You are on page 1of 76

THWART PROCUREMENT BATTLING PRODUCT LEARNING FROM PRIVATE 5 MOST SCANDALOUS UNETHICAL BEHAVIOR

FRAUD P. 24 SUBSTITUTION P. 32 INVESTIGATORS P. 40 FRAUDS OF 2022 P. 48 RATIONALIZATIONS P. 62

VOL. 38 | NO. 1 | JANUARY/FEBRUARY 2023


Fraud-Magazine.com

THE MEDICARE DISADVANTAGE


HOW INSURERS GAME THE SYSTEM AND COMMIT FRAUD
SEE P. 14
Stay ahead in
the ever-changing
world of fraud
Fraud is always evolving. You should be too.

Become a Certified Fraud Examiner (CFE)


• Enhance your anti-fraud knowledge and expertise
with world-class training and resources
• Earn 17% more than your non-certified colleagues*
• Showcase your CFE credential on social media
with the exclusive CFE digital badge
*2022 Compensation Guide for Anti-Fraud Professionals

Visit ACFE.com/CFE to learn how you can earn your CFE credential.
Contents Volume 38, No. 1, January/February 2023

COVER STORY
The Medicare disadvantage —
How insurers game the system
14
and commit fraud

By Paul Kilby

Medicare Advantage, the private-sector


arm for elderly care, is fast becoming
the new battle front in the fight against
health care fraud in the U.S. Here’s
why, and what fraud examiners think
should be done.
14 THE MEDICARE DISADVANTAGE

FEATURES

WHAT CAN CFES LEARN FROM


40 PRIVATE INVESTIGATORS?

BATTLING FRAUDULENT 5 MOST SCANDALOUS FRAUDS


24 THWART PROCUREMENT FRAUD 32 PRODUCT SUBSTITUTION 48 OF 2022

What can CFEs learn from private


Thwart procurement fraud
investigators?
by Sheryl Goodman and Tom Caulfield, CFE
24 by Dick Carozza, CFE 40
Battling fraudulent 5 most scandalous frauds
product substitution of 2022
by Stewart Thompson, CFE 32 by Jennifer Liebman 48
4 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM
Publisher John Gill, J.D., CFE

Editor-in-chief Paul Kilby

Editor-in-chief emeritus Dick Carozza, CFE

COLUMNS AND DEPARTMENTS


Assistant Editor Jennifer Liebman

Editorial Assistant Anna Brahce

Contributing Editor Scott H. Patterson


FROM THE PRESIDENT
Use advanced tools to fight Contributing Writer Donn LeVie Jr., CFE

Medicare fraud Legal Editor Ron Cresswell, J.D., CFE

Art Director Lauren Marshall


Bruce Dorris, J.D., CFE, CPA 3 Designers Flavia Sanches, Daryl Smith, Amy Tisi,
Victoria Tolan, Stephanie Weil
FRAUD IN THE NEWS Cover Art Illustrator Jonathan Bartlett
A house of cards Circulation Manager Aimee Jost, CFE
Compiled by Anna Brahce 6 Account Executive Nathalie Sterling
Contact: (800) 245-3321 | nsterling@ACFE.com

INNOVATION UPDATE Editorial Advisory Committee

Build it right, and they will come 6 FRAUD IN THE NEWS Jonathan E. Turner, CFE, CII, chair; Jane Amling, CFE, FCA; Em-
manuel A. Appiah, CFE, CPA, CGMA, CFF; Johnnie R. Bejarano,

By Vincent M. Walden, CFE, CPA 8 DBA, CFE, CPA, CGMA; Richard Brody, Ph.D., CFE, CPA; Jeimy J.
Cano, Ph.D., CFE, CAS; Courtney Castelino, CFE, CPA, CA, CBV,
CFF; Franklin Davenport, CFE; Chris Dogas, CFE, CPA; David J.
Clements, CFE; Peter D. Goldmann, CFE; Katya Hirose, J.D., CFE,
FRAUD BASICS CAMS; Robert Holtfreter, Ph.D., CFE; Sezer Bozkus Kahyaoglu,
Preventing fraud through CFE; Thomas Cheney Lawson, CFE, CIA; Philip C. Levi, CFE, CPA,

due diligence
FCA; Robert Loh, CFE, CFCS, CIRA; Larry Marks, CFE, CISA, PMP,
CISSP, CSTE; Dorothy Riggs, CFE; Elisabeth Rossen, MBA, CFE,
MAcc; Daniel Semick, MPA, CFE, CGFM; Katharina Shamai, CFE,
By Mandy Yousif, CFE 10 CIA, CA, IIA; Herbert Snyder, Ph.D., CFE; Stéphane Vuille, CFE, PCI
2022-2023 Board of Regents
Bruce Dorris, J.D., CFE, CVA, CPA; Jeanette LeVie, CFE;
CASE IN POINT
Wendy Evans, CFE; Alexandra Sagaro, MSS, CFE, Collins
Better together Wanderi, CFE; Hannibal “Mike” Ware, CFE; John Warren,
J.D., CFE; Chrysti Ziegler, CFE
By Raina Verma, CFE 58 Fraud Magazine (ISSN 1553-6645) is published bimonthly
65 ACFE NEWS by the Association of Certified Fraud Examiners, 716 West
Avenue, Austin, TX 78701-2727, USA. Periodical postage
CAREER CONNECTION paid at Austin, TX 78701 and at additional mailing offices.
‘The devil made me do it’ Postmaster — Please send address changes to:
Fraud Magazine | ACFE Global Headquarters
and other unethical 716 West Avenue | Austin, TX 78701-2727, USA
behavior rationalizations (800) 245-3321 | +1 (512) 478-9000
Fax: +1 (512) 478-9297
By Donn LeVie Jr., CFE 62 Subscriptions
ACFE members: annual membership dues include a reg-
ular one-year subscription. Printed subscription rates for

ACFE NEWS 65 66 TAKING BACK THE I.D. libraries and organizations are available upon request.
Membership information can be obtained by visiting
ACFE.com, emailing MemberServices@acfe.com or by
calling (800) 245-3321, or +1 (512) 478-9000. Change of
TAKING BACK THE I.D. address notices and subscriptions should be directed to
Fake Geek Squad scams and what Fraud Magazine. Although Fraud Magazine may be quot-
ed with proper attribution, no portion of this publication
to do if you fall victim to credit may be reproduced unless written permission has been
obtained from the editor. The views expressed in Fraud
card fraud Magazine are those of the authors and might not reflect
the official policies of the Association of Certified Fraud
By Robert E. Holtfreter, Ph.D., CFE 66 Examiners. The editors assume no responsibility for
unsolicited manuscripts but will consider all submissions.
Contributors’ guidelines are available at Fraud-Magazine.
com. Fraud Magazine is a double-blind, peer-reviewed
I’M A CFE publication. To order reprints, visit Fraud-Magazine.com/
Kathryn Wilson, CFE reprint or email reprints@fraud-magazine.com.
© 2023 Association of Certified Fraud Examiners, Inc. “ACFE,” “CFE,” “Certified
By Jennifer Liebman 68 Fraud Examiner,” “CFE Exam Prep Course,” “Fraud Magazine,” “Association of
Certified Fraud Examiners,” “Report to the Nations,” the ACFE Seal, the ACFE
Logo and related trademarks, names and logos are the property of the As-

CPE QUIZ 70 68 I’M A CFE - KATHRYN WILSON, CFE sociation of Certified Fraud Examiners, Inc., and are registered and/or used in
the U.S. and countries around the world.

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 5


FRAUD in the news Read more news at Fraud-Magazine.com

A HOUSE OF CARDS
When Andrew Smith rented a house in
Cambridge, U.K., he immediately set about
trying to sell the three-bedroom property
through a fake online real estate company.
In November, Smith received a 2 1/2-year
VICTIMS SCAMMING VICTIMS jail sentence for his fraudulent scheme.
Police nabbed Smith after neighbors
While many fall victim to fraud scams, to get them to invest in crypto and alerted a prospective buyer that the house
it’s rare that the scammers themselves are trading scams. was rented. The buyer contacted the letting
victims. But that’s what’s been happening In August last year, 40 Vietnamese agents who in turn reported the fraud to
in Southeast Asia, where tech workers workers narrowly escaped a casino in law enforcement.
are being conned into working for Cambodia’s Kandal province, and in To decorate the house, Smith had
cybercrime rings. September, the Indian government rented furniture from a company that
Lured by fake high-paying job issued an advisory against the fake provides furniture for showrooms. The
offers, thousands of young Asian tech job offers targeting young IT workers. unsuspecting buyer almost parted with
workers have arrived on job sites only (See “Cyber criminals hold Asian tech 400,000 pounds in what one police con-
to find crime syndicates confiscating workers captive in scam factories,” by stable described as an “almost unbeliev-
their phones and passports, demanding Anuradha Nagaraj and Nanchanok able and truly brazen crime.” (See “Man
ransom fees and threatening violence. Wongsamuth, Reuters, Nov. 1, 2022, jailed for trying to sell someone else’s
Criminals hold tech workers captive tinyurl.com/37xkjscv; “Inside The house,” by Debbie Luxon, Independent,
in converted casinos in Cambodia, Crypto Human Trafficking Rings In Nov. 9, 2022, tinyurl.com/3r25r2nw.)
and economic zones in Myanmar and Myanmar, Cambodia & Laos,” by Suprita
Laos, and train them in the art of online Anupam, Inc 42, Oct. 24, 2022, tinyurl.
cryptocurrency scams. com/ceymxurf; and “‘I was a slave’:
A favorite scam is “pig butchering,” Up to 100,000 held captive by Chinese
which involves building trust with cybercriminals in Cambodia,” by David
victims over social media apps and Pierson, Los Angeles Times, Nov. 1, 2022,
developing fake romantic relationships tinyurl.com/9jacz4t3.)

DOJ CLOSES BOOK ON ONE A 58-year-old woman received a 10-year prison sentence in October for masterminding
OF U.S.’S BIGGEST-EVER what a Homeland Security agent called one of the biggest marriage fraud conspiracies in
MARRIAGE SCAMS U.S. history — a scam that brought in a total of $15 million for the fraudsters, according
to the U.S. Department of Justice.
Ashley Yen Nguyen was the ringleader of a group that charged Vietnamese nationals
$50,000 to $70,000 to find a spouse in the U.S. and fraudulently obtain permanent resident
status in the country. Operating out of the Southwest Houston area, the group organized
over 500 sham marriages, using fake wedding albums and fabricated details about the
couples’ relationships to appear legitimate during interviews with immigration officials.
Nguyen regularly offered U.S. citizens $15,000 and $20,000 in installments to act
as spouses but rarely paid them the full amount. She also used mass marketing to reach
her audience, advertising the scheme through recruiters and Facebook. (See “Ringleader
sentenced in immigration scam that offered fake marriages for $70,000,” DOJ, Oct. 27,
2022, tinyurl.com/mu5kc84y.)

— Compiled by Anna Brahce

6 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


Prepare to Pass
the CFE Exam
The CFE Exam Prep Course® gives you flexibility to
prepare for the CFE Exam on your schedule. Including
study questions and practice exams, the CFE Exam Prep
Course will help you prepare to pass the rigorous CFE Exam.

Includes a subscription to the


online Fraud Examiners Manual!

1,300+ STUDY QUESTIONS PRACTICE EXAMS FRAUD EXAMINERS MANUAL


Review sample exam questions with Evaluate your preparedness for the CFE Explore topics in depth with the
explanations of the correct answers. Exam with practice exams and results. Fraud Examiners Manual.

Visit ACFE.com/PrepCourse to learn more.


INNOVATION UPDATE Practical anti-fraud ingenuity

BUILD IT RIGHT, AND THEY WILL COME


When we think of innovation, certain industries spring to mind: electric vehicles, fintech,
medtech, space exploration, to name a few. But innovation and change are just as prevalent in the
professional services industry, where consultants must stay up to speed to best advise their cli-
ents. Learn how professional services firms can stay competitive and relevant through technology
innovation.

T
oday’s world is fraught with director at consulting firm J.S. Held
geopolitical sanctions, fraud, COLUMNIST LLC, tells Fraud Magazine.
corruption and cyber warfare, VINCENT M. “However, firms are constantly
and fueled by rapidly emerging tech-
WALDEN, CFE, CPA faced with resource allocation chal-
CEO KONA AI
nologies that continue to change how lenges, wrestling with decisions to hire
we approach business and risk mitiga- more technical experts and/or invest
as the “innovation funnel” to innovate
tion. Companies large and small are in licensing technology solutions that
and create new anti-fraud products. (See
enduring a costly, but necessary, shift will gain them a competitive differen-
tinyurl.com/27b4met9.) The framework
to digital, while transitioning opera- tiator and ROI [return on investment].
walks through six phases summarized
tions to the cloud and scrambling to With the flood of technology companies
as follows:
hitting the market in recent years, the
protect their systems from intrusion.
1. Ideation: Brainstorming market and timeless debate over whether to build
With change comes risks, which is why
client needs and services. your own technology infrastructure or
companies often look to anti-fraud and/
2. Evaluation: Frequent yet short buy/outsource has become more critical
or forensic technology professionals
meetings to narrow down the list of than ever.”
to help them build the preventive and
options. Feinstein says that building soft-
detective anti-fraud controls needed to
3. Acceleration: Selected proof of con- ware solutions from scratch, or “pro-
protect their business and align with
cept is designed and modeled out, ductizing,” can be a dangerous game for
regulatory expectations.
and more research is gathered. professional services firms, which need
In many cases, companies turn
to adapt nimbly to their clients’ chang-
to professional services firms that can 4. Incubation: Solutions are tested in
ing needs. Challenges facing today’s
add additional horsepower (like more a pilot environment in development
companies may quickly become yester-
CFEs) to their risk mitigation objectives sprints, and solutions are compared.
day’s news, leaving what seemed to be
or assist with an internal investigation 5. Iteration: Finalizing activities and
the next big thing collecting dust on the
or litigation matter. This often includes plans to roll out the new service or
proverbial shelf. Take the Cambridge
specialized forensic technology solu- solution.
Analytica scandal from 2018, when re-
tions where professional services firms 6. Launch: New service offering or ports revealed that the political consult-
can really go deep. However, yesterday’s product is launched in the market. ing firm had harvested Facebook data of
innovation is today’s norm. What was While the above framework can be millions of people without their
relevant a few years ago may not have helpful in spurring innovation, there are consent to support the 2016 presiden-
the same market need as today’s fraud still many questions a professional ser- tial campaigns of Ted Cruz and Donald
risk or investigative technologies. vices firm needs to consider, especially Trump. (See “How Cambridge Analytica
That’s why professional services firms, when it comes to technology. Sparked the Great Privacy Awakening,”
especially leading mid-to-large firms by Issie Lapowsky, Wired, March 17,
and the Big Four, are constantly seeking Buy vs. build in-house 2019, tinyurl.com/yc55vu5k.) Executives
to innovate new fraud risk manage- “There’s no disputing the fact that across the globe scrambled to ensure
ment solutions and technologies to stay professional services firms, particularly their customer data was secure from
relevant with their clients. in forensic accounting, need to invest third-party misuse, spurring consulting
In Fraud Magazine’s January/ in technology infrastructure, cutting- firms to respond expeditiously to assess
February 2019 edition of “Innovation edge anti-fraud software, and superior third-party risk and identify data misuse
Update,” I collaborated with my friend talent to be able to provide high-quality through automated solutions. But by
Eric Johnson, managing director at EY, client service and remain ahead of the the time the ink dried on many engage-
to apply a common framework known competition,” Ken Feinstein, managing ment agreements, much of the buzz

8 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


surrounding the scandal had subsided, wishing to specialize in third-party Software companies specialize in
and companies instead were funneling due diligence, bringing this function developing and supporting software to
investment dollars towards stricter com- in-house could be a good solution. But address a specific business issue, most
pliance and data governance. That left for forensic accounting or investigations often in the customer’s IT environment.
many firms with half-baked products firms whose specialty skills are in fo- In contrast, professional service firms
and fewer clients concerned about these rensic accounting, forensic technology, have expert knowledge of particular
types of third-party risks. litigation support or white-collar crime fields or sectors (also known as domain
The concern over conflict miner- investigations, it often makes sense to expertise) and the understanding of
als is arguably a similar story. In 2010, subcontract or outsource due diligence various technologies to align the right
the Dodd-Frank Wall Street Reform and checks. people, processes and software tech-
Consumer Protection Act sought to stop
nologies to solve a particular client
the national army and rebel groups in Staying ‘software agnostic’ problem.
the Democratic Republic of the Congo, Professional services firms might be
among others, from funding armed con- tempted to develop their own anti-fraud How to build it right,
flict through illegal mining by requiring or compliance-monitoring software so they will come
companies to disclose whether their solutions, replacing the hourly billing
Feinstein and I collaborated on some
products contained these types of con- model with one that’s more scalable
flict minerals. Consulting firms spent a tips to help professional services firms
around a solution. But this poses a con-
tremendous amount of time and money in the anti-fraud and investigations
flict for professional services firms that
to find solutions for clients faced with space best foster innovation and contin-
view themselves as “software agnostic.”
the new regulatory landscape only to see uously remain relevant to their clients.
In other words, they’re supposed to
the Trump administration try to repeal We aren’t claiming an all-inclusive list
be recommending the best technical
those rules years later. (See “The Dodd- here, but these tips are drawn from
solution for the client’s need, not what
Frank repeal: What it means for conflict more than 20 years of experience we
they’ve internally built themselves.
minerals,” by John Filitz, mining.com, each have in this field. Some of these
(Think of it as a “separation of church
Aug. 8, 2017, tinyurl.com/5awn59wx.) are idioms you may have heard; others
and state” on the software level.) Be-
“Procuring technology to meet a might make you laugh. But all of them
yond that inherent conflict, there are
client’s needs is unavoidable whether stem from experience.
also other factors like ongoing support
it’s commercial off-the-shelf software
and maintenance that make software • Stay relevant: Come up with a new
(COTS), cloud-based platforms or data
development challenging to a profes- service offering or market idea at least
visualization tools, etc.,” says Feinstein.
sional services firm. How will they every six months, and let the market
“It becomes a question of invest-
deploy software updates and security know about it.
ment when faced with an opportunity
to help your client handle a unique patches on the client’s hardware after • It’s always best to align your anti-
challenge such as performing natural the consulting agreement (or project) is fraud and service offerings to industry
language processing (NLP) to derive over? Is the client tied to the consulting or regulatory guidance from The
insights from thousands of documents. firm, and their billable hours, for the Committee of Sponsoring Organiza-
When evaluating the purchase of a entire life of the software relationship? tions of the Treadway Commission
software technology, one should ask if To combat these issues, many pro- (COSO), U.S. Department of Justice,
this is a one-and-done proposition for a fessional services firms offer a managed U.S. Securities and Exchange Com-
specific client need or does this solution service solution where the firm hosts mission, U.K.’s Serious Fraud Office,
span multiple clients.” (stores) the client’s data for analysis. EU’s General Data Protection Regula-
Outsourcing is another option, This works well for a one-time investiga- tion and the U.S.’s Financial Industry
but it’s typically more about people tion, eDiscovery matter or short-term Regulatory Authority (FINRA), just to
and processes rather than technology. projects, but not for long-term monitor- name a few.
Companies often choose to outsource ing or proactive risk assessments and
• Cost, quality or speed — clients can
a task or function as part of an overall continuous monitoring where client
only pick two.
client service offering to conduct oner- data constantly needs to be refreshed to
ous or routine procedures. One such be relevant. The thought of companies • Go beyond rules-based queries in your
example is third-party due diligence sending reams of sensitive transactional solution designs. Think data visual-
checks, which require access to expen- data (such as third-party payments or ization, text mining, machine learn-
sive databases and significant, but often sales) each month to an outside firm for ing, optical character recognition (for
tedious, reviews to ensure the accuracy processing and analysis sounds like an matching), risk scoring, and pattern
and relevance of the subject. For firms IT and data privacy nightmare. and link analysis, for example.
CONTINUED ON PAGE 71

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 9


FRAUD BASICS Fundamentals for all

PREVENTING FRAUD THROUGH DUE DILIGENCE


Due diligence is a proactive countermeasure against fraud, helping to safeguard the interests of
all parties involved in a transaction. Here are some pointers in how to carry out due diligence and
prevent fraud in the process.

I n March 2019, former New York Lt.


Gov. Brian Benjamin, at the time
a state senator, asked a real estate
developer to help procure a number of
small-dollar contributions for his latest
COLUMNIST
MANDY YOUSIF, CFE
COO/PARTNER, SPECIALTY
RISK & INTELLIGENCE
SERVICES (SRIS)
told him that the business generated
a gross income of C$12,000 a month.
The agreement allowed Patel to cancel
the transaction if he found this to be
false after conducting due diligence
political campaign. Benjamin’s un- within a certain period of time. Patel
the legitimacy of various contribu-
named contact, who also led a nonprofit conducted some due diligence, but not
tions to Benjamin’s campaign. In the
organization, later told investigators enough and eventually found that the
fallout, Benjamin was indicted by the
from the U.S. Department of Justice business brought in much less money
DOJ for bribery and related offenses
(DOJ) that he initially rebuffed Benja-
and resigned his office, and we can than he was told. He defaulted on the
min’s request for several reasons: He
presume that taxpayers are on the hook promissory note and accused the seller
didn’t have experience “bundling politi-
for the tab in Benjamin’s investiga- of fraudulent misrepresentation. The
cal contributions” in that manner; he
tion and prosecution. (See “New York’s courts, however, ruled in favor of the
was focused on fundraising for his own
lieutenant governor resigns after being seller, rejecting Patel’s requests for
nonprofit; and any potential donors he
charged with bribery and fraud,” NPR, further financial records as he had not
could target were the same ones from
April 13, 2022, tinyurl.com/23adu8nu.) sought them during the time stipulated
whom he intended to solicit contribu-
Benjamin’s case isn’t an outlier. A in the contract. Lesson learned. (See
tions for the nonprofit. (See “New York
Lieutenant Governor Brian Benjamin string of recent fraud investigations il- “Canada Inc. v. Ontario Inc. - court file
Charged With Bribery And Related Of- lustrates the importance of conducting no.: CV-19-00630443,” Ontario Superior
fenses,” DOJ press release, April 12, 2022, due diligence, and the repercussions Court of Justice, June 25, 2021, tinyurl.
tinyurl.com/4z969d4p.) of failing to do so. These range from com/nw9jaj2a.)
Benjamin was undeterred, telling the well-publicized fraud trial of Trevor Due diligence is an essential
the developer, “Let me see what I can Milton, the founder of electric truck preemptive measure against fraud,
do,” according to the DOJ. About three company Nikola; to the lesser-known and failing to apply it can be detrimen-
months later, New York awarded a case of the buyer of a laundry service tal. Read on to learn how proper due
$50,000 grant to the developer’s non- who failed to dig deep into the busi- diligence can go a long way toward pre-
profit, a windfall that the DOJ alleges ness’s financials. (See “Nikola founder venting fraud, irrespective of the nature
Benjamin facilitated — with the expec- Trevor Milton found guilty of fraud over of a contract and whether it’s related
tation that the developer acquiesced statements he made while CEO of the to a mergers and acquisitions (M&A)
to his request for campaign donations. EV company,” by John Rosevear, CNBC, transaction, vetting of political appoin-
The developer did just that in an alleged Autos, updated Oct. 14, 2022, tinyurl. tees, preemployment background or
bribery scheme that disguised his il- com/burkza2n and “Buyer’s failure to vendor screening.
licit payments to Benjamin’s campaign conduct due diligence defeats claim
as “donations” made in the names of for misrepresentation against seller Levels of due diligence
unaware family members, as well as of laundry business,” by James R.G. The nature and extent of due diligence
from an LLC under his control. The Cook, Gardiner Roberts, Aug. 20, 2021, processes organizations employ to
alleged scheme was finally exposed, tinyurl.com/34x3msse.) mitigate fraud vary depending on their
according to the DOJ, when Benjamin The latter is a good case in point. assessment of perceived risks. Organiza-
failed to meet disclosure requirements In 2019, Chirag Patel agreed to buy tions commit a common mistake when
for the LLC, the New York City Cam- a coin laundry business in Ontario, they apply the same level of diligence to
paign Finance Board deemed some of Canada, for C$290,000 — C$100,000 each engagement without taking into
the donations as ineligible, and a media upfront and the rest over time through consideration the level of risk, type of
outlet published an article questioning a promissory note — after the seller investment or purpose of the contract.

