+ All Categories
Home > Documents > FIGHTING FRAUD IN THE GOVERNMENT Disposal of Documents and Media ... Why Social Engineering Attacks...

FIGHTING FRAUD IN THE GOVERNMENT Disposal of Documents and Media ... Why Social Engineering Attacks...

Date post: 18-Mar-2018
Category:
Upload: dominh
View: 217 times
Download: 2 times
Share this document with a friend
12
GLOBAL HEADQUARTERS • THE GREGOR BUILDING 716 WEST AVE • AUSTIN, TX 78701-2727 • USA FIGHTING FRAUD IN THE GOVERNMENT
Transcript

GLOBAL HEADQUARTERS • THE GREGOR BUILDING716 WEST AVE • AUSTIN, TX 78701-2727 • USA

FIGHTING FRAUD IN THE GOVERNMENT

FIGHTING FRAUD IN THE GOVERNMENT

Fighting Fraud in the Government i

TABLE OF CONTENTS

I. INTRODUCTION TO GOVERNMENT FRAUD Course Introduction ................................................................................................................................................. 1 Overview of Government Fraud ............................................................................................................................ 2

Definition of Government Fraud ......................................................................................................................... 2 The Impact and Significance of Government Fraud .................................................................................... 2 Video .................................................................................................................................................................... 3 The Public’s Perception of Government Organizations .............................................................................. 3 Factors Leading to Government Fraud .......................................................................................................... 3

Victims of Government Fraud ............................................................................................................................... 5 Why People Commit Fraud ..................................................................................................................................... 5

Video .................................................................................................................................................................... 6 Video .................................................................................................................................................................... 8

Who Commits Government Fraud? .................................................................................................................... 12 Types of Government Fraud ................................................................................................................................ 15 II. OCCUPATIONAL FRAUD BY GOVERNMENT EMPLOYEES Introduction ............................................................................................................................................................. 17 Asset Misappropriation: Cash Schemes ............................................................................................................... 17

Cash Larceny ..................................................................................................................................................... 18 Skimming Schemes .......................................................................................................................................... 19 Video .................................................................................................................................................................. 21 Fraudulent Disbursements .............................................................................................................................. 24 Video .................................................................................................................................................................. 25 Video .................................................................................................................................................................. 27 Video .................................................................................................................................................................. 30 Video .................................................................................................................................................................. 31

Asset Misappropriation: Noncash Schemes........................................................................................................ 31 Misuse of Noncash Government Assets and Resources ........................................................................... 32 Theft of Noncash Assets ................................................................................................................................ 32 Inventory Theft and Inventory Shrinkage .................................................................................................... 34 Video .................................................................................................................................................................. 34

Fraudulent Statements in Nonfinancial Matters................................................................................................. 36 Internal Control Weaknesses .......................................................................................................................... 37 Red Flags of Fraudulent Statements in Nonfinancial Matters .................................................................. 37 Prevention of Fraudulent Statements Concerning in Nonfinancial Matters ........................................... 37

Review Questions ................................................................................................................................................... 39 III. PUBLIC CORRUPTION Introduction ............................................................................................................................................................. 43 Corruption Data from the 2016 Report to the Nations ......................................................................................... 43 Types of Corruption Schemes .............................................................................................................................. 44

Bribery ............................................................................................................................................................... 44 Kickbacks .......................................................................................................................................................... 45

FIGHTING FRAUD IN THE GOVERNMENT

ii Fighting Fraud in the Government

III. PUBLIC CORRUPTION (CONT.) Video .................................................................................................................................................................. 46 Illegal Gratuities ............................................................................................................................................... 46 Economic Extortion ........................................................................................................................................ 46 Undisclosed Conflicts of Interest .................................................................................................................. 47 Video .................................................................................................................................................................. 47 Video .................................................................................................................................................................. 49 Breach of Loyalty ............................................................................................................................................. 49

