A former Department of Government Efficiency (DOGE) software engineer stands accused of removing sensitive Social Security Administration data and storing it on a USB drive, allegedly intending to bring it to his new employer, the private contractor Leidos. The allegation, reported on March 10, 2026, involves John Solly and represents one of the most serious data security incidents at a federal agency in recent years. The breach potentially exposed records on over 500 million Americans, including their Social Security numbers, birth dates and places, citizenship status, race and ethnicity, and parents’ names pulled from the SSA’s Numident and Master Death File databases.
This incident marks an escalation in concerns about how DOGE employees have accessed sensitive government databases. The Social Security Administration’s Inspector General’s office launched an investigation on March 6, 2026, and notified Congress of the alleged breach the same day. Congressman John Larson called it a “Massive, Illegal, and Horrific Breach,” while Senator Gary Peters demanded an independent investigation into DOGE activities at the SSA. This article examines the allegations, the databases at risk, the government response, and what this incident reveals about insider threats in federal agencies.
Table of Contents
- How Did a DOGE Employee Gain Access to 500 Million Americans’ Social Security Records?
- The Scope of Exposure: Over 500 Million Americans at Risk
- A Pattern of DOGE Access Concerns at the Social Security Administration
- The Role of Insider Threat Monitoring and Why It Failed
- Denials and Investigation Status as of March 2026
- Why Leidos Is Central to Understanding the Breach Motive
- Systemic Implications for DOGE Oversight and Federal Security
- Conclusion
How Did a DOGE Employee Gain Access to 500 Million Americans’ Social Security Records?
The alleged breach exposes a fundamental vulnerability in how government contractors and executive branch staffers operate within federal agencies. John Solly, identified as a software engineer employed by DOGE, reportedly had legitimate access to the SSA’s most sensitive databases as part of his work. Rather than being restricted to read-only access or use within secure facilities, Solly allegedly had the ability to extract entire datasets and transfer them to portable storage devices—a technical capability that should have been blocked or heavily monitored at a minimum. The two databases involved—Numident and Master Death File—are among the most sensitive systems within the SSA.
Numident contains complete Social Security records for virtually every American with a Social Security number, while the Master Death File tracks deceased individuals. Together, they represent a comprehensive directory of American identity information. The alleged extraction of both databases suggests that either access controls were inadequate or were deliberately circumvented. For comparison, private financial institutions typically implement air-gapped systems and prevent USB devices entirely to protect customer data at this scale; the SSA’s apparent reliance on logging and monitoring rather than hard technical barriers is a significant policy gap.

The Scope of Exposure: Over 500 Million Americans at Risk
The scale of the alleged breach is staggering. Over 500 million living and dead Americans are represented in the exposed databases, making this one of the largest potential data exposures in U.S. government history. Each record included not just a Social Security number, but contextual identity information: exact birth date and birthplace, citizenship status, race and ethnicity, and names of parents.
This combination of data fields is nearly impossible to safely expose; it provides criminals and state actors with the foundational information needed for identity theft, fraudulent benefit claims, and targeted social engineering. The inclusion of deceased individuals’ records is particularly concerning because it suggests the Master Death File was also copied. This database is specifically maintained by the SSA for verification purposes and is frequently targeted by criminals seeking to file fraudulent claims or conduct synthetic identity fraud using deceased individuals’ Social Security numbers. If Solly’s USB drive contained these records, it would have provided a verified list of deceased Americans’ identities—a resource that criminals cannot easily obtain through other means and for which there is significant black-market demand.
A Pattern of DOGE Access Concerns at the Social Security Administration
This incident did not occur in isolation. In January 2026, just two months before Solly’s alleged data theft, the SSA disclosed that DOGE employees had “secretly and improperly” shared sensitive personal data in 2025. At that time, the SSA stated it could not verify the extent of those earlier violations, suggesting a loss-of-control situation that extended well beyond a single incident. The combination of the January disclosure and March allegations paints a picture of inadequate oversight of DOGE staffers working within the agency.
The difference between the January 2025 incidents and the March 2026 allegation is one of intent and scale. Earlier disclosures suggested data was shared within DOGE channels without proper authorization. The Solly allegation, by contrast, suggests a deliberate extraction of entire databases with the apparent intent to transfer them to an external organization. This escalation indicates that access controls either failed to tighten after January, or that the scale of DOGE’s presence within the SSA allowed individuals to circumvent whatever controls were in place. Either scenario represents a systemic security failure.

