Microsoft Failed To Disclose Key Details About Use Of China-Based Engineers In U.S. Defense Work, Record Shows

Microsoft, as a provider of cloud services to the U.S. government, is required to regularly submit security plans to officials describing how the company will protect federal computer systems.

Yet in a 2025 submission to the Defense Department, the tech giant left out key details, including its use of employees based in China, the top cyber adversary of the U.S., to work on highly sensitive department systems, according to a copy obtained by ProPublica. In fact, the Microsoft plan viewed by ProPublica makes no reference to the company’s China-based operations or foreign engineers at all.

The document belies Microsoft’s repeated assertions that it disclosed the arrangement to the federal government, showing exactly what was left out as it sold its security plan to the Defense Department. The Pentagon has been investigating the use of foreign personnel by IT contractors in the wake of reporting by ProPublica last month that exposed Microsoft’s practice.

Our work detailed how Microsoft relies on “digital escorts” — U.S. personnel with security clearances — to supervise the foreign engineers who maintain the Defense Department’s cloud systems. The department requires that people handling sensitive data be U.S. citizens or permanent residents.

Microsoft’s security plan, dated Feb. 28 and submitted to the department’s IT agency, distinguishes between personnel who have undergone and passed background screenings to access its Azure Government cloud platform and those who have not. But it omits the fact that workers who have not been screened include non-U.S. citizens based in foreign countries. “Whenever non-screened personnel request access to Azure Government, an operator who has been screened and has access to Azure Government provides escorted access,” the company said in its plan.

The document also fails to disclose that the screened digital escorts can be contractors hired by a staffing company, not Microsoft employees. ProPublica found that escorts, in many cases former military personnel selected because they possess active security clearances, often lack the expertise needed to supervise engineers with far more advanced technical skills. Microsoft has told ProPublica that escorts “are provided specific training on protecting sensitive data” and preventing harm.

Microsoft’s reference to the escort model comes two-thirds of the way into the 125-page document, known as a “System Security Plan,” in several paragraphs under the heading “Escorted Access.” Government officials are supposed to evaluate these plans to determine whether the security measures disclosed in them are acceptable.

In interviews with ProPublica, Microsoft has maintained that it disclosed the digital escorting arrangement in the plan, and that the government approved it. But Defense Secretary Pete Hegseth and other government officials have expressed shock and outrage over the model, raising questions about what, exactly, the company disclosed as it sought to win and keep government cloud computing contracts.

Keep reading

Microsoft AI chief says it’s ‘dangerous’ to study AI consciousness

AI models can respond to text, audio, and video in ways that sometimes fool people into thinking a human is behind the keyboard, but that doesn’t exactly make them conscious. It’s not like ChatGPT experiences sadness doing my tax return … right?

Well, a growing number of AI researchers at labs like Anthropic are asking when — if ever — AI models might develop subjective experiences similar to living beings, and if they do, what rights they should have.

The debate over whether AI models could one day be conscious — and merit legal safeguards — is dividing tech leaders. In Silicon Valley, this nascent field has become known as “AI welfare,” and if you think it’s a little out there, you’re not alone.

Microsoft’s CEO of AI, Mustafa Suleyman, published a blog post on Tuesday arguing that the study of AI welfare is “both premature, and frankly dangerous.”

Suleyman says that by adding credence to the idea that AI models could one day be conscious, these researchers are exacerbating human problems that we’re just starting to see around AI-induced psychotic breaks and unhealthy attachments to AI chatbots.

Furthermore, Microsoft’s AI chief argues that the AI welfare conversation creates a new axis of division within society over AI rights in a “world already roiling with polarized arguments over identity and rights.”

Suleyman’s views may sound reasonable, but he’s at odds with many in the industry. On the other end of the spectrum is Anthropic, which has been hiring researchers to study AI welfare and recently launched a dedicated research program around the concept. Last week, Anthropic’s AI welfare program gave some of the company’s models a new feature: Claude can now end conversations with humans who are being “persistently harmful or abusive.

Keep reading

AI Startup Backed by Microsoft Revealed to Be 700 Indian Employees Pretending to Be Chatbots

A once-hyped AI startup backed by Microsoft has filed for bankruptcy after it was revealed that its so-called artificial intelligence was actually hundreds of human workers in India pretending to be chatbots.

Builder.ai, a London-based company previously valued at $1.5 billion, marketed its platform as an AI-powered solution that made building apps as simple as ordering pizza. Its virtual assistant, “Natasha,” was supposed to generate software using artificial intelligence.