Methods of Making and Concealing Corrupt Payments ................................................................................... 49 Video .................................................................................................................................................................. 50 Gifts, Travel, and Entertainment ................................................................................................................... 50 Video .................................................................................................................................................................. 50 Cash Payments .................................................................................................................................................. 50 Checks and Other Financial Instruments ..................................................................................................... 50 Hidden Interests ............................................................................................................................................... 50 Loans .................................................................................................................................................................. 51 Credit Cards ...................................................................................................................................................... 51 Transfers Not at Fair Market Value .............................................................................................................. 51 False Transfers .................................................................................................................................................. 51 Promises of Favorable Treatment ................................................................................................................. 51 Video .................................................................................................................................................................. 52

Red Flags of Corruption ........................................................................................................................................ 52 Red Flags of Corrupt Employees .................................................................................................................. 52 Red Flags of Corrupt Third Parties ............................................................................................................... 52 Internal Control Red Flags of Corruption ................................................................................................... 53

Corruption Risk Factors ........................................................................................................................................ 54 Internal Corruption Risks ............................................................................................................................... 54 External Corruption Risks .............................................................................................................................. 54 Video .................................................................................................................................................................. 55

Laws Prohibiting Public Corruption .................................................................................................................... 55 U.S. Laws Prohibiting Corruption ................................................................................................................. 55 Video .................................................................................................................................................................. 60 Video .................................................................................................................................................................. 61 The United Kingdom Bribery Act ................................................................................................................. 63 International Anti-Corruption Initiatives ..................................................................................................... 66

Preventing and Detecting Public Corruption ..................................................................................................... 68 Anti-Corruption Policies and Procedures .................................................................................................... 70 Use of Corruption Risk Assessments ............................................................................................................ 70 Internal Controls to Prevent Corruption...................................................................................................... 71 Periodic Testing and Review .......................................................................................................................... 72

Review Questions ................................................................................................................................................... 74 IV. PROCUREMENT FRAUD Introduction ............................................................................................................................................................. 77 Basics of Contract Law .......................................................................................................................................... 77

Elements of a Contract ................................................................................................................................... 77 Breach of Contract ........................................................................................................................................... 78

Methods of Procurement ....................................................................................................................................... 78

FIGHTING FRAUD IN THE GOVERNMENT

Fighting Fraud in the Government iii

IV. PROCUREMENT FRAUD (CONT.) Video .................................................................................................................................................................. 79 Competitive Bidding Using Sealed Bids ....................................................................................................... 79 Video .................................................................................................................................................................. 79 Contracting by Negotiation ............................................................................................................................ 80 Simplified Acquisition Procedures ................................................................................................................ 82 Video .................................................................................................................................................................. 83

Employees Involved in the Procurement Process ............................................................................................. 84 Procurement ..................................................................................................................................................... 84 Accounts Payable ............................................................................................................................................. 85 Operations ......................................................................................................................................................... 85

Phases in the Procurement Process ..................................................................................................................... 86 The Pre-solicitation Phase .............................................................................................................................. 86 The Solicitation Phase ..................................................................................................................................... 87 The Bid Evaluation and Award Phase .......................................................................................................... 88 The Post-Award and Administration Phase................................................................................................. 89

Categories of Procurement Fraud Schemes ........................................................................................................ 91 Collusion Among Contractors ....................................................................................................................... 91 Video .................................................................................................................................................................. 92 Collusion Between Contractors and Employees ......................................................................................... 97 Fraud in Procurement Without Competition ........................................................................................... 108 Defective Pricing Schemes that Violate the U.S. Truth in Negotiations Act....................................... 113 Performance Schemes .................................................................................................................................. 116

Preventing Contract and Procurement Fraud ................................................................................................. 126 Video ............................................................................................................................................................... 127 Employee Education .................................................................................................................................... 127 Internal Controls ........................................................................................................................................... 127 Monitoring Activities .................................................................................................................................... 127 Video ............................................................................................................................................................... 128 Vendor Management .................................................................................................................................... 128 Video ............................................................................................................................................................... 128

