U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

Annual Report of the Council of Inspectors General on Financial Oversight - July 2019

Report Information

Publish Date
Report sub-type
CIGFO
Report Number
No Report Number

Text Alternative

We have maintained the structural and data integrity of the original printed product
in this text file to the extent possible. Accessibility features, such as descriptions
of tables, footnotes, and the text of the Corporation’s comments, are provided but may
not exactly duplicate the presentation or format of the printed version.

The portable document format (PDF) file also posted on our Web site is an exact
electronic replica of the printed version.

[Cover page]

Council of Inspectors General on Financial Oversight

Annual Report of the Council of Inspectors General on Financial Oversight - July 2019

(CIGFO member agency seals)

[End of Cover page]

Message from the Chair

In keeping with its mission, the Council of Inspectors General on Financial Oversight
(CIGFO), which is authorized to oversee the Financial Stability Oversight Council
(FSOC) operations, continued its  work in 2018 and 2019. In its oversight role, it has,
since 2011, established working groups that are comprised of staff from the CIGFO member
Inspector General offices to conduct reviews of FSOC operations—CIGFO relies on these
working groups to fulfill its mission. CIGFO issued an audit report by a Working Group
convened in December 2017 that assessed FSOC’s monitoring of international financial
regulatory proposals and developments. CIGFO also convened the following Working Groups:

• June 2018 – initiated a project to report on management and performance challenges
identified in 2017 across CIGFO agencies. That report, Top Management and Performance
Challenges Facing Financial Regulatory Organizations, was issued in September 2018.

• December 2018 – initiated a project to survey FSOC Federal members’ efforts to support
implementation of the Cybersecurity Information Sharing Act. This project is expected to
be completed in 2019.

• March 2019 – initiated a project to report on management and performance challenges
identified in 2018 across CIGFO agencies. This project is expected to be completed in
2019.

In addition to CIGFO’s oversight activities, it has performed monitoring activities that
included sharing financial regulatory information which enhanced the Inspectors General
knowledge and insight about specific issues related to members’ current and future work.
For example, during its quarterly meetings, CIGFO members discussed efforts to increase
cybersecurity and the resiliency of the financial sector; swaps regulations, including
related reforms under the Dodd-Frank Wall Street Reform and Consumer Protection Act; and
other legislative activities that could impact the financial regulatory system.

In the coming year, CIGFO members will continue, through their individual and joint work,
to help strengthen the financial system by oversight of FSOC and its Federal member
agencies.

/s /

Rich Delmar

Acting Chair, Council of Inspectors General on Financial Oversight

Acting Inspector General, Department of the Treasury

[End of Message from the Chair]

Table of Contents

The Council of Inspectors General on Financial Oversight

Council of Inspectors General on Financial Oversight Reports

Office of Inspector General Board of Governors of the Federal Reserve
System and Bureau of Consumer Financial Protection

Office of Inspector General Commodity Futures Trading Commission

Office of Inspector General Federal Deposit Insurance Corporation

Office of Inspector General Federal Housing Finance Agency

Office of Inspector General U.S. Department of Housing and Urban
Development

Office of Inspector General National Credit Union Administration

Office of Inspector General U. S. Securities and Exchange Commission

Special Inspector General for the Troubled Asset Relief Program

Office of Inspector General Department of the Treasury

Appendix A: Top Management and Performance Challenges Facing Financial
Regulatory  Organizations

Appendix B: CIGFO Audit of the Financial Stability Oversight Council’s
Monitoring of International Financial Regulatory Proposals and
Developments

[End of Table of Contents]

[Seal Board of Governors of the Federal Reserve System, Consumer Financial Protection
Bureau]

Office of Inspector General

Board of Governors of Federal Reserve System and Bureau of Consumer Financial
Protection

The Office of Inspector General (OIG) provides independent oversight by conducting
audits, inspections, evaluations, investigations, and other reviews of the programs
and operations of the Board of Governors of the Federal Reserve System (Board) and the
Bureau of Consumer Financial Protection Bureau (Bureau) and demonstrates leadership by
making recommendations to improve economy, efficiency, and effectiveness, and by
preventing and detecting fraud, waste, and abuse.

Background

Congress established the OIG as an independent oversight authority for the Board, the
government agency component of the broader Federal Reserve System, and the Bureau.

Under the authority of the Inspector General Act of 1978, as amended (IG Act), the OIG
conducts independent and objective audits, inspections, evaluations, investigations,
and other reviews related to the programs and operations of the Board and the Bureau.

• We make recommendations to improve economy, efficiency, and effectiveness, and we
prevent and detect fraud, waste, and abuse.

• We share our findings and make corrective action recommendations to the Board and
the Bureau, but we do not have the authority to manage agency programs or implement
changes.

• We keep the Board’s Chair, the Bureau’s Director, and Congress fully informed of
our findings and corrective action recommendations, as well as the agencies’ progress
in implementing corrective action.

In addition to the duties set forth in the IG Act, Congress has mandated additional
responsibilities for the OIG. Section 38(k) of the Federal Deposit Insurance Act (FDI
Act) requires that the OIG review failed financial institutions supervised by the Board
that result in a material loss to the Deposit Insurance Fund (DIF) and produce a report
within 6 months. The Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-
Frank Act) amended section 38(k) of the FDI Act by raising the materiality threshold
and requiring the OIG to report on the results of any nonmaterial losses to the DIF
that exhibit unusual circumstances warranting an in-depth review.

Section 211(f ) of the Dodd-Frank Act also requires the OIG to review the Board’s
supervision of any covered financial company that is placed into receivership under
title II of the act and produce a report that evaluates the effectiveness of the
Board’s supervision, identifies any acts or omissions by the Board that contributed
to or could have prevented the company’s receivership status, and recommends
appropriate
administrative or legislative action.

The Federal Information Security Modernization Act of 2014 (FISMA) established a
legislative mandate for ensuring the effectiveness of information security controls
over resources that support federal operations and assets. In a manner consistent
with FISMA requirements, we perform annual independent reviews of the Board’s and
the Bureau’s information security programs and practices, including the effectiveness
of security controls and techniques for selected information systems.

OIG Reports and Other Products Related to the Broader Financial Sector

In accordance with section 989E(a)(2)(B) of the Dodd-Frank Act, the following
highlights the completed and ongoing work of our office, with a focus on issues
that may apply to the broader financial sector.

Completed Work

Major Management Challenges for the Board and the Bureau

Although not required by statute, we annually report on the major management
challenges facing the Board and the Bureau. These challenges identify the areas that,
if not addressed, are most likely to hamper the Board’s and the Bureau’s accomplishment
of their strategic objectives. Among other items, we identified five major management
challenges for the Board that apply to the financial sector in 2018:

• Enhancing Organizational Governance

• Enhancing Oversight of Cybersecurity at Supervised Financial Institutions

• Ensuring an Effective Information Security Program

• Advancing Efforts to Improve Human Capital Management

• Remaining Adaptable to Internal and External Developments While Refining the
Regulatory and Supervisory Framework

Among other items, we identified three major management challenges for the Bureau that
apply to the financial sector in 2018:

• Ensuring That an Effective Information Security Program Is in Place

• Managing the Human Capital Program

• Strengthening Controls and Managing Risks

In Accordance With Applicable Guidance, Reserve Banks Rely on the Primary Federal
Regulator of the Insured Depository Institution in the Consolidated Supervision of
Regional Banking Organizations, but Document Sharing Can Be Improved, OIG Report
2018-SR-B-010, June 20, 2018

The Board is the consolidated supervisor of bank holding companies (BHCs)—entities
that own or control one or more banks. The Board delegates authority to each Reserve
Bank to supervise the BHCs in the Reserve Bank’s District. By law, the Reserve Banks
must rely to the fullest extent possible on the work of the PFR of the BHCs’
subsidiary depository institutions. We conducted this evaluation to assess the
effectiveness of the consolidated supervision of RBOs. We reviewed how Reserve Banks
rely on other federal regulators to conduct consolidated supervision of RBOs—each
with $10–$50 billion in assets.

In accordance with applicable guidance related to consolidated supervision, the
Reserve Banks relied on the respective PFR of RBOs’ insured depository institutions
to supervise the RBOs we sampled. We also noted that the Reserve Banks appear to have
increased their reliance on the PFRs.

We identified an opportunity for the Board to establish general guidelines for reliance
on PFR documents and to ensure that all examiners have access to those documents. In
addition, we found that the Board and the Reserve Banks could improve document-sharing
processes. Finally, several RBO executives noted the potentially avoidable regulatory
burden created because RBO employees sometimes upload the same documentation to multiple
systems in response to Reserve Bank and PFR documentation requests.

Our report contains recommendations designed to improve document sharing among the Board,
the Reserve Banks, and the PFRs. The Board concurred with our recommendations.

The Board’s Currency Shipment Process Is Generally Effective but Can Be Enhanced to Gain
Efficiencies and to Improve Contract Administration, OIG Report 2018-FMIC-B-021,
December 3, 2018

The Board’s Banknote Issuance and Cash Operations section is responsible for the currency
shipment process. This process includes monitoring and forecasting the demand for
currency and planning and executing the issuance of currency to Reserve Bank cash offices.
We assessed the efficiency and effectiveness of the Board’s management of the currency
shipment process and the effectiveness of related contracting activities.

The Board’s currency shipment process is generally effective; however, the process can be
enhanced to gain time and cost efficiencies. Streamlining the currency forecasting process
could save time and minimize the potential for human error. Selecting different
transportation modes for certain currency shipment routes and evaluating alternatives to
transporting shipping equipment could yield transportation cost savings.

Additionally, the Board can improve the administration of its armored carrier contracts
to help ensure that the Board is adequately protected against loss or damage during
shipments, that armored carriers are adequately protecting Board data, and that the
Board is receiving the expected level of service.

Our report contains recommendations designed to help the Board seek additional
efficiencies in the currency shipment process and to improve the administration of
armored carrier contracts. The Board concurred with our recommendations.

Knowledge Management for the Board’s Comprehensive Liquidity Analysis and Review Is
Generally Effective and Can Be Further Enhanced, OIG Report 2018-SR-B-013,
September 5, 2018

Through the CLAR program, the Federal Reserve System conducts a horizontal
supervisory assessment of liquidity risk and risk management practices across Large
Institution Supervision Coordinating Committee (LISCC) firms—the largest, most complex
financial firms under Board supervision. We assessed the System’s knowledge management
processes, practices, and systems in support of the CLAR program.

The CLAR program’s knowledge management practices generally align with many of the
leading practices described in the academic studies and Harvard Business Review articles
we reviewed related to preserving and transferring institutional knowledge. For example,
CLAR leadership has fostered a culture that prioritizes knowledge management; CLAR teams
practice regular, team-based collaboration; and the CLAR program uses an information-
sharing application to capture, store, and share institutional knowledge. As a result,
the CLAR program appears to preserve and maintain institutional knowledge related to
supervisory findings and fosters effective collaboration.

Although the CLAR program has generally effective knowledge management practices, the
practices can be further strengthened by (1) increasing CLAR program employees’ awareness
of management’s office hours, during which they can discuss the rationale for decisions
made during the CLAR letter-writing process; (2) formalizing employee onboarding
procedures; and (3) standardizing the CLAR Steering Committee’s approach to meeting
minutes.

Our report contains recommendations designed to further enhance the CLAR program’s
knowledge management
practices. The Board concurred with our recommendations.

Review of the Failure of Fayette County Bank, OIG Report 2018-SR-B-016,
September 26, 2018

In accordance with the requirements of section 38(k) of the Federal Deposit Insurance
Act, as amended by the Dodd-Frank Act, we conducted an in-depth review of the failure
of Fayette County Bank (FCB) because the failure presented unusual circumstances that
warranted an in-depth review.

FCB failed primarily because of an aggressive growth strategy coupled with ineffective
oversight by its board of directors, leading to declining asset quality and rapid
capital depletion. In addition, the bank’s board of directors was unable to hire and
retain effective management following a long-tenured Chief Executive Officer’s
retirement in December 2012.

The Federal Reserve Bank of St. Louis generally took decisive supervisory action to
address FCB’s weaknesses and deficiencies during the time frame we reviewed, 2011
through 2017, by appropriately downgrading the bank’s CAMELS composite rating
consistent with its risk profile and promptly issuing an emergency supervisory
directive. The Federal Reserve Bank of St. Louis’s supervisory activity included
formal enforcement actions and a recommendation to implement an enforcement
action against an FCB bank official.

Our review resulted in a finding related to enhanced communication between the
Board’s Legal Division and the Federal Reserve Bank of St. Louis. Because our
office has recently issued a recommendation to address that communication issue,
our report contains no new recommendations.

The Bureau Can Improve Its Follow-Up Process for Matters Requiring Attention at
Supervised Institutions, OIG Report 2019-SR-C-001, January 28, 2019

During the examination process, Division of Supervision, Enforcement and Fair
Lending (SEFL) employees may identify corrective actions that a supervised
institution needs to implement to address certain violations, deficiencies, or
weaknesses. These corrective actions include MRAs. We assessed SEFL’s
effectiveness in monitoring MRAs and ensuring that supervised institutions address
them in a timely manner.

SEFL can improve its follow-up process for MRAs. For example, we found that the
Bureau’s approach for measuring how timely it resolves MRAs is prone to
misinterpretation and therefore appeared to overstate the agency’s progress toward
closing these actions. We also determined that some of the underlying data used to
calculate the measurement were not reliable. Additionally, we observed inconsistent
MRA follow-up documentation and workpaper retention practices in certain areas.

Our report contains recommendations designed to further enhance the MRA follow-up
process. The Bureau concurred with our recommendations.

Security Control Review of the Bureau’s Mosaic System, OIG Report 2018-IT-C-012R,
June 27, 2018

Mosaic, a public-facing web application running on a cloud-based platform-as-
a-service, is used by the Bureau to manage consumer complaints related to financial
products and services. It also provides the Bureau with enhanced services and tools
related to workforce and resource management; entity boarding; and the creation and
management of investigative records, company ratings, and surveys. In accordance
with FISMA requirements, we evaluated the effectiveness of specific (1) security
controls for the Mosaic system and (2) components of the planning, development, and
delivery processes used for the system as they relate to the Bureau’s risk
management program.

Overall, we found that the security controls we tested for the Mosaic system were
operating effectively. Further, specific components of the planning, development,
and delivery processes used for the system, as they relate to the Bureau’s risk
management program, were performed effectively. For instance, we found that controls
related to continuous monitoring, vulnerability scanning and remediation, and system
and information integrity were operating effectively. Further, the Bureau developed
a business case, which included an analysis of the benefits and risks, prior to
implementing Mosaic. However, we found that the Bureau can strengthen controls in
the area of identity and access management to ensure that the security control
environment for Mosaic remains effective.

We made a recommendation in the area of identity and access management controls
for Mosaic. The Bureau concurred with our recommendation. In addition, our report
includes matters for management’s consideration in the areas of audit and
accountability, contingency planning, and configuration management.

The Bureau Can Improve Its Risk Assessment Framework for Prioritizing and
Scheduling Examination Activities, OIG Report 2019-SR-C-005, March 25, 2019

The scope of the Bureau’s financial institution oversight authorities covers
depository institutions with more than $10 billion in total assets and thousands
of nondepository institutions. The Bureau seeks to prioritize its examination
activities based on an annual assessment of the risks that the products offered by
these financial institutions present to consumers. We assessed the effectiveness
of SEFL’s risk assessment framework, including the identification, analysis,
and prioritization of specific institution product lines for examination, and we
reviewed each region’s implementation of the results of the prioritization process
through examination scheduling.

We identified opportunities for the Bureau to improve its risk assessment framework
for prioritizing and scheduling examinations. Specifically, SEFL’s approach for
assigning a key risk score to individual institution product lines is not transparent
for some Bureau employees involved in the scoring process; these employees would
benefit from additional training and guidance on that process. We also found that
SEFL can improve its preliminary research on supervised institutions. Finally, we
found that SEFL can improve the internal reporting of changes to the examination
schedule.

Our report contains recommendations designed to improve the Bureau’s risk assessment
framework for prioritizing and scheduling examination activities. The Bureau concurred
with our recommendations.

Ongoing Work

Evaluation of the Effectiveness of the Board’s Cybersecurity Supervision (Phase 2)

We identified cybersecurity oversight at supervised financial institutions as a major
management challenge for the Board on an annual basis from 2015 to 2018. In 2017, we
issued a report focused on cybersecurity supervision of multiregional data processing
servicers and financial market utilities, among other topics. We have initiated the
second phase of our cybersecurity oversight activities focused on assessing the Board’s
cybersecurity supervision of the nation’s largest and most systemically important
financial institutions—those institutions in the Board’s Large Institution Supervision
Coordinating Committee portfolio.

Audit of the Federal Reserve System’s Supervision and Oversight of Designated Financial
Market Utilities

Title VIII of the Dodd-Frank Act grants the Board the authority to supervise certain
financial market utilities designated as systemically important by the Financial
Stability Oversight Council. Title VIII also grants the Board the authority to consult
with federal agencies that supervise other designated financial market utilities. This
project will assess the Federal Reserve System’s (1) process for supervising and
overseeing designated financial market utilities and (2) processes for reviewing
notices of material change from these institutions. We also plan to review the System’s
collaboration with other federal agencies in these areas.

Evaluation of the Efficiency and Effectiveness of the Board’s and the Reserve Banks’
Enforcement Action Issuance and Termination Processes

The Board may take formal enforcement actions against supervised financial institutions
for violations of laws, rules, or regulations; unsafe or unsound practices; breaches of
fiduciary duty; and violations of final orders. The Board also may use a variety of
informal enforcement tools to address deficiencies that are relatively small in number,
are not material to the safety and soundness of the institution, and can be corrected
by the institution’s current management. We are assessing the efficiency and effectiveness
of the Board’s and the Federal Reserve Banks’ processes and practices for issuing and
terminating enforcement actions.

Evaluation of the Board’s and the Reserve Banks’ Enforcement Action Monitoring Practices

An enforcement action generally requires a supervised financial institution to develop
and implement acceptable plans, policies, and programs to remedy the deficiencies that
resulted in the action. Under delegated authority from the Board, the Federal Reserve Banks
conduct supervision activities, including monitoring institutions’ efforts to
address the terms of enforcement actions. We are assessing the effectiveness of the Board’s
and the Reserve Banks’ practices for monitoring open enforcement actions against supervised
financial institutions.

Evaluation of Postemployment Restrictions for Senior Examiners

The Intelligence Reform and Terrorism Prevention Act of 2004 prohibits specific employees
who meet the definition of a senior examiner from knowingly accepting compensation as an
employee, officer, director, or consultant from a depository institution, a depository
institution holding company, or certain related entities that the employee may have
supervised as a Reserve Bank employee. In November 2016, the Board issued new guidance on
these postemployment restrictions that expanded the definition of a senior examiner. We
are assessing the implementation of these updates across the Federal Reserve System and
the effectiveness of controls that seek to ensure compliance with postemployment
restrictions.

Evaluation of the Bureau’s Periodic Monitoring of Supervised Institutions

The Bureau has the authority to supervise depository institutions with more than $10 billion
in total assets and nondepository institutions in certain markets, including credit
reporting agencies. To supplement its onsite examinations of those institutions, the Bureau
conducts periodic offsite monitoring of all the depository institutions within its
supervisory jurisdiction and certain nondepository institutions, including credit reporting
agencies. We plan to evaluate the Division of Supervision, Enforcement and Fair Lending’s
policies and procedures for conducting periodic monitoring. This evaluation will assess the
implementation of these practices across the Bureau’s regional offices and benchmark the
Bureau’s approach to offsite monitoring activities against the monitoring activities of other
financial regulators.

Evaluation of the Bureau’s Processes for Leveraging the Federal Risk and Authorization
Management Program

The Federal Information Security Modernization Act of 2014 requires that we test the
effectiveness of the Bureau’s policies, procedures, and practices for select information
systems. In support of these requirements, we are conducting an evaluation of the Bureau’s
risk management activities with respect to its various cloud computing platforms and
providers, including the agency’s reliance on the Federal Risk and Authorization Management
Program.

Our evaluation objective is to determine whether the Bureau has implemented an effective
life cycle process for deploying and managing its cloud-based systems, including ensuring
that effective security controls are implemented.

Evaluation of the Office of Consumer Response’s Efforts to Share Complaint Data Within the
Bureau

The Office of Consumer Response (Consumer Response) is responsible for sharing
consumer complaint information with internal stakeholders in order to help the Bureau
supervise companies, enforce federal consumer financial laws, and write rules and
regulations. The effective sharing of consumer complaint information can help the Bureau
understand the problems consumers are experiencing in the financial marketplace and
identify and prevent unfair practices from occurring before they become major issues.
This evaluation is assessing the effectiveness of Consumer Response’s complaint-sharing
efforts. Specifically, this project is examining (1) the extent to which Consumer
Response’s consumer complaint-sharing efforts help to inform the work of internal
stakeholders and (2) Consumer Response’s controls over internal access of shared
complaint data, which can contain sensitive consumer information.

Evaluation of the Bureau’s Final Order Follow-Up Activities

This evaluation is assessing the Division of Supervision, Enforcement and Fair
Lending’s final order follow-up processes. The Bureau generally has enforcement
authority over any person or entity that violates federal consumer financial protection
law. In executing that authority, the Bureau can file a civil suit in federal district
court that may result in a federal court order. Alternatively, through the
administrative adjudication process, the Bureau and the relevant entity may agree to a
consent order that includes a series of required corrective actions by that entity. Our
objective is to review the Bureau’s processes for monitoring and conducting follow-up
activities related to final orders.

[Seal - Commodity Futures Trading Commission]

Office of Inspector General

Commodity Futures Trading Commission

The CFTC OIG acts as an independent Office within the CFTC that conducts audits,
investigations, reviews, inspections, and other activities designed to identify fraud,
waste and abuse in connection with CFTC programs and operations, and makes
recommendations and referrals as appropriate.

Background

The CFTC OIG was created in 1989 in accordance with the 1988 amendments to the Inspector
General Act of 1978 (P.L. 95-452). OIG was established as an independent unit to:

• Promote economy, efficiency and effectiveness in the administration of CFTC programs
and operations and detect and prevent fraud, waste and abuse in such programs and
operations;

• Conduct and supervise audits and, where necessary, investigations relating to the
administration of CFTC programs and operations;

• Review existing and proposed legislation, regulations and exchange rules and make
recommendations concerning their impact on the economy and efficiency of CFTC programs
and operations or the prevention and detection of fraud and abuse;

• Recommend policies for, and conduct, supervise, or coordinate other activities carried
out or financed by such establishment for the purpose of promoting economy and efficiency
in the administration of, or preventing and detecting fraud and abuse in, its programs and
operations; and

• Keep the Commission and Congress fully informed about any problems or deficiencies in
the administration of CFTC programs and operations and provide recommendations for
correction of these problems or deficiencies.

CFTC OIG operates independently of the Agency and has not experienced any interference
from the CFTC Chairman in connection with the conduct of any investigation, inspection,
evaluation, review, or audit, and our investigations have been pursued regardless of the
rank or party affiliation of the target.1 The CFTC OIG consists of the Inspector General,
the Deputy Inspector General/Chief Counsel, the Assistant Inspector General for Auditing,
the Assistant Inspector General for Investigations, one Attorney-Advisor, two Auditors,
one Senior Program Analyst, and one parttime consultant. The CFTC OIG obtains additional
audit, investigative, and administrative assistance through contracts and agreements.

Footnote: 1 The Inspector General Act of 1978, as amended, states: “Neither the head of
the establishment nor the officer next in rank below such head shall prevent or prohibit
the Inspector General from initiating, carrying out, or completing any audit or
investigation….” 5 U.S.C. App. 3 sec. 3(a).[End of Footnote]

Role in Financial Oversight

The CFTC OIG has no direct statutory duties related to oversight of the futures, swaps
and derivatives markets; rather, the CFTC OIG acts as an independent Office within the
CFTC that conducts audits, investigations, reviews, inspections, and other activities
designed to identify fraud, waste, and abuse in connection with CFTC programs and operations,
and makes recommendations and referrals as appropriate. The CFTC’s yearly financial statement
and Customer Protection Fund audits are conducted by an independent public accounting firm,
with OIG oversight.

Recent, Current or Ongoing Work in Financial Oversight

In addition to our work on CIGFO projects described elsewhere in this report, CFTC OIG
completed the following projects during the past year:

Inspection & Evaluation: CFTC Stress-Testing Development Efforts (July 2018)

OIG’s Office of Legal and Economic Review completed and published a report titled Inspection
& Evaluation: CFTC Stress-Testing Development Efforts. This inspection was motivated by
allegations of mismanagement in the Risk Surveillance Branch (RSB) of the CFTC Division of
Clearing and Risk (DCR), which was conveyed to us by multiple CFTC whistleblowers. We first
brought the allegations to the attention of the Chairman’s Chief of Staff in July 2017. The
Chairman appointed a new Director of DCR in September 2017, and OIG communicated frequently
with the new DCR Director beginning in October 2017. We circulated a summary memo to the
Chairman in October 2017, followed by a substantially complete version of the report in
December 2017. In January 2018, we met with the Chairman, his staff, and the Director of DCR;
they stated they had no major disagreements with the report. We finalized a discussion draft
in February 2018 and circulated it to the Commission. We accommodated the Chairman’s request
for an extended time to respond to the February 2018 discussion draft. We received no formal
written response or any stated disagreements, and circulated the report as final on July
30, 2018.

We found that leadership in the Division of Clearing and Risk (DCR)’s Risk Surveillance
Branch (RSB) retarded the development of CFTC stress-testing capabilities, undermined efforts
to improve the usability of uncleared swaps data, denied various employees access to certain
information technology resources, and overstated publicly the independence and coverage of its
November 2016 Supervisory Stress Test of Clearing Houses report (November 2016 report). To
complete our inspection and evaluation, we contracted with National Economic Research
Associates, Inc. (NERA). NERA assisted our technical evaluation of two CFTC stress-test
methodologies. NERA issued detailed analysis, including substantive criticism of the
methodology CFTC employed in the November 2016 report. No recommendations were issued by
NERA or OIG.

In our cover memo, we disclosed that, in lieu of a written response, the new DCR Director
verbally informed us that a new Deputy Director of the Risk Surveillance Branch (RSB) would
be named shortly, and this has occurred. In addition, we were told there will be a
reorganization of RSB, including greater integration of the related endeavors of margin model
review and stress-testing; that there will be greater emphasis on technical acumen,
technological development, and automation; and that there will be greater quantitative
analytical support of other business divisions within the CFTC. We understand these
processes are ongoing, and we intend to monitor the issues identified in our report and in
NERA’s report.

Customer Protection Outreach Whitepaper (September 2018)

This whitepaper examined possible locations for targeted CFTC education initiatives based
on the locations of highvolumes of complaints and enforcement filings (“hotspots”), coupled
with the locations of airport hubs and relevant state regulators.

We compared identified hotspots with recent outreach efforts by CFTC’s Office of Customer
Education and Outreach (OCEO), and concluded that OCEO’s educational outreach activities
could better align with existing hotspots, specifically in the Southern and Western United
States, where large hotspots exist that have not been visited by OCEO (or have not been
visited frequently). We noted that CFTC does not have a permanent physical presence in these
regions; CFTC’s furthermost western (and southern) presence is in Kansas City, Missouri. We
believe OCEO should target its efforts where customer education and outreach appears most
needed.

In addition, we addressed factors impacting the feasibility of increased outreach efforts
by OCEO, including: 1) Consumer Protection Funds (CPF) availability and the adequacy of
CFTC’s financial system to track and monitor expenditures; 2) CFTC’s authority to spend
CPF funds on education initiatives; and 3) CFTC’s ability to detail appropriate CFTC staff
to strengthen OCEO on a reimbursable basis. We concluded that CFTC has the current ability
to track and monitor expenditures, and agreed with the Office of General Counsel that CFTC
has the authority to spend CPF funds on education initiatives. Furthermore, we concluded
that CFTC has current funds available to further support education activities, and we
forecast -- based on our analysis of CFTC collections activity -- that funds
availability should continue.

We asked the Commission to consider –

• Establishing OCEO personnel in the CFTC Kansas City regional office;

• Opening additional CFTC field offices or establishing permanent remote OCEO employees
in the hotspots;

• Detailing personnel from other Divisions to OCEO (on a reimbursable basis from the CPF);
and

• Engaging appropriate Federal, State, and local government entities and other relevant
entities located in hotspots to facilitate customer education initiatives.

Management expressed their appreciation for our report and provided detailed comments.
Management’s comments, and our responses, are published with the whitepaper.

Inspection and Evaluation of the February 2018 CFTC-SEC Harmonization Briefing
(October 2018)

Under the Dodd-Frank Act, the CFTC and the Securities and Exchange Commission have
certain joint responsibilities.2 Our report titled Inspection and Evaluation of the
February 2018 CFTC-SEC Harmonization Briefing responded to two outside complaints that
the SEC-CFTC harmonization briefing held on February 27, 2018, might have violated the
Government in the Sunshine Act.3 Lacking a specific allegation of misconduct by any
individual, we determined to conduct an inspection and evaluation of the meeting. After
interviewing all CFTC attendees, as well as reviewing all matters voted on by the
Commission from the date of the meeting until the appointment of a full Commission, we
concluded that CFTC complied with the Government in the Sunshine Act in the conduct of
the meeting.

Footnote: 2 See, e.g., Memorandum of Understanding Between the U.S. Securities and
Exchange Commission and the U.S. Commodity Futures Trading Commission Regarding
Coordination in Areas of Common Regulatory Interest and Information Sharing, July 11,
2018. [End of footnote]

Footnote: 3 The Government in the Sunshine Act, 5 U.S.C. § 552b (1976), requires that
meetings of multi-member federal agencies shall be open to the public, with the exception
of discussions in ten narrowly defined areas. The Sunshine Act defines “meeting” as “the
deliberations of at least the number of individual agency members required to take action
on behalf of the agency where such deliberations determine or result in the joint conduct
or disposition of official agency business” [with exceptions]. Id. [End of footnote]

[Logo - Office of Inspector General, Federal Deposit Insurance Corporation]

Office of Inspector General

Federal Deposit Insurance Corporation

The FDIC OIG mission is to prevent, deter, and detect fraud, waste, abuse, and misconduct
in FDIC programs and operations; and to promote economy, efficiency, and effectiveness at
the agency.

Background

The Federal Deposit Insurance Corporation (FDIC) was created by the Congress in 1933 as
an independent agency to maintain stability in the nation’s banking system by insuring
deposits and independently regulating state-chartered, non-member banks. The FDIC insures
more than $7.5 trillion in deposits at more than 5,400 banks and savings associations, and
promotes the safety and soundness of these institutions by identifying, monitoring, and
addressing risks to which they are exposed. The FDIC is the primary federal regulator for
approximately 3,500 of the insured institutions. An equally important role for the FDIC is
as Receiver for failed institutions; the FDIC is responsible for resolving the institution
and managing and disposing of its remaining assets.

The FDIC Office of Inspector General (OIG) is an independent and objective oversight unit
established under the Inspector General (IG) Act of 1978, as amended. The FDIC OIG mission
is to prevent, deter, and detect fraud, waste, abuse, and misconduct in FDIC programs and
operations; and to promote economy, efficiency, and effectiveness at the agency.

Importantly, also in connection with matters affecting the financial sector, in February
2019, our Office published its assessment of the Top Management and Performance Challenges
Facing the FDIC. This assessment was based on our extensive oversight work and research
relating to reports by other oversight bodies, review of academic and other relevant
literature, perspectives from Government agencies and officials, and information from
private sector entities.

In addition, we conducted significant investigations into criminal and administrative
matters involving complex multi-million-dollar schemes of bank fraud, embezzlement, money
laundering, and other crimes committed by corporate executives and bank insiders. Our cases
reflect the cooperative efforts of other OIGs, U.S. Attorneys’ Offices, FDIC Divisions and
Offices, and others in the law enforcement community throughout the country. These working
partnerships contribute to ensuring the continued safety and soundness of the nation’s
banks and help ensure integrity in the FDIC’s programs and activities.

Finally, over the past year, we continued to coordinate with our financial IG counterparts
on issues of mutual interest. As a member of CIGFO, the FDIC OIG is also participating in
the joint project related to the Financial Stability Oversight Council members’ efforts to
support implementation of the Cybersecurity Information Sharing Act.

Top Management and Performance Challenges Facing the FDIC

The OIG identified the Top Management and Performance Challenges facing the FDIC and
provides its assessment to the Corporation for inclusion in the FDIC’s annual performance
and accountability report. This year, we identified nine areas representing the most
significant challenges for the FDIC, a number of which have implications to the financial
sector, and ways to improve financial oversight. The identification of these challenges
helps the FDIC and other policymakers to identify the primary risks at the agency, and
provides guidance for our Office to focus its attention and work efforts, as shown in the
following summaries of each of these challenges.

Enhancing Oversight of Banks’ Cybersecurity Risk

Cybersecurity continues to be a critical risk facing the financial sector. Cyber risks can
affect the safety and soundness of institutions and lead to the failure of banks, thus
causing losses to the FDIC’s Deposit Insurance Fund. For example, a cybersecurity incident
could disrupt services at a bank, resulting in the exploitation of personal information
in fraudulent or other illicit schemes, and an incident could start a contagion that spreads
through established interconnected banking relationships. Despite increased spending on
cybersecurity, banks are encountering difficulties in getting ahead of the increased
frequency and sophistication of cyberattacks. The FDIC’s IT examinations should ensure
strong management practices within financial institutions and at their service providers.

Adapting to Financial Technology Innovation

FDIC policy-makers and examiners must keep pace with the adoption of new financial
technology to assess safety and soundness of institutions and its impact on the stability
of the banking system. The pace of change and breadth of innovation requires that the
FDIC create agile and nimble regulatory processes, so that it can respond to and adjust
policies, examination processes, supervisory strategies, preparedness and readiness,
and resolution approaches as needed.

Strengthening FDIC Information Security Management

The FDIC maintains thousands of terabytes of sensitive data within its IT systems and has
more than 180 IT systems that collect, store, or process the PII of FDIC employees; bank
officials at FDIC-supervised institutions; and bank customers, depositors, and bank
officials associated with failed banks. FDIC systems also hold sensitive supervisory
data about the financial health of banks, bank resolution strategies, and resolution
activities. The FDIC must continue to strengthen its implementation of governance and
security controls around its IT systems to ensure that information is safeguarded
properly.

Preparing for Crises

Central to the FDIC’s mission is readiness to address crises in the banking system.
The FDIC must be prepared for a broad range of crises that could impact the banking
sector. These readiness activities should help to ensure the safety and soundness of
institutions, as well as the stability and integrity of our nation’s banking system.

Maturing Enterprise Risk Management

Enterprise Risk Management (ERM) is a critical part of an agency’s governance, as it
can inform prudent decisionmaking at an agency, including strategic planning, budget
formulation, and capital investment. ERM program requirements include identifying
risks that could affect the organization (Risk Profile and Inventory), establishing the
amount of risk an organization is willing to accept (Risk Appetite), prioritizing
strategies to address risks in the proper sequence, and responding to and mitigating
the risks. The FDIC established an ERM program office in 2011, but has neither developed
the underlying ERM program requirements nor realized the benefits of a mature ERM program.

Sharing Threat Information with Banks and Examiners

Federal Government agencies and private-sector entities share information about threats
to U.S. critical infrastructure sectors, including the financial sector. Sharing
actionable and relevant threat information among Federal and privatesector participants
protects the financial system by building threat awareness and allowing for informed
decision-making.The FDIC must ensure that relevant threat information is shared with its
supervised institutions and FDIC examiners as needed, in a timely manner, so that actions
can be taken to address the threats. Threat information also provides FDIC examiners with
context to evaluate banks’ processes for risk identification and mitigation strategies.

Managing Human Capital

The FDIC relies on skilled personnel to fulfill its mission, and 68 percent of the FDIC’s
operating budget for 2019 ($1.8 billion) was for salaries and associated benefits for
employees. Forty-two percent of FDIC employees are eligible to retire within 5 years, which
may lead to knowledge and leadership gaps. To ensure mission readiness, the FDIC should
find ways to manage this impending shortfall. In addition, the FDIC should seek to hire
individuals with the advanced technical skills needed for IT examinations and supervision
of large and complex banks.

