Posts in Fraud and Abuse.
Blogs
Clock 3 minute read

In its recent unpublished decision, United States ex rel. Stebbins v. Maraposa Surgical Inc., 2024 WL 4947274 (3d Cir. Dec. 3, 2024), the Third Circuit clarified that the public disclosure bar prevents whistleblower False Claims Act (FCA) qui tam actions arising from information gathered solely through publicly accessible databases.

As the Third Circuit explained, “[t]he FCA punishes the submission to the Government of fraudulent claims for payment under, for example, the Medicare and Medicaid programs.”  Id. at *1.  While the FCA encourages individuals, known as relators, to report government-related fraud by way of filing a qui tam suit, the public disclosure bar prevents a relator from bringing an FCA qui tam suit “if substantially the same allegations or transactions as alleged in the action or claim were publicly disclosed” in a “Federal report” or “from the news media” unless the relator is “an original source of the information.” 31 U.S.C. § 3730(e)(4)(A).  In the Third Circuit, “the public disclosure bar applies if either Z (fraud) or both X (misrepresented facts) and Y (true facts) are publicly disclosed by way of a listed source.” Stebbins, 2024 WL 4947274, at *2 (quoting U.S. ex rel. Zizic v. Q2Administrators, LLC, 728 F.3d 228, 236 (3d Cir. 2013)). 

In United States ex rel. Stebbins v. Maraposa Surgical Inc. et al., despite having no affiliation whatsoever with the defendants, the relator filed a qui tam action alleging, inter alia, that the defendants fraudulently sought reimbursement for the arteriograms performed in a physician’s office, rather than a licensed ambulatory surgery center, which the relator asserted violates Pennsylvania’s regulations.  Without deciding whether the defendants actually engaged in any wrongdoing, the Third Circuit held that the public disclosure bar prohibited the relator from proceeding with suit because the relator drew each piece of information supporting his FCA allegations from publicly disclosed databases.

Blogs
Clock 2 minute read

On August 22, 2024, the United States Department of Justice (“DOJ”) filed a complaint-in-intervention in a whistleblower lawsuit brought against Georgia Institute of Technology (“Georgia Tech”) and Georgia Tech Research Corporation (“GTRC”) asserting claims under the False Claims Act (“FCA”) and federal common law based on allegations that Georgia Tech and GTRC failed to meet cybersecurity requirements mandated by U.S. Department of Defense (“DoD”) contracts and DoD regulations.

In United States ex rel. Craig v. Georgia Tech Research Corp, et al., which is pending in the United States District Court for the Northern District of Georgia, the DOJ alleges that, from as early as May 2019, Georgia Tech and GTRC, an affiliate of Georgia Tech that contracts with government agencies for work to be performed at Georgia Tech, failed to enforce cybersecurity regulations in order to allegedly “accommodate ‘researchers [who were] pushing back’ on cybersecurity compliance because they found it burdensome.” The complaint-in-intervention further alleges that, until at least February 2020, “Georgia Tech failed to enforce basic cybersecurity at the Astrolavos Lab” despite the lab possessing “nonpublic and sensitive DoD information.” It is also alleged that, even after Astrolavos Lab implemented a system security plan, Georgia Tech and GTRC “failed to: (1) assess the system on which the Astrolavos Lab processed, stored or transmitted sensitive DoD data using DoD’s prescribed assessment methodology; and (2) provide to DoD an accurate summary level score for Astrolavos Lab to demonstrate the state of the lab’s compliance with applicable cybersecurity regulations.” The submission of a summary level score is a “condition of contract” for most DoD contracts.

Blogs
Clock 5 minute read

The widespread availability of Artificial Intelligence (AI) tools has enabled the growing use of “deepfakes,” whereby the human voice and likeness can be replicated seamlessly such that impersonations are impossible to detect with the naked eye (or ear). These deepfakes pose substantial new risks for commercial organizations. For example, deepfakes can threaten an organization’s brand, impersonate leaders and financial officers, and enable access to networks, communications, and sensitive information.

In 2023, the National Security Agency (NSA), Federal Bureau of Investigations (FBI), and Cybersecurity and Infrastructure Security Agency (CISA) released a Cybersecurity Information Sheet (the “Joint CSI”) entitled “Contextualizing Deepfake Threats to Organizations,” which outlines the risks to organizations posed by deepfakes and recommends steps that organizations, including national critical infrastructure companies (such as financial services, energy, healthcare and manufacturing organizations), can take to protect themselves. Loosely defining deepfakes as “multimedia that have either been created (fully synthetic) or edited (partially synthetic) using some form of machine/deep learning (artificial intelligence),” the Joint CSI cautioned that the “market is now flooded with free, easily accessible tools” such that “fakes can be produced in a fraction of the time with limited or no technical expertise.” Thus, deepfake perpetrators could be mere amateur mischief makers or savvy, experienced cybercriminals. 

Blogs
Clock 3 minute read

Since the pandemic, COVID-19-related fraud has been a consistent target of the Department of Justice. The creation of the DOJ’s COVID-19 Enforcement Task Force in May 2021 marked the start of DOJ’s commitment to combatting COVID-19-related fraud. Since then, according to the Task Force’s 2024 Report, published in April of this year, the Task Force has charged over 3,500 defendants with federal crimes related to Covid-19 fraud, recovered more than $1.4 billion in stolen funds and reached over 400 civil settlements and judgments.

