Skip to main content
U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Audits, Inspections, and Evaluations

Report Number Title Issue Date Fiscal Year Sort descending
OIG-18-14 Management Alert - Concerns with Potential Duplicate or Ineligible FEMA Public Assistance Funding for Facilities Damaged by Back-to-Back Disasters 2018
OIG-18-44 The Office of National Drug Control Policy’s (ONDCP) Circular, Accounting of Drug Control Funding and Performance Summary, requires National Drug Control Program agencies to submit to the ONDCP Director, not later than February 1 of each year, a detailed accounting of all funds expended for National Drug Control Program activities during the previous fiscal year (FY). The Office of Inspector General (OIG) is required to conduct a review of the agency’s submission and provide a conclusion about the reliability of each assertion in the report. an Independent Accountants’ Report on U.S. Coast Guard’s (Coast Guard) Detailed Accounting Submission. Coast Guard’s management prepared the Table of FY 2017 Drug Control Obligations and related disclosures in accordance with the requirements of the ONDCP Circular, Accounting of Drug Control Funding and Performance Summary, dated January 18, 2013 (Circular).

>Review of U.S. Coast Guard's Fiscal Year 2017 Detailed Accounting Submission for Drug Control Funds
2018
OIG-18-16 Independent Auditors' Report on DHS' FY 2017 Financial Statements and Internal Control over Financial Reporting 20187
OIG-19-36 Williams, Adley and Company - DC, LLP completed an audit of Missouri’s management of State Homeland Security Program (SHSP) and Urban Areas Security Initiative (UASI) grants awarded during fiscal years (FY) 2012 through 2015. Williams Adley concluded that Missouri’s State Administrative Agency generally complied with applicable Federal laws and regulations. Although Williams Adley did not identify any duplicate benefits received by the state, it did identify instances in which the state did not fully comply with the Federal Emergency Management Agency’s (FEMA) FYs 2012–2015 Notice of Funding Opportunity guidance.

>Missouri's Management of State Homeland Security Program and Urban Areas Security Initiative Grants Awarded During Fiscal Years 2012 through 2015
2019
OIG-19-67 Limitations of CBP OFO's Screening Device Used to Identify Fentanyl and Other Narcotics 2019
OIG-19-19 DHS Needs to Improve the Process for Identifying Acquisition Planning Capability Needs 2019
OIG-19-35 The Transportation Security Administration (TSA) needs to continue to improve its retention, hiring, and training of Transportation Security Officers (TSO). Specifically, TSA needs to better address its retention challenges because it currently does not share and leverage results of TSO exit surveys and does not always convey job expectations to new-hires. TSA does not fully evaluate applicants for capability as well as compatibility when hiring new TSOs. Thus, the agency may be making uninformed hiring decisions due to inadequate applicant information and a lack of formally documented guidance on ranking potential new-hires

>TSA Needs to Improve Efforts to Retain, Hire, and Train Its Transportation Security Officers
2019
OIG-19-66 FEMA did not take sufficient actions to prevent fraud, waste, and abuse of transportation assistance funds for vehicles considered damaged or destroyed by Hurricanes Harvey, Irma, and Maria in FY 2017.  These weakness occurred because FEMA does not require that agencies collect and retain documentation used to establish applicant eligibility; consider pre-disaster vehicle market value when determining award amounts; provide guidance to state, territorial and tribal governments on how to set transportation assistance thresholds; and conduct post-payment reviews to ensure funds are spent appropriately.  We made three recommendations that, when implemented, will help FEMA ensure it is spending Federal funds for transportation assistance properly.  FEMA concurred with one recommendation and non-concurred with two recommendations.

