FIGHTING FRAUD IN THE GOVERNMENT GLOBAL HEADQUARTERS • THE GREGOR BUILDING 716 WEST AVE • AUSTIN, TX 78701-2727 • USA FIGHTING FRAUD IN THE GOVERNMENT TABLE OF CONTENTS I. INTRODUCTION TO GOVERNMENT FRAUD Course Introduction ................................................................................................................................................. 1 Overview of Government Fraud ............................................................................................................................ 2 Definition of Government Fraud ......................................................................................................................... 2 The Impact and Significance of Government Fraud .................................................................................... 2 Video .................................................................................................................................................................... 3 The Public’s Perception of Government Organizations .............................................................................. 3 Factors Leading to Government Fraud .......................................................................................................... 3 Victims of Government Fraud ............................................................................................................................... 5 Why People Commit Fraud..................................................................................................................................... 5 Video .................................................................................................................................................................... 6 Video .................................................................................................................................................................... 8 Who Commits Government Fraud? ....................................................................................................................12 Types of Government Fraud ................................................................................................................................15 II. OCCUPATIONAL FRAUD BY GOVERNMENT EMPLOYEES Introduction .............................................................................................................................................................17 Asset Misappropriation: Cash Schemes...............................................................................................................17 Cash Larceny.....................................................................................................................................................18 Skimming Schemes ..........................................................................................................................................19 Video ..................................................................................................................................................................21 Fraudulent Disbursements..............................................................................................................................24 Video ..................................................................................................................................................................25 Video ..................................................................................................................................................................27 Video ..................................................................................................................................................................30 Video ..................................................................................................................................................................31 Asset Misappropriation: Noncash Schemes........................................................................................................31 Misuse of Noncash Government Assets and Resources ...........................................................................32 Theft of Noncash Assets ................................................................................................................................32 Inventory Theft and Inventory Shrinkage ....................................................................................................34 Video ..................................................................................................................................................................34 Fraudulent Statements in Nonfinancial Matters.................................................................................................36 Internal Control Weaknesses..........................................................................................................................37 Red Flags of Fraudulent Statements in Nonfinancial Matters ..................................................................37 Prevention of Fraudulent Statements Concerning in Nonfinancial Matters ...........................................37 Review Questions ...................................................................................................................................................39 III. PUBLIC CORRUPTION Introduction .............................................................................................................................................................43 Corruption Data from the 2016 Report to the Nations .........................................................................................43 Types of Corruption Schemes ..............................................................................................................................44 Bribery ...............................................................................................................................................................44 Kickbacks ..........................................................................................................................................................45 Fighting Fraud in the Government i FIGHTING FRAUD IN THE GOVERNMENT III. PUBLIC CORRUPTION (CONT.) Video ..................................................................................................................................................................46 Illegal Gratuities ...............................................................................................................................................46 Economic Extortion ........................................................................................................................................46 Undisclosed Conflicts of Interest ..................................................................................................................47 Video ..................................................................................................................................................................47 Video ..................................................................................................................................................................49 Breach of Loyalty .............................................................................................................................................49 Methods of Making and Concealing Corrupt Payments ...................................................................................49 Video ..................................................................................................................................................................50 Gifts, Travel, and Entertainment ...................................................................................................................50 Video ..................................................................................................................................................................50 Cash Payments..................................................................................................................................................50 Checks and Other Financial Instruments .....................................................................................................50 Hidden Interests ...............................................................................................................................................50 Loans ..................................................................................................................................................................51 Credit Cards ......................................................................................................................................................51 Transfers Not at Fair Market Value ..............................................................................................................51 False Transfers..................................................................................................................................................51 Promises of Favorable Treatment .................................................................................................................51 Video ..................................................................................................................................................................52 Red Flags of Corruption ........................................................................................................................................52 Red Flags of Corrupt Employees ..................................................................................................................52 Red Flags of Corrupt Third Parties ...............................................................................................................52 Internal Control Red Flags of Corruption ...................................................................................................53 Corruption Risk Factors ........................................................................................................................................54 Internal Corruption Risks ...............................................................................................................................54 External Corruption Risks ..............................................................................................................................54 Video ..................................................................................................................................................................55 