[Senate Hearing 114-580] [From the U.S. Government Publishing Office] S. Hrg. 114-580 CYBERSECURITY AND PROTECTING TAXPAYER INFORMATION ======================================================================= HEARING before the COMMITTEE ON FINANCE UNITED STATES SENATE ONE HUNDRED FOURTEENTH CONGRESS SECOND SESSION __________ APRIL 12, 2016 __________ [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Printed for the use of the Committee on Finance ______ U.S. GOVERNMENT PUBLISHING OFFICE 24-730-PDF WASHINGTON : 2017 ----------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 COMMITTEE ON FINANCE ORRIN G. HATCH, Utah, Chairman CHUCK GRASSLEY, Iowa RON WYDEN, Oregon MIKE CRAPO, Idaho CHARLES E. SCHUMER, New York PAT ROBERTS, Kansas DEBBIE STABENOW, Michigan MICHAEL B. ENZI, Wyoming MARIA CANTWELL, Washington JOHN CORNYN, Texas BILL NELSON, Florida JOHN THUNE, South Dakota ROBERT MENENDEZ, New Jersey RICHARD BURR, North Carolina THOMAS R. CARPER, Delaware JOHNNY ISAKSON, Georgia BENJAMIN L. CARDIN, Maryland ROB PORTMAN, Ohio SHERROD BROWN, Ohio PATRICK J. TOOMEY, Pennsylvania MICHAEL F. BENNET, Colorado DANIEL COATS, Indiana ROBERT P. CASEY, Jr., Pennsylvania DEAN HELLER, Nevada MARK R. WARNER, Virginia TIM SCOTT, South Carolina Chris Campbell, Staff Director Joshua Sheinkman, Democratic Staff Director (ii) C O N T E N T S ---------- OPENING STATEMENTS Page Hatch, Hon. Orrin G., a U.S. Senator from Utah, chairman, Committee on Finance........................................... 1 Wyden, Hon. Ron, a U.S. Senator from Oregon...................... 8 WITNESSES Koskinen, Hon. John, Commissioner, Internal Revenue Service, Washington, DC; accompanied by Terence V. Milholland, Chief Technology Officer, Internal Revenue Service, Washington, DC... 2 George, Hon. J. Russell, Treasury Inspector General for Tax Administration, Department of the Treasury, Washington, DC; accompanied by Michael E. McKenney, Deputy Inspector General for Audit, Treasury Inspector General for Tax Administration, Department of the Treasury, Washington, DC..................... 5 Dodaro, Hon. Gene L., Comptroller General of the United States, Government Accountability Office, Washington, DC; accompanied by Gregory C. Wilshusen, Director, Information Security Issues, Government Accountability Office, Washington, DC............... 7 ALPHABETICAL LISTING AND APPENDIX MATERIAL Dodaro, Hon. Gene L.: Testimony.................................................... 7 Prepared statement........................................... 33 George, Hon. J. Russell: Testimony.................................................... 5 Prepared statement........................................... 43 Hatch, Hon. Orrin G.: Opening statement............................................ 1 Prepared statement........................................... 49 Koskinen, Hon. John: Testimony.................................................... 2 Prepared statement........................................... 50 Wyden, Hon. Ron: Opening statement............................................ 8 Prepared statement........................................... 60 Communication Gyamfi, Kwame.................................................... 63 (iii) CYBERSECURITY AND PROTECTING TAXPAYER INFORMATION ---------- TUESDAY, APRIL 12, 2016 U.S. Senate, Committee on Finance, Washington, DC. The hearing was convened, pursuant to notice, at 10:13 a.m., in room SD-215, Dirksen Senate Office Building, Hon. Orrin G. Hatch (chairman of the committee) presiding. Present: Senators Grassley, Crapo, Thune, Portman, Coats, Heller, Scott, Wyden, Stabenow, Cantwell, Nelson, Carper, Cardin, Brown, Bennet, and Casey. Also present: Republican Staff: Chris Armstrong, Deputy Chief Oversight Counsel; Eric Oman, Senior Policy Advisor for Tax and Accounting; and Mark Prater, Deputy Staff Director and Chief Tax Counsel. Democratic Staff: David Berick, Chief Investigator; Michael Evans, General Counsel; Daniel Goshorn, Investigative Counsel; and Tiffany Smith, Senior Tax Counsel. OPENING STATEMENT OF HON. ORRIN G. HATCH, A U.S. SENATOR FROM UTAH, CHAIRMAN, COMMITTEE ON FINANCE The Chairman. The committee will come to order. I will mention that Senator Wyden is delayed. He will be here a little later. He has asked that I proceed without him, and we will be happy to have him participate when he comes. Well, good morning. It is a pleasure to welcome everyone to today's hearing, which we have entitled, ``Cybersecurity and Protecting Taxpayer Information.'' Now, these are really important issues that the Finance Committee has been working on for some time. In June of last year, for example, we had a hearing on the theft of Internal Revenue Service data affecting taxpayer information. Much has happened since that time. At the urging of the Finance Committee, the IRS, State revenue commissioners, and leaders in the tax return preparation industry came together last year to convene a Security Summit, which resulted in new information-sharing agreements to help identify suspicious activity in the tax filing and refund process. We look forward to hearing more about that effort today. But in the face of this progress, we have also seen unprecedented growth in the scope and scale of cyber-attacks aimed at stealing personal information and billions of dollars from our taxpayers. Last year alone, cyber-criminals obtained access to sensitive personal information from several large health insurers, exposing tens of millions of Americans to potential identity theft. Foreign governments gained access to poorly protected Federal Government databases, including a treasure trove of information at the Office of Personnel Management. Today, we will focus on three separate aspects of this problem. First, we will consider the ways the IRS authenticates taxpayer identities to prevent data thieves from using authentication information to gain access to even more information about taxpayers or to file false returns and obtain refunds under stolen identities. Second, we will examine how the IRS uses its resources to improve cybersecurity. This will include some discussion about the IRS Future State plan, which the agency has developed in order to adapt to the realities of the 21st century. Third and finally, we will consider the ongoing joint efforts of the IRS, State revenue collectors, and private tax preparers to see what can be accomplished to better secure taxpayer information and protect taxpayers from fraud. Taking a look at our witness table, it is clear that this is not a typical lineup of witnesses. Challenges to cybersecurity require not only smart and persistent leadership up at the top, but also technological expertise and up-to-date skills down on the ground. So today, we not only have with us the heads of the IRS, the Government Accountability Office, and the Treasury Inspector General for Tax Administration, but we have invited subject matter experts on the relevant issues from each of those agencies to testify as well. That is a total of six witnesses, and I suspect each of them will bring unique and important insights to this discussion. In closing, I will just say that while we are clearly making real progress in this area, the challenges are continuing to grow and criminals behind this kind of data theft are getting more sophisticated and aggressive, seemingly by the day, and American taxpayers and their livelihoods are their targets. In other words, we have a lot of work to do. My hope is that we will continue to be able to work on these issues on a bipartisan basis in order to do right by the American people. Now, with that, I would like to turn it over to Senator Wyden, when he gets here, for any opening remarks he might have. [The prepared statement of Chairman Hatch appears in the appendix.] The Chairman. Our first witness will be John Koskinen, Commissioner of the IRS. We will start with you first, Mr. Koskinen, and go from there. STATEMENT OF HON. JOHN KOSKINEN, COMMISSIONER, INTERNAL REVENUE SERVICE, WASHINGTON, DC; ACCOMPANIED BY TERENCE V. MILHOLLAND, CHIEF TECHNOLOGY OFFICER, INTERNAL REVENUE SERVICE, WASHINGTON, DC Commissioner Koskinen. Good morning, Chairman Hatch, Ranking Member Wyden, and members of the committee. Thank you for the opportunity to discuss the IRS's ongoing efforts in regard to cybersecurity and identity theft. As the chairman noted, I am delighted to have Terry Milholland, our Chief Technology Officer, here with me today for any specific technical questions you may have. Securing our systems and taxpayer data continues to be a top priority for the IRS. Even with our constrained resources, we devote significant time and attention to this challenge. We work continuously to protect our main computer systems from cyber-attack and to safeguard taxpayer information stored in our database. The systems withstand more than 1 million malicious attempts to access them each day. We are also continuing to battle the growing problem of stolen identity refund fraud. Over the past few years, we have made steady progress in protecting against fraudulent refund claims and criminally prosecuting those who engage in this crime, but we have found the type of criminal we are dealing with has changed. The problem used to be random individuals filing a few dozen or a few hundred false tax returns at a time. Now, we are dealing more and more with organized crime syndicates here and in other countries. They are gathering, as the chairman noted, almost unimaginable amounts of personal data from sources outside the IRS so they can do a better job of impersonating taxpayers, evading our return processing filters, and obtaining fraudulent refunds. To improve our efforts against this complex and evolving threat, in March 2015, we joined with leaders of the electronic tax industry, the software industry, and the States to create the Security Summit group. This is an unprecedented partnership that is focused on making the tax filing experience safer and more secure for taxpayers in 2016 and beyond. Our collaborative efforts have already shown concrete results this filing season. For example, Security Summit partners have helped us improve our ability to spot potentially false returns before they are processed. Over the past year, we have seen three examples of what identity thieves are capable of and why we cannot let up in this fight. In each case, we detected and stopped unauthorized attempts to access online services on our website, IRS.gov, by criminals masquerading as legitimate taxpayers. One of the services targeted was our Get Transcript online application, used by taxpayers to quickly obtain a copy of their prior year return. Another was an online tool to retrieve a lost Identity Protection Personal Identification Number, or IP PIN. Taxpayers who previously were victims of identity theft use these PINs to prove their identity when they file a return. The third was a tool that some people use to generate a PIN number when they e-file their tax return. In all three cases, criminals were trying to use our online tools to help them pretend to be legitimate taxpayers and sneak false returns past our fraud filters. These incidents, which, unfortunately, in the case of the Get Transcript access, resulted in the loss of taxpayer information for thousands of taxpayers before the applications were disabled, have shown us that improving our reaction time to suspicious activity is not enough. We need to be able to anticipate the criminals' next moves and attempt to stay ahead of them. The ongoing work of the Security Summit group will be critical to our success here. As we confront the challenge of identity theft, we are also working to expand and improve our ability to interact with taxpayers online to meet taxpayers' increasing demand for digital services. We are aware, however, that in building toward this enhanced online experience, we must continuously upgrade and improve our ability to verify the identity of taxpayers using these services. Taxpayers will only use these services if they are confident that they are safe and secure. So we are in the process of developing a strong, coordinated authentication framework. We have a delicate balance to maintain here. We need to keep the criminals out while letting the legitimate taxpayers in. Our goal is to have the strongest possible authentication process for our online services while maintaining the ability of taxpayers to access their data and use IRS services online. Congress can provide critical support by providing adequate resources for these efforts. We appreciate the $290 million in additional funding for fiscal year 2016, which included funds to improve cybersecurity and fight identity theft. Sustaining and increasing funding in this area will be critical as we move forward. Another way Congress helps us is by passing legislative proposals to improve tax administration and cybersecurity. One of the most important requests we have made is for the reauthorization of streamlined critical pay authority, the loss of which has made it very difficult, if not impossible, to recruit and retain employees with expertise in highly technical areas, such as information technology. Chairman Hatch, Ranking Member Wyden, and members of the committee, this concludes my statement, and Mr. Milholland and I would be happy to take your questions. [The prepared statement of Commissioner Koskinen appears in the appendix.] The Chairman. Thank you so much. Today's panel is a little bit unorthodox, at least as far as our typical hearings in this committee are concerned. In order to ensure that we have the most robust discussion possible--and I put that discussion into the record--we have invited the heads of three vital government offices to testify, as well as the subject matter experts in the relevant areas from each agency. Now, we have heard from the first witness, John Koskinen, who has a tremendous reputation and background for the job that he is doing. Our second witness will be Inspector General J. Russell George from the Treasury Inspector General for Tax Administration. Mr. George was confirmed to his current position in November 2004. Prior to that, he served as the Inspector General of the Corporation for National and Community Services. Mr. George began his career as a prosecutor in the Queens County District Attorney's Office in New York, following which he served as Assistant General Counsel in the Counsel's Office in the White House Office of Management and Budget. Mr. George also has served as the Associate Director for Policy in the Office of National Service, after which he moved to the private sector, where he practiced law at Kramer, Levin, Naftalis, Nessen, Kamin, and Frankel. Then in 1995, Mr. George returned to Washington, DC to join the Committee on Government Reform and Oversight as the Staff Director and Chief Counsel of the Government Management, Information, and Technology Subcommittee. Mr. George received his bachelor of arts degree from Howard University and his law degree from Harvard University School of Law. He will be joined by Deputy Inspector General for Audit, Michael McKenney. Mr. McKenney is responsible for providing audit oversight of IRS operations related to the preparation and processing of tax returns and the issuing of refunds to taxpayers. Then finally, from the Government Accountability Office, we welcome back Comptroller General Gene Dodaro. Mr. Dodaro was confirmed as the eighth Comptroller General of the United States and head of the U.S. Government Accountability Office in December 2010. Mr. Dodaro was confirmed to this position after serving as the Acting Comptroller General since March 2008. Including these 7 years of dedicated service, Mr. Dodaro has served the country for more than 40 years at the GAO. He served most recently as the Chief Operating Officer and is also head of GAO's Accounting and Information Management Division, where he directed the first-ever audit of the comprehensive financial statements covering all Federal departments and agencies. Mr. Dodaro has also worked closely with Congress in several administrations on major management reform initiatives, including the 1994 Government Management Reform Act, the revised 1995 Paperwork Reduction Act, and the Clinger-Cohen Act of 1996. He received a bachelor's degree in accounting from Lycoming College in Pennsylvania. Mr. Dodaro is joined by Information Security Issues Director Gregory Wilshusen, who leads cybersecurity and privacy-related studies and audits of the Federal Government. I want to thank all of you for coming. I know that this is an expansive topic, and the more insight and perspective we can get, the better off we will be. We will hear the witness testimonies in the order that I just introduced them. Mr. George, we will turn to you at this time. STATEMENT OF HON. J. RUSSELL GEORGE, TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION, DEPARTMENT OF THE TREASURY, WASHINGTON, DC; ACCOMPANIED BY MICHAEL E. McKENNEY, DEPUTY INSPECTOR GENERAL FOR AUDIT, TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION, DEPARTMENT OF THE TREASURY, WASHINGTON, DC Mr. George. Thank you, Chairman Hatch, members of the committee, for the opportunity to testify today on the IRS's processes to protect sensitive taxpayer information. As you noted, Mr. Chairman, I am joined by the Deputy Inspector General for Audit, Michael McKenney. Cybersecurity threats against the Federal Government continue to grow, and the IRS is a very prime target for attacks because of the extensive amount of taxpayer data it stores. As such, the security of taxpayer data is one of the top concerns facing the IRS. TIGTA has identified a number of areas in which the IRS could better protect taxpayer data. For example, TIGTA recently reported that the IRS is working towards continuous monitoring of its overall information security posture. This effort will eventually allow the IRS to perform ongoing real-time assessments of information security so that it knows when and where security vulnerabilities exist. We also reported that the IRS needs to fully implement unique user identification and authentication that complies with the Department of Homeland Security directives. Full implementation and integration of personal identity verification cards will help to ensure only authorized personnel can access computer systems and facilities. Further, TIGTA has evaluated the effectiveness of the security patch management process. This process is key to mitigating the security risks associated with known vulnerabilities to computer systems. We found the IRS is still working to expand a standard automated process needed to ensure that all IRS systems are patched timely and are operating securely. Web applications that provide online services are significantly vulnerable, because even without penetrating network security, hackers can and have cleared the authentication process to gain access to and steal valuable taxpayer information. The IRS has established processes and procedures to authenticate individuals requesting online access to IRS services; however, these processes and procedures do not comply with government standards. For example, the processes that the IRS used to authenticate users of its Get Transcript and Identity Protection Personal Identification Number, IP PIN, applications, required only single-factor authentication. Government standards require multi-factor authentication for such high-risk applications. Moreover, the authentication framework used for these applications did not comply with the government standards for a single-factor authentication. In August 2015, the IRS reported that unauthorized users had been successful in obtaining tax information on the Get Transcript application for an estimated 334,000 taxpayer accounts. To prevent further unauthorized access, the IRS removed the application from its website. Unfortunately, TIGTA's current review of the Get Transcript breach identified additional suspicious accesses to taxpayers' accounts that the IRS had not identified. Based on TIGTA's analysis, the IRS reported on February 26th of this year that potentially unauthorized users had been successful in obtaining access to an additional 390,000 taxpayer accounts. We also reported in November 2015 that the IRS did not complete the required authentication risk assessment for its IP PIN application and recommended that the IRS not reactivate this application for the 2016 filing season. However, the IRS reactivated the application on January 19, 2016. We issued a second recommendation to the IRS on February 24th, advising it to remove the IP PIN application from its public website. On March 7th, the IRS reported that it was temporarily suspending use of the IP PIN application as part of an ongoing security review. The IRS does not anticipate having the technology in place for either the Get Transcript or IP PIN application to provide multi-factor authentication capability before the summer of 2016. The number and sophistication of threats to taxpayer information will likely continue to increase, and these threats will be a continued focus of our audit and investigative activity. Chairman Hatch, Ranking Member Wyden, members of the committee, thank you for the opportunity to share my views. [The prepared statement of Mr. George appears in the appendix.] The Chairman. Thank you so much. We appreciate having your views. We will now turn to Mr. Dodaro, and then I understand the other two witnesses will be here to answer questions, if necessary. Mr. Dodaro, we will turn to you. STATEMENT OF HON. GENE L. DODARO, COMPTROLLER GENERAL OF THE UNITED STATES, GOVERNMENT ACCOUNTABILITY OFFICE, WASHINGTON, DC; ACCOMPANIED BY GREGORY C. WILSHUSEN, DIRECTOR, INFORMATION SECURITY ISSUES, GOVERNMENT ACCOUNTABILITY OFFICE, WASHINGTON, DC Mr. Dodaro. Thank you very much, Mr. Chairman. Good morning to you, Ranking Member Wyden, members of the committee. Greg and I are very pleased to be here today to discuss GAO's work related to computer security at IRS and identity theft refund fraud. Our most recent audit showed that IRS had instituted controls over its financial and tax processing systems. However, there were numerous weaknesses that we identified due to the inconsistent application of its information security program across IRS. These weaknesses included easily guessed passwords to gain access to servers supporting key systems at IRS, including those to access and manage taxpayer accounts, and users at the IRS who were given rights and privileges beyond what they needed to carry out their responsibilities, including access to electronic tax payment systems. We found that key systems that should have been encrypted were not. We found in other cases there were applications where user activity was not being logged so that IRS could potentially investigate or know who was using those systems, including those that were used to transfer financial data and to manage and access taxpayer accounts. Also, we found that software patches were not being implemented in a timely fashion in a couple key instances. Now, to address these weaknesses and strengthen IRS's security program, GAO made 45 new recommendations to the IRS. In addition, we reemphasized the importance of implementing 49 recommendations that we had made previously that were not yet implemented. One area we were concerned about with this most recent audit was that in 28 instances, IRS asserted that it had implemented our prior recommendations, but our subsequent testing showed that in nine of those 28 instances, the problem had not been fixed. So we are very concerned about that. This included access by employees and visitors to one of IRS's computing facilities where access lists had not been updated as appropriate. So we made many recommendations to strengthen IRS's computer security program. We are hopeful that IRS will rigorously implement our recommendations over the next few years, all 94 recommendations that we have outstanding. Now, with regard to identity theft, I am very pleased to report that the Congress has acted on the recommendations that we had made to allow for more timely filing by employers of W-2 data. As you recall, Mr. Chairman, I was here last year before this committee talking about the importance of providing earlier W-2 information to the IRS. In past years, IRS only received the W-2 information from employers in April. Having it earlier to match against early income tax filing will allow IRS to better detect tax returns that are filed using fake identities. The new law now gives IRS the ability to have that W-2 information at the end of January. We think it is very important for IRS to implement changes to its processes and systems in order to take advantage of the new, earlier information. We also think that IRS needs to continue to test and assess the costs, benefits, and risks of different authentication techniques that could be used. This has been a key weakness in the past on Get Transcript and the IP authorizations. IRS also needs to give better feedback to those who provide external leads to them, such as tips that they can follow up to further identify identity theft cases. We also have a recommendation for the Congress. We think Congress should lower the requirement for electronic filing of W-2 data by employers from 250 employees down to a much lower number. This would give IRS more electronic information that it could use to match to help avoid identity theft in the future. So, again, thank you for the opportunity to be here today. GAO is very committed to computer security in the Federal Government. We actually designated it as a high-risk area across the entire Federal Government in 1997. We have been working on it since then and made thousands of recommendations. I am pleased to be here today to participate in this hearing, along with Mr. Wilshusen. Thank you very much, Mr. Chairman. [The prepared statement of Mr. Dodaro appears in the appendix.] The Chairman. Thank you so much. I want to apologize to Senator Wyden. I should have called on him right away, but we are going to call on him at this time. OPENING STATEMENT OF HON. RON WYDEN, A U.S. SENATOR FROM OREGON Senator Wyden. Mr. Chairman, thank you. And to colleagues, my apologies for being late as well. I was at the public proceeding to look at steel overcapacity. We care a great deal about enforcing the trade laws on this committee, particularly the ENFORCE Act and the Leveling the Playing Field Act. We are dealing with a steel overcapacity that would really cost us family-wage jobs, family-wage jobs in Oregon and across the country. We worked on this in a bipartisan way, and I was at the USTR's proceeding to make sure that they move aggressively to enforce the law. Now, we turn to the question of IRS cybersecurity, and it is pretty obvious that hackers and crooks, including many who work for foreign crime syndicates, are jumping at every opportunity to steal hard-earned money and sensitive personal data from American taxpayers. It happens online, and it happens in the real world. In my view, taxpayers have been failed by the agencies, the companies, and the policymakers here in the Congress that they are counting on to protect them. It was unacceptable for the IRS to leave the front door open to hackers by using a weak authentication process for its Get Transcript system. It meant that thieves could walk through the door and steal the tax information of three-quarters of a million taxpayers. To make matters worse, after the IRS mailed the special Identity Protection PIN numbers to the hacking victims, it repeated its mistake and used lax security online. For the tax scammers, once again, it was as easy as going online, plugging in the personal data you have already stolen, and pretending to be somebody who lost their IP PIN. So after leaving the front door open, the IRS left the back door open as well. There is simply no excuse for this. But poor protection of taxpayer information is not just a problem at the IRS. There is plenty of blame to go around. Already this tax season, hackers have gotten into the inadequately guarded system of private software companies and stolen personal information from thousands of people. And it is my judgment that you cannot have an honest discussion about protecting taxpayer information without including the vulnerabilities from the e-file providers, as well as crooked return preparers who operate in the shadows and steal from customers. For years, Republicans and Democrats have agreed on the need for minimum standards for return preparers, but the Congress has sat back and watched while criminals have come in and preyed on taxpayers. When