Skip to main content
U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Audits, Inspections, and Evaluations

Report Number Title Issue Date Fiscal Year Sort descending
OIG-19-46 According to CBP statistics, the number of southwest border migrant apprehensions during the first seven months of FY 2019 has in general already surpassed that of the total apprehensions for each of the previous four fiscal years. At the sector level, El Paso has experienced the sharpest increase in apprehensions when comparing the first seven months of FY 2019 to the same period in FY 2018. The purpose  is to notify you of urgent issues that require immediate attention and action. Specifically, we are recommending that the Department of Homeland Security (DHS) take immediate steps to alleviate dangerous overcrowding at the El Paso Del Norte Processing Center (PDT).

>Management Alert - DHS Needs to Address Dangerous Overcrowding Among Single Adults at El Paso Del Norte Processing Center
2019
OIG-19-29 The Office of National Drug Control Policy’s (ONDCP) Circular, Accounting of Drug Control Funding and Performance Summary, requires each National Drug Control Program agency to submit to the ONDCP Director a detailed accounting of all funds expended for National Drug Control Program activities during the previous fiscal year. CBP’s management was unable to provide supporting documentation for the drug control methodology used to estimate the percentages of obligations allocated between interdiction and intelligence. These percentages are used to derive the dollar-value of obligations reported as Drug Resources by Budget Decision Unit and Drug Control Function in the Table of FY 2018 Drug Control Obligations presented in CBP’s Detailed Accounting Submission.

>Review of U.S. Customs and Border Protection's Fiscal Year 2018 Detailed Accounting Submission for Drug Control Funds
2019
OIG-19-43 The Department of Homeland Security did not comply with the Improper Payments Elimination and Recovery Act of 2010 (IPERA) because the Department did not meet two of the six requirements. Specifically, the Department omitted the percent of recaptured amounts from the Other Information section in its Agency Financial Report and did not meet its annual reduction target established for one of eight programs deemed susceptible to significant improper payments.The Department also did not comply with Executive Order 13520, Reducing Improper Payments, because DHS did not make available to the public its Quarterly High-Dollar Overpayment report for the second quarter of fiscal year 2018.

>Department of Homeland Security's FY 2018 Compliance with the Improper Payments Elimination and Recovery Act of 2010 and Executive Order 13520, Reducing Improper Payments
2019
OIG-19-27 The Office of National Drug Control Policy’s (ONDCP) Circular, Accounting of Drug Control Funding and Performance Summary, requires each National Drug Control Program agency to submit to ONDCP Director a detailed accounting of all funds expended for National Drug Control Program activities during the previous fiscal year. Williams Adley & Company – DC, LLP (Williams Adley), under contract with the Department of Homeland Security OIG, issued an Independent Accountant’s Report on U.S. Coast Guard’s (Coast Guard) fiscal year (FY) 2018 Drug Control Performance Summary Report.

>Review of U.S. Coast Guard's Fiscal Year 2018 Drug Control Performance Summary Report
2019
OIG-19-42 DHS expanded the Insider Threat Program from monitoring user activity on its classified networks to monitoring cleared and non-cleared employees’ activity on unclassified networks. We initiated a project to determine Insider Threat Program progress in monitoring, detecting, and responding to malicious insider threats on unclassified DHS systems and networks. Before continuing its planned expansion of the Insider Threat Program, DHS needs to address several deficiencies that may hinder program effectiveness and efficiency. Although the expanded program was approved in January 2017, the Office of the Chief Security Officer has yet to revise, obtain approval for, and reissue required documentation.

>DHS Needs to Address Oversight and Program Deficiencies before Expanding the Insider Threat Program
2019
OIG-19-26 The Office of National Drug Control Policy’s (ONDCP) Circular, Accounting of Drug Control Funding and Performance Summary, requires each National Drug Control Program agency to submit to ONDCP Director a detailed accounting of all funds expended for National Drug Control Program activities during the previous fiscal year. Williams, Adley & Company – DC, LLP (Williams Adley), under contract with the Department of Homeland Security OIG, issued an Independent Accountant’s Report on U.S. Customs and Border Protection’s (CBP) FY 2018 Drug Control Performance Summary Report. 

>Review of U.S. Customs and Border Protection's Fiscal Year 2018 Drug Control Performance Summary Report
2019
OIG-19-39 This report presents the results of KPMG LLP’s (KPMG) work conducted to address the performance audit objectives relative to the Audit of Department of Homeland Security’s Fiscal Year 2017 Conference Spending. KPMG performed the work during the period of September 18, 2017 to August 30, 2018, and our scope period for testing was October 1, 2016 through September 30, 2017. KPMG LLP (KPMG) found that DHS management has policies and procedures over conference spending and reporting, improvements are needed. KMPG made seven recommendations to improve conference spending reporting.