10 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


For instance, when recruiting records — and failing to include a
Know your vendor
new employees, the level of diligence number of additional crucial records.
Perhaps the most critical aspect when
should not be the same for an execu- Further, a myopic approach often only
conducting due diligence is partner-
tive position and that of an entry-level targets a specific timeline (usually 10
ing with the appropriate expert. We’ve
position. Likewise, the level of dili- years) and is mainly focused on a certain
seen cases where organizations have
gence should be greater for a multi- jurisdiction.
partnered with the wrong vendors af-
million-dollar investment or acquisi- Organizations must take a holistic
ter failing to uncover obvious red flags.
tion than a smaller one. The following view and thoroughly assess all areas of
Third-party vendors play a key role in
are the most common levels of due risks such as all available legal, regula-
due diligence investigations as they pro-
diligence: tory, financial, licensing, disciplinary,
vide the necessary expertise to obtain
• Simplified/basic. political, corporate, strategic, cultural
and interpret information and identify
and operational records, just to name a
• Standard. potential adverse records such as prior
few. Rather than focusing on a spe-
• Comprehensive/enhanced. criminal offenses, litigation disputes
cific jurisdiction, your investigation
or poor credit reports. The reliance on
should cover relevant records from all
The checklist dilemma jurisdictions where the target person-
third-party vendors is greater when the
Due diligence investigations often in- investigation requires an international
nel has resided and worked. In the case
clude accessing and reviewing a number component.
of a corporate entity, the investigation
of legal, regulatory, financial, licensing Relying on third-party vendors
should include all jurisdictions where
and disciplinary records, as well as vari- presents many risks, and they’re higher
the entity operates. Don’t limit your in-
ous additional government, proprietary among organizations that use inter-
vestigation to a specific period — cover
and public records. A common mistake national third-party vendors and lack
all available records dating as far back
organizations make is accessing and re- access to, or knowledge about, foreign
as permitted.
viewing records based on a checklist ap- records.
proach without considering the nature Many organizations operate under
Organizations can mitigate these
of the industry, or profile of the target the assumption that public records
risks by conducting their own due
personnel (to name a few factors). and traditional media sources include
diligence into new third-party vendors
Just as an organization shouldn’t all that’s needed for a due diligence prior to partnering with them. Ad-
conduct the same due diligence inves- investigation. But reputational source ditionally, evaluate the relationship of
tigation on a publicly traded entity as a inquiries are crucial. Third-party existing vendors regularly to assesses
privately held company, due diligence source inquiries not only verify known their performance and reliability. Prior
strategies should be different based on facts but often also reveal information to engaging a third-party vendor, con-
various industry sectors. For example, that’s not publicly available. sider the following measures:
due diligence on a political candidate In the case of preemployment
• Inquire about the vendor’s reputa-
should differ from an individual within background checks, organizations
tions, both locally and globally.
the investment sector or the cyberse- often fail to contact references, as-
• Ensure that the vendor has an exist-
curity industry. Following a checklist suming they’ll only provide a positive
ing ethics and compliance program
of items will limit the due diligence reference. However, some candidates
as well as privacy regulations and
process and could fail to uncover sig- will list important-sounding individu-
policies.
nificant findings that could later cause als as references with the hope that the
recruiting organizations won’t contact • Ask about the vendor’s anti-bribery
harm to the organization.
them. Further, references often dis- and anti-corruption policies.
Due diligence isn’t simply a check-
close information that’s not necessar- • Assess how the vendor conducts
list or a box-ticking exercise, but rather
ily favorable. In addition to checking internal audits.
a process dependent on a number of
factors that must be assessed through- references, organizations should, to • Ensure that the vendor agrees in writ-
out the investigation. the extent permitted by law, contact in- ing to abide by the organization’s code
dependent references such as industry of conduct.
Myopic approach associates, litigation adversaries and • Carry out a background check on
Due diligence investigations often fail others. These references can provide the vendor’s business, ownership
when they take a myopic (i.e., nearsight- further insight and information that’s structure, executive team and par-
ed, or narrow) approach, focusing on likely unattainable through other ticularly on the employees who will
the analysis of partial legal and financial resources. perform the investigation on your

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 11


FRAUD BASICS Fundamentals for all

organization’s behalf. The vendor especially for databases that feature document to ensure the search was
may be reputable, but some employ- several sections. For instance, Cana- conducted properly.
ees may lack the necessary skills for dian Securities Commission databases Knowing exactly with whom you’re
the job. This is especially problem- vary across all provinces and territo- partnering is not only a good business
atic when the investigation has been ries; some of these databases contain practice, but also a legal and ethical
delegated to junior employees with no over 20 sections with specified search necessity.
oversight from management. criteria. Fraud prevention starts with
• Interview the vendor and inquire • Become familiar with foreign records adequate due diligence procedures and
about its industry knowledge, and and ensure that the vendor provides strategies. Regardless of the jurisdic-
independently verify its credentials. clarification on the purpose of each tion, it’s best to conduct rigorous due
Don’t simply trust all information search. diligence on third-party associates to
found on the vendor’s website. • Request sample reports from multiple ascertain their integrity, financial via-
• Request a proposal prior to engaging vendors for comparison. bility, and legal and ethical compliance.
the vendor. The first red flag is when • Consider retaining a second vendor Knowing that fraud can take many
the vendor immediately accepts a for further verification and com- forms and cause extensive damage, it’s
client’s proposed request without parison. This is highly recommended easier, and less costly, to prevent and
providing any recommendations, ad- when selecting a new vendor. It en- mitigate the risks of fraud than it is to
ditional areas of inquiry, or delivering sures that old vendors are providing detect it. ■ FM
its own proposal. accurate results.

• Ensure that the vendor is trained • Don’t assume that the vendor’s reports Mandy Yousif, CFE, is COO and partner
to use databases and remains up to are always free of error. at consultant Specialty Risk & Intelli-
date with the changes and security • Don’t accept “no record” for an answer gence Services (SRIS). Contact her at
features. This is extremely important, and request a copy of the actual Mandy.Yousif@sris.ca.

ACHIEVING EXCELLENCE
WITH A GLOBAL VISION

OUR OFFERINGS
Forensic Investigation Due Diligence
Hard Disk Imaging Background Checks
Anti Counterfeit operations Physical Security consulting
Cyber Security Dark Web Monitoring
Online Monitoring Training and Certifications

Offices: UA E | S ri L a nk a | Si ng a p or e | I nd i a
OUR PRESENCE { India Offices: Del hi | M um b a i | B eng a l ur u | Chenna i | H y d er a b a d | Kol kat a
2 G / 2023 G CO
More details: info@netrika.com | www.netrika.com | +91 97152 4711713 | +91 98710 93338
Online Self-Study CPE Course
Merchandise

10 infamous cases of the 21st century


Duffel Bag

This rugged yet refined duffel bag with


ACFE seal, constructed of washed beige
cotton canvas and genuine leather, is
perfect for a trip to the gym after work, an
overnight business trip or a weekend
getaway. The top zipper closure opens to
a spacious main storage area that includes
a zippered interior pocket and two small
interior pockets without zippers.

Sling the bag over your shoulder using In this self-study course, learn from 10 infamous
the removable and adjustable shoulder fraud cases to better protect your clients, employers
strap or use the double carrying handles.
and the general public from similar schemes. Fraud
CPE Credit
cases include the WorldCom scandal, Madoff’s Ponzi 4
scheme and the Fédération Internationale de Football
Features Association (FIFA) scandal.

Top zipper closure


Zippered interior compartment KEY TAKEAWAYS: Course level
and two small interior pockets • Introductions and background information for Basic
Detachable adjustable shoulder all cases
strap that extends up to 58” • Insights to how each scheme was perpetrated
Double carrying handles and detected
• Recommendations to prevent future frauds
• Lessons learned for each case
prerequisites
None

$79.20 Members
$99 Non-Members $135.20 Members / $169 Non-Members

Visit ACFE.com/Duffel to learn more. Visit ACFE.com/TIFC to learn more.


THE MEDICARE
DISADVANTAGE
How private insurers are gaming the Medicare
system and committing fraud

By Paul Kilby
Illustrations by Jonathan Bartlett

14 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


Medicare Advantage, the
private-sector arm for elderly
care, is fast becoming the new
battle front in the fight against
health care fraud in the U.S.
Here's why, and what fraud
examiners think should be done.

W hen Cigna launched its “360 Pro-


gram” in 2012, it described it as a
way to identify gaps in care for
Medicare Advantage plan mem-
bers through regular wellness visits. The
health insurer said the extra consultations
came with no added costs and helped de-
lucrative diagnosis codes so that Cigna
could garner higher payments from Medi-
care. And the company admitted as much
in internal communications, according to
the lawsuit. In a 2017 company document,
Cigna said: “[t]he primary goal of a 360
visit is administrative code capture and
tect health problems earlier on while they not chronic care or acute care manage-
were less expensive to treat. They even ment.” (See “Complaint in Intervention
gave patients gift cards for participating. of the United States of America, Civil Ac-
It all made sense. After all, the strategy fell tion No. 3:21-cv-00748,” U.S. District Court,
nicely under the original rubric of Medi- Oct. 14, 2022, tinyurl.com/4mw5ry82.)
care Advantage, a program within the U.S. The way Cigna went about using
public health system designed to create third-party vendors for this purpose was
greater efficiencies, more choice and lower suspect, according to the DOJ. The health
costs by having private insurers manage insurer allegedly prohibited the vendors
health care for elderly Americans. (See from providing patient treatment or care
“Prevention Pays: $50 Prevention Bonus during home visits — one of the exam
program for 2018,” Network Insider, Cigna- options. Instead, nurse practitioners or
HealthSpring, Network Insider, Winter nonphysician health care providers, with
2017, tinyurl.com/2p97vr6u.) no access to beneficiaries’ full medical
But there was more to the 360 Pro- histories, spent little time with patients
gram than met the eye, at least according during home visits and relied heavily on
to the U.S. Department of Justice (DOJ), responses to self-assessment question-
which in October 2022 joined an earlier naires, according to the lawsuit.
whistleblower lawsuit that accused the The DOJ accuses Cigna of using ven-
insurer of using its 360 medical in-house dors, who were incapable of properly as-
exams conducted by third-party vendors sessing patients’ health, to establish in-
for more nefarious and fraudulent means. valid diagnoses for serious illnesses that
Rather than treat patients, the vendors it couldn’t have reliably determined in a
allegedly used the home visits to collect home setting without extensive diagnostic

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 15


THE MEDICARE DISADVANTAGE

testing or imaging. The lawsuit claims that


Cigna knew that these 360 home visits
crosshairs for fraudulent behavior relat-
ing to the Medicare Advantage plan. (See
CODING, CAPITATION
generated false and invalid diagnoses, but
it continued to submit tens of thousands
“‘The Cash Monster Was Insatiable’: How
Insurers Exploited Medicare for Billions,”
AND CLASSIFICATIONS
To understand the DOJ’s fraud accusations,
of these invalid codes to the Centers for by Reed Abelson and Margot Sanger-Katz, it helps first to examine how the U.S. gov-
Medicaid & Medicare Services (CMS), an The New York Times, The Upshot, Oct. 8, ernment reimburses private insurers. Un-
agency of the U.S. Department of Health & 2022, tinyurl.com/2dw56tph.) der Medicare Advantage programs, insur-
Human Services, because it was profitable. ers (or plans) agree to assume the liability
Alleged wrongdoing ranges from the
CMS took that data to determine higher and risks of beneficiaries’ health expenses
mundane accusation of failing to check
risk scores and in turn a bigger payout for and in exchange the CMS pays the insur-
the accuracy of diagnosis codes (argu-
the insurer, which allegedly made tens of ers a monthly, per person (or capitated)
ably because deleting them would impact
millions of dollars this way. amount. The CMS pays the plans according
revenues) to more sophisticated schemes
“Cigna knew that, under the Medi- to a base rate determined by the insurer’s
care Advantage reimbursement system, using algorithms and data mining. “Some-
bid for the business and whether it’s above
it would be paid more if its plan members times it is inadvertent, sometimes it is on
or below a benchmark rate set by the fed-
appeared to be sicker,” U.S. Attorney Da- purpose, but at the end of the day it is
eral government. If it’s above, a plan gets
mian Williams said at the time. “This office about making more money and getting
the benchmark rate and can charge enroll-
is dedicated to holding insurers account- reimbursed at a higher rate,” says Kurt ees a premium to make up the difference.
able if they seek to manipulate the sys- Yannelli, CFE, who has sold Medicare Ad- If it’s below, which most bids are, the plan
tem and boost their profits by submitting vantage plans to seniors and now works as gets a rebate, which it’s then required to use
false information to the government.” (See a trooper in the Pennsylvania State Police’s to lower costs and provide extra coverage.
“United States Files Civil Fraud Lawsuit criminal investigation unit. (See “Understanding Medicare Advantage
Against Cigna For Artificially Inflating Its The defendants all deny wrongdoing, Payment & Policy Recommendations,” Bet-
Medicare Advantage Payments,” DOJ, Oct. but the cases mark the latest chapter in ter Medicare Alliance, September 2018,
17, 2022, tinyurl.com/bdx43sw4.) the perennial battle against fraud in the tinyurl.com/32n8tw88.)
Cigna isn’t the only U.S. insurer to face U.S. public health system, this time high- But what’s important is the extra layer
a civil fraud lawsuit for allegedly submit- of payments the insurers receive through
lighting the potential for financial chica-
ting false and invalid patient diagnosis the so-called risk-adjustment scores that
nery among private insurers that provide
codes to artificially inflate payments the CMS calculate to account for the costs
such coverage in this growing segment of
received from the Medicare Advantage of sicker patients. The insurer and the doc-
the Medicare system. “If these turn out to
program. Over the past several years, the tors in its network supply the CMS with
be strong cases and the U.S. government
DOJ has similarly sued some of the largest International Classification of Disease
health insurers in the country as it turns a wins them, it’s a shot across the bow be-
(ICD) codes based on diagnosis data. The
spotlight on fraud in this corner of the U.S. cause fraud among the insurers was never CMS then takes that information, plus
national health care system. Aside from touched upon previously in the Medicare geographic information and other data,
Cigna, other U.S. health care giants such Advantage world,” says Eric Rubenstein, to create a numbered risk score (some-
as UnitedHealthcare, Humana, Elevance CFE, director of litigation for fraud, waste times called Risk Adjustment Factor or
(formerly Anthem) and Kaiser Perman- and abuse at health care advisory company RAF) using a model called hierarchical
ente have found themselves in the DOJ’s Advize. condition category (HCC) that estimates

16 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


GLOBAL. EXPERIENCED.
INTEGRAL.
CRI® Group safeguards businesses from fraud and corruption,
providing a wide range of background

BACKGROUND INVESTIGATIONS
EMPLOYEE INTEGRITY DUE DILIGENCE
VENDOR AND 3RD PARTY SCREENING
PERSONNEL VETTING & PRE-EMPLOYMENT SCREENING

COMPLIANCE SOLUTIONS
INVESTIGATIVE DUE DILIGENCE
INTEGRITY DUE DILIGENCE
CORPORATE SECURITY & RESILIENCE
THIRD-PARTY RISK ASSESSMENT
ANTI-MONEY LAUNDERING

Partners to TRUST

BUSINESS
INTELLIGENCE
MARKET RESEARCH & ANALYSIS
COMMERCIAL INVESTIGATIONS

INVESTIGATIVE RESEARCH
ANTI-CORRUPTION & REGULATORY INVESTIGATIONS
ASSET SEARCH AND RECOVERY
FRAUD RISK INVESTIGATIONS
INSURANCE INVESTIGATIONS
IP INFRINGEMENT INVESTIGATIONS

TRAINING
INTERNAL INVESTIGATIONS & CONFLICT OF INTEREST
FINANCIAL INVESTIGATIONS

& CERTIFICATION FORENSIC ACCOUNTING

ISO 31000:2018 RISK MANAGEMENT


ISO 37001:2016 ANTI-BRIBERY MANAGEMENT SYSTEM
GET A QUOTE
ISO 37002:2021 WHISTLEBLOWER MANAGEMENT SYSTEM
ISO 37301:2021 COMPLIANCE MANAGEMENT SYSTEM
ANTI-MONEY LAUNDERING (AML)

37th Floor, 1 Canada Square,


Canary Wharf,
London, E14 5AA
United Kingdom
t: +44 203 927 5250
e: london@CRIgroup.com
Global Leader in Risk Management,
BackgroundFRAUD-MAGAZINE.COM
Screening & Due Diligence Solutions
JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 17
THE MEDICARE DISADVANTAGE

TOTAL MEDICARE ADVANTAGE ENROLLMENT, 2007-2022


Medicare Advantage penetration 46 % 48 %
42 %
37 % 39 %
33 % 35 %
31 % 32 %
27 % 29 %
24 % 25 % 26 %
22 %
19 % TABLE

2008 2010 2012 2014 2016 2018 2020 2022


Note: Includes Medicare Advantage plans: HMOs, PPOs (local and regional), PFFS and MSAs. About 58.6 million people were enrolled in
Medicare Parts A and B in 2022.
SOURCE: KFF analysis of Medicare Chronic Conditions (CCW) Data Warehouse from 5% of beneficiaries, 2007-2017; CCW data from 20
percent of beneficiaries, 2018; and Medicare Enrollment Dashboard 2019-2022. Enrollment numbers from March of the respective year.

future health care costs per patient. For “Evaluating Medicare Advantage Value- Fraud,” Whistleblowers International,
example, a person with cancer will get Based Contracts,” American Medical As- 2022, tinyurl.com/ycx5e427; and “What
a higher number than a person who has sociation, 2019, tinyurl.com/2p85fc2x.) Are MACRA and MIPs?” by Max Freed-
some hypertension, qualifying the insurer In contrast, traditional Medicare has man, Business News Daily, updated June
for a higher payment amount for the sicker typically worked on a fee-for-service (FFS) 29, 2022, tinyurl.com/bddtexfs.)
patient. But a patient who has had cancer basis, where a doctor will bill Medicare “Traditionally health care fraud has
and recovered with no need for treatment for separate, unbundled services, such been linked to the (upcoding) of CPT
shouldn’t bump up risk scores for that as an office visit or specific medical pro- codes,” says Jacqueline Bloink, CFE, who
year. Each year the process starts anew. cedures. Doctors use current procedural runs a health care compliance consult-
(See “Hierarchical Condition Category terminology (CPT) and other codes to bill ing firm. “For example, maybe a doctor
Coding,” AAFP, tinyurl.com/2wjku2y5; for a particular medical or surgical service is billing as if they performed the service
“Medicare risk adjustment,” foresee Medi- rendered. Critics say this payment sys- in an ambulatory surgical center when
cal, tinyurl.com/y62tvnrs; and “Managed tem incentivizes physicians to “upcode” they really did it in their office. There is a
Care Fraud,” Whistleblower Law Collabora- — offer as many treatments and services place-of-service code, and the ambulatory
tive, tinyurl.com/2hpevut5.) as possible to garner more fees, often in surgical center pays more money than the
The idea is that the CMS ensures pay- fraudulent ways. And the U.S. Congress office-based setting.”
ments cover the costs of the beneficiaries has endeavored to change this, most re- Cast against FFS, Medicare Advan-
most in need and in theory stop the in- cently through an abstrusely titled piece tage’s reimbursement system certainly
surance companies from profiting by just of 2015 legislation called Medicare Access has its merits. One lump payment per
enrolling the healthiest Americans. The and CHIP Reauthorization Act (MACRA), year with the dollar amount dependent
system is more akin to what the health designed to reward physicians for the qual- on the severity of the diagnosis arguably
industry calls value-based care, which ity rather than the amount of health care eliminates the temptations to commit the
is supposed to encourage higher they provide. (See “What Is CPT®?” AAPC, type of fraud that comes with traditional
quality care through bundled ser- Dec. 15, 2021, tinyurl.com/3ec57dn4; per-service Medicare payments. And, as
vices and smarter spending. (See “Upcoding — Health care and Medicare Bloink points out, it’s arguably also easier

18 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


to substantiate whether the ICD codes submitted are correct or
not. An investigator, for example, can simply look at chart notes,
SHIFTING INCENTIVES
In 1997, the U.S. Congress passed the Balanced Budget Act, which
lab results and prescriptions sent to pharmacies to see if a person
among other goals tried to stop insurers from favoring healthy
has diabetes and is being treated for it.
Medicare enrollees over sick ones by providing higher payments
This may be why the focus on insurers committing fraud
for beneficiaries in poor health. (See “The Emerging Role of Private
in Medicare Advantage — apart from some scandals around ag- Plans in Medicare,” by Gretchen Jacobson, Journal of the Ameri-
gressive marketing tactics — has been until recently largely off can Society on Aging, Summer 2015, tinyurl.com/yb9pf7dk.)
U.S. agencies’ radar screens. Incentives shifted. And CMS providing higher compensation
“For some reason the U.S. government thought there for sicker patients tempted health care practitioners to upcode
wouldn’t be a lot of fraud in Medicare Advantage,” says Mary and commit fraud.
Beach, CFE, senior director for program integrity at Evolent “There are good arguments for capitated payments [in
Health. She says the CMS’s Medicare Medicare Advantage], but suddenly
Managed Care Manual only includes it’s not so much the providers [the

"
a couple of paragraphs on special in- doctors] who are committing fraud
vestigative units (SIUs) and provider There are good arguments for through upcoding; now you have
profit-motivated insurance compa-
investigations.
Rubenstein, who started his
capitated payments [in Medicare nies getting as many capitation fees
as they can,” says Samuel May, J.D.,
career as a senior special agent for Advantage], but suddenly it's not CFE, a research specialist at the ACFE
the U.S. Department of Health and
Human Services Office of Inspector so much the providers who are and a former investigations consul-
tant at UnitedHealth Group. “You are
General, has a similar take. committing fraud through upcoding; adding an extra layer of complexity
“When I was first hired as an between the doctors and those re-
agent in 1997, there was the belief now you have profit-motivated sponsible for oversight.”

insurance companies getting as

"
that there was no fraud (in what were The process is vulnerable to
then Medicare private plans) because fraud not only because it’s complex
the patients are getting the servic- many capitation fees as they can. but the sheer volumes of data — not
es they need,” Rubenstein says. “It to mention the multitude of Medi-
care Advantage plans — can make it
doesn’t matter if the patient sees the
doctor one time or a hundred times,
- Samuel May, CFE easier to miss wrongdoing. Accord-
ing to KFF, a nonprofit organization
the payment was what it was. But as
focused on U.S. health care, 3,834
time went by the spotlight has great-
Medicare Advantage plans were
ly shifted to the payer side, which is
available for enrollment in 2022 — more than any other previous
where we see the lawsuits with Anthem and Cigna and Kaiser.”
year — with more than 26 million people already enrolled. (See
In reality, experts like Mark Starinsky, CFE, were already “Medicare Advantage 2022 Spotlight: First Look,” by Meredith
seeing problems through the use of so-called Adjusted Commu- Freed, Anthony Damico and Tricia Neuman, KFF, Nov. 2, 2021,
nity Rate Proposals that managed care organizations were using tinyurl.com/2ukaenr8.)
to identify the health services they would provide to Medicare “When it comes to the validity of the claims data that is fed
members and the estimated costs. Plans would enroll a patient back to CMS, I think that is probably where there are problems.
with a risky diagnosis and then disenroll them once CMS had You are dealing with so much data,” says Beach. “Part of the
accepted their proposal, says Starinsky, who used to audit those problem is just the volume of it all, and there are thousands of
plans and is now senior product manager of U.S. health care at different Medicare Advantage plans. Just the oversight of that
Shift Technology. (See “U.S. Targets HMO Fraud In Medicare and is tremendous.”

Medicaid,” by Laurie Mcginley and David S. Cloud, The Wall Street


Journal, Oct. 19, 1998, tinyurl.com/3nbxy823 and “Semiannual
Report - April 1, 1998 - September 30, 1998,” Department of Health
DATA MANIPULATION
Because large amounts of data are increasingly susceptible to
and Human Services, OIG, tinyurl.com/mvdbrxnh.) algorithmic manipulation, insurers are allegedly finding creative

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 19


THE MEDICARE DISADVANTAGE

ways to use technology to bend diagnostic targeting a data miner for this kind of Lareau, Forbes, Innovation, Aug. 19, 2022,
code results in their favor. fraud. [See “The DOJ Says A Data Mining tinyurl.com/2p83k5jw.)
In late 2021, the DOJ accused Kaiser Company Fabricated Medical Diagnoses To “The government has increased its
Permanente, a California-based managed Make Money,” by Fred Schulte, NPR, Sept. oversight in this area and that will con-
care consortium, of defrauding Medicare 14, 2021, tinyurl.com/5dpwsft5 and court tinue to happen,” says Starinsky, a former
of $1 billion by submitting inaccurate diag- document, case no 12-CV-0299(S), Sept. 13, senior auditor for the U.S. Department
nosis codes through the Advantage Plan. 2021, tinyurl.com/ax4vpm69.] of Health and Human Services Office of
The company allegedly used algorithms to Inspector General. (See “Justice Depart-
data mine and identify high-value codes ment’s False Claims Act Settlements and
and “then determined the diagnoses its TURNING THE SPOTLIGHT ON Judgments Exceed $5.6 Billion in Fis-
cal Year 2021,” DOJ, Feb. 1, 2022, tinyurl.
doctors would need to make to support
the [codes] Kaiser wanted to submit for INSURER FRAUD com/4zeecmvz and “Petition for a writ
Medicare reimbursement,” according Governmental and medical experts are of certiorari,” U.S. Supreme Court, Feb. 2,
to the court filing. The company alleg- increasingly sounding the alarm about this 2022, tinyurl.com/54fw6bs8.)
edly used high-pressure tactics. Doctors’ type of fraud, and the DOJ says it has made The DOJ has enjoyed some successes.
compensation was allegedly tied to report investigating and litigating wrongdoing In 2021, Sutter Health agreed to pay $90
cards based in part on their responses to in the Medicare Advantage Program, also million to settle allegations that it had
data-mining results. And Kaiser allegedly known as Medicare Part C, a top priority as knowingly submitted unsupported di-
asked those doctors who disagreed with more whistleblower cases come to light. agnosis codes and failed to correct them.
algorithmically induced diagnoses to meet (See “DOJ and OIG ramp up enforcement Data mining and high-pressure tactics
one-on-one with “data quality trainers” of risk adjustment coding: 5 compliance also allegedly played an important role
and attend mandatory meetings called tips for providers,” by Nicole Jobe and Cath- in this case. (See “Sutter Health and Af-
“coding parties” to reassess their views filiates to Pay $90 Million to Settle False
erine Feorene, Thompson Coburn LLP, Jan.
on diagnostic results, according to court Claims Act Allegations of Mischarging
27, 2022, tinyurl.com/yyk7tx43; “Medicare
documents. (See “United States ex rel. the Medicare Advantage Program,” DOJ,
Advantage Upcoding, Overpayments Re-
Osinek v. Permanente Med. Grp.,” case- Aug. 30, 2021, tinyurl.com/2p9b55uz and
quire Attention,” by Paul N. Van de Water,
text, May 5, 2022, tinyurl.com/2p96e3ue court documents, March 4, 2019, tinyurl.
Center on Budget and Policy Priorities, off
and “Kaiser Permanente Defrauded Medi- com/2p986j7w.)
the charts, Oct. 30, 2018,
care of $1 Billion, DOJ Alleges,” by Lydia
tinyurl.com/3vjme2z5;
Wheeler, Bloomberg Law, last updated Oct.
and “The Coming Ex-
26, 2021, tinyurl.com/2p843bkw.)
plosion Of Medicare
Other health care providers are also
Advantage Fraud And
allegedly using data mining to these ends.
In 2021, the DOJ alleged that New York- Penalties,” by David
based Independent Health, and an affiliat-
ed medical analytics company, DxID, used
unsupported risk codes to scam the Medi-
care Advantage Program. This marked
the first civil suit by the U.S. government

