Skip to main content
U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Audits, Inspections, and Evaluations

Report Number Sort ascending Title Issue Date Fiscal Year
OIG-18-76 We determined that, from fiscal years 2010 to 2017, the number of assaults against CBP law enforcement officers decreased from 1,089 to 856. During the same time period, assaults of ICE law enforcement officers remained the same at 48. However, the data does not show a clear trend over that time period and the number of assaults varied widely from year to year. Our analysis also shows that, for a number of reasons, the data is unreliable and does not accurately reflect whether assaults have increased or decreased.

>Assaults on CBP and ICE Law Enforcement Officers
2018
OIG-18-75 Collectively, our FY 2017 work shows that FEMA continues to face systemic problems and operational challenges, as the variety of findings summarized in this report illustrates In FY 2017, FEMA did not manage disaster relief grants and funds adequately and did not hold grant recipients accountable for properly managing disaster relief funds. We continue to identify problems such as improper contract costs, and ineligible and unsupported expenditures.

In FY 2017, we identified $2.08 billion in questioned costs, which represents 96 percent of the $2.16 billion audited.2 We issued 37 reports concerning FEMA grants, programs, and operations funded by the DRF. Specifically, we conducted 16 grant audits, 13 proactive audits, and 8 program audits. In the last 9 fiscal years, we audited grant funds totaling $13.75 billion and reported potential monetary benefits of $6.55 billion.

>Summary and Key Findings of Fiscal Year 2017 FEMA Disaster Grant and Program Audits
2018
OIG-18-74 FEMA needs to continue providing technical assistance to and monitoring of California’s Public Assistance grant funding management.  This helps avoid the risk of exposing millions of taxpayer dollars to fraud, waste, or mismanagement and violating the Robert T. Stafford Disaster Relief and Emergency Assistance Act. In doing so, FEMA can assist California in providing reasonable, but not absolute assurance that Public Assistance subgrant funds are spent in accordance with Federal regulations and FEMA guidelines.

>Special Report: Lessons Learned from Previous Audit Reports Related to California's Practice of Managing Public Assistance Grant Funds
2018
OIG-18-73 Not all forms DHS and its components use to create NDAs include the required WPEA statement. Further, although many of the settlement agreement templates and settlement agreements in the sample we reviewed included provisions that might restrict or prevent disclosure of information, nearly three-fourths of these documents did not contain the WPEA statement. Omitting the statement in NDAs and personnel settlement agreements could lead to confusion about what information may be disclosed to permissible recipients, which could deter reporting of fraud, waste, or abuse and impede DHS Office of Inspector General (OIG) activities.

>DHS' Non-disclosure Forms and Settlement Agreements Do Not Always Include the Required Statement from the Whistleblower Protection Enhancement Act of 2012
2018
OIG-18-72 DHS did not comply with IPERA because it did not meet one of the six IPERA requirements. Specifically, DHS did not meet its annual reduction targets for 2 of 14 programs. Additionally, we determined that DHS did not provide adequate oversight of the component’s improper testing and reporting.

>Department of Homeland Security's FY 2017 Compliance with the Improper Payments Elimination and Recovery Act of 2010
2018
OIG-18-71 We found that FEMA overpaid its employees because it mistakenly believed the Department’s payroll provider had an automated control to prevent payments over the annual cap, and because it did not follow its own premium pay policy. We also found that FEMA has no effective policy or practice to determine the Fair Labor Standards Act status of FEMA employees during disaster deployments, which also contributed to this issue. Since discovering the overpayments, FEMA has been working to calculate how many people were overpaid, but it cannot finish that analysis until it addresses a number of outstanding questions.

>FEMA Paid Employees Over the Annual Premium Pay Cap
2018
OIG-18-70 Despite dedicating approximately $272 million to ground-based activities, including VIPR operations, FAMS could not demonstrate how these activities contributed to TSA’s mission. Visible Intermodal Prevention and Response (VIPR) operations, in which VIPR teams collaborate with local law enforcement to augment security at transportation hubs through an increased visible deterrent force.

FAMS could not demonstrate how these activities contributed to TSA’s mission. During our assessment of FAMS’ contributions to TSA’s layered approach to security, we determined that FAMS lacked performance measures for the 24 strategic initiatives and most ground-based activities outlined in its strategic plan. Additionally, FAMS’ VIPR operations performance measures fail to determine the program’s effectiveness. FAMS could not provide a budget breakout by division or operational area.