>Audit of Department of Homeland Security's Fiscal Year 2017 Conference Spending
2019
OIG-19-25 Review of U.S. Immigration and Customs Enforcement's Fiscal Year 2018 Detailed Accounting Submission for Drug Control Funds 2019
OIG-19-41 Special Report: Review Regarding DHS OIG's Retraction of Thirteen Reports Evaluating FEMA's Initial Response to Disasters 2019
OIG-19-24 Prompted by the suspicious cyber activities on election systems in 2016, Secretary Jeh Johnson designated the election infrastructure as a subsector to one of the Nation’s existing critical sectors. Our audit objective was to evaluate the effectiveness of the Department’s efforts to coordinate with states on securing the Nation’s election infrastructure. DHS has taken some steps to mitigate risks to the Nation’s election infrastructure; however, improved planning, more staff, and clearer guidance could better facilitate the Department’s coordination with state and local officials. Specifically, despite Federal requirements, DHS has not completed the plans and strategies critical to identifying emerging threats and mitigation activities, or established metrics to measure progress in securing the election infrastructure. Senior leadership turnover and insufficient guidance and administrative staff have hindered DHS’ ability to accomplish such planning.

>Progress Made, But Additional Efforts are Needed to Secure the Election Infrastructure
2019
OIG-19-40 Data Quality Improvements Needed to Track Adjudicative Decisions 2019
OIG-19-23 Within U.S. Customs and Border Protection (CBP), Border Patrol agents are responsible for patrolling our international land borders and coastal waters surrounding Florida and Puerto Rico. We conducted this audit to determine to what extent Border Patrol agents meet workload requirements related to investigative and law enforcement activities. Border Patrol needs to manage its workforce more efficiently, effectively, and economically. CBP and Border Patrol must expedite the development and implementation of a workforce staffing model for Border Patrol as required by Congress. Without a complete workforce staffing model, Border Patrol senior managers are unable to definitively determine the operational needs for, or best placement of, the 5,000 additional agents DHS was directed to hire per the January 2017 Executive Order.

>Border Patrol Needs a Staffing Model to Better Plan for Hiring More Agents
2019
OIG-19-21 The objective was to determine whether TSA implemented proper procedures to safeguard the secure areas of our Nation’s airports and whether airports, aircraft operators, and contractors were complying with TSA’s security requirements to control access to these areas.

 

We identified vulnerabilities with various airport access control points and associated access control procedures. We made six recommendations related to standard operating procedures, deployment of new technology, identification of industry best practices, and training.

>Covert Testing of Access Controls to Secure Airport Areas
2019
OIG-19-38 FEMA Should Not Have Awarded Two Contracts to Bronze Star LLC 2019
OIG-19-22 We intended to verify whether the U.S. Coast Guard is properly reporting service members who are prohibited from possessing a firearm (“prohibited individuals”) to the Federal Bureau of Investigation (FBI). However, in comparing relevant databases with data into the National Instant Background Check System (NICS), We identified a number of issues that led us to question the reliability of the Coast Guard’s data.  As a result, OIG cannot identify the full scope of prohibited individuals or verify that the Coast Guard properly reported prohibited individuals to the Federal Bureau of Investigation (FBI) and to Congress.  Despite our concerns about the quality of Coast Guard’s data, OIG identified 210 service members who committed offenses that placed them in one of the categories of prohibited individuals.  Of these 210, Coast Guard did not enter 16 service members (8 percent) into NCIS.  This underreporting occurred because Coast Guard policy did not require attorneys to forward information about all individuals referred for trial by general court martial for reporting to the FBI.  Additionally, Coast Guard’s reporting to the FBI is centralized, and does not allow investigators in field offices to have direct access to NICS.  We made eight recommendations that will enhance Coast Guard’s reporting of prohibited individuals to the FBI.  The Coast Guard concurred with the recommendations.

>United States Coast Guard's Reporting of Uniform Code of Military Justice Violations to the Federal Bureau of Investigation
2019
OIG-19-34-UNSUM We determined that DHS' information security program for Top Secret/Sensitive Compartmented Information intelligence systems is effective this year as the Department achieved “Level 4 – Managed and Measurable” in three of five cybersecurity functions, based on current reporting instructions for intelligence systems. However, we identified deficiencies in DHS’ overall patch management process and the Cybersecurity and Infrastructure Security Agency’s weakness remediation and security awareness training activities.

