PSIRA: 4394975
Specialised security services in an evolving world of Local, Regional, and Global Threats

In South Africa, those tasked with exposing corruption, fraud, organised crime, and governance failures are increasingly at risk not only professionally, but personally. Auditors, insolvency practitioners, forensic investigators, legal professionals, prosecutors, whistleblowers, and journalists are operating in an environment where accountability work can trigger intimidation, surveillance, and, in some cases, targeted violence.

“In some environments, accountability work no longer carries only professional risk, it carries personal risk too.”

Several high-profile incidents have brought this reality into sharper focus. The assassination of insolvency lawyer Bouwer van Niekerk in Johannesburg in 2025 highlighted the dangers associated with sensitive liquidation and corruption-related matters. This followed the 2023 killing of Cloete Murray and his son Thomas Murray, who were ambushed while travelling on a major highway, both linked to complex insolvency work connected to state capture. Earlier, in 2021, senior finance official Babita Deokaran was murdered outside her home after exposing major irregularities in public healthcare procurement. Taken together, these cases point to more than isolated tragedy, they suggest a persistent threat environment for people involved in scrutiny, enforcement, and financial accountability.

A further reported incident in March 2026, involving the fatal shooting of a female lawyer outside the CCMA offices in the Johannesburg CBD, reinforced the boldness with which some of these attacks are carried out. The attack reportedly took place in a busy legal precinct, underscoring that visibility, location, or routine public movement do not necessarily reduce risk where a person has been deliberately selected as a target.

What is particularly significant is the profile of the victims. These are not random victims of crime. They are often individuals whose roles place them close to financial flows, legal consequences, evidence trails, and institutional accountability. Their work may interrupt procurement fraud, expose corrupt relationships, support asset recovery, or strengthen prosecution pathways. In doing so, they can become obstacles to networks whose interests depend on silence, delay, or intimidation.

Importantly, this threat environment no longer appears confined to traditional investigators or law enforcement officials. It increasingly touches a wider accountability chain, including forensic auditors, insolvency practitioners, prosecutors, legal advisers, whistleblowers, and other professionals whose work can expose financial misconduct, enable enforcement, or disrupt corrupt networks. That widening of the target group is one of the clearest indicators that this is not simply an occupational hazard affecting a narrow category of professionals, but a broader pressure point on accountability itself.

From a security perspective, the pattern is notable. Across multiple reported incidents, there are recurring indicators: work-linked intimidation, targeted shootings, exposure during travel, and vulnerability at or near homes and workplaces. The presentation material also highlights an important point, threats and intimidation should not be dismissed as background noise. In many environments, they are early warning indicators that deserve structured assessment and active management.

Movement appears repeatedly as a point of exposure. A number of incidents have occurred while individuals were driving, arriving somewhere, departing from a known location, or moving along predictable routes. That matters because it suggests that routine, timing, and route familiarity can create opportunity for hostile surveillance and attack planning. Homes and workplaces are also recurring exposure points, likely because they are places where routines are easier to observe and security posture is often more static or relaxed.

In many targeted attacks, the vulnerability is not necessarily a lack of guarding, but the existence of a routine. Predictable routes, repeated arrival times, familiar meeting points, and exposed transitions between home, office, and case-related activity can all create opportunity. In security terms, routine often becomes visible pattern, and visible pattern can become exploitable risk.

It is also important to recognise that this type of risk rarely affects only the individual concerned. Families can become part of the exposure picture through known addresses, daily routines, school runs, social media visibility, and the emotional strain that sustained intimidation creates at home. For many professionals, the pressure of this threat environment is measured not only in personal risk, but in the extent to which it alters how their families live, move, and feel secure.

What the Pattern Shows

  • Work-linked intimidation
  • Targeted shootings
  • Travel as a recurring vulnerability
  • Home and workplace exposure
  • Threats as early warning signs

There are also wider implications. When professionals involved in investigations, compliance, restructuring, litigation, or financial oversight cannot operate safely, the effect is not limited to the individual. It weakens governance, undermines institutional confidence, and increases risk for the organisations and sectors in which they operate. For business, this has direct relevance. Companies operating in high-risk sectors, facing fraud matters, conducting sensitive investigations, or managing contentious legal and financial processes may not always recognise how quickly a governance issue can become a personal security issue.

The impact is also felt long before violence occurs. In many environments, threats, intimidation, and surveillance can alter behaviour well in advance of any attack. They can delay decisions, discourage reporting, reduce cooperation, and create hesitation around pursuing sensitive matters. In that sense, the objective is not always only physical harm, but also disruption, deterrence, and silence.

Investor confidence is also affected by this type of environment. Where people are targeted for performing legitimate oversight, questions arise around enforcement credibility, legal recourse, contract certainty, and the strength of the broader rule-of-law ecosystem. For both local and international stakeholders, the issue is not only crime, it is whether institutions and the people supporting them can function without coercion or fear.

Security Insight

The issue is no longer whether these risks exist, but whether organisations are structured to recognise and respond to them early enough.

From our perspective as a security company, one of the most important shifts is recognising that this risk cannot be addressed only after a threat has been made or an incident has occurred. Protection has to begin earlier. It starts with identifying which matters, roles, or case phases create elevated exposure. High-profile investigations, corruption-linked matters, organised crime intersections, sensitive handovers, enforcement activity, and court-related processes should all trigger closer security review.

Organisations also need practical systems, not just policy statements. Staff must know that every threat should be reported, every time. There must be clear escalation channels, accountable ownership, and the ability to obtain specialist support quickly. Threat assessment should be treated as a specialist function, one that helps distinguish between low-level noise and credible escalation, and that informs what protective measures are proportionate.

This is where many organisations misjudge the problem. Compliance measures, policies, reporting channels, and governance frameworks are important, but they are not the same as protection capability. Having a whistleblowing process or a code of conduct does not automatically mean an organisation can recognise escalation early, protect a high-risk employee, or respond effectively when warning signs emerge. Protection requires operational readiness, not only procedural compliance.

Protective measures should also be broader than traditional guarding. Effective protection may include threat and risk assessments, journey management, secure transport, residential security improvements, surveillance awareness, tighter control over schedules and case information, stronger digital hygiene, and support during high-risk operational phases. In some cases, surge protection during specific “hot phases” such as interviews, arrests, report handovers, or court appearances may be more realistic and more effective than static long-term measures.

Another key lesson is that organisational readiness matters. When an employee, investigator, lawyer, or executive receives a threat, the quality of the response depends heavily on whether the organisation already has a workflow, service providers, escalation authority, and reporting discipline in place. If these measures only start being assembled once a threat is active, valuable time is lost.

Ultimately, the targeted killing of professionals involved in exposing wrongdoing is not only a criminal justice concern, it is a governance and resilience issue. When the people responsible for enforcing standards, exposing misconduct, and protecting institutional integrity are intimidated or silenced, the impact extends far beyond the immediate victim. It affects trust, decision-making, accountability, and the ability of both public and private institutions to function effectively.

For organisations operating in complex or high-risk environments, the message is clear: personal security can no longer be separated from investigative, legal, and compliance work. Protecting people is now part of protecting governance itself.

What resilient organisations are doing

  • Recognising elevated-risk matters early
  • Taking threats seriously from the outset
  • Reducing predictability in movement and routines
  • Protecting sensitive information and limiting unnecessary exposure
  • Using specialist support when warning signs emerge
  • Having service providers, response plans, and decision-making authority in place before a threat becomes active
  • Building protection capability, not only compliance processes

Author: Gareth Katzew – CEO of NSA Security Consultants

Leave a Reply

Your email address will not be published. Required fields are marked *