Skip to main content
U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Audits, Inspections, and Evaluations

Report Number Title Sort descending Issue Date Fiscal Year
OIG-13-80 During fiscal years 2010 and 2011 audits of Department of Homeland Security (DHS) financial statements, independent auditors noted concerns with recorded obligations for some Enforcement and Removal Operations contracts. Since the scope of the financial statements audit does not necessarily include an in-depth review of matters that are not material to the audit, we conducted a performance audit of the processes. Our audit objective was to determine whether ICE is appropriately managing its contract funding and payment processes.

>U.S. Immigration and Customs Enforcement’s Enforcement and Removal Operations’ Contract Funding and Payment Processes
2013
OIG-12-51  

>U.S. Immigration and Customs Enforcement’s Management Letter for FY 2011 DHS Consolidated Financial Statements Audit
2012
OIG-13-66 We have audited the balance sheet of the U.S. Department of Homeland Security (DHS or Department) as of September 30, 2012 and the related statements of net cost, changes in net position and custodial activity, and combined statement of budgetary resources for the year then ended (referred to herein as the “fiscal year (FY) 2012 financial statements”). The objective of our audit was to express an opinion on the fair presentation of these financial statements. We were also engaged to examine the Department’s internal control over financial reporting of the FY 2012 financial statements, based on the criteria established in Office of Management and Budget (OMB), Circular No. A-123, Management’s Responsibility for Internal Control, Appendix A.

>U.S. Immigration and Customs Enforcement’s Management Letter for FY 2012 DHS Consolidated Financial Statements Audit
2013
OIG-14-66 We contracted with the independent public accounting firm KPMG LLP (KPMG) to conduct the audit of the DHS’ FY 2013 financial statements and internal control over financial reporting. The contract required that KPMG perform its audit according to generally accepted government auditing standards and guidance from the Office of Management and Budget and the Government Accountability Office. KPMG isresponsible for the attached management letter dated January 15, 2014, and the conclusions expressed in it

>U.S. Immigration and Customs Enforcement’s Management Letter for FY 2013 DHS Financial Statements Audit
2014
OIG-14-105 In fiscal year 2012, ICE had 2,253 cases totaling approximately $21 million in workers’ compensation related costs. Our audit objective was to determine whether ICE is effectively managing the program to minimize lost workdays and related compensation costs. ICE has not effectively managed its Federal Employees’ Compensation Act program to control costs. Specifically, it has not ensured correct processing of claims and monitoring of workers’ compensation cases. In addition, ICE has not implemented management controls needed to manage the program. As a result, ICE has not minimized lost workdays and related compensation costs. For example, we identified five cases in which individuals received approximately $1 million in compensation after they were cleared to return to work.

>U.S. Immigration and Customs Enforcement’s Management of the Federal Employees’ Compensation Act Program (Revised)
2014
OIG-14-33 U.S. Immigration and Customs Enforcement (ICE) is responsible for an effective worksite enforcement strategy to protect critical infrastructure, target employers who violate employment laws, and protect employment opportunities for the Nation’s lawful workforce. In 2009, ICE revised its worksite enforcement strategy to prioritize identifying employers who knowingly hire illegal workers, arresting and removing illegal workers, and using all available civil and administrative tools to penalize and deter illegal employment. From fiscal years 2009 through 2012, Congress allocated about $531 million to fund and implement ICE’s worksite enforcement strategy. Over that same period, ICE’s Homeland Security Investigations directorate conducted about 9,140 administrative inspections and issued about $31.2 million in civil fines to employers. The audit objective was to determine whether ICE is meeting the requirements of the Immigration Reform and Control Act of 1986 through the administrative inspection process for its worksite enforcement strategy.

>U.S. Immigration and Customs Enforcement’s Worksite Enforcement Administrative Inspection Process
2014
OIG-16-20 Secret Service has a dual mission of protection and criminal investigations. To support its protective mission, officers carry radios, which are their first line of communication for events such as fence jumpers, suspicious packages, or protests. These radio systems are critical for day-to-day protective operations. Secret Service needs to upgrade the radio systems used around the White House complex, the Vice President’s Residence, and Foreign Diplomatic Embassies. If Secret Service continues to use these outdated radio communications systems, it may negatively impact their protective operations.

