Microsoft is accused of allowing China-based engineers work on U.S. military cloud systems with minimal oversight and safeguards, according to a bombshell ProPublica report.
The details: Beginning in 2016, Microsoft established a program dubbed “digital escorting” where it paid U.S. contractors $18/hr to pair with foreign engineers who worked on federal cloud systems.
- The digital escorts were often ex-military with minimal tech skills.
- The “escorts” acted as intermediaries, entering commands into Pentagon servers on behalf of China-based engineers.
- The data fell below “classified” levels but included materials crucial to military operations.
In simple terms: Microsoft was paying these escorts for access to their security clearances.
Red flag: Experts worry that the digital escorts lacked the tech savvy to detect whether the Chinese engineers were engaging in sabotage or installing malware.
Aren’t there regulations to prevent this? Yes. Per Defense Department policy, individuals must be U.S. citizens or lawful permanent residents to access sensitive data.
Zoom out: In 2023, Chinese hackers breached Microsoft’s cloud and accessed data from the Commerce Secretary, the Ambassador to China, and the Pentagon.
What is Microsoft saying? They claim these foreign workers never had “direct access” to Pentagon data.
The last word goes to Michael Sobolik of the Hudson Institute, who said this program was “like asking the fox to guard the henhouse.”
UPDATE — Friday, July 18: In response to the controversy, Microsoft Chief Communications Officer Frank Shaw stated that the tech firm “has made changes to our support for U.S. Government customers to assure that no China-based engineering teams are providing technical assistance for DoD Government cloud and related services.”
“We remain committed to providing the most secure services possible to the U.S. government, including working with our national security partners to evaluate and adjust our security protocols as needed,” Shaw added.