Skip to main content
U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Audits, Inspections, and Evaluations

Report Number Title Sort descending Issue Date Fiscal Year
DD-13-13 The objective of this report is to disclose additional information related to the data that the Federal Emergency Management Agency (FEMA) relied on in its February 2008 decision to approve Comal County's (County) Hazard Mitigation Grant Program (HMGP) application. This report supplements our audit report, FEMA Hazard Mitigation Grant Program Funds Awarded to Comal County, Texas, DD-12-13, dated June 21, 2012, and provides additional information demonstrating that FEMA based its approval of the County's HMGP pplication on incomplete information. The Texas Division of Emergency Management (TDEM), a FEMA grantee, submitted the County's HMGP application to FEMA for funding following Hurricane Rita. In February 2008, FEMA approved the County's $7 million ($5,250,000 Federal share) initial HMGP request to construct a drainage improvement structure to mitigate future flood losses. In December 2010, FEMA approved an additional $9,302,516 for the project because of a design flaw in the County's original engineering plan, bringing the total award for his project to $16,302,516 ($12,226,887 Federal share).

>Comal County Understated Project Cost in Its Hazard Mitigation Grant Program Project Application
2013
DA-10-06  

>Commonwealth of Massachusetts Highway Dept
2010
OIG-12-66 Communication Regarding Participation in Secure Communities (Revised) 2012
OIG-09-49  

>Compendium of Disaster Assistance Programs
2009
OIG-18-32 In response to concerns raised by immigrant rights groups and complaints to the Office of Inspector General (OIG) Hotline about conditions for detainees held in U.S. Immigration and Customs Enforcement (ICE) custody, we conducted unannounced inspections of five detention facilities to evaluate their compliance with ICE detention standards. We identified problems that undermine the protection of detainees’ rights, their humane treatment, and the provision of a safe and healthy environment. Although the climate and detention conditions varied among the facilities and not every problem was present at all of them, our observations, interviews with detainees and staff, and our review of documents revealed several issues. Upon entering some facilities, detainees were housed incorrectly based on their criminal history. Further, in violation of standards, all detainees entering one facility were strip searched. Available language services were not always used to facilitate communication with detainees. Some facility staff reportedly deterred detainees from filing grievances and did not thoroughly document resolution of grievances. Staff did not always treat detainees respectfully and professionally, and some facilities may have misused segregation. Finally, we observed potentially unsafe and unhealthy detention conditions.

>Concerns About ICE Detainee Treatment and Care at Detention Facilities
2018
OIG-19-47 Concerns about ICE Detainee Treatment and Care at Four Detention Facilities 2019
OIG-16-37 To sustain border security, U.S. Customs and Border Protection (CBP) has established permanent facilities in forward or remote locations, called Forward Operating Bases. We determined whether Forward Operating Bases provide adequate living conditions, security, and safety for employees. Of the seven Forward Operating Bases we inspected along the southwest border, six have adequate living conditions. One Forward Operating Base has security issues, safety and health concerns, and inadequate living conditions. At the other six Forward Operating Bases, we identified security issues, such as inoperable security cameras, as well as an ongoing challenge to provide safe drinking water. In addition, we determined that CBP is not performing all required Forward Operating Base inspections or adequately documenting maintenance and repairs. Without regular inspections and timely maintenance and repairs, CBP cannot ensure it will continue to provide adequate security, safety, and living conditions for its personnel working at these remote facilities.

>Conditions at CBP's Forward Operating Bases along the Southwest Border (Redacted)
2016
OIG-07-47 Congressional Inquiry Regarding Southwest Charter Lines, Inc. 2007
DD-07-03 Congressional Inquiry, Landfill Cost Issues Relating to Disposal of Debris in the City of New Orleans, 2007
OIG-13-43 The objectives of the audit were to determine whether the State of Connecticut distributed and spent State Homeland Security Program and Urban Areas Security Initiative grant funds effectively and efficiently and in compliance with applicable Federal laws and regulations and complied with the Department’s guidelines governing the use of funding. We also addressed the extent to which funds awarded enhanced the State’s ability to prevent, prepare for, protect against, and respond to natural disasters, acts of terrorism, and other manmade disasters. The State received grant awards of approximately $43.9 million in State Homeland Security Program and Urban Areas Security Initiative grants for fiscal years 2008 through 2010.