>U.S. Secret Service Needs to Upgrade Its Radio Systems (Redacted)
2016
OIG-11-56  

>U.S. Secret Service's Information Technology Modernization Effort
2011
OIG-17-84 KPMG LLP, under contract with DHS OIG, audited USCIS’ financial statements and internal control over financial reporting.  The resulting management letter discusses four observations related to internal control for management’s consideration.  The auditors identified internal control deficiencies in several processes including monitoring and recording employee completion of the annual ethics and integrity training; review and approval of H1-B and L fraud fee journal entries; recording of property, plant, and equipment; and inaccurate and unsupported data in some systems.  These deficiencies are not considered significant and were not required to be reported in our Independent Auditors' Report on DHS’ FY 2016 Financial Statements and Internal Control over Financial Reporting, dated November 14, 2016, included in the DHS FY 2016 Agency Financial Report.

>United States Citizenship and Immigration Services' Management Letter for DHS' Fiscal Year 2016 Financial Statements Audit
2017
OIG-16-79 The Chief Financial Officers Act of 1990 (Public Law 101-576) and the Department Of Homeland Security Financial Accountability Act (Public Law 108-330) require us to conduct an annual audit of the Department of Homeland Security’s (DHS) consolidated financial statements and internal control over financial reporting.

>United States Citizenship and Immigration Services' Management Letter for DHS' FY 2015 Financial Statements Audit
2016
OIG-14-19 In 1990, Congress created the United States Citizenship and Immigration Services’ (USCIS) Immigrant Investor Program, also known as the Employment-Based Fifth Preference Program. The program’s intent was to stimulate the United States (U.S.) economy through job creation and capital investment by foreign investors. Three years later, the Departments of Commerce, Justice and State, the Judiciary, and Related Agencies Appropriations Act, 1993 created the regional center pilot program for pooling investor money in a defined industry and geographic area. Our audit objective was to determine whether the USCIS’ Employment-Based Fifth Preference regional center program is administered and managed effectively

>United States Citizenship and Immigration Services’ Employment-Based Fifth Preference (EB-5) Regional Center Program
2014
OIG-15-55 USCG has taken some steps to address the risk of insider threats to its information systems and data. For example, USCG established an Insider Threat Working Group designed to implement a holistic program focused on the insider risk. In addition, USCG implemented a process to verify that system administrators have the appropriate level of access to information technology systems and networks to perform their assigned duties. Further, USCG established the Cyber Security Operations Center to monitor and respond to potential insider threat risks or incidents against USCG information systems and networks. However, additional steps are needed to further address the risk posed by trusted insiders at USCG

>United States Coast Guard Has Taken Steps to Address Insider Threats, but Challenges Remain
2015
OIG-23-36 United States Coast Guard Instituted Controls for the Offshore Patrol Cutter Extraordinary Relief Request, But Guidance Could Be Improved 2023
OIG-15-87 The USCG has made progress in developing a culture of privacy. Separately, the USCG Privacy Office and Health Insurance Portability and Accountability Act (HIPAA) Office are working to meet requirements of pertinent legislation, regulations, directives, and guidance. These offices ensure their staff annually receive mandatory privacy training, which helps embed shared attitudes, values, goals, and practices for complying with requirements to properly handle sensitive personally identifiable information and protected health information (privacy data). Also, USCG has completed required privacy and security documentation for managing its information technology systems containing privacy data. However, USCG faces challenges in protecting privacy data effectively because it lacks a strong organizational approach to resolving privacy issues.

