p1: ota/xyz p2: abcdownload.e-bookshelf.de/download/0000/5942/...p1: ota/xyz p2: abc jwbt664-fm...

30

Upload: others

Post on 07-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum
Page 2: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come

ii

Page 3: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come

Healthcare Fraud

i

Page 4: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come

ii

Page 5: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come

Healthcare Fraud

Auditing and Detection Guide

Second Edition

REBECCA SALTIEL BUSCH

John Wiley & Sons, Inc.

iii

Page 6: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come

Copyright © 2012 by John Wiley & Sons, Inc. All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.

Previous Edition: Healthcare Fraud: Auditing and Detection Guide.ISBN: 978-0-470-12710-0. Published by John Wiley & Sons, Inc. © 2007.

Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, ortransmitted in any form or by any means, electronic, mechanical, photocopying,recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the1976 United States Copyright Act, without either the prior written permission of thePublisher, or authorization through payment of the appropriate per-copy fee to theCopyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923,(978) 750-8400, fax (978) 646-8600, or on the Web at www.copyright.com. Requeststo the Publisher for permission should be addressed to the Permissions Department,John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011,fax (201) 748-6008, or online at www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used theirbest efforts in preparing this book, they make no representations or warranties withrespect to the accuracy or completeness of the contents of this book and specificallydisclaim any implied warranties of merchantability or fitness for a particular purpose. Nowarranty may be created or extended by sales representatives or written sales materials.The advice and strategies contained herein may not be suitable for your situation. Youshould consult with a professional where appropriate. Neither the publisher nor authorshall be liable for any loss of profit or any other commercial damages, including but notlimited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support,please contact our Customer Care Department within the United States at(800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content thatappears in print may not be available in electronic books. For more information aboutWiley products, visit our web site at www.wiley.com.

Library of Congress Cataloging-in-Publication Data

Busch, Rebecca S.Healthcare fraud : auditing and detection guide / Rebecca Saltiel Busch. – 2nd ed.

p. ; cm.Includes index.ISBN 978-1-118-17980-2 (cloth); ISBN 978-1-118-22722-0 (ebk); 978-1-118-24025-0

(ebk); 978-1-118-26495-9 (ebk)I. Title.[DNLM: 1. Financial Audit–methods. 2. Fraud–prevention & control.

3. Computer Security. 4. Fraud–economics. 5. Health Care Sector–legislation &jurisprudence. W 80]

345.73′0263–dc232011048574

Printed in the United States of America

10 9 8 7 6 5 4 3 2 1

iv

Page 7: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come

In dedication to my grandmothers, Rebecca and Gregoria,and my mother, Francisca, who have modeled

perseverance; and to my father, Alberto, who hasmodeled incontrovertible truth.

v

Page 8: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come

vi

Page 9: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come

Contents

Preface xiii

Acknowledgments xvii

CHAPTER 1 Introduction to Healthcare Fraud 1

What Is Healthcare Fraud? 2

Healthcare Fraud in the United States 4

Healthcare Fraud in International Markets 4

What Does Healthcare Fraud Look Like? 5

Who Commits Healthcare Fraud? 9

What Is Healthcare Fraud Examination? 11

The Primary Healthcare Continuum: An Overview 13

Healthcare Fraud Overview: Implications forPrevention, Detection, and Investigation 14

Notes 17

CHAPTER 2 Defining Market Players within the PrimaryHealthcare Continuum 19

The Patient 19

The Provider 24

The Payer 42

The Employer/Plan Sponsor 48

The Vendor and the Supplier 49

The Government 50

Organized Crime 51

Market Players Overview: Implications for Prevention,Detection, and Investigation 53

vii

Page 10: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come

viii Contents

CHAPTER 3 Continuum Audit and Investigative Model 57

Market Understanding 58

The Primary Healthcare Continuum (P-HCC) 58

The Secondary Healthcare Continuum (S-HCC) 58

The Information Healthcare Continuum (I-HCC) 62

The Consequence Healthcare Continuum (C-HCC) 63

The Transparency Healthcare Continuum (T-HCC) 65

The Rules Based Healthcare Continuum (R-HCC) 66

Audit Continuum Models Overview: Implicationsfor Prevention, Detection, and Investigation 68

Notes 68

CHAPTER 4 Secondary Healthcare Continuum 69

The Secondary Healthcare Continuum (S-HCC) 71

Audit Continuum Models Overview: Implications forPrevention, Detection, and Investigation 75

