An official website of the United States government
Here's how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Brought to you by the Council of the Inspectors General on Integrity and Efficiency
Federal Reports
Report Date
Agency Reviewed / Investigated
Report Title
Type
Location
Federal Deposit Insurance Corporation
DOJ Press Release: Somerset County Man Admits $850,000 Paycheck Protection Program Fraud Scheme
This interim report presents the results of our self-initiated audit of the efficiency of selected processes at the Fort Point Station in Boston, MA. The Fort Point Station is in the Massachusetts-Rhode Island District of the Atlantic Area. We judgmentally selected the Fort Point Station for our audit.
This interim report presents the results of our self-initiated audit of the efficiency of selected processes at the Norwood Post Office in Norwood, MA. The Norwood Post Office is in the Massachusetts-Rhode Island District of the Atlantic Area. We judgmentally selected the Norwood Post Office for our audit.
This interim report presents the results of our self-initiated audit of the efficiency of selected processes at the Woburn Main Post Office in Woburn, MA. The Woburn MPO is in the Massachusetts-Rhode Island District of the Atlantic Area. We judgmentally selected the Woburn MPO for our audit.
For our evaluation of the U.S. Census Bureau's (the Bureau's) cybersecurity posture, our objective was to determine the effectiveness of the Bureau’scybersecurity posture against a simulated real-world attack. To do this, we conducted a covertcyber red team with six goals tailored to relevant risks. We found that the red team was able to gain unauthorized and undetected access to a Bureaudomain administrator account as well as personally identifiable information of Bureauemployees; reduce the Bureau’s defensive options; use insecure programs to send fake emails; and carry out severalmalicious actions that identified 11 security weaknesses.