Presentation on theme: "U.S. Department of Education Office of Inspector General"— Presentation transcript:
1 U.S. Department of Education Office of Inspector General PREVENTING FSA FRAUDChance JonesSpecial AgentNashville Field Office
2 OIG MISSION STATEMENTTo promote the efficiency, effectiveness, and integrity of the Department's programs and operations, we conduct independent and objective audits, investigations, inspections, and other activities.
4 U.S. Department Of Education Facts ED disbursed approximately $141 billion in Title IV aid for the award yearOver 22 million students had their federal financial aid applications processedOver 15 millions students submitted their federal financial aid applications onlineDuring this last year approximately 15 million students were delivered Federal Student Aid funds through more than 6,200 colleges or career schoolsMore than $80 billion in ED funding was disseminated amongst more than 142 different educational programs
5 Benjamin Franklin“There is no kind of dishonesty into which otherwise good people more easily and frequently fall than that of defrauding the government.”
6 FRAUD DEFINEDAn intentional distortion of the truth in an attempt to obtain something of value. Does not have to result in monetary loss.Layman’s terms:Lying, cheating, or stealing.We speak about fraud. What is fraud?
7 OIG Components Investigation Services Audit ServicesInvestigation ServicesEvaluation, Inspection and Management ServicesInformation Technology Audits and ComputerCrime InvestigationsBriefly describe each component.
8 IT/Computer Crimes Investigate intrusions into Education network Check/monitor network for vulnerabilitiesComputer forensicsProvide support to investigative services staffData mine
9 The Threat Actors Tools State Sponsored BotnetKeyloggerTargeted VirusesThe usual Internet attack toolsPhishing, Spam, etc…State SponsoredOrganized Cyber Crime International OrganizationsProfessional HackersSpammersInside ThreatDisgruntled Employees.
10 Examples of What to Report Compromise of Systems PrivilegesCompromise of Information Protected by Law.Unauthorized Access of IT Systems or Data.Exceeding Authorized Access.Denial of Service of Major IT Resources.Malicious Destruction or Modification of data/information.
11 Is Your System a Victim? Immediate Reporting is Necessary! Have the facts.Why you think there is an issue.Date/Time of the IncidentSystem Information.LocationType and Purpose of the System.Point of Contact.Actions Already Taken.
12 Common Identity Theft Practices Obtain or take over financial accountsTake out loans for large purchasesOpen new lines of creditSign lease agreementsEstablish services with utility companiesWrite fraudulent checksPurchase goods and services on the Internet
13 Avoiding Identity Theft Shred sensitive informationOnly carry what you usePhoto copy all cards in your walletSelect hard to guess PINs and passwordsDon’t leave mail sitting in an unprotected boxDon’t give out private information over the phoneOrder your credit reportsUse caution when providing ANY sensitive information
14 Protecting Others From Identity Theft Properly handle documentsShred sensitive informationUse key identifiers instead of the SSNPassword protect sensitive informationAudit accessReview access privilegesVerify who you are talking to in person or on the phone.Clean desk policy
15 Fraud Indicators One person in control No separation of duties Lack of internal controls/ignoring controlsNo prior auditsHigh turnover of personnelUnexplained entries in recordsUnusually large amounts of payments for cashInadequate or missing documentationAltered recordsInventories and financial records not reconciledUnauthorized transactionsRelated Party TransactionRepeated audit findingsThese are the conditions that contribute to fraud. In many situations, fraud is a crime of opportunity. The presence of anyone of these may not mean there is a problem. However, if more than two are present…the hair on the back of your neck rises and something doesn’t feel right. There might be a problem.
16 I was only borrowing the money. I was underpaid and deserve it. Weak controlsLittle or no oversightLax rulesDebtAddictionsStatusGreedOpportunityMotivationFraudTriangleRationalizationEveryone does it.I was only borrowing the money.I was underpaid and deserve it.
17 Red Flags to Investigators Vices such as substance abuse and gambling.Extravagant purchases or lifestyle.Lack of documents (the ‘big flood’ destroyed…)Common Addresses (mailing, , and IP)Pin number and password information the same.Personal information that does not fit the norm.Bank information that is the same.
