{"id":24510,"date":"2026-01-24T14:53:47","date_gmt":"2026-01-24T14:53:47","guid":{"rendered":"https:\/\/thisbiginfluence.com\/?p=24510"},"modified":"2026-01-24T14:53:47","modified_gmt":"2026-01-24T14:53:47","slug":"doge-may-have-misused-social-security-data-doj-admits","status":"publish","type":"post","link":"https:\/\/thisbiginfluence.com\/?p=24510","title":{"rendered":"DOGE May Have Misused Social Security Data, DOJ Admits"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span class=\"lead-in-text-callout\">Legislation enforcement authorities<\/span> in the US have for years <a href=\"https:\/\/www.wired.com\/story\/ndaa-2023-davidson-jacobs-fourth-amendment\/\">circumvented the US Constitution\u2019s Fourth Amendment<\/a> by <a href=\"https:\/\/www.wired.com\/story\/us-spies-one-stop-shop-private-data\/\">purchasing data on US residents<\/a> that might in any other case must be obtained by a warrant. Immediately, Immigration and Customs Enforcement apparently thinks it will possibly ignore long-standing constitutional safety by warrantlessly breaking down doorways to arrest individuals, in keeping with a current whistleblower grievance\u2014<a href=\"https:\/\/www.wired.com\/story\/us-judge-rules-ice-raids-require-judicial-warrants-contradicting-secret-ice-memo\">despite recent federal rulings that doing so violates the Fourth Amendment<\/a>.<\/p>\n<p class=\"paywall\">Such is the information <a href=\"https:\/\/www.wired.com\/story\/how-ice-uprooted-normal-life-in-minneapolis\/\">coming out of Minneapolis<\/a> this week, the place protesters and the federal authorities continued their standoff\u2014whilst ICE plans to <a href=\"https:\/\/www.wired.com\/story\/ice-detention-network-minnesota-5-states\/\">build out a deportation network spanning Minnesota and four other states<\/a>. And regardless of the Division of Homeland Safety\u2019s claims that merely naming an ICE agent publicly is akin to \u201cdoxing,\u201d a WIRED overview of LinkedIn discovered that brokers are <a href=\"https:\/\/www.wired.com\/story\/ice-agents-are-doxing-themselves\/\">frequently doxing themselves<\/a>. In fact, gaining access to somebody\u2019s private data can have penalties: A report this week discovered that individuals are <a href=\"https:\/\/www.wired.com\/story\/surveillance-and-ice-are-driving-patients-away-from-medical-care-report-warns\/\">less likely to seek medical care<\/a> as a consequence of ad-tech surveillance and ICE enforcement actions.<\/p>\n<p class=\"paywall\">Immigration authorities aren\u2019t simply raiding individuals\u2019s properties and not using a judge-signed warrant\u2014they\u2019re additionally in search of medication. Customs and Border Safety this week <a href=\"https:\/\/www.wired.com\/story\/cbp-wants-ai-powered-quantum-sensors-for-finding-fentanyl-in-cars\/\">put out feelers for a \u201cquantum sensor\u201d that\u2019s capable of detecting fentanyl<\/a> that ties into an \u201cAI database.\u201d<\/p>\n<p class=\"paywall\">In non-immigration information, a researcher just lately found <a href=\"https:\/\/www.wired.com\/story\/149-million-stolen-usernames-passwords\/\">an unsecured database containing 149 million login credentials<\/a>. The usernames and passwords seem linked to accounts for all the things from Gmail, Fb, and Apple to authorities methods world wide. The researcher who discovered the database, Jeremiah Fowler, believes the stolen logins have been collected by infostealing malware. The database, which was accessible to anybody on the web, has since been taken offline.<\/p>\n<p class=\"paywall\">TikTok, in the meantime, has begun <a href=\"https:\/\/www.wired.com\/story\/tiktok-new-privacy-policy\/\">collecting even more data on its users<\/a>\u2014together with exact location knowledge\u2014after the social video app was offered to US buyers.<\/p>\n<p class=\"paywall\">However that\u2019s not all. Every week, we spherical up the safety and privateness information we didn\u2019t cowl in depth ourselves. Click on the headlines to learn the total tales. And keep protected on the market.<\/p>\n<p class=\"paywall\">The Trump administration this week admitted in courtroom paperwork that operatives with the so-called Division of Authorities Effectivity (<a href=\"https:\/\/www.wired.com\/tag\/doge\/\">DOGE<\/a>) might have shared knowledge from the Social Safety Administration (SSA) with an outdoor group that seeks to \u201coverturn election leads to sure states,\u201d in keeping with a <a data-offer-url=\"https:\/\/storage.courtlistener.com\/recap\/gov.uscourts.mdd.577321\/gov.uscourts.mdd.577321.197.0.pdf\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/storage.courtlistener.com\/recap\/gov.uscourts.mdd.577321\/gov.uscourts.mdd.577321.197.0.pdf&quot;}\" href=\"https:\/\/storage.courtlistener.com\/recap\/gov.uscourts.mdd.577321\/gov.uscourts.mdd.577321.197.0.pdf\" rel=\"nofollow noopener\" target=\"_blank\">January 16 Department of Justice court filing<\/a>. Nevertheless, it isn&#8217;t clear to the DOJ whether or not the unnamed \u201cDOGE Staff members\u201d really shared the information with the group, which was unidentified within the courtroom data.<\/p>\n<p class=\"paywall\">The submitting, which seeks to \u201cright\u201d earlier testimony, additionally says DOGE operatives \u201chave been utilizing hyperlinks to share knowledge by means of the third-party server \u2018Cloudflare,\u2019\u201d which is \u201cnot authorised for storing SSA knowledge and when used on this method is exterior SSA\u2019s safety protocols.