When talking about national security, there is something that should be out of all discussion: the secrets of a country must be guarded by people with experience, impeccable trajectory and without links with criminal activities.
For obvious reasons, Trusting in doubtful profiles can lead to serious consequences for state stability. However, in the environment of President Donald Trump, that logic seems to have completely diluted.
Now, under the orbit of the controversial Government Efficiency Department (Doge), promoted by Elon Musk, has been incorporated A young technologist just 19 whose personal and professional history is full of doubts.
His name is Edward Coristine And since his arrival to the Musk team, he has aroused a wave of concerns among analysts, cybersecurity experts and federal exagents, since he has been indicated for collaborating with cybercriminals.
A teenager with access to confidential systems of the US government
Coristine is not a recognized name in the business or institutional world, but in digital circles it has been identified under pseudonyms Big Balls y JoeyCrafter. It is a young man with an interesting profile, but whose trajectory is far from being that of a traditional public official.
Currently, it is part of the Doge team, the agency created by Musk to «optimize» the functioning of the federal government. An ambitious objective that, in this case, has tested the limits of the permissible.
This hacker has been indicated for multiple reasons, and that is that from a young age he has founded several companies – at least five – in the United States and the United Kingdom, some with provocative names such as Tesla.Sexy LLC.
It should be noted that this website has been involved in controversies related to its founder and the activities it performs. For example, it has been reported that it controls multiple web domains, including some registered in Russia, and offers services such as Helfie, an artificial intelligence bot for Discord servers aimed at the Russian market.
In addition, the company has been mentioned in reports related to harassment activities and doxingaccording to Distributed Denial of Secretsso, in the end, Musk’s trust hacker is not entirely reliable for experts.
Beyond the above, the main problem lies in the international links that it has established, with domains registered in Russia and Chinese operational content, factors that would normally raise automatic alerts in any national security verification process.
But that’s not all. His history also relates it to telegram forums and channels linked to cyber attacks due to service denial (DDOS). In some of those messages, under his alias Joeycrafter, he appears requesting suppliers to execute computer attacks of Capa 7 type, one of the most advanced and difficult to mitigate.
It is important to mention that This behavior fits with malicious actors patternsand not with that of someone who should have privileged access to United States government systems, it is for this reason that there are national security concerns.
A profile that should never have gone unnoticed
Experts are clear and claim that Edward Coristine would not have exceeded a standard security verification. Neither his professional history, nor his business movements, much less their publications in social networks would meet the requirements required by a safety authorization for sensitive positions.
This has stated exagents of the FBI and intelligence officers with decades of experience. Ex Hilbert, former federal bureau agent, has been blunt about it: «If I were in charge of its verification, I would have recommended not hiring it for this type of work. This is bad people.»

Edward Coristine
And, since his name began to come to public light linked to doge, The young man has disappeared his most committed social profiles. LinkedIn accounts, Telegram and X have been deleted or placed privately, but their trail is still present in specialized files and forums.
Why is such a controversial figure, with links with hacker environments and companies of doubtful legitimacy, has he obtained access to key government structures? Who authorized its incorporation without a rigorous background verification? And what implications can this have in the medium and long term?
This case not only reflects a negligent management, but also evidences how borders between cybersecurity and national security can be drunk dangerously when institutional control is left to doubtful profiles.
Know How we work in NoticiasVE.
Tags: hackers, Elon Musk