Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

IRS probing possible data security breaches
Reuters & Myway.com ^ | June 24, 2005 | Caroline Drees

Posted on 06/24/2005 8:47:11 PM PDT by blogblogginaway

WASHINGTON (Reuters) - The Internal Revenue Service is investigating whether unauthorized people gained access to sensitive taxpayer and bank account information but has not yet exposed any privacy breaches, an official said on Friday.

The U.S. tax agency -- whose databases include suspicious activity reports from banks about possible terrorist or criminal transactions -- launched the probe after the Government Accountability Office said in April that the IRS "routinely permitted excessive access" to the computer files.

The GAO team was able to tap into the data without authorization, and gleaned information such as bank account holders' names, social security numbers, transaction values, and any suspected terrorist activity. It said the data was at serious risk of disclosure, modification or destruction.

"There is no evidence that anyone who was not authorized accessed the data outside the GAO," said Sheri James, a spokeswoman for the Treasury's Financial Crimes Enforcement Network (FinCEN), which is working with the IRS to address the concerns of the GAO, the investigative arm of Congress.

"The assessment remains ongoing at this time," James said.

IRS officials were not immediately available for comment.

FinCEN is responsible for administering the Bank Secrecy Act, under which banks must file suspicious activity reports on transactions they believe could be linked to money laundering or terrorism financing. The IRS stores this data for FinCEN.

As their name suggests, these reports are filed based on suspicions, not necessarily proof, and the vast majority never lead to investigations or prosecutions.

Unauthorized access to the information held by the IRS raises concerns about the privacy rights and civil liberties of innocent banking clients as well as ordinary taxpayers.

From October, when FinCEN rolls out a new computer system called BSA Direct, the agency will for the first time take control of all BSA data from filing to dissemination, which it hopes will significantly bolster data security.

Taxpayer data will remain with the IRS, which the Treasury says is addressing its "computer security deficiencies."

Concerns about privacy violations through weak computer security are mounting in the United States, where a string of companies this year have reported stolen or misappropriated customer data, including Bank of America Corp., ChoicePoint Inc. and Reed Elsevier .

Since ChoicePoint announced in February that it mistakenly sold 145,000 consumer profiles to a ring of identity thieves, dozens of other organizations, from banks to universities, have announced security breaches of their own.


TOPICS: Business/Economy; Crime/Corruption; Government; News/Current Events
KEYWORDS: bsadirect; debacle; fincen; irs; securitybreach
All these security breaches of our personal financial info. is beginning to sound suspicious.
1 posted on 06/24/2005 8:47:11 PM PDT by blogblogginaway
[ Post Reply | Private Reply | View Replies]

To: blogblogginaway
I'm not surprised that the IRS (or any Federal entity for that matter) was able to be accessed. The procurement cycle for information technology is so long in the federal government and the salary differentials are so great in comparison with IT in the private sectors that we are not dealing with the latest or the greatest.
2 posted on 06/24/2005 8:53:28 PM PDT by Wally_Kalbacken (Seldom right, but never in doubt.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: blogblogginaway

IRS: the TSA of data security.


3 posted on 06/24/2005 9:04:31 PM PDT by Atlas Sneezed
[ Post Reply | Private Reply | To 1 | View Replies]

To: blogblogginaway

"All these security breaches of our personal financial info. is beginning to sound suspicious."

People rob banks because thats where they keep the money.

People hack computers because that's where they keep the data.

My job is to fly around to our customers, break into their networks, and teach them how to keep the bad guys out. Many of our clients are well known companies and state and local government agencies. I can tell you that there has never been a penetration test we've done which if it was scoped to include a large enough segment of a customers internet facing network and enough time, we haven't been able to penetrate systems and use them to access other internal systems. We also do similar tests while plugged directly into our customers network to simulate a disgruntled employee, industrial espionage, etc. Internal networks are even less securely configured.

Windows, UNIX, it doesn't make a hell of a difference in an enterprise network.


4 posted on 06/24/2005 9:11:25 PM PDT by adam_az (It's the border, stupid!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: blogblogginaway

Note to IRS: YOU ARE AN ILLEGAL AGENCY. YOU WERE CHALLENGED IN COURT TO PROVE YOUR LEGITIMACY, AND FAILED.

