• All News
  • |
  • World Travel
    • Africa
    • Asia
    • Europe
    • North America
  • |
  • Educational Articles
    • Art & Culture
    • Books & Literature
    • History & Politics
    • Lifestyle & Relationships
    • Professional Development
    • Science & Nature
  • |
  • About Us
    • About Us
    • Our Mission
    • Editorial Standards
    • Corrections Policy
  • Help
  • Contact Us
Monday, September 29, 2025
Login
THX News | Global News, Travel & Education.
  • USA
    • Business and Commerce
    • Immigration & Border Security
    • International
      • Africa
      • Asia
      • Europe
      • Middle East
    • Law & Order
    • Local Government
      • Arizona
        • Phoenix
        • Tucson
      • California
        • San José
      • Oregon
        • Happy Valley
        • Hillsboro
        • Josephine County
        • Portland
        • Salem
        • Washington County
      • Virginia
        • Loudoun
    • Medicine & Health
    • Military
    • Space & Exploration
    • Technology
  • Canada
    • Community
    • Culture
    • Healthcare
    • Housing & Home Building
    • International
    • Military
    • Obituaries
    • Politics
    • Technology & Innovation
  • United Kingdom
    • Economy and Economics
      • Business
      • Jobs & Employment
      • Money and Taxes
    • Energy
    • Environment
    • Medical
    • International
    • Law and Order
      • Immigration
    • Military
    • Science & Technology
      • Space and Exploration
      • Technology
      • Transport
    • Society & Culture
      • Culture
      • Education
      • Housing & Land
No Result
View All Result
THX News | Global News, Travel & Education.
  • USA
    • Business and Commerce
    • Immigration & Border Security
    • International
      • Africa
      • Asia
      • Europe
      • Middle East
    • Law & Order
    • Local Government
      • Arizona
        • Phoenix
        • Tucson
      • California
        • San José
      • Oregon
        • Happy Valley
        • Hillsboro
        • Josephine County
        • Portland
        • Salem
        • Washington County
      • Virginia
        • Loudoun
    • Medicine & Health
    • Military
    • Space & Exploration
    • Technology
  • Canada
    • Community
    • Culture
    • Healthcare
    • Housing & Home Building
    • International
    • Military
    • Obituaries
    • Politics
    • Technology & Innovation
  • United Kingdom
    • Economy and Economics
      • Business
      • Jobs & Employment
      • Money and Taxes
    • Energy
    • Environment
    • Medical
    • International
    • Law and Order
      • Immigration
    • Military
    • Science & Technology
      • Space and Exploration
      • Technology
      • Transport
    • Society & Culture
      • Culture
      • Education
      • Housing & Land
THX News | Global News, Travel & Education.
No Result
View All Result
Home News North America United States of America Military AI & Cyber Intelligence

Pentagon Halts Chinese Coders on Cloud

Defense Secretary Pete Hegseth ends Microsoft’s decade-old program involving Chinese engineers on DOD cloud systems, citing major cybersecurity risks.

Ivan Golden by Ivan Golden
1 month ago
in AI & Cyber Intelligence
Reading Time: 5 mins read
A A

Table of Contents

Toggle
    • Introduction
  • Discovery and Immediate Response
    • How the Digital Escorts Program Worked
  • Security Concerns and Trojan Risks
    • Risks Identified
    • Program Timeline and Facts
  • Congressional and Vendor Accountability
  • Broader Policy Implications
    • In Conclusion

The Pentagon has abruptly shut down a decade-old Microsoft program that allowed Chinese engineers to work on Defense Department (DOD) cloud systems.

Defense Secretary Pete Hegseth announced the move after revelations that the arrangement exposed U.S. military networks to “unacceptable risk,” sparking immediate audits and heightened national security concerns.

 

Introduction

In August 2025, the Pentagon confirmed it had terminated Microsoft’s “digital escorts” program, which enabled Chinese coders to contribute to DOD cloud environments under minimal U.S. supervision.

The decision followed a ProPublica investigation revealing the practice, prompting Defense Secretary Pete Hegseth to order audits, vendor reforms, and tighter safeguards across defense IT contracts.

 

Discovery and Immediate Response

The program, launched in 2015, relied on U.S.-based supervisors, dubbed “digital escorts”, to oversee Chinese engineers performing technical tasks. Although the escorts held security clearances, they often lacked the expertise to vet complex code.

Once exposed, Hegseth acted swiftly, halting the program and issuing a formal letter of concern to Microsoft. He confirmed that a third-party audit would review every submission by Chinese nationals, ensuring U.S. taxpayers would not bear the cost.

“If you’re thinking ‘America first,’ this doesn’t pass the test,”

Hegseth said in a public address.

 

How the Digital Escorts Program Worked

Microsoft designed the model to meet the letter of contracting rules, which required cleared U.S. personnel to oversee foreign contributors. However, the arrangement effectively outsourced sensitive coding work while providing little real oversight.

The escorts, often paid near minimum wage, lacked the technical expertise to detect whether malicious code was being introduced.

For nearly a decade, this model persisted, raising questions about why compliance rules were allowed to substitute for robust cybersecurity practices.

 

Security Concerns and Trojan Risks

Experts warn that the long-term presence of foreign coders within defense systems creates the possibility of undetected backdoors, trojan scripts, or hidden vulnerabilities.

While Microsoft and the Pentagon insist they operated within contract rules, the risk to national security remains significant.

Risks Identified

  • Potential insertion of malicious code or hidden backdoors into DOD cloud systems.

  • Weak oversight by underqualified U.S. “escorts” unable to vet technical submissions.

The ongoing audit will attempt to uncover any such risks, but officials acknowledge that some vulnerabilities may remain hidden even after review.

