Financial Management

Strategies to Address Improper Payments at HUD, Education, and Other Federal Agencies Gao ID: GAO-03-167T October 3, 2002

This testimony discusses (1) how internal control weaknesses make the departments of Housing and Urban Development (HUD) and Education vulnerable to, and in some cases have resulted in, improper and questionable payments and (2) strategies these and other federal agencies can use to better manage their improper payments. Despite a climate of increased scrutiny, most improper payments associated with federal programs continue to go unidentified as they drain taxpayer resources away from the missions and goals of our government. GAO found that both HUD and Education lacked fundamental internal controls over their purchase card programs that would have minimized the risk of improper purchases. Combined with a lack of monitoring, environments were created at HUD and Education where improper purchases could be made with little risk of detection. One of the most important internal controls in the purchase card process is the review of supporting documentation and approval of each purchase by the approving official. Another control that is effective in helping to prevent improper purchases is the blocking of certain merchant category codes. This control, available as part of the agencies' purchase card contracts with the card issuing financial institutions, allows agencies to prohibit certain types of purchases that are clearly not business related.



GAO-03-167T, Financial Management: Strategies to Address Improper Payments at HUD, Education, and Other Federal Agencies This is the accessible text file for GAO report number GAO-03-167T entitled 'Financial Management: Strategies to Address Improper Payments at HUD, Education, and Other Federal Agencies' which was released on October 3, 2002. This text file was formatted by the U.S. General Accounting Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. United States General Accounting Office: GAO: Testimony: Before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, Committee on Government Reform, House of Representatives: For Release on Delivery: Expected at 2:00 p.m.: Thursday, October 3, 2002: Financial Management: Strategies to Address Improper Payments at HUD, Education, and Other Federal Agencies: Statement of Linda Calbom: Director, Financial Management and Assurance: GAO-03-167T: Mr. Chairman and Members of the Subcommittee: I am pleased to be here today to discuss (1) how internal control weaknesses we have noted make the departments of Housing and Urban Development (HUD) and Education vulnerable to, and in some cases have resulted in, improper and questionable payments and (2) strategies these and other federal agencies can use to better manage their improper payments. We are reporting our findings on HUD for the first time today. We previously reported our Education findings in a number of reports and testimonies. [Footnote 1] In addition, we issued an executive guide, Strategies to Manage Improper Payments: Learning from Public and Private Sector Organizations, [Footnote 2] last October, which we will also focus on in this testimony. The federal government of the United States - the largest and most complex organization in the world - expends approximately $2 trillion a year. As the steward of taxpayer dollars, it is accountable for how its agencies and grantees spend those funds, and is responsible for safeguarding against improper payments by the government - payments that should not have been made or that were made for incorrect or excessive amounts. Improper payments are a widespread and significant problem receiving increased attention not only in the federal government but also among states, foreign governments, and private sector companies. As you know, the President's Management Agenda, Fiscal Year 2002, included five governmentwide initiatives, one of which is improved financial performance. This financial management initiative calls for the administration to establish a baseline on the extent of erroneous payments. [Footnote 3] Under it, agencies were to include information on improper payment rates in their 2003 budget submissions to the Office of Management and Budget (OMB), including actual and target rates if available for benefit and assistance programs over $2 billion annually. Legislation that you sponsored, Mr. Chairman, and which is currently being considered by the Senate (H.R. 4878), calls for more stringent requirements in the areas of improper payment review and reporting than the President's Management Agenda. Specifically, it requires agency heads to (1) review all programs and activities that they administer, and identify those areas that may be susceptible to improper payments, (2) estimate the annual amount of improper payments, and (3) where they exceed the lesser of 1 percent of the total program budget or $1 million annually, report actions the agency is taking to reduce improper payments. In our executive guide, we identified practices that government and private sector organizations in the United States. and abroad have used to combat improper payments. Despite a climate of increased scrutiny, most improper payments associated with federal programs continue to go unidentified as they drain taxpayer resources away from the missions and goals of our government. They occur for many reasons, including insufficient oversight or monitoring, inadequate eligibility control, and automated system deficiencies. However, one point is clear based on our study - the root causes of improper payments can typically be traced to a breakdown in or lack of internal control. Collectively, internal controls are an integral component of an organization's management that provides reasonable assurance that the organization achieves the objectives of (1) effective and efficient operations, (2) reliable financial reporting, and (3) compliance with laws and regulations. Internal controls are not one event, but a series of activities that occur throughout an entity's operations and on an ongoing basis. People make internal controls work, and responsibility for good internal controls rests with all managers. Both HUD and Education have histories of financial management problems, including serious internal control weaknesses, which have affected their ability to provide reliable financial information to decision makers both inside and outside the agencies and to maintain the financial integrity of their operations. Because of this, we have designated Education's student financial assistance programs and HUD's single family and multifamily housing programs as high-risk areas for waste, fraud, abuse, and mismanagement. [Footnote 4] We have also identified weak internal controls as a major factor contributing to improper payments at other agencies and have issued reports and testimonies on this topic, including several to this subcommittee on the Department of Defense's purchase card and travel card programs. [Footnote 5] In order to carry out our improper payments reviews at HUD and Education, we identified disbursement processes at those agencies that would be highly susceptible to improper payments. [Footnote 6] Based on this analysis, we focused our reviews on (1) HUD's purchase card and multifamily property payment processes and (2) Education's grants and loans, purchase card, and third party draft payment processes. [Footnote 7] Our work at both of these agencies was designed to (1) determine if the existing controls provided reasonable assurance that improper payments would not occur or would be detected in the normal course of business and (2) determine if expenditures were properly supported as a valid use of government funds. Our work at Education was also designed to determine if computer equipment purchased with purchase cards and third party drafts was being included in Education's inventory and appropriately safeguarded. Our work at Education is complete, but our HUD work is ongoing. In the second phase of that work, we will continue to review multifamily disbursements and will also assess single family program payments to management and marketing contractors that maintain and sell single family houses owned by HUD. We will also follow up on physical control of computer equipment as we did at Education. To accomplish our two separate reviews of HUD and Education, we used data mining techniques [Footnote 8] and other computer analyses to identify unusual transactions and payment patterns that may be indicative of improper payments. Our review included the $181.4 billion in grants and loans disbursed by Education from May 1998 through September 2000, $214 million of payments made by HUD during fiscal year 2001 for goods and services to support multifamily properties, $22 million of purchase cards purchases made by Education from May 1998 through September 2000, and $10 million of purchase cards purchases made by HUD during fiscal year 2001. [Footnote 9] We conducted our work in accordance with generally accepted government auditing standards, as well with investigative standards established by the President's Council on Integrity and Efficiency. In my testimony today I will discuss: * poor controls over purchase cards and how they resulted in some fraudulent, improper, and questionable purchases at HUD and Education; * the failure of controls over Education's grants disbursement process to detect certain improper payments; * the lack of monitoring of a key HUD contractor and how it resulted in improper payments; and; * strategies that HUD, Education, and other federal agencies can use to manage improper payments. Poor Controls over Purchase Cards Resulted in Some Fraudulent, Improper, and Questionable Purchases at HUD and Education: The benefits of using purchase cards versus traditional contracting and payment processes are lower transaction processing costs and less "red tape" for both the government and the vendor community. We support the use of a well-controlled purchase card program to streamline the government's acquisition processes. However, it is important that agencies have adequate internal controls in place to protect the government from fraud, waste, and abuse. We found that both HUD and Education lacked fundamental internal controls over their purchase card programs that would have minimized the risk of improper purchases. For example, both agencies had inconsistent and inadequate pre-approval and review processes for purchase card transactions - key preventive and detective controls. Combined with a lack of monitoring, environments were created at HUD and Education where improper purchases could be made with little risk of detection. Inadequate controls over these expenditures, along with the inherent risk of fraud and abuse associated with purchase cards, likely contributed to the $4.0 million of fraudulent, improper, and