Lawfare Daily: Andrew Bakaj on Whistleblowing and DOGE’s Activities at the NLRB

Published by The Lawfare Institute
in Cooperation With
Andrew Bakaj, Chief Legal Counsel at Whistleblower Aid, joins Kevin Frazier, AI Innovation and Law Fellow at Texas Law and Contributing Editor at Lawfare, to discuss a declaration by a National Labor Relations Board employee Daniel Berulis that DOGE facilitated the exfiltration of potentially sensitive information to external sources. The two also analyze the merits of whistleblower protections more generally.
Read more about the declaration here: https://www.npr.org/2025/04/15/nx-s1-5355896/doge-nlrb-elon-musk-spacex-security
For a copy of the letter penned by several members of Congress, go here: https://www.npr.org/2025/04/24/nx-s1-5375118/congress-doge-nlrb-whistleblower
To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/lawfare-institute.
Click the button below to view a transcript of this podcast. Please note that the transcript was auto-generated and may contain errors.
Transcript
[Intro]
Andrew Bakaj: There's a lot of red flags in terms of why is this data being leaving the agency effectively in the middle of the night? Why are these containers here to obfuscate what's actually happening? And how is it that somebody or something from Russia is trying to log in with all the correct credentials?
Kevin Frazier: It's the Lawfare Podcast. I'm Kevin Frazier, the AI Innovation and Law Fellow at the UT Austin School of Law and a contributing editor at Lawfare, joined by Andrew Bakaj, chief legal counsel at Whistleblower Aid.
Andrew Bakaj: You know, when it comes to the security or national security, but also data security of American citizens, I, I think we can all agree on, we want to ensure that that's protected. And the only way to know what to do is if you have people who can conduct an independent investigation and those who know how to conduct an investigation in this space.
Kevin Frazier: Federal whistleblower laws provide a critical, legally protected channel for employees to expose potential government misconduct, waste, or abuse. Today we're examining such a case originating from the National Labor Relations Board involving allegations against DOGE.
[Main podcast]
Daniel Berulis, a cybersecurity professional at the NLRB, recently made a formal whistleblower disclosure, supported by a declaration under penalty of perjury, alleging significant irregularities involving the Department of Government efficiency, better known as DOGE, and access to sensitive NLRB data. These allegations have prompted inquiry from members of Congress and broad concern from the American public.
So with the understanding that you're serving as Mr. Berulis’s counsel—we're not going to go through the full timeline of the declaration that he provided. For listeners who are keen to go through the TikTok of that, we will include a link in the show notes for you to get into those weeds. But still, Andrew, if we could start with a high level summary of the nature of the events that gave rise to this declaration.
So let's just set the scene. DOGE, we know, is going agency by agency looking for inefficiencies, looking for opportunities to streamline government services purportedly, and they show up at the NLRB. Can you walk us through a little bit about DOGE'S stated purpose in coming to the NLRB and perhaps the extent to which there was notification or lack thereof or collaboration with NLRB staffers?
Andrew Bakaj: Absolutely. So basically the high level is that in the late February of this year, DOGE came to NLRB, as I understand it, unofficially, right. So what happened was—and I'm looking at just to refresh my own recollection, looking at Dan's declaration—so it was during the week of Feb. 24 through the 28, is that management at NLRB basically said, look, you're gonna have to all come back, people have to be back in their chairs because DOGE is coming in again, unofficially.
Then in early March of 2025 is when representatives of DOGE came into the agency. And so what they did was they—well ahead of time, ahead of their arrival, they wanted to know exactly what types of systems NLRB uses internally, like software, computer, hardware, etc. I think it's primarily software, though I'm not a tech person, so if I get into the tech speak wrong, I'm a, I'm the lawyer.
Kevin Frazier: I won't hold it against you, I won't hold it against you speaking as a lawyer guy myself. So yeah, let's, let's stick with the law and we will give you some grace on the technical side of things.
Andrew Bakaj: Thank you. Thank you. So what they did was when they finally came into the agency, they were going through and creating user accounts for themselves, usernames, passwords. Folks within the tech side of the NLRB were told to stay out of DOGE's way, let them do what they need to do, don't monitor, don't record or notate what's actually happening.
And what was really interesting was that they brought in something called a container. And a container in the tech world, in this world, it's effectively an external computer or hard drive where they can actually process activities in a way that prevents others from within the agency to see exactly what's happening in full transparency.
