Daniel Berulis

Berulis is the primary documentary source on the DOGE operation at the NLRB. A career IT professional, he observed, logged, and formally disclosed the sequence of access provisioning, data movement, monitoring suppression, and credential exposure that occurred inside the agency in March 2025. His disclosure serves as the evidentiary foundation for subsequent Congressional investigation and independent forensic analysis of that operation.

Silicon Valley Defense Complex
6 findings 3 connections 1 entities

Daniel Berulis is a network security architect who served at the National Labor Relations Board (NLRB) when DOGE personnel obtained unrestricted tenant-owner access to the agency’s Azure environment in March 2025 1. As a member of the NLRB’s IT division reporting to Chief Information Officer Prem Aburvasamy, Berulis observed and documented a sequence of events including high-privilege account creation exempt from logging, disabling of monitoring tools, and an anomalous 10-gigabyte outbound data transfer from the agency’s NxGen case management system 2.

On April 14, 2025, Berulis filed a formal whistleblower disclosure to Congress and the U.S. Office of Special Counsel through Whistleblower Aid, represented by attorney Andrew Bakaj 3. His disclosure and supplemental filing describe both the technical events inside the NLRB and subsequent physical intimidation, including a threatening note and drone surveillance photographs left at his home 4. Independent forensic analysis by Krebs on Security corroborated key elements of the disclosure 5.

Key Relationships

Berulis’s direct supervisor at the NLRB was Chief Information Officer Prem Aburvasamy. As the agency’s network security architect, Berulis was responsible for monitoring and maintaining the Azure environment that DOGE personnel accessed beginning March 3, 2025 5. The CIO chain of command is relevant because DOGE access provisioning bypassed the standard approval process that would ordinarily require CIO-level authorization for tenant-owner privileges 1.

Andrew Bakaj of Whistleblower Aid represented Berulis in both the original April 14 disclosure to Congress and the Office of Special Counsel and in the subsequent supplemental disclosure that added the physical intimidation evidence. Bakaj confirmed to journalists that the threatening note left at Berulis’s home referenced the specific disclosure then being prepared 4.

Lasharn Hamilton, who served as NLRB Director during this period, stated on April 16 that there had been no “official” prior DOGE contact with the agency. Berulis’s disclosure, filed two days earlier, directly contradicts that characterization. The qualifier “official” may technically exclude informal or undocumented access of the kind Berulis documented as occurring outside standard IT provisioning channels 5.

Daniel Berulis

4 nodes · 3 edges · 1-hop
Size = connections · color = relationship · dash = certainty
Scaffolded layout
Ctrl/Cmd + scroll to zoom · drag nodes to inspect structureSolid = documented · dashed = inferred · dotted = alleged

The NLRB DOGE Operation

The DOGE operation at the NLRB followed a pattern documented across multiple federal agencies, combining rapid provisioning of high-privilege accounts, suppression of logging and monitoring, and data movement that preceded or accompanied the suppression of incident reporting channels 1. Berulis documented the following technical steps at the NLRB: account creation with tenant-admin privileges exempt from logging on March 3; deployment of container technology the agency had not previously used on March 3; Azure network watcher disabled by March 5; alerting and monitoring tools disabled on March 10; a 10 GB data transfer from NxGen in the early morning hours of March 4–5 2; and instructions to halt US-CERT reporting on April 3–4 5.

The NxGen case management system held data with significant competitive and legal sensitivity. Employers and labor organizations submit confidential business records, witness identities, and litigation strategy documents to NLRB proceedings under confidentiality protections that are foundational to the agency’s adjudicatory function. Press reporting and Congressional records indicate that SpaceX had active NLRB cases at the time of the access and was simultaneously pursuing a constitutional challenge to the NLRB’s structure in the Fifth Circuit. Elon Musk served as a DOGE special government employee during this period.

A September 2025 Senate Homeland Security and Governmental Affairs Committee report identified a cross-agency pattern in which career cybersecurity officials who raised objections were sidelined or terminated, and DOGE personnel were installed in chief information officer roles to approve their own data access without standard oversight procedures. According to that report, DOGE operations likely violated the Privacy Act of 1974, the E-Government Act of 2002, FISMA, the Federal Records Act, and potentially the Computer Fraud and Abuse Act. The NLRB sequence Berulis documented is among the incidents named in the report.

Russian Credential Access Attempt

On March 11, 2025, more than twenty login attempts arrived against the DOGE accounts newly created at the NLRB, originating from IP address 83.149.30.186, which geolocates to Primorskiy Krai in Russia’s Far East. Berulis’s disclosure records that many of these attempts occurred within fifteen minutes of the accounts being created, and that the attempts used the correct username and password for those accounts 6. The attempts were blocked only by the NLRB’s standing geolocation policy that does not permit overseas logins.

