Is Trump using an unsecured smartphone?


By Dylan Bushell-Embling
Monday, 20 February, 2017


Is Trump using an unsecured smartphone?

Two US senators have raised concerns over President Donald Trump’s alleged continued use of an unsecured personal Android smartphone.

In an open letter to Department of Defense Secretary James Mattis, democratic senators Tom Carper and Claire McCaskill commented that media report indicates that Trump may still be using his own smartphone, despite being provided with a secure, encrypted device approved by the Secret Service prior to taking office.

The senators said security risks associated with the use of insecure smartphones include hackers’ ability to turn on audio recording and camera features, as well as activating surveillance tools that allow for location tracking.

“While it is important for the president to have the ability to communicate electronically, it is equally important that he does so in a manner that is secure and that ensures the preservation of presidential records,” the letter states.

The letter seeks a written response confirming whether Trump received a secure smartphone prior to inauguration, and the protective measures Defense is putting into place regarding Trump’s use of a personal smartphone.

Hillary Clinton, Trump’s rival in the 2016 presidential election, was the subject of a protracted controversy after revelations that she used her family’s private email server for official communications during her time as Secretary of State, rather than the official State Department email accounts.

Image courtesy of Gage Skidmore under CC

Follow us on Twitter and Facebook

Related Articles

Defending against AI‍-‍powered cyberthreats

Improving cyber resilience is no longer about perimeter defence or reactive patching, but...

Lessons from the Land Rover cyber attack: seeing risk before it strikes

The recent Jaguar Land Rover cyber attack saga is a stark demonstration of what happens when...

Why AI agents are a new insider threat for business

AI-powered insiders are non-human actors operating within the perimeter, inheriting trusted...


  • All content Copyright © 2025 Westwick-Farrow Pty Ltd