Skip to main content
U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Audits, Inspections, and Evaluations

Report Number Title Issue Date Fiscal Year Sort ascending
OIG-19-05 We conducted this audit to determine whether the Board accounted for and expended FEMA grant funds according to Federal regulations and FEMA guidelines. The Board sustained an estimated $90.6 million in damages caused by severe storms and flooding that occurred in August 2016. The Ascension Parish School Board (Board) accounted for disaster-related costs correctly, as Federal regulations require. However, the Board did not follow all Federal procurement regulations in awarding $25.6 million in disaster-related contracts, resulting in $9.1 million in ineligible costs. Additionally, there were issues with direct administrative costs related to a Recovery Program and Grants Management services contract. This occurred because the Federal Emergency Management Agency (FEMA) did not ensure the Louisiana Governor’s Office of Homeland Security and Emergency Preparedness (Louisiana) monitored the Board’s subgrant activities for compliance with Federal procurement requirements.

>FEMA Should Disallow $9.1 Million in Public Assistance Grant Funds Awarded to Ascension Parish School Board, Louisiana
2019
OIG-19-53 U.S. Customs and Border Protection (CBP) plays a critical role in the Nation’s efforts to interdict dangerous substances and prohibited items at U.S. ports of entry and keep these materials from harming the American public. An important part of CBP’s mission is preventing foreign countries from importing illegal drugs such as opioids into the U.S. CBP is experiencing a rise in seizures of synthetic opioids such as fentanyl that upon exposure can kill in minutes.  CBP’s Office of Field Operations (OFO) Fines Penalties and Forfeitures Division stores, manages, and disposes seized property, including illicit drugs such as fentanyl.  During our ongoing audit of CBP’s storage of seized drugs at permanent drug vaults we visited, we determined that CBP does not adequately protect its staff from the dangers of powerful synthetic opioids.  Specifically, CBP has not always made medications designed to treat narcotic overdose available in case of accidental exposure.  This occurred because CBP lacks an official policy requiring standard workplace practices for handling fentanyl and safeguarding personnel against exposure.  In addition, CBP does not require mandatory training for its staff to provide an understanding of the hazards of fentanyl and methods to combat accidental exposure.  As a result, CBP staff is at increased risk of injury or death in case of exposure.  We made one recommendation to help CBP provide its components with guidance, knowledge, and tools to handle and reverse overdoses from fentanyl and other opioids.

>Management Alert - CBP Did Not Adequately Protect Employees from Possible Fentanyl Exposure
2019
OIG-19-04 The Chief Financial Officers Act of 1990 (Public Law 101-576) and the Department Of Homeland Security Financial Accountability Act (Public Law 108-330) require us to conduct an annual audit of the Department of Homeland Security’s (DHS) consolidated financial statements and internal control over financial reporting. KPMG noted that the financial statements present fairly, in all material respects, DHS’ financial position as of September 30, 2018.

KPMG issued an adverse opinion on DHS’ internal control over financial reporting of its financial statements as of September 30, 2018. The report identifies the following six significant deficiencies in internal control, the first two of which are considered material weaknesses, and four instances where DHS did not comply with laws and regulations.

>Independent Auditors' Report on DHS' FY 2018 Financial Statements and Internal Control over Financial Reporting
2019
OIG-19-52 FEMA's Eligibility Determination of Puerto Rico Electric Power Authority's Contract with Cobra Acquisitions LLC 2019
OIG-19-01 Annual report, Major Management and Performance Challenges Facing the Department of Homeland Security. Pursuant to the Reports Consolidation Act of 2000, the Office of Inspector General is required to issue a statement that summarizes what the Inspector General considers to be the most serious management and performance challenges facing the agency and briefly assess the agency’s progress in addressing those challenges. We acknowledge past and ongoing efforts by Department’s senior leadership to address the challenges identified in this report. At the same time, our aim in this report is two-fold to identify areas that need continuing focus and improvement and to point out instances in which senior leadership’s goals and objectives are not executed throughout the Department. We highlight persistent management and performance challenges that hamper the Department’s efforts to accomplish the homeland security mission efficiently and effectively.

