Is the IRS a corrupt federal agency?

aristotle

Veteran Expediter
One gets the feeling that our federal government is hoping to run out the clock on this IRS controversy. By stonewalling, concealing, prevaricating, use of delay tactics, taking the 5th admendment, forgetting to inform, inexplicably losing emails and using any means to thwart due process- the truth might never be discovered or not discovered until those in power now are long gone from office. Hopefully, one brave soul will step forward to talk about what actually happened. Using the full power of the IRS to influence the outcome of a presidential election is never going to be acceptable.
 

layoutshooter

Veteran Expediter
Retired Expediter
"Using the full power of the IRS to influence the outcome of a presidential election is never going to be acceptable."

it will be the norm.
 

Jamin_Joe

Seasoned Expediter
My belief of cover up is based on. If it looks like poop, smells like poop, its poop!

With the current administration, this investigation will go nowhere. In the event that the leadership changes, then the investigation could resume and the charges filed, depending on the statue of limitations. Clearly stated, this is abuse of power and a blatent violation of law and the lack of respect for the rights of citizens as defined in the constitution and bill of rights.

To what degree will the violation of law be tolorated? Is the Government allowed to violate peoples rights based on partizen politics? Our Founding Fathers forsaw these types of abuses, but the missing element is the public outrage to forcibly remove via recall votes of the offendors.

Very dangerous how gullible the nation is to what is right due and their mindless support of the offendors. Very insane!
 

layoutshooter

Veteran Expediter
Retired Expediter
"Very dangerous how gullible the nation is to what is right due and their mindless support of the offendors. Very insane!"

And now you know why the feds wanted control of the public indoctrination system, it worked.
 

Jamin_Joe

Seasoned Expediter
"Very dangerous how gullible the nation is to what is right due and their mindless support of the offendors. Very insane!"

And now you know why the feds wanted control of the public indoctrination system, it worked.

Want to add, right out of the Socilizm playbook.

People should read the guidlines of Socialism from the 30's thru the early 60's to see for themselves.
 

layoutshooter

Veteran Expediter
Retired Expediter
Want to add, right out of the Socilizm playbook.

People should read the guidlines of Socialism from the 30's thru the early 60's to see for themselves.

I am well aware of the "play book", which includes a "take over" of health care and the ending, or greatly restricting, private arms ownership.

It's not only the "socialist" playbook, that same "book" was used by the "royal families" to gain and hold power.
 
Last edited:

Jamin_Joe

Seasoned Expediter
Yes the old lust for power, money, and prestege. My hope is that one day people will relize they are being used and take approprate action while they still can.
 

Jamin_Joe

Seasoned Expediter
On the hopeful side, there are alot of us that are stubborn enough to insist on what is right. Of course it may cost us more than we barganed for in the end.
 

muttly

Veteran Expediter
Retired Expediter
One gets the feeling that our federal government is hoping to run out the clock on this IRS controversy. By stonewalling, concealing, prevaricating, use of delay tactics, taking the 5th admendment, forgetting to inform, inexplicably losing emails and using any means to thwart due process- the truth might never be discovered or not discovered until those in power now are long gone from office. Hopefully, one brave soul will step forward to talk about what actually happened. Using the full power of the IRS to influence the outcome of a presidential election is never going to be acceptable.
You can apply this to their other scandals as well. Fast & Furious: Holder's delay in releasing information to the investigation, and then Obama claiming Executive Privilege preventing the release of information pertaining to Holder.
Benghazi: Hillary becoming physically ill when Congress wanted to talk to her, and then had further delays by her 'concussion' episode.
A pattern of stonewalling.
It also looks like they took a page out of the Clinton Administrations EPA record purging process:
The EPA was destroying computer files way before those hacks at the IRS « Hot Air
 

muttly

Veteran Expediter
Retired Expediter
From my previous link (eerily similar):
According to an Associated Press report, a federal judge has held the EPA in contempt for destroying computer files sought after by a conservative group: Landmark Legal Foundation…
U.S. District Judge Royce Lamberth had ordered the EPA on Jan. 19, 2001, at the end of the Clinton administration, to preserve all documents relevant to a Freedom of Information Act request by Landmark regarding the federal agency’s contact with outside groups. That same day, EPA Administrator Carol Browner asked a technician to delete her computer files. Browner later testified that she was unaware of the court order and simply wanted to remove some games from her work computer.
According to AP, EPA officials later admitted wiping clean the computer files from Browner and other top staff despite Lamberth’s order.
 

layoutshooter

Veteran Expediter
Retired Expediter
And the EPA is still around, damaging our economy at an ever increasing rate. Nothing will be done.
 