questionable purchases we identified at HUD and Education through our data mining efforts. According to our Standards for Internal Control in the Federal Government, [Footnote 10] transactions and other significant events should be authorized and executed only by persons acting within the scope of their authority. Although pre-approval and review of transactions by persons in authority is the principal means of assuring that transactions are valid, we found that the pre-approval and review process for purchase card purchases was inadequate at both HUD and Education. During our review of HUD and Education's purchase card programs, we found that department personnel did not consistently obtain pre-approval prior to making some or all purchases, as required by the departments' policies. According to HUD's October 30, 1995, purchase card policy, the approving official is required to establish a pre-approval process for each cardholder to ensure that purchases have the necessary technical approval or clearance before purchases are made and that all transactions are appropriate and for official use only. However, during our review we found that only the Information Technology Office routinely obtained authorization prior to purchasing items with the purchase card. Similarly, at the Department of Education, we found that 10 of its 14 offices did not require cardholders to obtain authorization prior to making some or all purchases, although Education's policy required that all requests to purchase items over $1,000 be made in writing to the applicable department executive officer. One of the most important internal controls in the purchase card process is the review of supporting documentation and approval of each purchase by the approving official. Approving officials at both HUD and Education are required to review each monthly statement of purchases along with the applicable supporting documentation and certify that these purchases were appropriate, in accordance with department regulations, and a valid use of government funds. Based on our testing of both HUD and Education's approving officials' review of monthly purchase card statements, we found that this key control was not an effective means of detecting improper purchases. At HUD, we selected a stratified random sample of 222 purchase card transactions made during fiscal year 2001, and found that $1.4 million, or about 77 percent, of the $1.8 million of sampled purchases lacked adequate support for the approving official to determine what was purchased, whether the purchase was previously authorized, and if there was a legitimate government need for the items purchased. [Footnote 11] We found similar problems at Education. To test the effectiveness of Education's approving officials' review, we analyzed 5 months of cardholder statements and found that 37 percent of the 903 monthly cardholder statements we reviewed were not approved by the appropriate official. These 338 unapproved statements totaled about $1.8 million. Another control that is effective in helping to prevent improper purchases is the blocking of certain merchant category codes (MCC). This control, available as part of the agencies' purchase card contracts with the card issuing financial institutions, allows agencies to prohibit certain types of purchases that are clearly not business related, such as purchases from jewelry stores or entertainment establishments. During our reviews, we noted that, initially, neither HUD nor Education was effectively using the MCC's as a preventive control. HUD was not blocking any MCCs and Education blocked only four MCCs. As a result, there were almost no restrictions on the types of purchases employees could make during the period of our audit. Both agencies took action to block more of the MCCs after we began our reviews of their purchase card programs. Our Standards for Internal Control in the Federal Government state that internal control should generally be designed to assure that ongoing monitoring occurs in the course of normal operations. Internal control monitoring should assess the quality of performance over time and ensure that findings of audits and other reviews are promptly resolved. Program and operational managers should monitor the effectiveness of control activities as part of their regular duties. HUD's purchase card policy requires the department to perform annual program reviews and report the results, including findings and recommendations, to the purchase card program administrator. However, HUD officials could locate only one such report. This November 2001 report, prepared by a consultant, identified problems that were similar to the findings previously reported [Footnote 12] by the Office of Inspector General (OIG) in February 1999. Both reports documented problems with weak internal controls and insufficient supporting documentation. The consultant's report also noted that HUD was not performing the periodic program reviews required by its policies and that employees were making improper split purchases. HUD management agreed with the findings in the OIG report and developed and implemented an action plan to address the identified weaknesses. According to HUD OIG staff, its recommendations were implemented and have been closed. However, based on our findings, corrective actions taken at that time were not fully effective. At the time of our review, Education did not have a monitoring system for purchase card activity to determine whether its staff was complying with key aspects of the purchase card program. We also found that approving officials at Education did not use monitoring reports that were available from its purchase card contractor to identify unusual or unauthorized purchases. However, as I will discuss later, the department subsequently issued new policies and procedures that, among other things, establish a quarterly quality review of a sample of purchase card transactions to ensure compliance with key aspects of the department's policy. The types of internal control weaknesses that I have just described created environments where improper purchases could be made with little risk of detection and likely contributed to the $4 million of fraudulent, improper, and questionable purchases we identified through our data mining efforts at both HUD and Education. We also found that property purchased with purchase cards was not always recorded in Education's property records, which likely contributed to missing or stolen property. This could also be an issue at HUD based on our preliminary inquiries into its property management system. I will now provide a few examples of how employees used their purchase cards to make fraudulent, improper, and questionable purchases. We considered fraudulent purchases to be those that were unauthorized and intended for personal use. Improper payments include errors, such as duplicate payments and miscalculations; payments for services not rendered; multiple payments to the same vendor for a single purchase to circumvent existing single purchase limits - known as split purchases; and payments resulting from fraud and abuse. We defined questionable transactions as those that, while authorized, were for items purchased at excessive costs, for questionable government need, or both, as well as transactions for which the departments could not provide adequate supporting documentation to enable us to determine whether the purchases were valid. In May 2002, we provided HUD with 5,459 transactions, totaling about $3.8 million in which the (1) payee appeared to be an unusual vendor to be engaging in commerce with the agency, (2) purchase was made on either a holiday or weekend, or (3) purchase appeared to be a split purchase. As of September 2002, HUD was able to provide adequate support for 3,428 of these questionable transactions, totaling about $1.5 million. HUD could not provide adequate supporting documentation to enable us to assess the propriety of the remaining 2,031 transactions totaling about $2.3 million, or 38 percent of the total questionable transactions and 61 percent of the total dollars requested. For these transactions, HUD could not provide support to determine what was purchased, whether it was authorized, and whether there was a legitimate government need for the item purchased. These purchases included (1) 1,183 questionable vendor transactions totaling about $869,000, (2) 31 purchases made on holidays totaling about $10,000, (3) 264 weekend purchases totaling about $354,000; and (4) 541 potential improper split transactions totaling about $1 million. Some examples of questionable vendor transactions for which we did not receive adequate support included (1) over $27,000 to various department stores, such as Best Buy, Circuit City, Dillard's, JC Penny, Lord & Taylor, Macys, and Sears, (2) over $8,900 to several music and audio stores, including Sound Craft Systems, J&R's Music Store, Guitar Source, and Clean Cuts Music, and (3) over $9,700 to various restaurants, such as Legal Sea Foods, Levis Restaurant, The Cheesecake Factory, and TGI Fridays. Additional examples of questionable or improper purchases we found included $25,400 of "no show" hotel charges for HUD employees who did not attend scheduled training and $21,400 of purchases from vendors where it appears the vendors were out of business prior to the purchases. Because HUD was unable to provide adequate documentation for these purchases, we consider them to be questionable uses of government funds and therefore potentially improper purchases. In order to identify potential improper payments in Education's purchase card program, we requested supporting documentation for (1) 338 monthly statements totaling $1.8 million that our testing of the approval function identified as not properly approved, and (2) other transactions, identified using data mining techniques, that appeared unusual. Education was unable to provide adequate supporting documentation to enable us to determine the validity of purchases totaling over $218,000. Education could not provide any support for more than $152,000 of these purchases nor could it specify what was purchased, why it was purchased, or whether these purchases were appropriate. For the remaining $66,000, Education was able to provide only limited supporting documentation. As a result, we were unable to assess the validity of these payments, and we consider these purchases to be potentially improper. These inadequately supported or unsupported purchases included charges to various hotels for more than $3,000, purchases of computer equipment and software totaling more than $22,000, and charges for various college and other training courses totaling about $51,000. Numerous other purchases were made from home electronics and appliance stores as well as toy, book, and furniture stores. In our review of the documentation