Notes 75

CHAPTER 5 Information Healthcare Continuum 77

Case Study Dr. Traveler—Recap 77

Continuum Audit Progression—Recap 78

The Information Healthcare Continuum (I-HCC) 78

Audit Continuum Models Overview: Implicationsfor Prevention, Detection, and Investigation 83

Notes 84

CHAPTER 6 Consequence Healthcare Continuum 85

Case Study Dr. Traveler—Recap 85

Continuum Audit Progression—Recap 86

The Consequence Healthcare Continuum (C-HCC) 86

Economic Business Impact 88

Serviceability and Service Integrity 89

Service, Medical, and Financial Errors 90

Audit Continuum Models Overview: Implicationsfor Prevention, Detection, and Investigation 90

Page 11: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come

Contents ix

CHAPTER 7 Transparency Healthcare Continuum 93

Case Study Dr. Traveler—Recap 93

Continuum Audit Progression—Recap 94

The Transparency Healthcare Continuum (T-HCC) 95

Audit Continuum Models Overview: Implications forPrevention, Detection, and Investigation 96

CHAPTER 8 Rules Based Healthcare Continuum 97

Case Study Dr. Traveler—Recap 98

The Rules Based Healthcare Continuum (R-HCC) 99

Continuum Audit Progression—Summary 104

Audit Continuum Models Overview: Implicationsfor Prevention, Detection, and Investigation 106

Notes 107

CHAPTER 9 Protected Health Information 109

Health Insurance Portability and Accountability Actof 1996 109

Audit Guidelines in Using Protected HealthInformation 110

Protected Health Information Overview: Implicationsfor Prevention, Detection, and Investigation 113

CHAPTER 10 Health Information Pipelines 115

The Auditor’s Checklist 115

What Are the Channels of Communication in a HealthInformation Pipeline? 116

Unauthorized Parties 125

Health Information Pipelines Overview: Implicationsfor Prevention, Detection, and Investigation 126

CHAPTER 11 Accounts Receivable Pipelines 129

Overview of Healthcare Reimbursement 130

Types of Reimbursement Models 131

Data Contained in Accounts Receivable Pipelines 135

Page 12: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come

x Contents

Accounts Receivable Pipelines by HealthcareContinuum Player 135

Accounts Receivable Pipelines Overview: Implicationsfor Prevention, Detection, and Investigation 154

CHAPTER 12 Operational Flow Activity 157

Operational Flow Activity Assessment 157

Operational Flow Activity Overview: Implications forPrevention, Detection, and Investigation 163

CHAPTER 13 Product, Service, and Consumer Market Activity 165

Product Market Activity 165

Service Market Activity 167

Consumer Market Activity 167

Product, Service, and Consumer Market ActivityOverview: Implications for Prevention, Detection,and Investigation 175

CHAPTER 14 Data Management 177

Data Management 177

Market Example: Setting Up a Claims RelationalDatabase Management System 181

Data Management Overview: Implications forPrevention, Detection, and Investigation 182

References 182

CHAPTER 15 Normal Infrastructure 185

Normal Profile of a Fraudster 185

Anomalies and Abnormal Patterns 188

Continuum Audit and Investigative Model 188

Normal Infrastructure Overview: Implications forPrevention, Detection, and Investigation 189

CHAPTER 16 Normal Infrastructure and Anomaly Tracking Systems 191

The Patient 191

The Provider 194

The Payer 198

Page 13: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come

Contents xi

The Vendor/Other Parties 201

Organized Crime 205

Normal Infrastructure and Anomaly Tracking SystemsOverview: Implications for Prevention, Detection,and Investigation 207

Notes 207

CHAPTER 17 Components of the Data Mapping Process 209

What Is Data Mapping? 209

Data Mapping Overview: Implications for Prevention,Detection, and Investigation 213

CHAPTER 18 Components of the Data Mining Process 215

What Is Data Mining? 215

Data Mining Overview: Implications for Prevention,Detection, and Investigation 219

CHAPTER 19 Components of the Data Mapping and DataMining Process 221

Forensic Application of Data Mapping andData Mining 224

Data Mapping and Data Mining Overview:Implications for Prevention, Detection,and Investigation 226

CHAPTER 20 Data Analysis Models 227

Detection Model 227

Investigation Model 230

Mitigation Model 233

Prevention Model 235

Response Model 240

Recovery Model 244

Data Analysis Model Overview: Implications forPrevention, Detection, and Investigation 253

Page 14: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come

xii Contents

CHAPTER 21 Clinical Content Data Analysis 255

What Is SOAP? 256

The SOAP Methodology 257

Electronic Records 270

Analysis Considerations with Electronic Records 273

Narrative Discourse Analysis 277

Clinical Content Analysis Overview: Implications forPrevention, Detection, and Investigation 284

