June 24, 2005
IRS Probing Possible Data Security Breaches
By REUTERS 
Filed at 4:37 p.m. ET

WASHINGTON (Reuters) - The Internal Revenue Service is investigating whether
unauthorized people gained access to sensitive taxpayer and bank account
information but has not yet exposed any privacy breaches, an official said
on Friday.

The U.S. tax agency -- whose databases include suspicious activity reports
from banks about possible terrorist or criminal transactions -- launched the
probe after the Government Accountability Office said in April that the IRS
``routinely permitted excessive access'' to the computer files.

The GAO team was able to tap into the data without authorization, and
gleaned information such as bank account holders' names, social security
numbers, transaction values, and any suspected terrorist activity. It said
the data was at serious risk of disclosure, modification or destruction.

``There is no evidence that anyone who was not authorized accessed the data
outside the GAO,'' said Sheri James, a spokeswoman for the Treasury's
Financial Crimes Enforcement Network (FinCEN), which is working with the IRS
to address the concerns of the GAO, the investigative arm of Congress.

``The assessment remains ongoing at this time,'' James said.

IRS officials were not immediately available for comment.

FinCEN is responsible for administering the Bank Secrecy Act, under which
banks must file suspicious activity reports on transactions they believe
could be linked to money laundering or terrorism financing. The IRS stores
this data for FinCEN.

As their name suggests, these reports are filed based on suspicions, not
necessarily proof, and the vast majority never lead to investigations or
prosecutions.

Unauthorized access to the information held by the IRS raises concerns about
the privacy rights and civil liberties of innocent banking clients as well
as ordinary taxpayers.

>From October, when FinCEN rolls out a new computer system called BSA Direct,
the agency will for the first time take control of all BSA data from filing
to dissemination, which it hopes will significantly bolster data security.

Taxpayer data will remain with the IRS, which the Treasury says is
addressing its ``computer security deficiencies.''

Concerns about privacy violations through weak computer security are
mounting in the United States, where a string of companies this year have
reported stolen or misappropriated customer data, including Bank of America
Corp., ChoicePoint Inc. and Reed Elsevier .

Since ChoicePoint announced in February that it mistakenly sold 145,000
consumer profiles to a ring of identity thieves, dozens of other
organizations, from banks to universities, have announced security breaches
of their own. 


 <http://www.nytimes.com/reuters/politics/politics-security-usa-data.html?p>
http://www.nytimes.com/reuters/politics/politics-security-usa-data.html?p

 

  _____  

FAIR USE NOTICE: All original content and/or articles and graphics in this
message are copyrighted, unless specifically noted otherwise. All rights to
these copyrighted items are reserved. Articles and graphics have been placed
within for educational and discussion purposes only, in compliance with
"Fair Use" criteria established in Section 107 of the Copyright Act of 1976.
The principle of "Fair Use" was established as law by Section 107 of The
Copyright Act of 1976. "Fair Use" legally eliminates the need to obtain
permission or pay royalties for the use of previously copyrighted materials
if the purposes of display include "criticism, comment, news reporting,
teaching, scholarship, and research." Section 107 establishes four criteria
for determining whether the use of a work in any particular case qualifies
as a "fair use". A work used does not necessarily have to satisfy all four
criteria to qualify as an instance of "fair use". Rather, "fair use" is
determined by the overall extent to which the cited work does or does not
substantially satisfy the criteria in their totality. If you wish to use
copyrighted material for purposes of your own that go beyond 'fair use,' you
must obtain permission from the copyright owner. For more information go to:
<http://www.law.cornell.edu/uscode/17/107.shtml>
http://www.law.cornell.edu/uscode/17/107.shtml 
THIS DOCUMENT MAY CONTAIN COPYRIGHTED MATERIAL.  COPYING AND DISSEMINATION
IS PROHIBITED WITHOUT PERMISSION OF THE COPYRIGHT OWNERS.

 

 



[Non-text portions of this message have been removed]



--------------------------
Want to discuss this topic?  Head on over to our discussion list, [EMAIL 
PROTECTED]
--------------------------
Brooks Isoldi, editor
[EMAIL PROTECTED]

http://www.intellnet.org

  Post message: [email protected]
  Subscribe:    [EMAIL PROTECTED]
  Unsubscribe:  [EMAIL PROTECTED]


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 



Reply via email to