44
Tax Policy Seminar Note January 2013 Curbing the Identity-theft Refund Fraud Epidemic with Technology and Common Sense 1

Writing Sample - Tax Identity Theft Note

Embed Size (px)

DESCRIPTION

Writing Sample - Tax Identity Theft Note

Citation preview

Page 1: Writing Sample - Tax Identity Theft Note

Tax Policy Seminar

Note

January 2013

Curbing the Identity-theft Refund Fraud Epidemic with

Technology and Common Sense

Christopher J. Sleeper

1

Page 2: Writing Sample - Tax Identity Theft Note

Introduction

Identity-theft related refund fraud is the crime du jour.1 Defrauding

taxpayers through the Internal Revenue Service does not require superior

intelligence, sophisticated tools or any specialized subset of knowledge.

Street criminals do it2; nurses do it3; undocumented workers do it4; people

behind bars do it5; geeks do it6; even Floridians do it (a lot)7; and you can do

it too. In hotel conference rooms, perpetrators teach groups of 50 to 100

1 See Identity Theft and Income Tax Preparation Fraud: Hearing Before the Subcomm. on Crime, Terrorism and Homeland Security of the H. Comm. on the Judiciary, 112th Cong. 14 (statement of Nina E. Olsen, National Taxpayer Advocate).2 In Tampa, detectives investigating drug dealers seized $600,000 in preloaded debit cards, $32,000 in fraudulent return checks, $15,000 in cash and ledgers with stolen personal information in suspects’ car following a high-speed chase. See Tampa Bay Online, “Drug Sting Leads Police to $600,000 in Tax Refund Debit Cards,” at http://www2.tbo.com/news/ news/2012/apr/02/5/drug-sting-leads-police-to-600000-in-tax-refund-de-ar-387665.3 Many of the 19 suspects arrested in a Florida sting used their positions in nursing homes to steal elderly people’s information. See Press Release, Polk County Sheriff’s Office, “PCSO Tax Fraud Investigation ‘Stop the Drop’ Nets 19 Suspects” (May, 8 2012), at http://www.polksheriff.org/NewsRoom/News %20Releases/Pages/05-08-2012.aspx. 4 See WRAL.com, “Investigators: Child Tax Credit Allows Fraudsters a Chance to Cheat,” at http://www.wral.com/investigators-child-tax-credit-allows-fraudsters-a-chance-to-cheat/11697176/.5 In TIGTA’s sample, 48,887 prisoners fraudulently claimed refunds totaling more than $130 million. See TIGTA, TIGTA 2010-40-129, Expanded Access to Wage and Withholding Information Can Improve Identification of Fraudulent Tax Returns, September 30, 2010.6 See IRS, IR-2012-23, IRS Releases the Dirty Dozen Tax Scams for 2012 (Feb. 16, 2012) (warning taxpayers about phishing).7 Tampa is the capital of refund fraud. See CNN Money, “IRS Pays Billions in Refunds to Identity Thieves,” at http://money.cnn.com/2012/08/02/pf/taxes/irs-identity-theft/index.htm.

2

Page 3: Writing Sample - Tax Identity Theft Note

how to commit refund fraud.8 They call these gatherings “drop parties”

because the easy money is dropped onto prepaid debit cards right into your

mailbox.9

Jokes aside, refund fraud is a serious issue that burdens the treasury,

individual taxpayers whose identities are stolen and the integrity of the tax

system. The Treasury Inspector General for Tax Administration (TIGTA)

estimated that in 2011 1.5 million returns involving ID theft went

undetected, representing a loss to the treasury of $5.2 billion.10 TIGTA

estimates that the IRS will issue $21 to $26 billion in fraudulent returns

over the next five years.11

Despite efforts to curb refund fraud, the government has

unintentionally encouraged its growth by making it more lucrative and

convenient. The government increasingly uses refundable credits for socio-

economic purposes.12 Tax filers may earn a negative income tax through

claiming a myriad of refundable credits, such as the Earned Income Credit,

Additional Child Tax Credit, Adoption Tax Credit, First-Time Homebuyer

Credit, Work Opportunity Credit, Making Work Pay Credit, Qualified Hybrid

Credit, and Health Coverage Tax Credit.13 Defrauders can manipulate

8 See Tampa Bay Times, “49 Accused of Tax Fraud and Identity Theft,” at http://www.tampabay.com/news/publicsafety/crime/49-accused-of-tax-fraud-and-identity-theft/1189406.9 Id.10 See TIGTA, TIGTA 2012-42-080, There Are Billions of Dollars in Undetected Tax Refund Fraud Resulting From Identity Theft, July 19, 2012.11 Id.12 See Identity Theft and Income Tax Preparation Fraud, 4.13 Id., 3-4; See also, Tax Credits, 1040.com, http://www.1040.com/federal-taxes/credits/ (last visited Jan. 9, 2012).

3

Page 4: Writing Sample - Tax Identity Theft Note

figures on returns through consumer-friendly software, such as TurboTax,

to maximize their refunds. Then they can bypass the IRS’s flimsy electronic

signature, electronically file, and receive their fraudulent refund in one to

two weeks via direct deposit or prepaid debit card.14 Due to poor detection

and prevention and lax enforcement and prosecution, fraudsters are

unlikely to face justice.15 Given the current state of affairs, refund fraud is

surely one of the most attractive crimes in the United States.

This paper will address identity-theft related refund fraud in four

parts. Part I will take the reader step-by-step through how fraudsters

commonly perpetrate refund fraud. Part II will explain how the IRS’s

current procedure is largely ineffective and, in fact, victimizes the injured

taxpayer. Part III will discuss the government’s attempts to minimize

refund fraud and analyze its failures and, if applicable, successes. Part IV

will recommend comprehensive solutions, including a real-time processing

system, which will greatly reduce this type of fraud. While some of my

recommendations are applicable to other types of refund fraud, such as

legitimate taxpayers abusing refundable credits to fraudulently inflate their

refunds, this paper will exclusively deal with identity-theft related refund

fraud.

I. Identity-theft Related Refund Fraud for Dummies

14 See Identity Theft and Income Tax Preparation Fraud, 3.15 Nationwide IRS launched only 898 refund fraud investigations in 2012. See Total Extent of Refund Fraud Using Stolen Identities is Unknown: Hearing Before the Subcomm. on Gov’t. Org., Efficiency and Fin. Mgmt. of the H. Comm. on Oversight and Gov’t. Reform, 112th Cong. 7 (statement of James R. White, Director, Strategic Issues).

