Skip to main content
U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Audits, Inspections, and Evaluations

Report Number Title Sort ascending Issue Date Fiscal Year
OIG-06-19 State of Indiana's Management of State Homeland Security Grants Awarded During Fiscal Years 2002 and 2003 (Redacted) 2006
DS-08-11 State of California's Administration of the Fire Management Assistance Grant Program for the Pine Fire 2008
DS-08-08 State of California's Administration of the Fire Management Assistance Grant Program for the Canyon Fire 2008
W-03-03 State of California Department of Forestry and Fire Protection, Sacramento, CA, FEMA Disaster No. 1155-DR-CA, Public Assistance ID No. 000-92003 2002
DS-08-06 State of Arizona's Administration of the Fire Management Assistance Grant Program for the Aspen Fire 2008
OIG-07-42 State Homeland Security Grants Awarded to the American Samoa Government 2007
OIG-17-105-D We determined that the County’s accounting policies, procedures, and business practices appear adequate to account for FEMA grant funds according to Federal regulations and FEMA guidelines.  However, the County could benefit from Florida, as FEMA’s grant recipient, providing additional technical assistance and monitoring of its pending projects.

>St. Johns County, Florida, Could Benefit from Additional Technical Assistance and Monitoring to Ensure St. Johns County, Florida, Could Benefit from Additional Technical Assistance and Monitoring to Ensure Compliance with FEMA Grant Requirements
2017
DD-07-02 St. Bernard Parish, Louisiana's, Management of State Homeland Security Grants Awarded For the Removal of Debris From Hurricane Katrina (Redacted) 2007
DD-09-10  

>St Bernard Parish, Louisiana
2009
OIG-07-31 Special Transient Accommodations Program For the Evacuees From Hurricanes Katrina and Rita 2007
OIG-18-35 Special Review: TSA's Handling of the 2015 Disciplinary Matter Involving TSES Employee (Redacted) – Retracted 2018
OIG-18-55 Department of Homeland Security (DHS) Under Secretary for Intelligence and Analysis (USIA) David J. Glawe used a personal email account to send an invitation to his ceremonial swearing-in event to staff members of the United States Senate Committee on Homeland Security and Governmental Affairs. Because the invitation came from a non-DHS email account and resembled a phishing email, Senator Claire McCaskill asked the DHS Office of Inspector General to review the circumstances surrounding the invitation

>Special Review: Swearing-In Ceremony of David J. Glawe, DHS Under Secretary for Intelligence and Analysis
2018
OIG-18-52 In light of the heightened public and congressional interest in the misuse of government-owned, government-leased, and chartered aircraft, the Department of Homeland Security (DHS) Office of Inspector General (OIG) conducted a special review of the use of government aircraft by the heads of the Department and several of DHS’s operational components. DHS OIG’s review also included a review of other-than-coach-class travel by this same group of senior officials. We determined that each instance of the use of government aircraft by DHS’s senior leaders during the time period of our review generally complied with relevant laws, rules, regulations, policies, and guidance.

With respect to DHS senior leaders’ other-than-coach-class (OTCC) commercial air travel over the same time period, we determined that such travel generally qualified as allowable premium travel. We could not definitively determine, however, whether one trip taken by a former Deputy Secretary met all of the Department’s criteria for allowable OTCC travel. We also identified two specific instances of non-compliance with the Department’s internal request and approval processes for such travel; however, the related travel was properly justified, and the process deviations were quickly identified and corrected by the Department.

>Special Review: DHS Executive Travel Review
2018
OIG-10-103  

>Special Review of the Science an Technology Directorate's Contracts With a Small Business
2010
OIG-18-84 Special Review - Initial Observations Regarding Family Separation Issues Under the Zero Tolerance Policy 2018
OIG-11-72  

>Special Report: Summary of Significant Investigations October 1, 2009 to December 31, 2010
2011
OIG-10-88  

>Special Report: Summary of Significant Investigations October 1, 2008 to September 30, 2009
2010
OIG-12-108  

>Special Report: Summary of Significant Investigations January 1, 2011, to December 31, 2011
2012
OIG-09-39  

