Topics

a la mode

AI

Amazon

Article image

Image Credits:Chip Somodevilla / Getty Images

Apps

Biotech & Health

clime

a photo of Elon Musk looking up at the ceiling while standing in front of a historical painting

Image Credits:Chip Somodevilla / Getty Images

Cloud Computing

Commerce

Crypto

A security guard stands at the entrance to the USAID headquarters on February 03, 2025 in Washington, DC

A security guard stands at the entrance to the headquarters of the U.S. Agency for International Development, or USAID, on February 3, 2025, in Washington, D.C.Image Credits:Kevin Dietsch / Getty Images

Enterprise

EVs

Fintech

U.S. Sen. Chris Murphy (D-CT) speaks to a crowd gathered in front of the U.S. Treasury Department in protest of Elon Musk and the Department of Government Efficiency on February 4, 2025 in Washington, DC. Several Democratic members of conference joined the rally to protest Musk’s access to the payment system of the Treasury, which houses the private information of millions of Americans.

Several Democratic senators and others outside the U.S. Treasury Department to protest Elon Musk.Image Credits:Anna Rose Layden / Getty Images

Fundraising

convenience

bet on

Google

Government & Policy

Hardware

Instagram

Layoffs

Media & Entertainment

Meta

Microsoft

Privacy

Robotics

Security

Social

Space

Startups

TikTok

transport

Venture

More from TechCrunch

Events

Startup Battlefield

StrictlyVC

Podcasts

video

Partner Content

TechCrunch Brand Studio

Crunchboard

Contact Us

Elon Musk’s DOGE has taken control of large swathes of Americans’ private information held by the U.S. government.

secret agent working for Elon Musk have gained unprecedented entree to a swath of U.S. authorities department — let in agencies creditworthy for care data point on millions of federal employees and a system of rules that treat $ 6 trillion in defrayment to Americans .

During the first three weeks of Trump ’s second organization , Musk ’s group of interpreter — a presidential advisory board known as the Department of Government Efficiency , or DOGE — hastaken ascendance of top federal departments and datasets , despite questions about their security clearance , their cybersecurity practice , and the legality of Musk ’s activity .

Whether a feat or a coup ( which depend only on your power point of view ) , a minor group ofmostly young , secret - sphere employeesfrom Musk ’s byplay and associates — many with no prior government experience — can now view and , in some cases , control the federal regime ’s most sensitive data held on millions of Americans and the nation ’s closest allies .

The memory access by Musk ’s DOGE team exemplify the widest - known compromise of federal government - held data by a private mathematical group of someone — and little has gotten in their means .

DOGE has admit few details about its ongoing action . That task has been left to the medium , which has reported refutable cybersecurity exercise and the crack-up in long - stand cybersecurity norms that lay on the line sensitive government datum from being accessed by villainous actor .

Much of DOGE ’s work is avoiding inadvertence and transparency , leaving open questions around whether cybersecurity and concealment drill are being followed . It ’s indecipherable whether DOGE staffers are observe the procedure to keep this data point from being get at by other people , or if any other steps are being take to protect the sensitive datum on Americans .

So far , the grounds suggests that security is not top of brain .

For exercise , a DOGE staffer reportedlyused a personal Gmail account to access a government call , and a newly filedlawsuit by federal whistleblowersclaims DOGE put an unauthorized email waiter to be connected to the government connection , which violates federal privacy law of nature .   DOGE staffer are also said to be feeding sensitive datum from at least one government departmentinto AI software .

Whether DOGE staff member are bad role player drop part of the breaker point . Acts of subterfuge , espionage , or ignorance could give rise the same suboptimal effect : exposure or red of the land ’s sore datasets .

For now , it ’s deserving looking at how we got here .

Questionable security clearances

The ease in which DOGE took over the departments and their vast entrepot of Americans ’ data point read career officials and U.S. lawmakers by surprisal , who go along to seek answers from the Trump administration .

Musk ’s efforts to take ascendency of the Carry Amelia Moore Nation ’s datum stores also privately alarmed cybersecurity professionals , some of whom have spent their vocation in authorities dedicate to secure Americans ’ most sensitive systems and datum .

Questions remain about what story of security headway the DOGE staff have and whether their interim security headway kick in them the authority to call for access to restricted federal organisation . On returning to office , Trumpsigned an executive orderallowing brass official to grant “ top enigma ” and compartmentalized certificate headway to individual on an interim base with little to no substantial vetting , a sharp departure from long - establish protocols .

The mix-up over DOGE staff clearances has direct to brief standoffs between several career officials at federal department in recent days . At the U.S. Agency for International Development ( USAID ) , elderly officials were put on leave after standing in the way of DOGE faculty to protect classified information , accord to the Associated Press . DOGE after gained access to the classified facility at USAID , which reportedly contained news reports .

Katie Miller , an consultant for DOGE , allege ina military post on Xthat no classified material was access by DOGE “ without proper protection clearances , ” though details of the squad ’s clearanceremains unspecified , include how many people were granted the interim secret clearances .

Severalsenior lawmakers of the Senate Select Committee on Intelligencesaid Wednesday that they were still search answer about DOGE and what headroom its members have .

“ No information has been provided to Congress or the public as to who has been officially hired under DOGE , under what self-confidence or regulations DOGE is operate , or how DOGE is vet and monitoring its staff and representatives before providing them seemingly unfettered access to classified material and Americans ’ personal info , ” the senator wrote .

