Datasets:

Modalities:
Text
Formats:
text
Languages:
English
Libraries:
Datasets
License:
CoCoHD_transcripts / data /CHRG-114 /CHRG-114hhrg20072.txt
erikliu18's picture
Upload folder using huggingface_hub
067e9f5 verified
<html>
<title> - SMALL BUSINESS AND THE FEDERAL GOVERNMENT: HOW CYBER ATTACKS THREATEN BOTH</title>
<body><pre>
[House Hearing, 114 Congress]
[From the U.S. Government Publishing Office]
SMALL BUSINESS AND THE FEDERAL GOVERNMENT: HOW CYBER ATTACKS THREATEN
BOTH
=======================================================================
HEARING
before the
COMMITTEE ON SMALL BUSINESS
UNITED STATES
HOUSE OF REPRESENTATIVES
ONE HUNDRED FOURTEENTH CONGRESS
SECOND SESSION
__________
HEARING HELD
APRIL 20, 2016
__________
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
Small Business Committee Document Number 114-057
Available via the GPO Website: www.fdsys.gov
______
U.S. GOVERNMENT PUBLISHING OFFICE
20-072 WASHINGTON : 2016
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Publishing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800;
DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC,
Washington, DC 20402-0001
HOUSE COMMITTEE ON SMALL BUSINESS
STEVE CHABOT, Ohio, Chairman
STEVE KING, Iowa
BLAINE LUETKEMEYER, Missouri
RICHARD HANNA, New York
TIM HUELSKAMP, Kansas
CHRIS GIBSON, New York
DAVE BRAT, Virginia
AUMUA AMATA COLEMAN RADEWAGEN, American Samoa
STEVE KNIGHT, California
CARLOS CURBELO, Florida
CRESENT HARDY, Nevada
NYDIA VELAZQUEZ, New York, Ranking Member
YVETTE CLARK, New York
JUDY CHU, California
JANICE HAHN, California
DONALD PAYNE, JR., New Jersey
GRACE MENG, New York
BRENDA LAWRENCE, Michigan
ALMA ADAMS, North Carolina
SETH MOULTON, Massachusetts
MARK TAKAI, Hawaii
Kevin Fitzpatrick, Staff Director
Emily Murphy, Deputy Staff Director for Policy
Jan Oliver, Chief Counsel
Michael Day, Minority Staff Director
C O N T E N T S
OPENING STATEMENTS
Page
Hon. Steve Chabot................................................ 1
Hon. Nydia Velazquez............................................. 2
WITNESSES
Mr. Richard Snow, Owner, Maine Indoor Karting, Scarborough, ME... 4
Mr. Kevin Dunn, Technical Vice President, NCC Group, Austin, TX.. 6
Mr. Nicholas A. Oldham, Counsel, King & Spalding, LLP,
Washington, DC................................................. 7
Mr. Stephen F. Mankowski, CPA, National Tax Chair, National
Conference of CPA Practitioners (NCCPAP), National Secretary,
NCCPAP, Partner at EP Caine & Associates CPA, LLC, Bryn Mawr,
PA............................................................. 9
APPENDIX
Prepared Statements:
Mr. Richard Snow, Owner, Maine Indoor Karting, Scarborough,
ME......................................................... 25
Mr. Kevin Dunn, Technical Vice President, NCC Group, Austin,
TX......................................................... 36
Mr. Nicholas A. Oldham, Counsel, King & Spalding LLP,
Washington, DC............................................. 42
Mr. Stephen F. Mankowski, CPA, National Tax Chair, National
Conference of CPA Practitioners (NCCPAP), National
Secretary, NCCPAP, Partner at EP Caine & Associates CPA,
LLC, Bryn Mawr, PA......................................... 47
Questions for the Record:
None.
Answers for the Record:
None.
Additional Material for the Record:
NAFCU - National Association of Federal Credit Unions........ 54
SMALL BUSINESS AND THE FEDERAL GOVERNMENT: HOW CYBER ATTACKS THREATEN
BOTH
----------
WEDNESDAY, APRIL 20, 2016
House of Representatives,
Committee on Small Business,
Washington, DC.
The Committee met, pursuant to call, at 11:00 a.m., in Room
2360, Rayburn House Office Building. Hon. Steve Chabot
[chairman of the Committee] presiding.
Present: Representatives Chabot, Luetkemeyer, Hanna,
Gibson, Brat, Hardy, Kelly, Velazquez, Clarke, Payne, Meng, and
Adams.
Chairman CHABOT. Good morning. The Committee will come to
order. I want to thank you, everyone, for being here today, and
we want to especially thank all of our witnesses for coming
here to share your insights and expertise with this Committee
on a very timely and important subject. In April of last year,
this Committee heard from a panel of industry experts about how
small businesses across the country are being threatened by a
growing number and variety of cyber attacks. Since then, the
threat to small businesses has only grown. Unfortunately, in
many ways, the Federal Government's efforts to guard against
this threat have not kept pace.
This morning, the Committee will look at the effects of
cyberterrorism and cyber attacks on both small businesses and
on the Federal Government. Small businesses face an increased
risk because they lack the resources to protect themselves
against sophisticated cyber attacks. We must make sure that the
Federal Government is part of the solution and not adding to
the problem. It is vital to both the economic and national
security of this nation that the sensitive data held by Federal
Government be safeguarded. The owners, employees, and customers
of America's 28 million small businesses need to have
confidence that their data is secure.
I think it is fair to say that confidence has been shaken
in recent years with the cyber attacks on the IRS, the State
Department, OPM, and even the White House. Between foreign
hackers from countries like China and Russia and domestic
identity thieves, the Federal Government has a target on its
back that seems to get larger by the day.
This is why recent findings by the Government
Accountability Office (GAO) on cybersecurity problems at
agencies like the IRS and the SBA, are so troubling to me and
many other members of this Committee. Just this month, the GAO
reported that the IRS paid $3.1 billion in fraudulent identity
theft, or IDT, tax returns. Three billion dollars for people
filing tax forms, for example, that were not the person who
actually should be getting the credit back.
When the GAO testified before this Committee earlier this
year, they told us that ``the SBA has not conducted regular
reviews of its IT investments.'' In these scenarios, American
small businesses and consumers were put at risk due to a lack
of diligence by Federal agencies. Just last week, I asked IRS
Commissioner Koskinen about the data breach at his agency last
May, which compromised the data of approximately 700,000
accounts. The commissioner informed our Committee that there
are 1 million cyber attacks at the IRS every day. Think about
that. One million cyber attacks every day at the IRS, people
trying to get into files for illicit, illegal purposes.
With over 3 billion different mobile applications and $340
billion in online commercial sales last year, business
transactions are moving away from the cash register and toward
the smartphone. It is great to be able to order your coffee or
pay your electric bill or reserve a car ride using your phone,
but with this convenience comes increased exposure for both the
customer and for businesses. In 2015, the average amount stolen
from small business bank accounts after a cyber attack was over
$32,000.
The fast pace of changes in technology means that hackers
are coming up with more sophisticated methods to go after
intellectual property, accounts, Social Security numbers, and
anything else that can be used for financial gain or a
competitive edge. With all of the uncertainty facing small
businesses in today's world of e-commerce, it will take
vigilance by all Federal agencies, and the watchful eye of this
Committee, to ensure the data of small businesses and
individual Americans remain secure. We must also look for new
and innovative ways to help small businesses protect their data
for this great and growing threat.
I look forward to hearing from our witnesses here this
morning, and I will now yield to the Ranking Member for her
opening statement.
Ms. VELAZQUEZ. Thank you, Mr. Chairman.
Technological innovations are vital to our modern economy,
and even more essential to the nation's small firms. In fact,
small businesses are some of the savviest users of technology
by using the internet to access new markets to grow and
diversify. Yet, for all the benefits technology brings to the
equation, it also creates additional challenges for business
owners, consumers, developers, and vendors. As more consumers
and businesses participate in E-commerce, protecting our
financial information from cyber attacks is critical.
Unfortunately, recent data breaches at federal agencies,
like the IRS and OPM, compromised financial data and personal
information of millions of people. Attacks like this have made
clear the weaknesses of the current cybersecurity landscape.
Last year's attack on the IRS exposed over 700,000 taxpayers'
accounts, and just last week we found out a former FDIC
employee breached the information of 44,000 FDIC customers.
These attacks strike close to home for many of us,
including small business owners. Keeping software and networks
up-to-date with the latest security is no longer enough. Cyber
threats come in many forms, but they are devastating to both
business owners and their customers. A single attack can wipe
out a small business, which is why cybercrime poses severe
problems for small businesses that are unprepared.
Sadly, some small companies fail to recognize the value of
cybersecurity as an investment until it is too late. On the
other hand, small firms that do recognize the importance of
such an investment often lack the resources to implement an
effective security system. Just as we must strengthen private
sector cybersecurity, we need to ensure Federal agencies take
precautions.
The testimony we will hear today will help us better
protect the nation's small businesses from growing cyber
threats. We will discuss the strengths and weaknesses of our
federal initiatives and what more must be done for private and
government data protection. In advance of the testimony, I want
to thank all the witnesses for both your participation and
insights to this very important topic.
With that, Mr. Chairman, I yield back.
Chairman CHABOT. Thank you very much. The gentlelady yields
back.
If Committee members have opening statements prepared, we
ask that they be submitted for the record.
I would like to take just a moment to explain our timing
and lighting system here. It is pretty simple. You get 5
minutes. The green light will come on there and you can talk
for 4 minutes. The yellow light will come on. That will let you
know you have a minute to wrap up. Then the red light will come
on after a total of 5 minutes, and if you could try and stay
within that, we would greatly appreciate it. The members hold
ourselves to the 5-minute rule, also, and we will ask you
questions then.
I would now like to introduce the panel. Our first witness
is Richard Snow, owner of Maine Indoor Karting in Scarborough,
Maine. Mr. Snow is here to provide his experience as a small
business owner whose company was the victim of a cyber attack.
Our second witness is Kevin Dunn, technical vice president
of NCC Group in Austin, Texas. He has over 14 years of
experience as a professional security consultant.
And our third witness today is Nicholas Oldham, counsel at
King and Spalding in Washington, D.C. In his current role, Mr.
Oldham assists clients with cybersecurity and risk management,
data privacy, incident response, and internal government
investigations. We welcome you all here today.
I would now like to yield to the Ranking Member to
introduce the final witness.
Ms. VELAZQUEZ. Thank you, Mr. Chairman. It is my pleasure
to introduce Mr. Stephen Mankowski, the national tax chair and
national secretary for the National Conference of CPA
Practitioners. He is also a partner at EP Caine and Associates
CPA, LLC, where he advises individuals and small businesses on
issues related to accounting, taxation, business consulting,
and litigation support services. Welcome.
