SHARE
Facebook X Pinterest WhatsApp

Pentagon Bans China-Based Engineers Over Hacking Concerns

The Pentagon bans China-based staff from cloud work after reports warn of espionage risks and urge tighter supply chain security.

Written By
thumbnail Ken Underhill
Ken Underhill
Sep 19, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

The US Department of Defense has banned technology vendors from using China-based personnel to maintain its cloud systems, following revelations that sensitive government data had been exposed to potential foreign interference. 

The new directive comes after a ProPublica investigation uncovered how Microsoft relied on engineers based in China for nearly a decade to service Pentagon networks. Experts warn that this practice could have given Beijing unprecedented access to critical defense information.

ProPublica noted that top Pentagon officials said they had been unaware of Microsoft’s digital escort system up until the nonprofit newsroom broke the news.

State-sponsored hacking and the supply chain threat

The incident underscores an urgent challenge for security teams: state-sponsored hacking campaigns are increasingly exploiting weaknesses in the software supply chain.

By employing engineers in jurisdictions where governments have sweeping surveillance powers, vendors can unintentionally create pathways for adversarial nations to infiltrate sensitive systems.

Inside Microsoft’s digital escort model

Microsoft developed its digital escort model as a workaround to a longstanding Pentagon rule that requires personnel handling sensitive defense data to be US citizens or permanent residents. 

Under this arrangement, engineers based in China could still work on Department of Defense cloud systems if a US-based supervisor continuously monitored them — the so-called escort.

The escort’s role was meant to be an active safeguard: supervisors were expected to observe sessions, track commands, and ensure that remote engineers did not access unauthorized areas or exfiltrate information. In practice, however, the system was poorly implemented. Many escorts lacked the deep technical knowledge necessary to evaluate the work of senior engineers who often possessed more advanced coding or system administration expertise.

This imbalance created a security blind spot. Rather than acting as effective gatekeepers, escorts frequently became little more than a compliance checkbox — present in name but unable to assess whether the actions taken by offshore staff were appropriate or potentially harmful.  

Such an oversight gap potentially exposed classified data to Chinese state actors, whose national laws give them broad authority to collect information from domestic firms.

The national security stakes

This episode reflects a broader shift in the cybersecurity landscape: adversarial governments are leveraging global talent pipelines and outsourced engineering to gain footholds in critical infrastructure. 

The discovery of this oversight gap has spurred the Pentagon to mandate stricter qualifications for anyone supervising foreign personnel and to require vendors to maintain granular audit logs of all escorted sessions, including technician identities, countries of origin, and exact commands executed.

As cloud platforms become increasingly intertwined with defense and enterprise operations, the distinction between commercial services and national security targets continues to blur.

Tightening oversight to counter foreign cyber threats

While there is no public evidence of specific breaches tied to this policy, experts warn that the mere exposure of US defense data to networks accessible inside China represents a significant national security risk. 

As state-sponsored hacking operations grow in sophistication, maintaining strict control over personnel and access remains critical.

Action steps for security teams

Organizations can strengthen defenses with the following best practices.

  • Evaluate supply chain geography and limit privileged access to trusted regions.
  • Enforce least privilege and ensure qualified oversight of external staff.
  • Maintain detailed logs of all remote engineer actions and changes.
  • Regularly review incident response plans for insider and state-sponsored threats.

Protecting sensitive systems isn’t just about patches… it’s about guarding against geopolitical risk.

To prepare for insider threats or state-sponsored attacks, see our guide to building an effective incident response plan.

thumbnail Ken Underhill

Ken Underhill is an award-winning cybersecurity professional, bestselling author, and seasoned IT professional. He holds a graduate degree in cybersecurity and information assurance from Western Governors University and brings years of hands-on experience to the field.

Recommended for you...

Russian Hackers Join Forces: Gamaredon + Turla Target Ukraine
ChatGPT Tricked Into Solving CAPTCHAs: Security Risks for AI and Enterprise Systems
Ken Underhill
Sep 19, 2025
SonicWall Urges Urgent Credential Reset After Backup File Exposure
Ken Underhill
Sep 19, 2025
Entra ID Bug Could Have Exposed Every Microsoft Tenant
Ken Underhill
Sep 18, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.