>FAMS Needs to Demonstrate How Ground-Based Assignments Contribute to TSA's Mission
2018
OIG-18-69 Since FY 2014, DHS improved conference spending reporting and implemented policies and procedures to ensure proper oversight and accurate and timely reporting. However, we found instances where DHS did not comply with annual conference reporting requirements. The Department failed to report two conferences costing more than $100,000 each. The Department also did not always report all hosted conferences costing more than $20,000 to OIG within 15 days of the conclusion of each conference. In addition, the Department did not always properly record actual costs accurately and within 45 days of the conclusion of each conference. Although DHS did not always comply with reporting requirements, in most cases, its FY 2016 conference expenses appeared appropriate, reasonable, and necessary.

>Audit of Department of Homeland Security's Fiscal Year 2016 Conference Spending
2018
OIG-18-68 Although CBP had controls over its polygraph examination process, a key control over its review and approval process was not always operating as intended. Specifically, the polygraph quality control program may not have always conducted independent and objective reviews (blind reviews) of polygraph examination results, as required. We also determined that 96 percent of the complaints we reviewed were unfounded or ambiguous. Nevertheless, CBP did not have a formal complaint review process, which led to inconsistent and subjective reviews. This approach risks not finding or properly addressing issues contained in the complaints.

>Most Complaints about CBP's Polygraph Program Are Ambiguous or Unfounded
2018
OIG-18-67 Neither type of inspection ICE uses to examine detention facilities ensures consistent compliance with detention standards or comprehensive correction of identified deficiencies. Specifically, because the Nakamoto inspection scope is too broad, ICE’s guidance on procedures is unclear, and Nakamoto’s inspection practices are not consistently thorough, its inspections do not fully examine actual conditions or identify all compliance deficiencies. In contrast, ODO uses effective methods and processes to thoroughly inspect facilities and identify deficiencies, but the inspections are too infrequent to ensure the facilities implement all corrections. Moreover, ICE does not adequately follow up on identified deficiencies or systematically hold facilities accountable for correcting deficiencies, which further diminishes the usefulness of both Nakamoto and ODO inspections.

>ICE's Inspections and Monitoring of Detention Facilities Do Not Lead to Sustained Compliance or Systemic Improvements
2018
OIG-18-66 In July 2017, FEMA reported that it awarded 252 projects under the PA alternative procedures pilot program valued at $11.9 billion, with just 26 of those projects (10.32 percent) closed. During our fieldwork, we gained access to FEMA’s grant management system of record and reviewed supporting documentation for the project worksheets in our scope to determine if FEMA followed its criteria when validating cost estimates. However, FEMA did not sufficiently document actions that it took to validate subrecipient cost estimates to ensure costs are reasonable. Of the three obligated projects we reviewed during our fieldwork, we did not find evidence that FEMA completed the required steps identified to validate the reasonableness of subrecipient cost estimates.

>Sandy Recovery Improvement Act Review
2018
OIG-18-65 Between January 2016 and April 2017, DHS OIG received dozens of allegations regarding a variety of issues at the FLETC facility in Glynco, Georgia. Following extensive investigation, DHS OIG determined that many of the allegations could not be substantiated. However, with respect to certain other allegations, DHS OIG’s findings indicate that some of FLETC’s senior managers, including former Director Connie Patrick, failed to exercise the judgment, stewardship, and leadership expected of DHS senior officials. This report focuses on two specific allegations that exemplify the broader issues uncovered by DHS OIG’s investigation. Many of the allegations DHS OIG received regarding FLETC related to the official travel of the former FLETC Director, Connie Patrick. Patrick served as the Director of FLETC from 2002 until her retirement in June 2017. During this time, she frequently traveled domestically and internationally on FLETC-related business. DHS OIG conducted an extensive review of Patrick’s travel for the period January 15, 2014 through June 23, 2016 to identify any instances of impropriety. In addition to multiple complaints about Patrick’s alleged noncompliance with federal, DHS, and FLETC travel rules and regulations, DHS OIG received complaints alleging that Patrick pressured FLETC managers to hire her husband, John Patrick (JP), for a term position within the FLETC Law Enforcement Leadership Institute (LELI). DHS OIG’s investigation determined that JP was hired to a term position with LELI on January 3, 2010 and completed the term on September 11, 2011 — all during Patrick’s tenure as Director of FLETC

>Special Report - Certain Findings Relating to the OIG's Investigation of Allegations Involving FLETC Senior Officials
2018
OIG-18-64 The County estimated that it had sustained $2.7 million in damages from severe storms and flooding in February 2017. We conducted the audit early in the grant process to identify areas in which the County may need additional technical assistance and monitoring to ensure compliance with Federal requirements. DHS OIG found that the County does not have adequate procurement policies, procedures, and business practices that comply fully with all Federal standards for its planned procurements, totaling approximately $500,000. At the time of our fieldwork, FEMA had not completed project worksheets to define the scope of disaster work. At this early stage in the grant process, Utah needs to provide the County with additional technical assistance and increased monitoring. Doing so should provide FEMA reasonable, but not absolute, assurance that the County will spend the $2.7 million in total estimated disaster-related costs according to Federal requirements.

