Contractor Fraud Against the Federal Government: Selected Federal Civil Remedies

Contractor Fraud Against the Federal Government: Selected Federal Civil Remedies

Date: April 1, 2014
Creator: Murrill, Brandon J.
Description: This report provides an overview of federal statutes that provide civil remedies for contractor fraud, as well as issues stemming from judicial interpretation of these statutes.
Contributing Partner: UNT Libraries Government Documents Department
Identity Theft: Trends and Issues

Identity Theft: Trends and Issues

Date: January 16, 2014
Creator: Finklea, Kristin
Description: This report first provides a brief federal legislative history of identity theft laws. It analyzes selected trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions. The report also discusses the relationship between data breaches and identity theft as well as possible effects of the FTC's Identity Theft Red Flags Rule. It also examines possible issues for Congress to consider.
Contributing Partner: UNT Libraries Government Documents Department
Identity Theft: Trends and Issues

Identity Theft: Trends and Issues

Date: May 27, 2010
Creator: Finklea, Kristin M.
Description: This report first provides a brief federal legislative history of identity theft laws. It analyzes the current trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions. The report also discusses the relationship between data breaches and identity theft as well as possible effects of the FTC's Identity Theft Red Flags Rule, effective June 1, 2010. It also examines current legislation on identity theft and possible issues for the 111th Congress to consider.
Contributing Partner: UNT Libraries Government Documents Department
Federal Inspectors General: History, Characteristics, and Recent Congressional Actions

Federal Inspectors General: History, Characteristics, and Recent Congressional Actions

Date: December 8, 2014
Creator: Ginsberg, Wendy & Greene, Michael
Description: This report discusses federal inspectors general (IGs), who are authorized to combat waste, fraud, and abuse within their affiliated federal entities. To execute their missions, offices of inspector general (OIGs) conduct and publish audits and investigations--among other duties. Two major enactments--the Inspector General Act of 1978 and its amendments of 1988 (codified at 5 U.S.C. Appendix)--established federal IGs as permanent, nonpartisan, and independent offices in more than 70 federal agencies.
Contributing Partner: UNT Libraries Government Documents Department
Barriers to Corporate Fraud: How They Work, Why They Fail

Barriers to Corporate Fraud: How They Work, Why They Fail

Date: December 27, 2004
Creator: Jickling, Mark
Description: The report focuses on the internal controls on American corporations (including corporate governance, business ethics, managerial structure and compensation, internal counsel, and whistleblowers), as well as external controls (government regulation, external auditors and accountants, and the judicial process). A recurring theme is the limited efficacy of many safeguards and watchdogs in cases of "control fraud," where fraud is directed or abetted by top management, and where unethical or abusive practices may become the organizational norm. Another broad question raised by the report is whether the post-Enron scandals were a one-time event, made possible by the stock market bubble of the 1990s and several other unique historical developments which together constituted a "perfect storm," or whether fraud is a cyclical phenomenon associated with the end of long bull markets.
Contributing Partner: UNT Libraries Government Documents Department
Identity Theft: Trends and Issues

Identity Theft: Trends and Issues

Date: August 26, 2009
Creator: Finklea, Kristin M.
Description: This report first provides a brief federal legislative history of identity theft laws. It analyzes the current trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions.
Contributing Partner: UNT Libraries Government Documents Department
Identity Theft: Trends and Issues

Identity Theft: Trends and Issues

Date: May 27, 2009
Creator: Finklea, Kristin M.
Description: This report first provides a brief federal legislative history of identity theft laws. It analyzes the current trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions. The report also discusses the relationship between data breaches and identity theft as well as possible effects of the FTC's Identity Theft Red Flags Rule, effective November 1, 2009.
Contributing Partner: UNT Libraries Government Documents Department
Identity Theft: Trends and Issues