NOW JUST STFU. (Wait until the lawsuits start flying the other way now!!!)


5 posted on 06/24/2005 9:20:53 PM PDT by datura (We ain't wrong, we ain't sorry, and you know it'll happen again. That's the truth about men.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: All

This is very odd. So much stolen info in the past 6 months. Maybe Al-quedia found a new way to attack us. We all wake up one morning and we're 120,000 dollars in the hole. That'd be a finicial situation.


6 posted on 06/24/2005 9:40:06 PM PDT by edmond246 (Condi '08)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Wally_Kalbacken
I'm not surprised that the IRS (or any Federal entity for that matter) was able to be accessed.

Well, do you know any smart people, with an ounce of self-respect, who want to make a living as a government drone-parasite helping Big Stupid Government steal money?

I'm guessing they consider themselves lucky to fill positions with the bottom of the barrel, intelligence-wise and motivation-wise.

7 posted on 06/24/2005 9:41:12 PM PDT by Hank Rearden (Never allow anyone who could only get a government job attempt to tell you how to run your life.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: blogblogginaway

IRS outsourcing...


8 posted on 06/24/2005 9:45:17 PM PDT by endthematrix (Thank you US armed forces, for everything you give and have given!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: blogblogginaway

Another good reason not to file tax returns. It ain't safe. :-)


9 posted on 06/24/2005 11:45:51 PM PDT by Mind-numbed Robot (Not all that needs to be done needs to be done by the government.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Wally_Kalbacken
...we are not dealing with the latest or the greatest.

Perhaps the laziest and the grayest??

10 posted on 06/24/2005 11:47:04 PM PDT by Mind-numbed Robot (Not all that needs to be done needs to be done by the government.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: adam_az

Would a disgruntled ex-employee from a company like yours be a likely suspect in these hackings?


11 posted on 06/24/2005 11:48:52 PM PDT by Mind-numbed Robot (Not all that needs to be done needs to be done by the government.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: adam_az

There's no way any info in an electronic environment can be safe is there?


12 posted on 06/24/2005 11:51:03 PM PDT by abigailsmybaby ("This is the sort of English up with which I will not put." Winston Churchill)
[ Post Reply | Private Reply | To 4 | View Replies]

To: edmond246
That'd be a finicial situation.

I am not sure what that is but it sounds bad. Maybe even hugh and series.

13 posted on 06/24/2005 11:51:18 PM PDT by Mind-numbed Robot (Not all that needs to be done needs to be done by the government.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: blogblogginaway
The GAO team was able to tap into the data without authorization

If even the Gummint Agency of Oafs can hack the IRS, that's bad.

14 posted on 06/24/2005 11:52:53 PM PDT by HiTech RedNeck (No wonder the Southern Baptist Church threw Greer out: Only one god per church! [Ann Coulter])
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mind-numbed Robot

Very hugh. Like so impotent. (important) lol...


15 posted on 06/25/2005 12:02:04 AM PDT by edmond246 (Condi '08)
[ Post Reply | Private Reply | To 13 | View Replies]

To: abigailsmybaby

"There's no way any info in an electronic environment can be safe is there?"

Depends on how safe you mean by safe.

Controls should be appropriate to business reqauirements. It's always a tradeoff between availability and security. The more secure, the less easily available for legit use.

There is no such thing as 100% secure, thats why we preach about things like security in layer, detective and protective controls, etc.


16 posted on 06/25/2005 5:54:29 AM PDT by adam_az (It's the border, stupid!)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Mind-numbed Robot

"Would a disgruntled ex-employee from a company like yours be a likely suspect in these hackings?"

Possible but unlikely.

There are a lot more bad guys than there are good guys.

Most commonly trotted out figure is that more than 80% of all hacks are perpetrated by insiders/employees.


17 posted on 06/25/2005 6:12:45 AM PDT by adam_az (It's the border, stupid!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: blogblogginaway

According to redstate she was leaking to Buzzfeed’s Jason Leopold.


18 posted on 10/17/2018 2:03:30 PM PDT by piasa (Attitude adjustments offered here free of charge.)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson