On April 15, 2025, a whistleblower who worked in the IT department of the National Labor Relations Board detailed a serious breach involving DOGE, a group reportedly connected to Elon Musk. According to the account, DOGE staff gained elevated access to internal NLRB systems. Once inside, they altered monitoring protocols to prevent detection. While operating inside the network, large volumes of data—including information on union activities, employer disputes, and sensitive affidavits—were taken. DOGE’s access left the systems defenseless: logging was disabled, alarms were silenced, and authentication trails were wiped clean.
Soon after DOGE personnel completed their activities and exited the system, login attempts began from a Russian IP address. The credentials used in those attempts matched valid DOGE user accounts, suggesting that the login information had been exfiltrated or shared. Those Russian-based attempts came immediately after the DOGE access window, implying deliberate coordination.
The whistleblower reported these findings internally and attempted to notify the federal cybersecurity authorities. His alerts were blocked, reportedly by senior figures within the agency, who sought to suppress the disclosure. The whistleblower then received threats, including photographs of him under surveillance, suggesting someone tracked him closely and intended to intimidate him into silence.
Although the agency denied any breach and refused to comment publicly, the pattern of events described suggests premeditated sabotage. The use of Starlink connections by DOGE-linked staff during their access window introduced further uncertainty about where the data was sent, and whether it reached systems outside U.S. jurisdiction. The simultaneous breakdown of internal safeguards and rapid foreign login attempts cannot be explained as coincidental.
The case shows a coordinated operation that stripped a federal labor agency of security, exposed personal and institutional data, and opened a direct path for foreign actors to walk through unchallenged. The deeper issue lies in who allowed this access in the first place, who benefitted, and what else remains undiscovered.