>United States Coast Guard Safeguards For Protected Health Information Need Improvement
2015
OIG-15-32 After an alteration of the BNSF Railway bridge (Burlington bridge) in Burlington, Iowa, was completed in 2012, the United States Coast Guard (Coast Guard) requested that we audit the sharing of costs, known as the final apportionment of cost, to determine its accuracy. Coast Guard could not provide proper documentation to support the final apportionment of cost for the Burlington bridge alteration, of which $74 million was allocated to the Coast Guard and $8 million to BNSF Railway (BNSF). Specifically, the Coast Guard did not properly document its review of the construction contractors who bid on the new bridge. In addition, the financial documentation for changes to originally planned work did not always support the cost of the work. The Coast Guard also did not have a process to evaluate and verify BNSF’s reported salvage value or expected savings in maintenance and repair costs. Based on our review of available documentation, we were unable to confirm either the Coast Guard’s or BNSF’s share of the final cost to alter the Burlington bridge. As a result, the Coast Guard cannot be certain it was appropriate to pay $74 million as the Federal share of the final cost of the bridge alteration.

>United States Coast Guard's Alteration of the Burlington Bridge Project
2015
OIG-11-115  

>United States Coast Guard's Internal Controls and Cost Capturing for the Deepwater Horizon Oil Spill
2011
OIG-17-89 KPMG, under contract with DHS OIG, audited the United States Coast Guard’s financial statements and internal control over financial reporting.  The resulting management letter discusses 12 observations related to internal control for management’s consideration.  The auditors identified internal control deficiencies in several processes including financial disclosure reports; accounts receivable; civilian and military payroll; financial reporting process; and accounts payable accrual.  These deficiencies are not considered significant and were not required to be reported in our Independent Auditors' Report on DHS’ FY 2016 Financial Statements and Internal Control over Financial Reporting, dated November 14, 2016, included in the DHS FY 2016 Agency Financial Report.

>United States Coast Guard's Management Letter for DHS' Fiscal Year 2016 Financial Statements Audit
2017
OIG-16-77 The Chief Financial Officers Act of 1990 (Public Law 101- 576) and the Department Of Homeland Security Financial Accountability Act (Public Law 108-330) require us to conduct an annual audit of the Department of Homeland Security’s (DHS) consolidated financial statements and internal control over financial reporting.

>United States Coast Guard's Management Letter for DHS' FY 2015 Financial Statements Audit
2016
OIG-08-51 United States Coast Guard's Management of the Marine Casualty Investigations Program 2008
OIG-11-17 United States Coast Guard's Reported Anti-Deficiency Violations for Shore Construction and Improvement Projects for Fiscal Years 2003 through 2009 2011
OIG-19-22 We intended to verify whether the U.S. Coast Guard is properly reporting service members who are prohibited from possessing a firearm (“prohibited individuals”) to the Federal Bureau of Investigation (FBI). However, in comparing relevant databases with data into the National Instant Background Check System (NICS), We identified a number of issues that led us to question the reliability of the Coast Guard’s data.  As a result, OIG cannot identify the full scope of prohibited individuals or verify that the Coast Guard properly reported prohibited individuals to the Federal Bureau of Investigation (FBI) and to Congress.  Despite our concerns about the quality of Coast Guard’s data, OIG identified 210 service members who committed offenses that placed them in one of the categories of prohibited individuals.  Of these 210, Coast Guard did not enter 16 service members (8 percent) into NCIS.  This underreporting occurred because Coast Guard policy did not require attorneys to forward information about all individuals referred for trial by general court martial for reporting to the FBI.  Additionally, Coast Guard’s reporting to the FBI is centralized, and does not allow investigators in field offices to have direct access to NICS.  We made eight recommendations that will enhance Coast Guard’s reporting of prohibited individuals to the FBI.  The Coast Guard concurred with the recommendations.

