Teen on Musk's DOGE team graduated from 'The Com'

DOGE staffing and cybercrime ties

  • The Krebs piece that a key DOGE teen came from “The Com” (SIM‑swapping, swatting, violent/CSAM‑adjacent networks) alarms many: they see him as a classic blackmail/extortion target now sitting near “the keys to the kingdom.”
  • Others note that ex‑hackers often end up in security work, but point out this activity was very recent, not youthful mischief decades ago.
  • There’s broad concern that a loose, crime‑adjacent online culture is now plugged directly into US government systems without normal guardrails.

Security clearances, data access, and LLMs

  • A major thread argues that security clearance and vetting processes exist precisely to weed out exploitable people and constrain damage (logging, least privilege, on‑network devices).
  • Defenders counter that the president has wide constitutional authority over classification and can grant access at will; they say “clearance” is being fetishized.
  • Critics reply that even if technically legal, bypassing standard processes massively increases risk: foreign intelligence can recruit, data can be exfiltrated invisibly, and normal audit trails may not exist.
  • Multiple comments note reporting that DOGE staff have fed large troves of sensitive data into Microsoft‑hosted LLMs, which would erase many existing access‑control and logging protections.

Audit vs. purge: what is DOGE actually doing?

  • Supporters frame DOGE as long‑overdue, aggressive audits of bloated, opaque agencies (especially USAID), arguing that “billions in fraud and waste” dwarf any process niceties.
  • They invoke examples like “shrimp treadmills,” “Iraqi Sesame Street,” transgender studies, and foreign grants as emblematic misuse of taxpayer money.
  • Critics scrutinize those talking points and find many based on old, cherry‑picked, or mischaracterized items (e.g., anti‑opium projects during the Afghanistan war, routine subscriptions to media).
  • They stress that USAID‑type programs are a tiny fraction of federal spending and that abruptly freezing them causes immediate real‑world harm (lost HIV meds, food aid, clinical trials, soft power).

Norms, law, and constitutional stakes

  • Several participants see a deeper crisis: Congress’s power of the purse being bypassed, courts publicly threatened (e.g., calls to impeach a judge who blocked access), and long‑standing norms around oversight and record‑keeping discarded.
  • Others insist this is just a hard‑nosed exercise of executive authority that prior administrations lacked the will to use, and that outrage is politically selective.

Twitter/X as a template

  • Pro‑Musk voices argue his “slash staff, keep product running” playbook at Twitter proves government can be similarly “leaned out.”
  • Opponents counter with X’s valuation collapse, broken features, brand‑safety problems, and say running a social network is not analogous to running essential public services where “rollback” isn’t possible.