Close Menu
Tech News VisionTech News Vision
  • Home
  • What’s On
  • Mobile
  • Computers
  • Gadgets
  • Apps
  • Gaming
  • How To
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Trending Now

The biggest changes coming to your iPhone with iOS 26

10 June 2025

Microsoft Finally Gets Into the Handheld Game With ROG Xbox Ally

10 June 2025

Gears of War: Reloaded Skips PS5 Release in Japan Due to ‘Platform Policies’

10 June 2025
Facebook X (Twitter) Instagram
  • Privacy
  • Terms
  • Advertise
  • Contact
Facebook X (Twitter) Instagram Pinterest VKontakte
Tech News VisionTech News Vision
  • Home
  • What’s On
  • Mobile
  • Computers
  • Gadgets
  • Apps
  • Gaming
  • How To
  • More
    • Web Stories
    • Global
    • Press Release
Tech News VisionTech News Vision
Home » Elon Musk’s DOGE Is Getting Audited
What's On

Elon Musk’s DOGE Is Getting Audited

News RoomBy News Room9 April 2025Updated:9 April 2025No Comments
Facebook Twitter Pinterest LinkedIn Tumblr Email

Notes from a March 18 meeting, marked “Internal/Confidential,” show that a DOL lawyer presented colleagues with an overview of DOL’s interactions with DOGE. “So far,” the notes read, “they do not have write access. They have asked; we’ve held them at bay. We’ve tried to get them to tell us what they want & then we do it. They only have read access.” DOGE seems primarily interested, according to the notes, in pay systems and grants, and has signed an agreement detailing a “long list of things they won’t do.”

The notes also detail interactions between the GAO and DOL related to DOGE’s work. Included are a specific set of requests GAO gave to DOL representatives:

“Please identify any systems and information for which USDS and/or agency DOGE team staff were provided access. In doing so, please identify all accounts created, including those for any applications, servers, databases, mainframes, and/or network equipment.

“Please describe the type of access that USDS and/or agency DOGE team staff have to agency systems and information (e.g., read, write, execute).

“Please describe how USDS and/or agency DOGE team staff access agency systems and information (e.g., on-premise or remote, agency furnished equipment or other equipment).

“Please describe the safeguards that are in place to determine that USDS and/or agency DOGE team staff protect the confidentiality, integrity, and availability of agency systems and information consistent with relevant laws and guidance.

“Please describe the processes that the agency has in place to ensure that USDS and DOGE teams are appropriately protecting the confidentiality, integrity, and availability of the agency systems and information as required by applicable laws and guidance?”

Concerns about DOGE access to agency systems are not unfounded. In February, WIRED reported that Marko Elez, a 25-year-old former X engineer, was granted the ability not only to read the code in the Treasury systems but also to write—or change—it. With that level of access, there were concerns that he could have potentially cut off congressionally authorized payments or caused the systems to simply stop working. “It’s like knowing you have hackers on your network, but nobody lets you do anything about it,” a Treasury employee told WIRED at the time.

Elez, according to the March 18 meeting notes and previous WIRED reporting, also has access to the DOL and has been linked to the Social Security Administration. His and other DOGE affiliates’ access to SSA data is currently restricted due to a court order. Elez did not immediately respond to a request for comment.

Reporting from WIRED and other outlets since then has continued to expose DOGE’s sweeping attempts to access sensitive data—and the potential consequences. President Donald Trump’s executive order from March 20 directs agencies to begin “eliminating information silos,” purportedly to fight fraud and waste. These actions could also threaten privacy by consolidating personal data housed on different systems into a central repository, WIRED previously reported.

A record detailing an initial request from GAO for DOL documents, due at the end of March, shows that the agency was asked to show how it protected its systems, with the requested documentation covering, among other things, its policies on management of access to system accounts, training, the principles of separation of duties and least privilege, the use of portable storage devices, audit logging, and its insider threat program. These requests reference the National Institute of Standards and Technology publication Security and Privacy Controls for Information Systems and Organizations, which serves as a set of information security guidelines for federal systems not related to national security.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

The biggest changes coming to your iPhone with iOS 26

10 June 2025

Microsoft Finally Gets Into the Handheld Game With ROG Xbox Ally

10 June 2025

Apple punts on Siri updates as it struggles to keep up in the AI race

10 June 2025

‘Beautiful’ and ‘Hard to Read’: Designers React to Apple’s Liquid Glass Update

10 June 2025
Editors Picks

Last of Us TV Series Showrunner Wants You To Know He Didn’t Kill Anyone In Real Life: ‘The Actor Is Alive And He’s In Literally Everything Else’

10 June 2025

Apple Releases iOS 26 Developer Beta 1 Update After WWDC 2025: How to Install, Compatible Models

10 June 2025

WWDC 2025: watchOS 26 Offers AI Workout Buddy, Wrist Flick Gesture, Liquid Glass Design, and More

10 June 2025

Nintendo Fans Spot Shigeru Miyamoto Missing From Mario Kart World Credits — but It Isn’t Too Much of a Surprise

10 June 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Trending Now
Tech News Vision
Facebook X (Twitter) Instagram Pinterest Vimeo YouTube
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact
© 2025 Tech News Vision. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.