IRS: Tracking Cell Phones, Billions in Fraud Refunds

IRS Can Track Your Cell Phone, but Leaves Billions in Taxes Uncollected

DailySignal: While the Internal Revenue Service continues to leave uncollected tax money on the table, the agency beefed up its surveillance capabilities in a move that alarms both conservative and liberal privacy advocates.

Now some complain the IRS is acting too much like Big Brother and not enough like a traditional taxman.

Since 2006, the IRS has overseen an annual tax gap—the shortfall between taxes owed and collected—of about $385 billion, government analysts say. And according to an April report, the agency has not implemented 70 of 112 actions identified by the Government Accountability Office to close that loop.

In 2009, though, the IRS purchased a “cell-site simulator,” more commonly known as Stingray technology. And since November, the agency has been trying to buy another of the devices.

Like something from a spy movie, a Stingray device mimics a cellphone tower, tricking all mobile phones in an area into revealing their location and numbers. Authorities can deploy the powerful technology to tag and track an individual’s location in real time.

More advanced versions of the devices can be used to copy information stored on a cellphone and to download malware remotely.

The devices are as controversial as they are prevalent. According to the American Civil Liberties Union, 61 agencies in 23 states and the District of Columbia own the devices.

IRS Commissioner John Koskinen says the IRS uses its Stingray to hunt down fraudsters and stop money laundering. The agency’s use of the devices remained a secret until an October report in the Guardian.

In a November letter to House Oversight Chairman Jason Chaffetz, R-Utah, Koskinen wrote that the agency’s technology “cannot be used to intercept the content of real-time communications” such as voicemails, text messages, and emails. Instead, the IRS chief said, the device has been used “to track 37 phone numbers.”

And the IRS commissioner insists his agency deploys the tech only in accordance with state and federal laws.

But during an April 13 hearing of the Oversight and Government Reform Committee, the deputy IRS commissioner for service and enforcement, John Dalrymple, couldn’t say whether the IRS obtained a warrant before activating the device.

Rep. Jim Jordan, R-Ohio, says he finds that concerning.

With a federal budget deficit projected at $544 billion in 2016, Jordan told The Daily Signal he’d rather have the IRS focus on “their fundamental job, which is to collect revenue due to the federal Treasury.” He added:

The GAO has 112 things they suggest, recommendations for the IRS to actually deal with the $385 billion dollar tax gap. Not one of those recommendations was to purchase a second Stingray unit.

More than a misappropriation of resources, the chairman of the House Freedom Caucus said, he fears the IRS could abuse the technology to monitor political groups like it did in 2013, when the agency began targeting conservative nonprofits.

“Now you have this same agency, who again for a long period of time went after people for exercising their First Amendment free speech rights, are using this technology and without a Fourth Amendment probable cause warrant,” Jordan said.

Nathan Wessler, an attorney with the American Civil Liberties Union, said the technology poses a significant threat even when gathering basic information like names and numbers. In an interview with The Daily Signal, Wessler said Stingray devices could be “quite chilling on people’s right to protest.”

And there’s already a precedent for misconduct, albeit at a more local level.

Wessler points to a 2003 incident when the Miami-Dade Police Department purchased a Stingray device to monitor a protest of a conference on the Free Trade Area of the Americas. According to an expense report obtained by the ACLU, police wanted the device because they “anticipated criminal activities.”

“It’s a pretty short step from those words to being concerned about the police intentionally downloading a list of every protester who shows up at some demonstration,” Wessler said. “It’s a powerful way to know who’s there.”

The IRS Criminal Investigations Division is already one of the more elite investigative agencies. Koskinen boasts that in 2015 the division achieved a 93.2 percent conviction rate, “the highest in all of federal law enforcement.”

It’s an open question whether the agency needs Stingray technology to complete its mission.

The IRS did not respond to The Daily Signal’s requests for comment made by emails and phone calls.

Paul Larkin argues that the nature of IRS investigations makes real-time intelligence irrelevant. Larkin, senior legal research fellow at The Heritage Foundation, told The Daily Signal that IRS agents are following a paper trail to investigate previous crimes:

There is no good reason the IRS would ever need real-time data information. The crimes that the IRS investigates all occurred in the past. They’re investigating fraud against the government that’s already happened. They don’t have crimes in progress like a burglary.

