• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Mobility

Trump Illustrates Frustrations of Employee BYOD Security

President Trump reportedly uses an unsecured iPhone that leaves his conversations vulnerable to eavesdropping by foreign governments like China and Russia.

November 12, 2018 Sam Harton 2 Comments

iOS macOS vulnerabilities
stock.adobe.com

Though President Trump’s aides have repeatedly told him that he should not use an unsecured phone in the White House, they have had to resort to just hoping he doesn’t discuss classified matters via his cell phone, according to The Verge. He refuses to heed their warnings, taking calls on his personal cell phone rather than the secured White House landline, consequently giving foreign governments access to his personal communications and interests.

US Intelligence agencies are particularly concerned that Russia and China may be eavesdropping on such conversations, with China possibly listening in to better understand Trump’s behaviors and how to most effectively influence him.

China’s effort is a 21st-century version of what officials there have been doing for many decades, which is trying to influence American leaders by cultivating an informal network of prominent businesspeople and academics who can be sold on ideas and policy prescriptions and then carry them to the White House,” wrote The New York Times. “The difference now is that China, through its eavesdropping on Mr. Trump’s calls, has a far clearer idea of who carries the most influence with the president, and what arguments tend to work.”

It is relatively easy for US and foreign government agencies to tap into an iPhone caller’s conversations unless National Security Agency protections, which limit an attackers ability to exploit the device’s security vulnerabilities, have been installed on that phone. Of Trump’s three iPhones, only two have these protections installed, as Trump appreciates the fact that he can store contacts in an unsecured phone.

Listening to foreign leaders’ phone calls is known to be an effective spying technique, so previous presidents like Barack Obama used iPhones that were unable to take pictures or receive messages from anyone but a specific email address. These iPhones, though limited in features, limited any attackers ability to eavesdrop on leaders’ communication patterns. Though Trump does not text or use email on his unsecured phone, his failure to follow this protocol worries experts.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cyber Security, Mobile Device

Related Content:

  • Xyte Mobile View for Support Teams and IT Managers to Monitor and Manage Their Devices On The Go Xyte Unveils Mobile RMM for IT Managers to…
  • VuWall Enhances Operational Efficiency for SIMOS Control Center
  • Crestron Automate VX Microsoft Grants Teams Room Device Certification to Crestron’s…
  • Zoom Anthropic Claude AI Zoom IQ Zoomtopia 2023 Unveils AI-Powered Workspaces, New Features for…

Free downloadable guide you may like:

  • Blueprint Series Cover: What works for hybrid workBlueprint Series: What Works for Hybrid Work

    Download this free resource to learn about how IT leaders can effectively manage and implement a hybrid work model.

Reader Interactions

Comments

  1. rana gulfam says

    November 18, 2018 at 10:37 am

    This is a great article about the power of the security system by the trump.
    Thanks for the sharing

    Reply

Trackbacks

  1. My TechDecisions Week in Review: IT Outsourcing, GDPR, ROI, etc. - My TechDecisions says:
    November 16, 2018 at 12:00 pm

    […] Trump Illustrates Frustrations of Employee BYOD Security […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.