18 Sources of Allegations OIG HotlineED Program OfficesSchool Employees and OfficialsGuarantee AgenciesCitizens and StudentsCompeting Vendors/SchoolsOther Federal AgenciesU.S. Attorney’s OfficesOther ED OIG InvestigationsFederal Bureau of InvestigationState and Local Education Agencies
19 Examples of Title IV Fraud Schemes Ghost studentsLeasing of eligibilityLoan theft/ forgeriesFraud/Theft by School EmployeesDefault rate fraud90/10 ruleFinancial statement falsificationATB fraudFalsified last date of attendanceFAFSA fraud- enrollmentFalsification of entrance examsFalsification of GEDs/HS DiplomasFalsification of attendanceFalsification of gradesFailure to make refundsObstruction of a federal audit or program review
20 Who Commits Fraud Involving Education Funds? School Employees, Officials, Owners, Financial Managers, and InstructorsLenders and lender servicersGuarantee AgenciesAward RecipientsGrantees and ContractorsED EmployeesOthers
22 How You Can Help Ensure that staff receive necessary training Review documents thoroughlyQuestion documents/Verify authenticityRequest additional information from the vendors or administrationCompare information on different documentsContact ED-OIG
23 Don’t Try To Investigate Suspicious Activity Yourself! You may have the missing piece of the puzzle we need!
25 OIG Investigation Results Conspiracy and Aggravated Identity Theft CaseBrian Salyer was sentenced to 45 months incarnation and 3 years supervised release for one count of aggravated identity theft and 1 count of conspiracy to commit fraud. Miranda Salyer was sentenced to 4 months incarceration and 3 years supervised release for 1 count of conspiracy to commit fraud.The Salyer’s submitted 15 fraudulent student loan applications, for which, they received approximately $173,668. Additionally, the Salyer’s forged Miranda Salyer’s grandfather’s signature on several promissory notes. The court ordered the Salyer’s to each pay $103,227 in restitution, for a total of $206,454.
26 OIG Investigation Results “Falsified ATB” and “Failure to Make” Refund CaseThe three former owners of the Moler Beauty College (MBC), located in Louisiana, were sentenced and fined for conspiracy to commit student financial aid fraud. Our investigation disclosed that the three owners, along with a financial aid administrator and a contracted Ability-To-Benefit (ATB) tester, engaged in a scheme to fraudulently obtain Title IV funds by falsifying student and school records. MBC officials also engaged in a scheme to prevent the return of Title IV funds to the Department. The owners received prison sentences ranging from 12 to 27 months, and were ordered to jointly pay over $164,000 in restitution to the Department.
27 OIG Investigation Results Former assistant registrar at Southern University sentenced. Cleo Carroll, former Assistant Registrar at Southern University (SU), Baton Rouge, LA was sentenced to 5 months in a halfway house, 5 months home confinement, 5 years probation, a $3,000 fine and a $100 special assessment fee for his role in the grade-buying scheme at SU. Carroll pled guilty to bribery concerning programs receiving federal funds. Carroll, a 30-year SU employee, made fraudulent grade changes and additions. Carroll manipulated SU’s student records system to alter academic transcripts and manually created transcripts using blank transcript paper in exchange for compensation.
28 OIG Investigation Results Financial Aid Director Sentenced. Magda Jules, former financial aid director of Long Technical College plead guilty to financial aid fraud. She was sentenced to 4 month incarceration, 36 months probation, and ordered to pay $39,641 in restitution. Jules increased student loan amounts, intercepted the student loan checks, forged student signatures and negotiated the student loan checks.
29 OIG Investigation Results Former collection agency owner sentenced to prison. Robert Hazlett, the former CEO of a collection agency, Valley Acceptance Corporation, was sentenced to 8 months in prison, to be followed by 36 months of supervised release, and ordered to pay restitution of $744,376. Hazlett conspired with four of his employees to submit 537 applications for consolidated education loans that contained fraudulent information and misrepresentations in order to generate over $1 million in commissions for the company.
30 OIG Investigation Results “Embezzlement” CaseThe former financial aid director of the Troy School of Beauty Culture (TSB), located in New York, was sentenced to 18 months in jail and two years of supervised release for embezzlement. Our investigation disclosed that the former director embezzled over $410,000 in Pell Grant funds over a four-year period. The former director used the identities of at least 25 individuals, including a co-worker, to substantiate draw downs of funds into the TSB Pell Grant account. The former director then wrote checks to “cash” and converted them for personal use.
31 OIG Investigation Results Co-conspirator pled guilty to conspiracy. Jason Justice, supplied the identification information for at least fourteen inmates incarcerated at the Pulaski Correctional Unit in Dublin, VA to his mother and his sister. They fraudulently enrolled the inmates in Internet distance learning programs at Ivy Tech State College and Owen Community College to obtain student aid refund checks. They also used the information to fabricate and file false income tax refunds.
