Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Maggie Romaniello SL Field Area Manger

Similar documents
Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Anita Douglas, Senior Stakeholder Liaison May 27, 2015

How the IRS Helps Taxpayers and Assists Victims

IRS & Partners Combat Tax-Related Identity Theft What s New for 2016

Taxes & Identity Theft

Identity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud

How the IRS Helps Taxpayers and Assist Victims

Instructions-for-Requesting-Copy-of-Fraudulent-Returns

What s New Collection Fall 2015

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Brian Wozniak IRS Stakeholder Liaison

IRS Resources for Payroll Professionals

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012

Arkansas Small Business Forum. IRS Identity Theft Prevention Efforts

Identity Theft Don t Be a Victim How IRS and Tax Professionals Can Prevent Identity Theft and Assist Taxpayers Who Are Victims

Helping the Identity Theft Victim

Taxpayer Guide to Identity Theft Protect yourself. By Beatriz Landa-Sanchez, EA

Identity Theft and Tax Administration

News Release Date: 11/23/15

The World of Identity Theft from the IRS s Point of View

How IRS Protects Taxpayers and Helps Victims of Identity Theft. Global Identity Summit September 16, 2014

IRS Identity Theft Efforts and 2013 Filing Season. Dennis Bell February 6, 2013

Federal and State Government Identity Theft and Protection Initiatives

WRITTEN TESTIMONY OF JOHN A

Identity Theft: Expanded efforts at IRS protect taxpayers and fight fraud

Criminal Investigation

What to Know, What to Do

How To Get Help From The Police Department

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

TYPES OF POSSIBLE IDENTITY THEFT

from the Retiree Activities Office

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE?

DVD Companion Learning Guide

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

1/19/2016. Identity Theft and Client Protection. Remember.. Major Concerns Regarding Identity Theft

Corona Police Department

Preventing and Detecting Identity Theft: Partnering with the IRS to Meet the Challenge. (edited transcript)

Retail/Consumer Client. Internet Banking Awareness and Education Program

Click to edit Master title style Fighting Back Against. Identity Theft and Online Fraud. Click to edit Master text styles Second level Third level

Identity Theft Prevention Presented by: Matt Malone Assero Security

Advising Victims of Tax Identity Theft

Identity Theft Protection

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Remote Deposit Quick Start Guide

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

Do s & Don ts Reference website.

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

GAO. TAXES AND IDENTITY THEFT Status of IRS Initiatives to Help Victimized Taxpayers

Helping the Identity Theft Victim (edited transcript)

Awareness, Deterrence and

Presented by Dave Olsen, CPA, President

Protecting Your Tax Identity Tax Identity Theft Awareness Tips

Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation

General Q&A Northland Pioneer Personal Data Security Incident

IRS Criminal Investigation. Special Agent Christine Shanley Supervisory Special Agent Michael Rivera

Tax Identity Theft. Identity Theft as of 2010 has become the most prevalently reported crime in the world exceeding credit card theft

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

Frequently Asked Questions [Updated January 20, 2015]

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense

Identity Theft and Medical Theft. *Christine Stagnetto-Sarmiento, Oglala Lakota College, USA

Standard 9: The student will identify and explain consumer fraud and identity theft.

Identity Theft Protection

IRS Hot Topics 1/5/2016. Stakeholder Liaison Field. Overview of Topics. ACA - Reporting Coverage

Learn to protect yourself from Identity Theft. First National Bank can help.

Identity Theft: Protecting, Monitoring and Resolving

Combating Identity Theft: Tips to Reduce Your Cybersecurity Risks. September 16, 2015

Identity Theft and Strategies for Crime Prevention

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

& INTERNET FRAUD

Beware! Identity Theft

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Identity Theft Problem and Solutions

Fraud and Identity Theft. Megan Stearns, Credit Counselor

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

I know what is identity theft but how do I know if mine has been stolen?

Cyber Self Assessment

Identity Theft is a Crime in the State of New Jersey.

Avoid completing forms in messages that ask for personal financial information.

IDENTITY THEFT: MINIMIZING YOUR RISK

The Pennsylvania Lawyer May June 2012

A persistent threat to taxpayers. IRS Identity Theft Efforts and 2013 Filing Season Improvements 4/10/2013. The most misused SSN of all time

Tax Refund Fraud and Identity Theft

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Identity Theft. Providing Your Student with a Safety Net By Sun Ow

June 2015 Newsletter

IRS Payroll Topics. Alan Gregerson. VOH to Hires Act of Qualified Veteran WOTC. March 15, 2012

Corporate Account Take Over (CATO) Guide

Identity Theft. Today s Goals. Identity Theft Statistics 03/26/2013. Joel Jacobsen Information Security Officer

8/13/2014. Types of Identity Theft HOW IS IDENTITY THEFT DISCOVERED? Identity Theft. Run up existing accounts. Create new accounts.