Now, DOGE comes in saying that, like you said, they want to go in and see whether or not government agencies are operating effectively and efficiently, and I think that from a high level perspective, we all want the government to be running in an effective and efficient manner. Side note, that's why we have offices of inspector general of inspectors general, right, which, you know, the president has effectively removed most of them. And so they're going in under the guise of, we wanna see whether or not you're operating effectively and efficiently.
So the question then becomes why are they looking at the internal systems where cases are being saved and, and processed within NLRB?
Kevin Frazier: And just to clarify one point when you say that folks like Daniel were being told not to exercise extensive oversight or get involved in DOGE’s work, that was coming from current NLRB agency leadership. Just to clarify, there.
Andrew Bakaj: It would be the leadership within Dan's office. So you have NLRB leadership and then you have folks within the IT department where Dan works. So that's where they said, look, this is what DOGE asked us to do and this is what you're supposed to do.
So then what, what Dan was doing was he was looking to see what was going on to the extent that he could, right, because he saw certain anomalies. Now first you've got the container being brought in, which is really questionable. You have user accounts being created, which is okay, they're creating their own, you know, usernames, password login information, right?
But what was really troubling was that on multiple occasions, I believe over 20 times somebody or something from Russia, tried to log in even within 15 minutes—which in, in the tech world is basically near simultaneous—tried to log in with the correct user name and the correct password. And, and a hack, by the way, as I understand it, there's a longer tail to that for somebody to get hacked. So there's a lot of questions in terms of what did or didn't happen.
And so when Dan saw that, when he saw that in the middle of the night, there was a large amount of data leaving the agency—and we're not talking about data that's talking about the efficiency and effectiveness of NLRB. We're talking about data, data from databases where there's case information, cases involving, you know, union activities or the formation of unions. You had, the NLRB handles cases where you have complaints, if you will, filed against corporations such as Tesla, as I understand it.
So, you know, there's, you know, there, there's, there's a lot of red flags in terms of why is this data being leaving the agency effectively in the middle of the night? Why are these containers here to obfuscate what's actually happening? And how is it that somebody or something from Russia is trying to log in with all the correct credentials? Which, by the way, because there's a final human check to that, Dan and the team blocked that access.
Kevin Frazier: So, and what, what's striking too is reading through Dan's declaration, you'll also see the level of access granted, tenant-owner level access is, is not the standard you would suspect per Dan for this sort of auditing of agency performance. If you were merely seeking to review files or workflows, you wouldn't need that extensive of a reach when it comes to access.
And I think it's also worth noting as, as you flagged that there were clear instructions for the NLRB folks not to suspect that there would be any logging or record keeping of the DOGE activity. And then finally, as you noted, there was this data exfiltration event, and I wanna stick on this for a second.
So Dan points out that there may have been 10 gigabytes of data that were exfiltrated. Can you give us a, a sense of where that may have gone? How much is 10 gigabytes? Is 10 gigabytes a lot? A little? Why is this significant?
Andrew Bakaj: So it's significant because we don't know exactly where that data went, and it is actually a lot of data. So for some—you can, you can talk to some folks and say, well, is 10 gigs a lot? Well, it isn't, if there are videos or pictures, because that's heavy data, right. But if we're talking about documents, just, you know, text—which is, this is what it was—it is a lot of data because it's the equivalent of an entire encyclopedia that was exfiltrated from the NLRB out.
So it does, so that's where it really matters, is the type of data that was exfiltrated and, and, and therefore that amount does underscore the fact that this was significant. This wasn't, you know, 10 gigs of pictures, which, that's one thing. 10 gigs of text. That's a lot.
Kevin Frazier: Thinking through the response of Dan when DOGE leaves, Dan's now back at the desk going through thinking, huh, that was a bit strange. DOGE comes in, DOGE leaves. What was the nature of his discovery of this data exfiltration, this level of access, this account creation. Was this a NLRB sanctioned review of saying, okay, let's go back and all hands on deck, let's track what Doge had done, or to what extent was this largely Dan, self-initiated review of internal processes and, and login functions?
Andrew Bakaj: My understanding—I would have to defer to Dan—but it's basically he saw something that was anomalous, right? And he looked into it because again, he's a trained cybersecurity expert for the government. He has worked previously in very sensitive areas ensuring that our, our cybersecurity is, you know, not going to be penetrated by foreign adversaries, etc. So when he saw these anomalies, he, as I understand it, did raise it up his chain of command. And there was an effort to conduct a, a formal review, or at least elevated to an entity that can conduct an investigation.