Identity Theft: Trends and Issues

Date: January 5, 2010
Creator: Finklea, Kristin M.
Description: This report first provides a brief federal legislative history of identity theft laws. It analyzes the current trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions. The report also discusses the relationship between data breaches and identity theft as well as possible effects of the FTC's Identity Theft Red Flags Rule, effective June 1, 2010.
Contributing Partner: UNT Libraries Government Documents Department
Identity Theft: Trends and Issues

Identity Theft: Trends and Issues

Date: February 15, 2012
Creator: Finklea, Kristin M.
Description: In 2010, about 8.1 million Americans were reportedly victims of identity fraud, and the average identity fraud victim incurred a mean of $631 in costs as a result of the fraud—the highest level since 2007. Identity theft is often committed to facilitate other crimes such as credit card fraud, document fraud, or employment fraud, which in turn can affect not only the nation's economy but its security. Consequently, in securing the nation and its economic health, policy makers are also tasked with reducing identity theft and its impact.
Contributing Partner: UNT Libraries Government Documents Department
Alleged Fraud, Waste and, and Abuse: General Dynamics Corp.

Alleged Fraud, Waste and, and Abuse: General Dynamics Corp.

Date: July 12, 1985
Creator: O'Rourke, Ronald
Description: Numerous Federal agencies -- including the Justice Department and Congressional committees -- are investigating allegations of fraud at the Electric Boat Division of General Dynamics Corporation, the nation's third largest defense contractor. This issue brief provides a chronological summary, based on newspaper and magazine accounts, of each of these investigations.
Contributing Partner: UNT Libraries Government Documents Department
Mail and Wire Fraud: A Brief Overview of Federal Criminal Law

Mail and Wire Fraud: A Brief Overview of Federal Criminal Law

Date: July 21, 2011
Creator: Doyle, Charles
Description: This report discusses ways in which mail and wire fraud can be federal crimes and penalties for conducting such crimes. It is a federal crime to devise a scheme to defraud another of property, when either mail or wire communications are used in furtherance of the scheme. Misconduct that constitutes mail or wire fraud may also constitute a violation of one or more other federal crimes.
Contributing Partner: UNT Libraries Government Documents Department
Mail and Wire Fraud: An Abridged Overview of Federal Criminal Law

Mail and Wire Fraud: An Abridged Overview of Federal Criminal Law

Date: July 21, 2011
Creator: Doyle, Charles
Description: This report discusses ways in which mail and wire fraud can be federal crimes and penalties for conducting such crimes. It is a federal crime to devise a scheme to defraud another of property, when either mail or wire communications are used in furtherance of the scheme. Misconduct that constitutes mail or wire fraud may also constitute a violation of one or more other federal crimes.
Contributing Partner: UNT Libraries Government Documents Department
The False Claims Act, the Allison Engine Decision, and Possible Effects on Health Care Fraud Enforcement

The False Claims Act, the Allison Engine Decision, and Possible Effects on Health Care Fraud Enforcement

Date: November 6, 2008
Creator: Staman, Jennifer
Description: The False Claims Act (FCA), an important tool for combating fraud against the U.S. government, generally provides that a person who knowingly submits, or causes to be submitted, a false or fraudulent claim for payment to the U.S. government may be subject to civil penalties and damages. This report provides an overview of the FCA and the Allison Engine decision, analyzes how this decision could affect certain FCA health care claims, and discusses the proposed False Claims Correction Acts (S. 2041 and H.R. 4854), which, if enacted, could limit the application of the Allison Engine decision.
Contributing Partner: UNT Libraries Government Documents Department
Recovery.gov: the official U.S. Government website for the Recovery Accountability and Transparency Board

Recovery.gov: the official U.S. Government website for the Recovery Accountability and Transparency Board

