The Greatest Heist in History: How Musk Stole America's Data and Now Controls the Government From the Shadows
Friday's quickly-arranged and bizarre press conference from the Oval Office was an attempt at projecting continuity amid claims Elon Musk was attempting a getaway.
This is part twelve of our multi-part investigation, The New Feudalism. Read Part 1 here, Part 2 here, Part 3 here, part 4 here, Part 5 here, Part 6 here, Part 7 here, Part 8 here, Part 9 here, Part 10 here, and Part 11 here.
On May 29, 2025, Elon Musk posted a farewell message and walked away from his government role. But this wasn't a resignation. It was the completion of the first phase of a sophisticated data extraction operation that gave him - and his Kremlin masters - remote control of the entire U.S. Government.
After 128 days inside the federal government through DOGE, Musk got away with stolen data of every American, the blueprint of how he's reconfigured the U.S. government on an AI platform, while positioning his operatives throughout every major U.S. agency. Musk has established a shadow government that operates outside traditional government oversight and that he controls - from the shadows.
The Long Con
The operation began years earlier. As we've exposed in our previous investigations, Musk was a central operative in a coordinated Kremlin campaign to reelect Trump by not only funding his campaign but also running systematic disinformation and election interference to ensure he won. The $44 billion Twitter acquisition, the oligarch funding, direct communications with Putin, the coordinated propaganda campaigns—all important data points that culminate in this moment.
Getting a Russian asset into the highest levels of American government required the perfect cover story. "Government efficiency" was brilliant in its simplicity. Who would question cutting waste and streamlining bureaucracy? DOGE gave Musk exactly what any intelligence operative dreams of: legitimate access to every federal database, with minimal oversight and maximum operational freedom.
The prey was irresistible: Social Security records for every American. Complete IRS files and financial histories. Treasury systems processing $6 trillion annually. Immigration records. Biometric data. Nuclear regulatory information. The entire digital nervous system of American government, ripe for the taking.
DOGE: The Perfect Cover
By January 2025, DOGE operatives had been granted administrator access across the federal government. Many were barely out of college, which was part of the cover. Who would suspect young tech workers of conducting sophisticated data operations?
But examine the personnel files more closely. Edward Coristine was the grandson of executed KGB agent Valery Martynov. Sam Corcos's wife had worked at a firm fronting for sanctioned Russian oligarch Suleyman Kerimov. Multiple operatives had documented connections to Russian intelligence networks.
DOGE engineers would arrive at agencies demanding administrator access to the most sensitive systems. When career officials expressed concerns, they were overruled. Many were fired. Security protocols were bypassed. Activity logging was disabled. The safeguards designed to prevent data breaches were systematically dismantled.
At the National Labor Relations Board, whistleblower Daniel Berulis documented what happened. DOGE operatives gained access to sensitive databases and disabled monitoring systems.
Then something unprecedented occurred. Within minutes of DOGE gaining access to NLRB systems, Russian IP addresses began attempting to access the same databases using the exact usernames and passwords that had just been created. Not random hacking attempts. Not brute force attacks. They had the correct credentials. Those credentials are the smoking gun that connects DOGE to Russian actors.
The Heist

But the true scope of the operation became clear when examining what had been taken. The data wasn't just copied—it vanished entirely from government systems. The evidence suggests that America's governmental records were systematically transferred from U.S. control.
The entire U.S. data archive may no longer even exist on U.S. servers.
The extraction operation was meticulously planned, and several whistleblowers came forward to reveal that Musk's Starlink technology was employed in the heist. This information corroborates the sightings of Starlink terminals on at least one federal building.
Starlink's satellite architecture operates independently of conventional internet infrastructure, making it an ideal platform for what one insider referred to as a "direct pipeline to Russia."
According to a leading whistleblower attorney, at the NLRB, as well as other federal agencies, Musk's satellite network appeared to provide real-time encrypted channels for massive data transfers while government cybersecurity systems remained oblivious.
The scale defied comprehension. Terabytes of the most sensitive U.S. government data—everything from individual tax returns to nuclear facility oversight—flowing through private satellites while government cybersecurity systems remained oblivious.
But to what end? Why steal America's data, and doesn't it still exist within DOGE? Isn't DOGE a part of the U.S. government?
The Entire U.S. Government May be Captured
Musk's "departure" from government service wasn't an exit. It was strategic positioning. As Olga Lautmann points out, "Musk physically might not be there. His operatives and the Palantir operatives are embedded in every single agency,” Lautman says. The media treats this as Musk leaving the building, but the control structure remains fully operational.”
Keep reading with a 7-day free trial
Subscribe to Narativ with Zev Shalev to keep reading this post and get 7 days of free access to the full post archives.