>Cache County, Utah, Needs Additional Assistance and Monitoring to Ensure Proper Management of Its FEMA Grant
2018
OIG-18-63 The Diamondhead Water and Sewer District (District), received a Federal Emergency Management Agency (FEMA) grant award of $49.3 million from the Mississippi Emergency Management Agency (Mississippi) for damage resulting from Hurricane Katrina in 2005. We had concerns because it took the District about 10 years to break ground on its new wastewater treatment plant. We also wanted to determine whether FEMA accurately applied its “50 Percent Rule.” we identified $1.5 million of improper procurement, unsupported costs, duplicate insurance benefits, and uncompleted project costs that FEMA should disallow to the District. These problems were largely the result of Mississippi not fulfilling its grantee responsibility to ensure the District properly managed FEMA funds. Mississippi is responsible for monitoring subgrant activities, and is compensated with Federal funds to support subgrant management and oversight. It is FEMA’s responsibility to hold Mississippi accountable for proper grant administration.

>FEMA Should Recover $20.4 Million in Grant Funds Awarded to Diamondhead Water and Sewer District, Mississippi
2018
OIG-18-62 The Victor Valley Wastewater Reclamation Authority, through its main engineering contractor (Contractor C), presented incorrect data and misinformed FEMA in obtaining a Federal grant of more than $33 million for its pipeline replacement and relocation project. Authority officials wanted to move the pipeline outside of the Mojave Riverbed, but noted the high cost to do so. Authority officials knew that replacing and relocating the pipeline was the most expensive repair option, as their Contractors A and C informed them. However, through Contractor C, Authority officials repeatedly provided FEMA incorrect data that made Alternative 2 appear to be the least expensive. Based on the incorrect information Authority officials provided, FEMA funded $11 million for the replacement and relocation project in 2013 and an additional $22 million in 2014, a total of $33 million. We question the entire $33 million as ineligible because the Authority did not comply with Federal regulations, and FEMA policies and procedures, in preparing cost estimates for FEMA.

>Victor Valley Wastewater Reclamation Authority, California, Provided FEMA Incorrect Information for Its $33 Million Project
2018
OIG-18-61 We conducted a verification review to determine the adequacy, effectiveness, and timeliness of USCIS' corrective actions to address the seven report recommendations in Better Safeguards Are Needed in USCIS Green Card Issuance, OIG-17-11, November 16, 2016. At the time of our audit fieldwork in spring 2016, USCIS’ efforts to address the errors were inadequate. USCIS conducted a number of efforts to recover the inappropriately issued cards; however, these efforts also were not fully successful. At the time of our audit fieldwork in spring 2016, USCIS’ efforts to address the errors were inadequate. USCIS conducted a number of efforts to recover the inappropriately issued cards; however, these efforts also were not fully successful.

>Verification Review: Better Safeguards Are Needed in USCIS Green Card Issuance (OIG-17-11)
2018
OIG-18-60 At the time of our audit, Federal Emergency Management Agency (FEMA) estimated that the City of Waterloo, Iowa (City), sustained approximately $1.9 million in damages from severe storms and flooding from September 21 through October 3, 2016. The City did not provide all requested information and explanations necessary to perform our review; therefore, we were unable to assess whether the City’s policies, procedures, and business practices were adequate to account for FEMA Public Assistance grant funds properly. The City’s failure to cooperate with a Federal audit put approximately $1.9 million dollars in potential FEMA grant funding at risk of being deobligated or not funded.

>The City of Waterloo, Iowa Jeopardizes $1.9 Million in Estimated FEMA Grant Funding
2018
OIG-18-59 Pursuant to the Federal Information Security Modernization Act of 2014, we reviewed the Department’s security program, including its policies, procedures, and system security controls for the enterprise-wide intelligence system. Since our FY 2016 evaluation, the Office of Intelligence and Analysis (I&A) has continued to provide effective oversight of the department-wide intelligence system and has implemented programs to monitor ongoing security practices. In addition, the United States Coast Guard is in the process of migrating its intelligence users to a system that is jointly managed by the Defense Intelligence Agency and the National Geospatial Agency.