>FEMA Did Not Sufficiently Safeguard Use of Transportation Assistance Funds
2019
OIG-19-18 U.S. Immigration and Customs Enforcement (ICE) contracts with 106 detention facilities to detain removable aliens. In FY 2017, these 106 facilities held an average daily population of more than 25,000 detainees. Since the beginning of FY 2016, ICE has paid more than $3 billion to the contractors operating these 106 facilities. Despite documentation of thousands of deficiencies and instances of serious harm to detainees that occurred at these detention facilities, ICE rarely imposed financial penalties. ICE should ensure that detention contracts include terms that permit ICE to hold contractors to performance standards and impose penalties when those standards are not maintained.

>ICE Does Not Fully Use Contracting Tools to Hold Detention Facility Contractors Accountable for Failing to Meet Performance Standards
2019
OIG-19-32 Through the TSA program, FEMA provides transitional sheltering in hotels to disaster survivors displaced by emergencies or major disasters. TSA reduces the number of survivors in congregate emergency shelters by providing hotel lodging. During our ongoing audit of the Federal Emergency Management Agency’s (FEMA) Transitional Sheltering Assistance (TSA) program, we determined that FEMA violated the Privacy Act of 19741 and Department of Homeland Security policy2 by releasing to the PII and SPII of 2.3 million survivors of hurricanes Harvey, Irma, and Maria and the California wildfires in 2017.3

>Management Alert - FEMA Did Not Safeguard Disaster Survivors' Sensitive Personally Identifiable Information (REDACTED)
2019
OIG-19-64 In two of the four areas – training and collaboration – Washington’s Emergency Management Division (EMD) and FEMA complied with applicable policies, procedures, and regulations.  In the third functional area – project execution, monitoring and oversight – we did not identify any significant deficiencies.  We found, however, EMD lacked position-specific guidance for all personnel with programmatic responsibilities.  In the last functional area – project and grant closeout – neither EMD nor its subrecipients submitted timely project closeout requests.  In addition, FEMA did not enforce compliance with its own guidance for processing closeouts.  We recommended FEMA ensure EMD complies with its State Administrative Plan by issuing and regularly updating desk manuals.  In addition, we recommended FEMA coordinate with EMD to initiate closeout on behalf of subrecipients for all open, large projects whose period of performance end dates exceed the 90-day regulatory requirement, and submit closeout requests to FEMA for projects exceeding the 180-day requirement.  We made five recommendations to strengthen EMD’s internal controls to improve its oversight of FEMA’s Public Assistance grant program.  FEMA concurred with all five of our recommendations.

>The State of Washington's Oversight of FEMA's Public Assistance Grant Program for Fiscal Years 2015-2017 Was Generally Effective
2019
OIG-19-16 The Department of Homeland Security (DHS) did not promptly fulfill its first requirement mandated by Public Law 114-278. Specifically, DHS delayed commissioning a comprehensive assessment of the effectiveness of the Transportation Security Card Program in enhancing security and reducing security risks for facilities and vessels. The public law required the assessment to begin no later than 60 days after its enactment. However, DHS did not award a work order for the assessment for more than a year after the deadline.  TSA only partially complied with requirements mandated by the public law. Of the six required actions, TSA partially complied with two and fully complied with four. We have concerns with aspects of TSA’s responses to all of the required actions.

>DHS' and TSA's Compliance with Public Law 114-278, Transportation Security Card Program Assessment
2019
OIG-19-33 The Office of National Drug Control Policy’s (ONDCP) Circular, Accounting of Drug Control Funding and Performance Summary, requires each National Drug Control Program agency to submit to the ONDCP Director a detailed accounting of all funds expended for National Drug Control Program activities during the previous fiscal year. Williams, Adley & Company –DC, LLP (Williams Adley), under contract with the Department of Homeland Security OIG, issued an Independent Accountant’s Report on U.S. Coast Guard’s (Coast Guard) Detailed Accounting Submission. Coast Guard management prepared the Table of FY 2018 Drug Control Obligations and related disclosures in accordance with requirements of ONDCP Circular, Accounting of Drug Control Funding and Performance Summary, dated May 8, 2018 (the Circular). Based on its review, nothing came to Williams Adley’s attention that caused it to believe that the Coast Guard’s FY 2018 Detailed Accounting Submission is not presented in conformity with the criteria in the Circular. Williams Adley did not make any recommendations as a result of its review.

