Red Cross uncovers $6-million fraud during Ebola crisis

Members of the Guinean Red Cross carry the body of a person who died from the Ebola virus on March 8, 2015 at the Donka hospital in Conakry. More than 9,700 people have died of the disease since the west African epidemic emerged in southern Guinea in December 2013, with nearly 24,000 people infected, according to the World Health Organization. AFP PHOTO / CELLOU BINANI / AFP PHOTO / CELLOU BINANI

The Red Cross has uncovered several cases of fraud by officials during efforts to combat the Ebola outbreak that struck West Africa in 2014-2016, estimating losses of $6-million (5.2 million euros). In a statement, the Geneva-based International Federation of Red Cross and Red Crescent Societies (IFRC) said it was “outraged”, and said it would “ensure any staff involved are held to account.”

The Ebola virus killed more than 11,300 people and infected an estimated 29,000, mainly in Guinea, Sierra Leone and Liberia.

The IFRC said the operations set up to contain the outbreak “were among the most complex in recent humanitarian history,” with several groups moving quickly to deploy staff and mobilize volunteers, and spending tens of millions of dollars on medical equipment and other supplies.

In Sierra Leone, it said it had found evidence of “likely collusion” between former IFRC employees and a bank, leading to a potential loss of $2.1-million. Over billing and fake invoices by a provider of customs clearance services in Guinea cost the organization $1.2 million, and two other investigations in the country are under way.

The IFRC also said it had previously found that in Liberia, inflated prices for relief items and payroll costs had cost it $2.7 million. The organization said it was “committed to holding all those involved in any form of fraud to account, and to reclaiming all misappropriated, diverted, or otherwise illegally taken funds.”

It also said that since 2014 it has bolstered efforts to root out corruption in its operations, including cash spending limits in “high-risk settings” and deploying trained auditors when sending out teams.


Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.