China's Shocking US Military Hack: A Decade of Secrets
Jul 29, 2025
Chinese hackers breached US nuclear security! How did Microsoft engineers in China gain access? A decade-old legacy system is now under review. 'Literally no one seems to know anything about this.' What happens if nuclear weapons systems are compromised? #ChinaHack #CyberSecurity #NuclearThreat #USDefense #Microsoft #TechNews
View Video Transcript
0:00
Last week, Chinese hackers penetrated a
0:03
high level security agency responsible
0:06
for maintaining and designing America's
0:09
nuclear weapons. It's not clear yet if
0:12
they gained access to any classified
0:14
information.
0:16
A new investigation reveals China may
0:18
have breached sensitive United States
0:20
military systems more than a decade ago.
0:23
National security correspondent Caitlyn
0:25
Burke has the details.
0:28
China's potential end to DoD systems
0:30
didn't come in the form of a cyber
0:32
attack or a rogue agent inside the
0:34
government. The source appears to be
0:36
Microsoft employees based in China
0:39
operating under oversight of
0:40
undertrained US-based supervisors.
0:43
These uh Microsoft engineers based in
0:46
mainland China were feeding code to uh
0:49
what were called digital escorts. So
0:51
these were DoD employees with security
0:53
clearances. They're able to take the
0:55
code that was produced by Microsoft
0:56
engineers and then put it directly into
0:59
DoD systems.
1:00
While these Microsoft employees are not
1:02
known Chinese agents, according to a
1:04
ProPublica investigation, many of the
1:07
digital escorts tasked with patching
1:09
their work into DoD systems, report
1:12
being illequipped to understand the code
1:14
they receive. Jack Bernham, a research
1:16
analyst with the Foundation for Defense
1:18
of Democracies, sees this arrangement
1:20
creating two main security concerns. So
1:23
there's both a concern about
1:24
vulnerabilities in terms of Chinese
1:27
engineers employed by Microsoft having
1:29
an extensive knowledge of the cloud
1:30
computing system. So being able to
1:33
target certain aspects as well as
1:35
potentially introducing vulnerabilities
1:37
that these digital escorts may not have
1:38
known existed because they didn't have
1:40
the technical expertise in order to spot
1:42
them.
1:43
Both Microsoft and the Pentagon were
1:45
reportedly notified over the last decade
1:47
regarding potential security concerns
1:49
given the location of the Microsoft
1:51
engineers. But when ProPublica spoke
1:53
with former and current Pentagon
1:55
officials, many had little to no
1:57
knowledge of the program or how it
1:59
operated. The spokesperson for the
2:01
Defense Information Systems Agency,
2:03
saying, quote, "Literally, no one seems
2:06
to know anything about this, so I don't
2:08
know where to go from here." Microsoft,
2:10
meanwhile, issuing a statement saying,
2:12
"Its personnel and contractors operate
2:14
in a manner quote consistent with US
2:16
government requirements and processes."
2:19
No matter what circumstances led to this
2:21
system flying under the radar for so
2:23
long, Defense Secretary Pete Hgsth says
2:26
it ends now.
2:27
And I want to thank all those Americans
2:28
out there in the media and elsewhere who
2:30
raised this issue to our attention so we
2:33
could address it.
2:34
Effective immediately, Hgsithth says
2:36
China will no longer have any
2:37
involvement in DoD cloud services and
2:40
he's ordered a two-week review of all
2:42
other Pentagon systems. This is
2:44
obviously unacceptable, especially in
2:47
today's digital threat environment. Now,
2:50
this was a legacy system created over a
2:52
decade ago during the Obama
2:54
administration. But we have to ensure
2:56
the digital systems that we use here at
2:58
the Defense Department are ironclad and
3:01
impenetrable. National security experts
3:04
say it's time for a cyber security
3:06
mindset shift across the federal
3:08
government and for a major investment in
3:10
a trusted workforce here at home capable
3:13
of ensuring more critical systems aren't
3:15
left vulnerable. Caitlyn Burke, CBN
3:17
News, Washington.
3:19
No, frankly, there needs to be a total
3:21
ban on either China or uh any of the the
3:25
the enemies of the United States.
3:28
China's been stealing US tech for
3:31
decades and and and it's not a new
3:33
story. What is a new story is that
3:35
somehow or other our department of
3:37
defense was using uh Chinese engineers
3:41
in in order to update the the uh code
3:45
for our our most sensitive data which is
3:48
how our nuclear weapons are designed. Uh
3:51
can you imagine a a warfare scenario
3:54
where the unthinkable is happening and
3:57
nuclear weapons are being exchanged and
4:00
suddenly because of a um ability to hack
4:03
them our weapons aren't aren't usable.
4:06
Well, it it it's just literally
4:08
mind-boggling that we would use
4:11
engineers in China for that task. And
4:15
you say, well, they're Microsoft
4:16
employees. Well, if you're a citizen of
4:20
China, there's a lot of pressure that
4:22
the Chinese government can and will put
4:25
on you to to bend to their will. And and
4:29
if you're in that sensitive position,
4:32
they know it already. So, uh, is it any
4:35
surprise that Chinese engineers would be
4:38
working for their own government in
4:41
order to extract secrets from our
4:43
Department of Defense? What is just
4:46
amazing to me is Microsoft would let
4:49
that happen and the Department of
4:51
Defense would let that happen and it
4:54
would sneak in. Again, it's been going
4:56
on for decades. China stealing it uh
5:00
from the US and and and using it for
5:03
their own systems. Uh and is it any
5:06
surprise that they would do it with our
5:08
defense department?
#Hacking & Cracking
#Military
#Network Security