>Review of U.S. Coast Guard's Fiscal Year 2018 Detailed Accounting Submission for Drug Control Funds
2019
OIG-19-63 Richland County did not always properly account for and expend Federal funds according to Federal regulations and FEMA guidelines.  FEMA did not hold North Dakota accountable for fulfilling its grant management responsibilities, and North Dakota did not adequately manage the FEMA grant by monitoring the County to ensure it complied with applicable regulations and guidelines.  The County failed to follow all Federal procurement regulations when awarding about $1.9 million in disaster-related contracts.  We recommended that FEMA disallow $1,146,921 in ineligible contract costs and direct North Dakota to work with the County to verify that the County complies with all Federal grant requirements and establishes effective accounting systems.  FEMA concurred with our three recommendations for improving County compliance in managing future Federal grants. 

>FEMA Should Disallow $1.1 Million in Grant Funds Awarded to Richland County, North Dakota
2019
OIG-19-15 National Protection and Programs Directorate (NPPD) Chief of Staff requested a review to determine whether Federal Protective Service (FPS) inspectors’ positions were classified correctly for purposes of earning overtime under the Fair Labor Standards Act. Although properly classified as non-exempt, inspectors’ excessive use of overtime does raise significant concerns. Specifically, 11 of the 19 inspectors reviewed frequently worked multiple 17- to 21-hour shifts with no days off in between. This kind of extensive overtime allowed seven inspectors to earn more than the most senior executives in the Federal Government, with three earning more than the Vice President of the United States. Furthermore, FPS’ increasing use of overtime contributed to a projected budget shortfall for fiscal year 2018, potentially putting the FPS mission at risk. The inspectors were able to accumulate the extensive overtime because of poor internal controls, such as management not monitoring the use of overtime.

>The Federal Protective Service Has Not Managed Overtime Effectively
2019
OIG-19-31 We could not fully assess whether Oregon’s State Administrative Agency (OEM) expenditures for State Homeland Security Program (SHSP) and Urban Areas Security Initiative (UASI) funding awarded from FY 2013 through FY 2015 enhanced its preparedness and security because we found some issues. These issues occurred because OEM did not obtain written consent when withholding more than 20 percent of funds, coordinate with subrecipients after award receipt, have approved indirect cost rate agreements, adhere to its subrecipient monitoring procedures, have a tracking system, or provide guidance to subrecipients. FEMA concurred with all 10 recommendations and plans to take corrective action.

>Oregon's Management of State Homeland Security Program and Urban Areas Security Initiative Grants Awarded During Fiscal Years 2013 through 2015
2019
OIG-19-62 DHS Needs to Improve Cybersecurity Workforce Planning 2019
OIG-19-14 Immigration and Customs Enforcement (ICE), Office of Professional Responsibility, Investigative offices accurately maintained equipment records and complied with vehicle and availability pay requirements. Offices were also accurate in accounting for all firearms. Investigative staff were diligent in complying with the DHS Management Directive relating to the referral of allegations. However, we noted deficiencies in compliance with evidence inventory requirements, and observed inaccuracies in ammunition records. We also found a systemic absence of training on certain firearms and problems with the timeliness of submitting investigative reports. Finally, we found that supervisors did not always review cases on a quarterly basis.