Laws Prohibiting Public Corruption ....................................................................................................................55 U.S. Laws Prohibiting Corruption .................................................................................................................55 Video ..................................................................................................................................................................60 Video ..................................................................................................................................................................61 The United Kingdom Bribery Act .................................................................................................................63 International Anti-Corruption Initiatives .....................................................................................................66 Preventing and Detecting Public Corruption .....................................................................................................68 Anti-Corruption Policies and Procedures ....................................................................................................70 Use of Corruption Risk Assessments............................................................................................................70 Internal Controls to Prevent Corruption......................................................................................................71 Periodic Testing and Review ..........................................................................................................................72 Review Questions ...................................................................................................................................................74 IV. PROCUREMENT FRAUD Introduction .............................................................................................................................................................77 Basics of Contract Law ..........................................................................................................................................77 Elements of a Contract ...................................................................................................................................77 Breach of Contract ...........................................................................................................................................78 Methods of Procurement.......................................................................................................................................78 ii Fighting Fraud in the Government FIGHTING FRAUD IN THE GOVERNMENT IV. PROCUREMENT FRAUD (CONT.) Video ..................................................................................................................................................................79 Competitive Bidding Using Sealed Bids .......................................................................................................79 Video ..................................................................................................................................................................79 Contracting by Negotiation ............................................................................................................................80 Simplified Acquisition Procedures ................................................................................................................82 Video ..................................................................................................................................................................83 Employees Involved in the Procurement Process .............................................................................................84 Procurement .....................................................................................................................................................84 Accounts Payable .............................................................................................................................................85 Operations.........................................................................................................................................................85 Phases in the Procurement Process .....................................................................................................................86 The Pre-solicitation Phase ..............................................................................................................................86 The Solicitation Phase .....................................................................................................................................87 The Bid Evaluation and Award Phase ..........................................................................................................88 The Post-Award and Administration Phase.................................................................................................89 Categories of Procurement Fraud Schemes ........................................................................................................91 Collusion Among Contractors .......................................................................................................................91 Video ..................................................................................................................................................................92 Collusion Between Contractors and Employees .........................................................................................97 Fraud in Procurement Without Competition ........................................................................................... 108 Defective Pricing Schemes that Violate the U.S. Truth in Negotiations Act....................................... 113 Performance Schemes .................................................................................................................................. 116 Preventing Contract and Procurement Fraud ................................................................................................. 126 Video ............................................................................................................................................................... 127 Employee Education .................................................................................................................................... 127 Internal Controls ........................................................................................................................................... 127 Monitoring Activities .................................................................................................................................... 127 Video ............................................................................................................................................................... 128 Vendor Management .................................................................................................................................... 128 Video ............................................................................................................................................................... 128 U.S. Laws Relating to Government Contracting............................................................................................. 136 Review Questions ................................................................................................................................................ 144 V. FRAUDULENT FALSE CLAIMS AND STATEMENTS Introduction .......................................................................................................................................................... 147 What Is a False Claim? ................................................................................................................................. 147 What Is a False Statement? .......................................................................................................................... 147 Elements of False Claim or Statement Violations .......................................................................................... 147 Common False Claims and Statements ............................................................................................................ 148 Video ............................................................................................................................................................... 149 U.S. Laws Prohibiting Fraudulent False Claims and Statements .................................................................. 149 False Statements (18 U.S.C. § 1001) ........................................................................................................... 150 Video ............................................................................................................................................................... 150 Criminal False Claims Act (18 U.S.C. § 287)............................................................................................. 151 Civil False Claims Act (31 U.S.C. § 3729 et seq.) ..................................................................................... 151 Conspiracy to Defraud Federal Government with False Claims (18 U.S.C. § 286) ............................ 152 False Entries in Federally Insured Banks (18 U.S.C. § 1005) ................................................................. 152 Fighting Fraud in the Government iii FIGHTING FRAUD IN THE GOVERNMENT V. FRAUDULENT FALSE CLAIMS AND STATEMENTS (CONT.) False Statements on Loan and Credit Applications (18 U.S.C. § 1014) ................................................ 152 The Major Fraud Act of 1988 (18 U.S.C. § 1031) .................................................................................... 152 Civil Monetary Penalty Law (42 U.S.C. § 1320a–7a) ............................................................................... 153 Perjury (18 U.S.C. §§ 1621 and 1623) ........................................................................................................ 154 Bankruptcy Fraud (18 U.S.C. § 152)........................................................................................................... 154 False Statements in Tax Returns (26 U.S.C. § 7206(1)) ........................................................................... 154 Qui Tam Suits....................................................................................................................................................... 