October 21, 2021


News Network

South Sudan Travel Advisory

22 min read

Do not travel to South Sudan due to COVID-19, crime, kidnapping, and armed conflict.

Read the Department of State’s COVID-19 page before you plan any international travel.

The Centers for Disease Control and Prevention (CDC) has issued a Level 3 Travel Health Notice for South Sudan due to COVID-19.

Travelers to South Sudan may experience border closures, airport closures, travel prohibitions, stay at home orders, business closures, and other emergency conditions within South Sudan due to COVID-19. Visit the Embassy’s COVID-19 page for more information on COVID-19 in South Sudan.

Violent crime, such as carjacking’s, shootings, ambushes, assaults, robberies, and kidnappings is common throughout South Sudan, including Juba. Foreign nationals have been the victims of rape, sexual assault, armed robberies, and other violent crimes.

Armed conflict is ongoing and includes fighting between various political and ethnic groups. Weapons are readily available to the population. In addition, cattle raids occur throughout the country and often lead to violence.

Reporting in South Sudan without the proper documentation from the South Sudanese Media Authority is considered illegal, and any journalistic work there is very dangerous. Journalists regularly report being harassed in South Sudan, and many have been killed while covering the conflict.

The U.S. government has limited ability to provide emergency consular services to U.S. citizens in South Sudan. U.S. government personnel in South Sudan are under a strict curfew. They must use armored vehicles for nearly all movements, and official travel outside Juba is limited. Due to the critical crime threat in Juba, walking is also restricted; when allowed, it is limited to a small area in the immediate vicinity of the Embassy and during daylight hours only. Family members cannot accompany U.S. government employees who work in South Sudan.

Due to risks to civil aviation operating within or in the vicinity of South Sudan, the Federal Aviation Administration (FAA) has issued a Notice to Airmen (NOTAM) and/or a Special Federal Aviation Regulation (SFAR). For more information U.S. citizens should consult Federal Aviation Administration’s Prohibitions, Restrictions and Notices.

Read the country information page.

If you decide to travel to South Sudan:

  • See the U.S. Embassy’s web page regarding COVID-19.
  • Visit the CDC’s webpage on Travel and COVID-19.
  • Exercise extreme care in all parts of the country, including Juba. Travel outside of Juba with a minimum of two vehicles along with appropriate recovery and medical equipment in case of mechanical failure or other emergency.
  • Avoid travel along border areas.
  • Avoid demonstrations and public gatherings. Even events intended to be peaceful can become violent.
  • Be aware that photography in public is strictly controlled and you are required to obtain authorization from the Ministry of Information before taking any photographs or video in public – including while inside a vehicle.
  • Monitor local/international news and consular messages.
  • Enroll your trip in the State Department’s Smart Traveler Enrollment Program (STEP).
  • Review your personal security plan and visit our page on travel to high risk areas.
  • Draft a will and designate appropriate insurance beneficiaries and/or power of attorney.
  • Discuss a plan with loved ones regarding care/custody of children, pets, property, belongings, non-liquid assets (collections, artwork, etc.), funeral wishes, etc.
  • Share important documents, log-in information, and points of contact with loved ones so that they can manage your affairs, if you are unable to return as planned to the United States. Find a suggested list of such documents here.
  • Establish your own personal security plan in coordination with your employer or host organization, or consider consulting with a professional security organization. Your plan should include sheltering in place, maintaining outside communication, and a personal evacuation plan via commercial means.
  • Develop a communication plan with family and/or your employer or host organization so that they can monitor your safety and location as you travel through high-risk areas. This plan should specify who you would contact first, and how they should share the information.
  • Be sure to appoint one family member to serve as the point of contact with hostage-takers, media, U.S. and host country government agencies, and Members of Congress, if you are taken hostage or detained.
  • Establish a proof of life protocol with your loved ones, so that if you are taken hostage, your loved ones can know specific questions (and answers) to ask the hostage-takers to be sure that you are alive (and to rule out a hoax).
  • Leave DNA samples with your medical provider in case it is necessary for your family to access them.
  • Erase any sensitive photos, comments, or other materials from your social media pages, cameras, laptops, and other electronic devices that could be considered controversial or provocative by local groups.
  • Leave your expensive/sentimental belongings behind.
  • Follow the Department of State on Facebook and Twitter.
  • Review the Crime and Safety Report for South Sudan.
  • U.S. citizens who travel abroad should always have a contingency plan for emergency situations. Review the Traveler’s Checklist.