>Oversight Review of the Department of Homeland Security Immigration and Customs Enforcement, Office of Professional Responsibility, Investigations Division
2019
OIG-19-61 FEMA Did Not Properly Review the Port Authority of New York and New Jersey's Request for $306 Million in Public Assistance Funds 2019
OIG-19-13 In November 2017, CBP awarded Accenture a $297 million contract to help meet the demands of recruiting and hiring agents and officers under the President’s January 25, 2017 Executive Order, Border Security and Immigration Enforcement Improvements. The contract includes 1 base year, with 4 option years, to hire 7,500 fully qualified applicants, including Customs and Border Protection Officers, Border Patrol Agents, and Air and Marine Interdiction Agents. In its first year, CBP’s contract with Accenture has already taken longer to deploy and delivered less capability than promised. Accenture is nowhere near satisfying its 7,500-person hiring goal over the next 5 years. Further, CBP has used significant staffing and resources to help Accenture do the job for which it was contracted. As such, we are concerned that CBP may have paid Accenture for services and tools not provided. Without addressing the issues we have identified, CBP risks wasting millions of taxpayer dollars on a hastily approved contract that is not meeting its proposed performance expectations. CBP must hold the contractor accountable, mitigate risk, and devise a strategy to ensure results without additional costs to the Government.

>Management Alert - CBP Needs to Address Serious Performance Issues on the Accenture Hiring Contract
2019
OIG-19-60 DHS’ information security program was effective for fiscal year 2018 because the Department earned the targeted maturity rating, “Managed and Measurable” (Level 4) in four of five functions, as compared to last year’s lower overall rating, “Consistently Implemented” (Level 3). We attributed DHS’ progress to improvements in information security risk, configuration management practices, continuous monitoring, and more effective security training. By addressing the remaining deficiencies, DHS can further improve its security program ensuring its systems adequately protect the critical and sensitive data they store and process.

>Evaluation of DHS' Information Security Program for Fiscal Year 2018
2019
OIG-19-12 The County received about $28.1 million in Public Assistance grant awards from Florida — a FEMA grantee — for damages from severe storms, tornadoes, straight-line winds, and flooding in April and May 2014. Jackson County was the first subgrantee in Florida to be approved for a grant award obligation under the Federal Emergency Management Agency’s (FEMA) Public Assistance Alternative Procedures (PAAP) pilot program. The Sandy Recovery Improvement Act of 20131 authorized PAAP and authorized FEMA to implement alternative procedures through the PAAP pilot program. Florida did not fulfill its grantee responsibility to ensure the County followed applicable Federal grant management requirements, and FEMA did not ensure the grantee carried out its responsibilities.

>FEMA Should Recover $3,061,819 in Grant Funds Awarded to Jackson County, Florida
2019
OIG-19-59 We determined that despite requirements of the Homeland Security Act of 2002, as amended, the Science and Technology Directorate (S&T) did not effectively coordinate and integrate department-wide research and development (R&D) activities.  In August 2015, S&T established Integrated Product Teams (IPTs) as the central mechanism to identify, track, and coordinate department-wide priority R&D efforts.  However, S&T did not follow its IPT process as intended.  Specifically, not all components submitted all information on capability gaps to the IPTs; S&T did not effectively gather, track, and manage data on the Department’s R&D gaps and activities; and S&T did not adequately monitor the IPT process to ensure it was effective.  As a result, S&T may not be able to provide the Secretary of Homeland Security and Congress with an accurate profile of the Department’s R&D activities or justify funding needs for a wide range of missions, including securing the border, detecting nuclear devices, and screening airline passengers.  We made three recommendations to improve S&T’s coordination of R&D activities across DHS.  S&T concurred with our recommendations.

>S&T Is Not Effectively Coordinating Research and Development Efforts across DHS
2019
OIG-19-11 CBP has a statutory responsibility to collect revenue owed to the U.S. Government that arises from the importation of goods into the United States. Although in fiscal year 2017 CBP collected $40 billion in duties, taxes, and fees, more than $4.3 billion in its allowance for doubtful account for cumulative duties, taxes, and fees remained delinquent and uncollectible — some dating back almost 40 years This outstanding cumulative debt will continue to increase without completing the viability analysis worksheets to enable the timely pursuit or termination of delinquent debt, and the ability to monitor and properly track debt collection and write-offs.

