The OIG is examining the Department’s oversight of asset seizure activities, with a focus on assessing the scope of federal seizure operations and the success rate of those actions, as well as the nature and extent of Department-organized or funded asset seizure training initiatives. The OIG’s review will cover the policies, practices, documentation, and outcomes of these activities and training programs for FY 2007 through FY 2014.
The Office of the Inspector General is initiating an audit of the Drug Enforcement Administration's (DEA) compliance with Memoranda of Understanding (MOU) between it and the Department of Defense (DoD) supporting aviation operations in Afghanistan. Our preliminary audit objective is to assess the DEA's compliance with the MOUs and determine how the DEA utilized DoD funding.
The OIG is conducting an audit to determine if the DEA's controls over accountability of drug evidence are adequate to safeguard against theft, misuse, and loss.
The Department of Justice (DOJ) and Department of State OIGs are conducting a joint review of the post-incident responses by the Department of State (State) and the U.S. Drug Enforcement Administration (DEA) to three drug interdiction missions in Honduras in 2012, all involving the use of deadly force. The missions were conducted jointly among the Government of Honduras, the DEA, and State pursuant to an aerial interdiction program known as Operation Anvil. The joint review will address, among other things, pertinent pre-incident planning and the rules of engagement governing the use of deadly force, the post-incident investigative and review efforts by State and DEA, the cooperation by State and DEA personnel with the post-shooting reviews, and the information provided to Congress and the public by DOJ and State regarding the incidents.
The OIG is examining the DEA’s use of administrative subpoenas to obtain broad collections of data or information. The review will address the legal authority for the acquisition or use of these data collections; the existence and effectiveness of any policies and procedural safeguards established with respect to the collection, use, and retention of the data; the creation, dissemination, and usefulness of any products generated from the data; and the use of “parallel construction” or other techniques to protect the confidentiality of these programs.