The thing that I want to underscore about what Dan did and is doing is that he's not going out and saying that, you know, I know X, Y, and Z happened. This is where the data went. What he's saying is there's a lot of anomalies here and a lot of problems, and you can maybe say if one or two things happen while maybe there's a fluke. But when all these things start lining up simultaneously, there's something, there's a lot of smoke. Which is why Dan, in his disclosure has made it clear. He was clear about what he saw. He, he, he, he created the timeline—which is really important 'cause that can help investigators assess what did happen and what happened when—and then he says, this is what I, I'm concerned happened, somebody needs to investigate somebody who has, frankly, better tools than Dan and NLRB have internally.
Kevin Frazier: Thinking about this act of, of whistleblowing and getting this information out, I think it's also worth flagging for our more technical folks who wanna look at that declaration. There's screenshots of activity that Dan took; He's very extensive with respect to who he was communicating with, what sort of technical red flags he was raising.
All of that leads me to the question of how has NLRB officially responded? Dan's been making the rounds. You have been making the rounds, sharing this declaration, sharing these concerns. What's NLRB’s official line? Any concerns here? Anything to be worried about?
Andrew Bakaj: So the NLRB’s official line is what, what's they've been putting out publicly, which is they're saying that DOGE wasn't there officially at this particular time. They're really hang, hanging on the term officially because that's, the thing is that, as I understand it from other folks who work within other government agencies where DOGE come in, they weren't coming in an official capacity. They didn't necessarily come in signing in the roster or, or, or the guest book, if you will, when they walk into the agency.
So they're putting out there that this, you know didn't happen. But now you've got DOGE coming into NLRB officially, and they're going to be working remotely there for a number of months, and you know, that is a concern. It's, you know, what are they doing now? Are they cleaning up mistakes that they made? We don't know. But that's why ultimately somebody needs to go in and conduct an investigation—by the way, not just at the NLRB, but at other agencies. I, I do, you know, believe that this is the tip of the iceberg, so to speak, right? And it is happening in other agencies and somebody needs to take this seriously.
And you know, I also know that for whistleblowers that this is a difficult thing to do, a prospective whistleblower, folks working in these agencies to, to come forward. Dan did this. He wasn't behind a screen, shall we say. We, he, he's out there by name and he has done interviews, and so he wants to basically create and encourage others to do the same.
And by the way, anybody who's thinking about coming forward and other federal agencies, or even with an NLRB, I've represented clients who have done this completely anonymously. So there is a way to do it, but Dan took that extra step not for himself, but to try and encourage others. And one of my colleagues at Whistleblower Aid, for example, she has this phrase that is courage is contagious, and I do believe that. And you know, Dan, here is an example of somebody who did the right thing for the right reasons.
Kevin Frazier: And thinking through Dan's motives, one I suspect is to have some remedy here or some additional step. What is Dan hoping for? So you pointed out there's some degree of uncertainty about just how much data was exfiltrated, what type of data was exfiltrated, how sensitive that information is; by chance, it could be something that was pretty innocuous or it could be incredibly sensitive.
So what is he hoping in terms of outcome here? And if you could also add, how is Congress now getting involved? We saw dozens of Democratic members of the House led by the Congressional Labor caucus raise some red flags in a letter to the NLRB which we’ll include in the show notes expressing similar concerns based off of Dan's declaration.
So what are we hoping for here? Is this going to be an exercise in bringing the data back? Is this going to be something about limiting DOGE'S activities? What may we see?
Andrew Bakaj: I think the first thing that, you know, I know, I'm being repetitive here, but he wants an investigation and frankly, Dan wants to be mistaken. Like the ideal is that an investigation comes forward, says, no, there wasn't a compromise or no X, Y, and Z didn't actually happen. There was a lot of smoke, but there were other things in place that did or didn't happen.
We can't undo what's been done. I, I do believe Dan is correct, and I've talked to other folks who stressed this. You can't undo what's been done, but what we can do is we can ensure that going forward, whether it's DOGE or anybody else, that these, that, that our government systems are operating in a secure manner, right.
So that way, whether it's you know, a hacker, as Donald Trump would say, you know, sitting on his bed, or a foreign nation state, can't access internal sensitive government databases. We also, it's important that if something did go wrong with, and somebody did intentionally engage in criminal misconduct, that at some point that they're going to be held accountable.
And you know, I, I do think, and this is my opinion, is that, you know, at some point there will have to be a rebuilding of our structures here in, in our government, and knowing what happened will go a long way in fixing all of this one day in the future.
