DCI Breaks Silence, Exposes How Ksh60M Tender Scam Unfolded at Ruto’s Harambee House Office

Office of the President, Harambee House

The Directorate of Criminal Investigations (DCI) has detailed how a sophisticated multi-million shilling fraud scheme targeting foreign investors was executed inside Harambee House, leading to the arrest of seven suspects.

In a press statement issued on Friday, March 20, 2026, the agency dismissed what it termed as “misleading and sensationalized” media reports, clarifying that no serving government officials were involved in the elaborate scam.

According to investigators, the fraud dates back to January 10, 2026, when a foreign investor, Talal Yousef Yousef Zaitoun of Swedish firm Jokara AB, received an unsolicited WhatsApp message from an individual identified as Stanley Ndawula.

Ndawula later linked the investor to Geoffrey Were, who allegedly posed as a consultant working with government agencies. The suspects then lured the investor into what appeared to be a lucrative government tender involving the supply of 500 Toyota Hiace High Roof ambulances.

“The Directorate of Criminal Investigations (DCI) wishes to set the record straight and strongly refute misleading and sensationalized headlines and reports appearing in sections of the media, particularly The Standard, concerning the arrest of seven individuals at Harambee House on 10th March, 2026,” the statement reads in part.

“Key facts of the matter are as follows: Mr. On 10th March, 2026, DCI detectives, acting on credible intelligence, arrested seven suspects who had illegally accessed a boardroom on the 12th floor of Harambee House. The suspects were masquerading as officials from the Ministry of Interior, National Treasury, Ministry of Health and had lured two foreign nationals Talal Yousef Yousef Zaitoun, representing M/S Jokara AB (a Swedish company), and his brother Mr. Hatem Youssef Yousef Zaitoun into a fictitious government tender for the supply of 500 Toyota Hiace High Roof Ambulances.”

On January 26, the investor travelled to Kenya and was received at the airport before being escorted to Harambee House. With the help of an accomplice, the suspects facilitated unauthorized access into the building.

Inside, the victim was ushered into a boardroom and introduced to individuals posing as officials from the National Treasury and Ministry of Health. He was presented with forged documents, including fake prequalification certificates allegedly signed by senior government officials.

The fraudsters offered two “investment packages,” with the victim opting for a USD 110,000 deal for multiple business opportunities.

Investigations reveal that on January 30, the victim transferred USD 110,000 to an account belonging to a law firm in Kenya.

On February 11, an additional USD 360,750 was wired under the pretext of insurance costs, bringing the total amount lost to USD 470,750 (over KSh 60 million).

The suspects later demanded an additional USD 1.08 million, prompting the victims to return to Kenya for further negotiations—unaware that detectives were already tracking the scheme.

On March 10, DCI detectives moved in and arrested the suspects inside a boardroom on the 12th floor of Harambee House, where they had again arranged a meeting with the victims.

Those arrested include Geoffrey Were Odondi, Michael Musyoki Ngumbi, Kororia Simatwa, Evans Simotwo, Allan Muthaiga Kariuki, Munialo Jared Masinde, and Purity Njeri Njiami.

DCI said Njiami, a former public servant, played a key role in facilitating unauthorized access to restricted areas but held no current government position.

The suspects were arraigned at the Milimani Law Courts on March 16, where they faced multiple charges, including conspiracy to defraud, obtaining money by false pretenses, forgery, and money laundering.

They pleaded not guilty and were released on a bond of KSh 5 million each or a cash bail of KSh 300,000 with two sureties. Their passports were confiscated, and the case is set for mention on April 1, 2026.

Daily Trends:
Leave a Comment

This website uses cookies.