Analytic Technology Industry Roundtable Fraud, Waste and Abuse

Similar documents
Using data mining to detect insurance fraud

Detecting and Preventing Fraud, Waste and Abuse: Using Analytics to Help Improve Revenue and Services

Better decision making under uncertain conditions using Monte Carlo Simulation

Using analytics to prevent fraud allows HDI to have a fast and real time approval for Claims. SAS Global Forum 2017 Rayani Melega, HDI Seguros

Get Smarter. Data Analytics in the Canadian Life Insurance Industry. Introduction. Highlights. Financial Services & Insurance White Paper

Decreasing Tax Fraud Using Validation. through Taxpayer Pattern Matching

FIGHTING AGAINST CRIME IN A DIGITAL WORLD DAVID HARTLEY DIRECTOR, SAS FRAUD & FINANCIAL CRIME BUSINESS UNIT

Predictive Modeling and Analytics for Health Care Provider Audits. Sixth National Medicare RAC Summit November 7, 2011

Real-time Driver Profiling & Risk Assessment for Usage-based Insurance with StreamAnalytix

Scotiabank. Enabling real-time credit analysis. Overview. IBM Software Business Analytics

White Paper. Demystifying Analytics. Proven Analytical Techniques and Best Practices for Insurers

IBM Financial Crimes Insight for Insurance

MUST BE ATTACHED TO A CLAIM JACKET VOUCHER FORM 15A OTHER AUTHORIZED COVER FORM OUT-OF-STATE Transp Per Diem Local Trans

Reduce exposure to claims fraud with integration of public records

AI Strategies in Insurance

A DECISION SUPPORT SYSTEM FOR HANDLING RISK MANAGEMENT IN CUSTOMER TRANSACTION

Submitting a Travel Authorization (TA) for a Student Group or Team Travel

EXECUTIVE SUMMARY. A systematic approach for combating enrollment fraud

Enterprise Fraud, Waste and Abuse Prevention and Detection:

RYE CITY SCHOOL DISTRICT RYE, NEW YORK PROCEDURES FOR REIMBURSEMENT FOR TRAVEL

The role of an actuary in a Policy Administration System implementation

E-Expenses Claimant Guidance Booklet

Increase Effectiveness in Combating VAT Carousels

Banking Title Application Fraud: The Enemy at the Gates

CA Clarity Project & Portfolio Manager

White Paper. Banking Application Fraud: The Enemy at the Gates. It is a fraud to borrow what we are unable to pay. Publilius Syrus, first century B.C.

Fundamentals of Machine Learning for Predictive Data Analytics

Automated Integrated Global Provision VERTEX TAX ACCOUNTING

Expense Reports and Payment Requests

Florida SkillsUSA Inc. Travel Manual for Official Business

INCREASING INVESTIGATOR EFFICIENCY USING NETWORK ANALYTICS

Article from The Modeling Platform. November 2017 Issue 6

Improving Tax Administration with Data Mining

Busting Fraud Rings with. Social Link Analysis

Expense Type Breakdown

Leveraging Innovative Technologies to Combat Health Care Fraud Kathy Mosbaugh, Director State Government Health Care NCSL Fall Forum 2011

MADERA COUNTY ADMINISTRATION

Enclosed is a copy of the decision resulting from the hearing held in the above-referenced matter.

Yield and. Protection. Anti-Fraud. Uncover insights you never thought were possible.

Expense Reports and Payment Requests

Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy

Investor Presentation. March 2017

TRAVEL LOG INSTRUCTIONS

APPENDIX K REIMBURSEMENT OF TRANSPORTATION, LODGING, MEALS, AND TRAVEL EXPENSES INCURRED BY KITSAP COUNTY OFFICERS, EMPLOYEES AND VOLUNTEERS POLICY

Identifying High Spend Consumers with Equifax Dimensions

Copyright 2015 by Sean Connolly

FRx FORECASTER FRx SOFTWARE CORPORATION

PLATTE CANYON WATER & SANITATION DISTRICT EXPENSE REIMBURSEMENT POLICY

Solution Brief. Trusting the transaction of things: IoT and blockchain intersect

CHAPTER TR - TRAVEL AND REIMBURSEMENT POLICY. Page. TR Purpose TR Authority TR Application... 1