>CBP Did Not Maximize its Revenue Collection Efforts for Delinquent Debt Owed from Importers
2019
OIG-19-58 FEMA's Longstanding IT Deficiencies Hindered 2017 Response and Recovery Operations 2019
OIG-19-10 The Trade Facilitation and Trade Enforcement Act of 2015 (TFTEA) requires U.S. Customs and Border Protection (CBP) to establish standard operating procedures (SOP) for searching, reviewing, retaining, and sharing information in communication, electronic, or digital devices at U.S. ports of entry. We determined that CBP’s Office of Field Operations (OFO) did not always conduct the searches at U.S. ports of entry according to its SOPs. Specifically, because of inadequate supervision to ensure OFO officers properly documented searches, OFO cannot maintain accurate quantitative data or identify and address performance problems related to these searches. These deficiencies in supervision, guidance, and equipment management, combined with a lack of performance measures, limit OFO’s ability to detect and deter illegal activities related to terrorism; national security; human, drug, and bulk cash smuggling; and child pornography.

>CBP's Searches of Electronic Devices at Ports of Entry
2019
OIG-19-57 A Joint Review of Law Enforcement Cooperation on the Southwest Border between the Federal Bureau of Investigation and Homeland Security Investigations 2019
OIG-19-09 FEMA Should Recover $413,074 of Public Assistance Grant Funds Awarded to Nashville-Davidson County, Tennessee, for a May 2010 Flood 2019
OIG-19-56 The Transportation Security Administration’s (TSA) methods for classifying its Office of Inspection (OOI) criminal investigators as law enforcement officers were adequate and valid, but the data TSA used were not adequate or valid. TSA’s criminal investigators spend at least 50 percent of their time performing criminal investigative duties to be classified as law enforcement officers. The FY 2017 timesheet data TSA used to validate that its criminal investigators met the 50 percent requirement were not adequate and valid as the data were not always timely submitted and approved. This occurred because OOI officials lacked oversight and accountability for the timesheet submission, review, and approval processes. Further, criminal investigators and their supervisors did not always complete and approve certification forms as required to verify eligibility for premium pay. In some instances, incorrect timesheet calculations inflated the annual average of unscheduled duty hours criminal investigators worked to be eligible for premium pay. OOI management did not develop and implement guidance to review these key calculations annually. Without better oversight and valid timesheet data, TSA cannot ensure it is accurately classifying criminal investigators as law enforcement officers. TSA also may be wasting agency funds on criminal investigators ineligible to receive premium pay. We made four recommendations that, when implemented, should help TSA improve data used to classify its OOI criminal investigators as law enforcement officers. TSA concurred with all of our recommendations.

>TSA's Data and Methods for Classifying Its Criminal Investigators as Law Enforcement Officers Need Improvement
2019
OIG-19-06 FEMA awarded the Chippewa Cree Tribe a $32.4 million Public Assistance Program grant for damages from a June 2010 flood disaster. The award provided 100 percent Federal funding to replace the Tribe’s severely damaged health clinic. The Tribe failed to manage a $32.4 million Public Assistance Program grant from FEMA according to Federal regulations and FEMA guidelines. As a result, FEMA has no assurance that expenditures the Tribe claimed for Project 2 (engineering and design), and plans to claim for Projects 132 (facility construction) and 133 (site preparation) are valid, allowable, or eligible. Therefore, FEMA should disallow about $22.3 million of the grant award for these three projects.

>FEMA Should Disallow $22.3 Million in Grant Funds Awarded to the Chippewa Cree Tribe of the Rocky Boy's Indian Reservation, Montana
2019
OIG-19-55 FEMA has instituted several effective mechanisms to demonstrate the importance of fraud prevention in its disaster assistance programs, but it needs to do more.  In line with our 2011 audit report recommendations, FEMA now uses standard system queries and additional business rules to flag potentially fraudulent disaster assistance applications.  However, FEMA must take additional, proactive steps to create and sustain a culture of fraud prevention and awareness.  This includes adequately staffing the Fraud and Internal Investigations Division, implementing an effective process to monitor and discourage staff noncompliance with required fraud training requirements, and establishing a clear and consistent process for reporting suspected fraud.  We made five recommendations for FEMA to demonstrate its commitment to fraud prevention in carrying out its disaster assistance programs.  FEMA concurred with all of our recommendations and has begun implementing corrective actions.