>Major Management and Performance Challenges Facing the Department of Homeland Security
2019
OIG-19-50 Inadequate Oversight of Low Value DHS Contracts 2019
OIG-19-03 The Office of Inspector General (OIG) is conducting an investigation into allegations that the whistleblower was retaliated against for, among other things, communicating with Members of Congress regarding discrimination and retaliation against the whistleblower. The whistleblower alleged being subjected to retaliatory investigations by CGIS in violation of the Military Whistleblower Protection Act (MWPA). We recently learned that CGIS executed a search warrant against the whistleblower several months after the whistleblower retired from the Coast Guard, but soon after CGIS became aware of the OIG’s whistleblower retaliation investigation. Our information indicates that a CGIS agent obtained the search warrant in connection with a CGIS-directed investigation.

>Management Alert - Coast Guard Investigative Service Search and Seizure of DHS OIG and Congressional Communications
2019
OIG-19-51 Management Alert - DHS Needs to Address Dangerous Overcrowding and Prolonged Detention of Children and Adults in the Rio Grande Valley 2019
OIG-19-02 CBP Should Improve Its Air Coordination of the Rio Grande Valley Sector 2019
OIG-19-49 CBP’s controls over the Global Entry Program do not always prevent ineligible and potentially high-risk Global Entry members from obtaining expedited entry into the United States. This occurred because CBP officers did not always comply with policies when reviewing Global Entry applications nor do CBP’s policies sufficiently help officers

determine an applicant’s level of risk. Additionally, during the airport arrival process, CBP officers granted some Global Entry members expedited entry without verifying the authenticity of their kiosk receipts. CBP officers also did not properly respond to a breach of the Daily Security Code. These weaknesses were due to officers not following policy, as well as CBP’s insufficient verification procedures. Unless CBP officers authenticate kiosk receipts, someone could use a fake receipt to enter the United States. Finally, CBP does not effectively monitor Global Entry to ensure members continue to meet program requirements. In particular, CBP did not conduct the required number of internal audits and did not use its Self-Inspection Program effectively. CBP’s lack of adherence to its compliance program’s policies and procedures creates vulnerabilities in Global Entry by allowing potentially ineligible members to continue to participate.

>CBP's Global Entry Program Is Vulnerable to Exploitation
2019
OIG-19-48 DHS Needs to Improve Its Oversight of Misconduct and Discipline 2019
OIG-19-47 Concerns about ICE Detainee Treatment and Care at Four Detention Facilities 2019
OIG-19-28 The Department of Homeland Security U.S. Immigration and Customs Enforcement (ICE) repatriates thousands of aliens every year. In this review, we sought to identify barriers to the repatriation of detained aliens with final orders of removal. Our case review of 3,053 aliens not removed within the prescribed 90-day timeframe revealed that the most significant factors delaying or preventing repatriation are external and beyond ICE’s control. The two predominant factors delaying repatriation are legal appeals and obtaining travel documents. Internally, ICE’s challenges with staffing and technology also diminish the efficiency of the removal process.

>ICE Faces Barriers in Timely Repatriation of Detained Aliens
2019
OIG-19-44 Audit of DHS' Issuance and Management of Other Transaction Agreements Involving Consortium Activities 2019
OIG-19-30 The Office of National Drug Control Policy’s (ONDCP) Circular, Accounting of Drug Control Funding and Performance Summary, requires each National Drug Control Program agency to submit to ONDCP Director a detailed accounting of all funds expended for National Drug Control Program activities during the previous fiscal year (FY). ICE’s management prepared the Performance Summary Report and the related disclosures in accordance with the requirements of ONDCP Circular, Accounting of Drug Control Funding and Performance Summary, dated May 8, 2018 (the Circular). Williams Adley was unable to assess the accuracy of the number of products reported in Metric 2, “Number of counter-narcotics intelligence requests satisfied,” as part of the PSR.