>Fiscal Year 2017 Evaluation of DHS' Compliance with Federal Information Security Modernization Act Requirements for Intelligence Systems
2018
OIG-18-58 "U.S. Citizenship and Immigration Services (USCIS) adjudicates applications for immigration benefits, including applications for permanent resident cards, also known as green cards. In response to congressional concerns, we examined green card application processing times, as well as why processing times vary among USCIS field offices. USCIS regularly posts information on its website about the time it takes field offices to adjudicate green card applications (processing time). Yet, the information is unclear and not helpful to USCIS’ customers because it does not reflect the actual amount of time it takes field offices, on average, to complete green card applications.

>USCIS Has Unclear Website Information and Unrealistic Time Goals for Adjudicating Green Card Applications
2018
OIG-18-57 The Government Charge Card Abuse Prevention Act of 2012 (Charge Card Act) requires the Office of Inspector General to conduct an annual risk assessment and periodic audits on agency charge card programs. We conducted this audit to determine whether the Department of Homeland Security implemented internal controls to prevent illegal, improper, and erroneous purchases and payments. During fiscal year 2016, DHS reported spending approximately $1.2 billion in purchase, travel, and fleet card transactions. Although the Department has established internal controls for its charge card programs, the components we reviewed did not always follow DHS’ procedures. Our testing results of purchase, travel, and fleet card transactions revealed internal control weaknesses. Specifically, we found major internal control weaknesses that persisted at the United States Coast Guard and some control weaknesses within CBP’s Fleet Card Program.

>Fiscal Year 2016 Audit of the DHS Bankcard Program Indicates Moderate Risk Remains
2018
OIG-18-56 We reviewed DHS’ information security program in accordance with the Federal Information Security Modernization Act of 2014 (FISMA). Our objective was to determine whether DHS’ information security program and practices were adequate and effective in protecting the information and information systems that supported DHS’ operations and assets in fiscal year 2017.

>Evaluation of DHS' Information Security Program for Fiscal Year 2017
2018
OIG-18-55 Department of Homeland Security (DHS) Under Secretary for Intelligence and Analysis (USIA) David J. Glawe used a personal email account to send an invitation to his ceremonial swearing-in event to staff members of the United States Senate Committee on Homeland Security and Governmental Affairs. Because the invitation came from a non-DHS email account and resembled a phishing email, Senator Claire McCaskill asked the DHS Office of Inspector General to review the circumstances surrounding the invitation

>Special Review: Swearing-In Ceremony of David J. Glawe, DHS Under Secretary for Intelligence and Analysis
2018
OIG-18-54 In November 2015, we reported that the Federal Emergency Management Agency’s (FEMA) information technology (IT) management approach did not adequately address technology planning, governance, and system support challenges to effectively support its mission. We issued five recommendations to the FEMA Chief Information Officer (CIO) aimed at improving the agency’s management of IT.1 Specifically, we recommended the CIO finalize key planning documents related to IT modernization; execute against those planning documents; fully implement an IT governance board; improve integration and functionality of existing systems; and implement agency-wide acquisition, development, and operation and maintenance standards.

 

>Management Alert - Inadequate FEMA Progress in Addressing Open Recommendations from our 2015 Report, "FEMA Faces Challenges in Managing Information Technology" (OIG-16-10)
2018
OIG-18-53 U.S. Senator Claire McCaskill asked us to review ICE’s modification of its intergovernmental service agreement (IGSA) with the City of Eloy in Arizona to procure family detention space in Dilley, Texas. We also reviewed other selected IGSAs to determine whether they complied with applicable laws and regulations. (ICE) is responsible for the detention of removable aliens. ICE commonly uses a type of agreement called an IGSA to reserve space at detention facilities owned or operated by state or local governments. In September 2014, ICE improperly modified an existing IGSA with the City of Eloy (Eloy) in Arizona to establish the 2,400-bed South Texas Family Residential Center in Dilley, Texas, more than 900 miles away. Although ICE could have contracted directly with the private company that operates the South Texas Family Residential Center, CCA, it instead created an unnecessary “middleman” by modifying its existing IGSA with Eloy. Eloy’s sole function under the modification is to act as the middleman between ICE and CCA; Eloy collects about $438,000 in annual fees for this service.

