Skip to main content
U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Ongoing Projects

Breadcrumb

New Title Sort descending Project Objective DHS Component Mission Area
2025 Unannounced Inspections of ICE Adult Detention Facilities

Determine whether ICE detention facilities are complying with select standards outlined in ICE's Detention Standards.

ICE Strengthen U.S. Borders and Approaches
New 2026 Unannounced Inspections of ICE Detention Facilities

Assess compliance with select standards at ICE facilities used to hold or house detainees.

ICE Strengthen U.S. Borders and Approaches
Assessment of CBP's Inbound Inspections at Northern Border Crossings

Determine to what extent CBP's inbound inspection process at the northern border identifies illegal border crossings.

CBP Counter Terrorism and Homeland Threats
Audit of CBP's Information Technology Access Controls

To determine the extent to which CBP is applying information technology access controls to help prevent unauthorized access to its information and systems.

CBP Counter Terrorism and Homeland Threats
Audit of DHS Grants and Contracts Awarded by Any Means Other Than Full and Open Competition during Fiscal Year 2025

Determine to what extent the DHS complied with applicable laws and regulations when awarding contracts and grants through means other than full and open competition during fiscal year 2025. 

DHS Enable Mission Success by Strengthening the Enterprise
Audit of DHS' Cybersecurity Incident Response Capabilities

To determine to what extent, DHS and its components have implemented effective incident response capabilities to detect, respond, and limit consequences of cybersecurity attacks.

DHS Secure Cyberspace and Critical Infrastructure
Audit of FEMA's Assessment of Community Trends

To determine how well FEMA followed its policies and procedures when addressing safety concerns and determining community trends that impact disaster survivor assistance in response to Hurricanes Irene and Milton.

FEMA Strengthen Preparedness and Resilience
Audit of FEMA's Progress in Implementing the Disaster Recovery Reform Act of 2018 (DRRA) Provisions

Determine to what extent FEMA has implemented the Provisions of the Disaster Recovery Reform Act of 2018 (DRRA).

FEMA Strengthen Preparedness and Resilience
Audit of FEMA, State of Hawaii, and Maui County's oversight and use of FEMA disaster assistance in response to the 2023 Lahaina wildfires

To determine the extent to which FEMA, the State of Hawaii, and Maui County managed, accounted for, and oversaw outcomes for FEMA disaster assistance funds in response to the 2023 Lahaina wildfires in accordance with applicable laws, regulations, and grant requirements.

FEMA Strengthen Preparedness and Resilience
Audit of ICE's Hiring and Training Process

To determine the extent to which U.S. Immigration and Customs Enforcement (ICE) is able to surge its hiring and training efforts to meet operational needs.

ICE Enable Mission Success by Strengthening the Enterprise
Audit of ICE’s Processes for Investigating and Addressing Allegations of Excessive Use of Force

Determine whether ICE investigates allegations of excessive use of force and holds personnel accountable in accordance with applicable Federal laws, DHS policies, and ICE directives.

ICE Strengthen U.S. Borders and Approaches
Audit of Transportation Security Administration (TSA) Access Controls

To determine the extent to which TSA is applying information technology access controls to help prevent unauthorized access to its information and systems.

TSA Counter Terrorism and Homeland Threats
Audit of TSA's Controls to Safeguard Watchlist Data

Determine the extent to which TSA has implemented controls to safeguard watchlist data shared with external partners and stakeholders.

TSA Counter Terrorism and Homeland Threats
CBP and CWMD's Oversight of the Next Generation Mobile Radiation Portal Monitor Program

To determine to what extent CBP and CWMD defined operational requirements for the Next Generation Mobile Radiation Portal Monitor Program prior to procuring prototype systems for operational test and evaluation.

CBP, Other Counter Terrorism and Homeland Threats
CBP and ICE Processes for Issuing Detainers Prior to Federal Prosecution

Assess whether U.S. Customs and Border Protection (CBP) and U.S. Immigration and Customs Enforcement (ICE) have an effective process for issuing, acting upon, or lifting detainers placed on noncitizens for immigration enforcement-related Federal criminal proceedings in Del Rio, Texas.

CBP, ICE Strengthen U.S. Borders and Approaches
CBP Interior Immigration Enforcement

Determine whether CBP conducts interior immigration enforcement in accordance with Federal requirements and Department policies and guidance. 

CBP Strengthen U.S. Borders and Approaches
CBP's Searches of Electronic Devices at Ports of Entry (3rd series)

To determine to what extent CBP conducted searches of electronic devices at U.S. ports of entry in accordance with its standard operating procedures.

CBP Strengthen U.S. Borders and Approaches
New CBP’s Administration of Border Security Contracts

To determine the extent to which CBP ensured contracted deliverables supporting border security were provided on schedule, within budget, and met mission requirements.

CBP Strengthen U.S. Borders and Approaches
CISA's Preparedness for and Response to the Salt Typhoon Cyberattack

Determine the extent to which CISA prepared for and responded to the Salt Typhoon cyberattack.

CISA Preserve and Uphold the Nation’s Prosperity and Economic Security
Coast Guard's Fast Response Cutter Mission Needs and Capabilities

To determine the extent to which the U.S. Coast Guard Fast Response Cutters address mission needs.

Coast Guard Counter Terrorism and Homeland Threats
Comprehensive Summary of the Department of Homeland Security COVID-19 Response Challenges

To evaluate prior audits, inspections, and investigations of the Department of Homeland Security's COVID-19 pandemic response efforts to identify systemic issues that may impede mission effectiveness or efficiency.

DHS Strengthen Preparedness and Resilience
New Department of Homeland Security’s FY 2025 Compliance with the Payment Integrity Information Act of 2019 (PIIA)

To determine to what extent DHS complied with the PIIA during fiscal year 2025.

DHS Preserve and Uphold the Nation’s Prosperity and Economic Security
DHS actions related to intelligence prior to the July 13, 2024 Butler, PA rally

To determine the Department’s posture and actions to identify, receive, and disseminate, and operationalize intelligence threat information related to then-former President Trump, including intelligence related to the July 13, 2024 Butler, PA rally.

Secret Service, Other Counter Terrorism and Homeland Threats
DHS Fentanyl Prevention Efforts

To determine the extent to which U.S. Immigration and Customs Enforcement (ICE) Homeland Security Investigation's (HSI) technologies, intelligence, and information sharing counter fentanyl entering the United States.

ICE Counter Terrorism and Homeland Threats
DHS Oversight to Promote Aviation Sector Compliance with DHS' Cybersecurity Guidance

To determine how well DHS can ensure the aviation sector complies with cybersecurity requirements to maintain operational security and continuity for travelers.

CISA, TSA Counter Terrorism and Homeland Threats
DHS Technology to Reduce Wildfire Impacts

Determine the extent to which DHS' sensor technology detects wildfires and alerts partners and the public to provide advance notice to reduce loss of life and property.

Other Strengthen Preparedness and Resilience
DHS' Administration and Enforcement of Immigration Laws for Dismissals of Noncitizens Cases

Determine whether DHS' process for referring immigration cases for dismissal and subsequent actions taken ensure the proper administration and enforcement of immigration laws.

CBP, ICE Strengthen U.S. Borders and Approaches
DHS' IT Applications and Systems used to Track Aliens in Immigration Proceedings

Determine the extent to which DHS' IT applications and systems can track aliens in immigration proceedings from apprehension through disposition

CBP, ICE Counter Terrorism and Prevent Threats
DHS' Oversight of SSP and EFSP-H Funding for Noncitizens

To determine to what extent FEMA managed the Shelter and Services Program funding to ensure that expenditures complied with applicable laws and regulations.

CBP, FEMA Strengthen U.S. Borders and Approaches
DHS's reliance on the completeness of information contained within the Consular Lookout and Support System (CLASS) Database

Determine if information indexed only in the L Hit category of the Department of State's Consular Lookout and Support System (CLASS) impacts various DHS components' (CBP, CIS, & TSA as examples) ability to thoroughly screen and vet individuals to determine their eligibility for admission into the US and to receive immigration related benefits.

CBP, TSA, USCIS Counter Terrorism and Prevent Threats
DHS’ Determination of U.S. Citizenship during Immigration Enforcement Operations

Assess DHS’ processes for determining U.S. citizenship for individuals detained or arrested during immigration enforcement operations.

CBP, ICE Strengthen U.S. Borders and Approaches
New DHS’ Preparation and Deployment of Counter-Unmanned Aerial Systems Technologies at Major Public Events

To determine whether DHS has plans and capabilities to deploy Counter-Unmanned Aerial Systems technologies at major public events in accordance with Federal laws and Department policies and procedures.

DHS Counter Terrorism and Homeland Threats
Effectiveness of CISA's Secure Cloud Business Applications Project

To assess the effectiveness of CISA's efforts to help secure Federal Civilian Executive Branch (FCEB) information assets stored within cloud environments through the Secure Cloud Business Applications (SCuBA) project.

CISA Secure Cyberspace and Critical Infrastructure
Evaluation of DHS' Compliance with Federal Information Security Modernization Act Requirements for Intelligence Systems for Fiscal Year 2025

To determine the Department's effectiveness in managing its intelligence information program and information technology systems for FY 2025. Mandatory review.