>Review of U.S. Immigration and Customs Enforcement's Fiscal Year 2018 Drug Control Performance Summary Report
2019
OIG-19-45 Lessons Learned from Prior Reports on FEMA's 50 Percent Repair-or-Replace Rule Decisions 2019
OIG-19-29 The Office of National Drug Control Policy’s (ONDCP) Circular, Accounting of Drug Control Funding and Performance Summary, requires each National Drug Control Program agency to submit to the ONDCP Director a detailed accounting of all funds expended for National Drug Control Program activities during the previous fiscal year. CBP’s management was unable to provide supporting documentation for the drug control methodology used to estimate the percentages of obligations allocated between interdiction and intelligence. These percentages are used to derive the dollar-value of obligations reported as Drug Resources by Budget Decision Unit and Drug Control Function in the Table of FY 2018 Drug Control Obligations presented in CBP’s Detailed Accounting Submission.

>Review of U.S. Customs and Border Protection's Fiscal Year 2018 Detailed Accounting Submission for Drug Control Funds
2019
OIG-19-46 According to CBP statistics, the number of southwest border migrant apprehensions during the first seven months of FY 2019 has in general already surpassed that of the total apprehensions for each of the previous four fiscal years. At the sector level, El Paso has experienced the sharpest increase in apprehensions when comparing the first seven months of FY 2019 to the same period in FY 2018. The purpose  is to notify you of urgent issues that require immediate attention and action. Specifically, we are recommending that the Department of Homeland Security (DHS) take immediate steps to alleviate dangerous overcrowding at the El Paso Del Norte Processing Center (PDT).

>Management Alert - DHS Needs to Address Dangerous Overcrowding Among Single Adults at El Paso Del Norte Processing Center
2019
OIG-19-27 The Office of National Drug Control Policy’s (ONDCP) Circular, Accounting of Drug Control Funding and Performance Summary, requires each National Drug Control Program agency to submit to ONDCP Director a detailed accounting of all funds expended for National Drug Control Program activities during the previous fiscal year. Williams Adley & Company – DC, LLP (Williams Adley), under contract with the Department of Homeland Security OIG, issued an Independent Accountant’s Report on U.S. Coast Guard’s (Coast Guard) fiscal year (FY) 2018 Drug Control Performance Summary Report.

>Review of U.S. Coast Guard's Fiscal Year 2018 Drug Control Performance Summary Report
2019
OIG-19-43 The Department of Homeland Security did not comply with the Improper Payments Elimination and Recovery Act of 2010 (IPERA) because the Department did not meet two of the six requirements. Specifically, the Department omitted the percent of recaptured amounts from the Other Information section in its Agency Financial Report and did not meet its annual reduction target established for one of eight programs deemed susceptible to significant improper payments.The Department also did not comply with Executive Order 13520, Reducing Improper Payments, because DHS did not make available to the public its Quarterly High-Dollar Overpayment report for the second quarter of fiscal year 2018.

>Department of Homeland Security's FY 2018 Compliance with the Improper Payments Elimination and Recovery Act of 2010 and Executive Order 13520, Reducing Improper Payments
2019
OIG-19-26 The Office of National Drug Control Policy’s (ONDCP) Circular, Accounting of Drug Control Funding and Performance Summary, requires each National Drug Control Program agency to submit to ONDCP Director a detailed accounting of all funds expended for National Drug Control Program activities during the previous fiscal year. Williams, Adley & Company – DC, LLP (Williams Adley), under contract with the Department of Homeland Security OIG, issued an Independent Accountant’s Report on U.S. Customs and Border Protection’s (CBP) FY 2018 Drug Control Performance Summary Report. 

