PLEASE SHARE THIS PUBLIC DOCUMENT
Specialised Security Services handles numerous cases involving unsuspecting individuals who fall victim to data breaches, scams, and identity theft. Mr Mike Bolhuis, a specialist investigator in severe violent crime, economic crime, and cybercrime,
is committed to educating the public, emphasising that crime prevention should be a
priority of each citizen and a shared responsibility.
Data breaches, scams, and identity theft in South Africa, as in most places, follow certain patterns.
HOW THESE CRIMES OCCUR:
DATA BREACHES:
STEP 1: IDENTIFYING VULNERABLE TARGETS
Cybercriminals target organisations or individuals that store valuable personal information (e.g., banks, retailers, government agencies).
Common vulnerabilities include weak passwords, outdated software, or unsecured networks.
STEP 2: EXPLOITING VULNERABILITIES
Hackers use methods like phishing, malware, ransomware, or brute force attacks to breach systems.
For example, an employee might unknowingly click a malicious link, giving hackers access to sensitive data.
STEP 3: EXTRACTING DATA
Once access is gained, hackers download sensitive information such as ID numbers, bank details, passwords, or medical records.
In South Africa, compromised information might include ID numbers, driver's license details, or financial records.
STEP 4: SELLING OR USING THE DATA
Breached data is sold on the dark web or used for further crimes, like fraud or identity theft.
SCAMS:
STEP 1: PLANNING THE SCAM
Scammers often target victims through phishing emails, fake websites, social media ads, or unsolicited phone calls.
Popular scams in South Africa include fake job offers, advance-fee fraud (e.g., "419 scams"), and online shopping scams.
STEP 2: GAINING THE VICTIMS TRUST
Scammers pretend to represent trusted entities like banks, government agencies (e.g., SARS), or legitimate businesses.
They create urgency (e.g., "Your account will be frozen") or appeal to greed (e.g., "You've won a prize").
STEP 3: OBTAINING PERSONAL INFORMATION OR PAYMENT
Victims are manipulated into sharing personal details (like banking info or ID numbers) or making payments.
Common methods include directing victims to fake login pages or requesting payment for non-existent goods/services.
STEP 4: DISAPPEARING
Once the scam succeeds, scammers quickly disappear, preventing victims from recovering their losses.
IDENTITY THEFT:
STEP 1: GATHERING PERSONAL INFORMATION
Criminals obtain personal data through data breaches, phishing, social engineering, or physical theft (e.g., stealing documents).
South African IDs, passports, or driver's licenses are often key targets.
STEP 2: USING STOLEN INFORMATION
Criminals use the stolen details to impersonate victims.
Examples include applying for loans, opening bank accounts, or committing crimes under the victim's name.
STEP 3: EXPLOITING THE IDENTITY
Fraudulent transactions are carried out, leading to financial loss or legal issues for the victim.
Identity theft can severely impact a victim's credit score and reputation.
STEP 4: COVERING TRACKS
Criminals abandon or sell the stolen identity to others after having profited from it.
COMMON TOOLS AND METHODS USED BY CYBERCRIMINALS:
PHISHING:
Fake emails, messages, or calls trick victims into revealing sensitive information.
SOCIAL ENGINEERING:
Manipulating victims to bypass security protocols.
SKIMMING DEVICES:
Installed on ATMs or other POSs (Point of Sale) to capture card details.
SIM SWAPS:
Fraudsters take over phone numbers to intercept OTPs (One-Time Pins) for bank accounts.
RANSOMWARE:
Locking systems and demanding payment to restore access.
HOW TO PROTECT YOURSELF:
Never share personal information over the phone or email unless you initiated contact.
Use strong passwords, enable two-factor authentication, and update software regularly.
Regularly check bank statements and credit reports for unauthorised activity.
Contact organisations directly to confirm requests or alerts.
Shred and dispose of documents containing sensitive information.
South Africa has laws like the POPIA (Protection of Personal Information Act) that regulate how personal data is handled,
but individual caution is crucial to minimise risk.
Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Channel.
This channel is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.
How to Join the WhatsApp Channel:
1. Make sure you have the latest version of WhatsApp on your device.
2. Click on the link below to join the Mike Bolhuis Daily Projects WhatsApp Channel:
3. Follow the prompts to join the channel.
4. Make sure you click on "Follow", then click on the "bell"-icon (🔔)
CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.
ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.
Regards,
Mike Bolhuis
Specialist Investigators into
Serious Violent, Serious Economic Crimes & Serious Cybercrimes
PSIRA Reg. 1590364/421949
Mobile: +27 82 447 6116
E-mail: mike@mikebolhuis.co.za
Fax: 086 585 4924
Follow us on Facebook to view our projects -
EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.
STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.
POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here: https://mikebh.link/fntdpv
SSS TASK TEAM:
Copyright © 2015- PRESENT | Mike Bolhuis Specialised Security Services | All rights reserved.
Our mailing address is:
Mike Bolhuis Specialised Security Services
PO Box 15075 Lynn East
Pretoria, Gauteng 0039
South Africa
Add us to your address book
THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.
Comentarios