Report Type
Report Category
Submitting Agency
- (-) Department of Defense OIG (18)
- (-) Department of Homeland Security OIG (28)
- (-) Department of Labor OIG (36)
- (-) Federal Deposit Insurance Corporation OIG (1)
- (-) National Science Foundation OIG (11)
- Department of Agriculture OIG (7)
- Department of Education OIG (15)
- Department of Health & Human Services OIG (28)
- Department of Housing and Urban Development OIG (1)
- Department of Justice OIG (6)
- Department of the Interior OIG (8)
- Department of the Treasury OIG (37)
- Department of Transportation OIG (5)
- Department of Veterans Affairs OIG (27)
- Election Assistance Commission OIG (13)
- Environmental Protection Agency OIG (5)
- Farm Credit Administration OIG (1)
- Federal Reserve Board & CFPB OIG (2)
- General Services Administration OIG (4)
- National Security Agency OIG (1)
- Pandemic Response Accountability Committee (1)
- Pension Benefit Guaranty Corporation OIG (2)
- Railroad Retirement Board OIG (5)
- Securities and Exchange Commission OIG (1)
- Small Business Administration OIG (30)
- Social Security Administration OIG (3)
- Tennessee Valley Authority OIG (3)
- Treasury Inspector General for Tax Administration (27)
- U.S. Agency for International Development OIG (1)
- U.S. Postal Service OIG (11)
State/Local Agency
State (State and Local Reports)
Fraud Type
Agency Reviewed
Related Organizations
Management Challenges
Any Recommendations
Any Open Recommendations
Reports
FEMA Did Not Effectively Manage the Distribution of COVID-19 Medical Supplies and Equipment
We recommend the FEMA Administrator clarify existing guidance and ensure FEMA personnel use the Logistics Supply Chain Management System or an alternative integrated solution as the system of record during disaster response operations to manage the distribution of FEMA-owned commodities, supplies, and equipment as well as those sourced by FEMA from partners across the Federal Government, non-governmental organizations, and the private sector to fulfill state, local, tribal, and territorial requests.
We recommend the FEMA Administrator take action to develop and improve the Logistics Management Directorate’s internal controls, guidance, and system integration to obtain more accurate information that enhances logistics decision making regarding the fulfillment of commodity requests during disaster response operations. At a minimum, FEMA should: a. develop internal controls to ensure appropriate information related to facility types, intermediate locations, and transportation-only orders is accurately reported in the Logistics Supply Chain Management System or an alternative integrated solution; b. update guidance and deliver training to ensure there is a clear audit trail when aggregating distribution data on FEMA-owned commodities, supplies, and equipment as well as those sourced by FEMA from partners across the Federal Government, non-governmental organizations, and the private sector to fulfill state, local, tribal, and territorial requests; and c. improve integration between the Logistics Supply Chain Management System and the Web Emergency Operations Center Crisis Management System to ensure the systems are, to the extent practicable, compatible and share information as required by the Post-Katrina Emergency Management Reform Act of 2006.
We recommend the FEMA Administrator issue guidance and ensure a standardized process for collecting and maintaining documentation to confirm delivery and receipt of FEMA-owned commodities, supplies, and equipment, as well as those sourced by FEMA from partners across the Federal Government, non-governmental organizations, and the private sector to fulfill state, local, tribal, and territorial requests. At a minimum, the guidance and standardized process should: a. identify the required types of documentation to confirm delivery and receipt such as signed bills of lading, packing slips, and other forms; b. include controls to ensure the shipment documentation includes item descriptions and the specific quantity of items delivered and received; c. clarify the procedures for executing and documenting the delivery of commodities, supplies, and equipment to locations where no FEMA personnel are present to receive shipments; and d. establish appropriate repositories for delivery and receipt documentation.
