HomeMalware & ThreatsWhistleblower Alleges DOGE of Concealing Data-Harvesting

Whistleblower Alleges DOGE of Concealing Data-Harvesting

Published on

spot_img

A recent federal whistleblower complaint has brought to light concerning allegations against Elon Musk’s Department of Government Efficiency (DOGE), accusing the staff of engaging in data harvesting activities at the National Labor Relations Board. The complaint, which was shared with Congress and first reported by NPR, details how DOGE staffers allegedly bypassed security protocols, disabled monitoring tools, and attempted to conceal their digital footprints while accessing sensitive federal systems.

The whistleblower, identified as Daniel Berulis, raised red flags after noticing unusual login attempts originating from a Russia-based IP address. These suspicious activities prompted further investigation, leading to the discovery of DOGE staffers deleting access logs and attempting to hide their actions. According to Berulis, the staffers were seeking access to confidential data on American businesses and taxpayers, violating strict privacy laws and security regulations in the process.

Despite the mounting legal battles and criticism from cybersecurity experts, the White House has defended DOGE’s actions, claiming that the probes into federal data are legitimate. However, the NLRB’s acting press secretary has denied the allegations, stating that no breach of agency systems occurred.

Berulis, in his complaint, expressed concerns about the staffers’ actions and the potential misuse of the data they accessed. He revealed that DOGE employees requested elevated permissions on the agency’s computer systems, allowing them unrestricted access to sensitive information. Additionally, Berulis received a threatening note with photos of him walking his dog, raising further security concerns.

The whistleblower’s complaint also highlighted incidents of DOGE staffers bypassing security protocols at other federal agencies, prompting investigations and court filings nationwide. One such incident involved a DOGE staffer sending unencrypted Treasury data over email to senior Trump administration officials. These breaches have raised alarms among security analysts and officials like Berulis, who fear the impact of such actions on national security.

The Russia-based IP address attempting to log into NLRB’s systems shortly after DOGE gained access added to the suspicions surrounding the data harvesting activities. Berulis also noted that sensitive data was observed leaving NLRB’s case management system, further emphasizing the severity of the situation.

The National Labor Relations Board, which is actively investigating cases involving Musk’s companies, faces challenges from Musk’s SpaceX, which has filed a lawsuit accusing the agency of overreach. Musk, now a special adviser to the president, has pledged to recuse himself from related matters, but questions remain about his involvement in cases concerning his businesses and DOGE.

Overall, the whistleblower complaint sheds light on the risks associated with unauthorized data access and misuse, highlighting the importance of robust security measures to safeguard sensitive information. As the investigation unfolds, stakeholders are closely monitoring the developments to ensure accountability and prevent future breaches of privacy and security protocols.

Source link

Latest articles

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

More like this

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...