Jenna McLaughlin
👤 PersonAppearances Over Time
Podcast Appearances
Luckily, Brulis came with the receipts. He included in his official disclosure that same image I had been talking about where it shows the spike of data leaving the system. So he was able to definitively prove that data left that should not have. And what makes him think that Doge may have taken this data? He really double and triple checked his work. He stress tested these theories.
So he talked to all of his colleagues.
So he talked to all of his colleagues.
So he talked to all of his colleagues.
He confirmed no one at the NLRB had been saving backup files that week or migrating data for projects. And, you know, the timeline matched up. He essentially thought of it as, you know, even if Doge was not the one responsible for this, something unusual happened and it needs to be investigated. I spoke to Richard Griffin. He was the former NLRB general counsel from 2013 to 2017.
He confirmed no one at the NLRB had been saving backup files that week or migrating data for projects. And, you know, the timeline matched up. He essentially thought of it as, you know, even if Doge was not the one responsible for this, something unusual happened and it needs to be investigated. I spoke to Richard Griffin. He was the former NLRB general counsel from 2013 to 2017.
He confirmed no one at the NLRB had been saving backup files that week or migrating data for projects. And, you know, the timeline matched up. He essentially thought of it as, you know, even if Doge was not the one responsible for this, something unusual happened and it needs to be investigated. I spoke to Richard Griffin. He was the former NLRB general counsel from 2013 to 2017.
And he told me in an interview that none of that confidential and deliberative information should ever leave the agency.
And he told me in an interview that none of that confidential and deliberative information should ever leave the agency.
And he told me in an interview that none of that confidential and deliberative information should ever leave the agency.
The data leaving was almost all text files. It added up to around 10 gigabytes. Think of that like the equivalent of a full stack of encyclopedias worth of pages if someone printed them. But it's possible the files that were extracted were compressed into a smaller package or that only some of the files were extracted. They could have searched for something specific.
The data leaving was almost all text files. It added up to around 10 gigabytes. Think of that like the equivalent of a full stack of encyclopedias worth of pages if someone printed them. But it's possible the files that were extracted were compressed into a smaller package or that only some of the files were extracted. They could have searched for something specific.
The data leaving was almost all text files. It added up to around 10 gigabytes. Think of that like the equivalent of a full stack of encyclopedias worth of pages if someone printed them. But it's possible the files that were extracted were compressed into a smaller package or that only some of the files were extracted. They could have searched for something specific.
Well, according to his disclosure, next thing he does is gather the troops. He got his IT team together to discuss possible insider threats, namely the Doge engineers. So this group of people eventually launched a formal breach investigation.
Well, according to his disclosure, next thing he does is gather the troops. He got his IT team together to discuss possible insider threats, namely the Doge engineers. So this group of people eventually launched a formal breach investigation.
Well, according to his disclosure, next thing he does is gather the troops. He got his IT team together to discuss possible insider threats, namely the Doge engineers. So this group of people eventually launched a formal breach investigation.
They were actually preparing a request for assistance outside their agency from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency. That's a mouthful. You can just call them CISA. They have more forensic tools to investigate potential breaches than the NLRB does. But ultimately, those efforts kind of just went quiet.
They were actually preparing a request for assistance outside their agency from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency. That's a mouthful. You can just call them CISA. They have more forensic tools to investigate potential breaches than the NLRB does. But ultimately, those efforts kind of just went quiet.
They were actually preparing a request for assistance outside their agency from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency. That's a mouthful. You can just call them CISA. They have more forensic tools to investigate potential breaches than the NLRB does. But ultimately, those efforts kind of just went quiet.
They were disrupted without an explanation from somewhere higher up, according to Brulis.