Watchdog: Millions in Katrina Aid Unaccounted For

This aerial photo from 2005 shows the devastation caused by the high winds and heavy flooding in the greater New Orleans area following Hurricane Katrina. This aerial photo from 2005 shows the devastation caused by the high winds and heavy flooding in the greater New Orleans area following Hurricane Katrina. Vincent Laforet/AP File Photo

Nearly $700 million in federal aid for victims of Hurricanes Katrina and Rita is unaccounted for, according to a new report from a government watchdog.

More than 24,000 homeowners in Louisiana who received millions in disaster recovery grants after the 2005 storms either did not comply with the terms of the aid, were nonresponsive, or did not provide sufficient documentation of how they spent the money as of August 2012, the Housing and Urban Development Department’s inspector general found.

“Therefore the state did not have conclusive evidence that the $698.5 million in Community Development Block Grant disaster recovery funds had been used to elevate homes,” the March 2013 report stated. The IG was following up on its March 2010 review of Louisiana’s elevation incentive program, part of the state’s $9 billion Road Home Program to help people rebuild after Katrina and Rita. The $940.5 million elevation incentive program offered eligible homeowners grants of up to $30,000; in return homeowners agreed to comply with elevation requirements and with building and manufactured housing codes in their area within three years, as well as maintain homeowner and flood insurance.

Louisiana, which developed a program to monitor homeowners who received federal funds and identify those who haven’t met the program requirements, is working with HUD to ensure greater compliance and responsiveness, said Patrick Forbes, executive director of the state’s Office of Community Development. “Rather than immediately embarking on the process of recapturing funds from all applicants who do not currently have all required compliance documentation in their files, [the state office] believes it is prudent to bring more applicants into compliance through ongoing file completion, elevation activities and working with HUD to approve and implement action plan amendments, reserving grant recovery for those applicants who cannot achieve compliance through these and or other means,” Forbes wrote in response to the IG report.

The IG findings have prompted concern over how the government plans to manage the nearly $16 million in disaster recovery aid for the Northeast after October 2012’s devastating megastorm Sandy. Sen. Tom Coburn, R-Okla., sent an April 1 letter to HUD Secretary Shaun Donovan asking how the department will ensure that money is properly spent and accounted for. “HUD must be diligent in its oversight of elevation funds as they are granted, and not years later,” Coburn wrote. President Obama designated Donovan to oversee the federal response to Sandy.

Disasters create different categories of need and the government’s way of prioritizing those needs can perplex victims as well as federal and state officials. HUD and the Federal Emergency Management Agency, for instance, are only two of several agencies that administer disaster assistance, and figuring out who is eligible for what kind of aid often is as confusing and overwhelming as the disaster itself.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.