CHAPTER 22 Profilers 287

Fraud and Profilers 287

Medical Errors and Profilers 291

Financial Errors and Profilers 296

Internal Audit and Profilers 300

Recovery and Profilers 302

Anomaly and Profilers 303

Fraud Awareness and Profilers 304

Profiler Overview: Implications for Prevention,Detection, and Investigation 305

CHAPTER 23 Market Implications 307

The Myth 307

“Persistent” 310

“Persuasive” 310

“Unrealistic” 312

Market Overview: Implications for Prevention,Detection, and Investigation 313

CHAPTER 24 Conclusions 315

Micromanagement Perspective 315

Macromanagement Perspective 326

Overview of Prevention, Detection, and Investigation 327

About the Author 333

Index 335

Page 15: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-bpreface JWBT664-Busch February 27, 2012 10:10 Printer Name: To Come

Preface

Before reading this book, recall an experience in your personal or profes-sional life, preferably both, in which you have been told a lie, believed it,

and acted on it. Hold onto that thought and then ask yourself, “Why? Whatgut reaction did I ignore? What clues did I miss? What evidence walkedby me?” Follow those questions with, “What price did I pay personally orprofessionally?”

That is the frame of reference required to appreciate the behind-the-scenes look that the charts, tables, diagrams, rules, and audit to-do lists thatare given throughout this book. In the course of all life experiences—and,in particular, audit, detection, and investigation—seeking 20/20 vision is theobjective. This vision is further enhanced by the ability to see what no oneelse has seen. Each chapter begins with a reflective quote that has inspiredthe work contained within. The book progresses by providing the buildingblocks for understanding the entire healthcare market and its respectiveplayers. Intertwined throughout are subject matter and skill set expertise.The cases and methodologies presented provide actual audit and investiga-tive tools. Theoretical applications are identified, and I include those fromvarious studies and established organizations. The case studies are actualpublic cases, in addition to cases on which I worked personally. Some ofthem are modified in detail, location, and names to avoid identification.

The methodologies and tools that I use in my practice are explained inthis book, with the goal being to answer any question presented at any pointin the healthcare continuum. Keep in mind that learning is a process. By nomeans is this book meant to cover all possible scenarios. It is presented frommy lessons learned, with the expectation that it will complement your ownevolving experiences. Further, your own methods and checklists shouldevolve with ongoing regulatory changes and emerging market tools. Newquestions that cannot be answered within the current models will generatenew algorithms within the audit checklists noted in this book. The conceptsof theft, waste, and abuse, of course, remain the same.

The school of hard knocks has resulted in my drive to share and teachall I have learned about the audit and detection of healthcare fraud. I wrotethis book to share with others the processes that I have developed to reach

xiii

Page 16: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-bpreface JWBT664-Busch February 27, 2012 10:10 Printer Name: To Come

xiv Preface

a state of incontrovertible truth. As new challenges and unique behaviorsof the ethically challenged enter the market, updates on these conceptswill be provided. That aside, the tools provided in this book are struc-tured to move with market changes. The original publication focused onone healthcare continuum. The current version has five additional contin-uums to ensure a more comprehensive approach. The first book used theterm healthcare continuum to discuss market players. In this edition, mar-ket players are now referred to as the primary healthcare continuum. Themodel now has six layered continuums to effectively obtain informationand evidence during an audit and or investigation. The introduction of theHealthcare Continuum Audit Model involves the following six layers:

� Primary Healthcare Continuum (P-HCC) is about the players� Secondary Healthcare Continuum (S-HCC) is about the benchmarks� Information Healthcare Continuum (I-HCC) is about the information

systems� Consequence Healthcare Continuum (C-HCC) is about measuring

damages� Transparency Healthcare Continuum (T-HCC) is about recognizing road

block� Rules Based Healthcare Continuum (R-HCC) is about knowing the rel-

evant rules

The complexity of health information systems, specifically the I-HCC,was discussed in more detail in a 2008 publication entitled “Electronic HealthRecords: An Audit and Internal Control Guide.”

