The Times Australia
The Times World News

.
The Times Real Estate

.

Cyber security experts on giving Elon Musk and DOGE the keys to US government IT systems

  • Written by Frank den Hartog, Professor of Information Systems, Research Chair in Critical Infrastructure, University of Canberra



A few weeks ago, word started to come out that the newly minted United States Department of Government Efficiency (DOGE)[1] had acquired unprecedented access to multiple US government computer systems[2].

DOGE employees – tech billionaire Elon Musk and his affiliates – have been granted access to sensitive personal and financial data, as well as other data critical for national security[3]. This has created a national and international outcry[4], and serious concerns have been raised about data security, privacy and potential influence.

A group of 14 state attorneys-general attempted to have DOGE’s access to certain federal systems restricted, but a judge has denied[5] the request.

Questions of trust

What are the deeper reasons behind this outcry? After all, Musk is far from the first businessman to gain political power.

There is, of course, US President Donald Trump himself, alongside many more on both sides of politics. Most of them kept running their businesses at arm’s length and went back to them after a stint in Washington.

So why are so many people alarmed now, but not before? The key word here is trust. Surveys suggest many people don’t trust Musk[6] with this kind of access.

Does that mean we trusted the others? The foundation of modern cyber security is not to trust anything or anybody[7] in the first place.

So while a lack of trust in Musk is one reason for disquiet, another is a lack of trust in the current state of cyber security in US government systems and procedures. And for good reason.

An insider threat

The situation in the US raises the spectre of what cyber experts call an “insider threat”. These concern cyber security incidents caused by people who have authorised access to systems and data.

Cyber security relies on controlling the so-called “CIA triad[8]” of confidentiality, integrity and availability. Insider threats can compromise all three.

Authentication and subsequent authorisation of access has traditionally been an important measure to prevent cyber incidents from occurring. But apparently, that is not sufficient any more.

Perhaps the most famous insider incident in history is Edward Snowden’s leak of classified documents[9] from the US National Security Agency in 2013. Australia too has had its share of insider breaches – the 2000 Maroochy Shire attack[10] is still a textbook example.

Musk and his DOGE colleagues have now become insiders.

How to reduce the risk of insider threat

There are plenty of strategies organisations can follow to reduce the risk of insider threats:

  • more rigorous vetting of employees

  • giving users only the bare minimum access and privileges they need

  • continuously auditing who has access to what, and restricting access immediately when needed

  • authenticating and authorising users every time they access a different system or file (this is part of what is called a “zero trust architecture[11]”)

  • monitoring for unusual behaviour regarding insiders accessing systems and files

  • developing and nurturing a cyber-aware culture in the organisation.

In government systems, the public should be able to trust these procedures are being rigorously applied. However, when it comes to Musk and DOGE, it seems they are not. And that’s where the core of the problem lies.

Clearances and a lack of care

DOGE employees without security clearance reportedly[12] have access to classified systems which would normally be considered quite sensitive.

However, even security clearances offer no iron-clad guarantees.

Security clearances assume someone can be trusted based on their past. But past performance can never guarantee the future.

Photo of protesters, one holding a placard reading 'GET YOUR PAWS OFF OUR DATA DOGE'.
Not all Americans are happy with DOGE access to government computer systems. John G. Mabanglo/EPA[13]

In the US, obtaining and holding a security clearance has become a status symbol[14]. A clearance may also be a golden ticket to high-paying jobs and power, and hence subject to politics rather than independent judgement.

And it seems little care has been taken to keep users’ access and privileges to a minimum.

You might think DOGE’s employees, tasked with seeking out inefficiency, would only need read-only access to the US government IT systems. However, at least one of them temporarily had “write” access to the systems of the treasury, according to reports, enabling him to alter code controlling trillions in federal spending[15].

It all comes down to trust

Even if all possible access control and vetting procedures are in place and working perfectly, there will always be the problem of how to declassify information.

Or to put it another way: how do you make somebody forget everything they knew when their clearance or access is revoked or downgraded?

What Musk has seen, he can never unsee. And there is only so much that can be done to prevent this knowledge from leaking.

Even if all procedures to protect against insider threats are followed perfectly (and they aren’t), nothing is 100% secure.

We would still need a certain level of public trust that the obtained data and information would be dealt with responsibly. Has trust in Musk and his affiliates reached that level?

According to recent polling[16], public opinion is still divided.

References

  1. ^ United States Department of Government Efficiency (DOGE) (www.abc.net.au)
  2. ^ multiple US government computer systems (therecord.media)
  3. ^ national security (www.theverge.com)
  4. ^ outcry (www.politico.com)
  5. ^ denied (www.nytimes.com)
  6. ^ don’t trust Musk (today.yougov.com)
  7. ^ not to trust anything or anybody (www.cyber.gov.au)
  8. ^ CIA triad (www.techtarget.com)
  9. ^ leak of classified documents (en.wikipedia.org)
  10. ^ Maroochy Shire attack (link.springer.com)
  11. ^ zero trust architecture (www.cyber.gov.au)
  12. ^ reportedly (www.theverge.com)
  13. ^ John G. Mabanglo/EPA (photos.aap.com.au)
  14. ^ status symbol (www.pbs.org)
  15. ^ controlling trillions in federal spending (www.wired.com)
  16. ^ recent polling (www.cbsnews.com)

Read more https://theconversation.com/insider-threat-cyber-security-experts-on-giving-elon-musk-and-doge-the-keys-to-us-government-it-systems-250046

The Times Features

How weight stigma in maternity care harms larger-bodied women and their babies

According to a study from the United States[1], women experience weight stigma in maternity care at almost every visit. We expect this experience to be similar in Australia, ...

10 Ways to Make Money Online and Provide Financial Stability

The possibility of earning money online has reached unprecedented heights. The proper strategy enables anyone to begin earning money. You don't need fancy degrees or special skil...

The Power of Exterior Design: How Facades Influence Property Value

First impressions count when it comes to real estate, and nothing quite sets the tone for a property like its exterior design. A building's facade is more than just an aesthetic ...

The Best Adjustable Bed and Mattress Packages for Comfort

The appropriate bed and mattress are essential for establishing the perfect sleep environment. If you seek a way to upgrade your sleep experience, adjustable bed and mattress pac...

Designing a Modern Home: Features That Will Make Your Dream House Stand Out

Designing your dream home is an exciting journey, and for many, it’s an opportunity to create a space that reflects their personal style, functionality needs, and modern trends. ...

Client Dinners Done Right: Tips for Meaningful Engagement

Client dinners offer more than just a meal—they’re an opportunity to build lasting business relationships in a more personal and relaxed setting. Done well, these dinners can str...

Times Magazine

Top Benefits of Hiring Commercial Electricians for Your Business

When it comes to business success, there are no two ways about it: qualified professionals are critical. While many specialists are needed, commercial electricians are among the most important to have on hand. They are directly involved in upholdin...

The Essential Guide to Transforming Office Spaces for Maximum Efficiency

Why Office Fitouts MatterA well-designed office can make all the difference in productivity, employee satisfaction, and client impressions. Businesses of all sizes are investing in updated office spaces to create environments that foster collaborat...

The A/B Testing Revolution: How AI Optimized Landing Pages Without Human Input

A/B testing was always integral to the web-based marketing world. Was there a button that converted better? Marketing could pit one against the other and see which option worked better. This was always through human observation, and over time, as d...

Using Countdown Timers in Email: Do They Really Increase Conversions?

In a world that's always on, where marketers are attempting to entice a subscriber and get them to convert on the same screen with one email, the power of urgency is sometimes the essential element needed. One of the most popular ways to create urg...

Types of Software Consultants

In today's technology-driven world, businesses often seek the expertise of software consultants to navigate complex software needs. There are several types of software consultants, including solution architects, project managers, and user experienc...

CWU Assistive Tech Hub is Changing Lives: Win a Free Rollator Walker This Easter!

🌟 Mobility. Independence. Community. All in One. This Easter, the CWU Assistive Tech Hub is pleased to support the Banyule community by giving away a rollator walker. The giveaway will take place during the Macleod Village Easter Egg Hunt & Ma...

LayBy Shopping