Last Update: Reissued with updates to COVID-19 information.

News Network

  • Next Generation Combat Vehicles: As Army Prioritizes Rapid Development, More Attention Needed to Provide Insight on Cost Estimates and Systems Engineering Risks
    In U.S GAO News
    The four efforts within the Next Generation Combat Vehicles (NGCV) portfolio all prioritize rapid development, while using different acquisition approaches and contracting strategies. Some of the efforts use the new middle-tier acquisition approach, which enables rapid development by exempting programs from many existing DOD acquisition processes and policies. Similarly, the efforts use contracting strategies that include both traditional contract types as well as more flexible approaches to enable rapid development of technology and designs. Vehicles of the Next Generation Combat Vehicles Portfolio The two programs within the portfolio that recently initiated acquisitions—Mobile Protected Firepower and Optionally Manned Fighting Vehicle—have taken some steps to mitigate risks in cost and technology consistent with GAO's leading practices. The Army's use of the middle-tier approach for these efforts may facilitate rapid development, but the programs could benefit from additional application of GAO's leading practices. For example, the programs identified some risks in their cost estimates, but because each presented a single estimate of the total cost—referred to as a point estimate—these estimates do not fully reflect how uncertainty could affect costs. Similarly, the programs took some steps to mitigate technical risk by limiting development to 6 years or less and incrementally introducing new technologies, steps consistent with GAO's leading practices. However, by delaying key systems engineering reviews, the programs took some steps not consistent with leading practices, which could increase technical risk. While trade-offs may be necessary to facilitate rapid development, more consistent application of GAO's leading practices for providing cost estimates that reflect uncertainty and conducting timely systems engineering reviews could improve Army's ability to provide insight to decision makers and deliver capability to the warfighter on time and at or near expected costs. The Army has taken actions to enhance communication, both within the Army and with Department of Defense stakeholders, to mitigate risks. Within the Army, these actions included implementing a cross-functional team structure to collaboratively develop program requirements with input from acquisition, contracting, and technology development staff. Program officials also coordinated with other Army and Department of Defense stakeholders responsible for cost and test assessment, even where not required by policy, to mitigate risk. The Army views the NGCV portfolio as one of its most critical and urgent modernization priorities, as many current Army ground combat vehicles were developed in the 1980s or earlier. Past efforts to replace some of these systems failed at a cost of roughly $23 billion. In November 2017, the Army began new efforts to modernize this portfolio. GAO was asked to review the Army's plans for modernizing its fleet of ground combat vehicles. This report examines (1) the acquisition approaches and contracting strategies the Army is considering for the NGCV portfolio, (2) the extent to which the Army's efforts to balance schedule, cost, and technology are reducing acquisition risks for that portfolio, and (3) how the Army is communicating internally and externally to reduce acquisition risks. GAO reviewed the acquisition and contracting plans for each of the vehicles in the portfolio to determine their approaches; assessed schedule, cost, and technology information—where available—against GAO's leading practice guides on these issues as well as other leading practices for acquisition; and interviewed Army and DOD officials. GAO is making three recommendations, including that the Army follow leading practices on cost estimation and systems engineering to mitigate program risk. In its response, the Army concurred with these recommendations and plans to take action to address them. For more information, contact Jon Ludwigson at (202) 512-4841 or ludwigsonj@gao.gov.
    [Read More…]
  • Whither Arms Control in Outer Space? Space Threats, Space Hypocrisy, and the Hope of Space Norms
    In Crime Control and Security News
    Dr. Christopher Ashley [Read More…]
  • Antitrust Division and Fellow Members of the Multilateral Pharmaceutical Merger Task Force Seek Public Input
    In Crime News
    The U.S. Department of Justice’s Antitrust Division is pleased to be a part of the Multilateral Pharmaceutical Merger Task Force (Task Force), along with its counterpart competition enforcement agencies — the Federal Trade Commission (FTC), the Canadian Competition Bureau, the European Commission Directorate General for Competition, the United Kingdom’s Competition and Markets Authority, and Offices of State Attorneys General.
    [Read More…]
  • Sanctioning Cuban Officials in Response to Violence against Peaceful Protestors
    In Crime Control and Security News