155 Filing a Qui Tam Action .............................................................................................................................. 155 Who Can Bring a Qui Tam Action ............................................................................................................ 156 Protections for Whistleblowers of Fraudulent False Claims and Statements ...................................... 157 Red Flags of Fraudulent False Claims and Statements .................................................................................. 158 Preventing Fraudulent False Claims and Statements...................................................................................... 158 Video ............................................................................................................................................................... 159 Review Questions ................................................................................................................................................ 160 VI. FRAUD IN GOVERNMENT SOCIAL PROGRAMS Introduction to Fraud in Government Social Programs................................................................................ 163 Video ............................................................................................................................................................... 163 Health Care Fraud................................................................................................................................................ 164 Types of Health Care Systems .................................................................................................................... 164 Types of Health Care Fraud in Public Systems ........................................................................................ 167 Video ............................................................................................................................................................... 175 Fraud in Income-Loss Benefits ......................................................................................................................... 181 Types of Claimant Fraud in Income-Loss Benefit Programs................................................................. 181 Types of Income-Loss Benefits .................................................................................................................. 182 General Red Flags of Claimant Fraud in Obtaining Income-Loss Benefits ........................................ 185 Red Flags of Claimant Fraud Involving Disability and Sickness Benefits ............................................ 186 Red Flags of Claimant Fraud Involving Work-Injury Benefits .............................................................. 186 Preventing Claimant Fraud in Income-Loss Benefits.............................................................................. 187 Fraud in Housing-Assistance Programs ........................................................................................................... 188 Types of Housing Assistance Programs .................................................................................................... 188 Tenant Eligibility for Housing Assistance ................................................................................................. 189 Perpetrators of Fraud in Housing-Assistance Programs ......................................................................... 189 Preventing Fraud in Housing-Assistance Programs ................................................................................ 192 Review Questions ................................................................................................................................................ 193 VII. OTHER TYPES OF GOVERNMENT FRAUD Introduction .......................................................................................................................................................... 197 Agricultural Subsidies Fraud .............................................................................................................................. 197 Forms of Agricultural Subsidies.................................................................................................................. 197 Types of Fraud in Agricultural Subsidy Programs ................................................................................... 198 Preventing Fraud in Agricultural Subsidy Programs ................................................................................ 199 Crop Insurance Fraud .................................................................................................................................. 199 Tax Evasion .......................................................................................................................................................... 204 Video ............................................................................................................................................................... 204 Types of Tax Evasion Schemes .................................................................................................................. 205 Tax Laws in the United States ..................................................................................................................... 207 iv Fighting Fraud in the Government FIGHTING FRAUD IN THE GOVERNMENT VII. OTHER TYPES OF GOVERNMENT FRAUD (CONT.) Common Defenses to Tax Evasion Charges ............................................................................................ 208 International Tax Avoidance and Evasion ................................................................................................ 209 Counterfeit and Forged Documents ................................................................................................................. 211 Identifying Counterfeit and Forged Documents ...................................................................................... 212 Red Flags of Counterfeit Money................................................................................................................. 212 Red Flags of Counterfeit and Forged Documents ................................................................................... 213 Conspiracy to Defraud the Government ......................................................................................................... 213 Basic Elements to Prove Conspiracy to Defraud the Government ...................................................... 214 U.S. Laws Criminalizing Conspiracies to Defraud the Government .................................................... 214 Grant Fraud .......................................................................................................................................................... 215 Video ............................................................................................................................................................... 216 Basic Responsibilities of Grant Recipients ................................................................................................ 216 Common Grant Fraud Schemes ................................................................................................................. 216 Perpetrators of Grant Fraud........................................................................................................................ 217 Common Motivations for Committing Grant Fraud .............................................................................. 218 Red Flags of Grant Fraud ............................................................................................................................ 218 Measures to Prevent Grant Fraud .............................................................................................................. 220 Student Financial Aid Fraud............................................................................................................................... 221 Video ............................................................................................................................................................... 222 Student Financial Aid Fraud Perpetrated by Students............................................................................. 222 Student Financial Aid Fraud Perpetrated by Employees of Educational Institutions ........................ 223 Review Questions ................................................................................................................................................ 225 VIII. MEASURES TO PREVENT GOVERNMENT FRAUD Introduction .......................................................................................................................................................... 229 Ethical Tone at the Top ...................................................................................................................................... 229 Tone in the Middle ....................................................................................................................................... 230 Minimize Motivations and Pressures to Commit Fraud ................................................................................ 230 Increasing Morale .......................................................................................................................................... 231 Offering Employee Support Programs ...................................................................................................... 232 Promoting and Rewarding Loyalty ............................................................................................................. 233 Establishing an Open-Door Management Policy .................................................................................... 233 Measuring Employee Attitudes About Anti-Fraud Efforts .................................................................... 233 Establishing a System of Disciplinary Procedures ................................................................................... 233 Fraud Policy .......................................................................................................................................................... 234 Video ............................................................................................................................................................... 234 Scope of Policy .............................................................................................................................................. 