Search Results

Identity Theft: Trends and Issues

Description: This report first provides a brief federal legislative history of identity theft laws. It analyzes selected trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions. The report also discusses the relationship between data breaches and identity theft as well as possible effects of the FTC's Identity Theft Red Flags Rule. It also examines possible issues for Congress to consider.
Date: January 16, 2014
Creator: Finklea, Kristin
Item Type: Report
Partner: UNT Libraries Government Documents Department

Identity Theft: Trends and Issues

Description: This report first provides a brief federal legislative history of identity theft laws. It analyzes the current trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions. The report also discusses the relationship between data breaches and identity theft as well as possible effects of the FTC's Identity Theft Red Flags Rule, effective June 1, 2010. It also examines current legislation on identity theft and possible issues for the 111th Congress to consider.
Date: May 27, 2010
Creator: Finklea, Kristin M.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Federal Inspectors General: History, Characteristics, and Recent Congressional Actions

Description: This report discusses federal inspectors general (IGs), who are authorized to combat waste, fraud, and abuse within their affiliated federal entities. To execute their missions, offices of inspector general (OIGs) conduct and publish audits and investigations--among other duties. Two major enactments--the Inspector General Act of 1978 and its amendments of 1988 (codified at 5 U.S.C. Appendix)--established federal IGs as permanent, nonpartisan, and independent offices in more than 70 federal agencies.
Date: December 8, 2014
Creator: Ginsberg, Wendy & Greene, Michael
Item Type: Report
Partner: UNT Libraries Government Documents Department

Barriers to Corporate Fraud: How They Work, Why They Fail

Description: The report focuses on the internal controls on American corporations (including corporate governance, business ethics, managerial structure and compensation, internal counsel, and whistleblowers), as well as external controls (government regulation, external auditors and accountants, and the judicial process). A recurring theme is the limited efficacy of many safeguards and watchdogs in cases of "control fraud," where fraud is directed or abetted by top management, and where unethical or abusive practices may become the organizational norm. Another broad question raised by the report is whether the post-Enron scandals were a one-time event, made possible by the stock market bubble of the 1990s and several other unique historical developments which together constituted a "perfect storm," or whether fraud is a cyclical phenomenon associated with the end of long bull markets.
Date: December 27, 2004
Creator: Jickling, Mark
Item Type: Report
Partner: UNT Libraries Government Documents Department

Identity Theft: Trends and Issues

Description: This report first provides a brief federal legislative history of identity theft laws. It analyzes the current trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions.
Date: August 26, 2009
Creator: Finklea, Kristin M.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Identity Theft: Trends and Issues

Description: This report first provides a brief federal legislative history of identity theft laws. It analyzes the current trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions. The report also discusses the relationship between data breaches and identity theft as well as possible effects of the FTC's Identity Theft Red Flags Rule, effective November 1, 2009.
Date: May 27, 2009
Creator: Finklea, Kristin M.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Identity Theft: Trends and Issues

Description: This report first provides a brief federal legislative history of identity theft laws. It analyzes the current trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions. The report also discusses the relationship between data breaches and identity theft as well as possible effects of the FTC's Identity Theft Red Flags Rule, effective June 1, 2010.
Date: January 5, 2010
Creator: Finklea, Kristin M.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Identity Theft: Trends and Issues

Description: In 2010, about 8.1 million Americans were reportedly victims of identity fraud, and the average identity fraud victim incurred a mean of $631 in costs as a result of the fraud—the highest level since 2007. Identity theft is often committed to facilitate other crimes such as credit card fraud, document fraud, or employment fraud, which in turn can affect not only the nation's economy but its security. Consequently, in securing the nation and its economic health, policy makers are also tasked with reducing identity theft and its impact.
Date: February 15, 2012
Creator: Finklea, Kristin M.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Mail and Wire Fraud: A Brief Overview of Federal Criminal Law