32 OIG Investigation Results Former DC Public School Teacher Pleads Guilty to Student Loan Fraud, Social Security Fraud, and False Statements. Deloris LaVelle Ennis plead guilty to Student Loan Fraud, Social Security Fraud, and False Statements in a Bankruptcy Proceeding. ENNIS fraudulently obtained multiple Social Security Numbers and used those identifiers to obtain federally insured student loans to attend Bowie State University. Ennis fraudulently obtained over $94,000 in federally insured student loans. Ennis also filed for bankruptcy using a fraudulently obtained Social Security Number.
33 OIG Investigation Results Former Prince William County, VA and Prince Georges County, MD Special Education Teacher sentenced for Identity Theft and Counterfeiting. Anthony G. Ward, was sentenced to thirty years incarceration with all but twenty-seven months suspended and five years supervised probation on one count of Identity Theft and two counts of Counterfeiting. Ward fraudulently received and attempted to cash checks totaling approximately $20,591 in federal financial aid by fraudulently using the victims’ personal identifiers on FAFSA’s.
34 Who is Responsible for Reporting Fraud? Everyone who deals with DoED funding has a responsibility to help control fraud.
35 Mandatory Reporting to the Inspectors General Why Report Fraud?OMB Guidance on ARRA Accountability and Reporting Requirements:Mandatory Reporting to the Inspectors GeneralAgencies must include in all grants “the requirement that each grantee or sub-grantee awarded funds made available under the Recovery Act shall promptly refer to an appropriate inspector general any credible evidence that a principal, employee, agent, contractor, sub-grantee, subcontractor, or other person has submitted a false claim under the False Claims Act or has committed a criminal or civil violation of laws pertaining to fraud, conflict of interest, bribery, gratuity, or similar misconduct involving those funds.”
36 Why Report Fraud? Ethical responsibility To deter others from committing fraud and abuseTo protect the integrity of the Federal, State and Local programsTo avoid being part of the fraudulent/criminal activities
37 Information for Financial Aid Professionals (IFAP) website: Link to OIG’s Distance Education Fraud Ring Investigative Program Advisory Report (IPAR)Information for Financial Aid Professionals (IFAP) website:Dear Colleague Letter GEN-11-17:
38 IPAR/Dear Colleague Letter On September 26, 2011, the Department’s IG issued a report about fraud rings operating on distance education programs offered by institutions participating in the Federal student aid programs. The IG’s report identified an increasing number of cases involving large, loosely affiliated groups of individuals (fraud rings) who conspire to defraud title IV programs through distance education programs. These fraud rings generally target institutions with low tuition in the context of distance education programs and involve a ringleader who:
39 IPAR/Dear Colleague Letter Obtains identifying information from straw students “individuals who willingly provide the information.”Completes multiple financial aid applications using the information collected.Applies for admission under the institution’s open admissions program, where little or no third-party documentation is required.Participates in the amount of on-line interaction necessary to establish participation in the academic program and secure disbursements under an institution’s procedures.
40 IPAR/Dear Colleague Letter Detecting fraud before funds have been disbursed is the best way to combat this crime. We therefore seek the help of institutions and advise that you take the following additional actions to identify and prevent the kind of student aid fraud identified in the IG’s report: Implement automated protocols that monitor information in your student information data system to identify instances where a number of students –
41 IPAR/Dear Colleague Letter Use the same Internet Protocol (IP) address to complete and submit an admissions application.Use the same IP address to participate in the on-line academic program.Use the same address to submit an admissions application.Use the same address to participate in the on-line academic programAppear to reside in a geographic location that is anomalous to the locations of most students in the program.
42 IPAR/Dear Colleague Letter Modify your disbursement rules for students participating exclusively in distance learning programs, which would immediately reduce the amount that fraud ring participants can receive. Institutions have the authority to:Delay disbursement of Title IV funds until the student has participated in the distance education program for a longer and more substantiated period of time (e.g., until an exam has been given, completed, and graded or a paper has been submitted).Make more frequent disbursements of Title IV funds so that not all of the payment period’s award is disbursed at the beginning of the period.
43 Management Information Report School-based student aid fraud ring activity is a rapidly growing problem. The population of school-based recipients considered as potentially participating in this activity has increased 82 percent from award year (A Y) 2009 (18, 719 students) to A Y 2012 (34,007 students). Over 85,000 recipients may have participated in this type of student aid fraud ring activity and received over $874 million in Federal student financial aid during this period. It is estimated that $187 million of this $874 million in Title IV funds are probable fraud loss.
44 QUESTIONS? SA Chance Jones Nashville Field Office Cell 202-345-0522