7 min read
7 min read

Microsoft has confirmed that China-based engineers will no longer work on Department of Defense cloud projects.
This move follows a ProPublica investigation exposing how these engineers supported sensitive Pentagon systems under loose supervision.
In response to mounting security concerns, Microsoft revised its protocols to ensure that only US-based personnel now handle technical support for these contracts, aiming to reduce cybersecurity risks and address growing pressure from US defense and intelligence officials.

Investigative outlet ProPublica revealed that Microsoft’s Pentagon cloud projects relied on engineers in China for maintenance tasks.
These engineers operated under minimal supervision from US “digital escorts” lacking technical expertise, raising fears about espionage and unauthorized system access.
Microsoft’s use of this model reportedly began over a decade ago. The revelation sparked immediate backlash from lawmakers and defense officials concerned about the potential vulnerabilities this practice created for critical national defense infrastructure.

To comply with security rules, Microsoft had employed US citizens with security clearances, known as “digital escorts,” to oversee China-based engineers. However, these escorts were often underqualified to effectively understand or monitor the engineers’ actions.
They typically followed instructions from Chinese experts without being able to assess the risks or spot malicious activity. One escort said bluntly, “We’re trusting that what they’re doing isn’t malicious, but we really can’t tell.”

Defense Secretary Pete Hegseth publicly denounced the reliance on foreign engineers for Pentagon systems. He emphasized that engineers from adversarial nations, “including China,” should never be permitted to access or maintain Department of Defense infrastructure.
Following the ProPublica report, Hegseth ordered an urgent two-week review of all Pentagon cloud contracts to identify similar vulnerabilities and promised decisive action to protect US military cybersecurity.

Microsoft’s Chief Communications Officer, Frank X. Shaw, announced on social media that China-based engineering teams would no longer assist with any DoD cloud or related services.
Shaw said Microsoft is working with national security partners to evaluate and update its security protocols.
He stressed the company’s commitment to providing the most secure services possible to the US government, positioning the change as part of Microsoft’s ongoing cybersecurity improvements.

Senator Tom Cotton, a key voice on the Senate Select Committee on Intelligence, demanded detailed explanations from Microsoft and the Department of Defense.
In a formal letter, he sought information about all contractors using foreign engineers on Pentagon projects.
Cotton warned that China remains one of the most aggressive cyber threats to the US, and outsourcing sensitive technical tasks to Chinese personnel presents unacceptable national security risks.

Since 2011, US regulations have mandated that cloud providers working with federal agencies, especially the Pentagon, ensure personnel with adequate security clearances handle sensitive data.
Microsoft sidestepped this by using “digital escorts” with clearances to act as intermediaries between US government systems and foreign engineers, including those based in China.
This workaround, though technically compliant, raised significant concerns once publicly revealed.

Microsoft’s lucrative federal cloud deals were a key reason its China-based engineers became involved in Pentagon projects.
Competing with giants like Amazon and Google, the company adopted the digital escort model to leverage its global workforce, especially Chinese and Indian teams.
While profitable, this decision risked exposing sensitive defense systems to foreign oversight, sparking the controversy that now forces Microsoft to change.

Microsoft’s Azure cloud platform is central to its government contracts, including military cloud services. After the ProPublica report, Microsoft announced that China-based engineers would no longer be allowed to support Azure-related Pentagon work.
Analysts estimate Azure contributes over 25% of Microsoft’s revenue, underscoring the importance of maintaining trust with US government clients while addressing cybersecurity concerns surrounding Azure’s operations.

The Pentagon’s review, initiated by Defense Secretary Hegseth, may uncover similar vulnerabilities across other government systems maintained by contractors like Microsoft.
Officials plan to investigate whether foreign engineers from adversarial nations have worked on sensitive US systems elsewhere.
This heightened scrutiny reflects broader concerns about supply chain integrity and cybersecurity during escalating tensions between the US and China.

The practice of using China-based engineers supervised by US “digital escorts” dates back at least to 2016. Digital escorts acted as intermediaries, often copying and pasting commands from Chinese engineers into US defense cloud systems without understanding their functions.
This system persisted largely unnoticed by senior defense officials and lawmakers, illustrating how embedded specific vulnerabilities were within federal contracting processes over time.

Before revising its protocols, Microsoft asserted that its personnel and subcontractors operated in line with US government rules. It pointed to its Lockbox review process, where specific engineer requests were checked for safety.
Microsoft claimed that foreign engineers never had direct access to Pentagon customer data. However, widespread concern about indirect influence and command execution led to the policy shift to exclude China-based engineers.

Microsoft’s internal security measures, like Lockbox, and training for digital escorts, were intended to safeguard sensitive cloud systems. However, the ProPublica investigation revealed these defenses were inadequate.
The digital escorts often lacked the technical understanding necessary to detect cyber threats embedded in code or command scripts, rendering safeguards ineffective against determined adversaries or insider threats.

This development comes amid growing tech and trade hostilities between the US and China. Both nations have introduced strict regulations limiting each other’s access to strategic technologies.
The revelation that engineers in China worked on Pentagon systems fed fears of espionage, especially given known Chinese cyber intrusions targeting US infrastructure. National security experts warn that such oversight gaps risk catastrophic security breaches.

Microsoft relied on third-party staffing firms to hire its US digital escorts. Insight Global, a key subcontractor, assured recruits of adequate technical skills. However, reports suggest many escorts were ex-military personnel with minimal coding experience.
This subcontractor-dependent model complicated oversight and raised questions about whether subcontractors prioritized cost savings over securing critical infrastructure.
Want to see where Microsoft’s focus is shifting next? Check out how its new AI agent is reshaping Windows 11 here.

The incident involving Microsoft and its China-based engineers spotlights critical supply chain vulnerabilities in national defense systems.
In an era of digital warfare and cyber espionage, trusting third-party contractors or foreign personnel with sensitive tasks exposes US infrastructure to significant risks.
Microsoft’s policy change represents a reactive safeguard, but the broader lesson is clear: securing supply chains must now be a top national priority.
Curious how Microsoft’s latest security moves impact everyday users? Find out why it’s now blocking Chrome here.
What do you think about Microsoft laying off Chinese engineers from the workplace? Please share your thoughts and drop a comment.
Read More From This Brand:
Don’t forget to follow us for more exclusive content on MSN.
This slideshow was made with AI assistance and human editing.
This content is exclusive for our subscribers.
Get instant FREE access to ALL of our articles.
Dan Mitchell has been in the computer industry for more than 25 years, getting started with computers at age 7 on an Apple II.
We appreciate you taking the time to share your feedback about this page with us.
Whether it's praise for something good, or ideas to improve something that
isn't quite right, we're excited to hear from you.
Stay up to date on all the latest tech, computing and smarter living. 100% FREE
Unsubscribe at any time. We hate spam too, don't worry.

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!