Education did provide, we identified some fraudulent, improper, and questionable purchases. Examples of these include the following: * In one instance, a cardholder made several fraudulent purchases from two Internet sites for pornographic services. As a result, Education management issued a termination letter, prompting the employee to resign. * Over several years, an Education employee made improper charges totaling $11,700 for herself and a coworker to attend college classes that were unrelated to Education's mission, such as biology, music, and theology. [Footnote 13] This same individual also had numerous questionable charges for other college classes totaling $24,060. * There were restaurant charges totaling $4,427 from a Year 2000 focus group meeting in San Juan, Puerto Rico, for meals for nonfederal employees. We referred additional charges of this same nature totaling approximately $45,000 to Education's OIG. [Footnote 14] Another type of improper purchase we identified is the "split purchase," which we defined as purchases made on the same day from the same vendor that appear to circumvent single purchase limits. Federal Acquisition Regulation prohibits splitting a transaction into more than one segment to avoid the requirement to obtain competitive bids for purchases over the $2,500 micro-purchase limit. At HUD, we identified 88 improper purchases totaling about $112,000 where employees made multiple purchases from a single vendor on the same day in excess of the $2,500 micro-purchase threshold. For example, one cardholder purchased nine personal digital assistants and the related accessories from a single vendor on the same day in two separate transactions just 5 minutes apart. Because the total purchase price of $3,788 exceeded the cardholder's single purchase limit of $2,500, the purchase was split into two transactions of $2,388 and $1,400, respectively. We identified 451 additional purchases totaling $893,000 where HUD employees made multiple purchases from a vendor on the same day in excess of $2,500. Although we were unable to determine whether these purchases were improper, based on the available supporting documentation, these transactions share similar characteristics with the 88 split purchases we identified. We also found improper split purchases at Education. For example, one cardholder from Education purchased two computers from the same vendor at essentially the same time. Because the total cost of these computers exceeded the cardholder's $2,500 single purchase limit, the total of $4,184.90 was split into two purchases of $2,092.45 each. We found 27 additional purchases totaling almost $120,000 where Education employees improperly made multiple purchases from a vendor on the same day. In addition to poor internal controls over the purchase card program, we found that Education lacked appropriate physical controls and segregation of duties over computer equipment purchased with purchase cards and third party drafts. According to the Education Inspector General, the department had not taken a comprehensive physical inventory for at least 2 years before our review. Further, one office lacked appropriate segregation of duties where responsibility for receiving, bar coding, securing the equipment, and delivering computers to the end users was done by only two individuals. According to our Standards for Internal Control in the Federal Government, an agency must establish physical control to secure and safeguard vulnerable assets. Such assets should be periodically counted and compared to control records. Recording the items purchased in property records is an important step to ensuring accountability and financial control over these assets and, along with periodic inventory counts, to preventing theft or improper use of government property. At Education, we found that employees regularly purchased computers using their purchase cards, which was a violation of the department's policy prohibiting the use of purchase cards for this purpose. From May 1998 through September 2000, the period covered by our audit, Education made purchases totaling more than $2.9 million from personal computer and computer- related equipment vendors. To determine whether this computer equipment was appropriately recorded in the department's inventory, we compared serial numbers obtained from the department's largest computer vendor to those in the asset management system and identified 384 pieces of computer equipment, including desktop computers, printers, and scanners, that were not in the property records. We conducted an unannounced inventory to determine whether the equipment was actually missing or inadvertently omitted from the property records. Although we found 143 pieces of equipment during this inventory that were not recorded on Education's books, and an additional 62 items were later found by Education, department officials have been unable to locate the remaining 179 pieces of missing equipment costing over $200,000. They surmised that some of these items may have been surplused; however, there is no documentation to determine whether this assertion is valid. According to Education officials, new policies were implemented that do not allow individual offices to purchase computer equipment without the consent of the Office of the Chief Information Officer. In addition, the new policies were designed to maintain control over the procurement of computers and related equipment, including: * purchasing computers from preferred vendors that apply the department's inventory bar code label and record the serial number of each computer on a computer disk that is sent directly to the Education official in charge of the property records; * loading the computer disk containing the bar code, serial number, and description of the computer into the property records; and; * having an employee verify that the computers received from the vendor match the serial numbers and bar codes on the shipping documents and the approved purchase orders. While these are very positive steps, a continued lack of adequate physical control could negate the effectiveness of these new procedures. For example, during a follow-up visit to Education, we found that the doors to the various rooms used to store computer equipment waiting to be installed were both unlocked and unattended. Without enhanced physical security, Education will continue to be at risk for further computer equipment losses. We also have concerns about HUD's accountability for computer and related equipment purchased with purchase cards because of the large volume of purchases for which it did not have appropriate documentation. In these cases, HUD likely does not know what was purchased, why it was purchased, whether there was a legitimate government need for the item purchased, and where the item is now. For example, HUD employees used their purchase cards to purchase portable assets such as computer equipment and digital cameras, totaling over $74,500, for which they have provided either no support or inadequate support. Further, in its purchase card remedial action plan, which I will discuss further shortly, HUD stated that not all property is entered in its automated property inventory system. When these purchases are not entered in an agency's inventory system, they become more vulnerable to loss or theft. In our follow-up work, we plan to determine whether these items are included in HUD's inventory and are being appropriately safeguarded. Effectiveness of Remedial Action Plans and Other Recent Steps to Curb Purchase Card Abuse Is Mixed: In April 2002, OMB issued a memorandum requiring all agencies to develop remedial action plans to manage the risk associated with purchase card usage. Agencies were required to submit their plans to the Office of Federal Procurement Policy no later than June 1, 2002. Both HUD and Education submitted their plans to OMB on time. While Education's plan was accepted by OMB and addressed the findings and recommendations in our September 2001 interim report and final Education report, HUD's plan was rejected because it lacked a timeline for when the corrective actions would be implemented. This plan also did not address key weaknesses we identified. HUD submitted a new plan to OMB on August 28, 2002. While the revised remedial action plan includes a broad timeline for when each objective will be completed, we found that it still does not adequately address key control weaknesses we identified, in part because it lacks specific steps necessary to fully address identified problem areas. For example, HUD's plan recognizes that monitoring of purchasing activities and the frequency of internal audits are areas that need improvement. However, the plan does not address developing and implementing a robust review and approval function for purchase card transactions, focusing on identifying split purchases and other inappropriate transactions. Further, this plan does not timely address some of the other serious weaknesses we found. For example, the revised remedial plan does not require the program administration staff to begin designing a monitoring plan to assess HUD's compliance with key aspects of its purchase card policy until the second quarter of fiscal year 2003 and does not give an estimated completion date for when this key internal control will be implemented. Additionally, the revised plan does not specifically identify who is responsible for developing or implementing any of the proposed improvements. We will be issuing a separate letter to HUD that will include recommendations to address these and other issues we identified during our review of its purchase card program. In contrast, Education's plan specifically addresses the findings and recommendations in our September 2001 interim report and final Education reports. These recommendations included (1) emphasizing policies on appropriate use of the purchase card and cardholder and approving official responsibilities, (2) ensuring that approving officials are trained on how to perform their responsibilities, and (3) ensuring that approving officials review purchases and their supporting documentation before certifying the statements for payment. Education took actions to respond to these recommendations, such as (1) reducing monthly and single purchase spending limits, (2) blocking over 300 MCCs, (3) implementing a new approval process, and (4) issuing new policies and procedures. However, during our follow-up work at Education, we found that weaknesses remained that continued to leave the department vulnerable to fraudulent and improper payments and lost assets. For example, the effectiveness of the department's new approval process was minimized because approving officials were not ensuring that adequate supporting documentation existed for all purchases. According to Education, it has since implemented a quarterly monitoring program to assess compliance with key aspects of the purchase card program. As discussed in our Executive Guide, which I will cover later, managing improper payments is a continuous cycle and includes, among other things, constant monitoring of the effectiveness of implemented controls and adjustments to these controls as warranted by monitoring results. Controls over Education's Grants Disbursement Process Failed to Detect Certain Improper Payments: Education's grant and loan disbursement process relies on computer systems application controls, or edit checks, to help ensure the propriety of payments. We focused our review on these edit checks and related controls because they are key to helping prevent or detect improper payments in an automated process. As we testified in July 2001, [Footnote 15] controls over grant and loan disbursements at Education did not include a key edit check or follow-up process that would help identify schools that were disbursing Pell Grants to ineligible students. To identify improper payments that may have resulted from the absence of these controls, we performed a variety of tests, including a test to identify students 70 years of age and older because we did not expect large numbers of older students to be receiving Pell Grants. [Footnote 16] Our review also built upon earlier work where we identified abuses in the Pell Grant program. [Footnote 17] Based on the initial results of our tests and because of the problems we identified in the past, we expanded our review of seven schools that had disproportionately high numbers of older students to include recipients 50 years of age and older. We found that three schools fraudulently disbursed about $2 million in Pell Grants to ineligible students, and another school improperly disbursed about $1.4 million in Pell Grants to ineligible students. We also identified 31 other schools that had similar disbursement patterns to those making the payments to ineligible students. These 31 schools disbursed approximately $1.6 million of Pell Grants to potentially ineligible students. We provided information on these schools to Education for follow-up. Education's staff and officials told us that they have performed ad hoc reviews in the past to identify schools that disbursed Pell Grants to ineligible students and have recovered some improper payments as a result. However, Education did not have a formal, systematic process in place specifically designed to identify schools that may be improperly disbursing Pell Grants. In our September 2001 interim report, we recommended that the Secretary of Education (1) establish appropriate edit checks to identify unusual grant and loan disbursement patterns and (2) design and implement a formal, routine process to investigate unusual disbursement patterns identified by the edit checks. Education subsequently implemented an age limit edit check of 75 years of age or older. If the student's date of birth indicates that he or she is 75 years of age or older, the system edit will reject the application and the school will not be authorized to give the student federal education funds until the student either submits a corrected date of birth or verifies that it is correct. However, without also looking for unusual patterns and following up, the edit may not be very effective, other than to correct data entry errors or confirm older students applying for aid. Education also implemented a new system, called the Common Origination and Disbursement (COD) system, which became operational in April 2002. Education officials told us that this integrated system will replace the separate systems Education has used for Pell Grants, direct loans, and other systems containing information on student aid, and it will integrate with applicant data in the application processing system. The focus of COD is to improve program and data integrity. If properly implemented, a byproduct of this new system should be improved controls over grant and loan disbursements. According to Education officials, they will be able to use COD to identify schools with characteristics like those we identified. However, until there is a mechanism in place to investigate schools once unusual patterns are identified, Education will continue to be vulnerable to the types of improper Pell Grant payments we identified during our review. We performed several additional tests of Education's disbursements to identify potentially improper grant and loan payments that may not have been detected because of missing or ineffective edit checks. In addition to Pell Grant payments to students 70 years of age and older, we identified $28.8 million of other potentially improper grant and loan payments made by more than 1,800 schools to students who (1) were much older or younger than would be expected, (2) had social security numbers (SSN) that were either not in Social Security Administration (SSA) database or were in SSA death records, or (3) received Pell Grants in excess of statutory limits. Based on supporting documentation provided to us by Education, we determined that $20.3 million of these payments were proper. However, Education did not provide adequate supporting documentation to enable us to determine the validity of the remaining $8.5 million of payments made by these schools. Although Education officials told us that they requested supporting documentation from the approximately 1,800 schools that disbursed these funds, over 1,000 schools did not provide the documentation, and documentation provided by some of the schools was inadequate for independent verification of the validity of these payments. According to Education officials, if a school that did not provide support or provided inadequate support had only a small number of potential improper payments, the department did not follow up because it did not consider doing so a wise use of its resources. We agree that Education should weigh the costs of resources required to follow up on potential improper payments with the benefits that could be obtained when making such decisions. However, 20 of the schools that did not provide support or provided inadequate support had from 20 to 138 instances of these potential improper payments totaling $1.5 million. While the amount of improper and potentially improper grant and loan payments we identified is relatively insignificant compared to the billions of dollars disbursed for these programs annually, it represents a control risk that could easily be exploited to a greater extent. As I will discuss later, once such a risk has been identified, appropriate control activities need to be implemented to respond to it. In addition to the recommendations that I have already discussed, we previously recommended that Education (1) conduct on-site investigations, including interviews of school personnel and students, at the 28 schools with characteristics similar to those we found that improperly disbursed Pell Grants to determine whether the grants were properly disbursed, (2) follow up with the schools that had high concentrations of the $12 million in potential improper payments for which the department did not provide adequate supporting documentation, and (3) implement a process to verify borrowers' SSNs and dates of birth submitted by schools to Loan Origination System (LOS). While Education has implemented a process to verify borrowers' SSNs and dates of birth submitted by schools to LOS, the other two recommendations remain open. Lack of Monitoring of a Key HUD Contractor Resulted in Improper Payments: Internal control standards state that monitoring should assess the quality of performance over time and ensure that review findings are promptly resolved. Due to a lack of monitoring, the internal controls of the HUD multifamily housing program's payment processes do not provide reasonable assurance that improper payments would be identified and corrected in the normal course of business. As we testified in July 2002, HUD has a limited ability to effectively monitor its contractors and as I am about to discuss, this left HUD vulnerable to abusive billing practices by its property management firms. [Footnote 18] HUD contracts with two property management firms, which are given a great deal of autonomy, to manage the operation of its multifamily properties, [Footnote 19] including apartment projects, nursing homes, and hospitals. These management firms are charged with initiating property renovations, hiring on-site staff, selecting vendors and certifying the acceptable delivery and performance of these activities. The vendors that provide the goods and services at the HUD properties submit their invoices to the property management firm for payment by HUD. The management firm forwards the invoices and required supporting documentation to another HUD contractor that maintains the department's property management system, provides a limited cursory review of the supporting documentation, and pays the vendors. HUD pre-approval for payment of these goods and services is not required when (1) the vendor's estimate will cost less than agreed upon dollar thresholds, which, depending upon the property management company, are as high as $50,000, or (2) an emergency situation exists that affects or endangers the health and/or safety of residents or property. The property manager is also not required to obtain competitive bids when the work is done to correct an emergency situation. Generally, the contractor that pays the vendors obtains a daily E-mail authorization from HUD prior to disbursing the funds. However, unless the amount exceeds the predetermined thresholds, HUD does not routinely review documentation supporting the payments and does not verify that the work was actually performed. Given the fairly broad delegation of authority to these contractors, it is important that HUD have effective processes for monitoring performance and the propriety of payment. We found that HUD did not comply with its monitoring policy to perform quarterly, on-site inspections and management reviews of its multifamily housing projects and had incomplete guidance on how to do so. Inspections and reviews were not conducted at the majority of multifamily properties and HUD could not provide documentation for some of the limited reviews and inspections that HUD officials said were performed. We found no on-site inspection guidance in the multifamily handbook, which establishes the policies and procedures to be followed by the multifamily staff. In two instances where HUD did conduct and document reviews of one of the property management firms, it did not follow up on or promptly resolve its findings. Based on these two reviews of the purchasing practices of the property management firm, HUD documented concerns about the (1) amount of money being disbursed to a limited number of construction companies with little control in place to ensure fair and reasonable prices and (2) unusually high number of emergency renovations made by this management firm. Yet HUD continued to authorize payments of over $8 million to these construction companies after it was known that the property management firm was not selecting these companies in accordance with provisions of its contract that required obtaining competitive quotes from several vendors, even for purchases below the $50,000 pre-approval threshold. Obtaining competitive quotes helps ensure that the government pays a reasonable price for goods and services. The property management firm told HUD that the vendors it used were the only ones that would work in the neighborhoods where the properties were located, and that other vendors did not feel comfortable with HUD's vendor payment process. HUD's staff accepted this explanation without independent verification. Had HUD followed up on their findings, it may have discovered what we found - funds being disbursed for alleged emergency goods and services that were not received or performed. Using computerized data mining techniques, we analyzed the $214 million of multifamily property payments made during fiscal year 2001 to identify potentially improper payments that could have resulted from HUD's lack of contractor oversight. The majority of the questionable disbursements identified by our analyses were for transactions initiated by one of the two management firms. Hence, we concentrated our efforts on HUD disbursements for this firm's transactions. Based on our data mining and reviews of the supporting documentation, we determined that a vice president and maintenance director of this property management firm, on numerous occasions circumvented HUD controls by (1) alleging that construction renovations were emergencies, thus not requiring multiple bids or HUD pre-approval, and (2) splitting renovations into multiple projects to stay below the $50,000 threshold of HUD-required approval. Over 18 months HUD authorized and paid for approximately $10 million of renovations, of which each invoice was for less than $50,000, at two properties where the above-mentioned maintenance director was employed. HUD did not verify that any of the construction renovations were actually performed or determine whether the emergency expenditures constituted such a classification. The following examples of improprieties, which are now being investigated by the HUD OIG and our Office of Special Investigations, could have been prevented or detected had HUD performed its contractor monitoring responsibilities. During June 2001, the maintenance director of the property management company falsified documents that indicated that 15,000 square feet of concrete sidewalk, at a cost of $227,500, was replaced and classified these repairs as an emergency. To remain below the HUD threshold of $50,000, the property management maintenance director had the vendor submit five separate invoices, each for $45,500, for the replacement of 3,000 square feet of concrete sidewalk in front of five buildings. HUD's contractor paid all five invoices. Based on our site visits and conversation with the maintenance director, we determined the square footage billed for sidewalk replacement had not actually been replaced. Figure 1 illustrates how only portions (the lighter shaded sections) of the sidewalk were replaced and not the entire sidewalk as was listed on the paid invoices. Figure 1: HUD Improper Payments: [See PDF for image] This figure is a photograph of the sidewalk referenced in the above paragraph. [End of figure] With the assistance of an independent construction firm, we hired, we determined that only about one-third of the work HUD paid for was actually performed. As a result, more than $164,000 of the $227,500 billed and paid for "emergency" installation of concrete sidewalk appears to be fraudulent. At this same property, we found instances where HUD paid construction companies for certain apartment renovations, deemed "emergency repairs," that were not made. Three of the 10 tenants we interviewed told us that some work listed on the invoice that the property management firm submitted was not performed at their homes. For instance, while an invoice indicated that the apartment floor and closet doors had been replaced at a cost of $10,400, the tenant stated that the floors and doors were never replaced. On several other occasions, HUD paid the same amount to perform "emergency renovations" of apartments of varying sizes and, more than likely, in differing degrees of disrepair. For example, HUD paid three identical $32,100 invoices for the emergency renovation of a one bedroom (600square feet), a two bedroom (800 square feet) and a three bedroom (1000 square feet) apartment. All three invoices listed the exact work performed. For example, each invoice listed a $4,500 cabinet fee, yet the one bedroom unit had five fewer cabinets than the three bedroom dwelling. We and the independent construction firm we hired questioned the validity of the same charge for units of varying sizes and the likelihood of numerous apartments being in identical condition and in need of the same extensive renovations. When confronted with these disparities, the property management company's maintenance director told us that although he did not have any documentation to support it, he kept mental notes of work that was billed and not performed and had the construction company perform additional unbilled renovations, rather than revising original emergency invoices. Our review of the maintenance director's files found multiple "boilerplate" copies of signed receiving reports, indicating that acceptable emergency work had been done, that had yet to be awarded to vendors, further evidence of ongoing improprieties. We will be providing formal recommendations to HUD to address these issues, as well as other acquisition management challenges, in a separate report to be issued in November 2002. Strategies to Manage Improper Payments: Now I would like to talk about some of the things that HUD, Education, and other federal agencies can do to address their improper payments comprehensively. As we recently reported, [Footnote 20] our review of improper payments reported in agency financial statements over the past 3 years shows some change in individual agencies and programs, but little change in the total amount over the period. While the total reported amount has decreased from about $20.7 billion in fiscal year 1999 to $19.1 billion in fiscal year 2001, these figures do not give a true picture of the level of improper payments in federal programs and activities. As significant as the $19 billion in improper payments is, the actual extent of improper payments government wide is unknown, likely to be billions of dollars more, and will likely grow without concerted, coordinated efforts by agencies, the administration, and the Congress. As we have seen, weak or nonexistent internal controls can result in a variety of improper payments that can affect an agency's ability to achieve its goals. Attacking the problem of improper payments requires strategies tailored to the organization involved and its particular risks. To identify effective practices and provide case illustrations and other information for federal agencies to consider when addressing improper payments, we contacted public and private sector organizations and talked with them about actions they had taken and considered effective in reducing improper payments. Participants were the Department of Health and Human Services' Health Care Financing Administration; [Footnote 21] the Social Security Administration; the Department of Veterans Affairs; the states of Illinois, Texas, and Kentucky; the governments of Australia, New Zealand, and the United Kingdom; and three private sector corporations. Our executive guide, Strategies to Manage Improper Payments: Learning from Public and Private Sector Organizations, issued last year, highlights the actions taken by these organizations. We categorized the actions into the five components of internal control outlined in the Comptroller General's Standards for Internal control in the Federal Government. We defined these components as follows: * Control environment - creating a culture of accountability by establishing a positive and supportive attitude toward improvement and achievement of established program outcomes. * Risk assessment - performing comprehensive reviews and analyses of program operations to determine if risks exist and if so, their nature and extent. * Control activities - taking actions to address identified risk areas and help ensure that management's decisions and plans are carried out and program objectives are met. * Information and communications - using and sharing relevant, reliable and timely financial and nonfinancial information in managing activities related to improper payments. * Monitoring - tracking improvement initiatives over time, and identifying additional actions needed to further improve program efficiency and effectiveness. I will address each of these control activities briefly in turn, giving examples that illustrate their use in combating improper payments. While I will discuss these activities separately, it is important to remember that managing improper payments typically requires continuous interaction among these areas. Control Environment: Instilling a Culture of Accountability: Perhaps the most significant of the elements critical to identifying, developing and implementing activities to reduce improper payments is the control environment. Top officials, whether in government or the private sector, and oversight bodies such as legislatures, set the stage for change with clearly established expectations and demands for improvement. Many of the officials we met with in the course of our work told us that without the clearly established demands and expectations for improvement by top management and legislators, little would have happened to effectively reduce fraud and errors in their programs. In addition, while top management sets the tone for cultural change, all personnel must buy into this change and work to achieve its overall goals. The cultural change fostered by an effective control environment stresses the importance of improvement and efficient and effective program operations while maintaining a balance with concerns about privacy and information security in a world where computers and electronic data are indispensable to making payments. In the oversight and legislative arena, it involves initiatives such as those in the President's Management Agenda, as I discussed earlier and legislation such as that introduced by you, Mr. Chairman, which requires comprehensive improper payment reviews and reporting. Interest in the amount of improper payments at the organizations