4

Page 5: Writing Sample - Tax Identity Theft Note

Step one: steal an identity. For tax purposes, this is a lot easier than

it sounds. Indeed, for any purpose it is a lot easier than most people

probably think.16 To file someone else’s tax return, all a defrauder needs is

that person’s social security number, name and last-known address.17

Employees in health, finance or insurance have ready access to this

information.18 Prisoners can “borrow” this information from their fellow

inmates.19 Criminals can create phishing websites or phony official emails

to fraudulently obtain this information.20 IRS agents of course have access

to this information, and because the IRS prints this information on the front

of its notices, so would anyone who intercepts IRS documents.21 The

16 See e.g. Charlotte Johnson. Why is Identity Theft So Easy?, eHow, http://www.ehow.com/ about_5434049_identity-theft-easy.html (last visited Jan. 9, 2012).17 Accord PCSO Tax Fraud Investigation ‘Stop the Drop’ Nets 19 Suspects.18 Id.19 Identity-theft related refund fraud occurs in prisons in all 50 states and is increasingly popular. The number of fraudulent prisoner returns doubled between 2009 and 2010 with an attending 153% increase in fraudulent refunds issued. The scheme works by incarcerated individuals giving their information to a co-conspirator outside of prison, often a recent parolee. The co-conspirator files returns on their behalf, receives the refunds and shares a portion with the incarcerated prisoners. The incarcerated fraudsters have plausible deniability by claiming that they could not have filed since they were in prison. See IRS Prisoner Tax Compliance Program: IRS, American Correctional Association Conference, 5-22 (January, 2012) (available at http://www.aca.org/conferences/winter2012/WorkshopPresentations/E-1B%20The%20IRS's%20Partnership%20With%20Correctional%20Agencies%20to%20Fight%20Fraud.pdf).20 See IR-2012-23.21 See TIGTA, TIGTA 2012-40-050, Most Taxpayers Whose Identities Have Been Stolen to Commit Refund Fraud Do Not Receive Quality Customer Service, May, 3 2012, 10.

5

Page 6: Writing Sample - Tax Identity Theft Note

absolute best way to get this information, however, is to gain access to the

Death Master File (DMF).22

The DMF is a list of recently deceased individuals that includes their

full names, social security numbers, dates of birth, dates of death, and

county, state and zip code of their last-known addresses.23 The Social

Security Administration (SSA) publishes this document online through the

Department of Commerce’s National Technological Information Service

(NTIS) and updates the information weekly.24 Unlimited access is available

through the NTIS website for $995 per year.25 It is also commonly available

through genealogical websites for a nominal sum.26 While originally

intended to be used by financial and credit agencies to prevent identity

fraud, the DMF is a cheap way to gain another identity.27 For refund fraud

purposes, a decedent identity is just as useful as a living person’s identity

because the fiduciary of a decedent’s estate must file the decedent’s final

22 In United States v. Serge St-Vil, et al., Case No. 12-20768-CR-Scola, three defendants were charged with filing 5,000 decedent returns. The IRS blocked $14 million in refund, but still issued $6 million to the defendants. Press Release, United States Attorney’s Office Southern District of Florida, “Forty Defendants Charged In Separate Schemes That Resulted In Thousands Of Identities Stolen And Millions Of Dollars In Identity Theft Tax Filings,” (Oct. 10, 2012) (http://www.justice.gov/usao/fls/PressReleases/ 121010-02.html).23 Identity Theft and Income Tax Preparation Fraud, 15.24 National Taxpayer Advocate 2011 Annual Report to Congress 519.25 CNN Money, “Buy A Dead Person’s Identity From Social Security For $10, ” at http://money.cnn.com/ 2012/07/18/pf/identity-theft-deceased/index.htm?iid=EL.26 National Taxpayer Advocate 2011 Annual Report to Congress 519.27 Id. at 519-522.

6

Page 7: Writing Sample - Tax Identity Theft Note

income tax return for the year of death and any returns not filed for

preceding years.28

Step two: fill out return using TurboTax29. The identity thief must file

the return before the legitimate taxpayer does, or else the thief’s return will

be rejected as a duplicate.30 Therefore, the identity thief should file the

return early in January before the legitimate taxpayer has likely filed his or

her return or even received his or her W-2s and 1099s. The identity thief

fills out a fraudulent tax return using the stolen identity. He then fabricates

data, manipulates wage and deduction figures, and claims credits to

maximize the refund without triggering too much suspicion. Usually, the

identity thief uses TurboTax’s built-in refund calculator to generate a refund

of just under $10,000.31 The last step before filing is determining how to

get the refund – cash or check. The identity thief could simply have the IRS

deposit the refund directly into his or her bank account, but should the IRS

detect the fraud it is better to avoid leaving such an obvious trace. Instead,

refund fraudsters have refund checks or prepaid debit cards mailed to

28 IRM 5.5.1.8 (March, 26 2010).29 “TurboTax” is street parlance for this type of crime. Tampa Bay Online, “Drug Sting Leads Police to $600,000 in Tax Refund Debit Cards.”30 TIGTA 2012-40-050, 6.31 Tampa Bay Times, “49 Accused of Tax Fraud and Identity Theft.” While $10,000 is a good rule of thumb, thieves can get away with requesting significantly larger refunds. For example, Krystle Marie Reyes falsely reported income of $3 million and received a $2.1 million prepaid visa debit card. The state approved this gigantic refund even after several manual reviews. She was only caught when she lost the debit card and then asked for a replacement. See Huffington Post, “Krstle Marie Reyes Gets 5 ½ Years For $2.1 Million Bogus Tax Refund,” at http://www.huffingtonpost.com/2012/07/25/krystle-marie-reyes-tax-refund_n_1700458.html.

7

Page 8: Writing Sample - Tax Identity Theft Note

vacant homes, co-conspirators or even, brazenly, to the legitimate

taxpayer’s own address where they can just intercept the refund before the

taxpayer checks the mail.32

Step three: e-file. In order to e-file, the fraudster must “prove” that

he is the legitimate taxpayer by providing the IRS with his electronic

signature.33 The electronic signature may be either the taxpayer’s prior

year’s adjusted gross income or self-created PIN.34 For the elderly, prior

year adjusted gross income is often just zero, making their electronic

signature effectively useless as a security measure. The fraudster will have

a high rate of success filing on behalf of an elderly or deceased individual by

just entering zero as the electronic signature. Therefore identity thieves

frequently target such individuals (See table 1).