Audit of the Reliability of the DoD Coronavirus Disease–2019 Patient Health Data
Rec. 1: The DoD OIG recommended that the Director of the Defense Health Agency work with the Program Executive Officer of the Program Executive Office, Defense Healthcare Management Systems to document and implement the process for identifying and collecting patient health data of DoD patients in the Military Health System in current and future registries within their purview in a written document, such as a standard operating procedure. The procedure should identify, at a minimum, the internal controls throughout the process, the relevant data sources, data fields, and diagnostic codes used in the computer scripts, and should be reviewed and approved when updates occur.
Rec. 2: The DoD OIG recommended that the Senior Contracting Official of the U.S. Army Medical Research Acquisition Activity and the Chief of the Joint Trauma System work with the Joint Trauma System contracting officer's representative to revise the quality assurance surveillance plan. The plan should include an appropriate sampling methodology for selecting patient health records from the Coronavirus Disease-2019 Registry to verify that the contractor is achieving the contract-required accuracy rate for entering patient data, and submit the revised quality assurance surveillance plan to the contracting officer.
Rec. 2: The DoD OIG recommended that the Senior Contracting Official of the U.S. Army Medical Research Acquisition Activity and the Chief of the Joint Trauma System work with the Joint Trauma System contracting officer's representative to revise the quality assurance surveillance plan. The plan should include an appropriate sampling methodology for selecting patient health records from the Coronavirus Disease-2019 Registry to verify that the contractor is achieving the contract-required accuracy rate for entering patient data, and submit the revised quality assurance surveillance plan to the contracting officer.
Rec. 3: The DoD OIG recommended that the Chief of the Joint Trauma System conduct an analysis to determine whether the patient data entered into the Coronavirus Disease-2019 Registry met the 90 percent accuracy rate requirement for contract W81XWH-20-P-0197 and contract W81XWH-22-C-0151.
Rec. 3.a: If the contractor did not meet the 90 percent accuracy requirement, the DoD OIG recommended that the Chief of the Joint Trauma System work with the Senior Contracting Official of the U.S. Army Medical Research Acquisition Activity to update the contractor's rating in the contractor's performance assessment reports for contract W81XWH-22-C-0151 and contract W81XWH-20-P-0197, when feasible.
Rec. 3.b: If the contractor did not meet the 90 percent accuracy requirement, the DoD OIG recommended that the Chief of the Joint Trauma System work with the Senior Contracting Official of the U.S. Army Medical Research Acquisition Activity to recoup any of the $3.9 million in questioned costs paid for services that did not comply with the terms of contract W81XWH-20-P-0197, if feasible.
Rec. 3.c: If the contractor did not meet the 90 percent accuracy requirement, the DoD OIG recommended that the Chief of the Joint Trauma System work with the Senior Contracting Official of the U.S. Army Medical Research Acquisition Activity to recoup any of the $2.3 million in questioned costs paid for services that did not comply with the terms of contract W81XWH-22-C-0151.
Rec. 3.d: If the contractor did not meet the 90 percent accuracy requirement, the DoD OIG recommended that the Chief of the Joint Trauma System work with the Senior Contracting Official of the U.S. Army Medical Research Acquisition Activity to consider all available contract remedies for contract W81XWH-22-C-0151, including modifying and, if necessary, terminating and re-competing the contract, and take action to ensure that the Department receives full value for the funds it expends for contract W81XWH-22-C-0151.
Rec. 3.e: If the contractor did not meet the 90 percent accuracy requirement, the DoD OIG recommended that the Chief of the Joint Trauma System work with the Senior Contracting Official of the U.S. Army Medical Research Acquisition Activity to delegate an official to review the concerns identified in this report, including the actions of the contracting officials, and take administrative actions, as necessary. The review should include a determination on whether the contractor's performance assessment reports were accurate and make updates as necessary.
Rec. 4.a: The DoD OIG recommended that the Director of the Defense Health Agency work with the Chief of the Joint Trauma System establish and implement a process for selecting Coronavirus Disease-2019 events for entry into the Coronavirus Disease-2019 Registry to limit selection bias.