Administering the Acquisitions Process

The FDIC relies heavily on contractors for support of its mission, especially for IT and
administrative support services. The average annual expenditure by the FDIC for contractor
services over the past 5 years has been approximately $587 million. The FDIC should maintain
effective controls to ensure proper oversight and management of such contracts and should
conduct regular reviews of contractors. In addition, the FDIC should also perform due
diligence to mitigate security risks associated with supply chains for goods and services.

Improving Measurement of Regulatory Costs and Benefits

Before issuing a rule, the FDIC should ensure that the benefits accrued from a regulation
justify the costs imposed. The FDIC should establish a sound mechanism to measure both costs
and benefits at the time of promulgation, and it should continue to evaluate the costs and
benefits of a regulation on a regular basis, even after it has been issued. Additional
information on these Challenges can be found in the full Top Management and Performance
Challenges report, available on our Website, www.fdicoig.gov. These Challenges align with
those facing the financial regulatory community as a whole, as discussed in the CIGFO report
entitled Top Management and Performance Challenges Facing Financial Regulators.

FDIC OIG Audits and Evaluations Made Significant Recommendations for
Improvements to the FDIC

During the 12-month period ending March 31, 2019, the FDIC OIG issued 14 audit, evaluation,
and other reports and made 53 recommendations to strengthen controls in FDIC programs and
operations. Our work covered diverse topics such as information security, processing of
consumer complaints, and the FDIC’s Forward-Looking Supervision program, among others.

The FDIC’s Forward-Looking Supervision Program

The goals of the FDIC’s Forward-Looking Supervision initiative are to identify and assess
risk before it impacts a financial institution’s financial condition and to ensure early
risk mitigation. Prior to the financial crisis of 2008-2011, examiners often identified weak
risk management practices at financial institutions, but they delayed taking supervisory
action until the institution’s financial performance declined. Forward-Looking Supervision
seeks to avoid this result.

Our evaluation objective was to determine whether the Forward- Looking Supervision
approach achieved its outcomes—the Division of Risk Management Supervision pursued
supervisory action upon identifying risks and the financial institutions implemented
corrective measures. Our review showed that examiners substantially achieved the
intended outcomes of the Forward-Looking Supervision approach for our sampled
institutions. Examiners applied Forward-Looking Supervision concepts during their
financial institution examinations, rated institutions based on risk,
and recommended corrective actions based on their risk assessments. Also, the
financial institutions committed to implement the corrective actions.

We found that:

• The FDIC did not have a comprehensive policy guidance document on Forward-Looking
Supervision and should clarify guidance associated with its purpose, goals, roles,
and responsibilities;

• Examiners typically documented their overall conclusions regarding the financial
institutions’ concentration risk management practices; however, they did not always
document certain Forward-Looking Supervision concepts in pre-examination planning
documents and when reporting examination results;

• Examiners typically reported or elevated identified overall concentration risk
management conclusions and concerns; however, a greater number of these concerns
should have appeared in the report section that includes issues requiring the
attention of the institution’s board; and

• Examiners generally identified concentration risk management concerns on a timely
basis; however, in certain instances, they identified concentration risk management
concerns that had not been identified during the prior examination cycle.

We made four recommendations to the FDIC to: (1) issue a comprehensive policy
guidance document defining Forward-Looking Supervision; (2) issue guidance to
reinforce how and where examiners should be documenting concentrations and an
institution’s concentration risk management practices in the Report of Examination;
(3) provide additional case studies on Forward-Looking Supervision to strengthen
training for examiners; and (4) conduct recurring retrospective reviews to ensure
examiners are documenting the concentration risk management analysis.

The full report is available on our Website, www.fdicoig.gov.

Federal Information Security Modernization Act (FISMA) Audit – 2018

We evaluated the effectiveness of the FDIC’s information security program and
practices. A strong information security program is needed for the protection of
sensitive information the FDIC collects in conducting is work, including sensitive
bank data and personal information of borrowers. The IG FISMA Reporting Metrics
require IGs to assess the effectiveness of their agencies’ information security
programs and practices on a maturity model spectrum. We found that the FDIC’s
overall information security program was operating at a Maturity Level 3
(Consistently Implemented) on a scale of 1 to 5, which is an improvement from
2017 but not considered effective under the metrics.

We found that the FDIC established a number of information security program
controls and practices that complied or were consistent with standards and
guidelines, and took steps to strengthen controls following the 2017 FISMA
report. However, ongoing security control weaknesses limited the effectiveness
of the FDIC’s information security program and practices and placed the
confidentiality, integrity, and availability of the FDIC’s information systems
and data at risk. In many cases, these security control weaknesses were
identified by other OIG audits or through security control assessments completed
by the FDIC. Although the FDIC was working to address these previously identified
control weaknesses, the FDIC had not yet completed corrective actions at the time
of the audit. Accordingly, the security control weaknesses continued to pose risk
to the FDIC. The highest risk weaknesses included:

• Information Security Risk Management. The FDIC had not fully defined or
implemented an enterprise-wide and integrated approach to identifying, assessing,
and addressing the full spectrum of internal and external risks, including those
related to cybersecurity and the operation of information systems. This limits
the ability of FDIC Divisions and Offices to make effective risk management
decisions, and prevents the FDIC from ensuring it is effectively prioritizing
resources toward addressing risks with the most significant potential impact on
achieving strategic objectives.

• Enterprise Security Architecture. Our 2017 FISMA audit noted that the FDIC had
not established an enterprise security architecture, which is considered a
fundamental component of an effective information security program and describes
the structure and behavior of an organization’s security processes, systems,
personnel, and subunits and shows their alignment with the organization’s mission
and strategic plans. In July 2018, the FDIC provided the OIG with documentation
describing its enterprise security architecture. The OIG is reviewing this
documentation, along with other information related to the enterprise security
architecture provided by the FDIC, to determine whether it is responsive to the
recommendation in our FISMA audit report issued in 2017. The lack of effective
enterprise security architecture increased the risk that the FDIC’s information
systems would be developed with inconsistent security controls that are costly to
maintain.

• Security Control Assessments. In separate OIG audit work, we identified instances
in which contractorperformed security control assessments did not include testing
of security control implementation, when warranted. Instead, assessors relied on
narrative descriptions of the controls in FDIC policies, procedures, and system
security plans and/or interviews of FDIC or contractor personnel. Without testing,
assessors did not have a basis for concluding on the effectiveness of security
controls. Inadequate FDIC oversight of security control assessments contributed to
this weakness. Because the FDIC relies on the results of the assessments
to support a number of important risk management activities, the FDIC must ensure
that personnel perform security control assessments at an appropriate level of
depth and coverage.

• Patch Management. The FDIC’s patch management processes were not always
effective in ensuring that the FDIC implemented patches within FDIC-defined
timeframes. Unpatched systems increase the risk of exposing the FDIC’s network
to a security incident.

• Backup and Recovery. Our 2017 FISMA report noted that the FDIC’s IT restoration
capabilities were limited and that the FDIC had not taken timely action to address
known limitations with respect to its ability to maintain or restore critical IT
systems and applications during a disaster. In December 2017, the FDIC’s Board of
Directors authorized a multi-year Backup Data Center Migration Project to ensure
that designated IT systems and applications supporting mission-essential functions
can be recovered within targeted timeframes. While the FDIC established governance
over this project, assurance that the FDIC can maintain and restore mission-
essential functions during an emergency within applicable timeframes will be
limited until the scheduled completion of the project in 2019.

We made four recommendations to improve the effectiveness of the FDIC’s information
security program controls and practices.

The publicly-releasable Executive Summary of this report is available on our Website,
www.fdicoig.gov.

Our ongoing audit and evaluation reviews are addressing the FDIC’s:

• Enterprise Risk Management Program;

• Cost-Benefit Analysis Process for Rulemaking;

• Anti-Sexual Harassment Program;

• Readiness for Crises;

• Contract Oversight Management Program; and

• Privacy Program.

These ongoing reviews are also listed on our Website, www.fdicoig.gov, and, when
completed, their results will be posted there.

FDIC OIG Special Inquiry Report Made Significant Recommendations Regarding Breach
Response, Reporting, and Interactions with Congress

In addition to the audit and evaluation reports listed above, the OIG issued a multi-
disciplinary Special Inquiry report in April 2018.

During late 2015 and early 2016, the FDIC experienced eight information security
incidents as departing employees improperly took sensitive information shortly before
leaving the FDIC. Seven of the eight incidents involved Personally Identifiable
Information (PII), including Social Security Numbers, and thus constituted breaches.
In the eighth incident, the departing employee took highly sensitive components of
resolution plans submitted by certain large systemically important financial
institutions without authorization.

In April and May 2016, the Committee on Science, Space, and Technology of the House
of Representatives (SST Committee) examined the FDIC’s handling of these incidents,
its data security policies, and reporting of the “major incidents.” As part of its
investigation, the SST Committee requested pertinent documents from the FDIC about the
incidents. The SST Committee held two hearings in May and July 2016 about the incidents
at the FDIC and issued an interim report on the matter. During the hearings and in its
interim report, as well in correspondence with the FDIC, the SST Committee expressed
concerns about the FDIC’s information security program, the accuracy of certain FDIC
statements, and the completeness of the FDIC’s document productions.

On June 28, 2016, the then-Chairman of the Senate Committee on Banking, Housing, and
Urban Affairs requested that our Office examine issues at the FDIC related to data
security, incident reporting, and policies, as well as the representations made by
FDIC officials.

The FDIC OIG conducted a Special Inquiry in response to that request. We examined the
circumstances surrounding the eight information security incidents. The FDIC initially
estimated that the incidents involved sensitive information that included the PII of
approximately 200,000 individual bank customers related to approximately 380 financial
institutions, as well as the proprietary and sensitive data of financial institutions.
Based on additional analysis, the FDIC later revised the number of affected individuals
to 121,633.

Our work revealed certain systemic weaknesses that hindered the FDIC’s ability to
handle multiple information security incidents and breaches efficiently and effectively;
contributed to untimely, inaccurate, and imprecise reporting of information to the
Congress; and led to document productions that did not fully comply with Congressional
document requests. We also identified shortcomings in the performance of certain
individuals in key leadership positions as they handled the incidents and related
activities.

Importantly, in its handling of the information security incidents, the FDIC did not
fully consider the range of impacts on bank customers whose information had been
compromised or consider customer notification as a separate decision from whether it
would provide credit monitoring services. As a result, the FDIC delayed notifying
consumers and thus precluded them from taking proactive steps to protect themselves.

Also of note, when reporting incidents to the Congress, the FDIC used broad
characterizations and referenced mitigating factors that were sometimes inaccurate and
imprecise, and tended to diminish the potential risks. Despite several opportunities
to clarify or correct the record regarding the nature of the incidents, the FDIC did
not provide the Congress with accurate and complete information about the incidents.

Finally, with regard to document production, the SST Committee had requested that the
FDIC produce relevant documents and information. The FDIC did not initially respond to
these requests in a complete manner and should have been clear in its communications
with the Committee as to its approach and progress in complying with the document
production requests. Later, the FDIC took steps to better identify and provide
responsive records.

Throughout and subsequent to our Special Inquiry, the FDIC took steps to address prior
recommendations pertaining to incident and breach response. In addition, we made 13
recommendations in this Special Inquiry report to address the systemic issues
associated with the FDIC’s incident response and reporting and interactions with the
Congress.

FDIC OIG Investigations Seek to Ensure Integrity in the Banking Sector

OIG investigations over the past months continued to complement our audit and
evaluation work. Our investigative results over the 12 months ending March 31, 2019,
included the following: 64 indictments; 35 arrests; 43 convictions; and potential
monetary recoveries (fines, restitution, and asset forfeitures) of over $354 million.

Our current cases involve fraud and other misconduct on the part of senior bank
officials, and include money laundering, embezzlement, bank fraud, and other
financial crimes. The perpetrators of such crimes can be those very individuals
entrusted with governance responsibilities at the institutions—directors and bank
officers. In other cases, parties providing professional services to the banks and
customers, others working inside the bank, and customers themselves are principals
in fraudulent schemes. The FDIC OIG also investigates significant matters of
wrongdoing and misconduct relating to FDIC employees and contractors.

Our Office is committed to partnerships with other OIGs, the Department of Justice
(DOJ), and other state and local law enforcement agencies in pursuing criminal acts
in open and closed banks and helping to deter fraud, waste, and abuse. The OIG also
actively participates in many financial fraud working groups nation-wide to keep
current with new threats and fraudulent schemes that can undermine the integrity of
the FDIC’s operations and the financial services industry as a whole.

The FDIC OIG’s Office of Investigations also continues to identify emerging financial
fraud schemes that affect FDICsupervised and insured institutions. Our relationships
with DOJ’s Money Laundering and Asset Recovery Section, and DOJ’s Fraud Section and
Anti-Trust Division, have allowed us to play a lead role in money laundering and
foreign currency exchange rate manipulation investigations. We also work with other
agencies, including the Small Business Administration, to identify fraud in the
guaranteed loan portfolios of FDIC-supervised institutions. These investigations
are important, as large-scale fraud schemes can significantly affect the financial
industry and the financial condition of FDIC-insured institutions.

Former Senior Employee at FDIC Convicted of Stealing Confidential Documents

On December 11, 2018, a former senior employee in the FDIC’s Office of Complex
Financial Institutions (OCFI) was convicted of two thefts of government property in
the possession of the FDIC. OCFI was created after passage of the Dodd-Frank Wall
Street Reform and Consumer Protection Act to oversee and conduct, if necessary, an
orderly bankruptcy of the world’s largest banks and financial institutions. Each of
these banks and financial institutions is required to file resolution plans, referred
to as “living wills,” with the FDIC. The plans contain confidential information
about the bank, including its assets, business operations, data center locations,
critical vendors, agreements with other banks, and potential weaknesses or other
deficiencies that pose risk during a time of financial crisis.

In August 2015, the then-FDIC employee used her office computer to review listings for
and apply for jobs with financial institutions that filed living wills with the FDIC.
On August 27, 2015, one day after being contacted about a possible position at one of
the banks, she logged on to a secure FDIC database and printed living will information
for that bank. On September 16, 2015, she resigned her position at the FDIC. A review
of FDIC Data Loss Prevention software revealed that on her last day of work, the then-
FDIC employee copied numerous electronic files from the FDIC network to external USB
drives, including living wills for U.S. banks where she had been seeking employment.

Former Bank President Sentenced to Prison and Ordered to Pay $137 Million

On December 14, 2018, the former president and CEO of The Bank of Union in El Reno,
Oklahoma, was sentenced to 4 years in federal prison followed by 2 years of supervised
release for making a false statement to the FDIC. He had previously pled guilty to this
charge in 2017. The sentence requires the former president to pay over $137 million in
restitution, over $97 million of which is owed to the FDIC.

State banking regulators closed The Bank of Union in 2014 because of the bank’s loan
losses, and the FDIC was appointed as receiver. According to a 2016 indictment, the
former president defrauded the bank in several ways: (1) by issuing loans with
insufficient collateral and falsifying financial statements for several high-dollar bank
borrowers; (2) by originating nominee loans to circumvent the bank’s legal lending limit;
(3) by concealing the bank’s true financial condition from the Board of Directors; (4)
by soliciting a fraudulent investment; and (5) by falsely representing the bank’s true
status to the FDIC.

Over a 4-year period, the former president conspired with borrowers by issuing them
millions of dollars in loans secured by collateral they did not have and issuing them new
loans to keep them off of overdraft reports. The former president misled the Board of
Directors by falsely stating the borrowers were paying down their loans. The former
president also defrauded a partial owner and investor in the bank by convincing him to
wire nearly $40 million. The former president falsely represented to the investor that
the bank was growing rapidly and performing well and that his investment would not be at
risk, despite knowing that the bank was on the brink of failure and needed an immediate
capital infusion.

Finally, the former president was charged with falsely representing the bank’s loan
status to the FDIC. Between September 2012 and September 2013, he continued to renew
certain unpaid loans by capitalizing unpaid interest. Pursuant to a 2013 FDIC examination,
he allegedly falsely represented that he had not renewed or extended any loans without
full collection of the interest due during that time period. He also falsely represented
in writing that the bank had total equity capital of more than $36 million in July 2013,
when he knew the bank’s equity capital was significantly less.

The partial owner who wired money for the bank’s benefit is due $40 million of the
restitution amount, and the remaining $97 million is due to the FDIC, which lost money
when it assumed the bank’s liabilities as receiver in January 2014.

South Florida Resident Convicted of $100 Million International Fraud Scheme that Led
to Collapse of One of Puerto Rico’s Largest Banks

On February 4, 2019, the former chairman and CEO of a pharmaceutical company was
convicted of eight counts of wire fraud affecting a financial institution after a three-
week trial in the Southern District of Florida. The former CEO’s scheme triggered a series
of events leading to the insolvency and collapse of Westernbank of Puerto Rico.
According to evidence presented at trial, from 2005 to 2007, the individual served as
chairman and CEO of Inyx, Inc., a publicly-traded multinational pharmaceutical
manufacturing company. Beginning in early 2005, the then-CEO caused Westernbank to enter
into a series of loan agreements in exchange for a security interest in Inyx’s assets.
Under the loan agreements, Westernbank agreed to advance money based on Inyx’s customer
invoices from “actual and bona fide” sales.

However, the then-CEO orchestrated a scheme to defraud Westernbank by causing numerous
Inyx employees to make tens of millions of dollars’ worth of fake customer invoices
purportedly payable by customers in the United Kingdom, Sweden, and elsewhere. The then-
CEO caused these invoices to be presented to Westernbank as valid invoices and made false
representations to Westernbank about purported repayments from lenders in order to lull
Westernbank into continuing to lend money to Inyx. He also fraudulently represented to
Westernbank executives that he had additional collateral, including purported mines in
Mexico and Canada worth hundreds of millions of dollars, to induce Westernbank to lend
additional funds.

The then-CEO caused Westernbank to lend approximately $142 million and diverted tens of
millions of dollars for his own personal benefit, including to buy a private jet, luxury
homes and cars, luxury hotel stays, and extravagant jewelry and clothing expenditures.

In or around June 2007, Westernbank declared the loan in default and ultimately suffered
losses exceeding $100 million. These losses later triggered a series of events leading to
Westernbank’s insolvency and ultimate collapse. At the time of its collapse, Westernbank
had approximately 1,500 employees and was one of the largest banks in Puerto Rico.

In addition, the then-CEO knowingly deposited a $3 million check at Mellon Bank from the
purported sale of his private jet. At the time of its deposit, he knew that the check was
worthless; he had actually agreed to sell his plane to a different buyer. After receiving
a provisional credit for the check from Mellon Bank, the then-CEO wired out all of the
provisional credit, including a $1 million wire to his personal account in Canada. Upon
Mellon Bank’s request to reverse this $1 million wire, he refused to do so, resulting in
at least a $1 million loss to Mellon Bank.

[Seal - Federal Housing Finance Agency]

Office of Inspector General

Federal Housing Finance Agency

Created by the Housing and Economic Recovery Act of 2008 (HERA), the Federal Housing
Finance Agency (FHFA or Agency) supervises and regulates (1) the Federal National
Mortgage Association (Fannie Mae) and the Federal Home Loan Mortgage Corporation (Freddie
Mac) (together, the Enterprises), (2) the Federal Home Loan Banks (FHLBanks) (collectively,
the regulated entities), and (3) the FHLBanks’ fiscal agent, the Office of Finance. Since
September 2008, FHFA has also served as conservator for the Enterprises. As of year-end
2018, the Enterprises collectively reported approximately $5.4 trillion in assets. The
FHLBanks collectively reported roughly $1.1 trillion in assets.

Also created by HERA, the FHFA Office of Inspector General (OIG) conducts, supervises, and
coordinates audits, evaluations, investigations, and other activities relating to the
programs and operations of FHFA. OIG promotes economy, efficiency, and effectiveness and
protects FHFA and the entities it regulates against fraud, waste, and abuse, contributing
to the liquidity and stability of the nation’s housing finance system. We accomplish this
mission by providing independent, relevant, timely, and transparent oversight of the Agency
to promote accountability, integrity, economy, and efficiency; advising the Director of the
Agency and Congress; informing the public; and engaging in robust enforcement efforts to
protect the interests of American taxpayers.

Background

FHFA serves as supervisor of the Enterprises and the FHLBanks, and as conservator of the
Enterprises. FHFA’s conservatorships of the Enterprises, now in their 11th year, are of
unprecedented scope, scale, and complexity. FHFA’s dual roles continue to present novel
challenges. Consequently, OIG must structure its oversight program to examine FHFA’s
exercise of its dual responsibilities, which differ significantly from the typical
federal financial regulator. Beginning in Fall 2014, OIG determined to focus its resources
on programs and operations that pose the greatest financial, governance, and/or
reputational risk to the Agency, the Enterprises, and the FHLBanks to best leverage its
resources to strengthen oversight.

Our annual Audit, Evaluation, and Compliance Plan describes FHFA’s and OIG’s roles and
missions, explains our riskbased methodology for developing this plan, provides insight
into particular risks within four areas, and generally discusses areas where we will focus
our audit, evaluation, and compliance resources. In addition to our risk-based work plan,
OIG completes work required to fulfill its statutory mandates.

An integral part of OIG’s oversight is to identify and assess FHFA’s top management and
performance challenges and to align our work with these challenges. On an annual basis,
we assess FHFA’s major management and performance challenges. In October 2018, we
identified four challenges (all of which carried over from prior years) and a
management concern. In our view, these are the most serious management and performance
challenges facing FHFA for the foreseeable future and, if not addressed, could adversely
affect FHFA’s accomplishment of its mission. (See OIG, Fiscal Year 2019 Management and
Performance Challenges (October 15, 2018)). During this reporting period, OIG continued
to focus much of its oversight activities on identifying vulnerabilities in these areas
and recommending positive, meaningful actions that the Agency could take to mitigate
these risks and remediate identified deficiencies.

These challenges and the management concern are:

Supervision of the Regulated Entities – Upgrade Supervision of the Enterprises and
Continue Robust Supervision of the FHLBanks

As supervisor of the Enterprises and the FHLBanks, FHFA is tasked by statute to ensure
that these entities operate safely and soundly so that they serve as a reliable source
of liquidity and funding for housing finance and community investment. Examinations of
its regulated entities are fundamental to FHFA’s supervisory mission. Within FHFA, the
Division of Federal Home Loan Bank Regulation (DBR) is responsible for supervision of
the FHLBanks, and the Division of Enterprise Regulation (DER) is responsible for
supervision of the Enterprises.

As a former FHFA Director observed, Fannie Mae and Freddie Mac would be Systemically
Important Financial Institutions (SIFIs), but for the conservatorships, and are subject
to the heightened supervision requirements for SIFIs, except that they are supervised
by FHFA, not the Federal Reserve. Because the asset size of the FHLBanks and Office of
Finance, together, is a fraction of the asset size of the Enterprises and because the
Enterprises are in conservatorship, we determined that the magnitude of risk is
significantly greater for the Enterprises. Since the Fall of 2014, the majority of our
work on supervision issues has focused on FHFA’s supervision of the Enterprises.

Based on our assessments of different elements of DER’s supervision program, over the
past few years, we identified four recurring themes, which were explained in a roll-up
report issued during FY 2017.4 Those themes are:

1. FHFA lacks adequate assurance that DER’s supervisory resources are devoted to
examining the highest risks of the Enterprises.

2. Many supervisory standards and guidance issued by FHFA and DER lack the rigor of
those issued by other federal financial regulators.

3. The flexible and less prescriptive nature of many requirements and guidance
promulgated by FHFA and DER has resulted in inconsistent supervisory practices.

4. Where clear requirements and guidance for specific elements of DER’s supervisory
program exist, DER examiners-in-charge and subordinate examiners have not consistently
followed them.

In that roll-up report, we cautioned that “[w]ithout prompt and robust Agency attention
to address the shortcomings we have identified,” the “safe and sound operation of the
Enterprises cannot be assumed from FHFA’s current supervisory program.” The findings
from subsequent audits, evaluations, and compliance reports regarding FHFA’s
supervision program for the Enterprises identified additional shortcomings. In light
of the observation that the Enterprises would be SIFIs, but for the conservatorships,
FHFA must make a heightened and sustained effort to improve its supervision of the
Enterprises.

We also looked at elements of FHFA’s supervision program for the FHLBanks. While our
reports of that work identified some shortcomings, they did not identify significant
weaknesses. Like any other federal financial regulator, FHFA faces challenges in
appropriately tailoring and keeping current its supervisory approach to the FHLBanks.

Conservatorship Operations – Improve Oversight of Matters Delegated to the Enterprises
and Strengthen Internal Review Processes for Non-Delegated Matters

As conservator of the Enterprises since September 2008, FHFA has expansive authority
to oversee and direct operations of two large, complex financial institutions that
dominate the secondary mortgage market and the mortgage securitization sector of the
U.S. housing finance industry. Under HERA, FHFA, as conservator, possesses all rights
and powers of any stockholder, officer, or director of the Enterprises and is vested
with express authority to operate the Enterprises and conduct their business
activities. Given the taxpayers’ enormous investment in the Enterprises, the unknown
duration of the conservatorships, the Enterprises’ critical role in the secondary
mortgage market, and their uncertain ability to sustain future profitability, FHFA’s
administration of the conservatorships remains a major risk.

Footnote: 4 See OIG, Safe and Sound Operation of the Enterprises Cannot Be Assumed
Because of Significant Shortcomings in FHFA’s Supervision Program for the Enterprises
(OIG-2017-003, Dec. 15, 2016). [End of footnote]

FHFA has delegated authority for many matters, both large and small, to the
Enterprises. FHFA, as conservator, can revoke delegated authority at any time (and
retains authority for certain significant decisions).

Since the Fall of 2014, OIG’s body of work has found that FHFA has limited its
oversight of delegated matters largely to attendance at Enterprise internal
management and board meetings as an observer and to discussions with Enterprise
managers and directors. Read together, our findings in these reports show that,
for the most part, FHFA, as conservator, has not assessed the reasonableness of
Enterprise actions pursuant to delegated authority, including actions taken by the
Enterprises to implement conservatorship directives, or the adequacy of director
oversight of management actions. FHFA also has not clearly defined the Agency’s
expectations of the Enterprises for delegated matters and has not established the
accountability standard that it expects the Enterprises to meet for such matters.
Our work has identified internal control systems at the Enterprises that fail to
provide directors with accurate, timely, and sufficient information to enable them
to exercise their oversight duties. Likewise, we have identified a lack of rigor
by some directors in seeking information from management about the matters for
which they are responsible. We have also identified instances in which corporate
governance decisions generally reserved to the board of directors
have been delegated to management.

As the Enterprises’ conservator, FHFA is ultimately responsible for actions taken
by the Enterprises, pursuant to authority it has delegated to them. FHFA’s
challenge, therefore, is to improve the quality of its oversight of matters it
has delegated to the Enterprises.

Generally, FHFA has retained authority (or has revoked previously delegated
authority) to resolve issues of significant monetary and/or reputational value.
FHFA has established written internal review and approval processes for non-
delegated matters, designed to provide a consistent approach for analyzing and
resolving such matters and for providing decision-makers with all relevant facts
and existing analyses. FHFA faces challenges in ensuring that its established
processes are followed.

Information Technology Security – Enhance Oversight of Cybersecurity at the
Regulated Entities and Ensure an Effective Information Security Program at FHFA

Cybersecurity, as defined by the National Institute of Standards and Technology
(NIST), is the process of protecting information by preventing, detecting, and
responding to attacks. In May 2017, President Trump issued an executive order to
strengthen the cybersecurity of federal networks and critical infrastructure.
The Financial Stability Oversight Council (FSOC) has identified cybersecurity
oversight as an emerging threat for increased regulatory attention. The Council
reported that cybersecurity-related incidents create significant operational
risk, impacting critical services in the financial system, and ultimately
affecting financial stability and economic health.

As cyberthreats and attacks at financial institutions increase in number and
sophistication, FHFA faces challenges in designing and implementing its
supervisory activities for the financial institutions it supervises. These
supervisory activities may be made increasingly difficult by FHFA’s continuing
need to attract and retain highly-qualified technical personnel, with expertise
and experience sufficient to handle rapid developments in technology.

Computer networks maintained by federal government agencies have proven to be a
tempting target for disgruntled employees, hackers, and other intruders. Over
the past few years, cyber attacks against federal agencies have increased in
frequency and severity. As cyber attacks continue to evolve and become more
sophisticated and harder to detect, they pose an ongoing challenge for virtually
every federal agency to fortify and safeguard its internal systems and operations.

As conservator of and supervisor for the Enterprises and supervisor for the
FHLBanks, FHFA collects and manages sensitive information, including personally
identifiable information (PII), that it must safeguard from unauthorized access
or disclosure. Equally important is the protection of its computer network
operations that are part of the nation’s critical financial infrastructure. FHFA,
like other federal agencies, faces challenges in enhancing its information
security programs, ensuring that its internal and external online collaborative
environments are restricted to those with a need to know, and ensuring that its
third-party providers meet information security program requirements.

Counterparties and Third Parties – Enhance Oversight of the Enterprises’
Relationships with Counterparties and Third Parties

The Enterprises rely heavily on counterparties and third parties for a wide array
of professional services, including mortgage origination and servicing. That
reliance exposes the Enterprises to counterparty risk, including the risk that
the counterparty will not meet its contractual obligations, and the risk that a
counterparty will engage in fraudulent conduct. FHFA has delegated to the
Enterprises the management of their relationships with counterparties and
reviews that management largely through its supervisory activities.

Our publicly reportable criminal investigations include inquiries into alleged
fraud by different types of counterparties, including real estate brokers and
agents, builders and developers, loan officers and mortgage brokers, and title
and escrow companies.

In light of the financial, governance, and reputational risks arising from the
Enterprises’ relationships with counterparties and third parties, FHFA is
challenged to effectively oversee the Enterprises’ management of risks related
to their counterparties.

Management Concern: Sustain and Strengthen Internal Controls Over Agency and
Enterprise Operations FHFA’s programs and operations are subject to legal and
policy requirements common to federal agencies. Satisfying such requirements
necessitates the development and implementation of, and compliance with,
effective internal controls within the Agency.

In January 2019, there was a leadership change with the appointment of an
acting FHFA Director, while the Senate considered the President’s nominee for
the next FHFA Director (who was subsequently confirmed and took office in April
2019). Key senior positions within FHFA have been filled on an acting capacity
for a long period of time (e.g., Chief Operating Officer and, until recently,
the Deputy Director of the Division of Conservatorship). Our work demonstrates
that FHFA is challenged to ensure that its existing controls, including its
written policies and procedures, are sufficiently robust, and its personnel are
adequately trained on these internal controls and comply fully with them.

Both Enterprises have also experienced significant leadership changes. For
example, in late March 2019, Fannie Mae appointed a new Chief Executive Officer
(CEO); that individual had been serving as Interim CEO with the departure of the
previous CEO in October 2018. In addition, Freddie Mac announced that its CEO
will retire with its current President to take over as CEO in July 2019. Among
other things, changes in leadership can lead to lack of attention to internal
controls.

Examples of OIG’s Oversight Accomplishments: Audit, Evaluation, and Compliance
Activities

Supervision of the Regulated Entities

FHFA’s Housing Finance Examiner Commissioning Program: $7.7 Million and Four
Years into the Program, the Agency has Fewer Commissioned Examiners
(COM-2018-006, issued September 6, 2018)

In 2011, FHFA acknowledged that the efficiency and effectiveness of its
examination program was impeded by the limited number of commissioned examiners
then in its employ, totaling 46. The Agency agreed to develop a Housing Finance
Examiner commission program (HFE Program) with the stated objectives of providing
examiners with “broadbased knowledge to conduct successful risk-based examinations”
and qualifying them “to lead the examination of a major risk area at Fannie Mae,
Freddie Mac, and the Federal Home Loan Banks.”

Previously, we issued four reports on FHFA’s efforts to increase the size of its
corps of commissioned examiners and two assessments of the HFE Program. During this
semiannual period, we conducted a study to assess whether the HFE Program had
increased the number of commissioned examiners on the FHFA staff and to determine
how FHFA deployed its commissioned examiners and reported our findings. We found
that the Agency has not achieved its goal of increasing the number of commissioned
examiners nor is it on track to do so. Since the Agency began awarding HFE
commissions in 2014, the total number of its commissioned examiners has decreased
from 59 (as of June 2014) to 58 (as of June 2018). Almost seven years after the
Agency committed to develop and implement a commissioning program and $7.7 million
later, the Agency’s examination program continues to be hindered by an insufficient
number of commissioned examiners.

We found the HFE Program suffers from a high non-completion rate. Of the 66
examiners who enrolled when the HFE Program first began in 2013, only 6 completed
the HFE Program and passed its final examination. By June 2018 more than half (36)
were no longer enrolled in the HFE Program. The remaining 24 continued to be enrolled
as of June 1, 2018, almost five years into the approximately four-year program, and
one-third (8) had completed less than 75% of the Program’s requirements after five
years. Since 2014, only 9 individuals have graduated from the HFE Program and
passed the final examination.

We also assessed the Agency’s deployment of its commissioned examiners. FHFA, in its
2013 Performance and Accountability Report, explained that the main objective of the
HFE Program was to produce commissioned examiners who are “qualified to lead”
examinations of major risk areas at the entities supervised by FHFA. However, that
objective has not been fulfilled in practice. DBR records reflect that, for each
of the last three supervisory cycles, commissioned examiners led roughly 75% of annual
DBR exams. DER records show that, for the 2016 and 2017 annual supervisory cycles, DER
initiated a total of 53 targeted examinations (defined by FHFA as “a deep or
comprehensive assessment” of areas of high importance or risk) and none of these 53
targeted exams was led by an HFE commissioned examiner.

Based on our prior reports and the fieldwork for our September 2018 report, we hold
the view that the multiple failures in FHFA’s administration of its HFE Program have
derailed efforts to produce the HFE commissioned examiners that the Agency claimed to
need. We questioned the $7.7 million in costs to develop, implement, and staff the HFE
Program in light of the failure of that Program to yield the anticipated results.

Conservatorship Operations

Special Report on the Common Securitization Platform: FHFA Lacked Transparency and
Exercised Inadequate Oversight Over a $2.13 Billion, Seven-Year Project (OIG-2019-005,
issued March 29, 2019)

In 2012, FHFA directed the Enterprises to build a Common Securitization Platform (CSP
or Platform) to replace their current separate “back-office” systems and to issue a
single mortgage-backed security (single security). As originally envisioned, the CSP
wasintended to facilitate issuance of mortgage-backed securities (MBS) by multiple
market participants in a future housing finance system. In May 2014, the then-FHFA
Director decided to limit the current scope of the Platform to working “for the
benefit of Fannie Mae and Freddie Mac” and committed to transparency in its
development.

The first phase of CSP development, Release 1, was rolled out in November 2016.
Release 1 allowed Freddie Mac to use the CSP to issue single-family fixed-rate MBS.
Under the second phase, Release 2, both Enterprises will use the CSP to issue the
new single security. Release 2 is now scheduled for completion by June 2019.

In December 2016, we reported that FHFA had not fully met its commitment to
transparency around the development of the CSP. We found that the Agency publicly
disclosed only the actual costs incurred to develop and test the CSP; represented
to Congress that, as of the first quarter of 2016, the actual and projected costs
to develop and test the CSP through 2018 totaled $696 million; and did not disclose
to Congress or the public what it knew about the Enterprises’ actual and projected
integration costs. We also found that FHFA had not publicly disclosed the risks to
successful development and implementation of the CSP.

During this reporting period, we conducted a review to determine whether (1) FHFA
honored its commitment to transparency about the CSP by disclosing updated
projections for the total cost (development and integration) of the CSP and its
internal assessment of the risks of this project after December 2016; and (2) FHFA
exercised adequate oversight of the CSP project. We found that: (1) FHFA was not
transparent; and (2) its oversight of the CSP project was inadequate.