Table 1: Number of Returns Involving Identity-Theft by Category FY 201035

Deceased 104, 950

Elderly 76,338

32 See CNN Money, “IRS Pays Billions in Refunds to Identity Thieves.”33 Signing Your Electronic Signature, IRS, http://www.irs.gov/uac/Signing-Your-Electronic-Tax-Return (last visited Jan. 9, 2012).34 Id.35 TIGTA 2012-42-080.

8

Page 9: Writing Sample - Tax Identity Theft Note

Citizens of U.S. Possessions 67,789

Students 288,252

Children 2,274

Income level does not require tax

return952,612

However, should the identity thief need or desire to verify the

taxpayer’s PIN, the IRS has set up a mechanism for the thief to easily obtain

it. He merely needs to call 1-800-829-1040, provide the taxpayer’s social

security number, name and address (which he has already stolen and used

to fill out the return), and the IRS will give the thief the legitimate

taxpayer’s prior year original AGI amount or prior year PIN right over the

phone.36

As the above demonstrates, committing identity-theft related refund

fraud is relatively simple. There is very little risk inherent in any step. To

limit risk, one could steal identities from the DMF using a library computer

and use a payphone or prepaid cellphone to obtain PINs. Then one can

purchase a cheap laptop with cash and use it to file returns at Starbucks.

Send the prepaid debit cards to a vacant home. Then, prepaid debit cards

in-hand, either launder them or turn them into cash at various gas station

ATMs. As will be explained in Part II, the IRS response to identity-theft

36 Free Tax USA, http://www.freetaxusa.com/display_faq.jsp?faq_id=86, (last visited Jan. 9, 2012).

9

Page 10: Writing Sample - Tax Identity Theft Note

related refund fraud does little to hinder this criminal scheme, and in fact

harms the real taxpayer in the process.

II. The IRS’s Current Procedure for Handling Identity Theft

Assuming a fraudulent return is not blocked by the IRS’s fraud

detection filter (discussed in Part III), it may not be detected until the

legitimate taxpayer attempts to file, if ever, or until the IRS discovers the

fraud by matching income and withholding information to individual tax

returns.37 Instances of refund fraud may go undetected for years.38 If the

legitimate taxpayer is not required to file, he may only become aware that

his identity has been fraudulently used when the IRS attempts to recover

the deficiency from him through liens, levies and other enforcement

mechanisms.39 This breakdown in communication occurs because the IRS

uses the address from the most current tax return (the fraudulent one) for

all correspondence.40 Therefore, the IRS will send the deficiency notice to

the identity thief’s address rather than the previous, and probably correct,

address.41

37 Identity Theft: Who’s Got Your Number, Hearing before S. Comm. on Finance, 110th Cong. (statement of Max Baucus, Chairman, Committee of Finance.38 Id.39 Identity Theft and Income Tax Preparation Fraud, 9; See also CNN Money, “IRS Struggles To Keep Up Amid Surge In Tax Fraud,” at http://money.cnn.com/2012/06/28/pf/taxes/irs-tax-fraud/index.htm?iid=EL.40 Identity Theft-Related Tax Fraud: Hearing Before the Subcomm. on Gov’t. Org., Efficiency and Fin. Mgmt. of the H. Comm. on Oversight and Gov’t. Reform, 112th Cong. 10 (statement of Nina E. Olsen, National Taxpayer Advocate).41 Id.

10

Page 11: Writing Sample - Tax Identity Theft Note

If the legitimate taxpayer attempts to electronically file her return

subsequent to the fraudster, she will receive an error code that indicates

that her social security number has already been used to file a return. Then

she must contact the IRS and attempt to resolve the matter, a process that

on average takes 414 days, but may take twice as long.42

A second return using the same social security number is considered a

duplicate return.43 If an individual attempts to submit a duplicate return

electronically, it will be rejected immediately.44 Unable to file

electronically, the taxpayer will either call the IRS hotline or look online for

guidance. If the taxpayer calls the IRS’s toll-free hotline, the IRS customer

service agent will not immediately flag the social security number or open a

case, but will merely request that the taxpayer file a paper return with an

attached Form 14039, Identity Theft Affidavit, or a police report and a valid

government issued ID.45

If the taxpayer elects to seek help online, she may face another

problem. The taxpayer may believe that she needs to file Form 3949-A,

Information Referral, which is intended to allow taxpayers to report certain

types of fraud, specifically tax fraud and tax law violations.46 It is not clear

from the form’s directions that identity-theft is not one of those types of

42 TIGTA 2012-40-050, at 8.43 Id. at 6-9.44 Id.45 See TIGTA, TIGTA 2012-40-106, The Process For Individuals To Report Suspected Tax Law Violations Is Not Efficient Or Effective, September 10, 2012, at 5.46 Id. at 7.

11

Page 12: Writing Sample - Tax Identity Theft Note

fraud.47 In 2011, over 3,000 victims of identity-theft related refund fraud

filed Form 3949-A.48 Because the IRS lacks a procedure on how to process

Form 3949-A when it contains a claim of identity-theft, all of these forms

were destroyed without the IRS recording any of the data or notifying the

victims.49 Hopefully for these taxpayers, they also called the IRS hotline

and discovered that they needed to file a Form 14039 instead.

When the IRS receives the taxpayer’s paper return and Form 14039, it

is sent to the Duplicate Function of the IRS.50 The return sits in the

Duplicate Function, along with other identity-theft related returns, until

after the April 15th filing deadline.51 Only then does an IRS assistor in the

Duplicate Function flag the return as a possible case of identity-theft.52

Even at this point, the IRS does not notify the legitimate taxpayer, who may

have been waiting to hear from the IRS about his identity being stolen since

January, that an identity-theft investigation has been opened.53 Next the

Duplicate Function transfers the case to one of twenty-four other IRS

functions.54 If the case involves multiple issues, it will be transferred

between functions.55 Despite the establishment of the Identity Prosecution

Specialized Unit (IPSU) in 2008 to act as “traffic-cop” (discussed more in

47 Id.48 Id.49 Id.50 TIGTA 2012-40-050, 6-12.51 Id.52 Id.53 Id.54 Id. See also Identity Theft-Related Tax Fraud, 8; 55 Identity Theft-Related Tax Fraud, 9.