it comes to blocking hackers, Congress has done next to nothing while the IRS loses its ability to hire the experts who can keep taxpayer information safe. If you are a top-notch tech expert, you already are taking a pay cut to work in public service compared to what you would earn at firms in Oregon or California. Now, without what is called streamlined critical pay authority, it can take 4 to 6 months to bring a new hire on board at the IRS. So I want to be clear as we go to questions. Taxpayer information is under assault every single day, but the IRS does not have the legal authority it needs from the Congress to build a cybersecurity team that can beat back the crooks. Already there has been an exodus of high-ranking IRS tech staff. The Director of Cybersecurity Operations left 1 month ago. The terms for the remaining employees working under this authority continue to expire, including for one of our witnesses, Chief Technology Officer Terence Milholland. Come 2017, there are not going to be any left. So today, instead of rehashing the past and just beating up on one agency or one firm, to me, the priority ought to be to focus on how to step up the fight against attackers and crooks across the board. It is my view that streamlined critical pay authority is a key part of the solution. There was a bipartisan bill, colleagues, ready to go last fall, and this committee ought to move forward on it as soon as possible. Furthermore, the Congress needs to make more than token investments in IT at the IRS. Congress has held the IRS tech budget below where it was 6 years ago, but you can bet that the hackers have not backed down since then. Next, the IRS and private firms need to do more to keep taxpayer information safe inside their systems. The Get Transcript hack I mentioned earlier has been well documented. A recent audit by the Online Trust Alliance found that the security maintained by private free-file services did not meet expectations. It is unacceptable for troves of taxpayer data to be more vulnerable to hacking than many social media or e-mail accounts, and the committee ought to consider whether the IRS has the authority it needs to guarantee that the security used by private software firms is up to snuff. While many tax preparers are honest practitioners, we know that there are always some bad apples in the barrel. Last year, Senator Cardin and I introduced a bill giving the IRS the authority to have basic minimum standards over these tax return preparers. We have worked to create a bipartisan identity theft bill for markup in the Finance Committee, which I had very much hoped would include at least these minimum standards for return preparers. It is still my view that people handling sensitive taxpayer information should have to meet what are minimum standards and that the committee should vote to require it. Anybody who thinks that Western civilization is going to end if we have minimum standards can come to my home State, because we have them, and it is working well, and we heard testimony from a preparer that that was the case. It is open season for hackers to steal money and data from hardworking Americans, so congressional inaction should not make this situation worse. With tax day approaching, millions of Americans are filing their returns online, through the mail, or with a private return preparer. The committee has a responsibility to protect taxpayers, no matter what filing method they choose. So I see this hearing as an opportunity to find some bipartisan solutions to do what the Finance Committee has always done best, which is to find common ground. I thank our witnesses, Mr. Chairman, and I look forward to working with you and our colleagues. [The prepared statement of Senator Wyden appears in the appendix.] The Chairman. Thank you, Senator. I appreciate it. Let me begin by asking this. The IRS is working with State revenue commissioners and the private tax industry in the so- called Security Summit and has made an agreement to create an information-sharing and analysis center, or ISAC, to facilitate the sharing of actionable information to prevent refund fraud and identity theft. Now, I understand the agency has made progress on this, but it remains incomplete. It hope that it moves forward as quickly as possible. I have two questions for the IRS and anyone else who would care to comment. One, when do you anticipate the ISAC will be up and running? What impediments are delaying its launch? Mr. Commissioner, given that we are nearing the end of the 2016 tax filing season, describe the extent to which the IRS and its partners are currently sharing information to prevent stolen identity refund fraud and how you measure whether that is working or not. Commissioner Koskinen. Thank you, Mr. Chairman. The Security Summit has been thus far a great success. In fact, part of the indication of its success is that the private-sector members have requested, which we have honored, that we make it a permanent partnership going forward, because it has already demonstrated its great utility. We have been able to receive information from State tax commissioners, as well as preparers, about suspicious patterns. We have been able to exchange information, give them notice when we see suspicious patterns or Social Security numbers that have been abused, and we have been able to share that information in real time with the private sector and with State tax preparers. As you noted, we agreed early on that an information- sharing center would be very helpful to increase the utility of that information and its availability. I would stress the private sector and the IRS and the States are all protective of individual taxpayer information, so the information we are sharing is about patterns, it is about activities going on; but basically, we are not sharing individual taxpayer information, except in situations where we know there have been fraudulent attempts to access those accounts. We measure it. Thus far, we have had a significant increase in the amount of leads provided. We have had a significant increase in the volume of refund fraud stopped. We have stopped over a million tax returns this year that were suspicious. We identified thousands of them that were fraudulent. We have shared all that information back and forth. We do think that as soon as we can, we will try to implement the ISAC. It will take some time for this unique opportunity. We are funding it with some of the money that we were given out of the $290 million the Congress provided us additionally this year. Some of it is going, in fact, to the development of the ISAC. We hope to have it up and running as soon as we can. It is not clear that we will be able to get it fully operational by next tax season, but I would stress that we are already exchanging information back and forth in real time, and it has been very helpful. The Chairman. Thank you. This is a question for all of the witnesses regarding unimplemented recommendations related to information technology, cybersecurity, and identity theft. In a report released last month on IRS information security, GAO identified specific IRS vulnerabilities that leave the sensitive taxpayer information of millions of Americans ``unnecessarily vulnerable to inappropriate and undetected use, modification, or disclosure.'' GAO made 45 new recommendations on how to better protect this data and identified 49 prior information security recommendations that the IRS has failed to implement. Last year, Chairman Brady, Senator Rubio, Congressman Yoho, and I wrote to the IRS requesting an update on TIGTA recommendations relevant to today's hearing, and I was disappointed to learn that several continue to remain unimplemented. I would just like to ask both TIGTA and GAO to detail the recommendations that you deem most important and discuss whether incidents like the unauthorized access of the Identity Protection Personal Identification Number tool would have occurred had these recommendations been implemented. I would also ask the IRS to respond to the status of these recommendations. Mr. George. Mr. Chairman, as it relates to the latter point, we believe that if our recommendations had been implemented, while we could not guarantee that the breach would not have occurred, it would have been much more difficult for that to have happened. But I would like to defer to my colleague, Michael McKenney, for the additional response. Mr. McKenney. One thing, especially in the area of authentication, that is probably one of the more important recommendations to improve its authentication, is to move to the multi-factor authentication. There are also some concerns we have expressed in the past that I think are really primary here, such as the IRS's willingness to accept risks in these areas without really very well following a process to document why they have accepted those risks and the rationale for what they have done to mitigate those risks. So one of the most significant concerns we have is the agency itself, when it decides to accept risk. It is unavoidable, but it should be kept to a minimum, and when they do accept risk, they should thoroughly document why, the rationale, and what they will eventually be able to do to overcome those risks. The Chairman. Senator Wyden, we will turn to you now for your questions. Senator Wyden. Thank you very much, Mr. Chairman. Commissioner Koskinen, it seems to me you do not fight the cheats and the rip-off artists by osmosis. You do it by having the right kind of experts, the talent that you need to take them on. Many of those experts were hired using streamlined critical pay, including the head IRS official who is sitting next to you, Mr. Milholland. But that authority expired in 2013, and the IRS has already lost many of these experts. I think it would be very helpful if you laid out for the committee what are going to be the consequences of the Congress failing to renew this key tool, the streamlined critical pay authority, so you can go out there and get people who know how to beat the crooks. Commissioner Koskinen. Well, we are concerned about it. That is the reason I have been talking about it for the last 2\1/2\ years, because what it gives us is the ability to find top-notch IT people and hire them, with suitable background checks, without going through the 3- to 6-month normal government application process--and these are all highly desirable people. Our people are being recruited every day, and when you tell somebody, ``We would love to hire you; we have a great position for you; now, if you will just sit around for 3 to 6 months, we will get back to you and, in the meantime, fill out the applications and apply for the job,'' needless to say, most of those people are not around when we come back. Now, there are good people who are willing to work through that process, but at the top of the heap, cybersecurity experts, people expert at development of new techniques and technologies, like Mr. Milholland, they simply do not need to go through that entire process. So authority was provided in the Restructuring Act of 1998, was renewed every 4 years, and the IG reviewed the program a year and a half ago and found that we had used it appropriately. It only applies to 40 slots, and we never used the full 40. But if we continue to lose people--we have 10 last IT people on the list--and by this time next year, they will all be gone, and our ability to replace them is very questionable. Senator Wyden. All right. Inspector George, we always value your work. I gather that you all have looked at this issue as well, and you largely agree with what the Commissioner has said, that these were justifiable hires, that these are exceptionally well- qualified individuals, and that this was something that really worked. Is that true? Mr. George. It is true, and it was actually even under budget. This is one of the programs implemented by the IRS that we have to say works. It is very successful and justified. Senator Wyden. I am going to repeat that for my colleagues. So here we have something that has been an essential tool. We are not going to have it any longer absent Congress getting serious on a bipartisan basis to renew it. And Inspector George, whose views we have long admired on both sides of the aisle, said the program came in under budget. I appreciate your doing that, Inspector, because if that is not a wakeup call to the Congress, I do not know what is. This is something that works, and if we are going to beat the crooks, we ought to have it. Now, Commissioner Koskinen, let me ask you about the private e-file providers, because I think we all understand that the IRS is not the only place where the bad guys, the crooks, can go after innocent taxpayers. In January, two e-file providers revealed that roughly 16,000 taxpayer accounts had been breached. The Independent Online Trust Alliance concluded that 6 of 13 private online free-file tax preparation services failed the best practice assessment with respect to these cybersecurity tests. Are e-file providers doing enough to keep taxpayer information safe, and, in your view, what needs to be done on this issue--again, with the Finance Committee, Democrats and Republicans, working together to ensure that we are using the tools that are essential. Commissioner Koskinen. That is an important question. One of the great outcomes of the Security Summit, the partnership we have with the private sector, is from the start, in our meetings with them, all of the preparers and providers and software developers agreed that they would all meet the NIST standards of operation. Most of them already met them. So it has not been a question of our having to require it. They have actually voluntarily agreed to a standard system of security, and they have gone beyond that. They have agreed to standard authentication procedures for taxpayers who use their services. So it is one of the great examples of what happens if you have a public-private partnership where both sides are working together to solve a problem. You can make great progress, and we feel comfortable that our partners in the private sector see this as an important problem. They want to protect their clients. None of them wants to have a breach. And they have all been willing to work cooperatively with us to set appropriate standards and agree to them. Senator Wyden. So the last leg of this game plan, in addition to critical pay authority and the tools to deal with these e-file rip-offs, is tax preparers. Once again, Chairman Hatch and I have had bipartisan legislation on this ready to go, and, for the life of me, I cannot understand, when taxpayers are ripped off, why we cannot have minimum standards. Where you all are sitting, we had a witness from Oregon who made it very clear the sky is not going to fall, Western civilization is not going to end, if we have minimum standards. I just want to wrap up with a question for Mr. Koskinen and Mr. Dodaro, whose work we also have long appreciated. My understanding is, you both think that there should be minimum standards over preparers based on what you have seen over the years, with all the problems that stem from the fact that, while most preparers are honest and reputable business leaders, we, unfortunately, have some bad apples. So is that your judgment, gentlemen, that there need to be some minimum standards over these preparers? Mr. Dodaro. Yes, Senator Wyden, I believe that. We have recommended that Congress give IRS the authority to regulate paid tax preparers, and I say that for several reasons. One, we did an undercover investigation that sent teams out to 19 paid tax preparers. Only two of the 19 paid tax preparers gave us correct answers, and some were very wrong. We also looked at 3 years of data at that time and found that paid tax preparers made errors 60 percent of the time versus 50 percent of the time for taxpayers who filed on their own behalf. IRS found that paid tax preparers file about 68 percent of the Earned Income Tax Credit returns in a 1-year or 2-year period of time, and about 48 to 53 percent of those returns over-claimed the tax credit. I definitely think there needs to be authority given IRS to set minimum standards for paid tax preparers. I would also comment that we think the IRS should have more monitoring and oversight of the security and privacy standards that paid tax preparers agree to use. We have had an open recommendation in this area since 2009. Senator Wyden. Thank you for your professional work. Thank you, Mr. Chairman. The Chairman. Thank you, Senator. I would just say we have heard a lot today from the IRS and the ranking member regarding streamlined critical pay authority. As Senator Wyden noted, re-implementing this authority is included in a bipartisan bill the committee introduced last year, and we will be moving to consider this particular bill in the near future. So hopefully we can resolve some of these problems. Senator Grassley, we will turn to you. Senator Grassley. I am going to start with Director Wilshusen, please. I spent a little time comparing your 2015- 2016 reports on information security at the IRS. Let me take a couple of examples. In 2015, one specific observation was that on two databases, account passwords were not set to expire every 90 days, as they should be. In 2016, the report says two of the 13 databases reviewed again had passwords that did not expire every 90 days, as they should have. Do you know if these were the same two databases? Mr. Wilshusen. Yes, sir, they were. Senator Grassley. It is common to hear that the lack of funding is why we cannot have better cybersecurity. So I might ask you, what is the approximate cost of setting up a password to expire every 90 days? Mr. Wilshusen. It would be negligible, sir. It would not be a high-cost issue. It would be very low-cost, indeed. Senator Grassley. Again, both the 2015 and 2016 reports had a section dedicated to physical access control procedures that were not consistently implemented. The 2016 report observes that security guards control physical access to each IRS computing center. Quoting now from the 2016 report, quote, ``IRS has yet to address weaknesses pertaining to its review of its authorized access lists to sensitive areas for both employees and visitors at one of its computing centers.'' So it is not an either/or. But I wonder if you could compare the cost of a dedicated guard force to the cost of reviewing a list of people who appropriately have access to the facility. Mr. Wilshusen. Well, certainly, employing and deploying a guard force would cost significantly more than what it would to just review an access list on a periodic basis. That would be basically very low-cost, and it is something that should be done as a normal course of business. Senator Grassley. Your 2015 report found the agency did not always ensure that contractors received security awareness training within 5 business days, as required. The 2016 report found the same problem and noted that the IRS acknowledged it had not addressed the issue. Could you say if this contractor problem is that they get the training, but that they get it late, or do they just not get it at all? Then I will follow that up right now. How expensive would it be to get the training in a timely manner rather than late? Mr. Wilshusen. Well, first of all, it is that they do not receive it in a timely manner. The contractors do not receive this training, for the most part, in a timely manner. And in terms of cost, if it is a web-based training, it should not cost much additional money to ensure that they receive it within the 5 days of gaining access to IRS systems. Senator Grassley. A couple of questions about mainframe security policy. Both your 2015 and 2016 reports say that, according to the mainframe manufacturer, policy should address who can administer the security software configurations that control access to mainframe programs. Is that correct? Mr. Wilshusen. Yes, sir. Senator Grassley. And both reports indicate that the IRS mainframe security policy does not address who can administer these configurations. Is that correct? Mr. Wilshusen. Yes, sir. Senator Grassley. What would be the cost of naming the person or persons who can administer the software configurations that control access to mainframe programs? Mr. Wilshusen. There should really not be much of any cost associated with that. It is just an assignment of responsibilities that IRS should make to assure that those individuals have been designated and take the appropriate steps to limit access as appropriate to those mainframes. Senator Grassley. So I would like to ask, Commissioner Koskinen, as you heard me ask Mr. Wilshusen about findings and recommendations that appear over and over in the GAO report--or at least each of the last 2 years--about cybersecurity at your agency, I took special note of four areas: setting passwords to expire every 90 days; two, a monthly review of lists of who should have access to computer centers; three, timely security awareness training for contractors; and, fourthly, the naming of administrators for software security on mainframe programs. Would you agree that these are low-cost changes that could improve cybersecurity, and if they are, then why have they not been done? Commissioner Koskinen. They are low-cost. I would note that we value highly both the reports and recommendations from GAO and from the IG, particularly in cybersecurity areas. In the last several years, we have counted up over 2,000 GAO recommendations, of which we have already implemented about 80 percent. In the internal security--and these are important internal security issues, not external, but they could become external, obviously--one of the things we are moving toward in terms of access is that passwords themselves turn out to be somewhat questionable, and we are moving toward what we call PIC cards, where you can actually only access servers--right now, you can only access e-mail with a Personal Identity Card you put into the computer. We are moving toward having that be the system for access to all servers, all mainframes, and security online, so that it does not matter if you have given away your password or somebody seeks it, they will not be able to have access without the card. But I agree, to the extent we can--we have a wide range and a large number of recommendations from both the IG and GAO. We do not disagree with those. We are working as quickly as we can to implement them, and these are particular ones internally to make sure that--we worry a lot about external threats. We also need to worry about internal threats, inadvertent or otherwise, and that is a high priority for us. Senator Grassley. Then I would expect that these will not be in the 2017 report. Commissioner Koskinen. I can almost guarantee you, working with GAO, they will not be. But GAO, I would note, has done a very important thing for us. Out of their range of recommendations, they have given us their priorities or what they think are the highest priority for us to do. Because there are limitations of time and resources, the ability to identify which of the recommendations have the highest priority is very helpful to us, and GAO has been very good about giving us that guidance. Senator Grassley. Thank you. The Chairman. Thank you, Senator. Senator Carper? Senator Carper. Thanks, Mr. Chairman. I want to associate myself with the comments of Senator Wyden earlier. I thought he nailed it with his comments with respect to the streamlined critical pay program. Mr. Chairman, you mentioned in your comments that legislation had been introduced, bipartisan legislation was introduced last Congress. I just think it is critical that we follow through on that. Year after year, Mr. Koskinen and others come to us and say, ``Please do this to enable us to do our jobs more effectively,'' and a lot of times we point the finger at them and say, ``You know, you screw up here and you screw up there, your people have as well.'' We have some responsibilities in this too, and one of the things that we could do to help out is to provide for the reestablishment of the streamlined critical pay program. Mr. Chairman, you are going to hear a lot from me in the months to come, saying we should do this, let us do it, let us get it done. We need to do our job. We need to do our job. We hear a lot about that lately. We need to do our job. This is another area where we need to do our job. Mr. Dodaro, I want to ask you--I want to come back to this other point that Senator Wyden raised, and that is the minimum standards for paid tax preparers. Would you just give--I think you guys have looked at this before, you folks have looked at this before. Just give us a minute or so on what we should be doing in this regard. Mr. Dodaro. We made a recommendation several years ago that IRS institute regulations over paid tax preparers, which it did, and then those regulations were overturned by the court because it viewed that IRS did not have statutory authority to do this. As I mentioned earlier, our work has consistently shown that there are problems with some paid tax preparers. We sent teams of people to 19 paid tax preparers. We checked in advance with the IRS what the right answers should be to our tax scenarios. Only two of the 19 paid tax preparers gave us correct answers. Some were very far off, to the point where they could have resulted in penalties and interest, both for themselves as well as for the people whom they were filing for. We also looked at IRS data, at a 3-year period of time, and found that paid tax preparers made errors 60 percent of the time versus 50 percent of the time for taxpayers filing on their own behalf. Senator Carper. It was actually worse. Mr. Dodaro. Yes. Yes. Senator Carper. What should we do? Mr. Dodaro. Well, I think you need to give the IRS the authority, the statutory authority, to regulate paid tax preparers. They need to set minimum standards. They should go through a due process procedure just as you would with any regulatory approach and set the standards and enforce those standards. This is a particular problem because of IRS's resource levels. If the government is going to rely on paid tax preparers to largely carry out a very important function on behalf of the government, then it needs to make sure that they are properly carrying out their responsibilities. IRS could greatly leverage the preparers' activities as opposed to a need to continually beef up the IRS. Senator Carper. Thanks so much. Last year, Mr. Koskinen, I worked with a number of our colleagues, some on the Homeland Security and Governmental Affairs Committee, some on the Intelligence Committee, and others, to eventually pass the Federal Cybersecurity Enhancement Act of 2015. Among other things, the bill strengthened an important cybersecurity system at the Department of Homeland Security that is known as EINSTEIN 3A. The EINSTEIN program uses the best threat intelligence from our national security agencies to block cyber-threats before they can actually reach our Federal agencies in many instances. It is my understanding that EINSTEIN 3A is now available to all Federal agencies. However, not all agencies, including the IRS, are signed up for EINSTEIN 3A. The bill we passed last year also made participation in the program mandatory for all Federal civilian agencies. When will the IRS adopt EINSTEIN 3A and start receiving its protections? Commissioner Koskinen. I would like to give you Mr. Milholland. Senator Carper. Mr. Milholland? Mr. Milholland. We are very familiar with the EINSTEIN program, 1 and 2, and we are scheduled to receive the EINSTEIN 3 equipment this year, and then there is the issue of implementing it. So certainly by next filing season, I suspect that we will have it all done. Senator Carper. So by next filing season, like a year from now? Mr. Milholland. Yes, sir. As I say, we have to schedule ourselves with DHS to receive the equipment, install it, test it, and then implement it. It is not something that is done overnight. Senator Carper. That is a lot of nights. We have 365 nights. Mr. Milholland. Again, we are not yet scheduled from DHS. So it is something we have to work out with another agency as to when we actually get the equipment. Senator Carper. We are going to go to work on that and make sure that we do everything we can to move you up in the queue. Mr. Milholland. Thank you, sir. Senator Carper. You bet. Thanks so much. Thanks, Mr. Chairman. The Chairman. Thank you, Senator. Senator Scott? Senator Scott. Thank you, Mr. Chairman. Good morning to the panel and thank you for taking the time to be here, and we certainly