In reality, nearly 700 engineers in India were manually coding customer requests behind the scenes, the Times of India reported.

The ruse began to collapse in May when lender Viola Credit seized $37 million from the company’s accounts, uncovering that Builder.ai had inflated its 2024 revenue projections by 300%. An audit revealed the company generated just $50 million in revenue, far below the $220 million it claimed to investors.

A Wall Street Journal report from 2019 had already questioned Builder.ai’s AI claims, and a former executive sued the company that same year for allegedly misleading investors and overstating its technical capabilities.

Despite that, the company raised over $445 million from big names including Microsoft and the Qatar Investment Authority. Builder.ai’s collapse has triggered a federal investigation in the U.S., with prosecutors in New York requesting financial documents and customer records.

Founder Sachin Dev Duggal stepped down earlier this year and was replaced by Manpreet Ratia, who reportedly uncovered the company’s internal misrepresentations.

The company now owes millions to Amazon and Microsoft in cloud computing costs and has laid off around 1,000 employees. On LinkedIn, the company announced its entry into insolvency proceedings, citing “historic challenges and past decisions” that strained its finances.

The fallout is seen as one of the biggest failures of the post-ChatGPT AI investment boom and has renewed scrutiny of “AI washing”—the trend of rebranding manual services as artificial intelligence to secure funding.

Keep reading

Leaked documents reveal Microsoft provided Israel’s Unit 8200 with tools to spy on Palestinians

  • Microsoft provided its Azure cloud platform to Israel’s Unit 8200, enabling mass surveillance of Palestinian communications.
  • Unit 8200 used Azure data to identify bombing targets in Gaza, leading to civilian casualties.
  • Microsoft claims ignorance but refuses to terminate its contract with Israeli military intelligence.
  • Investigations reveal Microsoft profits from war crimes while publicly promoting ethical AI principles.
  • Critics warn unchecked surveillance turns corporations into silent partners in oppression and human rights violations.

Microsoft isn’t exactly known for being ethical, but a shocking new exposé has exposed just how deep their complicity in war crimes runs. The Big Tech firm has been secretly providing Israel’s elite military intelligence Unit 8200 with its Azure cloud platform since 2021, enabling the storage and analysis of massive troves of Palestinian communications data.

According to a damning investigation by +972 MagazineLocal Call, and The Guardian, Microsoft’s technology has been weaponized to surveil millions of daily phone calls from Palestinians in Gaza and the West Bank, with Unit 8200 sources confirming the data was used to identify bombing targets in densely populated civilian areas. While Microsoft feigns ignorance, claiming its CEO was unaware of the data’s lethal purpose, the tech giant’s actions reveal a disturbing pattern of prioritizing profits over human lives… even as Palestinian civilians pay the ultimate price.

Keep reading

Did Microsoft Hand China Front Row Access to the Pentagon?

Let’s set the stage: Imagine Fort Knox, doors flung wide open, while a tour group from the Chinese Communist Party strolls through the vault with full access badges. Ridiculous? Sure. But swap out gold for data, and you’re not far off from what just happened with Microsoft, China-based engineers, and — wait for it — the U.S. military.

According to reports, we now know that Microsoft, the federal government’s longtime tech golden child, may have handed China a backstage pass to America’s most sensitive defense systems. Not through hacking or espionage — but through corporate hubris, off-the-books programming, and a terrifying lack of oversight.

A dangerous Microsoft initiative allowed China-based engineers working for Microsoft access to elements of the software powering our military’s digital infrastructure. And just to really spice things up, this may not have been properly disclosed to the Department of Defense.

In response, Senator Tom Cotton (R-AR) fired off a letter demanding answers. He wants to know what kind of access those engineers had, what vetting (if any) was done, and how a critical contractor failed to flag a program that sounds like it was cooked up in a spy novel.

This isn’t about paranoia — it’s about pattern recognition. China has been engaged in digital warfare against the West for years. From the OPM breach to targeting our infrastructure and tech companies with AI-driven cyberattacks, they’ve made it clear: they want our secrets, our systems, and ultimately, control of the digital battlefield.

And what have we done in response? We’ve outsourced vital software development to a tech company that couldn’t be bothered to mention Chinese nationals working on Defense Department tools.

Let that sink in.