    Antony J. Blinken, [Read More…]
  • Justice Department Files Lawsuit Against Two California Doctors for Discrimination Against Patient with HIV
    In Crime News
    The Justice Department filed lawsuits today alleging that two obstetrician-gynecologist (OB/GYN) doctors in Bakersfield, California refused to provide routine medical care to a patient on the basis of her HIV status, in violation of Title III of the Americans with Disabilities Act (ADA).
    [Read More…]
  • 2020 Indo-Pacific Business Forum Promotes Free and Open Indo-Pacific
    In Crime Control and Security News
    Office of the [Read More…]
  • Information Technology: Agencies Need to Develop and Implement Modernization Plans for Critical Legacy Systems
    In U.S GAO News
    What GAO Found In June 2019, GAO identified 10 critical federal information technology (IT) legacy systems that were most in need of modernization. These legacy systems provided vital support to agencies' missions. According to the agencies, these legacy systems ranged from about 8 to 51 years old and, collectively, cost about $337 million annually to operate and maintain. Several of the systems used older languages, such as Common Business Oriented Language (COBOL). GAO has previously reported that reliance on such languages has risks, such as a rise in procurement and operating costs, and a decrease in the availability of individuals with the proper skill sets. Further, several of the legacy systems were operating with known security vulnerabilities and unsupported hardware and software. Of the 10 agencies responsible for these legacy systems, GAO reported in June 2019 that seven agencies (the Departments of Defense, Homeland Security, the Interior, the Treasury; as well as the Office of Personnel Management; Small Business Administration; and Social Security Administration) had documented plans for modernizing the systems (see table). Of the seven agencies with plans, only the Departments of the Interior's and Defense's modernization plans included all of the key elements identified in best practices (milestones, a description of the work necessary to complete the modernization, and a plan for the disposition of the legacy system). The other five agencies lacked complete modernization plans. The Departments of Education, Health and Human Services, and Transportation did not have documented modernization plans. Table: Extent to Which Agencies' Had Documented Modernization Plans for Legacy Systems That Included Key Elements, as of June 2019 Agency Included milestones to complete the modernization Described work necessary to modernize system Summarized planned disposition of legacy system Department of Defense Yes Yes Yes Department of Education n/a – did not have a documented modernization plan Department of Health and Human Services n/a – did not have a documented modernization plan Department of Homeland Security No Yes No Department of the Interior Yes Yes Yes Department of the Treasury Partial Yes No Department of Transportation n/a – did not have a documented modernization plan Office of Personnel Management Partial Partial No Small Business Administration Yes No Yes Social Security Administration Partial Partial No Source: GAO analysis of agency modernization plans. | GAO-21-524T Agencies received a “partial” if the element was completed for a portion of the modernization. GAO stressed that, until the eight agencies established complete plans, their modernizations would face an increased risk of cost overruns, schedule delays, and project failure. Accordingly, GAO recommended that each of the eight develop such plans. However, to date, seven of the agencies had not done so. It is essential that agencies implement GAO's recommendations and these plans in order to meet mission needs, address security risks, and reduce operating costs. Why GAO Did This Study Each year, the federal government spends more than $100 billion on IT and cyber-related investments. Of this amount, agencies have typically spent about 80 percent on the operations and maintenance of existing IT investments, including legacy systems. However, federal legacy systems are becoming increasingly obsolete. In May 2016, GAO reported instances where agencies were using systems that had components that were at least 50 years old or the vendors were no longer providing support for hardware or software. Similarly, in June 2019 GAO reported that several of the federal government's most critical legacy systems used outdated languages, had unsupported hardware and software, and were operating with known security vulnerabilities. GAO was asked to testify on its June 2019 report on federal agencies' legacy systems. Specifically, GAO summarized (1) the critical federal legacy systems that we identified as most in need of modernization and (2) its evaluation of agencies' plans for modernizing them. GAO also provided updated information regarding agencies' implementation of its related recommendations.
    [Read More…]
  • [Protest of DPSC Contract Award for Retractor Holder Sets]
    In U.S GAO News
