Latest news with #classifieddata


Fox News
18-07-2025
- Business
- Fox News
Pentagon to probe Microsoft's use of Chinese engineers on sensitive defense systems, Hegseth says
Defense Secretary Pete Hegseth said the Pentagon was "looking into" a cloud computing program run by Microsoft utilizing foreign workers from China, which was criticized this week for potentially lacking adequate safeguards, which could provide the CCP easy access to classified defense data and systems. A ProPublica report released Tuesday accused Microsoft of allowing China-based engineers to assist with Pentagon cloud systems with inadequate guardrails in an effort to scale up its government contracting business. In response, Sen. Tom Cotton, R-Ark., sent a letter to Hegseth Thursday asking for information and documents about the program, including a list of all Department of Defense (DOD) contractors that hire Chinese personnel to provide maintenance or other services to DOD systems, a list of subcontractors that hire Microsoft's American-born "digital escorts" required to supervise foreign computer scientists while they work on DOD systems and documents on the training these supervisors receive to identify suspicious activity. "In light of recent and concerning reports about Microsoft using engineers in China to maintain DOD systems, I've asked the Secretary of Defense to look into the matter," Cotton said in a post on X sharing his letter to Hegseth. "We must guard against all threats within our military's supply chain." A few hours after Cotton's X post, Hegseth responded, "Spot on senator." "Agree fully," Hegseth said in his own X post responding to Cotton. "Our team is already looking into this ASAP. Foreign engineers — from any country, including of course China — should NEVER be allowed to maintain or access DOD systems." The ProPublica report cited current and former employees and government contractors who worked on a cloud computing program deployed by Microsoft in 2016, which involved a "digital escort" framework. The program, meant to meet federal contracting regulations, used a system of "digital escort" chaperones for global cybersecurity officials, such as those based in China, meant to create a security buffer so that they can work on agency computing systems. DOD guidelines require that people handling sensitive data be U.S. citizens or permanent residents. According to sources who spoke to ProPublica, including some who had intimate familiarity with the hiring process for the $18-per-hour "digital escort" position, the tech employees being hired to do the supervising lacked the adequate tech expertise to prevent a rogue Chinese employee from hacking the system or turning over classified information to the CCP. The sources elaborated that the escorts, often former military personnel, were hired for their security clearances more than their technical abilities and often lacked the skills to evaluate code being used by the engineers they were supervising. In China, people are governed by sweeping laws compelling government cooperation with data collection efforts. "If ProPublica's report turns out to be true, Microsoft has created a national embarrassment that endangers our soldiers, sailors, airmen and marines. Heads should roll, those responsible should go to prison and Congress should hold extensive investigations to uncover the full extent of potential compromise," said Michael Lucci. Lucci is the CEO and founder of State Armor Action, a conservative group with a mission to develop and enact state-level solutions to global security threats. "Microsoft or any vendor providing China with access to Pentagon secrets verges on treasonous behavior and should be treated as such," Lucci added. A Microsoft spokesperson defended the company's "digital escort" model Tuesday, saying all personnel and contractors with privileged access must pass federally approved background checks. "For some technical requests, Microsoft engages our team of global subject-matter experts to provide support through authorized U.S. personnel, consistent with U.S. government requirements and processes," the spokesperson added. "In these instances, global support personnel have no direct access to customer data or customer systems." The Defense Information Systems Agency's (DISA) public information office was initially unaware of the program when ProPublica began asking questions about it, but it eventually followed up to point out that "digital escorts" are used "in select unclassified environments" at the Defense Department for "advanced problem diagnosis and resolution from industry subject-matter experts." In Cotton's letter to Hegseth, the Republican senator requested answers to his questions by the end of the month. Microsoft did not immediately respond to Fox News Digital's requests for comment on this article.


