Index Company profile Initial project overview Successes since commencement of project Introduction to CPHA Modus operandi – Plant losses Modus operandi.

Slides:



Advertisements
Similar presentations
Barhale Procedure for Site Establishment
Advertisements

Customer Relation Management System Multi Environment Solutions.
© Annie Patton Credit Cards One of the most popular forms of credit Next Slide.
A business makes payments for what it buys, In return it receives payments for goods it sells or services it provides.
MoneyWi$e: Good Credit Good Credit Money Wi$e –A joint financial education project of Consumer Action and Capital One.
Intelligent Utilities Intelligent Utilities Intelligent Utilities Intelligent Utilities Intelligent Utilities Intelligent Utilities Intelligent Utilities.
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Accident Incident Policy Changes to Policy September 2007.
Company LOGO A Property Management Proposal Prepared for (Client Name and Property)
Banking Elder Abuse and Exploitation. Consider the following when determining whether an older adult may be in jeopardy: Is there more than one person.
VISIBLE POLICING PROPOSAL SECTOR POLICING / VISIBLE POLICING PRESENTATION TO ALEXANDRA COMMUNITY POLICE FORUM Alexandra Police Station Wednesday 24 July.
BATTALION OPERATIONS SECURITY SERVICES 20 Thornton Road, Krugersdorp, South Africa Registration No: 2012/117366/07 PSIRA No: Tel:
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up © 2009.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Export Freight Forwarding Services Conventional Freight Forwarding Services. Export Freight Management and Systems. Export Regulations and Compliance.
Golden Loans Now ABOUT US GETTING STARTED CONTACT PRIVACY POLICY STOCK LIST VEHICLE LOCATERS ► Competitive finance handled by experienced staff finance.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
SUMMER WORK AND TRAVEL Program Orientation. Welcome Welcome to CENET: Cultural Exchange Network’s Summer Work and Travel Program. I would like to take.
A Good CREDIT Welcome to MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP Build it and keep it © 2011.
Learning About Credit Advantages and Disadvantages.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
Chief Executive Office Risk Management RETURN TO WORK Unit
Personnel Management SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Credit Cards One of the most popular forms of credit Next Slide.
Main Building Blocks of National Legislation: Graham Zebedee, Head, Export Control Policy Section, Foreign & Commonwealth Office, United Kingdom.
ICT in Banking.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
For Real Estate Agents Farming Equipment Heavy Equipment Real Estate Motor Vehicles.
Hawk card (ID) Higher One card Hawk Card Vs. HigherOne card.
Advertising. Why Advertise? To generate funds To give others information about products and services they want and will use To improve your advertiser’s.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Fraudulent Hires. FRAUDULENT HIRES Background Pre Hire Checks Claims Examples Summary.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
PROPERTY MARKET IN UK These days after credit crunch property market in UK isn't in great shape. With bank tide up lending criteria month by month, large.
Department of Building and Housing Improvements to the way we provide our Service – and how you can help.
BIBA Personal Lines Administration Scheme Administered by Equity Direct Broking Ltd
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Pittsburgh Alliance for Response Risk Management, Loss Control & Insurance February 2009.
Getting Started… We‘ve put together, with the assistance from a Procurement Technical Assistance Center (PTAC) some help with required registrations you’ll.
Protecting Your Assets By Preventing Identity Theft 1.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
BUYING FROM HOME The Consumer’s Guide to buying by Mail, Telephone or Internet More and more people are buying goods and services direct from their homes.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
Big Problems with an Expired Green Card U.S. Immigration Center.
FIBER OPTIC INTERNET Tierzero has been serving businesses in Southern California since 1997.
Williamsburg County Williamsburg County Assistance available to Citizens impacted by the 2015 Flood.
Flagler County Sheriff’s Office “Lock it or Loose it Campaign” Sheriff James L. Manfre.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
Response to an Emergency Training for 211 Staff in Ontario Updated September
Safeguard Security Group Company Profile
Page 1 IRU CONFERENCE THE ROAD TO SUCCESS: EURO-ASIAN FREIGHT MARKET Challenges and Opportunities Warsaw, June 2007 Security in Euro-Asian Road Transport:
Protecting Your Assets By Preventing Identity Theft
One of the most popular forms of credit
Incident Reporting And Investigation Program
Business Partner Screening
NCA & FICA A brief overview Barry Robela.
Training Appendix Revised January 2018.
When you get caught for Identity Theft
Protecting Your Credit
The new data protection rules
Clemson University Red Flags Rule Training
Protecting Your Credit Identity
Presentation transcript:

Index Company profile Initial project overview Successes since commencement of project Introduction to CPHA Modus operandi – Plant losses Modus operandi – Plant hire & equipment Networking is VITAL Hot spot areas Precautions on site Contact Details

Company Profile John Pearson and Associates (Pty) Ltd was established in 2006 to provide a pre-eminent loss adjusting and surveying business throughout sub-Saharan Africa. Our expertise in Loss Adjusting is complimented by first class investigative and intelligence services specializing in all Jewellers Block, Specie and other crime related business.

Initial Project Overview After dealing with numerous truck losses on behalf of Zurich Insurance Company South Africa Ltd and other insurance companies, we felt that something needed to be done to try and recover some of the vehicles stolen, rather than simply dealing with the circumstances surrounding the loss and adjusting the Insured's claims. No recoveries were being made. We discussed a potential project with Zurich Insurance Company South Africa Limited and with their consent, we were assigned two broking companies within the Gauteng region to run a trial project. We requested they inform their clients to advise us of a loss as soon as possible when it occurred so that we could activate our informers to attempt to locate the whereabouts of the stolen vehicle.