12

Page 13: Writing Sample - Tax Identity Theft Note

Part III) and placement of identity-theft specialists in each function, the

procedure is inefficient and confusing for the taxpayer.56

TIGTA performed a case study on seventeen identity-theft related

refund cases and discovered the following: (1) Case resolution averaged 414

days; cases were opened from three to 917 days; (2) Inactivity on cases

averaged a staggering 86 days; inactivity ranged from 0 to 431 days; (3)

The 17 taxpayers had 58 different cases opened and multiple assistors

workers their cases; 57 and (4) The victims were asked multiple times to

substantiate their identities. 58 While it can be difficult to determine who

the legitimate taxpayer is, clearly the IRS was not expediently making this

determination.

Resolving who is the legitimate taxpayer is complicated by the IRS’s

poor communication with the taxpayer.59 The IPSU was intended to provide

the taxpayer with single point of contact.60 However, a taxpayer whose

identity has been stolen does not receive the contact information of one

agent, but instead deals with multiple agents, whom are rarely on the same

page, and, worse, relies primarily on the IRS’s paper notices.61 Even if the

IRS is aware that the current address is fraudulent, the IRS does not update

the taxpayer’s official address until the identity theft is fully resolved.62

56 See Identity Theft and Income Tax Preparation Fraud, at 5.57 TIGTA 2012-40-050, at 9.58 Id. at 5.59 See TIGTA 2012-40-050.60 Id. at 20.61 Id. at 10.62 Identity Theft-Related Tax Fraud, at 10.

13

Page 14: Writing Sample - Tax Identity Theft Note

Therefore, the IRS will send many important notices to the wrong address.

These notices may disclose personal information to the identity thief.63

Further, TIGTA found that because multiple departments with conflicting

procedures handle the taxpayer’s case, the taxpayer receives redundant and

sometimes contradictory notices from the IRS, which serve to just confuse

the victim.64

III. The IRS’s Response to ID-Theft Related Tax Fraud

The IRS has responded to the boom in identity-theft related refund

fraud predictably by stepping up prevention, detection, enforcement and

prosecution, but it has done nothing particularly meaningful.

A. Prevention – Electronic Signature, IP PIN and Deceased Lock

The figures indicate that the IRS is unable to prevent the vast majority

of identity-theft related refund fraud. TIGTA estimates that in 2011 the IRS

successfully blocked 938,664 identity-theft related returns but failed to

detect 1.5 million.65 The first line of defense is the electronic signature. As

discussed above, this defense is effectively useless because it will not stop

an identity thief who already has the victim’s social security number, name

and address.

63 See TIGTA 2012-40-050, at 10. 64 Id.65 TIGTA 2012-42-080, at 2.

14

Page 15: Writing Sample - Tax Identity Theft Note

In 2012, the IRS implemented an additional PIN, the Identity

Protection (IP) PIN, for taxpayers who are confirmed victims of identity

theft.66 The IP PIN is a unique code that the taxpayer must use to

electronically file.67 Failure to provide the code during e-filing will result in

the return’s immediate rejection by IRS filters.68 So far, the IRS has issued

250,000 IP PINs to victims whose addresses and identities have been

verified.69 While this additional security credential will effectively prevent

identity-theft related refund fraud for these 250,000, it is inherently limited

to this small class of taxpayers. For IP PIN to be helpful for the larger class

of taxpayers who have not yet been victimized, the IRS would need to allow

all taxpayers to receive a unique identifier. For the credential to be

effective, the taxpayer must only be able to receive this PIN after the IRS

has verified his or her identity. Allowing an identity thief to receive this

number via a toll-free call to the IRS would completely undermine the

program’s effectiveness.

In 2011, the IRS has sought to curb the theft of deceased identities by

placing a lock on a small portion of accounts where both the IRS Master

File and the DMF show a date of death.70 As of March 2012, the IRS had

locked 164,000 decedent accounts, preventing $1.8 million in fraudulent

66 Identity Theft and Income Tax Preparation Fraud, at 11.67 Id.68 Id.69 Id.70 Identity Theft and Tax Fraud: Hearing before Subcomm. on Oversight and Subcomm. on Soc. Sec. of H. Comm. on Ways & Means, 112th Cong. 2 (statement of J. Russell George, Treasury Inspector General for Tax Administration).

15

Page 16: Writing Sample - Tax Identity Theft Note

refunds.71 This program will probably not be successful. Because the

fiduciary of a decedent’s estate must still file taxes on behalf of the

decedent for many prior tax years, the IRS will prevent legitimate tax

returns by merely locking an account where the social security appears on

the DMF. Blocking 164,000 accounts for a savings of $1.8 million is

negligible considering the legitimate need for decedent accounts to stay

open and that the payoff per account here was just over $10 ($1.8 million

divided by 164,000).

B. EFDS Filter

The IRS’s Electronic Fraud Detection System (EFDS) is the most

critical element of the IRS’s efforts to prevent refund fraud. EFDS is a

“mission critical, stand-alone automated system” that detects “reliable

indicators of taxpayer fraud.”72 Once EFDS flags a return as suspicious, the

IRS can delay processing the refund for up to 14 days in order to identify

questionable claims.73 If the IRS determines it needs more time to review

the claim, it may place the account in a temporary lock for up to 70 days.74

At the end of the 70 days, the IRS must release the refund, disallow the

claim or refer the case to another function of the IRS for further (more

serious) investigation.75 During this process, agents in the Account

Management Taxpayer Assurance Program (AMTAP) attempt to verify wage

71 TIGTA 2012-42-080, at 4.72 Electronic Fraud Detection System (EFDS) – Privacy Impact Assessment, IRS (Dec. 17, 2010), http://www.irs.gov/pub//irs-pia/efds-pia.pdf.73 National Taxpayer Advocate 2011 Annual Report to Congress 3174 Id.75 Id.