>Special Report: Summary of Significant Investigations - March 1, 2003 - September 30, 2008
2009
OIG-19-41 Special Report: Review Regarding DHS OIG's Retraction of Thirteen Reports Evaluating FEMA's Initial Response to Disasters 2019
OIG-06-48 Special Report: Letter on TSA's FY 2005 Financial Statements 2006
OIG-07-18 Special Report: Letter on Information Technology Matters Related to TSA's FY 2005 Financial Statements (Redacted) 2007
OIG-18-21 FEMA is currently responding to Hurricane Harvey in Texas, one of the largest disasters in U.S. history, with current damage estimates reported to exceed $100 billion. Due to the massive scale of damage, FEMA and Texas, as a FEMA grantee, will face many challenges in the recovery phase of the disaster. As FEMA moves into the recovery phase for Hurricane Harvey, it will begin to obligate hundreds of millions, if not billions, of dollars from the Disaster Relief Fund for administrative costs and for Public Assistance and Hazard Mitigation grants to eligible state, tribal, and local governments and certain nonprofit organizations. Texas, as FEMA’s grantee, will be responsible for oversight and monitoring of the disaster grants to Texas subrecipients.

>Special Report: Lessons Learned from Prior DHS-OIG Reports Related to FEMA's Response to Texas Disasters and Texas' Management of FEMA Grant Funds
2018
OIG-18-74 FEMA needs to continue providing technical assistance to and monitoring of California’s Public Assistance grant funding management.  This helps avoid the risk of exposing millions of taxpayer dollars to fraud, waste, or mismanagement and violating the Robert T. Stafford Disaster Relief and Emergency Assistance Act. In doing so, FEMA can assist California in providing reasonable, but not absolute assurance that Public Assistance subgrant funds are spent in accordance with Federal regulations and FEMA guidelines.

>Special Report: Lessons Learned from Previous Audit Reports Related to California's Practice of Managing Public Assistance Grant Funds
2018
OIG-18-12 We prepared this special report to address challenges FEMA, Texas, Florida, U.S. territories in the Caribbean, and California may face managing insurance under the Public Assistance program in the wake of Hurricanes Harvey, Irma, and Maria, and the October 2017 California wildfires. This report describes lessons learned from findings and recommendations contained in our DHS OIG grant audit reports issued from fiscal years 2013–2017. During fiscal years 2013–2017, we issued 37 Disaster Assistance grant audit reports that disclosed challenges with FEMA’s Public Assistance insurance process. The major recurring challenges we identified included (1) Duplicate benefits in which subrecipients claimed FEMA reimbursement for costs that were covered by insurance; (2) Insufficient insurance in which subrecipients did not obtain and maintain sufficient insurance coverage required as a condition for receiving Federal disaster assistance; and (3) Misapplied or misallocated insurance proceeds in which subrecipients received insurance proceeds, and misapplied or did not allocate those proceeds to FEMA projects.

>Special Report: Lessons Learned from Previous Audit Reports on Insurance under the Public Assistance Program
2018
OIG-17-98-SR This is a DHS OIG special report regarding DHS’ efforts to hire an additional 15,000 law enforcement officers.  This is the first in a series of reports.  This report describes lessons learned from prior DHS OIG, Government Accountability Office, and DHS departmental reports on challenges relating to hiring and other important areas of human capital management.  We made no recommendations in this report.

>Special Report: Challenges Facing DHS in Its Attempt to Hire 15,000 Border Patrol Agents and Immigration Officers
2017
OIG-20-54 U.S. Immigrations and Customs Enforcement (ICE) does not follow its written policy when conducting disciplinary reviews of Senior Executive Employees (SES) employees, which risks creating an appearance that SES employees receive more favorable treatment than non-SES employees.  We reviewed the disciplinary proceedings of the former SES official to evaluate whether ICE’s deviation from the written policy, or any other evidence, in that case indicated that the official received favorable treatment, as alleged.  We did not find evidence of actual favoritism or inappropriate influence in the official’s disciplinary or security clearance review processes.  We recommended that ICE finalize and issue its draft policy documenting the process for disciplining SES members.  We made one recommendation that will enhance transparency in ICE’s disciplinary program.  ICE concurred with our recommendation and took action to resolve and close it.