Description: This report discusses ways in which mail and wire fraud can be federal crimes and penalties for conducting such crimes. It is a federal crime to devise a scheme to defraud another of property, when either mail or wire communications are used in furtherance of the scheme. Misconduct that constitutes mail or wire fraud may also constitute a violation of one or more other federal crimes.
Date: July 21, 2011
Creator: Doyle, Charles
Item Type: Report
Partner: UNT Libraries Government Documents Department

Mail and Wire Fraud: An Abridged Overview of Federal Criminal Law

Description: This report discusses ways in which mail and wire fraud can be federal crimes and penalties for conducting such crimes. It is a federal crime to devise a scheme to defraud another of property, when either mail or wire communications are used in furtherance of the scheme. Misconduct that constitutes mail or wire fraud may also constitute a violation of one or more other federal crimes.
Date: July 21, 2011
Creator: Doyle, Charles
Item Type: Report
Partner: UNT Libraries Government Documents Department

Recovery.gov: the official U.S. Government website for the Recovery Accountability and Transparency Board

Description: This is the website for the Recovery Accountability and Transparency Board, a non-partisan, non-political agency established by the American Recovery and Reinvestment Act of 2009 (ARRA) with the goals of providing transparency of ARRA-related funds, and detecting and preventing fraud, waste, and mismanagement of those funds. Under the Consolidated Appropriations Act of 2012, the Board's authority was expanded to include oversight of all federal funding and, under the Disaster Appropriations Act of 2013, the Board was mandated by Congress to use its resources to provide oversight of Hurricane Sandy funding. The website contains information about the board's activities, as well as data related to the $840 billion stimulus bill and information about the distribution and spending of Hurricane Sandy funds.
Date: 2015
Creator: United States. Recovery Accountability and Transparency Board
Item Type: Website
Partner: UNT Libraries Digital Projects Unit

Credit card fraud detection: An application of the gene expression messy genetic algorithm

Description: This paper describes an application of the recently introduced gene expression messy genetic algorithm (GEMGA) (Kargupta, 1996) for detecting fraudulent transactions of credit cards. It also explains the fundamental concepts underlying the GEMGA in the light of the SEARCH (Search Envisioned As Relation and Class Hierarchizing) (Kargupta, 1995) framework.
Date: May 1, 1996
Creator: Kargupta, H.; Gattiker, J.R. & Buescher, K.
Item Type: Article
Partner: UNT Libraries Government Documents Department

Visualization of high-dimensional clusters using nonlinear magnification

Description: This paper describes a cluster visualization system used for data-mining fraud detection. The system can simultaneously show 6 dimensions of data, and a unique technique of 3D nonlinear magnification allows individual clusters of data points to be magnified while still maintaining a view of the global context. The author first describes the fraud detection problem, along with the data which is to be visualized. Then he describes general characteristics of the visualization system, and shows how nonlinear magnification can be used in this system. Finally he concludes and describes options for further work.
Date: December 31, 1998
Creator: Keahey, T.A.
Item Type: Article
Partner: UNT Libraries Government Documents Department

Fraud detection in medicare claims: A multivariate outlier detection approach

Description: We apply traditional and customized multivariate outlier detection methods to detect fraud in medicare claims. We use two sets of 11 derived features, and one set of the 22 combined features. The features are defined so that fraudulent medicare providers should tend to have larger features values than non-fraudulent providers. Therefore we have an apriori direction ({open_quotes}large values{close_quotes}) in high dimensional feature space to search for the multivariate outliers. We focus on three issues: (1) outlier masking (Example: the presence of one outlier can make it difficult to detect a second outlier), (2) the impact of having an apriori direction to search for fraud, and (3) how to compare our detection methods. Traditional methods include Mahalanobis distances, (with and without dimension reduction), k-nearest neighbor, and density estimation methods. Some methods attempt to mitigate the outlier masking problem (for example: minimum volume ellipsoid covariance estimator). Customized methods include ranking methods (such as Spearman rank ordering) that exploit the {open_quotes}large is suspicious{close_quotes} notion. No two methods agree completely which providers are most suspicious so we present ways to compare our methods. One comparison method uses a list of known-fraudulent providers. All comparison methods restrict attention to the most suspicious providers.
Date: April 1, 1997
Creator: Burr, T.; Hale, C. & Kantor, M.
Item Type: Article
Partner: UNT Libraries Government Documents Department

