Latest news with #MatthewErickson


Time of India
18-07-2025
- Business
- Time of India
How an off-the-books Microsoft programme gave China a glimpse into Pentagon's digital nerve centre
Microsoft has been quietly allowing engineers in China to provide support for US Defence Department cloud systems, according to a detailed investigation by ProPublica . For nearly ten years, this arrangement has involved American employees acting as 'digital escorts' to input instructions from foreign tech workers into military networks. These escorts, though cleared for access to government systems, often lack the expertise to detect whether the code they're running could be malicious. Explore courses from Top Institutes in Select a Course Category MCA Finance Data Science CXO Healthcare Others Cybersecurity Operations Management Data Science Management Project Management Digital Marketing Degree Data Analytics Design Thinking others Product Management Public Policy Leadership MBA PGDM Artificial Intelligence Skills you'll gain: Programming Proficiency Data Handling & Analysis Cybersecurity Awareness & Skills Artificial Intelligence & Machine Learning Duration: 24 Months Vellore Institute of Technology VIT Master of Computer Applications Starts on Aug 14, 2024 Get Details 'We're trusting that what they're doing isn't malicious, but we really can't tell,' one current escort told ProPublica, speaking anonymously to avoid professional consequences. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Summer Clearance Sale Is Live Now Luxury Watches Buy Now Undo ET has not been able to independently verify this information. Sensitive military data in foreign hands The escorts work with data labelled 'Impact Level 4 and 5' — information considered highly sensitive but not officially classified. It includes content directly supporting military operations, along with other data whose compromise, according to Pentagon guidelines, 'could be expected to have a severe or catastrophic adverse effect' on national security. Live Events Despite the risk, Microsoft has relied on foreign engineers — including those based in China — to handle support tasks for these systems. Under the digital escort framework, foreign engineers submit instructions, and US citizens input them into the government systems. Many of these escorts are former military personnel hired primarily for their security clearances, not their technical skill. 'If someone ran a script called 'fix_servers.sh' but it actually did something malicious then [escorts] would have no idea,' said Matthew Erickson, a former Microsoft engineer who worked on the programme. Lawmakers and intelligence veterans demand answers The programme has now drawn sharp criticism from Capitol Hill. Senator Tom Cotton, who chairs the Senate Intelligence Committee , has formally asked Defence Secretary Pete Hegseth for a full list of contractors using foreign personnel, along with information on how digital escorts are trained. John Sherman, the former Chief Information Officer for the Defence Department, admitted he was unaware of the escort model until reporters contacted him. 'I probably should have known about this,' Sherman told ProPublica, adding that the situation warrants 'a thorough review by [the Defence Information Systems Agency], Cyber Command and other stakeholders.' According to the ProPublica report, Harry Coker, former senior executive at the CIA and NSA, described the escort setup bluntly: 'If I were an operative, I would look at that as an avenue for extremely valuable access. We need to be very concerned about that.' A workaround for US restrictions The escort system exists to satisfy federal rules requiring only US citizens or permanent residents to access sensitive defence data. Microsoft, which has large engineering operations in China, India and Europe, set up the escort model to navigate this restriction while scaling up its government cloud business. Digital escorts have been used since at least 2016, when Microsoft launched its programme for handling Pentagon cloud contracts. According to those familiar with its development, early concerns were raised. One former Microsoft cybersecurity strategist said they opposed the idea from the beginning, warning that the approach was too risky. Recruitment was handled in part by Lockheed Martin. At the time, one project manager said they told Microsoft that the escorts being hired 'would not have the right eyes' for the job due to low pay and lack of specialised experience. Microsoft defends the system Microsoft insists that the escort model meets government standards. A company spokesperson told Fox News Digital, 'For some technical requests, Microsoft engages our team of global subject matter experts to provide support through authorised U.S. personnel, consistent with U.S. government requirements and processes.' 'All personnel and contractors with privileged access must pass federally approved background checks,' the spokesperson said. 'Global support personnel have no direct access to customer data or customer systems.' Microsoft also claims to use multiple layers of security, including approval workflows and automated code reviews, to prevent threats. 'This production system support model is approved and regularly audited by the US government,' the company added. Insight Global, a contractor that provides Microsoft with digital escorts, said it screens candidates to ensure they have the technical capabilities and provides additional training. Disconnect between Microsoft and the defence department Despite Microsoft's claims, several officials within the US government said they were unaware of the escort system. When ProPublica contacted the Defence Information Systems Agency (DISA), even its public information office had not heard of the model. Later, DISA confirmed the escorts are used 'in select unclassified environments' and emphasised that experts under escort 'have no direct, hands-on access to government systems,' but instead 'offer guidance and recommendations.' Former Microsoft executive Pradeep Nair , who said he helped design the escort framework, argued that audit trails and other controls keep the system secure. 