235 Policy Statement ............................................................................................................................................ 235 Actions Constituting Fraud ......................................................................................................................... 235 Investigation Responsibilities ...................................................................................................................... 235 Confidentiality ............................................................................................................................................... 236 Authorization for Investigation .................................................................................................................. 236 Employee Responsibilities ........................................................................................................................... 236 Reporting Procedures ................................................................................................................................... 236 Acting in Good Faith ................................................................................................................................... 236 Whistleblower Protection ............................................................................................................................ 236 Termination.................................................................................................................................................... 236 Fighting Fraud in the Government v FIGHTING FRAUD IN THE GOVERNMENT VIII. MEASURES TO PREVENT TO PREVENT GOVERNMENT FRAUD (CONT.) Administration ............................................................................................................................................... 236 Fraud Risk Assessments...................................................................................................................................... 237 What Factors Influence Fraud Risk? .......................................................................................................... 237 Benefits of a Risk-Based Approach ............................................................................................................ 237 Planning for a Fraud Risk Assessment ...................................................................................................... 238 Video ............................................................................................................................................................... 239 Fraud Risk Assessment Framework ........................................................................................................... 240 Video ............................................................................................................................................................... 242 Video ............................................................................................................................................................... 247 Risk Assessment Checklist ........................................................................................................................... 247 The Fraud Risk Assessment Tool ............................................................................................................... 247 Internal Controls .................................................................................................................................................. 248 Video ............................................................................................................................................................... 248 Video ............................................................................................................................................................... 248 Reporting System ................................................................................................................................................. 249 Video ............................................................................................................................................................... 249 Video ............................................................................................................................................................... 250 Employee Anti-Fraud Education ...................................................................................................................... 250 Video ............................................................................................................................................................... 250 Video ............................................................................................................................................................... 251 Who Should Attend? .................................................................................................................................... 251 Frequency and Length of Fraud Awareness Training ............................................................................. 251 Training Delivery Methods .......................................................................................................................... 251 Video ............................................................................................................................................................... 252 Topics to Cover in Training ........................................................................................................................ 252 Video ............................................................................................................................................................... 253 Video ............................................................................................................................................................... 254 Document Training ...................................................................................................................................... 254 Continuous Monitoring ...................................................................................................................................... 254 Video ............................................................................................................................................................... 254 Video ............................................................................................................................................................... 255 Video ............................................................................................................................................................... 255 Video ............................................................................................................................................................... 255 Employee Background Checks .......................................................................................................................... 256 Video ............................................................................................................................................................... 256 Due Diligence for Third Parties ........................................................................................................................ 258 Mandatory Vacation and Job Rotation Policies .............................................................................................. 258 Video ............................................................................................................................................................... 259 Fraud Prevention in Local Government .......................................................................................................... 259 Video ............................................................................................................................................................... 260 Video ............................................................................................................................................................... 260 Review Questions ................................................................................................................................................ 262 IX. USING DATA TO COMBAT GOVERNMENT FRAUD Introduction .......................................................................................................................................................... 265 Video ............................................................................................................................................................... 265 Video ............................................................................................................................................................... 265 vi Fighting Fraud in the Government FIGHTING FRAUD IN THE GOVERNMENT IX. USING DATA TO COMBAT GOVERNMENT FRAUD (CONT.) Video ............................................................................................................................................................... 266 Barriers to Using Data Analytics to Prevent and Detect Fraud .................................................................... 267 Large Volumes of Data ................................................................................................................................ 267 Silo Systems.................................................................................................................................................... 267 Inadequate Data Sharing .............................................................................................................................. 268 Inadequate Access to Data .......................................................................................................................... 268 Poor Data Integrity ....................................................................................................................................... 269 Format Inconsistencies ................................................................................................................................ 269 Limited Analytic Capabilities ....................................................................................................................... 269 Cultural Impediments ................................................................................................................................... 269 Data Analysis Process ......................................................................................................................................... 