>Immigration and Customs Enforcement Did Not Follow Federal Procurement Guidelines When Contracting for Detention Services
2018
OIG-18-52 In light of the heightened public and congressional interest in the misuse of government-owned, government-leased, and chartered aircraft, the Department of Homeland Security (DHS) Office of Inspector General (OIG) conducted a special review of the use of government aircraft by the heads of the Department and several of DHS’s operational components. DHS OIG’s review also included a review of other-than-coach-class travel by this same group of senior officials. We determined that each instance of the use of government aircraft by DHS’s senior leaders during the time period of our review generally complied with relevant laws, rules, regulations, policies, and guidance.

With respect to DHS senior leaders’ other-than-coach-class (OTCC) commercial air travel over the same time period, we determined that such travel generally qualified as allowable premium travel. We could not definitively determine, however, whether one trip taken by a former Deputy Secretary met all of the Department’s criteria for allowable OTCC travel. We also identified two specific instances of non-compliance with the Department’s internal request and approval processes for such travel; however, the related travel was properly justified, and the process deviations were quickly identified and corrected by the Department.

>Special Review: DHS Executive Travel Review
2018
OIG-18-51 Homeland Security Presidential Directive (HSPD) 12 requires that Federal agencies implement a government-wide standard for secure, reliable identification for their employees and contractors to access facilities and systems. Our objective was to assess DHS’ progress in implementing and managing the HSPD-12 program since our prior audits in 2007 and 2010.  The Department of Homeland Security has not made much progress in implementing and managing requirements of the HSPD-12 program department-wide. Many of the same issues we previously reported in 2007 and 2010 pose challenges today.

>Department-wide Management of the HSPD-12 Program Needs Improvement
2018
OIG-18-50 The TSA SSI Program Office's Identification and Redaction of Sensitive Security Information 2018
OIG-18-49 The Federal Emergency Management Agency (FEMA) estimated that the City of Cedar Falls, Iowa (City), had sustained approximately $893,000 in damage caused by severe storms and flooding from September 21 through October 3, 2016. We audited early in the grant process to identify areas in which the City may need additional technical assistance or monitoring to ensure compliance with Federal procurement requirements. Except for procurement, the City’s policies, procedures, and business practices appear to be adequate to account for and expend FEMA grant funds according to Federal regulations and FEMA policies. Specifically, the City’s procurement policies did not provide sufficient opportunities for disadvantaged firms to compete for contracts, or prevent awarding contracts to debarred or suspended contractors. After we discussed these issues, City officials moved quickly to modify procurement policies to comply with Federal requirements.

>City of Cedar Falls, Iowa Has Policies, Procedures, and Business Practices to Manage Its FEMA Grant
2018
OIG-18-48 The Office of National Drug Control Policy’s (ONDCP) Circular, Accounting of Drug Control Funding and Performance Summary, requires National Drug Control Program agencies to submit to the ONDCP Director, not later than February 1 of each year, a detailed accounting of all funds expended for National Drug Control Program activities during FY 2017. There are six program offices within CBP that are tasked with drug-control responsibilities: the United States Border Patrol (USBP), the Offices of Field Operations (OFO), Information and Technology (OIT), Training and Development (OTD), Acquisition (OA), and Air and Marine (AMO)).

>Review of U.S. Customs and Border Protection's Fiscal Year 2017 Detailed Accounting Submission for Drug Control Funds
2018
OIG-18-47 The Office of National Drug Control Policy’s (ONDCP) Circular, Accounting of Drug Control Funding and Performance Summary, requires National Drug Control Program agencies to submit to the ONDCP Director, not later than February 1 of each year, a detailed accounting of all funds expended for National Drug Control Program activities during FY 2017. This Performance Summary Report contains the performance measures aligned to drug control decision units as required by the Office of National Drug Control Policy (ONDCP) Circular: Accounting of Drug Control Funding and Performance Summary, dated January 18, 2013. The drug control decision units are as follows: (1) Salaries and Expenses, (2) Air and Marine Interdiction, Operations, Maintenance, and Procurement and (3) Border Security Fence, Infrastructure and Technology.

>Review of U.S. Customs and Border Protection's Fiscal Year 2017 Drug Control Performance Summary Report
2018
OIG-18-46 The Office of National Drug Control Policy’s (ONDCP) Circular, Accounting of Drug Control Funding and Performance Summary, requires National Drug Control Program agencies to submit to the ONDCP Director, not later than February 1 of each year, a detailed accounting of all

funds expended for National Drug Control Program activities during FY 2017. U.S. Immigration and Customs Enforcement (ICE) is a multi-mission bureau, and obligations are reported pursuant to an approved drug methodology. ICE's Homeland Security Investigations (HSI) Domestic Investigations, International Operations (IO) and Office of Intelligence uphold U.S. drug control policy delegated amid the Office of National Drug Control Policy (ONDCP) initiatives, by fully supporting the overall ICE mandate to detect, disrupt, and dismantle smuggling organizations.

