PUBLIC SECTOR FRAUD Flashcards

1
Q

False Claims and Statements can be

A

oral, written, sworn or unsworn, signed or unsigned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The person must make the false statement

A

knowingly and wilfully

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

statement must be made to

A

a government agency or a government contractor or fiscal intermediary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The false statement must be

A

a material fact that influences the outcome of the agency action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Some examples of false claims and statements include:

A
  • Falsified contractor qualifications
  • False certifications or assurances
  • False records or invoices
  • Invoices from non-existent companies
  • Claims made in duplicate or altered invoices
  • Billing for fictitious employees
  • Billing for goods and services not provided
  • Inflated costs or substitution of cheaper goods

Other examples of false claims and statements might include false statements about
employees, fictitious transactions, and falsified documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ultimate detection method for false statements is

A

the examination of source documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

auditor might be alerted to the possibility of false statements if any of the following red flags are present:

A

• Failure to produce documents in a timely manner
• Failure to respond to inquiries in a timely manner • Inadequacies in reporting requirements (for example, untimely reports, incomplete
reports, and others)
• Failure to have an adequate information gathering and retrieval system
• Altered or missing documents
• Photocopied or duplicate documents
• Failure to have adequate supporting documentation for reports and summary data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Failure to Produce Documents in a Timely Manner

A

This might be an indication that there are no source documents to substantiate the summary data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Failure to Respond to Inquiries in a Timely Manner

A

This might also be an indication that there is no source documentation. It can also be an
indication that the information is not readily retrievable. This area should, however, be
approached with caution. If new and different information is requested, the contractor or
agency might have to redesign its system in order to retrieve the requested information,
causing an unanticipated time delay. It is important the requests for proposals include
adequate specifications for responding to data requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Inadequacies in Reporting Requirements

A

If the required reports are consistently late, incomplete, or unsatisfactory, this might be an
indication that the source data is either unavailable, non-existent, or it cannot be retrieved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Failure to Have Adequate Information Gathering and Retrieval Systems

A

This, along with the red flags concerning the source documents, assists the auditor in determining whether or not the scope of the audit should be increased, and if so, in what areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Altered or Missing Documents

A

Frauds are often concealed by altering or misplacing supporting documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Photocopied or Duplicate Documents

A

Transactions should be authorised and recorded based on original documentation, not
duplicates. Duplicates or photocopied documentation is subject to alteration and
manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Failure to Have Adequate Supporting Documentation for Reports and Summary
Data

A

In order for supporting documentation to be adequate, it must be sufficient, competent, and
relevant. In addition, the auditor must apply common sense to the source document. For
example, are the amounts too high or too low, do they include odd times, places, and/or
people?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

some reported cases typifying Beneficiary Fraud are:

A
  • Social insurance frauds
  • False claims for benefits
  • Fraudulent ID numbers
  • Improper billing procedures
  • Kickbacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

he best detection methods for beneficiary fraud will require

A

the examination of source documents or developing computer programs to identify fraudulent patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DETERMINING NEEDS

A

The typical fraud in this phase is collusion between the buyer and contractor, where the
buying organisation’s employee receives a gratuity, bribe, or backhander for recognising the
need for a particular product or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TAILORED SPECIFICATIONS

A

One fraudulent scheme that occurs in this process is the tailoring of the specifications to a
particular supplier for no obvious technical reason.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

POORLY WRITTEN SPECIFICATIONS

A

In some instances, the fraud is committed solely by the contractor based on poorly written
specifications. In the instance of poorly written specifications, it is easy for the contractor to
deliver a product or service that is priced higher than what was ordered.

20
Q

VAGUE SPECIFICATIONS

A

In other instances, vague specifications are deliberately written by the buyer in collusion with
the contractor, so that more money can be claimed later.

21
Q

AGREEMENT TO AMEND CONTRACTS

A

In situations where there is collusion between the buyer and supplier, there is sometimes an
agreement to award the contract based on skimpy specifications, and then increase the price
later once the contract has been awarded through amendments to the contract.

22
Q

The following is a list of potential red flags for frauds involving specifications:

A

• Providing the contractor with information or advice on a preferential basis
• Using statements of work, specification, or sole source justifications developed by, or in
consultation with, a contractor who will be permitted to bid
• Permitting consultants who assisted in the preparation of the statements of work,
specifications, or design to perform on the contract as subcontractors or consultants
• Splitting costs into separate categories to avoid review
• Writing specifications not consistent with past similar procurement

23
Q

Examples of bid submission schemes are:

A
  • Premature opening of bids
  • Altering bids
  • Unjustifiable extension of bid opening dates
  • Controlled bid opening
  • Falsifying bid logs and documents
24
Q

To detect bid submission schemes the fraud examiner should be aware of:

A
  • Acceptance of late bid
  • Falsification of documents or receipts to get a late bid accepted
  • Change in bid after other bidders’ prices are known
  • Change in bid dates
  • Receipt of late bids
  • Last bid usually receives the bid
25
Q

Most bid-rigging fraud schemes involve

A

a collusion between contractors of competing

companies during the bidding process.

26
Q

BID ROTATION

A

Collusive bidding occurs when a group of prospective vendors exchange information on
contract solicitations, taking turns at submitting the low bid.

27
Q

BID SUPPRESSION

A

In this type of scheme, one or more competitors agrees with at least one other competitor to
refrain from bidding or agrees to withdraw a previously submitted bid so that a contractor’s
bid will be accepted. Other forms of this activity involve agreements by competitors to fabricate bid protests or to coerce suppliers and subcontractors not to deal with non- conspirators who submit bids.

A variation of bid suppression occurs when competitors make arrangements to refrain from
competing in a designated portion of a market. This might be accomplished based on customer or geographic area. The result of such a division is that competing firms will not bid or will submit only complementary bids (discussed below) when requests for bids are issued in the competitor’s unassigned area.

28
Q

COMPLEMENTARY BIDS

A

also known as “protective” or “shadow” bidding, occurs when competitors submit token bids that are too high to be accepted (or if competitive in price, then on special terms that will not be acceptable). Such bids are not intended to secure the buyer’s acceptance, but are merely designed to give the appearance of genuine bidding.

29
Q

PHANTOM BIDS

A

creating dummy companies to submit a variety of bids on a single contract

30
Q

To detect BID-RIGGING SCHEMES, the fraud examiner must be alert for:

A
  • “Unsuccessful” bidders who later become subcontractors.
  • Wide disparity in bid prices.
  • Same contractors who bid on all projects with rotating low bidders.
  • Other qualified vendors who fail to submit bids.
  • Bid protests from losing, qualified bidders.
  • Splitting up requirements so contractors can each get a “fair share,” and can rotate bids.
  • A rotational pattern to winning bidders.
  • A geographical pattern to winning bidders.
  • Joint venture bids by firms who could have bid individually.
31
Q

Defective pricing occurs during the negotiated contracting process when

A

contractors fail to disclose accurate cost or pricing data in their price proposals, resulting in an increased contract price

32
Q

Examples of defective pricing schemes generally involve the submission of inflated labour
costs and inflated material/parts costs. Other schemes involve:

A
  • The use of vendors other than the one proposed.
  • Not disclosing documents on vendor discounts.
  • Changing make or buy decisions.
  • Not disclosing residual material inventory.
  • Inflating costs by channelling work under contract through a dummy company.
  • Withholding information on batch purchases.
33
Q

To detect defective pricing schemes, the fraud examiner should be alert for the following:

A
  • Failure to update cost or pricing data even though it is known that past activity showed that costs or prices have decreased.
  • Failure to correct known system deficiencies that can lead to defective pricing.
  • Repeated denial by the contractor of the existence of historical records.
  • Delay in the release of data to the buyer to preclude possible price reductions.
  • Altered supporting data.
34
Q

n order to increase profits, the contractor might employ a product substitution scheme, failing to meet the contract specifications in the areas of either quantity or quality of products. Examples of schemes involving product substitutions include:

A

• Delivery of inferior/substandard material.
• Delivery of materials that have not been tested.
• Falsification of test results.
• Delivery of used, surplus, or reworked parts.
• Delivery of counterfeit products.
• Submission of false certifications (certifications are statements that parts or materials are
new, domestically manufactured, and meet the contract specifications concerning quality
and quantity).
• Delivery of commercial equivalents hardware.
• Passing off or specially creating samples for inspection.
• Surreptitious movement of inspection tags to uninspected goods.
• Substitution of look-alike goods.

