Skip to main content
U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Audits, Inspections, and Evaluations

Report Number Title Issue Date Sort descending Fiscal Year
OIG-17-110 We determined that FEMA is unable to assess flood hazard miles to meet its program goal and is not ensuring mapping partner quality reviews are completed in accordance with applicable guidance.  FEMA needs to improve its management and oversight of flood mapping projects to achieve or reassess its program goals and ensure the production of accurate and timely flood maps.  We made four recommendations that would help FEMA strengthen its management and oversight of flood mapping projects to achieve program goals.  FEMA concurred with all four recommendations.

>FEMA Needs to Improve Management of its Flood Mapping Program
2017
OIG-17-112 We conducted covert tests to determine the effectiveness of TSA's checkpoint screening equipment and screener performance in identifying and resolving potential security threats at airport security checkpoints. We identified vulnerabilities with TSA's screener performance, screening equipment, and associated procedures. Details related to our testing results presented in the report are classified or designated Sensitive Security Information. We are making eight recommendations that when implemented, should improve TSA's screening checkpoint operational effectiveness.

>Covert Testing of TSA’s Screening Checkpoint Effectiveness
2017
OIG-17-114 We determined that U.S. Customs and Border Protection (CBP) IT systems and infrastructure did not fully support its border security objective of preventing the entry of inadmissible aliens to the country.  The slow performance of a critical system used for pre-screening travelers reduced Office of Field Operations officers’ ability to identify any passengers who may pose concerns, including national security threats.  Further, incoming passenger screening at U.S. international airports was hampered by system outages that created passenger delays and public safety risks.  IT systems and infrastructure also did not fully support Border Patrol and Air and Marine Operations border security activities between ports of entry.  Poor systems performance and network instability resulted in processing backlogs and agents’ inability to meet deadlines for submitting potential criminal alien prosecution cases.  Also, network outages hindered air and marine surveillance operations, reducing the situational awareness needed to detect inadmissible aliens and cargo approaching U.S. borders.  CBP has not yet addressed these long-standing IT systems and infrastructure challenges, due in part to ongoing budget constraints.  We recommended that CBP take steps to address passenger screening and border security IT systems and infrastructure challenges.  We made seven recommendations and CBP concurred with all seven of our recommendations.

>CBP's IT Systems and Infrastructure Did Not Fully Support Border Security Operations
2017
OIG-17-113-D We determined that while the Commission has a system in place to account for funds on a project-by-project basis and generally expended Public Assistance grant funds according to FEMA guidelines, the Commission needs additional assistance in developing long-term solutions for repetitive damages to county roads and managing its $5.4 million FEMA grant. We found that the Commission did not receive adequate guidance from FEMA and Alabama concerning Hazard Mitigation funding for long-term solutions to repetitive damages to roads; thus, potentially costing FEMA millions of dollars in the future; and project formulation, causing improperly written project scopes.  Additionally, the Commission did not have proper procurement procedures to ensure that small businesses, minority-owned firms, and women’s business enterprises have an opportunity to bid on Federal contracts; and adequate procedures to ensure proper documentation is collected to support $24,000 in costs. The report contains five recommendations to the Regional Administrator, FEMA Region IV, to provide the Commission with additional guidance to properly manage its $5.4 million and save millions in the future.  FEMA agreed with all recommendations.

>The Covington County Commission Needs Additional Assistance in Managing a $5.4 Million FEMA Grant
2017
OIG-17-120-D The Audit Tips provides an overview of OIG responsibilities; applicable disaster assistance Federal statutes, regulations, and guidelines; the audit process and frequent audit findings; and key points to remember when administering FEMA grants.  Using this report should assist disaster assistance applicants to (1) document and account for disaster-related costs; (2) minimize the loss of FEMA disaster assistance funds; (3) maximize financial recovery; and (4) prevent fraud, waste, and abuse of disaster funds.  We have updated the report to include information on FEMA’s second edition of the Public Assistance Program and Policy Guide that supersedes many of the Public Assistance publications and individual policy documents