>Review of U.S. Immigration and Customs Enforcement's Fiscal Year 2017 Detailed Accounting Submission for Drug Control Funds
2018
OIG-18-45 The Office of National Drug Control Policy’s (ONDCP) Circular, Accounting of Drug Control Funding and Performance Summary, requires National Drug Control Program agencies to submit to the ONDCP Director, not later than February 1 of each year, a detailed accounting of all funds expended for National Drug Control Program activities during the previous fiscal year (FY).  The Office of Inspector General (OIG) is required to conduct a review of the report and provide a conclusion about the reliability of each assertion made in the report. Independent Accountants’ Report on the

U.S. Immigration and Custom Enforcement’s (ICE) FY 2017 Drug Control Performance Summary Report. ICE’s management prepared the Performance Summary Report and the related disclosures in accordance with the requirements of the ONDCP Circular, Accounting of Drug Control Funding and Performance Summary, dated January 18, 2013 (Circular).

>Review of U.S. Immigration and Customs Enforcement's Fiscal Year 2017 Drug Control Performance Summary Report
2018
OIG-18-44 The Office of National Drug Control Policy’s (ONDCP) Circular, Accounting of Drug Control Funding and Performance Summary, requires National Drug Control Program agencies to submit to the ONDCP Director, not later than February 1 of each year, a detailed accounting of all funds expended for National Drug Control Program activities during the previous fiscal year (FY). The Office of Inspector General (OIG) is required to conduct a review of the agency’s submission and provide a conclusion about the reliability of each assertion in the report. an Independent Accountants’ Report on U.S. Coast Guard’s (Coast Guard) Detailed Accounting Submission. Coast Guard’s management prepared the Table of FY 2017 Drug Control Obligations and related disclosures in accordance with the requirements of the ONDCP Circular, Accounting of Drug Control Funding and Performance Summary, dated January 18, 2013 (Circular).

>Review of U.S. Coast Guard's Fiscal Year 2017 Detailed Accounting Submission for Drug Control Funds
2018
OIG-18-43 The Office of National Drug Control Policy’s (ONDCP) Circular, Accounting of Drug Control Funding and Performance Summary, requires National Drug Control Program agencies to submit to the ONDCP Director, not later than February 1 of each year, a detailed accounting of all funds expended for National Drug Control Program activities during the previous fiscal year (FY). The Office of Inspector General (OIG) is required to conduct a review of the report and provide a conclusion about the reliability of each assertion made in the report. Independent Accountants’ Report on the U.S. Coast Guard’s (Coast Guard) FY 2017 Drug Control Performance Summary Report. Coast Guard’s management prepared the Performance Summary Report and the related disclosures in accordance with the requirements of the ONDCP Circular, Accounting of Drug Control Funding and Performance Summary, dated January 18, 2013 (Circular).

>Review of U.S. Coast Guard's Fiscal Year 2017 Drug Control Performance Summary Report
2018
OIG-18-42 Management Alert - ICE's Training Model Needs Further Evaluation 2018
OIG-18-41 DHS Needs to Strengthen Its Suspension and Debarment Program 2018
OIG-18-40 The Indiana Department of Homeland Security (Indiana) received $27.9 million in Federal Emergency Management Agency (FEMA) Hazard Mitigation Grant Program (HMGP) funds to disburse to eligible subgrantees for projects in 10 disasters declared from June 2004 to April 2014. Our objective was to determine whether Indiana administered the grant program in accordance with Federal regulations and ensured subgrantees properly accounted for and expended FEMA funds. Indiana unable to demonstrate it has procedures and processes to ensure compliance with all Federal monitoring and financial reporting requirements. Specifically, Indiana did not perform required subgrant monitoring during project implementation and post closeout; submit quarterly progress and financial reports that met requirements; and comply with financial management requirements to ensure subgrantees accounted for and expended FEMA grant funds according to Federal regulations and FEMA guidelines.

