About Us | Contact Us
View Cart

Health Care Fraud Trends and Tips

By Vigilize | Wednesday, August 11, 2010 - Leave a Comment

A pharmaceutical company marketed four drugs to doctors. The drugs had been approved by the Food and Drug Administration (FDA) for specific medical conditions—like rheumatoid arthritis, schizophrenia, and neuropathic pain—but the company promoted the drugs for other uses as well—like post-operative pain, dementia, and migraines—and sometimes in larger doses than the FDA allowed. In some cases, the company even paid kickbacks to doctors to prescribe the drugs for these other uses.

What this company did is known as off-label marketing of prescription drugs, and it’s both illegal and potentially harmful to consumers. After an investigation involving the FBI and our federal and state partners, the company pled guilty to misbranding the drugs and agreed to pay $2.3 billion to settle criminal and civil violations…the largest U.S. health care fraud settlement ever.

At the FBI, we take our health care fraud responsibilities seriously as the primary investigative agency with jurisdiction over both federal and private insurance programs. But with total health care expenditures in the U.S. expected to reach $2.26 trillion by 2016 according to the Centers for Medicare and Medicaid Services, the opportunity for fraud will continue to grow—so will our workload. That means we have to find ways to leverage our resources.

Partnerships are key. A tried-and-true method of leveraging resources is establishing partnerships. And we’ve done just that—with federal agencies like the FDA and the Drug Enforcement Administration, various state and local agencies, and private insurance groups like the National Health Care Anti-Fraud Association.

Our most recent joint endeavor? Our participation in the Department of Justice/Health and Human Services’ (HHS) Health Care Fraud Prevention and Enforcement Action Team, or HEAT, and its Medicare Fraud Strike Forces located in several major metropolitan areas.

The HEAT initiative includes senior Justice, FBI, and HHS officials who are focusing their efforts to reduce Medicare and Medicaid fraud through enhanced cooperation. And the strike forces, which use a data-driven approach to identify unexplainable billing patterns by health care providers and then investigate these providers for possible fraudulent activity, are a vital part of the initiative. As a result of strike force efforts, more than 300 cases have been filed and close to 600 defendants charged.

Health care fraud facts:

  • Health care fraud schemes come in all forms—fraudulent billings, medically unnecessary services or prescriptions, kickbacks, duplicate claims, etc.
    Schemes target large health care programs—both public and private—as well as health care beneficiaries. (Medicare and the Medicaid are the largest programs, so they are targeted more often.)
  • Schemes are committed by health care providers, owners of medical facilities and laboratories, suppliers of medical equipment, organized crime groups, corporations, and even sometimes by the beneficiaries themselves.
  • FBI health care fraud cases sometimes cross over into other investigative areas, like organized crime, gangs, and cyber crime, where we see criminals beginning to use the proceeds from health care fraud schemes to fund their operations.

Tips to help avoid being victimized:

  • Protect your health insurance information card like a credit card.
  • Beware of free health services—are they too good to be true?
  • Review your medical bills, like your “explanation of benefits,” after receiving health care services and ensure the dates are services are correct.

And if you suspect health care fraud, contact your local FBI office.


Original notification posted by the Federal Deposit Insurance Corporation (FDIC), which is an independent agency created by the Congress to maintain stability and public confidence in the nation’s financial system by:

  • insuring deposits,
  • examining and supervising financial institutions for safety and soundness and consumer protection, and
  • managing receiverships.

same_strip_012513

Latest News
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Millions of phishing emails will get through automated defenses this year, are your employees ready? An article review. With cybersecurity threats such as cryptocurrency miners and ransomware seeming to dominate the news, it can be easy to forget about older threats such as phishing…but a recent report from cybersecurity firm Tessian reminds us that criminals […]
    The FFIEC’s latest guidance: The Architecture, Infrastructure, and Operations, has brought many changes to exactly how a small financial institution may look at their Technology Planning for 2022. Included in that will be the opportunity to write your first Architecture Plan and we intend to show you what may be involved in that! Have any […]
    While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]
    Following the contribution, Have I Been Pwned will host more than 800 million compromised credentials… An article review. Have any of your login credentials been revealed in a breach?  If you’re unsure about that, Have I Been Pwned (HIBP) can help you out by letting you check against over 600 million compromised credentials…and with the […]
    infotex and Log4j We are keeping our Clients’ safety in mind. To all infotex managed security service Clients: On Friday December 10th, infotex became aware of a zero-day vulnerability in the Apache Log4j library that allows unauthenticated remote code execution. We began incident response and took steps to proactively disable potentially vulnerable applications until we […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Trending: Awareness Posters went “Back to Basics” Here are the top seven posters as of the last twelve months! As always, our Awareness Posters were a hit in 2021! So we decided to run some reports to see what our most popular posters were since November 2020. As everybody loves top ten lists and contests, […]
    Dan is joined by a Panel to discuss the FFIEC’s New AIO Guidance and how it may impact Technology Planning in the future.