Up First from NPR - A Whistleblower Takes on DOGE

Episode Date: April 27, 2025

NPR's cybersecurity correspondent Jenna McLaughlin recently broke a story about a whistleblower inside the federal government who says DOGE representatives appear to have taken sensitive data, then co...vered their tracks. Daniel Berulis works for the National Labor Relations Board and he has shared evidence that DOGE engineers disabled security protocols, exported reams of sensitive data and used a "hacker's toolkit" to hide their activities. And he thinks his agency is not alone. Today on The Sunday Story, what this possible breach could mean for the private data of millions of Americans.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy

Transcript
Discussion (0)
Starting point is 00:00:00 I'm Ayesha Roscoe and this is the Sunday Story from Up First. And today we've got a big one. Recently NPR reporter Jenna McLaughlin broke open a huge story about a whistleblower from inside the federal government. His name is Daniel Barulis and for him it all started on a Friday at the end of February. I remember the moment vividly. I was at home and I got a call from my boss saying, hey, my boss wants us to come in next week.
Starting point is 00:00:32 It's possible Doge will show up. On Monday, he sees a black SUV with a police escort pull into the parking garage at their office in DC. Daniel didn't speak to anyone in the SUV, but he assumes it was members of the Department of Government Efficiency, or DOJ. He'd been hearing about DOJ showing up with police escorts around town,
Starting point is 00:00:54 and based on that call with his boss, he was expecting them to arrive that day. They didn't want to interface with us, the admins. They wanted system access to the cloud. That's what they were there for. And access to the cloud they got. This is Barulis' whole job, to guard the sensitive data in the cloud of his agency. He works at the National Labor Relations Board, or NLRB, which is a small, independent federal agency that enforces the law to protect people from unfair labor practices, like when a corporation wants to illegally punish workers for organizing a union.
Starting point is 00:01:30 After the Doge team arrived, Barula saw one red flag after another, indicating that sensitive data at the NLRB was at risk. It scared him enough to come forward as a whistleblower. He filed a disclosure with Congress and he approached Jenna at NPR. It scared him enough to come forward as a whistleblower. He filed a disclosure with Congress and he approached Jenna at NPR. Barrus' story gives us a rare look at what Doge was doing inside this agency and perhaps inside many others. And also what that means for the census of data of millions of Americans.
Starting point is 00:02:06 Jenna McLaughlin has covered cybersecurity for over a decade. Stephen Fowler is also with us. He's been focusing on the big picture of the federal government's restructuring under President Trump. Jenna and Stephen, thanks so much for being here. Thank you. Thanks for having us. So tell me a bit about this particular whistleblower at the NLRB.
Starting point is 00:02:29 Like, who is he? Yeah, I was lucky enough to speak to Barulis at length. He even got notes. I have my timeline, my handwritten, so let me get that out before we start. And got to learn a lot more about him and what makes him tick. Let's just start off with you introducing yourself.
Starting point is 00:02:46 Sure. Tell me a little bit about you. When he was 16, he got a computer for his birthday instead of a car, and he just took it apart to see how it worked and put it back together. I fell in love. I found the first video game I could play and it broke. And then I fixed it by just learning every little bit about how the hardware works and what parts are broken and what's doing what. He did the same thing with electronics from the thrift store, actually.
Starting point is 00:03:12 He would buy radios and take them apart. He even said that he once got nearly electrocuted messing around with all the electronics. My pastime is I like to understand how things work. And he's worked in this field for many years. Prior to being in the government, he was a technical consultant. He was a specialist actually doing auditing of corporate systems. So exactly the kind of stuff that Doge does that they're trying to do, that was actually Brulas's job. He says he decided to join the NLRB because he was really interested in public service. He had done volunteer firefighting in the past, he had worked for a rape crisis line, but he wanted to use his technical skills to do more.
