Notes from a March 18 meeting, which bears an “internal/secret” mark, shows that DOL’s lawyer gave a general overview of DOL’s reactions with DOGE. “Until now”, the notes have written, “They have no access to writing. They have asked; we have carried them. Doug seems to be interested in the first place, according to the notes, in payment and grant systems, and signed an agreement explaining in detail” a long list of things they will not do. “
Notice details also details of Gao and DOL A specific set of requests submitted to DOL representatives included:
“Please specify any systems and information that the USDs and/or/or DOGE employees are provided. In doing this, please determine all the accounts created, including those of any applications, servers, databases, central computers, and/or network equipment.
Please describe the type of access that the USDs and/or Dog Agency Systems and Information Agency (for example, reading, writing, implementation).
“Please describe how systems and/or agency to reach the USDs and/or agency’s systems and equipment agency (for example, furnished, furnished, remote or remote equipment or other equipment).
“Please describe the guarantees in place to determine that the employees of the USDS and/or Doug agency protect the secrecy, the safety and availability of agency and information systems in line with the relevant laws and directions.
“Please describe the operations by the agency to ensure the protection of USDs and Doge teams appropriately for confidentiality and integrity and the availability of agency and information systems as required according to the applicable laws and guidance?”
Fears about accessing agency systems are not baseless. In February, Wired mentioned that Marco Eliz, a 25-year-old former X X, has given the ability not only to read the code in treasury systems but also to write-or change-. With this level of arrival, there were fears that it would be possible to cut the approved payments from Congress or cause the systems to simply stop working. “It is like knowing that you have infiltrators on your network, but no one allows you to do anything about it,” said one of the Treasury employees at that time.
Eliz, according to the notes of the March 18 meeting and Previous wire reportsIt also has access to DOL and was linked to the Social Security Management. His arrival and other companies are currently restricted to SSA data due to the court order. Eliz did not immediately respond to a request for comment.
Since then, reported from wireless and outlets has since exposed Dog’s sweeping attempts to access sensitive data – and Possible consequences. President Donald Trump Executive order From March 20, agencies direct to the start of “getting rid of information silos”, and it is assumed that fighting fraud and waste. These procedures can also The threat of privacy By combining the personal data on various systems into a central warehouse, it was previously reported.
The record that shows in detail explains an initial request from Gao for DOL documents due at the end of March, that the agency was asked to show how to protect its systems, with the required documents, among other things, its policies on managing system accounts, training, and the principles of duties separating, The least concessionUse portable storage devices, scrutiny, and interior threat program. These requests refer to the National Institute for Standards and Technology Publishing Security and privacy controls for information systems and organizationsWhich works as a set of information security guidelines for federal regulations that are not related to national security.
https://media.wired.com/photos/67f5458d8b89f39e333c1035/191:100/w_1280,c_limit/doge-dao-pol-2197848967.jpg
Source link