>Connecticut’s Management of Homeland Security Program Grants Awarded During Fiscal Years 2008 Through 2010
2013
OIG-17-120-D-SPANISH Este informe asistiremos a los beneficiarios y sub-beneficiarios de las subvenciones de asistencia por desastre de la Agencia Federal para el Manejo de Emergencias (FEMA) a: documentar y contabilizar los costos relacionados con el desastre; minimizar la pérdida de los fondos de asistencia por desastre de FEMA; maximizar la recuperación financiera; y prevenir el fraude, malversación y abuso de los fondos de desastre. El informe revisado es efectivo para todas las emergencias y desastres mayores declarados a partir del 1 de abril de 2017.

>Consejos de Auditoría para Administrar los Costos de Projectos Relacionados con Desastres
2017
OIG-09-89  

>Consolidated Report on DHS' Management of 2005 Gulf Coast Hurricanes Mission Assignment Funding
2009
OIG-22-12 Continued Reliance on Manual Processing Slowed USCIS' Benefits Delivery during the COVID-19 Pandemic 2022
OIG-04-04 Continuing Development of the U.S. Chemical Safety and Hazard Investigation, January 7, 2004 2004
DA-09-09  

>Contract Award and Administration - Federal Emergency Management Agency, Transitional Recovery Office, Biloxi, MS
2009
DA-13-15 We are currently auditing $3.4 million of a $4.1 million hazard mitigation grant awarded to George County, Mississippi (County) (FIPS Code 039-99039-00) by the Mississippi Emergency Management Agency (State). The $3.4 million we are auditing provided 100 percent funding for the construction of two emergency shelters in the County. The State pro~ided the Federal Emergency Management Agency (FEMA) grant monies from Hazard Mitigation Grant Program (HMGP) funds made available to the State following Hurricane Katrina. Our overall audit objective is to determine whether the County accounted for and expended the hazard mitigation grant funds accordingto Federal regulations and FEMA guidelines.

>Contract Dispute Delaying Hurricane Shelters at George County, Mississippi: Interim Report on FEMA Hazard Mitigation Grant Program Funds Awarded to George County, Mississippi
2013
OIG-10-96 We conducted an audit of U.S. Customs and Border Protection’s control of its Secure Border Initiative technology program. Our objective was to determine whether the program office has implemented adequate controls to ensure that cost overruns are avoided and established milestones are met. To accomplish this objective, we reviewed four task orders for the program in fiscal year 2008, totaling approximately $267 million. Customs and Border Protection needs to improve its control of contractor activities on the Secure Border Initiative technology program. Specifically, program officials did not ensure that contractors maintain up-to-date information in the primary management tool designed to provide managers with advance information regarding potential cost overruns and program progress.

>Controls Over SBInet Program Cost and Schedule Could Be Improved
2010
OIG-07-55 Coordination Between FBI and ICE on Investigations of Terrorist Financing, 2007
OIG-15-97-VR DHS continues to lack reliable interoperable communications for emergencies, as well as daily operations and planned events. The inability to communicate effectively during an emergency presents serious risks to the health and safety of the public. To better fulfill its mission and unify its efforts, DHS must prioritize interoperable communications and expedite the implementation of the recommended corrective actions in our DHS’ Oversight of Interoperable Communications report.

