<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: IRS computer hack bigger than previously thought	</title>
	<atom:link href="https://behindtheblack.com/behind-the-black/points-of-information/irs-computer-hack-bigger-than-previously-thought/feed/" rel="self" type="application/rss+xml" />
	<link>https://behindtheblack.com/behind-the-black/points-of-information/irs-computer-hack-bigger-than-previously-thought/</link>
	<description></description>
	<lastBuildDate>Thu, 20 Aug 2015 03:25:03 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>
		By: Max		</title>
		<link>https://behindtheblack.com/behind-the-black/points-of-information/irs-computer-hack-bigger-than-previously-thought/#comment-790898</link>

		<dc:creator><![CDATA[Max]]></dc:creator>
		<pubDate>Thu, 20 Aug 2015 03:25:03 +0000</pubDate>
		<guid isPermaLink="false">http://behindtheblack.com/?p=35598#comment-790898</guid>

					<description><![CDATA[They should&#039;ve used the Diebold computer system!   The system the &quot;voting computers&quot;
use. 
It&#039;s the only computer system left in the world that has not been hacked...   Or has it ?  It is kind of old and not doing well. 

    Something to note about the IRS hack, the information gathered there is more than just personal. The IRS keeps on file everything about you including fingerprints, signatures, family history including mothers maiden name, and how much money you have, even the accounts and how to access them. 
     White collar thieves are not interested in the small stuff though. It&#039;s the accounts of  corporations, billionaires, firms and businesses, Politicians, their family, and list of their donors were likely targets as well. 
      If you&#039;re going to hack the IRS, you must be capable of thinking big.
     For instance, why take information when you can alter it to make someone look like they haven&#039;t paid their taxes? Or perhaps pay too much and is entitled to a few million refund?
    We will never know what really happened. Why tell us the truth when a lie will work better? The motto of this administration is never let a crisis go to waste. 
    I&#039;m hearing rumors that the other break-in of all the federal employees personal files is being used for a money laundering scheme to make donations to the political parties.  As long as the donation is not too much, rules of privacy protects the donors.]]></description>
			<content:encoded><![CDATA[<p>They should&#8217;ve used the Diebold computer system!   The system the &#8220;voting computers&#8221;<br />
use.<br />
It&#8217;s the only computer system left in the world that has not been hacked&#8230;   Or has it ?  It is kind of old and not doing well. </p>
<p>    Something to note about the IRS hack, the information gathered there is more than just personal. The IRS keeps on file everything about you including fingerprints, signatures, family history including mothers maiden name, and how much money you have, even the accounts and how to access them.<br />
     White collar thieves are not interested in the small stuff though. It&#8217;s the accounts of  corporations, billionaires, firms and businesses, Politicians, their family, and list of their donors were likely targets as well.<br />
      If you&#8217;re going to hack the IRS, you must be capable of thinking big.<br />
     For instance, why take information when you can alter it to make someone look like they haven&#8217;t paid their taxes? Or perhaps pay too much and is entitled to a few million refund?<br />
    We will never know what really happened. Why tell us the truth when a lie will work better? The motto of this administration is never let a crisis go to waste.<br />
    I&#8217;m hearing rumors that the other break-in of all the federal employees personal files is being used for a money laundering scheme to make donations to the political parties.  As long as the donation is not too much, rules of privacy protects the donors.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
