The Deceiver makes others believe something that is not true to dishonestly gain personal benefits.
This might involve:
- providing false statements
- deliberate misrepresentation of facts or circumstances
- withholding relevant information for personal gain.
- An individual misrepresents facts or circumstances to receive a welfare benefit.
- A vendor withholds relevant information to win a contract.
Routine checks of the Department of Defence credit card spending detected multiple incidents of Australian Defence Force (ADF) members using their Defence Travel Card for improper purposes.
Counter the Deceiver using measures that support honesty, integrity, information sharing and verification:
Use declarations or acknowledgments to both communicate and confirm that a person understands their obligations and the consequences for non-compliance. The declaration could be written or verbal, and should encourage compliance and deter fraud.
Have clear and specific eligibility requirements and only approve requests or claims that meet the criteria. This can include internal requests for staff access to systems or information.
Automatically match data with another internal or external source to obtain or verify relevant details or supporting evidence. This countermeasure is supported by the Office of the Australian Information Commissioner's Guidelines on data matching in Australian government administration.
Train and support staff to identify red flags to detect fraud, know what to do if they suspect fraud and know how to report it. Fraudsters can take advantage if staff and contractors are not aware of what constitutes fraud and corruption.
Reconcile records to make sure that two sets of records (usually the balances of two accounts) match. Reconciling records and accounts can detect if something is different from what is standard, normal, or expected, which may indicate fraud.
Conduct internal or external audits or reviews to evaluate the process, purpose and outcome of activities. Clients, public officials or contractors can take advantage of weaknesses in government programs and systems to commit fraud, act corruptly, and avoid exposure.
Fraud detection software programs automatically analyse data to detect what is different from what is standard, normal, or expected and may indicate fraud or corruption.