A little-known Microsoft program could expose the Defense Department to hackers

104 pointsposted 18 hours ago
by danso

53 Comments

beoberha

16 hours ago

I work in azure and this is wildly mischaracterizing the risk, though it is news to me that there are non-US nationals doing escorts for the non-airgapped government clouds.

I assume it is OK to say this: Microsoft has a “China” cloud and a non-airgapped “US Government” cloud. It is standard practice that engineers making production touches in the clouds have to be “escorted” by vendors who make sure you’re not doing anything malicious. I assume the article is implying that these vendors for the US Gov cloud may be Chinese nationals.

As Jason mentions in another comment, anything actually requiring clearance is serviced by the airgapped clouds and only folks with clearance are able to operate there.

Edit: misread the article but the third paragraph stands. The government is totally aware of where the operator boundary lies and this is still wildly mischaracterized.

kjellsbells

4 hours ago

Yeah it seems like there are two issues here being conflated. The first is that non-US-persons are operating, by proxy, Azure assets that serve US Gov missions. The second is that those persons may be operating assets used in sensitive missions. Say IL4 and up.

The first is a little embarrassing for Microsoft, but a venal sin, not a mortal one. Makes them look like cheapskates offshoring work, instead of training local workers, but Ok, fine.

The second would be a mortal sin, assuming ( its not clear from the article whether) these non-US people are really operating at IL4 and up. Those assets really need US people especially at the higher impact levels. All of the above is public info described in FedRAMP standards.

apical_dendrite

16 hours ago

How does the vendor make sure you're not doing anything malicious if they don't have the skills to understand the change?

It sounds like the issue here isn't that the vendor doing the escort is a Chinese national, it's that the engineer making the change is a Chinese national in China and they're using this escort system to check a box saying that because the changes themselves are being made by US nationals, they won't send PII or passwords back to China. But fundamentally a system where an untrusted person gets a less technical person to make a change for them seems inherently extremely high-risk.

beoberha

15 hours ago

Yep, I totally read the article incorrectly. You’re spot on and honestly I’ve asked myself the same question - though less from a national security perspective and more a “what’s the point of this extra tax to mitigate this incident”

stackskipton

12 hours ago

>“what’s the point of this extra tax to mitigate this incident”

My guess is ATO requires that only US Citizens make changes to the system. However, Microsoft did not want to hire skilled US citizens for pay reasons so they hire unskilled US citizens and get trained Chinese nationals to direct US citizens to make changes they require.

So stockholders get another yacht because GovCloud is expensive but overhead is peanuts and national security be damned.

US Government should announce that their ATO has been revoked but we don't do that.

opello

15 hours ago

It seems pretty reasonable to consider the national security perspective when it seems like the potential risk is organized, nation state actors, and the potential mitigation is only the actual depth of security practices at play.

To put it another way, if the air gap is the only thing preventing the malicious system from doing its malicious thing, it seems like "defense in depth" is working but there's still a problem to solve. That is, making the malicious system not malicious.

> anything actually requiring clearance is serviced by the airgapped clouds and only folks with clearance are able to operate there

It seems like "operate" may be doing a lot of work here.

danso

13 hours ago

> The government is totally aware of where the operator boundary lies and this is still wildly mischaracterized.

Regardless of the program’s actual risk, it doesn’t seem that the government is fully aware of the program’s very existence. The article quotes the former CIO of the Pentagon as being surprised:

> John Sherman, who was chief information officer for the Department of Defense during the Biden administration, said he was surprised and concerned to learn of ProPublica’s findings. “I probably should have known about this,” he said. He told the news organization that the situation warrants a “thorough review by DISA, Cyber Command and other stakeholders that are involved in this.”

jasonthorsness

16 hours ago

This article is trying to show it as more scary than it is. The key points are: this is systems up to secret level only and sessions are recorded and watched by an escort; the escort is not as tech savvy as the engineers performing maintenance (who are also Microsoft employees, from many countries of origin) but there are other controls too; they can’t just run unsigned code etc.

The top secret stuff isn’t using this system; it’s using cleared staff.

TruffleLabs

16 hours ago

Secret is still sensitive info and, if released, can cause harm or disruption.