20 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


A CALL FOR CHANGE
Rising fraud, waste and abuse in the U.S. Medicare Advan- Advantage risk scores, as described above, it’s obliged by
tage plan is stirring the ire of politicians, who are calling for law to reduce those scores to make them more consis-
change. U.S. Representative Lloyd Doggett (D-TX), then-chair tent with the FFS coding used elsewhere in the Medicare
of the House Ways & Health Subcommittee, along with other system. Yet while CMS has the authority to impose a
lawmakers, took aim at the plan in a letter last year to the larger reduction than those required by law, the agency
Centers for Medicaid & Medicare Services (CMS). They’re has never done so, according to MedPAC. That higher
criticizing a system that they say is overpaying insurers bil- risk score in Medicaid Advantage plans resulted in an
lions of dollars compared to what the U.S. government would estimated $12 billion in unwarranted payments in 2020,
spend on the same beneficiaries under traditional Medicare. according to MedPAC. (See “Improving the Medicare
(See “Members Urge Reform of Medicare Advantage to Pro- Advantage Program,” MedPAC, testimony, June 28, 2022,
tect Taxpayer Dollars & Improve Care,” office of Rep. Lloyd tinyurl.com/ysd98uz7.)
Doggett, press release, Sept. 7, 2022, tinyurl.com/2d5s6msa • Enforce greater transparency around pricing practices of
and “Comment on Request for Information: Medicare Pro- insurance companies participating in Medicare Advan-
gram,” Aug. 31, 2022, tinyurl.com/4bpx4w6v.) tage to prevent manipulation of medical loss ratios — an
Doggett and fellow lawmakers think the CMS should Affordable Care Act mandate that requires these plans to
implement the following recommendations proposed by the spend 80% to 85% of what they receive from Medicare
U.S. Government Accountability Office, OIG and MedPAC to on medical claims and improving the quality of care. For
prevent what they call the “looting of Medicare:” smaller plans it’s 80%, and for the big ones it’s 85%. No
• Conduct targeted audits of plans receiving a dispropor- more than 15% to 20% of those premiums can go toward
tionate share of payments from chart reviews and health profits and administrative costs. (See “medical loss
risk assessments (HRAs). Chart reviews are an exami- ratio,” Healthinsurance.org, tinyurl.com/ystady8m.)
nation of a beneficiary’s medical records to identify However, those ratios are susceptible to fraud and other
diagnoses that a provider didn’t submit or submitted in types of manipulation. (See “Profits, medical loss ratios,
error. HRA involves collecting data from a beneficiary to and the ownership structure of Medicare Advantage
identify possible gaps in health care. OIG has expressed plans,” by Richard G. Frank and Conrad Milhaupt, USC-
concerns that insurers leverage both chart reviews and Brookings Schaeffer Initiative for Health Policy, July 13,
HRAs to maximize risk adjustment payments without 2022, tinyurl.com/nhdws34n and “What is Medical Loss
providing additional care for any diagnosis determined Ratio Fraud,” Price Armstrong, tinyurl.com/25wcch5f.)
through those assessments. DxID, the medical analytics
• Verify the accuracy of encounter data — details of a ben-
company cited in the case above, is accused of disre-
eficiary’s health and treatment based on “encounters”
garding the chart review requirement that submitted
with physicians. CMS has increasingly used this data to
diagnosis codes must be relevant to the date of service
determine risk-adjustment scores. (See “Encounter Data
years, not merely mentioned in prior years. MedPAC ad-
in Medicare Advantage,” Better Medicare Alliance, Jan.
vocates eliminating HRAs altogether as a source for risk-
12, 2021, tinyurl.com/yuv7942w.) Critics say that insur-
adjusted payments. (See “Some Medicare Advantage
ers provide insufficient information in encounter data,
Companies Leveraged Chart Reviews and Health Risk
such as national provider identifiers (NPIs) for physi-
Assessments To Disproportionately Drive Payments,”
cians and nonphysician practitioners. The CMS and OIG
U.S. Department of Health and Human Services Office of
use NPIs to conduct oversight and fraud investigations,
Inspector General, Sept. 20, 2021, tinyurl.com/4rbj9vjr.)
helping them to identify inappropriate billing and order-
• Reassess the use of in-home HRAs as a source of diagno- ing patterns. (See “CMS’s Encounter Data Lack Essential
sis for risk-adjustment payments. (Refer to the article’s Information That Medicare Advantage Organizations
opening Cigna case.) Have the Ability to Collect,” U.S. Department of Health
• Increase the statutory minimum coding adjustment that and Human Services Office of Inspector General, August
the CMS must make. When the CMS calculates Medicare 2020, tinyurl.com/uxpfzwf3.)

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 21


THE MEDICARE DISADVANTAGE

But it isn’t always easy to prove fraud,


and many cases are still stuck in the courts
hear UnitedHealth’s lawsuit on Medicare
Advantage overpayments rule,” by Robert
BIG MONEY
as insurers fight back against what they Still, if large amounts of government mon-
King, Fierce Healthcare, Payers, June 22,
think is unjust punishment for honest ey are any gauge for potential fraud and
2022, tinyurl.com/ykzbd2ta.)
mistakes and incorrect claims in diagno- worth the attention of fraud examiners, the
That case stems from UnitedHealth-
sis coding. They also argue that the U.S. Medicare Advantage program fits the bill.
care’s 2016 challenge
challe to the
h so-called
ed
government employs
emplo a double
d b standard The program now accounts for $427 billion,
overpayment rule that required plans to
bet ee audits
between aud ts in ttradi-ad - or 55%, of total federal Medicare spending
r
refund
d reimbursements
b to CMS within
hin
t o a Medicare
tional ed ca e a andd (net of premiums), according to KFF. That’s
60 d
days if the
h ddiagnosis llacked
k d the
h sup-
p- set to grow to more than $850 billion if
the
h Advantage
d
p
port of medical
d l records.
d It said
d the
h rule
le estimates by the U.S. Congressional Budget
plan.
l United-d
v l d “actuariall equivalence”
violated l by
b allow-
ll w- Office are correct. (See "Baseline Projec-
H
Healthcare,
ing supported
d and
d unsupported
d codes
d in tions," tinyurl.com/mry5dwzk.) It’s also
the biggest
gg
t
traditional Medicare while only permit-
it- worth noting that Medicare Advantage is
private
p in--
ting supported
d codes
d when
h calculating
l l ng fast becoming the dominant health care
su e in the
surer t e
U fought
U.S., h r k scores in Medicare
risk d Advantage.
d This
his option among elderly Americans reliant
legal ar- c
came as the DOJ joined
j two whistleblower
er on the country’s national health services.
guments c
cases against UnitedHealthcare,
d lh accusing
ng According to KFF, 28 million people, or 48%
ag
against the it among other
h things
h of ignoring invalid
lid of the 58.6 million of Medicare beneficia-
way y it used diagnosis
g codes to avoid returning
g over-
er- ries, were enrolled in Medicare Advantage
ddiagnostic
g p y
payments. (See “DOJ files official com-
m- in 2022. (See table on page 18.) That marks
ccoding g for plaint in Medicare Advantage
g fraud case
se a steep upward participation rate since
y
years before against
g UnitedHealth,” by Leslie Small,
ll, 2007, when just 19% of Medicare ben-
t h e U. S . F
Fierce Healthcare,
lh May 3, 2017, tinyurl.
rl. eficiaries had signed up for the program.
Supreme (See “Medicare Advantage in 2022: Enroll-
c /
com/4uzrj826 re
and “UnitedHealthcare
Court
C re- ment Update and Key Trends,” by Meredith
l
loses Medicare Advantage
g overpayment
nt
j e c te d i t s Freed, Jeannie Fuglesten Biniek, Anthony
s
suit,” b
by Rebecca
b Pifer, HealthcareDive,
lh ve,
appeall llast Damico and Tricia Neuman, KFF, Aug. 25,
Aug.
g 16, 2021, tinyurl.com/mbsn7nab.)
y
year. (See 2022, tinyurl.com/5ef9hvdz.)
“We very rarely g
get to call anything
ng
“S
“Supreme This growth comes on the back of
fraud
aud in health
ea t
Court dde- what some critics see as dodgy, if not fraud-
c
care b
be-
c es
clines ulent, sales tactics to get seniors signed
t o up with the plan, provoking the ire of
politicians who think the incentives driv-
ing insurers involved in Medicare are all
wrong. (See “Pocan, Khanna Introduce Bill
to Strengthen Medicare, Define Alternative
Plans, U.S. Representative Mark Pocan,”
cause actually
lly
press release, Oct. 13, 2022, tinyurl.com/
p
proving
i intent
i to
bajyyb5y and “Medicare Advantage has a
co
commit
t criminal
c a fraud
aud marketing problem,” by Victoria Knight,
i very h
is hard,”
d says May.
ay. Axios, Sept. 8, 2022, tinyurl.com/4jbrc5t8.)
l
“So, unless h are super
they er Meanwhile, complex policy debates
e
egregious cases involving
l hor- abound over how best to mend what many
rific amounts of money, it usually
lly see as the fragile financial state of the U.S.
stays at waste and abuse where there
re public health care system. That includes
is a negotiation about
b h much
how h they
h are
re questions over whether Medicare Advan-
g g to pay back.””
going tage’s diagnostic coding system ultimately

22 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


results in more waste, abuse and fraud
despite the benefits of greater choice for WHISTLEBLOWERS AND provides guidelines on audits and what
is expected of compliance departments
its beneficiaries.
Indeed, Medicare Advantage enrollees
OTHER REMEDIES at insurance companies. (See "Managed
Care Manual," tinyurl.com/3t6hhv5h.) But
Many internal whistleblowers have re-
now have access to close to $2,000 in ex- there remains much scope in how plans
ported fraud in Medicare Advantage cases
tra benefits annually, but this comes at an manage compliance and the people they
thanks to the qui tam provision of the False
extra cost to the taxpayer and ultimately hire to keep an eye on any misconduct.
Claims Act that allows those with evidence
to those seniors on Medicare who haven’t “It then comes down to the culture of
of fraud against a federal program to sue
signed up to the Advantage plan, accord- the company as to how independent the
on behalf of the U.S. government.
compliance department is,” says Beach.
ing to MedPAC, an independent legislative “Whistleblowers are going to con-
“Sometimes they hire a compliance officer
branch agency that provides analysis and tinue to become an integral part of these
who has no idea about health care. You
policy advice to the U.S. Congress about cases because the level of information they
would hope that someone is regularly con-
Medicare. (See “The Medicare Advantage tend to have is so unique,” says Rubenstein.
ducting an audit to ensure that the infor-
program: Status report and mandated re- “If an insurer has rewritten an algorithm
mation fed back to the CMS is true and ac-
port on dual-eligible special needs plans – to move someone from one category to
curate. But Medicare Advantage plans are
Chapter 12,” Report to the Congress: Medi- another, that requires people who under-
required to perform claims audits, which
care Payment Policy, MedPAC, March 2022, stand that technical information and can
are checked against processing guidelines,
tinyurl.com/5n9xzu65.) impart it.”
and these claims audits do not include the
Aside from advocating for whistle-
validity of the claims information, such as
blowers, some are calling for more super-
CALL FOR CHANGE vision and frequent audits. Each year, the
the diagnosis codes.”
Ricky D. Sluder, CFE, is head of health
In a recent report, MedPAC says that the CMS conducts what are called Medicare
care value engineering for Shift Technol-
private plans involved in Medicare Ad- Advantage Risk Adjustment Data Valida-
ogy, where he helps develop artificial in-
vantage have never produced savings for tion (RADV) audits to ensure the accuracy
telligence software that health-insurance
Medicare due to “deeply flawed” payment of the data used to determine risk-adjusted
special investigators can use to prevent
rates. The agency is calling for a major payments. And new rules for such audits,
and detect fraud in reimbursement claims.
overhaul of Medicare Advantage policies including the retroactive use of the new
“More audits are good as long as regu-
methodology to recover payments from
that it says have resulted in inflated cod- lation requires the plans to provide more
audits as far back as 2011, have ignited
ing and incomplete data on beneficiaries’ transparency in the encounter data (details
protests from the insurance industry. But
health care encounters. Committee for a of a beneficiary’s health and treatment
critics say the CMS has been far too meek
Responsible Federal Budget, a nonprofit based on 'encounters' with physicians),”
in its approach. (See “Insurers criticize
policy organization, has also questioned says Sluder. “Right now, the way encounter
risk adjustment overhauls for MA plans,”
how capitated payments incentivize insur- data is set up, it doesn’t tell the full story.
by Jeff Lagasse, Healthcare Finance, Sept.
ers and ultimately up the cost of Medicare. That sets up auditors for failure, and as a
6, 2022, tinyurl.com/yc4y9a42 and “‘The
(See “The Medicare Advantage program: CFE that bothers me because if I don’t have
Cash Monster Was Insatiable’: How Insur-
Status report and mandated report on the ability to gather all the facts, how can
ers Exploited Medicare for Billions,” by
dual-eligible special needs plans – Chap- I be effective?”
Reed Abelson and Margot Sanger-Katz,
ter 12,” MedPAC and “Reducing Medicare Whatever the merits of the Medicare
The New York Times, The Upshot, Oct. 8,
Advantage Overpayments," Committee for Advantage plans, fraud examiners focused
2022, tinyurl.com/2dw56tph.)
a Responsible Federal Budget, Feb. 23, 2021, on health care are likely to have their work
Some also wonder if the system re-
tinyurl.com/yy5srr3b.) And politicians have cut out for them in the years to come. ■ FM
quires a rethink about how insurance
also joined the chorus of voices propos- companies share information and audit
ing changes to the system. (See sidebar their data. In chapters nine and 21 of the Paul Kilby is editor-in-chief of Fraud Mag-
on page 21.) Medicare Managed Care Manual, the CMS azine. Contact him at pkilby@ACFE.com.

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 23


Identifying procurement integrity
breaches via data analytics

By
Sheryl Goodman
and
Tom Caulfield, CFE
Organizations need to buy goods and services.
Fraudsters love to target faulty procurement
systems because that’s where they can find
fantastic amounts of cash. But you can impede
integrity breaches with dynamic data analytics.

A
s protests raged in Chile in 2020 over the cost of liv- procurement because that’s where the cash is, and safeguards
ing and inequality, the government sought to procure are often lacking.
body cameras for the police to monitor events on the In fiscal year 2020, the U.S. federal government spent more
ground. After going through a public bidding process, than $665 billion on contracts — an increase of over $70 billion
U.S. telecommunications equipment provider Motorola Solutions from fiscal year 2019. Half of this increase, or $35 billion, is at-
won the business to supply 300 cameras at a cost of close to 400 tributed to spending on medical supplies and pharmaceuticals to
million Chilean pesos, or about $340 each at today’s exchange treat COVID-19 patients, among other things related to COVID-19.
rate. Soon thereafter, those involved in the bidding process found [See “A Snapshot of Government-Wide Contracting For FY 2020,”
themselves under investigation for irregularities. According to U.S. Government Accountability Office (GAO), June 22, 2021,
the local press, government officials accepted Motorola’s bid tinyurl.com/22destye.]
even though the company submitted its offer on the electronic In 2018, the U.S. Department of Defense (DOD) reported to
procurement portal outside the hours stipulated by the bid rules.1 Congress that over $6.6 billion had been recovered from defense-
In early 2021, the scandal intensified after Chile Compra, the contracting fraud cases from fiscal years 2013 through 2017. In
entity that runs the electronic procurement portal — known un- 2020, the DOD Office of Inspector General reported that roughly
der its Spanish name Mercado Público — revealed that Motorola’s one in five of its ongoing investigations are related to procure-
cameras had failed to meet some basic requirements — namely ment fraud. (See “DOD Fraud Risk Management: Actions Needed
an ability to keep recording for at least 120 seconds after being to Enhance Department-Wide Approach, Focusing on Procure-
turned off. ment Fraud Risks,” GAO, Sept. 20, 2021, tinyurl.com/ycycz3xu.)
The intense scrutiny over the bidding process (and what may Violators breach procurement integrity — honest, fair, im-
seem like a storm in a teacup for some) reflects Chile’s serious- partial, transparent and legal contracting — by deliberately and
ness in tackling corruption and its efforts to clean up its pro- covertly abusing established contracting procedures, policies
curement process with the help of technology. In the late 1990s, and requirements. Some examples of breaches are the improper
Chile created what was then a first-of-its-kind electronic portal acceptance of late vendor bids, biased technical evaluations dur-
for procurement to improve the efficiency and transparency of ing bid scoring, needlessly long delays in contract negotiation or
public spending. It’s been updating the system ever since. The awards, unnecessary limiting of solicitation periods, approving
electronic public marketplace brings together all those involved uncalled for contract modifications and competitors submitting
in the procurement process onto one easy-to-find platform.2 complementary bids.
This case represents how entities — public or private — Rule breakers who cause breaches don’t always commit con-
can detect and eventually prevent public procurement integrity tract fraud. For example, some internal employees who knowingly
breaches via data analytics and other types of technology. Other violate procurement policies or guidance might believe estab-
countries around the world have also set up systems that use lished requirements are unnecessarily or overly burdensome.
technology to catch procurement fraud. (See sidebar on page 31.) Others might think they’re helping their organizations when they
These breaches, a major risk to organizations worldwide, perform their contract breaches. (See “Five personality faces of
can result in unnecessary financial losses, reputational dam- procurement fraud risk,” by Tom Caulfield, CFE, CIG, CIGI; and
age, contract delays and even contract terminations. Corrupt Sheryl Goodman Steckler, CIG, CIGI, Fraud Magazine, November/
officials and internal and external fraudsters love to target public December 2017, tinyurl.com/skw4crfb.) Of course, these breaches

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 25


THWART PROCUREMENT FRAUD

are inexcusable, but some well-meaning employees might per- web design solicitation with just three bidders could be flagged
form them because of lack of training. as suspicious.
Regardless, organizations can greatly reduce procurement
breaches by using robust data analytics and continuous monitor- Triangulation
ing software. Now it’s no longer a question of how technology Triangulation is the use of multiple search conditions to identify
can ensure procurement integrity, but what are the best ways to a single procurement integrity risk. The number of conditions
incorporate data analytics into our procurement integrity control and specific triangulation methods will depend on available
systems? (A procurement integrity control system is the aggregate data and the ability to group procurement integrity risks into
of the people, processes, procedures and management systems similar categories.
that are designed to provide reasonable assurance regarding For example, if your analytics is monitoring the total number
the prevention, detection, reporting and capability to respond of sole-source contracts (also called directed procurements) by
to procurement abuse, procurement fraud or noncompliance procurement departments and it identifies one unit noticeably
higher by percentage than the others, is that in itself a procure-
with procurement policy.)
ment integrity risk? (As the name indicates, a sole-source contract
is procurement through solicitation of a proposal from only one
Ways to perform
source.) What if the same analytics also included an additional
searches for breaches
search requirement for any sole-source contracts containing a
Open Contracting Partnership (OCP) is an independent, not-for-
modification within 30 days after the award — when 30 days is
profit spun out of the World Bank promoting open and transparent
considered abnormal? If these two analytical results are com-
government contracting worldwide.
bined, would it now increase the level of accuracy in identifying
An OCP global literature review showcased a wide and some-
a more accurate procurement integrity risk?
times inconsistent view on the most effective ways to perform
If a third search condition is also added — such as the per-
analytical searches for questionable breaches in procurements.
centage of increase in the dollar value of the sole-source contract
(See “RED FLAGS for integrity: Giving the green light to open over its period of performance — we’d surmise that the higher the
data solutions,” OCP, tinyurl.com/4rzzjwm9.) However, three percentage, the greater the risks. By adding more search condi-
common points of agreement were identified: tions, we increase the ability to identify procurement integrity
• The need to contextualize. risks more effectively.
• The need to incorporate triangulation.
Data quality and quantity
• The importance of data quality and quantity.
The quality and quantity of available data directly impacts the
(See “G7 commits to open and participatory public procure-
ability to contextualize and triangulate. Quality in, quantity out
ment reforms essential to ensure trillions of dollars for recovery
(QIQO) means that the value of data input influences the value of
aren’t wasted,” Open Contracting Partnership, Sept. 10, 2021,
the results’ output. In practice, it means that if the data going into
tinyurl.com/bp7zcvb7.)
an analytical model is clean and of sufficient size, the resulting
work done by the model will be accurate. Creating data analytical
Contextualize searches to identify procurement integrity is challenging enough;
Organizations need to develop effective procurement integrity doing so with a data sample that’s limited in scale and scope could
data analytics in the right context. To illustrate, what’s a “short” exacerbate miscalculation and identification of false breaches.
or “long” period for a given procurement task or an “abnormally Data availability is also critical. Quick, easy and reliable
high” or “abnormally low” cost? The answer relies on several access to automated data is, of course, the single most relevant
specific factors, such as: (1) the type of procurement method (2) requirement for the successful implementation of procurement
services or goods provided and (3) the provider’s geographical integrity data analytics. The greater the number of datasets, the
location. For example, in a highly specialized profession like more comprehensive and advanced the data analytics technique
aerospace, a typical solicitation for the building of a satellite may will be. For example, if your data is limited to only collecting
only result in two or three bidders, but a contract for a new web vendor information (e.g., a vendor management system) and
design may result in over a dozen bidders. Under these scenarios, human capital information (i.e., employee demographics), your
three bids for a satellite could be considered normal. However, a data analytics may be restricted to existing relationships among

26 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM



employees and vendors, improper release of bidding information
and/or anti-competitive activity of bidders.
The quality
Potential integrity breaches and quantity of
Organizations collect and store enormous amounts of contracting available data
activity data in a digital format, especially with e-procurement
directly impacts
systems, so they can perform multitude analytical searches to
identify potential procurement integrity breaches, such as: the ability to
contextualize

• A pattern of contract awards followed by change orders that
significantly increase the price of the contracts. and triangulate.
• Invoices notably higher than the average cost of similar
services and goods.
• Disparity in bid prices greater than a threshold value.
• An existing financial relationship between a vendor and the
procuring entity’s employee.
• Bid prices dropping when a new or infrequent competitor
enters a competition.
• Patterns of anti-competitive cost submissions in bids.
• Invoicing inconsistent with contract terms.
• Unusual percentage of sole-source contract awards.
• Winning bids that don’t meet award criteria of “lowest price
technically acceptable” (LPTA) when LPTA is required.
• Inconsistent bid evaluation scorings.
• Awards below the competitive bid threshold followed by
change orders that exceed such limits.
• Total payment for service is greater than invoice total.
• Wide variation in line-item bid prices among bidders with-
out apparent justification.
• Contract line items remain in recurring contracts that have
never been called for in the past, and/or which weren’t
called for in future contracts.
• Supplier receives multiple single-source/noncompetitive
contracts from a single procuring entity during a defined
time period.
(Source: “How emerging technologies are helping tackle
procurement frauds,” by Arpinder Singh and Harshavardhan
Godugula, EY, April 11, 2022, tinyurl.com/a54au24u.)

Analytical techniques
Parameter analytics
Parameter analytics is a technique that uses a limited number
of datasets combined in a simple Boolean condition (“true or
false,” “yes or no”) followed by an action. [Boolean conditions are
queries that compare two values with each other, e.g., with == or

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 27


THWART PROCUREMENT FRAUD

>= (or “equal to” or “greater


“g than or equal to”),
) and then return the value true
or false or yes or no. Those values that are interpreted as true or false
depend on the data type.]
ty ]
A simple example
exam l would
ld be:
b “Is the
h name of the
h re--
quester of the goods and that of the procuring
g official
the same? If yes, identify.”
ide Parameter analytics and
building Boolean conditions
cond will
ll normally
ll start
from a known statement:
statem “If
the contract is structured
structu ed
for quarterly payments,
payme
numb
the maximum number
of payments is four (4).”
)
The Boolean condition
condit o
would be “is the number
numbe
of payments greater than
th
four?”
O t h e r e xa m p l e s
conditions
of Boolean conditi
could be: “Does any in--
voice have multiple tax
identification numbers?”
numbe
Or “does any contract have
h
a change order within
with 20
days after contract award?”
aw
Each of these can be filtered
te ed
as a “true or false,” “yes
“y or no” (Boolean condition) and
whenever positive to identify.
d It’s important to remember
b
that data analytics doesn't
do identify
d misconduct;
d it can only
l
identify indicators or questionable
bl breaches,
b h andd therefore
h
each may require additional
add l follow-up
ll to determine
d the
h true
causes.

Distribution analytics
anal
Distribution analytics rely on accurate historical data, known patterns
and thresholds. This type
t of analytics is looking
g for outliers throughout
g the procurement data,
such as payments by percentage that
h are h
higher
h than
h prior purchases
h for the
h same items or a
greater number of contract
co modifications than that of a similar contract.
These outliers, more
m commonly referred to as anomalies, can be identified when looking
g at
multiple prior procurement
procur occurrences in addition
dd to those
h identifi
d ed
d whenever
h the
h same type off
procurement isn’t consistent.
co For example, identify:
y (1) abnormally
y short periods between invoice
payments (2) a higher
highe number of payments compared to a similar contract or (3)) a higher number of
purchases under a multiple-award
m l l d contract for a product
d compared
d to a judgmental
d l sample.
l
exampl is identifying
Another example g the percentage
g of sole sourcing
g performed by a procurement
official compared to other
o h procurement officials.
l All
ll of these
h are b
based
d on a d
deviation from what’s
h

28 FRAUD MAGAZI
MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM
M
normal.l As mentioned d previously,l develop
d l effective procurement the risk score up to 10. The predictive analytical model would
integrity
g data analytics in the right
g contexts (i.e.,
e., contextualized). then automatically combine this risk factor with other risks,
again between 1 to 10, such as:
Sociall network
k analytics
l • Number of months for the period of performance: The
Use social network analytics,
U y also called
lled “link analysis,” greater the number, the higher the risk.
t determine
to d relationships
l h among g different entities
• Contract value: The greater the amount, the higher the risk.
and/or individuals. Organizations
g s design link analy-
• Procurement method used: Sole-sourcing and emergency
ses with
h the
h underlying
d l reality
l that
hat most misconduct
purchasing are always assigned a higher risk.
occurs among those h familiar
l with each other and
who have previously y established ed relationships. • Number of follow-on contracts: The higher the number, the
This
h analytical
l l approach h will normally gen- greater the risk.
e
erate web-like
b l k graphic h d displays
lays that visualize • Degree of complexity of the effort: Low complexity, low risk.
andd link
l k theh types and d strengths
gths of connections • Prior incidents with a vendor: Five or more prior incidents of
a
among organizations or individuals. These poor performance indicate a higher risk.
c
connections mightg includeude shared address-
• Number of days from contract award to the first contract
e phone
es, h numbers,b family
mily relationships,
compared to similar contracts: over 40 days, low risk;
company affilliationss and other business
between 20 and 39 days, medium risk; under 20 days, high
connections.
i
risk.
D
Design sociall network analytics
The combined risks will provide a statistical probability of
with a strong g reliance
liance on unstruc-
the contract’s overall degree of risk, which can be displayed to
tured d data,
d such
ch as blogs, video
visually give an “early warning” and an opportunity to determine
s
services, d ssion forums and
discussion
what follow-up may need to occur. The statistical probability can
oh
others. An examplemple could be us-
be visually displayed to identify each of the numerical values for
i
ing public
bl media dia networks like
each risk factor, giving a better understanding of the specific risk
T
Twitter, Facebook ok and/or LinkedIn
condition. The visual display can be configured to perform this
to track k potentially
ally inappropriate
type of analytics across a division of the organization, a region
relationships.
l h
of the country or a specific type of contract.

