An official website of the United States government
Here's how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Brought to you by the Council of the Inspectors General on Integrity and Efficiency
In our final report, we determined what TEFAP flexibilities were available to States during the pandemic and FNS’ oversight of the States and Eligible Recipient Agencies’ compliance with administrative fund requirements.
Our objective was to evaluate the effectiveness of the Postal Service’s security controls to protect and manage its wireless infrastructure. Specifically, we conducted a technical wireless network assessment at four postal facilities from January through April 2022 using both [redacted] to determine if security controls were in place and functioning as intended.
The Office of Inspector General (OIG) evaluated and tested USDA’s virtualization platforms for compliance with controls found in National Institute of Standards and Technology (NIST) and industry best practices to determine the status of USDA’s overall management and security of IT resources.
An Amtrak Service/Train Attendant based in New Orleans was terminated from his position on August 18, 2022, following his administrative hearing. Our investigation found that the former employee violated company policies by engaging in outside self-employment while on a medical leave of absence.
We evaluated the Department of Homeland Security’s (DHS) enterprise-wide security program for Top Secret/Sensitive Compartmented Information intelligence systems. Pursuant to the Federal Information Security Modernization Act of 2014, we reviewed the Department’s security program, and system security controls for the enterprise-wide intelligence system. The Department’s information security program for FY 2021 was rated as “ineffective,” according to reporting instructions
We conducted covert tests to determine the effectiveness of TSA’s checked baggagescreening technologies, related procedures, and whether Transportation SecurityOfficers complied with screening policies and procedures. We identified vulnerabilitieswith TSA’s screener performance, associated procedures, and screening equipment.Details related to our testing results presented in the report are classified or designatedSensitive Security Information. We are making three recommendations that whenimplemented, should improve TSA’s checked baggage screening operationaleffectiveness. TSA concurred with all three recommendations.