270 The Planning Phase ...................................................................................................................................... 270 Video ............................................................................................................................................................... 270 The Preparation Phase ................................................................................................................................. 271 The Testing Phase ......................................................................................................................................... 272 Video ............................................................................................................................................................... 272 Spectrum of Analysis Capabilities ..................................................................................................................... 272 Common Data Analysis Techniques................................................................................................................. 273 Aging ............................................................................................................................................................... 273 Compliance Verification .............................................................................................................................. 273 Expressions or Equations ............................................................................................................................ 274 Testing for Frequently Used Values ........................................................................................................... 274 Fuzzy Logic Matching .................................................................................................................................. 274 Gap Tests ....................................................................................................................................................... 274 Identifying Amounts Below a Threshold .................................................................................................. 274 Video ............................................................................................................................................................... 275 Identifying Unusual Dates and Times........................................................................................................ 275 Round-Dollar Payments............................................................................................................................... 275 Benford’s Law................................................................................................................................................ 275 Video ............................................................................................................................................................... 275 Statistical Analysis ......................................................................................................................................... 276 Trend Analysis ............................................................................................................................................... 277 Predictive Modeling ...................................................................................................................................... 277 Qualitative Data Analysis ............................................................................................................................. 277 Video ............................................................................................................................................................... 277 Textual Analytics ........................................................................................................................................... 278 Video ............................................................................................................................................................... 278 Video ............................................................................................................................................................... 279 Conflict Checking ......................................................................................................................................... 279 Transaction Risk Scoring ............................................................................................................................. 279 Scheme-Specific Data Analysis Tests ................................................................................................................ 279 Data Analysis Tests for Billing Schemes ................................................................................................... 280 Data Analysis Tests for Payroll Schemes................................................................................................... 281 Data Analysis Tests for Expense Reimbursement Schemes .................................................................. 281 Data Analysis Tests for Corruption Schemes ........................................................................................... 282 Data Analysis Tests for Inventory Schemes ............................................................................................. 283 Review Questions ................................................................................................................................................ 285 Fighting Fraud in the Government vii FIGHTING FRAUD IN THE GOVERNMENT X. PROTECTING SENSITIVE AND CLASSIFIED DATA Introduction .......................................................................................................................................................... 287 Video ............................................................................................................................................................... 287 Video ............................................................................................................................................................... 287 Common Threats to Sensitive and Classified Data ........................................................................................ 288 Video ............................................................................................................................................................... 288 Theft and Espionage..................................................................................................................................... 288 Employee Sabotage ....................................................................................................................................... 288 Advanced Persistent Threats ....................................................................................................................... 289 Malware .......................................................................................................................................................... 289 Uneducated Users ......................................................................................................................................... 289 User Errors and Omissions ......................................................................................................................... 289 Social Engineering Threats .......................................................................................................................... 289 Email Security Risks ..................................................................................................................................... 289 Internal Threats ............................................................................................................................................. 289 Malicious Hackers ......................................................................................................................................... 289 Foreign Government Threats ..................................................................................................................... 290 Threats to Personal Privacy ......................................................................................................................... 290 Exploitation of Trusted Relationships ....................................................................................................... 290 Types of At-Risk Information ........................................................................................................................... 290 Proprietary Government Information ....................................................................................................... 290 Government Secrets ..................................................................................................................................... 290 Personally Identifiable Information ........................................................................................................... 291 Business Identifiable Information .............................................................................................................. 292 Private Financial Information ..................................................................................................................... 292 Personal Health Information....................................................................................................................... 292 Sources of Data Leakage..................................................................................................................................... 293 Employee Negligence ................................................................................................................................... 293 Video ............................................................................................................................................................... 293 Loss of Physical Media ................................................................................................................................. 293 Inadequate Business Processes ................................................................................................................... 293 Improper Disposal of Documents and Media .......................................................................................... 294 System Failure ................................................................................................................................................ 