Norms Impact
Musk’s DOGE Goons Trashed Office and Left Drugs Behind
A private donor’s “efficiency” unit used armed force and unilateral control to illegally seize a congressionally chartered institution—then left the public to pay for the wreckage.
Jun 3, 2025
⚖ Legal Exposure
Sources
Summary
A federal judge ruled that the “department” of government efficiency lacked authority to seize the U.S. Institute of Peace’s $500 million Washington headquarters or fire its employees, and the institute returned to a damaged, vermin-affected building with discarded marijuana reported on site. The episode reflects an attempted extra-statutory assertion of power over a congressionally founded, independent nonprofit corporation using armed law-enforcement presence and unilateral operational control. The practical consequence is forced institutional recovery—restoring systems, records, and public research—after an illegal occupation that imposed real costs and disruptions on a public-purpose entity.
Reality Check
This is the template of democratic backsliding: using state power to physically displace lawful leadership, seize assets, and erase institutional memory without statutory authority, leaving our rights hostage to whoever can command the next raid. If agents and officials participated in destroying records or impairing systems, the conduct risks federal exposure under 18 U.S.C. § 1519 (destruction or falsification of records) and 18 U.S.C. § 1030 (computer-related damage), alongside theft/embezzlement theories tied to seized funds or property under 18 U.S.C. § 641. Even where individual criminal intent is contested, the norm breach is unmistakable—weaponized enforcement to execute an unlawful takeover is an abuse of office that teaches every independent institution it can be erased first and litigate later.
Legal Summary
The article describes an allegedly unauthorized takeover later rejected by a federal judge, followed by seizure of funding, shredding documents, wiping IT systems, and disabling a website—facts that align with potential criminal exposure (conversion of property/records, computer damage, and record destruction). While the drugs/vermin allegations are largely ancillary, the core pattern reflects high-risk abuse of power with tangible harm and asset/records impairment, supporting a Level 3 exposure pending evidence of intent, methods, and responsible individuals.
Legal Analysis
<h3>18 U.S.C. § 641 — Theft/Conversion of Government Property</h3><ul><li>Allegations that DOGE personnel “seize[d] [USIP’s] funding,” wiped IT systems, and removed/destroyed institutional assets (website/research) support conversion or knowing unauthorized control over federally connected property/records.</li><li>A federal judge ruled DOGE lacked authority to seize the headquarters or fire employees, strengthening the inference that subsequent control over assets was unauthorized.</li></ul><h3>18 U.S.C. § 1030 — Computer Fraud and Abuse Act (unauthorized access/damage)</h3><ul><li>Allegations of wiping IT systems and taking down the website (including 40 years of research) indicate potential intentional “damage” to protected computers/systems.</li><li>The finding that DOGE lacked authority to take over the entity supports the “without authorization/exceeds authorized access” element, though specific access methods/credentials are not stated.</li></ul><h3>18 U.S.C. § 1519 — Destruction/Alteration/Falsification of Records in Federal Matters</h3><ul><li>Allegations that DOGE staff “shred[ded] its documents” and wiped systems during an assertedly unlawful takeover implicate destruction of records in connection with a federal matter.</li><li>Gaps: article does not specify a particular pending investigation; exposure increases if destruction occurred to impede oversight, litigation, or anticipated inquiries.</li></ul><h3>18 U.S.C. § 371 — Conspiracy to Defraud the United States</h3><ul><li>Coordinated actions to force out employees with armed agents and then seize funding/disable systems after a purportedly unauthorized takeover can support an agreement to impair lawful government/nonprofit functions by deceitful or improper means.</li><li>Gaps: article does not detail internal communications or formal roles, but the described coordinated operation supports investigative inference.</li></ul><h3>18 U.S.C. § 242 — Deprivation of Rights Under Color of Law (investigative risk)</h3><ul><li>Use of armed agents and law-enforcement involvement to remove employees in an action later deemed unauthorized raises exposure if personnel knowingly used color of law to unlawfully dispossess staff of workplace/property access.</li><li>Gaps: requires proof of willfulness and a cognizable right; article provides the judge’s authority ruling but not individual mental states.</li></ul><h3>Ethics/Administrative Misconduct — Abuse of Authority; Misuse of Government Resources</h3><ul><li>Allegations of illegal takeover, negligent property stewardship (vermin/water damage), and possible drug presence in a federal-adjacent workplace reflect serious governance and compliance failures.</li></ul><b>Conclusion:</b> The reported conduct goes beyond procedural irregularity and presents prosecutable structural abuse-of-power exposure centered on unauthorized seizure/control and destruction of assets/records and potential computer-system damage; the judge’s lack-of-authority ruling materially strengthens criminal inferences pending investigation of intent and specific acts.</p>
Detail
<p>USIP leadership returned to its Washington, D.C., headquarters on May 22 after being out of the building for about two months. Acting President and CEO George Moose stated in a sworn statement that staff found water damage and evidence of rats and cockroaches, problems he said the building had not previously experienced.</p><p>The return followed a federal judge’s ruling last month that the “department” of government efficiency did not have authority to seize USIP’s $500 million headquarters or to fire its employees. USIP was founded by Congress in 1984 as a nonprofit corporation and describes its mission as preventing and resolving violent conflict abroad.</p><p>During the mid-March attempt to remove staff, USIP employees refused to leave and maintained the actions were illegal. DOGE brought in armed agents from the FBI, the D.C. Metropolitan Police, the U.S. District Attorney’s Office, and a private security firm to force employees out. After gaining access, an employee told MSNBC that DOGE wiped USIP’s IT systems, shredded documents, seized funding, and took down the USIP website, including decades of research. The Economist reported that cleaners later found discarded marijuana after DOGE vacated the building.</p>