My background gives me a number of different perspectives. I startedoff as a nurse and this evolved into the role of a medical auditor for a hos-pital. Internal audit expertise then complemented my clinical background.My expertise continued to evolve as I began setting up internal controls fordocumentation- and reimbursement-related issues. The addition of health-care finance allowed me to move on to the next level. My career progressedto setting up audit programs for insurance carriers. In 1991, I started my owncompany, Medical Business Associates, with the idea of taking clinical nursesand training them in audit and finance. During this time period, my auditexperience led me to employer advocacy of healthcare benefits, and even-tually into additional audit programs for controlling employee healthcareexpenses. All roles involved data analytics and research. In between, I haveaudited on behalf of patients and other ancillary market players. The investi-gation of fraud and abuse was a natural evolution. In each context, scenariosinvolving ethically challenged behavior have presented themselves, leadingme to get involved with forensics and disputes. The legal world often re-quires experts to “answer that question” or “contribute to the tier of facts.”

Page 17: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-bpreface JWBT664-Busch February 27, 2012 10:10 Printer Name: To Come

Preface xv

I became that expert. Finally, the detailed avenues of this process havebeen filed in a patent referred to as an anomaly tracking system that inte-grates some of the concepts in this book. Thus, this book is written from anumber of perspectives—clinical, research, internal audit, investigative, dataintelligence, and forensic.

Why is healthcare so complex and difficult to manage? The healthcaremarket is fragmented, layered, and segmented. We have too many currentand changing rules, too many relationships, and too many old dynamicswhose historical and political roots are often lost or forgotten.

What have we created in healthcare? A Tower of Babel! The market,the U.S. legislature, executive branch, and various stakeholders have pur-sued six attempts at national healthcare reform since 1927. In 2010, historiclegislation referred to as the Affordable Care Act was signed into law. Com-ponents of the Act have been implemented, some are in route, and otherattributes continue to be challenged. Regardless of the political or marketclimate, use this book as a navigation guide to break apart and discoverall the relationships involved, and to answer whatever questions are athand. The goal is to create a common language to understand the events inquestion.

A general comment on fraud: Outside of the legal context of its def-inition, simply view it as individuals or entities taking things that do notbelong to them. Do not bury yourself in one particular market player, such as“provider” fraud. The ethically challenged can look like providers, but alsolike payers, employers, plan sponsors, patients, and vendors. This guide-book is structured to identify what is normal at any point in the healthcarecontinuum, on both individual and aggregate scales, with the assumptionbeing that everything else is abnormal. The building blocks containedwithin this book will help you whether you are just beginning your career orare an experienced professional looking for an out-of-the-box perspectiveor a new set of application skills.

The world of healthcare fraud is my passion. It is much more thanjust stealing money or a corporate asset. Healthcare fraud steals the veryessence of human life. Stories include false claims by perpetrators whoperform needless procedures that disable or kill, fake insurance broker orinappropriate payer denials that can leave a patient disabled or with anuntimely death, and even adulterated drugs that almost take the life ofa 16-year old liver transplant survivor. The list of examples is shocking,demoralizing, and generates a sense of hopelessness and another book initself. More disturbing is that the world of healthcare fraud has become oneof high-tech, highly skilled, educated, and professional perpetrators.

When was the last time you witnessed a consumer walking into a usedcar dealership with his guard up? When didn’t you! Unlike buying cars,healthcare is a personal, intimate experience with a high level of trust from

Page 18: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-bpreface JWBT664-Busch February 27, 2012 10:10 Printer Name: To Come

xvi Preface

a patient who more than likely is in a compromised physical and emotionalstate. In other words, the guard is down. With this in mind, if anything Ihave written and shared within this book helps any party prevent, detect,and shut down a perpetrator, then I will consider that my greatest accom-plishment. Thank you for taking the time to learn and participate in this veryimportant subject.

Page 19: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-back JWBT664-Busch March 14, 2012 8:14 Printer Name: To Come

Acknowledgments

Personal acknowledgments cannot go without thanking my whole familyfor support and for instilling a fountain of youth for learning. I especially

want to acknowledge my children, Rebecca Samantha, Andrew Bering, andAlberto William. They have taught me more about life than any degree orcredential. I have also been privileged to work with some amazing womenfor the past 20 years—Janet McManus, Donna Graham, and Mary Glynn,the ultimate patient advocates. I would like to acknowledge the editorialassistance of Tara McManus and Laura Spangler.

Professionally, as of this writing, I have more than 100 combined articlesand presentations. A special thank-you to all the students and professionalswho have participated in my classes, read my articles, emailed responsesto my questions, and shared their experiences. These experiences havegenerated insight and thought-provoking conversations, all of which havecontributed to the writing of this book. Further, in my own professionaldevelopment, a thank-you to all the professors and academic organizationsthat continue to educate and refine my understanding of this subject.