Chairman CHABOT. Thank you very much. I would now like to
recognize Mr. Snow. You are recognized for 5 minutes, sir.
Thank you.
STATEMENTS OF RICHARD SNOW, OWNER, MAINE INDOOR KARTING; KEVIN
DUNN, TECHNICAL VICE PRESIDENT, NCC GROUP; NICHOLAS OLDHAM,
COUNSEL, KING AND SPALDING LLP; STEPHEN F. MANKOWSKI, CPA,
NATIONAL TAX CHAIR, NATIONAL CONFERENCE OF CPA PRACTITIONERS,
NATIONAL SECRETARY, NCCPAP, PARTNER AT EP CAINE AND ASSOCIATES
CPA, LLC
STATEMENT OF RICHARD SNOW
Mr. SNOW. Good morning. Thank you, Chairman Chabot, Ranking
Member Velazquez, and members of the House Small Business
Committee for inviting me to testify today on the current state
of cybersecurity for small companies and how phishing scams
have impacted my own small business.
My name is Rick Snow, and I am the owner of Maine Indoor
Karting, located in Scarborough, Maine. We are an indoor
entertainment venue with a go-kart track, mini golf course,
arcade, and cafe. We have about 20 employees.
I am pleased to be here representing the National Small
Business Association, where I currently serve as a Board of
Trustee member and Chair of the Environmental and Regulatory
Affairs Committee.
NSBA is the Nation's oldest small business advocacy
organization with over 65,000 members representing every sector
and industry of the U.S. economy. NSBA is a staunchly
nonpartisan organization devoted solely to representing the
interests of small businesses which provide almost half of all
private sector jobs to the economy.
Several data breaches within the Federal Government,
including OPM, IRS, and DOD make it clear the government
struggles to combat cyber attacks. If the government cannot
protect its networks and data from cyber attacks with almost
unlimited resources at its disposal, how can we expect
America's small businesses to do so? Forty-two percent of NSBA
members surveyed indicated that they have been the victim of
cyber attack. In almost half of those attacks there was an
interruption in service.
I was the victim of a phishing attack, and I have also had
my credit card stolen three times. When I was phished, I
received an email from my bank that there had been a suspicious
attempt to gain access to my account. The email urged me to
immediately log in to my account and confirm that it was, in
fact, an unauthorized attempt. The link provided in the email
looked identical to the log-in page of my bank. Frantic that
there had been a breach, I logged in, and as soon as I typed my
password, I realized what had happened. I raced to the local
branch of my bank to set up a new account which took several
hours. It took about a week to get the new checks and debit
cards for the new account to us. Since we used the cards and
checks for all our bills and local purchases for our business,
I had to either use our company line of credit or my own credit
cards. This is not unusual as many small business owners often
need to use their personal credit cards to support their
business, especially during difficult times.
The financial cost to my business paled in comparison to
the delays and disruptions. My wife, who runs the day-to-day
operations of our business, and her work were limited because
she spent the week trying to update all of the vendors with the
new account information.
According to the NSBA 2015 Year-End Economic Report, in 10
percent of cyber attacks, a bank account was improperly
assessed. I was one of those. Two weeks after the initial
phishing attack, I logged into our new account late Friday
evening, and to my horror, found that my balance was zero. It
was payday and I was terrified that the paychecks that were
issued that day would not clear. We are supporting a number of
families, many of which live paycheck to paycheck and could not
have made it without that particular payday. I quickly
discovered that three wire transfers were made that night to
three different bank accounts around the country totaling
$15,000.
This is an ongoing threat of internet age, and it will
evolve as long as the internet continues to facilitate commerce
in the global economy. It is unlikely that there will be one
solution.
I am sorry. I missed a page. So, excuse me. Sorry.
After a night of no sleep, I had to be at the bank first
thing Saturday morning. I was lucky and was able to stop the
wire transfers. I had to then spend another day away from work
opening another account and going through the process of
getting all my new cards and ordering new checks. My poor wife
had to spend another week updating vendors. She spent the
better part of 2 weeks away from her normal duties because of
this phishing incident.
My bank told me that this was a standard phishing loss and
that I was lucky that I discovered it before the 48 hours had
lapsed so no money was actually stolen. My business accounts
were not protected against theft the way that my personal
accounts would be, so the losses would have been on my
business. This attack could have ended my business if I had not
been able to recover the money. Most small businesses do not
have a significant cushion to absorb these type of losses, and
we are no different. Losing thousands of dollars during a tough
time in the economy can make a significant different for me, my
business, and my employees.
As small businesses become increasingly dependent on the
internet, they become a larger target for cybercriminals. These
threats are very real and immediate. In fact, 94 percent of
small business owners indicate they are concerned about being
targeted by cyber attacks. For many small businesses, a
cybersecurity incident could lead to an entire network being
down for many days until the full extent of the problem is
known and then fixed.
This is an ongoing threat of the internet age and it will
evolve as long as the internet continues to facilitate commerce
at the global economy. It is unlikely that there will be one
solution to stop the attacks. In fact, slowing and preventing
these attacks will most likely require an ongoing process to
identify new threats, vulnerabilities, and ultimately,
solutions. I urge Congress and this Committee to always bear in
mind the unique challenges that small businesses face and
continue to include the small business community in that
process.
Thank you for allowing me to testify before the Committee
today, and I would be happy to answer any questions that you
might have for me.
Chairman CHABOT. Thank you, Mr. Snow, for your testimony
today. What a scary situation. Thank you.
Mr. Dunn, you are recognized for 5 minutes.
STATEMENT OF KEVIN DUNN
Mr. DUNN. Good morning, Mr. Chairman, Ranking Member
Velazquez, and other esteemed members of the Committee. Thank
you for the opportunity to testify today.
My name is Kevin Dunn, Technical Vice President for NCC
Group. For the last 15 years, I have dedicated my career to
carrying out cybersecurity attacks against private companies
and government organizations. I am not a criminal; I am a
penetration tester. For our actions in this highly specialized
field, my colleagues and I determine ways to break into
organizations via cyber and physical means. Specifically, we
are hired to identify vulnerabilities that allow a company's
security to be compromised. This exercise subsequently allows
us to provide customized advice to our clients, detailing the
short- and long-term actions they should take to reduce their
susceptibility to attack.
My testimony today will focus on four areas: the strengths
and weaknesses of cybersecurity training, increasing security
when using cloud service providers, the potential impact of
small business security on the government, and the benefits of
a data-driven risk model.
To evaluate the state of high level cybersecurity training
designed for small businesses, I would like to explore two
examples: training provided by the U.S. Small Business
Administration and training provided by the Federal
Communications Commission. Through these trainings, small
businesses are able to gain awareness of important
cybersecurity threats such as the dangers associated with
phishing emails, malicious websites, malware, ransomware, and
the typical motivations of attackers. This information provides
an ample start for educating small businesses in a general
awareness capacity and extends to providing cybersecurity tips
for the major areas of concern. However, the training and
guidelines are high level in nature and lack the depth of
information needed to convert directly into hands-on actions.
In the world of small business IT support where efforts are
typically coordinated by owner-operators, this information may
not be comprehensive enough to make a worthwhile difference
beyond providing general education.
Many small businesses use cloud service providers to
implement important services like email, file storage, and data
backup. This often unburdens the IT administration overhead
from small business owner-operators or small businesses with a
one- or two-person IT team. The use of third-party cloud
service providers is typically a positive security move for
small businesses. The attention to security from the major
providers in this space affords a number of features that
greatly increase the security of data for a small business.
However, it should be noted that there are additional
features that should be enabled to make attacks harder for
adversaries. These features are often not enabled by default.
Chief among these is the use of multifactor authentication. The
majority of major online services now support the use of
multifactor authentication using at least SMS messages to a
cell phone as a means of out-of-band authentication. But
despite this inexpensive option, it is often overlooked by
organizations that use cloud services or internet services,
relying instead on single factor authentication in the form of
user names and passwords.
The impact of a small business on the government should be
considered in at least two key ways. The first concerns the
direct and indirect connectivity between a small business and a
government network. The second concerns small businesses in the
government supply chain. A small business with a direct
connection to a government network is likely a rare occurrence,
but in such a scenario, if the small business is compromised
sufficiently, an attacker's ability to traverse to a government
network could be a simple task. However, examples of indirect
connectivity are more common and are typically databased in
nature. When government users consume the services of a small
business, their user names, passwords, personal information,
and other data could be used in a subsequent attack against
government systems if extracted from a compromised small
business system. Of course, the reverse is true as well.
The second area to consider is when a small business is in
some way part of the supply chain to a government department or
agency. The most typical examples of this are where a small
business develops software or hardware that is subsequently
installed on government networks.
Finally, a good way to think about security and a means to
ensure that the approaches chosen to secure your organization
are fit for purpose is to think first about the data you care
about. Considering the data first is an excellent approach and
one that is advised in the FCC's small business cyber plan at
all. However, too few organizations actually consider their
data or subsequently plan security around the value of
different data types. Even fewer organizations consider what
will happen when, not if, an attacker gains access to their
data. Using a data-centric risk management model would allow
small businesses to focus their security attention where they
need it most.
Thank you again for this opportunity to address this
Committee. I will be happy to answer any questions.
Chairman CHABOT. Thank you very much.
Mr. Oldham, you are recognized for 5 minutes.
STATEMENT OF NICHOLAS OLDHAM
Mr. OLDHAM. Mr. Chairman, Ranking Member, and members of
this Committee, thank you for allowing me the opportunity to
appear before you today.
I have been involved in cyber issues for many years as a
former Federal prosecutor at the U.S. Department of Justice,
and now as an attorney at King and Spalding. In my practice, I
counsel clients, both large and small, on cybersecurity risk
management. Our interconnectivity is growing at an astonishing
rate. This interconnectivity, especially the internet of
things, holds tremendous promise for consumers and companies.
It also creates new challenges in terms of cybersecurity
because anything connected to the internet can be hacked.
Cyber attacks cost businesses billions of dollars every
year as a result. Where do small businesses fit into this
landscape? The interconnected world lets small businesses
develop new products and services and compete across the globe,
but with cybersecurity, small businesses often get burned at
both ends. They are less likely to have the resources to
prevent breaches, and also may have fewer resources to respond
to those breaches. It can be difficult for small businesses to
find the right information and training, and the cost of
mitigation measures in response can significantly impact a
small business' bottom line.
As a lawyer, I do not manage corporate networks. I do not
conduct vulnerability testing. Rather, I believe that
cybersecurity is as much a people and a process issue as it is
a technical issue. I focus on the people and process side of
the equation, addressing the legal and business cybersecurity
risks faced by companies. I also help manage companies comply
with their legal obligations, interact with various regulators,
and respond to regulatory enforcement actions and litigation.