Towards general information theoretical representations of database problems

Description: General database systems are described from the General Systems Theoretical (GST) framework. In this context traditional information theoretical (statistical) and general information theoretical (fuzzy measure and set theoretical, possibilistic, and random set theoretical) representations are derived. A preliminary formal framework is introduced.
Date: June 1, 1997
Creator: Joslyn, C.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Maximum likelihood continuity mapping for fraud detection

Description: The author describes a novel time-series analysis technique called maximum likelihood continuity mapping (MALCOM), and focuses on one application of MALCOM: detecting fraud in medical insurance claims. Given a training data set composed of typical sequences, MALCOM creates a stochastic model of sequence generation, called a continuity map (CM). A CM maximizes the probability of sequences in the training set given the model constraints, CMs can be used to estimate the likelihood of sequences not found in the training set, enabling anomaly detection and sequence prediction--important aspects of data mining. Since MALCOM can be used on sequences of categorical data (e.g., sequences of words) as well as real valued data, MALCOM is also a potential replacement for database search tools such as N-gram analysis. In a recent experiment, MALCOM was used to evaluate the likelihood of patient medical histories, where ``medical history`` is used to mean the sequence of medical procedures performed on a patient. Physicians whose patients had anomalous medical histories (according to MALCOM) were evaluated for fraud by an independent agency. Of the small sample (12 physicians) that has been evaluated, 92% have been determined fraudulent or abusive. Despite the small sample, these results are encouraging.
Date: May 1, 1997
Creator: Hogden, J.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Financial system loss as an example of high consequence, high frequency events

Description: Much work has been devoted to high consequence events with low frequency of occurrence. Characteristic of these events are bridge failure (such as that of the Tacoma Narrows), building failure (such as the collapse of a walkway at a Kansas City hotel), or compromise of a major chemical containment system (such as at Bhopal, India). Such events, although rare, have an extreme personal, societal, and financial impact. An interesting variation is demonstrated by financial losses due to fraud and abuse in the money management system. The impact can be huge, entailing very high aggregate costs, but these are a result of the contribution of many small attacks and not the result of a single (or few) massive events. Public awareness is raised through publicized events such as the junk bond fraud perpetrated by Milikin or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These event,s although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. This paper explores the magnitude of financial system losses and identifies new areas for analysis of high consequence events including the potential effect of malevolent intent.
Date: July 1, 1996
Creator: McGovern, D.E.
Item Type: Article
Partner: UNT Libraries Government Documents Department

Threats to financial system security

Description: The financial system in the United States is slowly migrating from the bricks and mortar of banks on the city square to branch banks, ATM`s, and now direct linkage through computers to the home. Much work has been devoted to the security problems inherent in protecting property and people. The impact of attacks on the information aspects of the financial system has, however, received less attention. Awareness is raised through publicized events such as the junk bond fraud perpetrated by Milken or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These events, although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. Most of the losses can be traced to the contribution of many small attacks perpetrated against a variety of vulnerable components and systems. This paper explores the magnitude of these financial system losses and identifies new areas for security to be applied to high consequence events.
Date: June 1, 1997
Creator: McGovern, D.E.
Item Type: Article
Partner: UNT Libraries Government Documents Department

Federal Inspectors General: History, Characteristics, and Recent Congressional Actions