>Audit Tips for Managing Disaster-Related Project Costs
2017
OIG-17-121-MA We are providing this report to emphasize the potential housing challenges and risks that FEMA needs to address during Hurricane Harvey’s recovery efforts based on our observations and discussions with FEMA officials at the Austin, Texas Joint Field Office.  FEMA is currently responding to Hurricanes Harvey, Irma, and Maria, some of the most catastrophic disasters in recent United States history.  Damages from Hurricane Harvey are estimated to exceed $100 billion.  On September 22, 2017, the State of Texas General Land Office entered into an Intergovernmental Service Agreement to provide assistance to FEMA in the delivery of Direct Housing Assistance (DHA) to Hurricane Harvey survivors on a temporary basis.  FEMA estimates these costs will reach approximately $1 billion.  The agreement does not clearly identify basic controls to ensure DHA funds are spent according to Federal regulations. For instance, the agreement does not include approval authorities and physical inspections, or separation of duties and independent certifications.  We are concerned that without adequate controls in place the Federal funds may be at risk of fraud, waste, and abuse.  Therefore, it is imperative that FEMA ensure Texas’ proposed project management plan clearly identifies the internal controls needed to ensure that Federal funds will be properly spent.  Our report also provides observations on the current and past issues with FEMA’s use of direct housing assistance programs.

>Management Alert - Observations and Concerns with FEMA's Housing Assistance Program for Hurricane Harvey Efforts in Texas
2017
OIG-17-117-D We identified that the Diocese generally accounted for FEMA funds on a project-by-project basis as required by Federal regulations and FEMA guidelines.  However, it did not follow Federal procurement standards in awarding two contracts totaling $897,955. The Diocese and its parishes did not provide supporting documentation for procurements or their local procurement processes.  This occurred primarily because the Diocese was not familiar with certain Federal regulations and FEMA guidelines.  As FEMA’s grantee, New York should have done more to ensure the Diocese was aware of and complied with Federal procurement standards and documentation requirements.  FEMA should emphasize New York’s role in proper grant administration.

>Audit of FEMA Grant Funds Awarded to the Roman Catholic Diocese of Brooklyn, New York
2017
OIG-17-119 We determined that the seven facilities we inspected were generally following U.S. Immigration and Customs Enforcement (ICE) guidance for documenting decisions on segregating detainees with mental health conditions and promptly reporting segregation placement information for detainees with mental health conditions to ICE field offices.  However, the field offices we reviewed did not record and promptly report all instances of segregation to ICE headquarters, nor did their system properly reflect all required reviews of ongoing segregation cases.  Also, ICE does not regularly compare segregation data in the electronic management system with information at detention facilities to assess the accuracy and reliability of data in the system.  Unless ICE field offices comply with requirements to report and record these reviews, ICE headquarters cannot be sure required reviews are taking place and may not have all the information needed to assess the use of segregation, which could put detainees and facility staff at risk of harm.  We made three recommendations to ICE to improve oversight and accountability for segregation of detainees with mental health conditions.

>ICE Field Offices Need to Improve Compliance with Oversight Requirements for Segregation of Detainees with Mental Health Conditions
2017
OIG-17-116-VR We determined that due to changes DHS made to the process, political appointees do not influence Freedom of Information Act (FOIA) processors to delay or withhold the release of FOIA information.  Unlike the former process, the new process does not provide opportunities for political appointees in headquarters to inappropriately interfere with releases of significant FOIA information, and we did not identify any instances in which headquarters officials used the process to engage in those activities.  However, because DHS has not issued final guidance for the process, it is vulnerable to misuse in the future.  We recommended that the Chief FOIA Officer/Chief Privacy Officer issue final guidance on the 1-Day Awareness Notification Process.  The guidance should state 1) the purpose of the process is to inform senior officials of the imminent release of information that may raise public interest and 2) FOIA staff determine whether information should be released or withheld under FOIA’s exceptions and exemptions.

