Interagency fight against Medicare fraud shows promise

Committee chairman Max Baucus, D-Mont., said the result was a "success story." Committee chairman Max Baucus, D-Mont., said the result was a "success story." Susan Walsh/AP file photo

Teamwork between the Health and Human Services and Justice departments targeting criminal fraud in the Medicare program is producing encouraging results in prosecutions and funds recovered, agency officials told a Senate panel Tuesday. But HHS’ Centers for Medicare and Medicaid Services is seen as slow to implement some key tools made available under the 2010 health care form law.

The focus of the Senate Finance Committee hearing was indictments in Miami made public in September 2011 after a federal strike force busted a $300 million scheme of fraudulent home health care providers in eight cities. The scheme’s ringleaders, members of a firm called ABC Home Health Care, were charged with recruiting indigent people and paying them $1,500 a month to use their identification to file false claims for home health services that were never delivered. The invoices were executed by paying kickbacks to corrupt physicians to fill out forms for such treatments as insulin injections and physical therapy.

ABC’s records were “clinically incoherent,” as HHS Inspector General Daniel Levinson observed, noting computer data analysis revealed dozens of daily treatments were suspiciously the same for all patients.

Committee chairman Sen. Max Baucus, D-Mont., said the result was a “success story” where CMS, the HHS IG and Justice “were able to work as a team” to crack the largest case of Medicare fraud in U.S. history, having been given an “unparalleled set of tools from Affordable Care Act.”

Though the fight against Medicare fraud recovered $4.1 billion in fiscal 2011-- a return of $7 for every $1 invested in the effort, the IG said -- several Republican senators expressed doubts that CMS had done enough.

Sen. Orrin Hatch, R-Utah, graded CMS’ follow-through on implementing its new tools, assigning it an “incomplete” and noting, “though CMS has made some strides in its fight against fraud, [its report card] is not one to be proud of.” His list of unfulfilled tasks included not implementing a temporary moratorium on enrolling new Medicare providers and suppliers; not establishing a surety bond on home health agencies, which are considered high risks for fraud; not placing limits on billing amounts; and not denying billing privileges to providers not in good standing for past work.

Kathleen King, director of health care for the Government Accountability Office, said, “although CMS has taken some important steps to identify and prevent fraud . . . more remains to be done to prevent making erroneous Medicare payments due to fraud. In particular, we have found that CMS could do more to strengthen provider enrollment screening to avoid enrolling those intent on committing fraud, improve pre- and post-payment claims review to identify and respond to patterns of suspicious billing activity more effectively, and identify and address vulnerabilities to reduce the ease with which fraudulent entities can obtain improper payments.”

Dr. Peter Budetti, deputy administrator and director of the Center for Program Integrity at CMS, said the Miami case was “a good example of how we work together,” adding CMS provided data and played an important role in the entire prosecution, including serving as witnesses at the trial. He described his agency’s new software tools, which he called “the twin pillars,” a Fraud Prevention System that employs analytic technology to head off bad payments, and an Automated Provider Screening tool to root out bad actors who submit Medicare invoices. The prevention system has saved some $35 million in just the first year, he said.

Defending HHS’ speed in implementation, Budetti said his team fully intends to put the tools in place but said, “it is difficult to determine which tool to use in which circumstances.” He said slapping a moratorium on providers would affect legitimate ones as well fraudsters. He agreed with Baucus’ assertion that the anti-fraud effort should be executed with metrics or benchmarks to gauge progress, promising to deliver such metrics in the program’s annual report this summer.

Wifredo Ferrer, U.S. attorney for the Southern District of Florida, called the ABC Home Health Care case “a perfect example of the tools needed, from data analysis to old-fashioned police work,” and said the interdepartmental team meets monthly and shares leads immediately. He praised the Affordable Care Act for its expanded definition of health care fraud, greater subpoena power and tougher sentences for deterrence. “You have to prosecute up and down the health care chain to give an incentive to cooperate,” he said. But Ferrer added,“we can’t prosecute our way of this,” that prevention is key.

Sen. Tom Coburn, R-Okla., stressed the importance of delivering fraud-committing physicians to prison, “to send an important signal to publicize for other doctors to change their behavior.”

Levinson noted the anti-fraud team members increasingly face dangers of pursuing criminals who are armed, and stressed that modern fraud schemes have grown more sophisticated. “The people who’re doing the paperwork right know exactly what they’re doing to steal taxpayers money,” he said. The traditional Medicare fraud committed using empty storefronts selling durable medical equipment multiple times is today viewed as “lazy man’s fraud,” he said.

Baucus said, “We’re starting to make a little progress, [but] more needs to be done.” He promised another hearing in a year.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.