• October 13, 2024
  • Last Update July 1, 2024 6:17 PM
  • Nairobi

DCI asks public for help to arrest suspect behind internet fraud

DCI asks public for help to arrest suspect behind internet fraud

By Patricia Mollyne Mataga

The Directorate of Criminal Investigations (DCI) has sought for the help of members of the public in ongoing search for a man accused of hacking into a mobile app and stealing huge sums of money.

In a statement on their social media pages, the DCI named the suspect we Kevin Kiprono.

They accuse him of being behind an incident reported at Parklands Police Station.Kiprono was arrested but later released on police cash bail, only for him to vanish.

A warrant of arrest has since been issued against him.

“Kevin Kiprono, whose photo is attached, is wanted by DCI Serious Crime Unit being a suspect in a case of Impersonation and Unauthorized access to computer system reported at Parklands Police Station,” the DCI said in a statement.

“A warrant of arrest is in force for Kevin Kiprono, who, having been released on a police cash bail on December 19, 2023 pending completion of investigations, failed to report on the compelled date,” it added.

The police say in the case, the suspect is alleged to have hacked a mobile money application after which he withdrew huge sums of money.

Details of the incident however remain scanty.

A few weeks ago, a man took to social media to narrate how his M-Pesa App was hacked and over Ksh2,000 irregularly withdraw.

It is not clear if the incident related to the one the police are looking for the suspect.

The DCI has asked for help from Kenyans that would lead in Kiprono’s arrest and prosecution.

“Should you have any information that may assist in his arrest, Fichua kwa DCI by dialing 0800 722 203 or report to a police officer or any police station,” read part of the police statement.

“Equally, should this post be received by Kevin Kiprono, you are hereby ordered to present yourself to any police station for further legal action,” it added.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *