Some people go to prison, repay their debt to society and are rehabilitated.  Unfortunately, that isn’t always the case.  I’ve written before about instances in which fraudsters orchestrate fraud (e.g., unemployment fraud, tax refund fraud) from behind bars.  And, that’s what’s alleged by prosecutors in today’s Fraud of the Day from WTXL.com.

A 53-year-old inmate, currently serving time at a correctional institution in Sneads, Florida is accused of participating in a tax refund scheme with some of his fellow inmates and obtaining refund checks.  Court documents say that in January 2008, the defendant and fellow inmates began using the names and Social Security numbers of prisoners to complete tax refund forms.  Investigators also say that he listed company names on the forms and falsely claimed they were employers, providing fraudulent income information.  The indictment claims the checks were sent to the defendant’s mother’s house, among other addresses.  It also asserts that the fraud amounted to approximately $179,349 in falsely claimed refunds from 84 applications.

The defendant was charged with one count of conspiracy, one count of mail fraud, 16 counts of theft from the government and 27 counts of submitting false claims.  The defendant is, of course, innocent until proven guilty.  The justice system will resolve the issue.

The article, however, raises a good question:  how easy is it for inmates to perpetrate fraud from prison?  (Pretty easy.  They have a lot of time on their hands.)  Perhaps the more important question is “what can states and the federal government do to prevent fraud?” The answer is simple.  The problem described by the article hinges on the potential for identity-based fraud, and solving identity-based fraud requires an identity-based solution.  By leveraging public records and data analytics to verify and authenticate identities, agencies can stop fraud before they write the checks.

So, the question for the day is:  how can your agency leverage an identity-based fraud filter?

Post a Comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>