House Committee Knows Name of Secret IRS Leaker

House Ways and Means Committee Chairman Rep. Dave Camp House Ways and Means Committee Chairman Rep. Dave Camp Charles Dharapak/AP

The House Ways and Means Committee has solved the mystery of which Internal Revenue Service employee in 2012 allegedly violated the law by releasing the donor list of the conservative National Organization for Marriage to its political opposite number, the Human Rights Campaign.

But because of the tax code’s privacy protections, the panel is unable to release the employee’s name and can only unveil the name of a third party who allegedly transferred the document to the competing nonprofit.

The issue was highlighted this June when, at the start of congressional probes of the controversy over the IRS Exempt Organizations division’s improper extra scrutiny of conservative nonprofit groups, a witness from the pro-marriage group complained that in the middle of the 2012 presidential campaign, its mandatory IRS Form 990 Schedule B donor list was turned over to a group that presses gay and lesbian rights.

“Through our investigation, we identified that Matthew Meisel released the document to the Human Rights Campaign,” a committee spokeswoman told Government Executive in an email. But “how/when/who gave the document to Meisel is all” protected under Section 6103. “We do know the document is from the IRS.”

Meisel, a former employee of Bain Capital, did not respond to inquiries. Neither did the Human Rights Campaign.

The story was first reported by National Review Online. “I am astounded at the ease by which an individual was able to obtain and release confidential information including private citizens’ names and addresses,” House Ways and Means Committee Chairman Rep. Dave Camp, R-Mich., told a reporter. “What makes the situation even worse is that the law, intended to protect taxpayers, is being used as a shield for those that perpetrate this wrongdoing.”

John Eastman, chairman of the board of the National Organization for Marriage, which is suing the IRS after unsuccessful efforts to obtain the leaker’s identity under the Freedom of Information Act, told Government Executive, “The IRS has taken the position that disclosing the identity of the employee who appears to have committed a felony against us would itself violate the confidentiality of the IRS code he violated.”

Eastman said he thinks the leak was “part of an overall campaign to harass and intimate our donors into silence, as we allege in our lawsuit. It was used to file a frivolous complaint against us before the California Fair Political Practices Commission, which cost us $50,000 to respond.” He also said he believes that the release of his donors’ names has caused many donors to cut back on giving “because of concerns about confidentiality.”

During a Ways and Means hearing this June, Rep. Sander Levin, D-Mich., mentioned that the Treasury Inspector General for Tax Administration had stated that he had already investigated the leak and taken disciplinary action. Both TIGTA and the IRS declined comment.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.