FACULTY OF SCIENCE DEPARTMENT OF STATISTICS

IBM Cúram Evidence Broker Version Mapping logically equivalent evidence attributes IBM

Municipal Travel Policy (2008)

Data Analytics and Unstructured Data Actuaries 2.0

S-Corporation: EIN Name Date Incorporated Date of S-Election Address: Mailing Address Suite # City State Zip Code

Are you ready to be an Insurer of Things? How the Internet of Things is changing the rules of the game for insurers

Reimbursement of Staff Expenses

Curve fitting for calculating SCR under Solvency II

The Financial Platform Built for now DESKTOP WEB MOBILE

THE F FILES. Group benefits fraud what you need to know to fight fraud GET #FRAUDSMART

Insurance Program Benchmarking Methodology July 2015 Global Headquarters 1430 Broadway, 8th Floor New York, NY

TRAVEL REGULATIONS 2. TRAVEL BY INDIVIDUALS WHO ARE NOT STATE EMPLOYEES

State of New York Office of the State Comptroller Travel Manual. Prepared by: Division of Contracts and Expenditures Bureau of State Expenditures

Managing Rate Evasion: TransUnion Risk Verification Platform

TAA Scheduling. User s Guide

Overview. With the property & casualty solution from TCS BaNCS, your insurance firm can gain from:

Oracle Fusion Applications Asset Lifecycle Management, Assets Guide. 11g Release 6 (11.1.6) Part Number E

GLOSSARY HMIS STANDARD REPORTING TERMINOLOGY. A reference guide for methods of selecting clients and data used commonly in HMIS-generated reports

St. Johns County School District

FX Analytics. An Overview

Rules for Rules: Bringing Order and Efficiency to the Modern Insurance Enterprise ORACLE STRATEGY BRIEF FEBRUARY 2016

Reducing Fraud, Waste, and Abuse in Medicaid Managed Care. Senate Health and Human Services Hearing September 13 th, 2016

Quality Control & Compliance Initiative. This document is publicly available to any staff member on the following network path:

FINANCIAL STATEMENT FRAUD: DETAILED LOOK AT UNCOVERING CREATIVE ACCOUNTING FRAUD: P R E S E N T E D B Y : J O H N E K A D A H

emerchantview Service July 23, 2010

Enclosed is a copy of the decision resulting from the hearing held in the above-referenced matter.

Managing contractual obligations

CME Travel Procedures as of 11/2/2017. Department of Chemical & Materials Engineering College of Engineering University of Kentucky

Statistical Data Mining for Computational Financial Modeling

Staff Expenses Policy

POLICY & PROCEDURE DOCUMENT NUMBER: Finance & Administration. Travel Expense & Reimbursement Policy. DATE: January 1, 2011

Lenders using CreditXpert as an integral part

MEDICAID TRANSPORTATION PROGRAM POLICY REGARDING REIMBURSEMENT OF TRAVEL-RELATED EXPENSES

Zone 7 Board of Directors Compensation and Expense Reimbursement Policy

Shared: Budget. Setup Guide. Last Revised: April 13, Applies to these SAP Concur solutions:

Travel, Transportation Modes and Transportation-Related Expenses

FISCAL POLICIES and PROCEDURES

Reimbursement Guidelines

PERSONNEL POLICIES AND PROCEDURES Personnel Policy Adopted by Res.:

THE SCHOOL DISTRICT OF OSCEOLA COUNTY, FLORIDA

Revised. April Travel Policy

Enterprise Planning and Budgeting 9.0 Created on 2/4/2010 9:42:00 AM

All out-of-state travel for which reimbursement will be claimed shall be approved in advance by the Board.

Microsoft Forecaster. FRx Software Corporation - a Microsoft subsidiary

More details regarding the Program and the requirements of the anticipated contract can be found in the attached draft document.