\u201d The submitting additional says that Steve Davis, a high-ranking adviser to Elon Musk, was copied on a March 3, 2025, e mail that included an hooked up password-protected file containing the names and addresses of round 1,000 individuals, which was taken from SSA methods of document. The SSA was not capable of decide, nonetheless, whether or not Davis accessed the file, which remained inaccessible to present SSA employees as of the date of the courtroom submitting.<\/p>\n<p class=\"paywall\">The Federal Aviation Administration has taken the bizarre step of together with &#8220;Division of Homeland Safety services in cellular belongings&#8221; in a &#8220;no-fly zone&#8221; announcement, 404 Media stories. The discover restricts &#8220;unmanned plane,&#8221; which would come with industrial drones used to seize aerial footage, from getting used inside 3,000 toes horizontally and as much as 1,000 toes of altitude above DHS belongings. In line with 404 Media, individuals caught violating the restrictions may face legal costs, civil penalties, and even lose their authority to fly drones sooner or later.<\/p>\n<p class=\"paywall\">When you&#8217;re breaking out your thermals in preparation for this weekend&#8217;s <a href=\"https:\/\/www.wired.com\/story\/winter-storm-about-to-hit-the-us-snow-freezing-rain\/\">giant winter storm<\/a>, you may wish to test to see in case you purchased it from Below Armour. TechCrunch stories that the clothes and health app firm is investigating a possible knowledge breach after a hacker posted thousands and thousands of buyer data on-line. The info breach notification web site Have I Been Pwned knowledgeable 72 million people by e mail concerning the leak and says that the dataset included names, e mail deal with, genders, dates of beginning, approximate location, and data associated to purchases. An Below Armour spokesperson instructed TechCrunch that the corporate was conscious of claims concerning the breach, had engaged &#8220;exterior cybersecurity consultants&#8221; for assist, and didn&#8217;t have proof that the problem affected methods to course of funds or retailer buyer passwords.<\/p>\n<p class=\"paywall\">If you encrypt your laptop computer\u2019s onerous drive, you possible anticipate meaning solely you, the pc\u2019s proprietor, will be capable to decrypt it at will and entry your knowledge. When you observe Microsoft\u2019s suggestion of storing your decryption key within the cloud for simpler restoration of your knowledge in case you lose the important thing or overlook your password to unlock it, then you definitely you\u2019ll must replace your safety expectations: Microsoft has confirmed that it usually arms out these decryption keys to regulation enforcement at an company\u2019s request, giving them full entry to the machine\u2019s secrets and techniques. Forbes discovered an occasion when Microsoft complied with an FBI request for decryption keys for a pc in Guam that was a part of a fraud investigation. Microsoft went on to substantiate to Forbes that it receives about 20 requests for Bitlocker keys a yr from regulation enforcement and sometimes complies. The corporate added that it <em>can\u2019t<\/em> comply, nonetheless, when the secret&#8217;s saved solely regionally by the consumer\u2014an instructive be aware for cypherpunks in all places.<\/p>\n<p class=\"paywall\">The Iranian authorities has shut off the nation\u2019s web for weeks amid protests which have swept the nation. However anti-regime voices this week discovered one other technique to attain the nation\u2019s populace: an obvious hacking operation hijacked the nation\u2019s state TV satellite tv for pc to air a message in help of protesters, hundreds of whom have died amid the current rebellion. The clip, which featured the son of the previous ruler of Iran, Reza Pahlavi, referred to as on army and safety forces to affix protesters and battle the regime. \u201cDon\u2019t level your weapons on the individuals,\u201d one graphic within the broadcast learn. \u201cBe a part of the nation for the liberty of Iran.\u201d In line with some stories, the unauthorized message lasted so long as 10 minutes earlier than the state TV channel resumed its regular programming.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.wired.com\/story\/security-news-this-week-doge-may-have-misused-social-security-data-doj-admits\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Legislation enforcement authorities in the US have for years circumvented the US Constitution\u2019s Fourth Amendment by purchasing data on US residents that might in any other case must be obtained by a warrant. Immediately, Immigration and Customs Enforcement apparently thinks it will possibly ignore long-standing constitutional safety by warrantlessly breaking down doorways to arrest individuals, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":24512,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[623,2282,11742,1598,15548,301,203],"class_list":["post-24510","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-admits","tag-data","tag-doge","tag-doj","tag-misused","tag-security","tag-social"],"_links":{"self":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/24510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=24510"}],"version-history":[{"count":1,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/24510\/revisions"}],"predecessor-version":[{"id":24511,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/24510\/revisions\/24511"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/media\/24512"}],"wp:attachment":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=24510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=24510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=24510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}