Rec. 4.b: The DoD OIG recommended that the Director of the Defense Health Agency work with the Chief of the Joint Trauma System to include a bias disclosure notice on all reports generated from the Coronavirus Disease-2019 Registry until the Coronavirus Disease-2019 Registry data represent the population of DoD patients who had a Coronavirus Disease-2019 event.
Rec. 5.a: The DoD OIG recommended that the Assistant Secretary of Defense (Health Affairs) establish and implement a policy for developing and populating patient registries that aligns with the Department of Health and Human Services best practices, "Agency for Healthcare Research and Quality, Registries for Evaluating Patient Outcomes: A User?s Guide," current edition.
Rec. 5.b: The DoD OIG recommended that the Assistant Secretary of Defense (Health Affairs) conduct a review of all patient registries in the Military Health System to verify the reliability of data in each registry and implement corrective actions, as necessary.
The U.S. Department of Labor Did Not Meet the Requirements for Compliance with the Payment Integrity Information Act for FY 2022
We recommend the Deputy CFO maintain management’s current focus on increasing its technical assistance and funding to states to improve the improper payment reduction strategies in order to reduce the improper payments estimate rate below the 10 percent threshold.
We recommend the Deputy CFO revise the methodology used to calculate the improper payment information for the FPUC program.
We recommend the Deputy CFO continue to work with OMB to develop an approved Sampling and Estimation Methodology Plan for the PUA program, and publish the resulting improper payment information.
Audit of DoD Actions Taken to Protect DoD Information When Using Collaboration Tools During the Coronavirus Disease–2019 Pandemic
Recommendation is CUI
Recommendation is CUI
Recommendation is CUI
Recommendation is CUI
Recommendation is CUI
Recommendation is CUI
(U) Rec. B.1.a: The DoD OIG recommended that the Chief Information Officer for the Defense Finance and Accounting Service renegotiate changes with the Adobe Connect vendor to configure Adobe Connect to require privileged users to authenticate into the collaboration tool using multifactor authentication.
Recommendation is CUI
Recommendation is CUI
Recommendation is CUI
Recommendation is CUI
Rec. B.3.c: The DoD OIG recommended that the Chief Information Officer for the Defense Threat Reduction Agency configure Zoom for Government to lock user accounts after three unsuccessful logon attempts in a 15-minute period.
Recommendation is CUI
FDIC Examinations of Government-Guaranteed Loans
Develop and implement guidance to examination staff on the credit, operational (including fraud), liquidity, and compliance risks related to Government-guaranteed loans to ensure staff adequately plans and conducts examinations to identify and address emerging risks.
Develop and implement a training plan to ensure examination staff are trained on the requirements and risks of Government-guaranteed loan programs.
Update, develop, and distribute to FDIC examination personnel a list of FDIC examiners who have significant experience examining banks that specialize in Government-guaranteed loan programs to regional offices.
Develop and implement a process to obtain improved data regarding Government-guaranteed lending activities of FDIC-supervised financial
institutions.
Update the [redacted] MOU to include the sharing of loan portfolio information such as historical loan performance, status of guaranty, and loan-level risk characteristics.
Establish arrangements with other Federal agencies that administer Government-guaranteed loan programs to facilitate information sharing and
proactive identification of risk.
Develop and implement processes and procedures for the routine sharing, receipt, and storage of confidential information with Federal agencies that administer Government-guaranteed loan programs.
Develop and implement guidance to provide instruction to FDIC bank examination staff requiring communication and information sharing with Federal agencies that administer Government-guaranteed loan programs to ensure FDIC staff and the Federal agencies are aware of any emerging risks.
Determine whether other Federal agencies that administer Government-guaranteed loan programs have a list of FDIC-supervised banks with high risk factors associated with such programs and develop protocols to share information with relevant FDIC personnel, including examiners.