Starting point is 00:03:52 The agency that I work at, they have a very specific mission. They are really the voice of the downtrodden and unincorporated worker when they try to make working conditions better for themselves or their coworkers, and management comes in and punishes them or fires them, that's where the NLRB steps in. So his job at the NLRB specifically is to secure the cloud-based systems. He reinforces who gets access to those systems
Starting point is 00:04:18 and he helps keep out attackers. So Daniel Baroulas has been working in cybersecurity for a long time. Walk me through what he saw when the Doge team accessed the NLRB systems. So, normally anyone working on these systems, once they create an account, there's a ticket filed. You get to track a little bit about what that account is doing. But when the Doge staffers came in, Baroulas said that his colleagues were asked not to
Starting point is 00:04:44 track anything, to just completely act like they were never there. The instructions given were very specific. And that was, do not log the accounts, don't log the access, and stay out of our way. How unusual is that request not to log? Like, does that happen often or are there special situations where they don't log? It's really unusual.
Starting point is 00:05:13 Every expert I talked to for this story, over 10 people said, there's absolutely no reason that you wouldn't want your activity logged if you're doing something legitimate. Because at the bare minimum, it allows you to troubleshoot, to fix errors that are completely benign. If there is a potential breach or a concern about a cybersecurity issue, it gives you a lot of clues about what systems affected, what happened, which users were involved. So yeah, it's extremely problematic and it really set off some red flags for Barulis. To give somebody a global admin account and not log or not track their activities or access,
Starting point is 00:05:52 that's keys to the kingdom. I'm going to close my eyes now and trust you. That's something that you just don't do. It violates every core concept of security and best practice. It's important to say when we asked NLRB for comment on this story, they said they had no official record of Doge visiting, that they'd never authorized Doge accessing their systems, that Doge had never requested access. Of course, that's counter to Brulas's official disclosure, plus records of internal communication seen by NPR and the forensic evidence that we've been looking at. It's really possible that this first visit and this request not to log access was outside senior leadership's awareness that they didn't
Starting point is 00:06:35 know about it. Stephen, kind of help us zoom out a bit and put all of this into context. zoom out a bit and put all of this into context. How is this different from how the federal government has historically operated? So the big thing I want to talk about here is the Privacy Act. It was passed in 1974, and that's a lot of the backbone of these lawsuits challenging Doge's access. Congress decided 50 years ago that there shouldn't
Starting point is 00:07:05 be this so-called God mode in government and there shouldn't be the ability for one person or a small group of people to be able to access virtually anything and everything about somebody that the federal government keeps. I mean, there's social security numbers, employment information, you've got immigration information, bank accounts. The thing I want people to realize about this is that there is so much that we entrust to the federal government and federal agency data wise that individually doesn't say that much. But now there are people affiliated with Doge that have access to that information and also have access to the Social Security Administration
Starting point is 00:07:50 and your Social Security number and any statements and benefits. And so even if they don't use it that way, we are now at a point where a small handful of people could build dossiers on people and do who knows what with it. And that's something that has concerned people across the ideological spectrum who are very much worried about privacy. And so Doge is now inside the NLRB working without much oversight. What happens next?
Starting point is 00:08:31 Yeah, Aisha. So for the first couple of days, Barulis was continuing to do his job as normal. He went home on the weekend and then he noticed that this political reporter, Roger Sollenberger, tweeted about one of the Doge engineers and his public GitHub page. So basically that's a place where you can host coding projects, collaborate with other people on that project. And he noticed that a project was deleted or made private before he was able to figure
Starting point is 00:08:56 out what it was. But the name was really interesting. The name of that project was NXGen B-Door Extract. NXGen is the name of an internal system that was designed specifically for the NLRB in-house, built just for them. And because of that name, Burliss was freaked out. What is this file?
Starting point is 00:09:16 Like, what is he looking at? Yeah, every single person I talked to about this immediately just gasped. They were shocked that someone would actually call something this, because the name BDoor essentially implies that you're building a back door, or a way to get into a system that's not authorized, a possible way to extract information.
Starting point is 00:09:35 When I saw this tool, I immediately panicked. Just for lack of a better term, I kind of had a conjection and said, whoa, whoa, whoa. So to be clear, we were not able to recover the code for that project. We can't know exactly what the program was doing without seeing the details of that code. But, you know, even without knowing when it was created or how frequently it was used, the real importance of this is that it made Brueless concerned. That's when his real fears started to escalate. And why did that scare him so much? Mostly because he was really scared of the data inside the NLRB getting out,
Starting point is 00:10:16 particularly the data that lives in an extremely sensitive internal system, the case management system. That's where all the case files live of ongoing NLRB investigations. So Aisha, here's some of the kind of data that NLRB has. Personal information about union members or employees that are voting to join the union. It has witnessed testimony in ongoing cases. It lists union organizers and leadership. And you know, even if there's a possibility that that information was out in the wrong hands, we spoke to a lot of labor law experts who said that it could have a chilling effect. It could scare people from forming unions or coming to the NLRB with concerns or testifying
Starting point is 00:10:55 if they feel like that information isn't going to be secure. But you know, even if you're not the biggest fan of unions, this agency also has sensitive business information. Companies sometimes cooperate with investigations, whether it's an investigation into potential trade secrets or something along those lines. So it's possible that companies will have shared a lot of information about their internal workings that they also would not want exposed.
Starting point is 00:11:20 So help me understand what's really at stake here. Like what really could come out of this data? So, help me understand what's really at stake here. What really could come out of this data? I think firstly, if someone had this data, they could use it to create blacklists of union organizers, fire a bunch of people, target harassment intimidation tactics at individuals involved in union activism. It could even give a company an advantage in an ongoing legal battle with the NLRB. If you've got insight into the opposing counsel's notes, you can probably come up with a pretty good response. Meanwhile, a foreign adversary or criminal hacker might
Starting point is 00:11:55 be really interested in that data too. They might hold it for ransom. They might learn more about their competitors' businesses or innovations. And it's also possible that this data could be combined with some of the other sensitive sources of data that Stephen's been talking about to build a larger dossier on American citizens. Stephen, you've been covering Doge at large. How does this complaint from this whistleblower fit into the larger story of what Doge as advisors are doing across the federal government? So the National Labor Relations Board is just a small pocket inside
Starting point is 00:12:33 the federal government, but we have some of the most detailed looks at what Doge is doing and how they're doing it because of this whistleblower and also because of more than a dozen lawsuits. These are federal court cases that I'm tracking and a handful of agencies challenging how DOGE has access to the sensitive data there and the fact that they even have access to the data at all. Individually, these cases paint isolated pictures about employee one having access to database one here and so on and so forth, but we pulled all of these things together and found this pattern of a small number of Doge staffers
Starting point is 00:13:12 being given access to virtually everything at all of these agencies that control just vast amount of data about millions and millions and millions of Americans. When we come back, the whistleblower himself becomes the target of secret surveillance and threats. Do you remember when discovering a new artist felt like finding buried treasure? At All Songs Considered, NPR's music recommendation podcast, we put that kind of magic back into
Starting point is 00:13:43 discovering new tracks. We're here to make the hunt for new music easy, delivering you the cream of the crop When Malcolm Gladwell presented NPR's ThruLine podcast with a Peabody Award, he praised it for its historical and moral clarity. On Thru Line, we take you back in time to the origins of what's in the news, like presidential power, aging, and evangelicalism. Time travel with us every week on the Thru Line podcast from NPR. At Planet Money, we'll take you from a race to make rum in the Caribbean. Our rum from a quality standpoint is the best in the world.
Starting point is 00:14:27 To the labs dreaming up the most advanced microchips. It's very rare for people to go inside. To the back rooms of New York's Diamond District. What, you're looking for the stupid guy here? They're all smart, don't worry about it. Planet Money from NPR. We go to the story and take you along with us, wherever you get your podcasts. We're back with Jenna McLaughlin and Stephen Fowler. So about a week after they arrived, the Doge engineers left the NLRB systems and deleted their accounts. But Baroulos kept looking into their activity and he uncovered other clues that made him alarmed.
