
United States
- Contract and Grant Fraud (view a description of Common Fraud Schemes)
- Environmental, Health, and Safety Violations
- Computer Crimes
- Product Substitution and Suspect/Counterfeit Parts
- Bribery, Kickbacks, and Gratuities
- False Statements and False Claims
- Conflicts of Interest and Ethics Violations
- Travel Fraud
- Theft or Abuse of Government Property
- Violation(s) of Criminal Law and/or the Civil False Claims Act in Connection with a Federal Contract
- Other Violations of Federal Laws and Regulations
- DOT Employees
- Employees of DOT Contractors, Subcontractors, Grantees, and Sub-grantees
Consent Judgment Entered Against Philadelphia Drone Flyer For Violations of FAA Regulations
Culver City Man Agrees to Plead Guilty to Recklessly Crashing Drone into Super Scooper Firefighting Aircraft During Palisades Fire
Former Keolis Assistant Chief Engineer Pleads Guilty to Defrauding Keolis Commuter Services
MARAD Has Not Established a Compliant Information Management System for USMMA's Sexual Assault Prevention and Response Program
Our Objective(s)To (1) determine whether MARAD has implemented an information management system for the SAPR Program that complies with NDAA requirements and (2) assess the system's cybersecurity and privacy controls. Why This AuditThe 2023 National Defense Authorization Act (NDAA) required MARAD to...
Quality Control Review on a Single Audit of the Dallas Area Rapid Transit, Dallas, TX
Our Objective(s)To determine whether (1) Weaver and Tidwell, L.L.P.'s audit work complied with the Single Audit Act of 1984, as amended, the Office of Management and Budget's Uniform Guidance, and the extent to which we could rely on the auditor's work on the U.S. Department of Transportation's (DOT...
Virginia contractor to pay over $2.6M to settle allegations of falsely obtaining small business contracts
U.S. Attorney's Office Secures Sentencing of Mexican National for Attempted Aircraft Destruction and Drug Trafficking
DOT Needs To Increase Adherence to Cybersecurity Policies To Protect FHWA's IT Infrastructure From the Risk of Further Compromise
Our Objective(s)To determine whether security weaknesses exist in FHWA's information technology (IT) infrastructure that could lead to the compromise of the Agency's IT systems and data. Specifically, we reviewed FHWA's (1) adherence to cybersecurity policies and (2) compliance with the Rules of...