Develop and implement guidance to ensure relevant risk information exchanged with Federal Government agencies that administer Government-guaranteed loan programs is shared internally within the FDIC on an ongoing basis with the appropriate FDIC employees.
Develop and implement updated FDIC examination guidance to establish an appropriate timeframe for uploading complete supervisory business records to RADD.
Develop and implement guidance to examination staff to ensure the staff consistently evaluate Government-guaranteed loans in their review of loan classification, assessment of off-balance sheet risk, concentration risk, and ongoing monitoring.
Update and implement the Examination Profile Script to include additional questions on financial institution participation in Government-guaranteed loan programs in order to identify and address emerging risk.
Develop and implement additional items to the Safety and Soundness Request List to identify Government-guaranteed loans, the performance of those loans, and status of the guaranty.
Issue and implement guidance to require that examination staff conduct a fraud risk assessment on future Government-guaranteed loan programs involving FDIC-insured and FDIC-supervised financial institutions to inform policy decisions.
Ensure guidance on future Government-guaranteed loan programs includes all risks associated with such programs and has instructions to allow for consistency in supervisory activities.
Issue and implement guidance for examiners clarifying the FDIC supervisory expectations for reviewing bank PPP activities, including the level of PPP loan volume triggering a heightened review, how examiners should assess the PPP activities of banks that have existing BSA/AML weaknesses, and protocols for examination staff to communicate observed weaknesses.
Revise and implement FDIC guidance and practices for assessing concentrations and loan classification to ensure uniform application with the other Federal bank regulators of supervisory approaches to banks
Coordinate with the other Federal bank regulators to ensure uniform application of supervisory approaches to banks regarding concentrations and loan classification.
Audit of DoD Actions Taken to Implement Cybersecurity Protections Over Remote Access Software in the Coronavirus Disease–2019 Telework Environment
Rec. A.1: The DoD OIG recommended that the Director of the U.S. Southern Command - Joint Interagency Task Force South Command, Control, Communications, Computers, Cyber and Intelligence direct its network administrators to scan the VMware Horizon main virtual desktop for malware in accordance with the McAfee Endpoint Security Technical Implementation Guide, develop compensating controls, or formally accept the risk of not scanning the main virtual desktop.
Rec. A.2.a: The DoD OIG recommended that the Chief Information Officer of the Department of the Air Force revise its policy to align with the Windows 10 Security Technical Implementation Guide requirement for disabling inactive user accounts after no more than 35 days.
Rec. A.2.b: The DoD OIG recommended that the Chief Information Officer of the Department of the Air Force direct network and system administrators to disable inactive user accounts after no more than 35 days of inactivity in accordance with the Windows 10 Security Technical Implementation Guide, develop compensating controls, or formally accept the risk of not disabling the inactive user accounts.
Rec. A.3: The DoD OIG recommended that the Chief Information Officer of the Naval Surface Warfare Center - Panama City Division direct network and system administrators to disable inactive user accounts after no more than 35 days of inactivity in accordance with the Windows 10 Security Technical Implementation Guide, develop compensating controls, or formally accept the risk of not disabling the inactive user accounts.
Rec. A.4.a: The DoD OIG recommended that the Chief Information Officer of the Defense Intelligence Agency revise its policy to align with the Windows 10 Security Technical Implementation Guide requirement for disabling inactive users after no more than 35 days.
Rec. A.4.b: The DoD OIG recommended that the Chief Information Officer of the Defense Intelligence Agency direct network and system administrators to disable inactive user accounts after no more than 35 days of inactivity in accordance with the Windows 10 Security Technical Implementation Guide, develop compensating controls, or formally accept the risk of not disabling the inactive user accounts.
Rec. A.5.a: The DoD OIG recommended that the Director of the Marine Corps Information Command, Control, Communications, and Computers revise the organization's policy to align with the Windows 10 Security Technical Implementation Guide requirement for disabling inactive users after no more than 35 days.