Other Secure Cyberspace and Critical Infrastructure
Evaluation of DHS' Information Security Program for Fiscal Year 2025

Determine whether DHS' information security program and practices are adequate and effective in protecting DHS' operations and assets for FY 2025. Mandated review.

DHS Secure Cyberspace and Critical Infrastructure
FEMA Flood Mitigation Assistance Grant Program

Determine the extent to which FEMA's processes for soliciting, evaluating, and selecting Flood Management Assistance grant recipients of Infrastructure Investment and Jobs Act funding are consistent with requirements of laws, regulations, policy, and guidance.

FEMA Secure Cyberspace and Critical Infrastructure
FEMA's Oversight of State Critical Infrastructure Resilience Planning

Determine to what extent FEMA assists states in including key infrastructure areas in preparedness and mitigation plans.

FEMA Secure Cyberspace and Critical Infrastructure
FEMA's Small Project Disaster Recovery Grants

To determine the extent to which FEMA managed Public Assistance small projects to ensure compliance with applicable laws and regulations while mitigating waste and abuse.

FEMA Preserve and Uphold the Nation’s Prosperity and Economic Security
FEMA's Use of Infrastructure Investment and Jobs Act (IIJA) Funds to Manage the National Dam Safety Program

Determine the effect IIJA funding has on FEMA's management of the National Dam Safety Program.

FEMA Strengthen Preparedness and Resilience
New FEMA’s Hermit’s Peak/Calf Canyon Business, Government, Tribal, Not-for-Profit, and Insurance Claims

To determine whether amounts paid to Hermit’s Peak/Calf Canyon businesses, governments, tribes, not-for-profits and insurance companies were in accordance with applicable laws, regulations, policies, and procedures. 

FEMA Strengthen Preparedness and Resilience
Hermit's Peak/Calf Canyon Individual and Household Claims

To determine whether FEMA processed and paid individual and household claims for the Hermit's Peak/Calf Canyon fires in accordance with applicable laws, regulations, policies, and procedures.

FEMA Strengthen Preparedness and Resilience
ICE Enforcement of Visa Overstays

 

To determine to what extent ICE enforces visa overstays.

ICE Counter Terrorism and Homeland Threats
ICE Processes to Monitor and Check Unaccompanied Alien Child (UAC)

To determine the extent to which ICE can monitor and confirm the current location, status, and safety of UACs (Unaccompanied Alien Child).

ICE Counter Terrorism and Homeland Threats
ICE's Management of Student and Exchange Visitor Program School Certification

To determine whether ICE manages the Student and Exchange Visitor Program in accordance with Federal law and agency guidance.

ICE Counter Terrorism and Homeland Threats
ICE's Oversight of the 287(g) Program

To determine to what extent does ICE ensure law enforcement agencies participating in the 287(g)-program conduct immigration enforcement efforts in accordance with program requirements.

ICE Secure and Manage Our Borders
ICE's Use of Expedited Removal Authority

Determine to what extent ICE Enforcement and Removal Operations (ERO) uses expedited removal for inadmissible and removable aliens in accordance with Federal law and DHS policies and procedures.

ICE Secure and Manage Our Borders
New Immigration Enforcement Data security

To determine if DHS obtains and secures PII and biometric data used for immigration enforcement efforts.

DHS, ICE Counter Terrorism and Homeland Threats
Office of Intelligence and Analysis (I&A) Mobile Device Management and Security

To determine the extent to which I&A manages and secures its mobile devices.

Other Secure Cyberspace and Critical Infrastructure
Office of Intelligence and Analysis Management of DHS Counterintelligence Program's Investigation Efforts

Determine the extent to which the Office of Intelligence & Analysis leads the DHS Counterintelligence Program to identify and investigate foreign intelligence threats to Department programs, operations, and personnel.

Other Counter Terrorism and Homeland Threats
Operation Allies Welcome Recurrent Vetting

To determine the extent to which DHS conducts recurrent vetting and takes action when derogatory information is identified for Operation Allies Refuge and Operation Allies Welcome participants.

CBP Counter Terrorism and Homeland Threats
Oversight of Department of Homeland Security's (DHS) Infrastructure Investment and Jobs Act (IIJA) Contract Solicitations

To determine whether DHS components ensured solicitations for contract bids using IIJA funds complied with IIJA requirements; were fair, open, and competitive; and complied with Federal and agency acquisition laws and regulations.