 

Program Timeline and Facts

Year/Period Event Details
~2015 Program launched Microsoft introduced “digital escorts” under DOD cloud contract
2015–2024 Active use Chinese engineers worked under U.S.-based supervisors
July 2025 Discovery ProPublica investigation exposed the practice
Aug 2025 Pentagon response Program halted, audit ordered, letter of concern issued
Current Ongoing Third-party audit and vendor reforms underway

 

Congressional and Vendor Accountability

Lawmakers, including Senator Tom Cotton, have demanded clarity on how such practices persisted for nearly a decade.

Critics argue that Microsoft prioritized scale and profit over security, while supporters emphasize that oversight loopholes were baked into outdated federal rules.

Hegseth stressed that every vendor working with the Pentagon must now certify that no Chinese nationals are engaged in defense cloud systems.

This requirement marks a significant tightening of contractor obligations, signaling broader reforms in how the Pentagon manages its technology partnerships.

 

Broader Policy Implications

The controversy highlights a larger challenge: ensuring federal security regulations evolve as quickly as global cyber threats. The Pentagon’s reliance on a compliance-based system, rather than a capability-based one, allowed this loophole to persist unchecked.

For policymakers, the case underscores that foreign technical involvement, even with formal supervision, presents unacceptable risks in national security systems.

It also raises pressing questions about how other agencies may be exposed to similar vulnerabilities.

 

In Conclusion

The Pentagon’s decision to end the digital escorts program signals a sharp shift toward stricter cybersecurity practices in defense contracting. While Microsoft and the DOD scramble to review code and repair oversight gaps, the incident serves as a reminder that compliance alone is insufficient to guarantee security.

Future safeguards will depend on sustained vigilance, stronger technical expertise, and a clear commitment to prioritizing national security over expediency in federal technology partnerships.

 

Sources: US Department of Defense.

 

Prepared by Ivan Alexander Golden, Founder of THX News™, an independent news organization delivering timely insights from global official sources. Combines AI-analyzed research with human-edited accuracy and context.

 

Tags: DOD cloudMicrosoft auditnational securityPentagon cybersecurity
Ivan Golden

Ivan Golden

Ivan Golden founded THX News™ with the goal of restoring trust in journalism. As CEO and journalist, he leads the organization's efforts to deliver unbiased, fact-checked reporting to readers worldwide. He is committed to uncovering the truth and providing context to the stories that shape our world. Read his insightful articles on THX News.

Related Posts

Defense Department Cyber Service Academy stickers at the DOD CSA cyber boot camp held at George Washington University's Science and Engineering Hall, July 21-22, 2025. Photo by DOD Corbin Stewart.
AI & Cyber Intelligence

DoD Cyber Service Academy Boot Camp: Top Cyber Scholars Converge

July 24, 2025
Undersecretary of Defense, Emil Michael delivers remarks to attendees at the Department of Defense Manufacturing Technology Program Exhibition at the Pentagon. Photo by Kubitza.
AI & Cyber Intelligence

DoD ManTech Program: Advancing National Security

July 8, 2025
An Air Force MQ-9 Reaper remotely piloted aircraft, assigned to the 432nd Wing, taxis toward the runway at Creech Air Force Base, Nev., April 15, 2025. Photo by the US Dept. of Defense.
AI & Cyber Intelligence

DARPA’s Resilient Software Systems: Enhancing U.S. Military Cybersecurity

June 18, 2025
Army Lt. Gen. William Hartman, acting commander of U.S. Cyber Command House Armed Services Committee cyber, information technologies and innovation subcommittee. Photo by Maj. Wes Shinego.
AI & Cyber Intelligence

Cyber Threat Landscape: State-Sponsored Risks

May 16, 2025
Army Lt. Gen. Paul T. Stanton, DISA director and JFHQ-DODIN commander, speaks at the DOD Cyber Workforce Summit. Photo by the DOD.
AI & Cyber Intelligence

Cyber Workforce Development Demands Warrior Mindset

April 7, 2025
Airmen from the 67th Cyberspace Wing review daily tasks at Joint Base San Antonio – Lackland’s Medina annex, Texas. Photo by Jason W. Edwards. DOD.
AI & Cyber Intelligence

DISA’s FY25-27 Data Strategy

March 4, 2025

Explore & Discover More

THX News™

Reporting on the Official Record.

THX News delivers clarity by providing unfiltered news direct from primary sources. Our commitment is to foster an informed global community through fact-driven reporting you can trust.

About THX News

  • Our Mission
  • About Us
  • Contact Us

Legal & Policies

  • Editorial Standards
  • Corrections Policy
  • Privacy Policy
  • Terms of Use

© 2020-2025 THX News, Inc. All Rights Reserved.

No Result
View All Result
  • Home
  • Canada
    • Community
    • Healthcare
    • Housing & Home Building
    • International
    • Military
    • Obituaries
    • Politics
    • Technology & Innovation
  • UK
    • Education
    • Environment
    • Healthcare
    • Housing & Land
    • Jobs & Employment
    • Law & Order
    • Money and Taxes
    • Technology
  • USA
    • Economics & Money
    • Immigration & Border Security
    • International
    • Law & Order
    • Local Government
      • Arizona
      • California
      • Oregon
      • Virginia
    • Medicine & Health
    • Military
    • Space & Exploration
    • Technology
  • —
  • Travel
    • Africa
    • Asia
    • Europe
    • USA
  • Education
    • Art & Culture
    • Books & Authors
    • Fashion
    • History & Politics
    • Lifestyle & Relationships
    • Music
  • —
  • About Us
  • Help & FAQ
  • Contact Us
  • Login

© 2020-2025 THX News, Inc. All Rights Reserved.

THX News™ uses cookies. By using this website you are giving consent to the use of cookies. Visit our Privacy and Cookie Policy.