Spying is not based on finding a single discovery of top secret information but a continuous process of pulling various pieces together. A "secret" item by itself may not cause bad things to happen but combined with other information could result in far greater damage.

bigfatkitten

7 hours ago

> systems up to secret level only

These aren’t SECRET systems. If they were, that would be catastrophically bad and someone would go to jail.

pjc50

14 hours ago

Does any of this matter any more given that DOGE have total clearance bypass for uncleared staff?

nonameiguess

16 hours ago

This doesn't reflect what the article says. It only includes unclassified systems, not systems up to secret. That means anything from IL2 to IL5 (secret is impact level 6). In practice, IL2 is basically open access anyway, so it's really IL4 and IL5 as those levels actually restrict access. IL5 can include controlled unclassified information, but that's the highest possible. Remote access to IL5 systems also requires either a common access card issued by the DoD or personal PKI issued by an approved CA that still has to verify your background and identity in person before issuing you a certificate pair.

Along with everyone else they interviewed apparently, I had no idea this program even existed, but there have always been similar programs for other kinds of maintenance and support personnel. The people who repair the toilets and refrigerators in a SCIF don't have clearances. They get an escort, and everyone else in the building gets a warning before anyone needing an escort comes in, telling them to put away any sensitive data and either work on something unclassified or turn off your monitors and stop working completely until these people are done and leave again.

jasonthorsness

15 hours ago

Thanks for the clarification; I was going off "While the ad said that specific technical skills were “highly preferred” and “nice to have,” the main prerequisite was possessing a valid “secret” level clearance issued by the Defense Department" from the article.

bangaladore

15 hours ago

Secret because that's generally the lowest level clearance you can get that means something to the DoD. Essentially anyone working in and around the DoD has a secret clearance. Notably a clearance in itself means nothing without need to know.

g-b-r

15 hours ago

> they can’t just run unsigned code etc.

They can do everything that the escort's account can, I don't think you can know what that is.

Since it's to solve technical issues, there's a high chance that low-level access will be required, often.

user

16 hours ago

[deleted]

opello

17 hours ago

The "program" is a logistical one and not a software one in which Microsoft employs Chinese software engineers to be "overseen" by US citizens that have security clearances, but not necessarily the requisite experience for say a code review level of oversight.

fuzzfactor

16 hours ago

>not a software

Appears the program has unfixed bugs and security holes anyway :\

MisterTea

16 hours ago

I am flabbergasted that the United States government does not have a requirement that anyone who touches their systems MUST be a vetted US citizen.

bigfatkitten

7 hours ago

There’s no single overarching federal requirement when it comes to citizenship etc, but I would’ve assumed that ITAR requirements at the very least would’ve made this work US citizen on US soil only.

eigendreams

3 hours ago

Permanent residents are US Persons for ITAR purposes

remarkEon

2 hours ago

Which is a rule that needs to be changed.

ToucanLoucan

16 hours ago

I mean what does vetting even mean anymore? Our President is a convicted felon, our head of HHS thinks bad humors cause illness and vaccines cause Autism, our head of Education is dismantling her own organization with the approved sign off of the Supreme Court, of whom a solid percentage are accused sex offenders, and I could keep going with the utter circus our Government is currently.

Not only are qualifications not required they are apparently actively discouraged in favor of nepotism and connections.

davidw

15 hours ago

The guy who heads up the Defense department was (drunkenly?) texting out secret plans to a journalist.

galangalalgol

15 hours ago

And the DNI regularly repeats Russian propaganda meant for Russian internal media... If it seems odd to anyone that our president seemed genuinely surprised that Putin was "tapping him along" consider who advises him. And our two most recent presidents both liked keeping classified documents in insecure locations. The situation is ridiculous and everyone just seems to shrug. I don't know if our overlords got way worse at this or they just stopped caring. We can't even get a high quality supervillain to rule us anymore.

nosioptar

13 hours ago

I knew a guy with clearance that cashed out 100% of his retirement to fly to Moscow to meet a sex worker he'd be involved with online. It never affected his clearance.

Dude would run his mouth about stuff he shouldn't tell people under normal circumstances. There's no way he didn't tell the sex worker secret stuff.

datadrivenangel

16 hours ago

So the digital escorts are basically human kvm switches to firewall things off... seems like a bad program.

user

16 hours ago

[deleted]

DarkmSparks

15 hours ago

well, I guess this probably explains the OPM breach. I wondered how they got hold of even the basic details needed for that, seems Microsoft was sending them targets by email voluntarily.

Worst part is I'm not really surprised.

charcircuit

17 hours ago

Did I miss it, but what do these "digital escorts" actually do. The article doesn't seem to actually explain it.