 

>DHS Review of Responses to Significant Freedom of Information Act Requests (Verification Review of OIG-11-67)
2017
OIG-17-118-D We determined that the County accounted for and expended the majority of FEMA grant funds according to Federal regulations and FEMA guidelines.  However, the County claimed $246,294 of ineligible and unsupported costs for two large projects.  County officials said these issues occurred because FEMA officials provided inconsistent guidance regarding the types of direct administrative costs that were eligible; and internal clerical errors for overstated material costs.  We recommended FEMA disallow $246,294 of ineligible and unsupported costs and provide clearer guidance for documenting eligible direct administrative costs.

>FEMA Should Disallow $246,294 of $3.0 Million in Public Assistance Grant Funds Awarded to Lincoln County, Missouri
2017
OIG-17-115-MA We conducted unannounced inspections of U.S. Customs and Border Protection (CBP) immigration holding facilities to determine if conditions are adequate, the quality of care provided is reasonable, and standards outlined in CBP’s National Standards on Transport, Escort, Detention, and Search are being met.  During these inspections, we identified physical security issues that pose a potential threat to Border Patrol agents, assets, and operations at Border Patrol stations.  We also identified security issues related to cameras and access at other Border Patrol stations.  As a result, we are recommending that CBP promptly address the physical security issues, ensure cameras are operable, and facility access is secure.

>Management Alert - Security and Safety Concerns at Border Patrol Stations in the Tucson Sector (Redacted)
2017
OIG-18-01 Mississippi Emergency Management Agency (MEMA) followed applicable Federal grant requirements.  It is FEMA’s responsibility to hold Mississippi accountable for proper grant administration.  MEMA did not provide proper oversight of a $29.9 million Hazard Mitigation grant, or follow Federal Regulations and FEMA guidelines when accounting for grant funds.  As a result, FEMA has no assurance that MEMA properly accounted for and expended Federal funds.

>Hazard Mitigation Grant Funds Awarded to MEMA for the Mississippi Coastal Retrofit Program
2018
OIG-18-02 In 2013 and 2014, we conducted an audit of the District of Columbia’s (DC) management of the Homeland Security Grant Program (HSGP) for grants awarded from fiscal years 2010 through 2012. In September 22, 2014, we issued an audit report entitled, District of Columbia’s Management of Homeland Security Grant Program Awards for Fiscal Years 2010 Through 2012 (OIG-14-147), which included 11 recommendations to improve the overall effectiveness of DC’s management of the Homeland Security Emergency Management Agency’s (HSEMA) State Homeland Security Program (SHSP) and Urban Area Security Initiative (UASI) funds. We determined that DC HSEMA met the intent of our prior recommendations and demonstrated improvements in its SHSP and UASI subrecipient monitoring and oversight. We also confirmed DC HSEMA submitted required THIRA reports to FEMA. Overall, FEMA and DC HSEMA’s implementation of our prior recommendations achieved the intended results of strengthening grant program management, performance, and oversight

>Verification Review of District of Columbia's Management of Homeland Security Grant Program Awards for Fiscal Years 2010 Through 2012
2018
OIG-18-03 USCIS site visits provide minimal assurance that H-1B participants are compliant and not engaged in fraudulent activity. These visits assess whether petitioners and beneficiaries comply with applicable immigration laws and regulations. USCIS can approve more than 330,000 H-1B petitions each year, which could include extensions and amendments. As of April 2017, USCIS reported more than 680,000 approved and valid H-1B petitions. However, during FYs 2014–16, USCIS conducted an average of 7,200 ASVVP site visits annually. For the limited number of visits conducted, USCIS does not always ensure the IOs are thorough and comprehensive in their approach. Further limiting the site visits’ effectiveness, USCIS does not ensure the agency always takes proper and timely action when IOs identify potential fraud or noncompliance. USCIS also uses targeted site visits to respond to indicators of fraud; however, the agency does not completely track the costs and analyze the results of these visits.

