06:20 PM
Connect Directly

Are Security Concerns Over Trumps Android, Twitter Use Overblown?

Security experts say it's hard to know for sure without further details.

Some concerns aired lately about potential security implications of President Trump’s use of his Twitter account and apparently an old personal Android smartphone could be based on incomplete information security experts said this week.

Several media reports in recent days have noted Trump’s apparent use of an old and unsecured Android device to post his tweets. Android Central analyzed a couple of photos of Trump using the phone and surmised that it most likely was a Samsung Galaxy S3 released back in 2012, and which hasn’t received any software updates since at least 2012.

Trump was rumored to have turned in the phone for an encrypted US Secret Service-approved device soon after being sworn in as President. But in an interview with The New York Times earlier this week, he seemed to indicate that he still had the old Android and was apparently using it to post on Twitter.

In a separate story, The New York Times described Trump’s alleged use of the old Android as a practice that could expose him and the nation to multiple security threats. The Times cited experts as worrying over whether the device and its contents were properly encrypted, whether it was open to hacking on cellular and Wi-Fi networks, and its susceptibility to location tracking.

Famed cryptographer Bruce Schneier expressed concern about the potential for the phone to be used for eavesdropping, if indeed Trump was using the phone as reported. Meanwhile, there were reports this week that Trump’s official @POTUS Twitter account was possibly connected to a personal Gmail account belonging to White House social media director Dan Scavino - claims that stirred additional security concerns.

A Twitter user with the handle WauchulaGhost noted the problem in how Trump’s Twitter account was secured and that of multiple other Twitter accounts belonging to people close to the President. On Thursday, Trump’s @POTUS account was linked to a White House email account after several media reports had raised the issue.

While such issues are important, the real question is to what extent they are being allowed to become a security problem, several experts said.

"The White House has a solid security team," says Eddie Schwartz, president and COO of White Ops Inc. "It's unlikely they and more senior officials would not have briefed the President or his aides on the risks of their personal devices."

At a minimum, they would have taken steps to lock down personal devices or keep them out of controlled access areas where classified material is discussed, Schwartz says.

Multiple measures are also available to shore up security on off-the-shelf devices like the aging Android that the President is reported to be using, he says. This can include measures like implementing data encryption at rest and in transmission, the use of a secure OS like Knox, and device configuration management.

"Certain hardware and software platforms have more problems than others," he says. "But I’m confident that the White House has access to all the vulnerabilities that are known by the government."

Morey Haber, vice president of technology at BeyondTrust, said it's hard to believe that the Secret Service and the NSA would allow the President direct access to an unsecure device with an unsecure set of credentials based on a commercial Gmail account. It is also very likely that someone other that Trump is tweeting the messages on his behalf, Haber says. The President himself will likely only be allowed to use an authorized Blackberry or STIG-hardened Android device, he noted.

"I have no insight or inside information into what device President Trump really is using," notes John Pescatore, director of emerging security threat at SANS Institute. But it isn’t unusual at all for a C-level executive or a Command-in-Chief to refuse to be dictated a security function.

If that is the case, "I hope that President Trump is at least using a single-purpose device only for Tweeting and using the strongest authentication possible," he says, noting Twitter’s available two-factor verification process. Ideally, the President would be using an authorized device that is locked down and monitored and kept secure.

"That said, he has been a prolific Tweeter for many years and doesn’t seemed to have fallen to attacks before," Pescatore says. "He may be unusually security-aware or just unusually lucky."

Either way, it is up to the President to set the standard in secure communications from the top-down, according to Pescatore.

Related stories:


Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
1/30/2017 | 12:18:39 PM
White House Social Media Tweet
FWIW: He's apparently since deleted it (along with all Tweets except the last five, as of this posting), but I could have sworn that I remembered seeing a recent Tweet from Dan Scavino, White House social media director, expressly telling reporters that the White House/Administration had "zero interest" in discussing social media security issues.

If it wasn't Scavino, it was somebody else close to the Administration, but I'm pretty sure it was him.
User Rank: Strategist
1/30/2017 | 8:52:15 AM
No, they are not being overblown

This has been another episode of simple answers to simple questions.


If you really need to be reminded President Trump is the guy that claimed he does not need security briefings because he is "a smart guy". Do you think he listens to the security experts avialable to him? If he did has he given any indication at all that he could retain and process that information? Any sign that he would behave in any way other than how he has previously?
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.