Predictive analytics
lytics
Predictive analytics is the
P he gold star of tech-
n
niques because
b it can forecastst a potential future
o
occurrence of improper conduct d or noncompliance to These breaches, a major risk
p
policyy or improper payments.
y Predictive analytics
lytics can be one of
to organizations worldwide,
the more effective contract management g techniques.
hniques. However,
predictive analytics isn’t easy because it requires
p quires (1) assigning can result in unnecessary
a numerical value of risk (i.e., risk factor)) to individual pro- financial losses, reputational
c
curement actions (2)) combining the risk k factors together damage, contract delays and
( comparing
(3) g results to historical procurement
rement data of the
organization and (4)) establishing a range nge of low to high
even contract terminations.
risk. The proper assigning
g g of a numeric
meric value to each
risk factor makes this analytical approach
pproach difficult.
To give an example, l let’s
l start
rt with this analyti-
c model: Using
cal g a range
g of 1 to 10,0, with 10 being the
h h
highest risk,
k assign a score b based
sed on the number
o standard
of sta da d deviations
de at o s o on tthee number of contract
modification (mods)) for a similarmilar contract. The
h h the
higher h percentage of deviation the higher

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 29


B
Breeding g
grounds for fraud
R
Research
h by
b the
h World
ld Bank
k found
d that
h governments around
d the
h world
ld
s
spend
d an estimated
m d $9.5 trillion
ll on goods
d and
d services each
h year. This
h
a
accounts for roughly
o hl one-third
h d of government expenditures
d and
d 10% to
20% of total gr
gross domestic product in many nations — more than 14%
i low-income
in o co e cou
countries.
t es Thiss does
doesn’tt accou
accountt for
o tthee ttrillions
o s of
o dol-
do -
lars spent in the
h private sector on contracts. (See
(

“GovTech:
h Putting
ting People First w
with Simple,
l
Efficient and
dTTransparent Government,”
v
W
World Bank Live,
v April 13, 2019,
9 tinyurl.
y
com/48rpmzym.)
ym
A procurement
e system
y that
a lacks
i
integrity is the
h ideal breeding g
ground
f waste of vital
for t resources, m
miscon--
d
duct and
d even w
worse, fraud.
d Regular
R l
p
procurement integrity
n data analytics
n
can provide
d indications
d of breaches
e
th organizations
that i can use to
o deter--
mine whether
h h they
t need to conduct
c
i d h reviews.
in-depth w
Data analytics
ly is not the
h end-all
solution,, but when combined
b with
t
trained
d employees
l y — in a setting committed
it d
t procurement
to n integrity — its potentiall is llimitless.
l ■ FM
F

Sheryl
S y Goodman
m and Tom Caulfield, CFE,
CFE, are co-founders off
Procurement Integrity
P g Consulting
g Services, LLC —a woman-owned
ssmall businesss specializing
g in developing,
g assessing
g and structuring
g
sstrategies
g to ensure
n contracting
g integrity.
g The company also assists
both domestic and international clients in identifying
b g and mitigat-
g
iing
g their inherent
r risk to procurement fraud and abuse, developing
g
analytical strategies
a t g and ensuring
g an environment commitment to
procurement integrity.
p g Contact Goodman at sheryl@procurement-
iintegrity.net.
g Contact Caulfield at tom@procurement-integrity.net.
C g

Endnotes
d s
1
“El informe de C
Contraloría
í que complica a Katherine Martorell, la actual vocera de
S
Sichel, por millonaria
n compra de cámaras
á GoPros para Carabineros,” El Mostrador,
O 15, 2021, tinyurl.com/yrrkksc3.
Oct. y /
2
“Martorell en p
problemas: informe de Chile Compra
p revela q
que Subsecretaría
incumplió
ó basess de licitación
ó para adquisición
ó de cámaras
á para Carabineros,”
El Mostrador, Jan.
n 6, 2021, tinyurl.com/yjm4tnk8; “Cámaras policiales: testigos
g
r
revelan presiones
e para favorecer a Motorola en licitación
ó de Martorell,” Nicolás
á
P
Parra a Montero, BioBioChile, March 23, 2022, tinyurl.com/2fsr5zwa;
y Felipe Díaz /
a d “Martorell
and ll in
n trouble:
bl Chile
h l Compra report reveals
l that
h Undersecretariat
d failed
l d
to comply
l with
hbbidding
dd rules
l for the
h acquisition of cameras for Carabineros,”
b
A
Archyde, Jan. 6, 2021, tinyurl.com/3km7m5dx. Also see “Chilecompra: Using
g
T h l
Technology to Deliver
el Better Value
l for Public
bl Money,” b
by Rachel
h l Lipson, Harvard,
d
T
Technology and Operations Management, Nov. 18, 2016, tinyurl.com/4ufy3cb7.

30 FRAUD M
MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM
M
International examples of
data analytics systems

Brazil authorities) are better equipped to make public contracts awarded in 2012, won
informed procurement evaluation and over 32% in 2016.
The Office of the Comptroller General These drastic statistical changes
contract award decisions. Cartelogy is
of Brazil launched the Public Spending are suspicious because IMCO found
configured to reduce the probability of
Observatory (Observatório da Despesa
contracts being awarded to phantom, that most public procurement markets
Pública) to enable the continuous
crony or colluding companies, and typically maintain a certain range of
identification of potential misconduct
expose conflicts of interests or personal stability in public contract awards — never
and fraud in public procurements. (See
relationships among public officials and in inflated numbers, such as these. The
“Country case: Public Spending Obser-
companies. (See “Cartelogy: A tool for IMCO’s findings were provided to the
vatory in Brazil,” OECD, 2016, tinyurl.
fair competition and corruption-free pub- Mexican National Anti-Corruption System
com/2ppnt2tr.) The Observatory cross-
lic procurement in Malaysia,” by Zulkfli for further investigation. (We can’t further
checks procurement data with other
Ahmad, Open Contracting Partnership, report on any investigation conducted
government databases and identifies
Aug. 23, 2019, tinyurl.com/3wpuym8h.) by this system because of the lack of
possible misconduct by color coding in
publicly available information.)
orange or red flags for follow-up reviews.
The system looks for 20 indicators of
potential wrongdoing, including: Mexico
U.S. Postal Service
• Conflicts of interest by procurement The Instituto Mexicano para la Competi-
personnel. Some U.S. government agencies utilize
tividad (IMCO), a Mexican NGO, used
• Contract splitting to avoid competitive data analytics to enhance procurement
analytics to spot suspicious patterns in
bidding. integrity. For example, the U.S. Postal
contract awards. The IMCO wanted to
• Unusual bid patterns in amounts or Service (USPS) inspector general's office
number of bidders. identify any patterns related to which
built the Risk Assessment Data Reposi-
• Bidders with the same address. vendors had historically won a specific
tory (RADR) to help identify high-risk
• Rotation of winning bidders. percentage of public contracts; namely
contracts for follow-up audits and
• Contract amendments within one who the awarding government organiza-
investigations.
month of contract award. tions were; how much was being paid;
At its core, RADR is a suite of analyti-
and the dates and periods of perfor-
cal models that merge data from a vari-
Malaysia mance. (See “Corruption Risk Index: the
ety of internal sources and scores it on
Mexican Public Procurement System,”
The Malaysian Administrative and Mod- the likelihood — or probability — of fraud.
IMCO, Investigation, March 5, 2018, The resulting analytics are displayed
ernization Unit, an agency within the
tinyurl.com/fwrnv338.) on a geographic interface allowing for
Prime Minister’s Department, developed
The IMCO analytics project clearly proactive actions rather than waiting to
“Cartelogy,” a proactive and preventive
identified a pattern of contract awards receive reports of wrongdoing. The USPS
tool to help the ministry of finance and
after various presidential elections. Spe- developed RADR with inspectors general
other procurement agencies identify po-
cifically, after Mexico’s 2012 presidential offices’ subject-matter and technical ex-
tential bid-rigging and corruption risks in
public procurement at the tender stages election, 73 companies had won 29% of perts along with a contractor to develop
before contracts are even awarded. the Mexican public contracts awarded tailored algorithms. The analytical tool
Cartelogy combines data about that year. However, after the 2016 elec- was first built to identify potential health
procurements, company profiles and tion and a change of administration, the care fraud, expanded to contracts and
political persons. The tool is designed to same 73 companies were awarded less financial fraud, and eventually to mail
analyze, evaluate, and detect potential than 1% of all public contracts. The data theft. (See “In-house analytics tool maps
breaches so that decision-makers (as well also revealed that a second group of fraud at USPS,” by William Jackson, GCN,
as oversight committees and relevant companies who had won only 2% of all May 20, 2014, tinyurl.com/2wbdwzxc.)

F
FRAUD-MAGAZINE.COM
E.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 31
BATTLING
fraudulent product
substitution
By Stewart Thompson, CFE

32 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


Fraud fighters have long been aware of the dangers
of product substitution and counterfeit parts
in military equipment. But global supply chain
shortages and the U.S. armed forces’ need for
obsolete parts have exacerbated the problem. Here
a former NCIS agent talks about his experience and
how a more proactive approach can help.

I
magine for a minute that you’re controls the timing of the ejection — con- counterfeit components/product substitu-
an Air Force pilot flying the tributed to the pilot’s death. Not only that, tion — which is really a category of pro-
fighter jet F-16CM Falcon and but the electronic components inside the curement fraud all on its own — remains
you’re returning to base after sequencer were reportedly counterfeit, an ongoing problem.
a nighttime training mission. even though the F-16 manufacturer main- With the U.S. government looking
While attempting to touch tained the strictest quality controls over to replenish billions of dollars in military
down on the runway, you discover that its subcontractors that built the ejection aid to Ukraine on the back of supply chain
your landing gear is damaged. You execute seat and the DRS. woes, fraud fighters are once again on high
a go-around and try to land again, this time This incident is based on the true alert for signs of fraud and abuse. In fact,
by having the plane’s tailhook catch an ar- story of First Lt. David Schmitz, an F-16 there are even more pressures and oppor-
resting cable. That fails too, and the wing Fighting Falcon pilot, who died in June tunities to commit this type of fraud, as
touches the runway. As the plane starts to 2020 in a botched landing after his ejection people seek illicit sources for parts amid a
crash, you reach down and pull the ejec- seat failed to deploy its parachute. It un- global supply chain crisis that has created
tion handle, which releases the canopy. derscores the need for strict enforcement a rich environment for fraud and made
An explosive cartridge launches your seat of U.S. Department of Defense (DOD) stan- the U.S. more vulnerable to threats from
over a hundred feet into the air. But your dards for military parts. And an important foreign adversaries.
parachute fails to deploy, and you realize part of that is the aggressive investigation Concerns about the use of Chinese
you’re about to slam into the ground, still of anyone suspected of prioritizing profits components in U.S. military equipment
strapped into your seat, with only a frac- over safety by substituting subpar com- are on the rise not only because they might
tion of a second to go before your death. ponents to meet contract demands and be counterfeit but also for their potential
How could a scenario like this happen? passing them off as parts that meet the use in sabotage and spying as military and
Once an ejection handle is pulled, it trig- standards. (See “An F-16 pilot died when economic competition between the two
gers an almost instantaneous sequence his ejection seat failed. Was it counterfeit?” superpowers intensifies. Earlier this year,
of events aimed at getting the pilot safely by Rachel S. Cohen, Air Force Times, Sept. FBI Director Christopher Wray warned that
to the ground. But in this real-life exam- 13, 2022, tinyurl.com/5n9amjba.) the Chinese government “poses the big-
ple of the potential dangers of product Because of the enormous amount gest long-term threat” to the economic
substitution, an Air Force investigation of government funding that goes into and national security of the U.S. and its
later revealed that the failure of the seat’s the defense sector, the U.S. military has allies. (See “Heads of MI5, FBI give joint
digital recovery sequencer (DRS) — which long suffered its fair share of fraud. And warning of growing threat from China,”

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 33


BATTLING FRAUDULENT PRODUCT SUBSTITUTION

by Juby Babu, Reuters, updated July 7, 2022, Program at major U.S. Navy commands to in prison and fined $50,000 after
tinyurl.com/ywr9prmk.) supplement its more traditional, reactive years of falsifying the results of tests
Just last September, the Pentagon and role. He also helped procure funding so to measure the strength and tough-
Lockheed Martin suspended deliveries of that NCIS agents could obtain their CFE ness of steel used in Navy submarines.
F-35 fighter jets after discovering that a credential, realizing they needed the train- Bradken is the Navy’s leading sup-
subcontractor had used a magnet made of ing the ACFE offers. [See “I’m a CFE - Nancy plier of high-yield steel castings for
cobalt and samarium alloy that came from Rich, CFE, Special Agent at the Naval Crimi- submarines, which can’t fail during a
China. Lockheed described the supplier nal Investigative Service (NCIS),” by Emily collision. But for 30 years, Thomas fal-
of the alloy as a “fifth-tier” supplier amid Primeaux, Fraud Magazine, September/Oc- sified test results to hide that its cast-
concerns that the Chinese-sourced materi- tober 2014 issue, tinyurl.com/2xxbhcvw.] ings failed to meet the Navy’s rigorous
als might have violated the Defense Federal Lockwood envisioned that agents standards. Bradken agreed to pay a
Acquisition Regulation Supplement — re- would embed themselves in major Navy nearly $11 million civil settlement
quirements and regulations designed to command headquarters to develop close related to the case. In all, the fraud
maintain the integrity of sensitive govern- relationships and promote fraud aware- affected 30 submarines, and the Navy
ment information that third parties might ness through briefings. This proactive has had to spend nearly $14 million to
hold or use. [See “Pentagon suspends F-35 approach would help agents better un- assess the risks to the vessels.
deliveries over Chinese alloy in magnet,” by derstand and assess command vulner- • From 2012 to 2019, Brighton Cromwell,
Stephen Losey, Defense News, Air Warfare, abilities and concerns. It was during this LLC, a military vehicle parts supplier,
Sept. 7, 2022, tinyurl.com/yydbz6fx and time that Admiral Walter Massenburg took allegedly provided the DOD with non-
“Defense Federal Acquisition Regulation over the reins as Commander of Naval Air conforming materials and knowingly
Supplement (DFARS),” Security Encyclo- (NAVAIR) Systems Command in Patuxent violated the Defense Federal Acquisi-
pedia, tinyurl.com/4m9we9m9.] River, Maryland. tion Regulation Supplement by selling
As a retired special agent for the Na- In 2005, members of the NCIS Eco- items without determining whether
val Criminal Investigative Service (NCIS), nomic Crimes Division, Washington, D.C., they were manufactured according
I spent many years investigating product went down to NAVAIR to brief Massenburg to the Buy American Act or the Trade
substitution cases for the Navy. Here I look on the Integrated Agent Program. Debbie Agreements Act. Brighton Cromwell
back on how the NCIS took a renewed in- Winslow, NCIS assistant special agent-in- also allegedly breached its contracts
terest in counterfeit parts, the latest cases charge, told me that when Massenburg with the government after selling it
of wrongdoing in this corner of the fraud was asked to identify his major concern, items manufactured or assembled in
world and how NCIS’s proactive approach he replied, “What keeps me up at night prohibited countries. In 2021, it agreed
can make all the difference in detecting are potential safety mishaps involving our to pay $850,000 to resolve these
and preventing product substitution. aircraft.” allegations.
That philosophy continues to this day
A renewed focus on as NCIS works alongside other government Dangers lurking in the
product substitution agencies to prevent this type of fraud and gray market
After the 2000 USS Cole bombing and the accidents it causes. Here are some re- Historically, the DOD has relied on compa-
the Sept. 11 terrorist attacks in 2001, the cent cases of product substitution, involv- nies like Bradken and Brighton Cromwell
NCIS’s fraud program was overshadowed ing NCIS and the Defense Criminal Inves- to manufacture or sell parts for military
by those events and became extinct ... al- tigative Service (DCIS) — the investigative aircraft and weapon system applications.
most. The NCIS resurrected it, largely due arm of the Office of Inspector General, U.S. However, as the cases above illustrate, un-
to the efforts of former Special Agent Louis Department of Defense (DOD). (See “Semi- scrupulous companies have used various
Lockwood, who in 2005 became NCIS’s di- annual Report to the Congress,” Inspector methods to introduce counterfeit or non-
vision chief, economic crimes, which is the General, DOD, Oct. 1, 2021, through March conforming parts into the DOD procure-
department responsible for safeguarding 31, 2022, tinyurl.com/4mkww6h3.) ment chain. This is worrisome because
the Navy’s acquisition programs from fraud • In February 2022, Elaine Thomas, the counterfeit parts imported from abroad
and corruption. Lockwood developed and former director of metallurgy at Brad- and sold to DOD distributors can poten-
implemented the Integrated Agent Fraud ken Inc., was sentenced to 30 months tially compromise U.S. national security.

34 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


Because of the enormous amount of government
funding that goes into the defense sector, the U.S.
military has long suffered its fair share of fraud.
And counterfeit components/product substitution —
which is really a category of procurement fraud all
on its own — remains an ongoing problem.

These items can contain malicious com- Against this backdrop, major prime investigating counterfeit parts — Op-
puter code and create a back door into DOD contractors at NAVAIR were reporting in eration Chain Reaction — Stephanie A.
networks, enabling a foreign adversary to the Government-Industry Data Exchange McCloskey was sent to prison in 2011 for
access sensitive information to commit Programs (GIDEP) increasing procure- importing counterfeit integrated circuits
espionage. And the gray markets — where ments of counterfeit integrated circuits from China and Hong Kong and selling
items are sold outside the manufacturer’s (ICs) from multiple independent dis- them to the U.S. Navy and defense con-
authorized channels — have been a par- tributors. (See “Counterfeit Part Report- tractors. McCloskey and others had run
ticular concern. (See “Brand Protection ing Trends,” by Henry Livingston, Feb. 11, their operation from a Florida-based firm
Insights from Industry Leaders in Gray 2014, tinyurl.com/4fw23bf6.) GIDEP is an called VisionTech Components, generat-
Market, Counterfeit and IP Fraud Mitiga- information-sharing program between the ing $15.8 million from those sales. I was
tion,” by Sherri Erickson, De La Rue and U.S. government and industry. GIDEP’s da- the case agent at NCIS, which conducted
John Solheim, FiveBy Solutions, December tabase receives and disseminates informa- the investigation jointly with U.S. Immi-
2020, tinyurl.com/4b6zade8.) tion about nonconforming products and gration and Customs Enforcement’s (ICE)
Gray markets aren’t new. Nor is their materials. The DOD has also designated Homeland Security Investigations (HSI).
use to game the U.S. military procure- GIDEP as its central database on obsolete (See “VisionTech administrator sentenced
ment system. In 2006, a U.S. district court military parts and those parts with a di- to prison for role in sales of counterfeit cir-
charged the owners of eGlobe Solutions minishing number of manufacturers. (See cuits destined to US military,” U.S. Depart-
Inc, an authorized seller of Cisco Systems www.gidep.org.) ment of Homeland Security, Oct. 25, 2011,
products, with defrauding the government tinyurl.com/ytbehkhf.)
on computer equipment contracts worth Clamping down on BAE Systems Electronic Solutions had
$788,000. They allegedly sold gray-market counterfeit parts reported that it and NAVAIR had jointly
and counterfeit products from China to By the early 2000s, the rise in this type of procured suspected counterfeit microcir-
the Navy. Unauthorized vendors also al- fraud helped spur a series of investigations cuits from a parts broker; this broker had
tered that equipment to appear as if the by law enforcement into the distribution purchased the discrepant devices from a
product met the contract specifications. of counterfeit network hardware, bring- second tiered subcontractor based in Flor-
(See “Edmonds Brothers Charged With De- ing together various agencies including ida, which we now know was VisionTech.
frauding The Government on Computer the NCIS and DCIS. (See “Departments of NAVAIR and BAE had procured these parts
Equipment Contracts,” DOJ, press release, Justice and Homeland Security Announce for the purpose of installing them in ship
Nov. 16, 2006, tinyurl.com/4rs9npu4 and International Initiative Against Traffickers and land-based antenna equipment related
“Inspector General United States Depart- in Counterfeit Network Hardware,” DOJ, to the identification friend foe (IFF) sys-
ment of Defense Semiannual Report to the Feb. 28, 2008, tinyurl.com/wtv6wzsh.) tem, which enables the military to identify
Congress, Oct. 1, 2006 – March 31, 2007,” In the case that laid the foundation whether incoming aircraft or vehicles are
tinyurl.com/m9kewsyp.) for the creation of the largest task force friendly or hostile.

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 35


BATTLING FRAUDULENT PRODUCT SUBSTITUTION

In a related case I worked on, owners


of California-based company MVP Micro Unscrupulous companies have used
were sentenced to 20 months in prison for
importing counterfeit microchips from
various methods to introduce
China. In a process called “blacktopping,”
the owners took legitimate chips, sanded
counterfeit or nonconforming parts
off the brand markings and re-marked into the DOD procurement chain. This
them to make them appear to be of a
higher quality. The company owner was is worrisome because counterfeit
indicted and pleaded guilty in U.S. Dis-
trict Court. One of the counts he pleaded parts imported from abroad and sold
to was purchasing a counterfeit, military-
grade integrated circuit from VisionTech. to DOD distributors can potentially
(See “Three California Family Members
Indicted in Connection with Sales of Coun- compromise U.S. national security.
terfeit High Tech Parts to the U.S. Military,”
DOJ, Oct. 9, 2009, tinyurl.com/yc2ja2dx certificates of conformance (CoCs) for parts Counterintelligence Division all intelli-
and “Operations Manager for MVP Micro destined for use in the space shuttle. An gence gleaned from companies abroad that
Sentenced to 20 Months in Prison For Con- authorized party typically provides a CoC were importing counterfeit parts into the
spiring to Sell Counterfeit Microelectron-
to verify that a product meets certain U.S.
ics to the U.S. Military,” DOJ, Feb. 22, 2022,
standards of specification. (See “What is Despite efforts to put an end to this
tinyurl.com/mry4e869.)
a Certificate of Conformance?” My Ac- type of fraud, law enforcement and manu-
Other investigations involved differ-
counting Course, tinyurl.com/yvb9vdxt.) facturers continue to fret about the sale
ent agencies, including the Federal Avia-
This resulted in the FAA issuing an unap- of unauthorized parts through the gray
tion Administration (FAA), NASA Office
proved parts notification (UPN), initiat- market and other means. Cisco Systems
of Inspector General (OIG), and the U.S.
ing a suspected unapproved parts (SUP) recently warned that the disruptions in the
Department of Transportation OIG, as both
investigation and sharing the informa- global supply chains due to the pandemic
civilian and military aircraft share many
tion with law enforcement agencies. (See have encouraged its customers to turn to
of the same parts. For example, one com-
“Owners of Florida Aerospace Metals Sup- unauthorized channels to purchase its
pany, which had contracts with NAVAIR
and NASA, altered test results and falsified plier Pleads Guilty to Supplying Customers gear. This has resulted in a spike of avail-
with $854,379 in Sub-Standard Metals,” ability of counterfeit/gray-market Cisco
OIG, U.S. Department of Transportation, equipment. (See “Cisco Warns Supply
Sept. 12, 2006, tinyurl.com/2drxcyw9.) Chain Issues Causing Spike In Gray Mar-
As part of these cases, we reviewed ket, Counterfeit IT Gear,” by Gina Narcisi,
U.S. Customs and Border Protection (CBP) CRN, Networking News, April 28, 2022,
import/export seizure records with the tinyurl.com/53xu69d8.)
assistance of Homeland Security’s Intel-
lectual Property Rights Resource Center Need for obsolete parts
and found that the implicated companies Many micro components installed in mili-
distributed counterfeit electronic compo- tary and aerospace applications are tested
nents and violated U.S. export licensing to withstand conditions typically experi-
requirements. As a result, the original enced in a military environment such as
equipment manufacturers would often shock, vibration, salt spray, high-altitude
issue cease-and-desist letters to the con- pressures and extreme temperature rang-
tractors receiving the bogus parts to pro- es. As a result, many of these parts are la-
tect their brands against trademark in- beled as military grade. Fake components
fringement. I shared with NCIS’s Foreign could work perfectly fine for months and