 

>USCIS Needs a Better Approach to Verify H-1B Visa Participants
2018
OIG-18-04 We identified limitations with FAMS contributions to aviation security. Details related to FAMS operations and flight coverage presented in the report are classified or designated as Sensitive Security Information. We are making five recommendations that when implemented, should improve FAMS

 

>FAMS’ Contribution to Aviation Transportation Security is Questionable (Unclassified Summary)
2018
OIG-18-05 DHS personnel do not always safeguard sensitive assets that, if lost, would result in critical mission impact or loss of life. Between fiscal years 2014 and 2016, the Department of Homeland Security personnel lost a total of 2,142 highly sensitive assets — 228 firearms; 1,889 badges; and 25 secure immigration stamps. Although this represents a slight improvement from our last audit, more than half of the lost items we reviewed (65 of 115) revealed that component personnel did not follow policy or used poor judgment when safeguarding these assets. In these cases, components did not always hold personnel accountable nor did they receive remedial training for failing to safeguard these sensitive assets.

>DHS' Controls Over Firearms and Other Sensitive Assets
2018
OIG-18-06 FEMA did not manage disaster relief grants and funds adequately and did not hold grant recipients accountable for properly managing disaster relief funds. We continue to identify persistent problems such as improper contract costs, and ineligible and unsupported expenditures as examples of this continued failure. Over the 7-year period, FYs 2009 to 2015, we found $1.64 billion, or 15 percent, in questioned costs out of the $10.9 billion that we audited, which we recommended FEMA disallow as ineligible and unsupported costs. In FY 2016, we found $155.6 million2, or 23 percent, in questioned costs out of the $686 million that we audited, confirming that FEMA is not making progress managing disaster relief funds adequately. We continue to identify persistent problems throughout FEMA’s grant process, we are concerned that billions of tax payer dollars remain at risk.

 

>Summary and Key Findings of Fiscal Year 2016 FEMA Disaster Grant and Program Audits
2018
OIG-18-09 The County does not have legal responsibility for the disaster-related repairs on township roadway projects. Therefore, the County is not eligible to receive $6,151,893 in Federal funding identified as township projects because it is not legally responsible for the repairs to the damaged facilities (roadways).

>Management Alert - FEMA Should Recover $6.2 Million in Public Assistance Funds for Disaster Repairs That Are Not the Legal Responsibility of Richland County, North Dakota
2018
OIG-18-07 ICE, CBP, and USCIS continue to experience challenges with emerging immigration enforcement and administration activities. Although DHS has established unity of effort initiatives to break silos and centralize decision making related to immigration, problems remain. We identified challenges related to mission allocation and expenditure comparisons, the affirmative asylum application process, and the Department’s struggle to understand immigration outcomes and decisions. DHS will continue to allow vulnerabilities that may affect national security and public safety to persist.

 

>DHS Needs a More Unified Approach to Immigration Enforcement and Administration
2018
OIG-18-07
    1. Report: O:\Special Projects\508 Reports\FY18\MGMT
    2. Press release:  O:\Special Projects\508 Reports\FY17\PR
    3. Testimony: O:\Special Projects\508 Reports\FY17\TM
  • PTS or final report folder
  • 508 compliant- need default tools
    1. Action Wizard tab
  • >DHS Needs a More Unified Approach
    2018
    OIG-18-08 CalRecycle also has sufficient policies, procedures, and business practices in place to account for disaster costs on a project-by-project basis in accordance with most Federal regulations and FEMA guidelines. CalRecycle did not follow these policies, procedures, and practices when accounting for and expending $198.9 million in project costs. Therefore, we questioned these costs unless CalRecycle can correct the deficiencies we identify. CalRecycle did not adequately document costs, account for costs on a residential lot-by-lot basis, effectively monitor contractors to ensure they performed to contract terms and conditions, or clearly separate costs for eligible and ineligible work.

     

    >FEMA and California Need to Assist CalRecycle, a California State Agency, to Improve Its Accounting of $230 Million in Disaster Costs
    2018
    OIG-18-10 The Department faces challenges to effectively sharing cyber threat information across Federal and private sector entities. Without acquiring a cross-domain information processing solution and automated tools, DHS cannot analyze and share threat information timely. Further, without enhanced outreach, DHS cannot increase participation and improve coordination of information sharing across Federal and private organizations.