Most of these matters involved unemployment insurance (“UI”) benefits fraud, Paycheck Protection Program fraud (“PPP”), and Economic Injury Disaster Loan (“EIDL”) fraud , but other types of CARES Act fraud and health care fraud related to the COVID-19 pandemic were also charged. The quantum of fraud losses associated with these cases was reported to be over $2.1 billion.

Most recently, on August 8, 2024, the DOJ issued  a press release announcing that West Coast Dental Administrative Services LLC, operating a network of dental offices in Southern California, along with its founders and former owners, agreed to pay $6.3 million to resolve allegations that they knowingly violated the False Claims Act (“FCA”) in connection with seven improper loans that the company and its affiliated dental offices received under the PPP. Additionally, an unrelated real estate holdings company owned by one of the founders agreed to pay an additional $35,149.82 to resolve its potential liability under the FCA in connection with a separate PPP loan.

Blogs
Clock 19 minute read

On June 27, 2024, the U.S. Department of Justice (“DOJ”) and the U.S. Department of Health and Human Services, Office of Inspector General (“HHS-OIG”), along with other federal and state law enforcement partners, announced the annual National Health Care Fraud Enforcement Action using criminal enforcement to target a wide variety of alleged health care fraud schemes.

What Has Stayed the Same and What Has Changed?

Similar to last year’s all-encompassing “takedown,” this year’s enforcement action charged defendants with schemes related to telemedicine and laboratory fraud; diversion of controlled substances (HIV medications and prescription stimulants); addiction treatment schemes; opioids and other familiar types of health care fraud (such as home health, DME and kickbacks).  However, the “headline” this year was a $900 million case in Arizona involving medically unnecessary amniotic wound grafts.

The 2024 enforcement action charged 193 defendants who allegedly have committed over $2.75 billion in fraud. The cases were brought by 32 different U.S. Attorneys’ Offices and 11 State Attorney Generals’ Offices. Although the dollar figure at issue is slightly higher than the 2023 enforcement action, the number of defendants is strikingly higher, with almost two and a half times as many defendants charged. Similarly, the cases were brought in almost twice as many federal districts as last year, suggesting that the Fraud Section is building more partnerships with U.S. Attorney’s Offices nationwide.  

Blogs
Clock 27 minute read

New episode of our podcast, Speaking of LitigationFBI! Open up! Is your organization prepared to handle a government investigation?

Guilty or not, having a preparedness plan in place for when a government agency comes knocking is just as important as conducting a company fire drill.

In this episode of Speaking of Litigation, Epstein Becker Green litigators Alkida KacaniGeorge Breen, and Eric Moran discuss a few of the most common (and invasive) legal maneuvers government investigators may take when approaching a company or its employees.

When dealing with civil ...

Blogs
Clock 8 minute read

On June 28, 2023, the U.S. Department of Justice (“DOJ”) and the U.S. Department of Health and Human Services, Office of Inspector General (“HHS-OIG”), along with other federal and state law enforcement partners, announced a nationwide health care fraud enforcement action targeting a variety of alleged health care fraud schemes. As has been the case over the last few years, DOJ and HHS-OIG have moved away from categorizing the enforcement action as a “takedown”. The government has not explained the naming change, but one explanation is that it is no longer properly considered a true “takedown” because the enforcement activity (charges, arrests) occurs over many weeks leading up to the day it is announced.  

Blogs
Clock 2 minute read

In September 2020, the U.S. Department of Justice (“DOJ”) and the U.S. Department of Health and Human Services (“HHS”) Office of Inspector General (“OIG”) announced its annual healthcare-related “takedown.” The takedown, which involved enforcement actions that actually occurred over numerous months preceding the press event (and as such, the reference to a “takedown” is a misnomer”) targeted alleged schemes that related to opioid distribution, substance abuse treatment facilities (“sober homes”), and telehealth providers, the latter of ...

Blogs
Clock less than a minute

We are pleased to present Commercial Litigation Update, the newest blog from law firm Epstein Becker Green (EBG), which will offer engaging content about emerging trends and important developments in commercial and business litigation.

Commercial Litigation Update will feature thought leadership from EBG litigation attorneys and provide insightful and practical commentary and analysis on a wide range of timely litigation issues that affect businesses. Areas of interest will include trends and developments in antitrust, contract, defamation and product disparagement ...

Blogs
Clock 3 minute read

On August 20, 2019, the Securities and Exchange Commission (“SEC”) charged Mosaic Capital, LLC, formerly known as AOC Securities, LLC (“AOC”), and its CEO with failing to adequately supervise an employee who engaged in securities fraud. Pursuant to the SEC Orders, AOC and its CEO were ordered to pay penalties of $250,000 and $40,000, respectively. The SEC’s actions serve as a reminder to broker-dealers—and members of firm management—of the potential for liability based on the actions of a self-dealing employee, and the need to guard against such activities.

The ...

Search This Blog

Blog Editors

Recent Updates

Related Services

Topics

Archives

Jump to Page

Subscribe

Sign up to receive an email notification when new Commercial Litigation Update posts are published:

Privacy Preference Center

When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.