assessment assessment
Mar 5, 2026 YNTK Red Cell 13 min read Loyalty State

ASSESSED: The Loyalty Purge Apparatus Is Degrading US National Defense

Red cell assessment of how informal loyalty enforcement networks — operating outside accountability structures — are systematically degrading the competence, morale, and institutional knowledge of US national security agencies.

red-cellassessmentloyalty-statenational-security

BOTTOM LINE UP FRONT

The United States is conducting a systematic purge of competence from its national security apparatus and replacing it with loyalty signaling. This is not a policy disagreement. This is not partisan framing. This is a structural degradation of the institutions responsible for defending 330 million people, driven by actors with no security clearances, no institutional knowledge, no accountability, and no apparent understanding of what they are destroying.

The pattern is not new. Every state that has prioritized political loyalty over institutional competence in its security services has suffered catastrophic capability loss. The United States is now running this experiment on the most powerful military and intelligence apparatus in human history.


1. THE PERSONNEL DESTRUCTION CHAIN

Between April and November 2025, a single social media influencer — Laura Loomer, a twice-failed congressional candidate with no government experience, no security clearance, and no intelligence training — drove the firing or removal of at least 15-16 officials across six federal agencies. The targets include:

  • The NSA Director and US Cyber Command chief (Gen. Timothy Haugh) — the officer responsible for both offensive and defensive cyber operations for the entire United States
  • The NSA Deputy Director (Wendy Noble) — removed in the same Oval Office meeting
  • The NSA General Counsel (April Falcon Doss) — the senior legal authority on surveillance authorities and cyber operations law
  • Six or more National Security Council staffers — the interagency coordination body that synthesizes intelligence for presidential decision-making
  • The former CISA Director’s post-government career (Jen Easterly) — her West Point faculty appointment rescinded within 24 hours of a Loomer X post

The mechanism: Loomer identifies targets through social media tips from followers, contacts cabinet officials directly (she has Trump’s cell phone number and secured an Oval Office meeting in April 2025), posts on X to 1.7 million followers if private pressure fails, and sustains campaigns for days to months until the target is removed. The verb “Loomered” has entered the political lexicon.

What this means for cyber defense: The nation’s top cyber warfare officer was removed not because of operational failure, not because of misconduct, not because of incompetence — but because a social media influencer compiled a list of names and brought it to the Oval Office. His replacement must now calculate, consciously or not, whether any decision they make might attract the attention of someone with no understanding of what the NSA does but absolute power to end their career with a single post.


2. THE INSTITUTIONAL KNOWLEDGE HEMORRHAGE

When Jen Easterly’s West Point appointment was rescinded within 24 hours of a Loomer post tagging Defense Secretary Hegseth, the message to every national security professional in the US government was unambiguous: there is no safe harbor. Not active service, not retirement, not academia. Your entire career — past, present, and future — is subject to retroactive vetting by people who have never held a clearance.

What walks out the door when these officials leave is not replaceable by hiring:

Operational knowledge — understanding of classified programs, threat landscapes, source networks, and ongoing operations that exists in no document and no database. When the NSA General Counsel is removed, the institutional memory of how surveillance authorities have been interpreted, challenged, and defended across administrations leaves with her. Her replacement starts from zero.

Relationship capital — the trust networks between agencies, between the US and allied intelligence services, and between leadership and the workforce that take years to build. Five Eyes partners, NATO intelligence liaisons, and signals intelligence sharing agreements depend on personal trust between specific humans. When those humans are purged, the relationships are not automatically inherited by their replacements.

Deterrent credibility — adversaries assess US capability partly by the competence of the people running the systems pointed at them. When cyber defense leadership is selected by social media consensus rather than demonstrated expertise, adversaries update their risk calculations accordingly.


3. THE TIP LINE AND THE INFORMANT CULTURE

In July 2025, Loomer launched a public tip line for federal employees to anonymously report “disloyal” colleagues. She described it as “a form of therapy for Trump administration officials who want to expose their colleagues.” She anticipates “hundreds” more removals.

Assess the second-order effects:

Recruitment collapse. The intelligence community and DoD already struggle to recruit top technical talent against private sector compensation. The value proposition was mission, purpose, and service. The new value proposition is: work on the hardest problems in national security, and if a coworker with a grievance decides you’re insufficiently loyal, a social media influencer with no clearance will end your career and there is no appeals process.

Retention crisis. Mid-career professionals with 10-20 years of irreplaceable expertise are the backbone of institutional capability. They are also the most mobile — they can leave for the private sector tomorrow. Every one of them is now calculating whether the mission is worth the risk of being “Loomered.” The ones who stay are not necessarily the most capable. They are the ones most willing to be silent.