     

    >Biennial Report on DHS’ Implementation of the Cybersecurity Act of 2015
    2018
    OIG-18-11 Department leadership must commit itself to ensuring DHS operates more as a single entity. rather than a collection of components. The lack of progress in reinforcing a unity of effort translates to a missed opportunity for greater effectiveness. Second, Department leadership must establish and enforce a strong internal control environment typical of a more mature organization. The current environment of relatively weak internal controls affects all aspects of the Department’s mission, from border protection to immigration enforcement and from protection against terrorist attacks and natural disasters to cybersecurity. We have seen little evidence of proactive effort by leadership to view the organization holistically, to forcefully communicate the need for cooperation among components, and to establish programs or policies that ensure unity, even though such effort is a necessary precondition to unified action.

     

    >Major Management and Performance Challenges Facing the Department of Homeland Security
    2018
    OIG-18-12 We prepared this special report to address challenges FEMA, Texas, Florida, U.S. territories in the Caribbean, and California may face managing insurance under the Public Assistance program in the wake of Hurricanes Harvey, Irma, and Maria, and the October 2017 California wildfires. This report describes lessons learned from findings and recommendations contained in our DHS OIG grant audit reports issued from fiscal years 2013–2017. During fiscal years 2013–2017, we issued 37 Disaster Assistance grant audit reports that disclosed challenges with FEMA’s Public Assistance insurance process. The major recurring challenges we identified included (1) Duplicate benefits in which subrecipients claimed FEMA reimbursement for costs that were covered by insurance; (2) Insufficient insurance in which subrecipients did not obtain and maintain sufficient insurance coverage required as a condition for receiving Federal disaster assistance; and (3) Misapplied or misallocated insurance proceeds in which subrecipients received insurance proceeds, and misapplied or did not allocate those proceeds to FEMA projects.

    >Special Report: Lessons Learned from Previous Audit Reports on Insurance under the Public Assistance Program
    2018
    OIG-18-13 FEMA and CBP Oversight of Operation Stonegarden Program Needs Improvement 2018
    OIG-18-15 Coast Guard IT Investments Risk Failure Without Required Oversight 2018
    OIG-18-14 Management Alert - Concerns with Potential Duplicate or Ineligible FEMA Public Assistance Funding for Facilities Damaged by Back-to-Back Disasters 2018
    OIG-18-16 Independent Auditors' Report on DHS' FY 2017 Financial Statements and Internal Control over Financial Reporting 20187
    OIG-18-17 The Hospital must improve its policies, procedures, and business practices to account for and expend FEMA grant funds according to Federal regulations and FEMA guidelines. Specifically, it did not properly document and adequately account for project costs; comply with its overtime policy; and comply with Federal requirements for insurance. Additionally, there were major differences in the damage estimates FEMA and the Hospital calculated.

    >Napa State Hospital, California, Should Improve the Management of Its $6.7 Million FEMA Grant
    2018
    OIG-18-18 CBP issued the summons to Twitter regarding the @ALT_USCIS account for the purpose of identifying the owner of the account. CBP took the position that it needed this information in order to “insure compliance with the laws of the United States administered by the [Service]” - investigate possible criminal violations by CBP officials, including murder, theft, and corruption.

    >Management Alert - CBP's Use of Examination and Summons Authority Under 19 U.S.C. § 1509
    2018
    OIG-18-19 Review of CBP Information Technology System Outage of January 2, 2017 (Redacted) 2018
    OIG-18-20 We evaluated the Office of Health Affairs’ (OHA) privacy safeguards for protecting the personally identifiable information (PII) it collects and maintains. OHA has not implemented an effective organizational framework for safeguarding PII in accordance with Federal requirements. OHA appointed a Privacy Officer, but this official lacks adequate authority and resources to carry out the various required privacy management responsibilities. This official also has not received OHA senior leadership support to issue the policies and procedures needed for effective organization-wide privacy management. Further, there was no central tracking to ensure that all employees completed annual privacy training and to accurately report this information to the Department and Congress as required.