36 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


then prematurely fail when most needed Lanhee Lee, Reuters, June 28, 2022, tinyurl. that products presented for acceptance
long after installation and use. com/2p8zm38x.) It’s hoped that the recent satisfy established contract technical
The problem is exacerbated by the fact passage of the U.S. CHIPS Act bill will boost requirements.
that the DOD relies on obsolete parts, es- the production of microchips in the semi- Alternatively, a contract may simply
pecially brand-name, trademark-protected conductor industry and help alleviate these stipulate destination acceptance. This
microchips, to maintain its aging aircraft shortages. (See “The proposed legislation means that the organization where the
fleet and weapon systems. DOD aircraft to boost semiconductor manufacturing,” product was sent will administer the in-
and other weapon systems are designed by Alex McLenon, WDET, July 23, 2022, spection and acceptance process for the
to operate with upgrades for decades. In tinyurl.com/yrmsukeu.) government. As part of DCMA procedures,
many cases, original equipment or com- it’s common to have DOD employees,
ponent manufacturers no longer make or Understanding the known as quality assurance representa-
upgrade the proprietary semiconductors vetting process tives (QARs), perform on-site inspections
used in the systems, because it’s no longer Before examining proactive methods im- to confirm that quality procedures are in
cost-effective. This forces the DOD to turn plemented at NAVAIR, it first may help to place and to perform material acceptance
to outside channels, such as unauthorized understand the vetting process for supply inspections. In addition, DCMA QARS wit-
distributors or parts brokers, which leaves contracts in the U.S. armed forces. ness various types of testing to verify that
the industry vulnerable to procuring coun- The Defense Contract Manage- contractual requirements are met.
terfeit or gray-market materials. In addi- ment Agency (DCMA), which adminis- When the DOD identifies a substan-
tion, global supply chain disruptions create ters contracts for the DOD, carries out a dard part, the supplier typically claims
even more of an opportunity for brokers to process known as origin inspection and innocent error or that the government
sell fake parts. (See “Fraud’s fertile breed- acceptance. This involves going to the reported the deficiency long after the ex-
ing ground,” by Stephen Pedneault, CFE, contractor’s facility to inspect and verify piration of any warranty. This usually re-
CPA/CFF, Fraud Magazine, January/Feb- the product for acceptance. The DCMA sults in either a credit to the government
ruary 2022 issue, tinyurl.com/4cn4j8n9 works directly with the defense contrac- or some determination of cause or blame.
and “Chip shortages result in record wire tor to ensure sufficient technical systems When the DOD detects nonconforming
fraud reports by desperate buyers,” by Jane are in place to produce the products and parts, it’s often difficult to prove intent to

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 37


BATTLING FRAUDULENT PRODUCT SUBSTITUTION

defraud without compelling evidence. The A review of the pertinent DCMA file Queries of product quality deficiency
DOD normally administers each problem and witness interviews revealed the QARs reports (PQDRs) revealed that the compa-
as a separate instance and rarely conducts had issued these companies numerous nies provided nonconforming parts to the
an analysis of the overall practices of the corrective action requests (CARs), docu- DOD. PQDRs are part of the Navy’s product
vendor for possible referral for criminal menting the contractors’ quality deficien- data reporting and evaluation program
investigation. Law enforcement agen- cies, including repeated testing failures. (PDREP), which is useful in locating com-
cies have traditionally investigated bogus CARs provide written notification to a panies selling nonconforming products/
parts cases reactively. This investigative contractor that the parts inspected were services to the government. (See tinyurl.
rejected and inform the contractor of the com/z92n83a3.)
approach of addressing the problem and
reason for the failure. These companies For example, one of the companies in-
of developing and prosecuting bogus parts
also had a lengthy history of failing first volved in this case was issued a PQDR after
cases has had only limited success.
article testing (FAT) inspections witnessed supplying defective cables associated with
by QARs or independently performed by the AIM-9 missile’s guidance system. The
Proactive prevention NAVAIR engineers to ensure a contractor cable was classified as a CAI. The PQDR
A proactive approach provides a more ef-
can correctly make the part. concluded that the parts didn’t pass cali-
fective and efficient means of obtaining
The investigation revealed that one of bration tests. Had they been installed, the
evidence to prosecute suspects, who are the companies failed a FAT inspection for missile system would’ve likely been ren-
predisposed to supplying nonconforming a motor cable, part of the weapons system dered inoperable. The AIM-9 (Sidewinder)
parts to the DOD. This starts with monitor- for a U.S. Marine Corps amphibious ve- is a supersonic heat-seeking missile car-
ing suppliers for red flags. A disproportion- hicle. The cable was classified as a critical ried by U.S. fighter aircraft. This is an es-
ate percentage of deficiency reports, failed application item (CAI), meaning if it failed pecially effective weapon as the pilot can
tests or inspections, and terminations for it would likely impact the ability or perfor- fire the missile and immediately exit the
convenience or default are good indica- mance of a weapon system to carry out a area to get out of harm’s way. The DCMA
tors of chronically unreliable suppliers, required mission. After the testing failure, had previously rejected the parts after they
whether they’re careless, unscrupulous the contract was terminated for default. failed in-house testing, resulting in the is-
or possibly both. Despite that the company subsequently suance of a CAR. But the contractor then
Here’s one case that underscores the provided motor cable assemblies with the sold the parts, accompanied by a CoC, to
importance of paying attention to these same part number, including a CoC, under a commercial distributor, which in turn,
warning signs. In 2006, the DCIS and NCIS a destination acceptance DOD contract. sold them to the DOD.
initiated an investigation, implicating the Another one of the companies sup-
plied serialized wiring harnesses for Seal
owner of four companies in knowingly
Team 1’s submersible Seal Delivery Vehi-
providing nonconforming parts to NA-
cles (SDV). These serialized parts had been
VAIR. For example, the companies failed
rejected under an earlier contract after
to conduct contractually required testing
failing an in-plant insulation resistance
and falsified CoCs.

38 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


“What keeps me up at night are
potential safety mishaps
involving our aircraft.”
- Admiral Walter Massenburg

test, which resulted in moisture entering


the cable/connectors. After receiving the
parts, Seal Team 1 authored a PQDR. One
part bore the same serial number as the
one that the DCMA QAR had previously
rejected. Had these parts been installed, evidence. The parts were then tested for
a failure would've had potentially disas- compliance with contract specifications
trous consequences to the safety of the by NAVAIR’s system engineering depart-
crew during high-risk exercises and mis- ment or the original manufacturer of the
sions, as the vehicle would need to surface. part, which was often a member of the
(See “Indictment alleges business owner Semiconductor Industry Association (SIA)
Anti-Counterfeiting Task Force (ACTF).
defrauded U.S. gov’t.,” Centraljersey.com, activity for civil remedies to initiate debar-
The SIA ACTF provided direct support to
Aug. 13, 2008, tinyurl.com/bdfthedh and ment and suspension proceedings.
law enforcement in the form of report-
“Monmouth County Defense Contractor The above examples demonstrate how
ing suspected counterfeit devices and
Pleads Guilty to Making False Statements some contractors and parts distributors
in testing suspected counterfeit parts.
to Defense Department,” DOJ, Jan. 15, 2010, egregiously supply nonconforming parts
(See "Anti-Counterfeiting," SIA, tinyurl.
tinyurl.com/2uvmaxnb.) to the DOD despite the best efforts of gov-
com/6ju5ve9k.)
ernment to prevent this type of fraud. Bad
If the parts failed testing, then law
Working together enforcement agents considered making
actors can still find ways to intentionally
NAVAIR carried out proactive operations sell defective goods through distributors
repeat buys. Sources engaged subjects in
to help determine whether suspects know- that knowingly or innocently sell bad parts
consensually monitored telephone con-
ingly provided nonconforming parts for to the DOD or to major contractors. This
versations to potentially elicit incrimi-
use in military systems. To make these underscores the importance of imple-
nating statements and to request any test
determinations, NCIS/NAVAIR would fund menting proactive operations at various
data from the company and CoCs that the
the purchase of parts from subject contrac- military commands to combat product
supplier hadn’t already provided. NAVAIR
tors. Law enforcement agents worked with substitution. n FM
would identify all platforms in which the
NAVAIR to conduct research relating to the discrepant parts were installed. NCIS
military specifications associated with the would notify sister law enforcement agen- Stewart Thompson, CFE, is a retired
parts. The relevant military command or cies if their organizations were impacted. special agent for the Naval Criminal
agency — i.e., NAVAIR, DCMA, or Naval Law enforcement agents worked closely Investigative Service (NCIS). He served
Sea Systems Command — provided the with the relevant assistant U.S. attorneys over 25 years at the U.S. Department
specifications, which would, in turn, be to apply for and execute search warrants. of Defense and as an insurance fraud
given to the suspected supplier. Once NCIS After the criminal case was completed, it investigator with the State of Maryland.
received the parts, they were entered into was referred to the pertinent debarment Contact him at thomps4649@gmail.com.

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 39


WHAT CAN CFES LEARN FROM PRIVATE INVESTIGATORS?

WHAT CAN
FRAUD
EXAMINERS
LEARN FROM
PIS?
Some Certified Fraud Examiners, who are
also licensed private investigators, say their
PI skills have helped them become better
practitioners. Here’s what they can teach us.
By Dick Carozza, CFE
T
here’s a good Intelligence and OSINT Investigations questions or ease concerns,” says Will-
possibility (2021)," Maltego, tutorial, Oct. 31, 2021, ingham. “I just happen to be a private
you’re a Certi- tinyurl.com/mwka9sr8.] investigator.” 
fied Fraud Ex- “I never got to look at the original Marcy Phelps, CFE, PI, is owner of
aminer. But you’re prob- subcontractor’s invoices and time sheets Marcy Phelps & Associates Inc., a firm
ably not a licensed private like I would in a financial investigation, focused on due diligence, financial as-
investigator. Are you missing but through my PI work I was able to write set investigations and training services.
out?
t? Not necessarily, but some a report for the client so they could end She says, “I see private investigators as
C s believe their hard-won PI
CFEs the subcontractor engagement and turn it unbiased third parties — those with no
sk s burnish their fraud exam-
skills over to law enforcement,” Wietholter says. stake in the outcomes of investigations.”
iner careers
areers and make them bet- “I was able to get the job done successfully The PI-finder site PInow (pinow.com)
fessionals.
ter professionals. without looking at one spreadsheet!” says clients might hire PIs for investigat-
L ah Wietholter, a licensed
Leah ing suspicions of infidelity, performing
P
PI, is one e of those CFEs. In a case What’s a private investigator? background checks on potential employ-
sshe worked, ed, an engineering busi- As we all know, the CFE Exam tests pro- ees, investigating the validity of an insur-
n
ness came to her firm, Workman Fo- spective CFEs on four areas: financial ance claim or finding a missing person.
rensics, afterr its managers suspected a transactions and fraud schemes, law, Most of the CFEs/PIs interviewed here
s b
subcontractor or was stealing from them fraud prevention and deterrence, and also conduct in-depth due diligence for
v overbilling.
via b ll g. The subcontractor had investigation. The investigation section their clients.
b
burned through gh the budget granted by of the ACFE Fraud Examiners Manual (FEM) PInow says PIs use several tactics, in-
the
h engineering ing firm, then requested is exhaustive. But we thought it might be cluding surveillance, computer forensics,
m
more money from the engineers, spent useful to get some input from CFEs who skip tracing, background checks and asset
that
h and d requested
uested even more. And he also wear PI hats. Fraud Magazine recently searches.
wasn’t d delivering
l ing adequate work. interviewed several CFEs/PIs who empha-
The engineers
gineers invoked the audit sized they’re better fraud examiners be- PI areas that enhance fraud
cclause
ause in tthe e subcontractor’s contract. cause they’ve attained PI skills that help examiners’ capabilities
Wietholter
h l sent
ent him a letter asking for them move FEM concepts off the page and CFE and PI skills, of course, aren’t mutual-
e l
explanations and records, but the subcon- into action. First, here are some of their ly exclusive; they overlap and sometimes
t
tractor never responded.
esponded. “Some fraud ex- thoughts on what a PI does and the dif- merge as fraud examiners move through
aminers at thiss point might have thought, ferent roles they can play. their careers. But here are some areas,
‘ can’t get much
‘I ch further because I have no “A private investigator conducts in- among many others, that the CFEs/PIs
financiall records,’”
rds,’” Wietholter says. “But vestigations on behalf of various clients, interviewed say PI education and experi-
my PI instinctss kicked in, and I began an such as corporations, insurance agencies, ence have enhanced:
open-source intelligence [OSINT] investi- law firms, private individuals or other • Skeptical and investigative mindset.
gation. We found that the subcontractor entities. Depending on the jurisdiction • Cognizance of personal risks and
in turn subcontracted to a guy in India and the situation, the PI may require li- liabilities.
who was charging only $30 an hour, but censure in their jurisdiction,” says Beth
• Open-source intelligence (OSINT)
the original subcontractor was billing the Mohr, CFE, PI, managing partner at The
proficiency.
engineering firm $150 an hour.” McHard Firm, which specializes in foren-
Wietholter then discovered through sic accounting. (See sidebar on page 47 • Evidence collection.
OSINT that the original subcontractor for more details on the possible need to • Ethical challenges solidifying
wasn’t even a licensed engineer but had become a licensed PI.) convictions.
been using the stolen licensing number of Brian Willingham, CFE, PI, is found-
an actual engineer. OSINT is the process er and president of investigative firm Skeptical and investigative mindset
of obtaining intelligence in an investiga- Diligentia Group. “I believe in ethically Phelps says that in her years of investiga-
tion through publicly available informa- sourced information to help clients make tive research she’s learned that she must
tion. [See “Everything about Open Source educated decisions, answer complex let the facts speak for themselves and not

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 41


WHAT CAN CFES LEARN FROM PRIVATE INVESTIGATORS?

make any preconceived judgment per the ACFE Code of Professional


Ethics: “No opinion shall be expressed regarding the guilt or innocence
of any person or party.”
“I often receive calls from attorneys who want me to prove their
cases,” Phelps says. “But I don’t do that. I find the facts and let them
speak for themselves.” Willingham agrees with Phelps’ sentiment.
“A lot of attorneys come to me and always have some theories about
something that happened, and they want you to find information to
support their theories,” Willingham says. “That’s just not how my
brain works; I’m a fact-finder. I let the facts do the talking.”
Phelps says that her PI experience helped her develop a skep-
tical mind and avoid assumptions. “Sometimes fraud isn’t in the
numbers or financial statements,” she says. “Sometimes when I’m
doing due diligence, for example, on a hedge fund manager, I might
find something subtle like they said they received an MBA from a
prestigious university, but it was really from a state school. That was
a deal breaker for one client.”
Jeffrey Dunhill, CFE, PI, is senior manager, colleague relations
relat
at CVS Health, where employee investigations are a major portionporti off
his job. He says a PI who was his supervisor in a previous investiga-
inves -
tive job encouraged him to always inspect what you expect.
“Many times, we get into a case and we see what the outcomes
outco
are most likely going to be, so we might rush to judgment and stop
investigating if we think we’ve reached a conclusion,” he says. “But
if we’re ever deposed, attorneys will ask if we did enough thorough
thoro h
research. If they indicate that we didn’t, they can accuse us of bias.”
b
(Dunhill’s comments in this article are his own and not necessarily
necess
those of CVS Health.)
Wietholter says most of her firm’s cases are from closely held h ld
companies that don’t have internal audit teams or just have one audi-a
tor each. (A closely held corporation, according to Investopedia,
Investopedia is a
company with the majority of its shares owned by a few individuals.
individ
Shares aren’t traded publicly on an exchange and, therefore, can’t
be purchased by the public. Those who control most of the shares
have a significant influence on and control of the company. See
tinyurl.com/4trtwp8y.) Therefore, these companies need assistance
from a company, such as Workman Forensics, to conduct audits
and investigations.
PINOW
O SAYS
S S PIS USES Wietholter says she wanted to be an investigator since she was
12. In her book, “Data Sleuth: Using Data in Forensic Accounting
SSEVERAL TACTICS,
C CS IN- Engagements and Fraud Investigations,” (Wiley, 2022) she
writes that she was obsessed with an episode in a kid’s
CCLUDINGG SSURVEILLANCE,
CE, radio drama in which a young woman, Tasha, was in-

CO
COMPUTER FORENSICS,
O S CS, troduced as a special agent for the U.S. National
Security Agency. “This episode about Tasha’s

SKIP TRACING, BACK- career as an agent … made me realize that


I, as a female, could be an investigator,”

GROUND CHECKS AND she says.

ASSET SEARCHES.
An accounting d
degree followed,
ll d then
h a b for you. So, your work product should
bat
c
coveted FBI internship and two years with a include any exculpatory evidence and
also
the agency.
g y After an MBA and a few years
y at not indicate judgment. Again, just present
a public accounting firm, “An accounting the facts.”
headhunter suggested, ‘What would hap- When Dunhill managed his private in-
pen if you started your own investigation vestigations business, he says the personal
and forensic accounting business?’” she risks gave him additional energy and mo-
writes in her book. She opened her firm mentum to ensure the integrity of evidence
in November 2010 and then earned her and findings he presented to his clientele.
Oklahoma private investigator’s license. “That energy has crossed over into the cor-
porate realm, where I now work,” he says.
Cognizance of personal risks
and liabilities OSINT proficiency
PIs generally own their businesses, so, un-
Investigators and researchers of all stripes
like CFEs who might work in the corporate
and in all sectors — military and state
world, they must protect themselves be-
intelligence, marketing, IT — search for
cause clients’ and organizational struc-
information in published or otherwise
tures won’t shield them. “PIs must review
publicly available sources. OSINT, and
their jurisdictions’ laws and regulations to
research through subscription software,
ensure they’re in compliance,” says Dun-
is a major component of PIs’ workdays. “I
hill. “Companies normally have policies
work with law firms, private-equity firms,
requiring employees to communicate with
hedge funds and investors to conduct due
their internal investigators. PIs don’t have
diligence,” says Willingham.
that. No one is required to talk with them.
“There’s a big difference between what
They’re on their own. So, PIs have to be
I do and what Certified Fraud Examiners
overly cautious because their reputations
do. CFEs usually have a collection of doc-
are on the line. That cautious attitude has
helped me as a fraud examiner.” uments they have access to — normally
For the first 10 years or so of his career, through their employers that they use to
Dunhill worked for a PI. “He taught me to analyze situations. I typically don’t start
make sure my documentation was clean, with any access.”
consistent and repeatable, and to pay at- Willingham is working on a case
tention to detail — principles that have where his client sued a financial advisor
assisted me in every investigative role I’ve for several hundreds of thousands of dol-
ever had,” he says. lars. Willingham and his team believe the
Other skills critical to success and financial advisor is lying, but they aren’t
avoiding liability, Dunhill says, are to con- analyzing all the financial statements to
duct quality interviews, assess subjects’ prove this. “Although the financial state-
credibility and leave no stone unturned. ments may provide some clues, I’m trying
“As a private investigator, you don’t have to find information that suggests that the
any additional support. No one will go to financial advisor might be a serial liar,

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 43


WHAT CAN CFES LEARN FROM PRIVATE INVESTIGATORS?

used his clients’ asset for personal use or has a history of toxic re-
lationships,” says Willingham. “I’m also looking up lawsuits that
the financial advisor has been involved with to determine whether
others have accused him of fraud — finding fact witnesses that can
speak to his character or can impeach his credibility in civil court.”
In a 2013 ACFE Insights article, Willingham encouraged fraud
examiners to make use of public sources in their examinations. (See
tinyurl.com/5a32vdcm.) “What I have come to learn is that many
people take public records for granted,” he wrote. “Because they are
‘public,’ people assume that they can’t be all that valuable. … Our
vast system of public records in the U.S. is one of the most unique
investigative assets we have.
“Most people don’t realize how public records can serve as re-
sources to help connect the dots, develop a complete picture, fill in
the blanks, and find supporting documentation, hidden clues or just
plain old dirt,” Willingham writes. “As an investigator, your job is to
collect information and facts. And if part of collecting information
doesn’t include using the vast resources found in public records, you
are definitely missing out.”
One advantage for private investigators, Willingham says, is
that as professional practitioners of their craft they invest in some
powerful and pricey resources, such as Maltego, TLO, IDI, IRB, Trac-
ers and Delvepoint. “Maltego, for example, is a platform that helps
you sort and analyze massive datasets,” Willingham says. “For
example, it’s good for establishing some links or connections
among dozens or hundreds of Twitter accounts.”
Phelps, who holds a master’s degree in library and
information science, uses OSINT resources to help
mitigate risk and to prevent and deter fraud for
asset management firms, funds of funds and
other investment organizations; private
equity firms; mergers and acquisitions
advisors; attorneys; senior execu-
tives and others. In addition to
specialized investigative
databases, she also uses
IN A 2013 ACFE other subscription
services, such as
INSIGHTS ARTICLE, LexisNexis,
Dow Jones
WILLINGHAM ENCOUR- Factiva
and
AGED FRAUD EXAMINERS
TO USE PUBLIC SOURCES IN
THEIR EXAMINATIONS.

44 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


ProQuest Dialog.
P l Phelps
h l teaches
h severall online courses at Illumeo.
com, such as “How to Search Online Records
rds Like a Pro” and “Online
Court Searching: A How-To
How To for Non-Legal
Non Legal Professionals.”

Evidence collection
“Auditors who find evidence are trained to make copies and return
the original documents to the client,” says Mohr. “But as an investi-
gator, if you run across something that may have evidentiary value
you’re obligated to collect the original as evidence, and you have
to preserve it in a way that allows it to be admissible as evidence
in court, which means having it in a secure spot with a chain-of-
custody log that proves to the court who’s handled it and that it
hasn’t been altered.” Mohr’s PI experience heavily influences her
evidence collection and preservation plus her interviewing. She
teaches on the subjects to auditor and accounting groups, and
the ACFE. A former officer with the San Diego Police Department,
Mohr is credentialed as a Nationally Certified Law Enforcement
Instructor by the International Association of Directors of Law
Enforcement Standards and Training.
Of course, CFEs are trained in evidence collection and preser-
vation. But Mohr says her PI and law enforcement experience has
accentuated the seriousness of protecting anything that could be
considered evidence. “Fraud examiners might just have cursory
experience of investigatory techniques and evidence collection.
Some of the attendees at one recent workshop I taught had little
knowledge in this area. I always tell any attendees, ‘When in doubt
— bag and tag!’” she says.
PIs know that when they must collect digital evidence, they
need to call in digital forensics experts so they don’t risk contami-
con
nating computers and devices, Mohr says. She provides these digital
d l
evidence collection guides from her PI experience:
• “Best Practices for Seizing Electronic Evidence: A pocket guide
d
Departme off
for First Responders v. 4.2,” U.S. Secret Service, Department
Homeland Security (tinyurl.com/5n93u9a8).
• “First Responder Guide to Mobile Forensics,” by Amber
Schroader, Paraben Corporation (paraben.com).
• “Electronic Crime Scene Investigation: A Guide for First
Departme off
Responders,” National Institute of Justice, U.S. Department
Justice (tinyurl.com/4h8ubvrs).
• “Seize First, Search Later: The Hunt for Digital Evidence,”
by Paige Bartholomew, Touro Law Review, volume 30, No. No 4
(tinyurl.com/rpzu6wby).

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 45


WHAT CAN CFES LEARN FROM PRIVATE INVESTIGATORS?
VESTIGATO INVESTIGATORS?

PIs’ ethical challenges can solidify 4 Conflicts


4.
t i convictions
their i i s We will not knowingly
kn l
The ACFE has a strict Code of Professional Eth-- accept
ccept any assignments
assi
ics and a Code of Professional Standards for its that can be construed
const ued in
members (tinyurl.com/3ec8mrse). Violations can any way as self-serving
self g
result in ACFE discipline, such as suspension or or a conflict of inter--
permanent expulsion from the association. ACFE
est with our business or
members know the ethics bar is high.
other assignments. We
Private investigators might not always have
will not allow our personal
the shiniest of reputations, says Willingham. In a
beliefs, prejudices, friend-
2013 Google consumer survey his firm, Diligen-
tia, conducted, 95% of those surveyed thought ships or feelings influence
that private investigators break the law at least our professional decisions. AS AN INVESTIGATOR,
some of the time, and 20% thought that PIs never 5. Confidentiality
abided by the law. “The public’s perception of PIs We will not disclose any
YOUR JOB IS TO COL-
is one of the ultimate reasons I earned my CFE
because it was one of the only credentials after my
confidential information
without the consent of our
LECT INFORMATION
name that actually means something,” he says.
PIs (as well as any investigator) can be tempt-
clients, unless required by law AND FACTS. AND IF
or court order.
ed to slide over the line into unethical practices,
which ironically can help them maintain and 6. Fees and results PART OF COLLECT-
fortify their honesty, Willingham says. He’s de-
vised his own Private Code of Ethics:
We will bill at a reasonable fee,
which is mutually agreed upon
ING INFORMATION
1. Professional standards and can be adequately explained.
We will not work on a contin-
DOESN’T INCLUDE
We will adhere to these ethical and moral
standards, follow the laws of the jurisdic- gency fee. We offer no guarantees USING THE VAST RE-
tions in which we work and will cooperate regarding the result or outcome of
with the appropriate legal and regulatory our investigation. SOURCES FOUND IN
authorities. We expect our employees and 7. Reporting
subcontractors to follow these same ethical Our reports will be based on unbi-
PUBLIC RECORDS,
and legal guidelines.
2. Licensing and insurance
ased, fact-based information. We
will not provide any determination
YOU ARE DEFINITE-
We will maintain a license with the ap-
propriate licensing body where we practice.
of guilt or innocence and we will not LY MISSING OUT.
omit any material information.
We will maintain professional liability
insurance to protect ourselves, our employ-
Burnish your skills
ees and our clients.
By nature, CFEs are inquisitive and resource-
3. Scope of work
ful. It makes sense that you’d want to learn
We reserve the right to refuse work that
from the viewpoints of your private inves-
could call into question our character, mor-
tigator colleagues. Allow these CFEs/PIs to
als or professional license or cases that may
emphasize time-honored principles that you
have questionable motives. We will only
accept cases in which we have the appropri- can use to polish your professional skills. ■ FM
ate level of expertise required to conduct
the investigation. We will not misrepresent Dick Carozza, CFE, is editor-in-chief emeritus
ourselves in order to solicit private, inti- at Fraud Magazine. Contact him at
mate or confidential information. dcarozza@ACFE.com.