appreciate your investment of time and your energies toward making sure that taxpayers' information is secure as possible. I certainly know firsthand that identity theft is a terrifying experience and one that we should all hope that all taxpayers have an opportunity to avoid. The reality of it is that what we have seen over the last several years is too many taxpayers having too much information exposed inappropriately and, frankly, very poor results. Unfortunately, there seems to be a systemic failure at the IRS in protecting taxpayer information, despite repeated warnings that the IRS needed to strengthen and modernize protection of taxpayer information. Due to these failures, I have received a number of e-mails from constituents throughout South Carolina, one in the last couple of days specifically from a taxpayer in Lexington, SC, who seems just bewildered at what the Federal Government, particularly the IRS, is doing to protect personal information. I am interested in learning more about what the IRS is doing, and we certainly have heard a number of presentations and a lot of information about some programs that would be successful. Other than what has already been mentioned, what else do you think should be done and can be done? If you can take maybe 50 seconds to answer that one. Commissioner Koskinen. We are doing a wide range of things. One is, we are getting ready to establish a significantly increased authentication protocol. It will mean more taxpayers will not be able to answer the questions or get in, but it will make the system more secure. As noted, we are moving to protect the systems with PIC cards, so people can only access e-mails or servers with personal identity cards. We are working, and the private sector is working very closely with us--and we have a public relations campaign going with them out to taxpayers, trying to give them information on how to protect their data. I would stress the accesses that have been obtained at the IRS were by criminals able to masquerade as taxpayers because they already had the information on the taxpayers. So we think it is important for individuals to be careful what they do with their information, not to give out their Social Security numbers, not to use the same user ID and passwords all across the board, because we are all in it together. Senator Scott. Thank you very much. Another issue that we have had many conversations about, and certainly one that I think should be deeply troubling to all of us, is the ruling last month by the Sixth Circuit Court that basically, in United States v. NorCal Tea Party Patriots, demanded that the IRS stop their games of delaying and turn over the documents requested by the plaintiffs. In fact, the Sixth Circuit called the conduct displayed by the IRS attorneys outside the tradition of defending the Nation's interests in enforcing its laws. And while we spend a lot of time on cyber-breaches, the reality of it is that protecting all taxpayers should be one of our top priorities. Has the IRS complied with that court order? Commissioner Koskinen. We have complied with that court order. We have given the plaintiffs the information they requested, the names and addresses of the organizations. As you know, our strong view was, that was taxpayer information. We have a lot of applications for a lot of things, whether it is private letter rulings or applications to become a c(3), (4), (5), (6), or (7), and oftentimes people, when they apply, do not assume that the application will be made public. So we disagreed with the court, but we have complied with the court, because we have that order, but we have only complied with the information specifically in that case, and we have only done it in that case. We have not made a decision about any other case. Senator Scott. Thank you. The Chairman. Senator Coats, you are next. Senator Coats. Thank you, Mr. Chairman. I would like to direct my question to Mr. George. Mr. George, I raised the issue of employment-related identity theft with the Commissioner the last time he testified before the committee here, and I know that TIGTA has done a lot of work on this issue. These are cases in which someone uses someone else's identity, their name or their Social Security number, to get a job illegally, on the employment side. A W-2 form with this false information is then sent to IRS and the Social Security Administration by an employer, or the W-2 may be attached to the tax return of the undocumented worker. Our staffs met to try to work this out. It was a couple of months ago. What we learned is that, one, the IRS continues to process tax returns with false W-2 information and issues refunds as if they were routine tax returns, saying, ``That is not really our job; we are there to process the returns and issue the refunds or collect what is overdue.'' We also learned the IRS ignores notifications from the Social Security Administration that a name does not match a Social Security number, and you use your own system to determine whether or not a number is valid. We learned that employers are liable for IRS fines and penalties if they submit false W-2 information, yet neither the IRS nor SSA is notifying employers that the information they are submitting is false. We learned that IRS identified 200,000 new cases of employment-related identity theft last year and marked victims' accounts, yet did not notify the victims, again, saying, ``That is really not our job.'' In fact, the IRS forbids its employees from notifying victims that their information has been stolen. The IRS does not examine returns submitted on paper for employment-related identity theft. Lastly, we learned that when the IRS marks the account of a victim, it does not notify the Social Security Administration that the victims did not earn the income reported on the W-2, and, as a result, the victims could lose income-related benefits because their Social Security earnings are not corrected. My question to you is, one, have we made some progress since we met, on the basis of what we learned; and secondly, if you do not have the authority to better inform victims or connect with SSA on the potential fraud and notify each other, do you need authority to be able to do that? Do you need a statutory mandate here from the Congress to do that? Where do we go from here? I think all of us can agree that victims need to know that they are victims, and they need to know that an agency of the Federal Government, whether it is IRS or whether it is SSA, or both, ought to have some ability to talk to each other to make sure that they do not run afoul of one or the other. I am happy to hear your response. Mr. George. Thank you, Senator. What you stated at the outset of your question is completely accurate. I would note the IRS did have a pilot program to address this issue. That program ended. So they are not providing the information that you pointed out, but we are literally, sir, in the process now of assessing this overall issue and expect to issue our report in June of this year. Senator Coats. Well, I am glad to hear that, but was the pilot program false? I mean, it just did not work out, is that---- Mr. George. I will defer to the Commissioner to describe whether or not he thinks it was--was it false? No, but they made a decision not to continue it, and I do not know whether it was resource-driven or what factors they took into consideration, Senator. Senator Coats. Commissioner, I would be happy to have your response. Commissioner Koskinen. Surely. Again, as you know, what happens in these situations is, someone is using a Social Security number to get a job, but they are filing their tax return with their ITIN--they are undocumented aliens. And so on that ground, they file taxes. It is in everybody's interest to have them pay the taxes they owe. The question is whether the Social Security number they are using to get the job has been stolen, though it is not the normal identity theft situation. We did run a pilot, and we are looking at--and I appreciated your discussions about this-- whether there is a way we could simply advise people. A lot of times, those Social Security numbers are, in fact, borrowed from friends or acquaintances, and people know they have been used. Other times, they do not. So we are looking at--and one of the reasons for the pilot was--what is the most effective way to deal with this without necessarily having people decide not to file their taxes-- obviously a priority for taxpayers and the IRS, which is collecting those taxes. So I would be delighted to have us get back to you with more detail on exactly where we are. And in some cases, there may be a need for statutory authority, and we are very sensitive about protecting taxpayer information on both sides. But we will be delighted to give you the update on what we have learned and what we might be able to do going forward. Senator Coats. Mr. George? Mr. George. Thank you, Senator. I just wanted to add that there was a bill introduced entitled the Social Security Identity Defense Act that would require the IRS to inform an individual whether their SS number has been fraudulently used. I do not know where it stands now in terms of the legislative process. Senator Coats. Well, we can check that out. Commissioner Koskinen. But I would note specifically, we do advise taxpayers, when there has been any kind of access to one of our online applications, that their Social Security number is in the hands of criminals. What we are talking about here is a very limited case of people filing taxes with an ITIN, but it is clear that they used the Social Security number to get the job. But in all the other cases, we have sent out hundreds of thousands of letters, even when our system has not been accessed, warning taxpayers, no information was obtained from us, but you should know criminals have your Social Security number and other identifiers, so you should take whatever actions you can to protect that information. Senator Coats. If I could, Mr. Chairman, just one last question. My tax preparer, by the way, who is fully certified, just sent me an e-mail asking would I prefer to have my tax returns filed electronically or by paper. How am I safer--which way? Commissioner Koskinen. You are actually safer electronically, because we can mark accounts. The only difference is, when you file on paper, it just takes longer to process, takes longer to get a refund. We get fraudulent paper returns. So it is not as if the criminals do not file paper as well. So we encourage everyone to e-file. Over 86 percent filed last year electronically, and as noted, it does give us the ability to track patterns more easily, and it is part of the data we share with the private sector and the States. So our advice to you is, file electronically. Senator Coats. Any other answer would probably flood your agency with a lot of paper. [Laughter.] I will put that in that context. Anyway, I ended up doing it electronically. I hope it works. Thank you, Mr. Chairman. The Chairman. Thank you, Senator. Senator Cardin, you are next. Senator Cardin. Thank you, Mr. Chairman. I thank all of our witnesses today in regards to the integrity of the system. We are very concerned about the recent warning that was given to Maryland, Virginia, and DC taxpayers, due to the phishing scams, trying to trick victims into verifying the last four digits of their IRS number in order to get unsuspecting taxpayers' information that can be used to compromise their privacy and their financial integrity. I guess I will go with the Commissioner. Could you just update us as to the status of that particular concern and whether there should still be high alert in our region in regard to this scam? Commissioner Koskinen. I think there should be. One of the things I think everyone should be aware of is--people should be aware of all the possible scams out there. There are the phone scams, where people call you and pretend to be from the IRS and threaten you, and we keep telling people, if you are surprised to be hearing from us, you are not hearing from us, and you should report that call. We work with the IG very closely on that. There are phishing expeditions of all kinds, from masquerading as coming from financial institutions to the IRS seeking information or personal information. A lot of times you will get a note that says your account is frozen, click here and you can unfreeze your account. You should never do that. No bank or financial institution will put you through that system. So this one is the most recent. We have had a couple new ones this year. We have had private-sector companies, where it would appear to be an e-mail from the CEO asking for personal information about employees, but it turns out to be an e-mail that is a phishing expedition from criminals. So in this area, we are encouraging people to always remember that no one is asking legitimately for any personal information like Social Security numbers online or on the phone, and so you should not either click on the link and you should not provide that information. Senator Cardin. Do you know why this has been geographically in this region that this particular scam is being used? Commissioner Koskinen. We do not. We know ID theft began, kind of flourished in Florida. We have a pilot program for IP PINs that has run for a couple of years in Florida, Georgia, and the District of Columbia. Why those were the three areas where we have had more identity theft is hard to know, but the District has always been one of the areas that has been most prone to identity theft. And so it is not unusual for a permutation on that scam or scheme to happen in the same geographic area, but there is no other indication. We cannot even tell you why the District of Columbia and Georgia are on the high end of identity theft. It just turns out to be one of those things that develops. Senator Cardin. One of the challenges in this environment is that we have to use all the resources we have at our disposal. That is, the Federal agencies need to work with the States and need to work with private entities and need to work with taxpayers. What efforts are underway to try to coordinate the resources to go after those who are committing these frauds? Commissioner Koskinen. We have a great effort--as I say, we work very closely with TIGTA. They have been tracking down people who are participating in phone scams. We have prosecuted and thrown in jail about 2,000 people for identity theft. We have about 1,700 investigations going on right now. We work closely with the Department of Justice in those areas. In more general phishing expeditions, they are harder to track down. We work with the Federal Trade Commission and others to make sure that that information is readily available to the public. As I said, the partnership we created a year ago with the private sector and the States has been a great vehicle for us, not only exchanging information about taxpayers, but exchanging information about fraud. We learned about the private-sector company CEO e-mail from one of our partners, and what has happened is, we all then can publicize that and put it out. So it is, I think, a significant step forward, but your point is well taken. We need everybody working together on this matter. As I told the States and the private sector when we brought them together, it is clear no one of us by ourselves is going to be able to successfully deal with this problem. Senator Cardin. Mr. George, do you want to respond? Mr. George. Senator, just to give you a sense, as of this week, we at TIGTA received approximately 1.2 million calls concerning impersonation cases, with approximately $31 million having been sent by people in scams. So as the Commissioner noted, we at TIGTA have engaged in public service announcements. We are doing as much local media as possible. The key is getting the word out, and you would be shocked how difficult it is sometimes to convince people that, as the Commissioner indicated, if you do not think you have an IRS problem and someone calls you out of the blue, you should hang up immediately, and they fail to do so. Senator Cardin. Let me just make one final point, and that is working with our State, in Maryland, our Comptroller has the ability to deal with paid preparers and is able to suspend their rights in Maryland. That, of course, has been compromised by the Supreme Court interpretation, and there will be an effort made to give the IRS the ability to regulate again those who are paid preparers. Mr. Commissioner, I know you have supported that, and hopefully we can use that as an opportunity to work more closely with our States. Commissioner Koskinen. Yes. We look forward to that. As I would say, the regulation is basically just requiring minimum standards in information, your ability to process tax returns. We are not talking about all sorts of other regulations. So it really is appropriately described as requiring minimum standards of paid preparers. Senator Cardin. Thank you, Mr. Chairman. The Chairman. Thank you. Senator Casey? Senator Casey. Mr. Chairman, thank you very much. I want to thank the panel for being here and for your public service. I am going to be addressing my question to Commissioner Koskinen. But I do want to say, because Mr. Dodaro has great Pennsylvania roots, that I apologize for probably not getting to you today, but I will tell everyone at Belle Vernon High School that you said hello. Is that okay? Mr. Dodaro. That is fine. Senator Casey. Thanks. And the chairman, of course, has Pennsylvania roots as well. So we want to highlight that. I want to start with, Commissioner, some of the data points that you had in your testimony. I know I missed your presentation, but the written testimony highlights a number of things we should focus on in terms of the volume of your work. In fiscal year 2015, you processed 244 million returns, issued more than $400 billion in refunds. Your new filters stopped 1.4 million returns filed by identity thieves, thereby preventing $8.7 billion in fraudulent returns. So I wanted to state that for the record, because I know those numbers bear repeating. But I want to focus on two areas. One is cyber-criminals and the Security Summit, if you can comment on that, and also on tax scams. With regard to the Security Summit itself, if you can just reiterate or amplify some of the earlier comments about some of the recommendations that came out of that Security Summit and, secondarily, how IRS can be more adaptive in terms of dealing with some of those security recommendations. Commissioner Koskinen. What we all agreed on at our first meeting of the Security Summit--and we have been developing it since then--was that it would be critical to exchange information in real time. We are very sensitive about protecting taxpayer information and as a result, over the years, have not been particularly forthcoming with our partners about sharing information back. One of their concerns was, they would give us leads and then we never told them whether the leads were good, and we never built on that. So one of the purposes of the summit was to change all that and to have a robust exchange back and forth about patterns of activities, suspicious activities. We created a rapid response team with representatives from the States, the private sector, and the IRS. If there ever is a significant incident--and there have been a couple of them--we immediately have a way of getting that information out simultaneously. They gave us and we all agreed on 20 different data points that we would get, what IP is being used on a computer, how long people are using it. If you are filing several returns very quickly, it is pretty clear you are not checking your deductions, you probably are a criminal filing. So all of that has helped significantly. The additional funding we got from the Congress allows us to fund the development of the information center for analysis, which will simply facilitate more quickly the ability for States and the private sector to access the data rather than having it come in to us and then have us push it back out. So we think that it is significant. It is important for it to be an ongoing partnership. One of the things that has been interesting to me was, at the first meeting, the private-sector preparers and software developers said that we, the IRS, are the only people who could set standards, and I told them that was fine as long as they worked with us to establish the standards as opposed to us just imposing them. That is how we ended up with security standards; it is how we ended up with increased authentication standards that all the preparers are using this year. We are working together to broaden those activities as we go forward. We will have more data points used in the next filing season, and we already see an up to 40 percent increase in the refund fraud stopped as a result of just sharing the information about leads. Senator Casey. Well, I appreciate that, and I hope as you begin to implement recommendations, that you keep us updated. Number two, if you find any either institutional obstacles or policy gaps that we can help with, I hope you tell us that. I want to move, in the remaining seconds I have, to tax scams. I went across the State on our break and held a number of roundtables regarding senior scams more broadly, a lot of them having their origin in IRS impersonation or tax scams. What can you tell us about that in terms of your recent work and what taxpayers should be focused on as we approach tax day? Commissioner Koskinen. As we approach tax day, I think the most important thing for taxpayers to focus on is, if you are surprised to be hearing from us and you have not gotten a letter before--you should have gotten several letters--then you are not hearing from us. We never threaten people. We never tell you you are going to jail the next day, and we never tell you to make your payment to a bank account or a debit card. If you are going to pay taxes, you pay them to the United States Treasury. If I could just get people--we have been working on this for over 2 years--to understand, (a) we do not threaten you; (b) we do not surprise you; and (c) if you are going to pay your taxes, make sure they go in a check payable to the United States Treasury. TIGTA has been very good at working with us; the private- sector partnership has been good at working with us. They were the ones who said we have to have a public campaign to get taxpayers to pay attention to all of this. Senator Casey. Well, that ``IRS will never do'' list is something we read at various meetings, but we need to reemphasize that to give people the information so they understand that. Commissioner Koskinen. The marketers say you have to make seven impressions before anybody hears you. We have tried to make more than seven impressions. TIGTA has been a wonderful partner with us with their work as well. We have had very good coverage from the media, local and national media, over the last couple of years. But the people most vulnerable are elderly, are immigrants, low-income people who kind of live in a state of worry or fear, and they are the most likely to be prey to these kinds of events, which is why we are so concerned. Senator Casey. Thank you, Commissioner. The Chairman. Senator Portman? Senator Portman. Thank you, Mr. Chairman. Thanks for holding this important hearing today. It is a topic that affects all of our constituents, I am sure. I will tell you that in 2014, we had one case, one constituent case, of identity fraud. In 2015, we had 32. I do not know if that is consistent across the States, but that kind of an increase, unfortunately, is an indication of the growing problem that we are all facing. I am very concerned particularly about, Mr. George, your report, as the Inspector General for Tax Administration, indicating that the IRS has not established an IRS-wide approach to authenticating someone's identity. I am open to more funding. I, for one, believe, as you know--we have talked about this--that more funding may be appropriate, as we did at year end, but I want to be sure the money is well spent. So I look forward to following up with you on that. But I want to, if I could, shift to another issue this morning. It has to do, Commissioner Koskinen, with a very urgent issue for a group of our constituents. And Senator Brown and I have worked closely on this issue, and I think he has similar concerns to mine. I look forward to hearing from him on it in a moment. But this has to do with the health coverage tax credit. As you know, section 407 of what is called the Trade Preferences Extension Act last year reinstated that health coverage tax credit through 2019. Basically, it extended the advance monthly payment program, which is essential. It is a program that gives advance premium payments to these HCTC recipients. In that statute, the program was to be in place 1 year from the date of enactment. So in this case, we enacted it in June of 2015. We said that it would have to be in place by June 2016, this year, 1 year. We were, unfortunately, told on March 7th of this year, 9 months after the bill had originally passed, by way of a letter from you, Mr. Commissioner, that the IRS would not be starting the advance monthly payment program by June, as required under law, but that you all hoped to start making advance payments by January of next year, so January of 2017. So this has caused a huge problem. Six months go by, we do not hear anything, and then all of a sudden, taxpayers are told that the rug is being pulled out from under them and that we are not going to go ahead with this required advance payment program. Expecting that they are going to get this advance monthly payment starting in mid-year, a lot of these taxpayers signed up for the health coverage in December and January. They thought they could get premium assistance, of course, starting on July 1st, as required under law. This is not an easy decision to make. These premiums, as you know, are thousands of dollars per month. In some cases, taxpayers had to borrow money from family and friends, borrow from a bank, or take money from their retirement accounts early, to pay for these full premium prices in the first 6 months of this year, knowing that help was coming. Furthermore, in some cases, these taxpayers had the option of receiving premium subsidies for plans on the health-care exchanges, but they turned down that opportunity because they wanted to stay in their private plans, which a lot of people do, and because they expected to get this 72.5-percent premium starting in July. So, by the time the middle of March 2016 rolls around, these taxpayers have made a lot of life-altering decisions based on the fact that these advance payments are going to be there, and, again, they have the rug pulled out from under them. These are resilient folks. They have been through a lot. These are people who were left behind, frankly, by our own Federal Government in terms of their health care and pensions. They can plan for stuff and they have done this. When the HCTC was unavailable in 2014 and 2015, they made sacrifices and they got by, but, again, to pull a rug out from under them 3 months before they are expecting this help is unacceptable, completely unacceptable. The fact that the IRS had July, August, September, October, November, and December of last year to provide them with some sort of notice, to me, is also unacceptable. And the option left to these taxpayers now of trying to find another way to fund these premiums for the next 6 months or to have to drop health-care plans altogether because they cannot afford them is also unacceptable. So I understand our staffs--Senator Brown's staff and mine--have been working to try to find some sort of solution so that these advance monthly payment programs can get up and running by July. We have been having discussions about alternative methods of administering the advance monthly payment system so they are ready to go by July, as required by law. I would just ask today, Mr. Commissioner, that, as you have in the past on some issues, you get personally involved in this and help us to work out an arrangement so that we can be sure that we do not have an unacceptable result. Commissioner Koskinen. I have actually been personally involved since it was passed, because it is a critical program, and one of our obligations, we feel, is a high commitment to implement statutory mandates. As we advised people when they were considering this, the last time the program was initiated, we got a $74-million appropriation to go with it, and that allowed us to hire a contractor