Imagine every piece of identifying information the U.S. government has ever collected about you — your Social Security number, your date and place of birth, your parents’ names, your race and ethnicity, your citizenship status — all of it copied onto a device roughly the size of your thumb, then carried out the door by someone who no longer works for the government.
That’s what investigators are now looking into following a whistleblower complaint about a former employee of DOGE — the Department of Government Efficiency — who allegedly did exactly that at the Social Security Administration.
If the allegations prove true, this could be one of the most significant unauthorized disclosures of American personal data in history. We’re not talking about a corporate data breach where someone stole your credit card number. We’re talking about the foundational identity records of more than half a billion people — living and dead — potentially sitting in a private contractor’s hands, right now.
This story broke publicly on March 10, 2026, when The Washington Post reported that the SSA’s inspector general had opened an investigation into a whistleblower complaint. Since then, the Social Security Administration has pushed back hard, calling the reporting “fake news to scare seniors.” But the inspector general’s investigation is real, it’s independent from the Trump administration, and it is ongoing.
Here’s what we know, what we don’t know, and — most importantly — what you can do to protect yourself.
Who Is DOGE, and Why Were They Inside the Social Security Administration?
If you haven’t been following the DOGE story closely, here’s the short version: Shortly after President Trump took office in January 2025, a new initiative called the Department of Government Efficiency — DOGE — was established, with Elon Musk as its public figurehead. Despite its name, DOGE is not a formal government department in the traditional sense. It operates more like a task force, deploying teams of employees — many of them young software engineers with backgrounds in the tech industry — into various federal agencies.
The stated mission of DOGE was to cut government waste and improve efficiency. In practice, that meant DOGE personnel were embedded at agencies across the federal government, including the Social Security Administration, the Department of Treasury, the Office of Personnel Management (OPM), and others. These DOGE employees were given access to agency systems, databases, and records that are normally tightly restricted — access that career civil servants spend years earning and that is typically governed by strict security protocols.
At the SSA specifically, DOGE installed at least a dozen employees shortly after Trump took office. Here’s the part that alarmed many SSA career staff and outside observers: the roles of these DOGE employees were not communicated to the rest of the SSA workforce. Regular employees didn’t know who these people were, what they were authorized to do, or what data they were allowed to touch.
For any large organization, that kind of opacity would be a red flag. For the agency that holds the most sensitive personal records of virtually every American, it was, for many, deeply alarming.
”God-Level” Access
The employee at the center of the current investigation reportedly told colleagues at his new job that he had what he described as “God-level” access to SSA systems. That phrase is worth pausing on.
In the world of data systems and cybersecurity, “God-level” access (sometimes called root access or superuser access) means you can see everything. No restrictions, no guardrails, no audit trail that you can’t erase. You can read records you’re not supposed to read, copy files you’re not supposed to copy, and — in some cases — modify or delete data.
For a government system as sensitive as the SSA’s, God-level access is not something that should be handed to a newcomer without extensive vetting, rigorous oversight, and very good reasons. The fact that a DOGE engineer allegedly had this kind of access — and then allegedly walked out with two entire databases — is what investigators are now trying to untangle.
What’s Actually in These Databases?
The two databases at the center of this investigation have somewhat technical names, but what they contain is not technical at all. They are, in essence, the most comprehensive identity records the U.S. government keeps on American citizens.
The Numident Database
“Numident” is short for “Numerical Identification System.” It is the SSA’s master database of Social Security records — a record for every person who has ever been issued a Social Security number in the United States.
What’s in a Numident record? According to reporting and official SSA documentation, a Numident record can include:
- Your Social Security number — the nine-digit identifier that unlocks financial accounts, government benefits, credit applications, tax filings, and more
- Your full legal name as it appeared on your Social Security application
- Your date and place of birth
- Your citizenship and immigration status
- Your race and ethnicity — information collected during earlier eras of Social Security enrollment
- Your parents’ names, including your mother’s maiden name — a common security question used by banks and other institutions
- Date of death (where applicable)
Think about that list for a moment. The combination of your Social Security number, date of birth, place of birth, mother’s maiden name, and citizenship status is essentially a master key to your identity. With that information, someone could:
- Open credit accounts in your name
- File fraudulent tax returns and claim your refund
- Apply for government benefits using your identity
- Access financial accounts where those details are used as verification questions
- Potentially obtain government-issued identification documents
This is not theoretical. These are the exact data points that identity thieves use every day to impersonate people, and they are the data points that financial institutions, the IRS, and government agencies rely on to verify who you are.