46 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


IF YOU’RE A CFE,
DO YOU NEED
TO BECOME A
LICENSED PI?
“The term fraud examination refers to a process of
resolving allegations of fraud from inception to dispo-
sition, and it is the primary function of the anti-fraud
professional,” according to the ACFE Fraud Examiners
Manual. “The fraud examination process encompasses
a variety of tasks that might include obtaining evi-
dence, reporting, testifying to findings, and assisting
in fraud detection and prevention.”
Beth Mohr, CFE, PI, says this definition includes
many elements that are traditionally associated with
investigations, including those specifically included
in various U.S. state statutes that require investigators
to be licensed.
In the “Career Connection” column in the July/
August 2013 Fraud Magazine, Mohr wrote that each
jurisdiction in the U.S. and around the world has varied
regulations that govern what defines investigators
or private detectives. The statutes can change at any
time. Mohr wrote that CFEs and CPAs who say they
conduct “forensic investigations” should be properly
licensed if their jurisdictions require it.
Mohr tells Fraud Magazine that PI licensing quali-
fications vary — from testing and prior law enforce-
ment or extensive investigative experience as a re-
quirement — all the way to just being over a certain
age, like 18 or 21. Some U.S. states require a bond, oth-
ers require insurance and some have no additional
requirements, she says.
“Each firm and CFE is responsible to ensure
they’re in compliance with the law, so you need to
consult your legal counsel,” Mohr wrote. “Don’t wait to
be embarrassed on the stand or find yourself charged
with a crime.” (See tinyurl.com/4tkk3bb3.)

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 47


05
most
SCANDALOUS

fraud cases
of 2 0 2 2

Each year the ACFE, along with input from


our Advisory Council, selects the five most
scandalous fraud stories of the year based
on money lost, lives impacted and relevance
to the anti-fraud profession. It’s another year,
and we have a brand-new list.

By Jennifer Liebman
I
t’s hard to believe, but it’s been al-
most three years since the start of the
COVID-19 pandemic, and fraud fight-
ers are still grappling with the fallout of
frauds tied to government-relief funds.
Yet, despite the massive scale of pan-
demic frauds and the staggering loss of

01/ Crypto Bonnie


money, governments made some progress
after enacting task forces to investigate
COVID-related frauds and recover stolen
funds. And while some of the most scan-
dalous frauds of 2022 were connected to a n d C ly d e
the pandemic, it wasn’t all COVID all the
time. Indeed, there were plenty of other
frauds we believe will live on in infamy and The bride, dressed in gold, arrived on a Moroccan palanquin and
serve as essential case studies for fraud ex- rapped a love ditty to the groom, and the groom performed a mind-
aminers in the years to come. (See “Justice reading trick to delight the guests. But while the couple feted their
Department Announces COVID-19 Fraud love, U.S. law enforcement officials were inching closer to nabbing
Strike Force Teams,” U.S. DOJ press release, the newlyweds for allegedly laundering stolen bitcoin from the 2016
Sept. 14, 2022, tinyurl.com/3m5wf4wk and Bitfinex hack. When the couple was arrested, U.S. law enforcement
“Secret Service recovers $286 million in seized from them approximately $3.6 billion in cryptocurrency, the
stolen COVID relief funds,” by Julia Ainsley largest U.S. financial seizure to date. [See “The Ballad of Razzlekhan
and Sarah Fitzpatrick, NBC News, Aug. 26, and Dutch, Bitcoin’s Bonnie and Clyde,” by Nick Bilton, Vanity Fair,
2022, tinyurl.com/ytts63rm.) Crypto Crime, Aug. 18, 2022, tinyurl.com/mr29zkhk and “Two Arrested
for Alleged Conspiracy to Launder $4.5 Billion in Stolen Cryptocur-
Here we look at the most
rency,” U.S. Department of Justice (DOJ) press release, Feb. 8, 2022,
scandalous of 2022. And see the
tinyurl.com/mw7b76fm.]
online version of this article in Ilya “Dutch” Lichtenstein and Heather Morgan were an unlikely
Fraud-Magazine.com for updates pair of fraudsters when U.S. officials arrested them at their New York
on some of the most famous per- apartment in February for conspiracy to commit money laundering
petrators of past frauds. and defraud the U.S. Lichtenstein was a technology entrepreneur,
and Morgan was an occasional contributor to Forbes magazine with
articles about protecting digital currency from fraud. She also had a
hobby as a rapper called “Razzlekhan.” The couple often took their
cat for walks in a stroller. But behind their quirky personas, U.S. law
enforcement officials say the couple conducted an intricate money-
laundering scheme that would take six years to solve.
In 2016, someone hacked cryptocurrency exchange Bitfinex and looted 119,754 bitcoins, about $72 million at the time.
Lichtenstein and Morgan aren’t accused of the actual hack, but they’re facing more than 20 years in prison for allegedly tak-
ing those stolen funds, storing them in a digital wallet and laundering them via gold coins, Walmart gift cards, international
travel, five-star hotels and likely their wedding. Federal prosecutors say the couple traveled to Ukraine in 2019 to plan a life
there. They allegedly bought fake Ukrainian passports, SIM cards and details for secret bank accounts from the dark web. (See
“How Feds Aimed To Unravel One Of The Most Notorious Cryptocurrency Heists Of All Time,” by Jill Sederstrom, Oxygen True
Crime, Oct. 19, 2022, tinyurl.com/2s4z4wsz.)
According to Ars Technica, IRS Criminal Investigation (IRS-CI) traced the couple’s alleged money laundering path from
Lichtenstein’s digital wallets across the Bitcoin blockchain through wallets hosted on the AlphaBay darknet market. The couple
then used techniques like “chain-hopping,” in which they exchanged bitcoins for monero, a “privacy coin,” to hide the trail of
funds. In an article for Wired magazine, reporter Andy Greenberg wrote that the number of multilayered measures the couple
took to obscure their tracks wasn’t the most impressive part of the case. What was more remarkable was how federal investigators

5 m o s t s c a n d a l o u s f r a u d c a s e s of 2 0 2 2
5 MOST SCANDALOUS FRAUDS OF 2022

were able to crack the case and expose the pair’s attempts at ano- in my career have I seen such a complete fail-
nymity. “They demonstrated just how advanced cryptocurrency ure of corporate controls and such a complete
tracing has become — potentially even for coins once believed to absence of trustworthy financial information
be practically untraceable,” wrote Greenberg. (See “$3.6 billion as occurred here,” he said. (See “8 Days in No-
bitcoin seizure shows how hard it is to launder cryptocurrency,” vember: What Led to FTX’s Sudden Collapse,”
Ars Technica, Feb. 12, 2022, tinyurl.com/3wjnrdkc.)
by David Z. Morris, CoinDesk, Nov. 9, 2022,
According to David Utzke, Ph.D., CFE, who worked with
tinyurl.com/yceb2mpj and “The crypto melt-
the IRS-CI when Lichtenstein and Morgan were arrested, fraud
down, explained,” by Allison Morrow, CNN,
examiners must know the technologies criminals are using to
launder cryptocurrency. Utzke is now senior director of crypto-
Nov. 18, 2022, tinyurl.com/mr4yda89.) /01
economic technology for MasterCard. “Coming from a decades-
long career in technology and civil/criminal cybercrimes federal
enforcement and being engaged in this investigation as it evolved
in mid-2016, whether we’re talking about digital assets, art, 0 2 / U n h e a lt h y
choices
drugs, or some other asset — digital or physical — laundering,
traditional AML and sanction methods are not addressing the
technology methods criminals utilized,” Utzke says.
However, federal investigators eventually tied Lichtenstein
and Morgan to the stolen crypto in a much more ordinary way From suits against large U.S. health insurers
by linking a $500 Walmart gift card to their emails and cloud- for allegedly defrauding the Medicare Advan-
service providers. (See “A Crucial Clue in the $4.5 Billion Bitcoin tage program to pharmaceutical giant Biogen’s
Heist: A $500 Walmart Gift Card,” by James Fanelli, Ben Foldy eye-popping settlement, 2022 turned out to be
and Dustin Volz, The Wall Street Journal, Feb. 15, 2022, tinyurl. quite a shameful year for health care.
com/ysduy2ws.) In July, Biogen agreed to a $900 million
Lichtenstein and Morgan’s futures are uncertain as they settlement with the U.S. government over al-
await plea deals and sentences, but one thing is for sure: Crypto- legations that it gave kickbacks to doctors for
currency and fraud will still be hot topics in 2023, especially in the promoting its multiple sclerosis (MS) drugs.
wake of crypto exchange FTX’s extraordinary crash in November. A former Biogen employee, Michael Baw-
The Securities and Exchange Commission is investigating if FTX duniak, originally sued the company in 2012
mishandled customer funds. Investors filed a lawsuit alleging under the U.S. False Claims Act as a whistle-
that FTX founder Sam Bankman-Fried and celebrities like Tom blower. In Bawduniak’s lawsuit, he accused his
Brady and Larry David engaged in deceptive practices to sell FTX
yield-bearing digital currency accounts. (See “Sam Bankman-
Fried’s FTX Empire Faces U.S. Probe Into Client Funds, Lending,”
by Lydia Beyoud, Yueqi Yang and Olga Kharif, Bloomberg, Nov.
9, 2022, tinyurl.com/358yh7nh and “FTX’s Bankman-Fried, Tom
Brady and other celebrity promoters sued by crypto investors,”
by Jody Godoy, Reuters, Nov. 17, 2022, tinyurl.com/bdd6teav.)
Reports that Bankman-Fried had inappropriately been using
FTX’s customers’ funds to prop up his crypto hedge fund Alameda
Research sparked a rush for the exits and the overnight collapse
of the exchange. Creditors are now looking to recoup billions
of dollars from the company. Bankman-Fried’s high standing
not only in the crypto community but among regulators and
politicians has made the bankruptcy particularly shocking and
has the potential to be one of the biggest fraud cases of 2023.
FTX’s new CEO John J. Ray III, better known for overseeing the
collapse of Enron more than 20 years ago, has been scathing in
his assessment of the inner workings of the exchange. “Never

50 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


March 8, 2023 | Washington D.C.

The 2023 ACFE Women’s Summit will be


in-person and online March 8, 2023.

Attend and explore common challenges


women face in the industry, ask questions,
share ideas and resources, and support
each other as you navigate your own
professional journey.

Learn more at ACFE.com/WomensSummit.

March 27–29, 2023 | Online Virtual Conference

The 2023 ACFE Fraud Conference Europe


will be online March 27–29, 2023. Learn
anti-fraud best practices from leading
experts, plus network online
with fellow fraud fighters.

Watch
sessions
online or
on-demand.
earn
20 CPE.

Learn more at FraudConference.com/Europe.


5 MOST SCANDALOUS FRAUDS OF 2022

05
most
SCANDALOUS

fraud cases
of 2 0 2 2

ex-employer of enticing doctors with sham consulting deals, Insatiable’: How Insurers Exploited Medicare for Billions,”
speaker engagements and fancy dinners so they’d prescribe by Reed Abelson and Margot Sanger-Katz, The New York
Biogen’s MS drugs to their patients. As Reuters explained, Times, Oct. 8, 2022, tinyurl.com/mr2ua3mu.)
MS drugs are expensive, and only a small number of drugs The DOJ has sued some of the biggest health insurance
are approved to treat the autoimmune disease affecting the companies in the country — UnitedHealth, Humana and Kai-
central nervous system. The alleged kickbacks were meant ser Permanente, to name a few — for submitting inflated bills
to help the Cambridge, Massachusetts-biotech company, and overdiagnosing patients. The DOJ has joined several suits
which specializes in treatments for neurological diseases,
that were originally filed by whistleblowers, signaling that
corner the market and boost sales of its MS drugs.
law enforcement believes the fraud allegations have merit.
The DOJ claimed the alleged kickbacks resulted in false
The suits suggest that incredibly profitable insurance
claims to Medicare and Medicaid for prescriptions of Biogen’s
companies are gaming a system that pays them higher rates
MS drugs. Biogen denies any wrongdoing. (See “Biogen
for sicker patients. The lawsuits describe how the companies
agrees to $900 million drug kickback settlement on eve
have “developed elaborate systems to make their patients ap-
of trial,” by Nate Raymond, Reuters, July 20, 2022, tinyurl.
pear as sick as possible, often without providing additional
com/2swajs6t and “Biogen Inc. Agrees to Pay $900 Million to
treatment” to collect more from the government, The New
Settle Allegations Related to Improper Physician Payments,”
DOJ press release, Sept. 26, 2022, tinyurl.com/yc2e2nva.) York Times wrote. California-based Kaiser Permanente alleg-

In October, The New York Times highlighted the ex- edly urged doctors to add extra illnesses to patients’ medi-

tent to which U.S. health insurers have allegedly exploited cal records, incentivizing them with bottles of Champagne
Medicare Advantage — the arm of the U.S. national health or pay bonuses. The U.S. Congressional watchdog group
system for older Americans managed by private entities — MedPAC has estimated that additional diagnoses led to $12
by fraudulently inflating diagnostic codes and making bil- billion in overpayments in 2020. (See “‘The Cash Monster
lions of dollars in the process. (See “‘The Cash Monster Was Was Insatiable,’” tinyurl.com/mr2ua3mu.) /02

52 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


Protestors at Wells Fargo Bank shareholders meeting
(Photo by Justin Sullivan/Getty Images)

03/ Scam-to-scam
banking
The company Zelle makes sending money
to someone a cinch. It’s a person-to-person
payment service controlled by many of
the largest U.S. banks. You only need to
connect the app to your bank account
and voila: The recipient gets your money
instantly with no need to wait for a bank
transfer or a payment to clear. But the im-
mediacy of the service is also what makes
it popular with fraudsters.
In 2021, people sent $490 billion
through Zelle, but all those billions in trans-
and claim financial institutions haven’t we have an enormous amount of systems to
actions also include plenty of fraud, and
done enough to warn customers about stop. And the amount of fraud relatively is
the service has become a favorite hunting
these scams. (See “TD Bank, Capital One very small for this free-of-charge service.”
ground for the likes of romance and cryp-
and more, Zelle fraud class action lawsuit (See “Zelle Emerges as Lawmakers’ Surprise
tocurrency scammers. And while banks say
investigation,” Top Class Actions, Oct. 30, Foe at Bank Hearings,” by Jennifer Surane,
they take Zelle fraud seriously, many victims
2022, tinyurl.com/mrxp7ycw and “Class Bloomberg, Business, updated Sept. 22,
have struggled to get help. The problem is
Action Lawsuit Filed Over Alleged Wells 2022, tinyurl.com/2b7fpvrc.)
that many fraudsters trick their marks into
authorizing Zelle payments, and banks say Fargo Zelle Scam [Update],” by Corrado An investigation led by U.S. Senator

regulations don’t require them to refund Rizzi, ClassAction.org, updated June 30, Elizabeth Warren (D-MA) found that in 2021
money for authorized transactions. (See 2022, tinyurl.com/ybkwmxmv.) and the first half of 2022, four banks had
“Fraud Is Flourishing on Zelle. The Banks The U.S. Senate Banking Committee 192,878 cases worth $213.8 million where a
Say It’s Not Their Problem,” by Stacy Cowley convened hearings in September, pressing customer claimed they’d been tricked into
and Lananh Nguyen, The New York Times, bank CEOs and Zelle’s operator, Early Warn- making Zelle payments. Banks reimbursed
March 6, 2022, tinyurl.com/2nh73dds.) ing Services, on how they can make their customers in only 3,500 of those cases.
“It’s like the banks have colluded with customers whole. JP Morgan CEO Jamie Di- Only 47% of the dollars were reimbursed
the sleazebags on the street to be able to mon told the committee, “Anything that’s in cases where it was obvious that funds
steal,” fraud victim Bruce Barth told The unauthorized, we do cover. So, you’re really were transferred without the customers’
New York Times. Barth is one of many cus- talking about authorized transactions that authorizations. Warren’s report also found
tomers scammed by thieves on the service that PNC Bank had 8,848 cases on Zelle in
2020 and will have about 12,300 cases in
but discovered his bank was unwilling to
refund the stolen money.
“It’s like the 2022. US Bank had 14,886 cases in 2020 and
Since the summer, Zelle customers banks have colluded had 27,702 cases in 2021. Truist had 9,455
have joined in several class-action lawsuits cases of fraud and scams on Zelle in 2020,
aimed at their banks. The lawsuits, against
with the sleazebags which shot up to 22,045 in 2021. (See “Sen-
the likes of TD Bank, Capital One and Wells on the street to be ate report finds increasing cases of fraud,
Fargo, press banks to take responsibility for scams on Zelle,” by Ken Sweet, Associated
the money customers have lost to fraud- able to steal.” Press, PBS Newshour, Oct. 3, 2022, tinyurl.
sters through authorized Zelle payments com/yckmyjya.) /03

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 53


04/ Feeding fraud
In September, the DOJ arrested 47 people Andrew M. Luger for the District of Min- of children and meals plus false invoices
affiliated with Minnesota nonprofit Feed- nesota. “These defendants exploited a pro- and meals served at each site. They also
ing Our Future, all wanted in connection gram designed to provide nutritious food submitted false invoices for food and fake
with a massive $250 million COVID-relief to needy children during the COVID-19 attendance records complete with fake
fund scheme to defraud the Federal Child pandemic. Instead, they prioritized their names of children supposedly served at
Nutrition Program of the U.S. Department own greed, stealing more than a quarter the sites.
of Agriculture (USDA). By the end of Oc- of a billion dollars in federal funds to As in many COVID-relief-related
tober, law enforcement officials had ar- purchase luxury cars, houses, jewelry, frauds, the rush to get money to people
rested 51 people allegedly involved in the and coastal resort property abroad.” (See in need combined with poor controls, lack
scheme. Among those arrested was Aimee tinyurl.com/mswc2azn.) of oversight and relaxed standards for par-
Bock, founder and executive director of the According to the DOJ, employees of ticipation in the Federal Child Nutrition
nonprofit. (See “U.S. Attorney Announces the organization allegedly recruited oth- Program contributed to the scale of fraud
Federal Charges Against 47 Defendants in ers to open more than 250 Federal Child associated with Feeding Our Future. USDA
$250 Million Feeding Our Future Fraud Nutrition Program sites around Minnesota allowed for-profit restaurants to partici-
Scheme,” DOJ press release, Sept. 20, 2022, to fraudulently claim to be serving meals to pate in the program and permitted off-site
tinyurl.com/mswc2azn and “51st person thousands of children. Defendants are ac- food distribution to children outside of
charged in $250 million Feeding our Future cused of creating shell companies to enroll educational programs. Both were part of
fraud case,” by WCCO Staff, CBS Minnesota, in the program and receive and launder the Feeding Our Future fraud. According
Oct. 28, 2022, tinyurl.com/5br7nezm.) reimbursement funds. Furthermore, de- to The New York Times, two Feeding Our
“This was a brazen scheme of stag- fendants allegedly created and submit- Future locations claimed to be running
gering proportions,” said U.S. Attorney ted fake documents to show the number large child care centers out of the same

All in the family W h en A rchegos


In April, Archegos Capital Management CEO Bill Hwang
c ol l ap s ed in March
2021 , Wa ll S treet
and his top lieutenant, Patrick Halligan, were arrested for
ba n ks t h at w ere
racketeering conspiracy, securities fraud and wire fraud.
Dishonorable c ou n t erparties to
According to prosecutors, loose regulations over “family
t h e in ves t ment f irm
mentions offices” — private wealth management firms that serve the
super wealthy — allowed them to intentionally mislead
su f f e red billions in
l osses a n d s hare-
banks to loan them money so they could place bets on h o l d er valu e.
Many frauds vied for a spot
stocks through sophisticated securities.
in the top 5 this year. Here
are some scandalous ones When Archegos collapsed in March 2021, Wall Street
that deserve a little bit more banks that were counterparties to the investment firm
attention even if they didn’t suffered billions in losses and shareholder value. Hwang
quite make the cut. allegedly timed stock trades to drum up investor interest
and borrowed enough to increase his portfolio from $1.5
By Anna Brahce
billion to a staggering $160 billion in stock exposure. (See
“Archegos stock manipulation scheme was ‘historic,’ U.S.
attorney says,” by Matthew Goldstein and Lananh Nguyen,
Bill Hwang leaves for federal
The New York Times, Business, April 27, 2022, tinyurl.
court (Photo by Spencer Platt/
com/6z2dewuc.) Getty Images)

54 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


5 m o s t s c a n d a l o u s f r a u d c a s e s of 2 0 2 2

small building. One said it was feeding 2,000 children a day and the
other claimed to be feeding 500. Another operation in a restaurant said
it was feeding 6,000 children a day, which was more than the number of
children who lived in the ZIP code in that area. A lawyer for the nonprofit
said the group never had an accountant on staff. And while Feeding Our
Future said it had a three-member board to provide outside oversight
of its finances, the person listed as the board’s president between 2018
and 2020 was a bartender and electrician who said he’d been tricked
into taking the job. (See “Running a marathon at a sprinter’s pace,” by
Paul Kilby, Fraud Magazine, May/June 2021 issue, tinyurl.com/2bvv547p;
“Preparing for a post-pandemic fraud landscape,” by James Ruotolo,
CFE, and Linda Miller, Fraud Magazine, November/December 2021 issue,
tinyurl.com/2p8sa2va; and “F.B.I. Sees ‘Massive Fraud’ in Groups’ Food
Programs for Needy Children,” by David A. Fahrenthold, The New York
Times, March 8, 2022, tinyurl.com/29hbz6c2.) /04

Bed Bath & Beyond fraud the stock prices of the deli’s parent company Hometown Interna-
tional and another company, E-Waste Corp, through manipula-
In September, the CFO of Bed Bath & Beyond,
Gustavo Arnal, fell from the 18th floor of a Manhat- tive trading. Hometown’s stock prices rose 939% and E-Waste’s
tan building to his death less than two weeks after rose 19,900%, raising Hometown’s market value to $123 million
being named in a federal lawsuit accusing him of even though its sole asset was a deli. (See “Owners of a small
securities fraud and insider trading. The suit, filed deli are charged with fraud for valuing business at $100 million,”
in the U.S. District Court for the District of Columbia by Matt Adams, NPR, National News, Sept. 28, 2022, tinyurl.
claimed that Arnal and GameStop chairman Ryan com/3bpyy6cn and “$100 million New Jersey deli scheme leads
Cohen used false statements to sell their Bed Bath to U.S. fraud charges,” by Jonathan Stempel, Reuters, Sept. 26,
& Beyond shares and inflate the price of publicly 2022, tinyurl.com/2p9aex9j.)
traded stock. Arnal sold more than 42,000 shares for
$1 million, and Cohen sold all his 9.8% stake, causing ‘Gucci Master’ of none
shares to plummet in a pump-and-dump scheme.
Nigerian Instagram influencer, Ramon Abbas, aka the “Billionaire
The home goods retailer closed 150 of its 900 stores
Gucci Master” or Hushpuppi to his followers, was sentenced to
and laid off 20% of its corporate staff. (See “Bed Bath
11 years in prison in the U.S. for committing wire fraud, money
& Beyond CFO was implicated in insider trading and
laundering and identity theft. The assistant director of the Los
fraud scheme days before death, court docs show,”
Angeles FBI office, Kristi K. Johnson, said he was “among the
by Oliver O’Connell, The Independent, Sept. 5, 2022,
tinyurl.com/37pp6hk4.) most high-profile money launderers in the world.”
Abbas made his claim to fame bragging on social media

The pastrami wasn’t amazing about his wealth. But his riches weren’t won through an hon-
est day’s work. Instead, Abbas accumulated his wealth through
In September, the owners of a tiny deli in New Jersey
business email compromise (BEC) scams. The FBI also believes
were charged with securities fraud for falsely valuing
their business at more than $100 million. In a letter he facilitated large-scale transactions for North Korea, including
to clients, investor David Einhorn noted the deli a scheme in 2019 to launder $13 million stolen by North Korean
had generated less than $40,000 in sales but had a hackers from a bank in Malta. The Gucci Master’s scams amount-
market cap of $113 million. “The pastrami must be ed to more than $24 million in losses. (See “Hushpuppi: Notori-
amazing,” he joked. ous Nigerian fraudster jailed for 11 years in US,” BBC News, Nov.
According to prosecutors, the owners of Home- 8, 2022, tinyurl.com/5n8sbrtv and “‘He Got Burnt’: How One of
town Deli, James Patten, Peter Coker Sr. and Peter Instagram’s Biggest Fraudsters Was Brought Down,” by Charlotte
Coker Jr., had been conspiring since 2014 to inflate Lytton, Vice, Nov. 8, 2022, tinyurl.com/yfd8ad2h.)

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 55


5 MOST SCANDALOUS FRAUDS OF 2022

0 5 / C h i n a’ s
banking scandal

In April, customers of several small banks in


rural Central China with deposits worth at
least $1.5 billion, found their accounts frozen
and were unable to access their funds. The
scandal sparked rare protests, put a spotlight
on loose banking regulations and ignited what
some described as China’s biggest-ever bank
fraud probe. (See “China probes officials, re-
pays more depositors in Henan bank scandal,”
Reuters, July 29, 2022, tinyurl.com/4vdnnd29.)
Bank officials claimed internal updates
were blocking access to funds, but custom-
ers later realized that their plight was due to
financial shenanigans perpetrated by Lv Yi, a
former official of a banking group, who also
happened to be the alleged head of a crimi-
nal gang. The gang allegedly colluded with
bank employees to steal about 40 billion yuan
($5.9 billion) in deposits and investments.
They used online platforms to entice deposi-
tors with promises of high interest rates and
created fake lending agreements to transfer
money. Yi allegedly used the money to invest
in financial institutions, leveraging shell
companies as collateral. In August, Chinese
police arrested 234 people allegedly con-
nected to the gang. (See “China’s cash crisis
culprit named by police, said to have run
powerful criminal gang since 2011,” by Luna
Sun and Amanda Lee, South China Morn-
ing Post, July 11, 2022, tinyurl.com/2p99j9j9;
“China’s rural bank scandal has $300 bln tail
risk,” by Yawen Chen, Reuters, July 12, 2022,
tinyurl.com/3cbstj46; and “China arrests

56 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


“The most important take- in China Adds to Social Tensions Over Finance,” Bloomberg,
tinyurl.com/yc7tw8z3.)
away from the scandal is the While the fraud only affected about 400,000 customers
out of a nation of 1.4 billion people, rural banks comprise about
failure of the regulatory one-quarter of China’s banking industry. That makes these
system to properly implement types of financial institutions a potential hotspot for broader
systemic risks and worthy of regulatory scrutiny. Indeed, the
regulations.” scammers allegedly circumvented rules that prohibited rural
banks from soliciting new depositors outside their regions
hundreds in rural banking scandal,” by Nectar Gan, CNN, Aug.
by marketing online across the country. Their complicated
30, 2022, tinyurl.com/4te2nwhv.)
ownership structures also make them a prime spot for corrup-
In July, over 1,000 depositors, seeking to get their money,
tion, according to a report by CNN. (See “An Epic Bank Scandal
gathered in protest outside the central bank in Zhengzhou.
in China Adds to Social Tensions Over Finance,” Bloomberg,
Demonstrations soon turned violent when plainclothes police
tinyurl.com/yc7tw8z3 and “Small banks in China are running
officers forcibly dispersed depositors from the scene. Chinese
into trouble. Savers could lose everything,” by Laura He, CNN
banking regulators now are refunding depositors to quell un-
rest. (See “China arrests hundreds in rural banking scandal,”
Business, June 24, 2022, tinyurl.com/mv3kdajt.) /05
tinyurl.com/4te2nwhv.)
“The most important takeaway from the scandal is the Jennifer Liebman is assistant editor for Fraud Magazine.

failure of the regulatory system to properly implement regu- Contact her at jliebman@ACFE.com.

lations,” Martin Chorzempa, a senior fellow at the Peterson


Institute for International Economics, told Bloomberg Business Anna Brahce is editorial assistant for Fraud Magazine.
Week in an Aug. 29, 2022, report. (See “An Epic Bank Scandal Contact her at abrahce@ACFE.com.