that participated in our study often resulted from program, audit or media reports of misspent funds or fraudulent activities. As the magnitude of improper payments became known, government officials and legislative bodies faced increased pressure to reduce them. In Texas, for instance, the legislature was instrumental in changing in the state's benefit programs after reports of improper payments in the Medicaid program that ranged from $365 million to $730 million as well as in the Temporary Assistance to Needy Families and Food Stamps programs, estimated at a total of $222.4 million. Lawmakers sought to reduce these improper payments by mandating specific actions that included use of computer technology to deter fraud and abuse. The government has led the way in setting the stage for changes in the United Kingdom. Following Comptroller and Auditor General reports stating that the government did not know enough about the level of fraud in its benefits programs, Parliament required the Department of Work and Pensions (DWP) to improve measurement of fraud in its programs. DWP conducted a benefit review from which the government estimated that $3 billion per year were lost to known fraud. The government further noted that if all suspicions of fraud were well founded, the figure could be as high as $10 billion per year. DWP proposed a strategy to reform the welfare system and reduce improper payments. Through the process, Parliament has stayed actively involved, enacting legislation to allow data sharing between government agencies and departments. In addition, the Treasury requires departments to disclose irregular expenditures arising from erroneous benefit awards and fraud by claimants. Further, the Comptroller and Auditor General qualified his opinion on DWP's fiscal years 1995 through 2000 financial statements because of the level of fraud and error identified in the benefit programs. This served to reinforce the message that high levels of improper payments are unacceptable. At the day-to-day level, improper payments resulting from miscalculation and other errors often receive inadequate attention. Centrelink, a "one-stop shop" that pays a variety of Australian government benefits, found through audit reports that up to 30 percent of its work was rework. The organization's management responded by implementing a "Getting it Right" strategy in 2000, setting out the roles and responsibilities of managers and team leaders as well as minimum standards for the staff to apply when making payment decisions. Centrelink distributed posters and mouse pads to reinforce the "Getting it Right" message. Centrelink's Chief Executive Officer has stated that she expects the implementation of the strategy to result in a reduction of improper payments as well as continued timeliness in payments to beneficiaries. Study participants successfully used the following strategies to create a control environment that instilled a culture of accountability over improper payments, and could also be used at federal agencies: * Provide leadership in setting and maintaining the agency's ethical code of conduct and in ensuring proper behavior under the code. * Provide a cultural framework for managing risk by engaging everyone in the organization in the risk management process. * Increase accountability by establishing goals for reducing improper payments for major programs. * Foster an atmosphere that regards improper payments as unacceptable. Among the organizations we studied, pressures from oversight entities and top management were instrumental in creating change. The President's Management Agenda and the previously mentioned legislation help define and communicate the need for improvement. By being transparent in redefining the culture, oversight entities and top management can set expectations and obtain agreement on the need for change from individuals managing day-to-day program activities. This culture of accountability is necessary to begin the critical next step in managing improper payments, the risk assessment process. Risk Assessment: Determining the Nature and Extent of the Problem: Strong systems of internal control provide reasonable assurance that programs are operating as intended and are achieving expected outcomes. A key step in gaining this assurance is conducting a risk assessment. This involves comprehensively reviewing and analyzing program operations to determine where risks lie and what they are, and then measuring the potential or actual effect of those risks on program operations. The information developed during a risk assessment forms the foundation from which management can determine the corrective actions needed and provides baseline information for measuring progress. Specific methodologies for managing risk vary by organization depending on mission and the difficulty in quantifying and defining risk levels. In addition, because economic, governmental, industrial, regulatory, and operating conditions continually change, risk assessments should be updated to identify and address any new risks. The organizations that participated in our study found that conducting risk assessments to determine the nature of their improper payments was essential to helping them focus on the most significant problem and determine what needed to be done to address it. While many federal agencies do not perform risk assessments, some do. The Department of Health and Human Services, for example, began reporting an annual estimate of improper payments in the Medicare fee- for-service program in 1996. In fiscal year 2001, it reported estimated improper Medicare fee-for-service payments of $12.1 billion, or about 6.3 percent of such benefits. This analysis and reporting has led to the implementation of several initiatives to identify and reduce improper payments, including working with medical providers to ensure that medical records support billed services. HUD also measures improper payments in its housing assistance programs, reporting $1.87 billion in fiscal year 2000 and $2 billion in fiscal year 2001. HUD has taken actions to identify the risks associated with these programs and is working to refine the procedures currently used to obtain more useful information. HUD has not, however, done risk assessments in other disbursement areas. A thorough risk assessment allows organizations to target high-risk areas, focusing limited resources where the greatest exposure exists. The Illinois Department of Public Aid (IDPA), for instance, found that it had a payment accuracy rate of 95 percent. Its payment accuracy review identified errors and their causes that allowed IDPA to focus its attention on the 5 percent of inaccurate payments. In doing so, it discovered that of the $37.2 million spent for nonemergency transportation services, $11.55 million, or 31 percent, was estimated to be in error. This discovery led to a series of actions to address this problem. Government agencies in other countries have also used payment accuracy reviews to identify high-risk areas. For instance, the United Kingdom's DPW uses the results of rolling program reviews to determine levels of fraud and error in its Income Support and Jobseeker's Allowance benefit programs. These reviews quantify the amount of fraud and error affecting benefit claims and are used to target areas for prevention and detection. Participants in our study used the following strategies successfully to assess risk and determine the nature and extent of improper payments. We believe that federal agencies should also consider these strategies to address improper payments. * Institute a systematic process to estimate the level of improper payments being made by the organization. * Based on this process, determine where risks exist, what those risks are, and the potential or actual effect of those risks on program operations. * Use the results of the risk assessment to target high-risk areas and focus resources where the greatest exposure exists. * Reassess risks on a recurring basis to evaluate the effect of changing conditions, both external and internal, on program operations. Assessing risk allows an organization to set goals and target its efforts to reduce improper payments. Having developed such a framework, an organization can then proceed to determine which control activities to implement to reduce risks and, ultimately, fraud and errors. Control Activities: Taking Action to Address Identified Risk Areas: Control activities are the policies, procedures, techniques, and mechanisms that are designed to help ensure that management's decisions and plans are carried out. Once an organization has identified and quantified the risks in its operations, and management has set a goal for reducing the risks, the organization must take action to achieve that goal. Control activities used by organizations to address improper payments vary depending on risks faced; objectives; managerial judgment; size and complexity of the organization; the operational environment; sensitivity of data; and requirements for system reliability, availability, and performance. Control activities can include both prepayment and post payment mechanisms. Given the large volume of federal payments, it is generally more efficient to prevent improper payments rather than attempt to recover overpayments that have already been made. Recognizing, however, that some overpayments are inevitable, agencies should adopt effective detection techniques to identify and recover them. These techniques can range from sophisticated computer analyses of program data to post award contract audits and are dictated by the type of payment activity that presents the most risk in a particular organization. They include the following: * data sharing, which allows organizations to compare information from different sources to help ensure that payments are appropriate; * data mining, which analyzes data for relationships that were previously unknown; * neural networking, which analyzes associations and patterns among data elements; * recovery auditing, which is the practice of identifying and recovering overpayments using payment file information; * contract audits, which verify that payments are being made in accordance with contract terms and applicable regulations, and; * prepayment investigations, in which contradictory information is investigated before payment is made. Data sharing, data mining, and neural networking techniques are powerful internal control tools that provide useful, timely access to information. Using these techniques can provide potentially significant savings by identifying reporting errors and misinformation before payments are made or by detecting improper payments already made. However, more extensive use of personal information in an evolving technological environment raises new questions about privacy and how it should be protected. In the federal