The Master Death File (MDR)
The second database allegedly taken is officially called the Master Death Record — colloquially known as the “Master Death File.” The SSA maintains this database to track Americans who have died, which is essential for stopping benefit payments to deceased individuals and preventing fraud.
The Master Death File includes records for deceased Americans going back many decades. Combined with the Numident, it means this person allegedly possessed records touching virtually every American who has ever had a Social Security number — living and dead.
Why does dead people’s data matter? Because identity thieves regularly use the Social Security numbers and personal information of deceased people to commit fraud. Deceased individuals obviously can’t report the crime. Their records often remain usable in financial and government systems for years. And the people closest to them — their families — are often not watching for signs of identity theft under their loved one’s name.
How Many Records Are We Talking About?
According to reporting, the two databases could include records for more than 500 million Americans, living and dead.
To put that in perspective: the current U.S. population is approximately 340 million people. The Numident covers not just current residents but everyone who ever received a Social Security number — immigrants, naturalized citizens, people who have since died, going back to the 1930s when Social Security was established. The scope of what may have been taken is almost incomprehensibly large.
Why Is a Thumb Drive Such a Big Deal?
You might be wondering: companies deal with large datasets all the time. Data moves around. Why is a thumb drive specifically so alarming?
The answer has several layers.
Physical Security vs. Digital Security
When data lives on government servers, it is (in theory) protected by multiple layers of security: firewalls, access controls, encryption, audit logs that track who accessed what and when, and physical security at the data centers where servers are housed. Removing data from the government’s systems by copying it to a personal USB drive bypasses all of that.
Once that thumb drive leaves the building, the government has essentially zero control over where that data goes, who else sees it, whether it gets copied again, or whether it ends up for sale on the dark web. The physical object — and all the data on it — is just… gone.
The Scale Is Unprecedented for a Single Device
Modern USB drives can hold enormous amounts of data. A high-capacity thumb drive today can store hundreds of gigabytes or even terabytes of data. A database of 500 million records is large, but it’s not impossibly large for a modern storage device. The fact that someone could allegedly take this data home in their pocket is a stark illustration of how traditional physical security concepts have been disrupted by modern storage technology.
In the pre-digital era, stealing the equivalent of the Numident database would have required physically removing warehouses full of file cabinets. Today, it fits in your pocket.
He Allegedly Planned to Use It
Perhaps the most alarming element of this story is not just that the data was allegedly taken — it’s what the former employee allegedly said he planned to do with it.
According to reporting, the man told coworkers at his new employer — a government contractor — that he “possessed two tightly restricted databases of U.S. citizens’ information” and that he planned to use the data at his new company.
This is not alleged to be a case of accidental data retention or a sloppy security practice. This is alleged to be intentional possession with intent to use the data for commercial or professional purposes. That changes the legal and ethical calculus significantly.
If those allegations are accurate, we’re not just looking at a privacy breach. We’re looking at a potential federal crime: the unauthorized possession and potential misuse of government data that belongs to the American people.
A Pattern of Concerning Access
It would be easier to dismiss this story as an isolated incident if it were the first time something like this had happened with DOGE and the SSA. But it isn’t. Over the past year, there has been a pattern of alarming incidents involving DOGE’s access to Social Security systems.
January 2026: DOGE Members Suspected of Accessing Restricted Records
In January 2026, a lawsuit was filed alleging that two DOGE members had accessed Social Security numbers and other records they were not authorized to view or share. The lawsuit raised questions about whether these individuals had appropriate security clearances, whether their access had been approved by proper SSA officials, and whether any of that accessed data had been improperly shared or retained.
That case drew little mainstream attention at the time but foreshadowed the larger concerns that are now at the center of the current investigation.
2025: Whistleblower Alleged Mass Upload to Vulnerable Cloud Server
Earlier in 2025, a separate whistleblower alleged that DOGE personnel had uploaded hundreds of millions of SSA records to a cloud server — a server that the whistleblower characterized as vulnerable and not meeting federal security standards for the handling of sensitive personal data.
Think about what that means: government records containing the Social Security numbers and personal information of hundreds of millions of Americans, stored on a cloud server that reportedly did not have the appropriate security protections. A cloud server, by definition, means the data is accessible over the internet. If that server was inadequately secured, it could have been accessible to foreign intelligence services, criminal hackers, or anyone else with the skill and motivation to find it.
This allegation, too, was largely overshadowed by other news at the time.
2025: Federal Judge Blocked DOGE from SSA Systems
Also in 2025, a federal judge issued a ruling blocking DOGE from accessing SSA systems, characterizing DOGE’s data access as a “fishing expedition” — meaning the judge concluded that DOGE personnel were accessing data beyond any legitimate governmental purpose.
That’s a federal judge, appointed through the normal judicial process and independent of any administration, saying in so many words: these people should not have access to this data.
And yet, according to the current whistleblower complaint, a DOGE employee may have already downloaded and removed massive amounts of that data before or around the time access was being challenged and restricted.
The Pattern Points to a Systemic Problem
Taken together, these incidents are not a collection of unrelated glitches. They describe a consistent pattern: DOGE personnel arriving at the SSA with unclear authorization, accessing data they were not clearly entitled to access, and in at least some cases allegedly retaining and misusing that data.
Career SSA employees raised alarms. Courts raised alarms. Whistleblowers raised alarms. And the fundamental question — whether the American people’s most sensitive personal records were being handled with appropriate care — never seems to have been adequately answered.
Is Your Information Safe?
This is the question on everyone’s mind, and the honest answer is: we don’t know for certain. Here’s what we do know.
The SSA Says No Breach Occurred
The Social Security Administration has flatly denied the claims, calling The Washington Post’s reporting “fake news to scare seniors.” An SSA spokesperson stated that the agency’s data had not been compromised and that the reporting was irresponsible.
It’s worth noting that government agencies have strong incentives to deny or minimize the severity of data incidents. Acknowledging a breach of this magnitude would create enormous legal liability, public outrage, and pressure for major reforms. Denial is the path of least institutional resistance.
That doesn’t mean the SSA is lying — they may genuinely believe that no breach has occurred, or they may have information that contradicts the whistleblower’s account. But their denial alone is not sufficient reassurance, especially given the independent nature of the inspector general investigation.
The Inspector General Investigation Is Real and Independent
The SSA’s Office of Inspector General is a watchdog organization that operates independently of SSA leadership. The IG is investigating the whistleblower complaint, and that investigation is not subject to direction or interference from the SSA administrator or the Trump administration.
Inspector general offices were created specifically for situations like this — where the agency being investigated has an obvious conflict of interest in conducting its own oversight. The IG can interview witnesses, subpoena records, and issue findings that carry significant weight, even if they don’t have prosecutorial authority.
The fact that the IG opened this investigation means investigators found sufficient credibility in the whistleblower’s complaint to warrant a formal inquiry. That’s not nothing.
The Truth May Take Time to Emerge
IG investigations are thorough, but they are not fast. We may not have a definitive public answer about what exactly happened for months or even years. In the meantime, we are left with competing claims: a whistleblower saying data was taken, an SSA saying it wasn’t, and an independent watchdog trying to figure out who’s telling the truth.
For the approximately 340 million living Americans whose records exist in these databases, that uncertainty is uncomfortable. But it’s the honest reality of where things stand today.
What Does This Mean for Your Privacy?
Even if you are skeptical of the most alarming version of this story, this episode illustrates several important truths about the nature of government data and personal privacy in the digital age.
You Have Little Control Over Government Data About You
When you applied for a Social Security card — something most Americans do as children, with their parents acting on their behalf — you had no meaningful choice about what data was collected or how it would be stored and protected. When the SSA created your Numident record, you were not consulted about the security measures that would protect it.