CBP, CISA, Coast Guard, DHS, Other Secure Cyberspace and Critical Infrastructure
Review of asylum application adjudication processing in response to Ahmed vs. DHS settlement

Determine whether missed aliases or incomplete resolution of potential matches to derogatory records have increased following the Ahmed vs. DHS settlement agreement

USCIS Strengthen U.S. Borders and Approaches
Review of DHS's Continuous Diagnostics and Mitigation Program

To determine to what extent the Department of Homeland Security's (DHS) Continuous Diagnostics and Mitigation (CDM) program meets acquisition requirements.

CISA, DHS Secure Cyberspace and Critical Infrastructure
Review of FEMA Flood Map Amendment Process

Determine whether the Federal Emergency Management Agency's (FEMA) Risk Mapping, Assessment and Planning Program amend flood maps in accordance with National Flood Insurance Program requirements.

FEMA Strengthen Preparedness and Resilience
Review of FEMA's Response to the July 2025 Central Texas Floods

To assess FEMA's response to the July 2025 Central Texas floods.

FEMA Strengthen Preparedness and Resilience
Review of the United States Coast Guard's military and civilian equal employment opportunity processes

To determine the effectiveness of Coast Guard's military and civilian equal employment opportunity processes.

Coast Guard Champion the DHS Workforce and Strengthen the Department
New Review of TSA’s and CBP’s Canine Programs

To determine whether TSA and CBP 1) provide care for working dogs in accordance with Department policies and procedures and 2) use dogs effectively in operations.

CBP, DHS Counter Terrorism and Homeland Threats
Secret Service's Process for Securing Former President Trump's July 13, 2024 Event

Evaluate the United States Secret Service's (Secret Service) process for securing former President Trump's July 13, 2024 campaign event.

Secret Service Counter Terrorism and Homeland Threats
Single Audit Act Reviews Review nonfederal auditors’ work for compliance with OMB Circular A-133 requirements. DHS Promoting Management Stewardship
State and Territories Disaster Response Capabilities

To determine state and territorial capabilities to respond to major disasters and oversee Federal disaster funding.

FEMA Strengthen Preparedness and Resilience
TSA Oversight of SIDA Badges

To determine the extent to which TSA oversees airport operators' process for issuing and managing security identification display areas (SIDA) badges to access secure areas of airports.

TSA Counter Terrorism and Homeland Threats
TSA's Modernization of Identity Authentication and Biometric Technology to Enhance Passenger Screening at U.S. Airports

To determine the extent to which TSA's facial recognition and identification technologies enhance security screening to identify persons of interest and authenticate flight traveler information while protecting passenger privacy.

TSA Counter Terrorism and Homeland Threats
U.S. Citizenship & Immigration Services (USCIS) Personnel Security and Suitability Screening (PSSS)

Determine the extent to which USCIS screens for employee security clearance according to applicable laws, regulations, and guidance.

USCIS Counter Terrorism and Homeland Threats
U.S. Customs and Border Protection's (CBP) Small Unmanned Aircraft Systems (sUAS) Program

Evaluate U.S. Customs and Border Protection (CBP) Border Patrol's use of small, unmanned aircraft systems (UAS), including operating requirements along the Southwest border.

CBP Strengthen U.S. Borders and Approaches
U.S. Immigration and Customs Enforcement Acquisition and Management of Detention Space

Determine to what extent U.S. Immigration and Customs Enforcement acquired and managed detention space contracts and agreements in accordance with federal and Department requirements.

ICE Strengthen U.S. Borders and Approaches
U.S. Immigration and Customs Enforcement's Oversight of its Electronic Health Record System

Determine to what extent Immigration and Customs Enforcement's Electronic Health Record system addresses capability needs for transfer and access of medical records.

ICE Secure Cyberspace and Critical Infrastructure
U.S. Secret Service Planning and Implementation Activities for Protective Operations

To determine the extent to which the Secret Service's planning and implementation activities ensures the safety and security of designated protectees.

Secret Service Counter Terrorism and Homeland Threats
United States Secret Service Management and Security of Mobile Devices

To determine whether the United States Secret Service manages and secures mobile devices used to conduct official government business.

Secret Service Secure Cyberspace and Critical Infrastructure
USCIS Priority-2 (P-2) Direct Access Program (DAP) for U.S. Affiliated Iraqis

To determine whether (1) U.S. Citizenship and Immigration Services (USCIS) and U.S. Immigration and Customs Enforcement (ICE), Homeland Security Investigations (HSI) have taken corrective actions on potentially improper refugee resettlement determinations under the Priority-2 (P-2) Direct Access Program (DAP) for U.S.-affiliated Iraqis, and (2) USCIS has implemented controls to detect and prevent fraud in the program.

ICE, USCIS Strengthen U.S. Borders and Approaches