U.S. Laws Relating to Government Contracting............................................................................................. 136 Review Questions ................................................................................................................................................ 144 V. FRAUDULENT FALSE CLAIMS AND STATEMENTS Introduction .......................................................................................................................................................... 147

What Is a False Claim? ................................................................................................................................. 147 What Is a False Statement? .......................................................................................................................... 147

Elements of False Claim or Statement Violations .......................................................................................... 147 Common False Claims and Statements ............................................................................................................ 148

Video ............................................................................................................................................................... 149 U.S. Laws Prohibiting Fraudulent False Claims and Statements .................................................................. 149

False Statements (18 U.S.C. § 1001) ........................................................................................................... 150 Video ............................................................................................................................................................... 150 Criminal False Claims Act (18 U.S.C. § 287)............................................................................................. 151 Civil False Claims Act (31 U.S.C. § 3729 et seq.) ..................................................................................... 151 Conspiracy to Defraud Federal Government with False Claims (18 U.S.C. § 286) ............................ 152 False Entries in Federally Insured Banks (18 U.S.C. § 1005) ................................................................. 152

FIGHTING FRAUD IN THE GOVERNMENT

iv Fighting Fraud in the Government

V. FRAUDULENT FALSE CLAIMS AND STATEMENTS (CONT.) False Statements on Loan and Credit Applications (18 U.S.C. § 1014) ................................................ 152 The Major Fraud Act of 1988 (18 U.S.C. § 1031) .................................................................................... 152 Civil Monetary Penalty Law (42 U.S.C. § 1320a–7a) ............................................................................... 153 Perjury (18 U.S.C. §§ 1621 and 1623) ........................................................................................................ 154 Bankruptcy Fraud (18 U.S.C. § 152)........................................................................................................... 154 False Statements in Tax Returns (26 U.S.C. § 7206(1)) ........................................................................... 154

Qui Tam Suits ....................................................................................................................................................... 155 Filing a Qui Tam Action .............................................................................................................................. 155 Who Can Bring a Qui Tam Action ............................................................................................................ 156 Protections for Whistleblowers of Fraudulent False Claims and Statements ...................................... 157

Red Flags of Fraudulent False Claims and Statements .................................................................................. 158 Preventing Fraudulent False Claims and Statements ...................................................................................... 158

Video ............................................................................................................................................................... 159 Review Questions ................................................................................................................................................ 160 VI. FRAUD IN GOVERNMENT SOCIAL PROGRAMS Introduction to Fraud in Government Social Programs................................................................................ 163

Video ............................................................................................................................................................... 163 Health Care Fraud................................................................................................................................................ 164

Types of Health Care Systems .................................................................................................................... 164 Types of Health Care Fraud in Public Systems ........................................................................................ 167 Video ............................................................................................................................................................... 175

Fraud in Income-Loss Benefits ......................................................................................................................... 181 Types of Claimant Fraud in Income-Loss Benefit Programs ................................................................. 181 Types of Income-Loss Benefits .................................................................................................................. 182 General Red Flags of Claimant Fraud in Obtaining Income-Loss Benefits ........................................ 185 Red Flags of Claimant Fraud Involving Disability and Sickness Benefits ............................................ 186 Red Flags of Claimant Fraud Involving Work-Injury Benefits .............................................................. 186 Preventing Claimant Fraud in Income-Loss Benefits .............................................................................. 187

Fraud in Housing-Assistance Programs ........................................................................................................... 188 Types of Housing Assistance Programs .................................................................................................... 188 Tenant Eligibility for Housing Assistance ................................................................................................. 189 Perpetrators of Fraud in Housing-Assistance Programs ......................................................................... 189 Preventing Fraud in Housing-Assistance Programs ................................................................................ 192

