A federal whistleblower has alleged that a cybersecurity breach at the National Labor Relations Board (NLRB) was the result of unauthorized access by individuals affiliated with Elon Musk’s Department of Government Efficiency, known as DOGE. The explosive claims center on what the whistleblower describes as a systemic breakdown in oversight and digital safeguards.
According to the whistleblower, a longtime IT specialist at the NLRB, DOGE personnel were given unusually broad administrative access to the agency’s systems in early March. Soon after, suspicious activity was detected—including changes to system logs, disabling of standard security protocols, and the unauthorized transfer of an estimated 10 gigabytes of sensitive data. The leaked information is said to include private union filings, confidential whistleblower affidavits, and internal communications.
One particularly alarming detail in the complaint is an alleged login attempt from a Russian IP address using what appeared to be valid credentials. Although the attempt was blocked by the agency’s geolocation security protocols, the whistleblower claims it indicates that access credentials may have already been compromised.
The whistleblower also alleges that when he attempted to alert cybersecurity authorities, including the Cybersecurity and Infrastructure Security Agency (CISA), senior officials prevented him from escalating the issue. Not long after, he reportedly received an anonymous note containing a veiled threat, accompanied by what appeared to be surveillance photos of his family.
While the NLRB has officially denied any breach, the allegations have sparked internal inquiries and concerns across multiple federal agencies. The DOGE unit, created as part of Musk’s broader effort to streamline federal operations through aggressive cost-cutting and automation, has faced criticism for a perceived lack of transparency and proper vetting.
No formal investigation has been announced yet, but pressure is mounting on lawmakers and law enforcement agencies to respond to the potentially far-reaching implications of the breach. For now, the federal government is facing serious questions about who has access to its systems—and how that access is being monitored.