    >Office of Health Affairs Has Not Implemented An Effective Privacy Management Program
    2018
    OIG-18-24 DHS reported using its Other Transaction Authority to work with non-traditional contractors, DHS did not always follow statutory requirements when entering, modifying, and overseeing its agreements. Inadequate internal policies contributed to DHS falling short of meeting all statutory requirements for using OTAs. In addition, DHS acquisition policy staff reported that competing priorities prevented timely reporting to Congress. As a result, DHS may have taken on more risks and costs than necessary and impeded Congress’ ability to oversee DHS’ use of OTAs.

    >Department of Homeland Security's Use of Other Transaction Authority
    2018
    OIG-18-21 FEMA is currently responding to Hurricane Harvey in Texas, one of the largest disasters in U.S. history, with current damage estimates reported to exceed $100 billion. Due to the massive scale of damage, FEMA and Texas, as a FEMA grantee, will face many challenges in the recovery phase of the disaster. As FEMA moves into the recovery phase for Hurricane Harvey, it will begin to obligate hundreds of millions, if not billions, of dollars from the Disaster Relief Fund for administrative costs and for Public Assistance and Hazard Mitigation grants to eligible state, tribal, and local governments and certain nonprofit organizations. Texas, as FEMA’s grantee, will be responsible for oversight and monitoring of the disaster grants to Texas subrecipients.

    >Special Report: Lessons Learned from Prior DHS-OIG Reports Related to FEMA's Response to Texas Disasters and Texas' Management of FEMA Grant Funds
    2018
    OIG-18-25 The Omaha Tribe’s serious financial management weaknesses combined with inadequate and missing documentation resulted in unreliable financial records. As a result, we have little confidence that the transactions recorded in the accounting system actually occurred or that the tribe completed its FEMA-authorized projects. Therefore, we question $13.9 million as unsupported. Due to the unreliable financial information, we calculated the amount unsupported as the entire $16.9 million FEMA provided for both grants, less $2.8 million in unused Federal funding that FEMA should put to better use; $165,000 in unclaimed insurance coverage; and approximately $74,749 that we were able to verify as supported and eligible.

    >The Omaha Tribe of Nebraska and Iowa Mismanaged $14 Million in FEMA Disaster Grants
    2018
    OIG-18-23 USCIS deployed this capability in April 2016 to improve processing of approximately 84,000 naturalization applications received each month. However, as before, the ELIS capabilities deployed did not include critical functionality necessary for end-to­-end Form N-400 processing. ELIS repeatedly experienced outages and did not always perform as intended. Also, USCIS did not ensure field personnel were adequately trained to use the new system capabilities prior to deployment. Given its focus on meeting established system release dates, USCIS did not fully address our prior report recommendations to improve user support, stakeholder engagement, performance measurement, and testing to ensure ELIS met user needs and improved operations.

    >USCIS Has Been Unsuccessful in Automating Naturalization Benefits Delivery
    2018
    OIG-18-22 Representative Raúl M. Grijalva requested that we review U.S. Immigration and Customs Enforcement’s (ICE) decision to award GEO Care, LLC a contract to establish a Family Case Management Program (FCMP). We sought to determine whether ICE awarded the FCMP contract in accordance with laws, regulations, and guidance. We also conducted a limited review of post-award contract modifications. FCMP is an alternative to detention that uses case managers to ensure participants comply with their release conditions, such as attending court hearings, while allowing them to remain in their community as they move through immigration proceedings. We determined that ICE properly awarded FCMP contracts.

    >U.S. Immigration and Customs Enforcement's Award of the Family Case Management Program Contract
    2018
    OIG-17-80-D Cancellation of OIG Audit – FEMA’s Initial Response to the 2016 Catastrophic Flooding in Louisiana 2017
    OIG-18-27 The Transportation Security Administration (TSA) intended to expand TSA PreCheck to 25 million air travelers at a rate of more than 5 million enrollments per year. We evaluated whether the current TSA PreCheck Application Program adjudication process will allow TSA to meet its enrollment goals. TSA did not allocate additional resources or staff to the TSA Adjudication Center, which had multiple vacancies and was tasked with manually processing about 26 percent of TSA PreCheck Application Program applications. To make matters worse, in June 2016, TSA PreCheck applications surged, leaving the Adjudication Center overwhelmed with applications to process. As the application queue grew, TSA brought on detailees from other Federal agencies to assist with adjudications part time, but they did not have a significant impact. Further, the Adjudication Center relies on a manual caseload assignment and reporting process, which is inefficient for the volume of TSA PreCheck applications needing adjudication.