Combating Refund Fraud: Recent Trends and Successful Prevention Techniques

Implementing the Expected Credit Loss model for receivables A case study for IFRS 9

T+2 Readiness Assessment. A Broadridge Professional Services Offering

White Paper. Basel III Liquidity Risk. Perspectives on the implementation challenges facing banks

BUDGET MANAGER BUDGET MANAGEMENT

Transcription:

Analytic Technology Industry Roundtable Fraud, Waste and Abuse 1. Introduction 1.1. Analytic Technology Industry Roundtable The Analytic Technology Industry Roundtable brings together analysis and analytic technology companies to address industry challenges and discuss topics of mutual interest and concern. The Roundtable also engages with the U.S. government on selected topics to foster greater industry government collaborations that can lead to better solutions. 1.2. Analytic Exchange A priority project for the Roundtable is the creation of an Analysis Exchange that Roundtable companies can use to interconnect their technologies and create demonstration capabilities against select U.S. government use cases. These demonstration capabilities can show the government how: Users can save time and money with a more interoperable, consistent, and repeatable model Products and systems can become more effective at meeting government needs and requirements The Analysis Exchange can break down the data silos that multiple analytic tools typically create Member companies can adopt consistent standards more quickly, saving them and the government time and money The Analysis Exchange can develop a set of common standards and protocols for the analysis and analytics community The Analysis Exchange can draw enriched products from the results of different companies' products

2. Use case: Fraud, Waste and Abuse 2.1. User Need: One use case selected by the Roundtable for collaboration in the Analysis Exchange was Fraud, Waste and Abuse. The specific application area chosen to highlight how the Analysis Exchange can be applied was Travel Voucher Fraud which is within a common government recognized highpriority area of loss known as improper payments. According to the U.S. Government Accountability Office: While improper payments estimates are not a measure of fraud, a lack of sufficient supporting documentation may mask the true causes of improper payments including fraud. When payments lack the appropriate supporting documentation, their validity cannot be determined. It is possible that these payments were for valid purposes, but it is also possible that the lack of documentation could conceal fraudulent activities. (GAO-17-631T, Report and testimony before the Committee on the Budget, U.S. Senate, May 2017) While the magnitude of loss from government travel voucher fraud is difficult to accurately measure, preventing and detecting certain improper payments is a significant cross-government challenge. 1 Below is a functional architectural flow of how our multi-vendor scenario maps to the user roles (i.e., Data Visualization, Geographical Application Development, Data Scientist/Analyst).

Figure 1: Functional fraud, waste, and abuse travel voucher user work stream flow. 2.2. Use case goal: This study provides a best practice approach for how front-end controls can leverage the Analysis Exchange and increase the likelihood of validating compliant beneficiary travel voucher behavior while alerting upon those that are non-compliant or possibly fraudulent. While some travel voucher improprieties are more difficult to discern than others (such as submitting mileage reimbursement when a claimant uses public transportation instead), our use case has been selected because of its alignment with data and commercial-off-the-shelf software (COTS) that likely is already in place within the IT and system s environment of most federal agencies. 3. Fraud, Waste and Abuse Working Group SAS, IBM, ESRI, Net Owl and Thomson Reuters are partnering in the Analysis Exchange to demonstrate how an integrated analytic system that efficiently applies commercially available

solutions can more efficiently assist in the validation and analysis of data and generate alerts from the data that prioritizes the risk of fraud. Figure 2: Analytic interaction with Analysis Exchange for the fraud, waste, and abuse use case. As indicated in the above Figure 2 diagram step 1, IBM created fictitious data that was based upon generic beneficiary claim information that is typical for the reimbursement of travel expenses. An example of the data elements (questions) can be found on the Department of Veterans Affairs Veteran/Beneficiary Claim for Reimbursement of Travel Expenses form https://www.va.gov/vaforms/medical/pdf/vha-10-3542-fill.pdf (Figure 3). SAS was used in step 1 for data-preparation steps which included the creation of computational variables that would then be used in the analysis of risk in step 5. While capture for travel expense reimbursement varies within the government, typical techniques are to capture in written format then read in with Optical Character Recognition (OCR) software, manually enter into an electronic data capture tool or directly capture the data through an electronic interface and store the data in data repository.

Figure 3: Example of a claim form for reimbursement of travel expenses (https://www.va.gov/vaforms/medical/pdf/vha-10-3542- fill.pdf). In Step 2 of Figure 2, Net Owl was used to extract the unstructured content and categorize information such as name, address, dates and other written comments. Below (Figure 4) is an example of a claim form question that might require written content.

