Interagency fight against Medicare fraud shows promise

Committee chairman Max Baucus, D-Mont., said the result was a "success story." Committee chairman Max Baucus, D-Mont., said the result was a "success story." Susan Walsh/AP file photo

Teamwork between the Health and Human Services and Justice departments targeting criminal fraud in the Medicare program is producing encouraging results in prosecutions and funds recovered, agency officials told a Senate panel Tuesday. But HHS’ Centers for Medicare and Medicaid Services is seen as slow to implement some key tools made available under the 2010 health care form law.

The focus of the Senate Finance Committee hearing was indictments in Miami made public in September 2011 after a federal strike force busted a $300 million scheme of fraudulent home health care providers in eight cities. The scheme’s ringleaders, members of a firm called ABC Home Health Care, were charged with recruiting indigent people and paying them $1,500 a month to use their identification to file false claims for home health services that were never delivered. The invoices were executed by paying kickbacks to corrupt physicians to fill out forms for such treatments as insulin injections and physical therapy.

ABC’s records were “clinically incoherent,” as HHS Inspector General Daniel Levinson observed, noting computer data analysis revealed dozens of daily treatments were suspiciously the same for all patients.

Committee chairman Sen. Max Baucus, D-Mont., said the result was a “success story” where CMS, the HHS IG and Justice “were able to work as a team” to crack the largest case of Medicare fraud in U.S. history, having been given an “unparalleled set of tools from Affordable Care Act.”

Though the fight against Medicare fraud recovered $4.1 billion in fiscal 2011-- a return of $7 for every $1 invested in the effort, the IG said -- several Republican senators expressed doubts that CMS had done enough.

Sen. Orrin Hatch, R-Utah, graded CMS’ follow-through on implementing its new tools, assigning it an “incomplete” and noting, “though CMS has made some strides in its fight against fraud, [its report card] is not one to be proud of.” His list of unfulfilled tasks included not implementing a temporary moratorium on enrolling new Medicare providers and suppliers; not establishing a surety bond on home health agencies, which are considered high risks for fraud; not placing limits on billing amounts; and not denying billing privileges to providers not in good standing for past work.

Kathleen King, director of health care for the Government Accountability Office, said, “although CMS has taken some important steps to identify and prevent fraud . . . more remains to be done to prevent making erroneous Medicare payments due to fraud. In particular, we have found that CMS could do more to strengthen provider enrollment screening to avoid enrolling those intent on committing fraud, improve pre- and post-payment claims review to identify and respond to patterns of suspicious billing activity more effectively, and identify and address vulnerabilities to reduce the ease with which fraudulent entities can obtain improper payments.”

Dr. Peter Budetti, deputy administrator and director of the Center for Program Integrity at CMS, said the Miami case was “a good example of how we work together,” adding CMS provided data and played an important role in the entire prosecution, including serving as witnesses at the trial. He described his agency’s new software tools, which he called “the twin pillars,” a Fraud Prevention System that employs analytic technology to head off bad payments, and an Automated Provider Screening tool to root out bad actors who submit Medicare invoices. The prevention system has saved some $35 million in just the first year, he said.

Defending HHS’ speed in implementation, Budetti said his team fully intends to put the tools in place but said, “it is difficult to determine which tool to use in which circumstances.” He said slapping a moratorium on providers would affect legitimate ones as well fraudsters. He agreed with Baucus’ assertion that the anti-fraud effort should be executed with metrics or benchmarks to gauge progress, promising to deliver such metrics in the program’s annual report this summer.

Wifredo Ferrer, U.S. attorney for the Southern District of Florida, called the ABC Home Health Care case “a perfect example of the tools needed, from data analysis to old-fashioned police work,” and said the interdepartmental team meets monthly and shares leads immediately. He praised the Affordable Care Act for its expanded definition of health care fraud, greater subpoena power and tougher sentences for deterrence. “You have to prosecute up and down the health care chain to give an incentive to cooperate,” he said. But Ferrer added,“we can’t prosecute our way of this,” that prevention is key.

Sen. Tom Coburn, R-Okla., stressed the importance of delivering fraud-committing physicians to prison, “to send an important signal to publicize for other doctors to change their behavior.”

Levinson noted the anti-fraud team members increasingly face dangers of pursuing criminals who are armed, and stressed that modern fraud schemes have grown more sophisticated. “The people who’re doing the paperwork right know exactly what they’re doing to steal taxpayers money,” he said. The traditional Medicare fraud committed using empty storefronts selling durable medical equipment multiple times is today viewed as “lazy man’s fraud,” he said.

Baucus said, “We’re starting to make a little progress, [but] more needs to be done.” He promised another hearing in a year.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.