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

Tax Refund Fraud and Identity Theft. IRS Criminal Investigation Special Agent Chad Cutting

Frequently Asked Questions How our service works:

November 2014 Seminar IRS UPDATES. Oklahoma City Chapter OSCPA. Miscellaneous Topics. Anita Douglas Senior Stakeholder Liaison November 13, 2014

Protecting Yourself from Identity Theft

Identity Theft: Expanded efforts at IRS protect taxpayers and fight fraud. Ley Mills IRS COSS SL/Field November 12, 2014

Identity Theft: Prevention & Survival

Prepared by Sgt. Gibbs, Thomas B

Identity Theft. What it is and How to Protect Yourself

Transcription:

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Glenn Gizzi Senior Stakeholder Liaison Robert Glantz Criminal Investigator Maggie Romaniello SL Field Area Manger

What is tax-related identity theft? Tax-related identity theft occurs when someone uses your Social Security Number (SSN) to file a tax return claiming a fraudulent refund.

General Scope of Identity Theft Identity theft costs U.S. victims more than all property crimes combined Identity theft remains number one issue reported to Federal Trade Commission New identity theft victim occurs every two seconds More than 1 billion personal records stolen in 2014

Scope of Tax-Related ID Theft 19 million suspicious returns identified from 2011-2014 $63 billion in fraudulent refunds stopped from 2011-2014 4.5 million suspicious returns 2015 through September; 1.2 million confirmed IDT returns $9.5 billion total confirmed refund fraud protected 2015 through September

How identity theft occurs Identity theft most often occurs from the following sources: Dumpster diving Skimming Phishing Address changes Theft of records Pre-texting Trojan Horses Spyware Data breaches 4

IRS Strategy The IRS combats identity theft with a multipronged strategy: Prevention Detection Victim Assistance Presentation Name W&I 5

IRS Efforts Against Tax-Related Identity Theft The IRS has: Increased number of filters to 200 from 11 Limited refunds to a single account Locked nearly 29 million deceased taxpayer accounts Improved cooperation with local law enforcement Worked to reduce internal use of SSNs

IRS Efforts Against Tax-Related Identity Theft Continued The IRS has: Reduced prisoner tax fraud Established external leads program with financial institutions Recovered $3 billion in erroneous refunds Helped convict about 2,000 identity thieves in recent years; Criminal Investigation has 1,700 open investigations Curbed EFIN abuse

IDENTITY THEFT

Victim Assistance Warning signs: E-filed return rejected as a duplicate IRS notice that more than one tax return was filed for taxpayer(s) Individuals may owe additional tax, have a refund offset or have collection actions taken against them IRS records indicate taxpayer(s) received wages from an employer unknown to them Presentation Name W&I 9

Recommended steps for IDT victims Steps recommended by FTC for all identity theft victims: File a police report File a complaint with the FTC Contact one of the three credit bureaus to place a fraud alert Close any account opened without your permission Presentation Name W&I 10

Recommended steps for IDT victims Victims of tax-related identity theft should take these additional steps: Submit IRS Form 14039, Identity Theft Affidavit Respond immediately to IRS notices and letters Continue to file and pay taxes even if by paper Visit IRS.gov/identitytheft Presentation Name W&I 11

Victim Assistance Process Confirmed IDT victim files IRS Form 14039, Identity Theft Affidavit (with or without a return). IRS codes taxpayer s account to show we received identity theft documentation. If necessary, IRS reconciles taxpayer s account to reflect valid return information. IRS places identity theft indicator on the taxpayer s account. 12

Victim Assistance Process IRS issues a CP01 notice Before the next filing season, the IRS generally assigns the taxpayer a unique Identity Protection PIN to use when filing. If the IRS identifies the taxpayer as deceased, the account is locked to prevent future filings from being processed. 13

Victim Assistance Process The IP PIN is a six-digit number assigned annually to: o A validated identity theft victim or o A taxpayer who voluntarily opt in to an ongoing pilot project The IP PIN is used as a supplement to the taxpayer s SSN to identify the taxpayer as the valid owner of the SSN and related tax account. 14

Types of IRS notices CP01 Notifies the taxpayer that the IRS has resolved IDT issues and that an identity theft indicator has been placed on their account. CP01A An annual notice that contains the latest IP PIN. CP01F A one-time notice for 2015 giving certain taxpayers option of obtaining an IP PIN through www.irs.gov/getanippin. Presentation Name W&I 15

Maintaining a well-trained workforce IRS has trained 37,000 employees who work with taxpayers over the phone, in person or through case work. The training emphasizes: How to recognize signs of identity theft How to help victims of identity theft The importance of empathy when dealing with taxpayers who face this frustrating situation. 16

Preventing online identity theft Don t respond to suspicious IRS emails, texts, or faxes Secure your computers (i.e., firewalls, antivirus/anti-phishing/anti-spam, etc.) Use strong passwords Back up critical personal information Limit the personal information you provide on social media Never answer yes to pop-up screens Visit onguardonline.gov 17

FBI Statistics 438,800,000 319,084,000 Overall 2013 35% Web Application Breaches 8% Insider Misuse Finance 27% Web Application Breaches 7% Insider Misuse IRS-CI Tracking over 200 Preparer and Payroll Service Compromises in 2015 18