Turtle

Administrator
Staff member
Retired Expediter
The emails may be gone, but the data trail is out there in the forms of the header info and the path that the data took is still out there in the form of transaction logs of the servers and routers.
The data trail might be there, maybe, but the data itself is most definitely not. On backbone routers, access logs are usually kept for 13 months, sometimes as long as 25 months, transport logs are rarely kept for longer than 30, 60 or 90 days, as those are used almost exclusively for diagnosing network problems. SMTP, POP and other mailserver logs are rarely kept more than a year. So the chances of mail and path header information still being archived from 3 years ago is slim on the servers, and nearly zero for the routers.

It is posdible to regenerate these emails from the packets, since tge whole email wont fit into one packet. This us a royal pain in the rear, but there is software that can do this. Deleting network data is vertually impossible due to the way data is sent and what router and servers it was passed through.
This is entirely incorrect. Packet headers do not contain any data payload transfer data, they only contain the header information. A packet consists of a header (Ethernet, IP, UDP) and a payload (the information contained in an e-mail, for example). You cannot recreate the payload from the header information. It would be like trying to recreate all of the individual posts in a 1500-post Locations thread here on EO using only the thread title and the date and time they were posted, and who posted them. The contents of those posts simply are not there. It would be like trying to identify exactly what was loaded on each and every truck at a shipper by using solely the driver sign-in sheet with the driver's name, carrier, truck number and time in/out.

All network packets do is transport data. They move it from A to B. They don't archive the data itself, and the data cannot be recreated from the activity logs.
 

layoutshooter

Veteran Expediter
Retired Expediter
The data trail might be there, maybe, but the data itself is most definitely not. On backbone routers, access logs are usually kept for 13 months, sometimes as long as 25 months, transport logs are rarely kept for longer than 30, 60 or 90 days, as those are used almost exclusively for diagnosing network problems. SMTP, POP and other mailserver logs are rarely kept more than a year. So the chances of mail and path header information still being archived from 3 years ago is slim on the servers, and nearly zero for the routers.

This is entirely incorrect. Packet headers do not contain any data payload transfer data, they only contain the header information. A packet consists of a header (Ethernet, IP, UDP) and a payload (the information contained in an e-mail, for example). You cannot recreate the payload from the header information. It would be like trying to recreate all of the individual posts in a 1500-post Locations thread here on EO using only the thread title and the date and time they were posted, and who posted them. The contents of those posts simply are not there. It would be like trying to identify exactly what was loaded on each and every truck at a shipper by using solely the driver sign-in sheet with the driver's name, carrier, truck number and time in/out.

All network packets do is transport data. They move it from A to B. They don't archive the data itself, and the data cannot be recreated from the activity logs.

A GOOD traffic analyst can, however, determine much from the externals of a packet. Proper use of net diagrams, etc, can prove to whom and from the traffic followed. Dates can be proven. Numbers of emails shown.

Signal/packet externals are almost as important as the internal data is. The indicative information is priceless to the analysis. IF that information is still available it could be used to push for warrants for further searches or provide enough to push for more subpoena's.

In my "former" world, I used those "externals" to provide targeting information for my nukes.
 

Turtle

Administrator
Staff member
Retired Expediter
Even a BAD traffic analyst can determine a whole lot. Most people haven't a clue as to just how much personally identifiable information about them can be found inside a simple TCP/IP packet, even when they are surfing the net anonymously. A few years ago a particularly nasty worm (MBlaster) was released onto the Internet, and the FBI tracked the offender through more than half a dozen remailers and literally hundreds of routers. And they did it in 3 days.

In my former "world" I had certifications in Novel Networking and Cisco Networking, as well as MCP certifications in NT Networking, Server, Desktop, and Applications, with a particular interest and expertise in networking protocols, including TCP/IP, NNTP, Transport Layer, Network Layer, MAP, Logic Link Control, Network Socket Control, Bonding Protocol, and Cryptographic Protocol. I also did hard drive forensics recovery. With the right software and hardware tools, you can do some really kewl stuff.
 

layoutshooter

Veteran Expediter
Retired Expediter
Not ONLY what is in the packet externals, sometime there are "little extras" tacked on as "preambles or postambles". Knowing how to find those "little extras" is the difference between the good and bad signal and traffic analysts. Knowing your target is just as important as knowing the tech side of life. "FEEL" is everything.

I used to have LOTS of "kewl" toys too, but, my biggest "find" was done because I knew how look at things in "old" ways, that the "toys" hid. Without going into detail, digitizing things that were analog to start, is not always a wise move.

I never worked with IP addresses, but I can picture them along the lines of an assigned radio freq, using them to ID targets in the same way. The packets I worked on were NOT on the internet.
 
Last edited:
Top