Skip to main content

The Coercer

The Coercer influences, manipulates or bribes another person to act in a desired way to dishonestly gain personal benefits.

This might involve negative incentives such as threats or intimidation, or positive incentives such as favour or monetary kickbacks.


  • A criminal organisation threatens public officials to win government contracts.
  • An individual intimidates another person to make them hand over personal or banking information to commit fraud.

Case studies

Two Commonwealth employees and an associate have been charged with conspiracy to defraud the Commonwealth and abuse of public office. Police allege that the trio used inside knowledge obtained in the course of their employment at the Department of Finance to direct IT contracts to ‘preferred suppliers.’ The trio then allegedly used kickbacks to buy and renovate properties. Police have frozen $7.8 million in assets as part of the investigation.

A man has been charged with allegedly assisting members of the public to fraudulently obtain Australian Government Disaster Recovery Payments that were intended to support victims of the NSW bushfires. Services Australia received a tip-off that the man was allegedly calling the hotline to claim payments on behalf of other people even though they were not adversely affected by the NSW bushfires. He would then receive payments or benefits in return. The man also allegedly threatened potential witnesses to the fraud.


Counter the Coercer using measures that support probity, information security, oversight and deterrence:

Limit and control functionality within systems with user permissions. Assign permissions to users based on specific business needs such as making high-risk functions limited to specialised users.

Separate duties by spreading tasks and associated privileges for a business process among multiple staff. This is very important in areas such as payroll, finance, procurement, contract management and human resources. Strong separation of duties controls are enforced by systems. It is also known as segregation of duties.

Conduct internal or external audits or reviews to evaluate the process, purpose and outcome of activities. Clients, public officials or contractors can take advantage of weaknesses in government programs and systems to commit fraud, act corruptly, and avoid exposure.

Was this page helpful?