Finally, in this second edition I need to acknowledge the story behindthe story. The first edition was written as an act of penance. I was involvedin a case with a client who had issues with his billing company and rep-resentation by a disbarred attorney. During the course of this investigationI met an FBI agent who, during my interview, asked why I was helpingthis doctor. I told her simply that it appeared he was victimized. I didn’ttake it lightly the FBI was investigating my client, so I asked her if therewas anything she could share. She simply stated, “You have encountereda thicket of thieves.” Being first-generation Cuban American, and feelingsomewhat compromised with Spanish as a first language, I thought great,an American colloquialism. What the heck was she talking about?

It took me about a year to appreciate the true meaning of the phrase.I encountered evidence that I could label as an incontrovertible truth—mylie detector test. My conclusion about the disbarred attorney was correct,issues with the billing entities involved were also correct. What I failed tosee was that my client was also a thief—and a liar himself, thus the thicketof thieves. I encountered a group of con artists that were stealing from each

xvii

Page 20: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-back JWBT664-Busch March 14, 2012 8:14 Printer Name: To Come

xviii Acknowledgments

other. Since that first edition, I have continued to refine the methodology torespond to any query presented. The hard lesson learned is this: an effectiveaudit or investigation is totally reliant on the ability to execute your auditor investigations by creating a path of incontrovertible truth. The purposeof the healthcare continuum models is to obtain objective evidence that isimmune from our own subconscious biases.

I went back to visit with the agent after I had assembled the puzzle,with a little egg on my face, and said, “I now understand your reference to‘a thicket of thieves’.” She smiled and sincerely expressed “It is never thefault of the individual who was deceived.” The perpetrator alone is account-able for their actions. My act of penance was to develop a methodology thatwould prevent a similar outcome, write about it, and teach others.

The FBI agent who inspired me to write? Well, she chooses to remainanonymous, and I respectfully oblige the request. So I will simply say,thank you.

Page 21: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-back JWBT664-Busch March 14, 2012 8:14 Printer Name: To Come

Healthcare Fraud

xix

Page 22: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-back JWBT664-Busch March 14, 2012 8:14 Printer Name: To Come

xx

Page 23: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-c01 JWBT664-Busch February 28, 2012 6:49 Printer Name: To Come

CHAPTER 1Introduction to Healthcare Fraud

Truth is often eclipsed but never extinguished.—Livy, Historian (59 B.C.–A.D. 17)

When Willie Sutton, an infamous twentieth-century bank robber, wasasked why he robbed banks, he replied, “Because that’s where the

money is.” The healthcare industry, too, has lots of money. Long considereda recession-proof industry, healthcare continues to grow. Statistics from theCenters for Medicare and Medicaid Services (CMS), formally known as theHealth Care Financing Administration, show that in 1965, U.S. healthcareconsumers spent close to $42 billion. In 1991, that number grew in excessof $738 billion, an increase of 1,657 percent. In 1994, U.S. healthcare con-sumers spent $1 trillion. That number climbed to $1.6 trillion in 2004, whichamounted to $6,280 per healthcare consumer. The figure hit $2.5 trillion in2009, which translates to $8,086 per person or 17.7 percent of the nation’sGross Domestic Product (GDP).1

How many of these annual healthcare dollars are spent wastefully?Based on current operational statistics, we will need to budget $550 billionfor waste. A trillion-dollar market has about $329.2 billion of fat, or about25 percent of the annual spending figure. The following statistics are stag-gering in their implications:

� $108 billion (16 percent) of the above is paid improperly due to billingerrors. (Centers for Medicare and Medicaid Services, www.cms.gov)

� $33 billion Medicare dollars (7 percent) are illegitimate claims billed tothe government. (National Center for Policy Analysis, www.ncpa.org)

� $100 billion private-pay dollars (20 percent) are estimated to be paidimproperly. (www.mbaaudit.com)

� $68 billion in health insurance fraud (3 percent of expenditures).(www.insurancefraud.org)

1

Page 24: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-c01 JWBT664-Busch February 28, 2012 6:49 Printer Name: To Come

2 Introduction to Healthcare Fraud

� $50 billion (10 percent) of private-payer claims are paid out fraudulently.(BlueCross BlueShield, www.bcbs.com)

� $37.6 billion is spent annually for medical errors. (Agency for HealthcareResearch and Quality, www.ahrq.gov)

� 10 percent of drugs sold worldwide are counterfeit (up to 50 percentin some countries) (www.fda.gov). The prescription drug market is$121.8 billion annually (www.cms.gov), making the annual counterfeitprice tag approximately $12.2 billion.