>Corrective Actions Still Needed to Achieve Interoperable Communications
2015
OIG-12-97  

>Costs Claimed by Bristol Township Volunteer Fire Department under Fire Station Construction Grant No. EMW-2009-FC-01627R
2012
OIG-12-113  

>Costs Claimed by Brunswick Volunteer Fire Company under Fire Station Construction Grant Number EMW-2009-FC-00409
2012
OIG-13-22 The Chicago Fire Department submitted a grant application that identified six projects: five fire station renovations and one new station construction. The proposed costs for the six projects were $26 million, consisting of a Federal share of $15 million and an applicant share of $11 million. The grant application identified a Federal share of 43 percent and an applicant share of 57 percent. FEMA awarded a grant of $4.8 million to the Chicago Fire Department to construct a new fire station. The grant award did not specify an amount or percentage for the matching share. A FEMA official told us that FEMA had not specified a Federal share in the award because it knew that the cost of the new station would exceed the Federal share and its main concern was that construction of the station be completed.

>Costs Claimed by Chicago Fire Department Under Fire Station Construction Grant Number EMW-2009-FC-05246R
2013
OIG-12-98  

>Costs Claimed by Grand Traverse Metro Emergency Services Authority under a Fire Station Construction Grant
2012
OIG-13-73 The American Recovery and Reinvestment Act of 2009, as amended (Recovery Act) appropriated $610 million to the Federal Emergency Management Agency(FEMA) for emergency food and shelter, public transit and port security assistance, and construction of non ‐federal fire stations. FEMA awarded $150 million of that amount in port security grants to 214 ports, port authorities, ferry systems, and other eligible entities.

>Costs Claimed by Kinder Morgan Liquid Terminals LLC Under Port Security Grants Awarded by the Federal Emergency Management Agency
2013
OIG-13-83 The American Recovery and Reinvestment Act of 2009, as amended (Recovery Act), appropriated $610 million to the Federal Emergency Management Agency (FEMA). Of that amount, the Recovery Act allocated $150 million for Public Transportation Security Assistance and Railroad Security Assistance (Transit Grants) under sections 1406 and 1513 of the Implementing Recommendations of the 9/11 Commission Act of 2007, as amended (hereinafter referred to as Transit Security Grants).

>Costs Claimed by Metropolitan Transportation Authority of New York Under Transit Security Grants
2013
OIG-13-02 The American Recovery and Reinvestment Act of 2009 (Recovery Act), as amended, appropriated $210 million to the Federal Emergency Management Agency (FEMA) for competitive grants for modifying, upgrading, or constructing non-Federal fire stations. On September 25, 2009, FEMA awarded a grant of $4,007,374 to Snoqualmie Pass Fire & Rescue to construct a new fire station. The grant specified a period of performance from September 25, 2009, to September 24, 2012. As of April 15, 2012, Snoqualmie Pass Fire & Rescue had completed the construction of the new fire station (see figure 1) and had received reimbursements of $4,007,374 from FEMA for project design, engineering, construction, and management.

>Costs Claimed by Snoqualmie Pass, WA, Fire & Rescue Under Fire Station Construction Grant Number EMW-2009-FC-02883R
2013
OIG-12-126 Costs Claimed by Sumter County, FL, Fire Rescue under Fire Station Construction Grant Number EMW-2009-FC-05940R 2012
OIG-13-12 The Department of Homeland Security Transit Security Grant Program (TSGP) focuses on the use of visible, unpredictable deterrents to reduce risk to transit systems. Transit Security Grants fund capital projects including Multi-User High-Density Key Infrastructure Protection, Single-User High-Density Key Infrastructure Protection, Key Operating Asset Protection, and other mitigation activities. These construction grants pay for infrastructure improvements such as installation of anti-terrorist barriers at tunnel entrances and security systems for underground and underwater infrastructure. In addition, Transit Security Grants also fund canine, mobile explosives detection screening, and anti-terrorism teams. FEMA allocated $72.2 million to four transit security capital projects and $77.8 million to 15 transit security terrorist teams.