arena, these techniques must be implemented consistent with the protections of the Privacy Act of 1974, as amended by the Computer Matching and Privacy Protection Act of 1988, and other privacy statutes. These techniques are an example of the types of activities that our study participants found useful. For example, in 1995, the United Kingdom formalized data matching between government organizations. It reported that through March of 2000, it had saved about $450 million dollars. Further, from April 1999 through March 2000, data matches identified 217,000 inconsistencies for investigation, resulting in another $53 million in benefit savings. In the United States, SSA shares information with federal agencies through more than 15 data matches to prevent and detect fraud. SSA estimates that it saves approximately $1.5 billion each year for other agencies through data these data matches. In its own programs, SSA estimates that it saves $350 million annually for Old Age and Survivors Insurance and Disability Insurance and $325 million annually for Supplemental Security Income through the use of data matching. While data matching or sharing gives an organization the means to compare data from different sources, data mining offers a tool to review and analyze diverse data. The IDPA, for instance, had identified one of its risk areas as health care providers who were billing in excess of 24 hours in a single day. Using its data mining capability, the Illinois OIG identified 18 providers who had billed in excess of 24 hours for at least 1 day during a 6-month period. A number of these providers were already under investigation for other program violations. As a result of this analysis, the OIG planned to refer serious cases to law enforcement agencies and take administrative action against less serious violators. Neural networking analyzes associations and patterns among data elements, allowing an organization to find relationships that can result in new queries. In Texas, models used with neural networking technology identified fraudulent patterns from large volumes of medical claims and patient and provider history data. Such models can help identify perpetrators of both known and unknown fraud schemes by analyzing utilization trends, patterns, and complex interrelationships in the data. The state currently has models for physicians and dentists and plans to initiate a model for pharmacies. Recovery auditing, which came into use about 30 years ago, has a long- standing record in the private sector, and more recently, in the federal government. [Footnote 22] More extensive use of recovery auditing could offer federal agencies an opportunity to prevent and detect improper payments. One private sector company that participated in our study contracted with a recovery audit firm to review its accounts payable files. The company's own systems had found no errors in these files, yet the review resulted in the recovery of $8 million in improper payments. Subsequently, the company began to use recovery auditing techniques on accounts payable information to prevent improper payments, through such things as identifying potential duplicate payments. During our visit, this system identified and avoided a duplicate payment of $136,000 from the reports generated by the recovery audit software. In addition, as a result of using recovery auditing before payments are made, the company identified and stopped the processing of $41 million in duplicative wire payments. The particular software this company uses also identifies the employees making the errors so that they can be trained appropriately. The organizations that participated in our study used the following strategies successfully to identify and address risks. We believe these same strategies could be used successfully by federal agencies. * Based on an analysis of the specific risks facing the organization, and taking into consideration the nature of the organization and the environment in which it operates, determine which types of control activities would be most effective in addressing the identified risks. * Where in-house expertise is not available, investigate the possibility of contracting activities out to firms that specialize in specific areas, such as recovery auditing and neural networking. * Perform cost-benefit analyses of potential control activities before implementation to help ensure that the cost is not greater than the potential benefit. * Ensure that personnel involved in developing, maintaining, and implementing control activities have the requisite skills and knowledge, recognizing that staff expertise needs to be frequently updated in evolving areas such as information technology and fraud investigation. * Recognize and consider the importance of privacy and information security issues when developing and implementing control activities. An agency's internal control activities should be flexible, weigh costs and benefits, and be tailored to an agency's needs. Once control activities are in place, the internal control cycle continues with the prompt communication of information that managers need to help them carry out these activities and run their operations efficiently and effectively. Information and Communications: Using and Sharing Knowledge to Manage Improper Payments: Those responsible for managing and controlling program operations need relevant, reliable, and timely financial and nonfinancial information to make operating decisions, monitor performance, and allocate resources. This information can be obtained through a variety of sources using a wide range of data collection methodologies. The organizations that participated in our study used internal and external sources to obtain the information they needed. Further, these sources varied widely, from multiple computer databases to periodic meetings. The need for information and communication also extends beyond organizational boundaries. Many of the governmental programs with improper payments are benefit programs that involve recipients and providers of services. Organizations in our study developed educational programs to assist these participants in understanding eligibility and other requirements, and for service providers, information on issues including common claim filing errors. For instance, in 1997 Texas implemented several initiatives to educate new medical providers before they enroll in the Texas Medicaid program. Each new provider receives a hand-delivered package with information on claim filing, helpful tips, and instructions on how to use the automated phone system for inquiries. Three months after the provider is enrolled, a field representative from Medicaid evaluates a sample of the provider's claims and revisits the provider to answer questions and discuss any problems noted in the claims sample. In another example, Australia's Health Insurance Commission (HIC) implemented a feedback program to provide medical practitioners with regular information about their own benefit authorization, patient demographics, and comparative statistical information showing services rendered and the dollar value of benefits paid. All 32,000 practitioners receive correspondence once a year from HIC. While at first most practitioners did not realize that HIC was able to accumulate and analyze this information, the program has now become an effective deterrent to wrongdoing as well as a desired source of information to medical providers. Some practitioners have asked for additional information or statistics prior to the annual feedback report. HIC has since established an on-line feedback and statistics site for general practitioners, 2,100 of whom accessed their reports online in 1999. Coordination and cooperation with local law enforcement and other sources outside an agency can also establish an infrastructure conducive to preventing and detecting fraud. The IDPA OIG established a Fraud and Abuse Executive (FAE) whose objective is to be a conduit among internal and external parties for all fraud issues. As a result of cooperation between the Illinois State Police, one bank, and the FAE, thousands of dollars in fraudulent payments were stopped and a number of perpetrators were arrested. Organizations that participated in our study used the following strategies to help them effectively use and share knowledge to manage improper payments. These strategies could also be used by federal agencies. * Determine what information is needed by managers to meet and support initiatives aimed at reducing improper payments. * Ensure that necessary information provided to managers is accurate and timely. * Provide managers with timely feedback on applicable performance measures so they can use the information to manage their programs effectively. * Develop educational programs to assist program participants in understanding program requirements. * Ensure that there are adequate means of communicating with, and obtaining information from, external stakeholders that may have a significant effect on improper payment initiatives. * Develop working relationships with other organization to share information and pursue potential instances of fraud or other wrongdoing. Communications are effective when information flows up, down, and across an organization. In addition to internal communications, management should ensure that there are adequate means to give and obtain information from external parties who could have an effect on the agency's goals. Moreover, effective information technology management is critical. Managers need operational and financial data to monitor whether they are meeting their agency's goals with appropriate resources. Monitoring: Tracking the Success of Improvement Initiatives: Monitoring focuses on assessing the quality of an organization's performance over time and on promptly resolving problems identified either through separate program evaluations or audits. Evaluation of an organization's programs and its successes in meeting its established goals and in identifying additional actions is an integral element of performance measurement and continued improvement in operations. Once an organization has identified its risks related to improper payments and undertaken activities to reduce these risks through internal controls, monitoring performance allows the organization to gauge how well its efforts are working. When Illinois had assessed the risk of improper payments in its Medicaid program, based on the results, it implemented initiatives to improve payment accuracy. To monitor the effect of the new initiatives, the state uses random claims sampling to test the accuracy of payments. The goal of the project, which reviews 1,800 claims per year, is to ensure that every paid claim faces an equal chance of random review. This approach not only provides periodic estimates of payment accuracy rates but helps deter future