Kevin Frazier: Thinking, just to play devil's advocate for a second, we've noted repeatedly that there's some degree of uncertainty here. We've noted also that DOGE has been at a lot of agencies and been doing allegedly similar efforts and probes across the federal government.
So if everyone were to mirror Dan, we could see the gumming up of the works of DOGE, which is for, for all intents and purposes, very much something that the president has endorsed, signed off on.
So just to play devil's advocate for a second, how do you decide, if you're thinking about now at a theoretical level, the pros and cons of whistle blowing, of having folks speak out, but speak out, for lack of a better phrase, at the right level, right? You don't want–
Andrew Bakaj: Yeah.
Kevin Frazier: –everyone to scream the sky is falling, but at the same time, you wanna make sure there are investigations of events like this. So how do you draw that line, or what factors do you think about?
Andrew Bakaj: So the first thing is, you know, when, when somebody's considering whistleblowing which is not an easy thing to do, the prospective whistleblowers will have to at least, you know, come forward and be able to articulate, like Dan did in a sworn declaration, what happened factually, what they saw or what others have seen, etc, right? And be specific about, I saw X or I heard from somebody that X, Y, and Z happened. That's important to set. The stage to tell the story. Also, what's very important is to have at least some of the receipts, you know, images of what is or isn't happening on those systems, on those databases.
And, you know, there are things that I, cases I've brought forward where we've taken them to specific congressional offices and committees as well as within the executive branch for investigation. And, you know, not everything needs to be public all at once. That, that's the other thing. Some of our work, it does, you know, getting the information out there in a responsible manner educates the public and it informs Congress in a public way. But we've done things at times, you know, more behind the scenes where we—I, I shouldn't say behind the scenes, but rather file a formal complaint without going to the media per se, but there may be a proper time to, to do that, to have that discussion like we're doing today.
So, you know, bottom line. If you see something—it goes back to what happened post 9/11, right—if you see something, say something, know who to say it to be able to provide at least some evidence. And you know, I've always told whistleblowers in the past that really it's not up to you to conduct a full investigation. One, that's a way to potentially put yourself in professional jeopardy because a question that will become, why are you doing A, B, or C or X, Y, or Z, but rather, take the information that you have and let's turn it over to the proper authorities for investigation for an independent review.
And that's where this is going to get really complicated because you know right now a lot of the government, federal executive branch agencies may not necessarily have the willingness to conduct a comprehensive investigation. I'm hopeful that some will or someone will, right? I still believe in the system, you know, and the system is created by human beings, so, right. I mean, we live in a flawed world, we’re flawed people ourselves, but you know, hopefully the system will work.
And Congress, you know, unfortunately, you know, because how, how things are politicized here in, in Washington, you know, it, it's, it's really unfortunate, but I'm hopeful that the folks on both sides can agree that, you know, we can't allow our sensitive data to be exfiltrated or to be maintained in such a way that somebody can hack into it. Because here's the thing—and I've had this conversation with a number of folks—I worked in the national security field for most of my career, right, and if you were to ask somebody, you know, do you support national security? Their answer is obviously going to be yes. But national security is really an amorphous thing, right, and you know, to a lot of folks, it may not touch them personally.
What's been interesting about this case and, you know, and stuff that we've seen about Treasury or the Social Security administration of the press—I've not worked in any of those matters, not, not yet—is that those things are touching people personally, right. And so, you know, we, you know, if there's data that's going out with social security numbers or personal tax information like this, this is, this is, you’re potentially going to affect every one of us up on a personal level. And so we want to make sure that for the sake of all Americans, that our data is protected.
Kevin Frazier: When you mentioned earlier that you think that whistleblowing is obviously a important function of the government doing well, of having a heightened degree of accountability, having the right level of transparency while also not blending or blurring the line between doing your job and and making sure you're implementing policies and following best practices and things like that—can you walk us through for listeners who maybe aren't familiar with the whistleblowing protections, what's the actual law undergirding the activities of Daniel and others?
Obviously, I think a lot of folks have heard of the Pentagon Papers or other instances of famous whistle blowing, but what gives folks like Daniel the authority to actually come forward, step up and say, hey, this is an issue, and I think everyone including, and especially the government, needs to know about it.