Review Questions ................................................................................................................................................ 193 VII. OTHER TYPES OF GOVERNMENT FRAUD Introduction .......................................................................................................................................................... 197 Agricultural Subsidies Fraud .............................................................................................................................. 197

Forms of Agricultural Subsidies .................................................................................................................. 197 Types of Fraud in Agricultural Subsidy Programs ................................................................................... 198 Preventing Fraud in Agricultural Subsidy Programs ................................................................................ 199 Crop Insurance Fraud .................................................................................................................................. 199

Tax Evasion .......................................................................................................................................................... 204 Video ............................................................................................................................................................... 204 Types of Tax Evasion Schemes .................................................................................................................. 205 Tax Laws in the United States ..................................................................................................................... 207

FIGHTING FRAUD IN THE GOVERNMENT

Fighting Fraud in the Government v

VII. OTHER TYPES OF GOVERNMENT FRAUD (CONT.) Common Defenses to Tax Evasion Charges ............................................................................................ 208 International Tax Avoidance and Evasion ................................................................................................ 209

Counterfeit and Forged Documents ................................................................................................................. 211 Identifying Counterfeit and Forged Documents ...................................................................................... 212 Red Flags of Counterfeit Money................................................................................................................. 212 Red Flags of Counterfeit and Forged Documents ................................................................................... 213

Conspiracy to Defraud the Government ......................................................................................................... 213 Basic Elements to Prove Conspiracy to Defraud the Government ...................................................... 214 U.S. Laws Criminalizing Conspiracies to Defraud the Government .................................................... 214

Grant Fraud .......................................................................................................................................................... 215 Video ............................................................................................................................................................... 216 Basic Responsibilities of Grant Recipients ................................................................................................ 216 Common Grant Fraud Schemes ................................................................................................................. 216 Perpetrators of Grant Fraud ........................................................................................................................ 217 Common Motivations for Committing Grant Fraud .............................................................................. 218 Red Flags of Grant Fraud ............................................................................................................................ 218 Measures to Prevent Grant Fraud .............................................................................................................. 220

Student Financial Aid Fraud ............................................................................................................................... 221 Video ............................................................................................................................................................... 222 Student Financial Aid Fraud Perpetrated by Students ............................................................................. 222 Student Financial Aid Fraud Perpetrated by Employees of Educational Institutions ........................ 223

Review Questions ................................................................................................................................................ 225 VIII. MEASURES TO PREVENT GOVERNMENT FRAUD Introduction .......................................................................................................................................................... 229 Ethical Tone at the Top ...................................................................................................................................... 229

Tone in the Middle ....................................................................................................................................... 230 Minimize Motivations and Pressures to Commit Fraud ................................................................................ 230

Increasing Morale .......................................................................................................................................... 231 Offering Employee Support Programs ...................................................................................................... 232 Promoting and Rewarding Loyalty ............................................................................................................. 233 Establishing an Open-Door Management Policy .................................................................................... 233 Measuring Employee Attitudes About Anti-Fraud Efforts .................................................................... 233 Establishing a System of Disciplinary Procedures ................................................................................... 233

Fraud Policy .......................................................................................................................................................... 234 Video ............................................................................................................................................................... 234 Scope of Policy .............................................................................................................................................. 235 Policy Statement ............................................................................................................................................ 235 Actions Constituting Fraud ......................................................................................................................... 235 Investigation Responsibilities ...................................................................................................................... 235 Confidentiality ............................................................................................................................................... 236 Authorization for Investigation .................................................................................................................. 236 Employee Responsibilities ........................................................................................................................... 236 Reporting Procedures ................................................................................................................................... 236 Acting in Good Faith ................................................................................................................................... 236 Whistleblower Protection ............................................................................................................................ 236 Termination.................................................................................................................................................... 236

FIGHTING FRAUD IN THE GOVERNMENT

vi Fighting Fraud in the Government

VIII. MEASURES TO PREVENT TO PREVENT GOVERNMENT FRAUD (CONT.) Administration ............................................................................................................................................... 236

