Where does federal financial assistance go?

Federal agencies obligate trillions in grants and loans annually. Independent audits provide crucial oversight signals about how these funds are managed.

Explore the data

"Follow the Money. Trust the Recipient."

1.1 Trillion Dollars Obligated (FY24 Est.)

Financial assistance obligations tracked in our dataset for recent fiscal years.

Source: USAspending.gov
40,000+ Audit Reports

Single audit reports filed by non-federal entities receiving significant funding.

Source: Federal Audit Clearinghouse
3 Connected Systems

We link Spending, Audits, and Exclusions to show the full oversight picture.

Source: Project Pipeline

Taxpayer Protection Score (TPS)

A 0–100 score that summarizes audit risk signals into an easy-to-read tier.

How TPS works

  • We start with risk points from audit signals (e.g., material weaknesses, significant deficiencies, repeat findings, questioned costs) and funding context.
  • We cap risk points between 0 and 100 so outliers do not break interpretability.
  • TPS = 100 − capped risk points.
Green (80-100) Trusted: Lower oversight signals; still validate with context.
Yellow (60-79) Watch List: Review patterns and audit flags.
Red (0-59) High Risk: Highest oversight signals; prioritize for deeper review.

Current Dataset Snapshot:
Red (High Risk): ~9,976 entities (avg TPS 17.43)
Yellow (Watch List): ~22,202 entities (avg TPS 68.35)
Green (Trusted): ~10,044 entities (avg TPS 85.48)

TPS Simulator

Adjust risk points to see how the score changes.

80
Green - Trusted

Lower oversight signals. Good standing based on current audit data.

Ready to see real data?

Use TPS to decide where to look, then use dashboards to understand why.

Explore Dashboards ↓
GitHub Repo | Appendix (Methodology) | Tableau Workbooks (below)

Explore the Data

Interactive Tableau dashboards built from USAspending.gov and Federal Audit Clearinghouse (FAC), organized around TPS tiers and oversight signals.

A) Funding by State (USAspending)

What you are seeing: Total obligation amounts aggregated by recipient state.

Why it matters: Helps spot geographic concentration and quickly identify the biggest funding destinations.

Tip: Compare per capita to normalize totals for population.
Interpretation guardrails: Population size affects totals.
Paste Tableau Public Embed URL into [TABLEAU_VIZ_STATE_URL]
Open in Tableau
Embed placeholder: [TABLEAU_VIZ_STATE_URL] Workbook (TWBX on GitHub): USAspending Updated
Note: High spending does not imply inefficiency.

B) Funding Over Time (FY2019–FY2024)

What you are seeing: Trends in obligations across recent fiscal years.

Why it matters: Reveals spikes (for example, pandemic relief) or shifts in funding priorities.

Tip: Look for the COVID-era spike and check which programs drove it.
Interpretation guardrails: Spikes can reflect one-time programs.
Paste Tableau Public Embed URL into [TABLEAU_VIZ_TIME_URL]
Open in Tableau
Embed placeholder: [TABLEAU_VIZ_TIME_URL] Workbook (TWBX on GitHub): USAspending Updated
Compare adjacent years to avoid over-reading noise.

C) Audit Findings Risk Signals (FAC)

What you are seeing: Aggregated audit findings patterns from Federal Audit Clearinghouse data.

Why it matters: Highlights entities or geographies with elevated oversight signals.

Tip: Start with the highest finding counts, then drill into the finding types.
Interpretation guardrails: Screening signal, not proof of wrongdoing.
Paste Tableau Public Embed URL into [TABLEAU_VIZ_FAC_FINDINGS_URL]
Open in Tableau
Embed placeholder: [TABLEAU_VIZ_FAC_FINDINGS_URL] Workbook (TWBX on GitHub): FAC-Merged set
Use audit context when interpreting findings.

D) High-Risk Entities + Funding Context

What you are seeing: A combined view that contextualizes oversight signals with funding and recipient information.

Why it matters: Supports guided analysis and case-study drill downs.

Tip: Start with the highest-risk group, then compare funding totals and counts.
Interpretation guardrails: A flag prompts review, not a conclusion.
Paste Tableau Public Embed URL into [TABLEAU_VIZ_RISK_ENTITY_URL]
Open in Tableau
Embed placeholder: [TABLEAU_VIZ_RISK_ENTITY_URL] Workbook (TWBX on GitHub): FAC-Merged set
Use this to support the Case Studies section.

Datasets & Connections

We combine three official datasets to build this view. Understanding what each system tracks—and misses—is critical for analysis.

Federal Audit Clearinghouse (FAC)

The central repository for single audit reports filed by recipients of federal funds.

  • Helps Answer: Does this entity have recent findings?
  • Helps Answer: Are there "Material Weaknesses"?
  • Helps Answer: What is the auditor's opinion?
  • Does not answer: Real-time daily spending.

Pitfall: Reporting lags by 9 months or more.

Go to FAC

USAspending.gov

The official open data source of federal spending information.

  • Helps Answer: Who received the money?
  • Helps Answer: How much was obligated?
  • Helps Answer: Which agency funded it?
  • Does not answer: If the money was used effectively.

Pitfall: 'Obligation' is not the same as cash outlay.

Go to USAspending API Docs

SAM.gov (Exclusions)

The primary database for entity registration and debarments (exclusions).

  • Helps Answer: Is this entity debarred?
  • Helps Answer: What is their UEI?
  • Helps Answer: Is their registration active?
  • Does not answer: Transaction history.

Pitfall: Exclusions data often lacks UEI fields.

Exclusions API

How we connect them

We use the Unique Entity ID (UEI) to join FAC audits with USAspending records.
Limitation: Since SAM exclusions often lack a structured UEI, matching debarred entities to spending requires fuzzy logic and is not 100% exact.

Financial Literacy & Context

Government data is complex. Use this glossary to understand key terms like "Material Weakness" or "Obligation."

Showing 12 of -- terms

Methodology

We aggregate data from three official government systems to create a unified view of funding and oversight.

Taxpayer Protection Score (TPS) is an interpretability layer we generate. We compute it by capping risk points (derived from audit findings and funding context) at 100, then subtracting from 100.
Formula: TPS = 100 - min(risk_points, 100)

Data Pipeline
1. Clean
Standardize columns from raw extracts.
2. Compute TPS
Flag risks, calc points, assign Tier (Red/Yellow/Green).
3. Merge
Join datasets on UEI (fuzzy match for SAM).
View Pipeline Documentation on GitHub

Case Studies

Guided examples of how to interpret the dashboards and spot oversight signals.

Rapid Funding Growth

An entity or state shows a sharp increase in funding over a short window. Start by checking the TPS tier—is it Red or Yellow?

  • Step 1: Identify the TPS tier to gauge baseline oversight risk.
  • Step 2: Use the dashboards to see if the funding spike correlates with new audit findings.
  • Step 3: Check which agency provided the funding spike.

Exclusion Matching

An entity appears on the SAM exclusions list (name/UEI match) but still shows awards. This typically flags a "Red" tier risk.

  • Look for: SAM exclusion flags or match indicators in the merged risk view.
  • Look for: Award timing vs. exclusion effective dates (watch for date gaps).
  • Context: UEI mismatches are common data gaps, confirm with supporting docs.

Repeat Findings

A recipient shows similar audit findings across multiple years. This lowers the TPS because it indicates systemic issues.

  • Look for: Repeated finding types or consistently high finding counts.
  • Look for: Notes about corrective action plans and whether issues close out.
  • Context: Repeat findings are not proof of wrongdoing, but a strong oversight signal.

Next Steps

How to use this information responsibly to ask better questions.

3 questions for your community

  • Which agencies provide the most funding to my local area?
  • Do local nonprofits have recent "Clean" audit opinions?
  • Are there repeat findings that haven't been fixed for years?

How to engage responsibly

  • Do: Use data to ask informed questions.
  • Do: Contextualize findings with funding size.
  • Don't: Assume every finding means money was stolen.
  • Don't: Ignore the management response.

Sources & Traceability

Everything here is traceable to official sources or reproducible repo artifacts.

Detailed Project Artifacts

Direct access to our reproducible data products on GitHub.