Andrew Bakaj: Yeah, no, absolutely. So, you know, the, the first thing is that, you know, all federal employees have a positive obligation to disclose something when they see wrongdoing, okay. The laws that protect whistleblowers from retaliation, if you're in the civil service, if you're a federal employee in most agencies, it's Title 5, Section 2302. That's a section that prohibits retaliation through adverse personnel action. So you can't be fired, demoted, experience a significant change in duties, responsibilities, or working conditions among others because of your whistle blowing.
Now, that's, that's from, from an employment standpoint, and for members of the intelligence community and those who have security clearances, you have Title 50 and the presidential policy directive of PPD 19 that protects whistleblowers in the intelligence community and those security clearances to where their clearances are being suspended or revoked in retaliation for their whistleblowing.
Again, personnel actions, right, which is significant. But then we also go into the area of, you know, witness protection or tampering with witnesses, which is not your typical whistleblower protection framework, really, you know, because this is now going beyond the employment issue, but it's really important because we're living now in a day where personal threats are being directed at federal employees, government contractors, whistleblowers. We've seen, you know, for example, Elon Musk name people personally and specifically on X, early on in the administration. I think this was in January, if I, if memory serves me correctly. And we, we need to come into a place where, you know, unfortunately we're gonna have to rely on those other statutes to protect our clients from intimidation from threats. And that's, that's where we are today, but we do have those levers on our side.
Kevin Frazier: And just to personalize this a little bit for the audience, can you explain how has this experience been going for Dan so far? Obviously you mentioned you can whistleblow and remain anonymous; Dan made the choice to identify himself with this declaration.
What have the ramifications been? How have things been going on a kind of personal level for Dan?
Andrew Bakaj: Yeah. No, you know, from my perspective, you know, I don't wanna speak for Dan, but it's not been easy. Obviously, he's, you know, experienced threat threats in the past. But, you know, I, I do believe from speaking with him, that he's empowered and he feels empowered because he can become an example for others to come forward. And, and that's really what he wants. He wants others to feel confident and comfortable knowing that there is a path forward to do this lawfully, meaning not, you know, properly handling the sensitive data by going to Congress, etc. And then you don't have to take the specific path that Dan took, you can do this anonymously.
So Dan's doing pretty well. He's hopeful that he is a good example of how to do the right thing for the right reasons. And also somebody, you know, who just wants what we were discussing at the beginning, which is an investigation for somebody to look, find out what happened, and fix it.
Kevin Frazier: And two things to drill down on in terms of just to, to touch on Dan's experience for a second, he has been, received some, some threatening messages, right? Even photos of his home and family notices of, of named loved ones, if, if I'm correct?
Andrew Bakaj: Yes.
Kevin Frazier: Right. I, I think when you assess the experience of someone like Dan, what additional protections would you like to see perhaps for whistleblowers? Or perhaps are there, are there state equivalents that perhaps afford greater protection for folks like Dan or other jurisdictions that may be a model so that folks could feel a little bit more shielded from that sort of backlash?
Andrew Bakaj: You know, I wish that there was a way to have whistleblowers be physically protected from all sorts of retaliation. The state and federal governments don't necessarily provide that. That's typically something that's reserved for, you know, witnesses and, and major criminal investigations, you know, like the mob as we've seen in movies and whatnot, right, the witness protection programs. But, you know, we at Whistleblower Aid and other organizations as well are looking at ensuring that prospective whistleblowers are protected and, and have a good and, and, and healthy path forward.
I don't wanna dissuade anybody from coming forward. I know that this is a difficult decision to make, but that's why there are ways in which we can do this without even having somebody be publicly identified about being the whistleblower, right.
And also, you know, there is, you know, in some respects, safety in numbers. You know, the more that something is known commonly within an agency or a lot of people know about it, it'll be harder to identify who the whistleblower may be. And so, you know, but it just takes one individual to be able to come forward with the receipts, if you will, and bring it to somebody's attention for investigation.
And, you know, there, there's a way to do this that is effective. It gets it, we get it to the right people, and then our clients are able to pivot and move on with their lives. And I know it's a difficult time for federal employees now, you know, federal sector wide, but know that you're not alone and you can do it.
Kevin Frazier: We've noted also that this isn't the first alleged incident of DOGE misconduct at a specific agency. What do you think from your experience at Whistleblower Aid is the chief barrier to more folks following Dan's lead or doing so even anonymously? What are the main barriers when we see kind of the, the scholarship in this area? Why aren't more folks coming forward on the aggregate?
Andrew Bakaj: I think in this particular, on, on this particular issue, it's fear. I, I think people are genuinely afraid to come forward. You know, when you have your colleagues losing their jobs because of RIFs and, you know, 30% cuts with agencies and you have a mortgage and you know, kids, what kids, whatever life to pay for, it's, it's not an easy thing to do.