>Review of U.S. Customs and Border Protection's Fiscal Year 2018 Drug Control Performance Summary Report
2019
OIG-19-42 DHS expanded the Insider Threat Program from monitoring user activity on its classified networks to monitoring cleared and non-cleared employees’ activity on unclassified networks. We initiated a project to determine Insider Threat Program progress in monitoring, detecting, and responding to malicious insider threats on unclassified DHS systems and networks. Before continuing its planned expansion of the Insider Threat Program, DHS needs to address several deficiencies that may hinder program effectiveness and efficiency. Although the expanded program was approved in January 2017, the Office of the Chief Security Officer has yet to revise, obtain approval for, and reissue required documentation.

>DHS Needs to Address Oversight and Program Deficiencies before Expanding the Insider Threat Program
2019
OIG-19-25 Review of U.S. Immigration and Customs Enforcement's Fiscal Year 2018 Detailed Accounting Submission for Drug Control Funds 2019
OIG-19-39 This report presents the results of KPMG LLP’s (KPMG) work conducted to address the performance audit objectives relative to the Audit of Department of Homeland Security’s Fiscal Year 2017 Conference Spending. KPMG performed the work during the period of September 18, 2017 to August 30, 2018, and our scope period for testing was October 1, 2016 through September 30, 2017. KPMG LLP (KPMG) found that DHS management has policies and procedures over conference spending and reporting, improvements are needed. KMPG made seven recommendations to improve conference spending reporting.

>Audit of Department of Homeland Security's Fiscal Year 2017 Conference Spending
2019
OIG-19-24 Prompted by the suspicious cyber activities on election systems in 2016, Secretary Jeh Johnson designated the election infrastructure as a subsector to one of the Nation’s existing critical sectors. Our audit objective was to evaluate the effectiveness of the Department’s efforts to coordinate with states on securing the Nation’s election infrastructure. DHS has taken some steps to mitigate risks to the Nation’s election infrastructure; however, improved planning, more staff, and clearer guidance could better facilitate the Department’s coordination with state and local officials. Specifically, despite Federal requirements, DHS has not completed the plans and strategies critical to identifying emerging threats and mitigation activities, or established metrics to measure progress in securing the election infrastructure. Senior leadership turnover and insufficient guidance and administrative staff have hindered DHS’ ability to accomplish such planning.

>Progress Made, But Additional Efforts are Needed to Secure the Election Infrastructure
2019
OIG-19-41 Special Report: Review Regarding DHS OIG's Retraction of Thirteen Reports Evaluating FEMA's Initial Response to Disasters 2019
OIG-19-23 Within U.S. Customs and Border Protection (CBP), Border Patrol agents are responsible for patrolling our international land borders and coastal waters surrounding Florida and Puerto Rico. We conducted this audit to determine to what extent Border Patrol agents meet workload requirements related to investigative and law enforcement activities. Border Patrol needs to manage its workforce more efficiently, effectively, and economically. CBP and Border Patrol must expedite the development and implementation of a workforce staffing model for Border Patrol as required by Congress. Without a complete workforce staffing model, Border Patrol senior managers are unable to definitively determine the operational needs for, or best placement of, the 5,000 additional agents DHS was directed to hire per the January 2017 Executive Order.

>Border Patrol Needs a Staffing Model to Better Plan for Hiring More Agents
2019
OIG-19-40 Data Quality Improvements Needed to Track Adjudicative Decisions 2019
OIG-19-21 The objective was to determine whether TSA implemented proper procedures to safeguard the secure areas of our Nation’s airports and whether airports, aircraft operators, and contractors were complying with TSA’s security requirements to control access to these areas.

 

We identified vulnerabilities with various airport access control points and associated access control procedures. We made six recommendations related to standard operating procedures, deployment of new technology, identification of industry best practices, and training.