FHFA issued a public update in March 2017, in which it projected a total of $1.12
billion in CSP development costs. However, FHFA did not disclose the projected
$955 million cost to integrate the Enterprises’ IT systems into the CSP. Because
it had conducted a thorough review of the program in late 2016, FHFA was aware
that the CSP development was “off track” with a significant risk of untimely
completion and additional costs. However, it disclosed no known issues or risks
in its March 2017 update. It announced that Release 1 had been implemented but
reported that Release 2 would be delayed by six months, until the second quarter
of 2019.

Since March 2017, FHFA has provided no further cost information in public updates.
Our review of internal FHFA documents found that, as of February 2019, FHFA
projected that Platform development costs and Enterprise integration costs through
Release 2 will total $2.13 billion by June 30, 2019. Although the Agency has
asserted that the Platform was developed using standard industry technology and
interfaces, it acknowledged to us that it has yet to develop plans, establish a
timetable, and determine the costs for use of the Platform by any third party.

FHFA’s Approval of Senior Executive Succession Planning at Freddie Mac Acted to
Circumvent the Congressionally Mandated Cap on CEO Compensation (EVL-2019-002,
issued March 26, 2019) and FHFA’s Approval of Senior Executive Succession
Planning at Fannie Mae Acted to Circumvent the Congressionally Mandated Cap on
CEO Compensation (EVL-2019-001, issued March 26, 2019)

During this reporting period, we issued two reports that evaluated FHFA oversight
of the Enterprises’ boards of directors’ succession planning efforts.

Under HERA, FHFA is empowered to operate the Enterprises “with all the powers of
the shareholders, the directors, and the officers” while the Enterprises remain in
conservatorship. FHFA delegated responsibility to the respective boards of
directors to develop a succession plan for the CEO and President positions and
select candidates for vacant CEO and President positions, and the selections are
subject to review by FHFA as conservator. According to FHFA, it has, as a
practical matter, chosen to approve such selections after review. FHFA has
retained the responsibility to
approve compensation actions for senior executive officers.

FHFA reported to us that the then-FHFA Director raised the need for succession
planning with the Fannie Mae Board Chair in 2018, following the CEO’s notice of
his likely departure. In June 2018, the Board Chair submitted the Board’s
written proposed transition plan for directors and senior executive leadership
(Board Transition Plan) to FHFA for approval. The Fannie Mae Board Transition
Plan represented that the statutory cap of $600,000 on compensation for
Enterprise CEOs imposed by the Equity in Government Compensation Act of 2015
created challenges to recruit internal and external qualified candidates for
the CEO position.

To address these challenges, the Board Transition Plan recommended a change to
Fannie Mae’s management structure by filling the positions of President and
CEO with separate individuals. (Since 2008, those positions had been held by
one individual.) Under the Fannie Mae Board Transition Plan, certain
responsibilities previously executed by the individual holding the CEO and
President positions would be assigned to the position of President. The Fannie
Mae Board proposed that the annual compensation for the President position
should be no less than Fannie Mae’s most highly compensated Fannie Mae officer,
which was then $3.25 million. The then-FHFA Director approved the Board
Transition Plan in July 2018.

We found that FHFA’s approval of the Fannie Mae Board Transition Plan acted to
circumvent the congressionally mandated cap of $600,000 on CEO compensation. By
authorizing Fannie Mae to fill the positions of CEO and President with two
separate individuals and transfer substantial responsibilities from the CEO and
President to the President position, FHFA permitted Fannie Mae to compensate its
President at a level more than five times greater than the statutory cap. After
the current President had served in the position for less than seven weeks, the
Board approved an 11% increase in the President’s target compensation, raising
it to $3.6 million per year, which FHFA approved in October 2018. Fannie Mae is
now compensating its interim CEO and President a total of $4.2 million to
execute the same responsibilities for which it had previously paid $600,000.

In addition, we found that the then-FHFA Director overrode internal controls
for processing, tracking, and monitoring requests for conservator approval, which
he was authorized to do, when he determined to review the Fannie Mae Board
Transition Plan directly, without any staff analysis or recommendation. The
decision by the then-FHFA Director to override established FHFA internal controls
for conservator review and approval of an Enterprise request created an
information vacuum within the Division of Conservatorship (DOC) and rendered
it unable to execute its responsibilities.

To address these shortcomings, we recommended that FHFA (1) re-assess the
appropriateness of the annual compensation award of $3.6 million to the Fannie
Mae President; and (2) establish a process for maintaining and monitoring
sensitive conservator requests in its tracking system. FHFA disagreed with
our first recommendation and agreed with our second recommendation.

In a companion report, we focused on FHFA oversight of the Freddie Mac Board
of Directors. FHFA reported that Freddie Mac’s CEO, who has served as CEO
since May 2012, advised the Freddie Mac Board that he intends to retire
during the second half of 2019. In May 2018, the Freddie Mac Board Chairman
provided the then-FHFA Director with a Board Transition Plan that included
recommendations to address this transition. The Freddie Mac Board Transition
Plan stated that the statutory cap on the compensation of Enterprise CEOs of
$600,000 created challenges to Freddie Mac’s ability to recruit qualified
external candidates and an external search could be disruptive to existing
internal leadership. The then-FHFA Director responded in writing to the Board
Transition Plan, advising the Freddie Mac Board that the plan “strikes us
as being very reasonable” and concurred with the Board’s request to forego
an external search. Over the following months, the Freddie Mac Board
Transition Plan was refined to include: designation of the senior executive
who would succeed the CEO after his retirement; creation of a “Deputy CEO”
position to be filled by this designated senior executive for one year;
mentorship of the Deputy CEO by the CEO until his retirement; and a
proposed compensation package for the Deputy CEO position at a level no
less than the highest paid executive who
reported to the CEO (then $3.25 million).

Acting upon a written staff recommendation, the then-FHFA Director approved
this executive compensation package

of $3.25 million for the Deputy CEO position on August 15, 2018. Despite
FHFA’s earlier response to Freddie Mac that the Board Transition Plan was
reasonable, FHFA notified Freddie Mac after August 15, 2018, that the
Enterprise would need to conduct an external search for a CEO and title the
new position “President,” rather than Deputy CEO. FHFA approved creation of
the position of President with the understanding that the individual in that
position would serve as the “understudy” to the CEO and execute only those
responsibilities previously executed by the CEO and now delegated to him over
a one-year period.

We found that FHFA’s approval of a $3.25 million compensation package for the
Deputy CEO position (which was never created) and subsequent approval of the
same compensation for the President position, acted to circumvent the
congressionally mandated cap of $600,000 on CEO compensation. As a result
of FHFA’s approval, Freddie Mac provided a total of $3.85 million in
compensation for the same set of CEO responsibilities for which it
previously paid $600,000. We recommended that FHFA re-assess the
appropriateness of the Freddie Mac President’s $3.25 million compensation.
FHFA disagreed with our recommendation.

Fannie Mae Purchased Single-Family Mortgages, Including those Purchased
through Master Agreements, in Accordance with Selected Credit Terms Set
Forth in its Selling Guide for 2015 – 2017 (AUD-2019-006, issued March 27,
2019)

Fannie Mae manages the quality of its mortgage purchases by requiring
mortgage sellers to comply with its Selling Guide. The Selling Guide sets
forth Fannie Mae’s underwriting standards and eligibility guidelines, as
well as its policies and procedures related to sales of single-family
mortgages to it. Fannie Mae’s underwriting standards are developed, in part,
based on risk-based criteria which enables it to evaluate a borrower’s
willingness and capacity to repay a mortgage and the value of the property
to ensure that it provides adequate collateral for the mortgage. Riskbased
criteria relating to a borrower’s willingness and capacity include the debt-
to-income (DTI) ratio, loan-to-value (LTV) ratio, and credit score while
collateral value is assessed through property valuation. None of these
criteria are considered in a vacuum but are considered together to build a
snapshot of the potential risk level of the mortgage.

Historically, many mortgage sellers sought to sell mortgages to Fannie Mae
that did not meet the underwriting standards and/or eligibility requirements
in the Selling Guide. Fannie Mae captured these negotiated terms, referred
to as variances, with its mortgage sellers in a document called a “master
agreement.” Each master agreement supplemented the general requirements of
the Selling Guide and set forth the additional negotiated terms under
which Fannie Mae agreed to purchase mortgages from the mortgage seller.

We completed an audit in which we sought to assess FHFA’s oversight of
Fannie Mae’s master agreements with its single-family mortgage sellers from
2015 through 2017 (review period). As part of the audit, we analyzed master
agreements for Fannie Mae’s top three single-family mortgage sellers and
found no variation between the terms in the master agreements for DTI ratio,
LTV ratio, credit score, and property valuation method from the terms for the
same element set forth in the Selling Guide.

We also obtained information from FHFA and Fannie Mae and analyzed loan-
level data in FHFA’s Mortgage Loan Integrated System (MLIS) for all single-
family mortgage sellers to determine whether the credit terms for DTI ratio,
LTV ratio, credit score, and property valuation methods for the mortgages
purchased by Fannie Mae differed from those credit terms in the governing
Selling Guide. For the single-family mortgages purchased by Fannie Mae
during the review period (nearly 6.46 million mortgages with a total unpaid
principal balance of $1.49 trillion), through our analysis, we identified
some differences with these credit terms, but those differences were not
material (less than one-tenth of one percent of the mortgages purchased by
Fannie Mae during the review period).

We did, however, identify issues with the reliability of certain data fields
in MLIS. Specifically, we found instances where data fields for our selected
credit terms were either missing information or were shown as “unknown.”
particularly with respect to the data field for property valuation method.
FHFA agreed with our recommendation to address this MLIS data field.

Information Technology Security

External Penetration Test of FHFA’s Network and Systems During 2018 (AUD-
2019- 003, issued February 11, 2019) To support our ongoing oversight of
FHFA’s  implementation of the Federal Information Security Modernization
Act of 2014 (FISMA), we completed an audit during this period to determine
whether FHFA’s security controls were effective to protect its network and
systems against external threats.

We found that FHFA’s security controls successfully prevented us from
gaining unauthorized access to its systems via the internet, wireless
access points, or phishing email. Through a vulnerability scan of the
Internet Protocol addresses registered to FHFA, we identified two medium
severity vulnerabilities related to an outdated encryption protocol
and web cookies; however, we were not able to exploit these vulnerabilities
to gain unauthorized access to FHFA’s systems. Upon receiving our
vulnerability scan reports, FHFA management reported that a plan was
underway  to replace systems with an outdated encryption protocol and FHFA
took action  to address the web cookie vulnerability.

We also performed a test that revealed FHFA employees were susceptible to
email phishing. FHFA agreed with our three recommendations to address these
matters.

Counterparties and Third Parties

FHFA Should Re-evaluate and Revise Fraud Reporting by the Enterprises to
Enhance its Utility (EVL-2018-004, issued September 24, 2018)

HERA requires the Enterprises to establish and maintain procedures designed
to discover and report instances of fraud and possible fraud. In 2010, FHFA
promulgated a regulation to implement HERA’s fraud reporting requirements.
This regulation requires each Enterprise to report to the FHFA Director
instances of fraud and possible fraud relating to the purchase or sale of
fraudulent loans or financial instruments. In addition, FHFA Advisory
Bulletin 2015-02, Enterprise Fraud Reporting, directs the Enterprises to
submit monthly and quarterly fraud status reports. FHFA provided standardized
templates for specifying the information the Enterprises should include in
their monthly and quarterly reports. Similarly, under the Bank Secrecy Act,
the Enterprises are required to report fraud and other suspicious activities
to the Financial Crimes Enforcement Network, a Treasury bureau.

FHFA is responsible for examining and monitoring the Enterprises’ fraud risk
management practices and overseeing the Enterprises’ compliance with FHFA
fraud reporting requirements. FHFA recognizes that timely fraud reporting to
the Agency is essential to maintain the Enterprises’ safe and sound condition.

We reviewed the applicable requirements and guidance governing the Enterprises’
obligations to detect and report fraud, the Enterprises’ fraud detection and
reporting practices, and FHFA’s use of the Enterprises’ fraud reports. We found
that FHFA does not make any documented, systematic use of the content of the
Enterprises’ fraud reports. FHFA advised us that it recently began to analyze
trends of the information in the Enterprises’ fraud reports. While FHFA has
considered using that information for risk analysis, it has not developed any
framework in which to assess that information.

Because Congress required the Enterprises to prepare fraud reports and FHFA has
directed them to submit detailed monthly and quarterly reports to meet this
statutory requirement, we recommended that FHFA re-evaluate the fraud
information  it requires from the Enterprises and revise, as appropriate, its
existing reporting requirements to enhance the utility of these reports with
the goal of using these reports to inform its supervisory activities with
respect to the risk that fraud poses to the Enterprises. FHFA agreed with our
recommendation.

Examples of OIG Investigative Accomplishments

OIG is vested with statutory law enforcement authority that is exercised by
its Office of Investigations (OI). OI conducts criminal and civil
investigations into those, whether inside or outside of government, who
waste, steal, or abuse in connection with the programs and operations of the
Agency and the regulated entities. OI is staffed with special agents (SAs),
investigative counsel, analysts, and attorney advisors who work in field
offices across the nation. OI has offices located within several federal
judicial districts that lead the nation in reported instances of mortgage
fraud: the Southern District of Florida; the Northern District of Illinois;
the District of New Jersey; and the Central District of California.

OI specializes in deterring and detecting fraud perpetrated against the
Enterprises. OI’s focus on fraud committed against the Enterprises is
essential to the well-being of the secondary mortgage market. Collectively,
Fannie Mae and Freddie Mac hold more than $5 trillion worth of mortgages on
their balance sheets. Each year the Enterprises acquire millions of
mortgages worth several hundreds of billions of dollars. The potential for
fraud in these circumstances is significant.

Civil Cases

OI continued to participate in residential mortgage backed securities (RMBS)
investigations and other civil investigations by working closely with U.S.
Attorneys’ offices to investigate allegations of fraud committed by financial
institutions and individuals.

The Royal Bank of Scotland Agrees to Pay $4.9 Billion for Financial Crisis-Era
Misconduct

In August 2018, the Department of Justice (DOJ) announced a $4.9 billion
settlement with The Royal Bank of Scotland Group plc (RBS Group) resolving
federal civil claims that RBS Group’s subsidiaries in the United States (RBS)
misled investors in the underwriting and issuing of RMBS between 2005 and 2008.
The penalty is the largest imposed by DOJ for financial crisis-era misconduct
at a single entity.

Using recordings of contemporaneous calls and emails of RBS executives, the
settlement includes a statement of facts alleged by DOJ (but not admitted or
agreed to by RBS) that details how RBS routinely made misrepresentations to
investors about significant risks it failed to disclose about its RMBS.

For example, RBS’s reviews of loans backing its RMBS (known as “due diligence”)
confirmed that loan originators had failed to follow their own underwriting
procedures, and that their procedures were ineffective at preventing risky
loans from being made. As a result, RBS routinely found that borrowers for the
loans in its RMBS did not have the ability to repay and that appraisals for the
properties guaranteeing the loans had materially inflated the property values
RBS’s RMBS contained, as its Chief Credit Officer put it, “total [expletive
deleted] garbage” loans with “random” and “rampant” fraud that was “all
disguised to, you know look okay kind of . . . in a data file.” RBS never
disclosed that these material risks both existed and increased the likelihood
that loans in its RMBS would default.

RBS’s due diligence practices did not remove fraudulent and high-risk loans
from its RMBS. In fact, RBS executives internally discussed how RBS’s due
diligence process was “just a bunch of [expletive deleted].”

To develop and maintain business relations with originators, RBS agreed to
limit the number of loans it could review (due diligence caps) and/or limit
the number of materially defective loans it could remove from an RMBS (kick-out
caps). As a result, RBS securitized tens of thousands of loans that it
determined or suspected were fraudulent or had material problems without
disclosing the nature of the loans to investors.

Through its scheme, RBS earned hundreds of millions of dollars, while
simultaneously ensuring that it received repayment of billions of dollars it
had lent to originators to fund the faulty loans underlying the RMBS. RBS used
RMBS to push the risk of the loans, and tens of billions of dollars in
subsequent losses, onto unsuspecting investors across the world, including non-
profits, retirement funds, and federally-insured financial institutions. As
losses mounted, and after many mortgage lenders who originated those loans had
gone out of business, RBS executives showed little regard for this misconduct
and made light of it. For example, after RBS’s Head Trader received an e-mail
from a friend stating “[I’m] sure your parents never imagine[d] they’d raise a
son who [would] destroy the housing market in the richest nation on the planet,”
the Head Trader answered, “I take exception to the word ‘destroy.’ I am more
comfortable with ‘severely damage.’”

According to OIG’s Associate Inspector General Jennifer Byrne: “The actions of
RBS resulted in significant losses to investors, including Fannie Mae and Freddie
Mac, which purchased the Residential Mortgage-Backed Securities backed by
defective loans.”

Criminal Cases

11 Individuals and 3 Businesses Charged in National Foreclosure Relief Scheme,
Ohio

In March 2019, 11 people from across the country and three businesses were
indicted for their roles in a scheme to defraud distressed homeowners by falsely
representing that they could help the victims save their homes.

According to the 26-count indictment, the co-conspirators took advantage of
homeowners’ desperation to save their homes and used money from homeowner victims
to personally enrich themselves. It is alleged that co-conspirators were involved
in a multilevel marketing scheme, which promised affiliates commissions by
recruiting distressed homeowners to companies they controlled, including MVP Home
Solutions, LLC, Bolden Pinnacle Group Corp., and Silverstein & Wolf Corp. They
used multiple ways to recruit affiliates, including conference calls and direct
mailings. For example, some co-conspirators hosted weekly conference calls where
participants from across the country dialed in to hear details of the scheme and
share sales strategies. During the calls, co-conspirators encouraged affiliates
to recruit homeowners to their companies on the promise of easy money.

Some co-conspirators also allegedly promoted, organized, and attended conferences
in which affiliates came to hear details of the scheme in person. For example,
some co-conspirators organized and participated in a national conference in
Columbus, Ohio, in April 2015 in which they provided “deep impact training” and
techniques for affiliates to convince homeowners to enroll in Bolden Pinnacle
Group Corp. and Silverstein & Wolf Corp. programs.

Affiliates were encouraged to be aggressive in recruiting homeowners. Affiliates
used online databases and court records to identify vulnerable, financially
distressed homeowners who had recently received notice of foreclosure on their
home.

According to the indictment, some co-conspirators mailed more than 22,000
postcards promising that they could “stop foreclosure” or “stop the sheriff sale”
for a fixed fee. Co-conspirators also reached out to homeowners using
Craigslist ads, websites, emails, and social media platforms.

On the promise of reducing or eliminating mortgage obligations in exchange for a
fee, initial recruiters would collect payments from homeowners and refer the
victims to the co-conspirator’s companies.

Among other things, the referral programs promised to negotiate with mortgage
lenders on the homeowners’ behalf for the purchase of the mortgage notes at a
discount, negotiate the sale of their home and release of their mortgage loans
through a short sale and/or deed in lieu of foreclosure sale, stop an imminent
foreclosure sale, remove the mortgage lien via a tender offer, and achieve
short sale prices at a fraction of the value of the outstanding lien/note.

Further, co-conspirators represented that they had “proprietary” methods or
“legal tactics” to help homeowners stall or completely avoid foreclosure. In
actuality, the indictment says co-conspirators persuaded homeowners to file
chapter 13 bankruptcies in order to delay foreclosure actions.

Co-conspirators allegedly filed skeletal bankruptcy petitions that they called
“pump fakes.” These petitions intentionally failed to disclose the
co-conspirators as preparers and named the homeowners as filing pro se. Any
relief from foreclosure delay was temporary until the bankruptcy court
dismissed the proceeding.

In 2014 alone, one co-conspirator allegedly prepared and filed petitions for
30 homeowners without their knowledge.

The Enterprises suffered losses because of this scheme.

Vice President of Real Estate Management Company and Managing Director of
Commercial Real Estate Financing Firm Pled Guilty in Multi-Million Dollar
Mortgage Fraud Scheme, New York

Between December 2018 and March 2019, Kevin Morgan and Patrick Ogiony were
charged by information and pled guilty to conspiracy to commit bank fraud.

According to court documents, Kevin Morgan and Ogiony, along with
co-defendants Todd Morgan, Frank Giacobbe, and others, conspired to defraud
financial institutions and the Enterprises. Kevin Morgan was employed as a
Vice President at Morgan Management, LLC, a real estate management company
that managed more than 200 multifamily properties. Todd Morgan also was
employed by Morgan Management as a Project Manager. Kevin and Todd Morgan
worked with Frank Giacobbe, who owned and operated Aurora Capital Advisors,
LLC, a mortgage brokerage company, and Patrick Ogiony, an Aurora employee,
to secure financing for properties managed by Morgan Management or certain
principals of Morgan Management.

Kevin Morgan, Ogiony, and others created and provided false information to
lenders, the Enterprises, and servicers, including reporting inflated
revenues and reduced expenses for the properties managed by Morgan
Management.
This resulted in the financial institutions issuing loans for larger
amounts than they would have authorized had they been provided with truthful
information.

The co-defendants misled the financial institutions regarding the occupancy of
properties. For example, Kevin Morgan and Ogiony conspired to provide false
rent rolls to lenders and appraisers on a variety of dates, overstating
either the number of renters in a property and/or the rent paid by occupants;
conspired to provide false and inflated income statements for the properties;
and worked with others to deceive inspectors into believing that unoccupied
apartments were, in fact, occupied.

In one such instance, Kevin Morgan, Ogiony, and others provided false
information to Berkadia Commercial Mortgage LLC and Freddie Mac, in connection
with Rochester Village Apartments at Park Place, a multi-family residential
community owned by certain Morgan Management principals. The false information
included inflated income derived from storage unit rentals, parking revenue,
and apartment leases. Additionally, during the construction phase, apartments
were reported to lenders as “occupied” prior to the issuance of the certificates
of occupancy. At another property, radon testing procedures were falsified to
secure financing.

In addition, Kevin Morgan, Ogiony, and others made misrepresentations to the
lending institutions to conceal the unauthorized use of loan proceeds by Morgan
Management and its principals. Loan funding was used to maintain or improve other
properties managed by Morgan Management, and to satisfy debts associated with
other properties managed by Morgan Management. For example, the defendants
included a fictitious $2.5 million debt in a loan application, purportedly owed
to a Morgan Management controlled entity and created a fabricated payoff letter
for that debt to increase the amount of the loan in connection with a property
known as Autumn Ridge.

Charges are pending against Giacobbe and Todd Morgan. The investigation revealed
fraud in at least 23 loans issued for over $500 million, secured by at least 21
different properties.

Loss calculations are ongoing. Some loans involved in this scheme were purchased
or securitized by the Enterprises.

Ex-Fannie Mae Employee Found Guilty and Fannie Mae Real Estate Owned (REO) Broker
Pled Guilty in Multi-Million Dollar Scheme Involving Property Listings and
Approval of Below-Market Sales, California

In February 2019, Shirene Hernandez was found guilty at trial on charges of wire
fraud and deprivation of honest services involving a scheme where she received
bribes and kickbacks from brokers in exchange for Fannie Mae real estate listings
and for approving the discounted sales of Fannie Mae-owned properties.

According to the evidence presented at a five-day trial, Hernandez was a sales
representative at Fannie Mae. As part of its operations, Fannie Mae acquires
properties through foreclosures and other methods, and then it manages and
sells those properties for Fannie Mae’s benefit. Since at least 2012, Fannie
Mae’s profits have gone to the U.S. Treasury
for the benefit of U.S. taxpayers.

As a sales representative, Hernandez assigned Fannie Mae-owned properties to
real estate brokers and approved sales of the properties based on offers the
brokers submitted. In violation of Fannie Mae rules and federal law, Hernandez
approved sales of Fannie Mae-owned properties at discounted prices to herself
and to the brokers who paid her kickbacks. She also received bribes – mostly
in cash payments – in return for listing opportunities and commissions that
brokers earned on real estate sales.

Hernandez also assigned listings to family members who earned nearly $2 million
in commissions in less than three years. Other brokers who paid kickbacks
earned millions more. For her part in the scheme, Hernandez received more than
$1 million in benefits, including the cash kickbacks that she received, and the
value of a property that she obtained with kickback money.

As part of the scheme, Hernandez purchased a Fannie Mae-owned property in
Sonoma, California, that she was responsible for selling, and she rejected higher,
market-priced offers in favor of her own below-market price. Hernandez purchased
the Sonoma property through intermediaries and affiliates that she controlled,
selling it first to a company affiliated with a broker who was bribing her, then
directing the broker to transfer the property to her sister-in-law, who paid for
the property with a duffel bag filled with $286,450 in cash from Hernandez – far
below the market price. The Sonoma property was rented out and Hernandez received
the rent proceeds.

In a related case, in January 2019, Peter Michno, a broker, was charged and pled
guilty to conspiracy to commit wire fraud involving deprivation of honest services
for his role in this scheme.

According to the plea agreement, Michno was a Fannie Mae-approved REO broker
entitled to receive a commission from the sale of REO properties as compensation
for his services. Michno was not authorized to purchase Fannie Mae REO properties
for himself or for his friends, relatives, and associates or permitted to pay
referral fees, bribes, or kickbacks to Fannie Mae employees.

Michno paid co-conspirators, employed by Fannie Mae, cash bribes and kickbacks in
exchange for the assignment of listings and the approval of below-market sales of
Fannie Mae REO properties to him and his affiliates. Michno then transferred some
of these properties to his co-conspirators as a kickback for the performance of
their official duties.

Former Business Owner Convicted in Federal Court for Over $49 Million Bank Fraud,
Maryland

In August 2018, Mark Gaver was convicted by a federal jury on charges of bank
fraud and money laundering arising from a scheme in which he obtained over $49
million in bank financing for his company Gaver Technologies, Inc. (GTI), using
false and fraudulent financial statements, balance sheets, and certifications of
outstanding accounts receivable.

According to the evidence presented at his seven-day trial, Gaver formed GTI, an
information technology company based in Frederick, Maryland. Gaver submitted
materially false financial documents to Santander Bank, a federally insured bank,
including fraudulent audit reports and contract status reports, to establish and
obtain successive increases in the line of credit from the lender for GTI. Based
upon the false documentation submitted by Gaver, the lender ultimately extended
$50 million in financing to GTI.

The evidence showed that some of the funds obtained from the lender were used by
Gaver to cover regular business expenses and thereby keep GTI open, but Gaver also
diverted half of the loan proceeds—approximately $15 million—to his own personal
use. For example, Gaver used loan proceeds to pay rental fees of private planes that
he used for non-business purposes, as well as to pay for personal pleasure trips to
France, Germany, Mexico, Jamaica, and the Bahamas. Gaver also used the funds to
purchase vacation homes, including a 4,000-square foot condominium with a view of
the Gulf of Mexico in Bonita Springs, Florida, a 2012 Maserati Gran Turismo, a 2011
Mercedes Benz SL Roadster, and a private membership at an exclusive golf club.

Gaver obtained a home equity line of credit that was pledged to the FHLBank of
Pittsburgh. The estimated loss to Santander, a member bank of the FHLBank of
Pittsburgh, is $49 million.

In December 2018, Gaver was sentenced to 17 years in prison, 3 years of supervised
release, and ordered to pay $48,774,308 in restitution and $49,215,606 in forfeiture.

[Seal - Office of Inspector General, U.S. Department of Housing and Urban Development]

Office of Inspector General

U.S. Department of Housing and Urban Development

The HUD OIG conducts independent audits, evaluations, investigations, and other reviews
of HUD operations and programs to promote economy, efficiency, and effectiveness, and
protect HUD and its component entities from fraud, waste, and abuse.

Background

While organizationally located within HUD, the OIG operates independently with separate
budget authority. Its
independence allows for clear and objective reporting to HUD’s Secretary and Congress.
HUD’s mission is to create strong, sustainable, inclusive communities and quality
affordable homes for all. HUD is working to strengthen the housing market to bolster
the economy and protect consumers, meet the need for quality affordable rental homes,
and use housing as a platform for improving quality of life. Its programs are funded
through more than $50 billion in
annual congressional appropriations.

Within HUD are two entities that have major impact on the Nation’s financial system:
the Federal Housing Administration (FHA) and Government National Mortgage Association
(Ginnie Mae). FHA provides mortgage insurance for single-family homes, multifamily
properties, nursing homes, and hospitals. FHA is the largest insurer of mortgages in
the world, having insured more than 47.5 million loans since its inception in 1934.
FHA mortgage insurance provides lenders with protection against losses as the result
of homeowners defaulting on their mortgage loans. In fiscal year 2018, FHA generated
more than $1.3 trillion in insured loans. FHA receives limited congressional
funding and is primarily self-funded through mortgage insurance premiums.

Ginnie Mae is a self-financing, wholly owned U.S. Government corporation within HUD.
It is focused on providing investors a guarantee backed by the full faith and credit
of the United States for the timely payment of principal and interest on mortgage-
backed securities (MBS) secured by pools of government home loans, which are insured
or guaranteed by FHA, HUD’s Office of Public and Indian Housing, the U.S. Department
of Veterans Affairs (VA), and the U.S. Department of Agriculture (USDA). The
purchasing, packaging, and reselling of mortgages in a security form frees
up funds that lenders use to provide more loans.

Ginnie Mae has an outstanding portfolio of MBS securities valued at more than $2
trillion. A majority of the MBS securities consist of FHA-insured mortgages. Ginnie
Mae offers the only MBS securities carrying the full faith and credit guaranty of the
U.S. Government, which means that its investors are guaranteed payment of principal
and interest in full and on time. If an issuer of MBS securities fails to make the
required pass-through payment of principal and interest to investors, Ginnie Mae is
required to assume responsibility for it by defaulting the issuer and assuming
control of the issuer’s MBS securities pools and the servicing of the loans in those
pools.

HUD’s Top Management Challenges

OIG continually looks for ways to meet the needs of HUD’s beneficiaries and to
protect taxpayer dollars. OIG’s oversight efforts focus on identifying and addressing
HUD’s most serious management challenges, several of which relate to financial
oversight:

• Ensuring the Availability of Affordable Housing that is Decent, Safe, Sanitary, and
in Good Repair

• Protecting the FHA Mortgage Insurance Fund

• Administering Disaster Recovery Assistance

• Instituting Sound Financial Management

Identifying these challenges helps HUD and Congress mitigate the primary risks that
hinder HUD in meeting its mission and being able to put taxpayer dollars to the best
use. OIG uses these challenges to target its oversight efforts, as demonstrated in the
following summaries.

Ensuring the Availability of Affordable Housing that is Decent, Safe, Sanitary, and in
Good Repair

Part of HUD’s mission is to create quality, affordable homes for all. The housing that
HUD insures and funds must be decent, safe, sanitary, and in good repair. Economic and
demographic factors, as well as aging housing stock, have created an extreme shortage of
housing that is affordable and safe. HUD’s challenge is to adapt existing programs to
address ever-increasing housing pressures on the Nation’s lowest income residents.

One of HUD’s financial strategies to address affordable housing is to encourage public
housing agencies (PHAs) to transition public housing units to a private-public partnership
model. HUD developed its Rental Assistance Demonstration Program (RAD) to give PHAs a tool
to preserve and improve public housing properties and address the $26 billion nationwide
backlog of deferred maintenance. For fiscal year 2018, Congress increased to 455,000 the
number of public housing units that may participate in RAD. OIG audited a number of PHAs
in fiscal year 2018 to assess their conversion to the RAD program, and is continuing to
conduct PHA RAD audits nationwide in fiscal year 2019. For example:

The Housing Authority of the City of Evansville, IN, Did Not Follow HUD’s and Its Own
Requirements for Units Converted Under the Rental Assistance Demonstration

The Authority of the City of Evansville, IN, did not follow HUD’s and its own requirements
for the units converted under RAD. Specifically, it (1) did not ensure that units complied
with HUD’s housing quality standards before it entered into a housing assistance payments
contract, (2) failed to obtain the services of a HUD-approved independent third party to
perform housing quality standards inspections for units owned by entities it substantially
controlled, and (3) did not apply the correct contract rents for the converted units. As a
result, the Authority could not support the eligibility of more than $1 million in housing
assistance payments to the entities and more than $10,000 in program funds paid to a
contractor for housing quality standards inspection services. Further, the application of
incorrect rents led to the underpayment of housing assistance to the entities, so these
funds were not available for the administration of the Authority’s Project-Based Voucher
Program. OIG made multiple recommendations to correct the identified deficiencies. (Audit
Report: 2018-CH-1003)

Protecting the FHA Mortgage Insurance Fund

HUD is challenged in protecting the FHA mortgage insurance fund, which insures approximately
25 percent of all mortgages in the United States. Through the Mutual Mortgage Insurance
(MMI) fund,5 FHA insures participating lenders against losses when borrowers default on
loans, which allows lenders to make loans to higher risk borrowers. From April 2017 through
March 2018, the MMI fund paid out almost $14 billion in reimbursements for defaulted
loans. For those claims for which the lender conveyed the property to HUD and HUD resold the
property, HUD recovered only about 54 percent of the funds paid out.

Without sufficient controls, oversight, and effective rules, FHA’s MMI fund is at risk of
unnecessary losses. Further, if insurance fees collected from borrowers cannot support the
fund, additional funding from the U.S. Department of the Treasury is required, as authorized
for Federal credit programs.

In protecting the FHA and Ginnie Mae programs, HUD is confronted with

• a lack of sufficient safeguards in FHA’s mortgage insurance program,

• large losses to the insurance fund due to home equity conversion mortgages,

• an increase in Ginnie Mae’s nonbank issuers, and

• potential emerging risks related to a market shift toward an entirely digital mortgage
life cycle.

For more than a decade, OIG has reported the need for more safeguards to protect the FHA
insurance program, and fiscal year 2018 was no exception. For example:

FHA Insured $1.9 Billion in Loans to Borrowers Barred by Federal Requirements
OIG audited FHA insured loans from calendar year 2016 to determine whether FHA insured
loans to borrowers with delinquent Federal debt or who were subject to Federal
administrative offset for delinquent child support.

FHA insured an estimated 9,507 loans, worth more than $1.9 billion, which were not
eligible for insurance because they were made to borrowers with delinquent Federal debt
or who were subject to Federal administrative offset for delinquent child support. OIG
recommended that FHA put more than $1.9 billion to better use by developing a method for
using the U.S. Treasury Do Not Pay portal to identify delinquent Federal debt and
delinquent child support to prevent future FHA insured loans to ineligible borrowers.
(Audit Report: 2018-KC-0001)

HUD Paid an Estimated $413 Million for Unnecessary Preforeclosure Claim Interest and
Other Costs Due to Lender Servicing
Delays

OIG audited FHA’s preforeclosure sale claim process to determine the amount of
unnecessary

preforeclosure claim

interest and other costs that resulted from lender noncompliance with HUD’s loan-
servicing timeframe requirements. HUD paid more than $413 million in unnecessary interest
and other costs for 27,634 preforeclosure claims because lenders failed to complete
servicing actions for defaulted loans within established timeframes. Although the
unnecessary amounts were caused by lenders’ inaction, HUD reimbursed lenders for these
added costs through FHA insurance claims. As a result, the FHA insurance fund incurred
unnecessary and unreasonable costs, and fewer funds were available to pay other claims
or apply toward reducing FHA borrower mortgage insurance premiums. OIG recommended that
HUD implement a change to regulations at 24 CFR (Code of Federal Regulations) Part 203 to
require curtailment of preforeclosure interest and other costs caused by lender servicing
delays, resulting in more than $413 million in funds to be put to better use. (Audit
Report: 2018-LA-0007)

Footnote: 5 The MMI fund is a Federal fund that insures mortgages guaranteed by FHA. The
MMI fund supports both FHA mortgages used to buy homes and reverse mortgages used by
seniors to extract equity from their homes. [End of footnote]

HUD Failed to Enforce the Terms of a Settlement Agreement With Fifth Third Bank Because It
Did Not Record Indemnified Loans in Its Tracking System

OIG worked with HUD to resolve outstanding matters related to two September 2015 agreements
with Fifth Third Bank (FTB) and its principal subsidiary, Fifth Third Bancorp, a bank holding
company. HUD had failed to properly record required indemnifications in its FHA Connection
system; therefore, it did not hold FTB accountable to the terms of the settlement agreements.
OIG recommended that HUD require FTB to reimburse HUD nearly $312,000 for two loans, for which
HUD incurred losses when it sold the properties, and 15 loans for which FHA insurance had been
terminated and HUD had paid loss mitigation claims to FTB. OIG also recommended that HUD record
in FHA Connection the remaining indemnified loans, avoiding more than $47 million in estimated
losses, and that HUD develop and implement controls to ensure that indemnification agreements
that result from legal settlements have been properly recorded in FHA Connection. Finally, OIG
recommended that HUD take appropriate administrative action against FTB for violations of the
settlement agreement. (Memorandum: 2018-CF-0802)

OIG also conducted a civil fraud review of a professional services firm that provides auditing
services to clients throughout the United States.

Deloitte & Touche, LLP, Settled Allegations That It Failed To Conduct Taylor, Bean & Whitaker
Mortgage Corporation’s Audits in Conformance With Generally Accepted Auditing Standards

OIG and the U.S. Attorney’s Office conducted a civil fraud review of Deloitte & Touche, LLP,
a professional services firm that provides auditing services to clients throughout the United
States. Deloitte provided auditing services to its client, Taylor, Bean & Whitaker Mortgage
Corporation (TBW). TBW was an FHA-approved direct endorsement lender and as such, was required
to submit to HUD annual audited financial statements to maintain its status as a direct
endorsement lender. Deloitte served as TBW’s independent outside auditor and submitted audit
reports on TBW’s financial statements for its fiscal years ending April 30, 2002, through
April 30, 2008. Deloitte stated in its reports that it had conducted its audits of TBW in
accordance with generally accepted auditing standards.

Deloitte & Touche, LLP, entered into a settlement agreement with the Federal Government,
agreeing to pay $149.5 million, of which $115 million was to be paid to HUD. Deloitte denied
but settled allegations of alleged conduct in connection with its role as TBW’s independent
outside auditor for fiscal years that ended April 30, 2002, through April 30, 2008. The
settlement agreement was neither an admission of liability by Deloitte nor a concession by
the United States that its claims were not well founded. (Memorandum: 2018-FO-1802)

OIG has several planned and ongoing audits focused on protecting the FHA mortgage insurance
fund. For example, one ongoing audit has the objective of determining whether FHA insured
loans made to borrowers that were ineligible due to delinquent Federal tax debt. OIG expects
to issue this report in fiscal year 2019. Another audit that recently began focuses on whether
FHA insured loans that did not meet the underwriting requirements for special flood hazard
areas. OIG expects to issue this report in fiscal year 2020.

In addition, OIG continues to pursue resolution to concerns reported in previous years. OIG
reported one of its highest concerns in October 2016, which was that OIG projected that HUD
paid claims for nearly 239,000 properties that servicers did not foreclose upon or convey on
time. As a result, HUD paid an estimated $2.23 billion in unreasonable and unnecessary holding
costs over a 5-year period. These excessive costs were allowed to occur because HUD regulations
do not establish a maximum period for filing a claim and do not place limitations on holding
costs when servicers do not meet all deadlines. OIG recommended HUD make regulatory changes to
establish a maximum claim filing period and sufficient limitation on holding costs after
services missed deadlines. To date, HUD has not completed the regulatory changes and our
recommendation remains open. These significant, excessive costs will continue to negatively
affect the MMI fund until the regulatory changes are completed.

OIG also fears continued large losses to the FHA insurance fund due to home equity conversion
mortgages (HECM). HECM is a reverse mortgage program that enables eligible homeowners age 62
and older to borrow funds using the equity in their homes. FHA’s fiscal years 2015 through
2018 annual reports on the status of the MMI fund showed an overall trend of large
fluctuations in the value of the HECM portfolio and consistently negative net cash flows
ranging from negative $1.6 billion to negative $4.5 billion. In total, the HECM program
consumed $13 billion in MMI fund assets and $7 billion in General Insurance fund6 assets over
the 4-year period of fiscal years 2015 through 2018.

OIG is currently conducting an audit with an objective to determine whether HUD designed the
HECM program to control the risk of loss related to assignment claims and ensure program
viability. Our subobjectives are to (1) identify the full cost of the HECM program and
determine whether HUD reported that cost, (2) identify inherent program risks
and existing or potential controls to mitigate risks and control costs, and (3) determine
whether the HECM program can function as a stand-alone program without a Federal subsidy.
OIG expects to issue this report in fiscal year 2019.

HUD is also challenged by the significant increase in the number of nonbanks issuing MBS
pools that Ginnie Mae guarantees. In fiscal year 2018, nonbank issuers accounted for 78
percent of Ginnie Mae’s single-family MBS issuance volume for the year, up from 51 percent
in June 2014 and from 18 percent in fiscal year 2010. As OIG and Ginnie Mae have reported,
the increase in the number of nonbank issuers and their complexity continues to present an
unmitigated challenge for monitoring efforts. As Ginnie Mae wrote in its 2018 Annual Report,
“[a]s more non-banks issue Ginnie Mae’s securities, the cost and complexity of monitoring
increases as the majority of these institutions involve more third parties in their
transactions, making oversight more complicated. In contrast to traditional bank issuers,
non-banks rely more on credit lines, securitization involving multiple players, and more
frequent trading of [mortgage servicing rights].”

In addition, the mortgage industry is moving toward an entirely electronic loan process.
FHA and Ginnie Mae intend to do the same. However, HUD, particularly FHA, has well-known
technology challenges. Risks include information security, data transfers and platform
integration, and system functionality, all of which could lead to fraudulent activities.

OIG continues to have concerns that an increase in demand on the FHA and VA programs will
have collateral implications for the integrity of the Ginnie Mae MBS program, including
the potential for increased fraud. Of particular concern is VA loan churning, in which
lenders encourage veterans to repeatedly refinance their loans, which can result in the
borrower incurring ever increasing fees on their loan. If the fees get too high, the
veteran could lose his or her home. The churning produces profits for the lenders at the
expense of the veterans, which means that lenders, at times, use deceptive practices to
encourage repeated refinances. Since September 2017, the Ginnie Mae – VA Loan Churn Task
Force has been working to address these concerns. Ginnie Mae has notified issuers that
are outliers among market participants to develop corrective action plans. The action
plans are aimed to prevent a few bad actors from raising the cost of homeownership for
millions of Americans. A Ginnie Mae executive said “We expect issuers receiving these
notices to respond quickly, produce a corrective action plan and come into compliance
with our program.”

OIG also helps protect the FHA insurance fund by conducting investigations of alleged
fraud against the fund, and securing recoveries to the fund. OIG completed 126 single-
family investigations of fraud against the FHA insurance fund in fiscal year 2018.
A majority of the investigations focused on loan origination fraud, for both forward and
reverse mortgages. Recoveries from these cases totaled nearly $500 million. For example:

• The co-owner of a mortgage company was sentenced in U.S. District Court in connection
with a guilty plea to 24 counts of wire fraud, 6 counts of bank fraud, and 3 counts of
filing a false tax return. The defendant was sentenced to 60 months incarceration,
followed by 5 years of probation, and ordered to pay $12.7 million in restitution. The
co-owner and three other defendants defrauded numerous lenders into purchasing
refinanced FHA and refinanced conventional mortgages that the mortgage company originated,
for which the first mortgages were not paid off at the time of closing. The defendants
used the closing escrow funds for their personal benefit. OIG, the U.S. Attorney’s Office,
the Federal Bureau of Investigation (FBI), and the Internal Revenue Service Criminal
Investigation division conducted the investigation.

Footnote: 6 The General Insurance fund (GI) provides a large number of specialized
mortgage insurance activities, including insurance of loans for property improvements,
cooperatives, condominiums, housing for the elderly, land development, group practice
medical facilities, nonprofit hospitals, and reverse mortgages. To comply with the FHA
Modernization Act of 2008, activities related to most single-family programs, including
HECM, endorsed in fiscal year 2009 and going forward, are in the MMI fund. The single-
family activities in the GI fund from fiscal year 2008 and prior remain in the GI fund.
[End of footnote]

• A former accountant for a Ginnie Mae-approved loan servicing company was sentenced in
U.S. District Court in connection with a guilty plea to an Information charging the
defendant with reporting false transactions to HUD. The Court sentenced the former
accountant to one year of supervised release and ordered her to pay HUD more than $108,000
in restitution. Over a period of about 18 months, the defendant helped the former owner of
the loan servicing company divert millions of dollars in mortgage payments to an account
that the former owner used for other business and personal expenses. The payments should
have been made to Ginnie Mae investors. The former accountant and former company owner
then falsely reported to Ginnie Mae that the defrauded borrowers had not made those
mortgage payments. Given the shortfall in payments to investors, as well as tax and
insurance payments that were supposed to have been escrowed for borrowers but were not,
Ginnie Mae was forced to reimburse investors and borrowers, resulting in an approximate
$2.8 million loss to HUD. OIG, the U.S. Attorney’s Office, the USDA OIG, the VA OIG, and
the FBI conducted this investigation.

Administering Disaster Recovery Assistance

HUD has taken on significant leadership responsibilities in the area of disaster recovery
assistance. Congress has appropriated more than $84 billion in supplemental funding to HUD
for disaster recovery since 2001. This amount includes $35.8 billion appropriated by
Congress in supplemental appropriations to HUD in 2017 and 2018 for recovery from Hurricanes
Harvey in Texas; Irma in Florida, Georgia, South Carolina, and the U.S. Virgin Islands; Maria
in Puerto Rico and the Virgin Islands; and Nate in Mississippi. These disasters resulted in
the loss of many human lives and massive property destruction. Further, as the Federal
Emergency Management Agency noted, economic recovery is a critical and integral part of
disaster recovery. Disasters not only damage property, but also entire markets for goods and
services. Considerable Federal funds are contributed to State, local, and Tribal economic
recovery as well as to other areas of recovery that necessarily strengthen the economy.

The nature of disaster recovery is inherently risky and susceptible to fraud, given the
complexity and range of challenges experienced when recovering from disasters. Disaster
recovery appropriation funds may take decades to spend, as their purpose is for long-term
recovery, which includes rebuilding homes and communities. HUD awards grants to States and
units of local government for disaster recovery efforts. Over the years, HUD has gained more
experience and made progress in assisting communities recovering from disasters, but it
continues to face these challenges in administering and overseeing these grants:

• codifying the Community Development Block Grant - Disaster Recovery (CDBG-DR) program,

• ensuring that expenditures are eligible and supported,

• ensuring and certifying that grantees are following Federal procurement regulations,

• addressing concerns that citizens encounter when seeking disaster recovery assistance, and

• preventing fraud in disaster recovery assistance.

OIG reported on these areas in recent years, including fiscal year 2018. For example:
HUD’s Office of Block Grant Assistance Had Not Codified the Community Development Block Grant
Disaster Recovery Program OIG audited HUD’s disaster recovery program to determine whether HUD
should codify the CDBG-DR funding as a program in the CFR. Although HUD had managed billions
in CDBG-DR funds since 2002, it has not codified the program because it believed it did not
have the authority under the Robert T. Stafford Disaster Relief and Emergency Assistance Act
and had not determined whether it had the authority under the Housing and Community

Development Act of 1974, as amended. It also believed a Presidential Executive order presented
a barrier to codification, as it required HUD to identify two rules to eliminate before
creating a new codified rule. OIG believes HUD has the authority under the Housing Act of 1974
and it should codify the program. HUD’s use of multiple Federal Register notices to operate the
CDBG-DR program presented challenges to the grantees. For example, 59 grantees with 112 active
CDBG-DR grants, which totaled more than $47.4 billion as of September 2017, had to follow
requirements contained in 61 different Federal Register notices to manage the program. Further,
codifying the CDBGDR program would (1) ensure that a permanent framework is in place for future
disasters, (2) reduce the volume of Federal Register notices, (3) standardize the rules for all
grantees, and (4) ensure that grants are closed in a timely manner. OIG recommended that HUD
work with its Office of General Counsel to codify the CDBG-DR program. (Audit Report:
2018-FW-0002)

The City of New York, NY, Did Not Always Use Disaster Recovery Funds Under Its Program for
Eligible and Supported Costs

OIG audited the City of New York, NY’s Infrastructure Rehabilitation and Reconstruction of
Public Facilities Program to determine whether the City used CDBG-DR funds under its program
for eligible and supported costs. The City did not always use CDBG-DR funds under its
program for eligible and supported costs. Specifically, for one of two projects reviewed, the
City did not (1) have sufficient documentation to show that the use of salary multipliers for
overhead and profit, resulting in more than $594,000 in additional costs, was supported and
eligible; (2) maintain adequate documentation to show compliance with requirements of the
Davis-Bacon Act and related acts; and (3) identify billing and payroll errors made by
subcontractors. As a result, HUD did not have assurance that the City used nearly $598,000
in CDBG-DR funds as intended for matching requirements for other federally funded
infrastructure projects, and HUD could not be assured that funds were disbursed for only
eligible and supported costs that complied with applicable Federal requirements. OIG
recommended that HUD require the City to adequately support identified expenditures or
reimburse its program from non-Federal funds, and strengthen its controls to ensure
compliance with applicable expenditure requirements. (Audit Report: 2018-NY-1007)

Grantees carry out the disaster recovery activities supported by CDBG-DR funding. The
ability of these grantees to accomplish recovery from disasters and do so in an efficient
and effective manner is critical to the recovery of the affected communities. To help HUD
ensure that grantees have this ability, OIG conducts capacity reviews to determine whether
these entities have the capability to administer their CDBG-DR grants in accordance with
applicable regulations and requirements, particularly with regard to financial management,
procurement, monitoring, and reporting. In fiscal year 2018, OIG conducted capacity reviews
of the State of Florida’s Department of Economic Opportunity (2018-AT-1010) and the State
of Texas’ General Land Office (2018-FW-1003). In fiscal year 2019, OIG has planned and
ongoing capacity reviews and compliance audits of Puerto Rico’s Department of Housing,
the U.S. Virgin Island’s Housing Authority, and the State of Texas’ General Land Office,
among others. OIG expects to begin reporting on these audits starting in fiscal year 2019.

OIG is also currently conducting an audit of HUD to determine whether it is adequately
prepared to respond to upcoming natural and man-made disasters. The audit focuses on
disaster policies and procedures regarding interaction with external partners and disaster
survivors, as well as for receiving and distributing disaster funds. OIG is coordinating
this audit with several other Federal agencies and expects to issue a report in fiscal
year 2019 or 2020.

Instituting Sound Financial Management

Over the last several years, HUD’s financial management has been operating at “inadequate”
or “basic” levels of maturity7 due to (1) a weak governance structure, including the lack
of a confirmed Chief Financial Officer for a number of years; (2) ineffective internal
controls; and (3) an antiquated financial management system consisting of legacy systems
and manual processes that have precluded HUD from producing reliable and timely financial
reports As a result, HUD has been unable to achieve an unmodified audit opinion8 on its
financial statements for the last 6 years and has received a disclaimer of opinion for
the last 5 years.

Footnote: 7 U.S. Department of the Treasury, Bureau of the Fiscal Service, Federal
Financial Management Maturity Model. The Maturity Model is a business tool that helps a
CFO self-assess his or her organization’s level of financial management discipline,
effectiveness, and efficiency. A copy of the model can be found at https://www.fiscal.
treasury.gov/fsservices/gov/fit/MaturityModelHandout2017-05-10.pdf. [End of footnote]

One of HUD’s component entities, Ginnie Mae, has also been unable to achieve an
unmodified opinion and has received a disclaimer of opinion for the last 5 years due to
poor governance and a weak internal control framework. Ginnie Mae has been unable to
appropriately account for and support several financial statement line items in accordance
with generally accepted accounting principles, including its nonpooled loan asset
portfolio, which totaled as much as $6 billion at one point. HUD’s unstable financial
management environment weakens public confidence in the government programs HUD
administers and prevents HUD’s stakeholders from being able to rely on HUD’s financial
position.

[Seal - Office of Inspector General, National Credit Union Administration]

Office of Inspector General

National Credit Union Administration

The NCUA OIG promotes the economy, efficiency, and effectiveness of NCUA programs and
operations and detects and deters fraud, waste and abuse, thereby supporting the NCUA’s
mission of providing, through regulation and supervision, a safe and sound credit union
system that promotes confidence in the national system of cooperative credit.

Agency Overview

The National Credit Union Administration (NCUA) is responsible for chartering, insuring,
and supervising Federal credit unions and administering the National Credit Union Share
Insurance Fund (Share Insurance Fund). The agency also manages the Operating Fund,9 the
Community Development Revolving Loan Fund,10 and the Central Liquidity Facility.11

Credit unions are member-owned, not-for-profit cooperative financial institutions formed
to permit members to save, borrow, and obtain related financial services. NCUA charters
and supervises federal credit unions, and insures accounts in federal and most state-
chartered credit unions across the country through the Share Insurance Fund, a federal
fund backed by the full faith and credit of the United States government.

The NCUA’s mission is to provide through regulation and supervision, a safe and sound
credit union system that promotes confidence in the national system of cooperative
credit and its vision is to protect consumer rights and member deposits. NCUA further
states that it is dedicated to upholding the integrity, objectivity, and independence
of credit union oversight. The agency implements initiatives designed to meet these
goals.

Major NCUA Programs

Supervision

NCUA supervises credit unions through annual examinations, regulatory enforcement,
providing guidance in regulations and letters, and taking supervisory and
administrative actions as necessary. The agency’s Office of National Examinations and
Supervision (ONES) oversees examination and supervision issues related to consumer
credit unions with assets greater than $10 billion and all corporate credit unions,
which provide services to consumer credit unions (also known as natural person credit
unions). Due to the relative size of their insured share base, they are deemed
systemically important to the Share Insurance Fund. In addition, the Dodd-Frank Act
gave the Consumer Financial Protection Bureau (CFPB) the authority to examine
compliance with certain consumer laws and regulations by credit unions with assets
over $10 billion.

Footnote: 9 The Operating Fund was created by the Federal Credit Union Act of 1934.
It was established as a revolving fund in the United States Treasury under the
management of the NCUA Board for the purpose of providing administration and service
to the federal credit union system. A significant majority of the Operating Fund’s
revenue is comprised of operating fees paid by federal credit unions. Each federal
credit union is required to pay this fee based on its prior year asset balances and
rates set by the NCUA Board. [End of footnote]

Footnote: 10 The NCUA’s Community Development Revolving Loan Fund, which was
established by Congress, makes loans and Technical Assistance Grants to low-income
designated credit unions. [End of footnote]

Footnote: 11 The Central Liquidity Facility is a mixed-ownership government
corporation the purpose of which is to supply emergency loans to member credit
unions. [End of footnote]

Insurance

NCUA administers the Share Insurance Fund, which is capitalized by credit unions
and provides insurance for deposits held at federallyinsured credit unions nationwide.
The insurance limit is $250,000 per depositor.

Credit Union Resources and Expansion

NCUA’s Office of Credit Union Resources and Expansion (CURE) supports credit union
growth and development, including providing support to low-income, minority, and any
credit union seeking assistance with chartering, charter conversions, by-law amendments,
field of membership expansion requests, and low-income designations. CURE also provides
access to online training and resources, grants and loans, and a program for preserving
and growing minority institutions.

Consumer Protection

NCUA’s Office of Consumer Financial Protection (OCFP) is responsible for consumer
protection in the areas of fair lending examinations, member complaints, and financial
literacy. OCFP consults with the CFPB, which has supervisory authority over credit
unions with assets of $10 billion or more. CFPB also can request to accompany NCUA on
examinations of other credit unions. In addition to consolidating consumer protection
examination functions within the agency, OCFP responds to inquiries from credit unions,
their members, and consumers involving consumer protection and share insurance matters.
Additionally, the office processes member complaints filed against federal credit unions.

Asset Management

NCUA’s Asset Management and Assistance Center (AMAC) conducts credit union liquidations
and performs management and recovery of assets. AMAC assists agency regional offices with
the review of large complex loan portfolios and actual or potential bond claims. AMAC also
participates extensively in the operational phases of conservatorships and records
reconstruction. AMAC’s purpose is to minimize costs to the Share Insurance Fund and to
credit union members.

Office of Minority and Women Inclusion

NCUA formed the Office of Minority and Women Inclusion in January 2011, in accordance with
the Dodd-Frank Act. The office is responsible for all matters relating to measuring,
monitoring, and establishing policies for diversity in the agency’s management, employment,
and business activities, and with respect to the agency’s regulated entities, excluding the
enforcement of statutes, regulations, and executive orders pertaining to civil rights.

Office of Continuity and Security Management

The Office of Continuity and Security Management evaluates and manages security and
ontinuity programs across NCUA and its regional offices. The office is responsible for
continuity of operations, emergency planning and response, critical infrastructure and
resource protection, cyber threat and intelligence analysis, insider threats and
counterintelligence, facility security, and personnel security.

The NCUA Office of Inspector General

The 1988 amendments to the Inspector General Act of 1978 (IG Act) established IGs in
33 designated federal entities (DFEs), including the NCUA.12 The NCUA Inspector General
(IG) is appointed by, reports to, and is under the general supervision of a three-member
presidentially appointed Board. OIG staff consists of ten employees: the IG, the Deputy
IG/Assistant IG for Audit, the Counsel to the IG/Assistant IG for Investigations, the
Director of Investigations, five auditors, and an office manager. OIG promotes the
economy, efficiency, and effectiveness of agency programs and operations, and detects
and deters fraud, waste, and abuse, thereby supporting the NCUA’s mission of facilitating
the availability of credit union services to all eligible consumers through a regulatory
environment that fosters a safe and sound credit union system. OIG supports this mission
by conducting independent audits, investigations, and other activities, and by keeping
the NCUA Board and the Congress fully and currently informed of its work.

Recent Work

We coordinated with our counterparts in CIGFO on issues of mutual interest, including
on the Top Management and Performance Challenges Facing Financial Regulatory
Organizations report that CIGFO issued in September 2018. This report noted that
cybersecurity was the most frequently identified cross-cutting challenge among CIGFO
members and included our observation that the NCUA must continue to strengthen the
resiliency of the credit union system to cyber threats.

In that regard, we currently are conducting an audit of the NCUA’s Information
Systems and Technology Examination Program to determine whether the NCUA provides
adequate oversight of the cybersecurity programs of federal credit unions with
assets of $10 billion or more and all corporate credit unions. This audit follows
our September 2017 audit focusing on the NCUA’s oversight of cybersecurity programs
of credit unions with assets between $250 and $10 billion. Both of these audits
could be instructive for the broader financial sector.

Footnote: 12 5 U.S.C. app. § 8G [End of footnote]

[Seal - U. S. Securities and Exchange Commission]

Office of Inspector General

U. S. Securities and Exchange Commission

The U.S. Securities and Exchange Commission (SEC or agency) Office of Inspector
General (OIG) promotes the integrity, efficiency, and effectiveness of the critical
programs and operations of the SEC and operates independently of the agency to help
prevent and detect fraud, waste, and abuse in those programs and operations, through
audits, evaluations, investigations, and other reviews.

Background

The SEC’s mission is to protect investors; maintain fair, orderly, and efficient
markets; and facilitate capital formation. The SEC strives to promote capital markets
that inspire public confidence and provide a diverse array of financial opportunities
to retail and institutional investors, entrepreneurs, public companies, and other
market participants. Its core values consist of integrity, excellence, accountability,
teamwork, fairness, and effectiveness. The SEC’s goals are focusing on the long-term
interests of Main Street investors; recognizing significant developments and trends
in evolving capital markets and adjusting agency efforts to ensure the SEC is
effectively allocating its resources; and elevating the SEC’s performance by
enhancing its analytical capabilities and human capital development.

The SEC is responsible for overseeing the nation’s securities markets and certain
primary participants, including broker-dealers, investment companies, investment
advisers, clearing agencies, transfer agents, credit rating agencies, and securities
exchanges, as well as organizations such as the Financial Industry Regulatory
Authority, Municipal Securities Rulemaking Board, Public Company Accounting
Oversight Board, Securities Investor Protection Corporation, and the Financial
Accounting Standard Board. Under the Dodd-Frank Wall Street Reform and Consumer
Protection Act of 2010 (Dodd-Frank Act), the agency’s jurisdiction was expanded
to include certain participants in the derivatives markets, private fund advisers,
and municipal advisors.

The SEC’s headquarters are in Washington, DC, and the agency has 11 regional
offices located throughout the country. The agency’s functional responsibilities
are organized into 5 divisions and 25 offices, and the regional offices are
primarily responsible for investigating and litigating potential violations of
the securities laws. The regional offices also have examination staff to inspect
regulated entities such as investment advisers, investment companies, and
broker-dealers. In fiscal year 2018, the SEC employed 4,483 full-time equivalents.

The SEC OIG was established as an independent office within the SEC in 1989 under
the Inspector General Act of 1978, as amended (IG Act). The SEC OIG’s mission is
to promote the integrity, efficiency, and effectiveness of the SEC’s critical
programs and operations. The SEC OIG prevents and detects fraud, waste, and abuse
through audits, evaluations, investigations, and other reviews related to SEC
programs and operations.

The SEC OIG Office of Audits conducts, coordinates, and supervises independent
audits and evaluations of the SEC’s programs and operations at its headquarters
and 11 regional offices. These audits and evaluations are based on risk and
materiality, known or perceived vulnerabilities and inefficiencies, and
information received from the Congress, SEC staff, the U.S. Government
Accountability Office, and the public.

The SEC OIG Office of Investigations performs investigations into allegations
of criminal, civil, and administrative violations involving SEC programs and
operations by SEC employees, contractors, and outside entities. These
investigations may result in criminal prosecutions, fines, civil penalties,
administrative sanctions, and personnel actions. The Office of Investigations
also identifies vulnerabilities, deficiencies, and wrongdoing that could
negatively impact the SEC’s programs and operations.

In addition to the responsibilities set forth in the IG Act, Section 966 of
the Dodd-Frank Act required the SEC OIG to establish a suggestion program
for SEC employees. The SEC OIG established its SEC Employee Suggestion
Program in September 2010. Under this program, the OIG receives, reviews
and considers, and recommends appropriate action with respect to such
suggestions or allegations from agency employees for improvements in the
SEC’s work efficiency, effectiveness, and productivity, and use of its
resources, as well as allegations by employees of waste, abuse, misconduct,
or mismanagement within the SEC.

SEC OIG Work Related to the Broader Financial Sector

In accordance with Section 989E(a)(2)(B)(i) of the Dodd-Frank Act, below is
a discussion of the SEC OIG’s completed and ongoing work, focusing on issues
that may apply to the broader financial sector.

Completed Work

Evaluation of the EDGAR System’s Governance and Incident Handling Processes,
Report No. 550, September 21, 2018

On September 20, 2017, the Chairman of the SEC publicly disclosed that an
incident—specifically, a software vulnerability in a component of the
agency’s Electronic Data Gathering, Analysis, and Retrieval (EDGAR) system—
previously detected in 2016, resulted in unauthorized access to non-public
information. On September 23, 2017, the Chairman, who began his service in
May 2017 and was notified of the incident in August 2017, requested that the
OIG review the agency’s handling of, and response to, the 2016 incident.
In response, the OIG initiated an evaluation. In July 2018, the OIG presented
the Chairman and other SEC Commissioners with the non-public results of its
evaluation relative to the 2016 EDGAR intrusion. Report No. 550 presents the
OIG’s findings related to the information security practices applicable to
the EDGAR system between fiscal years (FYs) 2015 and 2017.

EDGAR is at the heart of the agency’s mission of protecting investors;
maintaining fair, orderly, and efficient markets; and facilitating capital
formation. The availability of accurate, complete, and timely information from
EDGAR is essential to the SEC’s mission and the investing public. Without
adequate controls to ensure the SEC identifies, handles, and responds to
EDGAR system incidents in a timely manner, threat actors could gain
unauthorized access to the system, which could lead to illicit trading,
negative impacts to the economy and public access to filings, and loss of
public confidence in the SEC.

We determined that, between FYs 2015 and 2017, the EDGAR system lacked
adequate governance commensurate with the system’s importance to the SEC’s
mission. In addition, we determined that certain preventive controls did
not exist or did not operate as designed. Moreover, between September 2015
and September 2016, the SEC wasted at least $83,000 on a tool for which the
SEC derived little, if any, benefit. Finally, we found that the SEC lacked
an effective incident handling process. These weaknesses potentially
increased the risk of EDGAR security incidents, and impeded the SEC’s
response efforts. The SEC has since strengthened EDGAR’s system security
posture, including the handling of and response to vulnerabilities. Among
other actions, in August 2017, the agency established a Cyber Initiative
Working Group to oversee and lead a number of priority cyber initiatives
such as an EDGAR security uplift. As this and other work continues,
opportunities for further improvement exist.

We issued our final report on September 21, 2018, and made 14
recommendations to improve the SEC’s EDGAR system governance, security
practices, and incident handling processes. We also noted that open
recommendations from prior OIG work should address some of our
observations, and we encouraged management to implement agreed-to
corrective actions. Management concurred with the recommendations,
which will be closed upon completion and verification of corrective
action.

Because the underlying report contains sensitive information about the
SEC’s information security program, we prepared this summary with
information releasable to the public. An executive summary is also
available on our website at https://www.sec.gov/files/Eval-of-the-EDGAR-
Systems-Governance-and-Incident-Handling-Processes.pdf.

TCP Established Method to Effectively Oversee Entity Compliance With
Regulation SCI but Could Improve Aspects of Program Management, Report
No. 551, September 24, 2018

In recent years, several factors, including a significant number of
systems issues at exchanges and other trading venues, increased concerns
over “single points of failure” in U.S. securities markets. These
concerns contributed to the SEC’s decision to address technological
vulnerabilities and improve agency oversight of the core technology
of key U.S. securities markets entities. In November 2014, the SEC
adopted Regulation Systems Compliance and Integrity (SCI), under which
the agency monitors the security and capabilities of U.S. securities
markets’ technological infrastructure. The SEC’s Office of Compliance
Inspections and Examinations’ (OCIE) Technology Controls Program
(TCP) is responsible for ensuring entities comply with Regulation
SCI and for evaluating whether entities have established, maintained,
and enforced written policies and procedures reasonably designed to
ensure the capacity, integrity, resiliency, availability, and security
of their Regulation SCI systems. We initiated an evaluation to assess
OCIE’s TCP and determine whether the program provided effective oversight
of entities’ compliance with Regulation SCI.

TCP has an established method to effectively oversee entity compliance
with Regulation SCI. The program assesses compliance through its
CyberWatch program and through TCP examinations. However, we
identified opportunities to improve aspects of TCP program management.
Specifically, we found that TCP’s examination manuals in effect at the
outset of our evaluation were outdated, management had not identified or
documented TCP risks and control activities in OCIE’s internal risk and
control matrix, and TCPs’ development of the Technology Risk-Assurance,
Compliance, and Examination Report (TRACER) system—the program’s system
of record—was not well-planned or documented.

• Examination Manuals. The TCP Examination Manual and draft TRACER
Examination User Manual in effect at the outset of our evaluation were
outdated and did not align with TCP examination practices. Management was
in the process of revising the TCP Examination Manual and, on June 25,
2018, released an updated version.

• Risks and Control Activities. TCP management had not identified or
documented the program’s risks and corresponding control activities in
OCIE’s risk and control matrix. Although TCP examinations appear to have
similar risks and controls as other OCIE examinations, documentation we
reviewed did not clearly identify comparable documented control activities
specific to TCP examination processes for all identified risks.

• TRACER Development. Between September 2015 and January 2018, TCP
continued  development of the SEC’s TRACER system at a cost of nearly
$780,000. As the system’s business owner during that time, TCP oversaw
frequent (sometimes weekly) system updates, but did not properly plan or
document its development efforts. TRACER’s purpose and functions evolved
over time as TCP was considering continued development of the system or
migration to an existing OCIE system known as the Tracking and Reporting
Examinations National Documentation System (TRENDS). Certain planned
system capabilities were not realized and it is unclear, based on a lack
of documentation, how TCP assessed or managed system requirements. On
May 4, 2018, TCP management decided to discontinue developing TRACER and
transition its examination program to TRENDS, which is expected to yield
operational and cost savings benefits.

We also identified two other matters of interest for management’s
consideration. First, a majority of TCP staff who responded to a survey we
administered indicated that they either did not receive adequate training
or only sometimes received adequate training. TCP management has completed
a 3-year training plan. We encouraged management to continue to review TCP
staff training to ensure staff members have the knowledge and skills
necessary to perform TCP examinations. Secondly, we identified a gap
in the Office of Acquisitions’ process for reviewing CORs’ files. We suggest
that Acquisitions consider establishing follow-up procedures to address this
gap.

At the outset of our evaluation, TCP management identified ongoing improvement
initiatives and began implementing changes. We issued our final report on
September 24, 2018, and, to further improve TCP program management, we
recommended that OCIE: (1) ensure TCP management updates the TCP Examination
Manual in a timely manner following TCPs’ transition to TRENDS; (2) identify
and document the risks and controls related to TCP operations, and update
OCIE’s risk and control matrix accordingly; and (3) ensure TCP management
properly plans and documents TCP’s transition to TRENDS, and retains all
relevant materials in a central location. Management concurred with the
recommendations, which will be closed upon completion and verification of
corrective action. Because the underlying report contains non-public
information, we prepared this summary with information releasable to the
public. Also, a redacted public version is available on our website at
https://www.sec.gov/files/TCPEstablished-Method-to-Effectively-Oversee-
Entity-Compliance-with-Reg-SCI--But-Could-Improve.pdf.

Although Highly Valued by End Users, DERA Could Improve Its Analytics
Support by Formally Measuring Impact, Where Possible, Report No. 553,
April 29, 2019

The SEC increasingly relies on data and analytics to guide its strategic
and operational activities and to make more informed, effective decisions.
Based on FY 2017 budget information, the SEC spends about $120 million
annually on data management and about $20 million annually on analytics.
Furthermore, the SEC’s Strategic Plan for FY 2018 through FY 2022 and FY
2020 Annual Performance Plan emphasize the agency’s goal of enhancing and
expanding its use of analytics.

The SEC’s Division of Economic and Risk Analysis (DERA) assists the agency
in executing its mission by integrating sophisticated, data-driven analytics
and economic analysis into the work of the SEC. Analytics provided by DERA’s
Office of Risk Assessment (ORA) and Office of Research and Data Services
(ORDS) support exam planning and other agency oversight programs related to
issuers, broker-dealers, investment advisers, exchanges, and other trading
platforms. To assess DERA’s controls over integration of data analytics
into the core mission of the SEC, we initiated an evaluation.

We determined that, although end users highly valued DERA’s analytics
support and believed such analytics were indispensable for risk scoping,
investor protection, detecting illegal conduct, allocating resources more
efficiently, and helping the SEC achieve its mission, ORA and ORDS
management generally did not formally measure the quantitative or
qualitative impact of either office’s analytics support. Management noted
that it tracked end user requests for analytics support, considered repeat
customers as evidence analytics are valued, and identified potential metrics
for measuring impact (such as efficiency gains and end user satisfaction);
however, management had not formalized such metrics.

DERA management and end users of DERA’s analytics acknowledged that it might
be difficult to devise meaningful impact measurement metrics for some
analytics projects. For example, even though ORA analytics identified outliers
that led to at least one Division of Enforcement investigation, not all
analytics produce such directly measurable outcomes. Management was also
apprehensive about burdening end users with requests for feedback regarding
analytics’ impact. However, by not measuring, where possible, the impact of
ORA’s and ORDS’ analytics support, DERA risks limiting its ability to assess
its organizational performance, increase awareness of its analytics
capabilities (including through outreach efforts), and fully integrate
analytics into the work of the SEC in accordance with the agency’s strategic
goals and objectives.

In addition, we reviewed available usage data for two analytics tools that
incorporated ORA analytics and found that end users used and valued both
tools. Although DERA did not regularly review the usage data for one tool
and usage data for the other tool was incomplete, we determined that DERA’s
review of such data would not significantly help the Division meet agency
goals and objectives.