But at the same time, you know, sitting by and watching these things happen, if you see it, right and know that it's happening, not scuttlebutt, but actually see something going wrong, there is a way to come forward and there is a way to come forward in a way that protects you through anonymity. And so some clients, you know, are comfortable being out there, you know, in in full name like Dan, I've represented many clients who have done this anonymously and we've done it successfully.
Kevin Frazier: And when you say I've seen something, say something or see something, document something, is there a threshold for which someone can receive whistleblower protection in terms of, oh, I may be uneasy with something politically and that rubs me the wrong way, whereas I see something that may be going against either a federal regulation or federal law—how do you clarify that difference for folks who are thinking, huh, maybe I should be reaching out to Andrew. What's the, the gulf between those two?
Andrew Bakaj: So, if you're a federal employee and you disagree with the policies of an administration, that's not for us to you, you to determine. You're there to serve the nation regardless of who the president is and you know, if you disagree, the particular policy, decision, c’est la vie, that's, that's one thing.
But if you see somebody who is, you know, engaging in potential violations of law, rule or regulation, fraud, waste, or abuse, and, and you see that, that's where you, you've crossed the threshold of there being potential wrongdoing, right?
So if you see somebody, for example, intentionally mishandling, mishandling classified information, or engaging in contract fraud—which, which, which has happened, that's why we have IGs conducting these investigations. Or like in Dan's case, you see the questionable exfiltration of data, and the manner in which that, you know, DOGE appears to have conducted itself, violates various laws with respect to systems protection, etc.—that's something that's actionable. And the threshold for, for that is that you have a reasonable belief that something's happening wrong.
You know, a lot of folks over time, whenever they attack whistleblowers, they usually do, they attack whistleblowers in two ways. One, they say that they're, they're disgruntled employees, one, or two, that they're wrong.
And by the way, you want people to come forward, you know—and like Dan said, you know, he hopes that he's wrong, I don't, he doesn't think he is. I think he's, he's got, he's, he's got, you know, what he saw was really concerning—but you know, the idea is to come forward, have somebody take an independent look, mitigate the problem, and fix it.
Kevin Frazier: So before we let you go back to all the important work you're taking on right now, what should we be tracking in this declaration? What should we be expect to happen next? Are we looking for Congress to maybe formally declare that it wants to launch an investigation? Should we be paying attention to the NLRB?
What's next? What may we see?
Andrew Bakaj: What I hope is, is that whether it's at the executive branch, that there is an investigation. You know, there, there can be different agencies looking at the, at the same fact pattern from different vantage points, right? One agency may be looking to see whether or not there was criminal misconduct. Another agency may be looking at determining whether or not there were any flaws within the systems that can allow for a data breach to occur, not just because of what happened but going forward is, are the systems secure
Congress needs, in my opinion, should be conducting over, oversight of all of this in a bipartisan manner, determine what is and isn't happening. Because, you know, when it comes to the security or national security, you know—again, the amorphous term national security—but also data security of American citizens, I, I think we can all agree on, we wanna ensure that that's protected.
And the only way to know what to do is if you have people who can conduct an independent investigation and those who know how to conduct an investigation in this space, right? So for example, when I served previously in the federal government, I, I was an investigator. But I would not be the best person to conduct an investigation of highly technical things; that's why I have subject matter experts do that. So you want to have an independent investigation run by folks who know how this stuff needs to be looked at, and that's what we need to call for.
And again, I'm hoping that, you know, this is going to be a bipartisan issue. I know that unfortunately, you know, politics is the way it is, but it doesn't have to be that way.
Kevin Frazier: Andrew, thank you so much for joining us. We'll have to leave it there and best of luck.
Andrew Bakaj: Thank you so much. Thank you for having me on.
Kevin Frazier: The Lawfare Podcast is produced in cooperation with the Brookings Institution. You can get ad-free versions of this and other Lawfare podcasts by becoming a Lawfare material supporter at our website, lawfaremedia.org/support. You'll also get access to special events and other content available only to our supporters.
Please rate and review us wherever you get your podcasts. Look for our other podcasts, including Rational Security, Allies, The Aftermath, and Escalation, our latest Lawfare Presents podcast series about the war in Ukraine.
Check out our written work at lawfaremedia.org. The podcast is edited by Jen Patja. Our theme song is from Alibi Music. As always, thank you for listening.