>United States Coast Guard's Reporting of Uniform Code of Military Justice Violations to the Federal Bureau of Investigation
2019
OIG-15-68 KPMG LLP reviewed the United States Coast Guard’s (U.S. Coast Guard) internal control over financial reporting. The management letter contains six observations related to internal control and other operational matters for management’s considerations. KPMG LLP noted deficiencies and the need for improvements in certain U.S. Coast Guard processes. These deficiencies did not meet the criteria to be reported in the Independent Auditors’ Report on DHS’ FY 2014 Financial Statements and Internal Control over Financial Reporting, dated November 14, 2014, included in DHS’ fiscal year 2014 Agency Financial Report. These observations are intended to improve internal control or result in other operating efficiencies.

>United States Coast Guards' Management Letter for DHS' FY 2014 Financial Statements Audit
2015
OIG-13-59 We have audited the balance sheet of the U.S. Department of Homeland Security (DHS or Department) as of September 30, 2012 and the related statements of net cost, changes in net position and custodial activity, and combined statement of budgetary resources for the year then ended (referred to herein as the “fiscal year (FY) 2012 financial statements”). The objective of our audit was to express an opinion on the fair presentation of these financial statements. We were also engaged to examine the Department’s internal control over financial reporting of the FY 2012 financial statements, based on the criteria established in Office of Management and Budget (OMB), Circular No. A-123, Management’s Responsibility for Internal Control, Appendix A.

>United States Coast Guard’s Management Letter for FY 2012 DHS Consolidated Financial Statements Audit
2013
OIG-14-69 We contracted with the independent public accounting firm KPMG LLP (KPMG) to conduct the audit of the DHS’ FY 2013 financial statements and internal control over financial reporting. The contract required that KPMG perform its audit according to generally accepted government auditing standards and guidance from the Office of Management and Budget and the Government Accountability Office. KPMG isresponsible for the attached management letter dated January 15, 2014, and the conclusions expressed in it

>United States Coast Guard’s Management Letter for FY 2013 DHS Financial Statements Audit
2014
OIG-12-63  

>United States Customs and Border Protection’s Management of the Federal Employees’ Compensation Act Program
2012
OIG-13-26 DNDO reported that there are currently 444 radiation portal monitors operating at seaports throughout the U.S., which are meeting the requirement to screen all containerized cargo at the 22 seaports with the most container volume. We were unable to determine whether DNDO and CBP initially deployed radiation portal monitors to ensure operational efficiency because the components did not thoroughly document deployment decisions and plans. Although all cargo is being screened, we identified some radiation portal monitors utilized infrequently or not utilized at all.

>United States Customs and Border Protection’s Radiation Portal Monitors at Seaports
2013
OIG-15-71 KPMG LLP reviewed the United States Immigration and Customs Enforcement’s (ICE) internal control over financial reporting. The management letter contains five observations related to internal control and other operational matters for management’s considerations.

>United States Immigration and Customs Enforcement's Management Letter for DHS' FY 2014 Financial Statements Audit
2015
OIG-16-80 The Chief Financial Officers Act of 1990 (Public Law 101-576) and the Department Of Homeland Security Financial Accountability Act (Public Law 108-330) require us to conduct an annual audit of the Department of Homeland Security’s (DHS) consolidated financial statements and internal control over financial reporting.

>United States Immigration and Customs Enforcement's Management Letter for DHS' FY 2015 Financial Statements Audit
2016
OIG-17-71 KPMG, LLP, under contract with DHS OIG, audited the U.S. Immigration and Customs Enforcement’s financial statements and internal control over financial reporting.  The resulting management letter discusses nine observations related to internal control for management’s consideration.  The auditors identified internal control deficiencies in several processes including intra-governmental payment and collection expense approval; accounts payable analysis, payroll cash reconciliation; performance reviews; and financial disclosure reporting.  These deficiencies are not considered significant and were not required to be reported in our Independent Auditors' Report on DHS’ FY 2016 Financial Statements and Internal Control over Financial Reporting, dated November 14, 2016, included in the DHS FY 2016 Agency Financial Report.

