08/29/2025 / By Willow Tohi
Defense Secretary Pete Hegseth announced on Wednesday that the Pentagon has initiated a full-scale investigation into Microsoft for employing Chinese Communist Party (CCP)-linked engineers to work on U.S. military and Pentagon cloud contracts. The probe, which stems from a controversial program known as “Digital Escorts,” aims to determine whether China-based engineers had indirect access to highly sensitive national security infrastructure and whether any malicious code or vulnerabilities were introduced.
The “Digital Escorts” program, initiated during the Obama-Biden administration, ostensibly allowed U.S. citizens with security clearances but limited technical expertise to act as intermediaries for China-based engineers working on critical defense systems. Despite being marketed as compliant with security protocols, the arrangement effectively provided foreign nationals with indirect access to classified defense infrastructure, raising significant security concerns.
The program was designed to address a shortage of skilled U.S. citizens in the tech sector, but it has come under intense scrutiny for its potential security risks. Critics argue that the program not only compromised the integrity of U.S. defense systems but also opened up avenues for espionage and data theft.
“The use of Chinese nationals to service Department of Defense cloud environments — it’s over,” Hegseth declared during a briefing. “We’re requiring a third-party audit of Microsoft’s digital escort program, including the code and submissions by Chinese nationals. This audit will be free of charge for U.S. taxpayers.”
The Pentagon has taken immediate steps to sever ties with Microsoft’s CCP-linked engineers and is implementing a comprehensive review of all existing contracts. Hegseth emphasized that the Pentagon will not tolerate any compromises to national security and is committed to ensuring that all defense systems are secure and free from foreign interference.
The Pentagon’s investigation is driven by the need to ensure that no malicious code or backdoors were inserted into U.S. military systems. Cybersecurity experts and defense analysts have expressed serious concerns over the potential vulnerability created by the “Digital Escorts” program.
Michael Lucci, CEO of State Armor: “Microsoft’s gross irresponsibility in creating this backdoor should be fully exposed, and if laws were broken, those responsible should be prosecuted. The integrity of our national defense systems must be a top priority.”
A recent ProPublica report detailed how roughly 50 U.S. citizens with security clearances relayed hundreds of commands from Chinese engineers without knowing what was being executed inside defense servers. Employees reportedly raised repeated warnings about the risks, but their concerns were not adequately addressed.
The report revealed a pattern of negligence and lack of oversight, with some employees describing a culture of complacency and a focus on meeting project deadlines at the expense of security. These findings have further intensified calls for a thorough and transparent investigation.
The Trump administration has made tightening cybersecurity and reducing reliance on foreign tech workers a top priority. Hegseth emphasized the importance of addressing the issue promptly and thoroughly. “This never should have happened in the first place. But once we found out about it, we attacked it aggressively from the beginning, and we’re going to follow all the way through the tape to make sure this is addressed.”
The administration has taken several steps to bolster cybersecurity, including increasing funding for cybersecurity research and development, implementing stricter vetting processes for tech workers and enhancing international collaboration on cyber threats.
The Pentagon’s investigation into Microsoft’s use of CCP-linked engineers underscores the critical need to safeguard U.S. national security. As the audit and parallel investigations proceed, the focus remains on ensuring that no foreign interference compromises the integrity of America’s defense networks.
Supporters of human freedom have raised concerns over a covert cyber operation orchestrated by the Chinese Communist Party that has allowed them to maintain unauthorized access to U.S. networks and allied systems for an extended period. According to Israel Soong, who holds a significant position at the National Security Council as the director for East Asia and Pacific Cyber Policy, this digital assault is part of a broader strategy employed by the CCP aimed at preparing for potential attacks on critical infrastructure.
If you cannot spread awareness, let me share something with you. I have been informed at the highest levels that our Pentagon is involved in a serious issue. In the next hour, Roy McKenzie will reveal information about how China may have compromising data on our troops through their servers. They managed to access cell phones and desktop computers using voting software funded by the Department of Defense.
The Pentagon’s actions and the forthcoming revelations by McKenzie highlight the urgent need for accountability and transparency in matters of national security. The public’s role in exposing and addressing these issues is more critical than ever.
Sources for this article include:
Tagged Under:
big government, Big Tech, CCP, China, computing, cyberwar, Dangerous, Digital Escorts, Glitch, national defense, national security, Pentagon, Pete Hegseth, privacy watch, progress, real investigations, Spygate, surveillance, tech giants, technocrats, White House
This article may contain statements that reflect the opinion of the author
COPYRIGHT © 2018 TECHGIANTS.NEWS
All content posted on this site is protected under Free Speech. TechGiants.news is not responsible for content written by contributing authors. The information on this site is provided for educational and entertainment purposes only. It is not intended as a substitute for professional advice of any kind. TechGiants.news assumes no responsibility for the use or misuse of this material. All trademarks, registered trademarks and service marks mentioned on this site are the property of their respective owners.