Morale destruction. When promotion, retention, and career survival depend on perceived loyalty rather than demonstrated competence, rational actors optimize for loyalty signaling. They attend the right events, express the right opinions, avoid the wrong associations, and above all, they do not dissent. Dissent is how intelligence agencies avoid catastrophic failure. The entire purpose of competitive analysis, red teaming, and alternative assessment is to surface uncomfortable truths before they become operational disasters. A workforce that has been taught that uncomfortable truths end careers will not produce them.

The informant dynamic. Anonymous tip lines for reporting political disloyalty among colleagues are not an innovation. They are one of the oldest tools of authoritarian control. The practical effect is that every professional interaction — every meeting, every email, every hallway conversation — now carries the risk that the person you are speaking to might report you. This does not produce loyalty. It produces fear, silence, and the systematic elimination of honest communication within the organizations responsible for national security.


4. THE DEFENSE SECRETARY AND THE FOR-PROFIT OPPO FIRM

In August 2025, CNN reported that Defense Secretary Pete Hegseth had spoken directly with Laura Loomer “to discuss her work on finding disloyal employees in the Department of Defense.”

Parse this carefully: a sitting Secretary of Defense is collaborating with a private citizen who runs a for-profit opposition research firm (Loomered Strategies, launched March 2025, Montana LLC, approximately $300,000 gross income, actively pitching the White House Presidential Personnel Office for government vetting contracts) on military personnel decisions.

The counterintelligence implications are severe:

A private entity with no security clearance, no oversight, no Inspector General, and no legal accountability is collecting information on the political beliefs and associations of military and intelligence personnel. This information is being used to influence career-ending decisions at the cabinet level. The entity has a financial incentive to find “disloyalty” — the more people it flags, the more its services are worth.

Any foreign intelligence service watching this — and they are all watching — sees an obvious attack surface. Loomer’s tip line is an open channel for feeding disinformation into the US personnel security system. A fabricated tip, properly constructed, could remove a specific target from a specific position. The influencer-driven purge mechanism has no verification process, no due process, and no counterintelligence screening. It is, from an adversary perspective, a gift.

Separately: Loomered Strategies’ business partner, Eric Silverstein, operates the anonymous X account @CcpSkipTracer. The business partner of the person vetting federal employees for loyalty uses a pseudonymous social media account. The irony is structural.


5. THE PARALLEL SCANDAL: WHEN LOYALTY NETWORKS BECOME CONTRACTING VEHICLES

On March 5, 2026, President Trump fired DHS Secretary Kristi Noem following congressional testimony revealing that her department awarded $142.8 million in no-bid contracts to Safe America Media LLC — a Delaware shell company incorporated on February 6, 2025, eight days before receiving its first contract. The company had no website, no headquarters, no employees, and no federal contracting history.

The money flowed from Safe America Media to The Strategy Group, an Ohio firm run by Ben Yoho — who is married to Tricia McLaughlin, Noem’s DHS Assistant Secretary for Public Affairs, whose office funded the contracts. Yoho was connected to Noem through her top adviser Corey Lewandowski, who ProPublica documented personally approving DHS contracts despite Noem’s sworn testimony that he played no such role.

The contracts were deliberately exempted from DOGE review using immigration, law enforcement, and emergency spending carve-outs in Trump’s own executive order.

The pattern: Informal loyalty networks — built through political campaigns, personal relationships, and shared political identity — become the channel through which public money flows to private entities controlled by network members. The shell company exists not to perform work but to obscure the connection between the decision-maker and the beneficiary. The work itself is secondary to the relationship. Eight days of corporate existence and zero operational capability were sufficient to receive $142.8 million because the selection criteria were not competence, experience, or capability. The selection criteria were proximity and loyalty.

This is not a bug in the system. This is what loyalty-based governance produces. When personnel decisions are made on loyalty rather than competence, contracting decisions follow the same logic. The same networks that decide who stays and who goes also decide who gets paid.


6. THE CHILLING EFFECT IS THE POINT

The conventional analysis treats the chilling effect as a side effect — an unfortunate consequence of overzealous loyalty enforcement. This assessment disagrees. The chilling effect is the primary product.

A national security workforce that self-censors — that avoids dissent, avoids challenging assumptions, avoids delivering bad news, avoids associating with anyone who might be perceived as disloyal — is a workforce that will not prevent the next intelligence failure. It is a workforce optimized to tell leadership what leadership wants to hear.

The 9/11 Commission identified exactly this dynamic — the failure to challenge assumptions, the reluctance to deliver unwelcome assessments, the organizational pressure toward consensus — as a root cause of the intelligence failure that preceded the September 11 attacks. The loyalty purge apparatus is deliberately constructing the conditions the 9/11 Commission identified as catastrophic.

Career professionals now face a calculation with no good answer: speak honestly and risk being “Loomered,” or stay silent and risk being complicit in whatever the next failure produces. The rational career move is silence. The rational career move is also the one that gets people killed.


7. HISTORICAL PARALLELS — THE PATTERN IS NOT NEW

Every regime that has subordinated institutional competence to political loyalty in its security services has paid for it in blood.

Soviet political commissars (1937-1941). Stalin’s Great Purge removed 3 of 5 marshals, 13 of 15 army commanders, 50 of 57 corps commanders, and 154 of 186 division commanders from the Red Army between 1937 and 1938. Officers were replaced based on political reliability rather than military competence. The result was the catastrophic performance of the Red Army in the Winter War against Finland (1939-40) and the near-destruction of the Soviet military in the opening months of Operation Barbarossa (1941). The Soviet Union lost approximately 4.3 million soldiers in the first six months of the German invasion — a casualty rate directly attributable to the incompetence of politically-selected commanders replacing the experienced officers who had been purged.

Ba’athist Iraq (1979-2003). Saddam Hussein’s security services prioritized tribal and political loyalty above all other criteria. Senior military commanders were selected from the Tikrit region and Ba’ath Party ranks regardless of competence. Officers who demonstrated independent judgment were eliminated. The result was an Iraqi military that looked formidable on paper but collapsed under contact with a competent adversary — twice, in 1991 and 2003. Iraqi generals could not exercise initiative because initiative had been systematically punished for decades.

Turkish military purge (2016-present). Following the 2016 coup attempt, the Erdogan government purged approximately 150,000 personnel from Turkish state institutions, including thousands of military officers. NATO allies have documented significant capability degradation in the Turkish armed forces, particularly in technical specialties (signals intelligence, cyber operations, pilot training) where institutional knowledge is difficult to replace.

The common thread: loyalty-selected leadership performs adequately in peacetime, when the primary task is maintaining internal political order. It fails catastrophically when confronted with an external adversary that does not care about your politics — only your competence.


8. ASSESSMENT

The United States is not yet at the scale of Stalin’s purge or Erdogan’s post-coup housecleaning. But the mechanism is identical: an extrajudicial loyalty enforcement apparatus operating outside institutional accountability structures, removing competent officials and replacing them with loyalty-signaling alternatives, while creating a surveillance and informant culture that punishes dissent and honest assessment.

The specific characteristics that make the current US implementation dangerous:

  1. No accountability structure. Loomer holds no office, has no clearance, faces no Inspector General, and cannot be fired. She is simultaneously more powerful than any Senate-confirmed official in personnel decisions and less accountable than a GS-7 filing clerk.

  2. Profit motive. Loomered Strategies has a direct financial incentive to maximize the number of people flagged as disloyal. More purges = more demonstrated power = more clients = more revenue. The loyalty enforcement apparatus is a business.

  3. No verification. There is no process for verifying whether a “disloyal” employee is actually disloyal, incompetent, or simply disliked by someone with access to the tip line. The standard of evidence is a social media post, not an investigation.

  4. Asymmetric consequences. The person who flags someone for disloyalty faces zero consequences if wrong. The person flagged faces career destruction. This asymmetry guarantees over-reporting and creates an incentive structure identical to anonymous denunciation systems in authoritarian states.

  5. Targeting expertise specifically. The officials removed are disproportionately senior technical leaders — the NSA Director, the Cyber Command chief, the CISA Director, the NSA General Counsel. These are not interchangeable political appointees. They are domain experts with decades of classified operational experience. Their removal degrades capability in proportion to their expertise.

The bottom line is this: The United States is systematically destroying the institutional competence of its own national security apparatus during a period of active military operations in the Middle East, rising cyber threats from state adversaries, and strategic competition with China. The mechanism of destruction is an informal loyalty enforcement network operated by a private citizen with a for-profit opposition research firm, a social media following, and the president’s phone number. No adversary could have designed a more effective capability degradation program.

The historical record is unambiguous about where this leads. The question is not whether the capability loss will become apparent. The question is what crisis will reveal it, and how many people will pay for the revelation.


This is a red cell assessment — analytical judgment informed by open-source intelligence, not sourced reporting. Red cell analysis deliberately adopts an adversarial perspective to stress-test assumptions and identify vulnerabilities that conventional analysis may miss. The assessments above represent the analytical conclusions of the authoring cell and do not claim to represent the positions of any government agency, institution, or official.