>FEMA Must Take Additional Steps to Demonstrate the Importance of Fraud Prevention and Awareness in FEMA Disaster Assistance Programs
2019
OIG-19-07 On January 25, 2017, the President issued two Executive Orders directing the Department of Homeland Security to hire an additional 15,000 law enforcement officers. We conducted this audit to determine whether the Department and its components — specifically FLETC, USBP, and ICE — have the training strategies and capabilities in place to train 15,000 new agents and officers.  Prior to the start of the hiring surge, FLETC’s capacity is already overextended. FLETC is not only responsible for accommodating the anticipated Department hiring surge, but also for an expected increase in demand from other Partner Organizations. Despite observing ongoing work in the development of hiring surge training plans and strategies, challenges exist due to uncertain funding commitments and current training conditions. Absent remedial action, these challenges may impede consistency and lead to a degradation in training and standards. As a result, trainees will be less prepared for their assigned field environment, potentially impeding mission achievability and increasing safety risk to themselves, other law enforcement officers, and anyone within their enforcement authority.

>DHS Training Needs for Hiring 15,000 Border Patrol Agents and Immigration Officers
2019
OIG-19-54 Federal Emergency Management Agency (FEMA) did not properly oversee the Louisiana Governor’s Office of Homeland Security and Emergency Preparedness (Louisiana or State) to ensure it complied with Federal regulations and FEMA guidelines.  Louisiana and the Office of Community Development (OCD), in turn, did not always properly account for and expend Federal grant funds.  Specifically, Louisiana did not provide adequate documentation to support costs, as required by Federal regulations, and FEMA is not requiring the State to provide mandatory documentation to close out the $706.6 million Hazard Mitigation Grant Program (HMGP) grant.  Louisiana also has not provided FEMA with required documentation showing that homeowners paid $79.7 million in promissory notes for state-funded mitigation work on their homes.  Finally, Louisiana drew down funds exceeding project obligations by $50.4 million due to a lack of FEMA controls.  These issues arose primarily because FEMA did not ensure Louisiana exercised proper oversight of the HMGP grant and the State did not comply with Federal regulations.  As a result, Federal funds are at risk of fraud, waste, and abuse.  We provided five recommendations to FEMA to postpone project closeout until Louisiana provides adequate documentation that supports $706.6 million in costs and that FEMA ensures compliance with Federal regulations and FEMA guidelines.  FEMA’s responses were sufficient to close all but one recommendation, which we consider open and unresolved.  

>Louisiana Did Not Properly Oversee a $706.6 Million Hazard Mitigation Grant Program Award for Work on Louisiana Homes
2019
OIG-19-08 Following the January 13, 2018, false missile alert in Hawaii, Congress requested we examine the Federal Emergency Management Agency’s (FEMA) role in the incident. We concluded that FEMA has limited responsibility for the sending and canceling of state and local alerts. Following the Hawaii false missile alert, three U.S. Senators proposed legislation to define the federal government’s role during false missile alerts, as well as to direct FEMA to recommend best practices in the alerting process. We also identified two areas of concern regarding FEMA’s overall oversight of IPAWS. Although FEMA maintains IPAWS as a messaging platform, state and local alerting authorities must obtain commercially-available emergency alert software to generate a message which passes through IPAWS for authentication and delivery. However, we found that FEMA does not require that this software perform functions critical to the alerting process, such as the ability to preview or cancel an alert. Instead, FEMA only recommends that software vendors include these capabilities as “best practices.”