to set the program up, and it ran well. This time, we got no money, but we said, we are going to work to do our best. The reason we did not notify people until the 1st of March was, we worked very hard trying to see if, in addition to allowing people, which they can, to file in 2014 and 2015 for reimbursement, we could get the advance payment up and running, and as soon as we figured out that we would not be able to be up in June, we notified you and everyone else. But I understand. Your points are well taken, and we do not take them lightly. If there were a way to do it, we would. I would say in addition to the $74 million, the last time the program was set up, it took 2 years. If we can get it up and running by January--and we are committed to doing that--it will be a year and a half. So without any funding at all, we will be 6 months faster than the last time. But your point is still valid. It does not necessarily help people who are, in fact, waiting for those payments. The fact that we will reimburse them after the fact is still a burden for them, and we regret that. We are delighted to work with you and Senator Brown to find any way to get there before January, but we have to build systems to make payments. We normally do not make monthly payments. So we have no system to do it. We can do the credit at the end of the year, because we give credits, which is why we could get 2014 and 2015 up and running. But we are delighted to work with you. We recognize that this is a burden on a number of people who have had a lot of other problems as well. Senator Portman. Well, it is a burden. Again, Mr. Chairman, thank you for your indulgence. But nothing you have said explains to me why we wait until March, mid-March of 2016, to tell people that these life-altering decisions that they made are not going to work out for them and they have to now find some alternative, which, in many cases, is going to mean, again, they are not going to have health-care coverage that they fully expected under law. So I do hope that you will instead work with Senator Brown's staff and my staff to come up with an acceptable solution so that we can get these people some sort of coverage through this advance health-care payment. Commissioner Koskinen. I would do that. The reason it took until February is, we actually made a good faith effort to see if we could get it done. We thought there was one possibility we could get it up and running. We worked on that and finally decided in February that the IT systems just would not be ready. But it was not because we did not care about it. It was because we were actually trying to see if we could make the one-year deadline. But we will work with you. We are delighted to do that. The Chairman. Senator Nelson? Senator Nelson. Thank you, Mr. Chairman. Mr. Commissioner, you were kind enough to respond to my March letter on April 1st. I hope that it was not an April fool's joke. But here was one of the questions in the letter, and let me read to you your office's response to me, and I need a clarification. The question was, under 26 CFR 1.501(c)(4)-1, the promotion of social welfare does not include direct or indirect participation or intervention in political campaigns on behalf or in opposition to any candidate for public office. Given these requirements, please provide examples, Mr. Commissioner, of when it is permissible for 501(c)(4), 501(c)(5), or 501(c)(6) organizations to run ads supporting or attacking the positions of a candidate for elected office. Please provide examples of when this activity would be impermissible. Now, I know this is a delicate subject, especially in front of the chairman and those of us over here. This was your answer, and I think it is quite clear, quote: ``Unlike section 501(c)(3) charitable organizations, organizations described in section 501(c)(4), 501(c)(5), and 501(c)(6) are not prohibited from engaging in political campaign intervention. However, section 501(c) organizations that engage in political campaign intervention may be subject to tax under 527(f) on their exempt function expenditures. Whether an organization is engaged in political campaign intervention depends upon all the facts and circumstances of each case. ``Revenue ruling'' such-and-such ``2004-6 provides six examples illustrating facts and circumstances to be considered in determining whether a section 501(c) organization that engages in public policy advocacy has expended funds for a section 527 exempt function; that is, influencing or attempting to influence the selection, nomination, election, or appointment of any individual to public office.'' The final couple of sentences read: ``Revenue ruling 2007- 41 provides an additional 21 examples illustrating facts and circumstances to be considered in determining whether a 501(c)(3) organization's activities result in political campaign intervention. The analysis reflected in these revenue rulings for determining whether an organization has engaged in political campaign intervention or has expended funds for a section 527 exempt function is fact-intensive. A copy of both revenue rulings is enclosed with this letter.'' That was a very extensive answer, and I want you to know I appreciate it. Now, here is the clarification that I need, please. So if that is the case, and if the IRS is really enforcing the law, how much tax revenue have you collected for political expenditures of 501(c)(4) groups this year or last year--or any year? I fully do not expect you to have that on the top of your head, but I would like you to give the answer to this member of the committee. Commissioner Koskinen. I carry around a lot of numbers in my head, but that is not one of them, as you suspected. Senator Nelson. Understandably. Commissioner Koskinen. Yes. We will be delighted to get you that information as quickly as we can, because it is important and we should be able to answer quickly. Senator Nelson. That is great. Thank you, Mr. Chairman. The Chairman. Thank you, Senator Nelson. Senator Cantwell? Senator Cantwell. Thank you, Mr. Chairman. I thank the Senator for his work on this issue. I wanted to ask of the Commissioner, one of the issues that I think all government faces is the shortage of highly skilled IT personnel, and we previously had support that would allow you to streamline the pay and authority so that you could get the skill level that you need. My understanding is, though, that this legislative authority has expired and we need to re-legislate that streamlined authority so that you can have the critical pay. So how much is this affecting us in getting the workers that we need at the IRS? Commissioner Koskinen. Well, it is a significant challenge for us. We have only 13 or 14 people left. There were 40 slots. We never used more than 34 of that. There are 13 or 14 left; 10 are senior IT people working on cybersecurity, online services. By this time next year, they will all be gone. Replacing them is very challenging for us at the IRS, although a lot of people want to come to us because we have very interesting challenges. IT people, high-level people, are in great demand, and putting them through the hiring process--we find you, we like you, yet you get to wait for 3 to 6 months while we put you through an application process. Our people are being recruited every day. Those people whom we are recruiting are being recruited every day. So saying, ``We really like you; we would like you to come work; sit still for 3 to 6 months, and we will get back to you,'' does not work. And so our concern is--and it is a serious concern--in the areas of information technology particularly, where we are talking about attracting the best in the country, without the authority--and we have not had it since 2013--it has made it almost impossible for us to recruit and retain at the level that we need to. Senator Cantwell. Is this affecting cybersecurity at the IRS? Commissioner Koskinen. Our head of cybersecurity left recently rather than wait until his term ran out. The reason it is four plus two would allow us, for the people remaining, to have 2 years to, in fact, replace them as we go forward. But it is a critical need. It is not a major expenditure. It is not a lot of people. But it is critical to us, because it is focused on an area of high need for us. Senator Cantwell. Well, the competition for people knowledgeable in cybersecurity in general is very high, and IT still also remains very high. So the fact is that, even in an ``I can hire you tomorrow'' environment, you are facing very, very stiff competition. So I think, Mr. Chairman, this legislation--I think it keeps getting delayed or postponed based on markup, or maybe it is going to be on the next legislative schedule--it is really important for us to make sure that we have the flexibility. I think the issue for all of our government is to continue to make sure that we have the best technology people, which is challenging for a whole lot of reasons. But I think that this authority to help you streamline that hiring and pay is something that we need to do as quickly as possible. So thank you. Thank you, Mr. Chairman. Commissioner Koskinen. Thank you, Senator. The Chairman. I thank all of you for appearing here today. I also want to thank my colleagues for their participation. Considering that tax day is just a few days away, I hope this hearing has helped us better understand the current environment for all taxpayers, and I hope to continue working with my colleagues from both sides of the aisle as we continue to examine ways to improve cybersecurity and better protect taxpayer information at the IRS. I would ask that any questions for the record be submitted by Tuesday, April 26, 2016, and if you folks could get your answers back to us promptly, it would be very meaningful to us. So with that, we will recess until further notice. [Whereupon, at 11:54 a.m., the hearing was concluded.] A P P E N D I X Additional Material Submitted for the Record ---------- Prepared Statement of Hon. Gene L. Dodaro, Comptroller General of the United States, Government Accountability Office GAO-16-589T April 12, 2016 INFORMATION SECURITY IRS Needs to Further Improve Controls Over Taxpayer Data and Continue to Combat Identity Theft Refund Fraud what gao found In March 2016, GAO reported that the Internal Revenue Service (IRS) had instituted numerous controls over key financial and tax processing systems; however, it had not always effectively implemented other controls intended to properly restrict access to systems and information, among other security measures. In particular, while IRS had improved some of its access controls, weaknesses remained in key controls for identifying and authenticating users, authorizing users' level of rights and privileges, encrypting sensitive data, auditing and monitoring network activity, and physically securing facilities housing its information technology resources. These weaknesses were due in part to IRS's inconsistent implementation of its agency-wide security program, including not fully implementing prior GAO recommendations. GAO concluded that these weaknesses collectively constituted a significant deficiency for the purposes of financial reporting for fiscal year 2015. As a result, taxpayer and financial data continue to be exposed to unnecessary risk. Identity theft refund fraud also poses a significant challenge. IRS estimates it paid $3.1 billion in these fraudulent refunds in filing season 2014, while preventing $22.5 billion (see figure). The full extent is unknown because of the challenges inherent in detecting this form of fraud. [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] IRS has taken steps to combat identity theft refund fraud such as improving phone service for taxpayers to report suspected identity theft and working with industry, States, and financial institutions to detect and prevent it. However, as GAO reported in August 2014 and January 2015, additional actions can further assist the agency in addressing this crime, including pre-refund matching of taxpayer returns with information returns from employers, and assessing the costs, benefits, and risks of improving methods for authenticating taxpayers. In addition, the Consolidated Appropriations Act 2016 includes a provision that would help IRS with pre-refund matching and also includes an additional $290 million to enhance cybersecurity, combat identity theft refund fraud, and improve customer service. According to IRS and industry partners, the 2016 filing season has generally gone smoothly, with about 95 million returns and $215 billion in refunds processed through April 1, 2016. In addition, IRS increased its level of phone service to taxpayers, although it has not developed a comprehensive strategy for customer service as GAO recommended in December 2015. _______________________________________________________________________ Chairman Hatch, Ranking Member Wyden, and members of the committee: Thank you for the opportunity to testify on cybersecurity and protecting taxpayer information. As taxpayers file their returns for 2015, it is especially important that the Internal Revenue Service (IRS) ensure that adequate protections are in place to secure the sensitive information entrusted to the agency by members of the public. The Federal Government faces an evolving array of cyber-based threats to its systems and data. Reported incidents and data breaches at Federal agencies, including IRS, have affected millions of people through the compromise of sensitive personal information and underscore the continuing and urgent need for effective information security. We initially designated Federal information security as a government-wide high-risk area in 1997, and in 2003 we expanded this area to include computerized systems supporting the Nation's critical infrastructure. In 2015 we added the protection of personally identifiable information (PII)\1\ that is collected, maintained, and shared by both Federal and nonfederal entities.\2\ --------------------------------------------------------------------------- \1\ PII is information about an individual, including information that can be used to distinguish or trace their identity, such as name, Social Security number, mother's maiden name, or biometric records, as well as any other personal information that is linked or linkable to an individual. \2\ See GAO, High-Risk Series: An Update, GAO-15-290 (Washington, DC: Feb. 11, 2015). In carrying out its mission to collect taxes, process tax returns, and enforce U.S. tax laws, IRS relies extensively on computerized systems and on information security controls to protect the confidentiality, integrity, and availability of sensitive personal and financial information for each U.S. taxpayer. Recent information security incidents at IRS further highlight the importance of ensuring --------------------------------------------------------------------------- that these controls are effectively implemented. As you know, the filing season is the time when most taxpayers interact with IRS. As in previous years, a major challenge during the filing season is protecting taxpayers' information and addressing identity theft (IDT) refund fraud, which occurs when a refund-seeking fraudster obtains an individual's Social Security number, date of birth, or other PII and uses it to file a fraudulent tax return seeking a refund.\3\ This crime burdens honest taxpayers because authenticating their identities is likely to delay processing their returns and refunds. Moreover, the victim's PII can potentially be used to commit other crimes. Given current and emerging risks, in 2015 we expanded the enforcement of our tax laws high-risk area to include IRS's efforts to address IDT refund fraud.\4\ --------------------------------------------------------------------------- \3\ This statement discusses IDT refund fraud and not employment fraud. IDT employment fraud occurs when an identity thief uses a taxpayer's name and Social Security number to obtain a job. \4\ GAO-15-290. My statement today focuses on opportunities to assist IRS in addressing (1) information security weaknesses we have identified and (2) the challenge of identity theft refund fraud. I will also discuss --------------------------------------------------------------------------- the status of selected IRS filing season operations. Within the context of my testimony, it is important to note that, for fiscal year 2016, IRS received about $290 million in additional funding to support these areas. Specifically, the funding was intended to improve customer service, IDT identification and prevention, and cybersecurity efforts.\5\ According to IRS's spending plan this funding will be used to invest in (1) increased telephone level of service, including reduced wait times and improved performance on IRS's Taxpayer Protection Program/Identity Theft Toll Free Line ($178.4 million); (2) cybersecurity including network security improvements, protection from unauthorized access, and enhanced insider threat detection ($95.4 million); and (3) IDT refund fraud prevention ($16.1 million). --------------------------------------------------------------------------- \5\ Consolidated Appropriations Act, 2016, Pub. L. No. 114-113, div. E, Sec. 113, 129 Stat. 2242 (Dec. 18, 2015). My statement is based in part on our previous reports issued between August 2014 and March 2016. We updated selected data in this statement with 2016 data from IRS on individual income tax return processing and telephone service, as well as IRS's fiscal year 2016 spending plan for the additional $290 million in appropriated funds. We also incorporated IRS statements on recent data breaches and IRS actions to address our past recommendations. To assess data reliability, we reviewed IRS data and documentation and assessed documentation for data limitations. We found the data to be sufficiently reliable for our purposes. All the work on which this statement is based was conducted in accordance with generally accepted government auditing standards. Those standards require that we plan and perform audits to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. background IRS's mission is to provide America's taxpayers top-quality service by helping them to understand and meet their tax responsibilities and to enforce the law with integrity and fairness to all. During fiscal year 2015, IRS collected more than $3.3 trillion; processed more than 243 million tax returns and other forms; and issued more than $403 billion in tax refunds. IRS employs about 90,000 people in its Washington, DC, headquarters and at more than 550 offices in all 50 States, U.S. territories, and some U.S. embassies and consulates. Each filing season IRS provides assistance to tens of millions of taxpayers over the phone, through written correspondence, online, and face-to- face. The scale of these operations alone presents challenges. In carrying out its mission, IRS relies extensively on computerized information systems, which it must effectively secure to protect sensitive financial and taxpayer data for the collection of taxes, processing of tax returns, and enforcement of Federal tax laws. Accordingly, it is critical for IRS to effectively implement information security controls and an agency-wide information security program in accordance with Federal law and guidance.\6\ --------------------------------------------------------------------------- \6\ In particular, the Federal Information Security Modernization Act of 2014 (FISMA), among other things, requires the head of each agency to provide information security protections commensurate with the risk and magnitude of harm resulting from unauthorized access, use, disclosure, disruption, modification, or destruction of the agency's information or information systems. Pub. L. No. 113-283, Sec. 2(a), 128 Stat. 3074 (Dec. 18, 2014), codified at 44 U.S.C. Sec. 3554(a). Cyber incidents can adversely affect national security, damage public health and safety, and compromise sensitive information. Regarding IRS specifically, two recent incidents illustrate the impact --------------------------------------------------------------------------- on taxpayer and other sensitive information: In June 2015, the Commissioner of the IRS testified that unauthorized third parties had gained access to taxpayer information from its Get Transcript application.\7\ According to officials, criminals used taxpayer-specific data acquired from non-department sources to gain unauthorized access to information on approximately 100,000 tax accounts. These data included Social Security information, dates of birth, and street addresses. In an August 2015 update, IRS reported this number to be about 114,000, and that an additional 220,000 accounts had been inappropriately accessed. In a February 2016 update, the agency reported that an additional 390,000 accounts had been accessed. Thus, about 724,000 accounts were reportedly affected. The online Get Transcript service has been unavailable since May 2015. --------------------------------------------------------------------------- \7\ This application provides users, via the IRS website, the ability to view, print, and download tax account, tax return, and record of account transcripts; wage and income documents; and proof of non-filing transcripts. In March 2016, IRS stated that as part of its ongoing security review, it had temporarily suspended the Identity Protection Personal Identification Number (IP PIN) service on IRS.gov. The IP PIN is a single-use identification number provided to taxpayers who are victims of identity theft (IDT) to help prevent future IDT refund fraud.\8\ The service on IRS's website allowed taxpayers to retrieve their IP PINs online by passing IRS's authentication checks. These checks confirm taxpayer identity by asking for personal, financial and tax- related information. The IRS stated that it was conducting further review of the IP PIN service and is looking at further strengthening the security features before resuming service. As of April 7, the online service was still suspended. --------------------------------------------------------------------------- \8\ In January 2014, IRS offered a limited IP PIN pilot program to eligible taxpayers in Florida, Georgia, and the District of Columbia. Taxpayers must confirm their identities with IRS to receive an IP PIN. IP PINs help prevent future IDT refund fraud because, once issued, the IP PIN must accompany their electronically filed tax return or else IRS will reject the return. If a paper return has a missing or incorrect IP PIN, IRS delays processing the return while the agency determines if it was filed by the legitimate taxpayer. See GAO, Identity Theft: Additional Actions Could Help IRS Combat the Large, Evolving Threat of Refund Fraud, GAO-14-633 (Washington, DC: Aug. 20, 2014), for more details on IRS's IP PIN service. The Commissioner of Internal Revenue has overall responsibility for ensuring the confidentiality, integrity, and availability of the information and systems that support the agency and its operations. Within IRS, the senior agency official responsible for information security is the Associate CIO, who heads the IRS Information Technology Cybersecurity organization. although irs has made improvements, information security weaknesses continue to place taxpayer and financial data at risk As we reported in March 2016,\9\ IRS has implemented numerous controls over key financial and tax processing systems; however, it had not always effectively implemented access and other controls,\10\ including elements of its information security program. --------------------------------------------------------------------------- \9\ GAO, Information Security: IRS Needs to Further Improve Controls Over Financial and Taxpayer Data, GAO-16-398 (Washington, DC: Mar. 28, 2016). \10\ Information security controls include logical and physical access controls, configuration management, and continuity of operations. These controls are designed to ensure that access to data is properly restricted, physical access to sensitive computing resources and facilities is protected, systems are securely configured to avoid exposure to known vulnerabilities, and backup and recovery plans are adequate and tested to ensure the continuity of essential operations. Access controls are intended to prevent, limit, and detect unauthorized access to computing resources, programs, information, and facilities. These controls include identification and authentication, authorization, cryptography, audit and monitoring, and physical security controls, among others. In our most recent review we found --------------------------------------------------------------------------- that IRS had improved access controls, but some weaknesses remain. Identifying and authenticating users--such as through user account-password combinations--provides the basis for establishing accountability and controlling access to a system. IRS established policies for identification and authentication, including requiring multifactor authentication \11\ for local and network access accounts and establishing password complexity and expiration requirements. It also improved identification and authentication controls by, for example, expanding the use of an automated mechanism to centrally manage, apply, and verify password requirements. However, weaknesses in identification and authentication controls remained. For example, the agency used easily guessable passwords on servers supporting key systems. --------------------------------------------------------------------------- \11\ Multifactor authentication involves using two or more factors to achieve authentication. Factors include something you know (password or personal identification number), something you have (cryptographic identification device or token), or something you are (biometric). Authorization controls limit what actions users are able to perform after being allowed into a system and should be based on the concept of ``least privilege,'' granting users the least amount of rights and privileges necessary to perform their duties. While IRS established policies for authorizing access to its systems, it continued to permit excessive access in some cases. For example, users were granted rights and permissions in excess of what they needed to perform their duties, including for an application used to process electronic tax payment information and a database on a human resources --------------------------------------------------------------------------- system. Cryptography controls protect sensitive data and computer programs by rendering data unintelligible to unauthorized users and protecting the integrity of transmitted or stored data. IRS policies require the use of encryption and it continued to expand its use of encryption to protect sensitive data. However, key systems we reviewed had not been configured to encrypt sensitive user authentication data. Audit and monitoring is the regular collection, review, and analysis of events on systems and networks in order to detect, respond to, and investigate unusual activity. IRS established policies and procedures for auditing and monitoring its systems and continued to enhance its capability by, for example, implementing an automated mechanism to log user activity on its access request and approval system. But it had not established logging for two key applications used to support the transfer of financial data and access and manage taxpayer accounts; nor was the agency consistently maintaining key system and application audit plans. Physical security controls, such as physical access cards, limit access to an organization's overall facility and areas housing sensitive IT components. IRS established policies for physically protecting its computer resources and physical security controls at its enterprise computer centers, such as a dedicated guard force at each of its computer centers. However, the agency had yet to address weaknesses in its review of access lists for both employees and visitors to sensitive areas. IRS also had weaknesses in configuration management controls, which are intended to prevent unauthorized changes to information system resources (e.g., software and hardware) and provide assurance that systems are configured and operating securely. Specifically, while IRS developed policies for managing the configuration of its information technology (IT) systems and improved some configuration management controls, it did not, for example, ensure security patch updates were applied in a timely manner to databases supporting 2 key systems we reviewed, including a patch that had been available since August 2012. To its credit, IRS had established contingency plans for the systems we reviewed, which help ensure that when unexpected events occur, critical operations can continue without interruption or can be promptly resumed, and that information resources are protected. Specifically, IRS had established policies for developing contingency plans for its information systems and for testing those plans, as well as for implementing and enforcing backup procedures. Moreover, the agency had documented and tested contingency plans for its systems and improved continuity of operations controls for several systems. Nevertheless, the control weaknesses can be attributed in part to IRS's inconsistent implementation of elements of its agency-wide information security program. The agency established a comprehensive framework for its program, including assessing risk for its systems, developing system security plans, and providing employees with security awareness and specialized training. However, IRS had not updated key mainframe policies and procedures to address issues such as comprehensively auditing and monitoring access. In addition, the agency had not fully addressed previously identified deficiencies or ensured that its corrective actions were effective. During our most recent review, IRS told us it had addressed 28 of our prior recommendations; however, we determined that 9 of these had not been effectively implemented. The collective effect of the deficiencies in information security from prior years that continued to exist in fiscal year 2015, along with the new deficiencies we identified, are serious enough to merit the attention of those charged with governance of IRS and therefore represented a significant deficiency in IRS's internal control over financial reporting systems as of September 30, 2015.