Starting point is 00:15:08 Like, what else did he discover? Yeah, there were some really weird stuff going on that any IT specialist that you talk to is gonna kind of scratch their head about. He saw them using what's called a container. It's kind of like a little bubble that exists inside of a computer where everything that you're doing inside of it
Starting point is 00:15:24 is invisible to the rest of the system. So you can execute code, you can have it run a bunch of automated programs, and then when it's deleted, when you're done with it, nobody really knows it was ever there or what it was up to. In his disclosure to Congress, Baroulas also said that they turned off multi-factor authentication, deleted logs, turned off security requirements for mobile access. You know, these are all security controls that would be really strange and unusual for a regular user to disable. And, you know, for Barulis, all of this points to a real attempt to obfuscate activities, to cover tracks. From what I saw, these tools have a very specific use, what you would call part of a hacker toolkit. And then the thing that was really important to Barulis is he saw this giant spike of data
Starting point is 00:16:09 leaving the agency. That was one of the biggest red flags that he saw. He captured images of data transiting out of the agency over time, over several weeks, and there's one gigantic spike that you can see right in the time where Doge had access. I saw that there was a good 10 gigabyte spike within the matter of maybe two hours that lined up right about the time that they had their access accounts. It would represent data that was being copied from within our system to outside of our system and for it to spike like that, that's across the board probably the number one indicator
Starting point is 00:16:46 that you've been breached. So first, Barula saw files leaving the case management system that we had been talking about. He described it as kind of the nucleus where all the sensitive stuff lives and stuff never leaves there. And then he saw a slightly larger chunk of files leaving the entire system. And it was impossible to know exactly what those files were. It's all extremely mysterious and sketchy.
Starting point is 00:17:09 But has NPR seen evidence of this? Is he just making allegations? Or have people confirmed what he says he saw? Luckily, Burles came with the receipts. He included in his official disclosure that same image I had been talking about where it shows the spike of data leaving the system. So he was able to definitively prove
Starting point is 00:17:35 that data left that should not have. And what makes him think that Doge may have taken this data? He really double and triple checked his work. He stress tested these theories. So he talked to all of his colleagues. I went to, you know, obviously immediately try to validate that this was not legitimate copying.
Starting point is 00:17:56 And so I first went to the dev team, validated that nobody was working on the systems at that time. It was like an early morning. So it did make sense for them anyway. He confirmed no one at the NLRB had been saving backup files that week or migrating data for projects. And you know, the timeline matched up.
Starting point is 00:18:13 He essentially thought of it as, you know, even if Doge was not the one responsible for this, something unusual happened and it needs to be investigated. I spoke to Richard Griffin. He was the former NLRB general counsel from 2013 to 2017, and he told me in an interview that none of that confidential and deliberative information should ever leave the agency. So how much data are we talking about? Like is it every file that
Starting point is 00:18:38 the NLRB got? So it's not everything. The data leaving was almost all text files. It added up to around 10 gigabytes. Think of that like the equivalent of a full stack of encyclopedias worth of pages if someone printed them. But it's possible the files that were extracted were compressed into a smaller package or that only some of the files were extracted. They could have searched for something specific. When he realizes that it was taken, what did Barulis do next? Well, according to his disclosure, next thing he does is gather the troops.
Starting point is 00:19:13 He got his IT team together to discuss possible insider threats, namely the Doge engineers. So this group of people eventually launched a formal breach investigation. They were actually preparing a request for assistance outside their agency from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency. That's a mouthful. You can just call them CISA. They have more forensic tools to investigate potential breaches than the NLRB does. But ultimately, those efforts kind of just went quiet. They were disrupted without an explanation from somewhere higher up, according to Brulas.
Starting point is 00:19:47 Instructions to drop it, to not file the report. It was one of those situations where it just, it bothered everybody that was involved in my agency and my, especially my department to do that. And so there was a lot of concern amongst us about that. So Aisha, I should also say that the NLRB told NPR that they did conduct an investigation into Brulis's claims. They said that they ruled out a breach.
