Investigative Priorities

Procurement Fraud and Public Corruption

Procurement Fraud and Public CorruptionProcurement fraud investigations continue to comprise a major part of the DCIS case inventory. Of all forms of white-collar crime, procurement fraud is probably the least visible, yet the most costly. Procurement fraud includes, but is not limited to, cost or labor mischarging, defective pricing, price fixing, bid rigging, and defective and counterfeit parts. The potential damage resulting from procurement fraud extends well beyond financial losses. This crime poses a serious threat to the ability of the Department to achieve its operational objectives and can have a negative effect on the implementation of programs. DCIS places the highest priority on investigations impacting safety and operational readiness to protect the welfare of warfighters throughout the procurement process.

Product Substitution

Product SubstitutionDCIS supports DoD and its warfighting mission through timely, comprehensive investigations of counterfeit, defective, or substandard products, and substituted products that do not conform with the requirements of the contract. Nonconforming products disrupt readiness and waste economic resources. They also threaten the safety of military and Government personnel and other end-users. When substituted products are deliberately provided to DoD, mission critical processes and capabilities can be severely impacted until those products are removed from the DoD supply chain.

DCIS works with Federal law enforcement partners, supply centers, and the defense industrial base to ensure that DoD contractors provide the correct parts and components to meet DoD requirements. DCIS actively participates in the Defense Supply Center - Columbus Counterfeit Material/Unauthorized Product Substitution Team and partners at the national level with the Intellectual Property Rights Coordination Center, to focus on preventing the proliferation of counterfeit parts. Pooling the member agencies' resources allows for more effective detection and removal of inferior goods that threaten the safety of America's soldiers, sailors, airmen, and Marines.

Health Care Fraud

Health Care FraudThe rising costs associated with healthcare continue to be a national concern. DCIS has experienced an increase in allegations of healthcare fraud, and combatting this crime is one of DoD IG's top investigative priorities. Of particular concern are allegations of potential harm to DoD military members and their dependents. In addition to patient harm, typical investigations scrutinize healthcare providers participating in corruption or kickback schemes, overcharging for medical goods and services, marketing of drugs for uses not approved by the U.S. Food and Drug Administration (FDA), and approving unauthorized individuals to receive TRICARE healthcare benefits. DCIS continues to proactively target healthcare fraud through coordination with other Federal agencies and participation in Federal and state task forces.

Illegal Technology Transfer

Illegal Technology TransferDCIS serves a vital role in national security through investigations of theft and illegal export or diversion of strategic technologies and U.S. Munitions List items to banned nations, criminal enterprises, and terrorist organizations. This includes the illegal transfer or theft of defense technology, weapon systems, and other sensitive components and programs. Consistent with its role in protecting America's warfighters, DCIS is an integral participant in the President's Export Control Reform Initiative. DCIS is also a charter member of the Export Enforcement Coordination Center, a multi-agency center established to serve as a focal point for the coordination and enhancement of government export enforcement efforts.

Computer Crimes

Computer CrimesDCIS investigates cybercrimes and computer network intrusions as well as provides digital exploitation and forensics services in support of traditional investigations. This includes and emphasis on crimes involving the compromise and theft of sensitive defense information contained in government and DoD contractor information systems. In addition, there is a particular focus on instances where contract fraud by DoD IT contractors has been a factor in either the penetration of DoD networks or the loss of DoD information.