Figure 4: Example content that can contain unstructured textual content on a claim form for reimbursement of travel expenses (https://www.va.gov/vaforms/medical/pdf/vha-10-3542-fill.pdf). In Step 3 of Figure 2, ESRI was used to identify address information and create measures of distance between beneficiary address and facility address. In Step 4 of Figure 2, Thomson Reuters provides an example of a 3 rd party data source that can be used to enrich the data with information about an individual to add validity to the beneficiary/claimant information or highlight a potential area of risk. Information such as a history of arrest, criminal records, bankruptcy or liens are some examples of what elements can be added to enrich the data. 4. Source Data and Data Preparation For the purposes of this exercise, IBM s fictitious data included the following data elements that simulated what would come from a travel voucher reimbursement claim and Net Owl s transformation of the unstructured content (note beneficiary and claimant are most often the same person but they can be different individuals): Beneficiary First Name Beneficiary Last Name Beneficiary Full Name Beneficiary Social Security Number Beneficiary Date of Birth Claimant First Name Claimant Last Name Claimant Full Name Claimant Social Security Number Claimant Date of Birth Location address where travel reimbursement is claiming travel reimbursement from Date trip began Mode of travel (e.g., car train, bus, taxi) Location address where travel reimbursement is claiming travel to Date trip ended Mode of travel (e.g., car, train, bus, taxi) Reimbursement of expenses other than mileage (tolls, parking, lodging, meals) Treating facility name Treating facility address

These data elements were mapped to the ontology during the adaptation initialization phase as depicted below in Figure 5. Because the design of the ontology is specific to a unique problem set, ontological elements were also created to align to other variables that were created from the data preparation or data pre-processing efforts using SAS, ESRI and Thomson Reuters. This framework supports the adaptation execution phase which positions the data ready for analytics as depicted below in Figure 5. Figure 5: Mapping and aligning the ontology to the source data and additional prepared data (data preparation-step A) so as to be ready for analysis (step B). SAS Data Preparation: The following computational variables were by SAS: Binary flags (0/1) to identify: o prior history of incorrect mileage reports filed by claimant o prior history of incorrect reimbursement claim amounts filed by claimant o use of known risky transportation service o history of not using closest facility o SSN and name do not match historical data o total expenses are above a certain threshold per mile Note, many of these computational variables imply the ability to examine historical data and keep track of information that may be relevant to potential risk at the level of an entity

(beneficiary/claimant/transportation service) over time. Other indicators could potentially be calculated that would further enhance the ability for analytical techniques to identify behavior. For example, data elements that identify contextual information associated with a claim but not captured in the claim form can often be useful when identifying anomalous behavior or events. Some of these include: Significant differences in claims made by personnel who traveled together or don t travel together but belong to the same peer group in terms of a shared zip code for their originating address with the same destination Submitting a higher portion of travel vouchers that do not have to be supported with a receipt as compared to their peers ESRI Data Preparation ESRI enhanced the data with geographic locational distance from location address where travel reimbursement is claiming travel reimbursement from to location address where travel reimbursement is claiming travel to. This distance in miles is used later in the analysis to crosscheck distance in miles as reported by the traveler. Thomson Reuters Data Enhancement Enhancements were further made from the validation information from our 3 rd party data provider, Thomson Reuters. The elements that were matched to our beneficiary/claimant were: History of criminal record History of arrest History of bankruptcy History of liens These values were completely fictitious and chosen since these type of historical indicators can often be probabilistic when predicting the likelihood of fraud. 5. Analytics: SAS Visual Statistics The data preparation effort in our multi-vendor system amounted to approximately 70% of overall effort. This is not uncommon in any process whereby data needs to become analytically ready prior to analysis. As described above, the Steps 1-4 in Figure 2 highlight the data preparation that took place prior to Step 5. During Steps 1-4 the Analysis Exchange was leveraged, both in terms of identifying the ontological map and hierarchy of the original data elements from the travel reimbursement claim form, as well as the computational data (SAS and ESRI) and enhanced data

elements (Thomson Reuters). The goal is to provide an example for how the Analysis Exchange can be leveraged to facilitate the collaboration across a multi-vendor system. Figure 6: Screen shots of SAS Visual Statistics. The analysis used SAS Visual Statistics to explore the prepared data, then interactively create and refine descriptive and predictive models. Scenarios for analysis included: Outlier detection using peer group analysis of expense estimates given same geographic location for traveling from and to same facilities of care Peer group type of care destination facility likelihood given to and from distances, contrasted with closest facility of care Probability of expense amounts given mileage distances (i.e., probability is low when mileage is low and much higher when mileage implies an overnight stay is required) Probability of expense amounts including meals, parking, tolls (based upon ESRI routing) Likelihood estimates of amount claimed given distance traveled Weighted estimates of risk given one or more indicators of risk from Thomson Reuter data enrichment Outlier detection using anomaly detection