The Role of Insider Threat Monitoring and Why It Failed
One of the most troubling aspects of this case is that it appears to have been discovered through a whistleblower complaint rather than through the SSA’s own internal security monitoring. Insider threat programs are specifically designed to detect when employees or contractors copy data, transfer large files to USB devices, or prepare to leave an organization with sensitive information. The existence of a whistleblower—rather than automated alerts—suggests either that monitoring was not in place, or that alerts were not acted upon quickly.
Effective insider threat programs typically employ multiple layers: file access logging, data loss prevention (DLP) tools that block USB transfers of sensitive files, endpoint detection that monitors for suspicious device behavior, and behavioral analysis that flags unusual access patterns. The fact that Solly allegedly had the ability to copy gigabytes of data onto a USB drive without triggering an alarm is a damning failure of these basic security practices. This is not an advanced espionage case where a sophisticated actor defeated state-of-the-art security; this is an undetected data copy on a USB drive, suggesting that even foundational controls were absent.
Denials and Investigation Status as of March 2026
Despite the seriousness of the allegations, all parties involved have denied wrongdoing. John Solly has denied the accusations. Leidos, the intended recipient employer, has denied receiving or being offered the data. Even the SSA itself, through a spokesperson, initially denied that data was stolen and suggested the allegation was “desperate for clicks”—a dismissal that contradicts the agency’s own notification to Congress on March 6 and the Inspector General’s decision to open an investigation.
The Social Security Administration’s Inspector General’s office is leading the investigation as of mid-March 2026. Multiple House and Senate committees were notified of the breach on March 6, including oversight committees that monitor both DOGE and SSA operations. However, as of March 11-12, 2026, no charges have been filed and the investigation remains active. A critical uncertainty remains: whether the USB drive itself was actually transferred, whether it was recovered, and what security measures can prevent similar incidents in the future. The denial from the SSA spokesperson is particularly noteworthy because it suggests possible internal resistance to acknowledging the scope of the problem.

Why Leidos Is Central to Understanding the Breach Motive
The allegation specifically names Leidos as Solly’s intended new employer, which is crucial context for understanding the motive. Leidos is a major defense and intelligence contractor with significant contracts involving background checks, identity verification, and government databases. For a contractor in this space, access to comprehensive Social Security records and death file information would have substantial commercial value.
It could be used to improve verification systems, win government contracts, or provide advantages in competitive situations where background check accuracy or fraud detection matters. The fact that Solly allegedly planned to bring the data to a new employer (rather than selling it on the dark market or exfiltrating it for a foreign government) suggests the breach was motivated by career advancement or potential financial gain within the private sector. However, this does not reduce the severity of the crime; it actually demonstrates how insider threats can emerge from seemingly routine career transitions. Solly’s move from government to a large defense contractor is exactly the kind of transition that insider threat programs should flag, yet he allegedly accomplished the data transfer before sufficient controls triggered an alarm.
Systemic Implications for DOGE Oversight and Federal Security
This incident has profound implications for how Congress oversees DOGE and the broader question of whether political appointees embedded within federal agencies receive adequate security vetting. DOGE staffers are not typical civil servants subject to standard background investigation protocols; many are detail positions or temporary appointments from the private sector.
The track record of improper data sharing in January 2025, followed by the alleged theft in March 2026, suggests that DOGE’s presence within the SSA was never matched with appropriate security controls. Looking forward, this case will likely prompt reviews of how government contractors gain access to federal databases and whether SSA systems require hardened security architectures that prevent data extraction entirely rather than relying on post-hoc monitoring. The fact that this breach was allegedly discovered by a whistleblower rather than prevented by technical controls suggests that future policy changes will focus on air-gapped systems, hardware-enforced USB restrictions, and real-time data transfer alerts rather than just improved investigation procedures.
Conclusion
The allegation that John Solly removed over 500 million Americans’ Social Security records on a USB drive represents a catastrophic failure of insider threat detection and data security controls at a critical federal agency. Whether or not Solly is ultimately convicted, the incident has revealed that DOGE employees working within the SSA have had inadequate oversight, that basic security controls were absent or ineffective, and that whistleblowers—not automated systems—detected the breach. The pattern of security incidents involving DOGE staffers at the SSA suggests systemic problems that require immediate remediation.
For Americans whose records may have been exposed, the short-term risk includes identity theft, fraudulent benefit claims, and targeted social engineering. The long-term implications for federal security are broader: this case will likely accelerate adoption of hardware-enforced security controls, closer vetting of political appointees working within agencies, and mandatory security reviews of all systems accessed by DOGE personnel. The investigation initiated by the SSA’s Inspector General and ongoing Congressional oversight will determine whether criminal charges are filed and what systemic reforms result.
