Pentagon launches full-scale inquiry into Microsoft’s use of CCP-linked engineers
By willowt // 2025-08-29
 
  • The Pentagon is conducting a comprehensive audit of Microsoft’s practices, focusing on the "Digital Escorts" program.
  • A third-party audit of all code and submissions tied to Chinese engineers will be required.
  • Hegseth declared an end to the use of Chinese nationals in U.S. defense cloud environments.
  • The Defense Department is conducting its own investigation into the program and the engineers involved.
  • The probe aligns with the Trump administration’s push to tighten cybersecurity and reduce reliance on foreign tech workers.
Defense Secretary Pete Hegseth announced on Wednesday that the Pentagon has initiated a full-scale investigation into Microsoft for employing Chinese Communist Party (CCP)-linked engineers to work on U.S. military and Pentagon cloud contracts. The probe, which stems from a controversial program known as "Digital Escorts," aims to determine whether China-based engineers had indirect access to highly sensitive national security infrastructure and whether any malicious code or vulnerabilities were introduced.

Background on the digital escorts program

The "Digital Escorts" program, initiated during the Obama-Biden administration, ostensibly allowed U.S. citizens with security clearances but limited technical expertise to act as intermediaries for China-based engineers working on critical defense systems. Despite being marketed as compliant with security protocols, the arrangement effectively provided foreign nationals with indirect access to classified defense infrastructure, raising significant security concerns. The program was designed to address a shortage of skilled U.S. citizens in the tech sector, but it has come under intense scrutiny for its potential security risks. Critics argue that the program not only compromised the integrity of U.S. defense systems but also opened up avenues for espionage and data theft. “The use of Chinese nationals to service Department of Defense cloud environments — it’s over,” Hegseth declared during a briefing. “We’re requiring a third-party audit of Microsoft’s digital escort program, including the code and submissions by Chinese nationals. This audit will be free of charge for U.S. taxpayers.” The Pentagon has taken immediate steps to sever ties with Microsoft’s CCP-linked engineers and is implementing a comprehensive review of all existing contracts. Hegseth emphasized that the Pentagon will not tolerate any compromises to national security and is committed to ensuring that all defense systems are secure and free from foreign interference.

Concerns over national security

The Pentagon’s investigation is driven by the need to ensure that no malicious code or backdoors were inserted into U.S. military systems. Cybersecurity experts and defense analysts have expressed serious concerns over the potential vulnerability created by the "Digital Escorts" program. Michael Lucci, CEO of State Armor: “Microsoft’s gross irresponsibility in creating this backdoor should be fully exposed, and if laws were broken, those responsible should be prosecuted. The integrity of our national defense systems must be a top priority.”

ProPublica report highlights risks

A recent ProPublica report detailed how roughly 50 U.S. citizens with security clearances relayed hundreds of commands from Chinese engineers without knowing what was being executed inside defense servers. Employees reportedly raised repeated warnings about the risks, but their concerns were not adequately addressed. The report revealed a pattern of negligence and lack of oversight, with some employees describing a culture of complacency and a focus on meeting project deadlines at the expense of security. These findings have further intensified calls for a thorough and transparent investigation.

Trump administration’s cybersecurity focus

The Trump administration has made tightening cybersecurity and reducing reliance on foreign tech workers a top priority. Hegseth emphasized the importance of addressing the issue promptly and thoroughly. “This never should have happened in the first place. But once we found out about it, we attacked it aggressively from the beginning, and we’re going to follow all the way through the tape to make sure this is addressed.” The administration has taken several steps to bolster cybersecurity, including increasing funding for cybersecurity research and development, implementing stricter vetting processes for tech workers and enhancing international collaboration on cyber threats.

Ensuring the integrity of U.S. defense systems

The Pentagon’s investigation into Microsoft’s use of CCP-linked engineers underscores the critical need to safeguard U.S. national security. As the audit and parallel investigations proceed, the focus remains on ensuring that no foreign interference compromises the integrity of America’s defense networks. Supporters of human freedom have raised concerns over a covert cyber operation orchestrated by the Chinese Communist Party that has allowed them to maintain unauthorized access to U.S. networks and allied systems for an extended period. According to Israel Soong, who holds a significant position at the National Security Council as the director for East Asia and Pacific Cyber Policy, this digital assault is part of a broader strategy employed by the CCP aimed at preparing for potential attacks on critical infrastructure. If you cannot spread awareness, let me share something with you. I have been informed at the highest levels that our Pentagon is involved in a serious issue. In the next hour, Roy McKenzie will reveal information about how China may have compromising data on our troops through their servers. They managed to access cell phones and desktop computers using voting software funded by the Department of Defense. The Pentagon’s actions and the forthcoming revelations by McKenzie highlight the urgent need for accountability and transparency in matters of national security. The public’s role in exposing and addressing these issues is more critical than ever. Sources for this article include: YourNews.com Vinnews.com emni.life