It's Still Not That Hard to Defraud the Food Stamp Program

Flickr user NatalieMaynor

Detection of improper receipt or trafficking of federal food subsidies being performed by state governments has been hindered by inconsistent data and staff cuts, an audit found.

The Supplemental Nutrition Assistance Program, run by the states under guidance from the Agriculture Department’s Food and Nutrition Service, has long been at risk of fraud in the form of improper requests for replacement electronic benefit cards and account access by prisoners or thieves using the names of deceased individuals.

The study of fraud policing in 11 states released Thursday by the Government Accountability Office faulted state oversight of such tools as fraud hotlines and data matching. “Most of selected states reported difficulties in conducting fraud investigations due to either reduced or maintained staff levels while SNAP recipient numbers greatly increased from fiscal year 2009 through 2013,” said the study, requested by Sen. Jeff Sessions, R-Ala., ranking member of the Budget Committee.

The states are achieving “mixed success,” GAO found, with potential for illicit trafficking in 73 percent of the households that requested excessive replacement SNAP benefit cards. 

. “Some state officials suggested changing the financial incentives structure to help support the costs of investigating potential SNAP fraud,” auditors noted. “For example, investigative agencies are not rewarded for cost-effective, anti-fraud efforts which prevent ineligible people from receiving benefits at all.”

The Food and Nutrition Service’s recommended e-commerce website monitoring tool, according to the auditors, is “less effective than manual searches in detecting posts indicative of SNAP trafficking. GAO found the recommended tool for monitoring social media to be impractical due to the volume of irrelevant data.”

Despite enhanced federal oversight in recent years, the report said, states still lack clear and consistent data in such areas as what constitutes a fraud investigation, the report concluded.

GAO recommended that the Food and Nutrition Service reassess financial incentives and detection tools and issue guidance to help states. Agency officials agreed. Some mentioned that while many requests for replacement food stamp cards are legitimate and hence do not merit fraud investigators’ time, “monitoring of replacement card data has an important educational component, as it allows states to identify situations where a recipient requires education on how to use their SNAP” electronic card. 

Clarification: This story has been clarified as to where the potential for illicit trafficking is. 

(Image via Flickr user NatalieMaynor)

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.