Premium Essay

Social Security Fraud Research Paper

Submitted By
Words 1442
Pages 6
With the rising number of workers in America who are dependent on SSDI benefits rising to a record one out of fourteen, the Social Security Administration is experiencing a loss of funds at a rate much earlier than anticipated (Finger n.p). The funds intended to return to workers once retirements are reached are now instead going to SSDI beneficiaries. Noted by Finger “According to the Congressional Research Services this program cost taxpayers $128.9 billion in 2011 and was in deficit to the tune of $25.3 billion” (Finger n.p). The SSA funds come from the constant 1.8% payroll tax, and SSDI makes up 18% of Social Security spending (Finger n.p). Taxpayers are unknowingly suffering from disability fraud without even realizing the seriousness …show more content…
The program currently participates in several different methods, but fraud is still prevalent within the system. One of the most effective methods of fraud prevention enacted by the Social Security Administration is the usage of field representatives. As field representatives, the SSA employees are required to investigate the SSDI recipients of a certain area (Koeppel n.p). While interviewing SSA employee Mike Nelson, who had been working for the government program for over 25 years, he states “A lot of people say, “You’re just here to make sure I’m alive. Right?” (Koeppel n.p). The most common form of Social Security fraud is typically the continuation of payments after the beneficiaries’ death. For the most part, Nelson stated that the people he checks on are “fairly honest,” and “out of about 6,000 visits in the region, we referred 27 cases to the office of investigation” (Koeppel n.p). Since 1999, when Koeppel conducted the interview, the requirement for a more effective method of finding fraudulent beneficiaries has certainly become an issue the Social Security Administration and the government must

Similar Documents

Premium Essay

Identity Theft and Fraud

...monitor the bank statement and etc. Checking the mail for missing account statements is another way to protect from identity theft and fraud. If someone going on vacation that person should ask the post office to hold all their mail until that person came back, to prevent identity theft and frauds. People should invest in a shredder to shred unwanted information. Use a secure website to access information, never enclose personal information by the phone. Check bank statement and credit card statement very careful each month to see any unwanted purchase. If that person sees any unwanted purchase notices their credit card immediately. Thesis: One day you receive a call from your bank, stating you had just made a purchase for a random estimate of 5,000 dollars. But you did not go on a shopping spree. Your identity just has stolen. How secure is your identity? Do you ever wonder about your identity? Ways to prevent/protect yourself from identity theft and frauds. I. One thing you should be aware about is your bank account. A. Once your ATM has been compromises change your pin right away. B. Get new ATM cards if it has been compromised. C. Contact the bank if you see any suspense in your bank account. I. Another way is keeping your social security secure in a safe. A. Do not write your Social Security card piece of paper. B. Do not give out your personal information to strangers. II. Monitoring your Credit Card Statements A. Check your credit...

Words: 2515 - Pages: 11

Free Essay

Security Basics

...(Anderson). The Federal Trade Commission estimates that more than 9 million individuals are victims of identity theft each year. The Justice Department puts the figure at more than 3.5 million households (Anderson). Anyone can become a victim of identity theft and it is not limited to the financial activities of one’s life. People’s identity is also stolen in order to commit criminal activities. Both activities are defined as fraud and are punishable by law if caught. Financial identity theft or fraud includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, and mail fraud. In fact, a total of 25 types of financial identity fraud are listed and investigated by the United States Secret Service (Obringer). In 1997, Secret Service agents made approximately 10,000 financial crime arrests which 94 percent involved identity theft (Obringer). Fifteen years later, Javelin Strategy & Research reports that over 12 million financial identity theft cases were reported (Javelin Strategy & Research). Other types of identity theft usually involve financial elements as well but are typically committed to fund some sort of criminal enterprise. Criminal activities include gaining someone else’s identity in order to enter a country, get special permits, hide one's own identity, or commit acts of terrorism. Criminal identity theft is relatively easy to commit by simply providing someone else’s name and birth date...

