Security Experts:

Connect with us

Hi, what are you looking for?


Mobile & Wireless

Senators Launch Query on Trump’s Smartphone Security

Washington – Two US senators have requested details on President Donald Trump’s smartphone security, saying he could jeopardize national secrets if he is still using his old handset, as some reports say.

Washington – Two US senators have requested details on President Donald Trump’s smartphone security, saying he could jeopardize national secrets if he is still using his old handset, as some reports say.

“Did Trump receive a secured, encrypted smartphone for his personal use on or before Jan. 20? If so, is he using it?,” said a tweet Tuesday by Senator Tom Carper, who along with fellow Democrat Claire McCaskill released a letter to the administration requesting information on the president’s device.

“Trump should be well aware by now of the appropriate and necessary protocol to safeguard our nation’s secrets.”

The letter from the two lawmakers, dated February 9, was sent to Defense Secretary James Mattis along with Homeland Security chief John Kelly and the National Security Agency director Michael Rogers. The senators released the letter late Monday.

The lawmakers said they were concerned by reports that Trump was still using an Android device that may be several years old for his frequent personal Twitter messages.

“While it is important for the president to have the ability to communicate electronically, it is equally important that he does so in a manner that is secure and that ensures the preservation of presidential records,” the letter said.

“The national security risks of compromising a smartphone used by a senior government official, such as the president of the United States, are considerable.”

The New York Times reported last month that while Trump had received a new, secure device after his inauguration, he still relied on his older device despite protests from aides.

That report prompted a flurry of comments from security experts who argued that the president would be inviting danger by using his old personal phone.

Trump’s smartphone “would probably be the most widely prized device on the internet for hackers — and top of the target list for intelligence agencies around the world,” said independent security researcher Graham Cluley in a blog post Tuesday.

Last month, Nicholas Weaver of the International Computer Science Institute in Berkeley, California, warned that “Trump’s continued use of a dangerously insecure, out-of-date Android device should cause real panic.”

Writing on the Lawfare blog, Weaver noted that hackers could gain access to the phone’s location as well as its microphone and camera and that “the working assumption should be that Trump’s phone is compromised by at least one — probably multiple — hostile foreign intelligence services and is actively being exploited.”

Written By

AFP 2023

Click to comment

Expert Insights

Related Content

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

South Dakota Gov. Kristi Noem says her personal cell phone was hacked and linked it to the release of documents by the January 6...


A digital ad fraud scheme dubbed "VastFlux" spoofed over 1,700 apps and peaked at 12 billion ad requests per day before being shut down.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Application Security

Software maker Adobe on Tuesday released security patches for 29 documented vulnerabilities across multiple enterprise-facing products and warned that hackers could exploit these bugs...