{{item.title}}
{{item.text}}
{{item.text}}
The federal government has intensified its oversight of fraud, waste, and abuse (FWA) of public funds in recent months. Central to this effort is the FCA, the primary mechanism for recovering taxpayer money from organizations and individuals that defraud the government. FCA settlements and judgments exceeded $6.8 billion in the most recent fiscal year alone.
What’s changing? For starters, FCA enforcement has become more data-driven and coordinated. Federal agencies increasingly use advanced analytics and cross-agency task forces to identify suspicious patterns and anomalies. They’re also applying the law in new ways. As a result, inquiries move faster and reach further, focusing not only on traditional billing issues but also on representations tied to cybersecurity, procurement integrity, pricing, eligibility, and diversity, equity, and inclusion (DEI) conditions. The trend is clear: Enforcement is becoming more proactive, coordinated, and expansive.
For organizations that receive, administer, or otherwise touch government funds—whether through contracts, grants, loans, or federal and state-administered programs—this shift changes the risk equation. FCA exposure no longer sits solely within legal or compliance. Operational teams in groups such as IT, finance, HR, supply chain, and program management are often responsible for representations and certifications that can trigger liability. When documentation, data lineage, and control evidence are fragmented across functions, even routine agency inquiries can escalate quickly.
In this environment, defensibility requires transparency, documentation discipline, and control accuracy across the enterprise. Organizations should have a clear “evidence chain” behind each material representation, certification, and claim submitted to the federal government.
The scale of government outlays, coupled with the growing severity of FCA outcomes, underscores why this risk profile is now enterprise-wide, and why preparedness should extend across the overall funding life cycle.
The risk environment has shifted in four primary ways.
“The importance of enterprise-wide defensibility is matched only by the importance of enterprise-wide risk avoidance. To prevail in an FCA case, the government must demonstrate that a material, false claim was submitted to it knowingly. Knowledge, in this context, includes actual knowledge, deliberate indifference, and, most importantly, recklessness. To show recklessness, government investigators routinely focus on the robustness of the defendant’s compliance program. Accordingly, as with evidence chain defensibility, contractors should make FCA compliance an enterprise-wide endeavor, and not the sole province of their compliance and legal departments.”
Jonathan Aronie,Partner, Sheppard Mullin LLPIn many FCA matters, the most expensive failure mode is not the absence of a policy. Rather, it’s the inability to demonstrate a credible, repeatable, documented evidence trail showing that each material representation, certification, and claim was supported and defensible when made.
This means showing what was promised, who approved it, what data supported it, and how it was assessed at the time. That’s why FCA compliance has become an enterprise-execution and data-integrity problem, not solely a legal one.
Getting ahead of the curve requires having an organization-wide capability to answer the following questions.
“The most practical step organizations can take in the near term is to map their highest-risk, government-facing representations to actual evidence and ownership. For each major certification, whether in billing, cybersecurity, sourcing, or pricing, someone should be able to answer three questions quickly: What exactly did we say? What facts support it? And where will we go first if we’re asked to prove it tomorrow?”
Abigail Hazlett,Partner, Troutman Pepper Locke| Task force or initiative | What it targets | Why it matters for organizations |
|---|---|---|
| Task Force to Eliminate Fraud (White House/interagency) | FWA in federal benefit programs, including improper payments, ineligible beneficiaries, provider or retailer fraud, and organized or cross-program fraud schemes. | Reinforces that scrutiny is moving upstream. Organizations may face greater expectations to substantiate eligibility, controls, and supporting documentation before and after funds flow. |
| Health Care Fraud Strike Force/Medicare Fraud Strike Force (DOJ and HHS-OIG and partners) | Complex healthcare fraud schemes involving Medicare, Medicaid, and other federal health programs including large-scale network fraud. Uses data analytics and multi-agency investigations. | High-velocity investigations; focuses on substantiation of medical necessity, coding, arrangements, and documentation. Also signals avenues established to share data across organizations enabling for earlier and easier identification of potential FWA. |
| Procurement Collusion Strike Force (DOJ Antitrust and interagency partners) | Bid rigging, price fixing, market allocation, and related fraud in procurement, grants, and program funding. | Collusion and integrity issues can become fraud allegations when pricing, competition, or certifications are impacted. |
| COVID-19 Fraud Enforcement Task Force (DOJ) and pandemic-relief oversight (e.g., PRAC) | Fraud tied to pandemic-era relief programs and misuse of emergency funds; coordinated sweeps and data sharing. | Legacy relief portfolios still drive investigations, recoveries, and derivative controls expectations. |