We also assessed DERA’s interactions with the SEC’s other divisions and
offices, including its coordination and outreach efforts, and determined
that staff in other divisions and offices generally viewed interactions with
DERA favorably; duplicative analytics work across the SEC was not apparent;
and DERA proactively engaged in outreach.
However, a majority of respondents to a question in a survey we administered
(22 of 37, or almost 60 percent) expressed an interest in further DERA
outreach. Respondents believed that promoting the nature and benefits (that
is, impact) of DERA analytics and systems could be useful to the SEC’s other
divisions and offices.

Finally, we identified one other matter of interest related to data management.
Although we did not assess the SEC’s data management practices and are not
making any recommendations regarding data management at this time, we noted that
data management is the foundation of analytics. Therefore, it is important to
verify completion of the SEC’s plans to improve in this area. We will continue
to monitor the agency’s plans and progress related to data management.

We issued our final report on April 29, 2019, and to improve its ability to
assess its organizational performance, increase awareness of its analytics
capabilities, and fully integrate analytics into the work of the SEC in
accordance with the agency’s strategic goals and objectives, we recommend that
DERA (1) work with end users of its analytics projects to develop metrics, where
possible, for formally measuring analytics support impact; (2) modify existing
internal tracking processes to include, where possible, analytics impact
measurement; and (3) incorporate the results of analytics impact measurements in
the Division’s outreach efforts. Management concurred with the recommendations,
which will be closed upon completion and verification of corrective action.

This report is available on our website at https://www.sec.gov/files/Although-
Highly-Valued-by-End-Users-DERA-Could-Improve-Report-No-553_0.pdf.

Final Management Letter: Update on the SEC’s Progress Toward Redesigning the
EDGAR System

In September 2017, we reported observations about controls over the SEC’s EDGAR
system enhancements and redesign efforts.13 We noted that the SEC’s EDGAR Redesign
(ERD) program is a multi-year, cross-agency initiative and, since 2014, the SEC
had taken steps to develop and implement a new electronic disclosure system that
meets agency needs, including spending about $10.6 million on related contracts.
Since issuing our September 2017 report, we have continued to monitor the SEC’s
progress toward redesigning the EDGAR system. We did not conduct an audit or
evaluation in conformance with generally accepted government auditing standards
or the Council of the Inspectors General on Integrity and Efficiency’s Quality
Standards for Inspection and Evaluation. However, based on the work performed,
on May 23, 2019, we reported concerns that warrant management’s attention.
Specifically, we determined that:

• The agency’s approach to redesigning the EDGAR system is unclear;

• ERD program cost and schedule estimates presented to agency decision makers
and senior officials were not based on best practices; and

• The EDGAR Business Office (EBO) created a Grand Functional Requirements
Document (Grand FRD) for the redesigned EDGAR system, but did not include
sufficient detail about the system’s security requirements.

On May 7, 2019, we provided SEC management with a draft of our management letter
for review and comment. In its May 17, 2019, response, management concurred with
our overall observations and stated that it remains committed to modernizing and
improving the security, functionality, and maintainability of the EDGAR system.
Although management did not use cost and schedule estimates based on best practices
for its deliberations about the appropriate high-level strategy for the EDGAR system,
management anticipates preparing more detailed estimates, based on best practices,
later in the process. Also, although the Grand FRD did not describe in detail
security requirements for redesigning EDGAR, management anticipates it will obtain
detailed security requirements in a future phase of the project. Finally, management
expects that completed and ongoing work will modernize much of the EDGAR system,
achieve many of the goals of the original EDGAR redesign project, and position the
system for further modernization.

Footnote: 13 U.S. Securities and Exchange Commission, Office of Inspector General,
Audit of the SEC’s Progress in Enhancing and Redesigning the Electronic Data Gathering,
Analysis, and Retrieval System, Report No. 544; September 28, 2017. [End of footnote]

To help us determine whether further action by the OIG is warranted, we requested that,
no later than June 6, 2019, management provide to the OIG the SEC’s approach to
redesigning the EDGAR system and its planned or ongoing actions to (a) manage the ERD
program using reliable cost and schedule estimates based on established methods
and valid data; (b) integrate “functional requirements” with “non-functional
requirements,” including those for security, recoverability, testability, and
maintainability, with sufficient detail that future offerors can propose viable
solutions and designs as part of a future competitive procurement; and (c) further
manage the existing EDGAR system.

The final management letter contains non-public information about the agency’s
efforts to redesign the EDGAR system. We redacted the non-public information to
create this public summary. Our public version of the letter is also available on
our website at https://www.sec.gov/files/Final-Mgmt-Ltr-Update-on-the-SECs-Progress-
Toward-Redesigning-EDGAR.pdf.

Ongoing Work

Evaluation of the Division of Trading and Markets’ Office of Broker-Dealer Finances

The SEC prescribes broker-dealer net capital and risk assessment reporting
requirements through various rules, overseen by the Division of Trading and Markets’
Office of Broker-Dealer Finances (OBDF). On June 10, 2019, we initiated an evaluation
of OBDF’s efficiency and effectiveness. Specifically, we will determine whether OBDF
(1) ensures efficient use of government resources to help achieve organizational
goals and objectives, and (2) provides effective oversight of broker-dealer
compliance with capital and risk reporting requirements, in accordance with
applicable rules and guidance. We expect to issue a report summarizing our
findings during 2020.

Evaluation of the SEC’s Delinquent Filer Program

In 2004, the SEC initiated the delinquent filer program, administered jointly
by the Division of Enforcement and the Division of Corporation Finance, to bring
administrative proceedings under Exchange Act Section 12(j) to revoke the Exchange
Act registrations of securities of issuers that are more than 1-year delinquent in
their Exchange Act reports and have been unresponsive to SEC requests for
compliance.14 At the same time, the Division of Enforcement seeks Commission
approval for trading suspensions under Section 12(k) to suspend trading of the
securities of the non-filing issuers under certain circumstances. On June 10, 2019,
we initiated an evaluation of the SEC’s delinquent filer program to assess the SEC’s
process for identifying, tracking, and notifying delinquent filers and issuing related
revocation orders and/or trading suspensions in accordance with applicable laws,
rules, and regulations. As part of the evaluation, we will also review the Division
of Enforcement’s efforts to decentralize the delinquent filer process. We expect to
issue a report summarizing our findings during 2020.

Footnote: 14 According to a 2004 advice memo, an enhanced delinquent filings
program for issuers was needed because publicly traded companies that are delinquent
in filing Exchange Act reports deprive investors of accurate financial information
upon which to make informed investment decisions. Further, these entities are often
vehicles
for fraudulent stock manipulation schemes. [End of footnote]

[Seal - Special Inspector General for the Troubled Asset Relief Program]

Special Inspector General for the Troubled Asset Relief Program

The Special Inspector General for the Troubled Asset Relief Program (SIGTARP) has
the duty, among other things, to conduct, supervise, and coordinate audits and
investigations of the purchase, management, and sale of assets under the Troubled
Asset Relief Program (TARP) or as deemed appropriate by the Special Inspector
General.

Background

SIGTARP is primarily a Federal law enforcement agency protecting the interests
of the American people by investigating crime at financial institutions that
received TARP funds or at other TARP recipients in housing programs. All TARP
programs are intended to promote financial stability.

When first created, SIGTARP found that financial institution fraud had evolved
from the insider self-dealing fraud that marked the savings and loan crisis, to
escape detection from traditional fraud identification methods of self-reporting
and regulator referrals. SIGTARP created an intelligence-driven approach and
leveraged technological solutions to discover insider crimes at banks that
previously went undetected. Now, as a result of SIGTARP investigations, 105
bankers have been criminally charged and 74 have been sentenced to prison with
more bankers awaiting trial and sentencing.

SIGTARP is applying its intelligence-driven approach to search for crime in
TARP housing and foreclosure prevention programs. TARP recipients include
large mortgage servicers in the Making Home Affordable (MHA) Program, like
Wells Fargo, Bank of America, and JPMorgan Chase.

SIGTARP assesses that the top threat in TARP today is unlawful conduct by
any of the 152 banks and other financial institutions that received $20.1
billion or will continue to receive $3.7 billion for foreclosure prevention
in TARP’s MHA Program. With an uptick in enforcement actions against
financial institutions in MHA, SIGTARP has shifted resources to counter
this threat.

The Most Serious Management and Performance Challenges & Threats of Fraud,
Waste, & Abuse Facing the Government in TARP

SIGTARP identifies the most serious management and performance challenges
and threats facing the Government in TARP. Our selection is based on the
significance and duration of the challenge/threat to the mission of TARP and
to Government interests; the risk of fraud or other crimes, waste or abuse;
the impact on agencies in addition to Treasury; and Treasury’s progress
in mitigating the challenge/threat.

Risk of Fraud, Waste, and Abuse by Large Banks and Others in the Making
Home Affordable Program (Until Sep. 2023)

Unlawful conduct by any of the 152 banks or institutions that received
$20.1 billion or will continue to receive $3.7 billion in TARP’s MHA
program is the top threat in TARP. Treasury will pay up to $3.1 billion
to Ocwen, Wells Fargo, JPMorgan Chase, Bank of America, Nationstar, Select
Portfolio Servicing, CitiMortgage, OneWest/CIT, Bayview Loan Servicing,
and Specialized Loan Servicing along with 131 institutions. These TARP
payments require compliance with the law and Treasury’s rules for the
institutions assisting the 834,206 consumers in all 50 states. Wells
Fargo recently
disclosed in two SEC filings its wrongful denial of homeowners for
admission to the program. Despite enforcement actions and other
wrongdoing by many of these financial institutions, Treasury has
significantly scaled back its compliance reviews. The risk of fraud,
waste, and abuse also jeopardizes the GSEs, FHA, and Veterans Affairs
that participate in MHA.

Risk of Waste and Misuse of TARP Dollars by State Agencies for Their
Own Administrative Expenses in the Hardest Hit Fund (Until Dec. 2021)

Treasury has budgeted $1.1 billion in TARP dollars for administrative
expenses of 19 state agencies to distribute HHF assistance. In March
2019, SIGTARP issued an audit that found state agencies violated
federal cost regulations by charging more than $400,000 in prohibited
travel and conference costs to the Hardest Hit Fund. SIGTARP found
waste, a lack of internal controls at state agencies, and lack of
effective oversight by Treasury. State agencies did not have the
documentation required by Federal regulations to charge the travel
and conferences to HHF. The audit also identified outright waste,
including TARP funds spent on luxury hotels, conferences and
extravagant dinners and receptions. In 2016 and 2017, SIGTARP
identified $11 million in wasteful and unnecessary spending by state
housing agencies, including, for example, catered barbeques, parties,
country club events, leasing a Mercedes, cash bonuses, gym
memberships, gifts, free parking, settlements and legal fees in
discrimination cases, other costs not associated with HHF, and more.
In 2018, SIGTARP issued an audit that found that while Treasury
anticipates millions of dollars in spending on lawyers, accountants,
auditors, consultants, information technology, communications, risk
management, training, and marketing, there is no Federal requirements
for competition.

Risk of Corruption, Anticompetitive Actions, and Fraud in the Hardest
Hit Fund Blight Elimination Program (Until Dec. 2021)

There is a risk of corruption, anticompetitive acts, and fraud as TARP
funds the demolitions of abandoned homes and apartments. The number of
municipalities in the program increased to 378 cities or counties. There
have already been criminal indictments for corruption in HHF.

Risk of Asbestos Exposure, Contaminated Soil, and Illegal Dumping in the
Hardest Hit Fund Blight Elimination Program (Until Dec. 2021)

In November 2017, based on the U.S. Army Corps of Engineers’ findings, SIGTARP
warned that the standard protections in demolition are not present in the TARP
program. The Army Corps found missing industry standard safeguards that protect
against the risk of asbestos exposure, illegal dumping of debris, and
contaminated material filling the hole. Treasury did not implement SIGTARP’s
recommendations, even to require basic documentation of proper asbestos abatement,
certain inspections, landfill receipts for dumping, and receipts showing the
purchase of clean dirt. SIGTARP’s investigation into a demolition contractor for
illegal dumping of contaminated soil in Fort Wayne, Indiana was resolved for over
$800,000 through remediation and a settlement by DOJ under the False Claims Act.

TARP may expand even further in this area: The Economic Growth, Regulatory Relief,
and Consumer Protection Act authorizes Treasury to use TARP dollars to remediate
lead and asbestos hazards in residential properties.

No Complete List or Data Identifying All Contractors and Others Doing Work in the
Hardest Hit Fund Blight Subprogram and What They Were Paid

Treasury and the state agencies do not know, and cannot provide to SIGTARP a
complete list of contractors receiving TARP dollars in the program. SIGTARP and
Treasury cannot conduct oversight over contractors and other entities that are
unknown. Treasury rejected SIGTARP’s 2015 recommendation to maintain a list and
accounting of payments in HHF. SIGTARP’s proactive analysis has identified 2,210
land banks or other partners, contractors, or subcontractors that have done or are
contracted to do work in the program—but given the missing data, we believe the
actual numbers may be much higher. State agency data is incomplete. The data
provided by state agencies to SIGTARP also provides limited detail about the $510.5
million that has been spent in the Blight Elimination Program beyond the first-level
recipient. As a result, there may be hundreds, or perhaps thousands, of additional
unknown subcontractors doing work in the program. Without complete records and
accounting, the program and taxpayers are vulnerable.

Risk of Waste from Weakened Oversight by Treasury of State Agencies in the Hardest
Hit Fund

Starting in October 2018, Treasury has allowed state agencies to shift HHF dollars
between programs and removed caps on administrative expenses (by the greater of
five percent or $50,000). Treasury also decreased oversight in the HHF program in
2018 by reducing OFS personnel charged with providing oversight of the HHF program
by 30%. These Treasury changes increase risk of fraud, waste and abuse because state
agencies can move more TARP money to higher risk subprograms. These changes also have
weakened Treasury oversight of state administrative spending after SIGTARP has proven
waste and misuse of TARP dollars by state agencies. Additionally, GAO found in a
December 2018 study that “Treasury is missing an opportunity to ensure that HFAs are
appropriately assessing their risk.”

SIGTARP’s Investigations Approach

SIGTARP gained expertise in investigating large institutions which resulted in
significant DOJ enforcement actions against Goldman Sachs, Bank of America, JPMorgan
Chase, Morgan Stanley, Ally Financial, Wilmington Trust, Sun Trust Bank, Fifth Third
Bank, Jefferies & Co., and RBS Securities.

SIGTARP’s law enforcement counters threats to public safety and Government interests
by investigating criminal actors and working with the Justice Department to prosecute
those criminal actors. With 278 people sentenced to prison resulting from a SIGTARP
investigation, at an average prison sentence of nearly five years, the threat these
crimes pose is significant. SIGTARP’s ongoing criminal investigations of recipients of
TARP dollars in TARP housing programs promote free and fair trade by improving the
overall condition for competition, and counter threats to public safety and Government
interests, including financial institution fraud, public corruption, antitrust (unfair
competition), contract fraud, and organized crime. Recent DOJ charges, pleas and false
claim settlements continue to demonstrate that these threats are current and real.

Financial Institution Fraud: SIGTARP’s highest priority is investigating banks and other
financial institutions receiving TARP dollars in the Making Home Affordable Program. Our
investigations into TARP banks have already resulted in 104 bankers criminally charged
and 73 sentenced to prison. Many await trial. Our remaining investigative work in
this area focuses on supporting the Justice Department in its efforts to prosecute TARP
bankers. SIGTARP’s work on financial institution fraud supports Justice Department
prosecutions of individuals investigated by SIGTARP, such as international money
laundering charges related to a TARP bank, that help identify and reduce vulnerabilities
in the financial system while stopping abuses by illicit actors.

Public Corruption: The corruption of local officials threatens public safety and fair
competition. State and local officials award contracts under the more than $760 million
Hardest Hit Fund blight demolition program.

Antitrust Violations: Unfair competitive practices in TARP housing programs including
contract steering, bid rigging and price fixing, threatens the quality of work, harms
public safety, threatens fair competition, and results in higher
costs.

Contract Fraud, False Claims/Theft or Bribery in TARP Programs: Demolition contractors
and State agencies play key roles in administering HHF programs. Fraud in any of these
risk areas harm Government interests and fair competition. Organized Crime: Organized
crime in the over $760 million blight demolition program or in TARP banks threatens
public safety, fair competition and harms Government interests.

Selected SIGTARP’s Investigations Results (April 1, 2018 to March 31, 2019)

Wilmington Trust Corporation

In December 2018 and January 2019, a federal court sentenced seven former Wilmington
Trust bankers to prison terms of up to six years. As a result of a SIGTARP investigation,
the bank’s former president, chief financial officer, chief credit officer and controller
were convicted of securities fraud after a trial. Wilmington Trust Bank received a $330
million TARP bailout. As the conspiracy was ongoing and while in TARP, the bank collapsed
and was acquired by M&T Bank at a discount of approximately 46% from the bank’s share
price the prior trading day.

SIGTARP’s investigation uncovered a scheme by bank insiders to conceal the total quantity
of past due loans on its books from the Federal Reserve, the Securities and Exchange
Commission and the investing public. After the trial, a jury convicted former president
Robert Harra, former chief financial officer David Gibson, former chief credit officer
William North, and former controller Kevyn Rakowski of hiding more than $300 million in
loans that were 90 days past due.

At their sentencing, U.S. District Judge Richard G. Andrews said the investigation
uncovered the “the biggest financial crime in Delaware, at least in the past 35 years.”
The court sentenced former president Harra and former chief financial officer Gibson to
six years in prison and ordered them to pay $300,000 each. The court sentenced former
chief credit officer North to four and half years in prison and ordered him to pay
$100,000 and former controller Rakowski to three years in prison. The court separately
sentenced three other Wilmington Trust officers: former head of commercial real estate
Delaware Brian Baily to two and half years, former vice president for commercial real
estate for Delaware
Joseph Terranova to one year and nine months and former commercial real estate
relationship manager for Delaware Peter Hayes to one year and three months.

In October 2017, as part of a criminal investigation Wilmington Trust admitted
wrongdoing and agreed to pay $60 million. Wilmington Trust was the only TARP bank
indicted by the Justice Department.

SIGTARP was joined in the investigation by the Federal Bureau of Investigation, the
Internal Revenue Service-Criminal Investigation, and the Federal Reserve Bank-Office
of Inspector General. The U.S. Attorney’s Office for the District of Delaware
prosecuted the case.

Sonoma Valley Bank of California

In August 2018, a federal court sentenced both the Sonoma Valley Bank CEO Sean
Cutting and Chief Loan Officer Brian Melland to eight years and four months in prison,
and the attorney of a bank borrower to six years and eight months in prison. SIGTARP’s
investigation uncovered that leading up to and during the time Sonoma Valley Bank was
in TARP, the bank officers conspired to commit fraud that would contribute to the
failure of the bank and a complete loss to TARP of $8.6 million. They made millions
in illegal bank loans to “straw” borrowers, knowing the proceeds would go to one bank
borrower who was a real estate developer. They then tried to cover up the scheme by
falsifying the bank’s books and lying to the bank’s regulators.

During the fraud, the bank applied for TARP, with the CEO describing TARP as a “cookie
jar” and saying it only made sense for the bank to take some. After a Federal jury
trial in December 18, 2017, the jury found Cutting and Melland guilty of conspiracy,
bank fraud, wire fraud, attempted obstruction of justice, and other offenses. The real
estate developer was indicted but died prior to the trial when his car drove over a
cliff on Highway 1. The court ordered $19 million in restitution and forfeiture of a
condominium complex involved in the fraud.

SIGTARP was joined in the investigation by the Federal Housing Finance Agency Office
of Inspector General, the Federal Deposit Insurance Corporation Office of Inspector
General, the Marin County Sheriff’s Office, the Sonoma County Sheriff’s Office, and
the Santa Rosa Police Department. The U.S. Attorney’s Office for the Northern District
of California prosecuted the case.

Southern Bancorp

As a result of a SIGTARP investigation, in February 2019, a federal court sentenced
bank officer Michael J. Erickson to two years in prison after he was convicted of
embezzling funds from Southern Bancorp. The court ordered Erickson to pay $1.4
million to Southern Bancorp. Taxpayers lost $2.3 million on the investment; the bank
received a $33.8 million bailout from TARP.

In its investigation, SIGTARP uncovered a scheme where Erickson stole thousands of
dollars for his own personal enrichment from a commercial loan he managed. SIGTARP
was joined in the investigation by the Federal Bureau of Investigation. The U.S.
Attorney’s Office for the Northern District of Mississippi prosecuted the case.

Saigon National Bank

In February 2019, a federal court sentenced Vivian Tat to two years in federal
prison for laundering tens of thousands of dollars in cash. This case is the result
of Operation “Phantom Bank,” targeting TARP recipient Saigon National Bank, which
resulted in six indictments that charge a total of 25 defendants. SIGTARP was
joined in the investigation by the FBI and the IRS Criminal Investigation. The U.S.
Attorney’s Office for the Central District of California prosecuted the case.

First Legacy Community Credit Union of North Carolina

In March 2019, President and CEO of First Legacy Community Credit Union (FLCCU)
Saundra Torrence was sentenced to six months in prison and ordered to pay
$187,066 in restitution for making or causing false entries. SIGTARP’s investigation
uncovered that Scales falsified the credit union’s books, misapplied and stole funds
from the credit union, and fraudulently used the identity of at least one third
party victim to obtain a loan from FLCCU. Torrence’s wrongdoing caused significant
losses to the credit union. The fraudulent entries she made to conceal her
wrongdoing caused the credit union’s reported financial results to be inaccurate.

SIGTARP was joined in the investigation by the FBI. The U.S. Attorney’s Office for
the Western District of North Carolina prosecuted the case.

First State Bank

In October 2018, former First State Bank CEO Joseph Natale, financier Albert
Gasparro, and business owner Gary Ketchum were indicted for their roles in a scheme
to defraud the now defunct First State Bank, which attempted to obtain TARP funds.

The defendants are charged with conspiracy to mislead the FDIC and First State Bank,
conspiracy to commit bank fraud and bank fraud. Former First State Bank legal counsel
Donna Conroy, a conspirator, pleaded guilty in May 2017 and is awaiting sentencing.
SIGTARP was joined in the investigation by the FBI and the FDIC Office of Inspector
General. The U.S. Attorney’s Office for New Jersey is prosecuting the case.

Lone Star Bank

Following a SIGTARP investigation, in September 2018, a Federal court sentenced Lone
Star Bank loan officer Ricky Hajdik to 20 months in prison and sentenced co-conspirator
Hugo Lafuente to 25 months in prison for a conspiracy to defraud the bank out of $1.3
million in loans. Hajdik knew that Lafuente’s income would not qualify for a
construction loan. Hajdik conveyed to loan broker Leonard Tyson an inflated and untrue
income number that LaFuente needed to qualify for the construction loan. Lafuente then
directed Mark Zylker to prepare fraudulent income tax returns that inflated his income,
which Hajdik used for the bank to make the loan. When Lafuente defaulted on this loan
and a Small Business Administration Loan, the bank suffered losses $735,758. TARP
suffered a $1.2 million loss on the bank and the bank missed dividend payments of
 $2.2 million.

SIGTARP was joined in the investigation by the Federal Deposit Insurance Corporation
Office of Inspector General. The U.S. Attorney’s Office for the Southern District of
Texas prosecuted the case.

SIGTARP’s Audit Approach

SIGTARP conducts audits over TARP housing programs, helping promote financial
stewardship by the Government. Much of SIGTARP’s audit work is at the request of
members of Congress. SIGTARP specializes in forensic audits that follow the money,
analyzing general ledgers, credit card statements, invoices, and receipts.

SIGTARP assists Treasury in these efforts by auditing and evaluating housing programs
to determine whether the Government is receiving fair value for its money and that
recipients are spending TARP funds appropriately to accomplish the stated goals. To
promote financial stewardship, SIGTARP reports on fraud, waste, and abuse and makes
recommendations to Treasury (which has oversight of all TARP programs) to recover
wasteful spending and prevent future fraud, waste, and abuse.

Travel and Conference Charges to the Hardest Hit Fund that Violated Federal Regulations

In a March 2019 audit, SIGTARP uncovered that state agencies violated federal cost
regulations by charging HHF $411,658 in prohibited travel and conference costs. Remarking
on the findings, Special Inspector General Goldsmith Romero said, “Flying around the
country, staying at luxury hotels, attending conferences beachside and at other vacation
destinations are not ‘must have’ costs for a local foreclosure prevention program.”

SIGTARP’s Recoveries from Audits and Investigations

SIGTARP continues to assess current and future operations to fulfill its mission and
reduce spending, while supporting financial stewardship by providing recoveries to assist
in funding the Government at the least cost over time. SIGTARP’s investigations and audits
have recovered $10 billion. Fiscal Year 2018 recoveries of more than $314 million,
including more than $294 million recovered for the government, are a 9 times return on
investment from the Fiscal Year 2018 appropriated budget. Already in Fiscal Year 2019,
SIGTARP has recovered $804 million, including more than $336 million paid to the government,
a 35 times annual return on investment from the Fiscal Year 2019 appropriated budget.

[Seal - Office of Inspector General, Department of the Treasury]

Office of Inspector General

Department of the Treasury

The Department of the Treasury Office of Inspector General performs independent, objective
reviews of specific Treasury programs and operations with oversight responsibility for one
federal banking agency – the Office of the Comptroller of the Currency. That federal banking
agency supervises approximately 1,260 financial institutions.

Introduction

The Department of the Treasury (Treasury) Office of Inspector General (OIG) was established
pursuant to the 1988 amendments to the Inspector General Act of 1978. The Treasury Inspector
General is appointed by the President, with the advice and consent of the Senate. Treasury
OIG performs independent, objective reviews of Treasury programs and operations, except for
those of the Internal Revenue Service (IRS) and the Troubled Asset Relief Program (TARP),
and keeps the Secretary of the Treasury and Congress fully informed. Treasury OIG is comprised
of four divisions: (1) Office of Audit, (2) Office of Investigations, (3) Office of Counsel,
and (4) Office of Management. Treasury OIG is headquartered in Washington, DC, and has an
audit office in Boston, Massachusetts, and investigative offices in Greensboro, North Carolina;
Houston, Texas; and Jacksonville, Florida.

Treasury OIG has oversight responsibility for the Office of the Comptroller of the Currency
(OCC). OCC is responsible for approximately 891 national banks, 316 federal savings
associations, and 57 federal branches of foreign banks. The total assets under supervision are
$12.5 trillion. Treasury OIG also oversees four offices created by the Dodd-Frank Wall Street
Reform and Consumer Protection Act (Dodd-Frank) which are (1) the Office of Financial Research
(OFR), (2) the Federal Insurance Office, (3) the Office of Minority and Women Inclusion within
Treasury’s Departmental Offices (DO), and (4) the Office of Minority and Women Inclusion within
OCC. Additionally, Treasury OIG oversees Treasury’s role related to the financial solvency of
the Federal National Mortgage Association (Fannie Mae) and the Federal Home Loan Mortgage
Corporation (Freddie Mac) under the Housing and Economic Recovery Act of 2008 (HERA), to
include Treasury’s Senior Preferred Stock Purchase Agreements established for the purpose of
maintaining the positive net worth of both entities.

Treasury Management and Performance Challenges Related to Financial
Regulation and Economic Recovery

In accordance with the Reports Consolidation Act of 2000, the Treasury Inspector General
annually provides the Secretary of the Treasury with his perspective on the most serious
management and performance challenges facing the Department. In a memorandum to the Secretary
dated October 15, 2018, the Inspector General reported three management and performance
challenges that were directed towards financial regulation and economic recovery.

Those challenges are: Operating in an Uncertain Environment, Cyber Threats, and Anti-Money
Laundering and Terrorist Financing/Bank Secrecy Act Enforcement.15

Operating in an Uncertain Environment

The proposed budget cuts and new requirements imposed by Executive Order (EO) 13781,
Comprehensive Plan for Reorganizing the Executive Branch (March 13, 2017) create an uncertain
environment that affect Treasury’s operations. In its implementation of EO 13781 the Office of
Management and Budget (OMB) required agencies to submit Agency Reform Plans to OMB, which
included long-term workforce plans that are in alignment with their strategic plans. These
plans were to include proposals in four categories: eliminate activities; restructure or merge;
improve organizational efficiency and effectiveness; and workforce management. In June 2018,
after consideration of all Agency Reform Plans, OMB developed it comprehensive “Government-
wide Reform Plan and Reorganization Recommendations” (Government-wide Reform Plan) to
reorganize the Executive Branch.

The Government-wide Reform Plan includes a recommendation to transfer alcohol and tobacco
responsibilities from the Bureau of Alcohol, Tobacco, Firearms and Explosives within the
Department of Justice to Treasury’s Alcohol and Tobacco Tax and Trade Bureau (TTB) in order
to leverage the expertise of TTB. Other potential impacts on Treasury include OMB
recommendations to increase coordination and avoid duplication of agency’s roles in the areas
of small business programs, the housing finance market, and financial literacy and education.
Until OMB and agencies begin discussions with Congress to prioritize and refine the proposals
in the Government-wide Reform Plan, there is looming uncertainty as to the plan’s impact.
Nonetheless, the Department must plan for the potential long-term restricting of certain
functions or offices/bureaus and expected budget cuts.

Cyber Threats

Cybersecurity continues to be a long-standing and serious challenge facing the Nation today.
A reliable critical infrastructure, including information systems and networks, is vital to
our national security and economic stability. Cyber threats are a persistent concern as
Treasury’s information systems are critical to the core functions of government and the
Nation’s financial infrastructure. As cyber threats continue to evolve and become more
sophisticated and subtle, they pose an ongoing challenge for Treasury to fortify and safeguard
its internal systems and operations and the financial sector it oversees.

Attempted cyber attacks against Federal agencies, including Treasury, and financial
institutions are increasing in frequency and severity, in addition to continuously evolving.
Such attacks include distributed denial of service attacks, phishing or whaling attacks,
fraudulent wire payments, malicious spam (malspam), and ransomware. Organized hacking groups
leverage published and unpublished vulnerabilities and vary their methods to make attacks hard
to detect and even harder to prevent. Criminal groups and nation-states are constantly seeking
to steal information; commit fraud; and disrupt, degrade, or deny access to information systems.

Effective public-private coordination continues to be required to address the cyber threat
against the Nation’s critical infrastructure. In this regard, Treasury is looked upon to provide
effective leadership to financial institutions in particular, and the financial sector in
general, to strengthen awareness and preparedness against cyber threats. Anti-Money Laundering
and Terrorist Financing/Bank Secrecy Act Enforcement Identifying, disrupting, and dismantling
the financial networks that support terrorists, organized transnational crime, weapons of mass
destruction proliferators, and other threats to international security continue to be a challenge.
Treasury’s Office of Terrorism and Financial Intelligence (TFI) is dedicated to countering the
ability of terrorist organizations to support such activities through intelligence analysis,
sanctions, and international private-sector cooperation that identify donors, financiers, and
facilitators funding terrorist organizations.

Footnote: 15 The Treasury Inspector General’s memorandum included one other challenge not
directly related to financial regulation and economic recovery: Efforts to Promote Spending
Transparency and to Prevent and Detect Improper Payments. The memorandum also discussed concerns
about two matters: currency and coin production and excise tax reform. [End of footnote]

Disrupting terrorist financing depends on a whole-of-government approach and requires
collaboration and coordination within Treasury and with other Federal agencies. Effective
coordination and collaboration and TFI’s ability to effectively gather and analyze intelligence
information on financial crimes and terrorism requires a stable cadre of staff. TFI filled long
standing vacancies such as the Assistant Secretary of Intelligence and Analysis, which is a key
leadership position that had been vacant for approximately 2 years. Stability, experienced
leadership, and coordination within TFI is imperative to enhance information gathering and
intelligence analysis and increase efficiency.

Completed and In-Progress Work on Financial Oversight

OFR’s Procurement Activities – Contracts

We initiated an audit of OFR’s procurement activities. We reported that OFR effectively and
efficiently acquired goods and services to accomplish its mission and those acquisitions were
made in compliance with applicable procurement regulations. We did not make any recommendations
as a result of our audit; however, in light of OFR’s recent workforce restructuring efforts, we
encouraged the Acting Director to ensure the files of OFR’s contracting officer representatives
are maintained and accessible in the event of any changes in contracting officer representatives’
responsibilities.

OCC’s Supervision of Federal Branches of Foreign Banks (In Progress)

We initiated an audit of OCC’s supervision of federal branches of foreign banks. The objective of
this audit is to assess OCC’s supervision of federal branches and agencies of foreign banking
organizations operating in the United States.

OCC’s Supervision of Wells Fargo Bank (In Progress)

We initiated an audit of OCC’s supervision of Wells Fargo Bank’s sales practices. The objectives
of this audit are to assess (1) OCC’s supervision of incentive-based compensation structures within
Wells Fargo and (2) the timeliness and adequacy of OCC’s supervisory and other actions taken
related to Wells Fargo sales practices, including the opening of accounts.

OCC’s Supervision Related to De-risking by Banks (In Progress)

We initiated an audit of OCC’s supervisory impact on the practice of de-risking16 by banks. The
objectives of this audit are to determine (1) whether supervisory, examination, or other staff of
the OCC have indirectly or directly caused banks to exit a line of business or to terminate a
customer or correspondent account, and (2) under what authority OCC plans to limit, through
guidance, the ability of banks to open or close correspondent or customer accounts, including a
review of laws that govern account closings and OCC’s authority to regulate account closings.

OFR’s Hiring Practices (In Progress)

We initiated an audit of OFR’s hiring practices. The objective for this audit is to determine
whether OFR’s hiring practices are in accordance with Office of Personnel Management, Treasury,
OFR, and other Federal requirements.

OCC’s Controls over Purchase Cards (In Progress)

We initiated an audit of OCC’s controls over purchase cards. The objective for this audit is to
assess the controls in place over OCC’s purchase card use and identify any potential illegal,
improper, or erroneous transactions.

Footnote 16: The Financial Action Task Force defines de-risking as the termination or
restriction, by financial institutions, of business relationships with categories of customers.
[End of footnote]

OCC Human Capital Policies and Planning (In Progress)

We initiated an audit of OCC’s human capital policies and resource planning. The objective for
this audit is to determine whether OCC’s human capital policies and planning align with its
mission and strategic goals.

Failed Bank Reviews

In 1991, Congress enacted the Federal Deposit Insurance Corporation Improvement Act (FDICIA)
amending the Federal Deposit Insurance Act (FDIA). The amendments require that banking
regulators take specified supervisory actions when they identify unsafe or unsound practices
or conditions. Also added was a requirement that the Inspector General for the primary federal
regulator of a failed financial institution conduct a material loss review when the estimated
loss to the Deposit Insurance Fund is “material.” FDIA, as amended by Dodd-Frank, defines
the loss threshold amount to the Deposit Insurance Fund triggering a material loss review as
a loss that exceeds $50 million for 2014 and thereafter (with a provision to temporarily raise
the threshold to $75 million in certain circumstances). The act also requires a review of all
bank failures with losses under these threshold amounts for the purposes of (1) ascertaining
the grounds for appointing Federal Deposit Insurance Corporation (FDIC) as receiver and
(2) determining whether any unusual circumstances exist that might warrant a more in-depth
review of the loss. As part of the material loss review, OIG auditors determine the causes of
the failure and assess the supervision of the institution, including the implementation of
the prompt corrective action provisions of the act.17 As appropriate, OIG auditors also make
recommendations for preventing any such loss in the future.

From 2007 through March 2019, FDIC and other banking regulators closed 538 banks and federal
savings associations. One hundred and forty-two (142) of these were Treasury-regulated
financial institutions; in total, the estimated loss to FDIC’s Deposit Insurance Fund for
these failures was $36.4 billion. Of the 142 failures, 58 resulted in a material loss to
the Deposit Insurance Fund, and our office performed the required reviews of these failures.