>United States Immigration and Customs Enforcement's Management Letter for DHS' FY 2016 Financial Statements Audit
2017
OIG-10-04 United States Secret Service After-Action Review of Inaugural Security  2010
OIG-20-18 The U.S. Secret Service incurred operational and temporary duty costs for rental cars, hotel rooms, meals and incidentals, overtime pay, commercial airfare, golf cart rentals, and other logistical support.  Certain details of the cost information related to the Secret Service’s protective operations presented in the report are designated as Law Enforcement Sensitive.  We did not include salaries and benefits for government personnel traveling with the President because the Secret Service would have incurred these costs regardless of whether the President traveled.  Also excluded are costs associated with assistance provided by the Department of Defense, such as the use of military aircraft to transport personnel and equipment, because the Secret Service is not required to reimburse these costs.  We did not identify any fraud indicators or unauthorized costs.  We made no recommendations. 

>United States Secret Service Expenses Incurred at Trump Turnberry Resort
2020
OIG-17-87 KPMG LLP, under contract with DHS OIG, audited the United States Secret Service’s financial statements and internal control over financial.  The resulting management letter discusses four observations related to internal control for management’s consideration.  The auditors identified internal control deficiencies in several processes including financial reporting; time and attendance approval; invoice entry and disbursements; and confidential financial disclosure reporting.  These deficiencies are not considered significant and were not required to be reported in our Independent Auditors' Report on DHS’ FY 2016 Financial Statements and Internal Control over Financial Reporting, dated November 14, 2016, included in the DHS FY 2016 Agency Financial Report.

>United States Secret Service's Management Letter for DHS' Fiscal Year 2016 Financial Statements Audit
2017
OIG-15-58 KPMG LLP reviewed the United States Secret Service’s (U.S. Secret Service) internal control over financial reporting. The management letter contains seven observations related to internal control and other operational matters for management’s considerations. KPMG LLP noted deficiencies and the need for improvements in certain U.S. Secret Service processes. These deficiencies did not meet the criteria to be reported in the Independent Auditors’ Report on DHS’ FY 2014 Financial Statements and Internal Control over Financial Reporting, dated November 14, 2014, included in DHS’ fiscal year 2014 Agency Financial Report. These observations are intended to improve internal control or result in other operating efficiencies.

>United States Secret Service's Management Letter for DHS' FY 2014 Financial Statements Audit
2015
OIG-16-81 The Chief Financial Officers Act of 1990 (Public Law 101-576) and the Department Of Homeland Security Financial Accountability Act (Public Law 108-330) require us to conduct an annual audit of the Department of Homeland Security’s (DHS) consolidated financial statements and internal control over financial reporting. For

>United States Secret Service's Management Letter for DHS' FY 2015 Financial Statements Audit
2016
OIG-11-54  

>United States Secret Service's Management Letter for FY 2010 DHS Consolidated Financial Statements Audit
2011
OIG-13-65 We have audited the balance sheet of the U.S. Department of Homeland Security (DHS or Department) as of September 30, 2012 and the related statements of net cost, changes in net position and custodial activity, and combined statement of budgetary resources for the year then ended (referred to herein as the “fiscal year (FY) 2012 financial statements”). The objective of our audit was to express an opinion on the fair presentation of these financial statements. We were also engaged to examine the Department’s internal control over financial reporting of the FY 2012 financial statements, based on the criteria established in Office of Management and Budget (OMB), Circular No. A-123, Management’s Responsibility for Internal Control, Appendix A.

>United States Secret Service’s Management Letter for FY 2012 DHS Consolidated Financial Statements Audit
2013
OIG-14-74 We contracted with the independent public accounting firm KPMG LLP (KPMG) to conduct the audit of the DHS’ FY 2013 financial statements and internal control over financial reporting. The contract required that KPMG perform its audit according to generally accepted government auditing standards and guidance from the Office of Management and Budget and the Government Accountability Office. KPMG isresponsible for the attached management letter dated January 15, 2014, and the conclusions expressed in it

