In a shocking revelation, two individuals connected to Elon Musk's Department of Government Efficiency (DOGE) were reportedly given access to classified networks that contain sensitive information concerning America's nuclear arsenal. This development has raised eyebrows and drawn scrutiny from various sources, including NPR, which first reported the incident.

The two employees, Luke Farritor, a 23-year-old former intern at SpaceX, and Adam Ramada, a venture capitalist based in Miami, allegedly had accounts on these classified computer networks for at least two weeks. Sources familiar with the matter have claimed that prior to their positions at DOGE, neither Farritor nor Ramada had any notable experience handling classified material or dealing with nuclear weaponry.

Initially, a spokesperson for the Department of Energy (DOE) refuted claims that these employees had accessed the sensitive networks. In an email sent to NPR, the spokesperson stated, This reporting is false. No DOGE personnel have accessed these NNSA systems. The two DOGE individuals in question worked within the agency for several days and departed DOE in February. However, as the narrative unfolded, the spokesperson later clarified that while accounts were created for the DOGE employees, they were ultimately never activated or used.

Despite the clarification, sources who spoke to NPRremaining anonymous due to the sensitive nature of the informationrevealed that they were able to see Farritor and Ramada's names in the directories of the networks. These directories are accessible to thousands of personnel working on nuclear weaponry across various U.S. facilities, although the actual classified networks can only be accessed from secure terminals within designated rooms.

Experts consulted about the situation emphasized that the mere existence of accounts for these DOGE employees would not automatically grant them access to the classified information contained within those networks. According to various analysts, even within these classified channels, data access is stringently controlled and typically granted only on a need-to-know basis.

The networks in question are crucial components of the National Nuclear Security Administration (NNSA), which operates under the DOE and is responsible for overseeing the countrys nuclear arsenal. One of these networks, known as the NNSA Enterprise Secure Network, serves as a conduit for exchanging restricted data related to nuclear weapon designs and the special materials utilized in their construction. The second network, the Secret Internet Protocol Router Network (SIPRNet), facilitates communication between the Department of Defense and the DOE concerning nuclear issues, and serves as a broader platform for sharing classified information that could potentially jeopardize national security if disclosed.

To gain access to these networks, a Q clearancethe highest level of security clearance within the DOEis typically required. This process is often lengthy, although it can be expedited under certain circumstances. Observers are now questioning what level of access to classified data Farritor and Ramada might have had, had they decided to utilize their accounts.

Sources familiar with the issue indicated that the presence of DOGE officials on these classified systems signifies a notable expansion in their authority within the agency, suggesting that these accounts could serve as a toehold to request classified information. Hans Kristensen, the director of the Nuclear Information Project at the Federation of American Scientists, speculated that DOGE employees may have sought this access to discuss program details and budget priorities, even though much of the nuclear weapons budget consists of unclassified information.

The backdrop of this incident also includes recent actions taken by the Trump administration to reduce government size, which have reverberated throughout the NNSA. Earlier this year, DOGE directed the dismissal of hundreds of workers from the agency, although this decision was quickly reversed, resulting in fewer than 50 employees losing their jobs.

As concerns about DOGE's handling of sensitive data mount, revelations have surfaced regarding whistleblower claims from the National Labor Relations Board (NLRB). The whistleblower alleged that DOGE employees had acquired high-level access and might have copied sensitive information from internal systems. Alarmingly, the DOGE team reportedly requested that their activities not be documented, and attempted to obscure their actions by disabling monitoring tools and deleting access records. Employees at the NLRB expressed worry when suspicious login attempts were detected from a Russian IP address using newly created DOGE credentials.

This incident also coincides with a broader controversy surrounding Secretary of Defense Pete Hegseth's use of the encrypted messaging app Signal for sharing sensitive military information, including details of a military strike in Yemen. Such lapses in data security have raised serious concerns about the management of classified information across various government departments.

As this story continues to develop, the implications of these unauthorized accesses to classified networks remain a pivotal concern for national security.