Starting point is 00:20:15 However, given the evidence in Brulis's disclosure that NPR reviewed, he argues that there's suspicious activity that should be investigated further. In the days after requesting the formal investigation, it got even scarier. Brueless actually found a printed letter in an envelope taped to his door at home, a place he had only been living for two months, and that included a ton of sensitive personal information. It had photos of him walking his dog that appeared to be taken with a drone. And, you know, when investigators and myself tried to follow this data trail
Starting point is 00:20:49 and figure out where this could have come from, we could not find it even in the tools that journalists have access to, to search through public records. That's really scary. I mean, the idea of it seems like someone's watching him. Does he know or have any idea who left that letter? It's terrifying, honestly. He doesn't know. Law enforcement is investigating as we speak. Right now there's not clear, obvious suspects yet, but he's really scared because all of this really sensitive data, it was only available in his government file. He only recently updated it. He just moved like two months ago.
Starting point is 00:21:26 When we come back from the break, Jenna and Stephen consider what else could be motivating Doge to access all this data. Imagine if you will, a show from NPR that's not like NPR. A show that focuses not on the important, but the stupid, which features stories about people smuggling animals in their pants and competent criminals in ridiculous science studies. And call it Wait, Wait, Don't Tell Me because the good names were taken. Listen to NPR's Wait, Wait, Don't Tell Me. Yes, that is what it is called wherever you
Starting point is 00:21:58 get your podcasts. At NPR's Pop Culture Happy Hour, we sort through a lot of television. And we've found some recent TV comedies we really like that you don't want to miss. And we'll tell you where to watch them in one handy guide. Listen to the Pop Culture Happy Hour podcast from NPR. These days there is a lot of news. It can be hard to keep up with what it means for you, your family, and your community. Consider This from NPR is a podcast that helps you make sense of the news. Six days a week, we bring you a deep dive on a story and provide the context, backstory, and analysis you need to understand our rapidly changing world.
Starting point is 00:22:40 Listen to the Consider This podcast from NPR. changing world. Listen to the Consider This Podcast from NPR. We're back with a Sunday story from up first. We're talking with reporters Jenna McLaughlin and Stephen Fowler about a huge story that they've broken wide open after talking to a whistleblower at the National Labor Relations Board or NLRB. So what are the consequences of the access that Doge has gained to these systems? What kind of vulnerabilities has Doge left in its wake? So, Burulis can't confirm for sure, but he has reason to believe that there was potential malicious activity. According to his disclosure, there were multiple login attempts to the system from a Russian IP address that was using the new credentials that Doge appears to have created.
Starting point is 00:23:34 So Ayesha, this happened within minutes of those new accounts being created? Because of all this, experts told me that they could see the possibility that Doge has been compromised. I spoke to Russ Handorf. He's a former FBI cyber expert. He said malicious cyber actors, whether they're criminals or hackers working for Russia and China,
Starting point is 00:23:53 might be really interested in getting inside the NLRB systems. And that's for a couple of reasons. First, we've heard US government officials sounding the alarm for years about stealing US intellectual property to benefit their own industries and companies. It might also be valuable for blackmail purposes or to hold the data for ransom. But the thing about this is this cloud account could be connected to other government systems
Starting point is 00:24:17 and Handorf said that it could be a way for a hacker to jump off from NLRB and go somewhere else. Stephen, you mentioned earlier that there's no reason DOGE needs to access the data at the NLRB for their stated mission, which is to deal with waste, fraud, and abuse. So why else might they want to collect it? Yeah, it is worth mentioning that at a lot of these agencies that Doge has had access to data, there is a benefit of the doubt
Starting point is 00:24:51 to understand why they would have it. For example, at the Social Security Administration, they are looking at data to try to find evidence of people receiving benefits that they shouldn't have. This is nowhere like that. It could be used for business purposes, especially if you're Elon Musk. His companies have several active cases before the NLRB.
