Teen on Musk's DOGE team graduated from 'The Com'
DOGE staffing and cybercrime ties
- The Krebs piece that a key DOGE teen came from “The Com” (SIM‑swapping, swatting, violent/CSAM‑adjacent networks) alarms many: they see him as a classic blackmail/extortion target now sitting near “the keys to the kingdom.”
- Others note that ex‑hackers often end up in security work, but point out this activity was very recent, not youthful mischief decades ago.
- There’s broad concern that a loose, crime‑adjacent online culture is now plugged directly into US government systems without normal guardrails.
Security clearances, data access, and LLMs
- A major thread argues that security clearance and vetting processes exist precisely to weed out exploitable people and constrain damage (logging, least privilege, on‑network devices).
- Defenders counter that the president has wide constitutional authority over classification and can grant access at will; they say “clearance” is being fetishized.
- Critics reply that even if technically legal, bypassing standard processes massively increases risk: foreign intelligence can recruit, data can be exfiltrated invisibly, and normal audit trails may not exist.
- Multiple comments note reporting that DOGE staff have fed large troves of sensitive data into Microsoft‑hosted LLMs, which would erase many existing access‑control and logging protections.
Audit vs. purge: what is DOGE actually doing?
- Supporters frame DOGE as long‑overdue, aggressive audits of bloated, opaque agencies (especially USAID), arguing that “billions in fraud and waste” dwarf any process niceties.
- They invoke examples like “shrimp treadmills,” “Iraqi Sesame Street,” transgender studies, and foreign grants as emblematic misuse of taxpayer money.
- Critics scrutinize those talking points and find many based on old, cherry‑picked, or mischaracterized items (e.g., anti‑opium projects during the Afghanistan war, routine subscriptions to media).
- They stress that USAID‑type programs are a tiny fraction of federal spending and that abruptly freezing them causes immediate real‑world harm (lost HIV meds, food aid, clinical trials, soft power).
Norms, law, and constitutional stakes
- Several participants see a deeper crisis: Congress’s power of the purse being bypassed, courts publicly threatened (e.g., calls to impeach a judge who blocked access), and long‑standing norms around oversight and record‑keeping discarded.
- Others insist this is just a hard‑nosed exercise of executive authority that prior administrations lacked the will to use, and that outrage is politically selective.
Twitter/X as a template
- Pro‑Musk voices argue his “slash staff, keep product running” playbook at Twitter proves government can be similarly “leaned out.”
- Opponents counter with X’s valuation collapse, broken features, brand‑safety problems, and say running a social network is not analogous to running essential public services where “rollback” isn’t possible.