DOGE worker’s code supports NLRB whistleblower
Alleged DOGE Activity at NLRB
- Complaint says DOGE demanded “tenant owner” / “tenant admin” accounts at NLRB with:
- Permissions above even the CIO’s.
- Ability to read, copy, and alter sensitive case data (union organizers, corporate docs, PII).
- Exemptions from normal logging and standard audit roles the system already supported.
- Whistleblower claims:
- Roughly 10GB of data was exfiltrated with abnormal outbound traffic.
- DOGE-related accounts coincided with blocked login attempts from a Russian IP using valid new credentials.
- Cyber staff were told not to report to US‑CERT and his own access was curtailed after raising concerns.
- He later received a threatening note and drone photos at home referencing his disclosure.
Admin Access, Logging, and GitHub Tools
- Most technical commenters say:
- Superuser accounts are normal; superusers exempt from logging are not.
- For audits, read‑only or dedicated auditor roles plus more logging, not less, are standard.
- Asking in advance for unlogged, all‑powerful accounts is itself evidence of bad faith.
- DOGE personnel allegedly downloaded IP‑rotation and scraping libraries from GitHub to bypass rate limits and rotate through cloud IPs; one fork:
- Stripped the original GPLv3 license and comments.
- Was publicly visible, then rapidly deleted after coverage; archives and gists remain.
- Attracted a very long, hostile critique that many readers suspect was AI‑generated.
Security Incident & Russia Angle
- Whistleblower report: repeated login attempts from a Russian region within ~15 minutes of account creation, apparently using correct credentials but blocked by a geo‑policy.
- Some see this as near‑textbook treason or foreign compromise; others:
- Note that serious state actors normally hide behind clean infrastructure, not known‑bad IPs.
- Float alternatives: credential stuffing, poor DOGE endpoint security, or even fabrication/false flag.
- One incident‑response professional in the thread argues:
- Logs and context shown are incomplete and selective.
- The IP used is long‑flagged for low‑grade attacks, not typical of sophisticated operations.
- NLRB and US‑CERT reportedly deemed it non‑reportable; he suspects misinterpreted Zero‑Trust hardening and overblown claims.
Law, Accountability, and Pardons
- Many argue this should lead to prison time; others doubt any convictions because:
- Access was “authorized” by agency leadership and ultimately framed as presidentially directed.
- Key computer‑crime statutes hinge on “unauthorized” access, which courts and a friendly Supreme Court might interpret narrowly.
- The President’s broad pardon power and recent immunity rulings effectively make federal law “optional” for insiders.
- Extended debate over:
- Whether the US still meaningfully lives under rule of law versus “might makes right.”
- The structural problem that laws, enforcement, and voters’ expectations have drifted far apart.
Motives, Politics, and Systemic Concerns
- Many see DOGE’s pattern—logging exemptions, secretive data pulls, mass firings, and AI tooling—as:
- A project to bust unions, dismantle the welfare state, and justify replacing civil servants with “AI plus a few coders.”
- A way to harvest sensitive data for political repression (union organizers, immigrants, voters) and private gain.
- Others insist this is just aggressive auditing and cost‑cutting:
- Claim large‑scope admin access is a practical necessity when departments may hide waste or destroy records.
- Argue that outrage is partisan and that some amount of error is inevitable when rooting out “waste.”
- Several note past examples (VA, nuclear safety, USAID) where DOGE‑style slash‑and‑burn changes seemed to increase risk and long‑term cost rather than efficiency.
Trust in the Whistleblower and Reporting
- Some readers find the whistleblower’s sworn narrative, detailed exhibits, and alleged retaliation entirely credible, pointing to:
- Corroborating media reports.
- Quick repo deletions after attention.
- Others see “bad novel” vibes:
- Over‑dramatic elements (drone stalking, Russian IPs).
- Politically aligned counsel and a media narrative that, they argue, muddles technical facts and leans heavily on innuendo.
- Overall, the thread splits between those who see this as a clear, systemic abuse of power and those who think the evidence is murky, technically thin, or opportunistically framed.