Rec. A.5.b: The DoD OIG recommended that the Director of the Marine Corps Information Command, Control, Communications, and Computers direct network and system administrators to disable inactive user accounts after no more than 35 days of inactivity in accordance with the Windows 10 Security Technical Implementation Guide, develop compensating controls, or formally accept the risk of not disabling the inactive user accounts.
Rec. A.6: The DoD OIG recommended that the Director of the Defense Information Systems Agency Joint Service Provider direct network and system administrators to disable inactive user accounts after no more than 35 days of inactivity in accordance with the Windows 10 Security Technical Implementation Guide, develop compensating controls, or formally accept the risk of not disabling the inactive user accounts.
Rec. B.1: The DoD OIG recommended that the Director of the Defense Information Systems Agency Joint Service Provider direct network and system administrators to revise the vulnerability management program to include mitigation timeframes for all vulnerabilities and develop plans of actions and milestones for all vulnerabilities that cannot be mitigated in a timely manner.
FEMA Did Not Provide Sufficient Oversight of Project Airbridge
FY 2022 Independent Auditors' on DOL's Consolidated Financial Statements Report
We recommend that the Deputy Chief Financial Officer and the Assistant Secretary for Employment and Training design and implement controls over their respective estimates to ensure management’s review of the estimates are performed at a sufficient level of detail, including the methodology, underlying data, and assumptions used to develop the estimates.
We recommend that the Deputy Chief Financial Officer and the Assistant Secretary for Employment and Training maintain documentation of the reviews performed to assess the reasonableness of the methodology, underlying data, and assumptions used to develop the estimates that is sufficiently detailed to evidence the specific items reviewed, analysis performed, and conclusions reached.
We recommend that the Deputy Chief Financial Officer and the Assistant Secretary for Employment and Training provide additional training to the reviewers of the estimates to reinforce established policies and procedures, as necessary.
COVID-19: OSHA's Enforcement Activities Did Not Sufficiently Protect Workers From Pandemic Health Hazards
We recommend the Assistant Secretary for Occupational Safety and Health: provide additional training to CSHOs to enforce the recording and reporting standard for fatalities.
We recommend the Assistant Secretary for Occupational Safety and Health: update guidance or policy to include supervisory review of inspection files to ensure they contain adequate support for the reasons regarding citation issuance decisions before closing inspections.
We recommend the Assistant Secretary for Occupational Safety and Health: develop a plan for a future pandemic or epidemic to collaborate with external agencies on worksite case data and to use this data to maximize rapid response and enforcement actions in worksites.
We recommend the Assistant Secretary for Occupational Safety and Health: as part of OSHA's rulemaking on infectious diseases, require employers to notify all employees of all known positive cases at the worksite.
We recommend the Assistant Secretary for Occupational Safety and Health: develop and implement a tracking tool to ensure OSHA receives and reviews all items CSHOs request during inspections to ensure alleged hazards have been mitigated.
FEMA’s Management of Mission Assignments to Other Federal Agencies Needs Improvement
We recommend the FEMA Associate Administrator for Response and Recovery develop a process to ensure FEMA components comply
with FEMA’s Mission Assignment Guide, requiring the formulation of comprehensive cost estimates during initiation and throughout the
performance period for mission assignments.
We recommend the FEMA Associate Assistant Administrator for Response and Recovery evaluate the resources and other
process improvements needed to ensure unliquidated obligations financial data are obtained, reviewed, and reported, as required per FEMA guidance.
We recommend the FEMA Deputy Administrator develop a risk-based process for reviewing documentation that supports mission
assignment expenditures and apply this process to COVID-19 mission assignments to ensure eligibility of claimed costs.
We recommend the FEMA Associate Administrator for Response and Recovery obtain documentation supporting the more than $103
million for COVID-19 mission assignments and conduct a review to determine whether the costs comply with Federal and FEMA guidance.