Feb 14 2025

DOGE: A National Security Cyber Breach

Category: Data Breach,Security Breachdisc7 @ 9:22 am

In a recent series of events, the U.S. government has faced significant security breaches, not from external cyberattacks, but through actions initiated by the Department of Government Efficiency (DOGE), a newly established entity led by a billionaire with an ambiguous governmental role. These breaches have profound implications for national security.

Initially, individuals associated with DOGE accessed the U.S. Treasury’s computer systems, granting them the capability to collect data on and potentially control approximately $5.45 trillion in annual federal payments. Subsequently, unauthorized DOGE personnel obtained classified information from the U.S. Agency for International Development, possibly transferring it to their own systems. Following this, the Office of Personnel Management (OPM), which maintains detailed personal data on millions of federal employees, including those with security clearances, was compromised. Additionally, Medicaid and Medicare records were breached.

In another alarming incident, partially redacted names of CIA employees were transmitted via an unclassified email account. DOGE personnel have also been reported to input Education Department data into artificial intelligence software and have commenced operations within the Department of Energy.

On February 8, a federal judge intervened, prohibiting the DOGE team from further accessing Treasury Department systems. However, given that DOGE operatives may have already copied data and altered software, the effectiveness of this injunction remains uncertain. Without strict adherence to established security protocols by federal employees, further breaches of critical government systems are anticipated.

The systems compromised by DOGE are integral to the nation’s infrastructure. For instance, the Treasury Department’s systems contain detailed blueprints of federal financial operations, while the OPM network holds comprehensive information on government personnel and contractors.

What sets this situation apart is the method of breach. Unlike traditional foreign adversaries who employ stealth and spend years infiltrating government systems, DOGE operatives, with limited experience and oversight, are openly accessing and modifying some of the United States’ most sensitive networks. This not only introduces potential new security vulnerabilities but also involves the dismantling of essential security measures, such as incident response protocols and auditing mechanisms, by replacing seasoned officials with inexperienced personnel.

A fundamental security principle, known as “separation of duties,” has been undermined in these instances. This principle ensures that no single individual has unchecked power over critical systems, requiring multiple authorized personnel to collaborate on significant actions. The erosion of this safeguard poses a substantial risk to national security.

For further details, access the article here

Elon Musk’s DOGE Posts Classified Data On Its New Website

Anyone Can Push Updates to the DOGE.gov Website

‘Experts left database open’: Hackers mock Elon Musk after easily defacing his DOGE site

DOGE Team Raises Major Cyber Security Concerns

Young engineers pose ā€˜the single greatest insider threat risk the Bureau has ever faced’ as experts warn of cybersecurity breaches

 Congressman Robert Garcia makes ‘A Minor’ Barb At DOGE

The Data Protection Guidebook: A Survey of U.S. Federal and State Laws, Statutes, and Regulations Governing Data Breach Notification, Biometric Information, Cybersecurity, and Data Privacy

Hackers are getting quicker—48 minutes is all it takes for a breach.

A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back

New regulations and AI hacks drive cyber security changes in 2025

Hackers will use machine learning to launch attacks

VNC Is The Hacker’s New Remote Desktop Tool For Cyber Attacks

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: Cyber Intrusion, data breach, data privacy, data protection, DOGE, National security


Mar 26 2022

FCC adds Kaspersky to Covered List due to unacceptable risks to national security

Category: Antivirus,Information Security,Information WarfareDISC @ 9:53 pm

The Federal Communications Commission (FCC) added Kaspersky to its Covered List because it poses unacceptable risks to U.S. national security.

The Federal Communications Commission (FCC) added multiple Kaspersky products and services to its Covered List saying that they pose unacceptable risks to U.S. national security.

ā€œThe Federal Communications Commission’s Public Safety and Homeland Security Bureau today added equipment and services from three entities – AO Kaspersky Lab, China Telecom (Americas) Corp, and China Mobile International USA Inc. – to its list of communications equipment and services that have been deemed a threat to national security, consistent with requirements in the Secure and Trusted Communications Networks Act of 2019.ā€ reads the FCC’sĀ press release.

The Covered List, published by Public Safety and Homeland Security Bureau published, included products and services that could pose an unacceptable risk to the national security of the United States or the security and safety of United States persons.

The US commission also added Chinese state-owned mobile service providers China Mobile International USA and China Telecom Americas to the list. Below is the list of Covered Equipment or Services added on March 25, 2022:

  • Information security products, solutions, and services supplied, directly or indirectly, by AO Kaspersky Lab or any of its predecessors, successors, parents, subsidiaries, or affiliates.
  • International telecommunications services provided by China Mobile International USA Inc. subject to section 214 of the Communications Act of 1934.
  • Telecommunications services provided by China Telecom (Americas) Corp. subject to section 214 of the Communications Act of 1934.

FCC banned Kaspersky security solutions and services supplied by Kaspersky or any linked companies.

ā€œThe FCC’s decision to add these three entities to our Covered List is welcome news. The FCC plays a critical role in securing our nation’s communications networks, and keeping our Covered List up to date is an important tool we have at our disposal to do just that. In particular, I am pleased that our national security agencies agreed with my assessment that China Mobile and China Telecom appeared to meet the threshold necessary to add these entities to our list. Their addition, as well as Kaspersky Labs, will help secure our networks from threats posed by Chinese and Russian state backed entities seeking to engage in espionage and otherwise harm America’s interests.ā€Ā saidĀ FCC Commissioner Brendan Carr. ā€œI applaud Chairwoman Rosenworcel for working closely with our partners in the Executive Branch on these updates. As we continue our work to secure America’s communications networks, I am confident that we will have more entities to add to our Covered List.ā€

In Mid March, the German Federal Office for Information Security agency, aka BSI,Ā recommendedĀ consumers uninstall Kaspersky anti-virus software. The Agency warns the cybersecurity firm could be implicated in hacking attacks during the ongoing Russian invasion of Ukraine.

According to §7 BSI law, the BSI warns against the use of Kaspersky Antivirus and recommends replacing it asap with defense solutions from other vendors.

Tags: FCC, kaspersky, National security


Jun 14 2011

Hacker Groups Attacks US Senate WebSite

Category: cyber security,Security BreachDISC @ 11:04 pm

Seal of the United States Senate.

Image via Wikipedia

US Senate Hacked! “We Don’t Like The U.S. Government Very Much” LULZ Security

The video states some reasons in significant rise of hack attack by Lulz Security on US information assets including critical assets (US senate) which is a growing threat to national security.

Leon Penetta warned in last week hearing that next Pearl Harbor might very well be a cyber attack which may affect power grid, financial system or government system.

“The Computer systems of exective branch agencies and the congress were probed or attacked on an average of 1.8 billion times per month last year” Sen. Susan Collins (R-ME)

http://www.youtube.com/watch?v=aFD3W6LhO04

Cyber War: The Next Threat to National Security and What to Do About It




Tags: Bethesda Softworks, Federal government of the United States, National security, Pearl Harbor, Sony, Susan Collins, United States, United States Senate