Date: 2015
Creator: United States. Recovery Accountability and Transparency Board
Description: This is the website for the Recovery Accountability and Transparency Board, a non-partisan, non-political agency established by the American Recovery and Reinvestment Act of 2009 (ARRA) with the goals of providing transparency of ARRA-related funds, and detecting and preventing fraud, waste, and mismanagement of those funds. Under the Consolidated Appropriations Act of 2012, the Board's authority was expanded to include oversight of all federal funding and, under the Disaster Appropriations Act of 2013, the Board was mandated by Congress to use its resources to provide oversight of Hurricane Sandy funding. The website contains information about the board's activities, as well as data related to the $840 billion stimulus bill and information about the distribution and spending of Hurricane Sandy funds.
Contributing Partner: UNT Libraries Digital Projects Unit
Credit card fraud detection: An application of the gene expression messy genetic algorithm

Credit card fraud detection: An application of the gene expression messy genetic algorithm

Date: May 1, 1996
Creator: Kargupta, H.; Gattiker, J.R. & Buescher, K.
Description: This paper describes an application of the recently introduced gene expression messy genetic algorithm (GEMGA) (Kargupta, 1996) for detecting fraudulent transactions of credit cards. It also explains the fundamental concepts underlying the GEMGA in the light of the SEARCH (Search Envisioned As Relation and Class Hierarchizing) (Kargupta, 1995) framework.
Contributing Partner: UNT Libraries Government Documents Department
Visualization of high-dimensional clusters using nonlinear magnification

Visualization of high-dimensional clusters using nonlinear magnification

Date: December 31, 1998
Creator: Keahey, T.A.
Description: This paper describes a cluster visualization system used for data-mining fraud detection. The system can simultaneously show 6 dimensions of data, and a unique technique of 3D nonlinear magnification allows individual clusters of data points to be magnified while still maintaining a view of the global context. The author first describes the fraud detection problem, along with the data which is to be visualized. Then he describes general characteristics of the visualization system, and shows how nonlinear magnification can be used in this system. Finally he concludes and describes options for further work.
Contributing Partner: UNT Libraries Government Documents Department
Fraud detection in medicare claims: A multivariate outlier detection approach

Fraud detection in medicare claims: A multivariate outlier detection approach

Date: April 1, 1997
Creator: Burr, T.; Hale, C. & Kantor, M.
Description: We apply traditional and customized multivariate outlier detection methods to detect fraud in medicare claims. We use two sets of 11 derived features, and one set of the 22 combined features. The features are defined so that fraudulent medicare providers should tend to have larger features values than non-fraudulent providers. Therefore we have an apriori direction ({open_quotes}large values{close_quotes}) in high dimensional feature space to search for the multivariate outliers. We focus on three issues: (1) outlier masking (Example: the presence of one outlier can make it difficult to detect a second outlier), (2) the impact of having an apriori direction to search for fraud, and (3) how to compare our detection methods. Traditional methods include Mahalanobis distances, (with and without dimension reduction), k-nearest neighbor, and density estimation methods. Some methods attempt to mitigate the outlier masking problem (for example: minimum volume ellipsoid covariance estimator). Customized methods include ranking methods (such as Spearman rank ordering) that exploit the {open_quotes}large is suspicious{close_quotes} notion. No two methods agree completely which providers are most suspicious so we present ways to compare our methods. One comparison method uses a list of known-fraudulent providers. All comparison methods restrict attention to the most suspicious providers.
Contributing Partner: UNT Libraries Government Documents Department
Towards general information theoretical representations of database problems

Towards general information theoretical representations of database problems

Date: June 1, 1997
Creator: Joslyn, C.
Description: General database systems are described from the General Systems Theoretical (GST) framework. In this context traditional information theoretical (statistical) and general information theoretical (fuzzy measure and set theoretical, possibilistic, and random set theoretical) representations are derived. A preliminary formal framework is introduced.
Contributing Partner: UNT Libraries Government Documents Department
Maximum likelihood continuity mapping for fraud detection