But if the IRS ever needed to track a suspect in the moment, Larkin said, there’s a practical solution—teamwork. He explains that there’s “no legal hurdle” that prohibits the IRS from teaming up, for instance, with the Department of Justice and borrowing its Stingray technology.

Jordan says he isn’t ready to accept that the IRS ever needs access to the device.

“Really, should the IRS have this and be using this at all?” the Ohio Republican said. “I tend to think you’d be better off with this technology not being in their hands.”

******

The 23-page report is actually quite readable, and worth looking at if you’ve been a victim of identity theft or refund fraud, you’re a tax preparer, or you’re interested in the future of how Americans file our taxes.

  1. The IRS paid out $3.1 billion in refunds to scammers last year. We’ve discussed in the past how this scam works: someone with basic information about a U.S. taxpayer files a return with fake information, depositing their refund in the scammer’s own account. It’s a sophisticated operation and very lucrative. Additional 5 items are here, a must read from the Consumerist.

Cyber: New Strategic Operation v. ISIS

The US Cyber Command started the attacks on the Islamic State

The US Government has announced to have launched a series of cyber attacks against the Islamic State coordinated by the Cyber Command.

SecurityAffairs: The US Government has launched its cyber offensive against the coordinated by the Cyber Command. The strategy is clear, the use of hacking operations and cyber weapons will aim to destroy computer systems used by the ISIL and to track its cyber hubs.

In March, Senior Pentagon officials revealed the military’s first use of cyber warfare operations against the ISIL terrorist group.

The US military has started launching cyber attacks against members of the terrorist organization ISIS as part of the operation conducted to take back the Iraqi city of Mosul.

The US military is using cyber tools to contrast the ISIS troops in the area, interfering  members’ operation and communication.

Now the US Government wants to use all the hacking tools in its cyber arsenal against the Islamic State. The New Your Times revealed that until now the Cyber Command operations were more focused on cyber disputes against Russia, China, Iran, and North Korea.

“The National Security Agency, which specializes in electronic surveillance, has for years listened intensely to the militants of the Islamic State, and those reports are often part of the president’s daily intelligence briefing.” states the NYT. “But the N.S.A.’s military counterpart, Cyber Command, was focused largely on Russia, China, Iran and North Korea — where cyberattacks on the United States most frequently originate — and had run virtually no operations against what has become the most dangerous terrorist organization in the world.”

The goal of the new campaign is to disrupt the propaganda activities managed by the Islamic State, but also interfere with IS daily functions, like paying its fighters.

“Our cyberoperations are disrupting their command-and-control and communications,” Mr. Obama saidat the C.I.A. headquarters in Langley, Va., on countering the Islamic State.

The deputy secretary of defense, Robert O. Work, confirmed the goals of the cyber operations that were conducted by a small number of “national mission teams.”

“We are dropping cyberbombs,” Mr. Work said. “We have never done that before.”

The NYT, citing interviews withs senior and midlevel officials, confirmed that the US cyber army has begun to deploy a series of “implants” in the networks of the Islamic State to spy on its commanders.

“Now, the plan is to imitate them or to alter their messages, with the aim of redirecting militants to areas more vulnerable to attack by American drones or local ground forces.” continues the NYT. “In other cases, officials said, the United States may complement operations to bomb warehouses full of cash by using cyberattacks to interrupt electronic transfers and misdirect payments.”

The fact that the US Government is admitting the use of cyber weapons that would have unpredictable effects over vast areas of the planet raising major questions over an invasion of sovereignty.

Of course, now we are speaking to contrast the Islamic State and everything seems to be admitted to destroying the threat.

“We’re trying to both physically and virtually isolate ISIL, limit their ability to conduct command and control, limit their ability to communicate with each other, limit their ability to conduct operations locally and tactically,” said Gen. Joseph F. Dunford Jr., the chairman of the Joint Chiefs of Staff,

“But I’ll be one of the first ones arguing that that’s about all we should talk about,” General Dunford said. “We want them to be surprised when we conduct cyberoperations. And, frankly, they’re going to experience some friction that’s associated with us and some friction that’s just associated with the normal course of events in dealing in the information age.”

