Public Accountability7 min read

Public Money, Private Relationships: How Procurement Fraud Actually Works

Nobody wakes up and decides to commit procurement fraud. It starts with a favor. A familiar name on a bid list. A contract that's just small enough to skip the extra layer of review. And then it becomes a pattern nobody wants to interrupt.

Nobody wakes up and decides to commit procurement fraud.

That's not how it works. Nobody walks into a government office, cracks their knuckles, and goes "today's the day I funnel public money to someone I'm sleeping with." It's quieter than that. More banal. It starts with a favor. A familiar name on a bid list. A contract that's just small enough to fly under the approval threshold. And then it becomes a pattern nobody wants to interrupt because interrupting it means admitting they let it happen in the first place.

I didn't learn this from a textbook. I learned it from pulling public records and watching the documents contradict themselves.


The Anatomy of a Quiet Grift

Public procurement is supposed to be competitive. Agency identifies a need, issues a solicitation, evaluates bids on merit, awards to the best vendor at the best price. That's the brochure version.

The real version: someone inside the agency has a relationship with someone submitting bids. Doesn't have to be a spouse — boyfriend, old friend, business partner, someone they met at a conference and now text at 11pm. The relationship creates an information asymmetry that turns "competitive bidding" into theater. The insider knows what the agency will prioritize before the solicitation drops. Knows the budget range. Knows the evaluation criteria. The connected vendor uses that information to craft a bid that lands like it was written by someone who already had the answer key. Because they did.

The bid comes in dead-on to internal estimates. The scope of work reads like it was ghostwritten by the person who'll approve it. The pricing is competitive enough to survive a cursory glance but generous enough to be wildly profitable.

And nobody asks questions. Because asking questions means admitting something is wrong. And admitting something is wrong means paperwork, investigations, HR, board meetings, and the creeping realization that the person two offices down — the one everyone likes, the one who's been there for years — has been running a scheme the entire time.

So nobody asks. And the money keeps moving.


How Small Contracts Become Big Problems

The first one is always small. $30K, maybe $50K. Safely below whatever threshold requires director-level or CEO-level sign-off. Procurement processes it without a second look because it looks like every other small contract that crosses their desk.

But small contracts have a way of metastasizing.

Amendment #1 extends the timeline. Amendment #2 adds scope. Amendment #3 bumps the not-to-exceed. Each amendment is individually defensible — there's always a business justification, always a reason the work grew. "Unforeseen complexities." "Evolving requirements." "Additional deliverables identified during Phase 1."

Zoom out and you're looking at a vendor whose contract has tripled in value without ever being rebid. A vendor who keeps getting work not because they're the best but because they're already there, already embedded, already past the procurement gatekeepers who might have asked uncomfortable questions if this had gone out for competitive bid.

And through all of this, there are conflict of interest certifications. Forms that vendors sign under penalty of perjury swearing no conflict exists. They're checkbox exercises. The vendor signs, the procurement officer files it, and nobody — nobody — verifies whether the answer is true.

The form exists so the agency can say it has a process. The process exists so the agency can say it has oversight. The oversight exists on paper and absolutely nowhere else.

What Happens When Someone Notices

Here's where it gets interesting. Not the fraud itself — the fraud is boring. Money moves from public coffers to a connected vendor through a series of defensible-looking transactions. Invoices get rubber-stamped. Amendments get signed. It's accounting with a secret.

What's interesting is what happens when someone sees the pattern.

Agencies don't respond to procurement fraud allegations by launching investigations. They respond by launching containment operations. The institutional immune system doesn't attack the disease — it attacks the person who diagnosed it.

First move: reclassify the person asking questions. They're not a concerned citizen or a whistleblower. They're a threat. A security concern. Once that label sticks, everything they do gets filtered through a threat framework instead of a transparency framework. Their records requests get routed to legal instead of the records officer. Their emails get flagged. Their motives get dissected in meetings they'll never know about.

Second move: document management. Not document destruction — that's too obvious and too prosecutable (usually). Document management. Metadata gets cleaned. Files get regenerated with fresh timestamps. Meeting notes materialize for meetings that may not have happened. The paper trail gets reinforced where it was thin and sanitized where it was damning.

Third move: lawyer up. Outside counsel gets hired. Litigation holds get issued. The message to employees is clear without anyone having to say it explicitly: don't talk about this. Don't write about this. Don't respond to anyone asking about this. The wagons circle, and if you're inside the circle, you stay quiet. If you're outside the circle, you're the enemy.

By the time the public gets involved — if the public gets involved — the narrative is set. The agency has its story. The documents support the story. And the person who asked the original question is standing outside the circle wondering why everyone's looking at them like they're the problem.

Why Nobody Fixes It

The incentives are backwards. Every single person in the chain has a reason to look the other way.

The vendor keeps the arrangement going — it's guaranteed revenue with minimal competition. The insider protects the vendor — the personal relationship depends on it. Agency leadership looks the other way — discovering the fraud means admitting they failed to prevent it, which means board scrutiny, media attention, and potential personal liability for everyone who signed off on those amendments.

The only people with an incentive to expose it are the ones with the least institutional power: competing vendors who lost contracts they should have won, taxpayers who don't even know their money is being funneled through a rigged system, and the occasional stubborn asshole who stumbles into the pattern and decides they can't un-see it.

Washington State has tools for this. The Public Records Act — RCW 42.56 — gives anyone the right to request documents from public agencies. Federal transit agencies that receive FTA funding are subject to procurement integrity requirements. False Claims Act provisions create liability for fraudulent certifications.

But tools only work if someone picks them up. And picking them up means accepting that you'll spend months — years — pulling documents, cross-referencing timelines, reading metadata, filing appeals, and getting treated like a paranoid nuisance by the same institutions that are supposed to serve you.

Ask me how I know.


What To Actually Look For

If you ever feel like taking a peek at whether your local transit agency or public works department has a procurement hygiene problem, here's your starter kit:

A vendor whose contract value has ballooned through amendments without ever being competitively rebid. An employee whose partner, spouse, or close associate holds vendor contracts with the same agency. Conflict of interest certifications that were signed but never verified — and never will be, because the verification process doesn't exist. Contract documents with metadata that doesn't match the agency's standard systems. A vendor who survives leadership changes, reorganizations, and even formal reviews without ever losing their spot.

None of these alone prove fraud. But together they draw a picture. And once you see the picture, you can't un-see it. Trust me on that.

Public money is supposed to serve the public. When it's serving someone's boyfriend instead, the only thing that fixes it is someone stubborn enough to read the documents and honest enough to say what they found.

Love that for accountability.