This is the nature of government data collection: it’s largely mandatory, it’s comprehensive, and it persists essentially forever. Your Social Security record exists whether you want it to or not, and its security depends entirely on the government’s practices and the integrity of the people with access to it.
This story is a reminder that “the government has it, so it’s secure” is not a guarantee. Government data systems have been breached before — the 2015 OPM breach, which exposed security clearance records for 21 million federal employees and contractors, is one of the most damaging government data breaches in history. And government employees, like employees anywhere, sometimes misuse their access.
The Risk Isn’t Just What Happened in the Past
Even if this particular incident turns out to be less severe than feared — if the data was deleted, if it was never actually used — the episode reveals a structural vulnerability that continues to exist.
DOGE personnel, or future equivalents, could potentially gain similar access again. The protocols governing who can access what data, and under what circumstances, appear to have been inadequate to prevent this situation from developing in the first place. Without meaningful reform, the risk doesn’t end with this investigation.
Identity Theft Using Government Data Is Particularly Dangerous
When your credit card number is stolen, your bank can issue you a new card. The damage is real, but it’s containable.
When your Social Security number is stolen, you cannot get a new one. (In very limited circumstances, the SSA will issue a replacement SSN to victims of ongoing identity theft, but this is rare and comes with its own complications.) Your SSN is with you for life, and so is the risk that someone who has it can use it against you.
Data stolen from the Numident — if it was stolen — includes not just your SSN but the constellation of identifying details that makes it usable: your date of birth, your place of birth, your parents’ names. With all of that, an identity thief doesn’t just have your number; they have the ability to convincingly impersonate you.
Understanding the Political Dimension
It would be incomplete to discuss this story without acknowledging its political context, because that context affects how different people are likely to receive it.
DOGE is closely associated with President Trump and Elon Musk. Criticism of DOGE is routinely characterized by supporters as politically motivated. When the SSA calls the Washington Post’s reporting “fake news,” they are explicitly framing this as a partisan media attack.
We want to be clear about how we’re approaching this: our concern here is not partisan. The question of whether Americans’ most sensitive personal data was adequately protected is not a Republican or Democratic question. Privacy protection should be a baseline expectation regardless of who is in power.
If a DOGE employee had stolen this data under a Democratic administration, we would be equally concerned. If the Obama administration had deployed mysterious, unvetted personnel to the SSA with “God-level” database access, that should have raised the same alarms. The issue is the data and the people whose records are in it — that’s all of us.
We acknowledge that the SSA denies the breach occurred. We acknowledge that this story is disputed and that the investigation is ongoing. We are not claiming to know with certainty what happened. What we are saying is that the allegations are serious enough, the pattern of incidents is real enough, and the independent investigation is credible enough that every American should be paying attention and taking reasonable protective steps.
What Can You Do?
Now for the part that actually matters: practical steps you can take today, regardless of how this investigation ultimately resolves. These measures protect you not just from this potential breach, but from the many other data security risks that exist in the modern world.
1. Freeze Your Credit at All Three Bureaus — Today
A credit freeze (also called a security freeze) is the single most powerful tool available to protect yourself against identity theft. When your credit is frozen, no one — not you, not a bank, not a thief with your SSN — can open a new credit account in your name without first unfreezing it.
Credit freezes are free and they are your right under federal law. You need to freeze your credit at all three major bureaus:
- Equifax: equifax.com/personal/credit-report-services/credit-freeze/
- Experian: experian.com/freeze/center.html
- TransUnion: transunion.com/credit-freeze
You’ll create a PIN or account that you’ll use to temporarily unfreeze your credit when you legitimately need to apply for credit. Keep that information somewhere safe.
Many people avoid credit freezes because they sound complicated or inconvenient. In practice, you may only need to unfreeze your credit a handful of times in your life — when you’re getting a mortgage, financing a car, or opening a new credit card. The minor inconvenience is worth the major protection.
Also consider freezing your credit at:
- ChexSystems (chexsystems.com) — used by banks when opening checking and savings accounts
- NCTUE/Innovis — smaller bureaus sometimes used by lenders
2. Set Up Your My Social Security Account
If you haven’t already, create an account at ssa.gov/myaccount. This is the SSA’s official online portal for your Social Security records. By claiming your account, you accomplish two important things:
First, you can monitor your Social Security earnings history for discrepancies, which could indicate that someone else is working under your SSN.
Second — and critically — you prevent a thief from creating an account in your name. If you don’t claim your my Social Security account, a fraudster with your SSN and personal information could create one before you do and use it to divert future benefit payments to an account they control.
This is a particular concern for people nearing or already in retirement: Social Security benefit fraud is a real and growing category of identity theft, and creating your account is one of the easiest ways to protect against it.
3. Place a Fraud Alert
A fraud alert is a free step that is less restrictive than a credit freeze but still provides some protection. When you place a fraud alert with one of the three major credit bureaus, they are required to notify the other two, and lenders must take extra steps to verify your identity before opening new accounts.
A basic fraud alert lasts one year. Extended fraud alerts (for confirmed victims of identity theft) last seven years.
A fraud alert is not a substitute for a credit freeze, but it’s a useful additional layer, especially if you aren’t ready to do a full freeze.
4. Check Your Credit Reports
You are entitled to free credit reports from all three major bureaus at annualcreditreport.com — the official, FTC-recognized site. Review your reports carefully for any accounts you don’t recognize, hard inquiries from lenders you didn’t contact, or personal information that’s wrong.
If this breach turns out to be real and your data was misused, evidence of that misuse will likely show up in your credit reports before you’d otherwise become aware of it.
5. Protect Against Tax Fraud with an IRS Identity Protection PIN
The IRS offers a free Identity Protection PIN (IP PIN) program. An IP PIN is a six-digit number that must be included on your federal tax return to verify your identity. If a thief tries to file a fraudulent tax return using your SSN to claim your refund, they will fail without knowing your IP PIN.
You can request an IP PIN at irs.gov/identity-theft-central. Once enrolled, you’ll receive a new PIN each year. This is an underused but highly effective protection against one of the most common forms of SSN-based identity theft.
6. Monitor for Strange Activity on Your SSA Record
Beyond setting up your my Social Security account, pay attention to your annual Social Security Statement, which shows your earnings history and estimated benefits. You can access this through your online account.
If you see earnings listed for years when you were too young to work, or in states where you never lived, that could indicate someone else is using your SSN. Report discrepancies to the SSA immediately.
7. Be Extra Wary of Phishing Attempts
In the aftermath of high-profile data incidents, scammers almost inevitably increase their activity. They know that people are scared, and they take advantage of that fear.
Be skeptical of:
- Calls claiming to be from the SSA or Social Security Administration saying your number has been “suspended” or “compromised” — the real SSA almost never calls you, and they will never threaten you or demand immediate payment
- Emails saying your Social Security benefits are at risk and asking you to click a link or provide your SSN
- Texts offering to help you “protect” your Social Security number for a fee
The SSA will contact you primarily by mail. If you get an unexpected call or email about your Social Security account, hang up or close the email and contact the SSA directly at 1-800-772-1213 or ssa.gov.
8. Consider a Password Manager and Strong Unique Passwords
If your mother’s maiden name — one of the data points potentially in the Numident database — is used as a security question for any of your online accounts, a breach of this data could enable account takeovers. Review your online accounts and:
- Replace knowledge-based security questions (mother’s maiden name, birth city, etc.) with randomly generated answers that you store in a password manager
- Enable two-factor authentication on important accounts, especially email, banking, and Social Security
- Use a unique, strong password for every account
A password manager (like Bitwarden, which is free and open-source, or 1Password) handles the burden of remembering unique passwords for every site. This is one of the most important steps anyone can take for their overall digital security.
9. If You’re a Parent — Protect Your Children’s SSNs Too
Children’s Social Security numbers are frequently targeted by identity thieves specifically because parents often don’t check their children’s credit, meaning fraud can go undetected for years. The Numident would include records for anyone who has ever been issued a Social Security number — including children.
