An official website of the United States government
Here's how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Brought to you by the Council of the Inspectors General on Integrity and Efficiency
In 2015, the Environmental Protection Agency issued the Coal Combustion Residuals (CCR) rule, which included requirements for addressing the risks from coal ash disposal. The Tennessee Valley Authority (TVA) updated the program funding for its CCR management program in 2015 to address compliance with the CCR rule and in 2017 began developing a site-specific project to address coal ash at Gallatin Fossil Plant. The Gallatin Ash Pond Complex Closure and Restoration (Gallatin Ash) project activities include (1) construction, operation, and closure of on-site lined landfills; (2) excavation and disposal of approximately 14 million cubic yards of CCR from Gallatin Fossil Plant; and (3) closure of the legacy ash site and coal yard, along with other site restoration work.
The project was first approved for implementation by the Project Review Board in February 2018 with a total estimated project cost of approximately $899 million. As of July 2024, the total estimated project cost had increased to approximately $1.64 billion, an increase of approximately 82 percent. Because of the costs associated with this project, we assessed the management of project costs.
We determined cost management for the Gallatin Ash project needed improvement related to the development of the project estimate and monitoring and tracking of project change requests (PCRs). Specifically, the project estimate (1) did not include the complete scope of work and (2) was not developed using definitive costs as required. As a result, the initial implementation project estimate was significantly understated. Some PCRs submitted by contractors lacked adequate detail to determine if project cost increases were reasonable. In addition, PCRs were not prepared for cost increases resulting from inaccurate project estimates. During the review, we also identified confidential contractor information that was shared by TVA project management with another contractor, creating reputational and liability risks for TVA.
The Department of Homeland Security Headquarters (HQ) did not adequately secure a non-Tier 1 High Value Asset (HVA) system used to support data analysis and reporting on DHS component operations, which rendered the system and its sensitive information vulnerable to cyberattacks. Although DHS HQ developed policies and procedures meant to reduce risks to sensitive information stored on the HVA system and effectively implemented certain controls, we determined the system did not meet security requirements. We identified nine unique critical and high-risk vulnerabilities that appeared 182 times in the system and, through simulated cyberattack penetration testing, were able to exploit vulnerabilities. The vulnerabilities we identified pose significant security risks, increasing the likelihood an attacker could gain access to sensitive information. These deficiencies demonstrate that DHS HQ needs to strengthen its management of the HVA system. Ensuring the system complies with the Department’s security and privacy policies will better protect the sensitive information processed by the system. Until these deficiencies are addressed, DHS HQ may not be equipped to protect the HVA system and cannot ensure it will be able to quickly respond to and recover from a cyberattack.
The U.S. Postal Service has been transporting live, day-old poultry since 1918. “Day-old poultry” is defined as day-old chickens, ducks, emus, geese, guinea birds, partridges, pheasants, quail, and turkeys. As the primary shipper for these time-sensitive shipments, or “lives,” the Postal Service provides an essential service for hatcheries, farmers, feed stores, and backyard hobbyists. Last year, the Postal Service handled over 41 million lives through its air network alone.
To ensure safe, effective, and efficient transportation, the Postal Service requires mailers of live animals to comply with established guidelines. In turn, the Postal Service prioritizes shipment of lives through its processing and logistic networks.
U.S. Customs and Border Protection (CBP) did not effectively manage and secure its mobile devices, resulting in vulnerabilities and higher susceptibility to cyberattacks, potential unauthorized access to law enforcement and operational sensitive information, and waste and abuse from under- or over-usage. Specifically, we found that CBP did not: • Consistently implement required security settings to protect its mobile devices or mitigate risks from applications installed on these devices; • Use its mobile device management system to fully manage and secure its mobile devices; • Address software vulnerabilities within the mobile device management system; • Increase monitoring and protection for devices used outside the United States, which are at a higher risk of cyberattacks; • Perform required steps to reduce risks associated with the disposal, loss, or theft of its mobile devices; and • Monitor its mobile devices for under- or over-usage. CBP allowed mobile devices to operate without completing a security authorization process to ensure required security controls; did not establish or implement sufficient security policies and processes; relied on unclear or contradictory guidance; and did not address its increased mobile device losses. Moreover, the Department did not provide oversight to ensure that CBP fulfilled DHS requirements for monitoring mobile devices outside the United States and CBP did not enforce its policies.
An Amtrak coach cleaner based in New Orleans, Louisiana, signed a civil settlement agreement on September 22, 2025, with the U.S. Attorney’s Office, Eastern District of Louisiana. The employee agreed to pay $19,132.75 in restitution and a penalty of $4,497.25 related to the fraudulent receipt of a Paycheck Protection Program (PPP) loan. We found that the employee submitted an application containing false statements and information to qualify for the loan. As a result, the employee received a PPP loan in the amount of $16,452 to which she was not entitled.
The U.S. Environmental Protection Agency Office of Inspector General has identified concerns regarding the installation and use of unauthorized software, specifically jiggler software, on EPA computers and networks. Commonly referred to as “mouse jigglers,” jiggler software simulates activity on a laptop, preventing the laptop from entering sleep mode and locking out its user. After running network scans in two EPA regions in November and December 2024, the Agency discovered 120 employees and contractors using jiggler software.
Summary of Findings
Our investigation found that jiggler software could bypass the Agency’s Windows Installer settings, that some of the EPA’s information technology specialists believed they were exempt from the policy, and that other EPA employees and contractors installed the software without authorization. Furthermore, we discovered inconsistencies in how quickly the regional offices acted to remove the jiggler software after it was detected. The installation and use of unauthorized software on EPA computers and networks represent critical cybersecurity risks and ethics violations for the Agency.