Fraud Risk Assessments ...................................................................................................................................... 237 What Factors Influence Fraud Risk? .......................................................................................................... 237 Benefits of a Risk-Based Approach ............................................................................................................ 237 Planning for a Fraud Risk Assessment ...................................................................................................... 238 Video ............................................................................................................................................................... 239 Fraud Risk Assessment Framework ........................................................................................................... 240 Video ............................................................................................................................................................... 242 Video ............................................................................................................................................................... 247 Risk Assessment Checklist ........................................................................................................................... 247 The Fraud Risk Assessment Tool ............................................................................................................... 247

Internal Controls .................................................................................................................................................. 248 Video ............................................................................................................................................................... 248 Video ............................................................................................................................................................... 248

Reporting System ................................................................................................................................................. 249 Video ............................................................................................................................................................... 249 Video ............................................................................................................................................................... 250

Employee Anti-Fraud Education ...................................................................................................................... 250 Video ............................................................................................................................................................... 250 Video ............................................................................................................................................................... 251 Who Should Attend? .................................................................................................................................... 251 Frequency and Length of Fraud Awareness Training ............................................................................. 251 Training Delivery Methods .......................................................................................................................... 251 Video ............................................................................................................................................................... 252 Topics to Cover in Training ........................................................................................................................ 252 Video ............................................................................................................................................................... 253 Video ............................................................................................................................................................... 254 Document Training ...................................................................................................................................... 254

Continuous Monitoring ...................................................................................................................................... 254 Video ............................................................................................................................................................... 254 Video ............................................................................................................................................................... 255 Video ............................................................................................................................................................... 255 Video ............................................................................................................................................................... 255

Employee Background Checks .......................................................................................................................... 256 Video ............................................................................................................................................................... 256

Due Diligence for Third Parties ........................................................................................................................ 258 Mandatory Vacation and Job Rotation Policies .............................................................................................. 258

Video ............................................................................................................................................................... 259 Fraud Prevention in Local Government .......................................................................................................... 259

Video ............................................................................................................................................................... 260 Video ............................................................................................................................................................... 260

Review Questions ................................................................................................................................................ 262 IX. USING DATA TO COMBAT GOVERNMENT FRAUD Introduction .......................................................................................................................................................... 265

Video ............................................................................................................................................................... 265 Video ............................................................................................................................................................... 265

FIGHTING FRAUD IN THE GOVERNMENT

Fighting Fraud in the Government vii

IX. USING DATA TO COMBAT GOVERNMENT FRAUD (CONT.) Video ............................................................................................................................................................... 266

Barriers to Using Data Analytics to Prevent and Detect Fraud .................................................................... 267 Large Volumes of Data ................................................................................................................................ 267 Silo Systems .................................................................................................................................................... 267 Inadequate Data Sharing .............................................................................................................................. 268 Inadequate Access to Data .......................................................................................................................... 268 Poor Data Integrity ....................................................................................................................................... 269 Format Inconsistencies ................................................................................................................................ 269 Limited Analytic Capabilities ....................................................................................................................... 269 Cultural Impediments ................................................................................................................................... 269

Data Analysis Process ......................................................................................................................................... 270 The Planning Phase ...................................................................................................................................... 270 Video ............................................................................................................................................................... 270 The Preparation Phase ................................................................................................................................. 271 The Testing Phase ......................................................................................................................................... 272 Video ............................................................................................................................................................... 272

Spectrum of Analysis Capabilities ..................................................................................................................... 272 Common Data Analysis Techniques ................................................................................................................. 273

