Six arrested for corruption and money laundering

The HAWKS arrested six suspects employed at the Department of Education in Bushbuckridge.

READ |SASSA fraudsters convicted for defrauding agency

They handled payments of ex-employees and deceased beneficiaries. The primary suspect, Nomthandazo Khoza, allegedly colluded with Error Mosibudi by creating fraudulent beneficiaries of late employees. They made the payments to their relatives’ bank accounts, causing an actual loss to the amount of R 3 010 475.44 to the Department.

“The police seized four vehicles for further investigation. We charged and took the accused to Bushbuckridge Magistrate Court for first appearance. They set the bail application for Khoza at R15 000,” read the statement.

ALSO READ | Immigration officials arrested at Lebombo Port of Entry

Accused number four and six received bail amount of R5000 each. Accused numbers two, four and five were released on R3000 each.

1. Nomthandazo Delsie Khoza (41)

2. Error Mosibudi Makutu (45)

3. Patrick Ngobeni (40)

4. Themba Confidence Khoza (42)

5. Musa Brandon Mathebula (43)

6. Portia Khoza (44), on warrants of arrests for 117 counts of fraud, corruption and money laundering.

Related articles

Teen rapist handed three life sentences

He was out on bail in December 2020 when he pointed two friends with a knife.

Sizwe Nyambi’s shooter sought by police

The victim was swiftly transported to a nearby hospital for medical treatment and is fighting for his life though he is receiving the necessary care.

Two women scammed for bogus jobs

Another lady who works at a local retail company was also defrauded R50 000 by the same suspect. Both women opened a case at the Elukwatini police station on September 25.

Five Mozambican nationals arrested for highjacking and murder of Head Of Communication

After he was reported missing at Kwamhlanga Police Station, the tracking company was also notified. This led to his vehicle's discovery near a fuel station in Witbank.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

The reCAPTCHA verification period has expired. Please reload the page.