Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Breach
2019
IRS consultant charged in leak of tax returns for Trump, wealthy Americans

IRS consultant charged in leak of tax returns for Trump, wealthy Americans

Table of Contents

Incident Details

An IRS consultant from Washington has been accused of unlawfully accessing and sharing tax records of ex-president Donald Trump and numerous affluent individuals in 2019 and 2020 with two media outlets. Charles Edward Littlejohn, aged 38, is charged with one federal felony for improper disclosure of tax details, which carries a maximum penalty of five years in jail, as per the Justice Department.

Incident

How Did the Breach Happen?

The incident occurred when the IRS advisor unlawfully obtained the tax documents of ex-president Donald Trump and numerous affluent individuals.

What Data has been Compromised?

The data breach involved the tax filings of ex-president Donald Trump as well as numerous affluent individuals.

Why Did the company's Security Measures Fail?

The reason behind the specific breach where the company's security measures did not succeed is not known.

What Immediate Impact Did the Breach Have on the company?

The security breach had an instant effect on the Internal Revenue Service's reputation and sparked worries about the confidentiality and protection of tax data.

How could this have been prevented?

Enhanced security measures and access controls could have stopped this breach from happening and safeguarded sensitive tax data.

What have we learned from this data breach?

The significance of robust security protocols and defenses in safeguarding sensitive data, particularly in cases involving notable individuals, is underscored by this data breach.

Summary of Coverage

An IRS consultant faced accusations of unlawfully taking the tax documents of ex-president Donald Trump and affluent individuals, and sharing them with media outlets. This incident sparked worries regarding the confidentiality and protection of tax records.

Is your System Free of Underlying Vulnerabilities?
Find Out Now