Aging ............................................................................................................................................................... 273 Compliance Verification .............................................................................................................................. 273 Expressions or Equations ............................................................................................................................ 274 Testing for Frequently Used Values ........................................................................................................... 274 Fuzzy Logic Matching .................................................................................................................................. 274 Gap Tests ....................................................................................................................................................... 274 Identifying Amounts Below a Threshold .................................................................................................. 274 Video ............................................................................................................................................................... 275 Identifying Unusual Dates and Times ........................................................................................................ 275 Round-Dollar Payments ............................................................................................................................... 275 Benford’s Law ................................................................................................................................................ 275 Video ............................................................................................................................................................... 275 Statistical Analysis ......................................................................................................................................... 276 Trend Analysis ............................................................................................................................................... 277 Predictive Modeling ...................................................................................................................................... 277 Qualitative Data Analysis ............................................................................................................................. 277 Video ............................................................................................................................................................... 277 Textual Analytics ........................................................................................................................................... 278 Video ............................................................................................................................................................... 278 Video ............................................................................................................................................................... 279 Conflict Checking ......................................................................................................................................... 279 Transaction Risk Scoring ............................................................................................................................. 279

Scheme-Specific Data Analysis Tests ................................................................................................................ 279 Data Analysis Tests for Billing Schemes ................................................................................................... 280 Data Analysis Tests for Payroll Schemes................................................................................................... 281 Data Analysis Tests for Expense Reimbursement Schemes .................................................................. 281 Data Analysis Tests for Corruption Schemes ........................................................................................... 282 Data Analysis Tests for Inventory Schemes ............................................................................................. 283

Review Questions ................................................................................................................................................ 285

FIGHTING FRAUD IN THE GOVERNMENT

viii Fighting Fraud in the Government

X. PROTECTING SENSITIVE AND CLASSIFIED DATA Introduction .......................................................................................................................................................... 287

Video ............................................................................................................................................................... 287 Video ............................................................................................................................................................... 287

Common Threats to Sensitive and Classified Data ........................................................................................ 288 Video ............................................................................................................................................................... 288 Theft and Espionage..................................................................................................................................... 288 Employee Sabotage ....................................................................................................................................... 288 Advanced Persistent Threats ....................................................................................................................... 289 Malware .......................................................................................................................................................... 289 Uneducated Users ......................................................................................................................................... 289 User Errors and Omissions ......................................................................................................................... 289 Social Engineering Threats .......................................................................................................................... 289 Email Security Risks ..................................................................................................................................... 289 Internal Threats ............................................................................................................................................. 289 Malicious Hackers ......................................................................................................................................... 289 Foreign Government Threats ..................................................................................................................... 290 Threats to Personal Privacy ......................................................................................................................... 290 Exploitation of Trusted Relationships ....................................................................................................... 290

Types of At-Risk Information ........................................................................................................................... 290 Proprietary Government Information ....................................................................................................... 290 Government Secrets ..................................................................................................................................... 290 Personally Identifiable Information ........................................................................................................... 291 Business Identifiable Information .............................................................................................................. 292 Private Financial Information ..................................................................................................................... 292 Personal Health Information....................................................................................................................... 292

Sources of Data Leakage ..................................................................................................................................... 293 Employee Negligence ................................................................................................................................... 293 Video ............................................................................................................................................................... 293 Loss of Physical Media ................................................................................................................................. 293 Inadequate Business Processes ................................................................................................................... 293 Improper Disposal of Documents and Media .......................................................................................... 294 System Failure ................................................................................................................................................ 294 Malicious Insiders ......................................................................................................................................... 294 Hacker Attacks .............................................................................................................................................. 294

Perpetrators of Information Theft .................................................................................................................... 294 Insiders ........................................................................................................................................................... 295 Hackers ........................................................................................................................................................... 300 Competitors ................................................................................................................................................... 300 Organized Criminal Groups ........................................................................................................................ 300 Government-Sponsored Groups ................................................................................................................ 301

Information Espionage ....................................................................................................................................... 301 Targets of Information Espionage ............................................................................................................. 301 High-Risk Industries ..................................................................................................................................... 302 Forms of Information Espionage ............................................................................................................... 303 Video ............................................................................................................................................................... 303 Exfiltration Techniques ................................................................................................................................ 303