16

Page 17: Writing Sample - Tax Identity Theft Note

and withholding information.76 Typically, due to resource constraints or

lack of information, AMTAP must place an account at least in temporary

lockdown because it is unable to verify wage and withholding information.77

While this screening prevents fraudulent returns, it also burdens innocent

taxpayers whose refunds are mistakenly delayed.78 When a taxpayer wants

to inquire with the IRS why his refund has been blocked by EFDS, the IRS

refers his call to the Taxpayer Protection Unit.79 During peak filing season

in 2011, the Taxpayer Protection Unit could only field 11.7% of its phone

calls.80 Callers who did get through to the Taxpayer Protection Unit waited

an average of one hour six minutes.81 Overall, the IRS is unable to field

about 30% of its calls.82 These figures about poor communication with the

IRS indicate not just the burden that EFDS imposes on taxpayers but also

casts doubt upon any figure the IRS releases regarding the accuracy of

EFDS.83

In 2011, EFDS identified 1,054,704 suspicious returns, up from

611,845 in 2010.84 The IRS estimates that EFDS is 89% accurate, i.e. 89%

of flagged returns are fraudulent.85 TIGTA and others question the IRS’s

76 Id.77 See National Taxpayer Advocate 2011 Annual Report to Congress 32-35.78 Id.79 Identity Theft and Tax Fraud: Hearing before Subcomm. on Oversight and Subcomm. on Soc. Sec. of H. Comm. on Ways & Means, 112th Cong. 13 (statement of Nina E. Olsen, National Taxpayer Advocate).80 Id. at 14.81 Id.82 “IRS Struggles To Keep Up Amid Surge In Tax Fraud”.83 Identity Theft and Tax Fraud (statement by Nina E. Olsen), at 14.84 Identity Theft and Income Tax Preparation Fraud, at footnote 9.85 Id. at 8.

17

Page 18: Writing Sample - Tax Identity Theft Note

estimate.86 In addition to mistakenly delaying at least 100,000 legitimate

taxpayer’s returns87, EFDS fails to identify the majority of fraudulent

returns (1.5 million fraudulent returns in 2011).88 TIGTA examined a

sample of 60 fraudulent returns and found that 49 did not score high

enough on EFDS’s filters to merit further review.89

While no filter is perfect, EFDS glaringly omits a number of factors

that would significantly increase detection of refund fraud. First, EFDS

should consider the address given on the return because a large portion of

fraudulent returns comes from one of five cities: Lansing, Chicago, Belle

Glade, Orlando and Tampa.90 2,137 fraudulent returns came from one

address in Lansing, MI.91 Second, EFDS does not look at whether or not the

tax filer is incarcerated. TIGTA discovered that 88% of returns filed by

prisoners were not screened by EFDS.92 Further, TIGTA found that 17% of

prisoner returns (48,887) were fraudulent and falsely claimed $130 million

in refunds.93 Lastly, the IRS does not retain data from previous identity

theft cases.94 The IRS should retain and factor into EFDS the following info:

(1) how the return was filed, (2) income information, (3) the amount of the

86 Id. See also TIGTA 2012-40-050.87 Id.88 TIGTA 2012-42-080, at 2.89 Id. at 3-4.90 Id. at 9.91 Id.92 TIGTA 2010-40-129, at 22.93 Id.94 TIGTA 2012-42-080, at 9.

18

Page 19: Writing Sample - Tax Identity Theft Note

refund, (4) how the refund was issued and (5) the account or debit number

issued.95

Until the IRS implements more comprehensive reform, such as that

suggested in Part IV of this paper, the IRS should continue to improve

EFDS’s algorithms to reduce the number of false positives and improve

detection of fraudulent returns. EFDS is not nearly as sophisticated as it

could and should be. Also, the IRS must do a better job at vetting out

legitimate taxpayers caught in the EFDS filter.

C. Organizational Improvements – IPSU and Specialization

There are currently 660,000 identity-theft related tax cases in the IRS

inventory servicewide.96 Due to the tremendous growth of identity-theft

related refund fraud, the IRS has only responded with meager

organizational improvements. In 2008, the IRS established the Identity

Prosecution Specialized Unit (IPSU).97 IPSU’s goal was to provide end-to-

end case resolution and a single point of contact for victims of identity theft

tax fraud.98 IPSU is not equipped to meet this goal, and further IRS

organizational changes have actually deviated from this vision for IPSU.

IPSU should act as a traffic-cop, ensuring that cases are processed

efficiently and coordinating the various IRS functions. However, following

IPSU’s formation, the IRS placed specialized agents in each relevant

95 Id.96 Identity Theft and Income Tax Preparation Fraud, at 15.97 Id.98 Id. at 19.

19

Page 20: Writing Sample - Tax Identity Theft Note

function to deal with identity theft.99 Instead of making these specialized

agents liaisons with the IPSU, these agents too often act independently

following separate and conflicting procedures to deal with identity theft

cases.100 IPSU may issue Identity Theft Assistant Requests (ITARs) to

request functions perform specific actions.101 However, ITARs are not

binding.102 IRS functions do not have procedures in place to ensure

compliance with ITARs.103 Therefore, IPSU does little to simplify the

resolution of identity-theft cases. Cases still get handled by multiple agents

across multiple functions with minimal coordination.104 In effect, IPSU often

merely monitors this bureaucratic mess.105 As for a single point of contact,

this has not occurred as discussed above. The IRS should have a program

to monitor and coordinate ID-theft cases, i.e. the IPSU, and a separate

program to provide a single point of contact for ID-theft victims.

D. Enforcement and Prosecution

In 2008, the IRS launched only 108 investigations into identity-theft

tax fraud.106 In 2011, the IRS launched 276 investigations.107 In 2012, the

IRS stepped up enforcement, launching 898 investigations.108 The IRS

99 Id. at 17.100 Identity Theft and Tax Fraud (statement by Nina E. Olsen), at 16.101 TIGTA 2012-40-050, at 20.102 Id.103 Id.104 Id. at 8.105 IPSU is mandated to monitor each case every 60 days. Identity Theft and Income Tax Preparation Fraud, at 19.106 Total Extent of Refund Fraud Using Stolen Identities is Unknown, at 7.107 Id.108 Id.

20

Page 21: Writing Sample - Tax Identity Theft Note

made headlines early in 2012 by executing a nationwide sweep to round up

perpetrators of identity-theft related tax fraud.109 During one week, the IRS

arrested 105 people in 23 states and filed 939 criminal charges.110

However, there has been no comprehensive study on the prevalence of

identity theft.111 Obviously the fact that 2.5 million fraudulent returns are

filed per year (almost 2% of all returns)112 indicates that the scale of this

crime is enormous. Considering that everyone from petty thieves to

criminal enterprises engage in ID-theft related tax fraud, it is impossible to

determine how many individuals are engaged in this activity, and therefore,

how much the IRS needs to improve enforcement measures. Without hard

figures, we might take the word of people on the ground. Detective Sal

Augeri from Tampa compared the prevalence of refund fraud to the crack

epidemic of the 1980s: "[I]t’s being done by anybody and everybody that

can get their hands on a computer. . . . It's just rock cocaine on a plastic

card.”113 If this is the case, 898 investigations do not seem nearly enough to

act as a meaningful deterrent to this crime.