>Costs Claimed by the Chicago Transit Authority for the Subway Security and SCADA Project – Video Analytics and Intrusion Detection, and the Public Transport Anti-Terrorism Team Program, Grant Numbers 2009-RA-RI-0106 and 2009-RA-RI-0093
2013
OIG-13-37 The American Recovery and Reinvestment Act of 2009 (Recovery Act), as amended, appropriated $150 million to the Federal Emergency Management Agency (FEMA) for Public Transportation Security Assistance and Railroad Security Assistance under sections 1406 and 1513 of the imlementing Recommendations of the 9/11 Commission Act of 2007, as amended. FEMA focused grants under this program on (1) operational packages for canine teams, mobile explosives detection screening teams, and antiterrorism teams, and (2) capital projects for activities such as infrastructure protection. On July 31, 2009, FEMA awarded a transit security grant of $1,670,988 to the Northeast Illinois Railroad Corporation (commonly referred to as METRA) for one antiterrorism team.

>Costs Claimed by the Northern Illinois Railroad Corporation Under Transit Security
2013
OIG-13-03 On September 29, 2009, FEMA awarded a Transit Security Grant of $48,286,592 (number 2009-RA-RI-0105) to the Port Authority of New York and New Jersey (Port). The purpose of the grant is to fund exterior and interior mitigation measures to strengthen the PATH rail tunnels connecting cities in northern New Jersey to Manhattan. Reimbursement for eligible project costs is based on the grant agreement; Office of Management and Budget (OMB) Circular A-87, Cost Principles for State,Local and Indian Tribal Governments, Revised; and FEMA guidance. As of March 31, 2012, the Port had claimed project costs totaling $42,020,112. The costs covered the period from September 1, 2009, through March 31, 2012.

>Costs Claimed by the Port Authority of New York and New Jersey Under Transit Security Grant No. 2009-RA-R1-0105
2013
OIG-13-46 On September 29, 2009, FEMA awarded a $6 million grant (number 2009-PU-R1-0176) to the Port of Los Angeles (port) for a port-wide fiber optics project.Reimbursement for eligible project costs is based on the grant agreement; Office of Management and Budget (OMB) Circular A-87, Cost Principles for State, Local and Indian Tribal Governments; and FEMA guidance. As of August 10, 2012, the Port had claimed project costs totaling $5,703,711. The costs covered the period from September 1, 2009, through June 30, 2012.

>Costs Claimed by the Port of Los Angeles Under Port Security Grant Number 2009-PU-R1-0176
2013
OIG-13-112 The American Recovery and Reinvestment Act of 2009 (Recovery Act), as amended, appropriated $150 million for Public Transportation Security Assistance and Railroad Security Assistance. The Federal Emergency Management Agency (FEMA) administered these funds through its Transit Security Grant Program, which primarily funded operational packages for canine, mobile explosives screening, and antiterrorism teams, and capital projects for activities such as infrastructure protection. In 2009, FEMA awarded $9,560,064 to the Washington Metropolitan Area Transit Authority (WMATA) for the creation of antiterrorism teams (ATT). Specifically, the grant funded 20 Metro Transit Police Department sworn officer positions, which were used to form 5 permanent ATTs. From August 1, 2009, through June 30, 2012, WMATA reported project costs totaling $7,590,766. As of June 30, 2012, WMATA had been reimbursed for $1,058,080 of these costs.

>Costs Incurred by the Washington Metropolitan Area Transit Authority under Transit Security Grant No. 2009-RA-R1-0102
2013
OIG-13-01 The Federal Emergency Management Agency (FEMA) requested that we audit the grant (EMW-2009-FC-06054R) to Volunteer Fire and Rescue of Harrison Township (Fire and Rescue). FEMA asked for the audit to help resolve concerns over delays by Fire and Rescue in initiating the project and allegations about the size and location of the project and the award of construction contracts. Fire and Rescue requested and received a grant of $1,149,490 for construction of a new fire station. The grant specified a period of performance from September 25, 2009, to September 24, 2012. As of January 23, 2012, Fire and Rescue had broken ground for the new station and had incurred costs of $76,591 for plans, building materials, and other initial project costs. Fire and Rescue has billed for and received from FEMA reimbursement of $10,000.