Social Engineering ............................................................................................................................................... 304

FIGHTING FRAUD IN THE GOVERNMENT

Fighting Fraud in the Government ix

X. PROTECTING SENSITIVE AND CLASSIFIED DATA (CONT.) Video ............................................................................................................................................................... 304 Why Social Engineering Attacks Succeed ................................................................................................. 305 Information Targeted by Social Engineers................................................................................................ 305 How Social Engineering Works .................................................................................................................. 306 Red Flags of In-Person Social Engineering Schemes .............................................................................. 309 Preventing Social Engineering Schemes .................................................................................................... 309

Common Challenges with Protecting Information ........................................................................................ 311 Video ............................................................................................................................................................... 311

Protecting Sensitive and Classified Data .......................................................................................................... 311 Video ............................................................................................................................................................... 312 Security Risk Assessments ........................................................................................................................... 312 Video ............................................................................................................................................................... 312 Security Policies and Procedures ................................................................................................................ 313 Awareness Training ...................................................................................................................................... 313 Nondisclosure Agreements.......................................................................................................................... 314 Data Retention and Destruction Policies .................................................................................................. 314 Security Controls ........................................................................................................................................... 315 Incident Response Plan ................................................................................................................................ 316 Video ............................................................................................................................................................... 316

Information Security in Bring-Your-Own-Device Environments ............................................................... 316 BYOD Challenges and Risks ...................................................................................................................... 316 Video ............................................................................................................................................................... 317 Video ............................................................................................................................................................... 317 BYOD Policies .............................................................................................................................................. 321 Mobile-Device Management Platforms ..................................................................................................... 326 Video ............................................................................................................................................................... 326

Cloud Computing and Information Security ................................................................................................... 328 Video ............................................................................................................................................................... 328 Video ............................................................................................................................................................... 328 Cloud-Computing Security Challenges ...................................................................................................... 328 Video ............................................................................................................................................................... 329 Protecting Data in the Cloud ...................................................................................................................... 329 Challenges of Investigating in the Cloud ................................................................................................... 331

Review Questions ................................................................................................................................................ 333 XI. INVESTIGATING GOVERNMENT FRAUD Introduction .......................................................................................................................................................... 337 Government Fraud Investigations Versus Private Fraud Investigations .................................................... 337

Video ............................................................................................................................................................... 338 Individual Rights and Protections ..................................................................................................................... 339

Rights and Obligations Under Criminal Law ............................................................................................ 340 Government Search and Seizure................................................................................................................. 340 Privacy Laws .................................................................................................................................................. 341 Protections Against Unlawful Confinement ............................................................................................. 343 Video ............................................................................................................................................................... 344 Video ............................................................................................................................................................... 345 Protections Against Harms to Reputations ............................................................................................... 345

FIGHTING FRAUD IN THE GOVERNMENT

x Fighting Fraud in the Government

XI. INVESTIGATING GOVERNMENT FRAUD (CONT.) What Fraud Examination Entails ...................................................................................................................... 346

Obtaining Evidence ...................................................................................................................................... 346 Reporting ........................................................................................................................................................ 346 Testifying to Findings ................................................................................................................................... 347 Assisting in the Detection and Prevention of Fraud ............................................................................... 347

Fraud Examination Methodology ..................................................................................................................... 347 Assume Litigation Will Follow .................................................................................................................... 347 Act on Predication ........................................................................................................................................ 347 Video ............................................................................................................................................................... 348 Move from the General to the Specific ..................................................................................................... 348 Use the Fraud Theory Approach ................................................................................................................ 348 Video ............................................................................................................................................................... 349

