A revealing update on my three-part series 1 that tracked Elon Musk’s power consolidation from Tesla shareholder to information broker via X and DOGE, now turbocharged by xAI.
This week, the tech billionaire and “special government employee” let something telling slip. Frustrated by government systems, he complained:
"There's, like, so many situations where the computers are so broken, even in the intelligence world... [To move] data from one computer to another, you have to print it out and then type it into the next computer."
This is a confession hidden in plain sight. Yes, he’s critiquing government IT infrastructure. That’s fair criticism: Government technology is notoriously outdated and expensive. But read between the lines : This quote exposes how deeply Musk penetrated government systems during his DOGE tenure. He wasn’t just hunting for efficiency savings or personal data to monetize. He was probing national intelligence and defense networks .
Let that sink in: The man who bought Twitter to control the flow of information was intent on mining the Pentagon’s digital vaults.
Those “broken” computers Musk encountered? They’re not broken. They’re intentionally isolated . Defense and intelligence computers are specifically designed to lack USB ports, network connections, and electronic transfer capabilities.
I’ve witnessed this firsthand. We were asked to present a proposal to military leadership at the Pentagon. No PowerPoint allowed. No digital files. No USB sticks. Paper only.
The reason is existential : One compromised connection could hand foreign adversaries—or domestic oligarchs—the keys to America’s defense apparatus. Every “inefficiency” Musk encountered was a firewall protecting national security. Convenience be damned.
For once, institutional paranoia trumped Silicon Valley “disruption.” The same air-gapped systems that frustrated Musk’s data harvest may have prevented something far more dangerous than government waste—it may have prevented the privatization of America’s most sensitive intelligence assets.
The question remains : What exactly was he looking for in those classified networks? What would he have done with it?
However, the threat is not over:
He still has a wealth of personal information about average citizens. Is that enough to control “We, the People”? We, the People, shall see.
Stay tuned. It’s not over.
[See earlier posts in this series]