 

We made one recommendation to the Office of Intelligence and Analysis and two recommendations to the Cybersecurity and Infrastructure Security Agency to address the deficiencies identified. DHS concurred with all three recommendations.

>(U) Evaluation of DHS' Compliance with Federal Information Security Modernization Act Requirements for Intelligence Systems for Fiscal Year 2018
2019
OIG-19-20 This inspection is part of an ongoing review of ICE detention facilities. While conducting an unannounced visit to the Essex County Correctional Facility using ICE’s 2011 Performance-Based National Detention Standards, we identified serious violations. As part of this assessment, ICE must review and ensure compliance with those standards addressing unreported security incidents, food safety, and facility conditions that include ceiling leaks, unsanitary shower stalls, bedding, and outdoor recreation areas.

>Issues Requiring Action at the Essex County Correctional Facility in Newark, New Jersey
2019
OIG-19-37 This interim report is part of an ongoing audit to determine the extent FEMA is meeting disaster survivors’ transitional shelter needs after the California wildfires and Hurricanes Harvey, Irma, and Maria in 2017. We determined that FEMA does not require disaster survivors to notify the agency when they vacate hotels participating in the TSA program, thus allowing the hotels to continue to bill FEMA for unoccupied rooms. Because FEMA is unaware when disaster survivors vacate the hotels, the agency does not know the magnitude of unnecessary hotel charges. Consequently, FEMA could not account for associated TSA payments it may have paid since August 2017, related to the 2017 hurricane season and California wildfires.

>Additional Controls Needed to Better Manage FEMA's Transitional Sheltering Assistance Program
2019
OIG-19-17 As a follow-up to our 2017 report on TSA’s Federal Air Marshal Service’s (FAMS) domestic flight operations, we conducted this audit to determine the extent to which FAMS can interdict an improvised explosive device during flight. We identified vulnerabilities with FAMS’ contribution to international flight security. Details related to FAMS operations and flight coverage presented in the report are classified or designated as Sensitive Security Information. We made two recommendations.

>FAMS' Contribution to International Flight Security is Questionable
2019
OIG-20-31 DHS complied with the Improper Payments Elimination and Recovery Act (IPERA) in fiscal year 2019 by meeting all six of the IPERA requirements.  DHS also complied with Executive Order 13520, Reducing Improper Payments.  Additionally, we reviewed DHS’ processes and procedures for estimating its annual improper payment rates.  Based on our review, we determined DHS did not provide adequate oversight of the components’ improper payment testing and reporting.  We made one recommendation to DHS’ Risk Management and Assurance Division to properly follow the requirements in the DHS Improper Payment Reduction Guidebook. 

>Department of Homeland Security's FY 2019 Compliance with the Improper Payments Elimination and Recovery Act of 2010 and Executive Order 13520, Reducing Improper Payments
2020
OIG-20-65 We determined that children brought to Port Isabel on July 15, 2018, waited extended periods, and in many cases overnight, to be reunited with their parents.  U.S. Immigration and Customs Enforcement (ICE) was not prepared to promptly reunify all children who arrived at Port Isabel on the first day of attempted mass reunifications.  ICE and U.S. Health and Human Services had fundamentally different understandings about the timing and pace of reunifications, and ICE personnel at Port Isabel underestimated the resources necessary to promptly out-process the parents of arriving children.  As a result, some children waited in vehicles at Port Isabel, while others waited in unused detention cells, though all children were in climate-controlled environments and had continuous access to food, water, and restrooms.  As the mass reunifications continued, ICE personnel responded to processing and space issues, which generally resulted in shorter wait times for children who arrived at Port Isabel closer to the court’s July 26, 2018 deadline.  The report contains no recommendations.

>Children Waited for Extended Periods in Vehicles to Be Reunified with Their Parents at ICE's Port Isabel Detention Center in July 2018
2020
OIG-20-30 KPMG, LLP found that the Federal Emergency Management Agency (FEMA) did not always ensure Virgin Islands Territorial Emergency Management Agency (VITEMA) and the Virgin Islands Department of Education (VIDE) established and implemented policies, procedures, and practices to account for and expend Public Assistance (PA) grant funds according to Federal regulations and FEMA guidance.  For example, VIDE did not have policies and procedures to address procurement-related conflicts of interest and related disciplinary actions.  This occurred because FEMA did not adequately train VIDE personnel and did not review these policies and procedures.  We made five recommendations that, when implemented, should improve management of FEMA PA grant funds, ensuring the funds are expended according to Federal regulations and FEMA guidance.  FEMA concurred with the recommendations. 

