Kristi Noem says DHS employees installed spyware on her devices, credits Musk team with uncovering it
Homeland Security Secretary Kristi Noem revealed that employees within her own department installed software on her phone and laptop to surveil her, record meetings, and monitor political appointees. The discovery, which Noem described as recent, came with an assist from Elon Musk and his team.
Newsweek reported that Noem disclosed the spying operation during an appearance on Patrick Bet-David's conservative podcast, in an episode released Thursday. She did not name the employees involved or specify the software used, but she was unequivocal about what it was designed to do.
"[Musk] helped me identify that some of my own employees in my department had downloaded software on my phone in my laptop to spy on me, to record our meetings and they had done that to several of the politicals."
"Several of the politicals" is a striking phrase. It suggests this wasn't a rogue IT worker with a grudge. It was a coordinated effort targeting political appointees, the very people voters put into power through elections, carried out by career staff who answer to no one at the ballot box.
A Hidden Room With Hidden Files
The spyware wasn't the only discovery. Noem also revealed that a Sensitive Compartmented Information Facility, or SCIF, was found on a university campus containing classified files that had apparently escaped anyone's official awareness. An employee stumbled onto it almost by accident.
Noem described someone who would "walk by a door, wonder what it was and ask questions about it," and that curiosity led to the find. Inside were files Noem said covered "some of these most controversial topics."
She offered no further detail on the contents, but the podcast conversation touched on subjects including the Jeffrey Epstein scandal and the assassination of John F. Kennedy in 1963.
Those files have now been turned over to attorneys.
A SCIF on a university campus, housing secret files that no one in leadership knew existed, found only because someone got curious about a door. The sentence almost writes itself.
The Deep State Isn't a Metaphor
For years, the phrase "deep state" was treated by legacy media as a conspiracy theory, a term deployed to discredit anyone who suggested that entrenched federal employees might work against the elected officials they nominally serve.
Every time an administration appointee claimed internal sabotage, the press ran the same playbook: call it paranoia, question the source, and memory-hole it within a news cycle.
But the pattern keeps repeating, and the specifics keep getting harder to wave away. Career employees installing surveillance software on a Cabinet secretary's personal devices is not a policy disagreement. It is not bureaucratic friction. It is espionage conducted against a sitting official by people drawing government paychecks.
The distinction matters. A bureaucrat slow-walking a policy directive is frustrating. A bureaucrat recording your meetings and monitoring your communications is something else entirely.
That's the kind of behavior that, in any private sector context, would end careers and invite criminal prosecution. In Washington, it apparently earns you anonymity and the quiet protection of a system that treats elected leadership as a temporary inconvenience.
Musk as the Unlikely Auditor
The fact that Noem credited Musk and his team with identifying the surveillance raises its own questions, not about Musk, but about DHS itself.
If the department's own internal security apparatus couldn't detect, or chose not to detect, spyware installed on the Secretary's devices, what exactly is it securing?
That Noem had to rely on outside expertise to discover what was happening on her own hardware tells you everything about the institutional rot. The people tasked with protecting the department's leadership were either complicit, incompetent, or both. None of those options should make anyone comfortable.
Noem also faces a class-action lawsuit in Maine that names her and DHS in claims of using technology to intimidate legal observers. The details in the public record remain thin, with no case name or filing date specified.
But the juxtaposition is worth noting: Noem stands accused of weaponizing technology while simultaneously discovering that technology was weaponized against her.
This is the environment in which Trump administration officials are attempting to govern. They arrive to run agencies that have spent years building their own insular power structures, complete with hidden facilities, undisclosed files, and apparently, the tools to monitor anyone who asks too many questions.
Newsweek contacted DHS for comment via email outside of normal working hours. No response was noted.
What Comes Next
The files have been handed to attorneys. The spyware has been identified. But the employees who installed it remain unnamed, and no public accountability has followed. That gap between discovery and consequence is where Washington buries its scandals.
If career federal employees can install surveillance software on a Cabinet secretary's phone and face no public reckoning, the message to every other bureaucrat is simple: the system protects its own.
The question now is whether this administration treats the discovery as a starting point or lets it become another data point in a pattern everyone acknowledges and no one punishes.
Someone bugged the Homeland Security Secretary's phone. The people who did it still work for the government she runs. That's the story.