These legal and business costs, including compliance costs,
drain on employee morale, and time and reputational damage can
be significant.
There are at least three ways the government can play a
role in lowering these costs. First, by addressing the
cybersecurity education gap. When weighing the costs and
benefits of enhancing their cybersecurity, companies may find
that it is far more expensive to not implement basic security
measures. The problem here is that there is a cybersecurity
education gap. Small businesses may not find the information
they need to properly assess and mitigate these costs.
Bridging this education gap can be difficult for small
businesses, especially those that lack the resources to hire
specialized employees or cybersecurity experts. Even when
information is available online, it is often difficult to find,
rarely updated, and often inadequate.
In many ways, cyber threats have analogs to traditional
crime. In the traditional crime scenarios, small businesses
would likely call the local police department for best
practices in preventing or responding to crime. In the digital
crime scenarios, there is no one logical place to call. The
government may have a role in bridging the cybersecurity
education gap by encouraging the development of cybersecurity
education resources and connecting them to those who need them
in the private sector.
Second, many of the cybersecurity initiatives receiving the
most attention are not necessarily tailored to small
businesses. For example, the NIST cybersecurity framework is
emerging as a leader, which is a promising development. This
could simplify the landscape for small and large businesses
alike. The current iteration of the NIST framework, however, is
not particularly geared towards small businesses. It can be
difficult and expensive to understand and implement regardless
of business size, and until it is better tailored to small
businesses, for some of them it may just be one more program
that they cannot afford to keep up with.
Perhaps more importantly, a small business might become
subject to a cybersecurity framework by virtue of its
contractual relationships. In this case, the small business
might inadvertently expose itself to significant liabilities
and cyber risks. While good cyber hygiene is important, to
improve the NIST framework and similar programs and policies,
the government should make a serious effort to increase the
involvement of small business owners in all phases of the
legislative and rulemaking process.
Third, the current regulatory regime for cybersecurity
presents additional difficulties for small businesses who will
inevitably struggle to determine both what cybersecurity
measures they are required to meet, and when a breach or attack
does occur, what procedures the law requires them to follow.
There are currently 51 different State or territory data breach
notification laws and many of them are inconsistent with each
other. I have seen a growing number of Federal agencies also
stepping into this space.
In short, there is a need to clarify and simplify what
companies must do. Because of the complicated and evolving
landscape, the on-the-ground expertise of the private sector
must necessarily play an important role in these efforts.
Thank you for the opportunity to testify today, and I look
forward to your questions.
Chairman CHABOT. Thank you very much.
Mr. Mankowski, you are recognized for 5 minutes.
STATEMENT OF STEPHEN F. MANKOWSKI
Mr. MANKOWSKI. Thank you. Mr. Chairman, Ranking Member
Velazquez, and members of the Committee, thank you for inviting
me to testify today.
My name is Stephen Mankowski, a partner with EP Caine and
Associates, the Executive Vice President of NCCPAP, the
National Conference of CPA Practitioners, and a member of the
AICPA.
NCCPAP has been at the forefront of identity theft issues
through our advocacy and testimony at prior hearings dealing
with ID theft. NCCPAP members have helped guide numerous
clients who have been victims of identity theft.
ID theft has been growing exponentially for years. It seems
that no matter what controls are put in place, criminals have
better and more focused resources to circumvent these
safeguards.
The IRS reminds practitioners that they must be vigilant
with their system integrity. Criminals are aware that the prize
for breaching tax practitioner systems could yield not only
names and Social Security numbers, but also several years of
earnings, as well as bank information and dates of birth. Two
Midwestern firms were compromised this tax season and had
fraudulent returns submitted by utilizing their Electronic
Filing Identification Number or EFIN.
While firms are required to obtain an EFIN from the IRS to
electronically file tax returns, paid preparers are required to
use a Practitioner Tax Identification Number or PTIN. Firm
information, including their Employer Identification Number,
however, still appears on their tax return. Given the risk of
firm ID theft, why has the IRS not adopted a firm PTIN,
something that NCCPAP strongly recommends.
Over the past year, as noted by the other panelists, the
IRS has had multiple system breaches. First, the IRS online
transcript program, Get Transcript, was compromised in May
2015. The number of accounts affected now exceeds 700,000. The
second breach was related to the IP PIN retrieval tool that was
contained on the IRS website and is more troubling. The
taxpayers who have IP PINs have already been victims of tax
refund fraud and obtained the six-digit IP PIN to prevent
further unauthorized account access or tax filings. This tool
had been used using the same interface as Get Transcript but
had remained available to the public, and unfortunately, those
less scrupulous.
Social Security uses a banking prenote to verify the
accuracy of the recipient's banking information prior to the
initial payment. Unfortunately, the IRS refund system does not
include prenote account verification. The implementation of a
prenote system could result in a significant reduction of the
annual $3.1 billion misappropriation of government funds.
While it is easy to understand that taxpayers want to
receive their refunds as quickly as possible, one must ask a
simple question: Is paying a tax refund in 7 to 10 days
prudent? A recent survey by Princeton Research Group noted that
22 percent of taxpayers surveyed would be willing to wait up to
6 to 8 weeks to receive their refund if they knew it would
combat identity theft.
Taxpayers are urged to protect their personal data, but
with widespread internet usage, online shopping, and criminals
just waiting to pounce on unsuspecting victims, ID theft
continues to grow. Individuals and businesses remain the target
of cyber attacks and must remain cautious when opening emails
with attachments, visiting web pages, or simply paying for the
family groceries. Taxpayers often do not realize they have been
a victim of tax-related ID theft until their electronically
filed tax return gets rejected. Once a taxpayer has been
victimized, they expect to obtain an IP PIN from the IRS, and
starting in January 2017, they automatically will.
In conclusion, NCCPAP feels that using the prenote
technology that already exists and is used throughout the
financial industry would allow taxpayers to continue receiving
their refunds promptly while reducing refund fraud.
Further, NCCPAP urges Congress to pass legislation to
provide the IRS the necessary authority to regulate all tax
preparers and require paid preparers to meet minimum standards.
Currently, only CPAs, EAs, and attorneys are subject to the
requirements of IRC Circular 230.
Finally, NCCPAP calls on Congress to provide the necessary
funding for the IRS to continually modernize and upgrade their
systems to minimize and eliminate data security breaches. The
first step would be Congress reauthorizing streamline critical
pay authority to allow the IRS to secure top IT talent without
a 3- to 6-month waiting period.
Thank you for the opportunity to present this testimony,
and I welcome your questions.
Chairman CHABOT. Thank you very much, and we appreciate the
testimony of all the witnesses here this morning. It was
excellent.
Mr. Snow, first, let me apologize to you for having to
return a call there before your testimony. I apologize for
that, but I had your written statement ahead of time, so I am
prepared.
You experienced a worst-case scenario for a small business
cyber theft. What advice would you give to others who are put
in the same or a similar situation?
Mr. SNOW. The first thing I would do is to ensure that when
you look at the website at the top, web ID, that there is a
https ID, and that would have prevented that from happening. I
just learned that in that process. But it would be very
difficult to stop someone from just accessing the way it was
with me because it was an identical website to the bank
website. The login looked identical. In fact, there was no
difference.
What was more disconcerting to me was the fact that they
stole the new account number, and to this day, no one
understands how that happened; how they were able to access a
brand new account opened with all that information and move
money out of the new account, not the old account.
Chairman CHABOT. How long did it take you to straighten all
this out?
Mr. SNOW. The whole process was about a month because, the
first time we had to rush everything because they have to print
new checks and new credit cards and everything, so it was about
a week and a half. Then when we discovered the loss, it was 2
weeks later. Then we had another week and a half or so of
additional time to go through that whole process again.
Chairman CHABOT. Mr. Dunn, in your testimony, you provided
the example of using text message authentication as an
inexpensive use of multifactor authentication. Are there other
inexpensive steps the Federal Government or small businesses
could make in order to verify accounts?
Mr. DUNN. Yes. I think that you can use email. There are a
number of channels that you can use. The situation really is
that when you rely on just one thing, in perhaps this case as
well, just a username and password, that that is a single point
of failure. The point is to have more than one authenticating
factor. A number of things could do that so long as it is out
of band from the process.
Chairman CHABOT. Thank you very much.
Mr. Oldham, protecting the privacy and civil liberties of
Americans is obviously an important component of cybersecurity
discussions. What effort is the private sector making to
protect consumers in this area?
Mr. OLDHAM. One of the key goals is transparency,
communicating to consumers what information is being collected
and how is it being used. That has become even more important
as the ecosystem is growing so that everything is connected,
multiple third parties and the like, and the third party would
include, for instance, sharing information with the government.
I think the most critical step the private sector is taking is
ensuring that there is this transparency.
Chairman CHABOT. Thank you very much.
Mr. Mankowski, in your testimony, you gave a firsthand
account of how a tax preparer dealt with confusion and delays
with the IRS in response to a data breach. What would you
recommend to the IRS for future responses to a tax preparer
once a breach has been confirmed?
Mr. MANKOWSKI. That is a very good question, Mr. Chairman.
What I would recommend, first of all, is that I have reached
out to my contacts that I deal with through some of my
committees at the IRS, and it is being addressed tomorrow at a
monthly meeting. But in addition, I would advise practitioners
to know who their local stakeholder liaisons are so they have
an area that they could reach out to so that they can start the
process of communicating with the IRS when they suspect there
may be a breach, not once they actually confirm. Because during
that period of time, if their EFIN was being used improperly,
the IRS could have stepped in very quickly, disabled their
EFIN, and could have potentially stopped fraudulent returns
from being processed.
Chairman CHABOT. Thank you. Let me give you another
question. You mentioned a recent audit where 6 of 13 e-filing
sites failed to take steps to protect consumers from fraudulent
and malicious emails. What recommendations would you offer
these sites in order to improve their cybersecurity?
Mr. MANKOWSKI. That is also a very interesting question. I
believe that is one that Mr. Dunn could probably help with as
far as the cybersecurity aspect. But they would certainly need
to ensure that as they are going through their systems that
they are making sure that any incoming emails are being
checked. There has been widespread spoofing of calls as well as
emails coming in to companies that are purporting themselves to
be high-level individuals within a company asking for data that
they would normally be asking for, such as W-2s and such, that
everything looks to be coming from that individual, everything
looks the same, just the email address may be slightly or just
something a little bit off. Companies really need to be
vigilant as to looking at who emails are coming in from, and if
they are not sure if it is legitimate or not, they should pick
up the phone and call the person who they are actually getting
this request from. Simply responding to that email, you are
responding back to the criminal. Of course, they are going to
say, oh, yeah, I am so-and-so, and I need to get this
information to finalize a report for the board. They are
further spoofing. They just need to be careful when they are
responding, and as Mr. Snow had mentioned, making sure that any
websites they go into do have the https that would mean that it
is a secured website.