>Capacity Audit of FEMA Grant Funds Awarded to the U.S. Virgin Islands Department of Education
2020
OIG-20-62 Since 2017, DHS has continued to make progress in meeting its Digital Accountability and Transparency Act of 2014 (DATA Act) reporting requirements, but challenges remain.  To enable more effective tracking of Federal spending, DHS must continue to take action to accurately align its budgetary data with the President’s budget, reduce award misalignments across DATA Act files, improve the timeliness of financial assistance reporting, implement and use government-wide data standards, and address risks to data quality.  Without these actions, DHS will continue to experience challenges in meeting its goal of achieving the highest possible data quality for submission to USAspending.gov.  We made five recommendations to help strengthen DHS’ controls for ensuring complete, accurate, and timely spending data.  The Department concurred with all five recommendations. 

>DHS Has Made Progress in Meeting DATA Act Requirements, But Challenges Remain
2020
OIG-20-29 KPMG, LLC found the Federal Emergency Management Agency (FEMA) did not provide adequate guidance to the Virgin Islands Emergency Management Agency (VITEMA) and the Virgin Islands Housing Finance Agency (VIHFA) and that VITEMA and VIHFA did not adequately manage FEMA Public Assistance (PA) funds.  Also, VITEMA and VIHFA did not always ensure the accuracy of project funding information or promptly notify FEMA about significant project cost overruns.  This occurred because FEMA did not provide the necessary guidance to and oversight of VITEMA and VIHFA to properly manage PA funds.  Because of these deficiencies, PA programs are at increased risk of mismanagement and expenditure of funds for unallowable activities.  We made seven recommendations to improve VITEMA’s and VIHFA’s management of FEMA PA funds, ensuring they are expended according to Federal regulations and FEMA guidance.  FEMA concurred with the recommendations.

>Capacity Audit of FEMA Grant Funds Awarded to the U.S. Virgin Islands Housing and Finance Authority
2020
OIG-20-59 determined ICE’s Homeland Security Investigations (HSI) is effectively contributing to the Federal Bureau of Investigation’s (FBI) Joint Terrorism Task Force (JTTF) counterterrorism efforts by leveraging its authorities, experience, skills, and staffing.  However, existing agreements and guidance on HSI’s participation in the JTTF and its terrorism financing investigations are outdated.  Additionally, we determined existing agreements and policy impose restrictions that delay and hinder sharing and access to information in the JTTF.  We recommended DHS JTTF contributors evaluate and update agreements governing JTTF participation as needed.  HSI should renegotiate and update the 2003 agreement on terrorism financing, as well as update its related guidance accordingly.  We also recommended DHS coordinate with Department of Justice and Department of State, as well as within the DHS, to develop agreements to allow for the more direct sharing of critical investigative information.  We made five recommendations that aim to improve counterterrorism efforts and information sharing.  DHS concurred with two recommendations and non-concurred with three.

>HSI Effectively Contributes to the FBI’s Joint Terrorism Task Force, But Partnering Agreements Could Be Improved (REDACTED)
2020
OIG-20-28 TSA's Challenges With Passenger Screening Canine Teams (Redacted) 2020
OIG-20-60 The Federal Emergency Management Agency’s (FEMA) Individuals and Households Program (IHP) has no assurance of applicants’ eligibility for Small Business Administration (SBA) Dependent Other Needs Assistance (ONA) payments.  According to OMB Circular A-123, Appendix C, when documentation or verification is non-existent to support eligibility payment decisions it must be considered improper.  FEMA did not collect sufficient income and dependent documentation or verify self-reported information to determine whether applicants below the income threshold, known as Failed Income Test (FIT), were eligible for SBA Dependent ONA payments.  FEMA believed requiring documentation or verification would delay the disbursement of assistance and relied on an honor system to make eligibility and payment decisions.  We determined, according to FEMA-provided data, it has paid, and we are questioning, the more than $3.3 billion in improper payments to applicants deemed as FIT for SBA Dependent ONA since 2003.  Additionally, FEMA has not evaluated the program risk associated with not collecting or verifying income information.  Per Federal requirements, agencies must conduct risk assessments to determine whether programs are susceptible to improper payments.  Rather, FEMA assessed IHP at the overall program level and did not specifically evaluate each IHP form of assistance, such as SBA Dependent ONA.  These weaknesses have allowed applicants self-certifying income and dependent information to receive less oversight, despite posing the greatest risk for improper payments.  FEMA cannot assure Congress and taxpayers it is a prudent steward of Federal resources, and adequately assesses the risks of improper payments.  FEMA did not concur with all three report recommendations.  Therefore, these recommendations are considered unresolved and open.

>FEMA Has Paid Billions in Improper Payments for SBA Dependent Other Needs Assistance since 2003
2020
OIG-20-27 Harris County, Texas needs additional technical assistance and monitoring to ensure grants management comply with Federal procurement regulations.  The County’s procurement policies, procedures, and business practices were not adequate to expend disaster grant funds in accordance with Federal procurement regulations and Federal Emergency Management Agency (FEMA) guidelines.  We recommended FEMA disallow $2.7 million in ineligible costs and require Texas to work with the County to incorporate Federal procurement regulations when using Federal funds, and review procurement activities before the County awards future contracts.  We made three recommendations that will help improve the procurement capability of Harris County, Texas.  FEMA concurred with all three recommendations. 

>Harris County, Texas, Needs Continued Assistance and Monitoring to Ensure Proper Management of Its FEMA Grant
2020
OIG-20-44 We identified debris removal contract performance issues and concerns.  In the report, we discuss our observations regarding the use of pre-disaster debris removal contracts in Florida following Hurricane Irma.  We also emphasize how FEMA can benefit from implementing effective controls to track systemic issues after a disaster and ensure FEMA follows procedures for uploading required documentation to support debris removal costs for proper grant management.  The report contains no recommendations.

>Pre-Disaster Debris Removal Contracts in Florida
2020
Investigation of Alleged Violations of Immigration Laws at the Tecate, California, Port of Entry by U.S. Customs and Border Protection Personnel (OSC File No. DI-18-5034); OSC Final Letter to President; OSC Referral to DHS 2020
OIG-20-61 The DHS Chief Information Officer (CIO) and most component CIOs had conducted strategic planning efforts to help prioritize legacy Information Technology (IT) systems and infrastructure to better accomplish mission goals.  However, due to a lack of standard guidance and funding, not all components have complied with or fully embraced Department-wide IT modernization initiatives to adopt cloud-based computing, and to consolidate data centers.  Meanwhile, DHS continues to rely on deficient and outdated IT systems to perform mission-critical operations.  Additionally, DHS has not yet leveraged the Modernizing Government Technology Act mandate to accelerate ongoing IT modernization efforts, as DHS and its components questioned whether the benefits of the Act outweighed the additional effort needed to use the resources provided under the Act.  Until DHS addresses these issues, it will continue to face significant challenges to accomplish mission operations efficiently and effectively.  We made three recommendations for the DHS OCIO to develop guidance for implementing cloud technology and migrating legacy IT systems to the cloud, coordinate with components to develop and finalize a data center migration approach, and establish a process to assign risk ratings for major legacy IT investments.  The Department concurred with all three recommendations.

>Progress and Challenges in Modernizing DHS' IT Systems and Infrastructure
2020
OIG-20-26 Capacity Audit of FEMA Grant Funds Awarded to the Puerto Rico Department of Education 2020
OIG-20-58 The Federal Emergency Management Agency did not properly award or oversee its contract with Corporate Lodging Consultants (CLC) to administer disaster survivors’ hotel stays.  These deficiencies occurred because FEMA officials did not ensure staff responsible for the Transitional Sheltering Assistance (TSA) contract award and oversight had the guidance and training they needed to be effective.  As a result, FEMA released personally identifiable information for about 2.3 million disaster survivors, increasing the survivors’ risk to identity theft.  We made six recommendations that when implemented should strengthen FEMA contracting and compliance with Federal Acquisition Regulations and DHS requirements.  FEMA concurred with all six of our recommendations.

>FEMA Did Not Properly Award and Oversee the Transitional Sheltering Assistance Contract
2020
OIG-20-25 Williams-Adley determined that the Federal Emergency Management Agency (FEMA) did not always ensure that Department of Transportation and Public Works (DTOP) established and implemented policies, procedures, and practices to account for and expend PA grant funds according to Federal regulations and FEMA guidance.  Specifically, DTOP did not have (1) an effective grants management process; (2) sufficient internal controls in the procurement process; and (3) sufficient controls over its processes for claiming Force Account Labor costs.  This occurred because FEMA and Central Office of Recovery, Reconstruction and Resiliency (COR3) did not adequately oversee DTOP’s grant management activities.  We made three recommendations to improve COR3’s and DTOP’s management of FEMA Public Assistance funds, ensuring they are expended according to Federal regulations and FEMA guidance.  FEMA concurred with the recommendations.