What do these statistics mean? About $25 million per hour is stolen inhealthcare in the United States alone. Healthcare expenditures are rising ata pace faster than inflation. The fight against bankruptcy in our public andprivately managed health programs is in full gear.

Use this how-to book as a guide to walk through a highly segmentedmarket with high-dollar cash transactions. This book describes what is nor-mal, so that the abnormal becomes apparent. Healthcare fraud prevention,detection, and investigation methods are outlined, as are internal controlsand anomaly tracking systems for ongoing monitoring and surveillance. Theultimate goal of this book is to help you see beyond the eclipse created byhealthcare fraud and sharpen your skills as an auditor or investigator toidentify incontrovertible truth.

What Is Healthcare Fraud?

The Merriam-Webster Dictionary of Law defines fraud as:

any act, expression, omission, or concealment calculated to deceive an-other to his or her disadvantage; specifically: a misrepresentation orconcealment with reference to some fact material to a transaction thatis made with knowledge of its falsity or in reckless disregard of its truthor falsity and with the intent to deceive another and that is reasonablyrelied on by the other who is injured thereby.

The legal elements of fraud, according to this definition, are:

� Misrepresentation of a material fact� Knowledge of the falsity of the misrepresentation or ignorance of

its truth� Intent� A victim acting on the misrepresentation� Damage to the victim

Page 25: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-c01 JWBT664-Busch February 28, 2012 6:49 Printer Name: To Come

What Is Healthcare Fraud? 3

Definitions of healthcare fraud contain similar elements. The CMSwebsite, for example, defines fraud as the:

Intentional deception or misrepresentation that an individual knows,or should know, to be false, or does not believe to be true, and makes,knowing the deception could result in some unauthorized benefit tohimself or some other person(s).

The Health Insurance Portability and Accountability Act (HIPAA) of 1996is more specific, defining the term federal health care offense as “a violationof, or a criminal conspiracy to violate” specific provisions of the U.S. Code,“if the violation or conspiracy relates to a health care benefit program”18 U.S.C. § 24(a).

The statute next defines a health care benefit program as “any publicor private plan or contract, affecting commerce, under which any medicalbenefit, item, or service is provided to any individual, and includes anyindividual or entity who is providing a medical benefit, item, or service forwhich payment may be made under the plan or contract” 18 U.S.C. § 24(b).

Finally, health care fraud is defined as knowingly and willfully exe-cuting a scheme to defraud a healthcare benefit program or obtaining, “bymeans of false or fraudulent pretenses, representations, or promises, anyof the money or property owned by . . . any health care benefit program”18U.S.C. § 1347.

HIPAA establishes specific criminal sanctions for offenses against bothprivate and public health insurance programs. These offenses are consistentwith our earlier definitions of fraud in that they involve false statements, mis-representations, or deliberate omissions that are critical to the determinationof benefits payable and may obstruct fraud investigations.

Healthcare fraud differs from healthcare abuse. Abuse refers to:

� Incidents or practices that are not consistent with the standard of care(substandard care)

� Unnecessary costs to a program, caused either directly or indirectly� Improper payment or payment for services that fail to meet professional

standards� Medically unnecessary services� Substandard quality of care (e.g., in nursing homes)� Failure to meet coverage requirements

Healthcare fraud, in comparison, typically takes one or more ofthese forms:

� False statements or claims� Elaborate schemes

Page 26: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-c01 JWBT664-Busch February 28, 2012 6:49 Printer Name: To Come

4 Introduction to Healthcare Fraud

� Cover-up strategies� Misrepresentations of value� Misrepresentations of service

Healthcare Fraud in the United States

Healthcare fraud has grown and continues to grow at an accelerated ratein the United States. Traditional schemes include false claim submissions,care that lacks medical necessity, controlled substance abuse, upcoding(billing for more expensive procedures), employee-plan fraud, staged-accident rings, waiver of co-payments and deductibles, billing experimen-tal treatments as nonexperimental ones, agent-broker fraud relationships,premium fraud, bad-faith claim payment activities, quackery, overutiliza-tion (rendering more services than are necessary), and kickbacks. Evolvedschemes include complex rent-a-patient activities, 340 B program abuse ac-tivities (setting aside discounted drugs, making them unavailable to those inneed), pill-mill schemes (schemes to falsely bill prescriptions), counterfeitdrug activities, and organized criminal schemes.

Healthcare Fraud in International Markets

Healthcare fraud knows no boundaries. The U.S. Medicare and Medicaidprograms are equivalent to many government-sponsored programs in othercountries. Regardless of country, the existence and roles of players withinthe healthcare continuum are the same. All healthcare systems have patients,providers, TPAs (third party administrators) that process reimbursements tothird parties, plan sponsors (usually government programs or private-payactivities), and support vendors.