294 Malicious Insiders ......................................................................................................................................... 294 Hacker Attacks .............................................................................................................................................. 294 Perpetrators of Information Theft .................................................................................................................... 294 Insiders ........................................................................................................................................................... 295 Hackers ........................................................................................................................................................... 300 Competitors ................................................................................................................................................... 300 Organized Criminal Groups ........................................................................................................................ 300 Government-Sponsored Groups ................................................................................................................ 301 Information Espionage ....................................................................................................................................... 301 Targets of Information Espionage ............................................................................................................. 301 High-Risk Industries ..................................................................................................................................... 302 Forms of Information Espionage............................................................................................................... 303 Video ............................................................................................................................................................... 303 Exfiltration Techniques ................................................................................................................................ 303 Social Engineering ............................................................................................................................................... 304 viii Fighting Fraud in the Government FIGHTING FRAUD IN THE GOVERNMENT X. PROTECTING SENSITIVE AND CLASSIFIED DATA (CONT.) Video ............................................................................................................................................................... 304 Why Social Engineering Attacks Succeed ................................................................................................. 305 Information Targeted by Social Engineers................................................................................................ 305 How Social Engineering Works .................................................................................................................. 306 Red Flags of In-Person Social Engineering Schemes .............................................................................. 309 Preventing Social Engineering Schemes .................................................................................................... 309 Common Challenges with Protecting Information ........................................................................................ 311 Video ............................................................................................................................................................... 311 Protecting Sensitive and Classified Data .......................................................................................................... 311 Video ............................................................................................................................................................... 312 Security Risk Assessments ........................................................................................................................... 312 Video ............................................................................................................................................................... 312 Security Policies and Procedures ................................................................................................................ 313 Awareness Training ...................................................................................................................................... 313 Nondisclosure Agreements.......................................................................................................................... 314 Data Retention and Destruction Policies .................................................................................................. 314 Security Controls ........................................................................................................................................... 315 Incident Response Plan ................................................................................................................................ 316 Video ............................................................................................................................................................... 316 Information Security in Bring-Your-Own-Device Environments ............................................................... 316 BYOD Challenges and Risks ...................................................................................................................... 316 Video ............................................................................................................................................................... 317 Video ............................................................................................................................................................... 317 BYOD Policies .............................................................................................................................................. 321 Mobile-Device Management Platforms ..................................................................................................... 326 Video ............................................................................................................................................................... 326 Cloud Computing and Information Security ................................................................................................... 328 Video ............................................................................................................................................................... 328 Video ............................................................................................................................................................... 328 Cloud-Computing Security Challenges ...................................................................................................... 328 Video ............................................................................................................................................................... 329 Protecting Data in the Cloud ...................................................................................................................... 329 Challenges of Investigating in the Cloud ................................................................................................... 331 Review Questions ................................................................................................................................................ 333 XI. INVESTIGATING GOVERNMENT FRAUD Introduction .......................................................................................................................................................... 337 Government Fraud Investigations Versus Private Fraud Investigations .................................................... 337 Video ............................................................................................................................................................... 338 Individual Rights and Protections ..................................................................................................................... 339 Rights and Obligations Under Criminal Law ............................................................................................ 340 Government Search and Seizure................................................................................................................. 340 Privacy Laws .................................................................................................................................................. 341 Protections Against Unlawful Confinement ............................................................................................. 343 Video ............................................................................................................................................................... 344 Video ............................................................................................................................................................... 345 Protections Against Harms to Reputations ............................................................................................... 345 Fighting Fraud in the Government ix FIGHTING FRAUD IN THE GOVERNMENT XI. INVESTIGATING GOVERNMENT FRAUD (CONT.) What Fraud Examination Entails ...................................................................................................................... 346 Obtaining Evidence ...................................................................................................................................... 346 Reporting ........................................................................................................................................................ 346 Testifying to Findings ................................................................................................................................... 347 Assisting in the Detection and Prevention of Fraud ............................................................................... 347 Fraud Examination Methodology ..................................................................................................................... 347 Assume Litigation Will Follow .................................................................................................................... 