A Federal Judge’s order that Elon Musk’s team temporarily refrained from being bored in the Treasury Payment Payment Department: Has Elon Musk labeled the performance of the government, is it a major cyber and national security Creating a weakness.
Mr. Musk’s official cost of cutting activities, US District Judge Paul A Angel Meyer said in his order on Saturday, “There is a risk of” revealing sensitive and confidential information “and the treasury system is more than” hacking. Weak “declared.
It is a danger that CyberScureti experts have been raising alarm in the past 10 days, as Mr Musk’s young coders’ band has called for access to the Treasury’s internal system. This access was eventually approved by Scott Basant, the newly certified Treasury Secretary.
But apart from the ambiguous assurances that the newcomers arriving at the Treasury gates were appropriate clearance, there was no details of how their work would be saved – and there is enough reason to believe that sugar from it. And it will be easier to target Russian intelligence services. Treasury system.
This was the central argument made by the 19 lawyers general as they sought temporarily prevention to remove Mr Musk’s workers from the Treasury system. And Judge Angle Mayor endorsed it on Saturday, restricting access to current Treasury officials until a different federal judge’s hearing next week.
The government has maintained that Mr Musk’s team has been limited to reviewing the “reading” data in the Treasury Department, though the administration is now appointing positions where he can do a lot.
The concern about targeting the department is rarely focused: In December, the agency said in a letter to the Congress that a Chinese intelligence group had broken its system and stolen unidentified content. The loss has not been fully estimated. But it was a reminder that the Department of Treasury – as much as the Pentagon and its contractors, in the CIA and the White House – are higher on the list of Beijing’s target. And no new access to the agency’s system produces a new way for those who are potentially penetrating.
In the first days before the order, the potential for potential risks posed by Mr Musk’s plan was high. Washington Post reported That a sub -contractor of Boz Allen Hamilton, who runs most of the tragedy’s risk detection center, issued a written warning. After his contents were leaked, he was withdrawn.
Outside experts describe what can happen when an outsider has sudden access to the lockdown system: Personal data can be leaked, payments can be diverted and collected information about political rivals. Can go
Harvard’s CyberScoreti expert Bruce Schneare and author of security -related books, “Click here to kill everyone”, which in the US History of Mr. Musk’s Force “Most fruitful protective security Violation is called “.
Mr Shanier noted that the involvement came through a “sophisticated cybertack or a foreign spying act, but through a billionaire’s government orders through a faulty stated role.”
Mr. Musk, of course, is associated with cybersonicity issues. The starlink, the satellite system, under his company SpaceX, kept Ukraine in communication after the Russian invasion and is considered extremely secure. Similarly, SpaceX has reusable rocket operations, which is anxious to transcribe by Chinese space engineers.
Therefore, federal officials say they have been carelessly surprised, with Mr. Musk’s workers pierced government systems, which have two millions of sensitive records reserves: the management of the Treasury and the US Office for Staff, both of which are large. There are goals. China Intelligence Services.
James Goldgier and Elizabeth Ann Sanders Written on Friday in foreign affairs. The authors, who are fellows at the Brookings Institution, noted that the agency plays a central role in the sanctions policy. The major goals of sanctions – China, Russia, Iran and North Korea – are also the main cybraduruses for the United States.
He wrote, “If the Musk team has access to and can rewrite the code that directs the US government payments, the threats of cyberself and confidentiality will be widespread.” “Possibly intelligent intelligence services are already working, trying to assess which musk team members may be fairly or are at risk of entering or being repressed.”
The authors also noted that if Mr Musk’s team was given security clearance, as the White House insists, it would not be the least probable test, a process in which months of months. It takes time.
During the Obama administration, Chinese Intelligence Services pierced the office of personal management files related to security clearance of more than 20 million Americans. US officials have told Chinese agents that data with the stolen records of Starwood hotels and anthem health systems to pull the photo where the personnel were traveling and with whom.
“Foreign opponents usually spend years in trying to enter such government systems, and use stealth to avoid stealth,” said Mr Schneire. “In this case, external operators with limited experience and minimal monitoring are doing their job straight and widely under public scrutiny, with high -level access to” highly sensitive networks of the United States “.
Mr Musk’s group says it is using “radical transparency” because it examines public agencies’ spending samples. But there is little information about how the people in their team have access to information or are making changes to systems that can introduce security risks. The Trump administration has not revealed the names of most young can -recruiters nor explained what kind of approval they have.
This week, in a letter to Senator Ron Weden, the Origon Democrat, who raised concerns about the work of the costing team, said Jonathan Blum, a Treasury official, said there was no cause for concern.
He wrote, “Treasury has no responsibility than the American people’s management of financial affairs, and its payment system is important for this process. In view of this mission, the treasury system. Development is determined to protect integrity and security.
He said that the system’s reservations are “strong and effective” and under a permanent review.