Home | News | 6 ARRESTED FOR E20M CENTRAL BANK FRAUD

6 ARRESTED FOR E20M CENTRAL BANK FRAUD

Font size: Decrease font Enlarge font

MBABANE – Six people, including two suspended employees and a former employee of the Central Bank of Swaziland (CBS), have been arrested in connection with the E20 million fraud at the bank.


They are facing a total of 16 counts of fraud.
Initially, the stolen amount was known to be E7.5 million but the investigations, which led to the arrest of the six, have revealed that it was E20 million. This amount includes attempted transfers, which were discovered during the investigations


Some of those arrested are Sipho Anthony Mkhabela of Luyengo (currently on suspension), Jabulani Ronny Dlamini of Zakhele, and Nompumelelo Thabile Ginindza, who was dismissed from work after a disciplinary hearing.


The three were arrested by a joint team consisting of members of the Royal Swaziland Police (RSP) and officers from the Anti - Corruption Commission (ACC). The other three were arrested in South Africa and details of their arrests were scanty at the time of compiling this report. The suspects who were arrested in the kingdom made a brief court appearance yesterday before Mbabane Principal Magistrate Fikile Nhlabatsi.

During their appearance, Ginindza and Mkhabela informed the court that they would seek services of lawyers to represent them while Dlamini said he would conduct his own defence. “The accused are informed that they have a right to apply that they be admitted to bail but are also advised to move their application at the High Court. 

They are remanded in custody until August 5, 2016 pending their committal to the High Court,” said the principal magistrate. It is alleged that on different dates in 2013, the accused, acting jointly and/or in concert with each other and with other persons, unlawfully, directly or indirectly, in person or through an agent, falsely defrauded the bank by processing payment instructions to different foreign banks.

Comments (0 posted):

Post your comment comment

Please enter the code you see in the image: