Is Trump using an unsecured smartphone?


By Dylan Bushell-Embling
Monday, 20 February, 2017


Is Trump using an unsecured smartphone?

Two US senators have raised concerns over President Donald Trump’s alleged continued use of an unsecured personal Android smartphone.

In an open letter to Department of Defense Secretary James Mattis, democratic senators Tom Carper and Claire McCaskill commented that media report indicates that Trump may still be using his own smartphone, despite being provided with a secure, encrypted device approved by the Secret Service prior to taking office.

The senators said security risks associated with the use of insecure smartphones include hackers’ ability to turn on audio recording and camera features, as well as activating surveillance tools that allow for location tracking.

“While it is important for the president to have the ability to communicate electronically, it is equally important that he does so in a manner that is secure and that ensures the preservation of presidential records,” the letter states.

The letter seeks a written response confirming whether Trump received a secure smartphone prior to inauguration, and the protective measures Defense is putting into place regarding Trump’s use of a personal smartphone.

Hillary Clinton, Trump’s rival in the 2016 presidential election, was the subject of a protracted controversy after revelations that she used her family’s private email server for official communications during her time as Secretary of State, rather than the official State Department email accounts.

Image courtesy of Gage Skidmore under CC

Follow us on Twitter and Facebook

Related Articles

Accelerating the adoption of passkeys without compromising user experience

We need authentication methods that remove the human element from the equation, and that's...

Modern CISOs must throw out the traditional cybersecurity playbook

The primary imperative for today's CISOs should be to align the security agenda with business...

AI agents: securing the 'artificial workforce'

Just as they would with new employees, security teams will need to define access policies for...


  • All content Copyright © 2025 Westwick-Farrow Pty Ltd