    A firm protested a Defense Personnel Support Center (DPSC) contract award for retractor holder sets, contending that: (1) the awardee's item failed to conform to the solicitation requirements; (2) DPSC should have conducted a preaward survey of the awardee; and (3) the award violated patents held by the protester. GAO held that the protest was untimely, since the protester did not diligently pursue its basis for protest or request a post-award debriefing where it could have obtained the same or similar information pursuant to its Freedom of Information Act request. Accordingly, the protest was dismissed.
    [Read More…]
  • Actions in Turkey’s Parliament
    In Crime Control and Security News
    Ned Price, Department [Read More…]
  • Disaster Block Grants: Factors to Consider in Authorizing a Permanent Program
    In U.S GAO News
    What GAO Found In March 2019, GAO reported that because the Community Development Block Grant Disaster Recovery (CDBG-DR) program lacks permanent authority and regulations—unlike other disaster assistance programs—appropriations require the Department of Housing and Urban Development (HUD) to customize grant requirements for each disaster in Federal Register notices—a time-consuming process. GAO identified challenges associated with the lack of permanent statutory authority, including delays in disbursal of funds and the need for grantees to manage multiple grants with different rules. For example, GAO found it took HUD 5 months after the first appropriation for the 2017 hurricanes (Hurricanes Harvey, Irma, and Maria) for HUD to issue the first Federal Register notice establishing the grant requirements. Officials from one of the 2017 CDBG-DR grantees told GAO of challenges managing multiple CDBG-DR grants it received over the years because each grant had different rules. HUD officials noted then that permanently authorizing CDBG-DR would allow HUD to issue permanent regulations for disaster recovery. GAO identified factors to consider when weighing whether and how to permanently authorize a program for unmet disaster assistance needs. These factors, which are based on GAO's body of work on emergency management and past observations of broader government initiatives, include the following: Clarify how the program would fit into the broader federal disaster framework. GAO has emphasized the importance of articulating a program's relationship to other programs and of aligning the program within organizations with compatible missions and goals. This is particularly important with disaster programs, given the approximately 30 agencies involved in disaster recovery. Clarify the purpose and design the program to address it. Greater clarity about the purpose of CDBG-DR could help resolve implementation issues GAO has previously identified, such as how much time grantees should have to spend funds and the proportion of funds that should be distributed to renters. Consider the necessary capacity and support infrastructure to implement the program. GAO's prior work found that state, local, territorial, and tribal grantees and federal agencies faced capacity challenges in administering and overseeing federal grant funds, including CDBG-DR. Capacity challenges for grantees may contribute to fraud risks and slow expenditure of funds. Why GAO Did This Study Legislation proposed over the years would permanently authorize CDBG-DR or a similar program, but no proposal has been enacted. Since 1993, Congress has provided over $90 billion in supplemental appropriations through HUD's CDBG program to help communities recover from disasters. Just since 2001, HUD has issued over 100 Federal Register notices linked to these funds. Communities use these funds to address unmet needs for housing, infrastructure, and economic revitalization. HUD is one of approximately 30 federal agencies tasked with disaster recovery. This testimony discusses (1) challenges associated with the lack of permanent statutory authority for CDBG-DR and (2) factors to consider when weighing whether and how to permanently authorize CDBG-DR or a similar program. It is based primarily on GAO's March 2019 and May 2021 reports on CDBG-DR (GAO-19-232 and GAO-21-177) and GAO reports issued between February 2004 and June 2019 that identified factors to consider in making critical federal policy decisions. For those reports, GAO reviewed documentation on CDBG-DR and its observations of efforts to reorganize or streamline government, among other things.
    [Read More…]
  • Justice Department Reaches Settlement with San Antonio Housing Providers for Charging Unlawful Lease Termination Fees to Servicemembers
    In Crime News
    The Justice Department today announced that it has reached an agreement with the former owners of two apartment complexes in San Antonio, Texas, to resolve allegations that they violated the Servicemembers Civil Relief Act (SCRA) by imposing unlawful lease termination charges on 41 servicemembers and by refusing to allow four other servicemembers to terminate their leases early.
    [Read More…]
  • Aviation Cybersecurity: FAA Should Fully Implement Key Practices to Strengthen Its Oversight of Avionics Risks
    In U.S GAO News
