By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Musk’s DOGE team raises major cyber security concerns
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Musk’s DOGE team raises major cyber security concerns
News

Musk’s DOGE team raises major cyber security concerns

News Room
Last updated: 2025/02/13 at 7:44 AM
News Room Published 13 February 2025
Share
SHARE

Elon Musk, seen here in the Oval Office on February 11, has hired a team of unvetted and inexperienced outsiders to dive into sensitive US government systems Copyright AFP Jim WATSON

Alex PIGMAN

Young engineers deployed across the US government as part of Elon Musk’s Department of Government Efficiency have triggered alarm throughout Washington’s security establishment.

Never before has a group of unvetted and inexperienced outsiders gained such access to the nerve center of the US government, according to security experts.

The campaign, led by Musk’s DOGE team, began at the Treasury Department when they took control of the US government’s payment system — a move justified as monitoring public spending.

From there, it expanded into an unprecedented costcutting initiative, with software engineers spreading across federal agencies, taking control of computer systems.

They have disrupted and in some cases effectively shuttered organizations such the United States Agency for International Development (USAID), the Department of Education, and the General Services Administration (GSA), which manages much of the government’s infrastructure and building portfolio.

“In the span of just weeks, the US government has experienced what may be the most consequential security breach in its history,” wrote Bruce Schneier, a security technologist at the Harvard Kennedy School, and Davi Ottenheimer of Inrupt, a data infrastructure company, in Foreign Policy.

The situation is particularly critical at the Bureau of Fiscal Services, the Treasury unit managing all federal payments — a crucial chokepoint of the US economy.

An internal report by an outside contractor warned that the access given to the DOGE team “poses the single greatest insider threat risk the Bureau has ever faced.”

The computer systems in question rank among the world’s most complex and sensitive.

Yet DOGE is staffed primarily with individuals connected to Musk’s companies and young tech professionals in their 20s — virtually none of whom have been vetted, or have government experience.

As for Musk himself — who is unelected — there are concerns about his conflicts of interest, as his companies hold several major government contracts, and whether access to sensitive data will give his business empire an even greater advantage.

Meanwhile, senior government workers with decades of system expertise have been blocked from buildings and sidelined by DOGE teams, raising concerns among those who understand the intricate vulnerabilities of government technology.

The consequences are already emerging.

At the Office of Personnel Management, the government’s HR department, reports indicate DOGEassociated individuals connected an unauthorized server to the network and are using AI software on US citizens’ personal data — in violation of federal privacy laws.

The blitz on government has sparked numerous lawsuits, forcing some retreat from DOGE, with a Trump official on Wednesday acknowledging to a judge that a staffer should not have had full system access.

In another security slipup, according to The New York Times, the CIA sent an unclassified email listing all employees hired by the spy agency over the last two years to comply with costcutting efforts spearheaded by DOGE.

– Too much power –

Security experts Schneier and Ottenheimer are especially troubled by the removal of career officials who managed security measures.

“The Treasury’s computer systems have such an impact on national security that they were designed with the same principle that guides nuclear launch protocols: No single person should have unlimited power,” they wrote.

Making changes to critical financial systems “traditionally requires multiple authorized personnel working in concert,” they said.

Musk, who frequently posts on the social platform he owns, X, dismisses government workers as either inept or politically compromised — a “deep state” aligned with Democrats and opposed to Trump.

The risk of mistakes has alarmed cybersecurity experts, including Michael Daniel, former White House cybersecurity coordinator under Barack Obama and current head of the Cyber Threat Alliance.

“The Chinese, the Russians, other intelligence services – they put their Ateams on projects that target the US government, and they will exploit any opportunity they have,” Daniel warned.

“This assumption that obviously everybody that works for the federal government is stupid and incompetent, and it’s so simple that it doesn’t even matter who you put on the job… that’s just incorrect.”

“With government systems, things are not necessarily obvious on the surface. And it takes experience to understand what some of those issues are.”

Meanwhile, security experts note that China and Russia, which have long targeted these sensitive systems, could weaponize mistakes and vulnerabilities made in one afternoon for years to come.

If “cybersecurity is not top of mind in every step of the integration, you potentially open the door for foreign intelligence services and sophisticated cyber criminals to find a way through,” Eric O’Neill, former FBI operative and strategist for cybersecurity specialty firm NeXasure, told AFP.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article T Levels: How OneAdvanced is leading the way
Next Article The Best MagSafe Wireless Chargers
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The CIA’s secret technique for making quick decisions under stress
News
Pope Leo XIV names AI one of the reasons for his papal name
News
China’s GAC to use NIO’s battery swap network · TechNode
Computing
One UI 8 Watch is exploring half-size tiles, and here’s what they look like
News

You Might also Like

News

The CIA’s secret technique for making quick decisions under stress

3 Min Read
News

Pope Leo XIV names AI one of the reasons for his papal name

2 Min Read
News

One UI 8 Watch is exploring half-size tiles, and here’s what they look like

2 Min Read
News

Rootstock

0 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?