Starting point is 00:25:13 There's a group of former SpaceX employees that have lodged a complaint against Musk as an example, and Musk and SpaceX are part of a group of companies that have filed suit saying that the NLRB itself is unconstitutional. So in theory, if this data was taken by somebody affiliated with Doge and given it to Elon Musk, he could have access to sensitive information about these cases that have been filed against his companies, used to target lawyers or witnesses or other people involved with the case. Also, it's stuff about his competitors.
Starting point is 00:25:47 I mean, there are multiple competitors that also have cases before the NLRB and also have trade secrets or other inner company workings that are involved here. Another thing I want people to think about is the potential for data scraping. There's been a lot of reporting across the government about Musk and Doge and the use of artificial intelligence programs, you know, things like XAI and Grok, that are being used to basically train on government data for things. So, Stephen, from what you're saying, it's like this story is likely bigger than just the NLRB. Since
Starting point is 00:26:25 Doge has gained access to several agencies at this point, how have cybersecurity experts at other agencies responded? Well, we have seen testimony in those federal court cases that I was talking about of people expressing alarm about how Doge had access to the data. But at the same time, there isn't really much of a response because many of these cybersecurity professionals have resigned, been forced out, relocated, put on administrative leave, taken the buyouts that have been offered. So it's really hamstrung the ability to respond to or keep track of what Doge is doing.
Starting point is 00:27:04 I'm thinking specifically of Erie Meyer, a technologist who stepped down after Doge did something similar at the Consumer Financial Protection Bureau. Jenna talked to her for this story. She said, I'm trembling. They can get every piece of whistleblower testimony, every report, everything. This is not good.
Starting point is 00:27:22 Another employee at the Department of Interior subagency who requested anonymity fearing retribution said their cyber teams are, quote, pissed because they have to sit on their hands when every single alarm system we have regarding insider threats is going off. That's a lot of red flags. How has the administration reacted?
Starting point is 00:27:42 Trump issued an executive order that asked federal agencies to find ways to break down information silos and share non-classified data more easily across the federal agencies and to do so as applicable by law. But as we've seen here, their interpretation of what the law is is different from some of these experts. And Ayesha, the White House gave us a comment after we published. They said essentially it's old news that Doge is in federal agencies like the NLRB sharing data. They did not deny it.
Starting point is 00:28:15 So what else has happened since you broke the story last week? Well, the top Democrat on the House Oversight Committee, ranking member Jerry Connolly of Virginia, is calling for an investigation into Doge's access to the NLRB to get some answers. Meanwhile, we got a copy of an email informing NLRB employees that two Doge staffers will embed with the NLRB for the next two months. You know, given the fact that folks like Connolly want independent investigations, it'll be hard to guarantee that those new Doge staffers aren't going to mess with any forensic evidence while they're there. We're also hearing some IT staff have been locked out of the systems that they work on. Basically, they can't see what's going on or do their job.
Starting point is 00:28:56 With all of this, I'm still thinking about the whistleblower, Barulis, and the picture of him walking his dog and all of that. Across administrations, we have seen that being a whistleblower can be dangerous. Is Barulis still at the NLRB now? Barulis is still employed at the NLRB and we haven't heard any indication that he's going to be put on administrative leave or fired. In their statement, NLRB told us that they're committed to protecting their employees' rights to make official disclosures to Congress and that they will cooperate with any investigation.
Starting point is 00:29:34 But I think you're right. It's a really scary moment right now. And for him to know that these Doge staffers might be in the office with him after he raised these concerns, it's really troubling. But Brueless felt like it was really important to do this. He said it was a moral imperative that he has never encountered something like this in his 20 years of IT. I wouldn't be able to live with myself otherwise. To know that this data was out there, it's going to impact these cases, it's going to cost people their real livelihoods. And for that to happen with nobody knowing what happened, that's the biggest
Starting point is 00:30:08 travesty of all. And I believe with all my heart that this goes far beyond just case data. I know that there are other admins at other agencies I've spoken to who have seen similar behavior and they are uncomfortable speaking up. They're uncomfortable reporting it because at the end of the day they have families They have things on the line that have been implicitly threatened When I standing up like this, I'm not hopeful for the outcome for me What I'm hopeful is that people look and say hey somebody else did it I can do it too. And if enough people stand up Somebody else did it. I can do it too. And if enough people stand up, it can form a movement. And these practices that they're breaking security and violating and stealing data without anyone knowing, it can be stopped.