Of course, part of the intelligence consider very dangerous the use of the implants against the Islamic State. The same implants are used to infiltrate the networks of foreign government and there is the concrete risk that these operations allow foreign intelligence agencies to detect them and neutralize their effects. Another side effect is that the Islamic State militants would stop the use of a communications channel starting one that was harder to monitor.

“N.S.A. officials complained that once the implants were used to attack, the Islamic State militants would stop the use of a communications channel and perhaps start one that was harder to find, penetrate or de-encrypt.” states the NYT.

“It’s a delicate balance,” said Mr. Obama’s national security adviser, Susan E. Rice. “We still have to keep our eye on the Russia-China state-sponsored activity, but this was a new mission, one where we have to balance the collection equities against the disruption equities.”

Lisa O. Monaco, a deputy national security adviser and Mr. Obama’s top adviser met technology executives at IT giants calling for action against the online activities of the Islamic State.

****  

In part from the DailyBeast: The American military’s campaign of cyber attacks against ISIS is far more serious than what the president laid out in his bland description. Three U.S. officials told The Daily Beast that those operations have moved beyond mere disruption and are entering a new, more aggressive phase that is targeted at individuals and is gleaning intelligence that could help capture and kill more ISIS fighters.

As the U.S. ratchets up its online offensive against the terror group, U.S. military hackers are now breaking into the computers of individual ISIS fighters. Once inside the machines, these hackers are implanting viruses and malicious software that allow them to mine their devices for intelligence, such as names of members and their contacts, as well as insights into the group’s plans, the officials said, speaking on condition of anonymity to describe sensitive operations.

In remarks at CIA headquarters in Langley, Virginia, this week, Obama confirmed that cyber operations were underway and noted that recently the U.S. has either captured or killed several key ISIS figures, including Sulayman Dawud al-Bakkar, a leader of its chemical weapons program, and “Haji Iman,” the man purported to be ISIS’s second in command.

The military has also used cyber operations to block ISIS’s use of encrypted communications, in order to force members to use less secure channels where they can be more easily monitored, officials said. That tactic appears to be a response to ISIS’s effective use of encrypted text applications in particular, which officials had said previously made it harder for the military and intelligence community to track individual fighters.

Iran Forces Them to Fight for Assad

Fatimiyoun Brigade

A comprehensive summary is here.

The Islamic Republic of Iran now controls part–though not all–of Yemen, Iraq, Syria, and Lebanon, while Turkey is another contender.

***

The creation of an Afghan Shia division in the Iranian Revolutionary Guards structure is not new, and dates back to the Iran-Iraq war during the 1980s when an Afghan Shia force, the Abouzar Brigade, was formed to help fight Iraq.

So….while the White House, the National Security Council and the State Department want Assad removed from power and while the Obama regime is pro-Iran, how do they square this conundrum exactly? It should also be mentioned that those ‘Syrian’ refugees flooding into Europe are hardly all Syrian, in fact few are.

In part from BBC: Fatemioun Brigade, an all-Afghan unit commanded by Revolutionary Guards officers.

“The Iranian Revolutionary Guards Corps decided that the Syrian military could not succeed on their own,” he told the BBC. “The frontlines were too depleted and men were trying to avoid conscription.”

The Iranians decided to set up a 50,000-strong National Defence Force to fight alongside the Syrian army.

Photo obtained by opposition Syria Media Organization purportedly showing Afghan fighters in Syria

With a shortage of willing fighters inside Syria, they began looking elsewhere – signing up Iranian Afghans, Lebanese, Iraqi and Pakistani Shia recruits.

As the five-year conflict in Syria grinds on, BBC Persian has found evidence that Iran is sending thousands of Afghan men to fight alongside Syrian government forces.

The men, who are mainly ethnic Hazaras, are recruited from impoverished and vulnerable migrant communities in Iran, and sent to join a multi-national Shia Muslim militia – in effect a “Foreign Legion” – that Iran has mobilised to support Syrian President Bashar al-Assad.