Words: 752 - Pages: 4

Premium Essay

Fraud Detection and Deterrance

...millions in tax refund Over the past few years prisoner tax refund fraud has sky rocketed. According to the article - (Prisoners rake in millions from tax fraud, 2013) “In 2010, more than 91,000 inmate returns claimed $759 million in fraudulent refunds.” 1 That figure was more than double from the previous year. How is it a convicted felon who is behind bars still gets to cheat the system by robbing innocent tax payers of billions in tax refunds on an annual basis? This type of white collar crime is easily committed, all that is needed is the use of a computer with internet access and a great deal of time which a prisoner is in no shortage of having. They can educate themselves on how to hack into hundreds of databases that contains people’s personal information including social security numbers. Once that information is gathered they can begin the process of stealing tax refunds they are certainly not due by filing fraudulent income tax forms, sometimes hundreds at a time by using legitimate names and social security numbers, sometimes the names of their inmates, relatives or even people who are deceased. It is the duty of the IRS to fix this problem. This paper will highlight a few cases of inmate tax refund fraud and what measures the IRS has taken and will continue to take in order to protect innocent victims against this type of fraud. Case summaries involving inmate tax refund fraud The following cases are classic examples of how easily criminals in...

Words: 2300 - Pages: 10

Premium Essay

Cybercrime

...internet has become an important aspect through which education institutions use to carry out research, communicate and innovate. Even through this evolution has brought many benefits but also it has also brought serious threats such as cyber-attacks that has been demonstrated over the past few years through acts of cyber espionage and cyber-crime through the virtual space. In this context, the University of Dar es Salaam needs to develop policies towards cyber threats even through this has often be clustered and fragmented. Using theoretical and conceptual models this paper provides an informed understanding and critical assessment of the University of Dar es Salaam cyber security policy through addressing the following research questions: What are the IT risk management policy and systems that can be developed for the University of Dar es salaam? The primary data is collected through surveys, and interviews that are open ended and close ended. The results of the paper demonstrated that colleges and universities have been a target for cyber-attacks due to the fact that of the vast amount of computing power they possess, and they provide open access to their constituents and to the public. The research also showed that University of Dar es Salaam doesn’t have a comprehensive IT security risk management policy or guidelines that will guide the business process in the event of an IT security threat. Therefore the University needs to develop policiesthat provide roadmap for effectively...

Words: 7435 - Pages: 30

Premium Essay

Cyber Crime

...An Examination of Cybercrime and Cybercrime Research: Self-control and Routine Activity Theory Katherine M. Grzybowski Arizona State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 Federal Laws .................................................................................7 3.1.2 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 Business Cyber Victimization ......................................................20 3.4.2 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ....................................

Words: 13816 - Pages: 56

Premium Essay

This Paper Provides an Overview of the Growing Cybercrime Problem and Reviews Two Criminological Theories That Have Been Applied to the Study of Cybercrime and Cybercrime Victimization. Legislation Which Defines

...An Examination of Cybercrime and Cybercrime Research: Self-control and Routine Activity Theory Katherine M. Grzybowski Arizona State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 3.1.2 Federal Laws .................................................................................7 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 3.4.2 Business Cyber Victimization ......................................................20 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ...................................................................

Words: 13816 - Pages: 56

Premium Essay

Sarbanes-Oxley Act of 2002

...Homework: Term Paper GEB2430 Business Ethics & Social Responsibility Dr. Harvey Weiss June 16th, 2012 Abstract The main purpose of this research paper is to show how the Sarbanes-Oxley Act of 2002 may have contributed to holding corporate executives accountable for their actions then and for the future. This research paper will examine and discuss the origin of the Sarbanes-Oxley Act and go into detail regarding the eleven titles, or sections, of the document that it consists of. This research paper will then touch upon the different countries around the world that have been subsequently enacted with the Sarbanes-Oxley Act and conclude with the debates over the perceived benefits and costs from both opponents and proponents. The following research paper will prove to be useful for any executive running a public corporation. After reading this research paper, one will come to discover and understand the new standards implemented for corporate accountability as well as the new penalties for acts of wrongdoing. Body The Sarbanes–Oxley Act of 2002, also known as the “Public Company Accounting Reform and Investor Protection Act” by the Senate and “Corporate and Auditing Accountability and Responsibility Act” by the House of Representatives and commonly called Sarbanes–Oxley, Sarbox or SOX, is a United States federal law passed on July 30, 2002, which set new or enhanced standards for all United States public company boards, management and public accounting firms. It...

