More personnel sought for post-Katrina fraud investigations

Federal investigators from several departments, along with state and local officials on the Gulf Coast, will spend years combing through thousands of tips for possible contracting fraud in the aftermath of Hurricane Katrina, witnesses told a House panel Wednesday.

Already, more than 260 people - including some government employees - have been charged with a range of crimes because of investigations by the Homeland Security and Justice departments, the FBI and the Secret Service, among others. However, additional personnel, including investigators and prosecutors, will be needed, officials testified at a House Government Reform Subcommittee on Government Management, Finance and Accountability hearing.

"We have asked for additional resources," said Alice Fisher, chair of Justice's Hurricane Katrina Fraud Task Force.

The task force is headquartered in Baton Rouge, La., and because all departments and agencies - from federal to local levels - share databases, once allegations lead to charges, each investigator is notified to see if additional inquiries are being conducted elsewhere, Fisher said. Because some contracts will continue for years, the task force's effort will continue indeterminably, as will the need for continued support and personnel.

Local and federal employees have been caught either taking or soliciting bribes, Fisher said. A pair of Federal Emergency Management Agency managers in Algiers, La., each took $10,000 in bribes and, after being caught, pleaded guilty in April for defrauding a meal plan. A U.S. Army Corps of Engineers employee also was caught taking bribes, she said.

DHS Special Inspector Matt Jadacki said hundreds of cases remain open and he anticipates a three- to five-year commitment in the Gulf Coast.

"We plan to continue, we know this is a long-term, ongoing effort," he said.

Fisher described other schemes that took place far beyond the wake left by Hurricane Katrina. Some people filed multiple applications for aid, and others made up identities. Some filed from far-flung places that went unaffected - even prison. And others impersonated charities, or just made up fake ones.

Fisher said some scammers have taken notice of investigative efforts. More than $8 million has been voluntarily returned to various government entities, but it cannot be estimated how much of that was out of fear of getting caught, she said. However, she added, some of the checks that were returned already were under investigation.

Last week the House Government Reform Committee criticized the Army Corps of Engineers and DHS officials for widespread mismanagement that created the opportunity for contracting fraud.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.