A Department of Government Efficiency (DOGE) employee was mistakenly granted edit access to a sensitive Treasury payment database, but the error was quickly corrected and no unauthorized changes were made, according to a court filing submitted Tuesday.
The document, filed by Treasury official Joseph Gioeli III, details how DOGE staffer Marko Elez was inadvertently given read/write privileges on February 5. However, the access was revoked the following day, and there is no evidence that Elez was aware of his temporary elevated privileges or that he attempted to modify any records.
Gioeli’s testimony also highlights that the Treasury Department had strict security controls in place to mitigate risks associated with DOGE’s access to its payment systems. These risks included potential operational disruptions, insider threats, and data exposure. While the department acknowledges these risks, the filing asserts that Treasury leadership was fully aware of them and took precautionary steps to prevent misuse.
Extent of Elez’s Access & Security Measures
Following the initial access error, Elez was granted read-only access to the Treasury database in question and was restricted from making any modifications. His review of payment systems was limited to low-utilization periods to minimize the chance of operational impact, according to the filing.
Treasury officials are still conducting a forensic analysis of Elez’s government-issued laptop, but at this stage, they have found no indication of unauthorized access or data leaks. It remains unclear whether Elez shared any information with other members of the DOGE team.
Cybersecurity Precautions & Risk Mitigation Strategies
Cybersecurity analysts have expressed concerns about DOGE’s access to sensitive databases, noting that even read-only access can present vulnerabilities, such as potential data exfiltration or sophisticated cyberattacks. Treasury’s filing outlines several layers of security protocols put in place to prevent unauthorized access and protect sensitive financial data:
Restricted Device Access → Elez could only connect to Treasury systems using a government-issued Bureau of the Fiscal Service (BFS) laptop.
Enhanced Monitoring & Logging → Treasury used continuous activity monitoring, logging all commands, queries, and scripts executed on the device.
Website & USB Restrictions → External storage devices (such as USBs) were blocked, and cloud-based storage services were disabled to prevent unauthorized data transfers.
Data Exfiltration Detection → Treasury deployed automated detection tools to monitor for any attempted transmission of sensitive data outside of government networks.
Encryption & Access Limits → The BFS laptop was fully encrypted, and access was restricted to pre-approved operations only.
In addition to these security measures, DOGE official Tom Krause—who oversaw the project—was granted “over-the-shoulder” review privileges. This meant he could observe Elez’s work but had no direct access to payment systems himself.
To further ensure security compliance, Elez and Krause agreed to a formal attestation, committing to:
Destroying all Treasury-related data upon project completion
Confirming that no unauthorized access occurred
Legal Restrictions & Ongoing Lawsuit
DOGE’s access to Treasury payment systems has been at the center of legal scrutiny, with 19 Democratic state attorneys general filing a lawsuit to challenge the extent of DOGE’s database access.
A federal judge initially ruled to restrict DOGE’s access, citing concerns over data security and oversight. However, a subsequent court order issued Tuesday loosened some of those restrictions, allowing DOGE’s work to continue under stricter safeguards.
While Treasury’s filing emphasizes that Elez never abused his access, the broader debate over government database security, insider threat risks, and interagency data sharing remains ongoing.
Conclusion
The court filing confirms that Treasury officials were fully aware of the risks involved in granting DOGE access to payment systems and implemented multiple layers of security to mitigate potential threats. However, the incident raises larger questions about cybersecurity governance and how government agencies manage internal access to highly sensitive financial infrastructure.
With an ongoing forensic analysis of Elez’s activity, officials and legal experts will be closely watching for any further developments regarding DOGE’s role in Treasury operations and the future of interagency cybersecurity protocols.
Help us bring real change! Corporate lobbying has corrupted our system for too long, and it’s time to take action. Please sign and share this petition—your support is crucial in restoring accountability to our government. Every signature counts! Thank you!
https://www.ipetitions.com/petition/restore-our-republic-end-lobbying
Support truth, health, and preparedness by shopping the Alex Jones Store through our link. Every purchase helps sustain independent voices and earns us a 10% share to fuel our mission. Shop now and make a difference!
https://thealexjonesstore.com?sca_ref=7730615.EU54Mw6oyLATer7a



Thank you for specifics, John. I see that you are well aware of state attorneys general filing a lawsuit to challenge the extent of DOGE’s database access (as I thought you would be). I linked to a news report about this in one of your later posts.
You’re welcome, Chris! 😎
No bueno.
Estoy de acuerdo.