347 Act on Predication ........................................................................................................................................ 347 Video ............................................................................................................................................................... 348 Move from the General to the Specific ..................................................................................................... 348 Use the Fraud Theory Approach ................................................................................................................ 348 Video ............................................................................................................................................................... 349 Develop a Fraud Response Plan ........................................................................................................................ 349 The Response Team ..................................................................................................................................... 350 Factors Used to Decide on the Course of Action.................................................................................... 350 Litigation Hold Procedures ......................................................................................................................... 351 Principles for Documenting the Response ............................................................................................... 351 Incident Report Log ..................................................................................................................................... 351 Typical Steps in a Fraud Investigation .............................................................................................................. 352 Conduct an Initial Response ....................................................................................................................... 352 Assemble the Fraud Team ........................................................................................................................... 354 Video ............................................................................................................................................................... 354 Develop an Investigation Plan .................................................................................................................... 355 Video ............................................................................................................................................................... 356 Video ............................................................................................................................................................... 356 Video ............................................................................................................................................................... 357 Video ............................................................................................................................................................... 358 Conduct the Investigation............................................................................................................................ 360 Report the Findings ...................................................................................................................................... 363 Written Versus Oral Reports ....................................................................................................................... 363 Respond to the Findings .............................................................................................................................. 365 Review Questions ................................................................................................................................................ 368 XII. INVESTIGATING WITH THE INTERNET Introduction .......................................................................................................................................................... 371 Video ............................................................................................................................................................... 371 Five-Step Approach to Using the Internet in Fraud Examinations ............................................................. 371 Using Internet Search Engines to Find Information ...................................................................................... 372 Search Engines .............................................................................................................................................. 372 Meta-Search Engines .................................................................................................................................... 372 Advanced-Search Operators........................................................................................................................ 372 People Search Engines ................................................................................................................................. 375 Foreign Search Engines................................................................................................................................ 376 Additional Tips When Using Internet Search Engines to Find Information ...................................... 376 Using Online Databases to Find Public Records ............................................................................................ 377 Online Sources of Public Records .............................................................................................................. 377 Limitations of Online Public Database Searches ..................................................................................... 379 x Fighting Fraud in the Government FIGHTING FRAUD IN THE GOVERNMENT XII. INVESTIGATING WITH THE INTERNET (CONT.) Using the Deep Web to Find Information ...................................................................................................... 380 Using Internet Archives to Find Information ................................................................................................. 381 Using Social Networking Sites to Find Information ...................................................................................... 382 Video ............................................................................................................................................................... 382 Video ............................................................................................................................................................... 383 Types of Social Media................................................................................................................................... 383 Popular Social Media Platforms .................................................................................................................. 384 Social Media Search Tools ........................................................................................................................... 386 Privacy Issues When Collecting Evidence from Social Media ............................................................... 387 Using Newspaper and Media Databases to Find Information Online ........................................................ 388 Factiva ............................................................................................................................................................. 389 LexisNexis ...................................................................................................................................................... 389 HighBeam Research...................................................................................................................................... 389 ProQuest ........................................................................................................................................................ 389 Using the WHOIS Protocol to Find Information .......................................................................................... 389 Pitfalls of Using the Internet for Investigative Purposes ............................................................................... 390 Review Questions ................................................................................................................................................ 392 XIII. APPENDIX: VIDEO TRANSCRIPTS ........................................................................................... 395 XIV. SOLUTIONS TO REVIEW QUESTIONS II. Occupational Fraud by Government Employees ................................................................................. 435 III. Public Corruption ...................................................................................................................................... 443 IV. Procurement Fraud.................................................................................................................................... 448 V. Fraudulent False Claims and Statements ................................................................................................ 453 VI. Introduction to Fraud in Government Social Programs ..................................................................... 457 VII. Other Types of Government Fraud ........................................................................................................ 463 VIII. Measures to Prevent Government Fraud ............................................................................................... 470 IX. Using Data to Combat Government Fraud .......................................................................................... 475 X. Protecting Sensitive and Classified Data ................................................................................................ 479 XI. Investigating Government Fraud ............................................................................................................ 484 XII. Investigating with the Internet ................................................................................................................ 490 FINAL EXAMINATION .............................................................................................................................. E-1 INDEX ................................................................................................................................................................... I-1 Fighting Fraud in the Government xi
© Copyright 2025 Paperzz