erroneous and fraudulent billings. Performance measures are key to monitoring progress in addressing improper payments. The government of New Zealand, for instance, requires audited statements of objectives and service performance to be included along with financial statements. These statements include performance measures related to improper payments. Work and Income New Zealand (WINZ), a government agency that provides income support and employment assistance to eligible people, has established performance measures for entitlement accuracy, services to reduce benefit crime, and debt management. WINZ's financial statements are the main accountability reports used by Parliament to monitor the agency's performance. In addition, Parliament uses the audited information to make informed decisions on resource allocation, and through a monitoring body, to hold the entity's chief executive officer responsible if performance standards are not met. Participants in our study used the following strategies successfully to track the success of improvement initiatives. We believe the strategies would be effective for federal agencies as well. * Establish agency-specific goals and measures for reducing improper payments. * Using baseline information for comparison, periodically monitor the progress in achieving the established performance measures. * Make the results of performance reviews widely available to permit independent evaluations of the success of efforts to reduce improper payments. * Ensure timely resolution of problems identified by audits and other reviews. * Adjust control activities, as necessary, based on the results of monitoring activities. Organizations should monitor the control activities they use to address improper payments continuously, ingraining them in their operations. This kind of ongoing monitoring enables organizations to measure how well they are doing, track performance measures, and adjust control activities based on the results. Monitoring should also include policies and procedures for communicating review results to appropriate individuals in the organization so any problems can be resolved. Conclusions: In closing, Mr. Chairman, I want to emphasize that high levels of improper payments need not and should not be an accepted cost of running federal programs. The organizations that participated in our study found that they could effectively and efficiently manage improper payments by (1) changing their organization's control environments or cultures, (2) performing risk assessments, (3) implementing activities to reduce fraud and errors, (4) providing relevant, reliable and timely information and communication to management on results and (5) monitoring performance over time. While HUD, Education, and other agencies have taken some steps in these areas, effectively addressing improper payments requires a comprehensive strategy that permeates the entire organization. Implementing such a comprehensive strategy at federal agencies will not be easy or quick. It will require continued strong support from the President, the Congress, top-level administration appointees, and agency officials. The effort must include a willingness to dedicate personnel and money to implement the changes. This could involve performing needs assessments and hiring individuals with the necessary skills and knowledge to turn planned actions into reality. In addition, many actions that proved successful for organizations in our study involved computer assisted analyses of data. Implementing some of these practices could involve funding for computer software or hardware, and additional staff or training. In addition, it is important that the results of actions taken to address improper payments be openly communicated not only to the Congress and agency management, but to the public. This transparency demonstrates the importance that government places on the need for change at the same time it openly communicates performance results. It also acts as an incentive for agencies to be ever vigilant in their efforts to address wasteful spending that results from weak controls that lead to improper payments. Mr. Chairman, this concludes my statement. I would be happy to answer any questions you or other Members of the Subcommittee may have. Contact and Acknowledgments: For information about this statement, please contact Linda Calbom, Director, Financial Management and Assurance, at (202) 512-9508 or at calboml@gao.gov. Individuals making key contributions to this statement include Dan Blair, Don Campbell, Lisa Crye, Anh Dang, Bonnie Derby, Kelly Lehr, Carla Lewis, Sharon Loftin, Irving McMasters, Diane Morris, Andy O'Connell, Russell Rowe, Ruth Walk, Brooke Whittaker, and Doris Yanger. [End of section] Footnotes: [1] U.S. General Accounting Office, Financial Management: Internal Control Weaknesses Leave Department of Education Vulnerable to Improper Payments, GAO-01-585T (Washington, D.C.: Apr 3, 2001); Financial Management: Poor Internal Control Exposes Department of Education to Improper Payments, GAO-01-997T (Washington, D.C.: July 24, 2001); and Education Financial Management: Weak Internal Controls Led to Instances of Fraud and Other Improper Payments, GAO-02-406, (Washington, D.C.: Mar 28, 2002). [2] U.S. General Accounting Office, Strategies to Manage Improper Payments: Learning from Public and Private Sector Organizations, GAO-02- 69G (Washington, D.C.: October 2001). [3] Because of the similarity of the Office of Management and Budget‘s definition of erroneous payments to our definition of improper payments, we consider the terms synonymous. [4] U.S. General Accounting Office, Major Management Challenges and Program Risks, Department of Housing and Urban Development, GAO-01-248 (Washington, D.C.: January 2001); Major Management Challenges and Program Risks, Department of Education GAO-01-245 (Washington, D.C.: January 2001); and High-Risk Series: An Update, GAO-01-263, (Washington, D.C.: January 2001). [5] U.S. General Accounting Office, Purchase Cards: Control Weaknesses Leave Two Navy Units Vulnerable to Fraud and Abuse, GAO-01-995T (Washington, D.C.: July 30, 2001); Purchase Cards: Control Weaknesses Leave Two Navy Units Vulnerable to Fraud and Abuse, GAO-02-32 (Washington, D.C.: Nov 30, 2001); Purchase Cards: Continued Control Weaknesses Leave Two Navy Units Vulnerable to Fraud and Abuse, GAO-02- 506T (Washington, D.C.: Mar 13, 2002); and Government Purchase Cards: Control Weaknesses Expose Agencies to Fraud and Abuse, GAO-02-676T (Washington, D.C.: May 1, 2002). [6] We did not focus on HUD‘s rental housing assistance program because HUD is estimating improper payments for the program, and the HUD OIG and GAO have performed extensive work in that area. [7] Our testimony today generally will not address third party drafts, since Education eliminated that payment process in fiscal year 2001. However, we will discus the results of our inventory of computers and computer equipment purchased with third party drafts. [8] Data mining for improper payments involves using computer-aided auditing techniques to identify hidden patterns and relationships in data that are indicators of unusual transactions, which may be improper payments. [9] Due to separate congressional requests, the period of our review at Education differed from that for HUD. [10] Standards for Internal Control in the Federal Government (GAO/AIMD- 00-21.3.1), which was prepared to fulfill our statutory requirement the Federal Managers‘ Financial Integrity Act, provides an overall framework for establishing and maintaining internal control and for identifying and addressing major management challenges and areas at greatest risk of fraud, waste, abuse, and mismanagement. [11] Based on our testing, we estimate that $4,678,689 (plus or minus $678,806) of the total $10 million in purchase card transactions made during fiscal year 2001 lacked adequate supporting documentation. Our estimate is based on a 95 percent confidence level and a tolerable error rate of $1,059,046 (10 percent of the population total of $10,590,461). [12] Department of Housing and Urban Development Office of Inspector General, Commercial Credit Card Program, 99-DP-166-0001 (Washington, D.C.: Feb 1, 1999). [13] The Government Employees Training Act, 5 U.S.C. 4103 and 4107, requires that training be related to an employee's job and prohibits expenditures to obtain a college degree unless necessitated by retention or recruitment needs, which was not the case here. [14] These additional estimated charges were identified by an Education official. Under 31 U.S.C. 1345, appropriated funds may not be used to pay the costs of non-federal individuals to attend meetings unless otherwise specifically authorized by law. 5 U.S.C. 5703 allows the federal government to pay the costs of non-federal individuals to attend meetings if the attendees are providing direct services to the government. Education could not provide us with evidence that this was the case. [15] U.S. General Accounting Office, Financial Management: Poor Internal Control Exposes Department of Education to Improper Payments, GAO-01-997T (Washington, D. C.: July 24, 2001). [16] A Pell Grant is a form of financial aid that is awarded to undergraduate students who have not earned bachelor's or professional degrees, and who are enrolled in degree or certificate programs. [17] U.S. General Accounting Office, Student Financial Aid Programs: Pell Grant Program Abuse, GAO/T-OSI-94-8 (Washington, D.C.: Oct 27, 1993). [18] U.S. General Accounting Office, HUD Management: HUD‘s High-Risk Program Areas and Management Challenges, GAO-02-869T (Washington, D.C.: July 24, 2002). [19] In addition, HUD and the Massachusetts Housing Finance Agency have an agreement for the disposition and interim management of select HUD- owned multifamily properties in Boston. This pilot project was not implemented for other state housing agencies. [20] U.S. General Accounting Office, Financial Management: Coordinated Approach Needed to Address the Government‘s Improper Payments Problems, GAO-02-749 (Washington, D.C.: Aug 9, 2002). [21] The Health Care Financing Administration was renamed the Centers for Medicare and Medicaid Services in July 2002. [22] Section 831 of Pub.L. 107-107 requires executive agencies that enter into contracts totaling greater than $500 million in a fiscal year to have a program for recovering any amounts erroneously paid to contractors, including the use of recovery audits. [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "Subscribe to Updates." Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office: 441 G Street NW, Room LM: Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Gloria Jarmon, Managing Director, JarmonG@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Jeff Nelligan, Managing Director, AndersonP1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.