Initial Project Overview (Continued) We respectfully request that brokers communicate our initiative with their clients and emphasize the importance of informing our office as soon as possible after a loss has been discovered. Once the information has been obtained, we immediately notify all of our contacts throughout South Africa, informing them of the loss so that observations can be made along various routes leading to known borders with neighbouring countries. On receipt of a notification, we immediately dispatch an investigation team to the site where the loss has occurred in order to record a statement from the driver or site manager and to obtain additional information.

Successes since commencement of Project

Introduction to CPHA (Contractors Plant Hire Association) COMPOSITE INSURANCE BROKERS t/a REEF INSURANCE & ZURICH INSURANCE COMPANY SOUTH AFRICA LTD As a result of the initiative between John Pearson & Associates and Zurich South Africa, we were introduced to Reef Insurance Brokers who assisted us during the trial period. As a result of our successful recovery rate, Mr Slater believed our expertise could also be utilised to assist the CPHA members.

Modus Operandi – Plant Losses NEW CONTRACTS (BORROW INSTEAD OF BUY) As a result of the massive expansion projects within South Africa, a number of new contracts have been issued to various established and newly established companies. Due to these new contracts, many newly established companies purchase relatively cheap plant equipment without performing proper checks on the vehicles history. These individuals purchase these vehicles without consciously knowing that they have been stolen.

Modus Operandi – Plant Losses (Continued) NEIGHBOURING COUNTRIES Due to the increased exposure of Africa as a continent, a number of plant vehicles are being stolen from South African and moved into neighbouring countries north of our borders. We believe Botswana and Mozambique are currently being used as transport routes through to the remainder of the African continent. Once these vehicles are smuggled through our borders, the criminals sell these plant vehicles on to unsuspecting buyers. The projects aim is to close down our border posts to ensure these vehicles cannot leave the country illegally.

Modus Operandi – Plant Losses (Continued) COMPETITIVE EDGE We believe that some companies are extremely competitive. Due to the nature of their business these companies deliberately sabotage their competitors in order to increase their own productivity and wealth. Arranged hijackings and malicious damage incidents often occur.

Modus Operandi – Plant Hire & Equipment ARTICLE (Published in Hire SA – February 2009, page 18) Criminals perform ITC checks on construction companies. This allows them access to privileged information e.g. banking details, addresses and names and identification numbers of the companys directors. The suspects contact a plant hire company via cellular telephone requesting the use of one or more of their plant vehicles. An application form is faxed to the suspect for completion. The legitimate company details are then filled in and the form is faxed back to the plant hire company.

ITC checks are performed on the proposed company. Once clear, the individual is contacted and arrangements are made to deliver the machine / vehicle. Once the machine has been delivered the individual cuts off all communication with the plant hire company. The plant hire company later realises that they have been caught in a scam once they cannot reach the individual on any of the numbers provided.

WHAT CAN YOU DO TO HELP PREVENT THIS TYPE OF LOSS? Obtain two forms of identification such as a valid drivers licence and credit card in the same name. Photocopy of a valid drivers licence should be obtained. Always get the rental contract signed and retain the signed copy Take a photograph or video of the customer during the transaction Do not rent to new customers who want several pieces of equipment that dont fit the job described. Do credit checks and make contact with the management of the company they say they represent. Ensure that your insurance is correctly structured and values are adequate. It makes financial sense to safeguard valuable plant and machinery and to seek specialist advice to insure them correctly

Modus Operandi – Plant Hire & Equipment (Continued) TRACK & TRACE (INVESTIGATIONS) As a result of our discussions with Mr Slater, we understand there is a need for an investigation team to assist plant hire and equipment companies to trace equipment that is not being returned. We have involved an Investigator who purely deals in Track and Trace Investigations who we believe could assist in locating these individuals. We are in discussions with this individual on how best to deal with this type of loss and once a suitable solution has been agreed, we will send a formal letter to the CPHA for further consideration.

Networking is VITAL We currently have contacts with: Officials assigned to various weighbridges Officials manning border posts Flying Squad members Hijacking Unit members Station Commanders (SAPS) Investigators Individuals at Toll Plazas Whenever suspicious activity occurs drivers should be taught to hide their cellular telephones within the mechanical horse. We can then trace this cell phone number inside the vehicle until such a time as it is located by the suspects and deactivated.

Hot spot Areas Due to the increasing number of construction work taking place throughout South Africa, it has been noted that plant losses have increased sharply over the past few months. Syndicates and individuals involved in this type of crime must be identified and monitored in order to reduce the losses.

Precautions on Site It would be in the contractors interest to employ their own security guards rather than guards from other security companies. We would suggest full background checks be done on these guards to ensure that they are not wanted or suspected of involvement in any previous crimes. We believe that the majority of losses which occur on site are as a direct result of internal information being leaked to various syndicates. We suggest contractors focus more attention on the security guards employed to ensure they can be trusted fully.

Precautions on Site (Continued) Site areas should be fenced off, well lit and guard dogs should be utilised after hours. Access into and out of the yard should be controlled by one of the contractors personnel rather than the security guard. We would suggest the guard be furnished with adequate communication tools to alert individuals if a suspicious situation arose.

Contact details John Pearson & Associates (Pty) Ltd have been actively involved in investigating this type of loss for many years and have recovered a number of vehicles utilizing the contacts and agents at our disposal. We have a good relationship with senior individuals within the South African Police Services and often share information which has lead to a number of arrests and recoveries. We are in the process of visiting various outlying areas to expand our network with the aim of assisting you and your clients in recovering vehicles following any future hijacking or theft incident. We are available on our cellular telephones 24/7.

Contact details (Continued) We are contactable on: Office: (Tel) (Fax) John Pearson: Richard Pearson: Scott Archer: Jean Pitout: Ayésha Addinall: (Secretary to R Pearson) We look forward to being of assistance to you and your clients.

Thank You