Our drive towards excellence
obliges us to design a specific package tailored for each client
Our drive towards excellence
obliges us to design a specific package tailored for each client

Close Protection / Bodyguard

Our Close Protection Officers (bodyguards) are highly trained to adapt and deal with any situations that might put our clients at risk. Continued training, professionalism, passion and intelligence support allow us to ensure that our clients are comfortable and can focus on their daily productivity. We also have a number of B4 & B6 Armoured vehicles available on request.

Kidnap & Ransom (K&R)

New technology and intelligence provides us with the capability to keep our clients out of harm’s way in the face of ever-rising risks of kidnapping.

Anti Poaching

Investigations & Intelligence

State of the art technology combined with experienced operatives provides our clients with detailed reports on the requested information.

Risk & Threat Analysis

Attention to detail with highly experienced eyes provides our clients with in-depth assessment for corporate or individual risk, combined with health and safety regulations.

Special Events & Venue Security

Preventive strategic measures, health and safety with intelligence led operations to ensure minimum risk.

Surveillance & Background Checks

Knowing the potential risk to the client, this service is conducted in a professional, discreet and confidential manner.

Tracking & Monitoring

The latest technology provides cost saving tracking for human and an all in one fleet management solution, wireless live monitoring and alarms with rapid armed response.

Static Guards

PSiRA registered and trained guards with clear polygraph results and back-ground checks can be placed on-site, nationwide.

Polygraph Testing

A polygraph is a highly accurate tool used by governments and police departments around the world. With a documented accuracy rate of 95 percent and above, the polygraph test is a highly effective tool to uncover the truth, confirm or reject information/statements.

Helicopter Charter

Helicopter charter and support services, including our newest addition the Bell 407 GXP with only 300 hours of flying. Reliable, safe and suitable for VIPs and Diplomats.

Training

Subjects that we provide are:
  • Security Awareness
  • Hijack Avoidance
  • Armed Robbery Management
  • Hostage Survival
  • Simulation Exercises simulating the above in a realistic, but safe session.

Explosive Detection Dogs

Patrol/Protection Dogs: In limited circumstances we can supply suitably trained protection dogs on an ad hoc basis. In certain cases, the same canines that are deployed for EDD will also fulfill the protection role.

Trained Dogs: Upon request we can supply selected clients with trained dogs that is independently certified, or if required provide “green “dogs suitable for further training in mentioned disciplines.

 Forensic Investigations

Forensic scientists collect, preserve, and analyze scientific evidence during the course of an investigation. Investigations range from fraud to kidnapping as well as murder.

EXPANDED SERVICE

Fraud Management Services For Industries

Achilles, has a sophisticated fraud management platform leveraging advanced AI and machine learning capabilities, that can play a significant role in combating terrorist financing and ensuring compliance with anti-money laundering (AML) regulations. Here’s how we can contribute to the efforts against terrorist funding:

  1. Transaction Monitoring and Anomaly Detection: We can analyze financial transactions across various channels and detect anomalies that may indicate potential terrorist financing activities. Unusual patterns in transaction frequency, amounts, and sources can be flagged for further investigation.
  2. AML Compliance: We can assist financial institutions in adhering to AML regulations by automatically identifying and reporting suspicious transactions to the relevant authorities. This ensures that potential instances of terrorist financing are promptly addressed.
  3. Link Analysis and Network Mapping: The platform can analyze connections between individuals, organizations, and financial entities to uncover hidden links or networks associated with terrorist financing. By mapping out these relationships, authorities can better understand how funds are being moved.
  4. Behavioral Analysis: We can profile customer behavior and identify deviations from established patterns. Sudden changes in financial behavior or transactions that don’t align with a customer’s profile can trigger alerts for further investigation.
  5. Watchlist Screening: The platform can compare customer data against global watchlists that contain known individuals, organizations, and entities associated with terrorist activities. This helps prevent financial interactions with these entities.
  6. Transaction Source Verification: We can verify the legitimacy of transaction sources, ensuring that funds are not being channeled through shell companies or front organizations to finance terrorism.
  7. Cross-Border Transactions Monitoring: The platform can monitor cross-border transactions and identify suspicious fund flows that could potentially be used for terrorist financing. This includes tracking funds moving to or from high-risk jurisdictions.
  8. Data Fusion and Analysis: We can integrate data from various sources, including financial transactions, online activities, and communication patterns, to create a comprehensive view of potential risks and threats.
  9. Suspicious Activity Reporting: The platform can generate detailed reports on flagged activities, including transaction histories, account details, and behavioral patterns. These reports can aid investigators and regulatory bodies in their efforts.
  10. Constant Adaptation: Just as it adapts to evolving fraud schemes, it can also stay current with emerging trends in terrorist financing. Regular updates to algorithms and typologies ensure that the system remains effective against new tactics.
  11. Collaboration and Information Sharing: We can facilitate collaboration between financial institutions, law enforcement agencies, and regulatory bodies by providing a centralized platform for sharing information on suspected terrorist financing activities.

In summary, it can be a powerful tool in the fight against terrorist financing by leveraging its advanced capabilities to monitor, detect, and prevent suspicious financial activities that could be used to fund terrorism. Its ability to analyze large volumes of data, detect anomalies, and identify patterns of behavior makes it well-suited to support AML and counter-terrorism efforts.