Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Tinder test that allows users to set “height priority”

May 29, 2025

YouTube will quickly make viewers use Google lenses to search for what they are looking at while looking at shorts

May 29, 2025

US government sanctions technology company involved in cyber fraud

May 29, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Tinder test that allows users to set “height priority”

    May 29, 2025

    YouTube will quickly make viewers use Google lenses to search for what they are looking at while looking at shorts

    May 29, 2025

    Apple's US App Store surpassed $400 billion in developer billing and sales in 2024

    May 29, 2025

    Meta AI has 1B active users every month

    May 29, 2025

    Meet LoveJack, a dating app designed for users to find Love using five words

    May 29, 2025
  • Crypto

    GameStop bought $500 million in Bitcoin

    May 28, 2025

    Vote for the session you want to watch in 2025

    May 26, 2025

    Save $900 + 90% from 2 tickets to destroy 2025 in the last 24 hours

    May 25, 2025

    Only 3 days left to save up to $900 to destroy the 2025 pass

    May 23, 2025

    Starting from up to $900 from Ticep, 90% off +1 in 2025

    May 22, 2025
  • Security

    US government sanctions technology company involved in cyber fraud

    May 29, 2025

    Ten years later, the bootstrap Thinkst Canary will reach $20 million ARR without VC funding

    May 29, 2025

    Security Startup Horizon3.AI raises $100 million in new rounds

    May 28, 2025

    When fighting a security incident, he was hit by Victoria's secret halt.

    May 28, 2025

    Data broker giant LexisNexis says more than 364,000 personal information has been violated

    May 28, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    7 days until doors open during session: ai

    May 29, 2025

    Geal Capital Partners announces nearly $82 million Fund II

    May 29, 2025

    Founder Sahil Lavingia says he was booted from Doge just 55 days later

    May 28, 2025

    Confuse your 2025 agenda: Vote for your favorite session

    May 28, 2025

    Competing with incumbents with linear Christina Cordoba in the session: ai

    May 28, 2025
TechBrunchTechBrunch

The biggest violation of US government data is underway

TechBrunchBy TechBrunchFebruary 5, 20258 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


The operatives working for ELON MUSK include a system in charge of managing data on the employees of the federal government and the system in charge of paying $ 6 trillion to Americans. We have gained unprecedented access to the range.

For the past two weeks, the representatives of the mask (the government's efficiency or the DOGE President Advisory Committee), despite the questions about security clearance and cyber security practices, And managed the dataset. , And the legality of the mask activity.

Whether it's a feat that is completely dependent on your perspective or a coup, most of the mask businesses and friends are small groups in young private sector -Many people have no previous government -now -now -now -now Now, you can control it and in some cases. The federal government's most sensitive data is retained in millions of Americans and the nearest allies in the country.

Access by the Musk's Doge team represents the most known compromise of the data held by the federal government by personal groups, and has not disturbed them.

DOGE has hardly acknowledged the advanced activities. The task is assigned to the media that reports the suspected cyber security practices and the breakdown of many years of cyber security norms, which is dangerous to access the government sensitive data being accessed by malicious actors.

Many of DOGE's jobs avoid surveillance and transparency, leaving unresolved questions, whether or not the customs of cyber security and privacy have been protected. It is unknown whether the DOGE staff has followed the procedure to prevent this data from being accessed by others, or if other procedures have been taken to protect delicate data on Americans.

So far, evidence suggests that security is not the best.

For example, it is reported that the DOGE staff accessed the government call using a personal Gmail account. A newly submitted lawsuit, which is newly submitted by the Federal Federation, claims that DOGE has violated the Federal Privacy Law to connect unauthorized e -mail servers to government networks.

Whether the DOGE staff is a bad actor has missed a part of the points. Sinking, spy, or ignorant acts can create the same optimal result of exposure or loss of national confidential datasets.

For the time being, it's worth seeing the method we came here.

Suspicious security clearance

DOGE took over the category and took over a huge number of stores in American data, so career staff and US parliamentarians, who have been seeking answers from the Trump administration, were surprised.

The efforts to manage the national data store by the mask have also been closed to cyber security experts. Some people spend their careers in governments that concentrate on securing the most sensitive systems and data of Americans.

There is a question remains about what level of security clearance the DOGE staff has in the clearance and whether the provisional security clearance will provide the authority to require access to a restricted federal system. Returning to the office, Trump signed an administrative order, allows administrative authorities to provisionally grant individuals a secure clearance separated from the “secret” to individuals, and have almost never been a substantial screening, and for many years. Avoid significant deviation from the established protocol.

The security guard stands at the entrance of Washington DC's USAID headquarters on February 3, 2025.The security guard stands at the entrance of the USAID headquarters in Washington on February 3, 2025.

DOGE's confusion over staff clearance has brought a short conflict among some career staff in recent federal divisions. According to the AP communication, the US International Development Organization (USAID) took a vacation after the DOGE staff hindered the confidential information. Later, DOGE gained access to the classified facilities of USAID.

DOGE's advisor Katie Miller stated in X's post that “without the appropriate security clearance” has never accessed, but the details of the team's clearance remain unspecified.

Several members of the Senate Intelligence Committee members said on Wednesday that they are still seeking the answer to DOGE and their clearance.