109 See IRS, IR-2012-13, Identity Theft Crackdown Sweeps Across the Nation; More than 200 Actions Taken in Past Week in 23 States (Jan. 31, 2012).110 Id.111 See e.g. U.S. Gov't Accountability Office, GAO-02-363, Identity Theft Prevalence and Cost Appear to Growing (2002).112 Number of fraudulent returns (2.5 million) divided by 145 million annual returns. See Identity Theft and Income Tax Preparation Fraud, at 3.113 Tampa Bay Online, “Police: Tampa Street Criminals Steal Millions Filing Fraudulent Tax Returns,” at http://www2.tbo.com/news/politics/2011/sep/01/11/police-tampa-street-criminals-steal-millions-filin-ar-254724/.

21

Page 22: Writing Sample - Tax Identity Theft Note

The largest impediment to criminal enforcement of tax fraud is IRC

Section 6103(i)(2) which authorizes the IRS to disclose return information

to federal law enforcement for use exclusively in criminal investigations.114

This section does not allow disclosure to state and local law enforcement.115

While under 6103(c) a taxpayer may consent to the disclosure of return

information to any person designated by the taxpayer116, there are multiple

problems with the current code. First, 6103(c) assumes that the IRS can

contact the legitimate taxpayer, who may be dead or otherwise

unreachable. Second, the taxpayer may not consent to releasing

information to state and local law enforcement, especially considering

6103(c) does not allow the taxpayer to specifically limit the use of disclosed

information for law enforcement purposes.117 Therefore, the IRS could not

act independently to disclose information from such returns to state and

local law enforcement. Recently, the IRS implemented a pilot program with

the State of Florida (a haven of tax fraud) to facilitate consent-based

sharing of return information with state and local law enforcement

agencies.118 This program still does not allow the IRS to unilaterally

disclose return information with state and local agencies119, and will

therefore likely be only marginally successful. Unless Congress amends

these code provisions, most tax fraud enforcement must be done exclusively

114 Identity Theft and Income Tax Preparation Fraud, at 19.115 Id.116 Id.117 Id.118 Id.119 Id.

22

Page 23: Writing Sample - Tax Identity Theft Note

by federal law enforcement without assistance from state and local law

enforcement.

IV. Proposals to Combat to ID-Theft Refund Fraud

The IRS needs to enter the 21st century if it hopes to successfully

combat ID-theft refund fraud. For example, the IRS only stopped accepting

information returns in magnetic reel format in 2008.120 When fraudsters

can pretend to be both employer and employee121, no matter how much

technology improves it is likely impossible for the IRS to conclusively prove

an individual’s income. However, the IRS must make refund fraud more

difficult to commit, more risky, less profitable, and therefore, less attractive

to criminals.

A. Eliminate Refundable Credits

A simple, but radical, solution to stop refund fraud is to eliminate its

refundable credits. Congress could allow taxpayers to eliminate their tax

burden but not allow them to receive a refund. Every credit is subject to

some level of abuse.122 At the top of the list is the Earned Income Tax

Credit (EITC).123 The IRS believes that between 23% and 28% of EITC

120 Comments from the National Payroll Reporting Consortium, Internal Revenue Service Public Hearing on Proposed Real-Time Tax System 21 (January 25, 2012)121 See Other Business Identity Theft Schemes to Defraud, BusinessIDTheft.ORG, http://www.businessidtheft.org/Education/BusinessIDTheftScams/OtherSchemestoDefraud/tabid/177/Default.aspx (last available Jan. 9, 2012).122 Kelly Phillips, “A Simple Solution For Reducing Taxpayer Fraud,” Forbes (May 26, 2012) (http://www.forbes.com/sites/kellyphillipserb/2012/05/26/a-simple-solution-for-reducing-taxpayer-fraud/).123 Id.

23

Page 24: Writing Sample - Tax Identity Theft Note

claims are paid out in error, or approximately $10 billion annually.124 The

Child Tax Credit and First-Time Homebuyer Credit are also notorious for

abuse because of the lack of proof required to receive them.125

However, Congress will never take this route because refundable

credits are a popular socio-economic tool to combat poverty. Refundable

credits especially benefit working families with children.126 The Census

Bureau’s 2011 Supplemental Poverty Measure estimated that if these

credits were not refundable, the percentage of all people in poverty would

rise to 18.9 percent from 16.1 percent, and the percentage of children in

poverty would rise to 24.4 percent from 18.1 percent.127 To most, such a

result is not acceptable even if perhaps the IRS is not the best agency to

provide welfare services.128

B. Real-Time System

124 Id.125 See “First-Time Fraudsters – A Tax Credit So Silly Even a Four-Year-Old Can Do It,” The Wall Street Journal (October 29, 2009) (http://online.wsj.com/article/SB10001424052748703574604574501253942115922.html). See also “Investigators: Child Tax Credit Allows Fraudsters a Chance to Cheat”.126 See New Evidence That Refundable Credits Lift People Out of Poverty, Tax Credits for Working Families (November 14, 2012) (http://www.taxcreditsforworkingfamilies.org/2012/11/evidence-refundable-credits-lift-people-poverty/).127 Id.128 See Nick Timiraos, “Use of Refundable Tax Credits Has Grown in Recent Years,” The Wall Street Journal (October 21, 2008) (http://online.wsj.com/article/ SB122454768040352279.html) (explaining bi-partisan support for credit system).

24

Page 25: Writing Sample - Tax Identity Theft Note

In a real-time system, the IRS processes taxpayer returns

simultaneously with information returns.129 This would be done either by

delaying processing taxpayer returns until the IRS has received all

information returns, or by moving forward the filing deadline for

information returns. Given the American taxpayer culture of instant

gratification in which taxpayers expect their returns within days to weeks of

filing, the former suggestion is unpalatable. In early 2011, the IRS began

speaking publicly about its long-term goal to move to a real-time processing

system.130 The IRS’s goal has received powerful support.131 Currently,

employers must provide employees W-2s and 1099s by January 31, while the

deadline for reporting to the government is March 31.132 It is the view of

this paper that the benefits (reducing refund fraud and closing the tax gap)

of requiring reporting to the government by January 31st outweigh the costs

(potential for errors, employer and third party burden and IRS resource

drain).