    Modern airplanes are equipped with networks and systems that share data with the pilots, passengers, maintenance crews, other aircraft, and air-traffic controllers in ways that were not previously feasible (see fig. 1). As a result, if avionics systems are not properly protected, they could be at risk of a variety of potential cyberattacks. Vulnerabilities could occur due to (1) not applying modifications (patches) to commercial software, (2) insecure supply chains, (3) malicious software uploads, (4) outdated systems on legacy airplanes, and (5) flight data spoofing. To date, extensive cybersecurity controls have been implemented and there have not been any reports of successful cyberattacks on an airplane's avionics systems. However, the increasing connections between airplanes and other systems, combined with the evolving cyber threat landscape, could lead to increasing risks for future flight safety. Figure 1: Key Systems Connections to Commercial Airplanes The Federal Aviation Administration (FAA) has established a process for the certification and oversight of all US commercial airplanes, including the operation of commercial air carriers (see fig. 2). While FAA recognizes avionics cybersecurity as a potential safety issue for modern commercial airplanes, it has not fully implemented key practices that are necessary to carry out a risk-based cybersecurity oversight program. Specifically, FAA has not (1) assessed its oversight program to determine the priority of avionics cybersecurity risks, (2) developed an avionics cybersecurity training program, (3) issued guidance for independent cybersecurity testing, or (4) included periodic testing as part of its monitoring process. Until FAA strengthens its oversight program, based on assessed risks, it may not be able to ensure it is providing sufficient oversight to guard against evolving cybersecurity risks facing avionics systems in commercial airplanes. Figure 2: Federal Aviation Administration's Certification Process for Commercial Transport Airplanes GAO has previously identified key practices for interagency collaboration that can be used to assess interagency coordination. FAA coordinates with other federal agencies, such as the Departments of Defense (DOD) and Homeland Security (DHS), and with industry to address aviation cybersecurity issues. For example, FAA co-chairs the Aviation Cyber Initiative, a tri-agency forum with DOD and DHS to address cyber risks across the aviation ecosystem. However, FAA's internal coordination activities do not fully reflect GAO's key collaboration practices. FAA has not established a tracking mechanism for monitoring progress on cybersecurity issues that are raised in coordination meetings, and its oversight coordination activities are not supported by dedicated resources within the agency's budget. Until FAA establishes a tracking mechanism for cybersecurity issues, it may be unable to ensure that all issues are appropriately addressed and resolved. Further, until it conducts an avionics cybersecurity risk assessment, it will not be able to effectively prioritize and dedicate resources to ensure that avionics cybersecurity risks are addressed in its oversight program. Avionics systems, which provide weather information, positioning data, and communications, are critical to the safe operation of an airplane. FAA is responsible for overseeing the safety of commercial aviation, including avionics systems. The growing connectivity between airplanes and these systems may present increasing opportunities for cyberattacks on commercial airplanes. GAO was asked to review the FAA's oversight of avionics cybersecurity issues. The objectives of this review were to (1) describe key cybersecurity risks to avionics systems and their potential effects, (2) determine the extent to which FAA oversees the implementation of cybersecurity controls that address identified risks in avionics systems, and (3) assess the extent to which FAA coordinates internally and with other government and industry entities to identify and address cybersecurity risks to avionics systems. To do so, GAO reviewed information on key cybersecurity risks to avionics systems, as reported by major industry representatives as well as key elements of an effective oversight program, and compared FAA's process for overseeing the implementation of cybersecurity controls in avionics systems with these program elements. GAO also reviewed agency documentation and interviewed agency and industry representatives to assess FAA's coordination efforts to address the identified risks. GAO is making six recommendations to FAA to strengthen its avionics cybersecurity oversight program: GAO recommends that FAA conduct a cybersecurity risk assessment of avionics systems cybersecurity within its oversight program to identify the relative priority of avionics cybersecurity risks compared to other safety concerns and develop a plan to address those risks. Based on the assessment of avionics cybersecurity risks, GAO recommends that FAA identify staffing and training needs for agency inspectors specific to avionics cybersecurity, and develop and implement appropriate training to address identified needs. develop and implement