“Information about who officially hired under DOGE, what DOGE operates, how DOGE is reviewing and monitoring the staff and representatives, and who is formally hired under DOGE. Is not provided, and the Senator wrote that the American personal information.

Acquisition of the Douge government

President Trump's inauguration ceremony (and within a week after his presidential order established DOGE, Musk staff began to infiltrate various federal governments. From tax refunds to social security checks, from the government. The first delicate payment system of the US Treasury, including millions of Americans, was paid.

DOGE also has access to USAJOBS, which has data on the Human Resources Department of the government, which is a human resources department of the government, including the database of all federal workers, and the applicants who applied for the federal government. 。

OPM staff said that the team of the mask had no access to the system or no surveillance. “It creates the meaning of true cyber security and hacking,” he told Reuters.

DOGE's activities have led to a wide range of republican members.

Senator Ron Widen (D-OR), the most advanced Democratic Party of the Senate Finance Committee, is a national safety, given the conflict of interest in extensive business operations in China. It was called a security risk. A group of the Senior Democratic Party said in a later letter to the Ministry of Finance, saying that DOGE could access delicate government data, “there is a possibility of national security.”

In the post of the Blue Key's former Republican strategist Stuart Stevens, the acquisition of the Ministry of Finance's system was called “the most important data silver in cyber history,” and “data business individuals can access social security information. I added. ”

Senator Chris Murphy (D-CT) talks to the crowds gathered in Washington DC on February 4, 2025 against the efficiency of the government and the government. Several members of the Democratic Party of the Conference joined the rally and protested for access to Musuk's payment system to the Ministry of Finance.Several democratic members and others outside the US Treasury to protest against the Mask of the Musk, Anna Rose Rayden /Getti Image

The Ministry of Finance defends movements to give the delicate payment system of the department, and the mask DOGE team can access the bank of the Ministry of Finance of Americans about Americans. I confirmed it. The letter has confirmed that Tom Krause, the highest executive of Cloud Software Group, which owns Citrix and some other technology companies, is currently an employee of the Ministry of Finance. KRAUSE has not returned the comments.

Later, DOGE gained access to multiple sensitive internal systems from the Ministry of Education, including datasets, which include personal information about millions of students registered in financial assistance. DOGE staff also demanded the “all access” systems of small and medium -sized enterprises, such as contracts, payments, and personnel information.

It is reported that the team of the mask also has access to the US Ministry of Health and Welfare Payment System and has access to US organizations that manage Medicate and Medicade. DOGE is also accessing the human resources system of the National Ocean Air Bureau (NOAA) and will access the Ministry of Transport system.

Domestic and global impacts

There is an immeasurable security risk from the US government's access to internal data cores.

One of the mistakes that may be wrong is that if you access the government network from an unaccepted malware, it infringes and classifies other devices on the federal network, but confidential. High government information will be theft. And using the incorrect personal information on devices or the cloud environment that does not meet the government's top security specifications, or the most powerful security control, the data is further compromised or leaked. 。

These are not unlikely scenarios. These types of violations always occur.

Last year alone, some of the biggest data violations in history were seen. It was caused by malicious access obtained through personal devices of company employees. 。 The compromise of the team's qualification or access, or the inappropriate handling of confidential databases can cause the irreparable loss, theft, or incorrect arrangement of highly confidential government data.

Probably the most troublesome is DOGE, and its activities are active outside the public scrutiny.

Officials and members of the government who have been monitored by the government have noted the insights of which data can be accessed within the government or what the cyber security management or protection is. Experts in the department who spent many careers to protect the data stored in these systems to attack the most sensitive datasets as individuals who have little government experience Can be.

Technology and privacy lawyer Cathy Gellis wrote in TechDirt, Musk and his DOGE team have a computer fraud and abuse method that covers access to the federal system without appropriate permission. I argue that there is a high possibility of being “personally responsible”. 。 Gellis wrote that the court must finally judge DOGE's activities as “unacceptable access”, and thus it is illegal.

There is also the problem of how the US state government responds to the data of the inhabitants at the federal level. The US state has data violations that require the protection of citizens data, even if the federal government is not. It has not yet been seen whether a mask team has access to the federal system of legal measures.

This access is related to the United States, its diplomatic allies and unstable ground. The ally may not want to share Intelligence with the US government if information can be leaked and spilled into public domains as a result of the collapse of cyber security practices aimed at protecting confidential information. yeah.

In fact, the results of Cyber ​​Security, a continuous access to the federal department and dataset, may not be known for a while.

+1 Contact the Signal of +1 646-755-8849 and Zack Whittaker of WhatsApp. You can safely share your documentation with Techniccrunch via Securedrop.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

US government sanctions technology company involved in cyber fraud

May 29, 2025

Ten years later, the bootstrap Thinkst Canary will reach $20 million ARR without VC funding

May 29, 2025

Security Startup Horizon3.AI raises $100 million in new rounds

May 28, 2025

When fighting a security incident, he was hit by Victoria's secret halt.

May 28, 2025

Data broker giant LexisNexis says more than 364,000 personal information has been violated

May 28, 2025

Naukri has published the recruiter's email address, researchers say

May 24, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Tinder test that allows users to set “height priority”

May 29, 2025

YouTube will quickly make viewers use Google lenses to search for what they are looking at while looking at shorts

May 29, 2025

US government sanctions technology company involved in cyber fraud

May 29, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.