frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

What DOGE and its affiliates are doing with government systems and data [pdf]

https://oversight.house.gov/wp-content/uploads/2025/06/Schneier-Written-Testimony.pdf
32•ripe•8mo ago

Comments

malshe•8mo ago
Gemini 2.5 summary and highlights:

[cite_start]This report, based on the expert testimony of cybersecurity specialist Bruce Schneier and supplementary documents, outlines the significant cybersecurity risks created by the Department of Government Efficiency (DOGE). [cite: 1, 2, 3, 4] [cite_start]The central argument is that DOGE's approach to data management has dangerously weakened the U.S. government's security posture, creating unprecedented threats to national security and individual privacy. [cite: 4, 119]

### Key Findings:

*DOGE's Approach to Data:* * [cite_start]*Data Consolidation:* DOGE has been exfiltrating and connecting vast government databases to create a single, comprehensive pool of data on all people in the United States. [cite: 25, 27] [cite_start]This includes highly sensitive information such as tax returns, health records, social security numbers, and military service records. [cite: 21, 27, 138, 139, 140, 144] * [cite_start]*Reduced Security:* The program has consistently bypassed and disabled critical security measures. [cite: 4] [cite_start]This includes removing access controls, failing to vet staff with the required background checks, and creating unmonitored copies of data. [cite: 28, 29, 76] * [cite_start]*Use of AI:* DOGE is processing the consolidated data with AI tools, which exposes sensitive information outside of securely monitored environments and is being used to train AI models. [cite: 30, 191, 194] * [cite_start]*Outsourcing:* Control over data access is being transferred to private companies, notably Palantir, which has been reported to be working on projects without signed contracts outlining security measures. [cite: 31, 33, 34]

*Major Cybersecurity Risks:* * [cite_start]*Attractive Target for Adversaries:* The consolidation of disparate data streams has created a massive and highly attractive target for foreign and domestic adversaries. [cite: 4, 69] [cite_start]There is evidence of near real-time login attempts by users with Russian IP addresses using correct DOGE staff credentials. [cite: 39, 40] * [cite_start]*Coercion and Blackmail:* The accessible data can be used to blackmail, threaten, or harass individuals, including public officials and their families. [cite: 43, 46, 48] [cite_start]This can be achieved by weaponizing seemingly innocuous data like home addresses or more sensitive information related to health or finances. [cite: 47, 49] * [cite_start]*Cyberwarfare Preparation:* Adversaries can use the data to prepare for future conflicts by identifying vulnerabilities and targeting critical infrastructure or key individuals. [cite: 59, 62] [cite_start]The security breaches could allow for the installation of backdoors in crucial systems like the Treasury Payments System. [cite: 65] * [cite_start]*System Manipulation and Control:* The lax security practices create risks of data exposure, system manipulation, and complete system control by external actors. [cite: 230, 232, 235] [cite_start]This could lead to the alteration of records, denial of essential services, and the installation of ransomware. [cite: 248, 252, 254]

*Specific Examples and Consequences:* * [cite_start]DOGE personnel gained extensive "read" and sometimes "edit" access to critical systems at the Treasury Department, the Consumer Financial Protection Bureau, the Center for Medicare and Medicaid Services, and Veterans Affairs, among others. [cite: 17, 18, 20, 21, 22] * [cite_start]The 2015 hack of the Office of Personnel Management (OPM) by China, which was considered a massive security threat, pales in comparison to the potential data exposure from the combined DOGE datasets. [cite: 71, 73] * [cite_start]The lack of proper security protocols means that auditing what data has been copied and by whom is nearly impossible. [cite: 93] [cite_start]The report warns that government data on U.S. citizens could gradually appear on dark networks for years to come. [cite: 94] * [cite_start]Errors in the consolidated data, whether accidental or deliberately introduced by adversaries, could propagate through the system, leading to incorrect denial of benefits or the targeting of individuals for fraud. [cite: 102, 104, 106]

*Recommendations:* [cite_start]To mitigate these risks, the report recommends immediate action, including revoking DOGE's access, conducting a full forensic analysis of the systems, treating all affected systems as potentially compromised, rebuilding critical systems, and conducting an independent security assessment. [cite: 346, 349, 350, 351, 352] [cite_start]The report stresses that continued access exacerbates the damage, making recovery more difficult and increasing the risk of irreversible harm. [cite: 96, 353]

e2le•8mo ago
https://www.youtube.com/watch?v=wKkk-uWi7HM

An open replacement for the IBM 3174 Establishment Controller

https://github.com/lowobservable/oec
1•bri3d•1m ago•0 comments

The P in PGP isn't for pain: encrypting emails in the browser

https://ckardaris.github.io/blog/2026/02/07/encrypted-email.html
1•ckardaris•3m ago•0 comments

Show HN: Mirror Parliament where users vote on top of politicians and draft laws

https://github.com/fokdelafons/lustra
1•fokdelafons•4m ago•1 comments

Ask HN: Opus 4.6 ignoring instructions, how to use 4.5 in Claude Code instead?

