Skip to main content
U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Audits, Inspections, and Evaluations

Report Number Title Sort descending Issue Date Fiscal Year
OIG-09-87  

>Status of Disaster Recovery Planning for Informatiojn Systems at the Nebraska Avenue Complex (Unclassified Summary)
2009
OIG-10-86  

>Stronger Security Controls Needed on Active Directory Systems
2010
OIG-05-04 Summary of Evaluation of DHS' Security Program for Its Intelligence Systems 2005
OIG-04-34 Summary of Evaluation of DHS' Security Program for Its Intelligence Systems 2005
OIG-06-56 Survey of DHS Data Mining Activities 2006
OIG-07-49 Survey of DHS Intelligence Collection and Dissemination (Unclassified Summary) 2007
OIG-04-13 Survey of the Information Analysis And Infrastructure Protection Directorate, February 2004 2004
OIG-10-21 Survey of the Number, Qualifications, and Training of DHS Personnel Responsible for Administering Recovery Act Contracts and Grants ( 2010
OIG-04-24 Survey of the Science and Technology Directorate, March 2004 2004
OIG-07-25 Technical Security Evaluation of DHS Activities at Dulles International Airport, Unclassified Summary, 2007
OIG-13-104 Our evaluation focused on how these components had implemented computer security technical, management, and operational controls at the airport and nearby locations. We performed onsite inspections of the areas where these assets were located, interviewed departmental staff, and conducted technical tests of internal controls. We also reviewed applicable policies, procedures, and other relevant documentation. The information technology security controls implemented at these sites have deficiencies that, if exploited, could result in the loss of confidentiality, integrity, and availability of the components’ respective information technology systems. For example, a technical control includes regularly scanning servers for vulnerabilities. However, not all departmental servers were being scanned for vulnerabilities.

>Technical Security Evaluation of DHS Activities at Hartsfield Jackson Atlanta International Airport
2013
OIG-07-44 Technical Security Evaluation of DHS Activities at Ronald Reagan Washington National Airport, Unclassified Summary, 2007
OIG-17-15 We determined that in most instances, Texas distributed and spent the awards in compliance with applicable laws and regulations; however, the State lacked adequate controls over more than $1 million in grant funds we reviewed.  This occurred because the Federal Emergency Management Agency and the State did not ensure adequate management and oversight of Homeland Security Grant Program funds.  We made three recommendations, which when implemented, should enhance Texas’ effectiveness in the overall use of the grant funds to improve preparedness and response capabilities.  Better management and oversight should also reduce the risk associated with the State’s management of grant funds.  FEMA concurred with all three recommendations.

>Texas Management of Homeland Security Grant Program Awards for Fiscal Years 2012-14
2017
OIG-14-05 Our audit was conducted in accordance with applicable Government Auditing Standards, 2011 revision. The audit was a performance audit, as defined by Chapter 2 of the Standards, and included a review and report on program activities with a compliance element. Although the audit report comments on costs claimed by the CNMI, we did not perform a financial audit, the purpose of which would be to render an opinion on CNMI’s financial statements, or the funds claimed in the Financial Status Reports submitted to the Department of Homeland Security.

>The Commonwealth of the Northern Mariana Islands’ Management of Homeland Security Grant Program Awards for Fiscal Years 2009 Through 2011 (Revised) (PDF, 34 pages - 1.36 MB) Spotlight
2014
OIG-07-33 The Department of Homeland Security's Role in Food Defense and Critical Infrastructure Protection 2007
OIG-09-65  

>The DHS Personnel Security Process
2009
OIG-11-67  

>The DHS Privacy Office Implementation of the Freedom of Information Act
2011
OIG-08-29 The DHS Process for Nominating Individuals to the Consolidated Terrorist Watchlist 2008
OIG-14-137 The Department of Homeland Security (DHS) Visa Security Program is intended to prevent terrorists, criminals, and other ineligible applicants from receiving visas. DHS assigns special agents with expertise in immigration law and counterterrorism to U.S. diplomatic posts overseas to perform visa security activities . We reviewed the program’s effectiveness in preventing ineligible applicants from receiving U.S. visas; DHS’ annual reporting to Congress on the program’s expansion; and the efforts to expand the program to additional overseas posts, including the potential impact of a new initiative, the Pre ‐ Adjudicated Threat Recognition and Intelligence OperationsTeam.

>The DHS Visa Security Program
2014
OIG-14-75 We contracted with the independent public accounting firm KPMG LLP (KPMG) to conduct the audit of the DHS’ FY 2013 financial statements and internal control over financial reporting. The contract required that KPMG perform its audit according to generally accepted government auditing standards and guidance from the Office of Management and Budget and the Government Accountability Office. KPMG isresponsible for the attached management letter dated January 15, 2014, and the conclusions expressed in it

>The Office of Financial Management’s Management Letter for FY 2013 DHS Financial Statements Audit
2014
OIG-13-116 As of July 2013, ICE had 39 MOAs in 19 States, a reduction from the 64 MOAs in 24 States during fiscal year 2012. As of January 2013, all Task Force Officer Models have been discontinued. ICE Enforcement and Removal Operations (ERO) maintains day-to-day supervision of the 287(g) program. Within the ICE Office of Professional Responsibility (OPR), the 287(g) Inspections Unit assesses the effectiveness of ICE field offices in supervising and supporting 287(g) programs, as well as ICE and LEA compliance with program policies and MOA requirements. The results of 287(g) inspection reviews provide ICE management with information on the administration of the program by local ICE offices and LEAs.

>The Performance of 287(g) Agreements FY 2013 Update
2013
OIG-12-116  

>The State of Arkansas’ Management of State Homeland Security Program Grants Awarded, During Fiscal Years 2008 Through 2010
2012
OIG-11-91  

>Update on DHS’ Procurement and Program Management Operations
2011
OIG-06-16 US-VISIT System Security Management Needs Strengthening (Redacted) 2006
OIG-11-101  

>Use of DHS Purchase Cards
2011
OIG-09-101  

>Vulnerabilities Highlight the Need for More Effective Web Security Management (Redacted)
2009