>Capacity Audit of FEMA Grant Funds Awarded to the Puerto Rico Department of Transportation and Public Works
2020
OIG-20-55 U.S. Customs and Border Protection (CBP) does not comprehensively plan and conduct its covert testing, use test results to address vulnerability, or widely share lessons learned.  CBP’s two covert testing groups do not use risk assessments or intelligence to plan and conduct covert tests at ports of entry and U.S. Border Patrol checkpoints, do not plan coordinated tests, and do not design system-wide tests.  This occurred because CBP has not provided adequate guidance on risk- and intelligence-based test planning, directed the groups to coordinate, given them the required authority, or established performance goals and measures for covert testing.  Following testing, CBP does not widely share covert test results, consistently make recommendations, or ensure corrective actions are taken.  Results are not widely shared because CBP has not defined roles and responsibilities for such sharing.  Covert testing groups do not make recommendations or ensure corrective actions are implemented due to insufficient authority and policies directing these actions.  Finally, CBP does not effectively manage covert testing groups to ensure data reliability, completeness, and compliance with security requirements due to leadership changes and limited staff.  Without comprehensive planning, incorporating lessons learned from test results, and program management accountability, CBP cannot ensure it addresses vulnerabilities, which may be exploited and threaten national security.  We recommended CBP develop policies and procedures for conducting covert testing and assign roles and responsibilities for oversight of covert testing groups.  We made seven recommendations that will strengthen its covert testing program.  CBP concurred with all seven recommendations.

>CBP Needs a Comprehensive Process for Conducting Covert Testing and Resolving Vulnerabilities - (REDACTED)
2020
OIG-20-24 Williams-Adley determined that the Federal Emergency Management Agency (FEMA) did not ensure the Puerto Rico Central Office of Recovery, Reconstruction, and Resiliency (COR3) and the Puerto Rico Aqueduct and Sewer Authority (PRASA) establish and implement policies, procedures, and practices to account for and expend Public Assistance (PA) grant funds according to Federal regulations and FEMA guidance.  Specifically, PRASA did not follow established policies and procedures for: (1) recording the capacity size and rate of its force account equipment; and (2) ensuring each vendor had a certificate of eligibility before receiving a contract award.  We made two recommendations to improve PRASA’s management of FEMA PA funds, ensuring they are expended according to Federal regulations and FEMA guidance.

>Capacity Audit of FEMA Grant Funds Awarded to The Puerto Rico Aqueduct and Sewer Authority
2020
OIG-20-57 The Puerto Rico Electric Power Authority (PREPA) complied with Federal procurement requirements for its noncompetitive procurement of the Whitefish contract.  However, the contract costs may not have complied with Federal cost principles that costs must be reasonable to be eligible for Federal awards.  PREPA’s oversight of the Cobra contract did not comply with PA program guidelines.  Finally, FEMA’s Public Assistance grant to PREPA for the Cobra contract did not fully comply with PA program guidelines.  We made two recommendations for FEMA to provide technical assistance to Puerto Rico to ensure compliance with Federal regulations and PA program guidelines.  We made two other recommendations for FEMA to develop guidance to verify its subrecipients’ oversight of time and material contracts and determine the reasonableness and eligibility of time and material contract costs.  FEMA concurred with three of the recommendations and did not concur with one recommendation.

>FEMA's Public Assistance Grant to PREPA and PREPA's Contracts with Whitefish and Cobra Did Not Fully Comply with Federal Laws and Program Guidelines
2020
OIG-20-23 The Federal Emergency Management Agency’s (FEMA) Individuals and Households Program (IHP) has a robust process for collecting and verifying information provided by underinsured disaster applicants.  However, FEMA does not collect sufficient supporting documentation or verify applicants claiming to have no insurance are eligible for home repair assistance.  Rather, according to FEMA, it relies on applicant self-certifications because no comprehensive repository of homeowner’s insurance data exists, and any additional verification processes would delay home repair payments.  As a result, FEMA made and we are questioning, more than $3 billion in improper and potentially fraudulent payments to individuals since 2003.  Additionally, FEMA did not properly assess and report improper payment risks within IHP because it disregarded significant internal control deficiencies and prior audit findings when it evaluated program risks.  Therefore, IHP applicants who claimed no homeowner’s insurance received less oversight even though they posed the greatest risk for improper and fraudulent payments.  Without implementing changes to its home repair assistance processes, FEMA cannot ensure it is being a prudent steward of Federal resources and adequately assessing its risks of improper payments and fraud.  We made two recommendations to FEMA to improve its IHP home repair documentation, verification, and risk management processes.  FEMA non-concurred with the two report recommendations, resulting in both recommendations being unresolved and open.