129 Comments from the National Payroll Reporting Consortium, at 1.130 Id.131 TIGTA has stated: “Access to third-party income and withholding information at the time tax returns are processed is the single most important tool that the IRS could have to identify and prevent tax refund fraud.” TIGTA 2012-42-080, at 7. The Electronic Tax Administration Advisory Committee believes the benefits of a real-time system are “compelling and should be pursued.” Electronic Tax Administration Advisory Committee 2012 Annual Report to Congress, 12. The National Taxpayer Advocate has alternatively recommended delaying refund processing until after March 31st so that the IRS could investigate every suspicious return. Identity Theft and Income Tax Preparation Fraud, 4.132 Comments from the National Payroll Reporting Consortium, at 2.

25

Page 26: Writing Sample - Tax Identity Theft Note

A real-time system would prevent a vast portion of ID-theft related

refund fraud, but still could not eliminate some tax fraud schemes. A real-

time system would prevent the situation where the fraudster files before the

legitimate taxpayer files, thus preventing the legitimate taxpayer from

filing. In this situation, the IRS would discover the duplicate return

immediately, determine that one of them appears fraudulent because it

reports incorrect income and withholding, reject that return and process

the other return that contains information matching the IRS’s data. A real-

time system would also prevent identity-theft related refund fraud that

involves claiming credits that require earned income, as opposed to

unearned income reported on line 21 of 1040. For example, if an identity-

thief filed a return claiming the EITC, the fraudster’s reported

income/withholding would not match IRS records. However, a real-time

system would not prevent fraud if the legitimate holder does not have any

reported income or does not file a tax return, and the credits claimed do not

require earned income. For example, an identity thief could file a return on

behalf of a deceased person claiming the American Opportunity Credit,

which is a credit that does not require the taxpayer to have any earned

income. Further, assume the decedent taxpayer did not have any reported

income that year and no one else filed taxes on his behalf. If the IRS just

tried to match earned income reported on the return ($0), this figure would

be consistent with the IRS’s records showing no third party information

reported. The IRS would allow this fraudulent refund despite the

26

Page 27: Writing Sample - Tax Identity Theft Note

safeguards of real-time processing unless other filters blocked this request.

While there are undoubtedly other clever ways to commit fraud, a real-time

system would prevent the simplest forms of refund fraud and make identity-

theft related refund fraud more difficult and risky to perpetrate. An

identity-thief could rarely be absolutely certain that a taxpayer whose

information they have stolen will not also file or will not have reported

income.

Even if a real-time system only eliminated a portion of identity-theft

related refund fraud, the IRS can and should work rapidly to adopt such a

system. The IRS issues $5.2 billion in identity-theft related refunds per

year133, $10 billion falsely claimed EITC credits per year134, $7 billion falsely

reported credits to undocumented workers135, and the gross tax gap (the

difference between what Americans pay and should pay) is a whopping

$450 billion per year136. A real-time system would help close the tax gap

and eliminate falsely claimed EITC credits because the IRS would catch a

lot of income not reported.137

However, a real-time system is not without its costs. Advancing

reporting deadlines would impose higher compliance costs upon employers.

The National Payroll Reporting Consortium (NPRC), a non-profit trade

133 “IRS Pays Billions in Refunds to Identity Thieves”.134 Phillips.135 Id.136 IRS, IR-2012-4, IRS Releases New Tax Gap Estimates; Compliance Rates Remain Statistically Unchanged From Previous Study (Jan. 6, 2012).137 See U.S. Gov't Accountability Office, GAO-08-266, Costs and Uses of Third-Party Information Returns (2007).

27

Page 28: Writing Sample - Tax Identity Theft Note

association whose member organization provide payroll processing for one-

third of the private sector workforce, commissioned a study in 2011 in

response to the IRS’s desire to move to a real-time system.138 In addition to

the information provided to the employee on the W-2, employers must

report to the government up to 50 elements of compensation, such as health

and welfare benefits, equity compensation, non-cash fringe benefits, many

of which are administered by third parties and may not be determinable for

days to weeks after December 31st.139 However, by January 31st, generally

all information is available.140 In fact, six states and the District of

Columbia, already require information reporting by January 31st.141

Estimates on the cost on employers range from pennies to $1,000 per

employee.142 Given that technology is making it increasingly easy for small

and large businesses to electronically file their W-2s and 1099s, pennies

seems a more accurate estimate. A survey by the Government

Accountability Office (GAO) found that small business (5 employees and

under) filled out 1099s using accounting packages and spent from three to

five hours completing the tax process.143 The survey found that mid-sized

138 Comments from the National Payroll Reporting Consortium, 1.139 Id.140 Id.141 Id. at 2.142 The highest estimate pulls a random number ($1,000) from the air and multiplies it by the number of firms in the United States (5 million). See Joseph Cordes, Should the Government Prepare Individual Income Tax Returns?, Technology Policy Institute (Sept. 2010), at http://www.techpolicyinstitute.org/files/should%20the%20government %20prepare%20individual%20income%20tax%20returns.pdf.143 GAO-08-266, at 26.

28

Page 29: Writing Sample - Tax Identity Theft Note

employers (20-25 employees) spent just over an hour.144 Further, employers

already file 99.7% of W-2s and 90% of all other types of returns

electronically.145 The IRS should require all employers to file W-2s and

1099s electronically.146 The cost should be minimal.147 Some states already

require all employers to electronically file.148

In order to successfully implement a real-time processing system, the

IRS must be up for the task or be given the resources to get there.

