The young technology that has been recruited by billionaire Elon Musk to drill in US government computer files – which includes sensitive details about the lives of millions of Americans – is the erosion of American democratic standards, some experts warn, and they are likely to launch “national security nightmare.”
The orders of the demonstration march for this team are to assist the newly created government efficiency (DOGE) Modern Networks and reduce federal spending. But its operations surrounded by the secret, which appears in some cases designed to exceed meaningful supervision.
What is clear is that the new DOGE employment has managed, among other US government networks, the Treasury, which spends 90 % of all federal payments, including billions of dollars in the advantages of social security, federal wages, the advantages of old warriors, and recovered amounts Tax.
Why did we write this
ELON Musk is moving very quickly to modernize the United States government and reduce spending. National security experts warn that rapid changes call on risks.
It was described by the Public Prosecutor of Connecticut William Tong as “the largest data breach in American history” in a statement on Friday, through “a group of illegal strict technology brids combed through secret records, sensitive data and critical payment systems.”
Mr. Tong is one of 19 democratic lawyers that sue President Donald Trump, claiming that Dog is breaking the law, from other steps, preventing federal funds “from reaching beneficiaries who are not in line with the president’s political agenda.”
On Saturday, a federal judge was temporarily prevented from Mr. Musk from reaching the treasury records that contain sensitive data, noting the risks of “irreplaceable harm”. last Judicial cases It involves continuing dog. In the coming days and weeks, they will probably prove a vital test for American law, and analysts add guarantees designed to protect US national security.
“It is generally worrying, and it is a kind of informal method that enables these people to reach all of these systems without regular checks that expect to be in place,” says Benjamin Friedman, director of politics in conservative defense priorities in Al -Khanj. Washington.
Operations, on a broader scale, indicate another threat to national security: transfer of supervision away from legislators in the Capitol Hill who should have, in the American traditions of checks and balances, the strength of the wallet. “The seizure of the terrible White House is.”
The White House says that Mr. Musk and his team are working in “complete compliance with federal law” and “appropriate security permits.”
Applying commercial practices to the government
The Trump administration’s allies accused “those who firmly in the federal bureaucracy” of an exaggeration in the reaction, resistance to change, and “Hemming and Hawing”, as the Republican Senator Thom Tillis of North Carolina said last week.
While admitting that Mr. Trump’s movements are “in a constitutional process in the most striking sense,” Senator Teles said that “it is not uncommon for the presidents a little. … No one should be.” The rejectionists suggested, “Not only understand commercial practices. We are trying to apply to the government that has not been applied before “before.
There is a reason because the federal government is different, as critics claim: unprecedented DOGE operations can use these weak points that can be used, at the end of the spectrum, to collect American secrets, such as the names of their spies.
A former CIA officer told the New York Times that the White House order to send an uncomfortable email list recently appointed by American agents was a “anti -spy disaster”. According to what was reported, the request was part of the efforts made to reduce the federal workforce by targeting those who are still in the test period (and therefore easy to shoot).
The lack of surrounding transparency Doug did not help calm the fears of critics. According to what was reported, some new appointments were rejected by Mr. Musk, to provide their latest names to colleagues in the department. Mr. Musk said that the journalists who reveal the identities of the new tenant should be punished.
The Wall Street Journal discovered that one of the employees of Duji, Marco Eliz, wrote under a pseudonym for the social platform X last year, “I was racist before it was great.” After Mr. Eliz’s resignation, Mr. Musk said he would return it.
The company said in a statement on Friday after the Bloomberg investigation report, that another young assistant was dismissed from the 2022 training period after “an internal investigation into the leakage of the company’s royal information”, the company said in a statement on Friday after the investigation report conducted by Bloomberg.
This revelation strengthens the concerns raised by five former trustees of the Treasury, who warned on Monday from the two essays in the New York Times that the information that was rented by Duj can be armed to achieve ideological gains or seized it by enthusiastic foreigners.
They added that the critical electronic infrastructure in the United States “is at risk of failure if the symbol suggests it is not dealt with with due care.”
“Huge No”
In fact, the speed that Duwaij engineers work in federal computer systems raises large “red flags” in cybersecurity, says Richard Foreno, assistant director of the Cyber Security Institute at Maryland University, Baltimore, which the defense research department received his work financing.
“These programmers may be great,” he says, but it seems that they “move through the best practices, laws and federal standards, and this is a big problem.”
Doug is said to have installed his email servers to facilitate direct communication outside the official channels, says Professor Foreno, which is up to “Shadow email system“It seems that a Doge tenant has brought their laptops from abroad and connects them directly to government networks, as he adds:” Without any kind of government verification of their security, which is huge. “
The White House said that the DOGE employment has access to “reading only” to these federal computer files, which means that it cannot be changed or deleted. But there are concerns about this In some casesEngineers are granted the ability to write a symbol in payment systems that represent a huge part of the American economy.
“They are treating the federal government as an emerging garage company in Silicon Valley,” says Professor Foreno. He wonders about the one who examines servers to make sure they are properly forming and not being exposed to piracy from China or Russia. “It seems very little of due care, if any.”
There are also possibilities Installation of artificial intelligence analysis tools On the systems, there is a promising development that is likely to be ways, “because there are ways that can help our government to be more efficient and capture strange homosexuals,” says Emily Harding, director of the National Intelligence, National Security and Technology Program at the Center for Strategy and International Studies.
“But it must be done carefully, because it has not been tested.”
Security bombs “bomb”
Because it was a formulation condition For foreign affairs on Doug’s operations in the federal government, Elizabeth Sonders and her co -author, James Goldgier, both of them are students of political science and international relations, found that their article continued to overcome it through Doug’s developments close to work.
However, they realized that there are some basics that believe to make the activities of Mr. Musk as “a nightmare for national security”, even at the unlikely event that President Trump will put a quick end to Dog’s work.
They may have nefarious plans for these things. They may have completely harmless plans. Professor Sonders, who is studying at Columbia University, may want to complete it like criminal accounting.
However, what Doug had already did, aside mysterious details, is to pump enough uncertainty in US government operations that it takes into account “throwing a hand grenade at the National Security Services Center”, the professors Golders and Saunders conclude in their article. This is because Dog’s action not only made us tense about whether their secrets are safe and whether American leaders can be trusted, but it also affects the vital accounts of America’s opponents.
Despite the desire that non -friendly governments may have to sabotage or theft from America, American officials still keep something similar to the relationship of work with them – a task, says Professor Sonders.
In times of crisis, “you want the opponent to have a phone number and know that it will be captured by a person who speaks with power as the US government, and that everything they tell you is true,” you notice.
Regardless of Mr. Musk and his technology, they “wander with the infrastructure” of this main process, as Professor Sonders increases.
With wires crossing, the intention is likely to obtain reading. “It can be something related to China. It can be a matter of Russia. There may be an unintended or harmful leak Pin in it.
“It can explode in different ways,” says Professor Sonders. “It is a time bomb.”