>FEMA Has Made More than $3 Billion in Improper and Potentially Fraudulent Payments for Home Repair Assistance since 2003
2020
OIG-20-56 DHS generally met deadlines for responding to simple Freedom of Information Act (FOIA) requests, it did not do so for most complex requests.  A significant increase in requests received, coupled with resource constraints, limited DHS’ ability to meet production timelines under FOIA, creating a litigation risk for the Department.  Additionally, DHS has not always fully documented its search efforts, making it difficult for the Department to defend the reasonableness of the searches undertaken.  With respect to responding to congressional requests, we determined DHS has established a timeliness goal of 15 business days or less; however, on average, it took DHS nearly twice as long to provide substantive responses to Congress, with some requests going unanswered for up to 450 business days.  Further, DHS redacted personal information in its responses to congressional committee chairs even when disclosure of the information was statutorily permissible.  This was a descriptive report and contained no recommendations.  In its response, DHS acknowledged FOIA backlogs remain a problem, despite increasing requests processed.  DHS stated its process responding to congressional requests varies greatly and that its redactions are appropriate.

>DHS' Process for Responding to FOIA and Congressional Requests
2020
OIG-20-21 Management of FEMA Public Assistance Grant Funds Awarded to the Sewerage and Water Board of New Orleans Related to Hurricanes Katrina, Isaac, and Gustav 2020
OIG-20-54 U.S. Immigrations and Customs Enforcement (ICE) does not follow its written policy when conducting disciplinary reviews of Senior Executive Employees (SES) employees, which risks creating an appearance that SES employees receive more favorable treatment than non-SES employees.  We reviewed the disciplinary proceedings of the former SES official to evaluate whether ICE’s deviation from the written policy, or any other evidence, in that case indicated that the official received favorable treatment, as alleged.  We did not find evidence of actual favoritism or inappropriate influence in the official’s disciplinary or security clearance review processes.  We recommended that ICE finalize and issue its draft policy documenting the process for disciplining SES members.  We made one recommendation that will enhance transparency in ICE’s disciplinary program.  ICE concurred with our recommendation and took action to resolve and close it.

>Special Report - ICE Should Document Its Process for Adjudicating Disciplinary Matters Involving Senior Executive Service Employees
2020
OIG-20-22 Capacity Audit of FEMA Grant Funds Awarded to the Puerto Rico Department of Housing 2020
OIG-20-50 We contracted this audit with Cotton & Company LLP, which found that FEMA did not ensure the Florida Department of Emergency Management (FDEM) monitored the Polk County School Board (PCSB) to ensure it established and implemented policies, procedures, and practices to account for and expend PA grant funding in accordance with Federal regulations and FEMA guidance.  For example, PCSB was unable to support $46,168 in food spoilage costs; requested and received funding through a Florida Public Assistance grant for ineligible contract costs incurred under Project 2658 for debris removal and related costs; and charged $897 in unallowable costs associated with ineligible fringe benefits for substitute employees.  We made 13 recommendations that, when implemented, should improve PCSB’s management of FEMA Public Assistance funds.  FEMA concurred with our 13 recommendations.

>Early Warning Audit of FEMA Public Assistance Grants to Polk County School Board, Florida
2020
OIG-20-19 DHS’ funding and payments for PALMS violated Federal appropriations law.  Specifically, DHS violated the bona fide needs rule in using fiscal year (FY) 2011 component funds in FYs 2012 and 2013 for e-Training services and PALMS implementation respectively, when the funds were not legally available for those needs.  As a result of the bona fide needs rule and purpose statute violations, DHS may also have violated the Antideficiency Act in FYs 2013 – 2015 when the Department augmented appropriations for the Human Resources Information Technology program with component funds. We made nine recommendations to address violations of Federal appropriations law and to improve controls to prevent such potential violations in the future.

>PALMS Funding and Payments Did Not Comply with Federal Appropriations Law
2020
OIG-20-51 We contracted this audit with Cotton & Company LLP, which found that FEMA did not ensure Monroe County, Florida (the County) established and implemented policies, procedures, and practices to ensure it accounted for and expended Public Assistance program grant funds awarded to disaster areas in accordance with Federal regulations and FEMA guidance.  Specifically, the County did not allocate anticipated and actual insurance proceeds totaling $5 million to reduce FEMA’s share of disaster costs; charged $265,928 for ineligible stand-by time and other ineligible expenses; and requested $84,681 in unsupported and ineligible costs for multiple tasks including clearing emergency access and costs related to flooding.  Additionally, the County overstated $34,378 in force account labor costs that were unreasonable and therefore ineligible for grant funding; overpaid a debris removal contractor, resulting in $2,403 in ineligible costs; and charged $1,080 to PW 1512 for security costs that were unsupported and are therefore ineligible for grant funding. We made 18 recommendations that that, when implemented, should improve Monroe County, Florida’s management of FEMA Public Assistance funds.  FEMA concurred with our 18 recommendations.

