Waste and fraud still plague Medicare, but oversight is improving, officials say

Medicare remains vulnerable to waste and fraud, but a pilot program has helped reduce errors, according to witnesses testifying on Capitol Hill on Thursday.

The Centers for Medicare and Medicaid Services operated a three-year demonstration program that identified more than $1 billion in erroneous payments between 2005 and 2008, according to a report from the Office of the Inspector General at the Health and Human Services Department. That program, which since has been expanded to more states, employed recovery audit contractors; a provision in the 2010 health care reform law that mandates the expansion of that initiative by the end of the year to include the Medical Advantage program, Medicare Prescription Drug program and Medicaid.

The recovery audit contractors' program also has identified 58 areas where the Medicare payment system is most vulnerable to improper spending, and 23 of them already have been addressed, according to Kathleen King, director of health care at the Government Accountability Office. The use of invalid prescriber identifiers on claims for prescription drugs remains a significant source of improper spending, Robert Vito, HHS regional inspector general for evaluations and inspections, said on Thursday. According to Vito, Medicare paid $1.2 billion in claims in 2007 that supplied improper prescriber identifiers.

OIG has focused its attention on oversight of specific geographic regions with high rates of invalid claims as well as claims including drugs that are susceptible to abuse.

The Medicare program has been on GAO's high-risk list for two decades for fraudulent claims and wasteful spending. Federal estimates for Medicare payment errors in fiscal 2009 ranged between $36 billion and $60 billion. The Office of Management and Budget reports CMS contractors are charged with handling 4.5 million claims every day.

Deborah Taylor, director and chief of the Office of Financial Management at CMS, said the agency has created a database to address all potential vulnerabilities identified by the recovery audit contractors' program by categorizing and comparing denied claims, according to provider and provider type. Sen. Tom Carper, D-Del., chairman of the federal financial management subcommittee, asked Taylor and King to report back with specific timelines on when the weaknesses would be addressed.

"As a recovering governor, I understand the unique challenges that come along with running a major program," Carper said. "But Congress must ensure that the more than $460 billion we spend through Medicare to address the health care needs of our nation's seniors is spent efficiently and effectively."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.