Chairman CHABOT. Thank you very much.
Mr. Dunn, I would follow Mr. Mankowski's advice, except
that I am out of time, and I like to hold myself to the same
rules I do everybody else. So I will yield back my time, and
the gentlelady, the Ranking Member is recognized for 5 minutes.
Ms. VELAZQUEZ. Thank you, Mr. Chairman.
Mr. Mankowski, last week we had the Commissioner of the IRS
here testify before our committee, and he talked about the
Cybersecurity Summit between the IRS and tax practitioners.
From the industry perspective, do you believe this partnership
is effective at preventing tax fraud?
Mr. MANKOWSKI. I think it is a very good first step, and
they have already shown that it has been successful. They have
met with, and they have included initially people from State
associations, State government, as well as the banking and
software community, to work on trying to prevent tax returns at
the onset when they are being processed into the IRS system.
They have gone further and expanded their focus now to starting
including practitioners into their groups, and they are
estimating that last year, with the first year of their summit,
they prevented in excess of 3 million fraudulent returns from
getting into the system. Now they just need to understand that
returns are, unfortunately, getting through the filters, so now
they need to keep working on filters during the processing and
primarily protecting the refunds because that is taxpayer
dollars, as well as government funds, that are being
misappropriated.
Ms. VELAZQUEZ. Thank you.
Mr. Snow, I am concerned that typically, small business
owners view an investment as a way to increase revenues, yet,
with cybersecurity they are expected to make an investment in
order to prevent revenue losses. So is it often hard to
persuade small firms to spend money without seeing an immediate
return? What needs to be done to bridge this gap?
Mr. SNOW. I think the number one issue that we have as a
small business is that every single thing leads to the bottom
line. Every decision you make adds a cost. In our case we have
added insurance, cybersecurity insurance, to our overall cost.
The unfortunate part of that is that the deductible is very
high. It is a $5,000 deductible. For me, I am out that
immediately. That is the same as my burglary insurance as well.
When we have someone break into our building, which happened a
few months ago and they destroyed our security system, it cost
us $5,000, which is also our deductible. We are out that money.
That happened to be all the revenues that we had for that
particular month. So it really eats into our bottom line. It is
very expensive.
Ms. VELAZQUEZ. Mr. Dunn, in your estimation, how much would
it cost a company, a small company, one with fewer than 250
employees, to become cyber safe?
Mr. DUNN. I think it is very hard to provide that
estimation because it really depends on the data that they
hold, the types of inputs and communication channels they have.
We could be talking about a very simple setup or we could be
talking about a very complicated setup. It is true that the
cybersecurity industry has a certain price point that currently
is very difficult for small business owners to take part in.
Certainly, we are probably talking thousands of dollars in
order to get consultative help.
Ms. VELAZQUEZ. Thank you.
Mr. Oldham, who do you think is best situated to handle
cybersecurity threats, the federal government or private
industry? Or do you think some sort of balanced public-private
partnership is needed to properly address cybersecurity needs?
Mr. OLDHAM. I think the balanced public-private partnership
is the key. This industry is evolving so rapidly, and when the
government gets involved, it becomes very static. I think it is
important to make sure the private sector has a huge input, and
that is why I think something like in this framework is a great
start because it is voluntary. It attempts to coalesce the best
standards that are out there, but it is also something that has
a recognition that it needs to evolve over time. My worry is
tipping the scale to one side or the other will cause the
current industry to stagnate more.
Ms. VELAZQUEZ. What type of recommendations would you offer
for encouraging that type of partnership?
Mr. OLDHAM. Number one, supporting NIST's efforts and what
they are doing. Right now, NIST has put out a framework. It has
had some widespread success but also quite a bit of criticism
from industry. They held a workshop last month where they heard
from several sectors of the industry, including small business,
that it is not really approachable and useful. Just as a big
picture, the NIST framework was designed for critical
infrastructure, so it is not approachable for small businesses,
ensuring that the NIST is putting the appropriate emphasis on
adapting itself to particular market sizes and industries.
Chairman CHABOT. The gentlelady's time has expired.
Ms. VELAZQUEZ. Thank you.
Chairman CHABOT. Thank you.
Ms. VELAZQUEZ. Thank you, Mr. Chairman.
Chairman CHABOT. The gentleman from New York, Mr. Gibson,
is recognized for 5 minutes.
Mr. GIBSON. Thanks, Mr. Chairman. I appreciate the
opportunity here today to hear from the panelists' illuminating
testimony provided.
Mr. Snow, I want to begin with you, just a point of
clarification. You, in telling us about what had happened to
you, you had made the comment that, fortunately, within 48
hours you were able to take action. What was implied in your
statement is we have a differentiation between business and
personal liability or accounts. I am looking for clarification.
Is there some dimension of FDIC that protects people? Why is it
different? If you could just help me understand that, number
one.
Mr. SNOW. Number one, I do not know the exact
ramifications. My understanding was because it was a wire
transfer there is a 48-hour time that it runs. If you can stop
it within that timeframe, the money does not actually transfer
or they can call it back, the bank, with the interbank
processes.
Mr. GIBSON. Do any other panelists know the answer for
that? Why is it that business does not seem to have the same
protection as an individual? One of my constituents out there,
if somebody was to do a phishing expedition on them and they
would be under similar circumstances, I am curious if anybody
knows the answer to that.
Okay, for the Committee, I think that is something probably
worth checking into. A concerning situation. I am glad it
worked out okay for you there.
Then Mr. Oldham--even though I know that it was Mr. Snow--
it was very burdensome and onerous on your bottom line based on
you had to divert resources. Mr. Oldham, in one of your
comments you talked about that the Federal Government might
want to look at clarification or clarity in terms of what
companies must do when these circumstances happen, reporting
requirements and the like. What is your understanding of what
the SBA requires now with regard to--or the United States
Government--in terms of a protocol when a company faces an
attack?
Mr. OLDHAM. I am not aware of anything from the SBA, but
the notification requirement at large are a hodge-podge. If it
involves financial information, the Gramm-Leach-Bliley Act
would require notification. If it is healthcare information,
regulations under HIPAA would require notification. Each of the
State data breach laws have different definitions, and I think
one of the key concerns, especially if you are a small business
and you may have information involving people from multiple
jurisdictions or multiple types of information, there is an
enormous cost of just figuring out what you have to do at the
beginning.
Mr. GIBSON. I appreciate that comment. In fact, it mirrors
some of my experiences in the U.S. military. I think that is
also worthwhile for the Committee to capture that. Maybe we
should consider a clearinghouse requirement that really
socializes, if you will, what companies must do under these
circumstances.
Finally, for the panel, I would love to hear your insights
on this question, that with regard to science and technology,
research and development, sort of blue sky, if you will, what
do you think, based on your experiences, would be a worthwhile
endeavor to address the issue of cyber attack at large--on
businesses, on people, on government--on where you think we
should put emphasis on for science and technology, research and
development, to protect?
Mr. DUNN. I think in most cases, every incident I have ever
been involved with, the visibility of what is actually
happening from a data and packet level is never where it needs
to be. I would definitely like to see strides in that
direction, some way of increasing the ability for us to
understand from a network and data perspective what has
happened in a given scenario.
Mr. GIBSON. Thank you.
Mr. SNOW. I think the most frustrating thing for me was to
realize that someone at the receiving end of that money was
going to show up and get that money, and that there was no
action taken. On my private credit card thefts, purchases were
actually made. The merchant was out of that merchandise.
Obviously, they got the money for that merchandise, but we
absorb it as all of the consumers in the overall doing
business. There is no authority trying to stop these people,
that I know of, trying not catch these people who are making
these purchases with fraudulent credit cards or other things.
That is the frustration that I have. I know that I can call my
local police when they break into my building. If I walk into a
bank and demand money, the FBI will be chasing me forever. But
in this case, there is really no action that is done beyond
what we had to do as individual business owners.
Mr. GIBSON. Thank you. Mr. Chairman, I see my time has
expired. I wonder if maybe science and technology, research and
development into biometrics, is a possibility as a surety for
any kind of transaction is worth our endeavors. But I thank the
Chairman for the opportunity.
Chairman CHABOT. Thank you very much. The gentleman's time
is expired.
The gentlewoman from North Carolina, Ms. Adams, who is the
Ranking Member of the Investigations, Oversight, and
Regulations Subcommittee is recognized for 5 minutes.
Ms. ADAMS. Thank you, Mr. Chair. Thank you, Ranking Member
Velazquez, for hosting this hearing.
Some of you have mentioned the importance of education and
training in cybersecurity. I am long-time educator and very
interested in what we can do there.
The Federal Government is involved in this in a number of
ways. For example, last year, the Obama Administration
announced the New Cybersecurity Consortium consisting of 13
Historically Black Colleges and Universities, HBCUs, two
national labs, and a K-12 school district. The goal is to
create a sustainable pipeline of students focused on
cybersecurity. My question to any of you, is the Federal
Government doing enough to provide the kinds of expertise that
small businesses need to ensure their cybersecurity? If you
could speak to maybe some relationships between educating
students beyond this point.
Mr. MANKOWSKI. Ms. Adams, I will start the discussion. I
believe that from a tax standpoint, the amount of education
really starts from the government, from the IRS. As
practitioners, we are continually discussing this with our
clients that the IRS, with the different phishing phone calls
and the email scams, that the IRS currently is not phone
calling or emailing people. If they get any of these calls,
they should hang up. If they get a email that says it is from
the IRS, that they have an extra refund, just delete it,
because they are not going to be authentic. But every day
during tax season, it seemed my office was getting a phone call
from someone who received a phone call that they were getting
ready to get arrested. My partner in my firm had gotten a
similar phone call. We actually had a little bit of fun with
the people. We kind of strung them along for a little bit. But
as times are changing, with the rules that were passed recently
with collections within the IRS, some of that, as the
collections get outsourced, the companies that are going to be
taking over will be calling and could potentially be emailing
our clients. It is going to create an even greater disparity of
the education because what we have been telling our clients for
years, come whatever point that the IRS is able to implement
that process, everything we have worked on and gained with our
clients over the last few years will pretty much be thrown out
if they start getting phone calls from a collection for old tax
balances. Thank you.
Ms. ADAMS. Mr. Oldham?
Mr. OLDHAM. I think there are two separate issues; both are
very important. One is educating students as they come up about
cybersecurity. That is critical. Just like educating people how
to balance their checkbook to keep good financial sense,
teaching people good cyber hygiene is going to be imperative
for minimizing the cyber threats in the future.
Today, educating small businesses can be more challenging
because they have not had the years of education, such as a
secondary student. However, the biggest issue that I see is
that there is not a lot of helpful information out there that
is practical and granular for small businesses. In fact, in
preparation for my testimony today, I searched around the
internet looking for small business guides and was surprised
that in many locations, including on government websites, the
links were broken, the guides were out of date, or the guides
were so high level that I do not know how an owner-operator
without IT security background would be able to implement
security measures based on those guides.
Ms. ADAMS. Okay. Well, let me move on to another question.
Online marketplaces, such as eBay, have given small businesses
greater access to suppliers and customers abroad. A McKinsey
Global Institute study found that 97 percent of U.S. small- to
medium-size businesses on eBay engage on export to other
countries. My question is, do these marketplaces and
international transactions expose small businesses to greater
cybersecurity risk?
Mr. Dunn, if you want to answer that?
Mr. DUNN. I think the websites themselves and the online
marketplaces do have to be vetted, do have to be verified to
understand if they have any security flaws because, having a
security flaw in a marketplace like that will expose the vendor
and the small business to potential attacks. Understanding if
there are any flaws in that marketplace is really critical.
Ms. ADAMS. Quickly, Mr. Dunn, you talked about the use of
cloud computing. What is the best way that small businesses
could benefit from using cloud providers to improve their
security?
Mr. DUNN. I think not doing conventional IT in-house is a
good move. Using email and file storage from a cloud service
provider will be beneficial because it is not on premises, and
typically, the major providers of those services are doing a
lot in security and more than a small business could do.
Ms. ADAMS. Thank you. I am out of time, Mr. Chair. I yield
back.
Chairman CHABOT. Thank you very much. The gentlelady yields
back.
The gentleman from Mississippi, Mr. Kelly, is recognized
for 5 minutes.
Mr. KELLY. Thank you, Mr. Chairman. I thank each of you
witnesses for your insight here today.
First of all, I would like to echo what the gentleman from
New York, Mr. Gibson said. I think it is important for us as a
Committee to find out if there are different rules for persons
and small businesses and then large corporations to make sure
that we are protecting each of those in an appropriate manner.
Second, Mr. Snow, it is a travesty what happened to you,
but that story is repeated over and over again across this
nation. As a former district attorney, I can tell you that
there is a lot of room that we can improve in this. Do you have
any specific areas that you think the Small Business Committee
or the Small Business Administration can help to either educate
or inform the general public and small business users that we
can take forward?
Mr. SNOW. Thank you. I believe that education is probably
the key. Obviously, cost is another big concern for every small
business. When you start a business, capital is usually at a
premium, and when you sit down, in my case, I have close to
70,000 members who come in and race at my track throughout the
time that we have been open. I have their data, and it is in a
server that I have to protect. That is a concern. My software
is provided by a Belgium-based software company, so I have to
have access to them. They come in at night to update and
upgrade the system on a regular basis. In an international
marketplace that we are in, I think education is very important
so that the small businesses understand. The other issue is the
liability is significant, and a lot of small businesses do not
understand that. When I sat down with my insurance agent to
renew our insurance, that was one of the questions I asked, and
I was amazed, number one, at the cost to get the coverage, but
number two, how few businesses actually apply and get that
coverage. It can be very expensive for a small business.
Mr. KELLY. Mr. Oldham, going back, as I said, first of all,
thank you for your service as a prosecutor. I think they are
some of the most important people enforcing this law, and being
a former one, I am obviously biased in that. But I thank you
for your service. As a former district attorney, I was on the
local level or I was on the State level, and you as a Federal
prosecutor. Quite commonly what I saw is that, number one, when
small businesses or individuals are victimized, they do not
know who, how, what they need to report.
The second thing that I saw is quite often the
jurisdictions are not clear. It is not clear where it is coming
from, and they do not inform other jurisdictions, so they do
not know if it is Federal, they do not know if it is State,
they do not know if it is county, they do not know if it is the
next State over. It is outside the jurisdiction of this
hearing, but I think it is important that we inform law
enforcement on how to deal with this and small businesses on
how to inform law enforcement so there is a database that we
can use to stop this. Do you have any ideas in that area?
Mr. OLDHAM. I would say generally the jurisdiction issue is
a major issue in prosecuting cyber crime cases. The resources
are not there at the local level and it is hard to chase
criminal information that is as wide as the web and tracks lead
everywhere in the world.
I think, going back to the education point from earlier,
training local enforcement who are going to get the calls from
businesses that have been breached on who to report to, who is
the right person in the Federal Government who can help, or
where is this database, as you mentioned, would be incredibly
helpful to make sure the information is not just coming in for
prosecution, but also going out to help the small businesses
around the country.
Mr. KELLY. On that same line, quite often, these people who
take advantage of small businesses or individuals move from
jurisdiction to jurisdiction, and there is not any database
that gets us ahead of the curve. Quite commonly, they use the
same scheme. From Mississippi, they will move to Alabama, they
will move to Tennessee, they will move to New York City, but
they continue to do that. Are you aware of any Federal database
which keeps up with ongoing scams, especially those that are
quite frequently the same group or persons or organizations
that are doing the scams?
Mr. OLDHAM. I am not. In my role now in advising private
companies, I know we call the local law enforcement, usually at
the Federal level, to report information, and we rely on them
to come back to us with whatever information. But not with a
lot of visibility of what is going on behind the scenes.
Mr. KELLY. Are you aware of any program, and this is for
any of you, from the SBA or from anyone else that keeps people
informed of what the current scams are and the current phishing
expeditions and those things? Because quite frequently, people
fall victim to something that has been used over and over. Is
there anything that keeps people informed where they can go to
one source and see that?
Mr. MANKOWSKI. I know that the IRS does release what they
consider to be their ``Dirty Dozen,'' which are the top tax
frauds that they are suspecting or they are seeing in any given
year. What I have seen, especially with a lot of the phishing
and the phone calls, is that initially, some of the local news
stations were not all that keen on picking up on it, I believe
until they started to realize that even some of the people, the
top people within the IRS were getting the same phone calls as
you and I may be getting, saying that they are about ready to
get arrested or your wife is getting arrested or the sheriff is
coming to take your car. Now the news stations are broadcasting
that the IRS does not make the phone calls. They are getting
the word out, which is good, because by getting it out on the
news on that end, they are not using any of the budget that is
constrained within the IRS at this time.
Chairman CHABOT. The gentleman's time is expired. Thank
you.
The gentleman from New Jersey, Mr. Payne, is recognized for
5 minutes.
Mr. PAYNE. Thank you to the Chairman and to the Ranking
Member. I appreciate the opportunity to be here, and to all the
witnesses, thank you.
I want to ask, would it make sense to coordinate
cybersecurity efforts that are focused on small businesses
through the SBA? My thought is that if business owners are more
informed of computer security techniques and products to secure
their networks, we may be able to help curtail some of these
cyber attacks. Does that make sense?
Mr. DUNN. Yes, I think so. I think having coordination and
a place where really, truly, detailed information about threats
and what to do about them is put at and made available to small
businesses, would be excellent.
Mr. MANKOWSKI. Just as a comment on that as well, one of
the areas as far as coming out with too much specifics as to
what you need to do, you are then laying out the playing field
for what the criminals need to do to get around your system.
That was evident, 2 years ago when the IRS released that no
more than three refunds in a calendar year can go into a
specific bank account. Through a lot of reverse engineering,
they found out that if you start putting a zero before the
account number and a second number and a third zero, it was
tricking the IRS systems and the banks were disregarding it. It
is nice to have the education, but they need to be aware that
too much specifics as to what you are doing or what you need to
do, you are laying out a simple playing field for the bad guys
to just circumvent.
Mr. OLDHAM. I think consolidating information in a place
like the SBA would be very helpful. Mr. Dunn had mentioned the
FCC planning tool earlier, which is a good start, but that is
an agency that has jurisdiction over telecommunication
companies. I do not think a small retailer or other companies
of that nature would be going to the FCC's website. I think you
want to be able to have those resources in a place that folks
are willing to call or to search for.
Mr. PAYNE. Sure. I think it would be a natural depository
of information. They are already dealing with the agency, so
that is something that might make sense.
Unfortunately, even when consumers receive notification of
a security breach, many of them do nothing about it or just do
not know what to do and the next steps to remedy the breach.
What should they do to protect themselves from increased risk
of identity theft?
Mr. SNOW. I have got a number of levels of security systems
that I have put in place. Number one, I have an external server
provider that has a junk mail box. So anything that does not
look accurate or looks not quite right, it goes directly into
the junk mail. I have an internal system within my network in
the building that also looks at that, and that has a separate
junk mail file. So if it gets through the first level of
protection, it then goes to the second level, at which point
the user would have to override that junk mail from both
levels. That is one.
Going back to your other question, I think for me as a
small business owner, consistency is very important. As the
other members mentioned, every state has a different
jurisdiction, and for me as a small business owner, I have
customers all over the world. If I were ever to be breached and
that data was accessed, I would have a number of different
jurisdictions to go after and figure out what I need to do.
There is a tremendous cost in that.
Mr. DUNN. I think to the point of defense in depth and not
relying on any single point of failure, that is pretty key. The
concept of having several things that ultimately would have to
be bypassed is typically the best approach instead of just
having one particular thing.
Mr. OLDHAM. One thing that your question raises is the fact
that many Americans are receiving these breach notification
letters and they all give the same advice: monitor your
accounts, sign up for credit monitoring. It seems like maybe a
better way of getting at that is general consumer education as
opposed to forcing companies to send out these notifications
that many of us receive every week, every month, and doing it
maybe a slightly different way that is more impactful for the
consumers.
Mr. MANKOWSKI. Finally, from a tax perspective, people,
taxpayers, if they do receive one of these breach notifications
and find out that they have been a victim of identity theft,
they need to not only report it to the three credit agencies,
they should also file a specific form with the IRS, which would
put them on notice that they were a victim and that to be
careful for a fraudulent tax return coming in from them.
Mr. PAYNE. Thank you, Mr. Chair, I yield back.
Chairman CHABOT. Thank you very much. The gentleman's time
is expired.
The gentleman from Missouri, Mr. Luetkemeyer, who is the
Vice Chairman of this Committee, is recognized for 5 minutes.
Mr. LUETKEMEYER. Thank you, Mr. Chairman.
Mr. Oldham, quick question for you. We have seen that cyber
attacks come in all shapes and sizes and go after businesses of
all shapes and sizes, including government agencies, such as
the NSA and Office of Personnel Management. While no one thinks
that one size can fit all, should not every business and
government agency that handles highly sensitive data have some
reasonable, but also mandatory, policy and procedure in place
for security data against loss and theft?
Mr. OLDHAM. Absolutely there should be policies in place
that is standard and mandatory at any government agency that
handles sensitive data.
Mr. LUETKEMEYER. It is interesting. Mr. Snow talked about
an insurance policy in place. Can you elaborate just a bit, Mr.
Snow, with regards to availability and cost and coverages of
insurance policies that are out there for cyber attacks? Does
it count for your monetary loss or losses to your customers?
Does it also cover the liability exposure that you may have to
other customers that do business with you?
Mr. SNOW. My understanding is it covers the notification
mandates that are required around the country. What would
happen, from my perspective, is that I would notify the
insurance company, and they would immediately come to my aid in
terms of notifying all the customers that their data may have
been breached, and also to provide that security to the
individual that had the breach in terms of credit reporting and
other things. That was my understanding. That was the least
expensive of the policies that are out there. There is a whole
gamut of different insurance policies that you can get, I am
sure covering all the way up to the large liabilities. We have
also, on top of that, an umbrella policy that we hope will
cover what we feel--in our case we have a $2 million liability
policy--we hope that we will not exceed that in any particular
breach, but it is an uncertain area.
Mr. LUETKEMEYER. Mr. Oldham, you advise people on the risks
that they incur. I would assume you have a pretty good
knowledge or extensive knowledge of the availability of these
things and how far they go and the costs?
Mr. OLDHAM. Insurance policies. I am not an insurance
lawyer, but certainly that comes up in cases. There is a wide
range. To the cost in general, it depends on the number of
pieces of data, such as affected individuals. If I am advising
a client who has to give notifications in 30 different States,
that is 30 different statutes that have to be reviewed to do
that.
Mr. LUETKEMEYER. So it is basically a policy that is
tailored to the individual risk?
Mr. OLDHAM. Yes, again, I am not an insurance lawyer, but
when these insurance policies do come up and we have to look at
them, there is a great variation. I am not aware of a standard
insurance policy, and I think Mr. Snow, that is probably what
your experience was that you were talking about, the
marketplace is so new at this point.
Mr. LUETKEMEYER. It seems to me that that is a burgeoning
area of need, obviously, and so we will see how it develops.
Along that line, Mr. Dunn, you mentioned a while ago that
for small businesses that do business with the government, is
there a possibility of compromising government information with
those businesses and, therefore, they are exposed for a
liability situation? Is there something in the contract that
protects them, or do they need to be covering a risk there? How
does that work?
Mr. DUNN. I do not know necessarily about a contractual
obligation. I think from the perspective of interconnecting
systems or share of data there is a liability in either
direction. If an attacker was to gain access to a small
business that services a government client, the assumption is
either the value of the data or some direct connectivity to the
government agency may exist.
Mr. LUETKEMEYER. We have an exposure there you need to be
careful of, right? As a business, you are going to have to have
some sort of, I would think, an insurance policy or some bond
of some kind that would protect you in case something went
wrong.
Mr. DUNN. I think the whole area of cybersecurity insurance
is quite new and fairly immature. I do not know an awful lot
about it, but I often wonder what do you have to do in order to
be insurable and how do you stay insurable. That may have some
kind of compliance or regulatory check.
Mr. LUETKEMEYER. I have always thought that the insurance
companies are going to drive this issue because at some point
they are the ones that are going to have to insure the issue,
and therefore, they are going to demand certain standards. When
those standards are out there, they are going to be the ones
driving how this is all done.
Mr. Chairman, I yield back the balance of my time.
Chairman CHABOT. Thank you. The gentleman yields back.
The gentleman from New York, Mr. Hanna, who is the Chairman
of the Subcommittee on Contracting and Workforce is recognized
for 5 minutes.
Mr. HANNA. Thank you. Thank you, Chairman. Thank you all
for being here.
I want to talk about a bill--Mr. Payne actually mentioned
it inadvertently--I coauthored with Derek Kilmer from
Washington. It is the Improving Small Business Cybersecurity
Act of 2016. We have 900 small business development agencies
around the country. This bill, which would cost, we estimate
almost nothing, would authorize and change the Small Business
Act and direct these SBDCs to offer cyber support services to
small businesses, again, at no additional cost. We would simply
be leveraging the SBDCs cyber support services, DHS, and
Department of Homeland Security, and the Small Business
Administration would simply be required to review current
Federal programs and develop, along with the SBDC, a
cybersecurity strategy to help in all communities throughout
the country. I want to ask you a question, Mr. Dunn, and anyone
who wants to weigh in, it sounds like this problem is, at the
very least, a moving target, and it is not just a moving
target; it is an intellectually moving target. It is a one-
upmanship. It is a constant game, cat-and-mouse type of thing.
You mentioned in your statement, Mr. Dunn, and I apologize
for being late to this hearing, training needs to be offered
but it tends to be too general. Is it a practical thing to talk
to a small business person who may have one or two people and
still have enormous impact potential against them. Is it
practical in today's world to ask a person to be up to speed in
the way they need to be, not just today but going forward. How
do you manage that Mr. Oldham, anybody interested in answering
that?
Mr. DUNN. The concept is giving them-specific advice on the
things that really matter to them. If the example is perhaps
they want to offset their email services to a cloud provider,
telling them specifically the settings that would be useful to
turn on and the benefits is better than just telling them about
general awareness concepts about the dangers of email, for
example.
Striving for this education around data as being the factor
considered the most, you do not have to be up on all the
security concepts that currently are happening, but you do have
to understand what data you have, the value of it, and then
what you should do based on the different value of the
different data that you have.
Mr. HANNA. In that sense, Mr. Oldham, anyone, so it is
practical to do certain minimal things that help people broadly
to limit the possibility of an attack? Mr. Oldham?
Mr. OLDHAM. I think when you step back to the risk
management aspect and not just to the zeros and ones, it is
very important, as Mr. Dunn said, to focus on what the issue
is, and it is usually driven by the types of data. Certain data
is more sensitive than other data. Providing high-level
guidance that says cybersecurity is important, you should have
good cybersecurity, is not helpful to small businesses. It is
helpful to provide targeted advice that is practical and
granular to their specific situation.
Mr. HANNA. The Small Business Development Centers around
the country, the 900, would it be possible for them to
establish a basic format that would help the majority of small
businesses out there without making it too complicated,
difficult, and would it be helpful?
Mr. OLDHAM. I think it would be helpful as long as they
have the right expertise going into that guidance. One of the
issues that happens in this space is guidance gets put out but
it does not evolve with the threat. That is one of the big top-
level messages, this threat evolves rapidly, and so do the
legal requirements.
Mr. HANNA. If the Small Business Development Centers were
able to do this updating, they could be a source in that
community, rather than so many randomly small businesses trying
to do it on their own and maybe not being entirely effective in
that?
Mr. OLDHAM. It sounds very promising. Yes.
Mr. HANNA. Thank you. Chairman, I yield back.
Chairman CHABOT. Thank you. The gentleman yields back.
I want to thank our witnesses for being with us here today.
They have helped to clarify just how vulnerable many small
businesses and individuals are to cyber attacks. It is a
growing and evolving problem, and you have helped shed some
light on what should be done to combat it. For that we thank
you very much.
I ask unanimous consent that members have 5 legislative
days to submit statements and supporting materials for the
record. Without objection, so ordered. If there is no further
business to come before the Committee, we are adjourned. Thank
you very much.
[Whereupon, at 12:15 p.m., the Committee was adjourned.]
A P P E N D I X
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
Statement of
Nicholas A. Oldham
Counsel
King & Spalding LLP
before the
U.S. House of Representatives
Small Business Committee
April 20, 2016
Chairman Chabot, Ranking Member Velazquez, and members of
the Committee, thank you for the opportunity to appear before
you today.\1\
---------------------------------------------------------------------------
\1\ The views and opinions expressed in this statement are mine and
do not necessarily reflect the views or opinions of King & Spalding or
any of its clients.
I have been involved in cyber issues for many years--as a
former federal prosecutor at the U.S. Department of Justice and
now as an attorney with King & Spalding. In my practice, I
counsel clients, both large and small, on the legal aspects of
---------------------------------------------------------------------------
cybersecurity risk management.
Today, I focus my testimony on the cybersecurity landscape
for small businesses, and on three areas of particular
concern--the cybersecurity education gap, the need for
cybersecurity initiatives to be calibrated for small
businesses, and the need to clarify and simplify the current
regulatory environment.
Background
We are living in exciting times. Digital assets and
connected systems have generated new products and services,
redefining how business is conducted and services delivered.
But the truth is that we are only at the beginning of the
beginning when it comes to understanding the implications of
our reliance on this interconnectivity and the dangers that
cyber threats present.
Our interconnectivity is growing at an astonishing rate,
with some estimates that there will be as many as 50 billion
devices connected to the Internet by 2020. As a result, we are
marching toward an infinitely connected world: always online,
our information moving from network to network and device to
device.
Partly as a result of this interconnectivity, businesses
are gathering and utilizing an ever-growing amount of
information to improve their business practices and better
serve their customers. Today, every online communication,
transaction, and anything else you can think of can be captured
and stored, and then transmitted electronically anywhere and at
anytime. This interconnectivity, especially including the
Internet of Things, holds tremendous promise for consumers and
companies.
It also creates new challenges in terms of cybersecurity
because anything connected to the Internet can be hacked. Cyber
threats vary from the technologically sophisticated to the
surprisingly low tech methods such as ``social engineering''
and spear phishing. A recent RAND Corporation study found that
over a quarter of American consumers received a notice that
their data was stolen within the past year alone. Forbes
recently reported that cyber-attacks cost businesses an
estimated $400-500 billion per year, and because many cyber-
attacks are not reported, it is believed that the real number
is significantly higher. These reports underscore the
significant costs of preparing for, responding to, and
recovering from cyber incidents.
Where do small businesses fit in this landscape? The
interconnected world enables small businesses to develop new
products and services and compete across the globe. However,
growing cyber threats presents greater challenges to the same
small businesses, which can lack the tools needed to
effectively cope with the growing danger.
Small businesses are appealing targets. Small businesses
often have more digital assets than individual consumers, but
their resources may not allow for the same level of focus on
cybersecurity as large companies.
Businesses of all sizes need adequate cybersecurity
education, but it can be difficult for small businesses to find
the right information and training.
Small businesses also often feel the impact of cyber
threats differently than large companies. Establishing
effective cybersecurity and incident response mechanisms is
complicated and can be expensive. When any business implements
mitigation measures or responds to a cyber incident, it can
lost significant time and money. The costs can sink a small
business. Small businesses get burned at both ends--they are
less likely to have the resources to prevent breaches and they
also may have fewer resources to respond to those breaches.
From Cyber Threat Awareness to Cyber Risk Management
In June 2011, various Committees in both the House and
Senate held hearings regarding data breaches at Sony and
Epsilon Data Management. In March 2012, then-FBI Director
Mueller gave a now famous speech at the RSA Conference in San
Francisco. His oft repeated quote is that ``there are only two
types of companies: those that have been hacked and those that
will be.'' These events were key, early moments that helped
raise awareness of cyber threats. We have much farther to go in
terms of awareness and, perhaps more importantly, companies
need to move from awareness to expertise in managing the new
normal of cyber threats.
As a lawyer, I do not manage corporate networks or conduct
vulnerability testing. Rather, I believe that cybersecurity is
as much a people and process issue as it is a technical issue.
I focus on the people and process side of the equation,
addressing the legal and business cybersecurity risks faced by
companies including cybersecurity risk governance, compliance,
and incident response processes. I also help companies comply
with breach notification obligations, interact with various
regulators, and manage their responses to regulatory actions or
litigation. The legal and business costs, including compliance
costs, drain on employee time and morale, and reputational
damage, can be significant.
The Cybersecurity Education Gap
Before spending precious resources on increasing
cybersecurity measures, it is natural for small businesses to
carefully weigh the cost of putting new measures into place
versus the cost to the company of the inevitable cyber incident
if it does not take action. Because of the enormous potential
costs of a cyber incident, which is difficult to quantify,
companies may find that it is far more expensive to not
implement basic security measures. The problem here is that
there is a cybersecurity education gap: small businesses may
not be able to get the information they need to properly assess
and mitigate these costs.
Bridging this education gap can be difficult for small
businesses, especially those that lack the resources to hire
specialized employees or cybersecurity experts. Basic resources
are available online, but even where they provide crucial
information, they can be difficult to find, are rarely updated,
or are inadequate.
On the legal compliance front, the Federal Trade Commission
recently released a new web-based tool for developers who make
health-related apps. The tool asks developers a series of 10
high-level, yes or no questions related to their apps covering
topics such as the apps' functions, data they collect, and the
services they provide. Then, based on the answers to the high-
level questions, the tool identifies four potentially
applicable federal laws. While useful as a starting point for
introducing and orienting developers and other healthcare
industry players to the legal thicket affecting health apps,
the tool provides high-level guidance on the basics of only a
few relevant laws.
The FTC's tool is one example of an approach geared toward
educating the public on legal compliance. The tool is somewhat
promising, but does not cover all relevant laws and does little
more than point the developers to summaries of the relevant
language. This approach, however, could go a long way toward
helping small businesses stay informed on cybersecurity legal
best practices, provided such tools are expanded to cover a
broader set of laws and give more specific, timely information.
In many ways, cyber threats have analogs to traditional
crime. Ransomware is cyber extortion, spear phishing is nothing
more than a con artist taking advantage of the ubiquity of e-
mail. Hackers, moreover, are like burglars. They use their
``gloves,'' ``dark clothes,'' and ``tools'' to get inside a
network, stealing digital loot along the way. In the
traditional crime scenarios, small businesses would likely call
the local police department for best practices in preventing
these crimes or responding to them. In the digital crime
scenarios, there is no one logical place to call. The
government may have a role in bridging the cybersecurity
education gap by encouraging the development of cybersecurity
education resources and connecting them to those who need them
in the private sector.
Existing Programs Are Not Geared Toward Small Businesses
Many of the cybersecurity initiatives receiving the most
attention are not necessarily tailored to take into account the
realities of small business owners. Standards seem to be
coalescing around the NIST Cybersecurity Framework in some
areas, for example, which is a promising development. This has
the potential for simplifying the landscape for small and large
businesses alike.
The current iteration of the NIST Framework, however, is
not particularly geared toward the needs of small businesses.
The Framework itself can be difficult and expensive to
understand and implement regardless of business size, and until
it is better tailored to small businesses, for some of them it
may just be one more program that they cannot afford to keep up
with. Perhaps more importantly, a small business might become
subject to a cybersecurity framework by virtue of its
contractual relationship with a partner that passes its
cybersecurity obligations through its supply chain. In this
case, the small business might agree to obligations under the
cybersecurity framework without the same level of vetting it
might undertake if it were adopting the framework from scratch,
and thereby inadvertently expose itself to significant
liabilities and expose itself and its partners to significant
cyber risks.
While good cyber hygiene is important, to improve the NIST
Framework, and similar programs and policies, the government
should make a serious effort to increase the involvement of
small business owners in all phases of the legislative and
rule-making process. Until small business concerns are fully
baked into these standards, they could face serious challenges
of adoption.
The Current Regulatory Regime Is Difficult to Navigate
The current regulatory regime for cybersecurity presents
additional difficulties for small businesses, who will
inevitably struggle to determine both (1) what cybersecurity
measures they are required to enact, and (2) when a breach or
attack does occur, what procedure the law requires them to
follow.
There are currently 51 different state or territory laws
that pertain to the notifications a company that has been the
victim of a data breach provide to its customers. They are
inconsistent with each other in a variety of ways.
Additionally, several states have enacted laws requiring
companies to put ``reasonable security measures'' in place.
What ``reasonable'' means in this context is evolving and can
differ by jurisdiction and industry. I have seen a growing
number of federal regulatory agencies stepping into the same
space.
The cost of ensuring compliance with laws for any company
is enormous even before taking into account the cost of
litigation and reputation damage if a breach does occur. Small
businesses in particular are vulnerable to these costs because
they can consume a much larger proportion of their available
funds. Small businesses would benefit from a public sector
approach that lowers the cost of compliance and the cost of
implementing best practices.
In short, there is a need to clarify and simplify what
companies must do. Because of the complicated and evolving
landscape, the on-the-ground expertise of the private sector
must necessarily play an important role in these efforts.
Thank you for the opportunity to testify before you today.
I look forward to your questions.
NATIONAL CONFERENCE OF CPA PRACTITIONERS
22 Jericho Turnpike, Suite 110 T: 516-333-8282
Mineola, NY 11501 F: 516-333-4099
Chairman Chabot, Ranking Member Velazquez and members of
the Committee, thank you for inviting me to testify today. My
name is Stephen Mankowski. I am a Certified Public Accountant,
Executive Vice President of the National Conference of CPA
Practitioners, (NCCPAP - the countries' second largest CPA
organization) and a member of the American Institute of CPAs
(AICPA). NCCPAP is a professional organization that advocates
on issues that affect Certified Public Accountants in public
practice and their small business and individual clients
located throughout the United States. NCCPAP members serve more
than one million business and individual clients and are in
continual communication with regulatory bodies to keep them
apprised of the needs of the local CPA practitioner and its
clients. Accompanying me is Mr. Sanford Zinman, National Tax
Policy Chair of NCCPAP.
My firm, E.P. Caine & Associates CPA, LLC, has been
preparing tax returns for over 30 years. My firm annually
prepares well over 2,000 small business and individual tax
returns as well as sales tax returns, payroll tax returns,
highway use tax returns and Forms W2 and Forms 1099
informational returns. We are in the trenches with clients
discussing their tax, financial and personal issues, and the
impact events and proposed tax law changes may have on them.
Although our clients are mostly in the Pennsylvania, New York,
New Jersey and Delaware areas, we serve clients in over 30
states and also provide services to clients in Canada and
Europe. In this respect our practice is the same as many
members of NCCPAP and other smaller CPA firms throughout the
United States.
NCCPAP has been at the forefront of identity theft issues
through our advocacy and testimony at prior hearings dealing
with ID theft in June 2012. The initial hearings focused on the
refund scams that were prevalent at the time, such as Mo Money.
NCCPAP has remained vigilant on the topic and has been
discussing these issues annually when our members meet with
Congress and their staff and with IRS representatives. Our
members have helped guide numerous taxpayers who have been
victims of ID theft to navigate through the IRS to minimize the
risk of further consequences.
ID theft has been growing exponentially for years. It seems
that no matter what controls are put in place, criminals have
better and more focused resources to circumvent these
safeguards. All businesses are at risk, from the largest to the
smallest. Weekly, we are hearing about the latest business to
be a victim of some level of cybercrime or ID theft. Mr.
Richard Snow, who is also on the panel of witnesses today, has
been a victim.
All businesses are at risk, but CPA firms and tax
practitioners are at a greater risk. The IRS reminds tax
preparers that they must be vigilant with their system
integrity. The criminals are aware that the ``prize'' for
breaching tax practitioner systems could yield them not only
names and social security numbers, but also several years of
earnings as well as bank information and dates of birth. Thus,
the IRS recommends that tax preparers create a security plan.
IRS Publication 4557, Safeguarding Taxpayer Data, provides
suggestions and a checklist. My firm has reviewed the
Publication, continually trains our staff and, along with our
IT consultants, monitors our information and controls to ensure
that our offices not only meet but exceed these suggestions.
Our network logs usage form all users and is monitored to
ensure no unauthorized access. This includes staff with remote
access to our server. We also require a user id and passwords
to gain access to all of our software packages. Not all firms
have been as fortunate regarding cyber security. Two Midwestern
firms were compromised this tax season and had fraudulent
returns filed through their electronic filing identification
number (EFIN).
I was able to speak with a partner at one of the affected
firms. They were under the impression that their systems were
secure. However, the breach occurred after installing a new
copier system that had not been properly secured within their
network. Once they determined that they did in fact have a
breach, they attempted to contact the IRS. Unfortunately, there
is no easy means to identify the proper area within the IRS to
contact. Ultimately, it took nearly one month for a response
from the IRS.
Ensuring the security of client data has been and remains
the goal of my firm and we take that task very seriously.
Although our software has the ability to auto-generate the PINs
for electronic filing (EF PIN), we became aware that the EF PIN
was using a portion of the taxpayer SSN. We have opted to not
use this part of our software and have chosen to manually enter
the EF PIN. Some tax software packages use a random five-digit
number and we have suggested our software provider offers the
same option. Taxpayers are also able to obtain their own
specific EF PIN through the IRS website through the entry of
select information. Currently, this system is too new to
ascertain the true effectiveness of the program; however,
concerns exist as to whether the return would reject if this
number was not used or what would happen if the taxpayer lost
this number. It is not clear if there is a mechanism to
retrieve the number from the IRS.
Practitioners are also reminded to protect their EFIN. The
IRS suggests practitioners log into e-services on a regular
basis and verify the number of returns processed for their
EFIN. While the number probably will not be exact due to the
timing of return processing and updating of this service,
significant differences could be a cause for alarm.
Practitioners should contact the IRS e-Help Desk immediately if
the difference is excessive. At the beginning of this filing
season, the tax software community requested that tax
practitioners update their EFIN authorization letter before
they start using their EFIN. This is just another step in
preventing potential unauthorized access to a practitioner
EFIN. While in many cases the timing of this request might not
have occurred at the most opportune time, such as when the
first returns were to be filed, it sent a signal to the
practitioner community that the software vendors understood the
issues and were working in conjunction with practitioners to
address ID theft.