ANATOMY OF A HACK 19

The Cyber Crime Threat Cyber criminals have adapted to today s technology in exploiting the cyber arena These groups continually attack systems for monetary gain Malware Botnets Spam and phishing Extortion Identify theft Online fraud and unauthorized transactions 20

Cyber Underground 18 May 2016

Suspicious IRS-related communication If you or a client receive a suspicious communication claiming to be the IRS: Go to IRS.gov, scroll to the bottom of the homepage and click on Report Phishing Report all unsolicited email claiming to be from the IRS to phishing@irs.gov BEWARE Phone scam is ongoing 22

Sample Cases Passaic man, leader of extensive tax refund scheme, gets 7-year sentence JULY 21, 2015 BY JANE FRITSCH STAFF WRITER THE RECORD A 50-year-old Passaic man was sentenced Tuesday to seven years in prison for his role as the leader of taxpayer identity theft and mortgage schemes that brought in more than $5 million. Julio Cesar Concepcion, a father of 10, also was ordered to pay more than $5 million in restitution to the IRS and the Federal Housing Authority. Concepcion had earlier pleaded guilty to charges of conspiracy to steal government funds and theft of government funds in the case involving tax refunds, and to a charge of conspiracy to commit wire fraud in a separate mortgage fraud scheme. With relatives filling the benches in a Newark courtroom, Concepcion, who had cooperated with prosecutors, told U.S. District Judge Kevin McNulty that he was very ashamed of everything he did. I apologize to the United States and to all of my family, he said. McNulty said Concepcion was the architect and leader of the scams which involved getting fraudulent tax-refund checks and mortgages and had embarked on them after a calculation of the likelihood of being caught. The details of the case provide an unusual inside look at a type of financial fraud that is growing rapidly as more personal information is stored online and more hackers domestic and foreign find ways to access and sell it. A government report released in 2013 said the IRS issued nearly $4 billion in fraudulent tax refunds over the previous year to thieves who were using other people's personal information.

Sample Cases Bulgarian hacker admits role in $6M IRS refund scheme, feds say By Thomas Zambito NJ Advance Media for NJ.com July 06, 2015 NEWARK A Bulgarian national on Monday admitted his role in a $6 million IRS tax refund scheme that involved hacking into the computer networks of major accounting firms. Vanyo Minkov, 32, pleaded guilty to a single count of conspiring to file fraudulent tax returns during an appearance Monday before U.S. District Court Judge Jose Linares. Federal prosecutors say Minkov and others hacked into the networks of four major accounting firms so they could steal 2011 tax filings for more than 1,000 clients. They either used the stolen information to file phony 2012 tax returns or sold it to others, they say. An investigation by the U.S. Secret Service and the IRS' criminal investigation division turned up more than $6 million in phony claims, prosecutors say.

IRS TELEPHONE SCAM

Protecting your business and clients Physical safeguards Lock rooms and cabinets. Store records in secured area. Protect against destruction and damage. Inventory hardware. Dispose of information and hardware securely. 26

Protecting your business and clients System safeguards: Use strong passwords: Minimum of eight alphanumeric characters Change passwords periodically Use timed, password-activated screen savers Don t post or share passwords Encrypt sensitive data when: o Transmitting over networks o Storing on servers or media Encrypt entire computers, media 27

Protecting your business and clients More system safeguards - Don t store sensitive data on a machine with an internet connection Back up system(s) periodically on secure media Maintain updated firewalls, anti-virus, software updates, security patches, antispyware and anti-adware Provide central management security tools and passwords/security protections 28

Protecting your business and clients If you have a security breach: Notify law enforcement Notify the Federal Trade Commission (www.ftc.gov) Notify customers and business partners Take corrective actions Prevent other breaches 29

Actions When Compromised Contact IRS Stakeholder Liaison When Compromise Detected Stakeholder Liaison will refer Information within IRS (i.e. Criminal Investigations, Return Integrity & Compliance Services) Follow State Reporting Requirements (i.e. State Attorney General, State Consumer Protection Bureaus, State Police) Report Compromise to FBI, US Secret Service, Federal Trade Commission 30

Security Summit Actions for 2016 Agreed on new trusted customer standards for use of tax software New password standards Lockout features Out-of-band features Identified more than 20 new data elements for submission Improved information sharing Testing a W-2 Verification Code

Security Summit Actions Agreed on three new working groups: Financial Services Work Group will focus on tax-time products such as debit cards Communications Work Group will work to increase security awareness among taxpayers Tax Preparers Work Group to bring industry into the dialogue Summit partners reviewing additional steps for 2017

Dealing with Data Breaches

Additional information Identity theft information www.irs.gov/identitytheft o Individual identity theft o Business identity theft o Additional Resources o Taxpayer Guide to Identity Theft o Publication 5027 for taxpayers o Publication 5199 for tax preparers 34

Summary Identity theft presents a burden to individuals and a challenge to many businesses, organizations and governmental agencies, including the IRS. But, we are making progress. Fighting identity theft is an ongoing battle that requires a collaborative effort among the IRS, practitioners, and taxpayers. 35