'Because these controls are stringent, residual risk is minimal,' he said. Broader concerns about Chinese cyber access Critics point to broader issues beyond Microsoft's processes. Chinese law gives authorities sweeping powers to compel companies and individuals to cooperate with state data collection. 'It would be difficult for any Chinese citizen or company to meaningfully resist a direct request from security forces or law enforcement,' said Jeremy Daum, a senior research fellow at Yale Law School . Michael Sobolik, a senior fellow at the Hudson Institute , was blunt: 'This is like asking the fox to guard the henhouse and arming the chickens with sticks in case the fox gets mad. It beggars belief.' And Michael Lucci, CEO of State Armor Action , said, 'If ProPublica's report turns out to be true, Microsoft has created a national embarrassment that endangers our soldiers, sailors, airmen and marines. Heads should roll, those responsible should go to prison and Congress should hold extensive investigations to uncover the full extent of potential compromise.' He added, 'Microsoft or any vendor providing China with access to Pentagon secrets verges on treasonous behaviour and should be treated as such.' Past breaches and unanswered questions The digital escort model has not been directly linked to any breaches. But in 2023, Chinese hackers broke into Microsoft's cloud servers and stole thousands of emails from senior US officials, including the commerce secretary and the US ambassador to China. A government review by the now-disbanded Cyber Safety Review Board blamed Microsoft's security failures, but made no mention of the escort system. Still, critics say the bigger issue is trust. 'If these [ProPublica] allegations are credible, the federal government should never again rely on Microsoft to protect the data that keeps our men and women in uniform safe,' said Lucci. 'Our military cannot operate in security and secrecy if a vendor repeatedly and intentionally invites the enemy into the camp.' ProPublica reached out to other major cloud providers to ask whether they use similar escort models. Amazon Web Services and Google Cloud declined to comment. Oracle did not respond. That silence has raised further questions about industry-wide practices and transparency in how foreign tech expertise is used in sensitive government work. As scrutiny intensifies, one thing is clear: what began as a workaround is now at the centre of a growing national security debate.


Time of India
18-07-2025
- Business
- Time of India
Report warns: A little-known Microsoft program can expose US national security secrets to Chinese hackers
Microsoft is using engineers in China to help maintain the Defense Department's most sensitive computer systems with minimal US supervision, potentially exposing critical national security data to America's leading cyber adversary, a ProPublica investigation revealed this week. The arrangement relies on US citizens with security clearances, known as " digital escorts ," to oversee foreign engineers remotely. However, these escorts often lack the technical expertise to detect malicious activity from highly skilled Chinese developers who could insert harmful code into federal networks, the investigation found. "We're trusting that what they're doing isn't malicious, but we really can't tell," said one current escort who spoke anonymously to ProPublica, fearing professional repercussions. Chinese engineers gain access to Pentagon's most sensitive data The digital escort system has operated for nearly a decade, allowing Microsoft to bypass Pentagon rules that ban foreign citizens from accessing highly sensitive government data. The Chinese engineers work on "high impact level" information that includes materials directly supporting military operations and data whose compromise "could be expected to have a severe or catastrophic adverse effect" on national security. Microsoft's arrangement involves Chinese engineers filing support tickets and then remotely instructing American escorts—some earning barely above minimum wage—to input commands into Defense Department cloud systems. Many escorts are former military personnel with little coding experience, creating a dangerous skills gap. "If someone ran a script called 'fix_servers.sh' but it actually did something malicious then [escorts] would have no idea," Matthew Erickson, a former Microsoft engineer who worked on the escort system, told ProPublica. Senator demands Pentagon investigation into security risks The revelations prompted Senator Tom Cotton , who chairs the Senate Intelligence Committee, to demand answers from Defense Secretary Pete Hegseth. In a letter obtained by Reuters, Cotton requested a complete list of contractors using Chinese personnel and details about how digital escorts are trained to detect suspicious activity. National security experts expressed alarm at the program's existence. Harry Coker, former CIA and NSA senior executive, called it an "avenue for extremely valuable access" that intelligence operatives would covet. John Sherman, former Defense Department chief information officer, said the situation warrants "a thorough review" by military cybersecurity agencies. The program's low profile meant even Defense Department officials struggled to find personnel familiar with it when contacted by reporters. AI Masterclass for Students. Upskill Young Ones Today!– Join Now