| Civil Cyber-Fraud Initiative (DOJ) | Cybersecurity representations and required reporting tied to federal contracts and grants. | Misalignment between security practices and contractual representations can create FCA exposure; evidence of controls matters. |
| Civil Rights Fraud Initiative (DOJ) | Civil rights compliance tied to receipt of federal funds; focuses on false certifications or statements about compliance. | Compliance commitments may sit across HR, student affairs, operations, and program teams; documentation is critical. |
| Student aid anti-fraud efforts (Department of Education/Federal Student Aid and law enforcement partners) | Identity theft, “ghost student” schemes, and improper disbursements in federal student aid programs. | Institutions face heightened expectations for verification, reporting, and control execution; operational capacity is tested. |
| Financial crimes lens on program fraud (Treasury/FinCEN alerts; IRS task-force actions in Minnesota as an example) | Suspicious financial flows related to benefits and program fraud; laundering indicators and reporting expectations for financial institutions. | Program fraud can trigger anti-money laundering and financial reporting scrutiny in parallel; increases the cost of response and remediation. |
| Trade Fraud Task Force (DOJ and Homeland Security task force surrounding tariffs, country of origin, national security) | Targets knowingly false statements, certifications, or omissions made to evade tariffs, antidumping and countervailing duties, customs duties, or other trade restrictions—including misclassification, undervaluation, country-of-origin misrepresentation, and other schemes that result in the underpayment of amounts owed to the US government. | Increases whistleblower exposure, amplifying cross-agency investigative coordination and raising the stakes for importers through significant civil penalties and potential criminal scrutiny. |
Nearly every sector is affected by these enforcement trends, as demonstrated in the DOJ’s FY2025 False Claims Act Settlements and Judgments Fact Sheet.
In healthcare, enforcement continues to concentrate on high-volume reimbursement pathways, particularly Medicare Advantage risk adjustment and other areas where diagnosis support, clinical documentation, and third-party or vendor activity can materially affect payment. DOJ’s representative matters also reinforce ongoing focus on kickback-related allegations and reimbursement mechanics across life sciences and pharmacy channels, including dispensing and prescription integrity where documentation and controls should keep pace with scale. Increasing federal and state program integrity activity, particularly in Medicaid and managed care, raises the likelihood that billing anomalies, documentation gaps, or unsupported reimbursement practices will be identified and escalated into audit findings, payment recoveries, or FCA exposure.
“DOJ has been notably active in two areas within the pharmaceutical and life sciences sectors.”
“With respect to pharma companies, the DOJ appears to have a renewed focus on government price reporting and whether drug prices are inflated, manipulated, or otherwise misreported to government agencies. Drug makers, particularly those with costly drugs or therapies, should be mindful of the methodologies and materials used to support their price reporting obligations and also avoid any aggravating optics that they're ‘marketing the spread’ between the drug acquisition cost and the amount reimbursed by federal healthcare programs.”
“As for medical device companies, the DOJ has recently pursued a string of cases where the false claim was premised on manufacturing or other quality issues that rendered the devices substandard or defective in some way. Medtech firms should be mindful of how quality system regulation compliance now materially intersects with the FCA and the need for cross-functional collaboration when evaluating FCA compliance and the company's overall control environment.”
Jonathan Stevens,Partner, Paul Hastings, LLPOutside healthcare, DOJ matters show an expanding set of contract- and grant-related FCA allegations tied to procurement integrity, nonconforming goods or services, and false certifications. A clear theme is the growing overlap between FCA enforcement and cybersecurity requirements embedded in awards, where exposure often turns on alleged false certifications of compliance rather than an actual breach.
The DOJ also continues to pursue pandemic-relief matters where eligibility and attestation controls were weak, and it highlights trade and customs cases, such as tariff classification, valuation, and country-of-origin representations, where routine business processes can translate into FCA exposure when statements to the government are unsupported.
Looking forward, scrutiny is likely to remain elevated, particularly in high-volume healthcare reimbursement pathways where documentation, coding, and vendor activity can materially affect payment. At the same time, organizations should watch for FCA scrutiny expanding into representation-driven compliance areas, including cybersecurity requirements in contracts and grants, drug pricing and rebate reporting, DEI-related funding conditions, and trade or customs representations such as country of origin and valuation.
In this new era of FCA enforcement, traditional compliance approaches won’t suffice. Organizations should assess their exposure, prioritize the highest-risk public-funding touchpoints, and strengthen readiness, monitoring, and rapid-response capabilities. Data, analytics, and AI can support that work, but the goal is straightforward: know what you promised, monitor where risk is building, and be ready to respond with defensible evidence.
{{item.text}}
{{item.text}}