>Indiana Needs to Improve the Management of Its FEMA Hazard Mitigation Grants
2018
OIG-18-39 Audit of FEMA Public Assistance Grant Funds Awarded to Volunteer Energy 2018
OIG-18-38 Facing continued negative publicity and pressure from Members of Congress, FEMA established the Sandy Claims Review Process (SCRP). In doing so, FEMA did not rely on legislatively mandated internal controls designed to ensure appropriate payments for flood victims. Additionally, during the formation and operation of the SCRP, FEMA failed to establish contractor expectations or provide consistent guidance and oversight related to Hurricane Sandy claims. These omissions resulted in policyholders receiving unsupported additional payments, excessive costs to operate the SCRP, and time delays in processing the claims

>Unsupported Payments Made to Policyholders Who Participated in the Hurricane Sandy Claims Review Process
2018
OIG-18-37 Following news reports that U.S. Customs and Border Protection (CBP) personnel implementing Executive Order#13769 (EO) “Protecting the Nation from Foreign Terrorist Entry into the United States”(January 27, 2017) potentially violated the civil rights of individual travelers, we received a congressional request to investigate DHS’s implementation of the EO. In response, we investigated how DHS and CBP, the DHS entity primarily responsible for implementation of the EO, responded to challenges presented by the EO, including the consequence of court orders and CBP’s compliance with them. In our investigation, we found that CBP was caught by surprise when the President issued the EO on January 27, 2017. DHS had little opportunity to prepare for and respond to basic questions about which categories of travelers were affected by the EO. We found that the bulk of travelers affected by the EO who arrived in the United States, particularly LPRs, received national interest waivers. In addition, we observed that the lack of a public or congressional relations strategy significantly hampered CBP and harmed its public image.

>DHS Implementation of Executive Order #13769 "Protecting the Nation From Foreign Terrorist Entry Into the United States" (January 27, 2017) (Redacted)
2018
OIG-18-36 ICE Enforcement and Removal Operations (ERO) faces challenges in implementing the Known or Suspected Terrorist Encounter Protocol (KSTEP) screening process, which is used to identify aliens who may be known or suspected terrorists. Although ERO uses KSTEP to screen all aliens who are in ICE custody, ERO policy does not require continued screening of the approximately 2.37 million aliens when released and under ICE supervision. We sampled and tested 40 of 142 ERO case files of detained aliens identified as known or suspected terrorists during fiscal years 2013–15. All 40 files had at least one instance of noncompliance with KSTEP policy, generating greater concerns regarding the population of aliens screened and determined to have no connections to terrorism.

>ICE Faces Challenges to Screen Aliens Who May Be Known or Suspected Terrorists (Redacted)
2018
OIG-18-35 Special Review: TSA's Handling of the 2015 Disciplinary Matter Involving TSES Employee (Redacted) – Retracted 2018
OIG-18-34 The DATA Act required the OIG to review a statistically valid sample of DHS’ fiscal year 2017, 2nd quarter spending data posted on USASpending.gov and to submit to Congress a report assessing the data’s completeness, timeliness, quality, and accuracy; and DHS’ implementation and use of Government-wide financial data standards. The Digital Accountability and Transparency Act of 2014 (DATA Act) required DHS to submit, by May 2017, complete, accurate, and timely spending data to the Department of the Treasury (Treasury) for publication on USASpending.gov beginning with the 2nd quarter of FY 2017. DHS successfully certified and submitted its FY 2017/Q2 spending data for posting on USASpending.gov in April 2017. Although DHS met the DATA Act’s mandated submission deadline, we identified issues concerning the completeness and accuracy of its first data submission that hinders the quality and usefulness of the information.

 

>DHS' Implementation of the DATA Act
2018
OIG-18-33 Because of the high dollar amount in disaster funds likely awarded and the history of audit questioned costs for FEMA disaster funds, FEMA’s inadequate grant management poses a significant risk to taxpayer dollars. We identified issues in our previous reports that demonstrate FEMA’s ongoing issues with ensuring disaster grant recipients and subrecipients comply with Federal regulations and FEMA guidelines. Specifically, FEMA faces significant challenges in ensuring its grant recipients properly manage FEMA disaster funds. This alert highlights the significant deficiencies with FEMA’s internal controls and its lack of enforcement of Federal requirements. As FEMA moves forward with its recovery efforts, it must hold recipients accountable for proper grant management. FEMA must implement and use effective controls to overcome existing problems with managing and monitoring funds for disaster response and recovery.