You can freeze your child’s credit at each of the three major bureaus. Instructions for freezing a minor’s credit are on each bureau’s website. It’s a bit more paperwork than an adult freeze, but it’s worth doing.
What Needs to Change
Individual protective steps are important, but they can’t be the whole answer. This situation — if the allegations prove true — represents a systemic failure, and systemic failures require systemic solutions.
A few things that should happen, regardless of how the current investigation concludes:
Clear, enforced access controls for all government databases. Any person accessing Social Security data — whether a career civil servant, a political appointee, or a DOGE engineer — should have their access logged, audited, and limited to what they genuinely need for their job. “God-level” access should require extraordinary justification and extraordinary oversight.
Physical security for data removal. USB drives carrying sensitive government data should trigger security alerts. In many high-security government environments, USB ports are disabled or monitored precisely to prevent exactly this kind of data exfiltration. Those protocols should apply everywhere that sensitive citizen data is handled.
Transparency about who has access to what. Career SSA employees reportedly didn’t know who the DOGE personnel were or what they were authorized to do. That opacity is unacceptable when it comes to the most sensitive records of 340 million Americans. Any personnel with access to sensitive systems should have their access, authorization, and oversight framework disclosed to appropriate agency leadership.
Genuine consequences for misuse. If it is ultimately determined that data was improperly removed and used, the legal and professional consequences should be swift and severe — regardless of political affiliation. Right now, the alleged perpetrator appears to have left government employment and moved on to a contractor job. That should not be how this story ends.
Staying Informed
This story is evolving. The SSA inspector general investigation is ongoing, and new information may emerge in the coming weeks and months. Here’s how to stay informed:
- Follow reporting from The Washington Post and TechCrunch, which have been leading coverage of this story
- Check the SSA Office of Inspector General website (oig.ssa.gov) for any public statements or reports
- Watch for updates from privacy advocacy organizations like the Electronic Frontier Foundation (eff.org) and the Electronic Privacy Information Center (epic.org), which monitor government data practices
We’ll continue covering this story as it develops.
The Bottom Line
Let’s step back and look at the big picture.
The Social Security Administration holds some of the most sensitive personal records in existence. The Numident database — containing the Social Security numbers, birth information, citizenship status, and family details of every American who has ever been issued a Social Security card — is, in terms of its potential for harm if misused, essentially the master key to American identity.
The allegations at the center of this investigation — that a DOGE software engineer copied that database, along with the Master Death File, onto a personal thumb drive and walked out of the building with it — are serious. Not because we know with certainty that they are true, but because they are credible enough to warrant an independent investigation, because they fit a larger pattern of troubling DOGE behavior at the SSA, and because the potential consequences for hundreds of millions of Americans are severe.
The SSA says it didn’t happen. An inspector general investigation is underway to find out who’s right. And in the meantime, all of us who have Social Security numbers — which is essentially all of us — are left in the uncomfortable position of not knowing whether our most sensitive personal data is safely in government hands or sitting in a private contractor’s office.
That uncertainty is not comfortable, but it is manageable. The steps in this article — credit freezes, my Social Security accounts, IRS IP PINs, strong passwords, phishing awareness — don’t just protect you from this potential breach. They protect you from the constant background noise of identity theft risk that exists in the modern world, regardless of what happened or didn’t happen at the SSA.
Take those steps. Stay informed. And remember that privacy is not a luxury or a partisan issue — it’s a basic right that belongs to everyone.
This article is based on reporting from The Washington Post (March 10, 2026) and TechCrunch. The SSA disputes the allegations described here. The SSA Office of Inspector General investigation is ongoing, and we will update our coverage as new information becomes available. This article does not constitute legal advice; if you believe you are a victim of identity theft, contact the FTC at identitytheft.gov.
Related Articles:
- How to Freeze Your Credit for Free: A Step-by-Step Guide
- What Is DOGE and Why Does It Have Access to Government Databases?
- The 2015 OPM Breach: What It Taught Us About Government Data Security
- Your Social Security Number Was Already Probably Stolen — Here’s What to Do About It