>Early Warning Audit of FEMA Public Assistance Grants in Monroe County, Florida
2020
OIG-20-20 Following Hurricane Maria, FEMA did not maximize the use of advance contracts to address identified capability deficiencies and needs in Puerto Rico.  Specifically, we identified 49 of 241 new contracts issued in the aftermath of Hurricane Maria for the same goods or services covered by existing advance contracts.  We attributed FEMA’s limited use of advance contracts to its lack of a strategy and documented planning process for ensuring maximum use of advance contracts. Further, FEMA did not maintain contract files in accordance with Federal acquisition regulations and departmental or its own policy.  This occurred because FEMA’s Office of the Chief Procurement Officer did not have controls in place to ensure contract personnel follow Federal regulations and departmental or its own internal policy.  As a result, FEMA’s ability to hold contractors accountable for deliverables is hindered if contract files are not easily located. We made four recommendations to help FEMA improve its strategy for advance contracts, its process for identifying capability needs and gaps, and its contract file management practices. FEMA concurred with all four recommendations and described corrective actions it plans to take.

>FEMA’s Advance Contract Strategy for Disasters in Puerto Rico
2020
OIG-20-53 According to the Securing Our Agriculture and Food Act (SAFA), the program should provide oversight, lead policy initiatives, and coordinate with DHS components and Federal agencies.  However, the Countering Weapons of Mass Destruction Office (CWMD) has not yet carried out a program to meet SAFA’s requirements.  This occurred because CWMD believes it does not have clearly defined authority from the Secretary to carry out the requirements of the SAFA.  In addition, since its establishment in December 2017, CWMD has not prioritized SAFA requirements but instead has focused its resources on other mission areas.  As a result, CWMD has limited awareness of DHS’ ongoing efforts and cannot ensure it is adequately prepared to respond to a terrorist attack against the Nation’s food, agriculture, or veterinary systems.  We made three recommendations to DHS’ CWMD to improve oversight, policy initiatives, and coordination of the Department’s efforts to protect the Nation’s food, agriculture, and veterinary systems. 

>DHS Is Not Coordinating the Department's Efforts to Defend the Nation's Food, Agriculture, and Veterinary Systems against Terrorism
2020
OIG-20-18 The U.S. Secret Service incurred operational and temporary duty costs for rental cars, hotel rooms, meals and incidentals, overtime pay, commercial airfare, golf cart rentals, and other logistical support.  Certain details of the cost information related to the Secret Service’s protective operations presented in the report are designated as Law Enforcement Sensitive.  We did not include salaries and benefits for government personnel traveling with the President because the Secret Service would have incurred these costs regardless of whether the President traveled.  Also excluded are costs associated with assistance provided by the Department of Defense, such as the use of military aircraft to transport personnel and equipment, because the Secret Service is not required to reimburse these costs.  We did not identify any fraud indicators or unauthorized costs.  We made no recommendations. 

>United States Secret Service Expenses Incurred at Trump Turnberry Resort
2020
OIG-20-48 We contracted this audit with Cotton & Company LLP, which found that FEMA did not ensure Lee County, Florida (the County) established and implemented policies, procedures, and practices to ensure it accounted for and expended PA program grant funds awarded to disaster areas in accordance with Federal regulations and FEMA guidance.  Specifically, the County requested FEMA funding for $994,425 in unsupported force account labor, equipment, and materials; was unable to provide supporting documentation for $16,210 in costs incurred to operate an emergency shelter; did not maintain adequate documentation to support $267,452 in costs incurred for road repair services; did not include all required provisions in its contracts to obtain disaster recovery services related to Hurricane Irma; and had not evaluated the risk of subrecipients’ noncompliance with Federal requirements, obtained subrecipient audit reports, or developed plans for monitoring subrecipients.  We made nine recommendations that, when implemented, should improve Lee County, Florida’s management of FEMA Public Assistance funds.  FEMA concurred with all nine recommendations.

>Early Warning Audit of FEMA Public Assistance Grants to Lee County, Florida
2020
OIG-20-75 CBP Does Not Have a Comprehensive Strategy for Meeting Its LS-NII Needs 2020