Search Form
First, enter a politician or zip code
Now, choose a category

Public Statements

Letter to John Koskinen, Commissioner of the Internal Revenue Service - IRS Data Breach


Location: Washington, DC

May 28, 2015

The Honorable John Koskinen
Internal Revenue Service
1111 Constitution Avenue, NW
Washington, DC 20224

Dear Commissioner Koskinen:

Taxpayer confidence in the Internal Revenue Service's (IRS) ability to safeguard personal information is critical to our nation's system of voluntary tax compliance. The IRS's announcement that cyber attackers took advantage of IRS system vulnerabilities to access 104,000 taxpayers' confidential information is a profound mission failure. We are writing to inquire about the full extent of the breach, including whether these crimes were facilitated by known system weaknesses and what steps the IRS is taking to prevent any further breaches.

In recent months, both the Treasury Inspector General for Tax Administration (TIGTA) and the Government Accountability Office (GAO) identified significant deficiencies in the IRS's information security systems. In particular, they found that the IRS's systems did not have appropriate identity and access management (IA&M), leaving them vulnerable to cyber attacks, including unauthorized access to personally identifiable information. Further, they found that the systems had weak configuration management, which would prevent administrators from monitoring and controlling changes to IRS IT systems.

On May 26, 2015, the IRS announced that its online Get Transcript service, established in January 2014, had been exploited, providing improper access to 104,000 taxpayers' confidential information. The IRS reported that before it detected the unauthorized access, it issued 15,000 fraudulent refunds, totaling about $50 million. Until now, the IRS has been promoting its Get Transcript application nationally as providing safe and streamlined customer service.

But in its review of the IRS's information systems, TIGTA found that for FY 2014, the IRS was fully compliant with fewer than half of the performance metrics established by the Federal Information Security Management Act of 2002 (FISMA). FISMA establishes a clear framework for how government agencies must protect information and information systems, support the safe and secure adoption of new technology, and create a sophisticated information security workforce. It is essential that the IRS maintains FISMA standards to protect taxpayer information, but TIGTA reported that only five of eleven security areas met all FISMA requirements. Two key areas--configuration management and identity and access management--failed to meet the majority of standards needed for compliance.

Strong configuration management is important because it creates stability and efficiency within a system and allows administrators to identify and address problems quickly. Appropriate IA&M is key to preventing cyber attacks because it ensures that only people with proper identification and authentication may access systems. Weak IA&M can leave systems vulnerable to cyber attacks, including social engineering, and can make it difficult or impossible to identify whether unintended users are accessing information within the system.

Similarly, in March 2015, GAO released a report highlighting numerous weaknesses in the IRS's systems. GAO found that the IRS did not have strong password protection controls; IRS employees had excessive access privileges that allowed them to see information not necessary for their jobs; and physical access controls were inconsistent. Additionally, the IRS's servers used weak encryption--or no encryption at all--to authenticate users, potentially allowing unauthorized users to view data and then use that information to gain access to the systems.

Both GAO and TIGTA have reported that these weaknesses leave taxpayer information vulnerable to attack. TIGTA concluded that:

[U]ntil the IRS takes steps to improve its security program deficiencies and fully implements all 11 security program areas required by the FISMA, taxpayer data will remain vulnerable to inappropriate use, modification, or disclosure, possibly without being detected.

GAO's findings matched TIGTA's conclusions:

Without proper safeguards, computer systems are vulnerable to individuals and groups with malicious intentions who can intrude and use their access to obtain sensitive information, commit fraud and identity theft, disrupt operations, or launch attacks against other computer systems and networks . . . threats include the ever-growing number of cyber-based attacks that can come from a variety of sources--individuals, groups, and countries who wish to do harm.

These security safeguards are extremely important, especially as the government relies more and more on information technology.

The IRS has a responsibility to protect taxpayer information from unauthorized access and attacks. Clearly, the agency needs to do more. In order for the House Ways and Means Committee to better understand the breach that resulted in 104,000 taxpayers' information being compromised and the steps the IRS is taking to prevent future unauthorized disclosures, please respond to the following questions by June 11, 2015:

Describe the IRS's Get Transcript application generally, as well as any other systems affected by the cyber attack.

When and how did the IRS discover the cyber attack? Did any IRS detection involve algorithmic analysis, including analysis of account access patterns, transcript request trends, number or frequency of password reset attempts, etc.? If so, please describe the indicators detected and how IRS systems are designed to screen for them.

Did the IRS discover the problems itself, or did another organization or person call the problems to the IRS's attention? If so, who, when, and how did they inform the IRS?

We understand that 104,000 taxpayers' information was compromised. Were the 104,000 taxpayers part of a discrete group, or were they a random selection from the pool of taxpayers?

What data were accessed by the attackers?

Is the IRS assured that no other taxpayers' information, beyond those identified above, was compromised? If so, how?

Is the IRS reviewing its other applications, such as Where's My Refund, IRS Direct Pay, and IRS Online Payment Agreement, to determine if they are vulnerable or have been subject to an attack?

What steps is the IRS taking to notify potential victims of the attack?

What determinations has the IRS made about the cause of the attack? Who carried out the attack? What vulnerabilities allowed the attack to occur?

The IRS has reported that the criminals who carried out the attacks were able to answer "out of wallet" questions in order to access the system. What types of "out of wallet" questions does the IRS use to verify taxpayers? What steps will the IRS take to strengthen its authentication of users?

What steps will the IRS take to protect the 104,000 accounts from further unauthorized access or related crimes, such as identity theft related tax fraud?

Is the IRS coordinating with other agencies to investigate the attack and/or prevent taxpayer information from being used to perpetuate fraud in other federal programs? If yes, please describe all coordination efforts.
Please provide all information on any improvements the IRS has made to its information security to address TIGTA's and the GAO's recommendations.

Please provide a summary of any outstanding information security weaknesses, including any current agency efforts to resolve them and/or future plans to resolve them.

Additionally, please provide a briefing for Ways and Means Oversight Subcommittee staff on the cyber attack, no later than June 12, 2015.

Thank you for your attention to this extremely important matter. If you have any questions about this request, please do not hesitate to contact Oversight Subcommittee staff at (202) 225-5522.


Chairman Chairman
Committee on Ways and Means Subcommittee on Oversight

Skip to top

Help us stay free for all your Fellow Americans

Just $5 from everyone reading this would do it.

Thank You!

You are about to be redirected to a secure checkout page.

Please note:

The total order amount will read $0.01. This is a card processor fee. Please know that a recurring donation of the amount and frequency that you selected will be processed and initiated tomorrow. You may see a one-time charge of $0.01 on your statement.

Continue to secure page »

Back to top