June 24, 2005 IRS Probing Possible Data Security Breaches By REUTERS Filed at 4:37 p.m. ET
WASHINGTON (Reuters) - The Internal Revenue Service is investigating whether unauthorized people gained access to sensitive taxpayer and bank account information but has not yet exposed any privacy breaches, an official said on Friday. The U.S. tax agency -- whose databases include suspicious activity reports from banks about possible terrorist or criminal transactions -- launched the probe after the Government Accountability Office said in April that the IRS ``routinely permitted excessive access'' to the computer files. The GAO team was able to tap into the data without authorization, and gleaned information such as bank account holders' names, social security numbers, transaction values, and any suspected terrorist activity. It said the data was at serious risk of disclosure, modification or destruction. ``There is no evidence that anyone who was not authorized accessed the data outside the GAO,'' said Sheri James, a spokeswoman for the Treasury's Financial Crimes Enforcement Network (FinCEN), which is working with the IRS to address the concerns of the GAO, the investigative arm of Congress. ``The assessment remains ongoing at this time,'' James said. IRS officials were not immediately available for comment. FinCEN is responsible for administering the Bank Secrecy Act, under which banks must file suspicious activity reports on transactions they believe could be linked to money laundering or terrorism financing. The IRS stores this data for FinCEN. As their name suggests, these reports are filed based on suspicions, not necessarily proof, and the vast majority never lead to investigations or prosecutions. Unauthorized access to the information held by the IRS raises concerns about the privacy rights and civil liberties of innocent banking clients as well as ordinary taxpayers. >From October, when FinCEN rolls out a new computer system called BSA Direct, the agency will for the first time take control of all BSA data from filing to dissemination, which it hopes will significantly bolster data security. Taxpayer data will remain with the IRS, which the Treasury says is addressing its ``computer security deficiencies.'' Concerns about privacy violations through weak computer security are mounting in the United States, where a string of companies this year have reported stolen or misappropriated customer data, including Bank of America Corp., ChoicePoint Inc. and Reed Elsevier . Since ChoicePoint announced in February that it mistakenly sold 145,000 consumer profiles to a ring of identity thieves, dozens of other organizations, from banks to universities, have announced security breaches of their own. <http://www.nytimes.com/reuters/politics/politics-security-usa-data.html?p> http://www.nytimes.com/reuters/politics/politics-security-usa-data.html?p _____ FAIR USE NOTICE: All original content and/or articles and graphics in this message are copyrighted, unless specifically noted otherwise. All rights to these copyrighted items are reserved. Articles and graphics have been placed within for educational and discussion purposes only, in compliance with "Fair Use" criteria established in Section 107 of the Copyright Act of 1976. The principle of "Fair Use" was established as law by Section 107 of The Copyright Act of 1976. "Fair Use" legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of display include "criticism, comment, news reporting, teaching, scholarship, and research." Section 107 establishes four criteria for determining whether the use of a work in any particular case qualifies as a "fair use". A work used does not necessarily have to satisfy all four criteria to qualify as an instance of "fair use". Rather, "fair use" is determined by the overall extent to which the cited work does or does not substantially satisfy the criteria in their totality. If you wish to use copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: <http://www.law.cornell.edu/uscode/17/107.shtml> http://www.law.cornell.edu/uscode/17/107.shtml THIS DOCUMENT MAY CONTAIN COPYRIGHTED MATERIAL. COPYING AND DISSEMINATION IS PROHIBITED WITHOUT PERMISSION OF THE COPYRIGHT OWNERS. [Non-text portions of this message have been removed] -------------------------- Want to discuss this topic? Head on over to our discussion list, [EMAIL PROTECTED] -------------------------- Brooks Isoldi, editor [EMAIL PROTECTED] http://www.intellnet.org Post message: [email protected] Subscribe: [EMAIL PROTECTED] Unsubscribe: [EMAIL PROTECTED] *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ <*> To unsubscribe from this group, send an email to: [EMAIL PROTECTED] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/