While firms that electronically submit tax returns are
required to obtain an EFIN from the IRS, paid preparers
initially included their social security number on tax returns
and in 1999 were first offered the ability to use a Preparer
Tax Identification Number (PTIN). The requirement to include
the preparer's firm information, which includes their employer
identification number, began in 1978. Given the risks of firm
ID theft, why has the IRS not adopted a firm PTIN?
There are two primary reasons that criminals attempt to
breach systems--the challenge and/or for the information
contained in the systems, both reasons for IRS action. The IRS
has been transitioning to modern technology within its network
protocols to enhance safeguards. During this transition, the
IRS has encountered many of the same compatibility concerns
that affect most businesses. As a CPA, I became aware of this
when the IRS announced the planned retirement of the Disclosure
Authorization (DA) and Electronic Account Resolution (EAR)
options on IRS e-services in August 2013. When the tax
practitioner community complained that the elimination of these
options would have a significant impact on their practices, we
were told that the platform on which these services were
designed was not compatible with the new system architecture
and the initial costs to rewrite the programming was excessive.
The IRS has looked at a relaunch of these services in the
future, but the added authentications might make the systems
overly burdensome.
In March 2015, one tax software vendor had its electronic
processing systems compromised to the extent that the state of
Minnesota and subsequently all states temporarily ceased
accepting electronically filed returns from that vendor. One
positive result of this situation was the formation of the IRS
Commissioner's Security Summit, which initially included
representatives from state governments, banking and the
software community. This group approach was a positive signal
from the IRS that the issues of identity theft and data
security required a multi-faceted approach to work at stemming
the increases in data security and ID theft. Their initial
focus was addressing and stopping suspected fraudulent returns
through the implementation of protocols to address issues with
tax returns before processing and during the initial
processing. According to a recent General Accounting Office
(GAO) report, it is estimated that during the 2014 filing
season the IRS paid approximately $3.1 billion in fraudulent
refunds while preventing $22.5 billion. This was before the
creation of the Security Summit.
In its initial year, the Summit estimates that it has
prevented in excess of three million fraudulent returns from
being processed and refunds issued during the 2015 filing
season, but many fraudulent returns are still getting through.
The Summit has not been expanded to include tax practitioners.
The next level of focus needs to be on securing the refund
process. According to Senator Wyden, the IT budget within the
IRS is now operating at a level lower than it was six years ago
due to budget cuts. The criminals, however, have ample cash and
sophisticated systems. They continually attempt to reverse
engineer the security measures implemented by the IRS. One
recent instance occurred when the IRS announced that only three
IRS refunds would be able to be direct deposited into a bank
account in any calendar year. It was determined that adding
zeros before the account number would trick the IRS systems to
think it was a different account number and allow the refunds
to be deposited. It satisfied the IRS systems while being
disregarded by the financial institutions. This was a case that
I believe the IRS learned a valuable lesson--while you can
publicly address the solutions being implemented, you should
not provide the specifics. The limitation of refunds was
designed as a deterrent, but ultimately only served as a means
of preventing tax preparers from illegally collecting the fees
from a taxpayer refund.
The timing of the receipt of data by the IRS often comes
into question. Often fraudulent returns are submitted with
refunds transmitted long before the data needed to verify the
income and the tax withholding is received by the IRS.
Businesses filing Forms W-2 on paper are required to submit the
data by the end of February, while electronic filers had an
additional 30 days. In addition, an automatic 30-day extension
had been available. Because of the delay in submission of these
information returns, the criminals have begun filing fraudulent
W-2s. In an effort to counter this practice, Congress has
removed the automatic extension for filing paper or electronic
information returns. However, a time discrepancy still
remained. The Protecting Americans from Tax Hikes Act of 2015
(PATH) clarified and simplified these dates. For tax years
beginning in 2016, Forms W-2s will be required to be submitted
to Social Security and Forms 1099-MISC will be required to be
submitted to the IRS with the same due date as to the
recipient. This accelerated timeframe should pose a significant
hindrance for those who submit fraudulent returns. However,
there is still the issue that the IRS will start processing tax
returns during the month of January, usually on or about
January 20, leaving a window for fraudulent tax returns to be
submitted and processed before the IRS has the opportunity to
match data.
The IRS has estimated that it averages approximately one
million breach attempts daily. However large that number might
be, as a taxpayer I would expect that every attempt would be
defeated. Unfortunately, over the past year, the IRS has had
actual system breaches. First, the IRS online transcript
program, ``Get Transcript'', was compromised in May 2015 and
the number of accounts that the IRS admitted were affected has
doubled several times. In February 2016 the IRS announced the
affected accounts exceeded 700,000. The second breech that
occurred recently related to the Identity Protection PIN (IP
PIN) retrieval tool that is contained on the IRS website and is
more troubling than the prior breach. The taxpayers who have IP
PINs have already been victims of tax refund fraud and obtained
the six digit IP PIN to prevent further unauthorized access or
filings. This tool had been using the same interface as Get
Transcript but had remained available to the public and,
unfortunately, those less scrupulous. Finally, the IRS took
this page offline in February 2016, nearly nine months after
the initial Get Transcript breach.
The March 2016 GAO report identified that the IRS has
improved access controls, but noted that weaknesses still
remain. One of the primary concerns addressed by the GAO
surrounds the authentication of the user ID. The IRS has
employed a multifactor approach using two or more factors to
achieve authentication. This provides the basis for
establishing accountability and for controlling access to the
system. Their systems require that Homeland Security
Presidential Directive 12-Compliant Authentication be
implemented for IRS local and network access accounts. This
involves password-based authentication with passwords that are
not found in dictionaries and expire at a maximum of 90 days.
This same protocol should be implemented for all user accounts,
including e-services.
The direct deposit of refunds is a fast, inexpensive and
relatively secure means of issuing refunds. The IRS utilizes
banking's ACH system, whereby a refund goes to a selected
financial institution based upon their respective routing or
ABA number. If an account number exists within the institution,
the refund goes into the account. The IRS is mandated to
process refunds within 21 days, unless additional processing
time is required. Prior to the current Modernized e-File (MeF)
system, the IRS had been operating on a ``accept by Thursday,
refund following Friday'' schedule. Often under the MeF system,
refunds have been processed even quicker. Taxpayers have grown
accustomed to getting the quick refund and now wonder if there
is a problem when it is taking longer than a week for their
refund to appear in their account.
Social Security Administration uses a banking ``pre-note''
to verify the accuracy of the recipient's banking information
prior to the initial payment. The financial institution has
five days to verify the information and notify SSA if there are
errors or discrepancies. Failure to notify SSA could result in
the institution being held liable for the funds if the funds
are misdirected. Unfortunately, the IRS refund system does not
include pre-note account verification. Funds are simply
transmitted through the ACH network to the respective
institution. Once deposited, there is no control on the usage
of funds and often where there is fraud those deposits are
moved immediately upon receipt. The implementation of a pre-
note system could result in a significant reduction of the
annual $3.1 billion misappropriation of government funds.
As discussed, Congress has mandated 21 days for refunds to
be processed. While it is easy to understand that taxpayers
want their refunds processed as quickly as possible, one must
ask a simple question. Is paying a tax refund in seven to ten
days a prudent use of taxpayer dollars? A recent survey by
Princeton Research Associates noted that 22% of taxpayers
surveyed would wait up to six to eight weeks for their refunds
if they knew it would combat identity theft. NCCPAP members
feel that simply using the pre-note technology that already
exists and is used throughout the financial industry would
allow taxpayers to receive their refunds promptly while
reducing fraud.
Unfortunately, despite all of the efforts of the IRS and
Congress to curb ID theft, often the cause is unscrupulous
preparers that are often unregulated by any authority. NCCPAP
urges Congress to pass legislation to provide the IRS the
necessary authority to regulate all tax preparers and required
paid preparer to meet minimum standards. Currently, only CPAs,
EAs and attorneys are subject to the requirements of IRS
Circular 230.
In conclusion, ID theft is an issue that initially gained
traction with Congress in 2012. Much has occurred since the
initial hearings and, unfortunately, the criminals have taken
more steps to obtain information than the IRS has been able to
block. The IRS is not alone in this battle. It seems that not a
week goes by where there is not news of a major corporation
announcing that their systems had been hacked. Taxpayers have
become victims of ID theft through these breaches and do not
necessarily understand the importance of contacting the IRS.
While knowing that the IRS successfully thwarts approximately
one million breach attempts each day is comforting, we should
keep in mind that even one successful breach could be
catastrophic to not only the IRS but to the taxpayer. Often,
taxpayers do not realize they have been a victim of ID theft
until their electronically filed tax return gets rejected. Once
a taxpayer has been victimized, they expect to obtain an IP PIN
from the IRS and starting in January 2017 they will. In
Florida, Georgia and Washington, DC where ID theft has been
rampant, the IRS implemented a voluntary IP PIN program.
Unfortunately, this program failed to achieve the number of
participants to make the program successful.
Taxpayers are urged to protect their personal data, but
with widespread Internet usage, online shopping and criminals
waiting to pounce on unsuspecting victims, ID theft continues
to grow. Individual and businesses remain targets of
cyberattacks and must remain cautious when opening emails and
attachments, visiting web pages and simply paying for the
family groceries.
There are several electronic filing options available to
taxpayers. Many taxpayers use Free File, thirteen IRS-approved
free e-filing tax service sites. In a recent audit performed by
the Online Trust Alliance (OTA), six of the thirteen websites
failed due to poor site security and not taking steps to help
protect consumers from fraudulent and malicious email.
IRS Commissioner Koskinen had the foresight to convene the
initial Security Summit in 2015, which has proven to be
successful. Unfortunately, the criminals always seem to be
pushing the envelope further and further. Their approach is
more focused and better funded. The Security Summit has now
expanded its focus to include additional user groups, including
tax practitioners, to further address cyber security and
develop a multi-tiered approach to combat it. The only way to
truly combat ID theft is to incorporate input from various
sectors of the marketplace. This is a problem impacting
businesses and taxpayers worldwide and will require global
efforts to minimize and hopefully resolve. NCCPAP calls on
Congress to provide the necessary funding to continually
monitor, modernize and upgrade IRS systems to minimize and
eliminate data security breaches. The first step would be
Congress reauthorizing Streamlined Critical Pay Authority to
allow the IRS secure top IT talent without a three to six month
waiting period.
Thank you for the opportunity to present this testimony and
I welcome your questions.
Respectfully submitted,
Stephen F. Mankowski, CPA
Executive Vice President, NCCPAP
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
[all]
</pre></body></html>