BigTech CompaniesCybersecurityNewswireTechnology

DOGE Misused Social Security Data, DOJ Admits

Originally published on: January 24, 2026
▼ Summary

– US law enforcement agencies circumvent Fourth Amendment warrant requirements by purchasing resident data and conducting warrantless home raids, despite court rulings against such practices.
– A massive, unsecured database containing 149 million global login credentials was discovered and taken offline, with evidence pointing to collection by info-stealing malware.
– Microsoft confirms it often provides law enforcement with BitLocker decryption keys stored in its cloud recovery system upon request, granting full access to encrypted computers.
– The Trump administration admitted in court that operatives may have improperly shared Social Security Administration data with an outside group via unapproved servers, copying a Musk adviser.
– Major data breaches and surveillance issues were reported, including an Under Armour investigation, TikTok collecting more user data, and Iranian state TV being hacked to broadcast protest messages.

Recent court filings reveal a troubling pattern of government agencies potentially overstepping legal boundaries in data handling and enforcement actions. The Department of Justice has admitted that operatives from the so-called Department of Government Efficiency (DOGE) may have improperly shared sensitive Social Security Administration data. According to the filing, this information could have been passed to an outside group with political aims, though the DOJ states it remains unclear if the transfer actually occurred. The documents also note that the data was shared via unapproved third-party servers, breaching established security protocols. In a notable detail, an email copied to a senior adviser to Elon Musk contained a password-protected file with the personal information of approximately one thousand individuals.

This incident is part of a broader landscape where constitutional protections appear under pressure. Law enforcement bodies have been known to purchase personal data on residents, a practice that circumvents the warrant requirement of the Fourth Amendment. Parallel reports indicate that immigration authorities have conducted home raids without judicial warrants, a tactic recent federal rulings have deemed unconstitutional. These activities contribute to an environment where individuals may feel surveilled, with some studies suggesting it can deter people from seeking essential services like medical care.

Beyond government actions, significant digital vulnerabilities continue to expose the public. A security researcher recently discovered an unsecured database containing a staggering 149 million login credentials for platforms ranging from major email services to global government systems. The data, believed to be harvested by information-stealing malware, was openly accessible on the internet before being taken offline. In the corporate sphere, Under Armour is investigating a potential breach after a hacker posted millions of customer records online, exposing names, email addresses, and purchase-related information.

Technology companies also play a complex role in data access. Microsoft has confirmed it regularly provides hard drive decryption keys to law enforcement upon request, granting agencies full access to a computer’s contents. This practice applies when users follow Microsoft’s recommendation to store their BitLocker recovery key in the cloud. The company reportedly complies with about twenty such requests annually, though it cannot assist when a user stores the key solely on their local device.

New surveillance technologies are simultaneously expanding. Customs and Border Protection is exploring the use of a “quantum sensor” tied to an AI database to detect substances like fentanyl. In a move affecting airspace, the Federal Aviation Administration has established temporary no-fly zones around Department of Homeland Security facilities, restricting drone operations and warning of potential criminal charges for violations.

Amidst these developments, acts of digital protest have emerged. During widespread internet shutdowns in Iran, anti-regime voices hijacked a state television satellite broadcast to air a message of support for protesters, featuring a call for security forces to join the public. The unauthorized broadcast lasted for several minutes before regular programming resumed.

These events collectively underscore the ongoing tensions between security practices, privacy rights, and the evolving methods of both control and dissent in the digital age.

(Source: Wired)

Topics

fourth amendment violations 95% ice enforcement 90% Data Privacy 88% government surveillance 85% cybersecurity breaches 82% whistleblower complaints 78% social media data 75% encryption access 72% political interference 70% doxing risks 68%