Many have since fled the battlefield and joined the refugee trail to Europe.

In a small town in Germany, we meet “Amir”, an Afghan man in his early twenties.

He was born to refugee parents in Isfahan, Iran, and is now himself an asylum seeker in Europe.

Like most of the almost three million Afghans in Iran, he lived as a second-class citizen.

Without legal residency or identity documents, he found it hard to get an education or a job. Fear of arrest and deportation was a daily reality.

Human Rights Watch recently estimated as many as 10,000 Afghans may have been recruited by the Revolutionary Guards.

Iran’s foreign ministry has denied any Afghans are being sent in an official capacity. The official narrative from Tehran is that they are all volunteers, off to defend holy sites of their own volition.

But every week in Iran there are more military-style funerals for fallen Fatemioun fighters.

And with a major government spring offensive around Aleppo in the offing, it seems Iran’s Foreign Legion will be fighting – and dying – for President Assad for some time to come. Full article here.

****

AJ: “Iran is recruiting fighters from Shia communities across the world to fight in Syria,” continued al-Abdah, who is based in Turkey.

“Iran considers itself the one and only reference point for all Shia people in the whole world. It organises them into political, social, and military organisations, both in their local communities and abroad.

“This is part of the main mission of the Iranian regime in terms of exporting the revolution. Iran recruits, motivates, organises, finances, and trains Shias from all over the world to help support Bashar al-Assad’s regime from collapsing.” More here.

As for Iran and the Iranian Revolutionary Guard Corps, go here for the plotted objectives and study titled:

The Rise of the Pasdaran

Assessing the Domestic Roles of Iran’s

Islamic Revolutionary Guards Corps

 

Electronic Warfare, the Emerging War Platform

Russia Begins Test Of New Electronic Warfare System

DefenseWorld: Russia has begun testing a ground-based electronic warfare system that is capable of protecting the troops and civilian facilities from an air and space attack, TASS reported Monday.

A source from Concern Radio-Electronic Technologies (KRET), a subsidiary of State Corporation Rostec, told TASS that it has launched factory testing of components of a ground-based electronic warfare system, capable of protecting the troops and civilian facilities from air and space attack weapons. The tests will be completed during the year.

Integrated with antiaircraft defense systems, the electronic warfare system is capable of conducting real-time automated exchange of data on the actions of the aerospace grouping for purposes of centralized target assignment, according to the report.

The system consists of separate jamming modules that are capable of influencing the enemy’s command and control system at long distances emitting a powerful and complex digital signal. “Multichannel stations that ensure simultaneous inhibition of various avionics systems have been created”, the company representative said.

The consortium’s First Deputy Director General Igor Nasenkov is quoted by the company’s press service as saying that the jamming modules are elements of a hierarchically-structured multilevel system.

“Their energy, frequency and intellectual resources are distributed in an optimal way. In addition, all the modules are equipped with individual defense sets because they are the prime targets for enemy’s attack”, he said.

Previously, the company’s deputy head Yuri Mayevsky told TASS that the system will be installed on ground platforms, aircraft and offshore platforms.

*****

WASHINGTON: With the rise of high-tech threats from Russia and China, the Marine Corps plans a major increase in its forces devoted to jamming, hacking, and deceiving enemies. That includes:

  • putting new sensors and jammers in everything from ground units to drones to V-22 Osprey tiltrotors and KC-130 transports, despite a tight budget;
  • adding 1,000 to 3,000 more personnel, carved out of other parts of a Marine Corps legally limited to 182,000 active-duty troops. (That’s on top of a 1,300-plus increase in these specialties over the last several years);
  • retraining skilled electronic warriors from disbanded EA-6B Prowler squadrons to work with ground units and drones;
  • consolidating disparate disciplines — from offensive cyber warfare and electronic warfare to psychological operations and military deception — into a new “information warfare” force.

 Electronic Warfare (EW) represents the ability to use the electromagnetic spectrum—signals such as radio, infrared or radar—to sense, protect, and communicate. At the same time, it can be used to deny adversaries the ability to either disrupt or use these signals.

