Thoughts, essays, and writings on Liberty. Written by the heirs of Patrick Henry.

August 3, 2007

IRS Signs Over Fort Knox To Nigerian Scammers

by Brad Warbiany

Okay, well maybe it’s not THAT bad… But it’s close:

IRS employees ignored security rules and turned over sensitive computer information to a caller posing as a technical support person, according to a government study.

Sixty-one of the 102 people who got the test calls, including managers and a contractor, complied with a request that the employee provide his or her user name and temporarily change his or her password to one the caller suggested, according to the Treasury Inspector General for Tax Administration, an office that does oversight of Internal Revenue Service.

The caller asked for assistance to correct a computer problem.

The report said that by failing to question the identity of the caller the employees were putting the IRS at risk of providing unauthorized people access to taxpayer data that could be used for identity theft and other fraudulent schemes.

“This is especially disturbing because the IRS has taken many steps to raise employee awareness of the importance of protecting their computers and passwords,” said Inspector General J. Russell George.

Sadly, according to the Inspector General, this appears to have occurred after people were trained.

Granted, that some people failed this test is not a surprise, but over 60%?!

And some people want to trust these morons with our medical records too?

Freedom is sexy, so share!Share on Facebook0Tweet about this on Twitter0Share on Google+0Share on Reddit0Digg thisShare on StumbleUpon0Share on LinkedIn0Pin on Pinterest0Email this to someone
TrackBack URI: http://www.thelibertypapers.org/2007/08/03/irs-signs-over-fort-knox-to-nigerian-scammers/trackback/
Read more posts from
• • •
  • http://anarchangel.blogspot.com Chris

    Brad,

    Eric Selene and I are both security professionals, and a couple of us here are former intel weenies.

    Believe me when I say this: 60% falling for this is actually pretty good.

    Social engineering is, always has been, and always will be the most effective form of systems penetration.

Powered by: WordPress • Template by: Eric • Banner #1, #3, #4 by Stephen Macklin • Banner #2 by Mark RaynerXML
Social Media Auto Publish Powered By : XYZScripts.com