Words: 2565 - Pages: 11

Premium Essay

Computer Crime

...Cyber Crime Research Presentation by the Australian Institute of Criminology Dr Russell G Smith Principal Criminologist The Australian Institute of Criminology • Australia's national research and knowledge centre on crime and justice • Core funding from the Australian Government, with income for contract research from public and private sectors • Criminology Research Advisory Council representing all jurisdictions • Staff of 30 academic researchers and 25 support staff – total 55 Cyber crime research Research questions • • • • • • • • • • How are cyber crimes committed (e.g. credit cards, internet)? How many crimes are committed and what are the crime trends? Who commits them and why do people commit them? How much money is at stake, lost and recovered? How can such crime be reduced – by prevention or punishment? Online and desk-based reviews of books, reports and articles Legislative and case-law analysis, including sentencing research Consultations with business, government and the community Surveys of households, businesses, offenders and victims Analysis of media reporting of crime Research methods Dissemination of findings • Reports, books, articles, conference papers, roundtables, online, media Cyber crime concepts Organised Crime e.g. OMCGs Identity Crime Cyber Crime e.g. off-line crimes e.g. ID theft Internet Crime e.g. Offensive Content Phishing Financial Crime e.g. Home renovation scams A chronology of cyber crime Cloud...

Words: 1301 - Pages: 6

Free Essay

Identity Theft Research Paper

...Identity Theft Abstract This research paper will examine what is known about identity theft. The paper begins with defining the crime and its background, followed by a review of the patterns and incidences of identity theft. This review will include data on the extent and costs of this crime. Discussion will then focus on victims and perpetrators of identity theft. Common techniques used by identity thieves will be explored along with tips to protect consumers and businesses from having their identities stolen or data breached. Legislation in place to prevent and prosecute identity theft will be discussed. How to report identity theft is also explained. Defining Identity Theft The U.S. Department of Justice defines identity theft, also called identity fraud, as “all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain” (U.S. Department of Justice, 2015). Identity thieves use personal data such as Social Security numbers, bank account or credit card numbers to personally profit at the victim’s expense. These breaches allow thieves to take funds out of bank accounts or in the worst cases, take over a victim’s identity completely, running up huge debts and committing crimes using the victim’s name. Victims not only suffer the out-of-pocket financial losses, but they may have to rebuild their reputation in the community due...

Words: 4583 - Pages: 19

Premium Essay

A Primer on Sarbanes-Oxley

...A Primer on Sarbanes-Oxley This paper is an investigation of violations in finance according to Sarbanes-Oxley (SOX) as related to ethics and those influenced by decisions from investment management. I assessed the financial and social business practices of different organizations and identified ethical issues within the businesses that impacted internal and external stakeholders. Research revealed issues and activities that should have been resolved voluntarily prior to SOX’s enactment to meet ethical considerations relative to social and financial performance and the organization’s reputation. Recommendations were made based on studies and scholarly articles implicating the best governance practices organizations should adopt to remain compliant with SOX. What is SOX? SOX was established in 2002 as an act to strengthen corporate governance and restore investor confidence. The most important conditional term was to protect investors by improving the accuracy and reliability of corporate disclosures made pursuant to the securities laws and other purposes (Jennings, 2012, p. 212). Provisions under SOX affected organizations’ processes and changed how financial information was released to the public. The act highlights the importance of information system controls by requiring management and auditors to report on the effectiveness of internal controls over the financial reporting component of the organization’s management information systems (Li, Peters, Richardson & Weidenmier...

Words: 1194 - Pages: 5

Premium Essay

Internet Fraud: an Overview of Classifications, Government Actions, and Consumer Protection

...Internet Fraud: An Overview of Classifications, Government Actions, and Consumer Protection December 14, 2006 Internet Fraud: An Overview of Classifications, Governmental Actions, and Consumer Protection Internet fraud is an increasing threat to our technological society, which thrives on the advances and benefits of the Internet and e-commerce. With the increased growth and dependence of the Internet, creative individuals have found ways of conveying fraudulent schemes as legitimate goods and services. Not only does Internet fraud cause harm to individuals and institutions, but it also damages the consumer confidence of valid Internet businesses and e-commerce. There are many forms of Internet fraud which Internet patrons need to be aware of and cognizant of. This paper will explore major classifications of Internet fraud, provide information on how to deal with Internet fraud, relay actions taken by the government to thwart Internet fraud and prosecution thereof, and also take a detailed look into one type of Internet fraud especially, identity theft. According to the Department of Justice (http://www.usdoj.gov/criminal/fraud/text/Internet.htm), Internet fraud is any type of criminal scheme that uses one or more components of the Internet to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions or to transmit the proceeds of fraud to financial institutions. Major types include; online action and retail scams, business opportunities...