The binary flags created during the data preparation were included as possible explanatory variables in the predictive modeling efforts (linear regression, logistic regression, generalized linear models and decision trees) as well as possible descriptive variables for anomaly detection (k-means clustering, scatter plots and peer group analysis). 6. System Demonstration: IBM i2 Analyst Notebook The system demonstrates how an analyst/fraud investigator can use the IBM i2 Analyst Notebook (ANB) link analysis capability to explore the travel voucher data set once it has been scored by SAS. The Analysis Exchange exports the SAS data in a CSV file that can be used with the standard ANB import capability. 6.1. Import the Sample Data

Figure 7 ANB Import Specification The ANB Import specification shown in 7 above maps the columns in the CSV import into a series of entities and links in an ANB chart. For the purpose of this demonstration, only a subset of the data was imported, most significantly: toll_likelihood : assigned to the claim entity and the link to the beneficiary entity, indicating the probability that an excessive amount of tolls were claimed BT_Dashboard_flag : assigned to the beneficiary entity and the link to the origin address entity on the trip to the care center, indicating that a nearer facility could have been bypassed SSN_name_nomatch : assigned to the beneficiary entity and the link to the SSN entity, indicating that the social security number did not match previous history 7. Results The ANB initial view of the network can be seen below in Figure 8. A network diagram provides a visualization technique to understand the relationships and context of high risk behavior as identified by SAS analytical techniques.

Figure 8 ANB initial network view ANB conditional formatting was used to emphasize network links, SSNs or individuals receiving travel voucher reimbursement with the following high-risk behaviors: Highlighted trips in purple that bypassed nearer treatment facilities Highlighted trips in orange that had unexpected tolls Highlighted individuals with suspect SSNS in brown Further drill down allows for further scrutiny of high-risk behaviors as depicted in Figure 9.

Figure 9 ANB heat map of analytical risk categories and individual drill-down of suspicious SSN In Figure 9, individuals all using same SSN are identified with a significant amount of suspect tolls and an increased likelihood of bypassing nearer facilities. The heat map in the upper right identifies count and risk of individuals with SSN linked to more than one person. The final view, as seen below in Figure 10, incorporated additional links and entities related to suspect SSNS, providing the analyst/investigator with a larger picture of the context of risk.

Figure 10 ANB relationships identifying 8. Conclusion As government is looking to leverage the Analysis Exchange, there are two lessons-learned that are important to highlight from the vendor perspective. The first is, while vendor software can be used to build to the Analysis Exchange framework using REST services or vendor developed specialized adaptors, there is immense value in the ability for vendor software to plug and play in ways that promote compatibility/interoperability and rapid deployment/usability through message transfer content specified by the Analysis Exchange Ontology. This idea of multi-vendor interoperability is depicted below within the context of an Analytic Lifecycle. Figure 10 A perspective of an Analytics Lifecycle with the Analysis Exchange points of intersection At each junction in the lifecycle, as one moves from data discovery to exploitation there is an opportunity to leverage commercial off-the-shelf software and render elements of compatibility through the Analysis Exchange represented with by a symbol. The second lesson is, while the structure of the Analysis Exchange Ontology can be reused across multiple vendors and architectures, there is an initial level of effort required to map the ontology to the problem set (the ask as depicted in Figure 10) and the available data so that the adapters can correctly interface to the data and the decision support software.

Ultimately, leveraging the Analysis Exchange will help agencies deliver programs efficiently, effectively, and with integrity. 9. References 1 MITRE Technical Report, Document Number MTR160040. (2016). GOVERNMENT-WIDE PAYMENT INTEGRITY: NEW APPROACHES AND SOLUTIONS NEEDED, https://www.mitre.org/sites/default/files/publications/pr_16-0123-government-wide-paymentintegrity.pdf IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at Copyright and trademark information at www.ibm.com/legal/copytrade.shtml. Some content Copyright 2018 SAS Institute Inc., Cary, NC, USA. All Rights Reserved. SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. indicates USA registration. Other brand and product names are trademarks of their respective companies.