Examples of international healthcare fraud are plentiful. In France,an executive director of a psychiatric nursing home took advantage ofpatients to obtain their property.2 In 2004, a newspaper in South Africareported that “A man who posed as a homeopathic doctor was this weeksentenced to 38 years in jail—the stiffest term ever imposed by a SouthAfrican court on a person caught stealing from medical aids.” An Australianpsychiatrist claimed more than $1 million by writing fake referrals of pa-tients to himself; he also charged for the time spent having intimate relationswith patients.

In Japan, as in the United States, there are examples of hospitals incar-cerating patients, falsifying records, and inflating numbers of doctors andnurses in facilities for profit. A U.K. medical researcher misled his peersand the public by using his own urine sample for 12 research subjects.

Page 27: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-c01 JWBT664-Busch February 28, 2012 6:49 Printer Name: To Come

What Does Healthcare Fraud Look Like? 5

Switzerland, known for its watches, had providers sanctioned for billing30-hour days. All of these examples include patterns of behavior consistentwith the definitions of healthcare fraud in the United States.

What Does Healthcare Fraud Look Like?

It is important to appreciate that healthcare is a dynamic and segmentedmarket among parties that deliver or facilitate the delivery of health in-formation, healthcare resources, and the financial transactions that movealong all components. To fully appreciate what healthcare fraud looks like,it is important to understand traditional and nontraditional players. The pa-tient is the individual who actually receives a healthcare service or product.The provider is an individual or entity that delivers or executes the health-care service or product. The payer is the entity that processes the financialtransaction. The payer may be the party that takes on risk or managesrisk for a plan sponsor providing the covered services. The plan spon-sor is the party that funds the transaction. Plan sponsors include privateself-insurance programs, employer-based premium programs, and govern-ment programs such as Medicare and Medicaid. A vendor is any entitythat provides a professional service or materials used in the delivery ofpatient care.

What does healthcare fraud look like from the patient’s perspective? Thepatient may submit a false claim with no participation from any other party.The patient may exaggerate a workers’ compensation claim or allege thatan injury took place at work when in fact it occurred outside of work. Thepatient may participate in collusive fraudulent behavior with other parties.A second party may be a physician who fabricates a service for liabilitycompensation. The patient may be involved in an established crime ringthat involves extensive collusive behavior, such as staging an auto accident.The schemes repeat themselves as well as evolve in their creativity.

Sample Patient Fraud Case

At an insurance company, all payments of foreign claims are made tothe insured patient instead of to foreign medical providers. An insuredpatient submitted fictitious foreign claims ($90,000) from a clinic inSouth America, indicating that the entire family was in a car accident.A fictitious police report accompanied the medical claims. A telephonecall to the clinic revealed that the insured and the dependents werenever treated in the clinic.

Page 28: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-c01 JWBT664-Busch February 28, 2012 6:49 Printer Name: To Come

6 Introduction to Healthcare Fraud

What does healthcare fraud look like from the provider’s perspective?The fraud schemes can vary from simple false claims to complex financialarrangements. The traditional scheme of submitting false claims for servicesnot rendered continues to be a problem. Manipulation of required “costsreports” for the Medicare program is a different type of behavior. Other ac-tivities, such as submitting duplicate claims or not acknowledging duplicatepayments, are issues as well.

Some schemes demonstrate great complexity and sophistication in theirunderstanding of payer systems. One example is the rent-a-patient scheme.The complexity of this scheme requires cooperating providers, both facilityand professionals, cooperating employees and work peers, and inside em-ployer and payer information. In this scheme the criminals pay “recruiters”to organize and recruit beneficiaries (employees who are insured) to visitclinics owned or operated by the criminals. For a fee, recruiters “rent,” or“broker,” the beneficiaries to the criminals. Recruiters in this type of schemeoften enlist beneficiaries at low-income housing projects, retired employees,or employment settings of low-income wage earners.

Detection of schemes involving the coordination of participation ofmultiple nontraditional parties is complicated when we miss critical re-lationships with one or more party. Overall, detecting complicated mis-representations that involve contractual arrangements with third parties orcost report manipulations submitted to government programs requires aniche expertise.