>Covert Testing of Access Controls to Secure Airport Areas
2019
OIG-19-22 We intended to verify whether the U.S. Coast Guard is properly reporting service members who are prohibited from possessing a firearm (“prohibited individuals”) to the Federal Bureau of Investigation (FBI). However, in comparing relevant databases with data into the National Instant Background Check System (NICS), We identified a number of issues that led us to question the reliability of the Coast Guard’s data.  As a result, OIG cannot identify the full scope of prohibited individuals or verify that the Coast Guard properly reported prohibited individuals to the Federal Bureau of Investigation (FBI) and to Congress.  Despite our concerns about the quality of Coast Guard’s data, OIG identified 210 service members who committed offenses that placed them in one of the categories of prohibited individuals.  Of these 210, Coast Guard did not enter 16 service members (8 percent) into NCIS.  This underreporting occurred because Coast Guard policy did not require attorneys to forward information about all individuals referred for trial by general court martial for reporting to the FBI.  Additionally, Coast Guard’s reporting to the FBI is centralized, and does not allow investigators in field offices to have direct access to NICS.  We made eight recommendations that will enhance Coast Guard’s reporting of prohibited individuals to the FBI.  The Coast Guard concurred with the recommendations.

>United States Coast Guard's Reporting of Uniform Code of Military Justice Violations to the Federal Bureau of Investigation
2019
OIG-19-38 FEMA Should Not Have Awarded Two Contracts to Bronze Star LLC 2019
OIG-19-20 This inspection is part of an ongoing review of ICE detention facilities. While conducting an unannounced visit to the Essex County Correctional Facility using ICE’s 2011 Performance-Based National Detention Standards, we identified serious violations. As part of this assessment, ICE must review and ensure compliance with those standards addressing unreported security incidents, food safety, and facility conditions that include ceiling leaks, unsanitary shower stalls, bedding, and outdoor recreation areas.

>Issues Requiring Action at the Essex County Correctional Facility in Newark, New Jersey
2019
OIG-19-34-UNSUM We determined that DHS' information security program for Top Secret/Sensitive Compartmented Information intelligence systems is effective this year as the Department achieved “Level 4 – Managed and Measurable” in three of five cybersecurity functions, based on current reporting instructions for intelligence systems. However, we identified deficiencies in DHS’ overall patch management process and the Cybersecurity and Infrastructure Security Agency’s weakness remediation and security awareness training activities.

 

We made one recommendation to the Office of Intelligence and Analysis and two recommendations to the Cybersecurity and Infrastructure Security Agency to address the deficiencies identified. DHS concurred with all three recommendations.

>(U) Evaluation of DHS' Compliance with Federal Information Security Modernization Act Requirements for Intelligence Systems for Fiscal Year 2018
2019
OIG-19-17 As a follow-up to our 2017 report on TSA’s Federal Air Marshal Service’s (FAMS) domestic flight operations, we conducted this audit to determine the extent to which FAMS can interdict an improvised explosive device during flight. We identified vulnerabilities with FAMS’ contribution to international flight security. Details related to FAMS operations and flight coverage presented in the report are classified or designated as Sensitive Security Information. We made two recommendations.

>FAMS' Contribution to International Flight Security is Questionable
2019
OIG-19-37 This interim report is part of an ongoing audit to determine the extent FEMA is meeting disaster survivors’ transitional shelter needs after the California wildfires and Hurricanes Harvey, Irma, and Maria in 2017. We determined that FEMA does not require disaster survivors to notify the agency when they vacate hotels participating in the TSA program, thus allowing the hotels to continue to bill FEMA for unoccupied rooms. Because FEMA is unaware when disaster survivors vacate the hotels, the agency does not know the magnitude of unnecessary hotel charges. Consequently, FEMA could not account for associated TSA payments it may have paid since August 2017, related to the 2017 hurricane season and California wildfires.

