An official website of the United States government
Here's how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Brought to you by the Council of the Inspectors General on Integrity and Efficiency
Federal Reports
Report Date
Agency Reviewed / Investigated
Report Title
Type
Location
National Archives and Records Administration
Management Letter: Control Deficiencies Identified During the Audit of NARA’s Fiscal Year 2025 Financial Statements
This report describes an issue that the U.S. Environmental Protection Agency Office of Inspector General identified during its audit of the U.S. Infrastructure Investment and Jobs Act-funded IRL Council for the Indian River Lagoon National Estuary Program grant program.
Summary of Findings
The EPA OIG found that the IRL Council did not complete or submit any of the required Federal Financial Reports, or FFRs, for the first two years of its award and stated the reason was that the EPA did not request annual FFRs. This raised concerns that the EPA was not requiring any National Estuary Program, or NEP, award recipients to submit FFRs annually as mandated by 2 C.F.R. § 200.328.
Today, the U.S. Consumer Product Safety Commission Office of Inspector General released their semiannual report for the reporting period ending September 30, 2025. The report is part of the semiannual requirement to communicate OIG oversight activities of the CPSC to Congress and the American people.
Our Objective(s)To assess whether GLS's contract award and administration practices comply with Federal and Departmental requirements. Specifically, we evaluated GLS's compliance with contract award and administration requirements and overseeing contracting officer warrants.
Why This AuditBetween 2021 and 2024, GLS received around $154.8 million in Congressional funds to carry out its mission. In this time, GLS has managed a $65.1 million contract portfolio. Our prior work and that of DOT's Office of the Senior Procurement Executive previously identified that GLS did not always comply with Federal and Departmental acquisition requirements, including the Federal Acquisition Regulation (FAR), across the acquisition lifecycle. Considering these issues and the importance of GLS's mission, we initiated this audit.
What We FoundGLS cannot demonstrate compliance with several contract award and administration requirements.
For 43 of the 48 contracts in our sample-totaling $40.4 million-GLS could not demonstrate that it complied with key contract award and administration process requirements set by DOT's Transportation Acquisition Manual and the FAR.
These noncompliance issues put up to $18.7 million at risk.
GLS could not always verify that its contracting officials held proper warrants.
GLS officials could not provide evidence that three of its contracting officers who awarded six contracts in our sample between fiscal years 2021 and 2024 totaling around $1 million, were correctly warranted.
Further, between July 2023 and April 2024, GLS's Chief of the Contracting Office awarded 12 contracts totaling approximately $11.7 million without warrant authority.
RecommendationsWe made 5 recommendations to improve GLS's compliance with Federal and Departmental contracting requirements.
Beginning in 2021, the U.S. Department of Housing and Urban Development (HUD), Office of Inspector General (OIG) conducted several audits to assess HUD’s anti-fraud efforts and to develop inventories of fraud risks for several of its programs. Our previous work found that HUD’s fraud risk management program was in its early stages of development and we recommended that HUD perform program-specific fraud risk assessments and incorporate these assessments into an agency-wide plan to further advance its program. To continue assisting HUD in improving its anti-fraud efforts, we conducted this work to identify potential fraud risks and schemes that could negatively impact HUD’s Office of Community Planning and Development disaster recovery funding.
CPD had made progress in its efforts to identify fraud risks for its disaster recovery program. Specifically, CPD identified several fraud risks at the disaster recovery program level and documented them in a fraud risk inventory. To further assist CPD with its fraud risk efforts, we developed our own fraud risk inventory that includes additional fraud risks. To develop our inventory, we first identified seven fraud risk factors affecting disaster recovery funding that increase the chance of fraud by heightening the incentives, opportunities, and likelihood for rationalization by individuals inclined to commit fraud. We then used those fraud risk factors, along with the results of brainstorming sessions, interviews, and reviews of audit reports, investigations, press releases from HUD’s Office of Inspector General (HUD OIG) and other Federal agencies, to develop the inventory containing 57 potential fraud risks, 20 of which CPD had previously identified in its fraud risk inventory. Fraudulent misappropriation of disaster recovery funding undermines program integrity, compromises taxpayer dollars, and hinders disaster recovery efforts, ultimately harming the affected communities.
We recommend that HUD’s Office of Community Planning and Development (CPD) improve its anti-fraud efforts by using the fraud risk inventory our office developed and its Office of the Chief Risk Officer’s risk catalog. We also recommend involving key stakeholders in the disaster recovery program’s risk identification process and communicating the identified fraud risks to relevant stakeholders, such as grantees and subrecipients, to enhance fraud prevention, detection, and response efforts within HUD and grantees’ disaster recovery programs. We further recommend that CPD use its fraud risk inventory to help identify data needs and potential system enhancements to improve its ability to monitor and respond to fraud risks in the Disaster Recovery program.