AI TOOLS MASTER

AI TOOLS MASTER

2977 bookmarks
Newest
Musk’s DOGE agents access sensitive personnel data, alarming security officials
Musk’s DOGE agents access sensitive personnel data, alarming security officials

Agents of billionaire Elon Musk’s Department of Government Efficiency have gained access to highly restricted government records on millions of federal employees — including Treasury and State Department officials in sensitive security positions — as part of a broader effort to take control over the government’s main personnel agency, according to four U.S. officials with knowledge of the developments.

The records maintained by the Office of Personnel Management, or OPM, amount to a repository of sensitive information about employees of most federal agencies — including addresses, demographic profiles, salary details and disciplinary histories. The moves at the OPM by members of Musk’s pseudo-governmental DOGE have coincided with similar efforts to gain access to sensitive systems at other agencies, including a Treasury Department system responsible for processing trillions of dollars in U.S. government payments — a development reported last week by The Washington Post.

including Treasury and State Department officials in sensitive security positions
four U.S. officials
The records maintained by the Office of Personnel Management, or OPM, amount to a repository of sensitive information about employees of most federal agencies — including addresses, demographic profiles, salary details and disciplinary histories.
Records obtained by The Post show that several members of Musk’s DOGE team — some of whom are in their early 20s and come from positions at his private companies — were given “administrative” access to OPM computer systems within days of Trump’s inauguration last month. That gives them sweeping authority to install and modify software on government-supplied equipment and, according to two OPM officials, to alter internal documentation of their own activities.
A DOGE representative did not address questions about data access and other permissions. Emailed questions to the OPM went unanswered. A U.S. official maintained that everyone with access to sensitive systems is a government employee with the appropriate clearances.
The speed with which any clearances would have been supplied suggests they may have skipped customary precautions, including FBI background checks, U.S. officials said.
At least six DOGE agents were given broad access to all personnel systems at the OPM on the afternoon of Jan. 20, the day of Trump’s inauguration, according to two agency officials. Three more gained access about a week later, they said.
Enterprise Human Resources Integration and Electronic Official Personnel Folder
The two OPM officials said the level of access granted to DOGE agents means they could copy the Social Security numbers, phone numbers and personnel files for millions of federal employees.
The OPM’s new leadership argued in a court filing Wednesday that access to personnel databases was used simply to create a government-wide email system.
A former U.S. security official said DOGE’s access to Treasury’s payment system is alarming, describing it as a comprehensive map to U.S. expenditures encompassing highly classified programs and purposes.
“We have a whole bunch of classified relationships with U.S. businesses” under contract with U.S. intelligence agencies. The payment system “is a road map” to U.S. secrets coveted by foreign intelligence services.
“It’s highly likely they’re improperly accessing, transferring and storing highly sensitive data outside of the environments it was intended to be contained within,” he said. “If I were a nation like China, Russia or Iran, I’d be having a field day with a bunch of college kids running around with sensitive federal government data on unencrypted hard drives.”
“Secure communications take time and coordination to plan and implement,” says the lawsuit, filed by Kelly B. McClanahan, executive director of National Security Counselors, a public interest law firm. “Standard email is not encrypted, and it is common practice among hackers — including hackers affiliated with hostile foreign services — to begin attempting to access a new U.S. Government device as soon as they learn of its deployment.”
Wednesday’s privacy assessment identifies the agency’s point of contact as Riccardo Biasini,
“If I were the Russians or Chinese or Iranians and I saw this DOGE operation getting formed, I would be seeding people into this operation like crazy,”
·washingtonpost.com·
Musk’s DOGE agents access sensitive personnel data, alarming security officials
Entity Details :: OpenCorporates Lancom Systems GmBH Lothar Kronen, Ralf Eric Koenzen or Uwe Neumeier...Theory: he's a mentor to edward and the reason packetware is in germany
Entity Details :: OpenCorporates Lancom Systems GmBH Lothar Kronen, Ralf Eric Koenzen or Uwe Neumeier...Theory: he's a mentor to edward and the reason packetware is in germany
Free and open company data on Germany company LANCOM Systems GmbH (company number R3101_HRB16976), Adenauerstraße 20/B2, 52146 Würselen.
·opencorporates.com·
Entity Details :: OpenCorporates Lancom Systems GmBH Lothar Kronen, Ralf Eric Koenzen or Uwe Neumeier...Theory: he's a mentor to edward and the reason packetware is in germany
C=DE, ST=NRW, L=Wuerselen, O=LANCOM Systems, OU=Engineering, emailAddress=info@lancom-systems.de, CN=192.168.237.12 - Censys guy does al ot of kubernetes and is the CN for mail.ccrhub.org
C=DE, ST=NRW, L=Wuerselen, O=LANCOM Systems, OU=Engineering, emailAddress=info@lancom-systems.de, CN=192.168.237.12 - Censys guy does al ot of kubernetes and is the CN for mail.ccrhub.org
C=DE, ST=NRW, L=Wuerselen, O=LANCOM Systems, OU=Engineering, emailAddress=info@lancom-systems.de, CN=192.168.237.12
·search.censys.io·
C=DE, ST=NRW, L=Wuerselen, O=LANCOM Systems, OU=Engineering, emailAddress=info@lancom-systems.de, CN=192.168.237.12 - Censys guy does al ot of kubernetes and is the CN for mail.ccrhub.org
18.252.50.109 - Censys port 443 gitlab signin for Center for Cyberspace Research gay PROBLEMS cert issuer isn't a cert authority, appears to be some guy from germany???? and THIS is the cert guy for DOGE???
18.252.50.109 - Censys port 443 gitlab signin for Center for Cyberspace Research gay PROBLEMS cert issuer isn't a cert authority, appears to be some guy from germany???? and THIS is the cert guy for DOGE???
WPAFB Wright Patterson Air Force Base Ohio
Names 192.168.237.12, git.ccrhub.org
Subject CN=git.ccrhub.org, C=US, L=WPAFB Issuer CN=git.ccrhub.org, C=US, L=WPAFB Names 192.168.237.12, git.ccrhub.org
·search.censys.io·
18.252.50.109 - Censys port 443 gitlab signin for Center for Cyberspace Research gay PROBLEMS cert issuer isn't a cert authority, appears to be some guy from germany???? and THIS is the cert guy for DOGE???
18.254.37.84 invalid self signed cert to set up github for the gov???? is this the non us citizen
18.254.37.84 invalid self signed cert to set up github for the gov???? is this the non us citizen
Ports open: 22, 80, 122, 443, 8443
Issuer: C=GB, ST=London, L=London, O=Global Security, OU=R&D Department
Subject: C=GB, ST=London, L=London, O=Global Security, OU=R&D Department,
Not Before: Sep 19 23:51:58 2023 GMT Not After : Sep 18 23:51:58 2024 GMT
Subject: C=GB, ST=London, L=London, O=Global Security, OU=R&D Department, CN
·shodan.io·
18.254.37.84 invalid self signed cert to set up github for the gov???? is this the non us citizen