>Additional Controls Needed to Better Manage FEMA's Transitional Sheltering Assistance Program
2019
OIG-18-16 Independent Auditors' Report on DHS' FY 2017 Financial Statements and Internal Control over Financial Reporting 20187
OIG-18-43 The Office of National Drug Control Policy’s (ONDCP) Circular, Accounting of Drug Control Funding and Performance Summary, requires National Drug Control Program agencies to submit to the ONDCP Director, not later than February 1 of each year, a detailed accounting of all funds expended for National Drug Control Program activities during the previous fiscal year (FY). The Office of Inspector General (OIG) is required to conduct a review of the report and provide a conclusion about the reliability of each assertion made in the report. Independent Accountants’ Report on the U.S. Coast Guard’s (Coast Guard) FY 2017 Drug Control Performance Summary Report. Coast Guard’s management prepared the Performance Summary Report and the related disclosures in accordance with the requirements of the ONDCP Circular, Accounting of Drug Control Funding and Performance Summary, dated January 18, 2013 (Circular).

>Review of U.S. Coast Guard's Fiscal Year 2017 Drug Control Performance Summary Report
2018
OIG-18-75 Collectively, our FY 2017 work shows that FEMA continues to face systemic problems and operational challenges, as the variety of findings summarized in this report illustrates In FY 2017, FEMA did not manage disaster relief grants and funds adequately and did not hold grant recipients accountable for properly managing disaster relief funds. We continue to identify problems such as improper contract costs, and ineligible and unsupported expenditures.

In FY 2017, we identified $2.08 billion in questioned costs, which represents 96 percent of the $2.16 billion audited.2 We issued 37 reports concerning FEMA grants, programs, and operations funded by the DRF. Specifically, we conducted 16 grant audits, 13 proactive audits, and 8 program audits. In the last 9 fiscal years, we audited grant funds totaling $13.75 billion and reported potential monetary benefits of $6.55 billion.

>Summary and Key Findings of Fiscal Year 2017 FEMA Disaster Grant and Program Audits
2018
OIG-18-12 We prepared this special report to address challenges FEMA, Texas, Florida, U.S. territories in the Caribbean, and California may face managing insurance under the Public Assistance program in the wake of Hurricanes Harvey, Irma, and Maria, and the October 2017 California wildfires. This report describes lessons learned from findings and recommendations contained in our DHS OIG grant audit reports issued from fiscal years 2013–2017. During fiscal years 2013–2017, we issued 37 Disaster Assistance grant audit reports that disclosed challenges with FEMA’s Public Assistance insurance process. The major recurring challenges we identified included (1) Duplicate benefits in which subrecipients claimed FEMA reimbursement for costs that were covered by insurance; (2) Insufficient insurance in which subrecipients did not obtain and maintain sufficient insurance coverage required as a condition for receiving Federal disaster assistance; and (3) Misapplied or misallocated insurance proceeds in which subrecipients received insurance proceeds, and misapplied or did not allocate those proceeds to FEMA projects.

>Special Report: Lessons Learned from Previous Audit Reports on Insurance under the Public Assistance Program
2018
OIG-18-42 Management Alert - ICE's Training Model Needs Further Evaluation 2018
OIG-18-74 FEMA needs to continue providing technical assistance to and monitoring of California’s Public Assistance grant funding management.  This helps avoid the risk of exposing millions of taxpayer dollars to fraud, waste, or mismanagement and violating the Robert T. Stafford Disaster Relief and Emergency Assistance Act. In doing so, FEMA can assist California in providing reasonable, but not absolute assurance that Public Assistance subgrant funds are spent in accordance with Federal regulations and FEMA guidelines.

>Special Report: Lessons Learned from Previous Audit Reports Related to California's Practice of Managing Public Assistance Grant Funds
2018
OIG-18-11 Department leadership must commit itself to ensuring DHS operates more as a single entity. rather than a collection of components. The lack of progress in reinforcing a unity of effort translates to a missed opportunity for greater effectiveness. Second, Department leadership must establish and enforce a strong internal control environment typical of a more mature organization. The current environment of relatively weak internal controls affects all aspects of the Department’s mission, from border protection to immigration enforcement and from protection against terrorist attacks and natural disasters to cybersecurity. We have seen little evidence of proactive effort by leadership to view the organization holistically, to forcefully communicate the need for cooperation among components, and to establish programs or policies that ensure unity, even though such effort is a necessary precondition to unified action.

