotely coordinated.

Cybercrime now plays a central role in the orchestration of kidnappings.

Over 80% of these crimes involve digital planning and tools. Preparation must therefore be both physical and digital.

It is no longer enough to be armed; one must also be digitally aware and ready.

Every individual should have a designated "go-to" person - someone with access to vital information and

the authority to act swiftly when things go wrong.

This kind of preparation can drastically increase the chances of survival and successful recovery. 

In today’s world, cybercrime is as dangerous as any weapon.

Awareness, preparation, and responsible digital behaviour are the most effective tools we have to keep us safe.

Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Channel.

This channel is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.


How to Join the WhatsApp Channel:

1. Make sure you have the latest version of WhatsApp on your device.

2. Click on the link below to join the Mike Bolhuis Daily Projects WhatsApp Channel:

3. Follow the prompts to join the channel.

4. Make sure you click on "Follow", then click on the "bell"-icon (🔔)

CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.

ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.

Regards,

Mike Bolhuis

Specialist Investigators into

Serious Violent, Serious Economic Crimes & Serious Cybercrimes

PSIRA Reg. 1590364/421949

Mobile: +27 82 447 6116

Follow us on Facebook to view our projects -


EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.


STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.


POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here: https://mikebh.link/fntdpv

SSS TASK TEAM:

Copyright © 2015- PRESENT | Mike Bolhuis Specialised Security Services | All rights reserved.


Our mailing address is:

Mike Bolhuis Specialised Security Services

PO Box 15075 Lynn East

Pretoria, Gauteng 0039

South Africa

Add us to your address book


THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.

Comments


CONTACT US

Pretoria, 75 Wapad, Leeuwfontein Estate, Roodeplaat, 0186, South Africa

​​

E-mail: mike@mikebolhuis.co.za
Mobile: 082 447  6116
International: +27 82
447 6116
Fax: 086 585 4924

  • Instagram
  • Facebook
  • YouTube
  • TikTok
Mike Bolhuis WhatsApp contact

Thanks for submitting!

Copyright © mikebolhuis.co.za

MLB DIENSTE CC Reg: 1995/036819/23

PSIRA Reg: 1590364/421949

Web design by Mike Bolhuis Cybercrime Unit

bottom of page