Even worse, this comes amid a staggering spike in Microsoft vulnerabilities. The company’s systems have been peppered with Common Vulnerabilities and Exposures (CVEs) — some of them so severe they allow unauthorized access with a single email. One CVE error allowed attackers to exploit Outlook without user interaction. Just receiving the message triggered it. No click, no download — just a digital grenade in your inbox.

If you think a foreign adversary wouldn’t weaponize those kinds of flaws, bless your heart. But the rest of us should be alarmed that these exploits — paired with offshored engineering — could mean that China didn’t need to break into the Pentagon’s systems. They may have simply been invited in.

This crisis underscores a larger failure: our total underestimation of endpoint security. In a world where cyberattacks can be launched from an internet café or a basement across the globe, the last line of defense isn’t just software firewalls — it’s every connected device in the network. And right now, that defense is leaking like a sieve.

Keep reading

Microsoft knew of SharePoint server exploit but failed to effectively patch it

A security patch released by Microsoft (MSFT.O) last month failed to fully fix a critical flaw in U.S. tech giant’s SharePoint server software that had been identified in May, opening the door to a sweeping global cyber espionage operation.

It remains unclear who is behind the ongoing operation, which targeted around 100 organisations over the weekend. But Alphabet’s (GOOGL.O) Google, which has visibility into wide swathes of internet traffic, said it tied at least some of the hacks to a “China-nexus threat actor”.

The Chinese Embassy in Washington did not respond to a Reuters request for comment. Chinese government-linked operatives are regularly implicated in cyberattacks, but Beijing routinely denies carrying out hacking operations.

Contacted on Tuesday, Microsoft was not immediately able to provide comment on the patch and its effectiveness.

The vulnerability that facilitated the attack was first identified in May at a hacking competition in Berlin organised by cybersecurity firm Trend Micro (4704.T), which offered cash bounties for the discovery of computer bugs in popular software.

It offered a $100,000 prize for “zero day” exploits – so called because they leverage previously undisclosed digital weaknesses – that could be used against SharePoint, Microsoft’s flagship document management and collaboration platform.

A researcher working for the cybersecurity arm of Viettel, a telecommunications firm operated by Vietnam’s military, identified a SharePoint bug at the event, dubbed it ‘ToolShell’ and demonstrated a method of exploiting it.

The researcher was awarded $100,000 for the discovery, according to a post on X by Trend Micro’s “Zero Day Initiative”. A spokesperson for Trend Micro did not immediately respond to Reuters’ requests for comment regarding the competition on Tuesday.

Microsoft subsequently said in a July 8 security update that it had identified the bug, listed it as a critical vulnerability, and released patches to fix it.

Keep reading

Microsoft ends use of China-based computer engineers for certain Defense Dept projects amid espionage fears

Microsoft said it will cease using China-based computer engineering teams for work on Pentagon cloud systems, after an investigation this week led to national security concerns at the highest levels over a program that Microsoft has used since 2016.

ProPublica report released Tuesday accused Microsoft of allowing China-based engineers to assist with Pentagon cloud systems with inadequate guardrails in an effort to scale up its government contracting business. 

The report got the attention of GOP lawmakers and the Trump administration, with Defense Secretary Pete Hegseth insisting Friday that foreign engineers from “any country … should NEVER be allowed to maintain or access DOD systems.” He added that the Defense Department would be “looking into this ASAP.”

After Hegseth’s indication that the Pentagon would be looking into the matter, Fox News Digital reached out to Microsoft, which responded that it would be ceasing its use of China-based computer engineers providing assistance to sensitive Defense Department cloud “and related” services.

Keep reading

Report: Microsoft’s Chinese Engineers Access Pentagon Systems with Minimal Oversight from ‘Digital Escorts’

Microsoft is using engineers in China to help maintain the Defense Department’s computer systems — with minimal supervision by U.S. personnel — leaving some of the nation’s most sensitive data vulnerable to hacking from its leading cyber adversary, a ProPublica investigation has found.

A ProPublica investigation has uncovered that Microsoft is relying on engineers based in China to help maintain sensitive computer systems for the U.S. Department of Defense, with only minimal oversight from U.S. personnel. This arrangement, which Microsoft deems critical to winning the Pentagon’s cloud computing business, could potentially expose some of the country’s most sensitive data to espionage and hacking by China.

The system relies on U.S. workers with security clearances, known as “digital escorts,” to supervise the Chinese engineers and serve as a firewall against malicious activities. However, ProPublica found that these escorts often lack the advanced technical skills needed to effectively monitor the foreign workers, who possess far greater coding expertise. Some escorts are ex-military with little software engineering experience, earning barely above minimum wage.