Words: 3658 - Pages: 15

Premium Essay

White Collar

...investments and improve their health. The scams profiled include home-improvement projects, where a person takes the victim's money but does not perform the work promised; investment frauds and controlling their money for the future; and health and medical scams, which promise the equipment and service that do not perform as advertised. Also, research was taken from a survey from a rehab center with most of them senior citizens. The primary advice for preventing such white-collar crimes is to never give money for a product, service, or investment based upon a person's or business promise without first conducting a thorough background check. Key Terms: Senior Citizen, White Collar Crime, Prevention, Con Artists White Collar Crime against Senior Citizens Senior citizens are some of the most vulnerable targets when it comes to fraud and scam within white collar crime. There are many reasons why many people target the senior citizens and elderly mostly including but not limited to: because they are too polite and have good manners. For example, the elderly will usually not say no to people they are talking to. One of the main reasons that senior citizens have a problem is when they do find out about the scam and/or fraud; they are too embarrassed to report to the police or even their family members. This paper will focus on why the elderly are being targeted, the different types of white collar crime committed against them, and how they can be prevented. After speaking with a majority...

Words: 1862 - Pages: 8

Free Essay

Seminar Outline

... |Thursday: 11:30 – 1:00 | |Prerequisite(s) | | |Program of Study |BCom mandatory course | |Course Deliverable |Due Date |Weight on Final Grade | |Accounting Assignment |Oct. 3 |15% | |Midterm exam |Oct. 8 |25% | |Major Research Project |Nov. 14-28 |25% | |Final exam. |TBA |35% | Course Description The...

Words: 1243 - Pages: 5

Free Essay

Internet Fraud

...Internet Fraud Today we live in a modernized society that is dependent on computers and the internet like the human body is dependent on its brain and heart for ordinary daily function. In 1973, the U.S. Defense Advanced Research Projects Agency (DARPA) initiated a research program to investigate techniques and technologies for interlinking packet networks of various kinds. The objective was to develop communication protocols which would allow networked computers to communicate transparently across multiple, linked packet networks. This was called the Inter netting project and the system of networks which emerged from the research was known as the "Internet. (2) The Internet is constantly developing, becoming a greater power each day and it has affected our world in various negative and positive ways. The internet serves as an important data base worldwide. It is the greatest source of information, news, entertainment, education and even local and global interactions such as sales and trade are performed through the internet making life so much easier and hustle free. Computers are emerging almost in every aspect of our lives usually they are making everything very convenient for us, permitting us to shop from home, research information, work online, and communicate with our friends, family and acquaintances all around the world with speed. As technology continues to improve more benefits and disadvantages start to evolve. Internet access is no longer a luxury...

Words: 1347 - Pages: 6

Premium Essay

Identity Thief an Old Problem in a Modern Era

...Identity Thief an Old Problem in a Modern Era Your name KNOCK, KNOCK!!! …Who there? It Is I...I who? This is the question everyone must pose nowadays, for we don’t know who actual is behind that door. It could be your friend, family member or you banker but worst yet it can some devious individual posing to be someone you know or impersonating someone else to gain your trust in order to steal from you by stealing your identity. Identity thief has become a common practice in this Age of High Tech. One such area is the internet which has made transmission of our personally identifying information quick and easy, and sometimes less secure. Therefore just about anyone and everyone is susceptible to getting their identity stolen or compromised. So how did we get here you may ask? Well, that a good question. Brief History Identity thief is not something new despite the belief that it began with the internet. It has been around for thousand years or more. One of first recorded Identity thief in history and perhaps one of the greatest to occur happen in the Bible. It is The Blessing of Jacob by Deception (Genesis 27:1-46, King James Version). Jacob the youngest son of Isaac deceives his father by claiming to be his oldest brother, Esau (eldest son of Isaac) in order to receive the blessing that was reserved for the firstborn son. And Jacob said unto his father, I am Esau thy firstborn; I have done according as thou badest me: arise, I pay thee, sit and eat of my venison,...

Words: 2005 - Pages: 9