Confidential threat programs in departments such as Health and human servicesIN TransportAND VeteransThey also have rules that protect unplasified government information that allows them to monitor employees clicks and communicate, in accordance with notification in the Federal Register, the official source of documents regarding the order to order the provisions. Rules regarding Internal departmentThe Internal Revenue Serviceand Federal corporate deposit insurance (FDIC), also allows the collection and assessment of social media content.
These internal agency programs, supervised by the National Task group led by the Prosecutor General and the Director of the National Intelligence, are aimed at identifying behaviors that may indicate an increased risk of not only leaks and violence in the workplace, but also “losses” or “degradation” of the agency federal “Resources or possibilities. “Over 60 percent of incidents related to a confidential threat in the federal sector are associated with fraud, such as theft of money or taking someone’s personal data, and is related to the reaction, according to that, according to this analysis Carnegie Mellon researchers.
“Fraud“” Dissatisfaction “,”Ideological challenges“” “Moral outrage“Or a discussion about moral fears considered” unrelated to professional duties “are some of the possible signs that the employee is a threat, in accordance with the training literature of the US government.
Of the 15 departments at the office level, such as energy, working matters and veterans, at least nine had contracts at the end of last year with suppliers such as Everfox and DTEX systems, which allowed digitally monitoring some employees, in accordance with Data on public expenditure. Everfox refused to comment.
DTEX capturing software that is used by many federal agencies is one of the examples of newer class programs that generate individual risk results by analyzing anonymized metadata, such as URL people who visit and which files open and print to them according to the company’s work equipment . When the agency wants to identify and continue to examine someone with a high result, according to the company, two people must sign in some versions of its tool. DTEX software does not have to register the keys or scan the content of E -Maili, connections, chats or social media posts.
But they do not work widely in the entire government, where employees are clearly warned repetitive message When they run their devices, “they do not have reasonable waiting for privacy” in their communication or in any data stored or sent via government networks. The question remains whether, and to what extent, Doge agents rely on existing monitoring programs to conduct a Trump mission consisting in quickly eliminating federal employees that his administration considers to be incompatible with the president’s or disloyal program.
Rajan KOO, director of DTEX technology, tells Wired that he hopes that Trump’s administration will adapt the government’s approach to monitoring. Events such as widespread release in combination with relying on what KOO described as intrusive supervision tools can arouse an environment in which employees feel dissatisfied, he says. “You can create a culture of mutual loyalty,” says Koo or “The perfect basis for confidential threats.”
Already overwhelmed
Sources know about the threat programs by the US government describe them as largely inefficient and intensive labor -intensive, requiring excessive teams of hand -to -hand analysts through everyday alarm dams, which contain many false positives. Many sources have said that the systems are currently “overwhelmed”. Any efforts of Trump’s administration to expand the range of such tools or expand their parameters – for a more accurate analysis in terms of perceived signs of insubordination or disloyalty to partisan fealtie, time to comb, according to people familiar with work.
IN E -Mail last month Looking for the voluntary resignation of federal employees, Trump’s administration wrote that she wants a “reliable, true, trustworthy” labor force. Attempts to exploit confidential threat programs to enforce this vision can be met by a number of legal challenges.