Kenya: DCI nabs suspect in Ksh100 million sugar import fraud case

Nairobi, Kenya: On Wednesday, detectives from the Directorate of Criminal Investigations (DCI) arrested a key suspect involved in a fraudulent scheme that defrauded four businesspersons of over Ksh100 million through a fake sugar import deal.

According to a statement from the DCI, the 46-year-old suspect was taken into custody after a thorough investigation into the scam, which is believed to have occurred between May and October 2023.

Investigators found that the suspect, along with several accomplices, deceived the victims into paying money intended for the importation of 15,000 bags of sugar from Brazil.

The four businesspersons had transferred a total of Ksh100 million through five different bank accounts, expecting the delivery of the sugar as agreed.

However, the supposed importers failed to deliver the goods, causing alarm among the victims. The fraudsters had managed to maintain communication for several months before disappearing without a trace, leaving the businessmen unable to contact them.

At that point, the victims sought assistance from the DCI to help recover their lost funds.

The Operation Support Unit initiated a probe into the matter and compiled a detailed report, which was forwarded to the Office of the Director of Public Prosecutions (ODPP).

Following the report, the ODPP authorized the arrest of the suspects and recommended eight charges, including obtaining money by false pretences—an offence under Section 313 of the Penal Code.

According to the media report, the primary suspect was arraigned at the Milimani Law Courts on Wednesday, where he pleaded not guilty. He was released on a bond of Ksh3 million or a cash bail of Ksh500,000 as he awaits trial. Meanwhile, efforts to locate the remaining suspects are ongoing.

This incident adds to a growing trend of fraud cases targeting unsuspecting businesspeople in the country, with foreign investors often being the most affected.

 

LEAVE A REPLY

Please enter your comment!
Please enter your name here