An official website of the United States government
Here's how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Brought to you by the Council of the Inspectors General on Integrity and Efficiency
Federal Reports
Report Date
Agency Reviewed / Investigated
Report Title
Type
Location
Department of the Interior
U.S. Department of the Interior’s Compliance With the Improper Payments Elimination and Recovery Act of 2010 in Its Fiscal Year 2019 Agency Financial Report
In accordance with guidance from the Office of Management and Budget, we reviewed the “Payment Integrity” section in the U.S. Department of the Interior’s Agency Financial Report (AFR) for fiscal year (FY) 2019. Our objective was to determine whether the Department met the requirements of the Improper Payments Elimination and Recovery Act of 2010 (IPERA) and accurately and completely reported on improper payments in its AFR and accompanying materials.We found that the Department complied with all applicable IPERA reporting requirements for FY 2019, namely the first two requirements of six. We did not consider the four remaining IPERA reporting requirements applicable for this reporting period because the Department did not identify any programs that were susceptible to significant improper payments.We identified a minor reporting error. Specifically, the Department reported in its FY 2019 APR that it had risk assessed 93 programs when it had only risk assessed 86. Seven of the programs reported for FY 2019 were risk assessed in FY 2018. However, this reporting error does not change our determination that the Department complied with the requirement.
Due to the risk of personnel injury from arc flash hazards, we performed an evaluation to determine if (1) TVA’s arc flash procedures were being performed as required, (2) required personal protective equipment (PPE) was available and properly maintained, and (3) required training was completed. We determined some requirements of TVA’s arc flash procedure were not being performed. Specifically, we determined (1) some arc flash hazard analyses were not complete, reviewed timely, updated, or verified and submitted for record; (2) some identified arc flash hazards were not communicated accurately to workers; and (3) arc flash hazards were not consistently documented. In addition, we determined arc flash training needs improvement. Specifically, we determined (1) not all personnel assigned arc flash training had completed the training curriculum, (2) TVA’s identified population of individuals required to have arc flash training was incomplete and not a reliable indicator as to who is required by the Occupational Safety and Health Administration to receive the training, and (3) TVA does not require retraining at the frequency suggested by industry guidance. Also, while PPE was generally available and in good condition, PPE management practices could be improved.
HHS is one of the largest contracting agencies in the Federal Government and in fiscal year 2019 awarded contracts totaling approximately $27 billion, of which $7 billion related to Centers for Medicare & Medicaid Services (CMS) contracts. Congress has expressed concerns about and the media has reported on CMS's awarding of contracts for strategic communications services. Separately, OIG had begun preliminary work to review the strategic communications services contracts during CMS Administrator Seema Verma's tenure. Based on this preliminary work, we conducted an audit of these CMS contracts.
THE DEPARTMENT HAS DETERMINED THAT THIS REPORT CONTAINS SENSITIVE SECURITY INFORMATION (SSI) that is controlled under 49 CFR parts 15 and 1520 to protect Sensitive Security Information exempt from public disclosure. For U.S. Government agencies, public disclosure is governed by 5 U.S.C. 552 and 49 CFR parts 15 and 1520. A redacted version of the report will be posted here on our website when it is available. What We Looked AtThe Federal Aviation Administration (FAA) operates up to 172 Terminal Radar Approach Control (TRACON) facilities, which provide air traffic control services to pilots in the airspace immediately surrounding major airports. Currently, air traffic controllers use the Standard Terminal Automation Replacement System (STARS) to provide critical air traffic services at the 11 largest TRACONs, which handle about 33 percent of all TRACON traffic in the United States. Effective security controls and contingency plans at these 11 facilities are critical to maintaining the safety and security of the National Airspace System. Accordingly, we initiated this audit to (1) assess FAA’s identification and mitigation of security risks in STARS and (2) determine whether FAA’s contingency planning limits the effects caused by the loss of STARS operations at large TRACON facilities during emergencies. What We FoundFAA is identifying STARS’ security risks but is not mitigating vulnerabilities in a timely manner. In March 2019, for example, FAA found vulnerabilities in 53 of 73 STARS security controls but did not meet its own schedule for remediating them. DOT policy requires timely remediation of vulnerabilities to reduce the risk that an attacker could gain unauthorized access to mission-critical systems. In addition, the Agency’s STARS incident response policy does not comply with Federal requirements, and we found security control weaknesses that could make it harder for the Agency to ensure the confidentiality, integrity, and availability of STARS. Finally, FAA’s contingency plans for three large TRACONS are not sufficient to maintain continuity of air traffic operations during unplanned outages, as Agency policy requires. Our RecommendationsWe made 11 recommendations and consider recommendations 1–9 and 11 resolved but open pending completion of FAA’s planned actions. In accordance with DOT Order 8000.1C, we have asked the Agency to provide additional information on its planned actions for recommendation 10 within 30 days of the date of this report.
Audit of the Fund Accountability Statement of Michigan State University Under Grain Research and Innovation Program in Afghanistan, Cooperative Agreement AID-306-OAA-A-13-00006, January 1 to December 31, 2018
Financial Closeout Audit of USAID Resources Managed by Health Initiative for Safety and Stability in Africa, Nigeria Under Cooperative Agreement AID-620-A-14-00007, January 1 to December 31, 2019
Audit of Combined Security Transition Command–Afghanistan’s Implementation of the Core Inventory Management System Within the Afghan National Defense and Security Forces
The VA Office of Inspector General (OIG) conducted a healthcare inspection at the VA Southern Nevada Healthcare System in North Las Vegas in response to a referral from the U.S. Office of Special Counsel, which contained allegations that facility leaders responded inadequately after a patient attacked and later threatened a social worker. The OIG determined that facility managers failed to timely respond after the social worker reported an assault during a home visit and did not address the social worker’s health needs after the assault. The social worker’s supervisor failed to immediately report the incident to community and VA police. The facility’s policies lacked specific guidance regarding employee emotional and mental health injuries. Further, the OIG substantiated that the social worker was not informed by a supervisor of a homicidal threat, occurring subsequent to the assault, until two weeks after facility leaders became aware of the threat. Deficient communication between the supervisor and the Deputy Chief of VA Police resulted in a delay in notification to the social worker as well as a failure to coordinate with the community police who had jurisdictional oversight. Additional issues included a delay in disruptive behavior flag placement, deficiencies in VA police Disruptive Behavior Committee participation, and vacancies and staff turnover in the facility Housing and Urban Development Veterans Affairs Supporting Housing (HUD VASH) program. The OIG made six recommendations related to staff and supervisor awareness and reporting compliance with patient disruptive behavior incidents occurring outside of VA grounds, traumatic injury needs of staff experiencing a work-related emotional or mental health injury, timely notification of threats to targeted staff, placement of patient record flags, VA police participation in the Disruptive Behavior Committee process, and a review of HUD-VASH staffing and training needs.