Jenna McLaughlin
👤 PersonAppearances Over Time
Podcast Appearances
And it's also possible that this data could be combined with some of the other sensitive sources of data that Stephen's been talking about to build a larger dossier on American citizens.
And it's also possible that this data could be combined with some of the other sensitive sources of data that Stephen's been talking about to build a larger dossier on American citizens.
And it's also possible that this data could be combined with some of the other sensitive sources of data that Stephen's been talking about to build a larger dossier on American citizens.
Yeah, there were some really weird stuff going on that any IT specialist that you talk to is going to kind of scratch their head about. He saw them using what's called a container. It's kind of like a little bubble that exists inside of a computer where everything that you're doing inside of it is invisible to the rest of the system. So you can execute code.
Yeah, there were some really weird stuff going on that any IT specialist that you talk to is going to kind of scratch their head about. He saw them using what's called a container. It's kind of like a little bubble that exists inside of a computer where everything that you're doing inside of it is invisible to the rest of the system. So you can execute code.
Yeah, there were some really weird stuff going on that any IT specialist that you talk to is going to kind of scratch their head about. He saw them using what's called a container. It's kind of like a little bubble that exists inside of a computer where everything that you're doing inside of it is invisible to the rest of the system. So you can execute code.
You can have it run a bunch of automated programs. And then when it's deleted, when you're done with it, nobody really knows it was ever there or what it was up to. In his disclosure to Congress, Berulis also said that they turned off multi-factor authentication, deleted logs, turned off security requirements for mobile access.
You can have it run a bunch of automated programs. And then when it's deleted, when you're done with it, nobody really knows it was ever there or what it was up to. In his disclosure to Congress, Berulis also said that they turned off multi-factor authentication, deleted logs, turned off security requirements for mobile access.
You can have it run a bunch of automated programs. And then when it's deleted, when you're done with it, nobody really knows it was ever there or what it was up to. In his disclosure to Congress, Berulis also said that they turned off multi-factor authentication, deleted logs, turned off security requirements for mobile access.
You know, these are all security controls that would be really strange and unusual for a regular user to disable. And, you know, for Berulis, all of this points to a real attempt to obfuscate activities, to cover tracks.
You know, these are all security controls that would be really strange and unusual for a regular user to disable. And, you know, for Berulis, all of this points to a real attempt to obfuscate activities, to cover tracks.
You know, these are all security controls that would be really strange and unusual for a regular user to disable. And, you know, for Berulis, all of this points to a real attempt to obfuscate activities, to cover tracks.
And then the thing that was really important to Barulis is he saw this giant spike of data leaving the agency. That was one of the biggest red flags that he saw. He captured images of data transiting out of the agency over time, over several weeks. And there's one gigantic spike that you can see right in the time where Doge had access.
And then the thing that was really important to Barulis is he saw this giant spike of data leaving the agency. That was one of the biggest red flags that he saw. He captured images of data transiting out of the agency over time, over several weeks. And there's one gigantic spike that you can see right in the time where Doge had access.
And then the thing that was really important to Barulis is he saw this giant spike of data leaving the agency. That was one of the biggest red flags that he saw. He captured images of data transiting out of the agency over time, over several weeks. And there's one gigantic spike that you can see right in the time where Doge had access.
So first, Barula saw files leaving the case management system that we had been talking about. He described it as kind of the nucleus where all the sensitive stuff lives and stuff never leaves there. And then he saw a slightly larger chunk of files leaving the entire system. And it was impossible to know exactly what those files were. It's all extremely mysterious and sketchy.
So first, Barula saw files leaving the case management system that we had been talking about. He described it as kind of the nucleus where all the sensitive stuff lives and stuff never leaves there. And then he saw a slightly larger chunk of files leaving the entire system. And it was impossible to know exactly what those files were. It's all extremely mysterious and sketchy.
So first, Barula saw files leaving the case management system that we had been talking about. He described it as kind of the nucleus where all the sensitive stuff lives and stuff never leaves there. And then he saw a slightly larger chunk of files leaving the entire system. And it was impossible to know exactly what those files were. It's all extremely mysterious and sketchy.
Luckily, Brulis came with the receipts. He included in his official disclosure that same image I had been talking about where it shows the spike of data leaving the system. So he was able to definitively prove that data left that should not have. And what makes him think that Doge may have taken this data? He really double and triple checked his work. He stress tested these theories.
Luckily, Brulis came with the receipts. He included in his official disclosure that same image I had been talking about where it shows the spike of data leaving the system. So he was able to definitively prove that data left that should not have. And what makes him think that Doge may have taken this data? He really double and triple checked his work. He stress tested these theories.