\12\ --------------------------------------------------------------------------- \12\ A significant deficiency is a deficiency, or a combination of deficiencies, in internal control that is less severe than a material weakness, yet important enough to merit the attention of those charged with governance. A material weakness is a deficiency, or combination of deficiencies, in internal control such that there is a reasonable possibility that a material misstatement of the entity's financial statements will not be prevented, or detected and corrected, on a timely basis. A deficiency in internal control exists when the design or operation of a control does not allow management or employees, in the normal course of performing their assigned functions, to prevent, or detect and correct, misstatements on a timely basis. --------------------------------------------------------------------------- Implementing GAO Recommendations Can Help IRS Better Protect Sensitive Taxpayer and Financial Data To assist IRS in fully implementing its agency-wide information security program, we made two new recommendations to more effectively implement security-related policies and plans. In addition, to assist IRS in strengthening security controls over the financial and tax processing systems we reviewed, we made 43 technical recommendations in a separate report with limited distribution to address 26 new weaknesses in access controls and configuration management.\13\ --------------------------------------------------------------------------- \13\ GAO, Information Security: IRS Needs to Further Improve Controls Over Financial and Taxpayer Data, GAO-16-397SU (Washington, DC: Mar. 28, 2016). Implementing these recommendations--in addition to the 49 outstanding recommendations from previous audits--will help IRS improve its controls for identifying and authenticating users, limiting users' access to the minimum necessary to perform their job-related functions, protecting sensitive data when they are stored or in transit, auditing and monitoring system activities, and physically securing its IT --------------------------------------------------------------------------- facilities and resources. Table 1 below provides the number of our prior recommendations to IRS that were not implemented at the beginning of our fiscal year 2015 audit, how many were resolved by the end of the audit, new recommendations, and the total number of outstanding recommendations at the conclusion of the audit. Table 1: Status of GAO's Information Security Recommendations at the PConclusion of Fiscal Year 2015 Audit ---------------------------------------------------------------------------------------------------------------- Prior Recommendations Prior Total recommendations implemented or recommendations New outstanding not implemented considered no not fully recommendations recommendations Control area at the longer relevant implemented at made during at the beginning of at the end of the end of fiscal year conclusion of fiscal year fiscal year fiscal year 2015 audit fiscal year 2015 audit 2015 audit 2015 audit 2015 audit ---------------------------------------------------------------------------------------------------------------- Information security 12 3 9 2 11 program ---------------------------------------------------------------------------------------------------------------- Access controls ---------------------------------------------------------------------------------------------------------------- Identification and 6 1 5 9 14 authentication ---------------------------------------------------------------------------------------------------------------- Authorization 10 4 6 12 18 ---------------------------------------------------------------------------------------------------------------- Cryptography 8 3 5 14 19 ---------------------------------------------------------------------------------------------------------------- Audit and monitoring 6 1 5 3 8 ---------------------------------------------------------------------------------------------------------------- Physical Security 4 2 2 0 2 ---------------------------------------------------------------------------------------------------------------- Other security controls ---------------------------------------------------------------------------------------------------------------- Configuration 21 5 16 5 21 management ---------------------------------------------------------------------------------------------------------------- Segregation of duties 1 0 1 0 1 ---------------------------------------------------------------------------------------------------------------- Contingency planning 2 2 0 0 0 ---------------------------------------------------------------------------------------------------------------- Total: 70 21 49 45 94 ---------------------------------------------------------------------------------------------------------------- Source: GAO analysis of IRS data. | GAO-16-589T In commenting on drafts of our reports presenting the results of our fiscal year 2015 audit, the IRS Commissioner stated that while the agency agreed with our new recommendations, it will review them to ensure that its actions include sustainable fixes that implement appropriate security controls balanced against IT and human capital resource limitations. In addition, IRS can take steps to improve its response to data breaches. Specifically, in December 2013 we reported on the extent to which data breach policies at eight agencies, including IRS, adhered to requirements and guidance set forth by the Office of Management and Budget and the National Institute of Standards and Technology.\14\ While the agencies in our review generally had policies and procedures in place that reflected the major elements of an effective data breach response program, implementation of these policies and procedures was not consistent. With respect to IRS, we determined that its policies and procedures generally reflected key practices, although the agency did not require considering the number of affected individuals as a factor when determining if affected individuals should be notified of a suspected breach. In addition, IRS did not document lessons learned from periodic analyses of its breach response efforts. We recommended that IRS correct these weaknesses, but the agency has yet to fully address them. --------------------------------------------------------------------------- \14\ GAO, Information Security: Agency Responses to Breaches of Personally Identifiable Information Need to Be More Consistent, GAO-14- 34 (Washington, DC: Dec. 9, 2013). --------------------------------------------------------------------------- billions of dollars have been lost to idt refund fraud, and irs faces challenges in combating this evolving threat The importance of protecting taxpayer information is further highlighted by the billions of dollars that have been lost to IDT refund fraud, which continues to be an evolving threat. IRS develops estimates of the extent of IDT refund fraud to help direct its efforts to identify and prevent the crime. While its estimates have inherent uncertainty, IRS estimated that it prevented or recovered $22.5 billion in fraudulent IDT refunds in filing season 2014 (see figure 1).\15\ However, IRS also estimated, where data were available, that it paid $3.1 billion in fraudulent IDT refunds. Because of the difficulties in knowing the amount of undetectable fraud, the actual amount could differ from these estimates. --------------------------------------------------------------------------- \15\ IRS's 2014 estimates cannot be compared to 2013 estimates because of substantial methodology changes to better reflect new IDT refund fraud schemes and to improve the accuracy of its estimates, according to IRS officials. GAO is reviewing IRS's IDT refund fraud estimates as part of ongoing work. [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] IRS has taken steps to address IDT refund fraud; however, it remains a persistent and continually changing threat. IRS recognized the challenge of IDT refund fraud in its fiscal year 2014-2017 strategic plan and increased resources dedicated to combating IDT and other types of refund fraud.\16\ In fiscal year 2015, IRS reported that it staffed more than 4,000 full-time equivalents and spent about $470 million on all refund fraud and IDT activities.\17\ As described above, IRS received an additional $290 million for fiscal year 2016 to improve customer service, IDT identification and prevention, and cybersecurity efforts and the agency plans to use $16.1 million of this funding to help prevent IDT refund fraud, among other things. The administration requested an additional $90 million and an additional 491 full-time equivalents for fiscal year 2017 to help prevent IDT refund fraud and reduce other improper payments.\18\ IRS estimates that this $90 million investment in IDT refund fraud and other improper payment prevention would help it protect $612 million in revenue in fiscal year 2017, as well as protect revenue in future years. --------------------------------------------------------------------------- \16\ IRS, Strategic Plan: FY 2014-2017, (Washington, DC: June 2014). \17\ IRS officials told us they do not track spending for identity theft activities separately from other types of refund fraud. A full- time equivalent reflects the total number of regular straight-time hours (i.e., not including overtime or holiday hours) worked by employees divided by the number of compensable hours applicable to each fiscal year. \18\ Improper payments are payments that should not have been made or that were made in an incorrect amount (including overpayments and underpayments). IRS has taken action to improve customer service related to IDT refund fraud. For example, between the 2011 and 2015 filing seasons, IRS experienced a 430 percent increase in the number of telephone calls to its Identity Theft Toll Free Line--as of March 19, 2016, IRS had received over 1.1 million calls to this line.\19\ Moreover, 77 percent of callers seeking assistance on this telephone line received it compared to 54 percent during the same period last year. Average wait times during the same period have also decreased--taxpayers are waiting an average of 14 minutes to talk to an assistor, a decrease from 27 minutes last year. --------------------------------------------------------------------------- \19\ Total call volume to IRS's identity theft protection toll free telephone line includes automated and assistor calls answered, as well as those that received a busy signal or were abandoned or disconnected. IRS also works with third parties, such as tax preparation industry participants, States, and financial institutions to try to detect and prevent IDT refund fraud. In March 2015, the IRS Commissioner convened a Security Summit with industry and States to improve information sharing and authentication. IRS officials said that 40 State departments of revenue and 20 tax industry participants have officially signed a partnership agreement to enact recommendations developed and agreed to by summit participants. IRS plans to invest a portion of the $16.1 million it received in fiscal year 2016 into identity theft prevention and refund fraud mitigation actions from the Security Summit. These efforts include developing an Information Sharing and Analysis Center where IRS, States, and industry can share information --------------------------------------------------------------------------- to combat IDT refund fraud. Even though IRS has prioritized combating IDT refund fraud, fraudsters adapt their schemes to identify weaknesses in IDT defenses, such as gaining access to taxpayers' tax return transcripts through IRS's online Get Transcript service.\20\ According to IRS officials, with access to tax transcripts, fraudsters can create historically consistent returns that are hard to distinguish from a return filed by a legitimate taxpayer, potentially making it more difficult for IRS to identify and detect IDT refund fraud. --------------------------------------------------------------------------- \20\ As mentioned above, the online Get Transcript service has been unavailable since May 2015. Implementing Past GAO Recommendations Could Help IRS Combat IDT Refund Fraud Without additional action by IRS and Congress, the risk of issuing fraudulent IDT refunds could grow. We previously made recommendations to IRS to help it better combat IDT refund fraud: Authentication. In January 2015, we reported that IRS's authentication tools have limitations and recommended that IRS assess the costs, benefits and risks of its authentication tools.\21\ For example, individuals can obtain an e-file PIN by providing their name, Social Security number, date of birth, address, and filing status for IRS's e-file PIN application. Identity thieves can easily find this information, allowing them to bypass some, if not all, of IRS's automatic checks, according to our analysis and interviews with tax software and return preparer associations and companies. After filing an IDT return using an e-file PIN, the fraudulent return would proceed through IRS's normal return processing. --------------------------------------------------------------------------- \21\ GAO, Identity Theft and Tax Fraud: Enhanced Authentication Could Combat Refund Fraud but IRS Lacks an Estimate of Costs, Benefits and Risks, GAO-15-119, (Washington, DC: Jan. 20, 2015). In November 2015, IRS officials told us that the agency had developed guidance for its Identity Assurance Office to assess costs, benefits, and risk, and that its analysis will inform decision-making on authentication-related issues. IRS also noted that the methods of analysis for the authentication tools will vary depending on the different costs and other factors for authenticating taxpayers in different channels, such as online, phone, or in-person. In February 2016, IRS officials told us that the Identity Assurance Office plans to complete a strategic plan for taxpayer authentication across the agency in September 2016. While IRS is taking steps, it will still be vulnerable until it completes and uses the results of its analysis of --------------------------------------------------------------------------- costs, benefits, and risk to inform decision-making. Form W-2, Wage and Tax Statement (W-2) Pre-refund Matching. In August 2014 we reported that the wage information that employers report on Form W-2 is not available to IRS until after it issues most refunds, and that if IRS had access to W-2 data earlier, it could match such information to taxpayers' returns and identify discrepancies before issuing billions of dollars of fraudulent IDT refunds.\22\ We recommended that IRS assess the costs and benefits of accelerating W-2 deadlines. --------------------------------------------------------------------------- \22\ GAO, Identity Theft: Additional Actions Could Help IRS Combat the Large, Evolving Threat of Refund Fraud, GAO-14-633 (Washington, DC: Aug. 20, 2014). In response to our recommendation, IRS provided us with a report in September 2015 discussing (1) adjustments to IRS systems and work processes needed to use accelerated W-2 information, (2) the potential impacts on internal and external stakeholders, and (3) other changes needed to match W-2 data to tax returns prior to issuing refunds, such as delaying refunds until W-2 data are available. In December 2015, the Consolidated Appropriations Act of 2016 amended the tax code to accelerate W-2 filing deadlines to January 31.\23\ IRS's report will help IRS determine how to best implement pre-refund W-2 matching, given the new January 31st deadline for filing W-2s. Additionally, we suggested that Congress should consider providing the Secretary of the Treasury with the regulatory authority to lower the threshold for electronic filing of W-2s, which could make more W-2 information available to IRS earlier. --------------------------------------------------------------------------- \23\ Pub. L. No. 114-113, div. Q, Sec. 201, 129 Stat. 2242 (Dec. 18, 2015). This change goes into effect for W-2s reporting payments made in 2016 and filed in 2017. External Leads. IRS partners with financial institutions and other external parties to obtain information about emerging IDT refund trends and fraudulent returns that have passed through IRS detection systems. In August 2014, we reported that IRS provides limited feedback to external parties on IDT external leads they submit and offers external parties limited general information on IDT refund fraud trends and recommended that IRS provide actionable feedback to all lead generating third parties.\24\ --------------------------------------------------------------------------- \24\ GAO-14-633. In November 2015, IRS reported that it had developed a database to track leads submitted by financial institutions and the results of those leads. IRS also stated that it had held two sessions with financial institutions to provide feedback on external leads provided to IRS. In December 2015, IRS officials stated that the agency sent a customer satisfaction survey asking financial institutions for feedback on the external leads process and was considering other ways to provide feedback to financial institutions. In April 2016, IRS officials stated they plan to analyze preliminary survey results by mid-April 2016. Additionally, IRS officials reported that the agency shared information with financial institutions in March 2016 and plans to do so on a quarterly basis, with the next information sharing session scheduled in June 2016. the 2016 filing season has generally been smooth, and telephone service has improved IRS and industry partners have characterized that returns processing and refund issuance during this filing season has been generally smooth. Through April 1, 2016, IRS had processed about 95 million returns and issued 76 million refunds totaling about $215 billion. While IRS experienced a major system failure in February that halted returns processing for about a day, the agency reported that it had minimal effect on overall processing of returns and refunds. In addition to filing returns, many taxpayers often call IRS for assistance. IRS's telephone service has generally improved in 2016 over last year. From January 1 through March 19, 2016 IRS received about 35.4 million calls to its automated and live assistor telephone lines, about a 2 percent decrease compared to the same period last year.\25\ Of the 13.4 million calls seeking live assistance, IRS had answered 9.1 million calls--a 75 percent increase over the 5.2 million calls answered during the same period last year. --------------------------------------------------------------------------- \25\ Total call volume to IRS's toll free telephone lines include automated and assistor calls answered, as well as those that received a busy signal or were abandoned or disconnected. IRS anticipated that 65 percent of callers seeking live assistance would receive it this filing season, which runs through April 18, and 47 percent of callers would receive live assistance through the entire 2016 fiscal year.\26\ As of March 19, 2016, 75 percent of callers had received live assistance, an increase from 38 percent during the same period last year. Further, the average wait time to speak to an assistor also decreased from 24 to 9 minutes. As we reported in March 2016, however, IRS's telephone level of service for the full fiscal year has yet to reach the levels it had achieved in earlier years.\27\ --------------------------------------------------------------------------- \26\ This year, most taxpayers have until April 18 to file a tax return with IRS. IRS's projected telephone level of service for the filing season covers the period between January 1, 2016 and April 23, 2016. \27\ GAO, Internal Revenue Service: Preliminary Observations on the Fiscal Year 2017 Budget Request and 2016 Filing Season Performance, GAO-16-459R (Washington, DC: Mar. 8, 2016). IRS attributed this year's service improvement to a number of factors. Of the additional $290 million IRS received in December 2015, it allocated $178.4 million (61.5 percent) for taxpayer services to make measurable improvements in its telephone level of service. With the funds, IRS hired 1,000 assistors who began answering taxpayer calls in March, in addition to the approximately 2,000 seasonal assistors it had hired in fall 2015.\28\ To help answer taxpayer calls before March, IRS officials told us that they detailed 275 staff from one of its compliance functions to answer telephone calls.\29\ IRS officials said they believe this step was necessary because the additional funding came too late in the year to hire and train assistors to fully cover the filing season. IRS also plans to use about 600 full-time equivalents of overtime for assistors to answer telephone calls and respond to correspondence in fiscal year 2016, compared to fewer than 60 full-time equivalents of overtime used in fiscal year 2015. --------------------------------------------------------------------------- \28\ In contrast, IRS reduced the number of assistors answering telephone calls between fiscal years 2010 and 2015, which contributed to the lowest level of telephone service in fiscal year 2015 compared to recent years. \29\ IRS has not yet determined the amount of foregone revenue from taking this action. In December 2014, we recommended that IRS systematically and periodically compare its telephone service to the best in business to identify gaps between actual and desired performance.\30\ IRS disagreed with this recommendation, noting that it is difficult to identify comparable organizations. We do not agree with IRS's position; many organizations run call centers that would provide ample opportunities to benchmark IRS's performance. --------------------------------------------------------------------------- \30\ GAO, Tax Filing Season: 2014 Performance Highlights the Need to Better Manage Taxpayer Service and Future Risks, GAO-15-163 (Washington, DC: Dec. 16, 2014). In fall 2015, Department of the Treasury (Treasury) and IRS officials said they had no plans to develop a comprehensive customer service strategy or specific goals for telephone service tied to the best in the business and customer expectations. Without such a strategy, Treasury and IRS can neither measure nor effectively communicate to Congress the types and levels of customer service taxpayers should expect and the resources needed to reach those levels. Therefore, in December 2015 we suggested that Congress consider requiring that Treasury work with IRS to develop a comprehensive customer service strategy.\31\ In April 2016, IRS officials told us that the agency established a team to consider our prior work in developing this strategy or benchmarking its telephone service. --------------------------------------------------------------------------- \31\ GAO, 2015 Tax Filing Season: Deteriorating Taxpayer Service Underscores Need for a Comprehensive Strategy and Process Efficiencies, GAO-16-151 (Washington, DC: Dec. 16, 2015). In summary, while IRS has made progress in implementing information security controls, it needs to continue to address weaknesses in access controls and configuration management and consistently implement all elements of its information security program. The risks IRS and the public are exposed to have been illustrated by recent incidents involving public-facing applications, highlighting the importance of securing systems that contain sensitive taxpayer and financial data. In addition, fully implementing key elements of a breach response program will help ensure that when breaches of sensitive data do occur, their --------------------------------------------------------------------------- impact on affected individuals will be minimized. Weaknesses in information security can also increase the risk posed by identity theft refund fraud. IRS needs to establish an approach for addressing identity theft refund fraud that is informed by assessing the cost, benefits, and risks of IRS's various authentication options and improving the reliability of fraud estimates. While this year's tax filing season has generally gone smoothly and IRS has improved customer service, it still needs to develop a comprehensive approach to customer service that will meet the needs of taxpayers while ensuring that their sensitive information is adequately protected. Chairman Hatch, Ranking Member Wyden, and members of the committee, this concludes my statement. I look forward to answering any questions that you may have at this time. ______ Prepared Statement of Hon. J. Russell George, Treasury Inspector General for Tax Administration, Department of the Treasury Chairman Hatch, Ranking Member Wyden, and members of the committee, thank you for the opportunity to testify on the Internal Revenue Service's (IRS) controls to protect sensitive taxpayer information. The Treasury Inspector General for Tax Administration (TIGTA) is statutorily mandated to provide independent audit and investigative services necessary to improve the economy, efficiency, and effectiveness of IRS operations, including the IRS Chief Counsel. TIGTA's oversight activities are designed to identify high-risk systemic inefficiencies in IRS operations and to investigate exploited weaknesses in tax administration. TIGTA's role is critical in that we provide the American taxpayer with assurance that the approximately 86,000 IRS employees \1\ who collected over $3.3 trillion in tax revenue, processed over 244 million tax returns, and issued more than $400 billion in tax refunds during Fiscal Year (FY) \2\ 2015,\3\ have done so in an effective and efficient manner while minimizing the risks of waste, fraud, and abuse. --------------------------------------------------------------------------- \1\ Total IRS staffing as of October 3, 2015. Included in the total are approximately 15,400 seasonal and part-time employees. \2\ The Federal Government's fiscal year begins on October 1 and ends on September 30. \3\ IRS, Management's Discussion and Analysis, Fiscal Year 2015. TIGTA's Office of Audit (OA) reviews all aspects of the Federal tax administration system and provides recommendations to: improve IRS systems and operations; ensure the fair and equitable treatment of taxpayers; and detect and prevent waste, fraud, and abuse in tax administration. The Office of Audit has examined specific high-risk issues such as identity theft, refund fraud, improper payments, information technology, security vulnerabilities, complex modernized computer systems, tax collections and revenue, and waste and abuse in --------------------------------------------------------------------------- IRS operations. TIGTA's Office of Investigations (OI) protects the integrity of the IRS by investigating allegations of IRS employee misconduct, external threats to IRSemployees and facilities, and other attempts to impede or otherwise interfere with the IRS's ability to collect taxes. Specifically, the Office of Investigations investigates misconduct by IRS employees which manifests itself in many ways, including unauthorized access to taxpayer information and the use of the information for the purposes of identity theft; extortion; theft of government property; taxpayer abuses; false statements; and other financial fraud. The Office of Investigations is statutorily charged to investigate threats made against the IRS's employees, facilities and data. We are committed to ensuring the safety of IRS employees and the taxpayers who conduct business at more than 670 IRS facilities nationwide. TIGTA's Office of Inspections and Evaluations performs responsive, timely, and cost-effective inspections and evaluations of challenging areas within the IRS, providing TIGTA with additional flexibility and capability to produce value-added products and services to improve tax administration. Inspections are intended to monitor compliance with applicable laws, regulations, and/or policies; assess the effectiveness and efficiency of programs and operations; and inquire into allegations of waste, fraud, abuse, and mismanagement. Evaluations, on the other hand, are intended to provide in-depth reviews of specific management issues, policies, or programs. Cybersecurity threats against the Federal Government continue to grow. According to the Department of Homeland Security's U.S. Computer Emergency Readiness Team, Federal agencies reported 77,183 cyberattacks in FY 2015, an increase of more than 10 percent from FY 2014.