Keep reading

The ‘Economy of Genocide’ Report: A Reckoning Beyond Rhetoric

Francesca Albanese, the United Nations Special Rapporteur on the situation of human rights in occupied Palestine, stands as a testament to the notion of speaking truth to power. This “power” is not solely embodied by Israel or even the United States, but by an international community whose collective relevance has tragically failed to stem the ongoing genocide in Gaza.

Her latest report, ‘From Economy of Occupation to Economy of Genocide,’ submitted to the UN Human Rights Council on July 3, marks a seismic intervention. It unflinchingly names and implicates companies that have not only allowed Israel to sustain its war and genocide against Palestinians, but also confronts those who have remained silent in the face of this unfolding horror.

Albanese’s ‘Economy of Genocide’ is far more than an academic exercise or a mere moral statement in a world whose collective conscience is being brutally tested in Gaza. The report is significant for multiple, interlocking reasons. Crucially, it offers practical pathways to accountability that transcend mere diplomatic and legal rhetoric. It also presents a novel approach to international law, positioning it not as a delicate political balancing act, but as a potent tool to confront complicity in war crimes and expose the profound failures of existing international mechanisms in Gaza.

Two vital contexts are important to understanding the significance of this report, considered a searing indictment of direct corporate involvement, not only in the ongoing Israeli genocide in Gaza, but Israel’s overall settler-colonial project.

First, in February 2020, following years of delay, the UN Human Rights Council (UNHRC) released a database that listed 112 companies involved in business activities within illegal Israeli settlements in occupied Palestine. The database exposes several corporate giants – including Airbnb, Booking.com, Motorola Solutions, JCB, and Expedia – for helping Israel maintain its military occupation and apartheid.

This event was particularly earth-shattering, considering the United Nations’ consistent failure at reining in Israel, or holding accountable those who sustain its war crimes in Palestine. The database was an important step that allowed civil societies to mobilize around a specific set of priorities, thus pressuring corporations and individual governments to take morally guided positions. The effectiveness of that strategy was clearly detected through the exaggerated and angry reactions of the US and Israel. The US said it was an attempt by “the discredited” Council “to fuel economic retaliation,” while Israel called it a “shameful capitulation” to pressure.

The Israeli genocide in Gaza, starting on October 7, 2023, however, served as a stark reminder of the utter failure of all existing UN mechanisms to achieve even the most modest expectations of feeding a starving population during a time of genocide. Tellingly, this was the same conclusion offered by UN Secretary-General António Guterres, who, in September 2024, stated that the world had “failed the people of Gaza.”

This failure continued for many more months and was highlighted in the UN’s inability to even manage the aid distribution in the Strip, entrusting the job to the so-called Gaza Humanitarian Foundation, a mercenary-run violent apparatus that has killed and wounded thousands of Palestinians. Albanese herself, of course, had already reached a similar conclusion when, in November 2023, she confronted the international community for “epically failing” to stop the war and to end the “senseless slaughtering of innocent civilians.”

Albanese’s new report goes a step further, this time appealing to the whole of humanity to take a moral stance and to confront those who made the genocide possible. “Commercial endeavors enabling and profiting from the obliteration of innocent people’s lives must cease,” the report declares, pointedly demanding that “corporate entities must refuse to be complicit in human rights violations and international crimes or be held to account.”

According to the report, categories of complicity in the genocide are divided into arms manufacturers, tech firms, building and construction companies, extractive and service industries, banks, pension funds, insurers, universities, and charities.

These include Lockheed Martin, Microsoft, Amazon, Palantir, IBM, and even Danish shipping giant Maersk, among nearly 1,000 other firms. It was their collective technological know-how, machinery, and data collection that allowed Israel to kill, to date, over 57,000 and wound over 134,000 in Gaza, let alone maintain the apartheid regime in the West Bank.

Keep reading

Microsoft Drops USAID-Funded NewsGuard After Ted Cruz Starts Digging

Microsoft has dropped NewsGuard, a left-wing fact-checking organization they partnered with that has helped the advertising industry justify blacklists for independent conservative media sites such as ZeroHedge.

The move came after Sen. Ted Cruz (R-TX) began investigating Microsoft for funding the online “media literacy” censorship tool created by NewsGuard to help guide “learners of all ages through the overwhelming landscape of online news and information.”

Now we come to find out that NewsGuard was funded by USAID

Keep reading