An official website of the United States government
Here's how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Brought to you by the Council of the Inspectors General on Integrity and Efficiency
Federal Reports
Report Date
Agency Reviewed / Investigated
Report Title
Type
Location
U.S. Agency for International Development
Financial Audit of USAID Resources Managed by Mavambo Orphan Care in Zimbabwe Under Cooperative Agreement AID-613-A-15-00002, January 1 to December 31, 2020
INFORMATION TECHNOLOGY: Department of the Treasury Federal Information Security Modernization Act Fiscal Year 2021 Performance Audit for the Collateral National Security Systems (Sensitive But Unclassified)
Our objective was to evaluate the U.S. Postal Inspection Service’s oversight of case management reporting requirements related to arrests. We also determined whether the Postal Inspection Service reports its results to National Instant Criminal Background Check System.Postal Inspection Service inspectors lead investigations involving postal crimes such as mail fraud and mail theft, execute federal search warrants, and make arrests. They also participate in investigations with other federal, state, and local law enforcement agencies that have a postal nexus, such as mailing of illegal drugs. The requirements for conducting and documenting their investigations are in the Case Management Reporting Guidelines (the Guidelines) and Case Closing Checklist. Inspectors use the Case Management System (CMS) to document investigations and arrests. In fiscal year (FY) 2020, postal inspectors reported 4,803 arrests and 3,642 convictions related to postal crimes.
The Office of Inspector General (OIG) performed an inspection of four mission areas within the U.S. Department of Agriculture (USDA) to determine if the mission areas were identifying and mitigating vulnerabilities on their public-facing web applications and websites.