>Special Report - ICE Should Document Its Process for Adjudicating Disciplinary Matters Involving Senior Executive Service Employees
2020
OIG-18-65 Between January 2016 and April 2017, DHS OIG received dozens of allegations regarding a variety of issues at the FLETC facility in Glynco, Georgia. Following extensive investigation, DHS OIG determined that many of the allegations could not be substantiated. However, with respect to certain other allegations, DHS OIG’s findings indicate that some of FLETC’s senior managers, including former Director Connie Patrick, failed to exercise the judgment, stewardship, and leadership expected of DHS senior officials. This report focuses on two specific allegations that exemplify the broader issues uncovered by DHS OIG’s investigation. Many of the allegations DHS OIG received regarding FLETC related to the official travel of the former FLETC Director, Connie Patrick. Patrick served as the Director of FLETC from 2002 until her retirement in June 2017. During this time, she frequently traveled domestically and internationally on FLETC-related business. DHS OIG conducted an extensive review of Patrick’s travel for the period January 15, 2014 through June 23, 2016 to identify any instances of impropriety. In addition to multiple complaints about Patrick’s alleged noncompliance with federal, DHS, and FLETC travel rules and regulations, DHS OIG received complaints alleging that Patrick pressured FLETC managers to hire her husband, John Patrick (JP), for a term position within the FLETC Law Enforcement Leadership Institute (LELI). DHS OIG’s investigation determined that JP was hired to a term position with LELI on January 3, 2010 and completed the term on September 11, 2011 — all during Patrick’s tenure as Director of FLETC

>Special Report - Certain Findings Relating to the OIG's Investigation of Allegations Involving FLETC Senior Officials
2018
DA-10-15  

>South Mississippi Electric Power Association 
2010
OIG-14-89 The audit objectives were to determine whether the State distributed and spent State Homeland Security Program grant funds effectively and efficiently, and in compliance with applicable Federal laws and regulations. We also addressed the extent to which grant funds enhanced the State’s ability to prevent, prepare for, protect against, and respond to natural disasters, acts of terrorism, and other manmade disasters. The Federal Emergency Management Agency (FEMA) awarded the State approximately $14.6 million in State Homeland Security Program grants during fiscal years 2010 through 2012.

>South Dakota’s Management of Homeland Security Grant Program Awards for Fiscal Years 2010 Through 2012
2014
DD-11-14  

>South Central Power Company Ohio
2011
DA-10-07  

>South Carolina Public Service Authority 
2010
DA-14-04 South Carolina Department of Transportation, FEMA Disaster No. 1313-DR-SC 2004
DA-15-04 South Carolina Department of Transportation, FEMA Disaster No. 1299-DR-SC 2004
OIG-15-66-D The South Carolina Department of Transportation (Department) expects to claim about $165.2 million in Public Assistance grant funds for debris removal activities associated with a February 2014 severe winter storm. We conducted this audit early in the Public Assistance process to identify areas where the Department may need additional technical assistance or monitoring to ensure compliance with Federal requirements. The Department generally has established policies, procedures, and business practices to adequately account for and expend FEMA grant funds according to Federal regulations and FEMA guidelines. The Department has accounting systems in place to account for disaster costs on a project-by-project basis and has adequate support for costs it plans to claim under the grant award. Further, the contracts the Department awarded to accomplish work under the grant met Federal and FEMA procurement requirements.

>South Carolina Department of Transportation Has Adequate Policies, Procedures, and Business Practices to Effectively Manage Its FEMA Public Assistance Grant Funding
2015
OIG-18-26 Severe winter storms, flooding, and mudslides during January and February 2017 caused significant damage to Solano County, California (County). County officials estimate damages at $1.6 million. Based on our limited testing, the County appears to have in place policies, procedures, and business practices to generally account for and expend FEMA Public Assistance grant funds according to Federal regulations and FEMA guidelines. The County should be able to account for disaster-related costs on a project-by-project basis and adequately support these costs.