    >TSA's Adjudication Resources are Inadequate to Meet TSA PreCheck Enrollment Goals
    2018
    OIG-18-29 This is a Department of Homeland Security Office of the Inspector General (OIG) special report on Federal Emergency Management Agency (FEMA) and FEMA recipient and sub recipient disaster-related procurements. FEMA is currently responding to some of the most catastrophic disasters in U.S. history — Hurricanes Harvey, Irma, Maria, and the October 2017, California wildfires. Because of the massive scale of damage and the large number and high-dollar contracts that will likely be awarded, there is a significant risk that billions of taxpayer dollars may be exposed to waste, fraud, and abuse.

    >Lessons Learned from Prior Reports on Disaster-related Procurement and Contracting
    2018
    OIG-18-28 Osceola Electric Cooperative, Inc. (Osceola) received a $10 million Federal Emergency Management Agency (FEMA) grant award for damages caused by a severe winter storm in April 2013. Although the disaster occurred 4 years ago, Osceola has not completed all FEMA projects. We conducted this audit early in the grant process to identify areas in which Osceola may need additional technical assistance or monitoring to ensure compliance. Osceola generally accounted for and expended $10 million FEMA Public Assistance Funds according to Federal regulations and FEMA guidelines.

    >Osceola Electric Cooperative, Iowa, Generally Managed FEMA Grant Funds According to Federal Requirements
    2018
    OIG-18-26 Severe winter storms, flooding, and mudslides during January and February 2017 caused significant damage to Solano County, California (County). County officials estimate damages at $1.6 million. Based on our limited testing, the County appears to have in place policies, procedures, and business practices to generally account for and expend FEMA Public Assistance grant funds according to Federal regulations and FEMA guidelines. The County should be able to account for disaster-related costs on a project-by-project basis and adequately support these costs.

    >Solano County, California, Has Policies, Procedures, and Business Practices to Manage Its FEMA Grant Funding
    2018
    OIG-18-31 During our August 2017 site visit to the FLETC Artesia Training Center, we identified a potential safety issue at a warehouse, Building 13. The Border Patrol Academy had been using the warehouse to train new hires on search and conveyance. In 2009, a vehicle from an adjacent driving course struck the warehouse. FLETC officials could not provide documentation to support that an engineering evaluation was conducted to determine whether the accident affected the integrity of the warehouse structure. Border Patrol Academy officials also expressed safety concerns about using the warehouse to train new hires.

    >Management Alert - Safety Issue at FLETC Artesia Warehouse
    2018
    OIG-18-32 In response to concerns raised by immigrant rights groups and complaints to the Office of Inspector General (OIG) Hotline about conditions for detainees held in U.S. Immigration and Customs Enforcement (ICE) custody, we conducted unannounced inspections of five detention facilities to evaluate their compliance with ICE detention standards. We identified problems that undermine the protection of detainees’ rights, their humane treatment, and the provision of a safe and healthy environment. Although the climate and detention conditions varied among the facilities and not every problem was present at all of them, our observations, interviews with detainees and staff, and our review of documents revealed several issues. Upon entering some facilities, detainees were housed incorrectly based on their criminal history. Further, in violation of standards, all detainees entering one facility were strip searched. Available language services were not always used to facilitate communication with detainees. Some facility staff reportedly deterred detainees from filing grievances and did not thoroughly document resolution of grievances. Staff did not always treat detainees respectfully and professionally, and some facilities may have misused segregation. Finally, we observed potentially unsafe and unhealthy detention conditions.