Description: This report provides background on the statutory creation of federal offices of inspector general (OIGs) and provides historical context for contemporary debates about the strengths and limitations of the offices. Federal inspectors general (IGs) are authorized to combat waste, fraud, and abuse within their affiliated federal entities; to execute their missions, OIGs conduct and publish audits and investigations--among other duties.
Date: June 2, 2016
Creator: Ginsberg, Wendy & Greene, Michael
Item Type: Report
Partner: UNT Libraries Government Documents Department

INFORMATION: Special Report on "Selected Department of Energy Program Efforts to Implement the American Recovery and Reinvestment Act"

Description: The American Recovery and Reinvestment Act of 2009 (Recovery Act) was enacted on February 17, 2009, to jumpstart the economy by creating or saving millions of jobs, spurring technological advances in health and science, and investing in the Nation's energy future. The Department of Energy received over $32.7 billion in Recovery Act funding for various science, energy, and environmental programs and initiatives. As of November 2009, the Department had obligated $18.3 billion of the Recovery Act funding, but only $1.4 billion had been spent. The Department's Offices of Energy Efficiency and Renewable Energy, Fossil Energy, Environmental Management, Science, and Electricity Delivery and Energy Reliability received the majority of funding allocated to the Department, about $32.3 billion. Obligating these funds by the end of Fiscal Year 2010, as required by the Recovery Act, and overseeing their effective use in succeeding years, represents a massive workload increase for the Department's programs. The effort to date has strained existing resources. As has been widely acknowledged, any effort to disburse massive additional funding and to expeditiously initiate and complete projects increases the risk of fraud, waste and abuse. It is, therefore, important for the Department's program offices to assess and mitigate these risks to the maximum extent practicable. In this light, we initiated this review as an initial step in the Office of Inspector General's charge to determine whether the Department's major program offices had developed an effective approach for identifying and mitigating risks related to achieving the goals and objectives of the Recovery Act. The Department's program offices included in our review identified risks and planned mitigation strategies that, if successfully implemented and executed, should help achieve the goals and objectives of the Recovery Act. While each office identified risks unique to its respective areas of responsibility, there were a number of risks ...
Date: December 1, 2009
Creator: None
Item Type: Report
Partner: UNT Libraries Government Documents Department

Alleged Fraud, Waste and, and Abuse: General Dynamics Corp.

Description: Numerous Federal agencies -- including the Justice Department and Congressional committees -- are investigating allegations of fraud at the Electric Boat Division of General Dynamics Corporation, the nation's third largest defense contractor. This issue brief provides a chronological summary, based on newspaper and magazine accounts, of each of these investigations.
Date: July 12, 1985
Creator: O'Rourke, Ronald
Item Type: Report
Partner: UNT Libraries Government Documents Department

The False Claims Act, the Allison Engine Decision, and Possible Effects on Health Care Fraud Enforcement

Description: The False Claims Act (FCA), an important tool for combating fraud against the U.S. government, generally provides that a person who knowingly submits, or causes to be submitted, a false or fraudulent claim for payment to the U.S. government may be subject to civil penalties and damages. This report provides an overview of the FCA and the Allison Engine decision, analyzes how this decision could affect certain FCA health care claims, and discusses the proposed False Claims Correction Acts (S. 2041 and H.R. 4854), which, if enacted, could limit the application of the Allison Engine decision.
Date: November 6, 2008
Creator: Staman, Jennifer
Item Type: Report
Partner: UNT Libraries Government Documents Department

Identity Theft Laws: State Penalties and Remedies and Pending Federal Bills

Description: This report provides an overview of state laws on identity theft. It discusses state laws that penalize identity theft, as well as state laws that assist identity theft victims, including those that permit consumers to block unauthorized persons from obtaining their credit information, known as “security freezes.” The report also includes a survey of state “credit freeze” statutes. The report concludes with summaries of federal identity theft legislation pending in the 110th Congress.
Date: June 1, 2007
Creator: Rainson, Tara A.
Item Type: Report
Partner: UNT Libraries Government Documents Department