During the period covered by this annual report, we completed a material loss review of
Washington Federal Bank for Savings (Washington Federal) located in Chicago, Illinois, whose
failure in December 2017 resulted in a loss to the Deposit Insurance Fund estimated at
$82.6 million. We determined that Washington Federal failed because of fraud18 in the bank’s
loan activity perpetrated by bank employees. The fraudulent activity depleted the bank’s
capital, with the result that the bank was insolvent and in an extremely unsafe or unsound
condition to transact business. Regarding supervision, we found that OCC generally performed
examinations of Washington Federal in accordance with laws, regulations and guidance; however,
we identified weaknesses in the execution of OCC’s supervision of the bank that led to missed
opportunities for timely enforcement actions related to the bank’s loan portfolio.
Specifically, we identified the following supervisory weaknesses: (1) the Supervisory Office
and Examiners-in-Charge (EIC) did not provide sufficient supervision of examination staff
comprised mainly of first-time Assistant Examiners-in-Charge (AEIC) and examiners with limited
experience; (2) examiner conclusions were contradicted by documentation in the OCC work papers;
(3) examiners did not act promptly to address significant weaknesses in the loan portfolio
reporting capability of the bank’s management information system; (4) examiners missed red
flags related to Washington Federal’s loan portfolio and resultantly did not timely expand the
core assessment minimum procedures; (5) examiners did not identify and did not report unsafe
or unsound practices that were contrary to agency guidance and bank policy related to the
appraisal program; and (6) examiners did not identify a lack of independence in the bank’s
lending or loan review function.

We recommended the Comptroller of the Currency: (1) assess the need for additional guidance
related to the supervision of non-commissioned examiners by the EIC and the Supervisory
Office including the need to require that supervision be documented; (2) revise examination
guidance to clarify the roles and responsibilities of an EIC in supervising an examination
team, with an emphasis on reviewing work papers and confirming that conclusions in work papers
are supported by the documentation; (3) reinforce to examiners and provide training where
necessary to ensure they understand: (a) the requirements of OCC Bulletin 2000-20 and the
importance of the bank maintaining sufficient loan portfolio reporting for extensions,
deferrals, renewals, and rewrites of closed-end loans; (b) that bank assurances made to
examiners regarding deficiencies being resolved should be viewed with skepticism unless
support for the assurances is provided and the examiner validates the effectiveness of the
bank’s corrective actions, especially when the deficiencies result in noncompliance with
regulation or law; (c) that expanded procedures are recommended when an examination team is
comprised of examiners in training positions and those with limited experience, including
AEICs; (d) that expanded procedures are recommended for banks, or examination areas, that
are consistently considered low risk; (e) the need to identify and report appraisal exceptions
as required by the Interagency Appraisal and Evaluation Guidelines; and (f ) the need to
identify and address issues of independence in small banks where employees or board members
are participating in more than one function or committee.

Footnote 17: Prompt corrective action is a framework of supervisory actions for insured
institutions that are not adequately capitalized. It was intended to ensure that action is
taken when an institution becomes financially troubled in order to prevent a failure or
minimize the resulting losses. These actions become increasingly severe as the institution
falls into lower capital categories. The capital categories are well-capitalized, adequately
capitalized, undercapitalized, significantly undercapitalized, and critically undercapitalized.
[End of footnote]

Footnote 18: The use of this term “fraud” comes from OCC’s finding in its Supervisory
Memorandum. As of the date of the issuance of this material loss review report (November 7,
2018), no criminal or civil judicial finding of fraud has been made and applied to the bank’s
activities[End of footnote]

[Cover page]

Council of Inspectors General on Financial Oversight

Top Management and Performance Challenges Facing Financial Regulatory Organizations

Approved July 2019

[Images of OIG seals: Board of Governors of the Federal Reserve System Consumer Financial
Protection Bureau, Commodity Futures Trading Commission, Federal Deposit Insurance
Corporation, Federal Housing Finance Agency, United States Department of Housing and
Urban Development, National Credit Union Administration, U.S. Securities and Exchange
Commission, Troubled Asset Relief Program, Treasury]

Top Management and Performance Challenges Facing Financial-Sector Regulatory Organizations

Council of Inspectors General on Financial Oversight

[End of Cover page]

EXECUTIVE SUMMARY

Purpose

The purpose of this report is to consolidate and provide insight into cross-cutting
management and performance challenges facing Financial-Sector Regulatory Organizations in
2019, as identified by members of CIGFO.

Approach

Following a review of 10 TMPC reports issued by CIGFO members, we synthesized the primary
areas of concern facing Financial-Sector Regulatory Organizations. We sought to identify
common insights within the financial sector.

CIGFO Members

• Department of the Treasury (Chair)

• Federal Deposit Insurance Corporation

• Federal Housing Finance Agency

• Commodity Futures Trading Commission

• Department of Housing and Urban Development

• Board of Governors of the Federal Reserve System and the Bureau of Consumer
Financial Protection

• National Credit Union Administration

• Securities and Exchange Commission

• Special Inspector General for the Troubled Asset Relief Program

The Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd- Frank Act)
established the Council of Inspectors General on Financial Oversight (CIGFO) to
oversee the Financial Stability Oversight Council (FSOC) and suggest measures to
improve financial oversight. FSOC has a statutory mandate that created collective
accountability for identifying risks and responding to emerging threats to U.S.
financial stability.

The Inspectors General within CIGFO report annually on the Top Management and
Performance Challenges (TMPC) facing their respective Financial-Sector Regulatory
Organizations. This is CIGFO’s second report reflecting the collective input from
the Inspectors General in CIGFO and identifying cross-cutting Challenges facing
multiple Financial-Sector Regulatory Organizations. This report reiterates the
six challenges from our 2018 report and includes an additional challenge for 2019
– Improving Contract and Grant Management.

• Enhancing Oversight of Financial Institution Cybersecurity

• Managing and Securing Information Technology at Regulatory Organizations

• Sharing Threat Information

• Ensuring Readiness for Crises

• Strengthening Agency Governance

• Managing Human Capital

• Improving Contract and Grant Management

It is important to address the Challenges in this report because financial- sector
activities – such as consumer and commercial banking, and funding, liquidity and
insurance services – were identified by the Department of Homeland Security,
Cybersecurity and Infrastructure Security Agency, as National Critical Functions.
Those functions are so vital to the United States that any disruption, corruption,
or dysfunction would have a debilitating effect on U.S. security, the national
economy, and/or public health and safety.

Although Financial-Sector Regulatory Organizations have individual missions, this
report emphasizes the importance of addressing challenges holistically through
coordination and information sharing. Considering issues on a whole-of-Government
approach versus a siloed, agency-by-agency basis allows for more effective and
efficient means to address Challenges through a coordinated approach.

By consolidating and reporting these Challenges, CIGFO aims to inform FSOC,
regulatory organizations, Congress, and the American public of the cross-cutting
Challenges facing the financial sector.

[End of EXECUTIVE SUMMARY]

TABLE OF CONTENTS

BACKGROUND AND OBSERVATIONS

CHALLENGE 1: ENHANCING OVERSIGHT OF FINANCIAL INSTITUTION CYBERSECURITY

CHALLENGE 2: MANAGING AND SECURING INFORMATION TECHNOLOGY AT REGULATORY ORGANIZATIONS

CHALLENGE 3: SHARING THREAT INFORMATION

CHALLENGE 4: ENSURING READINESS FOR CRISES

CHALLENGE 5: STRENGTHENING AGENCY GOVERNANCE

CHALLENGE 6: MANAGING HUMAN CAPITAL

CHALLENGE 7: IMPROVING CONTRACT AND GRANT MANAGEMENT

CONCLUSION

APPENDIX 1: ABBREVIATIONS AND ACRONYMS

APPENDIX 2: METHODOLOGY .

[End of TABLE OF CONTENTS]

BACKGROUND AND OBSERVATIONS

The Dodd-Frank Act established CIGFO to oversee FSOC and suggest measures to
improve financial oversight. FSOC has a statutory mandate that established
collective accountability for identifying risks and responding to emerging
threats to U.S. financial stability.

CIGFO meets regularly to facilitate the sharing of information among Inspectors
General, with a focus on concerns that affect the financial sector and ways to
improve financial oversight. CIGFO publishes an annual report that describes
the concerns and recommendations of each Inspector General and a discussion of
ongoing and completed oversight work. Additionally, Congress authorized CIGFO
to convene working groups to evaluate FSOC’s effectiveness and internal
operations.

CIGFO members include the Inspectors General of the Department of the Treasury,
the Federal Deposit Insurance Corporation, the Commodity Futures Trading
Commission, the Department of Housing and Urban Development, the Board of
Governors of the Federal Reserve System and the Bureau of Consumer Financial
Protection, the Federal Housing Finance Agency, the National Credit Union
Administration, the Securities and Exchange Commission, and the Special
Inspector General for the Troubled Asset Relief Program. CIGFO members
oversee one or more Financial-Sector Regulatory Organizations, as shown in
Figure 1.

Figure 1: CIGFO Membership & Oversight Responsibilities

Table

Row 1;
CIGFO MEMBERSHIP: Department of the Treasury (Chair);
OVERSIGHT OF FINANCIAL- SECTOR REGULATORY ORGANIZATIONS: • Department of the
Treasury • Office of the Comptroller of the Currency;

Row 2;
CIGFO MEMBERSHIP: Federal Deposit Insurance Corporation;
OVERSIGHT OF FINANCIAL- SECTOR REGULATORY ORGANIZATIONS: Federal Deposit
Insurance Corporation;

Row 3;
CIGFO MEMBERSHIP: Commodity Futures Trading Commission;
OVERSIGHT OF FINANCIAL- SECTOR REGULATORY ORGANIZATIONS: Commodity Futures
Trading Commission;

Row 4;
CIGFO MEMBERSHIP: Department of Housing and Urban Development;
OVERSIGHT OF FINANCIAL- SECTOR REGULATORY ORGANIZATIONS: Department of Housing
and Urban Development;

Row 5;
CIGFO MEMBERSHIP: Board of Governors of the Federal Reserve System and Bureau of
Consumer Financial Protection;
OVERSIGHT OF FINANCIAL- SECTOR REGULATORY ORGANIZATIONS: • Board of Governors of
the Federal Reserve System • Bureau of Consumer Financial Protection;

Row 6;
CIGFO MEMBERSHIP: Federal Housing Finance Agency;
OVERSIGHT OF FINANCIAL- SECTOR REGULATORY ORGANIZATIONS: Federal Housing Finance
Agency;

Row 7;
CIGFO MEMBERSHIP: National Credit Union Administration;
OVERSIGHT OF FINANCIAL- SECTOR REGULATORY ORGANIZATIONS: National Credit Union
Administration;

Row 8;
CIGFO MEMBERSHIP: Securities and Exchange Commission;
OVERSIGHT OF FINANCIAL- SECTOR REGULATORY ORGANIZATIONS: Securities and Exchange
Commission;

Row 9;
CIGFO MEMBERSHIP: Special Inspector General for the Troubled Asset Relief Program;
OVERSIGHT OF FINANCIAL- SECTOR REGULATORY ORGANIZATIONS: Special Inspector General
for the Troubled Asset Relief Program;

[End of table]

[End of Figure 1: CIGFO Membership & Oversight Responsibilities]

The Inspectors General within CIGFO, as well as the Inspectors General of other
agencies, annually identify what they consider to be the TMPCs facing their
agency. Each Inspector General’s TMPCs generally appear in the host Agency’s
annual performance and accountability report under the Reports Consolidation
Act of 2000.

On March 26, 2019, CIGFO approved a motion to compile a report identifying the top
Challenges facing Financial-Sector Regulatory Organizations. The Federal Deposit
Insurance Corporation (FDIC) Office of Inspector General (OIG) led the working
group to conduct this analysis and compile this report.

This CIGFO report reflects the collective input from the nine CIGFO Member
Inspectors General and identifies cross-cutting Challenges facing multiple
Financial-Sector Regulatory Organizations. The report reiterates the six
challenges from our September 2018 report, Top Management and Performance
Challenges Facing Financial Regulatory Organizations, with an additional
Challenge for 2019 – Improving Contract and Grant Management.

• Enhancing Oversight of Financial Institution Cybersecurity

• Managing and Securing Information Technology at Regulatory Organizations

• Sharing Threat Information

• Ensuring Readiness for Crises

• Strengthening Agency Governance

• Managing Human Capital

• Improving Contract and Grant Management

This report identifies significant financial-sector cybersecurity challenges.
Financial-Sector Regulatory Organizations are faced with responsibilities to
protect the information held by their respective agencies against cyber attacks,
and to ensure that financial institutions and their third-party service providers
have processes in place to mitigate cyber risks. Financial-Sector Regulatory
Organizations must take a holistic, financial sector-wide view to address
cybersecurity threats because a security incident for any participant has the
possibility of infecting the entire financial sector.

Identifying threats, such as cyber risk and other vulnerabilities, requires the
sharing of information among Government agencies and throughout the entire
financial sector. Financial-Sector Regulatory Organizations face challenges to
ensure effective gathering, analysis, and sharing of timely and actionable threat
information. Absent such threat information, financial sector participants may
not have a full understanding of the risks. This could result in informational
gaps that can negatively impact risk mitigation and supervisory strategies and/or
the financial sector. Financial-Sector Regulatory Organizations must also mitigate
risks and stand ready when necessary to address threats that may escalate into a
crisis. This report observes that Financial-Sector Regulatory Organizations must
ensure that plans and resources are in place to address such crises.

Financial-Sector Regulatory Organizations also face Challenges to govern their
internal operations. Controls should be in place to manage Financial-Sector
Regulatory Organizations appropriately, including ensuring a sufficient workforce
with skillsets to achieve organization missions. Further, controls should be in
place to manage contract and grant funding so that organizations receive
appropriate goods and services and grantees use funds as prescribed by statute
and regulation.

Although Financial-Sector Regulatory Organizations have individual missions, this
report emphasizes the importance of addressing challenges holistically through
coordination and information sharing. Considering issues on a whole-of-Government
approach versus a siloed, agency-by-agency basis allows for more effective and
efficient means to address challenges through a coordinated approach. By
consolidating and reporting these Challenges, CIGFO aims to inform FSOC,
regulatory organizations, Congress, and the American public of the cross-
cutting Challenges facing the financial sector.

[End of BACKGROUND AND OBSERVATIONS]

CHALLENGE 1: ENHANCING OVERSIGHT OF FINANCIAL INSTITUTION CYBERSECURITY

Cybersecurity continues to be a critical risk facing the financial sector. FSOC
recognized in its December 2018 Annual Report that as financial institutions
increase their reliance on technology, there is an increased risk that a
cybersecurity event could have “severe negative consequences, potentially
entailing systemic implications for the financial sector and the U.S. economy.”1
The Office of the Comptroller of the Currency (OCC) echoed this sentiment in its
Semiannual Risk Perspective (Fall 2018), finding that cybersecurity threats
“target operational vulnerabilities that could expose large quantities of
personally identifiable information (PII)2 and proprietary intellectual property,
facilitate misappropriation of funds and data at the retail and wholesale levels,
corrupt information, and disrupt business activities.”3

Footnote 1: The Dodd-Frank Wall Street Reform and Consumer Protection Act of
2010 established FSOC, which has responsibility for identifying risks and
responding to emerging threats to financial stability. FSOC brings together
the expertise of Federal financial regulators, an independent insurance expert,
and state regulators. [End of footnote]

Footnote 2: According to OMB Memorandum 07-16, Safeguarding Against and
Responding to the Breach of Personally Identifiable Information, the term
PII refers to information that can be used to distinguish or trace an
individual's identity, such as their name, Social Security Number, biometric
records, etc. alone, or when combined with other personal or identifying
information that is linked or linkable to a specific individual, such as
date and place of birth, mother’s maiden name, etc. [End of footnote]

Footnote 3: OCC Semiannual Risk Perspective (Fall 2018). [End of footnote]

In February 2018, the White House Council of Economic Advisors estimated that
the United States economy loses between $57 and $109 billion per year to
malicious cyber activity. Cyberattacks—such as distributed denial of service
and ransomware—may be global in nature and have disrupted financial services
in several countries around the world.4 Verizon Communications’ 2019 annual
review of global data breaches across multiple sectors, including the
financial sector, reported that there were more than 41,000 security incidents
and 2,000 data breaches across 65 countries between April 2018 and April
2019.5 This review also found that cyberattacks happen very quickly, with
breaches occurring within seconds, and breach discovery taking months.

Footnote 4: World Bank Group, Financial Sector’s Cybersecurity: Regulations
and Supervision (2018). [End of footnote]

Footnote 5: Verizon Communications Inc., 2019 Verizon Communications Data
Breach Investigations Report, 11th Edition (April 2019). [End of footnote]

A 2018 study by the U.S. Chamber of Commerce and FICO (Fair Isaac
Corporation) evaluated the cyber risk at 2,574 U.S. firms across 10
sectors, including the financial sector. This study provided cybersecurity
ranking scores from 300 (high risk) to 850 (low risk) for each sector as
well as a national average. The cyber risks faced by the finance and banking
sector exceeded eight other sectors and the national average, as shown in
Figure 2.

Figure 2: Cyber Risk Scores Across Ten Sectors

Agriculture & Food 671,

Business Services 704,

Construcion 764,

Energy & Utilities 707,

Finance and Banking 642,

Transportation 709,

Retail and Consumer Services 697,

Media Telecom Tech 619,

Materials & Manufacturing 672,

Health Care 679.

[End of Figure 2: Cyber Risk Scores Across Ten Sectors]

Financial-Sector Regulatory Organizations are responsible for examining financial
institutions to identify Information Technology (IT) risks. The Interagency
Guidelines Establishing Information Security Standards for bank regulators
states that an insured financial institution must “implement a comprehensive
written information security program that includes administrative, technical,
and physical safeguards appropriate to the size and complexity of the institution
and the nature and scope of its activities.”6 Most Financial-Sector Regulatory
Organizations7 conduct IT examinations using the Uniform Rating System for
Information Technology created by the Federal Financial Institutions Examination
Council (FFIEC).8 The primary purpose of the rating system is to assess risks
introduced by IT at institutions and service providers, and to identify those
institutions requiring supervisory attention.9 When examinations identify risks
and weak management practices at institutions, regulators may use enforcement
procedures to address such risks.

Footnote 6: See 12 C.F.R. Part 364, Appendix B and 12 C.F.R. Part 748. The FDIC,
OCC, and Board of Governors of the Federal Reserve issued the Interagency
Guidelines Establishing Information Security Standards. [End of footnote]

Footnote 7: The National Credit Union Administration does not use the Uniform
Rating System for Information Technology. [End of footnote]

Footnote 8: The FFIEC was established on March 10, 1979, pursuant to title X
of the Financial Institutions Regulatory and Interest Rate Control Act of 1978,
Public Law 95-630. The Council is an interagency body empowered to prescribe
uniform principles, standards, and report forms for the federal examination of
financial institutions by the Board of Governors of the Federal Reserve System,
the FDIC, the National Credit Union Administration, the OCC, and the Bureau of
Consumer Financial Protection and to make recommendations to promote uniformity
in the supervision of financial institutions.[End of footnote]

Footnote 9: FFIEC, Uniform Rating System for Information Technology, 64 Fed.
Reg. 3109 (January 20, 1999). [End of footnote]

CIGFO members identified Challenges to keep pace with the changing cybersecurity
landscape. The Federal Housing Finance Agency (FHFA) OIG identified that the
FHFA will be challenged to design and implement supervisory activities for the
financial institutions it supervises. Specifically, the FHFA must ensure that
cybersecurity examination modules are updated in response to changes in the
cybersecurity environment. The FHFA must also recruit and retain a complement
of examiners with the experience and expertise needed to conduct IT examinations,
and ensure those examiners have ongoing training. Similarly, the Board of
Governors of the Federal Reserve System (Federal Reserve Board) and Bureau of
Consumer Financial Protection (Bureau) OIG noted that the Federal Reserve Board
is challenged to ensure that supervised financial institutions manage and
mitigate the risks and vulnerabilities of cyberattacks. The Federal Reserve
Board should ensure that its supervisory approaches keep pace with evolving
cybersecurity threats.

The FDIC OIG also identified cybersecurity as a significant challenge to FDIC-
supervised institutions. The FDIC must ensure the effectiveness and efficiency
of its IT examination work programs. One example would be using data to review
and understand cybersecurity risks across all institutions. The FDIC is also
challenged to have the appropriate number of IT examiners and to keep its
examination staff skillsets up-to-date given the increasing complexity and
sophistication of IT environments at banks. Similarly, the National Credit
Union Administration (NCUA) OIG also noted cybersecurity as a continued and
significant challenge to the stability and soundness of the credit union
industry. The NCUA OIG believes the NCUA must acquire and deploy resources
to enhance its oversight capabilities to maintain safety and soundness.

Financial institutions face increased cybersecurity risk through inter-
connections with financial technology companies. The Group of Twenty’s
Financial Stability Board defined financial technology as “innovation that
could result in new business models, applications, processes, or products
with an associated material effect on financial markets and institutions
and the provision of financial services.”10 Financial technology innovation
includes, for example, mobile wallets, digital currencies, and digital
financial advice.11 The rapid pace of financial technology is being driven
by capital investment, demand for speed and convenience, and
digitization.12 According to the Department of the Treasury (Treasury
Department), from 2010 to 2017, more than 3,330 new technology companies
were formed to serve the financial industry.13 The Treasury Department
also estimated that one-third of online U.S. consumers use at least two
financial technology services—including financial planning, savings and
investment, online borrowing, or some form of money transfer and
payment.14 Further, KPMG estimated that global investment in financial
technology was $57.9 billion in just the first 6 months of 2018.15

Footnote 10: Financial Stability Implications from FinTech, Supervisory
and Regulatory Issues That Merit Authorities’ Attention, (June 27, 2017).
The Financial Stability Board (FSB) was chartered by the Group of Twenty
(G20) on September 25, 2009. The G20 Members include Argentina, Australia,
Brazil, Canada, China, France, Germany, India, Indonesia, Italy, Japan,
Republic of Korea, Mexico, Russia, Saudi Arabia, South Africa, Turkey,
the United Kingdom, the United States, and the European Union (plus Hong
Kong, Singapore, Spain, and Switzerland). The FSB charter aims to promote
global financial stability by coordinating the development of regulatory,
supervisory and other financial-sector policies and conducts outreach to
non-member countries. The G20 members represent about two-thirds of the
world’s population, 85 percent of global gross domestic product, and over
75 percent of global trade. [End of footnote]

Footnote 11: Basel Committee on Banking, Sound Practices – Implications
of Fintech Developments for Banks and Bank Supervisors (February 2018).
[End of footnote]

Footnote 12: Department of the Treasury, A Financial System that Creates
Economic Opportunities: Nonbank Financials, Fintech, and Innovation (July
2018); Basel Committee on Banking, Sound Practices – Implications of
Fintech Developments for Bank and Bank Supervisors (February 2018). [End
of footnote]

Footnote 13: A Financial System That Creates Economic Opportunities:
Nonbank Financials, Fintech, and Innovation (July 2018). [End of footnote]

Footnote 14: A Financial System That Creates Economic Opportunities:
Nonbank Financials, Fintech, and Innovation (July 2018). [End of footnote]

Footnote 15: KPMG, The Pulse of Fintech 2018: Biannual Global Analysis of
Investment in Fintech (July 2018). KPMG is a professional services company.
[End of footnote]

Financial technology companies are interconnected with IT systems at banks,
yet these technology companies may not be subjected to regulatory requirements
for safety and soundness and may not be examined by financial regulators.
Certain banks reported that between 20 and 40 percent of online banking
logins are attributable to financial technology companies, and many banks
represented that they cannot distinguish among computer logins, as to whether
they originate from consumers, data aggregators, or even malicious actors.16
IT system interconnections may provide a pathway for a cybersecurity incident
at a financial technology company to infect the banking system.

Footnote 16: Lael Brainard, Member, Board of Governors of the Federal Reserve
System, Where Do Banks Fit in the Fintech Stack? Remarks delivered at the
Northwestern Kellogg Public-Private Interface Conference on “New Developments
in Consumer Finance: Research & Practice” (April 29, 2017). [End of footnote]

Additionally, when financial institutions have multiple financial technology
services and relationships, they face ambiguity and uncertainty as to the
applicability of certain privacy rules, the Bank Secrecy Act provisions and
regulations, and Anti-Money Laundering standards. Banks and credit unions
may be unsure as to whether they or the service provider must comply with
rules, regulations, and requirements. Moreover, financial institutions face
challenges to have sufficient skilled staff and capabilities to monitor
these risks and operations of financial technology companies.

The FDIC OIG stated that the FDIC faces challenges to ensure that banks have
proper governance and risk management practices around these technologies.
The FDIC may need to increase training and adjust staffing to ensure that
examiners have the skills to effectively supervise the risks involved with
new technology. Further, the FDIC may need to modify examination policies
and procedures that pre-date financial innovation to improve supervision of
financial innovation risk. The NCUA OIG stated that the NCUA faces
significant challenges with technology-driven changes in the financial
landscape that could potentially impact the safety and soundness of the
credit union system and the Share Insurance Fund. The NCUA OIG believes
it is imperative that the NCUA’s examination and supervision program
continues to evolve with emerging financial technologies that represent
not only risks, but also opportunities to the credit union system.

Mitigating Third-Party Service Provider Risk

Banks and credit unions frequently hire third-party Technology Service
Providers (TSP) to perform operational functions on behalf of the financial
institution—such as IT operations and business product lines. TSPs may
further sub-contract services to other vendors. According to the OCC, banks
are increasingly reliant upon TSPs and sub-contractors, and such dependence
creates a high level of risk for the banking industry.17 The OCC indicates
that TSPs are increasingly targets for cybercrimes and espionage and may
provide avenues for bad actors to exploit a bank’s systems and operations.
For example, on December 20, 2018, the Department of Justice announced that
two Chinese nationals were charged with computer intrusion offenses harming
more than 45 service providers whose clients included the banking and finance
industry and the U.S. Government. The hackers targeted service providers in
order to gain unauthorized access to the computer networks of their clients
and steal intellectual property and confidential business information.18

Footnote 17: The FFIEC described the term TSP to include “independent third
parties, joint venture/limited liability corporations, and bank and credit
union service corporations that provide processing services to financial
institutions.” Supervision of Technology Service Providers, FFIEC IT
Examination Handbook InfoBase. [End of footnote]

Footnote 18: Department of Justice Press Release, Two Chinese Hackers
Associated With the Ministry of State Security Charged with Global Computer
Intrusion Campaigns Targeting Intellectual Property and Confidential
Business Information (December 20, 2018). [End of footnote]

A financial institution must manage the interconnections, system interfaces,
and systems access of TSPs and sub-contractors and must implement appropriate
controls.19 Significant consolidation among TSPs caused large numbers of banks
to rely on a few large service providers for core systems and operations
support.20 As a result, a cybersecurity incident at one TSP has the potential
to affect multiple financial institutions.21 A financial institution’s Board
of Directors and senior managers are responsible for the oversight of
activities conducted by a TSP on their behalf to the same extent as if the
activity were handled within the institution.22

Footnote 19: OCC Semiannual Risk Perspective (Spring 2018). [End of footnote]

Footnote 20: OCC Semiannual Risk Perspective (Spring 2018).  [End of footnote]

Footnote 21: OCC Semiannual Risk Perspective (Spring 2018). [End of footnote]

Footnote 22: Financial Institution Letter 44-2008, Guidance for Managing
Third-Party Risk (June 6, 2008). [End of footnote]

The Federal Reserve Board and Bureau OIG identified the need for the Federal
Reserve Board to enhance its oversight of firms that provide technology
services to supervised institutions. Specifically, the Federal Reserve Board
can enhance its oversight by implementing an improved governance structure
and providing additional guidance to examination teams on the supervisory
expectations for such firms. The FDIC OIG also noted challenges with FDIC-
supervised institutions’ oversight of the TSPs with whom they do business.
The FDIC must ensure that supervised financial institutions assess TSP
cybersecurity risks, including due diligence of cybersecurity contract terms.

Financial-Sector Regulatory Organizations play a vital role in addressing
financial institutions’ cybersecurity risk which, if left unchecked, could
threaten the safety and soundness of institutions as well as the stability
of the financial system. Financial-Sector Regulatory Organizations must
ensure that IT examinations assess how financial institutions manage cyber-
security risks, including risks associated with TSPs and new financial
technology, and address such risks through effective supervisory strategies.

[End of CHALLENGE 1: ENHANCING OVERSIGHT OF FINANCIAL INSTITUTION CYBERSECURITY]

CHALLENGE 2: MANAGING AND SECURING INFORMATION TECHNOLOGY AT REGULATORY
ORGANIZATIONS

In March 2019, the Government Accountability Office (GAO) identified
securing Federal systems and information as a high-risk area in need of
significant attention.23 An Office of Management and Budget (OMB) and
Department of Homeland Security (DHS) review of Federal cybersecurity
capabilities at 96 civilian agencies across 76 metrics found that 74
percent (71 agencies) had cybersecurity programs that were either “At
Risk” or “High Risk.24 Further, the Government sector represented a
total of 56 percent of the over 41,000 cybersecurity incidents
identified by Verizon Communications in its 2019 annual review of
global data breaches across multiple sectors.25

Footnote 23: U.S. Government Accountability Office, High-Risk Series:
Substantial Efforts Needed to Achieve Greater Progress on High-Risk Areas,
GAO-19-157SP (March 2019). [End of footnote]

Footnote 24: Federal Cybersecurity Risk Determination Report and Action
Plan (May 2018). “At Risk” meant that some essential policies, processes,
and tools were in place to mitigate overall cybersecurity risk, but
significant gaps remained; while “High Risk” meant that fundamental cyber-
security policies, processes, and tools were either not in place or not
deployed sufficiently. [End of footnote]

Footnote 25: Verizon Communications Inc., 2019 Verizon Communications Data
Breach Investigations Report, 11th Edition (April 2019). [End of footnote]

Financial-Sector Regulatory Organizations’ IT systems house commercially
valuable and market sensitive information. For example, the Securities and
Exchange Commission (SEC) OIG reported that the SEC’s e-Discovery program
alone is approaching one petabyte of data.26 Financial-Sector Regulatory
Organizations may also house significant amounts of personally identifiable
information for bank and credit union officials, depositors, and borrowers.
Without proper safeguards, those IT systems are vulnerable to individuals
and groups with malicious intentions who can intrude and use their access
to obtain sensitive information, commit fraud and identify theft, disrupt
operations, or launch attacks against other computer systems and networks.
Further, interconnections among Financial-Sector Regulatory Organizations
and other Federal and state government agencies or private-sector
institutions increase the likelihood of contagion in which a cybersecurity
incident occurring anywhere within the systems may negatively impact the
entire financial system.27

Footnote 26: One petabyte of data is roughly the equivalent to the amount
that can be stored in about 20 million four-drawer filing cabinets. U.S.
Government Accountability Office, Military Base Realignments and Closures:
The National Geospatial-Intelligence Agency’s Technology Center Construction
Project, GAO-12-770R, (June 29, 2012). [End of footnote]

Footnote 27: Financial Services Sector-Specific Plan 2015 issued jointly
among the Department of the Treasury, Department of Homeland Security,
and the Financial Services Sector Coordinating Council. [End of footnote]

Securing IT from Evolving Threats

According to the GAO, risks to Federal IT systems are increasing.28 Threats
to Federal IT systems include those from witting or unwitting employees as
well as global threats from nation states.29 Federal agencies must develop,
document, and implement department- and agency-wide information security
programs to protect information and information systems.30 Federal agencies
use a common framework developed by the National Institute of Standards and
Technology to manage their cyber risk.31

Footnote 28: GAO, Cybersecurity Challenges Facing the Nation – High Risk
Issue. [End of footnote]

Footnote 29: Worldwide Threat Assessment of the US Intelligence Community,
January 29, 2019 [End of footnote]

Footnote 30: Federal Information Security Modernization Act of 2014,
Public Law No. 113-283. [End of footnote]

Footnote 31: Executive Order 13800, Strengthening the Cybersecurity of
Federal Networks and Critical Infrastructure, May 11, 2017. [End of footnote]

The Department of Housing and Urban Development (HUD) OIG recognized that
HUD faces challenges in the management and oversight of its IT systems. HUD
has demonstrated an inability to incorporate Federally mandated requirements
and key practices into effective operational management of its IT systems.
Persistent IT management challenges have affected HUD’s ability to manage and
oversee key programs. As a result, IT systems vulnerabilities that could lead
to breaches exist within HUD’s IT environment. Since 2007, HUD OIG has made
483 recommendations to HUD management to address IT challenges and 197 of
those recommendations remain open or unresolved.

The FDIC OIG found that the FDIC must continue to strengthen its
implementation of governance and security controls around its IT systems to
ensure proper safeguarding of information. The FDIC OIG identified security
control weaknesses that limited the effectiveness of the FDIC’s information
security program and practices and placed the confidentiality, integrity,
and availability of the FDIC’s information systems and data at risk. For
example, the FDIC had not fully defined or implemented an enterprise-wide
and integrated approach to identifying, assessing, and addressing the full
spectrum of internal and external risks, including those related to cyber
-security and the operation of information systems.

The Federal Reserve Board and Bureau OIG noted that the Federal Reserve
Board’s decentralized IT services results in an incomplete view of security
risks facing the agency as a whole, which impacts the implementation of
an effective information security program. The Federal Reserve Board also
faces challenges in implementing agency-wide processes for managing
vulnerabilities and software inventories. The Federal Reserve Board and
Bureau OIG also found that the Bureau faces challenges in centralizing
and automating processes to better manage insider risks; ensuring that
automated feeds from all systems, including contractor-operated systems,
feed into the Bureau’s security information and event management tool; and
aligning its information security program, policies, and procedures with
the agency’s evolving enterprise risk management program.

The Treasury Department OIG noted challenges with the mitigation of
risks to the Treasury Department’s IT systems posed by interconnection
agreements with other Federal, State, and local agencies as well as third-
party cloud service providers. Similarly, the FHFA OIG found that the
FHFA needs to ensure that access to its internal and external online
collaborative environment is restricted to those with a need for the
information.

The SEC OIG also noted that the SEC must mature its IT security programs
to minimize risks of unauthorized disclosure, modification, use, and
disruption of the SEC’s non-public information. Specifically, the SEC can
improve its management of IT risks, including access, continuous monitoring,
and incident management. Further, the SEC could better manage information
security risks of outside expert services contractors who have access to
sensitive, non-public information.

Modernizing IT Systems

Some Financial-Sector Regulatory Organizations are relying on systems that
are outdated, cannot be adapted to handle increasingly complex tasks, and
are no longer supported by vendors. According to the GAO, use of such systems
increases the vulnerability of unauthorized access to the information within
those systems.32

Footnote 32: U.S. Government Accountability Office, Information Security:
SEC Improved Control of Financial Systems but Needs to Take Additional Actions,
GAO-17-469 (July 2017). [End of footnote]

HUD OIG reported that HUD is using aging technology for most of its
operations – technology that was implemented dating back to 1974. Many of
HUD’s systems remain at risk of failure or exploitation because critical
vendor fixes or updates are no longer available. That situation increases
the risk of possible HUD data breaches. Further, HUD’s legacy systems are
very costly to maintain because of the specialized skills and support needed
to operate them. Over the last 5 years, HUD spent on average 70 to 95 percent
of its $280 million annual IT budget on operations and maintenance.

Similarly, the U.S. Commodity Futures Trading Commission (CFTC) OIG
identified that the CFTC faces challenges because it has not formalized IT
capital planning. Specifically, the CFTC has not established accountabilities
to eliminate manual-intensive legacy systems, reduce high-cost IT functions,
and adopt a modern IT infrastructure. CFTC OIG noted that IT modernization
efforts could yield cost savings and technological efficiencies during
periods of fiscal austerity.

The Treasury Department OIG also noted the impact of uncertain budgetary
funding on the Treasury Department’s IT modernization efforts. The Treasury
Department is challenged to balance cybersecurity requirements with
expenditures for the modernization and maintenance of existing Treasury
Department IT systems.

Enhancing the IT Security Workforce

According to the GAO, “a key component of mitigating and responding to cyber
threats is having a qualified, well-trained cybersecurity workforce.”33 The
GAO has identified, however, that there are cybersecurity workforce skills
gaps across the Federal Government.34

Footnote 33: U.S. Government Accountability Office, Cybersecurity Workforce:
Agencies Need to Improve Baseline Assessments and Procedures for Coding
Positions, GAO-18-466 (June 2018). [End of footnote]

Footnote 34: U.S. Government Accountability Office, High-Risk Series:
Substantial Efforts Needed to Achieve Greater Progress on High-Risk Areas,
GAO-19-157SP (March 2019). [End of footnote]

CIGFO members identified mission challenges related to cybersecurity skills
gaps. The Treasury Department OIG found that many IT security measures lacked
adequate cybersecurity resources and/or management oversight. Similarly, HUD
OIG noted that the maintenance of many of HUD’s systems requires specialized
skills. HUD OIG further noted that turnover among senior leadership and
resource constraints hindered the completion of three IT modernization
projects totaling approximately $370 million.