EW is divided into three (3) major areas:

Electronic Attack

Electronic Attack
Disrupting a signal, for example
electronic jammers
Electronic Protection
Preventing a receiver from being jammed
Electronic Support
Electronic Support
In the air, on land, and at sea, Lockheed Martin pioneers advanced technologies to control the electromagnetic spectrum, and develops disruptive technologies to outpace adversary threats. The key to success lies not only in the capability of the systems we provide, but integration of those systems across platforms to offer a complete picture of the battle space and unimpeded use of the electromagnetic spectrum for the warfighter.

250 SpecOps Deployed to Syria

The United States deployed 50 special operations members last year, some assigned to train. To begin to consolidate some advances against Islamic State, another 250 received their orders. Obama made the announcement officially during his visit in Germany. The concern of record is Aleppo falling to Islamic State and it is argued now, how will the coordination work with the ground operations of Russia.

Obama announces an additional 250 special operations forces to Syria

(CNN) U.S. President Barack Obama has announced an additional 250 special operations forces will be sent to Syria in the coming weeks in a speech in Hannover, Germany in an effort to stem the influence and spread of ISIS.

“Just as I approved additional support for Iraqi forces against ISIL I’ve decided to increase US support for local forces fighting ISIL in Syria, a small number of special operations forces are already on the ground in Syria and their expertise has been critical as local forces have driven ISIL out of key areas,” Obama said, using another acronym for the jihadist group.
“So given their success I’ve approved the deployment of up to 250 additional US personnel in Syria including special forces to keep up this momentum.”
He stressed that U.S. troops will not be leading the fight on the ground but they will be essential in training and assisting local forces.
“So make no mistake these terrorists will learn the same lesson as others before them have, which is ‘your hatred is no match for our nations united in the defense of our way of life,'” he said.
He said the increase would bring the number of U.S. special forces in the country to as many as 300 troops, including special forces.
Obama added that his administration would continue to pursue diplomatic solutions to ending the Syrian civil war.
“Just as we remain relentless on the military front we’re not going to give up on diplomacy to end the civil war in Syria because the suffering of the people in Syria has to end and that requires an effective political transition,” he said.

Supporting Syrian allies

The troops will be expanding the ongoing U.S. effort to bring more Syrian Arab fighters into units the U.S. supports in northern Syria that have largely been manned by the Kurds, an official told CNN earlier.
The plan calls for the additional U.S. forces to “advise and assist” forces in the area whom the U.S. hopes may eventually grow strong enough to take back territory around Raqqa, Syria, where ISIS is based.
These troops are not expected to engage in combat operations or to participate in target-to-kill teams but will be armed to defend themselves, one official said.
“As we have noted in recent days, the President has authorized a series of steps to increase support for our partners in the region, including Iraqi security forces as well as local Syrian forces who are taking the fight to ISIL,” a senior administration official CNN, using a different acronym for ISIS.
“The President during his remarks at the Hannover Messe fairgrounds on Monday will speak to this additional step.”
The official said the president was persuaded to take this additional step because of recent successes against ISIS.
*****

FNC: Islamic State oil man Abu Sayyaf was riding high a year ago. With little industry experience, he had built a network of traders and wholesalers of Syrian oil that at one point helped triple energy revenues for his terrorist bosses.

His days carried challenges familiar to all oil executives—increasing production, improving client relations and dodging directives from headquarters. He also had duties unique to the extremist group, including approving expenses to cover the upkeep of slaves, rebuilding oil facilities damaged by U.S. airstrikes and counting towers of cash.

Last May, U.S. Special Forces killed Abu Sayyaf, a nom de guerre, at his compound in Syria’s Deir Ezzour province. The raid also captured a trove of proprietary data that explains how Islamic State became the world’s wealthiest terror group.

Documents reviewed by The Wall Street Journal describe the terror group’s construction of a multinational oil operation with help from officious terror-group executives obsessed with maximizing profits. They show how the organization deals with the Syrian regime, handles corruption allegations among top officials, and, most critically, how international coalition strikes have dented but not destroyed Islamic State’s income.

Defense Secretary Ash Carter called the May 16, 2015, raid a “significant blow” against Islamic State and heralded the death of Abu Sayyaf, the terror group’s No. 2 oil executive.