Currently the IRS is overburdened and stretched too thin. Even though IRS

already has access to income and withholding information for individuals

who receive Social Security benefits at the end of December, the IRS has

not established a procedure to cross-check this information to identify

fraud.149 Nor does the IRS have a procedure to use prior-year third party

information to identify suspicious claims.150 AMTAP, the department that

verifies suspicious wage and withholding information, has a staff of only

336.151 The IRS is unable to keep up with all that it is tasked to do, and

144 Id.145 Electronic Tax Administration Advisory Committee 2012 Annual Report to Congress, 4. 146 Currently, employers with fewer than 250 employees may file paper returns. This threshold was established by Tax Equity and Fiscal Responsibility Act of 1982 (TEFRA) when electronic filing required expensive formatting, generating and shipping magnetic reel tapes. Comments from the National Payroll Reporting Consortium.147 For FY 2009, the IRS processed three billion information returns fewer than 2% of which were in paper format. Reducing that 2% to 0% should not impose as much burden on employers as keeping paper filing as an option imposes on the IRS. Id.148 Id.149 TIGTA 2012-42-080, at 13.150 Identity Theft and Income Tax Preparation Fraud, at 12-13.151 Id. at footnote 11.

29

Page 30: Writing Sample - Tax Identity Theft Note

Congress adds more duties each year without increasing the IRS’s budget

or mandating improvement in digital infrastructure.152 The IRS would need

a dramatic technological overhaul, consolidation of its various databases153,

streamlined and consistent procedures, and budgeting and staffing

necessary to achieve this. This would be an ambitious undertaking, but it

would be paid for quickly by eliminating fraud and reducing the tax gap,

and it could gain support from taxpayers anxious to curb identity theft.

C. Identity Ecosystem

Rather than imposing the burden upon employers, the IRS could

create a voluntary system whereby taxpayers can safeguard their identities

by providing the IRS with personal information that the IRS can cross-

reference with returns to verify their validity. For instance, imagine the

following system. The legitimate holder of a SSN logs into the IRS website.

He provides his SSN. The IRS requests that he verify his identity using

several secure credentials. The legitimate holder of the SSN inputs various

identifying information, such as dependents, banking accounts, employers,

etc. If a tax thief files a return that reports information that does not match

152 IRS has a lot of work already (the agency is tasked under health reform with implementing eligibility determination, documentation, and verification processes for premium and cost sharing credits, and with handling a greater reporting volume of 1099 Forms; also other credits) See Cordes, footnote 15. While the IRS had pushed last year to increase its 2012 budget by $1 billion, the 2012 budget that was ultimately passed by Congress cut the IRS's budget by about 3%, to $11.8 billion. “IRS Struggles To Keep Up Amid Surge In Tax Fraud”.153 The IRS records identity theft information manually on 22 separate databases. Identity Theft and Tax Fraud (statement by J. Russell George), at 12.

30

Page 31: Writing Sample - Tax Identity Theft Note

the information provided by the legitimate taxpayer, the IRS will reject the

return. While the system need not be as complex as this, there should be

some mechanism whereby a taxpayer may demand that a return filed on his

behalf contain additional security credentials. All taxpayers could have

access to a secure PIN, such as IP PIN. It would be a PIN that can only be

accessed by the legitimate taxpayer who alone has the knowledge to supply

the necessary security credentials.

D. Verify Refunds

The IRS could block many refunds to identity-thieves simply by

verifying the refund recipient’s identity. The average tax refund in 2011

was $2,993.154 This is a lot of money to the average person. When someone

tries to pick up an online order for a 60” television from BestBuy, customer

service will request a copy of the emailed receipt and proof of identification,

usually a photo ID and the credit card used to make the purchase. I have

tried to pick up a 24” monitor worth $300 for an elderly, vision-impaired

man unable to leave his house, and been rejected because I did not possess

the corresponding photo ID, and the store management would not accept

identification over the phone. The IRS, however, will mail or deposit this

significant sum to any address or account as long as the return has a valid

SSN and corresponding name. The IRS receives 109 million refund

requests.155 Understandably, verifying the identities of these recipients,

most of whom are legitimate taxpayers waiting for their refunds to pay bills,

154 Identity Theft and Income Tax Preparation Fraud, at 3.155 Id.

31

Page 32: Writing Sample - Tax Identity Theft Note

would be time-consuming and expensive; this does not make it any less

crazy that the IRS dispenses $3,000 in taxpayer dollars like it’s candy at a

parade. The IRS could set a dollar amount or a suspicion level set by filters

at which a manual review must occur. People requesting refunds could also

have the burden of providing sufficient credentials to prove identities. A

taxpayer requesting $10,000 should be required to provide at least two

forms of identification along with their tax return. Mandating that

taxpayers provide higher proof for refundable credits, not just in identity-

theft cases, is a practical solution that would curb abuse.

D. Miscellaneous Proposals

1. EFDS algorithms should be improved to block irrelevant taxpayer

accounts, such as decedent accounts that are up-to-date on taxes, flag for

scrutiny accounts belonging to previous ID-theft victims and prisoners,

factor into consideration locations in which a large number of fraud occurs

and utilize data from ongoing and prior ID-theft cases.

2. Congress should pass legislation to restrict access to the DMF.

DMF is available to the public under the Freedom of Information Act.156

Pension administrators sought access to SSA information in order to

prevent fraud by using the information in the file to verify when a

beneficiary died so they could stop benefit payments.157 The DMF’s other

legitimate use is genealogy. Congress could pass legislation to restrict

156 Id. at 15-22.157 Id.

32

Page 33: Writing Sample - Tax Identity Theft Note

access to the DMF to pension administrators and delay access to the public

for several years.

3. The IRS should mandate withholding for independent contractors.

Currently, there is no way to stop an individual from providing his or her

employer a fake or fraudulently acquired SSN. Undocumented workers

often use this technique because they do not have SSNs.158 An independent

contractor seeking to avoid taxation could also use this technique by

providing his employers a fake SSN. When the employer reports the

income to the IRS, the legitimate SSN holder may be liable for the taxes. To

discourage this type of identity-theft, the IRS should require withholding for

independent contractors so that they either have an incentive to file a

return or do not have as much incentive to avoid using their own SSN.

Conclusion

Nothing short of eliminating refunds will completely eradicate refund

fraud; however, the IRS has done too little to curb identity-theft related

refund fraud. As a result, criminals are taking advantage of this easy crime

to steal from legitimate taxpayers. This paper contains many common-

sense proposals that the IRS could implement with little difficulty and some

proposals that will require significant political resolve. Successfully

implemented, these proposals will pay for themselves and protect legitimate

taxpayers from the unscrupulous behavior of criminals and dishonest

taxpayers.

158 Cynthia Blum, Rethinking Tax Compliance of Unauthorized Workers After Immigration Reform, 21 Geo. Immigr. L.J. 595 (Summer 2007).

33