{"id":80660,"date":"2016-07-30T12:30:59","date_gmt":"2016-07-30T16:30:59","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-08-14T20:41:22","modified_gmt":"2021-08-15T00:41:22","slug":"more-irs-tech-troubles","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/more-irs-tech-troubles\/","title":{"rendered":"More IRS Tech Troubles"},"content":{"rendered":"<p><a href=\"http:\/\/www.cnbc.com\/id\/100747180\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-105012\" title=\"More IRS Tech Troubles\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/uncle-sam_pulling-money-from-wallet.jpg?resize=125%2C70&#038;ssl=1\" alt=\"More IRS Tech Troubles\" width=\"125\" height=\"70\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/uncle-sam_pulling-money-from-wallet.jpg?resize=150%2C84&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/uncle-sam_pulling-money-from-wallet.jpg?resize=75%2C42&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/uncle-sam_pulling-money-from-wallet.jpg?w=530&amp;ssl=1 530w\" sizes=\"auto, (max-width: 125px) 100vw, 125px\" \/><\/a>The U.S. gooberment agency in charge of <del>extorting<\/del> collecting taxes from citizens, <a href=\"http:\/\/www.politifact.com\/truth-o-meter\/statements\/2014\/aug\/28\/bernie-s\/bernie-sanders-says-tax-share-paid-corporations-ha\/\" target=\"_blank\" rel=\"noopener noreferrer\">but not businesses<\/a>, has more IT troubles. In the past, the <strong>IRS<\/strong> has had problems with <strong>hackers<\/strong> attacking its <a href=\"https:\/\/www.irs.gov\/uac\/newsroom\/irs-statement-on-get-transcript\" target=\"_blank\" rel=\"noopener noreferrer\">online systems<\/a>\u00a0which <strong>exposed<\/strong> more than <strong>720,000 taxpayer accounts<\/strong>.\u00a0It has had <a href=\"https:\/\/web.archive.org\/web\/20180531100755\/https:\/\/www.computerworld.com\/article\/3031846\/security\/identity-thieves-obtain-100000-electronic-filing-pins-from-irs-system.html\" target=\"_blank\" rel=\"noopener noreferrer\">data breaches<\/a>\u00a0that <strong>released 101,000 taxpayer SSNs<\/strong>, Its internal processes are so weak that the IRS <a href=\"http:\/\/www.theregister.co.uk\/2015\/10\/14\/half_irs_servers_still_running_win_2003\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>could not find 1,300 PC&#8217;s<\/strong><\/a> to complete the upgrade from <a title=\"Windows XP\" href=\"http:\/\/en.wikipedia.org\/wiki\/Windows_XP\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">Windows XP<\/a>.<\/p>\n<p><a href=\"http:\/\/www.fool.com\/investing\/general\/2014\/02\/08\/10-incredible-facts-you-probably-didnt-know-about.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105014 size-thumbnail\" title=\"collecting taxes from citizens, but not business\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/tax_money.jpg?resize=75%2C56&#038;ssl=1\" alt=\"collecting taxes from citizens, but not business\" width=\"75\" height=\"56\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/tax_money.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/tax_money.jpg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/tax_money.jpg?w=320&amp;ssl=1 320w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>The latest report says that the IRS off-boarding processes are so porous that <strong>former employees<\/strong> have \u201c<strong>unauthorized entry.<\/strong>\u201d Former employees have access to workplaces, IRS <strong>computers<\/strong>, <strong>taxpayer information<\/strong>, and could allow them to <strong>misrepresent themselves<\/strong> to taxpayers, <a href=\"http:\/\/www.nextgov.com\/cybersecurity\/2016\/07\/watchdog-former-irs-employees-might-still-have-access-computers-facilities\/129729\/\" target=\"_blank\" rel=\"noopener noreferrer\">according<\/a> to an article at <em><a href=\"http:\/\/www.nextgov.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Nextgov<\/a><\/em>.<\/p>\n<p>The article cites a new watchdog report. In the report, there was a random sampling in 2014 that said the IRS <strong>couldn\u2019t verify it had recovered all security items from more than 66 percent of roughly 4,100 \u201cseparated\u201d employees. <\/strong>The employees had left due to retirement, resignation, death, etc.<\/p>\n<p>If the IRS had just checked with me, this would not have been a surprise. In 2014 <a href=\"https:\/\/wp.me\/p2wgaW-ipV\" target=\"_blank\" rel=\"noopener\">wrote about this issue<\/a>. <a title=\"Lieberman Software\" href=\"https:\/\/www.beyondtrust.com\/blog\/entry\/lieberman-software-acquired\" target=\"_blank\" rel=\"noopener noreferrer\">Lieberman Software<\/a>\u00a0released the results of a survey of IT security professionals. 13%\u00a0of IT Pros at the <a title=\"RSA Conference 2014\" href=\"https:\/\/web.archive.org\/web\/20190712033801\/https:\/\/www.rsaconference.com\/events\/us14\" target=\"_blank\" rel=\"noopener noreferrer\">RSA Conference 2014<\/a>\u00a0admitted to being able to\u00a0<strong>access previous employers\u2019 systems<\/strong> using their old credentials.\u00a0Perhaps even more alarming is that of those able to access previous employers\u2019 systems nearly 23% can get into their previous two employers\u2019 systems <strong>using old credentials<\/strong>.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105016 size-medium\" title=\"two factor authentication\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2fa-e1569018668665-150x87.png?resize=150%2C87&#038;ssl=1\" alt=\"two factor authentication\" width=\"150\" height=\"87\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2fa-e1569018668665.png?resize=150%2C87&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2fa-e1569018668665.png?resize=75%2C43&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2fa-e1569018668665.png?w=534&amp;ssl=1 534w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>This is just another example of why passwords suck. If the tax collectors used a two-factor authentication (<a title=\"Two-factor authentication\" href=\"http:\/\/en.wikipedia.org\/wiki\/Two-factor_authentication\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">2FA<\/a>) process, chances are must greater that ex-employees would not be able to access taxpayer&#8217;s records. <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/two-factor-authentication\" target=\"_blank\" rel=\"noopener noreferrer\">Two-factor authentication<\/a> is a security process where the\u00a0user provides two means of identification from separate categories of credentials.\u00a0<\/em><\/p>\n<p><em>An authentication factor is an independent category of credentials used for identity verification. The three most common categories are often described as something you know (the <a href=\"http:\/\/whatis.techtarget.com\/definition\/knowledge-factor\" target=\"_blank\" rel=\"noopener noreferrer\">knowledge factor<\/a>), something you have (the <a href=\"http:\/\/whatis.techtarget.com\/definition\/possession-factor\" target=\"_blank\" rel=\"noopener noreferrer\">possession factor)<\/a>, and something you are (the <a href=\"http:\/\/whatis.techtarget.com\/definition\/inherence-factor\" target=\"_blank\" rel=\"noopener noreferrer\">inheritance factor<\/a>). For systems with more demanding requirements for security, location and time are sometimes added as fourth and fifth factors.<\/em><\/p>\n<p><em><a href=\"http:\/\/www.nwivisas.com\/nwi-blog\/south-africa\/what-is-a-biometrics-system-and-why-does-home-affairs-require-this\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105019 size-medium\" title=\"Biometrics\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/biometrics_finger.jpg?resize=150%2C101&#038;ssl=1\" alt=\"\" width=\"150\" height=\"101\" \/><\/a>One rising authentication measure is biometrics. <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/biometrics\" target=\"_blank\" rel=\"noopener noreferrer\">Biometrics<\/a> is the measurement and statistical analysis of people&#8217;s physical and behavioral characteristics. The technology is mainly used for identification and access control. The basic premise of <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/biometric-authentication\" target=\"_blank\" rel=\"noopener noreferrer\">biometric authentication<\/a> is that everyone is unique and an individual can be identified by his or her intrinsic physical or behavioral traits. An individual&#8217;s biometric uniqueness can fulfill the inheritance factor of identify verification (\u201csomething you are\u201d). Using biometrics in its various forms (I have written about different forms of biometrics on the <a href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a>;\u00a0<a href=\"https:\/\/wp.me\/p2wgaW-kOm\" target=\"_blank\" rel=\"noopener noreferrer\">voice<\/a>, <a href=\"https:\/\/wp.me\/p2wgaW-5Ez\" target=\"_blank\" rel=\"noopener noreferrer\">brain waves<\/a>, <a href=\"https:\/\/wp.me\/p2wgaW-5I2\" target=\"_blank\" rel=\"noopener noreferrer\">retina scan<\/a>, <a href=\"https:\/\/rbach.net\/index.php\/password-free-future\/\" target=\"_blank\" rel=\"noopener noreferrer\">behavioral biometrics<\/a>, etc.) when combined with a strong password can form a 2FA.<\/em><\/p>\n<p><em>There are\u00a0<a href=\"https:\/\/wp.me\/p2wgaW-fiM\" target=\"_blank\" rel=\"noopener\">drawbacks<\/a> to using biometrics for authentication too.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li>Global Two-factor Biometrics Industry to Grow at a CAGR of 22.87% to 2020 (newsmaker.com.au)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Biometric two-factor authentication could stop ex-staff from illegally accessing taxpayer files at the IRS<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2686,2682,1452,67,130,2541,4,1546,2736],"class_list":["post-80660","post","type-post","status-publish","format-standard","hentry","category-security","tag-2686","tag-2fa","tag-biometrics","tag-hack","tag-irs","tag-passwords","tag-security","tag-two-factor-authentication","tag-us-government"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=80660"}],"version-history":[{"count":13,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80660\/revisions"}],"predecessor-version":[{"id":130073,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80660\/revisions\/130073"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=80660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=80660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=80660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}