\4\ The IRS reported that more than 1,000 security incidents occurred to its systems during the period August 1, 2014, to July 31, 2015. --------------------------------------------------------------------------- \4\ Office of Management and Budget, Annual Report to Congress: Federal Information Security Management Act (Mar. 2016). The IRS, the largest component of the Department of the Treasury, has primary responsibility for administering the Federal tax system. The IRS's role is unique within the Federal Government in that it administers the Nation's tax laws and collects the revenue that funds the Government. It also works to protect Federal revenue by detecting and preventing the growing risk of fraudulent tax refunds and other improper payments. The IRS relies extensively on its computer systems to support both its financial and mission-related operations. These computer systems collect and process extensive amounts of taxpayer data, including Personally Identifiable Information. For Calendar Year 2015, the IRS processed more than 150 million individual tax returns and more than 55 million business tax returns that contain taxpayers' --------------------------------------------------------------------------- sensitive financial data. TIGTA has identified a number of areas in which the IRS could better protect taxpayer data and improve its overall security position. My comments today will focus on our work related to the IRS's ability to prevent and detect breaches to its computer systems and the IRS's processes to authenticate users accessing its online services. data security remains a top concern of tigta Since FY 2011, TIGTA has designated the security of taxpayer data as the top concern facing the IRS based on the increased number and sophistication of threats to taxpayer information and the need for the IRS to better protect taxpayer data and improve its enterprise security program. To provide oversight of the IRS's Information Security program, TIGTA conducts ongoing audit coverage of various security programs, systems, and solutions. As of March 2016, 14 TIGTA audits still have 23 recommendations that have yet to be implemented. These recommendations address weaknesses related to connections with external partners, continuous efforts to monitor information security, implementation of the Homeland Security Presidential Directive 12 initiative,\5\ and information technology asset management. --------------------------------------------------------------------------- \5\ Homeland Security Presidential Directive 12, Policy for a Common Identification Standard for Federal Employees and Contractors, requires agencies to follow specific technical standards and business processes for the issuance and routine use of Federal identity credentials to ensure that only authorized personnel have access to Government systems and applications. TIGTA continues to identify significant security weaknesses that could affect the confidentiality, integrity, and availability of financial and sensitive taxpayer data. For example, during our most recent Federal Information Security Modernization Act \6\ evaluation of the IRS's information security programs and practices,\7\ we found three security program areas, i.e., Continuous Monitoring Management, Identity and Access Management, and Configuration Management, that did not meet the level of performance specified by the Department of Homeland Security.\8\ --------------------------------------------------------------------------- \6\ Pub. L. No. 113-283, 128 Stat. 3073 (2014). This bill amended chapter 35 of title 44 of the United States Code to provide for reform to Federal information security. \7\ TIGTA, Ref. No. 2015-20-092, Treasury Inspector General for Tax Administration--Federal Information Security Modernization Act Report for Fiscal Year 2015 (Sept. 2015). \8\ To assist the Inspectors General in evaluating Federal agencies' compliance with the Federal Information Security Modernization Act, the Department of Homeland Security issued the Fiscal Year 2015 Inspector General Federal Information Security Modernization Act Reporting Metrics, which specified 10 information security program areas and listed specific attributes within each area for evaluation. One of the Federal Government's latest security initiatives is the implementation of continuous monitoring of information security, which is defined as maintaining ongoing, real-time awareness of information security, vulnerabilities, and threats to support organizational risk decisions. While the IRS has made progress and is in compliance with guidelines from the Department of Homeland Security and the Department of the Treasury, we found that the IRS is still in the process of implementing its Information Security Continuous Monitoring program required by the Office of Management and Budget to automate asset management and maintain the secure configuration of assets in real --------------------------------------------------------------------------- time. Specifically, we reported that the IRS Continuous Monitoring Management program is at a maturity level of one on a scale of one to five, where one is the least mature and five is the most mature. In July 2014, the Department of the Treasury decided to adopt a uniform approach across the Department and to use the toolset selected by the Department of Homeland Security to meet the program requirements. The Department of Homeland Security is currently in the process of procuring a standard set of cybersecurity tools and services for use by Federal agencies. These tools will include sensors that perform automated searches for known cyber flaws and send the results to dashboards that inform system managers in real time of cyber risks that need remediation. The Identity and Access Management program ensures that only those with a business need are able to obtain access to IRS systems and data. However, we found that this program did not meet a majority of the attributes specified by the Department of Homeland Security, largely due to the IRS's failure to achieve Government-wide goals set for implementing logical (system) and physical access to facilities in compliance with Homeland Security Presidential Directive 12 requirements. Homeland Security Presidential Directive 12 requires Federal agencies to issue personal identity verification cards to employees and contractors for accessing agency systems and facilities. Configuration Management ensures that settings on IRS systems are maintained in an organized, secure, and approved manner that includes the timely installation of patches to resolve known security vulnerabilities. We found that the IRS has not fully implemented enterprise-wide automated processes to identify computer assets, evaluate compliance with configuration policies, and deploy security patches. Specifically, these processes have not been fully implemented enterprise-wide and still rely on many tedious manual procedures. Eventually, the IRS's Configuration Management program will benefit from the implementation of the Information Security Continuous Monitoring program, which is intended to automate configuration management in real time for the universe of IRS assets. Patch \9\ management is an important element in mitigating the security risks associated with known vulnerabilities to computer systems. This is critical to prevent intrusions by unauthorized individuals or entities. TIGTA evaluated the effectiveness of the IRS security patch management process, which has been an ongoing challenge for the IRS.\10\ In 2012, we found that the IRS had made progress in automating installation and monitoring in a large segment of its computers, but it had not yet implemented key patch management policies and procedures needed to ensure that all IRS systems are patched timely and operating securely. Any significant delays in patching software with critical vulnerabilities provides ample opportunity for persistent attackers to gain control of vulnerable computers and get access to the sensitive data the computer systems may contain, including taxpayer data. The Government Accountability Office reported in March 2015 that the IRS was still not effectively applying security patches in a timely manner.\11\ We also reported in September 2015 that the IRS is still working to expand a standard automated process to deploy operating system patches enterprise-wide.\12\ --------------------------------------------------------------------------- \9\ A patch fixes a design flaw in a computer program. Patches must be installed or applied to the appropriate computer for the flaw to be corrected. \10\ TIGTA, Ref. No. 2012-20-112, An Enterprise Approach Is Needed to Address the Security Risk of Unpatched Computers (Sept. 2012). \11\ GAO-15-337, IRS Needs to Continue Improving Controls over Financial and Taxpayer Data (Mar. 2016). \12\ TIGTA, Ref. No. 2015-20-092, Treasury Inspector General for Tax Administration--Federal Information Security Modernization Act Report for Fiscal Year 2015 (Sept. 2015). We have also identified other areas that would improve the IRS's ability to defend its systems against cyberattacks. Monitoring IRS networks 24 hours a day, year-round, for cyberattacks and responding to various computer security incidents is the responsibility of the IRS's Computer Security Incident Response Center (CSIRC). TIGTA evaluated the effectiveness of the CSIRC at preventing, detecting, reporting, and responding to computer security incidents targeting IRS computers and data, and identified areas for improvement.\13\ At the time of our review, the CSIRC's host-based intrusion detection system was not monitoring a significant percentage of IRS servers, which leaves that portion of the IRS network and data at risk. In addition, the CSIRC was not reporting all computer security incidents to the Department of the Treasury, as required. Finally, incident response policies, plans, and procedures were nonexistent, inaccurate, or incomplete. We are currently evaluating the effectiveness of the CSIRC at preventing, detecting, reporting, and responding to computer security incidents targeting IRS computers and data, and plan to issue our report later this year.\14\ --------------------------------------------------------------------------- \13\ TIGTA, Ref. No. 2012-20-019, The Computer Security Incident Response Center Is Effectively Performing Most of Its Responsibilities, but Further Improvements Are Needed (Mar. 2012). \14\ TIGTA, Audit No. 201620003, Effectiveness of the Computer Security Incident Response Center, report planned for September 2016. TIGTA also found that many interconnections \15\ in use at the IRS do not have proper authorization or are not covered by security agreements. Although the IRS has established an office to provide oversight and guidance for the development of security agreements, that office is not responsible for managing or monitoring agreements for all external interconnections in use in the IRS environment. TIGTA believes the lack of a centralized inventory and of an enterprise-level approach to ensure that all external interconnections are monitored have contributed to interconnections that are active but lack proper approvals and assurances necessary to meet current security requirements.\16\ --------------------------------------------------------------------------- \15\ The National Institute of Standards and Technology defines a system interconnection as the direct connection of two or more information technology systems for the purpose of sharing data and other information resources. \16\ TIGTA, Ref. No. 2015-20-087, Improvements Are Needed to Ensure That External Interconnections Are Identified, Authorized, and Secured (Sept. 2015). In addition, TIGTA reported \17\ that the IRS was unable to upgrade all of its workstations with the most current Windows' operating system.\18\ Because of their importance, operating systems must be updated on a regular basis to patch security vulnerabilities and, if necessary, upgraded completely in order to fix crucial weaknesses or to address new threats to their functionality. TIGTA found that the IRS did not follow established policies with respect to project management and provided inadequate oversight and monitoring of the Windows upgrade early in its effort. As a result, the IRS had not accounted for the location or migration status of approximately 1,300 workstations and had upgraded only about one-half of its applicable servers at the conclusion of our audit. --------------------------------------------------------------------------- \17\ TIGTA, Ref. No. 2015-20-073, Inadequate Early Oversight Led to Windows Upgrade Project Delays (Sept. 2015). \18\ The software that communicates with computer hardware to allocate memory, process tasks, access disks and peripherals, and serves as the user interface. irs authentication processes need improvement The increasing number of data breaches in the private and public sectors means more personal information than ever before is available to unscrupulous individuals. Much of these data are detailed enough to enable circumvention of most authentication processes. Therefore, it is critical that the methods the IRS uses to authenticate individuals' identities provide a high level of confidence that tax information and services are provided only to individuals who are entitled to receive them. The risk of unauthorized access to tax accounts will continue to grow as the IRS focuses its efforts on delivering online tools to taxpayers. The IRS plans to increase the availability and quality of self-service interactions, allowing it to free up in- person resources for taxpayers who truly need them. The IRS's goal is to eventually provide taxpayers with dynamic online account access that includes viewing their recent payments, making minor changes and adjustments to their accounts, and corresponding digitally with the IRS. As tax administration evolves, the challenge of providing adequate data security will continue. The IRS recognized that there was a lack of consistency in the techniques it had employed for authentication; therefore, in June 2014, it established the Authentication Group. In a report issued in November 2015, TIGTA found that although the IRS recognizes the growing challenge it faces in establishing effective authentication processes and procedures, the IRS has not established a Service-wide approach to managing its authentication needs.\19\ As a result, the level of authentication the IRS uses for its various services is not consistent. TIGTA found that while the Authentication Group is evaluating potential improvements to existing authentication methods for the purpose of preventing identity theft, it is not developing overall strategies to enhance authentication methods across IRS functions and programs. TIGTA recommended that the IRS develop a Service-wide strategy that establishes consistent oversight of all authentication needs across IRS functions and programs. In addition, the IRS should ensure that responsibility for implementing the strategy is optimally aligned to provide centralized oversight and facilitate decision making for the development and integration of all forms of authentication, including frameworks, policies, and processes across the IRS. --------------------------------------------------------------------------- \19\ TIGTA, Ref. No. 2016-40-007, Improved Tax Return Filing and Tax Account Access Authentication Processes and Procedures Are Needed (Nov. 2015). Office of Management and Budget (OMB) Memorandum M-04-04, E- Authentication for Federal Agencies,\20\ establishes criteria for determining the risk-based level of authentication assurance required for specific electronic applications and transactions. E-Authentication is the process of establishing confidence in user identities electronically presented to an information system. The OMB guidance requires agencies to review new and existing electronic transactions to ensure that authentication processes provide the appropriate level of assurance. This guidance is intended to help agencies identify and analyze the risks associated with each step of the authentication process. As the outcome of an authentication error becomes more serious, the required level of assurance increases. --------------------------------------------------------------------------- \20\ OMB, M-04-04, E-Authentication for Federal Agencies (Dec. 2003). In addition, the U.S. Department of Commerce National Institute of Standards and Technology (NIST) Special Publication 800-63-2, Electronic Authentication Guideline \21\ provides the technical requirements for the four levels of assurance defined in OMB guidance as shown in the following table. --------------------------------------------------------------------------- \21\ NIST, NIST SP-800-63-2, Electronic Authentication Guideline (Aug. 2013). Table 1--Levels of Electronic Assurance ------------------------------------------------------------------------ Level of Assurance Requirements Level of Confidence ------------------------------------------------------------------------ Level 1 No identity proofing is Provides little or no required. confidence. ------------------------------------------------------------------------ Level 2 Requires basic identity Provides some proofing data, a valid confidence in the current Government validity of an identification number, and individual's a valid financial or identity. utility account number. Access occurs only after identity proofing data and either the Government identification number or financial/utility account number are verified by the agency. ------------------------------------------------------------------------ Level 3 Requires basic identity Provides high proofing data, a valid confidence in the current Government validity of an identification number, and individual's a valid financial or identity. utility account number as well as the use of a second authentication factor such as a one-time supplemental code issued via text message or e-mail to the telephone number or e-mail address associated with the individual. ------------------------------------------------------------------------ Level 4 Requires in-person identity Provides very high proofing and verification. confidence in the validity of an individual's identity. ------------------------------------------------------------------------ OMB standards require Federal agencies to conduct an assessment of the risk of authentication error for each online service or application they provide. An authentication error occurs when an agency confirms the identity provided by an individual when in fact the individual is not who he or she claims to be. In addition, NIST Special Publication 800-63 establishes specific requirements that agencies' authentication processes must meet to provide a specific level of authentication assurance. However, we found that, although the IRS has established processes and procedures to authenticate individuals requesting online access to IRS services, these processes and procedures do not comply with Government standards for assessing authentication risk and establishing adequate authentication processes. Our analysis of the e-Authentication processes used to authenticate users of the IRS's online Get Transcript and Identity Protection Personal Identification Number (IP PIN) \22\ applications found that these authentication methods provide only single-factor authentication despite NIST standards requiring multifactor authentication for such high-risk applications. --------------------------------------------------------------------------- \22\ To provide relief to tax-related identity theft victims, the IRS issues IP PINs to taxpayers who are confirmed by the IRS as victims of identity theft, taxpayers who are at a high risk of becoming a victim such as taxpayers who call reporting a lost or stolen wallet or purse, as well as taxpayers who live in three locations that the IRS has identified as having a high rate of identity theft (Florida, Georgia and the District of Columbia). The IRS assessed the risk of the Get Transcript application as required. However, the IRS determined that the authentication risk associated with Get Transcript was low to both the IRS and taxpayers. The IRS defines a low risk rating as one in which the likelihood of an imposter obtaining and using the information available on an application is low. In addition, a low risk rating indicates that controls are in place to prevent, or at least significantly impede, an imposter from accessing the information. As a result, the IRS implemented single-factor authentication to access the Get Transcript --------------------------------------------------------------------------- application. The IRS's current e-Authentication framework also does not comply with NIST standards for single-factor authentication. Specifically, the e-Authentication framework does not require individuals to provide Government identification or a financial or utility account number, as required by NIST standards. According to IRS management, the IRS decided to not request financial or utility account information because the information cannot currently be verified. IRS management informed us that the IRS obtained and verified the taxpayer filing status to mitigate the risk of its being unable to use financial information to authenticate individuals. Although the IRS required taxpayers to provide a filing status, this requirement does not bring it into compliance with NIST standards, and the IRS remains noncompliant with single-factor authentication requirements. The IRS received guidance from the NIST at the time the e-Authentication framework was being developed indicating that a Taxpayer Identification Number (TIN) was an acceptable form of identification. However, in August 2015, the NIST informed us that a TIN is not currently an acceptable Government identification number for the purpose of authentication. We brought this discrepancy to the IRS's attention and IRS management agreed that a TIN is no longer an acceptable form of identification. Management also indicated that the IRS would take steps to conform to NIST standards for verifying an individual's identity. In August 2015, the IRS indicated that unauthorized users had been successful \23\ in obtaining tax information \24\ on the Get Transcript application for an estimated 334,000 taxpayer accounts. According to the IRS, one or more individuals succeeded in clearing the IRS's authentication process that required knowledge of information about the taxpayer, including Social Security information, date of birth, tax filing status, and street address. To prevent further unauthorized accesses, the IRS removed the application from its website. --------------------------------------------------------------------------- \23\ A successful access is one in which the unauthorized users successfully answered identity proofing and knowledge-based authentication questions required to gain access to taxpayer account information. \24\ The tax information that can be accessed on the Get Transcript application can include the current and 3 prior years of tax returns, 9 years of tax account information, and wage and income information. TIGTA's current review \25\ of the Get Transcript breach identified additional suspicious accesses to taxpayers' accounts that the IRS had not identified. Based on TIGTA's analysis of Get Transcript access logs, the IRS reported on February 26, 2016 that potentially unauthorized users had been successful in obtaining access to an additional 390,000 taxpayer accounts. The IRS also reported that an additional 295,000 taxpayer transcripts had been targeted but the access attempts had not been successful. TIGTA was able to identify the additional unauthorized accesses due to our use of advanced analytics and cross-discipline approaches. The IRS had not previously identified these accesses because of limitations in the scope of its analysis, including its method of identifying suspicious e-mail accounts and the time frame it analyzed. --------------------------------------------------------------------------- \25\ TIGTA, Audit No. 201540027, Evaluation of Assistance Provided to Victims of the Get Transcript Data Breach, report planned for May 2016. In response to TIGTA's identification of the additional accesses, the IRS started on February 29, 2016 mailing notification letters to the affected taxpayers and placing identity theft markers on their tax accounts. It should be noted that the actual number of individuals whose personal information was available to the potentially unauthorized individuals accessing these tax accounts is significantly greater than the number of taxpayers whose accounts were accessed because the tax accounts accessed include certain information on other --------------------------------------------------------------------------- individuals listed on a tax return (e.g., spouses and dependents). We are currently evaluating the appropriateness of the IRS's response to the Get Transcript incident and the IRS's proposed solutions to address the authentication weakness that allowed the incident to occur.