Cybersecurity threats against Government agencies continue to increase.
Financial-Sector Regulatory Organizations must remain vigilant in their
efforts to institute necessary controls and properly protect the information
entrusted to them.

[End of CHALLENGE 2: MANAGING AND SECURING INFORMATION TECHNOLOGY AT
REGULTORY ORGANIZATIONS]

CHALLENGE 3: SHARING THREAT INFORMATION

On November 16, 2018, the President signed into law the Cybersecurity and
Infrastructure Security Agency Act of 2018 (Act). The Act established the
Cybersecurity and Infrastructure Security Agency (CISA) within the DHS to,
among other things, make the United States cyber and physical infrastructure
more secure by sharing information at all levels of Government and the
private and non-profit sectors.35

Footnote 35: Cybersecurity and Infrastructure Security Act of 2017, House
Report 115-454, 115th Congress, December 11, 2017. [End of footnote]

On April 30, 2019, the CISA published a list of National Critical Functions,
which were defined as, “[t]he functions of government and private sector so
vital to the United States that their disruption, corruption, or dysfunction
would have a debilitating effect on security, national economic security,
national public health or safety, or any combination thereof.”36 The provision
of consumer and commercial banking, funding and liquidity services,
and insurance services were included on the list of National Critical
Functions.37 Rather than relying on prior, sector-specific or asset-based
risk identification, the National Critical Functions construct looks across
sectors to provide a holistic approach to capture risks and dependencies within
and across sectors.38 As shown in Figure 3, the National Critical
Functions are presented in four overarching areas – connect, distribute,
manage, and supply.

Footnote 36: National Critical Functions – An Evolved Lens for Critical
Infrastructure and Security Resilience, DHS Cybersecurity and Infrastructure
Security Agency, April 30, 2019. [End of footnote]

Footnote 37: National Critical Functions – An Evolved Lens for Critical
Infrastructure and Security Resilience, DHS Cybersecurity and Infrastructure
Security Agency, April 30, 2019. [End of footnote]

Footnote 38: National Critical Functions – An Evolved Lens for Critical
Infrastructure and Security Resilience, DHS Cybersecurity and Infrastructure
Security Agency, April 30, 2019. [End of footnote]

Figure 3: National Critical Functions

National Critical Functions Set

Critical Function - CONNECT:

• Operate Core Network

• Provide Cable Access Network Services

• Provide Internet Based Content, Information, and Communication Services.

• Provide Internet Routing, Access, and Connection Services

• Provide Positioning, Navigation, and Timing Services

• Provide Radio Broadcast Access Network Services

• Provide Satellite Access Network Services

• Provide Wireless Access Network Services

• Provide Wireline Access Network Services

Critical Function - DISTRIBUTE:

• Distribute Electricity

• Maintain Supply Chains

• Transmit Electricity

• Transport Cargo and Passengers by Air

• Transport Cargo and Passengers by Rail

• Transport Cargo and Passengers by Road

• Transport Cargo and Passengers by Vessel

• Transport Materials by Pipeline

• Transport Passengers by Mass Transit

Critical Function - MANAGE:

• Conduct Elections

• Develop and Maintain Public Works and Services

• Educate and Train

• Enforce Law

• Maintain Access to Medical Records

• Manage Hazardous Materials

• Manage Wastewater

• Operate Government

• Perform Cyber Incident Management Capabilities

• Prepare for and Manage Emergencies

• Preserve Constitutional Rights

• Protect Sensitive Information

• Provide and Maintain Infrastructure

• Provide Capital Markets and Investment Activities

• Provide Consumer and Commercial Banking Services

• Provide Funding and Liquidity Services

• Provide Identity Management and Associated Trust Support Services

• Provide Insurance Services

• Provide Medical Care

• Provide Payment, Clearing, and Settlement Services

• Provide Public Safety

• Provide Wholesale Funding

• Store Fuel and Maintain Reserves

• Support Community Health

Critical Function - SUPPLY:

• Exploration and Extraction Of Fuels

• Fuel Refining and Processing Fuels

• Generate Electricity

• Manufacture Equipment

• Produce and Provide Agricultural Products and Services

• Produce and Provide Human and Animal Food Products and Services

• Produce Chemicals

• Provide Metals and Materials

• Provide Housing

• Provide Information Technology Products and Services

• Provide Materiel and Operational Support to Defense Research and Development

• Supply Water

Source: Cybersecurity and Infrastructure Security Agency

[End of Figure 3: National Critical Functions]

One key focus of the CISA and the National Critical Functions is collecting
and sharing information, including informing intelligence collection
requirements.39 FSOC noted, in its 2018 Annual Report, the critical
importance to the financial sector of sharing timely and actionable
threat information among the Federal Government and the private sector.
FSOC stated that Federal agencies should consider how to share information
and when possible “declassify (or downgrade classification) of information
to the extent practicable, consistent with national security needs.”40
The GAO also identified various sources of threat information that could
be shared with financial institutions. Figure 4 illustrates how the GAO
captured threat information flows from multiple sources.

Footnote 39: National Critical Functions – An Evolved Lens For Critical
Infrastructure Security and Resilience, Cybersecurity and Infrastructure
Security Agency, National Risk Management Center, April 30, 2019. [End of
footnote]

Footnote 40: FSOC 2018 Annual Report. [End of footnote]

Figure 4: Sources of Threat Information for Financial Institutions

Figure 1: Sources of Threat information for Financial Institutions

[Figure depicting information flow to and/or from Depository Institution]

Entity: Blogs Information Source: Open Information Flow: To

Entity: Media Reports Information Source: Open Information Flow: To

Entity: Security Researchers Information
Source: Open Information Flow:
To Depository Institution

Entity: RSS aggregators Information
Source: Open Information Flow: To
Depository Institution

Entity: Bulletin baords/forums Information
Source: Open Information Flow:
To Depository Institution

Entity: Technology Service Providers Information
Source: Private
Information Flow: To Depository Institution

Entity: Trade Associations Information
Source: Private Information Flow:
To Depository Institution

Entity: SSANS Institute Information
Source: Private Information Flow:
To Depository Institution

Entity: National Cyber-Forensics and Training Alliance Information
Source: Private Information Flow: To Depository Institution

Entity: Payment Processors Information Sharing Council Information
Source: Public/Private Information Flow: To Depository Institution

Entity: Financial Services Sector Coordinating Council Information
Source: Public/Private Information Flow: To Depository Institution

Entity: Federal Bureau of Investigation Inter-Agency information flow:
to - Department of the Treasury Information
Source: Government
Information Flow: To Depository Institution

Entity: National Security Agency Inter-Agency information flow: to -
Department of the Treasury Information Source: Government Information
Flow: To Depository Institution

Entity: Central Intelligence Agency Inter-Agency information flow:
to - Department of the Treasury Information
Source: Government
Information Flow: To Depository Institution

Entity: U.S. Secret Service, Department of Homeland Security Inter-
Agency information flow: to - Department of the Treasury Information
Source: Government Information Flow: To Depository Institution

Entity: US Computer Emergency Readiness Team, Department of Homeland
Security Inter-Agency information flow: to - Department of the
Treasury Information Source: Government Information Flow: To Depository
Institution

Entity: NCIC, National Cybersecurity and Communications Integration
Center, Department of Homeland Security Inter-Agency information flow:
to - Department of the Treasury Information Source: Government
Information Flow: To Depository Institution

Entity: Department of the Treasury Information
Source: Government
Inter-Agency information flow: to - FS-ISAC, Financial Services
Information Sharing and Analysis Center Information Flow: To Depository
Institution

Entity: FS-ISAC, Financial Services Information Sharing and Analysis
Center Information Source: Public/Private Inter-Agency information flow:
To/From - Office of the Comptroller of the Currency
Inter-Agency information flow: To/From - Federal Deposit Insurance
Corporation Inter-Agency information flow: To/From - Federal Reserve
Inter-Agency information flow: To/From - National Credit Union
Administration Information Flow: To/From Depository Institution

Entity: Office of Comptroller of the Currency Information
Source: Government (Member of the Federal Financial Institution
Examination Council) Inter-Agency information flow: To/From - Office
of the Comptroller of the Currency
Inter-Agency information flow: To/From - Federal Deposit Insurance
Corporation Inter-Agency information flow: To/From - Federal Reserve
Inter-Agency information flow: To/From - National Credit Union
Administration Information Flow: To/From Depository Institution

Entity: Federal Deposit Insurance Corporation Information
Source: Government (Member of the Federal Financial Institution
Examination Council)
Inter-Agency information flow: To/From - Office of the Comptroller
of the Currency
Inter-Agency information flow: To/From - Federal Deposit Insurance
Corporation Inter-Agency information flow: To/From - Federal Reserve
Inter-Agency information flow: To/From - National Credit Union
Administration Information Flow: To/From Depository Institution

Entity: Federal Reserve Information
Source: Government (Member of the Federal Financial Institution
Examination Council)
Inter-Agency information flow: To/From - Office of the Comptroller
of the Currency Inter-Agency information flow: To/From - Federal
Deposit Insurance Corporation
Inter-Agency information flow: To/From - Federal Reserve Inter-
Agency information flow: To/From - National Credit Union
Administration Information Flow: To/From Depository Institution

Entity: National Credit Union Administration Information
Source: Government (Member of the Federal Financial Institution
Examination Council)
Inter-Agency information flow: To/From - Office of the Comptroller
of the Currency
Inter-Agency information flow: To/From - Federal Deposit Insurance
Corporation
Inter-Agency information flow: To/From - Federal Reserve
Inter-Agency information flow: To/From - National Credit Union
Administration Information Flow: To/From Depository Institution

Source: GAO + GAO - 15 - 509

[End of Figure 4: Sources of Threat Information for Financial Institutions]

Sharing Threat Information Throughout the Financial Sector

Financial institutions must be prepared to address many threats, and
Financial-Sector Regulatory Organizations must ensure through supervisory
processes that financial institutions are ready to mitigate those risks.
According to the FFIEC, financial institutions should have business
continuity plans that “[a]nalyze threats based upon the impact to the
institution, its customers, and the financial market it serves.”41 Further,
the FFIEC notes that financial institutions should have “a means to collect
data on potential threats that can assist management in its identification
of information security risks.”42

Footnote 41: FFIEC, Business Continuity Planning Booklet, Risk Assessment,
(Available on the FFIEC website). [End of footnote]

Footnote 42: FFIEC IT Examination Handbook Infobase, Information Security
Booklet, II, Information Security Program Management (Available on the FFIEC
website). [End of footnote]

In November 2014, the FFIEC members encouraged financial institutions to
join the Financial Services Information Sharing and Analysis Center (FS-ISAC),
through its Statement on Cybersecurity Threat and Vulnerability Monitoring
and Sharing (Cybersecurity Sharing Statement).43 FS-ISAC is a group of
7,000 member organizations whose purpose is to share timely, relevant, and
actionable security threat information. The Cybersecurity Sharing Statement
also suggested using other resources such as the Federal Bureau of
Investigation’s (FBI) InfraGard,44 U.S. Computer Emergency Readiness Team,45
and Secret Service Electronic Crimes Task Force.46 Threat awareness is
important because financial institutions are links in the chain of financial
services system interconnections; an incident involving one community bank
has the potential to affect the broader financial sector.47 Therefore, as
part of the supervisory examination process, Financial-Sector Regulatory
Organizations must ensure that supervised institutions can receive and
access threat information, and that they have business continuity plans to
address such threats.

The Treasury Department leads financial sector readiness efforts. The
Treasury Department OIG recognized the Department’s challenge to provide
financial-sector leadership, ensure effective public-private coordination,
and strengthen awareness and preparedness against cyber threats. The FDIC
OIG identified challenges for the FDIC to ensure that relevant threat
information is shared with its supervised institutions and examiners as
needed, in a timely manner, to prompt responsive action to address the
threats. Threat information provides FDIC examiners with context to
evaluate banks’ processes for risk identification and mitigation strategies.

Sharing Information to Combat Terrorist Financing, Money Laundering, and
Other Financial Crimes

According to the Director of the Financial Crimes Enforcement Network,
“Financial institutions are often the first to detect and block illicit
financing streams, combat financial crimes and related crimes and bad
acts, and manage risk.”48 Providing the financial sector with information
about illicit activity can help sector participants identify and report such
activities; this assists law enforcement in disrupting money
laundering and other financial crimes.49 Such information is especially
important with the use of virtual currencies to identify illicit actors who
use virtual currency to “… facilitate criminal activity such as human
trafficking, child exploitation, fraud, extortion, cybercrime, drug
trafficking, money laundering, terrorist financing, and to support rogue
regimes and facilitate sanctions evasion.”50

Footnote 50: Financial Crimes Enforcement Network, Advisory on Illicit
Activity Involving Convertible Virtual Currency (May 9, 2019). [End of
footnote]

The Treasury Department OIG reported challenges affecting the Department’s
ability to effectively gather and analyze intelligence information.
Specifically, the Treasury Department must do more to collaborate and
coordinate with other Federal agencies to identify and disrupt financial
networks that support terrorist organizations. The Treasury Department also
faces staffing challenges threatening its ability to ensure effective
gathering and analysis of intelligence information. The Department requested
approximately 100 new analyst positions for Fiscal Year 2019. Those positions
are difficult to fill, however, because of required expertise and the length
of time to process security clearance for such personnel.

Threat information can be considered by financial institutions and Financial-
Sector Regulatory Organizations in developing and examining bank and credit
union mitigation strategies and continuity plans. Absent such threat information,
financial institutions and examiners may lack a full understanding of the risks
facing banks and credit unions, and thus, risk mitigation and supervisory
strategies might have gaps which could affect the safety and soundness of
institutions.

[End of CHALLENGE 3: SHARING THREAT INFORMATION]

CHALLENGE 4 ENSURING READINESS FOR CRISES Source: Federal Emergency Management
Agency

The financial sector is a vital component of the infrastructure of the United
States.
As noted by DHS, “large-scale power outages, recent natural disasters, and an
increase in the number and sophistication of cyberattacks demonstrate the wide
range of potential risks facing the sector.”51

Footnote 51: Department of Homeland Security, CISA, Financial Services Sector
available on the DHS website. [End of footnote]

Financial-Sector Regulatory Organizations support the financial sector by
identifying and mitigating potential systemic problems. When supervisory
mitigation cannot stem risks or economic events overtake such efforts,
Financial-Sector Regulatory Organizations, in conjunction with other Federal
and state regulators, must be ready to stabilize financial markets and provide
disaster aid.

Crisis readiness requires advanced preparation, regardless of whether the
crisis results from financial disruption in the markets, economic turmoil,
a cyber attack, natural disaster, or other event. “When the unexpected,
enterprise-threatening crisis strikes, it is too late to begin the planning
process. Events will quickly spin out of control, further adding to the loss
of reputation and avoidable costs necessary to survive and recover with minimal
damage.”52

Footnote 52: Hastings Business Law Journal, The Board’s Responsibility for
Crisis Governance (Spring 2017). [End of footnote]

Although crises may be different in their cause or complexity, implementation
of fundamental principles allows Financial-Sector Regulatory Organizations,
to plan and prepare for such events. Figure 5 illustrates the Crisis
Management Preparedness Cycle, which includes the following five components:53

Footnote 53: Federal Emergency Management Agency National Incident Management
System. [End of footnote]

• Plan – Supports effective operations by identifying objectives, describing
organizational structures, assigning tasks to achieve objectives, identifying
responsibilities to accomplish tasks, and contributing to the goals.

• Organize – Identifies necessary skillsets and technical capabilities.

• Train – Provides personnel with the knowledge, skills, and abilities to
respond to a crisis.

• Exercise – Identifies strengths and weaknesses through an assessment of gaps
and shortfalls with plans, policies, and procedures to respond to a crisis.

• Evaluate and Improve – Compiles lessons learned, develops improvement plans,
and tracks corrective actions to address gaps and deficiencies identified.

Figure 5: Crisis Management Preparedness Continuous Cycle

Preparedness Cycle.

Step 1 - Plan

Step 2 - Organize/Equip

Step 3 - Train

Step 4 - Exercise

Step 5 - Evaluate/Improve

Source: Federal Emergency Management Agency

[End of figure 5]

Preparing for Potential Financial Institution Disruptions and Failures

It has been more than a decade since Financial-Sector Regulatory Organizations
were called upon to address the financial crisis. An FDIC study described the
financial crisis as two interconnected and overlapping crises.54 The first phase
of the crisis involved systemic threats to the financial system as a whole
through the failure of large financial and non-financial institutions during
2008-2009. The second overlapping phase involved a rapid increase in the number
of smaller troubled and failed banks between 2008-2013. As noted by FDIC Chairman
Jelena McWilliams on April 3, 2019, “[t]here were regulatory gaps leading up to the
crisis—perhaps none more important than the inadequate planning for potential
failure of the largest banks and their affiliates.” 55 As described by Chairman
McWilliams, the lessons learned from the crisis are that large and small banking
institutions must be able to fail “without taxpayer bailouts and without
undermining the market’s ability to function.” 56

Footnote 54: FDIC, Crisis and Response, An FDIC History, 2008-2013 (November 30,
2017). [End of footnote]

Footnote 55: FDIC Chairman Jelena McWilliams, Bank Resolution: A Global Perspective,
International Banker (April 3, 2019). [End of footnote]

Footnote 56: FDIC Chairman Jelena McWilliams, Bank Resolution: A Global Perspective,
International Banker (April 3, 2019). [End of footnote]

Financial-Sector Regulatory Organizations, in conjunction with other Federal and
state regulators, must be prepared to mitigate financial institution risks and, when
necessary, resolve failed banks and credit unions. The Dodd-Frank Act introduced
significant changes since the crisis. The Dodd-Frank Act required that bank holding
companies plan for potential resolution through bankruptcy. The Dodd-Frank Act also
provided new resolution authority to orderly liquidate financial companies in extreme
cases during severe financial crisis. In addition, the FDIC instituted regulations
requiring that insured depository institutions with more than $50 billion in assets
also prepare resolution plans addressing how the FDIC could resolve the institution
under the Federal Deposit Insurance Act. These steps clarify resolution authority,
but Financial-Sector Regulatory Organizations must be able to execute those
resolutions.

The FDIC OIG identified challenges with the FDIC’s readiness to fulfill its
mission to manage receiverships. According to the FDIC, the events of the financial
crisis unfolded more quickly than the FDIC expected and were more severe than the
FDIC’s planning efforts anticipated.57 For example, in July 2008, the FDIC resolved
IndyMac, the most expensive FDIC failure, estimated to cost about $12.3 billion, and
in September 2008, Washington Mutual, the sixth-largest FDIC-insured institution,
also failed. The FDIC had not planned for several large and small banks to fail at
the same time, and these failures occurred at a quicker pace than in previous crises.
The FDIC OIG stated that the FDIC is challenged to ensure that it has the ability
to on-board the staff needed to address escalating crisis workloads. For example,
during the crisis, the FDIC authorized funding for additional personnel but faced
challenges expediting the hiring process to on-board needed staff.

Footnote 57: FDIC, Crisis and Response, An FDIC History, 2008-2013 (November 30,
2017). [End of footnote]

Further, the FDIC faced challenges dealing with the increased volume of contracts
required during the time of crisis. During the financial crisis, the FDIC awarded
over 6,000 contracts totaling more than $8 billion. The size of the FDIC
acquisition staff was initially insufficient, which resulted in delays to modify
existing contracts and award new contracts. The FDIC needed to rapidly hire and
train personnel to oversee the contracts. The FDIC is also challenged to ensure
that it has plans in place to react and respond quickly to a crisis, irrespective
of its cause, nature, magnitude, or scope; ensure those plans are current and
up-to-date; and incorporate lessons learned from past crises and the related
bank failures.

The NCUA OIG also noted several challenges faced by the NCUA pertaining to risks
to the safety and soundness of credit unions and the protection of the National
Credit Union Share Insurance Fund which, similar to the Deposit Insurance Fund,
insures credit union member accounts against losses up to $250,000.58 These risks
include: significant threats posed by cyberattacks, competitive challenges to
credit unions posed by new technology-driven financial products; increasing
competition in the financial services industry; and continuing consolidation
among depository institutions. The NCUA needs to: strengthen the resiliency of
the credit union systems and the agency; work with credit unions to manage risks
of new financial products and services; and continue to monitor consolidation
trends among depository institutions.

Footnote 58: Created by Congress in 1970, NCUA administers the Share Insurance Fund
and insures individual credit union member accounts against losses up to $250,000
and a member’s interest in all joint accounts combined up to $250,000. The Deposit
Insurance Fund is administered by the FDIC and insures account holder deposits in
FDIC insured banks and provides funds to resolve failed banks. [End of footnote]

Preparing to Administer Disaster Aid

HUD plays a substantial role in national disaster recovery initiatives and often
receives more disaster recovery funding than any other Federal agency. After a
national disaster, Congress may authorize additional funding to HUD for the Community
Development Block Grant Program (Community Development Grants) for significant unmet
needs for long-term recovery.59 Since 2001, Congress has awarded HUD more than $84.6
billion for disaster recovery. HUD awards Community Development Grants to state and
local governments who, in turn, may grant money to state agencies, non-profit
organizations, economic development agencies, citizens, and businesses. The state
and local governments provide these funds for disaster relief, long-term recovery,
restoration of infrastructure, housing, and economic revitalization.

Footnote 59: Community Development Block Grant Disaster Recovery Fact Sheet.
[End of footnote]

HUD OIG noted that, by their nature, Community Development Grants pose a risk as
they are provided at a time when a community is recovering from a disaster. HUD
OIG identified that HUD’s Community Development Grant requirements are not codified
in the Federal Register. Instead, HUD issues multiple requirements and waivers for
each disaster in Federal Register notices, which leads to confusion among program
grantees. For example, HUD OIG noted that 59 grantees with 112 active Community
Development Grants totaling more than $47.4 billion were required to follow 61
different Federal Register notices to manage the program. Further, HUD OIG
identified continuing risks to HUD concerning the more than $18 billion in
disaster recovery sent to Puerto Rico during a time when Puerto Rico was close
to filing for bankruptcy.

HUD OIG also reported that HUD is challenged to ensure that grantees have the
capacity to administer Community Development Grants and ensure the funds are
used for eligible and supported items. Since 2006, HUD OIG has completed 120
audits and 6 evaluations of the Community Development Block Grant Program,
identifying $477.4 million in ineligible costs, $906.5 million in unsupported
costs, and $5.5 billion in funds that could be put to better use.

HUD also faces challenges to ensure that grantees follow Federal procurement
regulations. HUD OIG identified that state disaster recovery programs may not
align with Federal procurement requirements. As a result, products and services
obtained through grant funds may not have been purchased competitively at fair
and reasonable prices. HUD OIG also identified challenges in HUD’s ability to
expedite disaster assistance grants while also maintaining adequate safeguards
to deter and detect fraud.

Additionally, HUD OIG found that Americans face challenges in attempting to
receive assistance from HUD and other disaster relief agencies. Citizens face
a circuitous path to receive disaster recovery assistance depending on how,
when, and where they enter the disaster relief process. As a result, citizens
may face significant delays in processing their applications for assistance,
delays in receiving funding, and possible duplication of benefits.

Financial-Sector Regulatory Organizations protect the financial sector and
American citizen when crises strike. Crises in the financial sector may come
from many sources and at any time. Financial-Sector Regulatory Organizations
must plan, prepare, train, exercise, and maintain readiness for scenarios
that could lead to crises.

[End of CHALLENGE 4: SHARING THREAT INFORMATION]

CHALLENGE 5 STRENGTHENING AGENCY GOVERNANCE

According to OMB Circular No. A-123, Management’s Responsibility for Enterprise
Risk Management and Internal Control, (OMB Circular A-123), Federal agencies
face internal and external risks to achieving their missions, including
“economic, operational, and organizational change factors, all of which
would negatively impact an Agency’s ability to meet goals and objectives
if not resolved.”60 To address those risks, Federal leaders and managers
generally must establish a governance structure to direct and oversee
implementation of a risk management and internal control process.61 Enterprise
Risk Management (ERM) and internal controls are components of this governance
framework. OMB defines ERM “as an enterprise-wide, strategically-aligned
portfolio view of organizational challenges that provides better insight
about how to most effectively prioritize resource allocations to ensure
successful mission delivery.”62

Footnote 60: Office of Management and Budget Circular No. A-123, Management’s
Responsibility for Enterprise Risk Management and Internal Control (July 15,
2016). [End of footnote]

Footnote 61: Office of Management and Budget Circular No. A-123, Management’s
Responsibility for Enterprise Risk Management and Internal Control (July 15, 2
016). [End of footnote]

Footnote 62: Office of Management and Budget Appendix A to OMB Circular A-123,
Management Reporting and Data Integrity Risk (June 6, 2018). [End of footnote]

Establishing Enterprise Risk Management

ERM focuses specifically on the identification, assessment, and management
of risk, and it should include these elements:

• A risk management governance structure;

• A methodology for developing a risk profile; and

• A process, guided by an organization’s senior leadership, to consider risk
appetite and risk tolerance levels that serves as a guide to establish strategy
and select objectives.

Figure 6: Enterprise Risk Management Program

Enterprise Risk Management

Strategic Decisions (OMB A-11):

-Mission/Vision, Performance Goal Setting/Metrics, Objective Setting, Establish
Risk Thresholds

Budget Decisions(OMB A-11):

-Policy, President's Budget, Congressional Justification

Program Management (OMB A-11):

-Cross Agency Priority Goals, Agency Priority Goals, Agency Program Reviews

CXO Operations Support (OMB A-123):

- Operational Control Objectives, Report Control Objectives, Comliance Control
Objectives, Risk Assessments

Source: CFO Playbook: Enterprise Risk Management for the U.S. Federal Government.

[End of Figure 6]

OMB urges agencies to adopt an enterprise-wide view of ERM—a “big picture”
perspective— thus synthesizing the management of risks into the very fabric of
the organization; it should not be viewed in “silos” among different divisions
or offices. As shown in Figure 6, ERM should integrate risk management into the
agency’s processes for budgeting, including strategic planning, performance
planning, and performance reporting practices.

The Federal Reserve Board and Bureau OIG found that the Federal Reserve Board
has a complex governance system that creates challenges for the Governors to
effectively carry out their roles and responsibilities and to have an enterprise-
wide view of the management of certain administrative functions. For example,
the Federal Reserve Board and Bureau OIG noted that Federal Reserve Board
guidance does not set clear expectations for communication among Governors
and between Governors and Division Directors. Such communication challenges
may result in the Federal Reserve Board Governors being unaware of certain
activities, and Board officials missing opportunities to leverage the Governors’
knowledge and experience. In addition, the decentralization of information
technology among Divisions does not allow for a complete view of IT security
risks and impedes the ability to have an effective information security program.
Additionally, the Federal Reserve Board Chief Human Capital Officer has had
difficulty implementing enterprise-wide succession planning.

Similarly, the FDIC OIG identified challenges in the FDIC’s implementation of
its ERM program. Although the FDIC began ERM implementation efforts in 2010,
the FDIC currently does not have an enterprise-wide and integrated approach to
identifying, assessing, and addressing the full spectrum of internal and external
risks. As a result, the FDIC faces difficulties integrating risk into its budget,
strategic planning, performance reporting, and internal controls. In addition,
FDIC Divisions and Offices are not able to evaluate risk determinations in the
context of the agency’s overall risk levels, tolerance, and profile. For example,
the FDIC could not be sure that its resources were being allocated toward
addressing the most significant risks in achieving strategic objectives.

Ensuring Effective Internal Controls

As described by the GAO, “a key factor in improving accountability in achieving
an entity’s mission is to implement an effective internal control system. An
effective internal control system helps an entity adapt to shifting environments,
evolving demands, changing risks, and new priorities.”63 OMB Circular A-123
emphasizes the need for agencies to coordinate risk management and strong and
effective internal controls into existing business activities as an integral
part of governing and managing an agency.

Footnote 63: U.S. Government Accountability Office, Standards for Internal
Control in the Federal Government, GAO-14-704G, (September 2014). [End of
footnote]

HUD OIG noted HUD’s continuing struggle with effective oversight controls to
monitor operations and programs. HUD faces challenges to effectively manage its
programs that distribute about $48.2 billion annually to state and local government,
organizations, and individuals through grants, subsidies, and other payments. For
example, in 2018, HUD OIG reports identified more than $1.3 billion in ineligible,
unsupported, unnecessary, or unreasonable costs. HUD OIG also noted that HUD’s lack
of compliance with the GAO’s internal control standards has deprived HUD management
of an important monitoring tool that can provide feedback on the effectiveness and
efficiency of departmental operations.

FHFA OIG identified that internal control systems at Fannie Mae and Freddie Mac,
which are under government conservatorship, fail to provide directors with accurate,
timely, and sufficient information to enable them to exercise their oversight duties
that are delegated to them by FHFA as conservator. Further, the FHFA OIG found that
leadership changes in 2018 and 2019 may lead to a lack of attention to internal
controls.

Governance is an important tool for Financial-Sector Regulatory Organizations to
ensure that they fulfill their missions and responsibilities to citizens and taxpayers.
ERM and internal control programs synthesize the management of Financial-Sector
Regulatory Organizations’ risks into an organization’s culture, so that these risks
may be considered and incorporated into budget, strategic planning, performance
reporting, and internal controls for the agency as a whole.

[End of CHALLENGE 5 STRENGTHENING AGENCY GOVERNANCE]

CHALLENGE 6 MANAGING HUMAN CAPITAL

Financial-Sector Regulatory Organizations rely on the skills of over 117,000 employees
to ensure the safety and soundness of the U.S. financial system.64 In March 2019, the
GAO recognized strategic human capital management as a continuing Government-wide area
of high risk.65 The GAO noted the need for Federal agencies to “measure and address
existing mission-critical skills gaps, and use workforce analytics to predict and
mitigate future gaps so agencies can effectively carry out their missions.”66

Footnote 64: CIGFO Working Group analysis of OPM Fedscope data as of March 2018
available at https://www.fedscope.opm.gov. [End of footnote]

Footnote 65: U.S. Government Accountability Office, High-Risk Series: Substantial
Efforts Needed to Achieve Greater Progress on High-Risk Areas, GAO-19-157SP (March
2019). [End of footnote]

Footnote 66: U.S. Government Accountability Office, High-Risk Series: Substantial
Efforts Needed to Achieve Greater Progress on High-Risk Areas, GAO-19-157SP (March
2019). [End of footnote]

Succession Planning to Fill Leadership Gaps

Government-wide retirement eligibility in 2022 is estimated to be 31.6 percent of all
permanent Federal employees.67 According to the GAO, retirements could cause gaps in
leadership and institutional knowledge and exacerbate existing skill gaps. According
to the Office of Personnel Management (OPM), succession planning for such retirements
forms an integral part of workforce planning and helps ensure an ongoing supply of
qualified staff to fill leadership and other key positions.68 Specifically, OPM
requires that the head of each agency, in consultation with OPM, develop a
comprehensive management succession program, based on the agency's workforce
succession plans, to fill agency supervisory and managerial positions. Agency
succession programs should be supported by employee training and development programs.

Footnote 67: U.S. Government Accountability Office, High-Risk Series: Substantial Efforts
Needed to Achieve Greater Progress on High-Risk Areas, GAO-19-157SP (March 2019).
[End of footnote]

Footnote 68: 5 C.F.R. Part 412. [End of footnote]

The Federal Reserve Board and Bureau OIG cited potential leadership and skills gaps as a
result of a projected increase in numbers of Federal Reserve Board employees becoming
eligible for retirement. Similarly, the FDIC OIG found that the percentage of FDIC employees
eligible to retire more than doubles (2.3 times) over the next 5 years, increasing from
18 percent in 2018 to 42 percent in 2023. Further, the FDIC OIG identified potential
leadership gaps resulting from the retirement eligibility of 66 percent of the Executive
Management employees and another 57 percent of Managers between 2018 and 2022.

HUD OIG also identified that leadership gaps have affected HUD’s management of its programs
and operations. Specifically, constant turnover and extended vacancies in HUD’s most
important political and career executive positions led to poor management decisions and
questionable execution of internal business functions. The SEC OIG also noted that, although
the agency’s multi-year strategic plan identified the need to strengthen human capital
management, the SEC lacked a formal succession plan.

Skills Gap Identification and Mitigation

OPM’s Human Capital Framework requires that agencies use comprehensive data analytic methods
to monitor and address skills gaps and develop gap closure strategies.69 CIGFO members
identified challenges in the identification and mitigation of agency skill set gaps
especially in response to new technologies. The Federal Reserve Board and Bureau OIG found
that the Federal Reserve Board remains challenged to identify a diverse workforce with the
necessary technical, managerial, and leadership skills. Continually evolving workforce
expectations and a highly competitive environment for individuals with specialized skills
presents challenges for the Federal Reserve Board. The FDIC OIG found that the FDIC was
challenged to ensure that examination staff skill sets kept pace with the increasing complexity
and sophistication of IT environments at banks as well as the introduction of new financial
technology. The FDIC OIG also identified examiner skillset imbalances among FDIC regional
offices. As a result, senior examiners may be required to travel more frequently in order to
supervise less experienced staff and sign reports of examination.

Footnote 69: See OPM Human Capital Framework Structure and SEC OIG, The SEC Made Progress
But Work Remains to Address Human Capital Management Challenges and Align With the Human
Capital Framework (September 11, 2018), Report No. 549. [End of footnote]

The Federal Reserve Board and Bureau OIG stated that to address vacancies in the Bureau’s
workforce, the agency is reallocating staff resources through reassignments or detail
opportunities. However, some of these vacancies are for highly specialized skillsets, and
the Bureau may face challenges in identifying the necessary skillsets in its current
workforce. The SEC OIG found that, although the SEC began a skill set assessment project
in 2016, the SEC was delayed in implementing the project. Specifically, as of July 2018,
the SEC had not completed competency assessment surveys or similar reviews to identify and
close skill gaps within SEC divisions, offices, and regional offices.

Financial-Sector Regulatory Organizations’ workforce plays a vital role in ensuring mission
success. Mission success is contingent on each organization’s management of human capital
activities – workforce planning, recruitment, on-boarding, compensation, engagement,
succession planning, and retirement programs – to allow for proactive responses to anticipated
changes and maximize human capital efficiency and effectiveness.

[End of CHALLENGE 6 MANAGING HUMAN CAPITAL]

CHALLENGE 7 IMPROVING CONTRACT AND GRANT MANAGEMENT

The Administration recognized the importance of improving Federal Government acquisitions in
finding that such acquisitions “often fail to achieve their goals because many Federal managers
lack the program management and acquisition skills to successfully manage and integrate large
and complex acquisitions into their projects.”70 In addition, the GAO found that Government
contracting officials were carrying heavier workloads, and thus, it was more difficult for
these officials to oversee complex contracts and ensure that contractors adhered to contract
terms.

Footnote 70: The President’s Management Agenda: Modernizing Government for the 21st Century.
[End of footnote]

Grants are an important policy tool to provide funding to state and local governments, and
nongovernmental entities for national priorities. According to the GAO, effective oversight
and internal control is important to provide reasonable assurance to Federal managers and
taxpayers that grants are awarded properly, grant recipients are eligible, and grants are
used as intended according to laws and regulations.71

Footnote 71: U.S. Government Accountability Office, Grants Management: Observations on
Challenges and Opportunities for Reform, GAO-18-676T (July 25, 2018). [End of footnote]

Strengthening Contract Oversight

According to the GAO’s Framework for Assessing the Acquisition Function at Federal Agencies,
agencies should effectively manage their acquisitions process in order to ensure that
contract requirements are defined clearly and all aspects of contracts are fulfilled.72
Agencies must properly oversee contractor performance and identify any deficiencies.

Footnote 72: U.S. Government Accountability Office, Framework for Assessing the Acquisition
Function at Federal Agencies, GAO-05-218G (September 2005). [End of footnote]

The Special Inspector General for the Troubled Asset Relief Program (SIGTARP) identified
challenges to Treasury Department’s oversight of Troubled Asset Relief Program (TARP) Funds.
Over 150 banks or other institutions have or can receive $23 billion through agreements
entered under the Making Home Affordable Program (MHA Program). The MHA Program pays TARP
dollars when banks and institutions comply with rules and guidelines to modify mortgages to
help struggling homeowners. SIGTARP found that despite enforcement actions and other wrongdoing
of many financial institutions, the Treasury Department is significantly scaling back on MHA
Program compliance reviews.

HUD OIG identified challenges with HUD’s oversight of IT procurement. According to HUD’s Chief
Procurement Officer, fewer than five people were adequately trained and possessed the expertise
to manage IT projects and contracts. HUD lacked well-documented and fully developed selection
processes to ensure consistent application of selection criteria used for applicants for
contracts. In addition, HUD did not have robust processes for contractor oversight and
evaluating contractor performance against expected outcomes to ensure that its contractors
met their obligations.

According to the FDIC OIG, the FDIC relies heavily on contractors for support of its mission,
especially for IT and administrative support services. The FDIC OIG identified a number of
contract challenges at the FDIC, including defining contract requirements, coordination
between contracting and program office personnel, and establishing implementation milestones.
For example, FDIC personnel did not fully understand and communicate the requirements to
transition a nearly $25 million data management services contract from one contractor to
another.

The Federal Reserve Board and Bureau OIG identified that the Bureau needed to strengthen
controls for contract financing and management. Specifically, for one of its largest
contracts, the Bureau did not comply with the Federal Acquisition Regulation requirements
concerning contract financing requirements and documenting annual blanket purchase agreement
reviews. Additionally, Bureau staff did not verify contractor expenses by obtaining and
reviewing supporting source documents. The Federal Reserve Board and Bureau OIG also noted
contracting challenges for the Federal Reserve Board’s oversight of physical infrastructure
changes. The Federal Reserve Board encountered significant delays, scope changes, and cost
increases for renovations to its William McChesney Martin, Jr. building.

The SEC OIG identified challenges with the SEC’s management and oversight of contracts. For
example, the SEC OIG found that contract oversight personnel did not enforce contract
requirements for experts performing work for the SEC. Further, contract oversight personnel
had limited first-hand knowledge of the sufficiency of contract deliverables and therefore
could not determine whether the invoices accurately reflected work performed.

Improving Grant Management

Grants are typically categorized as (1) categorical grants – which restrict funds to narrow,
specific activities; (2) block grants – which are less restrictive funding for broader
categories of activities; and (3) general purpose grants – which allow the greatest amount
of discretion to be used for government purposes. Oversight and internal control of grants
are important to ensure grants are used by eligible participants for allowable purposes.

SIGTARP identified challenges with the Treasury Department’s oversight of TARP expenses
charged by state housing finance agencies to administer the Hardest Hit Fund (HHF), a
grant-like program. The Treasury Department’s $9.6 billion for HHF provides funding to
state housing finance agencies to assist unemployed homeowners and individuals whose
mortgages are greater than their current home’s value. SIGTARP has issued several reports
on Treasury’s lack of oversight for grantees. Between 2016 and 2017, SIGTARP identified
$11 million in wasteful, abusive, and unnecessary funding by states for items such as gym
memberships, parties, and country club events. Further, SIGTARP reported that there is no
Federal requirement for states to use competition when spending funds on fees for
consultants, accountants, and lawyers.

HUD OIG reported that HUD continues to struggle with effective program management of the
nearly $50 billion in Federal funds that HUD passes to state and local governments,
organizations, and individuals in the form of grants, subsidies, and other payments.
Approximately 16 percent of HUD’s annual appropriations are provided as grants through
the Office of Community Planning and Development. HUD OIG identified that 21 of their
audits performed from 2014-2017 found that there was little or no monitoring of grantees.
As a result, HUD did not have assurances that it correctly identified high-risk grantees
or conducted adequate monitoring to mitigate risks.

Financial-Sector Regulatory Organizations rely on contracts and grants to perform their
respective missions. Strong oversight and controls over contract and grant processes are
critical to ensure proper stewardship over taxpayer funds.

[End of CHALLENGE 7 IMPROVING CONTRACT AND GRANT MANAGEMENT]

CONCLUSION

This is the second report developed by CIGFO members to identify cross-cutting Challenges
faced by Financial-Sector Regulatory Organizations. In this report, we continue to
emphasize to policy makers the importance of considering a whole-of-Government approach to
coordination and information sharing to address these Challenges.

Consistent with the mission of Inspectors General, this report helps inform the public by
providing them with information about the important Challenges facing the financial sector
to which most of the public is directly connected through bank or credit union accounts and
mortgages. This report also informs CIGFO members in their identification of future
Challenges and collaboration on reviews addressing cross-cutting Challenges facing the
financial sector.

APPENDIX 1 ABBREVIATIONS AND ACRONYMS

Bureau - Bureau of Consumer Financial Protection

CFTC - Commodity Futures Trading Commission

Challenges - The CIGFO Top Management and Performance Challenges
identified in this report.

CIGFO - Council of Inspectors General on Financial Oversight

CISA - Cybersecurity and Infrastructure Security Agency

DHS - Department of Homeland Security

Dodd-Frank Act - The Dodd-Frank Wall Street Reform and Consumer
Protection Act

ERM - Enterprise Risk Management

FBI - Federal Bureau of Investigation

FDIC - Federal Deposit Insurance Corporation

Federal Reserve Board  - Board of Governors of the Federal Reserve
System

FEMA - Federal Emergency Management Agency

FFIEC - Federal Financial Institutions Examination Council

FHFA - Federal Housing Finance Agency

Financial-Sector Regulatory Organizations - Federal Departments and
Agencies overseen by
CIGFO Inspectors General.

FISMA - Federal Information Security Modernization Act of 2014

FSB - Financial Stability Board

FS-ISAC - Financial Services Information Sharing and Analysis Center

FSOC - Financial Stability Oversight Council

GAO - U.S. Government Accountability Office

HHF - Hardest Hit Fund

HUD - Department of Housing and Urban Development

IT - Information Technology

MHA Program - Making Home Affordable Program

NCUA - National Credit Union Administration

NIST - National Institute of Standards and Technology

OCC - Office of the Comptroller of the Currency

OIG - Office of Inspector General

OMB - Office of Management and Budget

OPM - Office of Personnel Management

SEC - Securities and Exchange Commission

SIGTARP - Special Inspector General for the Troubled Asset Relief
Program

TMPC - Top Management and Performance Challenges

Treasury Department - Department of the Treasury

TSP - Technology Service Provider

[End of APPENDIX 1 ABBREVIATIONS AND ACRONYMS]

APPENDIX 2 METHODOLOGY

Department of the Treasury,
link - https://www.treasury.gov/about/organizational-structure/ig/Agency%20Doc…

Federal Deposit Insurance Corporation,
link - https://www.fdicoig.gov/report-release/top-management-and-performance-challenges-facing-federal-deposit-insurance

Commodity Futures Trading Commission,
link - https://www.cftc.gov/sites/default/files/2018-10/oigmgmtchal082718.pdf

Bureau of Consumer Financial Protection,
link - https://oig.federalreserve.gov/reports/bureau-major-management-challeng…

Department of Housing and Urban Development
link - https://www.hudoig.gov/sites/default/files/2018-11/TMC%20-%20FY%202019…

Board of Governors of the Federal Reserve System
link - https://oig.federalreserve.gov/reports/board-major-management-challenge…

Federal Housing Finance Agency
link - https://www.fhfaoig.gov/Content/Files/FY2019%20Management%20and%20Perfo…

National Credit Union Administration
link - https://www.ncua.gov/files/annual-reports/annual-report-2018.pdf

Securities and Exchange Commission
link - https://www.sec.gov/Inspector-Generals-Statement-on-the-SECs-Mgt-and-Pe…

Special Inspector General for the Troubled Asset Relief Program
link - https://www.sigtarp.gov/Pages/Reports-Testimony-Home.aspx

Footnote: 73 The Special Inspector General for the Troubled Asset Relief
Program issues  to the Treasury Department and has published its assessment
of the most serious management and performance challenges and threats
facing the Government in TARP in its  Quarterly Report to Congress since
October 2017. [End of footnote]

[End of APPENDIX 2 METHODOLOGY]

CIGFO Audit of the Financial Stability Oversight Council’s Monitoring of
International Financial Regulatory Proposals and Developments

May 2019

CIGFO-2019-01

[CIGFO member OIG agency seals]

Table of Contents

Transmittal Letter

Executive Summary

CIGFO Working Group Audit

Background

Audit Approach

FSOC’s Activities to Monitor International Financial Regulatory Proposals and
Devlopments

FSOC Members Consider the Monitoring

Process Adequate

Conclusion

Appendices

Appendix I: Objective, Scope, and Methodology

Appendix II: Prior CIGFO Reports

Appendix III: FSOC Response

Appendix IV: CIGFO Working Group

[End of Table of Contents]

Abbreviations

CIGFO Council of Inspectors General on Financial Oversight

Dodd-Frank Act Dodd-Frank Wall Street Reform and Consumer Protection Act

FSB Financial Stability Board

FSOC or Council Financial Stability Oversight Council

IOSCO International Organization of Securities Commissions

LIBOR London Interbank Offered Rate

RRC Regulation and Resolution Committee

SRC Systemic Risk Committee

Treasury Department of the Treasury

[End of Abbreviations]

Message from the Chair

Dear Mr. Chairman:

I am pleased to present you with the Council of Inspectors General on
Financial  Oversight (CIGFO) report titled, Audit of the Financial Stability
Oversight Council’s Monitoring of International Financial Regulatory Proposals
and Developments.

One of the statutory duties of the Financial Stability Oversight Council
(FSOC) is to monitor domestic and international financial regulatory proposals
and developments, including insurance and accounting issues, and to advise
Congress and make recommendations in such areas that will enhance the integrity,
efficiency, competitiveness, and stability of the U.S. financial markets.

FSOC’s monitoring of international financial regulatory proposals and
developments is conducted in the context of FSOC’s statutory purposes, which
focuses on developments that could pose risks to the stability of the U.S.
financial system.

CIGFO convened a Working Group to assess FSOC’s monitoring of international
financial regulatory proposals and developments. In this resulting audit report,
we concluded that FSOC has a process for monitoring international financial
regulatory proposals and developments. All FSOC members or member
representatives who offered an opinion described FSOC’s monitoring process as
adequate. Although described as adequate, several FSOC members or representatives
offered suggestions for enhancing the process. We encourage FSOC to consider
incorporating into its process the suggestions made by its members to the
extent the suggestions are consistent with FSOC’s focus on identifying and
addressing threats to the stability of U.S. financial system. We are not making
any recommendations to FSOC as a result of this audit.

I would like to take this opportunity to thank the FSOC members for their
support, especially those Department of the Treasury officials who assisted
with this effort.

CIGFO looks forward to working with you on this and other issues. In
accordance with the Dodd-Frank Wall Street Reform and Consumer Protection
Act, CIGFO is also providing this report to Congress.

Sincerely,

/s/

Eric M. Thorson

Chair, Council of Inspectors General on Financial Oversight

[End of Message from the Chair]

Executive Summary

Why and How

We Conducted this Audit

The Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act)1
created regulatory and resolution frameworks designed to reduce the likelihood,
and severe economic consequences, of financial instability. The Dodd-Frank Act
established the Financial Stability Oversight Council (FSOC or Council) and
charged it with identifying risks to the nation’s financial stability, promoting
market discipline, and responding to emerging threats to the stability of the
nation’s financial system. Among other duties, Title I of the Dodd-Frank Act
requires FSOC to monitor domestic and international financial regulatory
proposals and developments, including insurance and accounting issues, and to
advise Congress and make recommendations in such areas that will enhance the
integrity, efficiency, competitiveness, and stability of the U.S. financial markets.

The Dodd-Frank Act also created the Council of Inspectors General on Financial
Over-sight (CIGFO), whose members include the Inspectors General with oversight
authority for the majority of FSOC’s member agencies. The Dodd-Frank Act authorizes
CIGFO to convene a Working Group of its members to evaluate the effectiveness and
internal operations of FSOC. In December 2017, CIGFO convened a Working Group to
conduct an audit to assess FSOC’s monitoring of international financial regulatory
proposals and developments for the period of January 2016 to January 2018.2 The
Working Group was led by the Department of the Treasury’s (Treasury) Office of
Inspector General, whose Inspector General is the Chair of CIGFO.

To accomplish the audit objective, the Working Group reviewed the Dodd-Frank
Act to determine FSOC’s statutory purposes and duties. It reviewed FSOC’s governance
documents, annual reports, meeting minutes, and committee meeting agendas. It
also interviewed staff from the FSOC Secretariat at Treasury as well as interviewed
or received responses from FSOC members and member agency representatives to
develop a better understanding of FSOC’s monitoring of international financial
regulatory proposals and developments. The Working Group conducted fieldwork from
February 2018 through June 2018. Appendix I provides additional details about the
objective, scope, and methodology of this audit.

Footnote 1: Public Law No. 111-203, enacted July 21, 2010. [End of footnote]

Footnote 2: See Appendix IV for a listing of Working Group members. [End of footnote]

What We Learned

FSOC monitors international financial regulatory proposals and developments
in several ways. First, FSOC develops and publishes an annual report, which
describes important international financial regulatory proposals and developments,
identifies emerging threats to U.S. financial stability, and can include
recommendations related to these issues. FSOC also follows up on the issues,
threats, and recommendations identified in its annual report. Second, FSOC
members periodically discuss international topics at their meetings, and are
given presentations by experts from relevant member agencies. Third, the staffs
of FSOC member agencies share information on these topics in FSOC’s staff-level
committees, primarily the Systemic Risk Committee (SRC). Finally, some FSOC
member agencies have their own international engagement, which can inform their
participation in FSOC meetings

FSOC members and FSOC member agency representatives expressed their overall
satisfaction with FSOC’s monitoring of international activities and proposals, and
believed that the process was adequate. Several FSOC members offered suggestions for
process enhancements which are included on pages 8 and 9 of this report. We encourage
FSOC to consider incorporating the suggestions made by these members into its
processes to the extent the suggestions are consistent with FSOC’s purposes of
identifying risks to U.S. financial stability, promoting market discipline,
and responding to emerging threats to the stability of the U.S. financial system.
We are not making any recommendations to FSOC as a result of our audit.

FSOC Response

In a written response, Treasury, on behalf of the FSOC Chairperson, acknowledged the
findings and conclusions in this report. The response stated that the suggestions made
by several FSOC members to further enhance the Council’s work will be considered. The
response is provided as Appendix III.

[End of Executive Summary]

CIGFO Working Group Audit

This report presents the results of the CIGFO Working Group’s audit of FSOC’s monitoring
of international financial regulatory proposals and developments. CIGFO is issuing
this report to FSOC and Congress as part of CIGFO’s responsibility to oversee FSOC under
the Dodd-Frank Act. See Appendix II for a listing of previous CIGFO reports.

Background

The Dodd-Frank Act established FSOC to create joint accountability for identifying and
mitigating potential threats to the stability of the nation’s financial system. By creating
FSOC, Congress recognized that protecting financial stability would require the collective
engagement of the entire financial regulatory community. As shown in Figure 1, the
Council consists of 10 voting members and 5 non-voting members and brings together the
expertise of federal financial regulators; state regulators; an insurance expert appointed
by the President, by and with the advice and consent of the Senate; and others.3 The
voting members of FSOC provide a federal financial regulatory perspective as well as
an independent insurance expert’s view. The non-voting members offer different insights
as state-level representatives from bank, securities, and insurance regulators or as the
directors of offices within Treasury — the Office of Financial Research and the Federal
Insurance Office, established in Titles I and V of the Dodd-Frank Act, respectively.
Within Treasury, a dedicated policy office of Treasury staff, led by a Deputy Assistant
Secretary, functions as the FSOC Secretariat and assists in coordinating the work of
the Council among its members and member agencies.

The statutory purposes of FSOC are to:

• identify risks to the financial stability of the U.S. that could arise from the material
financial distress or failure, or ongoing activities, of large, interconnected bank
holding companies or nonbank financial companies, or that could arise outside
the financial services marketplace;

Figure 1: FSOC Council Membership

Federal and Independent Members

• Secretary of the Treasury, Chairperson (v)

• Chairman of the Board of Governors of the Federal Reserve System (v)

• Comptroller of the Currency (v)

• Director of the Bureau of Consumer Financial Protection (v)

• Chairman of the Securities and Exchange Commission (v)

• Chairperson of the Federal Deposit Insurance Corporation (v)

• Chairman of the Commodity Futures Trading Commission (v)

• Director of the Federal Housing Finance Agency (v)

• Chairman of the National Credit Union Administration Board (v)

• Director of the Office of Financial Research

• Director of the Federal Insurance Office

• Independent member with insurance expertise (v)

State Members

State Insurance Commissioner

State Banking Supervisor

State Securities Commissioner

[End of Figure 1: FSOC Council Membership]

• promote market discipline, by eliminating expectations on the part of shareholders,
creditors, and counterparties of such companies that the Government will
shield them from losses in the event of failure; and

• respond to emerging threats to the stability of the U.S. financial system.4

Footnote 4: 12 U.S.C. 5322(a)(1). [End of footnote]

Audit Approach

Our audit objective was to assess FSOC’s monitoring of international financial regulatory
proposals and developments. Our audit scope focused on FSOC’s efforts to monitor
international activities over a 2-year period, January 2016 through January 2018.
To accomplish our objective, participating Offices of Inspector General collected
information from FSOC members and/or FSOC member representatives, through interviews
or self-reporting guided by a questionnaire developed by the CIGFO Working Group,
regarding their perspectives on FSOC’s efforts to monitor international financial
regulatory proposals and developments. In addition, we interviewed officials of the
FSOC Secretariat and reviewed FSOC annual reports and laws applicable to FSOC’s authority
to monitor international financial regulatory proposals and developments. We conducted our
audit fieldwork from February 2018 through June 2018.

FSOC’s Activities To Monitor International Financial Regulatory Proposals And Developments

The Dodd-Frank Act provides that FSOC has the duty to monitor international financial
regulatory proposals and developments, including insurance and accounting issues, and
to advise Congress and make recommendations in such areas that will enhance the integrity,
efficiency, competitiveness, and stability of the U.S. financial markets. FSOC’s monitoring
of international financial regulatory proposals and developments is conducted in the context
of FSOC’s statutory purposes, which focuses on developments that could pose risks to the
stability of the U.S. financial system.

The Dodd-Frank Act does not establish specific guidelines or expectations for how FSOC is to
fulfill its duty to monitor international financial regulatory proposals and developments.
Accordingly, the CIGFO Working Group developed a methodology for reviewing FSOC’s activities
in this regard.

Through our interviews with the FSOC Secretariat and FSOC members and/or representatives
and their responses to the questionnaire developed by the CIGFO Working Group, we
learned that FSOC monitors these activities in several ways: (1) periodic discussion of
international topics at the FSOC principals’5 meetings, including presentations by experts
from relevant member agencies; (2) information sharing at FSOC committee-level meetings;
and (3) the development and publishing of its annual reports, which describe important
international proposals and developments, identify potential emerging threats to U.S.
financial stability, and may include recommendations related to these issues. In
addition, some member agencies have their own international engagement, which can
inform their participation in FSOC meetings.

FSOC Principals and FSOC Committee Meetings

FSOC has a statutory duty to facilitate information sharing and coordination among
its member agencies and other Federal and State agencies.6 Through this role, FSOC
works to address gaps and weaknesses within the regulatory structure that could pose
risks to U.S. financial stability, and to promote a safer and more stable financial
system. FSOC exercises its convening authority both through meetings of FSOC members
and through its staff-level committee structure.
We noted that the principals held 17 meetings
during the audit period and international topics
were discussed at 10 of those meetings.

Footnote 5: Principals are FSOC members, most of whom are heads of federal or state
financial regulatory agencies. [End of footnote]

Footnote 6: 12 U.S.C. 5322(a)(2)(E). [End of footnote]

FSOC operates under a committee structure to promote shared responsibility among its
members and member agencies and to leverage the expertise that already exists at each
agency. These committees consist of senior or staff level representatives from each
of the FSOC members. We identified two primary committees that support the Council’s
monitoring of international activities, FSOC’s Regulation and Resolution Committee (RRC)
and FSOC’s SRC. The RRC is tasked with identifying potential gaps in regulation that
could pose risks to U.S. financial stability, and the SRC is tasked with identifying
risks and responding to emerging threats to the stability of the U.S. financial system.
During the audit period, the RRC held nine meetings to discuss topics that were regulatory
in nature. We were told by an FSOC Secretariat official that most of the topics had
international aspects. Additionally, the SRC held 10 meetings during the audit period
to receive briefings from FSOC member agencies on a range of international topics that
had a bearing or potential bearing on financial stability and to discuss the issues
raised.

Topics discussed during SRC and RRC meetings included: European political and market
developments, the United Kingdom referendum to leave the European Union (known
as Brexit), Basel standards, the European banking sector (including Greece), China’s
economy and potential spillover risks, virtual currency, the London Interbank Offered
Rate (LIBOR), central counterparty supervisory stress tests, and qualified financial
contracts. We determined that many topics discussed at the committee meetings were
raised with the Council and were included, as appropriate, in FSOC’s annual report.

Most FSOC members and/or representatives that we interviewed or coordinated with noted
that the SRC is FSOC’s primary mechanism to monitor international financial regulatory
proposals and developments. The SRC serves as a forum for FSOC members and member
agencies to identify, discuss, and analyze potential risks to U.S. financial stability,
which may extend beyond the jurisdiction of a single agency.

Representatives from one member agency stated that proposals and developments monitored
by these committees are shared with the Deputies Committee,7 sometimes as part of a
committee meeting readout, and sometimes as a standalone presentation. Representatives
from another member agency stated that when there is an international financial
regulatory proposal or development of concern from a financial stability perspective,
the Deputies Committee and/or the Council receive briefings from relevant experts
from FSOC member agencies to inform them about the topic.

Footnote 7: The members of the Deputies Committee are senior officials from each of the
member agencies. This committee coordinates and oversees the work of the other interagency
staff committees. [End of footnote]

In addition, several FSOC members and/or representatives stated that FSOC focuses
more on domestic activities than those of an international nature due to the greater
potential influence of domestic developments on U.S. financial stability. For example,
representatives from one member agency stated that FSOC member agencies that are the
lead on domestic regulatory proposals and developments with financial stability
implications are available to brief FSOC members and/or its committees. Despite the
emphasis on domestic developments, briefings on international financial regulatory
proposals and developments are provided by FSOC member experts.

Annual Reporting

The Dodd-Frank Act requires FSOC to report to Congress annually about: (1) its
activities; (2) significant financial market and regulatory developments; (3) potential
emerging threats to the financial stability of the United States; and (4) recommendations
to: (i) enhance the integrity, efficiency, competitiveness, and stability of U.S.
financial markets; (ii) promote market discipline; and (iii) maintain investor confidence,
among other things. Consistent with this charge, we found that FSOC’s annual reports
described the activities of the Council and its subcommittees, including international
financial regulatory proposals and developments. Most of the FSOC members and/or
representatives we interviewed or coordinated with, told us that FSOC monitors international
financial regulatory proposals and developments through its annual reporting process.
Specifically, many FSOC members and/or representatives participate in FSOC’s annual report
drafting process, which serves as an opportunity for participating members and member
agencies to discuss and provide input about international activities.

FSOC has made no recommendations related to international financial regulatory proposals
and developments in its annual reports, which FSOC has issued to Congress each year since
its inception in 2010. An FSOC Secretariat official told us that should the Council identify
a need to make a recommendation related to an international regulatory proposal or development,
it would likely accomplish this through its annual report.

Individual Member Agencies’ Efforts

Some FSOC member agencies independently monitor international activities within their agencies’
purview and hold discussions with foreign counterparts. The knowledge these member agencies
gain from these activities can be shared among each other and at FSOC meetings. Examples of
agencies’ independent activities include: participation in working groups and committees of
the Financial Stability Board (FSB) and other international organizations,8 and information
sharing with agencies’ international affairs offices. For example, Treasury participates
in the FSB. The Securities and Exchange Commission is active in monitoring international
activities and regulatory developments through a variety of methods, including participation
in international financial regulatory organizations of which it is a member (e.g.,
FSB, International Organization of Securities Commission (IOSCO) and working groups
thereof), and direct engagement with foreign counterparts that are market regulators. The
Commodity Futures Trading Commission conducts its own monitoring of international
financial regulatory proposals through its membership in the IOSCO, the Over-The-
Counter Derivatives Regulators Group, and as an invited guest to working groups and
committees of the FSB. The Federal Deposit Insurance Corporation participates in
international standard-setting bodies and engages in its own discussions with international
supervisors and regulators. The Board of Governors of the Federal Reserve System
monitors international financial developments consistent with its mandate. For example,
the Federal Reserve Board’s Division of International Finance conducts research,
analyzes policies, and reports in the areas offoreign economic activity, U.S. external trade
and capital flows, and developments in international financial markets and institutions.
FSOC Secretariat officials told us that FSOC seeks to avoid duplication or overlap with its
member agencies’ individual efforts in monitoring international developments.

Footnote 8: The FSB was established in April 2009 and serves as an international body that
monitors and makes recommendations about the global financial system. The U.S. member
institutions on the Board are the Board of Governors of the Federal Reserve System, the
U.S. Securities and Exchange Commission, and Treasury. Additional background is available
online at www.fsb.org.

FSOC MEMBERS CONSIDER THE MONITORING PROCESS ADEQUATE

All FSOC members and/or representatives who provided views on this issue described
FSOC’s monitoring of international financial regulatory proposals and developments as
adequate since FSOC’s monitoring process accomplishes its intended purpose, which is
to keep abreast of international issues that may pose risks to the U.S. financial system
and raise awareness of those issues. We note that as a practical matter, FSOC does
not have decision making authority over international financial regulatory proposals
or developments.

A couple of members suggested that FSOC could enhance its monitoring process by
incorporating additional or more focused briefings at its principals and committee
meetings. One of these members suggested that FSOC’s RRC could receive periodic updates
on key international regulatory proposals being considered in various financial sectors
while the SRC could receive periodic updates on international market developments. That
member also suggested that it would be appropriate for the Nonbank Financial Companies
Designations Committee (Nonbank Designations Committee)9 to receive updates regarding the
global systemically important insurers’10 process and/or activities-based approach being
discussed at the International Association of Insurance Supervisors.11 In addition, the
member stated that it would make sense for the principals to receive briefings regarding
the most significant proposals and market developments to the extent that those proposals
and developments may impact U.S. financial stability.

Footnote 9: The Nonbank Designations Committee supports FSOC in fulfilling its
responsibilities to consider, make, and review determinations that nonbank financial
companies shall be supervised by the Board of Governors of the Federal Reserve System and
be subject to enhanced prudential standards, pursuant to the Dodd-Frank Act. [End of
footnote]

Footnote 10: Insurers identified by the FSB as those whose distress or disorderly failure,
because of their size, complexity, and interconnectedness, would cause significant
disruption to the global financial system and economic activity. [End of footnote]

Another member suggested that agencies who participate in international regulatory
coordination and standard-setting bodies could make a greater effort to regularly present
to the SRC, RRC, or other FSOC committees about their coordination efforts with
international regulatory authorities, as appropriate. The member suggested FSOC should
make a greater effort to cover, in committee meetings, the risks posed to systemically
important foreign financial institutions by domestic and international financial regulatory
proposals and developments. According to that member, international topics covered
by the SRC are generally related to international economic or political developments as
opposed to international financial regulatory developments. This member suggested that
FSOC could make a greater effort to connect emerging international risks to international
financial regulatory proposals intended to mitigate those risks. Additionally, this member
stated that greater effort could be made by the SRC to cover international developments
and proposals discussed in FSOC’s annual report.

Additionally, representatives from one FSOC member agency stated that FSOC does not
need to get involved in areas where regulators already exist and should continue monitoring
areas such as risks related to LIBOR, European debt, and the Chinese shadow banking system,
where there is no lead U.S. financial regulatory agency.

Footnote 11: Established in 1994, the International Association of Insurance Supervisors
is the international standard-setting body responsible for developing principles, standards,
and other supporting material for the supervision of the insurance sector and assisting in
their implementation. [End of footnote]

CONCLUSION

We determined that FSOC has a process for monitoring international financial regulatory
proposals and developments. FSOC’s monitoring is evidenced by the discussion of international
topics at FSOC principals’ meetings, information sharing at FSOC committee-level
meetings, and the development and publishing of its annual report.

All FSOC members or member representatives who offered an opinion described FSOC’s process
to monitor international financial regulatory proposals and developments as adequate.
Although they described FSOC’s monitoring process as adequate, several members and/or
representatives offered suggestions for enhancing the process which included, but were
not limited to: (1) asking member agencies who participate in international regulatory
coordination, as well as standard-setting bodies, to regularly present to FSOC’s
committees on coordination efforts with international regulatory authorities; (2)
making a greater effort to cover the risks posed to systemically important foreign
financial institutions by domestic and international financial regulatory proposals
and developments; (3) separating the types of periodic updates received by the SRC and
RRC—specifically, international market updates versus international financial regulatory
proposals, respectively; (4) receiving briefings at principals’ meetings regarding
the most significant international financial regulatory proposals and market developments
to the extent that those activities may impact U.S. financial stability; and (5)
continuing FSOC’s monitoring efforts in areas where no lead financial regulatory
agency exists.

We encourage FSOC to consider incorporating into its process the suggestions made by
its members to the extent the suggestions are consistent with FSOC’s focus on identifying
and addressing threats to the stability of U.S. financial system. We are not making
any recommendations to FSOC as a result of our audit.

FSOC Response

In a written response, Treasury, on behalf of the FSOC Chairperson, acknowledged
its monitoring of international financial regulatory proposals and developments as
outlined in this report. The response stated that the suggestions made by several FSOC
members to further enhance the Council’s work will be considered.

Appendix I:

Objective, Scope, and Methodology

Objective

The audit objective was to assess the Financial Stability Oversight Council’s (FSOC)
monitoring of international financial regulatory proposals and developments.

Scope and Methodology

The scope of this audit included FSOC’s monitoring of international financial regulatory
proposals and developments from January 2016 through January 2018.

To accomplish our objective, we:

• reviewed the Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act) to
determine FSOC’s statutory purposes and duties;

• interviewed staff from the FSOC Secretariat to determine FSOC’s process of monitoring
international financial regulatory proposals and developments;

• interviewed or coordinated with FSOC members and member agency representatives to obtain
their views and to determine their involvement in FSOC’s process of monitoring international
financial regulatory proposals and developments;

• reviewed past FSOC and Council of Inspectors General on Financial Oversight annual reports,
FSOC’s bylaws, FSOC’s committee charters for the following committees: Data Committee;
Financial Market Utilities and Payment, Clearing and Settlement Activities Committee; Nonbank
Financial Companies Designations Committee; Regulation and Resolution Committee; and the
Systemic Risk Committee;

• reviewed FSOC’s Principals’ meeting minutes, and meeting agendas for FSOC’s Systemic Risk
Committee and Regulation and Resolution Committee (FSOC is not required to prepare meeting
minutes for committee meetings; therefore, we could only review agendas for these groups);
and

• created a questionnaire designed to gather specific information regarding each FSOC member
and member agency’s participation in the monitoring of international financial regulatory
proposals and developments as well as their assessment of FSOC’s work in this area. This
questionnaire was used by each of the Working Group members to facilitate the consistent
collection of information from all interviewees. Several members self-reported their
responses to the questionnaire.

We performed fieldwork from February through June 2018. We conducted this performance
audit in accordance with generally accepted government auditing standards. Those standards
require that we plan and perform the audit to obtain sufficient, appropriate evidence to
provide a reasonable basis for our findings and conclusions based on our audit objectives.
We believe that the evidence obtained provides a reasonable basis for our findings and
conclusions based on our audit objectives.

[End of Appendix 1 Objective, Scope, and Methodology]

Appendix II:

Prior CIGFO Reports

The Council of Inspectors General on Financial Oversight (CIGFO) has issued the following
prior reports:

• Audit of the Financial Stability Oversight Council’s Controls over Non-public Information,
June 2012

• Audit of the Financial Stability Oversight Council’s Designation of Financial Market
Utilities, July 2013

• Audit of the Financial Stability Oversight Council’s Compliance with Its Transparency
Policy, July 2014

• Audit of the Financial Stability Oversight Council’s Monitoring of Interest Rate Risk
to the Financial System, July 2015

• Audit of the Financial Stability Oversight Council’s Efforts to Promote Market
Discipline, February 2017

• CIGFO’s Corrective Verification Action on the Audit of the Financial Stability
Oversight Council’s Designation of Financial Market Utilities, May 2017

• Top Management and Performance Challenges Facing Financial Regulatory Organizations,
September 2018

[End of Appendix II: Prior CIGFO Reports]

Appendix III: FSOC Response

December 19, 2018

The Honorable Eric M. Thorson
Chair, Council of Inspectors General
on Financial Oversight (CIGFO)
1500 Pennsylvania Avenue, NW
Washington, D.C. 20220

Re: Response to Draft Audit Report: CIGFO’s Audit of the Financial Stability Oversight
Council’s Monitoring of International Financial Regulatory Proposals and Developments

Dear Mr. Chairman:

Thank you for the opportunity to review and respond to your draft audit report. Audit of
the Financial Stability Oversight Council’s Monitoring of International Financial Regulatory
Proposals and Developments (the Draft Report). The Financial Stability Oversight Council
(FSOC) appreciates the CIGFO working group’s review of the FSOC’s efforts to monitor
international issues consistent with its statutory duties. This letter responds on behalf of
Secretary Mnuchin, as Chairperson of FSOC, to the Draft Report.

As the Draft Report notes, FSOC monitors international financial regulatory proposals and
developments in several ways, including through the development of its annual reports;
discussions at Council and staff-level committee meetings and other staff-level discussions;
and through the direct international engagement of its member agencies that inform their
participation on FSOC. The report noted that FSOC members and their staffs expressed their
overall satisfaction with FSOC’s monitoring in this area and believe the process is adequate.
CIGFO made no recommendations as a result of the working group review. The Draft Report
notes that several FSOC members offered suggestions to further enhance FSOC’s work, which
we will consider in the future.

Thank you again for the opportunity to review and comment on the Draft Report. We value
CIGFO’s input and look forward to continuing our constructive engagement with you.

Sincerely,

/s/

Bimal Patel

Deputy Assistant Secretary for the Financial Stability Oversight Council

[End of Appendix III: FSOC Response]

Appendix IV: CIGFO Working Group

Department of the Treasury Office of Inspector General, Lead Agency

Eric M. Thorson, Inspector General, Department of the Treasury, and CIGFO Chair

Deborah Harker

Lisa Carter

Jeffrey Dye

Vicki Preston

Virginia Shirley

Clyburn Perry III

Board of Governors of the Federal Reserve System and the Bureau of Consumer Financial
Protection Office of Inspector General

Mark Bialek, Inspector General, Board of Governors of the Federal Reserve System and Bureau of
Consumer Financial Protection

Chie Hogenmiller

Melissa Chammas

Commodity Futures Trading Commission Office of Inspector General

A. Roy Lavik, Inspector General, Commodity Futures Trading Commission

Miguel Castillo

Branco Garcia

Federal Deposit Insurance Corporation Office of Inspector General

Jay N. Lerner, Inspector General, Federal Deposit Insurance Corporation

Robert Fry

Federal Housing Finance Agency Office of Inspector General

Laura Wertheimer, Inspector General, Federal Housing Finance Agency

Marla Freedman

Bob Taylor

Jim Lisle

April Ellison

Securities and Exchange Commission Office of Inspector General

Carl W. Hoecker, Inspector General, Securities and Exchange Commission

Rebecca L. Sharek

Carrie Fleming

[End of Appendix IV: CIGFO Working Group]

[End of report]