>Management Alert - FEMA Faces Significant Challenges Ensuring Recipients Properly Manage Disaster Funds
2018
OIG-18-32 In response to concerns raised by immigrant rights groups and complaints to the Office of Inspector General (OIG) Hotline about conditions for detainees held in U.S. Immigration and Customs Enforcement (ICE) custody, we conducted unannounced inspections of five detention facilities to evaluate their compliance with ICE detention standards. We identified problems that undermine the protection of detainees’ rights, their humane treatment, and the provision of a safe and healthy environment. Although the climate and detention conditions varied among the facilities and not every problem was present at all of them, our observations, interviews with detainees and staff, and our review of documents revealed several issues. Upon entering some facilities, detainees were housed incorrectly based on their criminal history. Further, in violation of standards, all detainees entering one facility were strip searched. Available language services were not always used to facilitate communication with detainees. Some facility staff reportedly deterred detainees from filing grievances and did not thoroughly document resolution of grievances. Staff did not always treat detainees respectfully and professionally, and some facilities may have misused segregation. Finally, we observed potentially unsafe and unhealthy detention conditions.

>Concerns About ICE Detainee Treatment and Care at Detention Facilities
2018
OIG-18-31 During our August 2017 site visit to the FLETC Artesia Training Center, we identified a potential safety issue at a warehouse, Building 13. The Border Patrol Academy had been using the warehouse to train new hires on search and conveyance. In 2009, a vehicle from an adjacent driving course struck the warehouse. FLETC officials could not provide documentation to support that an engineering evaluation was conducted to determine whether the accident affected the integrity of the warehouse structure. Border Patrol Academy officials also expressed safety concerns about using the warehouse to train new hires.

>Management Alert - Safety Issue at FLETC Artesia Warehouse
2018
OIG-18-30 This is a Department of Homeland Security, Office of Inspector General management alert to make the Federal Emergency Management Agency (FEMA) and its partners aware of active attempts — observed during our ongoing disaster oversight work in Puerto Rico — to profit from disaster survivors seeking FEMA assistance. We observed posted notices featuring a logo similar to FEMA’s, advertising paid services to complete the FEMA disaster assistance application on behalf of survivors. These services appear to be associated with FEMA, but actually are not, and demand a fee for services FEMA provides at no cost.

To complete the disaster assistance application forms, the paid service requires disaster survivors to provide their Personally Identifiable Information (PII) — such as their social security number, household annual income, and bank account numbers — to a third party, which exposes survivors to unnecessary risks.

>Management Alert - FEMA Must Take Steps to Stop Those Attempting to Profit from Disaster Survivors Seeking Assistance in Puerto Rico
2018
OIG-18-29 This is a Department of Homeland Security Office of the Inspector General (OIG) special report on Federal Emergency Management Agency (FEMA) and FEMA recipient and sub recipient disaster-related procurements. FEMA is currently responding to some of the most catastrophic disasters in U.S. history — Hurricanes Harvey, Irma, Maria, and the October 2017, California wildfires. Because of the massive scale of damage and the large number and high-dollar contracts that will likely be awarded, there is a significant risk that billions of taxpayer dollars may be exposed to waste, fraud, and abuse.

>Lessons Learned from Prior Reports on Disaster-related Procurement and Contracting
2018
OIG-18-28 Osceola Electric Cooperative, Inc. (Osceola) received a $10 million Federal Emergency Management Agency (FEMA) grant award for damages caused by a severe winter storm in April 2013. Although the disaster occurred 4 years ago, Osceola has not completed all FEMA projects. We conducted this audit early in the grant process to identify areas in which Osceola may need additional technical assistance or monitoring to ensure compliance. Osceola generally accounted for and expended $10 million FEMA Public Assistance Funds according to Federal regulations and FEMA guidelines.

>Osceola Electric Cooperative, Iowa, Generally Managed FEMA Grant Funds According to Federal Requirements
2018
OIG-18-27 The Transportation Security Administration (TSA) intended to expand TSA PreCheck to 25 million air travelers at a rate of more than 5 million enrollments per year. We evaluated whether the current TSA PreCheck Application Program adjudication process will allow TSA to meet its enrollment goals. TSA did not allocate additional resources or staff to the TSA Adjudication Center, which had multiple vacancies and was tasked with manually processing about 26 percent of TSA PreCheck Application Program applications. To make matters worse, in June 2016, TSA PreCheck applications surged, leaving the Adjudication Center overwhelmed with applications to process. As the application queue grew, TSA brought on detailees from other Federal agencies to assist with adjudications part time, but they did not have a significant impact. Further, the Adjudication Center relies on a manual caseload assignment and reporting process, which is inefficient for the volume of TSA PreCheck applications needing adjudication.

>TSA's Adjudication Resources are Inadequate to Meet TSA PreCheck Enrollment Goals
2018