Develop a Fraud Response Plan ........................................................................................................................ 349 The Response Team ..................................................................................................................................... 350 Factors Used to Decide on the Course of Action .................................................................................... 350 Litigation Hold Procedures ......................................................................................................................... 351 Principles for Documenting the Response ............................................................................................... 351 Incident Report Log ..................................................................................................................................... 351

Typical Steps in a Fraud Investigation .............................................................................................................. 352 Conduct an Initial Response ....................................................................................................................... 352 Assemble the Fraud Team ........................................................................................................................... 354 Video ............................................................................................................................................................... 354 Develop an Investigation Plan .................................................................................................................... 355 Video ............................................................................................................................................................... 356 Video ............................................................................................................................................................... 356 Video ............................................................................................................................................................... 357 Video ............................................................................................................................................................... 358 Conduct the Investigation............................................................................................................................ 360 Report the Findings ...................................................................................................................................... 363 Written Versus Oral Reports ....................................................................................................................... 363 Respond to the Findings .............................................................................................................................. 365

Review Questions ................................................................................................................................................ 368 XII. INVESTIGATING WITH THE INTERNET Introduction .......................................................................................................................................................... 371

Video ............................................................................................................................................................... 371 Five-Step Approach to Using the Internet in Fraud Examinations ............................................................. 371 Using Internet Search Engines to Find Information ...................................................................................... 372

Search Engines .............................................................................................................................................. 372 Meta-Search Engines .................................................................................................................................... 372 Advanced-Search Operators ........................................................................................................................ 372 People Search Engines ................................................................................................................................. 375 Foreign Search Engines ................................................................................................................................ 376 Additional Tips When Using Internet Search Engines to Find Information ...................................... 376

Using Online Databases to Find Public Records ............................................................................................ 377 Online Sources of Public Records .............................................................................................................. 377 Limitations of Online Public Database Searches ..................................................................................... 379

FIGHTING FRAUD IN THE GOVERNMENT

Fighting Fraud in the Government xi

XII. INVESTIGATING WITH THE INTERNET (CONT.) Using the Deep Web to Find Information ...................................................................................................... 380 Using Internet Archives to Find Information ................................................................................................. 381 Using Social Networking Sites to Find Information ...................................................................................... 382

Video ............................................................................................................................................................... 382 Video ............................................................................................................................................................... 383 Types of Social Media................................................................................................................................... 383 Popular Social Media Platforms .................................................................................................................. 384 Social Media Search Tools ........................................................................................................................... 386 Privacy Issues When Collecting Evidence from Social Media ............................................................... 387

Using Newspaper and Media Databases to Find Information Online ........................................................ 388 Factiva ............................................................................................................................................................. 389 LexisNexis ...................................................................................................................................................... 389 HighBeam Research...................................................................................................................................... 389 ProQuest ........................................................................................................................................................ 389

Using the WHOIS Protocol to Find Information .......................................................................................... 389 Pitfalls of Using the Internet for Investigative Purposes ............................................................................... 390 Review Questions ................................................................................................................................................ 392 XIII. APPENDIX: VIDEO TRANSCRIPTS ........................................................................................... 395 XIV. SOLUTIONS TO REVIEW QUESTIONS II. Occupational Fraud by Government Employees ................................................................................. 435 III. Public Corruption ...................................................................................................................................... 443 IV. Procurement Fraud.................................................................................................................................... 448 V. Fraudulent False Claims and Statements ................................................................................................ 453 VI. Introduction to Fraud in Government Social Programs ..................................................................... 457 VII. Other Types of Government Fraud ........................................................................................................ 463 VIII. Measures to Prevent Government Fraud ............................................................................................... 470 IX. Using Data to Combat Government Fraud .......................................................................................... 475 X. Protecting Sensitive and Classified Data ................................................................................................ 479 XI. Investigating Government Fraud ............................................................................................................ 484 XII. Investigating with the Internet ................................................................................................................ 490 FINAL EXAMINATION .............................................................................................................................. E-1 INDEX ................................................................................................................................................................... I-1


Recommended