Maximum likelihood continuity mapping for fraud detection

Date: May 1, 1997
Creator: Hogden, J.
Description: The author describes a novel time-series analysis technique called maximum likelihood continuity mapping (MALCOM), and focuses on one application of MALCOM: detecting fraud in medical insurance claims. Given a training data set composed of typical sequences, MALCOM creates a stochastic model of sequence generation, called a continuity map (CM). A CM maximizes the probability of sequences in the training set given the model constraints, CMs can be used to estimate the likelihood of sequences not found in the training set, enabling anomaly detection and sequence prediction--important aspects of data mining. Since MALCOM can be used on sequences of categorical data (e.g., sequences of words) as well as real valued data, MALCOM is also a potential replacement for database search tools such as N-gram analysis. In a recent experiment, MALCOM was used to evaluate the likelihood of patient medical histories, where ``medical history`` is used to mean the sequence of medical procedures performed on a patient. Physicians whose patients had anomalous medical histories (according to MALCOM) were evaluated for fraud by an independent agency. Of the small sample (12 physicians) that has been evaluated, 92% have been determined fraudulent or abusive. Despite the small sample, these results are encouraging.
Contributing Partner: UNT Libraries Government Documents Department
Financial system loss as an example of high consequence, high frequency events

Financial system loss as an example of high consequence, high frequency events

Date: July 1, 1996
Creator: McGovern, D.E.
Description: Much work has been devoted to high consequence events with low frequency of occurrence. Characteristic of these events are bridge failure (such as that of the Tacoma Narrows), building failure (such as the collapse of a walkway at a Kansas City hotel), or compromise of a major chemical containment system (such as at Bhopal, India). Such events, although rare, have an extreme personal, societal, and financial impact. An interesting variation is demonstrated by financial losses due to fraud and abuse in the money management system. The impact can be huge, entailing very high aggregate costs, but these are a result of the contribution of many small attacks and not the result of a single (or few) massive events. Public awareness is raised through publicized events such as the junk bond fraud perpetrated by Milikin or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These event,s although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. This paper explores the magnitude of financial system losses and identifies new areas for ...
Contributing Partner: UNT Libraries Government Documents Department
Threats to financial system security

Threats to financial system security

Date: June 1, 1997
Creator: McGovern, D.E.
Description: The financial system in the United States is slowly migrating from the bricks and mortar of banks on the city square to branch banks, ATM`s, and now direct linkage through computers to the home. Much work has been devoted to the security problems inherent in protecting property and people. The impact of attacks on the information aspects of the financial system has, however, received less attention. Awareness is raised through publicized events such as the junk bond fraud perpetrated by Milken or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These events, although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. Most of the losses can be traced to the contribution of many small attacks perpetrated against a variety of vulnerable components and systems. This paper explores the magnitude of these financial system losses and identifies new areas for security to be applied to high consequence events.
Contributing Partner: UNT Libraries Government Documents Department
Identity Theft Laws: State Penalties and Remedies and Pending Federal Bills

Identity Theft Laws: State Penalties and Remedies and Pending Federal Bills

Date: June 1, 2007
Creator: Rainson, Tara A.
Description: This report provides an overview of state laws on identity theft. It discusses state laws that penalize identity theft, as well as state laws that assist identity theft victims, including those that permit consumers to block unauthorized persons from obtaining their credit information, known as “security freezes.” The report also includes a survey of state “credit freeze” statutes. The report concludes with summaries of federal identity theft legislation pending in the 110th Congress.
Contributing Partner: UNT Libraries Government Documents Department
Federal Inspectors General: History, Characteristics, and Recent Congressional Actions

Federal Inspectors General: History, Characteristics, and Recent Congressional Actions

Date: June 2, 2016
Creator: Ginsberg, Wendy & Greene, Michael
Description: This report provides background on the statutory creation of federal offices of inspector general (OIGs) and provides historical context for contemporary debates about the strengths and limitations of the offices. Federal inspectors general (IGs) are authorized to combat waste, fraud, and abuse within their affiliated federal entities; to execute their missions, OIGs conduct and publish audits and investigations--among other duties.
Contributing Partner: UNT Libraries Government Documents Department