UNITED STATES GOVERNMENT OFFICIALS have raised concerns that allowing Elon Musk’s Department of Government Efficiency (DoGE) access to Treasury Department databases could expose human intelligence assets operating abroad. On January 31, newly installed Treasury Secretary Scott Bessent gave two DoGE employees, Tom Krause and Marko Elez, read-only access to the Treasury Department’s payment system. (DOGE), led by Elon Musk, has been granted access to sensitive Treasury Department data, raising significant concerns about the security of intelligence assets. This access includes Treasury payment systems and databases containing sensitive information. The rapid integration of DOGE personnel, some of whom are young and inexperienced, into federal systems has heightened fears of potential data leaks and insider threats. Traditional counterintelligence measures, such as thorough vetting of personnel handling classified information, appear to have been bypassed, increasing vulnerability. DOGE’s access to Treasury data poses serious risks to intelligence assets, including potential exposure of covert operations and compromise of sensitive information. The situation underscores the need for stringent oversight and robust cybersecurity measures to protect national security interests.
Potential Risks:
- Exposure of Covert Operations: Access to detailed financial transactions could inadvertently reveal the identities and activities of covert operatives abroad. Such exposure compromises ongoing missions and endangers the lives of intelligence personnel.
- Insider Threats: The rapid integration of DOGE personnel into federal systems, often without thorough vetting, increases the risk of data leaks. This situation parallels past incidents where insufficiently vetted individuals caused significant security breaches.
- Legal and Privacy Violations: Administrative law judges have filed a lawsuit against DOGE, citing concerns that access to their personal and employment records endangers their safety and violates the Privacy Act. This legal action underscores the broader apprehension about DOGE’s access to sensitive information.
Mitigation Efforts:
In response to these concerns, the Treasury Department has implemented measures such as enhanced monitoring and activity logging to mitigate potential risks. However, the effectiveness of these measures in fully safeguarding sensitive information remains uncertain.
The access granted to DOGE poses serious risks to foreign intelligence assets. The potential for exposure of covert operations, coupled with concerns over insider threats and legal violations, underscores the need for stringent oversight and robust security measures to protect national security interests.
According to The Washington Post, a senior Treasury employee filed a memorandum to Secretary Bessent, warning that any form of access to the department’s payment system by DoGE employees would “pose an unprecedented insider threat risk” to government secrets. The memo reportedly focused specifically on payments made by Treasury to human intelligence sources, which are typically recruited and handled abroad by the Central Intelligence Agency (CIA), the Defense Intelligence Agency (DIA), and other agencies of the United States Intelligence Community. Such payments are made to foreign assets who collect intelligence on behalf of American agencies, or Americans who work in an intelligence capacity without the use of diplomatic cover.
The memo noted that the Treasury Department employs several methods to disguise payments made to human intelligence sources. These methods remain vulnerable to detection by “people with the requisite know-how”, which would allow these assets to be identified and could place their lives in danger. As a result, DoGE’s access to the classified database posed an “unprecedented insider threat risk”, according to the memo. It advised Secretary Bessent to “suspend [DoGE’s] access immediately and conducting a comprehensive review of all actions [DoGE employees] may have taken on these systems.
A federal judge in the district of Manhattan issued a preliminary injunction that bars DoGE from accessing any Treasury Department databases that contain personally identifiable information. The injunction also instructs DoGE personnel to surrender back to Treasury all information they have obtained so far. A hearing to decide the next steps in the case is due to occur on February 14.
DOGE’s access to systems poses substantial risks, including potential exposure of covert operations and compromise of sensitive information. The rapid integration of DOGE personnel into federal systems, often without thorough vetting, has heightened fears of data leaks and insider threats. Traditional counterintelligence measures appear to have been bypassed, increasing vulnerability.
while DOGE’s mission to enhance government efficiency is acknowledged, its access to intelligence-related payment systems is fraught with significant risks. The potential for compromising sensitive information and the absence of stringent oversight measures suggest that such access may not be justified.
Reports indicate that DOGE officials sought access to the Treasury payment system to halt payments to certain agencies, such as the U.S. Agency for International Development (USAID).
This action has led to apprehensions that DOGE might similarly target intelligence agencies, potentially disrupting their funding.
DOGE’s access to these systems could allow unilateral blocking of payments that have already been approved by Congress and signed into law by the president. This raises concerns about the potential for DOGE to interfere with the financial operations of intelligence agencies. The risks associated with DOGE’s access to Treasury payment systems are critical and multifaceted, encompassing potential exposure of covert operations, increased insider threats, and legal violations. These concerns underscore the need for stringent oversight and robust security measures to protect national security interests.

More on this story: Will Trump’s Plan to Reform the CIA succeed?