DOGE’s takeover of the federal government

Within a week of President Trump ’s startup — andhis executive ordination make DOGE — Musk ’s staffers began infiltrating a form of federal way . The U.S. Treasury ’s sensitive payments system , which contain personal information of millions of Americans who receive payments from the government , from tax repayment to Social Security stop , was among the first .

DOGE has alsogained accessto the Office of Personnel Management , the government ’s human imagination section that includes databases on the personal information of all federal workers , and USAJOBS , whichhas dataon applicants who applied for a federal line of work .

Officials at the OPM said they had no visibleness or oversight into Musk ’s team ’s access to its systems . “ It make real cybersecurity and chop implications , ” they told Reuters .

DOGE ’s activity has lead to widespread oppositeness , including from some Republicans .

Senator Ron Wyden ( vitamin D - OR ) , who service as the most senior Democrat on the Senate Finance Committee , called Musk ’s access to sensitive federal payments systems a national surety risk , given the conflict of interest over his extensive patronage operations in China . A group of senior Democrats subsequently saidin a letter to the Treasurythat DOGE ’s access to sore political science data “ could irreparably damage national protection . ”

In a post on Bluesky , former Republican strategian Stuart Stevenscalled the takeoverof the Treasury ’s system “ the most substantial data leak in cyber history , ” adding : “ Private individuals in the data business concern now have access to your Social Security info . ”

The Treasurydefended its move to deed over access to the section ’s sore payments systems , support in an unattributed reply to Democratic lawmaker that Musk ’s DOGE squad has access to the Treasury ’s savings bank of personal information on Americans . Tom Krause , the master executive ofCloud Software Group , which owns Citrix and several other technology companies , is now a senior Treasury employeeserving as help secretaryand has control over million of dollar in public funds .

DOGE has since gained access to multiple sensitive internal system at the Department of Education , including datasetscontaining the personal data on jillion of students enrolled in financial aid . The Washington Post reports that DOGE staffersfed sensitive employee and financial datafrom the department into an AI system of rules to poke into the agency ’s spending . DOGE staff alsodemanded “ access to all ” systems at the Small Business Administration , including contracts , requital , and human resources information .

Musk ’s teamalso reportedly has accessto payment organization within the U.S. Department of Health and Human Services , andaccess to dataat the U.S. agency that administers Medicare and Medicaid .

DOGE is alsoaccessing personnel systemsat the National Oceanic and Atmospheric Administration ( NOAA ) andplans to access aviation systemsat the Federal Aviation Administration after Transportation Secretary Sean Duffygranted DOGE access . Musk said ina Charles William Post on Xthat DOGE plans to “ make rapid safety upgrades to the breeze dealings dominance system , ” without providing specifics .

subsequently , DOGEgained accessto the Department of Energy ’s IT systems , despite reported vexation by officials at the lack of a received background check mark on a DOGE staffer . Musk ’s staffers also reportedly haveread - only access code to datawithin the federal consumer watchdog , the Consumer Financial Protection Bureau .

Domestic and global ramifications

There are untold security department endangerment that come from yield access to the inner data centre of the U.S. government to a mathematical group of unelected and private individuals with specious vetting .

To name just a couple of thing that could go wrong : Accessing the regime net from a non - approved calculator harboring malware can compromise other gadget on the Union connection and allow the theft of sensitive governance selective information , irrespective of whether it is classified . And the mishandling of personal data on devices or cloud environments that have not take on the standard of the regime ’s top surety specifications , or use the strongest surety control , puts that datum at hazard of further compromise or making water .

These are not unbelievable scenario ; these kinds of rupture happen all the time .

Last class alone sawsome of the biggest data breach in historycaused bymalicious access code make through the personal devices of company employees , who circumstantially installed malware by downloading bang - off software onto their personal information processing system and not using proper security protections like multi - factor hallmark . Any compromise of the squad ’s credentials or memory access , or any wrong handling of sensitive databases could ensue in the irretrievable loss , theft , or misplacement of sensible governance information .

Perhaps most perturbing is DOGE , and its action , are operating outside of public scrutiny .

Officials and lawmakers tax with governing supervising reportedly have no insight into what information DOGE has approach to within the authorities or what its cybersecurity controls or protections are — if any at all . The departmental master who have spent much of their career protect approach to the data hive away in these system can not do much but stand by and watch out as private individuals with small to no anterior government experience bust their most sensitive datasets .

Technology and privateness attorney Cathy Gellis , compose in Techdirt , argues Musk and his DOGE team are likely “ personally liable ” under the U.S. federal hacking jurisprudence , known as the Computer Fraud and Abuse Act , which cross the accessing of Union system of rules without the proper authorization . A court would still finally have to determine DOGE ’s action as “ unauthorized access ” and therefore illegal , compose Gellis .

There is also the question of how U.S. land governments will react to the compromise of their resident ’ data at the Union floor . U.S. states have data breach laws require the protection of their citizens ’ information , even if the Union government does not . A conglutination of more than a dozen Democratic state attorneys general said they willfile a lawsuit to block DOGE access sensitive federal governance defrayment systemscontaining personal data on Americans , without offer a timeline .

The admission also puts relationships with the United States and its diplomatic ally on trembling earth . Allied nationsmay not want to share intelligence with the U.S. governmentif they think the info could leak out , spill into the public knowledge base , or otherwise get lost as a solution of the dislocation in cybersecurity recitation take aim at protecting sensitive information .

In world , the cybersecurity consequence of DOGE ’s ongoing entree to Union departments and datasets may not be known for some sentence .

tangency Zack Whittaker on Signal and WhatsApp at +1 646 - 755 - 8849 . you’re able to also portion out document securely with TechCrunch viaSecureDrop .

First put out on February 5 , 2025 .