>FEMA's Oversight of the Integrated Public Alert & Warning System (IPAWS)
2019
OIG-19-53 U.S. Customs and Border Protection (CBP) plays a critical role in the Nation’s efforts to interdict dangerous substances and prohibited items at U.S. ports of entry and keep these materials from harming the American public. An important part of CBP’s mission is preventing foreign countries from importing illegal drugs such as opioids into the U.S. CBP is experiencing a rise in seizures of synthetic opioids such as fentanyl that upon exposure can kill in minutes.  CBP’s Office of Field Operations (OFO) Fines Penalties and Forfeitures Division stores, manages, and disposes seized property, including illicit drugs such as fentanyl.  During our ongoing audit of CBP’s storage of seized drugs at permanent drug vaults we visited, we determined that CBP does not adequately protect its staff from the dangers of powerful synthetic opioids.  Specifically, CBP has not always made medications designed to treat narcotic overdose available in case of accidental exposure.  This occurred because CBP lacks an official policy requiring standard workplace practices for handling fentanyl and safeguarding personnel against exposure.  In addition, CBP does not require mandatory training for its staff to provide an understanding of the hazards of fentanyl and methods to combat accidental exposure.  As a result, CBP staff is at increased risk of injury or death in case of exposure.  We made one recommendation to help CBP provide its components with guidance, knowledge, and tools to handle and reverse overdoses from fentanyl and other opioids.

>Management Alert - CBP Did Not Adequately Protect Employees from Possible Fentanyl Exposure
2019
OIG-19-05 We conducted this audit to determine whether the Board accounted for and expended FEMA grant funds according to Federal regulations and FEMA guidelines. The Board sustained an estimated $90.6 million in damages caused by severe storms and flooding that occurred in August 2016. The Ascension Parish School Board (Board) accounted for disaster-related costs correctly, as Federal regulations require. However, the Board did not follow all Federal procurement regulations in awarding $25.6 million in disaster-related contracts, resulting in $9.1 million in ineligible costs. Additionally, there were issues with direct administrative costs related to a Recovery Program and Grants Management services contract. This occurred because the Federal Emergency Management Agency (FEMA) did not ensure the Louisiana Governor’s Office of Homeland Security and Emergency Preparedness (Louisiana) monitored the Board’s subgrant activities for compliance with Federal procurement requirements.

>FEMA Should Disallow $9.1 Million in Public Assistance Grant Funds Awarded to Ascension Parish School Board, Louisiana
2019
OIG-19-52 FEMA's Eligibility Determination of Puerto Rico Electric Power Authority's Contract with Cobra Acquisitions LLC 2019
OIG-19-04 The Chief Financial Officers Act of 1990 (Public Law 101-576) and the Department Of Homeland Security Financial Accountability Act (Public Law 108-330) require us to conduct an annual audit of the Department of Homeland Security’s (DHS) consolidated financial statements and internal control over financial reporting. KPMG noted that the financial statements present fairly, in all material respects, DHS’ financial position as of September 30, 2018.

KPMG issued an adverse opinion on DHS’ internal control over financial reporting of its financial statements as of September 30, 2018. The report identifies the following six significant deficiencies in internal control, the first two of which are considered material weaknesses, and four instances where DHS did not comply with laws and regulations.

>Independent Auditors' Report on DHS' FY 2018 Financial Statements and Internal Control over Financial Reporting
2019
OIG-19-50 Inadequate Oversight of Low Value DHS Contracts 2019
OIG-19-01 Annual report, Major Management and Performance Challenges Facing the Department of Homeland Security. Pursuant to the Reports Consolidation Act of 2000, the Office of Inspector General is required to issue a statement that summarizes what the Inspector General considers to be the most serious management and performance challenges facing the agency and briefly assess the agency’s progress in addressing those challenges. We acknowledge past and ongoing efforts by Department’s senior leadership to address the challenges identified in this report. At the same time, our aim in this report is two-fold to identify areas that need continuing focus and improvement and to point out instances in which senior leadership’s goals and objectives are not executed throughout the Department. We highlight persistent management and performance challenges that hamper the Department’s efforts to accomplish the homeland security mission efficiently and effectively.