\26\ To date, we have learned that the IRS is working with the U.S. Digital Service \27\ on its new e-authentication and authorization policies and procedures. In addition, TIGTA is participating in a multi-agency investigation into this matter, and we have provided the IRS with some of our investigative observations to date in order to help them secure the e-authentication environment in the future. --------------------------------------------------------------------------- \26\ TIGTA, Audit No. 201520006, Review of Progress to Improve Electronic Authentication, report planned for July 2016. \27\ The U.S. Digital Service is part of the Executive Office of the President. Its goal is to improve and simplify the digital services that people and businesses have with the Government. We also reported in November 2015 that the IRS did not complete the required authentication risk assessment for its IP PIN application. In addition, on January 8, 2016, we recommended that the IRS not reactivate its online IP PIN application for the 2016 Filing Season, due to concerns that the IP PIN authentication process requires knowledge of the same taxpayer information that was used by unscrupulous individuals to breach the Get Transcript application. However, the IRS reactivated the application on January 19, 2016. We issued a second recommendation to the IRS on February 24, 2016, --------------------------------------------------------------------------- advising it to remove the IP PIN application from its public website. On March 7, 2016, the IRS reported that it was temporarily suspending use of the IP PIN application as part of an ongoing security review. The IRS reported that it is conducting a further review of the application that allows taxpayers to retrieve their IP PINs online and is looking at further strengthening its security features. The IRS does not anticipate having the technology in place for either the Get Transcript or IP PIN application to provide multifactor authentication capability before the summer of 2016. On February 9, 2016, the IRS announced that it had identified and halted an automated botnet \28\ attack on its Electronic Filing (e- file) PIN application on IRS.gov. Using personal data stolen elsewhere outside the IRS, identity thieves used malware in an attempt to generate e-file PINs for stolen Social Security Numbers (SSN). An e- file PIN is used in some instances to electronically file a tax return. While no personal taxpayer data was compromised or disclosed by IRS systems in the attack, the IRS did identify unauthorized attempts involving approximately 464,000 unique SSNs, of which 101,000 were used to successfully access an e-file PIN. --------------------------------------------------------------------------- \28\ A botnet is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or malware) to other computers on the Internet, usually for the purpose of a cyberattack or denial of service attack. No single authentication method or process will prevent unscrupulous individuals from filing identity theft tax returns or attempting to inappropriately access IRS services. However, strong authentication processes can reduce the risk of such activity by making it harder and more costly for such individuals to gain access to resources and information. Therefore, it is important that the IRS ensure that its authentication processes are in compliance with NIST standards in order to provide the highest degree of assurance required and to ensure that authentication processes used to verify individuals' identities are consistent among all methods used to access tax account --------------------------------------------------------------------------- information. In response to concerns expressed by the IRS Commissioner during 2015, the IRS received an additional $290 million in appropriated funds for FY 2016. The IRS plans to use $111.5 million of the additional funding to enhance cybersecurity to safeguard taxpayer data. Specifically, the IRS plans to increase staffing, replace outdated equipment, and make network improvements for monitoring and analyzing data traffic. In addition, the IRS plans to implement actions from the Security Summit \29\ and to relaunch the Get Transcript application. We are planning a review to assess IRS's use of these funds to improve cybersecurity. --------------------------------------------------------------------------- \29\ On March 19, 2015, the IRS Commissioner convened a meeting with IRS officials, the chief executive officers of the leading tax preparation firms, software developers, payroll and tax financial product processors, and representatives from 22 States to discuss common challenges and ways to leverage their collective resources and efforts for identity theft detection and prevention. We at TIGTA take seriously our mandate to provide independent oversight of the IRS in its administration of our Nation's tax system and will continue to expand our oversight related to cybersecurity. Based on the increased number and sophistication of threats to taxpayer information and the need for the IRS to better protect taxpayer data and improve its enterprise security program, we plan to provide continuing audit and investigative coverage of the IRS's efforts to --------------------------------------------------------------------------- protect the confidentiality of taxpayer information. Chairman Hatch, Ranking Member Wyden, and members of the committee, thank you for the opportunity to share my views. ______ Prepared Statement of Hon. Orrin G. Hatch, a U.S. Senator From Utah WASHINGTON--Senate Finance Committee Chairman Orrin Hatch (R-Utah) today delivered the following opening statement at a hearing examining how the Internal Revenue Service (IRS) is safeguarding private taxpayer information this filing season and to determine what improvements may be necessary for the agency to fully protect taxpayers from cybercriminals: Good morning. It's a pleasure to welcome everyone to today's hearing, which we've titled ``Cybersecurity and Protecting Taxpayer Information.'' These are important issues that the Finance Committee has been working on for some time. In June of last year, for example, we held a hearing on the theft of Internal Revenue Service data affecting taxpayer information. Much has happened since that time. At the urging of the Finance Committee, the IRS, State revenue commissioners, and leaders in the tax return preparation industry came together last year to convene a Security Summit, which resulted in new information-sharing agreements to help identify suspicious activity in the tax filing and refund process. We look forward to hearing more about that effort today. But in the face of this progress, we have also seen unprecedented growth in the scope and scale of cyber-attacks aimed at stealing personal information and billions of dollars from taxpayers. Last year alone, cyber-criminals obtained access to sensitive personal information from several large health insurers, exposing tens of millions of Americans to potential identity theft. Foreign governments gained access to poorly protected Federal Government databases, including a treasure trove of information at the Office of Personnel Management. Today we will focus on three separate aspects of this problem. First, we will consider the ways the IRS authenticates taxpayer identities to prevent data thieves from using authentication information to gain access to even more information about taxpayers or to file false returns and obtain refunds under stolen identities. Second, we will examine how the IRS uses its resources to improve cybersecurity. This will include some discussion about the IRS Future State plan, which the agency has developed in order to adapt to the realities of the 21st century. Third and finally, we will consider the ongoing joint efforts of the IRS, State revenue collectors, and private tax preparers to see what can be accomplished to better secure taxpayer information and protect taxpayers from fraud. Taking a look at our witness table, it is clear that this is not a typical lineup of witnesses. Challenges to cyber-security require not only smart and persistent leadership up at the top, but also technological expertise and up-to-date skills down on the ground. So today, we not only have with us the heads of the IRS, the Government Accountability Office, and the Treasury Inspector General for Tax Administration, we've invited subject matter experts on the relevant issues from each of those agencies to testify as well. That's a total of six witnesses. And, I suspect each of them will bring unique and important insights to this discussion. In closing, I'll just say that, while we are clearly making real progress in this area, the challenges are continuing to grow and criminals behind this kind of data theft are getting more sophisticated and aggressive, seemingly by the day. And, American taxpayers--and their livelihoods--are their targets. In other words, we have a lot of work to do. My hope is that we'll continue to be able to work on these issues on a bipartisan basis in order to do right by the American people. ______ Prepared Statement of Hon. John Koskinen, Commissioner, Internal Revenue Service introduction Chairman Hatch, Ranking Member Wyden, and members of the committee, thank you for the opportunity to discuss the IRS's ongoing efforts to safeguard our systems and protect taxpayer information from cybersecurity threats, as well as our work to combat stolen identity refund fraud. Securing our systems and taxpayer data continues to be a top priority for the IRS. Even with our constrained resources as a result of repeatedly decreased funding over the past few years, we continue to devote significant time and attention to this challenge, which is twofold. First, the IRS works continuously to protect our main computer systems from cyber incidents, intrusions and attacks, but our primary focus is to prevent criminals from accessing taxpayer information stored in our databases. These core tax processing systems remain secure, through a combination of cyber defenses, which currently withstand more than 1 million attempts to maliciously access our systems each day. Second, the IRS is waging an ongoing battle to protect taxpayers and their information as we confront the growing problem of stolen identity refund fraud. Our multipronged approach to this problem is discussed in more detail below. As we confront these challenges, the IRS has also been working to expand and improve our ability to interact with taxpayers online. While we already engage taxpayers across numerous communications channels, we realize the need to meet taxpayers' increasing demand for digital services. We are aware, however, that in building toward this enhanced online experience, we must continuously upgrade and improve our authentication protocols. The reality is criminals are becoming increasingly sophisticated and are gathering vast amounts of personal information as the result of data breaches at sources outside the IRS. We must balance the strongest possible authentication processes with the ability of taxpayers to legitimately access their data and use IRS services online. It is important to note that cybercrime (theft by unauthorized access) and privacy breaches are increasing across the country in all areas ofgovernment and industry. Cyber criminals and their methods continue to grow in sophistication, frequency, brazenness, volume and impact. IRS will continue to be challenged in our ability to maintain currency with latest technologies, processes and counter-measures. making progress against identity theft Discovering that your identity has been stolen by having your tax return rejected because someone else has already filed a return using your name and Social Security Number (SSN) can be a personal and traumatic experience. We are constantly working to improve our processes and methods to protect taxpayers from this situation. The problem of personal data being used to file fraudulent tax returns and illegally obtain refunds exploded from 2010 to 2012, and for a time overwhelmed private industry, law enforcement, and government agencies such as the IRS. Since then, we have been making steady progress within our reduced resources, both in terms of protecting against fraudulent refund claims and criminally prosecuting those who engage in this crime. Thanks to the work of our Criminal Investigation Division, about 2,000 individuals have been convicted on Federal charges related to refund fraud involving identity theft over the past few years. We currently have about 1,700 open investigations being worked by more than 400 IRS criminal investigators. Meanwhile, we continue to improve our efforts at stopping fraudulent refunds from going out the door. For example, we have improved the filters that help us spot suspicious returns before they can be processed. Using those filters, we stopped 1.4 million returns last year that were confirmed to have been filed by identity thieves. By stopping those returns, we kept criminals from collecting about $8.7 billion in fraudulent refunds. Importantly, the IRS also continues to help taxpayers who have been victims of identity theft. Last year, the IRS worked with victims to close more than 700,000 such cases. But while we have stopped many crimes, we find that the type of criminal we are dealing with constantly evolves. Previously we were dealing with individuals stealing personal information and filing a few dozen or maybe a few hundred false tax returns, and while we still see this, the threat has grown to include organized crime syndicates here and in other countries. Security Summit Group To improve our efforts against this complex and evolving threat, the IRS held a sit-down meeting in March 2015 with leaders of the electronic tax industry, software industry and State tax officials. We agreed to build on our past cooperative efforts and find new ways to leverage our public-private partnership to help battle stolen identity refund fraud. Motivating us was the understanding that no single organization can fight this type of fraud alone. This meeting led to the development of the Security Summit group, an unprecedented partnership that has focused our joint efforts on making sure the tax filing experience would be safer and more secure for taxpayers in 2016 and beyond. This is an important step for taxpayers and for tax administration, because the critical work being done by this group is giving everyone involved a better defense against stolen identity refund fraud. Over the past year, the Security Summit group has made progress on a number of initiatives including: Summit group members identified and agreed to share 20 data components from Federal and State tax returns to improve fraud detection and prevention this filing season. For example, group members are sharing computer device identification data tied to the return's origin, as well as the improper or repetitive use of the numbers that identify the Internet ``address'' from where the return originates. Tax software providers agreed to enhance identity requirements and strengthen validation procedures for new and returning customers to protect their accounts from being taken over by criminals. This change is one of the most visible to taxpayers during the 2016 filing season, because it includes new verification procedures they need to follow to log in to their accounts. These actions will serve as the baseline for ongoing discussions and additional enhancements for the 2017 filing season. The Summit group created a new memorandum of understanding (MOU) regarding roles, responsibilities and information sharing pathways currently in circulation with States and industry. So far, 40 State departments of revenue and 21 tax industry members have signed the MOU, along with the IRS and endorsing organizations. Tax industry participants have aligned with the IRS and the States under the National Institute of Standards and Technology (NIST) cybersecurity framework to promote the protection of information technology infrastructure. The IRS and States currently operate consistently with this framework, as do many in the tax industry. Next steps in this area include follow-up sessions to develop strategy for how the NIST cybersecurity framework will be employed by all organizations within the tax industry. Summit group members agreed on the need to create a tax administration Information Sharing and Analysis Center (ISAC) to centralize, standardize, and enhance data compilation and analysis to facilitate sharing actionable data and information. Recognizing the critical role that the Nation's tax professionals play within the tax industry in both the Federal and State arenas, the Summit group created a team that will examine issues related to return preparers, such as how the preparer community can help prevent identity theft and refund fraud. Our collaborative efforts are already showing concrete results this filing season. For example, Security Summit partners have helped the IRS improve its ability to spot potentially false returns before they are processed and thus before a possibly fraudulent refund is issued. Under our industry leads program, Security Summit partners and other external stakeholders such as banks provide information that allows us to improve our fraud filters, which in turn leads to more suspicious returns being identified for further review. In Calendar Year (CY) 2016 through mid-March, leads from industry partners directly resulted in the suspension of 27,000 returns on which a total of $119 million in refunds was claimed, up from 8,000 returns claiming $57 million during the same period last year. Identity Theft Public Awareness Campaign Despite the progress being made against stolen identity refund fraud, we recognized that we were missing an important partner in this effort--the taxpaying public. So in November 2015, with the strong support of all the Security Summit partners, we launched the ``Taxes, Security, Together'' campaign to raise awareness about actions people can take to protect themselves and avoid becoming victims of identity theft. Many of the steps are basic common sense, but given that 150 million households file tax returns every year, we believe these steps cannot be stressed enough. People continue to fall prey to clever cybercriminals who trick them into giving up SSNs, bank account numbers, password information or other sensitive personal data. So having the public's help will greatly strengthen and improve our new tools we have to stop the crime of identity theft. As part of this public awareness campaign, the IRS, in the weeks leading up to the 2016 filing season, issued weekly tax tips describing the actions people could take to protect their data. We have updated several publications for taxpayers and tax professionals. We have posted YouTube videos on this subject, and public- awareness information is being shared online across IRS.gov, State websites and platforms used by the tax software industry and many others in the private-sector tax community. I would note our public awareness campaign is not confined to the tax filing season, but is an ongoing effort. Our efforts to educate and inform members of the public about the need to protect themselves against identity thieves extend to businesses as well. Information returns, especially Form W-2, are becoming a major target of these criminals, as they seek new sources of information that will help them file false returns that have a better chance of going undetected by our fraud filters. In this effort, they attempt to trick companies into providing the information returns. One scheme uncovered recently involved identity thieves posing as a company's chief executive and sending a legitimate-looking e-mail to the payroll department requesting a list of all company employees and their Forms W-2. In March, the IRS issued an alert to payroll and human resources professionals warning them about this scam. Identity thieves' efforts to obtain Forms W-2 have not stopped there. We are increasingly concerned about efforts to create counterfeit Forms W-2 that are filed along with the false returns to make the return appear legitimate. That concern led the IRS to launch a pilot program earlier this year testing the idea of adding a verification code to Form W-2 that would verify the integrity of Form W-2 data being submitted to the IRS. For this pilot, the IRS partnered with four major payroll service providers. These providers added a special coded number on approximately 2 million individual Forms W-2 in a new box on the Form W-2 labeled ``Verification Code.'' Each coded number is calculated based on a formula and key provided by the IRS, using data from the Form W-2 itself, so that each number generated was known only to the IRS, the payroll service provider, and the individual who received the Form W-2. The verification code cannot be reverse engineered. Since this identifier is unique, any changes to the Form W-2 information provided when filed are detected by the IRS. Individuals whose Forms W- 2 were affected by the pilot and who used tax software to prepare their return entered the code when prompted to by the software program. The IRS plans to increase the scope of this pilot for the 2017 filing season by expanding the number and types of Form W-2 issuers involved in the test. verifying identities and stopping suspicious online activity Following the OMB Guidance and NIST Standards The IRS continues to make every effort to ensure that we provide tax account-related services only after verifying the identity of individuals seeking those services. This is true for all of our communications channels, some of which allow for extremely strong assurance processes that are not possible in other channels. For example, IRS employees at our Taxpayer Assistance Centers provide face-to-face help to taxpayers, and thus can easily verify identity through photo identification. This method provides the strongest possible level of assurance, but is obviously not feasible with phone or online interactions. Additionally, in-person assistance is more time-consuming for the taxpayer and costly for the IRS than the help we provide through other communications channels. Given the ability of cybercriminals and identity thieves to evolve and improve their methods of stealing personal data, the need to properly verify the identity of taxpayers using online services is particularly great. In developing authentication procedures for online interactions with taxpayers, the IRS continues to follow the Office of Management and Budget (OMB) memorandum issued in 2003, E-Authentication for Federal Agencies. This memorandum establishes criteria for determining the risk-based level of authentication assurance required for specific electronic applications and transactions. It requires agencies to review new and existing electronic transactions, to ensure authentication processes provide the appropriate level of assurance from among four levels, which are as follows: Level 1: Little or no confidence in the asserted identity's validity; Level 2: Some confidence in the asserted identity's validity; Level 3: High confidence in the asserted identity's validity; and Level 4: Very high confidence in the asserted identity's validity. Each increase in level requires users to take additional steps to validate their identity and gain access to a given online transaction. In addition to the OMB memorandum, we also follow the technical requirements set by NIST for the four levels of assurance defined in the OMB guidance. It is important to note that the NIST standards anticipate and require varying levels of assurance depending on the nature of a given online transaction and the information being exchanged. In following the NIST standards, the IRS employs differing levels of authentication assurance among the various digital services used by taxpayers. For example, the level of authentication required for an online tool that only accepts payments from a taxpayer can reasonably be set lower than an application that provides the taxpayer with their personal tax information. Thus, in establishing a risk assurance level to a particular online digital service, the IRS, in addition to assigning one of the four numerical levels of risk assurance, also assigns a letter representing the amount and types of validation that a taxpayer would have to provide, in order to gain access to the digital service in question: A: No credential required (OMB Level 1); B: User ID and password required, but no identity proofing (OMB Level 1); C: User ID and password, plus basic identity proofing--providing information such as name, address, date of birth, SSN (OMB Level 2); D: Everything included in C above, plus knowledge-based authentication--answers to so-called ``out of wallet'' questions that only the legitimate taxpayer should know (OMB Level 2); E: Everything included in D above, plus financial validation, such as providing the taxpayer's prior-year adjusted gross income (OMB Level 2); F: Everything included in C above, plus financial validation and an additional authentication factor, such an authentication code texted or mailed to the user--so-called multifactor identification (OMB Level 3); and G: In-person authentication. Recent Unauthorized Attempts to Access IRS Online Services Over the past year, unauthorized attempts were made to access online services on our website, IRS.gov. These attempts were not on our main computer system, which remains secure. Instead, in each situation criminals were attempting to use taxpayer information they had stolen from other sources to access IRS services by impersonating legitimate taxpayers, in order to file false tax returns and claim fraudulent refunds. Each of the situations, which are described in more detail below-- involving the Get Transcript online application, the Identity Protection Personal Identification Number (IP PIN) retrieval tool and the Get Your Electronic Filing PIN tool--illustrate both the progress we have made and the challenges we continue to face in detecting suspicious activity and ensuring the digital services we provide are used only by taxpayers who legitimately seek them. For all three services, the improvements made to our system- monitoring capabilities allowed the IRS to uncover the suspicious activity. We continue to improve these monitoring capabilities and enhance our return processing filters so that we can thwart criminal activity as quickly as possible. But improving our ability to react to these threats is not enough. The three situations are examples of how nimble criminals have become in attempting to access our systems by masquerading as legitimate taxpayers. In each case, those who were making the unauthorized attempts to gain access had already obtained vast amounts of stolen individual taxpayer data and were using it to help them get into our systems, with the ultimate goal of claiming a fraudulent refund. We are finding that, as the IRS improves monitoring capabilities and shuts off certain avenues of entry, identity thieves find new ways to file false returns. As the IRS enhances return processing filters and catches more fraudulent returns at the time of filing, criminals have become more sophisticated at faking taxpayers' identities so they can evade those filters and successfully obtain fraudulent refunds. Therefore, the IRS is working not just to react better and faster, but to anticipate the criminals' next moves and stay ahead of them. To fully protect taxpayers and the tax system, the IRS must not only keep pace with, but also get ahead of, criminals and criminal organizations, as they improve their efforts to obtain personal taxpayer information. The ongoing collaborative work of the Security Summit group along with additional funding received in FY 2016 as part of the Section 113 Administrative Provision have been crucial. The FY 2017 budget requests additional funding including a Departmentally-managed Cybersecurity Enhancement account which allows the IRS and the Department to leverage enterprise-wise services and capabilities. Following are descriptions of the three situations referenced above involving suspicious online activity: Get Transcript Application. The Get Transcript online application allows taxpayers to view and print a copy of their prior-year tax information, also known as a transcript, in a matter of minutes. Taxpayers use tax transcript information for a variety of non-tax administration, financial activities, such as verifying income when applying for a mortgage or financial aid. Prior to the introduction of this online tool in January 2014, taxpayers needing a transcript had to order a transcript by mail, by phone, or in person at one of our Taxpayer Assistance Centers, and then have it mailed to them. The development of the Get Transcript online application began in 2011. The IRS conducted a risk assessment and determined that the e- authentication risk assurance level appropriate for this application was 2D, which required the taxpayer to provide basic items of personal information and also answer out-of-wallet questions. At that time, this type of authentication process was the industry standard, routinely used by financial institutions to verify the identity of their customers conducting transactions online. During the 2015 filing season, taxpayers used the Get Transcript online application to successfully obtain approximately 23 million transcripts. If this application had not existed and these taxpayers had to call or write us to order a transcript, it would have stretched the IRS's limited resources even further. In May 2015, the IRS announced that criminals, using taxpayer information stolen elsewhere, had been able to access the Get Transcript online application. Shortly thereafter, we disabled the application. We are now strengthening the authentication process and expect to bring the Get Transcript application back on-line, in the near future. In reevaluating the application, we have changed the risk assurance level for this application to 3F, which will require taxpayers toundergo a multifactor authentication process in order to gain access. In the meantime, taxpayers