Daily Mail
30-05-2025
- General
- Daily Mail
Traitorous intelligence worker 'offered to leaked secrets to foreign government because he hated Trump'
A government intelligence worker has been charged with leaking classified data to a foreign power in exchange for citizenship. Nathan Vilas Laatsch, 28, allegedly betrayed his country due to frustration with Donald Trump 's policies that he found 'extremely disturbing'. A civilian employee of the Defense Intelligence Agency, he had top secret clearance and access to several highly classified Special Access Programs. Laatsch was arrested on Thursday as he allegedly made a dead drop of a USB drive filled with classified documents after a months-long FBI sting operation. He was charged with attempting to transmit national defense information to an officer or agent of a foreign government and will appear in court on Friday. Laatsch joined the DIA in August 2019, soon after graduating from Florida Polytechnic University with a Bachelor of Science in cyber security in 2018. By the beginning of this year he was a data scientist and IT specialist of information security at the agency's Insider Threat Division. He allegedly emailed an agent of a friendly country on March 2 from burner a account created the same day, with the subject line 'Outreach from USA Defense Intelligence Agency (DIA) Officer'. 'I am an officer of the Defense Intelligence Agency (DIA) serving in a technical role in support of our internal Officer of Security (SEC),' he wrote. 'The recent actions of the current administration are extremely disturbing to me 'I do not agree or align with the values of this administration and intend to act to support the values that the United States at one time stood for. 'To this end, I am willing to share classified information that I have access to, which are completed intelligence products, some unprocessed intelligence, and other assorted classified documentation.' The email explained he had 'intimate knowledge of how DIA tracks and monitors user activity' and all further communication had to be on an encrypted messaging app. Laatsch allegedly provided photos of his security badges with personal information removed - but left enough exposed that the FBI was able to identify him. His fatal mistake was to send a test email from another account that allegedly included his full name, phone number, and date of birth, and the IP address led back to his home. Instead of taking him up on his offer, the unnamed friendly government tipped of US authorities and the FBI began a sting operation, starting on March 23 'Good afternoon, I received your message and share your concerns. We are glad you reached out. I look forward to your response and learning more about your work,' investigators wrote on an encrypted app. The leaker didn't reply so they sent him an email on April 4. He replied on April 14 saying he didn't check the email much as there was no reply to his initial one for a while, but he was still interested. 'What I originally wrote remains true. Arguably more so now,' Laatsch wrote. Conversations moved to an encrypted app on April 17 with Laatsch allegedly still believing he was talking to the foreign government. He allegedly said he had 'access to a significant amount of information and finished products' but would need to 'copy things manually', which would 'somewhat limit' what he could provide. 'I've given a lot of thought to this before any outreach, and despite the risks, the calculus has not changed,' he explained. 'I do not see the trajectory of things changing, and do not think it is appropriate or right to do nothing when I am in this position.' Laatsch allegedly planned to copy out the classified data by hand and digitize it on his home computer. The FBI asked him for a sample of the intelligence on April 27 so they could authenticate it. DIA cameras allegedly filmed him writing on a notepad while having classified material open on his computer. He then allegedly smuggled the folded pages out of the office in his socks and lunchbox over the course of three days. Laatsch allegedly told them he had extracted classified data and they set up a dead drop at a park in Arlington, Virginia. The drop was done on May 1 and agents watched him leave a USB drive with a note explaining his methods, and nine documents. 'I have to the best of my ability attempted to copy the products by hand, but I cannot guarantee that every single word is completely correct,' the note read. 'If there are any mistakes, they would only be a basic word or two, and nothing that would alter the content or meaning of the product. 'As anticipated, the process of manually copying by hand will be time-intensive. Many of the provided products took around 40-60 minutes to fully complete, and often two full pages of notebook paper per-product.' Prosecutors said the documents were all top secret and one included 'sensitive methods of intelligence collection, intelligence related to foreign military exercises, and analysis of the impact of those military exercises'. Laatsch on May 7 allegedly asked for citizenship of the friendly country in exchange for future classified information. 'With my own credibility now hopefully established, I would like to outline something pertaining to the longer term of this arrangement,' he allegedly wrote. 'I'm [sic] not mentioned compensation throughout this, as that is not my motivation for doing this... There is though something I am interested in, but can be discussed at the appropriate time.' Laatsch allegedly wrote that he was interested in 'citizenship for your country' because he did not 'expect things here to improve in the long term, even in the event there is a change in the future'. This state affairs meant he he wanted 'to pursue an alternative, despite the clear challenges that would come with it'. Although he said he was 'not opposed to other compensation', he was not in a position where he needed to seek 'material compensation'. Laatsch allegedly explained how it would be difficult for him to because as his role would give him early warning of an investigation. 'it will not be easy for them, for example, to open a case on me without my knowledge since my permissions to see that would need to be changed and I'd notice,' he wrote. He laid out the 'stupid mistakes' others made when cases were opened on them and said these mistakes 'should not be too difficult for me to avoid'. Little did he know that the investigation was launched months ago, and as it was conducted by the FBI he didn't see it coming. Laatsch allegedly said he would be ready to provide more intel on May 26, and on May 15 to 27 he copied more data and hid it in his socks to extract it. He was arrested at the second dead drop on Thursday at the same park in Arlington, near his home in Alexandria, Virginia.