Edit: It's people who watch over what foriegn engineers are doing.

user

17 hours ago

[deleted]

opello

17 hours ago

It doesn't seem amazingly well worded, but I'm assuming that "these workers" from the previous paragraph are the "digital escorts" which were described as:

> U.S. citizens with security clearances to oversee the work and serve as a barrier against espionage and sabotage

nhinck3

17 hours ago

I'm guessing a pair of eyes over your shoulder (or virtually watching a session) as you do work near or with sensitive data or systems.

richardwhiuk

16 hours ago

It's more involved than that - the US national is the person who has control of the keyboard, the non US national views the screen share and instructs them what to do.

opello

15 hours ago

> “If someone ran a script called ‘fix_servers.sh’ but it actually did something malicious then [escorts] would have no idea,” Matthew Erickson, a former Microsoft engineer who worked on the escort system

It sounds like you may have additional context or perspective, which makes me curious about the scope of "instructs." For example, I can imagine that the deployment sources of the public and Government clouds infrastructure are different, such that a bug fix on the shared base may need to be merged between these two branches. If a foreign national made the fix for the public version and then provided the expertise of resolving merge conflicts when applying it to the Government version, it presents an opportunity for subtle abuse unless the change is either further audited by the keyboard operator or another engineer before the merge result lands or is deployed.

richardwhiuk

14 hours ago

Generally it's used for fixing corrupt deployments / debugging / deploying.

As far at I'm aware, there isn't a separate code base.

In general, you can't share scripts / executables via this mechanism - that's done via code review and deployment.

You could get an operator to run a script in a malicious way, but it'd need pre-written to include the malicious behaviour.

perching_aix

15 hours ago

That's not really what the article supposes unless I missed something, or do you have a different source? Hilarious if true.

Edit: yes it does, I just didn't read it all the way.

apical_dendrite

15 hours ago

Maybe it isn't displaying on mobile or something, but there's a grey box in the article that shows step-by-step what happens.

> A Microsoft engineer in China files an online “ticket” to take on the work.

> A U.S.-based escort picks up the ticket.

> The engineer and the escort meet on the Microsoft Teams conferencing platform.

> The engineer sends computer commands to the U.S. escort, presenting an opportunity to insert malicious code.

> The escort, who may not have advanced technical expertise, inputs the commands into the federal cloud system.

perching_aix

15 hours ago

I didn't read the article all the way through apparently.

nhinck3

15 hours ago

Makes sense, but it really does seems like a silly way to work around the security policies.

stackskipton

12 hours ago

It's cost saving exercise. Microsoft does not have to hired skilled US Citizen workers who command higher salary and can use cheaper labor in both US citizen and overseas worker.

Basically, stockholders get another yacht, national security gets screwed.

drcongo

17 hours ago

There's a lot of Microsoft programs that could expose the defense department to hackers.

belter

15 hours ago

It's called Windows for a reason...

jmclnx

17 hours ago

> Pentagon bans foreign citizens from accessing highly sensitive data, but Microsoft bypasses this by using engineers in China ...

The fun of using Cloud type systems. I expect AWS, Google and maybe IBM Cloud has the same issue. Save $ now, pay lots more later.

seviu

16 hours ago

So much bringing manufacturing to America but I see little regarding developing software solely in America.

Not sure if this is a debate the current administration has for the future or even if they are aware of it.

Not trying to give my opinion or deciding whether one thing is better or worse. Just genuine curiosity.

delfinom

16 hours ago

Because "manufacturing in America" is to continue having a peasant class to buy goods.

Outsourcing software development is 100% intended to surpress the peasants managing to go up higher on the ladder. Many companies doing "AI layoffs" are in fact just outsourcing to the usual countries overseas even more.

dmix

16 hours ago

"AI layoffs" is mostly just media spin + a useful excuse by execs when the company isn't performing well. Looking through the list few mention anything about laying off engineers because of AI https://www.forbes.com/sites/martineparis/2025/07/09/sweepin...

> IBM CEO Says AI Has Replaced Hundreds of Workers but Created New Programming, Sales Jobs

(laying off mostly administrative/HR people)

https://www.wsj.com/articles/ibm-ceo-says-ai-has-replaced-hu...

> Intel plans to lay off up to a fifth of its factory workers, an enormous cutback that will have a profound effect on one of the chipmaker’s core businesses.

https://www.oregonlive.com/silicon-forest/2025/06/intel-will...

Microsoft laid off mostly gaming from failed acquisitions + sales/marketing (one of which I know personally)

user

16 hours ago

[deleted]

svaha1728

17 hours ago

The Microsoft tech debt dumpster fire continues.