The Krebs on Security forensic review, which corroborated Berulis’s account through independent analysis, noted the presence of three external GitHub libraries downloaded to NLRB systems, including one specifically designed for proxy pool rotation for web scraping and brute-forcing — a tool consistent with credential enumeration or external data harvesting 5. The disclosure does not assert attribution for the Russian login attempts; it records them as observed events. The proximity of the attempts to account creation — within minutes, using valid credentials — is a factual detail whose explanation remains unresolved.

Intimidation and Institutional Response

While Berulis was preparing the supplemental disclosure, a note was affixed to the door of his home alongside drone photographs showing him walking in his neighborhood. Attorney Bakaj confirmed to journalists that the note made direct reference to the specific disclosure Berulis was then preparing. Berulis included this evidence in the supplemental filing as the basis for witness intimidation allegations 4.

The timing of institutional events around his disclosure is documented. On April 14 — the date of the original filing and the date NPR published its account of the disclosure — administrative access was stripped from career NLRB IT staff 5. On April 16, DOGE personnel visited the NLRB 3. That same day, Director Hamilton publicly characterized the DOGE contact as having no “official” prior existence 5. The sequence — access stripped on the day of publication, DOGE physically present two days later — is documented but not explained in any NLRB public statement.

All Connections

3 total
Andrew Bakaj employment strong
Prem Aburvasamy employment strong
Lasharn Hamilton employment medium

All Findings

6 total
intelligence high 2025-03-03

Krebs on Security forensic analysis of NLRB DOGE breach: DOGE operatives created accounts ([email protected]; 'Whitesox, Chicago M.'; 'Dancehall, Jamaica R.') with tenant-admin privileges exempt from logging. Three external GitHub code libraries downloaded including one designed for 'proxy pool rotation for web scraping and brute forcing.' Microsoft Azure network watcher set to 'off' March 5. April 3-4: NLRB staff instructed to halt US-CERT reporting. April 14: administrative access stripped from IT staff same day NPR published story. NLRB director Lasharn Hamilton claimed no 'official' prior DOGE contact April 16.

intelligence confirmed

DOGE operatives received unrestricted 'tenant owner' level access to NLRB IT systems in March 2025, bypassing standard security controls. Account creation was not logged. MFA was altered. Alerting and monitoring tools were disabled (March 10).

intelligence confirmed

NLRB whistleblower Daniel Berulis documented 10GB of data (primarily text files) exfiltrated from NLRB NxGen case management system between March 3-5, 2025. Anomalous spike in outbound data traffic observed around 3-4am EST on March 4-5. Data from NxGen included personal info on union members, witness testimony, trade secrets, and proprietary company data.

intelligence confirmed

On March 11 2025, login attempts from Russian IP address 83.149.30.186 (Primorskiy Krai, Russia's Far East) targeted newly created DOGE accounts at NLRB. Over 20 login attempts, many within 15 minutes of account creation. Attempts used correct username and password. Blocked because NLRB does not allow overseas access. One account: [email protected]

intelligence confirmed

While Daniel Berulis was preparing his supplemental disclosure, someone taped a threatening note to his home door, accompanied by drone photographs showing him walking in his neighborhood. Attorney Andrew Bakaj confirmed the note made direct reference to the disclosure Berulis was preparing. This constitutes witness intimidation allegations in the supplemental filing.

document confirmed 2025-04-14

Daniel Berulis filed original whistleblower disclosure to Congress and US Office of Special Counsel on April 14 2025 via Whistleblower Aid (attorney: Andrew Bakaj). Primary document: 2025_0414_Berulis-Disclosure-with-Exhibits.s.pdf. Supplemental disclosure added: physical intimidation (threatening note + drone surveillance photos taped to home door), additional forensic data. DOGE visited NLRB on April 16 2025 — the day after NPR reported the disclosure.

Full Timeline

2 events
Krebs on Security forensic analysis of NLRB DOGE breach: DOGE operatives created accounts ([email protected]; 'Whitesox, Chicago M.'; 'Dancehall, Jamaica R.') with tenant-admin privileges exempt from logging. Three external GitHub code libraries downloaded including one designed for 'proxy pool rotation for web scraping and brute forcing.' Microsoft Azure network watcher set to 'off' March 5. April 3-4: NLRB staff instructed to halt US-CERT reporting. April 14: administrative access stripped from IT staff same day NPR published story. NLRB director Lasharn Hamilton claimed no 'official' prior DOGE contact April 16.
2025-03-03
Daniel Berulis filed original whistleblower disclosure to Congress and US Office of Special Counsel on April 14 2025 via Whistleblower Aid (attorney: Andrew Bakaj). Primary document: 2025_0414_Berulis-Disclosure-with-Exhibits.s.pdf. Supplemental disclosure added: physical intimidation (threatening note + drone surveillance photos taped to home door), additional forensic data. DOGE visited NLRB on April 16 2025 — the day after NPR reported the disclosure.
2025-04-14
  1. 1.Finding #6396
  2. 2.Finding #6399
  3. 3.Finding #6415
  4. 4.Finding #6403
  5. 5.Finding #6429
  6. 6.Finding #6400