05
most
SCANDALOUS

fraud cases
of 2 0 2 2

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 57


CASE IN POINT Case history applications

BETTER TOGETHER
Sometimes departments within organizations can have tunnel vision, which can be
fatal for fraud investigations. Here the author looks at how a money-laundering probe at
one financial institution revealed the flaws in its siloed approach and how working together
makes all the difference.

W
hen sailing, mariners
must always know the
wind’s direction and
mind their points of sail — a boat’s
course relative to the wind. Sails can’t
catch the wind in what is known as the
no-go zone, approximately 45 degrees on
either side of the wind’s direction. But
sailing close-hauled, or as close to the
wind as possible, mobilizes sails. (See
“What is Sailing Close to the Wind?”
Life of Sailing, tinyurl.com/2m2mnvpr.)
Indeed, sailing requires working with
the wind to move ahead. Managing
fraud risk and investigations is a similar
process: Just as the mariner works with
the wind, collaboration among teams
of experts is the best way to propel
forward. When people come together
and share their expertise, they can truly
succeed.
My team and I learned the impor-
tance of collaboration when we worked
on a money-laundering probe at my
former employer, a financial institu-
tion. The investigation revealed gaps
in my organization’s processes and A case of money laundering similar troubling trends associated
controls, but perhaps more important, Someone had been wiring millions of with the same account through the
it redefined how we operated and man- U.S. dollars to different accounts outside company’s alert management system.
aged cases. Ultimately, we were able to the country without the appropriate We’d both spotted significant issues but
do right by our customers, sharehold- approvals from the account owner. And had failed to share the information with
ers, peer banks and regulators because as an investigator, I identified suspi- each other.
we decided to work together. We also cious patterns in the transactions, which This proved to be just one of many
strengthened our organization’s fraud- the anti-money laundering (AML) unit instances in the investigation that
fighting efforts after breaking down had reviewed. But, unbeknownst to me, showed how vital information went un-
the siloes we worked in. Here’s what our fraud-risk analyst, who worked in a noticed among teams that are trained
happened. different department, had also spotted to spot fraud and money laundering in

58 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


different ways but for whatever reason he displayed when using the account.
decided not to communicate their find- COLUMNIST But this information was dispersed
ings across the organization. RAINA VERMA, CFE across separate units in the company,
Another blind spot revolved INTERNAL AUDIT AND and no one had shared what they knew
FRAUD RISK MANAGEMENT
around so-called threshold triggers. PROFESSIONAL or connected the dots. That is until our
Depending on the risk profile of the investigation revealed that the account
customer, banks will raise red flags if was being used for money laundering.
transaction sizes hit or exceed certain I feared our organization would
thresholds. The client under suspicion When people come suffer unless we radically revised our
was receiving 157,000 Emirati dirham policies and procedures. Our inves-
every other day — about $43,000 at
together and share tigation of the account holder lasted
the current exchange rate. But that their expertise, they for more than a year, even with im-
failed to alert the analyst who based his
threshold trigger on single-day trans-
can truly succeed. mense support from regulators and law
enforcement. And while our internal
actions. Velocity and volume reports, process needed a facelift and created
which measure the pace of transactions obstacles, we eventually proved that
and the amounts over a longer period, the clear intent for opening this ac-
would’ve told a different story and alert- count with us was to defraud millions
ed us to potential suspicious activity. and hide the origin of wired funds. We
We could’ve then contacted the client quickly flagged this to regulators. And
for clarification and raised suspicious with possible litigation threats looming
reports if we received an unsatisfactory over our organization, I immediately
response. devised a plan to engage with our in-
Suspicious internet banking activi- house legal counsel, law enforcement,
ty also wasn’t immediately flagged. The regulators and our corporate lawyers.
client failed to report that someone had Thankfully the blind spots we
debited his account from abroad. This discovered in our internal controls pre-
was strange as the client would have sented an opportunity to revamp our
received a text message on his mobile systems to better serve our customers,
phone confirming this kind of activity. improve employee training and aware-
The account owner told us he was in ness, and fine-tune working relations
the country when the transactions were mention the correct matching of static with regulators and law enforcement.
made, but it wasn’t until later that our and dynamic data. Static data refers to Here are some of the lessons we learned
investigation revealed he’d shared his information that doesn’t change, such about collaboration.
credentials with other parties. as date of birth, nationality and past
That someone with an IP address education. Dynamic data, on the other Breaking down siloes
from another country was wiring funds hand, may eventually change such as Fraud-risk managers and AML experts
from the account should’ve raised red passport number (upon expiry), visa approach investigations with differ-
flags, especially if the account owner residency number, current residence ent perspectives. But both skill sets
had been banking on the internet just and place of work, etc. go hand-in-hand, and regulators see
a few hours earlier. This was clearly Indeed, this case raised red flags them as critical functions at financial
suspicious and, as we found out later, galore across our organization such as institutions. Each group may garner
indicated that he’d been sharing his the suspicious usage of the internet- information that the other could use,
credentials. The national origin of these banking account, odd transaction and together they’re more likely to see
types of communications are impor- volumes, and how the customer’s risk an entire scheme taking placing under
tant indicators in cases like this, not to category did not align with behavior their noses. With collaboration, we can

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 59


CASE IN POINT Case history applications

Fraudsters know that the keys to success


are collaboration and sharing information,
so fraud examiners must pool their resources
and work together to fight back.

avoid overlapping reports as occurred and identify whether it’s necessary to in- compared to a $57,000 median loss
above, and help anti-fraud and AML vestigate further or escalate a suspicious when fraudsters go solo. (See ACFE.
teams build on what’s already known activity report (SAR) to regulators. com/RTTN.)
about a customer profile. Remember that financial institu-
Fraudsters know that the keys to
To ensure that they’re adequately tions use know-your-customer and
success are collaboration and sharing
covering the AML and fraud-risk know-your-customer’s-customer
information, so fraud examiners must
ground, organizations should maintain processes (KYC and KYCC) to monitor
separate transaction-monitoring sys- transactions, and that this readily avail- pool their resources and work together
tems but educate the different teams on able data can be used to spot suspicious to fight back. (See “Why fraud fighters
how to identify the red flags that each cases and trade-based money launder- should team up for success,” by Nicho-
team seeks. ing triggers. las White, BAI, Banking Strategies, Oct.
If an AML analyst reviews an alert It’s also critical that organizations 24, 2022, tinyurl.com/42yspae6.)
and doesn’t find anything suspicious reach out to regulators because infor- You can’t overreact and roll out a
from an AML perspective, they should mation sharing helps identify global
fraud risk management program with-
pass those alerts along to a fraud risk criminal infrastructures.
out understanding what your business
analyst for their review. This informa- Identifying unusual relationships
tion sharing enables the fraud inves- in nonfinancial data using demograph- requires — that’s like sailing directly
tigation team to dig deeper into the ic details of employees, customers, into the wind. However, finding the
matter. While financial crimes analysts vendors, contract workers’ attendance right degree of wind is like finding your
cut their teeth in a wholly different area records, etc. is critical for any organiza- degree of collaboration during a fraud
of expertise, sharing their informa- tion in the race to curb bribery, corrup- investigation. Collaboration ensures
tion can also greatly aid in AML and tion and the use of insider information. that when fraud happens, the impact is
terrorist-financing investigations. In
minimal. No fraud risk assessment or
our case, it was clear that there had Fraudsters work together, so
any program can save an organization
been no collaboration between the AML must fraud fighters
and fraud team, each keeping alerts and Fraud examiners must work collabora- alone but collaboration with stakehold-
reviews within their respective units. tively because that’s what fraudsters are ers can. n FM
doing. ACFE’s Occupational Fraud 2022:
Leveraging in-house data A Report to the Nations shows fraudsters
Raina Verma, CFE, is an internal audit
It’s important to leverage readily avail- are increasingly working together and
and fraud risk management profes-
able in-house data. Some companies successful because of it. Frauds involv-
sional specializing in financial crimes
often think that hiring a data analyst to ing two or more perpetrators comprised
create reports is enough. But it’s often 58% of cases in 2022 versus 42% in 2012. investigations, regulatory compliance
better to bring in a financial crimes The median loss to fraud committed by and anti-money laundering. Contact
analyst with the skills to review reports two or more perpetrators is $145,000 her at Raina@windowslive.com.

60 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


Join more than 5,000 anti-fraud professionals gathering in Seattle and online.
Now in its 34th year, the ACFE Global Fraud Conference is the world’s largest
conference for fraud fighters looking to go beyond all limits.

Network with Earn more than Choose from Hear from


more than 30 NASBA CPE 90+ EDUCATIONAL 100+ INSPIRATIONAL
5,000 by attending live SESSIONS. SPEAKERS in the
ATTENDEES. sessions and watching fraud-fighting industry.
on-demand recordings.

Register now at
FRAUDCONFERENCE.COM
CAREER CONNECTION Building your professional future

‘THE DEVIL MADE ME DO IT’ AND OTHER UNETHICAL


BEHAVIOR RATIONALIZATIONS
When it comes to unethical behavior, people have a knack for rationalizing (one leg of the Fraud Triangle)
to try to justify their actions. Whether it’s “the devil made me do it” or “everyone else is doing it,” there’s
always an explanation, based on some form of self-interest, for why someone did something they shouldn’t
have or acted in a way contrary to their nature.

G
rowing up, we all tried at some inaction or a lack of urgency. Second,
point or another to squirm our COLUMNIST
they don’t want to admit to a problem,
way out of being accountable DONN LEVIE JR., CFE so they rationalize with an “out of sight,
for something we shouldn’t have done or LEADERSHIP CONSULTANT out of mind” mentality. Third, they fall
said. (I admit to throwing my little broth- into the Dunning-Kruger Effect, which
er under the bus a couple of times, but is a cognitive bias whereby their initial
company, the founders were golfing
my parents were wise to that approach.) confidence exceeds their competence.
friends and fraternity brothers who
We spun the facts or rationalized our (See “Why can we not perceive our own
would rationalize their actions to keep
action to avoid punitive measures; in abilities? The Dunning–Kruger Effect,
up the steady cash flow from venture
short, we wanted to preserve our stand- explained,” The Decision Lab, tinyurl.
capitalists. The founders were enthusias-
ing in the family unit and stay in Mom com/bddnbssm.)
tic yarn spinners, painting vivid imagery
and Dad’s good graces. But alas, many Palmar’s insights show how people
of us suffered some parental wrath as a of what the future could look like after resort to self-preservation behavior,
consequence for our behavior — and the their product launched in the market- which is an innate desire to keep oneself
fictitious tales we told to rationalize it. place in a few years. They were experts safe and out of harm’s way. It’s a power-
Our parents knew something we kids at dismissing objections with a smile, a ful motivator that can lead people to do
didn’t fully appreciate: Rationalization half-truth and a rationalization. or say things they otherwise wouldn’t so
allows us to wander further away on But soon reality set in, replacing the as to preserve their physical, emotional
the far side of truth. As adults gaining hype after yet another scheduled delay, or psychological safety. Self-preservation
experience in our respective professions, another request for additional funding can lead to unethical rationalizations,
we learn about compliance and eth- and another round of layoffs. as individuals try to justify their own
ics, but we also add to our repertoire of actions or decisions while overlooking
rationalizations. Role of egocentric bias in (or being willfully blind to) the potential
rationalization harm they could cause.
Rationalizations and Entrepreneurship isn’t entirely to blame.
entrepreneurship People behave in ways that favor their Everyone uses rationalizations
Entrepreneurship encourages founders self-interest due in part to egocentric every day
to be persistent evangelists and wheeler- bias (the tendency to believe that one’s Who are the rationalizers among us? To
dealers for their fledgling enterprises. own opinion is the correct one). Egocen- quote the comic strip “Pogo”: “We have
They have a lot to lose and must continu- tric bias occurs when people allow their met the enemy and he is us.” If you’ve
ally be on their “game” to woo venture personal perspectives to distort their ever had to defend yourself against
capitalists, entice employees from other judgment of a situation. Entrepreneurial feelings of guilt or protect yourself
companies to come work for them, and pursuits are just one area where this bias from criticism for something you did
win over skeptical market analysts. How- plays out. or said, you’re probably a rationalizer.
ever, such a system conceals the treach- Joseph Palmar, CFE, CEO of Palmar Even if “things all worked out in the
erous waters that lure all who enter. Forensics, tells Fraud Magazine that end anyway,” you’re using consequen-
Back in the late 1990s, I worked he’s encountered three reasons why tialism (the theory that says that the
at several high-tech startups, where I people don’t act and rationalize reasons consequences of your actions determine
regularly witnessed instances of unethi- for not taking preemptive or proactive whether they’re good or bad) to rational-
cal — and even illegal — actions. In one steps. First, they’re comfortable with ize a positive result from a questionable

62 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


ethical action. If you’re a philanthropist Slippery Slope of Rationalization,” by Dr. struggling between two options that
who supports several charities, but the Michael Hurd, Nov. 22, 2011, at Drhurd. had previously seemed equally at-
press has called you out for having an com, tinyurl.com/2yvynu2m.) tractive. A 2011 functional magnetic
extravagant lifestyle, you may have to resonance imaging (fMRI) study revealed
rationalize your position to assuage any Unpacking the psychology of that certain portions of the brain were
inner emotional conflict. ‘the devil made me do it’ associated with later decision-related
This behavior bias is known as the When trying to explain away our un- attitude changes. A few of these results
licensing effect, which involves someone ethical or immoral behavior, “the devil suggest that rationalizations linked
rationalizing bad behavior after doing made me do it” is a funny go-to excuse with decision-making may be engaged
something good. It’s an unconscious made famous by comedian Flip Wil- instantaneously with those decisions.
decision that can often go against one’s son. But what does this saying actually (See “The neural basis of rationalization:
best interests in both personal and pro- mean? And what does it say about our cognitive dissonance reduction during
fessional situations. (See “Licensing ef- psychology? decision-making,” by Johanna M. Jarcho,
fect in consumer choice,” by Uzma Khan “The devil made me do it” ratio- Elliot T. Berkman and Matthew D. Li-
and Ravi Dhar, Journal of Marketing Re- nalization is how people try to absolve eberman, Social Cognitive and Affective
search, 2006, tinyurl.com/vt69uj3n and themselves of responsibility for their Neuroscience, Vol. 6, Issue 4, September
“Licensing effect,” behavioraleconomics. actions. They didn’t want to do some-
2011, tinyurl.com/5n7c52ad and “The
com, tinyurl.com/ys2ae375.) thing, so they attribute their actions to
neural basis of rationalization: cognitive
some outside force that made them do
dissonance reduction during decision-
Slippery slope of it. If someone believes that they aren’t
making,” in Social Cognitive and Affec-
rationalizations responsible for their actions, then they
tive Neuroscience, by Johanna Jarcho,
In business, rationalization is a way of don’t have to face the fact that they did
Elliot Berkman and Matthew Lieberman,
looking at an opportunity, position or something wrong. But the saying also
September 2011, tinyurl.com/2p9fk73b.)
proposal to make it appear more logical reveals something about human nature
or defensible, even if it isn’t. Rationaliza- and even how our brains work in tricky
Tangled web of
tions can produce inaccurate assertions circumstances.
bounded ethicality
and ultimately lead to bad decisions. A
The concept of bounded ethicality
project that uses minor but questionable The brain’s role in
explains how predictable organizational
rationalizations to receive “go-ahead” rationalization
and environmental pressures as well as
approvals or funding may escalate into Rationalization is the brain’s way of try-
psychological forces can entice people
more convoluted activities of a prob- ing to reduce the discomfort of cognitive
to abandon their own ethical goals and
lematic moral and ethical nature (up to dissonance, which is a disagreeable emo-
behavior in favor of deferential, morally
and including fraud) to keep the project tional state brought about by a conflict
suspect behavior that contradicts their
moving forward — until it finally doesn’t between one’s actions and desires. (See
and slides down the slippery slope of chart “Eight types of rationalized corrup- values. (See “Bounded Ethicality,” The
disaster. tion” on page 64 and “On the motivation- University of Texas McCombs School of
As I’ve seen in my corporate and al nature of cognitive dissonance: Dis- Business, tinyurl.com/chy97knn.)
startup experiences, if the organization- sonance as psychological discomfort,” Fixed perceptual, cognitive and
al culture tolerates unethical behavior, by A.J. Elliot and P.G. Devine, Journal of social cognitive processes (egocentric
it’s more likely to become worse. If the Personality and Social Psychology, 1994, bias) may lead to decision-making er-
organizational climate supports ethical tinyurl.com/569cn6c5.) Cognitive rors. Most leaders try to convey a stable
values, it’s less likely to become worse. dissonance experiments can measure self-image that’s confident, worthy and
Psychotherapist Dr. Michael Hurd before-and-after attitude changes ac- strong; which, in turn, conveys a percep-
precisely conveys the deception be- companying rationalizations but can’t tion of them being less prone to ethical
hind rationalizations: “The rationalizer uncover the processes that kick-start challenges. But a leader with a strong
doesn’t merely dodge facts and logic. those changes. egocentric bias is likely to believe they’re
He subverts them by pretending to be When a decision is unchange- immune to the negative consequences of
paying attention to them, when in fact able, or presents challenges, adjusting their questionable decisions or behav-
he’s evading them. That’s how an ‘oth- attitudes to feel comfortable with the iors. And this attitude makes it more dif-
erwise reasonable’ person manages to decision can reduce cognitive disso- ficult for an organization and its leaders
avoid facts while disguising this evasion nance. For instance, people will often to identify and address actual ethical or
as intelligent and sensible.” (See “The favor the choice they have made after moral conflicts.

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 63


CAREER CONNECTION Building your professional future

Bounded ethicality is inherent to Emerging field of Than Among High Moral Identifiers,”
many organizational structures in the behavioral ethics by Laetitia B. Mulder and Eric van Dijk,
public and private sectors, and perhaps in Frontiers in Psychology, Jan. 8, 2020,
Research into the emerging field of be-
none more so than in the field of entre- tinyurl.com/37zmumf4.)
havioral ethics (including cognitive and
preneurship, as previously explained.
behavioral psychology, and evolutionary
biology) reveals something we already Damage done by rationalizing
Situational ethics unethical behavior
knew: People are not completely ratio-
rationalization: ‘It depends …’ It’s easy to rationalize unethical behav-
nal. Most ethical decisions are intuitive,
People who behave in a manner in con- ior. We tell ourselves that it’s not really
by virtue of feeling; they rarely have the
flict with their character or lifestyle may that bad, or that everyone does it, or that
luxury of resulting from methodical
be operating on the principal of situ- we’ll make up for it later. But the truth
analysis. Usually, someone who makes a
ational ethics, wherein individuals are
morally questionable decision has con- is, rationalizing unethical behavior can
free to make choices that align with their
scious and subconscious influences at damage business opportunities, careers,
own circumstances. Situational ethics
play, including self-serving bias and the relationships, and a sense of self. It can
contends that the context of an issue
pressure to conform, as well as the situ- erode our integrity and damage our
should determine the morality, rather
ational factor. (See “Ethics Unwrapped: reputation. It can also dull our sense of
than deferring to a comprehensive moral
Behavioral Ethics,” The University of responsibility for wrongful actions, and
code for all situations. This more flexible
Texas McCombs School of Business, lead to more serious problems, includ-
approach to ethics arguably can create
tinyurl.com/373p7mk3.) ing a variety of fraudulent actions and
fertile ground for justifications to green-
When people engage in post hoc consequences. ■ FM
light behavioral ills that absolve propo-
nents from personal accountability. (See moral rationalizations, they may be
“Situation ethics,” BBC, Ethics guide, more likely to engage in additional Donn LeVie Jr., CFE, is a Fraud Magazine
tinyurl.com/2ws9n7sy.) unethical behaviors. This is especially staff writer and a presenter and leader-
Critics say the problem with true for people who attach less impor- ship positioning/influence strategist at
situational ethics lies with individuals tance to morality for their personal ACFE Global Fraud Conferences since 2010.
who can’t make meaningful choices. identity. These “low moral identifiers” He’s president of Donn LeVie Jr. STRATE-
Instead, they rely on mitigating factors may even increase the intensity level GIES, LLC, where he speaks, writes, and
like convenience, efficiency or facing a of their unethical behavior over time. leads programs that enhance leader-
“no-win scenario” in an “ends justify the “High moral identifiers,” on the other ship performance, increase executive
means” approach, rather than relying hand, are less likely to follow this path. influence, and cultivate deeper strategic
on established ethical concepts and (See “Moral Rationalization Contributes connections. His website is donnleviejr-
personal standards of accountability and More Strongly to Escalation of Unethical strategies.com. Contact him at donn@
responsibility. Behavior Among Low Moral Identifiers donnleviejrstrategies.com.

Eight types of rationalized corruption


1. Rationalization of responsibility. 5. Redemption of corrupt activities. Jus-
Escaping blame by denying personal tifying unavoidable corrupt behavior for
responsibility. positive business outcome (“ends justify
2. Legality and legal ignorance. Justify- 01 the means”).
ing unethical behavior with legal tech- 08 02 6. Entitlement. One is entitled to corrupt ac-
nicality (“If it’s not illegal, it’s OK”). tions because one feels “owed” or feels less
3. Minimizing or misconstruing conse- culpable than others (“Others have done
8 Types of
quences. Denial of injury (“no harm, 07 Rationalized 03 worse…”).
no foul”) or denial of victim (victim Corruption 7. Appeal to higher loyalties. Claiming a
consented to action). higher moral purpose (“It was for a good
4. Social weighing and comparison. 06 04 cause…”).
Finding examples of others who are 05 8. Rationalization of intent. The claim that
more corrupt to moderate the weight one intends to pay back or fix the corrupt
of one’s own corruption. action or using euphemisms to soften the
Source: Donn LeVie Jr. nature of the act (“borrowing, not stealing”).
ACFE NEWS

CFEs have the edge in pay, high work satisfaction, CFEs earn
2022 Compensation Guide shows 17% more
than their
non-certified
Certified Fraud Examiners (CFEs) earn compensation reports with the ACFE counterparts.
17% more than their non-certified coun- Salary Calculator at ACFE.com/Comp-
terparts, and 62% report being happy Guide, using categories such as job mostly fighting fraud from home. In
on the job. These are just a few of the in- function, education, industry, years of 2019, less than 20% of CFEs worked
sights from the Association of Certified experience, and age and gender. mostly remote, according to the 2020
Fraud Examiner’s (ACFE) 2022 Compen- Compensation Guide.
sation Guide for Anti-Fraud Professionals, Like many professionals, fraud
which also revealed a slow trend toward
examiners experience on-the-job stress,
gender diversity in the anti-fraud pro-
rating their jobs either Somewhat High
fession and changing workplace habits
Stress (39.5%) or Very High Stress
since the COVID-19 pandemic. (See
ACFE.com/CompGuide.) (16.7%). But 62% gave the profession
“The CFE credential can help dis- high marks. And many find personal
tinguish anti-fraud professionals from fulfillment fighting fraud, rating it
their colleagues and represents a 17% Somewhat High (38.9%) or Very High
premium, when withholding for key (23.1%). But Pry has a warning for
factors like geography, professional role employers:
and experience,” says ACFE Vice Presi- “When participants were asked
dent of Membership Ross Pry, CFE. about their professional plans, it was
The guide, using data from 5,040
nearly a 50/50 split with respondents
fraud examiners from across the globe,
saying they plan to stay with their cur-
shows that CFEs make more than their
rent organization for the next two years
non-certified peers no matter where
they are. CFEs in Latin America and Evolving and diversifying and those saying they plan to leave in

the Caribbean outearn non-certified The guide provides a status update on the next two years.”
counterparts by 34%, while CFEs in the the field and presents a profession that’s
Middle East and North Africa are paid
21% more than non-CFEs in those coun-
diversifying, growing and adjusting to
the pandemic. Here are some notable
acfe board of regents
tries. North American CFEs earn 12% results. expels member
more, and European and Sub-Sahara Signaling an increasingly global The ACFE Board of Regents has revoked
African CFEs earn 8% and 9% more, network, over 52% of survey respon- the CFE credential of Paul Doran, of
respectively. CFEs in Asia earn 1% more dents were outside the U.S., exceed- London, U.K., and permanently expelled
than non-CFEs. ing the number of non-U.S. respon- him from the ACFE. This decision was
North American fraud examin- dents in the 2020 guide. (See tinyurl. based on Doran falsely holding himself
ers have the highest median salary at com/2zeesbzc.) The profession is also
out as a CFE and providing a false docu-
$106,000, followed by European fraud seeing more gender diversity, although
ment to support that status.
examiners at $91,991. Middle Eastern that trend has stalled over the last few
and North African examiners’ median years. In the 2013/2014 Compensation
Guide, the breakdown was 65% male
Reporting disciplinary cases
salary is $65,036, and in Latin Amer-
and 35% female; however, in 2020 If you believe an ACFE member has vio-
ica and the Caribbean the median is
$62,413. Asian and Sub-Saharan African it was 60/40. The 2022 guide nearly lated the ACFE’s rules of conduct, report
fraud examiners round out the list at matches that split at 62/38. And the directly to the ACFE Legal Department,
$51,346 and $34,356, respectively. COVID-19 pandemic generated major Legal@ACFE.com. The ACFE also main-
ACFE members can delve deeper change for anti-fraud professionals. tains an anonymous hotline. For more
into the data and create their own Now, 91% of respondents say they’re information, visit ACFE.com/standards.

