About Us | Contact Us
View Cart

Potential Economic Stimulus Fraud

By Dan Hadaway | Friday, September 18, 2009 - Leave a Comment

In today’s world, the most effective way for the FBI to serve the American people is to be intelligence-led and threat-driven. That means not only investigating violations of federal law after the fact, but also seeing potential threats and crimes on the horizon and being positioned to prevent them.

It’s for that reason that the FBI and the Department of Justice are working now—in concert with our federal, state, and local partners, including the Inspector General community—to get out in front of possible fraud and corruption associated with the American Recovery and Reinvestment Act (ARRA).

The ARRA, signed into law earlier this year, will inject $787 billion into the U.S. economy, providing jobs and other resources for states and local communities. While most of those receiving the funding are honest and dedicated individuals, experience tells us that there’s a good chance that some of the money could end up in the hands of a few unscrupulous government officials and others seeking to line their own pockets. A recent case in point: Hurricane Katrina.

The ARRA does include oversight and reporting requirements. But past investigations have shown that much of the crime is likely to occur among those who have minimal or no reporting requirements and limited oversight—that amount of money may prove too tempting for some.

The use of intelligence is key. The bulk of the funds won’t be allocated until 2010 and 2011, so there hasn’t been a widespread outbreak of corruption and fraud in response to the ARRA. Still, we are working now to head off potential problems by strategically collecting and analyzing intelligence to identify where we should be focusing resources.

Based on the areas that the ARRA funding is targeting, we’ve pinpointed specific programs that could be the most vulnerable. They include:

  • Transportation and infrastructure: Schemes historically involve bribery of contracting officers and inspectors and fraudulent billing for inferior materials or work not performed.
  • Education: Funding and contracts for public schools are typically conducted by an independent board with full spending authority and little or no oversight.
  • Energy/Environment: The increased popularity of renewable or alternative forms of energy—coupled with stimulus efforts to promote environmentally-friendly energy sources and create “green jobs”—will result in more projects and more opportunities for corruption and fraud.
  • Housing: Funding to redevelop foreclosed or abandoned homes will be provided to state and local governments via grants, providing opportunities for public officials or grant recipients to manipulate the program for personal gain.

And when crimes like these do occur, we’ll use our arsenal of lawful investigative techniques—undercover operations, court-authorized electronic surveillance, informants, etc.—that have been so effective against other types of crimes to uncover the illegal deeds.

You can help. If you suspect fraud or corruption, whether related to ARRA or another economic stimulus program, submit a tip electronically or contact your local FBI office.


Original Article from the Federal Bureau of Investigation: CORRUPTION ALERT: Potential Economic Stimulus Fraud


 

Latest News
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Many organizations still fail to consider the unique risks posed by cloud computing… An article review. Last month thousands of Western Digital MyCloud device owners learned about the risks of cloud-based solutions the hard way: their data had been wiped remotely due to a flaw in the internet-facing component of their external hard drives. While […]
    infotex does not use Kaseya… We are protecting our Clients! Another blog post meant to inspire thought about IT Governance . . . . To all infotex managed security service Clients: As you may be aware there was a large ransomware attack recently that leveraged a remote management tool called Kaseya that is used by many […]
    While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS Dan Hadaway and Sara Fultz co-wrote an article in the Spring 2021 issue of the Ohio Record, the Official Magazine of the Ohio Bankers League.  Find out on page 20 and 21 of the magazine how tabletop testing strengthens bank cybersecurity. You can read the article here! […]
    You’ve heard it from every MSSP you’ve met: the definition of a SIEM is in the eye of the beholder. But at infotex, we are not talking about the database – an asset whose definition is continuously evolving. We’re talking about the way three teams collaborate in an overall Technology Risk Monitoring process. And whether […]
    After the large number of high-profile breaches in the recent months, it is easy to become disconcerted about how to prevent such things from happening to your Bank. The answer to preventing a breach is a very complex one. infotex will explore this with you! The heightened level of awareness and extra protective tendencies that […]
    A follow-up on Dan’s 2008 Password Manifesto On the NIST Publication on Digital Identity Guidelines Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . In June 2017, NIST released a special publication on digital identity, NIST SP 800-63, that is starting to get the attention […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Over Seven Billion Usernames Have Been Leaked in Breaches Since 2011… An article review. An unfortunate fact of modern life seems to be the inevitable announcement of new data breaches, and if you’ve lost track of how many breaches you’ve had to perform a risk assessment on you’re probably not alone…but just how much personal […]