>Major Management and Performance Challenges Facing the Department of Homeland Security
2019
OIG-19-51 Management Alert - DHS Needs to Address Dangerous Overcrowding and Prolonged Detention of Children and Adults in the Rio Grande Valley 2019
OIG-19-03 The Office of Inspector General (OIG) is conducting an investigation into allegations that the whistleblower was retaliated against for, among other things, communicating with Members of Congress regarding discrimination and retaliation against the whistleblower. The whistleblower alleged being subjected to retaliatory investigations by CGIS in violation of the Military Whistleblower Protection Act (MWPA). We recently learned that CGIS executed a search warrant against the whistleblower several months after the whistleblower retired from the Coast Guard, but soon after CGIS became aware of the OIG’s whistleblower retaliation investigation. Our information indicates that a CGIS agent obtained the search warrant in connection with a CGIS-directed investigation.

>Management Alert - Coast Guard Investigative Service Search and Seizure of DHS OIG and Congressional Communications
2019
OIG-19-49 CBP’s controls over the Global Entry Program do not always prevent ineligible and potentially high-risk Global Entry members from obtaining expedited entry into the United States. This occurred because CBP officers did not always comply with policies when reviewing Global Entry applications nor do CBP’s policies sufficiently help officers

determine an applicant’s level of risk. Additionally, during the airport arrival process, CBP officers granted some Global Entry members expedited entry without verifying the authenticity of their kiosk receipts. CBP officers also did not properly respond to a breach of the Daily Security Code. These weaknesses were due to officers not following policy, as well as CBP’s insufficient verification procedures. Unless CBP officers authenticate kiosk receipts, someone could use a fake receipt to enter the United States. Finally, CBP does not effectively monitor Global Entry to ensure members continue to meet program requirements. In particular, CBP did not conduct the required number of internal audits and did not use its Self-Inspection Program effectively. CBP’s lack of adherence to its compliance program’s policies and procedures creates vulnerabilities in Global Entry by allowing potentially ineligible members to continue to participate.

>CBP's Global Entry Program Is Vulnerable to Exploitation
2019
OIG-19-02 CBP Should Improve Its Air Coordination of the Rio Grande Valley Sector 2019
OIG-19-48 DHS Needs to Improve Its Oversight of Misconduct and Discipline 2019
OIG-19-47 Concerns about ICE Detainee Treatment and Care at Four Detention Facilities 2019
OIG-19-44 Audit of DHS' Issuance and Management of Other Transaction Agreements Involving Consortium Activities 2019
OIG-19-28 The Department of Homeland Security U.S. Immigration and Customs Enforcement (ICE) repatriates thousands of aliens every year. In this review, we sought to identify barriers to the repatriation of detained aliens with final orders of removal. Our case review of 3,053 aliens not removed within the prescribed 90-day timeframe revealed that the most significant factors delaying or preventing repatriation are external and beyond ICE’s control. The two predominant factors delaying repatriation are legal appeals and obtaining travel documents. Internally, ICE’s challenges with staffing and technology also diminish the efficiency of the removal process.

>ICE Faces Barriers in Timely Repatriation of Detained Aliens
2019
OIG-19-45 Lessons Learned from Prior Reports on FEMA's 50 Percent Repair-or-Replace Rule Decisions 2019
OIG-19-30 The Office of National Drug Control Policy’s (ONDCP) Circular, Accounting of Drug Control Funding and Performance Summary, requires each National Drug Control Program agency to submit to ONDCP Director a detailed accounting of all funds expended for National Drug Control Program activities during the previous fiscal year (FY). ICE’s management prepared the Performance Summary Report and the related disclosures in accordance with the requirements of ONDCP Circular, Accounting of Drug Control Funding and Performance Summary, dated May 8, 2018 (the Circular). Williams Adley was unable to assess the accuracy of the number of products reported in Metric 2, “Number of counter-narcotics intelligence requests satisfied,” as part of the PSR.

>Review of U.S. Immigration and Customs Enforcement's Fiscal Year 2018 Drug Control Performance Summary Report
2019