    >Concerns About ICE Detainee Treatment and Care at Detention Facilities
    2018
    OIG-18-30 This is a Department of Homeland Security, Office of Inspector General management alert to make the Federal Emergency Management Agency (FEMA) and its partners aware of active attempts — observed during our ongoing disaster oversight work in Puerto Rico — to profit from disaster survivors seeking FEMA assistance. We observed posted notices featuring a logo similar to FEMA’s, advertising paid services to complete the FEMA disaster assistance application on behalf of survivors. These services appear to be associated with FEMA, but actually are not, and demand a fee for services FEMA provides at no cost.

    To complete the disaster assistance application forms, the paid service requires disaster survivors to provide their Personally Identifiable Information (PII) — such as their social security number, household annual income, and bank account numbers — to a third party, which exposes survivors to unnecessary risks.

    >Management Alert - FEMA Must Take Steps to Stop Those Attempting to Profit from Disaster Survivors Seeking Assistance in Puerto Rico
    2018
    OIG-18-33 Because of the high dollar amount in disaster funds likely awarded and the history of audit questioned costs for FEMA disaster funds, FEMA’s inadequate grant management poses a significant risk to taxpayer dollars. We identified issues in our previous reports that demonstrate FEMA’s ongoing issues with ensuring disaster grant recipients and subrecipients comply with Federal regulations and FEMA guidelines. Specifically, FEMA faces significant challenges in ensuring its grant recipients properly manage FEMA disaster funds. This alert highlights the significant deficiencies with FEMA’s internal controls and its lack of enforcement of Federal requirements. As FEMA moves forward with its recovery efforts, it must hold recipients accountable for proper grant management. FEMA must implement and use effective controls to overcome existing problems with managing and monitoring funds for disaster response and recovery.

    >Management Alert - FEMA Faces Significant Challenges Ensuring Recipients Properly Manage Disaster Funds
    2018
    OIG-17-120-D-SPANISH Este informe asistiremos a los beneficiarios y sub-beneficiarios de las subvenciones de asistencia por desastre de la Agencia Federal para el Manejo de Emergencias (FEMA) a: documentar y contabilizar los costos relacionados con el desastre; minimizar la pérdida de los fondos de asistencia por desastre de FEMA; maximizar la recuperación financiera; y prevenir el fraude, malversación y abuso de los fondos de desastre. El informe revisado es efectivo para todas las emergencias y desastres mayores declarados a partir del 1 de abril de 2017.

    >Consejos de Auditoría para Administrar los Costos de Projectos Relacionados con Desastres
    2017
    OIG-18-34 The DATA Act required the OIG to review a statistically valid sample of DHS’ fiscal year 2017, 2nd quarter spending data posted on USASpending.gov and to submit to Congress a report assessing the data’s completeness, timeliness, quality, and accuracy; and DHS’ implementation and use of Government-wide financial data standards. The Digital Accountability and Transparency Act of 2014 (DATA Act) required DHS to submit, by May 2017, complete, accurate, and timely spending data to the Department of the Treasury (Treasury) for publication on USASpending.gov beginning with the 2nd quarter of FY 2017. DHS successfully certified and submitted its FY 2017/Q2 spending data for posting on USASpending.gov in April 2017. Although DHS met the DATA Act’s mandated submission deadline, we identified issues concerning the completeness and accuracy of its first data submission that hinders the quality and usefulness of the information.

     

    >DHS' Implementation of the DATA Act
    2018
    OIG-18-36 ICE Enforcement and Removal Operations (ERO) faces challenges in implementing the Known or Suspected Terrorist Encounter Protocol (KSTEP) screening process, which is used to identify aliens who may be known or suspected terrorists. Although ERO uses KSTEP to screen all aliens who are in ICE custody, ERO policy does not require continued screening of the approximately 2.37 million aliens when released and under ICE supervision. We sampled and tested 40 of 142 ERO case files of detained aliens identified as known or suspected terrorists during fiscal years 2013–15. All 40 files had at least one instance of noncompliance with KSTEP policy, generating greater concerns regarding the population of aliens screened and determined to have no connections to terrorism.

    >ICE Faces Challenges to Screen Aliens Who May Be Known or Suspected Terrorists (Redacted)
    2018
    OIG-18-35 Special Review: TSA's Handling of the 2015 Disciplinary Matter Involving TSES Employee (Redacted) – Retracted 2018