>United States Secret Service’s Management Letter for FY 2013 DHS Financial Statements Audit
2014
DD-08-06 University of North Dakota Grand Forks, ND, FEMA Disaster No. DR-1174-ND, Public Assistance ID No. 000-92004, Audit. 2006
DD-03-04 University of North Dakota, Grand Forks, ND, FEMA Disaster No. 1174-DR-ND, Public Assistance ID No. 000-92004 2004
DD-07-01 University of Texas Health Science Center, Houston, TX, FEMA Disaster No. DR-1379-TX, 2007
DD-11-01 University of Texas, MD Anderson Cancer Center 2011
OIG-13-102 In 2012, FEMA announced that it would no longer use park models as a housing option, and instead would use only manufactured housing certified by the U.S. Department of Housing and Urban Development. Unless FEMA takes actions to ensure that it maintains the ability to use temporary housing units similar in size to the park model, this decision will increase program costs by tens of millions of dollars annually, and may hinder FEMA’s ability to provide shelter to disaster survivors quickly. In reacting to the decision, FEMA field staff expressed concerns to us about their ability to house disaster survivors quickly and cost effectively. Further, FEMA officials said that many homeowners prefer units that can fit on their home sites, because it allows them to remain on their own property near their places of employment and schools while they rebuild their homes.

>Unless Modified, FEMA’s Temporary Housing Plans Will Increase Costs by an Estimated $76 Million Annually
2013
DS-13-10 Our audit objective Is to determine whether the County accounted for and expended FEMA PA grant funds according to federal regulation and FEMA guide lines. The california Emergency Managemenl Agency (Cal EMA), a FEMA grantee, awarded t he County $54.9 million for costs resulting from storms, flooding. debris flows, and mudslides during the period of Decemher 27, 2004, through January 11, 2005. The award provided 75 percent FEMA funding for 143 large projects and 3S small projects. Our audit covered the period from December 27, 2004, to January 29, 2013. We are in the process of auditing a total of 108 large projects, with total awarded funding of $44.S million. We are comprehensively auditing 12 of those projects-with total awarded funding of $17.0 million- and auditing 96 projects - with total awarded funding of $27.8 miliion- exclusively for funds that can be deobligated and put to better use.

>Unneeded Funding and Management Challenges Associated with the FEMA Grant Awarded to Los Angeles County, California: Third Interim Report
2013
OIG-18-38 Facing continued negative publicity and pressure from Members of Congress, FEMA established the Sandy Claims Review Process (SCRP). In doing so, FEMA did not rely on legislatively mandated internal controls designed to ensure appropriate payments for flood victims. Additionally, during the formation and operation of the SCRP, FEMA failed to establish contractor expectations or provide consistent guidance and oversight related to Hurricane Sandy claims. These omissions resulted in policyholders receiving unsupported additional payments, excessive costs to operate the SCRP, and time delays in processing the claims

>Unsupported Payments Made to Policyholders Who Participated in the Hurricane Sandy Claims Review Process
2018
OIG-11-91  

>Update on DHS’ Procurement and Program Management Operations
2011
OIG-08-80 US Custom’s and Border Protection’s Management of 2005 Gulf Coast Hurricanes Mission Assignment Funding 2008
OIG-08-79 US Immigration and Customs Enforcement Visa Security Program 2008
OIG-12-111 US-VISIT Faces Challenges in Identifying and Reporting Multiple Biographic Identities (Redacted) 2012
OIG-06-16 US-VISIT System Security Management Needs Strengthening (Redacted) 2006
OIG-13-93 As of November 2012, the United States Coast Guard (USCG) reported more than 15,000 laptop computers in its inventory. These laptops are used by USCG’s military personnel and civilian employees to perform their job functions both in the United States and abroad. Our overall objective was to determine the effectiveness of USCG’s efforts to protect its laptop computers and controls implemented to safeguard its laptops and wireless networks and devices from potential exploits. We reviewed USCG’s policies and procedures for managing its laptop inventory. In addition, we reviewed the effectiveness of configuration management and technical controls implemented to protect the sensitive information processed by and stored on selected laptops.

>USCG Must Improve the Security and Strengthen the Management of Its Laptops
2013