Surprising plans in areas such as health and human services, transportation and veterans also have policies that protect the classified government information, allowing them to oversee clicks and communications of employees, According to declarations in the federal registration, an official source of documents governing the Ministry of Interior’s policies, internal revenue services and federal deposit insurance companies also enables the collection and evaluation of the content of the employees’ social media.
These domestic agency programs, supervised by a national task force led by the Prosecutor General and the National Intelligence Director, with the aim of identifying behaviors that may indicate the risk of increasing not only leaks and violence at work, but also “loss” or “destruction” Of “Federal Agency’s resources or capabilities”. According to the analysis of Carnegie Melon researchers, more than 60 percent of the federal threatening accidents include fraud, such as stealing money or taking personal information, and related to dissatisfaction.
“Fraud”, “unhappy”, “ideological challenges”, “moral anger” or discussion of moral concerns that are “unrelated to work tasks”, some of the potential signs that a worker threatens, according to US Government Education Literature.
Of the 15 sections at the cabinet level such as energy, labor and veterans, they have contracted with suppliers such as Everfox and DTEX systems at least last year, such as Everfox and DTEX, which allowed digital monitoring of some employees to provide public costs. Brought. Everfox data refused to comment.
DTTEX tracking software, used by several federal agencies, is one of the newer class examples of programs that creates individual risk scores by analyzing anonymous steriles, such as URL workers visit them. And which files open and print and print them. According to the company, business devices. When an agency wants to identify and research a person with a high score, two people must register in some versions of the tool. DTTEX software does not need to enter the key or scan the content of email, call, chat or social media posts.
But it is not that things work widely across the government, where employees are explicitly warned in a frequent message that they boot their devices that “no reasonable expectation of privacy” in their communications or any Data stored or transferred through government. Networks remain the question of whether and how much DOGE workers rely on existing supervisory plans to raise Trump’s mission to quickly eliminate federal workers whose government The title is indescribable with the President’s agenda or distrust.
Rajan Ku, chief technician at DTEX, tells Wired that he hopes the Trump administration will regulate the government’s approach to monitoring. He says events such as extensive expulsion along with relying on what Koo describes as supervisory tools can create an environment in which workers feel uncomfortable. “You can create a culture of mutual loyalty, or” the suitable land for their own threats, “Ku says.
Pre -drowning
Resources, with awareness of the threatening plans of the US government, describe them as great and intensively, and require over -analysts teams to be through daily barriers to warnings, including many false positives, in form. Handmade pores. Numerous sources said these systems are now “drowning”. Any attempt by the Trump administration to expand such tools or expand their parameters – to a more careful examination of the signs of perceived or mistrust of party parties, for example, leads to a dramatic increase in false positives, for example. It is noteworthy, according to people who are familiar with the work, the time of combing.
The Trump administration wrote in an email last month following the voluntary resignation of federal employees, he wrote that he wants to be a “reliable, loyal, trustworthy workforce”. Attempts to use their own threat programs to implement this view can be met with a number of legal challenges.