guidance for avionics cybersecurity testing of new airplane designs that includes independent testing. review and consider revising its policies and procedures for monitoring the effectiveness of avionics cybersecurity controls in the deployed fleet to include developing procedures for safely conducting independent testing. ensure that avionics cybersecurity issues are appropriately tracked and resolved when coordinating among internal stakeholders. review and consider the extent to which oversight resources should be committed to avionics cybersecurity. FAA concurred with five out of six GAO recommendations. FAA did not concur with the recommendation to consider revising its policies and procedures for periodic independent testing. GAO clarified this recommendation to emphasize that FAA safely conduct such testing as part of its ongoing monitoring of airplane safety. For more information, contact Nick Marinos at (202) 512-9342 or MarinosN@gao.gov, or Heather Krause at (202) 512-2834 or KrauseH@gao.gov.
    [Read More…]
  • Department of Justice Recognizes International Day of Zero Tolerance for Female Genital Mutilation
    In Crime News
    Female genital mutilation (FGM) has broad implications for the health and human rights of women and girls, as well as societies at large.
    [Read More…]
  • Maternal Mortality and Morbidity: Additional Efforts Needed to Assess Program Data for Rural and Underserved Areas
    In U.S GAO News
    What GAO Found Nationwide data from the Centers for Disease Control and Prevention's (CDC) Pregnancy Mortality Surveillance System from 2011-2016, the most recent data available at the time of GAO's review, indicate that deaths during pregnancy or up to 1 year postpartum due to pregnancy-related causes—are higher in rural areas compared to metropolitan areas. See figure. CDC data also showed higher mortality in underserved areas (areas with lower numbers of certain health care providers per capita). Pregnancy-Related Mortality Ratios in Rural and Metropolitan Areas, 2011-2016 Note: Micropolitan areas include counties with populations of 2,500 to 49,999. Noncore areas include nonmetropolitan counties that do not qualify as micropolitan. GAO also analyzed the most recent annual data available from the Agency for Healthcare Research and Quality for 2016-2018 on severe maternal morbidity (SMM)—unexpected outcomes of labor and delivery resulting in significant health consequences. Nationwide, these data showed higher estimated rates of SMM in metropolitan areas (72.6 per 10,000 delivery hospitalizations) compared to rural areas (62.9 per 10,000). CDC and another Department of Health and Human Services (HHS) agency, the Health Resources and Services Administration (HRSA), fund several maternal health programs that aim to reduce maternal mortality and SMM, including some that target rural or underserved areas. CDC and HRSA collect program data, such as the percentage of women who received postpartum visits, to track progress in improving maternal health, but they do not systematically disaggregate and analyze program data by rural and underserved areas. By taking these actions, CDC and HRSA could help better ensure that program funding is being used to help address any needs in these areas. HHS has taken actions to improve maternal health through its funding of various programs and releasing an action plan in 2020. HHS also has two workgroups that aim to coordinate across HHS agencies on maternal health efforts, such as program activities that aim to reduce maternal mortality and SMM. Officials from HHS's two workgroups said they coordinated in developing the action plan, but they do not have a formal relationship established to ensure ongoing coordination. Officials from one of the workgroups noted that they often have competing priorities and do not always coordinate their efforts. By more formally coordinating their efforts, HHS's workgroups may be in a better position to identify opportunities to achieve HHS's action plan goal for reducing maternal mortality and objectives that target rural and underserved areas. Why GAO Did This Study Each year in the United States, hundreds of women die from pregnancy-related causes, and thousands more experience SMM. Research suggests there is a greater risk of maternal mortality and SMM among rural residents and that underserved areas may lack needed health services. GAO was asked to review maternal mortality and SMM outcomes in rural and underserved areas. This report examines, among other objectives, what is known about these outcomes; selected CDC and HRSA programs that aim to reduce these outcomes, as well as actions to collect and use relevant data; and the extent to which HHS is taking actions to improve maternal health and monitoring progress on its efforts. GAO analyzed HHS data, agency documentation, literature, and interviewed officials from a non-generalizable sample of three states and stakeholders to capture various perspectives.
    [Read More…]
  • Justice Department Participates Virtually at G7 Meeting with Security Ministers
    In Crime News