>Costs Incurred by Volunteer Fire and Rescue of Harrison Township, IN, Under Station Construction Grant Number EMW 2009 FC 06054R
2013
OIG-08-86 Costs Incurred for Rejected Temporary Housing Sites 2008
OIG-12-106  

>Costs Invoiced by McKing Consulting Corporation Under Order Number HSFEHQ-05-F-0438
2012
OIG-12-123 Costs Invoiced by Sacramento County for a Checked Baggage Screening Project Under Agreement Number HSTS04-09-H-REC148 2012
OIG-12-40  

>Costs Invoiced by San Jose for a Checked Baggage Screening Project at the Norman Y. Mineta San Jose International Airport
2012
OIG-12-121  

>Costs Invoiced by the Omaha Airport Authority for Closed Circuit Television Cameras at Omaha Eppley Airfield Airport
2012
OIG-12-129 Costs Invoiced for Checked Baggage Inspection Systems and Closed-Circuit Television Cameras at Orlando International Airport 2012
DS-10-07  

>County of Los Angeles, California 
2010
DS-10-06  

>County of Mendocino, California 
2010
DS-03-04 County of San Mateo, California, Public Assistance ID No. 081-00000, FEMA Disaster No. 1203-DR-CA 2004
DS-11-04  

>County of Santa Barbara, California
2011
DS-10-01  

>County of Santa Cruz, California 
2010
DS-11-07  

>County of Sonoma, California
2011
DS-11-03 County of Ventura, California 2011
OIG-19-21 The objective was to determine whether TSA implemented proper procedures to safeguard the secure areas of our Nation’s airports and whether airports, aircraft operators, and contractors were complying with TSA’s security requirements to control access to these areas.

 

We identified vulnerabilities with various airport access control points and associated access control procedures. We made six recommendations related to standard operating procedures, deployment of new technology, identification of industry best practices, and training.

>Covert Testing of Access Controls to Secure Airport Areas
2019
OIG-15-150 The Transportation Security Administration (TSA) conducts or oversees passenger checkpoint screening at 450 federalized airports. Passenger checkpoint screening is a process by which passengers are inspected to deter, detect, and prevent explosives, incendiaries, weapons, or other security threats from entering sterile areas of an airport or getting onboard an aircraft. As threats to transportation security evolved, TSA needed a screening technology to detect nonmetallic threats. TSA developed Advanced Imaging Technology (AIT) to screen passengers for both metallic and nonmetallic threats concealed under clothing—without physical contact. In 2013, TSA equipped all AIT with Automated Target Recognition software, which displays a box around anomalies on a generic outline of a body. Our objective was to determine the effectiveness of TSA’s AIT, Automated Target Recognition software, and checkpoint screener performance in identifying and resolving anomalies and potential security threats at airport checkpoints. The compilation of the number of tests conducted, names of the test airports, and quantitative and qualitative results of our testing is classified or designated as Sensitive Security Information. We made one recommendation that when implemented should strengthen the effectiveness of identifying and resolving security threats at airport checkpoints.

>Covert Testing of TSA's Passenger Screening Technologies and Processes at Airport Security Checkpoints
2015
OIG-17-112 We conducted covert tests to determine the effectiveness of TSA's checkpoint screening equipment and screener performance in identifying and resolving potential security threats at airport security checkpoints. We identified vulnerabilities with TSA's screener performance, screening equipment, and associated procedures. Details related to our testing results presented in the report are classified or designated Sensitive Security Information. We are making eight recommendations that when implemented, should improve TSA's screening checkpoint operational effectiveness.

>Covert Testing of TSA’s Screening Checkpoint Effectiveness
2017
OIG-08-10 Customs and Border Protection Award and Oversight of Alaska Native Corporation Contract for Enforcement Equipment Maintenance and Field Operations Support 2008