>Solano County, California, Has Policies, Procedures, and Business Practices to Manage Its FEMA Grant Funding
2018
DS-09-07  

>Snohomish County Public Utilities District No. 1
2009
DA-09-16  

>Seminole Tribe of Florida – Activities for 2004 and 2005 Florida Hurricane
2009
OIG-05-35 Security Weaknesses Increase, Risks to Critical United States Coast Guard Database (Redacted) 2005
OIG-05-37 Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) 2005
OIG-05-42 Security Weaknesses Increase Risks to Critical United States Citizenship and Immigration Services Database (Redacted) 2005
OIG-05-43 Security Weaknesses Increase Risks to Critical Emergency Preparedness and Response Database (Redacted) 2005
OIG-06-17 Security Weaknesses Increase Risks to Critical DHS Databases (Redacted) 2006
OIG-10-09 Security of Air Cargo During Ground Transportation  2010
OIG-11-118  

>Security Issues with U.S. Customs and Border Protection’s Enterprise Wireless Infrastructure
2011
OIG-15-29 In October 2011, the Transportation Security Administration (TSA) introduced the TSA PreCheck initiative in response to congressional authorization to implement trusted passenger programs. TSA identifies low-risk passengers to receive expedited screening through TSA PreCheck lanes at airport security checkpoints. After initial implementation, Congress directed TSA to (1) certify by the end of December 2013 that 25 percent of air passengers are eligible for expedited screening without lowering security standards and (2) outline a strategy to increase the number of air passengers eligible for expedited screening to 50 percent by the end of December 2014. Our objectives were to determine: (1) what processes and procedures exist to ensure proper vetting of applicants; (2) how TSA assesses member continued eligibility; and (3) how TSA tests its processes for effectiveness and timeliness. As a concept, TSA PreCheck is a positive step towards risk-based security screening; however, TSA needs to modify TSA PreCheck vetting and screening processes. We also determined that TSACheckcommunication and coordination need improvement. We are making recommendations to assist TSA in correcting deficiencies to meet its expedited screening goals.

>Security Enhancements Needed to the TSA PreCheck™ Initiative
2015
OIG-16-11 Since 2001, FEMA provided first responder organizations with more than $9 billion through the AFG and Staffing for Adequate Fire and Emergency Response (SAFER) programs. According to FEMA, it began using the eGrants system in 2003 to manage the funds awarded through these programs. However, the eGrants system does not comply with Department of Homeland Security (DHS) information system security requirements. Specifically, access to the eGrants system is not controlled or limited because FEMA instructs grantees to share usernames and passwords within the grantee’s organization and with contractors who manage grants. As a result, someone other than the primary point of contact can take action or make changes in eGrants without the grantee’s knowledge. Additionally, in June 2014, DHS’s Office of Cyber Security advised FEMA it should not authorize eGrants to operate because it poses an unacceptable level of risk to the agency. FEMA’s Chief Information Officer acknowledged the high level of risk posed by system deficiencies and vulnerabilities. Despite the known system deficiencies and risks, FEMA authorized the continued use of the system.

>Security Concerns with Federal Emergency Management Agency's eGrants Grant Management System
2016
OIG-23-17 Secret Service and ICE Did Not Always Adhere to Statute and Policies Governing Use of Cell-Site Simulators - Law Enforcement Sensitive (REDACTED) 2023
OIG-15-125-D Scott County’s Physical Development Department in Jordan, Minnesota (County), received a $2.6 million grant for damages from a June 2014 disaster. We conducted this audit early in the grant process to identify areas where the County may need additional technical assistance or monitoring to ensure compliance with Federal requirements. The County has established policies, procedures, and business practices to account for and expend FEMA Public Assistance grant funds according to Federal regulations and FEMA guidelines.

>Scott County, Minnesota, Physical Development Department Has Adequate Policies, Procedures, and Business Practices to Effectively Manage Its FEMA Public Assistance Grant Funding
2015
OIG-13-69 We have audited the balance sheet of the U.S. Department of Homeland Security (DHS or Department) as of September 30, 2012 and the related statements of net cost, changes in net position and custodial activity, and combined statement of budgetary resources for the year then ended (referred to herein as the “fiscal year (FY) 2012 financial statements”). The objective of our audit was to express an opinion on the fair presentation of these financial statements. We were also engaged to examine the Department’s internal control over financial reporting of the FY 2012 financial statements, based on the criteria established n Office of Management and Budget (OMB), Circular No. A-123, Management’s Responsibility for Internal Control, Appendix A.

>Science and Technology Directorate’s Management Letter for FY 2012 DHS Consolidated Financial Statements Audit
2013