35
Q

The following is a list of potential red flags for product substitution schemes:

A

• High percentage of product returns to vendor for non-compliance with specifications. • Product compliance certificate missing.
• Compliance certificates signed by low-level employee with no quality assurance
responsibilities.
• Materials testing done by supplier, using his own personnel and facilities.
• Laboratory test reports are identical as to sample descriptions and test results, varying
only as to date and lot number tested.
• Highest profit product lines have the highest number of material return authorisations or
reshipments.

36
Q

In order to detect PRODUCT SUBSTITUTION , the fraud examiner should consider the following
audit procedures:

A
  • Conduct both routine and unannounced inspections and testing.
  • Carefully review the inspection and testing reports.
  • Request assistance from outside technical personnel to conduct after-the-fact tests.
  • Interview personnel and others for indications of non-compliance.
  • Review correspondence and contract files for indications of non-compliance.
37
Q

Accounting mischarges are defined as

A

knowingly charging unallowable costs to the buyer,
concealing or misrepresenting them as allowable costs, or hiding them in accounts (such as
office supplies) that are not usually audited closely. Another common variation involves
charging types of costs or independent research and development to other cost categories.

38
Q

Material mischarges are usually limited to

A

raw materials which can be used on many different

contract products or diverted for personal use.

39
Q

Material mischarges can be detected by examining material cost transfers. These might
include transfers:

A

• From government contracts to commercial.
• Via any type of suspense or holding account. • From ongoing jobs to jobs not scheduled for delivery until far into the future.
• From prior lot work orders to current or future work orders.
• To inventory write-off accounts.
• To scrap accounts.
• Of materials ordered and charged in excess of contract requirements.
• Of seemingly unrelated materials charged on routing slips.
• In which material standards are not updated over periods of time when the contractor
recognises improvements in manufacturing technology or product design.
• In which a significant variance exists between proposed versus negotiated vendor prices.

40
Q

Labour costs are perhaps more ___ than are material costs

A

susceptible to mischarging

41
Q

There are several schemes involving mischarged labour costs. Some of the more prominent
ones are:

A
  • Transfer of labour costs
  • Time and charges do not agree with contractor billing
  • Fictitious time cards
  • Changes made to individual time cards
  • Time card charges by supervisors
42
Q

Labour mischarges can sometimes be detected by examining the following:

A

• Distinctive labour-charging patterns on research and development.
• Significant increases in charging to overhead accounts (for example, idle time, down
time, and non-applied time).
• Reclassification or reorganisation of employees from indirect to direct charges.
• Changes in the labour-charging relationships between certain tasks or types of labour.
• Decrease in indirect expense pools.
• Increased labour hours with no corresponding increases in materials used or units
shipped.
• Actual hours and dollars consistently at or near budgeted amounts.

43
Q

Computer programs can be written to identify

the following:

A

• Vendors with post office box addresses.
• Vendors with addresses in common with employee addresses.
• Contractors who were unsuccessful bidders who are now subcontractors.
• Payments to a particular vendor over a specified period of time.
• Vendor payments that were initiated or paid outside the normal system (for example,
hand carried or approved).
• Employees who are assigned to more than one contract on any given day.

44
Q

Common Problems of Investigators

A

Lack of Familiarity with Terminology
Wide Variety of Case Assignments
Case Loads

45
Q

The typical investigator will ask:

A

• What is the evidence? Is it clear and convincing?
• Who are the witnesses? Are they credible?
• What is the amount of the loss? Can it be proven?
• What is the intent of the perpetrator? Can it be demonstrated that there was malice
aforethought?
• How difficult is the case to investigate? Is it necessary to review reams of documents
looking for evidence?

46
Q

The auditor can best overcome reluctance of the investigator to work a case by using good
salesmanship. In this regard, the following suggestions are helpful:

A
  • Present your case in person, not over the telephone.
  • Spend a little time establishing a relationship with the investigator if you do not know him.
  • Summarise your case in one sentence. If you cannot, there is little realistic hope of prosecution.
  • After summarising the case, fill in the details. Do not overwhelm the investigator with minutia.
  • Pledge the resources of your agency in helping provide backup.
  • Follow up periodically with the investigator after the case has been referred, but be careful of making a pest of yourself.
  • Offer an expert witness, if necessary. Remember, though, if you testify in a criminal case, you might be excluded from sitting in on your own case due to rules concerning witnesses.