Sample Provider Employee Fraud Case

A woman who was affiliated with a medical facility had access toclaim forms and medical records. She submitted doctor claims for heartsurgery, gall bladder surgery, finger amputations, a hysterectomy, andmore—27 surgeries in all. The intent was to cash in on the checks forthe services. The high volume was an issue in of itself. The key anomalywas that if a patient has surgery, a corresponding hospital bill shouldhave been submitted and it was not.

What does healthcare fraud look like from the payer’s perspective? Thepublished fraud schemes in this group tend to be noted mostly in responseto transactions between the payer and a government plan sponsor. Civillitigation tends to be resolved in the context of nondisclosure agreements,so specific details of findings and resolutions are often not known. Thosethat are publically available tend to include misrepresentations of perfor-mance guarantees, not answering beneficiary questions on claims status,

Page 29: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-c01 JWBT664-Busch February 28, 2012 6:49 Printer Name: To Come

What Does Healthcare Fraud Look Like? 7

bad-faith claim transactions, and financial transactions that are not contrac-tually based. Other fraudulent activities include altering or reassigning thediagnosis or procedure codes submitted by the provider. Auditing payer ac-tivities requires a niche expertise in operational as well as contractual issuesfrom a plan sponsor and provider perspective.

Sample Payer Fraud Case

A third-party administrator (TPA) processing claims on behalf of Medi-care signed a corporate integrity agreement (CIA) with the Depart-ment of Justice (CIAs are discussed later in this book) in response toa number of allegations by providers that the TPA did the followingeight acts:

1. Failed to process claims according to coverage determinations2. Failed to process or pay physicians’ or other healthcare claims in a

timely fashion, or at all3. Applied incorrect payments for appropriate claims submissions4. Inaccurately reported claims processing data to the state, includ-

ing a failure to meet self-reporting requirements and impose self-assessment penalties as required under the managed care contractwith the state

5. Failed to provide coverage of home health services to qualifiedbeneficiaries

6. Automatically changed current procedural terminology (CPT) codes(used to explain the procedure provided)

7. Did not recognize modifiers (modifiers are additional codes thatproviders submit to explain the service provided)

8. Did not reliably respond to appeals from patients, sometimes notresponding at all or waiting over 6 to 12 months to do so

What does healthcare fraud look like from the employer’s perspec-tive? Schemes include underreporting the number of employees, employeeclassifications, and payroll information; failing to pay insurance premiums,which results in no coverage; creating infrastructures that make employeespay for coverage via payroll deductions; engaging in management activitiesthat discourage employees from seeking medical treatment; and referringemployees to a medical facility and in turn receiving compensation forthe referrals.

Page 30: P1: OTA/XYZ P2: ABCdownload.e-bookshelf.de/download/0000/5942/...P1: OTA/XYZ P2: ABC JWBT664-fm JWBT664-Busch March 2, 2012 13:53 Printer Name: To Come viii Contents CHAPTER 3 Continuum

P1: OTA/XYZ P2: ABCJWBT664-c01 JWBT664-Busch February 28, 2012 6:49 Printer Name: To Come

8 Introduction to Healthcare Fraud

Sample Employer Fraud Case

An employer who colludes with applicants to receive benefits illegallyor who commits fraud to avoid taxes will be penalized at least $500,and may also be prosecuted. Collusion is knowingly helping applicantsobtain benefits to which they are not entitled, for example, cash wagesor other hidden compensation for services performed. In other words,the employer misrepresents the eligibility of the applicant so that he orshe can receive benefits that he or she is not qualified for.

What does healthcare fraud look like from a vendor’s perspective? Thiscategory has numerous examples that involve a range of participants, fromprofessional healthcare subcontractors to suppliers of equipment, products,services, and pharmaceuticals. These schemes include false claims, claimsfor altered products, counterfeit medications, and unlicensed professionals.They include collusive behavior among several entities as well as betweenindividual professionals.

Three Sample Vendor Fraud Cases

A third party medical billing company, Emergency Physician BillingServices, Inc. (EPBS), provided coding, billing, and collections servicesfor emergency physician groups in over 100 emergency departmentsin as many as 33 states. Based on allegations presented by a qui tamrelator (whistleblower reporting a fraud), the United States charged thatEPBS and its principal owner, Dr. J. D. McKean, routinely billed federaland state healthcare programs for higher levels of treatment than wereprovided or supported by medical record documentation. EPBS waspaid based on a percentage of revenues either billed or recovered,depending on the client.

In a second case, a supply vendor delivered adult diapers, whichare not covered by Medicare, and improperly billed them as ex-pensive prosthetic devices called “female external urinary collectiondevices.”

In a third example of a vendor fraud case, an ambulance companybilled ambulance rides for trips to the mall.