 

>Major Management and Performance Challenges Facing the Department of Homeland Security
2018
OIG-18-40 The Indiana Department of Homeland Security (Indiana) received $27.9 million in Federal Emergency Management Agency (FEMA) Hazard Mitigation Grant Program (HMGP) funds to disburse to eligible subgrantees for projects in 10 disasters declared from June 2004 to April 2014. Our objective was to determine whether Indiana administered the grant program in accordance with Federal regulations and ensured subgrantees properly accounted for and expended FEMA funds. Indiana unable to demonstrate it has procedures and processes to ensure compliance with all Federal monitoring and financial reporting requirements. Specifically, Indiana did not perform required subgrant monitoring during project implementation and post closeout; submit quarterly progress and financial reports that met requirements; and comply with financial management requirements to ensure subgrantees accounted for and expended FEMA grant funds according to Federal regulations and FEMA guidelines.

>Indiana Needs to Improve the Management of Its FEMA Hazard Mitigation Grants
2018
OIG-18-73 Not all forms DHS and its components use to create NDAs include the required WPEA statement. Further, although many of the settlement agreement templates and settlement agreements in the sample we reviewed included provisions that might restrict or prevent disclosure of information, nearly three-fourths of these documents did not contain the WPEA statement. Omitting the statement in NDAs and personnel settlement agreements could lead to confusion about what information may be disclosed to permissible recipients, which could deter reporting of fraud, waste, or abuse and impede DHS Office of Inspector General (OIG) activities.

>DHS' Non-disclosure Forms and Settlement Agreements Do Not Always Include the Required Statement from the Whistleblower Protection Enhancement Act of 2012
2018
OIG-18-10 The Department faces challenges to effectively sharing cyber threat information across Federal and private sector entities. Without acquiring a cross-domain information processing solution and automated tools, DHS cannot analyze and share threat information timely. Further, without enhanced outreach, DHS cannot increase participation and improve coordination of information sharing across Federal and private organizations.

 

>Biennial Report on DHS’ Implementation of the Cybersecurity Act of 2015
2018
OIG-18-41 DHS Needs to Strengthen Its Suspension and Debarment Program 2018
OIG-18-72 DHS did not comply with IPERA because it did not meet one of the six IPERA requirements. Specifically, DHS did not meet its annual reduction targets for 2 of 14 programs. Additionally, we determined that DHS did not provide adequate oversight of the component’s improper testing and reporting.

>Department of Homeland Security's FY 2017 Compliance with the Improper Payments Elimination and Recovery Act of 2010
2018
OIG-18-09 The County does not have legal responsibility for the disaster-related repairs on township roadway projects. Therefore, the County is not eligible to receive $6,151,893 in Federal funding identified as township projects because it is not legally responsible for the repairs to the damaged facilities (roadways).

>Management Alert - FEMA Should Recover $6.2 Million in Public Assistance Funds for Disaster Repairs That Are Not the Legal Responsibility of Richland County, North Dakota
2018
OIG-18-39 Audit of FEMA Public Assistance Grant Funds Awarded to Volunteer Energy 2018
OIG-18-71 We found that FEMA overpaid its employees because it mistakenly believed the Department’s payroll provider had an automated control to prevent payments over the annual cap, and because it did not follow its own premium pay policy. We also found that FEMA has no effective policy or practice to determine the Fair Labor Standards Act status of FEMA employees during disaster deployments, which also contributed to this issue. Since discovering the overpayments, FEMA has been working to calculate how many people were overpaid, but it cannot finish that analysis until it addresses a number of outstanding questions.

>FEMA Paid Employees Over the Annual Premium Pay Cap
2018