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 65


TAKING BACK THE ID Identity theft and cybersecurity analysis

FAKE GEEK SQUAD SCAMS AND WHAT TO DO


IF YOU FALL VICTIM TO CREDIT CARD FRAUD
Need help to fix your broken computer? Beware of geeks bearing gifts. They
could be fake technicians who want to access your laptop remotely pretending to
work for reputable companies. Here’s some advice to avoid these types of scams.

K
erry Binder thought of herself of the record 7 million reported cases of
COLUMNIST
as a real computer jock. When ROBERT E. HOLTFRETER, identity theft, credit card fraud ranked
she had a problem with her PH.D., CFE second with nearly 390,000 cases. New
DISTINGUISHED PROFESSOR
computer that she couldn’t solve, she account credit card fraud accounted
OF ACCOUNTING AND RESEARCH
contacted the Geek Squad, retailer Best for 363,092 of these cases, and existing
Buy’s tech support service, for help. One credit card fraud accounted for 32,204 of
Don’t use the number included in the them. (See tinyurl.com/m34ywy8x.) The
day she received a text message saying
message. FTC offers the following explanations of
she’d been charged hundreds of dollars
• If you see an unauthorized transaction why new account fraud predominates:
to renew her Geek Squad member-
on your credit card or in your bank • Existing account fraud has become
ship. She knew nothing about this and
account, ask the credit card company more difficult because advance credit-
thought that this was an error. The
or bank to reverse it and give you back card chip technology has made the
text message said Binder could dispute
your money. transaction process more secure, and
the charge or cancel her membership
• Report it or any other scam to the FTC it’s now harder to counterfeit credit
by calling a phone number within 24
at ReportFraud.ftc.gov. cards. (See “How the EMV credit card
hours. When she made the call, a scam-
• Also, if you paid a scammer or gave chip works and why it matters,” by
mer told her that he had to gain remote
them personally identifiable informa- Lance Cothern, credit karma, July 26,
access to her computer to help her.
tion (PII) or access to your computer, 2022, tinyurl.com/mumufuk6.)
When he’d finished rummaging around
read the helpful advice in my Novem- • Data breaches have exposed infor-
in her computer, he told her that he’d
ber/December 2022 Fraud Magazine mation for hundreds of millions of
corrected the error and apologized for
column, “Inheritance scam, improv- people. Identity thieves can use this
the mistake.
ing cybersecurity protection and information for new account fraud.
A week later, Kerry found that her
what to do if you get scammed,” to • Fraudsters can more easily steal mon-
bank account had a zero balance. A bank
help resolve these issues. (See tinyurl. ey via new account fraud because con-
employee told her that when she gave
com/2rtpm9n3.) sumers don’t know the new accounts
the scammer remote access to her com-
in their names exist. Card issuers or
puter, he probably installed a spyware
Credit card fraud consumers may notice suspicious
program that stole her bank account
Credit card fraud, a major and lucrative activities on their existing accounts
information.
scheme in the playbook of most iden- and lock the cards to prevent possible
This case is fictional, but represents
tity thieves, consists of two types: new takeovers by identity thieves.
this recent scam posted on the Federal
account and existing account.
Trade Commission (FTC) website. (See Assessing liabilities
New account: An identity thief
“How to recognize a fake Geek Squad Are you personally liable for any
opens a new credit card in your name
renewal scam,” by Alvaro Puig, FTC, Oct. using stolen PII. fraudulent charges that show up on
25, 2022, tinyurl.com/tvcptyxc.) Existing account: An identity your credit cards? According to the FTC,
Puig, the author of the FTC article, thief uses your existing credit card after your liability is limited, but it depends
offers the following advice: stealing your credit card information or on when you report the loss and the
• If you think the message is legitimate, purchasing it on the dark web. type of card that has been charged. (See
contact the company in question us- According to the FTC’s 2021 Con- “Lost or Stolen Credit, ATM, and Debit
ing a phone number you know is real. sumer Sentinel Network Data Book, out Cards,” FTC, tinyurl.com/4aad4wp3.)

66 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


The FTC says that according to fed- theft, visit IdentityTheft.gov to report • Cut up old cards. Be sure to cut
eral law, the following applies: it and get a recovery plan. through the account number, the
• If you report your credit card’s loss To protect your account information,
magnetic strip on the back and the
before someone uses it, you aren’t do the following:
security code before you throw the
responsible for any charges you didn’t • Don’t share your account informa-
pieces away in separate bags. If your
authorize. tion. Don’t give your account number
over the phone unless you made the card has a chip, it may be difficult
• If you report your credit card’s loss
call — and know why you need to to cut. You may want to destroy the
after someone uses it, the maximum
you might be responsible for is $50. share it. Never leave your account chip by smashing it into pieces with a
information out in the open. hammer.
• If your account number is used but
your credit card isn’t lost or stolen, • Protect your accounts by using
multifactor authentication, when
you aren’t responsible for any charges I’m here to help
you didn’t authorize. available. Some accounts offer extra
Please use information about these
security by requiring two or more cre-
dentials to log into your account. This scams in your outreach programs and
Getting help
is called multifactor authentication among your family members, friends
What steps can you take if you’ve been
— a security practice that makes it and co-workers.
a victim of credit card fraud or loss?
harder for scammers to log in to your
Call — or get on the mobile app — and As part of my outreach program,
accounts if they get your username
report the loss or theft to the bank or please contact me if you have any ques-
and password. (See “Protect Your
credit union that issued the card as
Personal Information and Data,” FTC, tions on identity theft or cyber-related
soon as possible. It’s important to act
issues that you need help with or if you’d
fast. Check your statement or online
account for the right number to call. like me to research a scam and possibly

Consider keeping the customer service include details in future columns or as


numbers for your bank or credit union feature articles.
in your phone’s contacts, and keep I don’t have all the answers, but I’ll
them up to date.
do my best to help. I might not get back
Follow up immediately in writ-
to you immediately, but I’ll reply. Stay
ing. Send a letter to the card issuer and
include your account number, the date tuned! ■ FM
and time when you noticed something
was wrong and when you first reported Robert E. Holtfreter, Ph.D., CFE, is
the loss. Keep a copy of your letter and
a distinguished professor of account-
your notes from calls with the bank tinyurl.com/57jkr7rb.) To log in to
or credit union. Keep checking your your account, you’d need either a pass- ing and research at a university in the
account statements and call to report code you get via text message or an U.S. Northwest. He’s a member of the
fraudulent charges immediately. If authentication app, or a scan of your Accounting Council for the Gerson
you wait, you may have to pay for the fingerprint, your retina or your face.
Lehrman Group, a research consult-
charges or lose the money withdrawn • Keep an eye on your accounts.
ing organization, and a member of the
from your account. Regularly check your account activity,
White Collar Crime Research Consor-
You should also do the following: especially if you bank online.
tium Advisory Council. He’s also the
• Check if your homeowner’s or • Promptly open your credit cards’
renter’s insurance covers you for monthly statements. Compare the vice president of the ACFE’s Pacific
card thefts. If not, ask your insurance current balance and charges on your Northwest Chapter and serves on the
company to include this protection in account with your receipts. Report any ACFE Advisory Council and the Edito-
your policy going forward. charges you don’t recognize as soon as
rial Advisory Committee. Holtfreter was
• Check your credit reports. Get you discover them.
the recipient of the Hubbard Award for
copies of your free credit reports • Keep your cards, PINs, receipts and
the best Fraud Magazine feature article
to monitor for accounts or charges deposit slips safe. Dispose of them
you don’t recognize. (See tinyurl. carefully. Carry only the cards you’ll in 2016. Contact him at doctorh007@
com/38v74fuv.) If you suspect identity need. gmail.com.

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 67


I’M A CFE
Kathryn Wilson, CFE
Senior manager, government and
public sector, CohnReznick LLP

Kathryn Wilson, CFE, learned in high school that accounting encompasses so much
more than crunching numbers — it’s also about following the money. And accounting
isn’t just a job for Wilson, who conducts risk assessments and devises ways to prevent
fraud as a senior manager in CohnReznick’s government and public-sector group; it’s
also a family affair with her two brothers and late grandfather in the profession.
Interview by Jennifer Liebman

I was born in Indiana but raised in I wanted to be an actress, pastor, risk assessments, identify and
Western Pennsylvania. I now live in private detective, archaeologist, implement internal controls, and
Northern Virginia with my husband, teacher and a lawyer. But a high establish policies and procedures
daughter and three fur babies: a school accounting course with an to mitigate fraud, waste and abuse.
tabby cat, miniature dachshund amazing teacher sold me on the Even though we don’t inves-
and Great Dane. (I’m a huge profession. It wasn’t the number tigate fraud, we consider control
“Scooby-Doo” fan.)  crunching that interested me as weaknesses that allow fraud to oc-
I’m the oldest of four children, much as the challenge of following cur and identify areas that require
so I always had a buddy to play the money. It’s also a profession remediation. There’s always a
with. My parents encouraged us to I share with my two brothers and lesson to learn about what fraud-
be active, and my favorite activi- late grandfather, who was an ac- sters can do and how to apply that
ties included cheerleading, tennis, countant for General Electric. knowledge to future audits and risk
archery, swimming, horseback assessments.
riding and reading. On nice days, I’m currently a senior manager
you’d see me reading a mystery in CohnReznick LLP’s govern- My interest in fraud started with
or a “Betty and Veronica” comic in ment and public sector advisory my passion for solving “myster-
the tree outside my window or on group, leading the company’s ies” and bringing justice to those
the porch swing. I absolutely loved growth in anti-fraud, waste and who’ve been victimized. You
reading “Choose Your Own Adven- abuse services. Additionally, I lead might’ve guessed from the careers
ture” books, “The Boxcar Children,” a team of hard-working, talented I considered and the books I en-
“Nancy Drew” and Agatha Christie individuals to support one of our joyed growing up that I’m a fan of a
mysteries. government clients. We conduct good mystery.

68 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


Being a CFE has also changed my mindset in every aspect
of work. Not a day goes by that I’m not thinking about fraud
risks. I even apply my CFE knowledge outside of work, such
as watching reality TV and calling out characters who are lying
because I can read their body language. It stays with you.

Pay attention to details and docu- instantly knew I needed to be a part Don’t be afraid to network and
ment, document, document! When of it. I took a chance and traveled to build relationships, and don’t be
it comes to documentation, it’s New York City for the ACFE’s CFE too quick to judge an opportu-
important to capture exactly what Exam Prep Course, and I passed all nity. Talk to people, observe their
you learned and what you found to four sections that week. My mother mannerisms (a helpful interview
be reasonable or unreasonable and even traveled to support me and tool), and most of all, be yourself.
explain why so that someone read- see me walk out of the last exam I wouldn’t be where I am today if
ing your report for the first time will with a big “cheese” smile and yell, “I I didn’t network and meet people
understand what happened. did it!” who’ve supported and mentored
me in my career.
Fraud prevention and strong I credit all the job opportunities
internal controls are key. In my I’ve gotten and the people I’ve met My ultimate achievement is my
experience, many agencies are daughter. She is a sassy, strong-
throughout my career to the CFE
only focused on the latest tools for willed, passionate and beautiful
credential. Being a CFE has also
detecting fraud after the damage 5 year old (going on 16) who I
changed my mindset in every as-
is done. It’s our duty as CFEs to know will one day conquer the
pect of work. Not a day goes by that
educate about fraud risks, internal world. She’s lit a fire in me and em-
I’m not thinking about fraud risks. I
controls and prevention. I often hear powered me to be a better version
even apply my CFE knowledge
about programs in which only one of myself and a role model.
outside of work, such as watching
person is handling transactions with I enjoy reading, playing the
reality TV and calling out characters
little support documentation and piano and flute, watching movies,
who are lying because I can read
minimal review of internal controls walking, yoga, meditating, watch-
or appropriate reconciliations. their body language. It stays with
ing the Steelers, playing pool and
you.
rummy with my husband, “dance
If there’s a will, there’s a way; nights” with our daughter, being
fraudsters are finding new ways to If you haven’t already, get certified.
outside, going on family trips to the
deceive, and we need to be up to Even if you only have an inkling of
beach, national parks and historic
date on the trends. The world still interest, do it. You do need to study
landmarks, and evenings dancing or
needs fraud fighters. for the exam, and I highly encour-
sitting by a bonfire with friends I’ve
age taking the CFE Exam Prep
known since grade school.  n FM
When I first started my career, only Course and attending in person if
a few of my colleagues were CFEs. possible. Once you obtain those
Jennifer Liebman is assistant editor
Once I heard there was an organiza- credentials, doors to many opportu- of Fraud Magazine. Contact her at
tion dedicated to fighting fraud, I nities will open. jliebman@ACFE.com.

FRAUD-MAGAZINE.COM JANUARY/FEBRUARY 2023 FRAUD MAGAZINE 69


The Fraud Magazine CPE quizzes are now available on-
CPE QUIZ line only. Please visit ACFE.com/FMQuiz or view the CPE
Quiz form on the next page for more information on how
No. 166 (JANUARY/FEBRUARY 2023, Vol. 38, No. 1)
to earn your 10 CPE.

1. According to the article, “The Medicare disadvantage,’’ A. Proper denial of late vendor bids.
how did Cigna allegedly commit fraud in its 360 Program? B. Needlessly long delays in contract negotiation or
A. It knew that 360 home visits generated false and invalid awards.
diagnoses but it continued to submit tens of thousands C. Unbiased technical evaluations.
of these invalid codes to the Centers for Medicaid &
Medicare Services (CMS). D. Approval of necessary contract modifications.
B. It consistently prioritized chronic care and acute care
management. 6. According to the article, “Thwart procurement fraud,” what
has not proven to be effective when performing analytical
C. It allowed vendors to provide patient treatment and
searches for questionable breaches in procurements?
care during home visits.
D. It gave nurse practitioners full access to beneficiaries’ A. Contextualization.
full medical histories. B. Triangulation.
C. Data quality and quantity.
2. According to the article, “The Medicare disadvantage,” the
sheer volumes of data and multitude of Medicare Advan- D. Limited data samples.
tage plans can make it easier for fraud fighters to miss
wrongdoing. 7. According to the article, “What can fraud examiners learn
from PIs?” what skillset do private investigators possess
A. True.
that can also enhance fraud examiners’ capabilities?
B. False.
A. Evidence tampering.
3. According to the article, “Battling fraudulent product sub- B. Preconceived judgment.
stitution,” what is one weakness in the vetting process for C. Skeptical and investigative mindset.
supply contracts in the U.S. armed forces, in contrast to the
proactive methods implemented at NAVAIR? D. Personal opinions.
A. When the Department of Defense detects nonconform- 8. According to the article, “What can fraud examiners learn
ing parts, excessive amounts of compelling evidence from PIs?” in a 2013 Google consumer survey conducted
have made it too easy to prosecute suspects.
by the firm Diligentia Group, 95% of those surveyed think
B. The Department of Defense normally administers each that private investigators break the law at least some of the
problem as a separate instance and rarely conducts an
time, and 20% think that PIs never abide by the law.
analysis of the overall practices of the vendor for pos-
sible referral for criminal investigation. A. True.
C. Law enforcement agencies have been overly proactive B. False.
in investigating bogus parts cases.
D. When the Department of Defense identifies a substan- 9. According to the article, “5 most scandalous fraud cases
dard part, the supplier immediately admits the error of 2022,” why have some banks been unwilling to refund
and is too quick to take the blame before a proper money stolen through Zelle fraud?
investigation can be conducted.
A. The Zelle fraud cases are so few that there’s no need to
4. According to the article, “Battling fraudulent product sub- take them seriously.
stitution,” what are the red flags to look for when monitor- B. Hardly any of their customers are using Zelle.
ing for suppliers that may be predisposed to supplying C. The number of Zelle fraud cases has been decreasing.
nonconforming parts to the Department of Defense?
D. They say regulations don’t require them to refund
A. A high number of passed tests and inspections. money for authorized transactions, and many fraudsters
B. Reports indicating high efficiency. trick their marks into authorizing Zelle payments.
C. A disproportionate percentage of deficiency reports,
10.According to the article, “5 most scandalous fraud cases of
failed tests or inspections, and terminations for conve-
nience or default. 2022,” employees of which nonprofit were arrested for a
massive $250 million COVID-relief fund scheme?
D. A lack of corrective action requests and zero testing
failures. A. Feeding Our Future.
B. Action Against Hunger.
5. According to the article, “Thwart procurement fraud,”
what is one example of how violators breach procurement C. The Hunger Project.
integrity? D. World Food Programme.

DO NOT SUBMIT THIS FORM. Log in to your My Transactions page after purchasing the Fraud Magazine Quiz
set to submit your answers or record your answers on the answer sheet and submit online when you are ready.

70 FRAUD MAGAZINE JANUARY/FEBRUARY 2023 FRAUD-MAGAZINE.COM


CPE QUIZ

CONTINUED FROM PAGE 9 The Fraud Magazine CPE Quiz has moved to an online
• Don’t boil the ocean with your client’s data. self-study format, making it easier for CFEs to earn 10
Start small, demonstrate effectiveness and ACFE (non-NASBA) CPE. CFEs can earn 10 CPE by
quick-hit wins, then expand based on suc- taking quizzes online after reading featured articles in
cess metrics. Fraud Magazine.
• If you don’t know what you’re looking for,
you’ll never find it!
• Use the right technology tool for the right
job. Don’t force a square peg into a round
Visit ACFE.com/FMQuiz
hole just because it’s your square peg. Do and follow the steps below:
what’s best for the client and be technology
agnostic.
1. Select the Online Fraud Magazine CPE Quizzes
• When it comes to applying data analytics by year from the dropdown*.
as an investigative tool, technology is only
as effective as the people using it and the 2. Click the “Add to Cart” button and complete the
process designed to implement it. The devil’s checkout process.
in the details — you just need the right tools
to exercise the demons. 3. Read featured articles in Fraud Magazine that
correspond to the year of the quiz set you purchased.
• Make sure your data analytics specialists
have a reserved seat at the table early in the 4. Access your quiz set by logging into your ACFE.com
process. Don’t underestimate the value of a account, clicking on the “My Transactions” tab and
strong investigation plan centered around clicking on the quiz set you purchased.
carefully curated analyses.
Build it right, keep it relevant and stay 5. Pass 5 of 6 quizzes with a score of 70% or higher and
innovative. Follow this recipe and they will receive your CPE certificate instantly via email.
indeed come for your services. n FM

Vincent M. Walden, CFE, CPA, is the CEO of


For more information, please review
Kona AI, an AI-driven anti-fraud and compli- the “CPE Info” and “FAQs” tabs
ance technology company providing easy-to- or contact a representative:
use, cost-effective payment and transaction
analytics software around corruption, inves- MemberServices@ACFE.com
tigations, fraud prevention and compliance
monitoring. He welcomes your feedback and (800) 245-3321 / +1 (512) 478-9000
ideas. Contact Walden at vwalden@konaai.
Secure online chat service*
com.

*
Quizzes will be added to the current year’s set as issues of Fraud Magazine are pub-
lished. CPE can only be obtained from the current year’s quizzes after the fifth quiz is
made available in September.
Please Note: The Fraud Magazine CPE Service CPE credits apply only to the CFE status
and not to any other professional designations. Fraud Magazine CPE is not registered
with the National Association of State Board of Accountancy (NASBA).
The ACFE collects and stores your personal data in the U.S. to provide member services
and fulfill transactions requested by you. For a full explanation of your rights regarding
how we store and use your data, visit ACFE.com/privacy-policy.aspx.

Together, Reducing
Fraud Worldwide
BOOKS AND MANUALS
Build your anti-fraud library with books and manuals
written by anti-fraud experts. Visit ACFE.com/books.

FRAUD EXAMINERS MANUAL FEATURED BOOKS

Bad Blood
By John Carreyrou
Paperback, 368 pages
In this book, you will learn the gripping story
of Elizabeth Holmes and Theranos — one of
the biggest corporate frauds in history — a
tale of ambition and hubris set amid the bold
promises of Silicon Valley, rigorously reported
by the author and prize-winning journalist
John Carreyrou.

$12.80 Members / $16 Non-Members

Your Essential Resource as an


Anti-Fraud Professional.
The Fraud Examiners Manual is the definitive body of
knowledge for the anti-fraud profession, providing
comprehensive guidance for anti-fraud professionals Crisis of Conscience
that no other work can match. By Tom Mueller
Hardcover, 608 pages
In this book, you will learn about the rise
The Fraud Examiners Manual is of whistleblowing through a series of
available online. riveting cases from the worlds of healthcare
With online access, the Fraud Examiners Manual is and other businesses, Wall Street and
more accessible and useful than ever. Washington.

Benefits of Online Access Include:


$20.00 Members / $25 Non-Members
• Real-Time, Ongoing Content Updates — Access the most
up-to-date anti-fraud information available.
• Supplemental Information — Access an expanding collection
of country- and region-specific information.
• Optimized for Multiple Devices — Access the Fraud Examiners
Manual on all your internet-connected devices. Rise of the Robots:
Technology and the Threat
The Fraud Examiners Manual: of a Jobless Future
• Describes hundreds of fraud schemes By Martin Ford
• Reviews legal principles involved with prosecuting fraudsters Paperback, 352 pages
• Provides tools and techniques for gathering information and This book will provide you with an
evidence when investigating fraud understanding of what accelerating
• Explores why people commit fraud and what can be done technology means for the workplace of the
to prevent it not-too-distant future and the economic
prospects for you and future generations.

$119.20 - $239.20 Members / $149 - $299 Non-Members $10.40 Members / $13 Non-Members

ACFE.com/books
SELF-STUDY COURSES
Expand your anti-fraud knowledge with our comprehensive,
ACFE.com/selfstudy.
NASBA-compliant self-study CPE courses. Visit

WORKBOOK SELF-STUDY Available in digital or print formats

CPE Credit: 20 CPE Credit: 8 CPE Credit: 4


Investigating by Inside the Using Benford's Law to
Computer, Second Fraudster's Mind Detect Fraud
Edition This course takes an inside look This self-study course will teach
Investigating by Computer, Second at the fraudster’s mind, exploring you the history behind Benford’s
Edition will help you turn your psychological information that is key to Law and how to apply it while
computer into the most powerful the successful development of a fraud undertaking a fraud audit or
investigative tool you own. Along prevention and detection program. fraud examination.
with basic computer skills, this
course can be used as a guide to
every aspect of digital investigations. Members ⊲ $151.20 Members ⊲ $135.20
Non-Members ⊲ $189 Non-Members ⊲ $169
Members ⊲ $199.20
Non-Members ⊲ $249

ONLINE SELF-STUDY Get immediate, 24/7 access to premier anti-fraud training

CPE Credit: 2 CPE Credit: 10 CPE Credit: 2

Alternative Currencies and Fraud Consumer Fraud Shell Companies


In this course, explore the rapidly expanding world This course will provide you with an increased In this course, you will learn how shell companies
of alternative currencies and their associated fraud awareness and understanding of common consumer work, how they are used to commit fraud and how
schemes. Topics include cryptocurrencies, blockchain, fraud schemes and will provide you with resources to investigate shell companies.
ransomware and many others. and remedies to detect, deter, report and prevent
these schemes.

Members ⊲ $71.20 Members ⊲ $159.20 Members ⊲ $71.20


Non-Members ⊲ $89 Non-Members ⊲ $199 Non-Members ⊲ $89

NANO SELF-STUDY 10-minute explorations of anti-fraud topics

NEW NEW
CPE Credit: 0.2 CPE Credit: 0.2 CPE Credit: 0.2

Red Flags of a Ponzi Scheme Trade-Based Money Laundering Signs of Deception


In this course, you will discover several red flags of In this course, you will learn about the types and red In this course, you will learn indicators of deception in
a Ponzi scheme that can be used to help prevent flags of trade-based money laundering and tips for written or verbal statements that you can use when
unwitting investors from becoming victims of fraud. combating it. evaluating statements.

Members ⊲ $8.80 Members ⊲ $8.80 Members ⊲ $8.80


Non-Members ⊲ $11 Non-Members ⊲ $11 Non-Members ⊲ $11

For more information on ACFE self-study courses, including refund and ordering policies,
= This course fulfills the annual ethics CPE requirement for CFEs.
fields of study, learning objectives and course levels, visit ACFE.com/selfstudy.
CALENDAR OF EVENTS
ADVANCE YOUR CAREER WITH TRAINING FROM THE
GLOBAL LEADER IN ANTI-FRAUD EDUCATION.
ACFE.COM/CALENDAR

VIRTUAL AND IN-PERSON

Jan FEB mar


INVESTIGATIVE INTERVIEW UNDERSTANDING THE MINDSET CFE EXAM REVIEW COURSE
TECHNIQUES OF A FRAUDSTER
Virtual Virtual Virtual
January 17-19, 2023 February 7-8, 2023 March 6-9, 2023

CFE EXAM REVIEW COURSE DETECTING FRAUD WITH DATA 2023 ACFE WOMEN’S SUMMIT
ANALYTICS WORKSHOP
Virtual Washington D.C. + Virtual
January 23-26, 2023 Virtual March 8, 2023
February 14-16, 2023

FRAUD RISK MANAGEMENT 2023 ACFE FRAUD CONFERENCE


Virtual EUROPE
January 24-26, 2023 Virtual
March 27-29, 2023

VISIT ACFE.COM/CALENDAR
for the latest list of UPCOMING EVENTS.
Calendar subject to change.
*All in-person events will be held following safety precautions for the city and venue of the event.

For information or to register, visit ACFE.com/training.


For Anti-Fraud Training.
For Your Team.
For Your Organization.

Group Membership. Discounted Anti-Fraud Training. Executive Roundtables.


ACFE.COM/CORPORATE
WWW.FORTHEPEOPLE.COM

You might also like