1•Chance-Device•5m ago•0 comments

We Mourn Our Craft

https://nolanlawson.com/2026/02/07/we-mourn-our-craft/
1•ColinWright•8m ago•0 comments

Jim Fan calls pixels the ultimate motor controller

https://robotsandstartups.substack.com/p/humanoids-platform-urdf-kitchen-nvidias
1•robotlaunch•12m ago•0 comments

Exploring a Modern SMTPE 2110 Broadcast Truck with My Dad

https://www.jeffgeerling.com/blog/2026/exploring-a-modern-smpte-2110-broadcast-truck-with-my-dad/
1•HotGarbage•12m ago•0 comments

AI UX Playground: Real-world examples of AI interaction design

https://www.aiuxplayground.com/
1•javiercr•12m ago•0 comments

The Field Guide to Design Futures

https://designfutures.guide/
1•andyjohnson0•13m ago•0 comments

The Other Leverage in Software and AI

https://tomtunguz.com/the-other-leverage-in-software-and-ai/
1•gmays•15m ago•0 comments

AUR malware scanner written in Rust

https://github.com/Sohimaster/traur
3•sohimaster•17m ago•1 comments

Free FFmpeg API [video]

https://www.youtube.com/watch?v=6RAuSVa4MLI
3•harshalone•17m ago•1 comments

Are AI agents ready for the workplace? A new benchmark raises doubts

https://techcrunch.com/2026/01/22/are-ai-agents-ready-for-the-workplace-a-new-benchmark-raises-do...
2•PaulHoule•22m ago•0 comments

Show HN: AI Watermark and Stego Scanner

https://ulrischa.github.io/AIWatermarkDetector/
1•ulrischa•23m ago•0 comments

Clarity vs. complexity: the invisible work of subtraction

https://www.alexscamp.com/p/clarity-vs-complexity-the-invisible
1•dovhyi•24m ago•0 comments

Solid-State Freezer Needs No Refrigerants

https://spectrum.ieee.org/subzero-elastocaloric-cooling
2•Brajeshwar•24m ago•0 comments

Ask HN: Will LLMs/AI Decrease Human Intelligence and Make Expertise a Commodity?

1•mc-0•25m ago•1 comments

From Zero to Hero: A Brief Introduction to Spring Boot

https://jcob-sikorski.github.io/me/writing/from-zero-to-hello-world-spring-boot
1•jcob_sikorski•25m ago•1 comments

NSA detected phone call between foreign intelligence and person close to Trump

https://www.theguardian.com/us-news/2026/feb/07/nsa-foreign-intelligence-trump-whistleblower
10•c420•26m ago•1 comments

How to Fake a Robotics Result

https://itcanthink.substack.com/p/how-to-fake-a-robotics-result
1•ai_critic•26m ago•0 comments

It's time for the world to boycott the US

https://www.aljazeera.com/opinions/2026/2/5/its-time-for-the-world-to-boycott-the-us
3•HotGarbage•27m ago•0 comments

Show HN: Semantic Search for terminal commands in the Browser (No Back end)

https://jslambda.github.io/tldr-vsearch/
1•jslambda•27m ago•1 comments

The AI CEO Experiment

https://yukicapital.com/blog/the-ai-ceo-experiment/
2•romainsimon•28m ago•0 comments

Speed up responses with fast mode

https://code.claude.com/docs/en/fast-mode
5•surprisetalk•32m ago•1 comments

MS-DOS game copy protection and cracks

https://www.dosdays.co.uk/topics/game_cracks.php
4•TheCraiggers•33m ago•0 comments

Updates on GNU/Hurd progress [video]

https://fosdem.org/2026/schedule/event/7FZXHF-updates_on_gnuhurd_progress_rump_drivers_64bit_smp_...
2•birdculture•34m ago•0 comments

Epstein took a photo of his 2015 dinner with Zuckerberg and Musk

https://xcancel.com/search?f=tweets&q=davenewworld_2%2Fstatus%2F2020128223850316274
14•doener•34m ago•2 comments

MyFlames: View MySQL execution plans as interactive FlameGraphs and BarCharts

https://github.com/vgrippa/myflames
1•tanelpoder•35m ago•0 comments

Show HN: LLM of Babel

https://clairefro.github.io/llm-of-babel/
1•marjipan200•36m ago•0 comments

A modern iperf3 alternative with a live TUI, multi-client server, QUIC support

https://github.com/lance0/xfr
3•tanelpoder•37m ago•0 comments