can still place an order for a transcript online, and have it mailed to their address of record. The IRS, immediately focusing on last year's filing season, initially identified approximately 114,000 taxpayers whose transcripts had been accessed and approximately 111,000 additional taxpayers whose transcripts were targeted but not accessed. We offered credit monitoring, at our expense, to the group of 114,000 for which the unauthorized attempts at access were successful. We also promptly sent letters to all of these taxpayers to let them know that third parties may have obtained their personal information from sources outside the IRS in an attempt to obtain their tax return data using the Get Transcript online application. Our review of the situation continued and, in August 2015, we identified another 220,000 taxpayers whose transcripts may have been accessed and approximately 170,000 taxpayers whose transcripts were targeted but not accessed. We again notified all of these taxpayers about the unauthorized attempts, and offered credit monitoring to the 220,000. In addition, the Treasury Inspector General for Tax Administration (TIGTA) conducted a 9-month investigation looking back to the launch of the application in January 2014 for additional suspicious activity. This expanded review identified additional unauthorized attempts to access taxpayer information using the Get Transcript online application. This review found potential access of approximately 390,000 additional taxpayer accounts during the period from January 2014 through May 2015. An additional 295,000 taxpayer transcripts were targeted but access was not successful. Again, the IRS sent letters to these taxpayers alerting them to the unauthorized attempts, offering credit monitoring to those whose accounts were accessed. The additional attempts uncovered by TIGTA brought the total number of potential unauthorized accesses to the Get Transcript online application to 724,000. So far, we have identified approximately 250,000 potentially fraudulent returns that were filed on behalf of these taxpayers, and we have stopped the majority of the known fraudulent refunds from going out. I would note that our analysis of the attempts to access the Get Transcript online application is ongoing, and we may yet discover that some accesses classified as unauthorized were, in fact, legitimate. For example, family members, tax return preparers or financial institutions could have been using a single e-mail address to attempt to access more than one account. However, in an abundance of caution, IRS notified any and all taxpayers whose accounts met these criteria. Additionally, as a result of the Get Transcript online application problem, we added an extra layer of protection for taxpayers who use our online services. We started sending a letter, known as a CP301 notice, to taxpayers when they first create a login and password for any web application on IRS.gov. This notice tells the taxpayer that someone registered for an IRS online service using their information. If the taxpayer was not the one who registered, the notice instructs the taxpayer to contact the IRS. Mailing this notice conforms to NIST guidance, and is a best practice similar to that used by the Social Security Administration and other financial institutions. Since we began sending these notices, we have disabled approximately 5,100 online accounts at the request of taxpayers who received a CP301. The majority of these accounts were disabled between January and March of this year, and we estimate that approximately 80 percent of these requests were related to the unauthorized attempts to access the IP PIN retrieval tool described below. IP PIN Retrieval Tool. One aspect of the IRS's efforts to help taxpayers affected by identity theft involves the IP PIN, a unique identifier that authenticates a return filer as the legitimate taxpayer. If the IRS identifies a return as fraudulently filed, the IRS offers the legitimate taxpayer the ability to apply for an IP PIN for use when filing their next return. The IRS mails the IP PIN to the taxpayer's address of record, and the IP PIN is valid for only one filing season. The IP PIN program began as a pilot in 2011, and since then has grown significantly. For the 2016 filing season, the IRS issued IP PINs to 2.7 million taxpayers previously identified by the IRS as victims of identity theft or participants in a pilot program. This pilot is for taxpayers living in Florida, Georgia and Washington, DC--three areas where there have been particularly high concentrations of stolen identity refund fraud--who can request an IP PIN regardless of whether the IRS has identified them as a victim of identity theft. In 2015, the IRS developed an online tool that allowed taxpayers who had received an IP PIN to retrieve it if they lost or misplaced the number before filing their return. Taxpayers accessed this tool on IRS.gov by entering personal information to authenticate their identity. The retrieval tool has been used by only a small subset of all taxpayers receiving an IP PIN: this filing season, out of the 2.7 million who received an IP PIN, just 130,000, or about 5 percent, used the retrieval tool. After discovering the problems with the Get Transcript online application, we began in July 2015 to monitor every request to recover a forgotten or lost IP PIN. In February 2016, as part of this proactive, ongoing security review, the IRS temporarily suspended this retrieval tool after detecting potentially unauthorized attempts to obtain IP PINs using the tool. Thus far, the IRS has confirmed and stopped about 5,000 false returns using a fraudulently obtained IP PIN. While our analysis is ongoing, at this time we do not believe any fraudulent refunds were issued as a result of successful unauthorized attempts to retrieve an IP PIN. We are conducting a further review of this online tool and will strengthen its security features before bringing it back online. The IRS conducted an e-authentication risk assessment, following OMB guidelines, for the IP PIN retrieval tool, and has assigned an assurance level of 3F to this tool, so that taxpayers will have to undergo a multifactor authentication process to gain access once we bring the tool back online. Taxpayers who still need to retrieve a lost IP PIN in order to file their 2015 tax return can call the IRS, and we will mail the replacement IP PIN to the taxpayer's address of record. Get Your Electronic Filing PIN Online Tool. Another way in which the IRS employs personal identification numbers involves the electronic signature on a tax return. When taxpayers electronically file a return, they sign their return by obtaining one of several types of PINs available through IRS.gov. For example, the self-select PIN (SSP) method requires the taxpayer to use their prior-year adjusted gross income (AGI) or their prior-year SSP to authenticate their identity. They then select a five-digit PIN that can be any five numbers to enter as their electronic signature. The IRS also provides an alternative to taxpayers unable to access their prior-year tax year return information for electronic signature authentication purposes. Using the Get Your Electronic Filing PIN application, taxpayers can enter identifying information and receive a temporary electronic filing PIN that can be used only for the current tax filing season. During FY 2015, taxpayers obtained approximately 25 million e-File PINs. On average, e-File PINs are used to sign about 12 million returns a year. In January of this year, the IRS identified and halted an automated ``bot'' intrusion upon the Get Your Electronic Filing PIN application. In this intrusion, identity thieves employed malicious software, commonly known as ``malware,'' to gain access to the application and generate e-File PINs for SSNs they had stolen from sources outside the IRS. Based on our review, we identified unauthorized attempts involving approximately 464,000 unique SSNs, of which 101,000 SSNs were used to successfully access an e-File PIN. Nonetheless, our analysis of the situation found that no personal taxpayer data was compromised or disclosed by IRS systems, and no fraudulent refunds were issued. The IRS has taken steps to notify affected taxpayers by mail that their personal information was used in an attempt to access this IRS application. The IRS has also put returns filed under these SSNs through additional scrutiny to protect against future tax-related identity theft. looking to the future Building an Authentication Framework These incidents illustrate the challenges we face in developing appropriate authentication procedures for online transactions. The IRS takes protection of taxpayer data very seriously, and with that in mind, we must constantly strike a balance between citizen convenience and strong authentication and security protocols in an ever-changing cybercrime environment. The incidents also illustrate a wider truth about identity theft in general, which is that there are no perfect systems. No one, either in the public or private sector, can give an absolute guarantee that a system will never be compromised. For that reason, we continue our comprehensive efforts to update the security of our systems, protect taxpayers and their data, and investigate crimes related to stolen identity refund fraud. We are reviewing our current e-authentication risk assessment process to ensure that the level of authentication risk for all current and future IRS online services accurately reflects the risk to the IRS and taxpayers should an authentication vulnerability occur. We also realize that more needs to be done. A key element in our efforts to improve protections for existing online tools and new ones contemplated for the future is the development of a strong, coordinated and evolving authentication framework. This framework, once fully developed, will enable us to require multifactor authentication for all online tools and applications that warrant a high level of assurance. To ensure proper development of our authentication framework, the IRS recently created a new position, the IRS Identity Assurance Executive. This executive will develop our Service-wide approach to authentication. In addition, we have engaged with the U.S. Digital Service (USDS), which uses the best of product design, engineering practices and technology professionals to build effective, efficient, and secure digital channels to transform the way government works for taxpayers. We are joining forces with a team from USDS as we develop the future taxpayer digital experience and the foundational authentication standards that will enable secure digital exchanges between the IRS and taxpayers. In addition, we will leverage NIST standards to ensure that authentication processes used for all current and future online applications provide the required level of assurance for the determined level of authentication risk. Going forward, we will continue to review and adjust our authentication protocols accordingly. The sophistication of today's cybercriminals and identity thieves requires us to continually reassess and modify these protocols. Enhancing the Taxpayer Experience Our efforts to detect and stop suspicious online activity and to develop a strong authentication framework are especially critical now, as the IRS builds toward the future and works to improve the online taxpayer experience for those taxpayers who prefer to communicate with us this way. Within our tight budget constraints, the IRS has continued to analyze and develop plans for improving how the agency can fulfill its mission in the future, especially in delivering service to taxpayers. We are looking forward to a new and improved way of doing business that involves a more robust online taxpayer experience. This is driven, in part, by business imperatives, since it costs between $40 and $60 to interact with a taxpayer in person, and less than $1 to interact online. But we also need to provide the best possible taxpayer experience, in response to taxpayer expectations and demands. While we have spent the last several years developing new tools and applications to meet these taxpayer expectations and demands, we are now at the point where we believe the taxpayer experience needs to be taken to a new level. Our goal is to increase the availability and quality of self-service interactions, which will give taxpayers the ability to take care of their tax obligations online in a fast, secure and convenient manner. The idea is that taxpayers would have an account with the IRS where they, or their preparers, could log in securely, get all the information about their account, and interact with the IRS as needed. Most things that taxpayers need to do to fulfill their Federal tax obligations could be done virtually, and there would be much less need for in-person help, either by waiting in line at an IRS assistance center or calling the IRS. As we improve the online experience, we understand the responsibility we have to serve the needs of all taxpayers, whatever their age, income, or location. We recognize there will always be taxpayers who do not have access to the Internet, or who simply prefer not to conduct their transactions with the IRS online. The IRS remains committed to providing the services these taxpayers need. We do not intend to curtail the ability of taxpayers to deal with us by phone or in person. In building toward the future of taxpayer service, we will need to strike a delicate balance with our efforts to improve our authentication protocols described above. Authentication protocols will need to be high, but not so high as to preclude taxpayers from legitimately using the online services we provide. As criminals become increasingly sophisticated, we will need to continue recalibrating our approach to authentication to continue maintaining this balance. The Get Transcript online application is a good example of these tradeoffs. Under the original authentication method we required for the Get Transcriptonline application, we estimate that about 22 percent of legitimate taxpayers trying to access the application were unable to get through. We anticipate that under the multifactor authentication protocol to be implemented, an even higher percentage of taxpayers will be unable to use the tool. We will explain to taxpayers why these strong protections are necessary. All taxpayers will be able to order a transcript, online or by phone, and have it mailed to their address of record, if the online tool does not work for them, or if they prefer not to interact with us online. Need for Adequate Resources and Legislative Solutions An important consideration as we move into the future is the need for adequate resources to continue improving our efforts against identity theft and protecting our systems against cybercrime involving incidents, intrusions, and attacks. The IRS has been operating in an extremely difficult budget environment for several years, as our funding has been substantially reduced. In FY 2016, our funding level is more than $900 million lower than it had been in FY 2010. Despite those reductions, the IRS still devotes significant resources to cybersecurity and identity theft, even though our total needs still exceeded our available funds. Congress provided $290 million in additional funding for FY 2016, to improve service to taxpayers, strengthen cybersecurity and expand our ability to address identity theft. This action by lawmakers was a helpful development for the IRS and for taxpayers, and we appreciate it. Sustaining and increasing funds available for cybersecurity efforts at the IRS is critical this year and in the future. The IRS is using the new resources wisely and efficiently. This includes: Cybersecurity. We are using approximately $95.4 million to invest in a number of critical security improvements, including more effective monitoring of data traffic and replacement of technology that supports the development, maintenance and operation of IRS applications to make processes more secure, reliable and efficient. The funding will help us to improve systems and defenses across the entire IRS, thereby helping to protect taxpayer data. We are also investing in systems to allow for enhanced network segmentation, which involves further subdividing our network, so that if any vulnerabilities occur, they would be contained to just one portion of the network. Identity Theft. We are using approximately $16.1 million to develop advanced secure access capabilities for applications such as Get Transcript, IP PIN and others. This will also fund advanced analytics and detection of anomalies in returns filed. In addition, this investment will allow the IRS to partner with private industry and State tax agencies through the Security Summit to, for the first time, share information systemically about suspicious activity in the tax system. Taxpayer Service. We are using approximately $178.4 million provided in the additional $290 million to add about 1,000 extra temporary employees to help improve our service on our toll-free phone lines. As a result, we are already seeing service improvements. So far this filing season, the telephone level of service (LOS) is nearly 75 percent, and the average for the entire filing season will probably be above 70 percent, which is a vast improvement over last year. The IRS has prioritized LOS during filing season, and was operating at historically low levels up until the new appropriations were provided in December. In fact, we expect LOS for the full year to be about 47 percent. The 2017 Budget provides LOS above 70 percent for the full year with an investment of $150 million above current levels, and by supplementing with user fees. The FY 2017 President's Budget sustains and bolsters funding for these important programs. This includes $90 million in additional funding to help prevent identity theft and refund fraud and to reduce improper payments. This funding will increase the capacity of our most important programs discussed above, including external leads and criminal investigations. New funds will allow the IRS to close almost 100,000 additional identity theft cases per year by helping victimized taxpayers who have engaged the IRS for assistance. The number of identity theft cases has grown from 188,000 in FY 2010 to 730,000 in FY 2014, and current resources can only close about 409,000 per year. The FY 2017 President's Budget also requests cybersecurity funds provided through a Department wide Cybersecurity Enhancement account, which will bolster Treasury's overall cybersecurity posture. Of the nearly $110 million requested in the account, $54.7 million will directly support IRS cybersecurity efforts by securing data, improving continuous monitoring, and other initiatives. An additional $7.4 million will be used to continue development and implementation of electronic authentication systems currently being developed for the Get Transcript online application for our expanding set of digital services. While adequate funding is critical to improving our cybersecurity efforts, Congress also provides important support to the IRS by passing legislative proposals that improve tax administration. An excellent example is the enactment last December of the requirement for companies to file Form W-2s and certain other information returns earlier in the year than now. Having W-2s earlier will make it easier for the IRS to verify the legitimacy of tax returns at the point of filing and to spot fraudulent returns. Although the new law is not effective until the 2017 filing season, some employers that issue large volumes of W-2s agreed this year to voluntarily file them earlier in the year, so the benefit of the change is already beginning to be felt. This year we received early submissions of about 26 million W-2s, most of which came in by the end of January. The IRS is using this data in our program to verify claims of wages and withholding on individual income tax returns. We expect this to assist in the quicker release of refunds for those returns we are able to verify. We have asked Congress for other changes to enhance tax administration and help us in our efforts to improve cybersecurity. An important proposal is the reauthorization of so-called streamlined critical pay authority, originally enacted in 1998, to assist the IRS in bringing in individuals from the private sector with the skills and expertise needed in certain highly specialized areas, including IT, international tax and analytics support. This authority, which ran effectively for many years, expired at the end of FY 2013 and was not renewed. The loss of streamlined critical pay authority has created major challenges to our ability to retain employees with the necessary high- caliber expertise in the areas mentioned above. In fact, out of the many expert leaders and IT executives hired under critical pay authority, there are only 10 IT experts remaining at the IRS, and we anticipate there will be no staff left under critical pay authority by this time next year. The President's FY 2017 Budget proposes reinstating this authority, and I urge the Congress to approve this proposal. Chairman Hatch, Ranking Member Wyden, and members of the committee, this concludes my statement. I would be happy to take your questions. ______ Prepared Statement of Hon. Ron Wyden, a U.S. Senator From Oregon Hackers and crooks, including many working for foreign crime syndicates, are jumping at every opportunity they have to steal hard- earned money and sensitive personal data from U.S. taxpayers. It happens online and in the real world. And in my view, taxpayers have been failed by the agencies, the companies, and the policymakers here in Congress they rely on to protect them. It was unacceptable for the IRS to leave the front door open to hackers by using a weak authentication process for its Get Transcript system. It meant thieves could walk through the door and steal the tax information of three quarters of a million taxpayers. And to make matters worse, after the IRS mailed special Identity Protection PIN numbers to the hacking victims, it repeated its mistake and used lax security online. For the tax scammers, once again it was as easy as going online, plugging in the personal data you've already stolen, and pretending to be somebody who's lost their IP PIN. So after leaving the front door open, the IRS left the back door open, too. There is no excuse for this. But poor protection of taxpayer information is not just a problem at the IRS--there's a lot of blame to go around. Already this tax season, hackers have gotten into the inadequately guarded systems of private software firms and stolen personal information from thousands of people. And it's my judgement that you can't have an honest discussion about protecting taxpayer information without including the vulnerabilities from e-file providers, as well as crooked return preparers who operate in the shadows and steal from customers. For years Republicans and Democrats agreed on the need for minimum standards for return preparers, but Congress has sat back and watched while criminals have come in and preyed on taxpayers. When it comes to blocking hackers, Congress has done next to nothing while the IRS loses its ability to hire the experts who can keep taxpayer information safe. If you're a top-notch tech expert, you're already taking a pay cut to work in public service compared to what you'd earn at firms in Oregon or California. Now, without what's called ``streamlined critical pay authority,'' it can take 4 to 6 months to bring a new hire on board at the IRS. So let's be clear: taxpayer information is under assault every day, but the IRS does not have the legal authority it needs from Congress to build a cybersecurity team that can beat back the crooks. Already there's been an exodus of high-ranking IRS tech staff. The Director of Cybersecurity Operations left a month ago. The terms for the remaining employees working under this authority continue to expire, including for one of our witnesses, Chief Technology Officer Terence Milholland. Come 2017, there will not be any left. So today, instead of rehashing the past and beating up on one agency or one firm, this committee ought to focus on how to step up the fight against hackers and crooks across the board. It's my view that streamlined critical pay authority is a key part of the solution. There was a bipartisan bill ready to go last fall, and this committee ought to move forward on it as soon as possible. Furthermore, Congress needs to make more than token investments in IT at the IRS. Congress has held the IRS' tech budget below where it was 6 years ago, but you can bet that the hackers haven't backed down since then. Next, the IRS and private firms need to do much more to keep taxpayer information safe in their systems. The Get Transcript hack I mentioned earlier has been well documented. And a recent audit by the Online Trust Alliance found that the security maintained by private free-file services did not meet expectations. It is unacceptable for troves of taxpayer data to be more vulnerable to hacking than many social media or e-mail accounts. And the committee ought to consider whether the IRS has the authority it needs to guarantee that the security used by private software firms is up to snuff. While many tax preparers are honest practitioners, there are always some bad apples in the barrel. Last year Senator Cardin and I introduced a bill giving IRS the authority to regulate tax return preparers. Senator Hatch and I have worked to create a bipartisan identity theft bill for markup in the Finance Committee, which I had hoped would include the regulation of return preparers. It is still my view that people handling sensitive taxpayer information should meet minimum standards and that the committee should vote to require that. It's already open season for hackers to steal money and data from hard-working Americans, so congressional inaction should not make the situation worse. With tax day approaching, millions of Americans are filing their returns online, through the mail, or with a private return preparer. This committee has a responsibility to protect taxpayers no matter what filing method they choose. So I see this hearing as an opportunity to find bipartisan solutions on all fronts. ______ Communication ---------- Statement for the Record by Kwame Gyamfi ``Cybersecurity and Protecting Taxpayer Information'' April 12, 2016 Senate Committee on Finance Dirksen Senate Office Building Washington, DC 20510-6200 I had the opportunity to attend the ``Cybersecurity and Protecting Taxpayer Information'' panel discussion on April 12, 2016. The purpose of this statement is to bring to this committee's attention the importance of developing safeguards to protect the public after a data breach has been uncovered. As a matter of public record, the OPM data breach of former and present federal employees and contractors indicated that the personal and private information had been breached from the eQip system. The OPM then instituted an identity theft monitoring system designed to safeguard the victims of this data breach in the event their private information was used against them. Unfortunately, these traditional safeguards are antiquated and outdated. Hence, cyber-criminals are far more sophisticated and have developed tools and applications to subvert the traditional methods of targeting fraud victims. Therefore, this honorable committee must consider encouraging the executive branch to consider monitoring sophisticated ``shadow'' and ``ghost'' applications that act as front-end applications that mimic official government systems. Unfortunately, during the hearing the focus was primarily a discussion about hiring industry leaders in cybersecurity to assist the agency (IRS) in protecting the taxpayer information. However, this discussion did not take into consideration the ``real-world'' applications of how cyber- criminals manage and process breached taxpayer data. In closing, ``shadow''' and ``ghost'' applications are systems that simulate official government systems, but are instead fraudulent applications. These systems are able to process millions of taxpayer dollars via bogus government letterhead ``.us'' domains and skewed legal jargon designed to confuse the targeted victims in banking and private industries. Hence federal government agencies must be vigilant in leading the charge against cybersecurity fraud and not just focus on the breach within the agency, but consider the sophistication of cyber- criminals that lay within and outside the federal government. [all]