    On Sept. 8-9, 2021, U.S. Attorney General Merrick B. Garland and Deputy Attorney General Lisa O. Monaco met remotely with G7 and EU Security Ministers, along with the Secretary General of INTERPOL, to discuss responding to the rapidly evolving events in Afghanistan, as well as countering racially and ethnically motivated extremism.
    [Read More…]
  • Former Supplement Company Owner Pleads Guilty to Unlawful Distribution of Steroid-like Drugs
    In Crime News
    A New Jersey chiropractor pleaded guilty today to a felony charge relating to the distribution of steroid-like drugs in purported dietary supplements.
    [Read More…]
  • District Court Orders Illinois Sprouts And Soybean Products Company To Comply With Food Safety Rules
    In Crime News
    A federal court permanently enjoined a Chicago firm from preparing and distributing adulterated sprouts and soybean products in violation of federal law, the Department of Justice announced today.
    [Read More…]
  • Celebrate Mars Reconnaissance Orbiter’s Views From Above
    In Space
    Marking its 15th [Read More…]
  • Jury convicts Cuban national for assaulting federal officers
    In Justice News
    A federal jury has [Read More…]
  • Department of Homeland Security: Progress Made Strengthening Management Functions, but Work Remains
    In U.S GAO News
    What GAO Found Shortly after the Department of Homeland Security (DHS) was formed, GAO designated implementing and transforming DHS as a high-risk area to the federal government because it had to transform 22 agencies—several with major management challenges—into one department. Progress made. In 2013, GAO reported that challenges remained for DHS across its range of missions, but that the department had made considerable progress transforming its original component agencies into a single cabinet-level department. As a result, GAO narrowed the scope of the high-risk area to focus on strengthening DHS management functions—specifically acquisition, information technology, financial, and human capital management. DHS's efforts to strengthen and integrate its management functions have resulted in the department meeting 3 of 5 criteria for removal from GAO's High-Risk List—demonstrating leadership commitment, having an action plan, and monitoring the effectiveness of its actions. DHS has partially met the remaining two criteria for removal—having sufficient capacity and demonstrating progress. Several factors contributed to DHS's success in narrowing the scope of the high-risk area. These include: DHS's top leaders demonstrated leadership commitment and support for addressing the department's challenges, which helped ensure sustained, consistent progress in this high-risk area. DHS consistently communicated its efforts and regularly sought constructive and specific feedback from GAO on its strategy and approach to addressing the high-risk area. Work remaining. Continued progress for this high-risk area depends on DHS addressing its remaining management challenges. For example, DHS needs to make additional progress identifying and allocating resources in acquisition and financial management. For instance: DHS lacks acquisition support staffing plans and has not clearly defined which acquisition positions are critical for oversight responsibilities, limiting DHS's insight into whether it has appropriate staff to carry out its duties. DHS's financial statement auditor identified several capacity-related issues, including resource limitations and inadequate staff training, resulting in material weaknesses in its 2020 financial statements. DHS also has work remaining to demonstrate progress implementing corrective measures. Specifically, of the 30 outcome measures GAO uses to gauge the department's progress, DHS has not yet fully addressed 12 of 30 measures. For example, DHS needs to effectively implement its long-term financial systems modernization efforts and use department-wide training data to inform its human capital programs. In the coming years, DHS needs to continue implementing its remaining work and sustaining its progress to-date. Why GAO Did This Study The events of September 11, 2001, led to profound changes in government agendas, policies, and structures to confront homeland security threats. In 2003, DHS began operations, with missions to prevent terrorist attacks and reduce the country's vulnerability to future terrorism. GAO's High-Risk List identifies programs and operations (such as DHS's management functions) that are vulnerable to waste, fraud, abuse, or mismanagement, or in need of transformation. GAO's five criteria for removing areas from the High-Risk List guide the assessment of DHS's progress. This statement addresses DHS's progress and actions needed to strengthen its management functions. It is based on reports in GAO's high-risk series, including its most recent March 2021 update, as well as selected updates on DHS's efforts as of September 2021. For this work, GAO analyzed DHS documents and data and interviewed DHS officials. DHS Progress against High-Risk List Removal Criteria For more information, contact at (404) 679-1875 or curriec@gao.gov.
    [Read More…]
Network News © 2005 Area.Control.Network™ All rights reserved.