Starting point is 00:30:57 And he actually made a personal plea to the Doge engineers. It was a simple request. Doge engineers. It was a simple request. Be transparent. If you have nothing to hide, don't delete logs. Don't be covert about your entrance to agencies. Be open, because that's what efficiency is really about. If this is all huge misunderstanding, then just prove it. Put it out there. That's all I'm asking. Steven, you mentioned that you and Jenna are part of a team investigating the restructuring of America's federal government. What's your team doing now and how are you continuing to uncover Doge's activities? Well, there are still so many questions unanswered, both with this specific story and with other
Starting point is 00:31:44 impacts across the federal government. questions unanswered, both with this specific story and with other impacts across the federal government. So we are fanning out across the country, across federal agencies, tracking these changes, trying to understand how things are changing for the worse, for the better, or not at all. And you know, there's these dozen court cases that are ongoing that there are just going to be more and more developments. So this is a full court press from this team and from the entire NPR newsroom. Absolutely and meanwhile Ayesha we're already hearing from more federal workers after this story came out. They want to share more about what
Starting point is 00:32:17 they're seeing at their agencies. So our team has a lot of work to do. So if somebody is listening and and they want to share some important information with you, where can they reach either of you? So the place to go is Signal. The encrypted messaging application Signal is a great tool. You know, it does a really good job of protecting the average user. It's not totally bulletproof if you're using a work device or if the phone itself is compromised, but for the average person, it does a really good job of keeping your data safe. And just a note, for full disclosure, NPR's CEO, Catherine Maher, is chair of the board of Signal.
Starting point is 00:32:51 To find us on Signal, click the little pen and pad in the top right corner of the app and search for our usernames. Mine's jenna mcglofflin.54. And Stephen? Mine is mynamewithoutvowelsstphnfwlr.25 Both of those are also at the bottom of our stories about this Jenna and Stephen, thank you so much for all of this incredible Reporting on the changes happening in our government. Thank you. Thanks for having us
Starting point is 00:33:22 That's NPR's Jenna McLaughlin and Stephen Fowler. You can find more details of their reporting on the NLRB at npr.org. This episode of the Sunday Story was produced by Kim Naderfane, Peter Suh, and Andrew Mambo. It was edited by Liana Simstrom, Irene Noguchi, and Brett Neely. The mix engineer for this episode was Jimmy Keely. The Sunday Story team includes Justine Yan and Jenny Schmidt. We always love hearing from you,
Starting point is 00:33:54 so feel free to reach out to us at thesundaystoryatmpr.org. I'm Ayesha Roscoe. Up first is back in your feed tomorrow with all the news you need to start your week. Until then, have a great rest of your weekend. Want to hear this podcast without sponsor breaks? Amazon Prime members can listen to Up First sponsor free through Amazon Music, or you
Starting point is 00:34:19 can also support NPR's vital journalism and get Up first plus at plus dot npr dot org. That's plus dot npr dot org. Have you or someone you love been confused by the push to make America healthy again? Then you, my friend, are in dire need of our new series. On It's Been A Minute from NPR, we're delving into some of the origins, conspiracy theories, and power grabs that have led us to this moment, and what it could mean for our health. That's on the It's Been A Minute podcast from NPR. On Trump's terms, we have followed the first hundred days of this administration. Tariffs very strongly work. Trade war.
Starting point is 00:35:01 Get ready. Elon Musk and Doge. We will make mistakes. Deportations. Litigation. I don't know who the judge is. He's radical left. Trade war, Elon Musk and Doge, deportations, litigation. Those first hundred days are coming to a close, but the pace of the news will likely continue. Follow NPR's coverage of President Trump trying to do things no other president has on Trump's terms from NPR.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.