Trump chief of staff's personal phone 'compromised'

John Kelly's smartphone may have been accessed by a foreign power - reports

A top US official may have had his personal smartphone compromised by hackers or a foreign government, it has been claimed.

John Kelly, the US chief of staff, took his phone to White House tech support staff in the summer, complaining that it hadn't working properly for several months, Politico reports.

The IT team then discovered a potential breach in the device, which may date back to as late as December 2016, leading to concerns sensitive information may have been disclosed to a third party, such as criminal hackers or a foreign state.

A White House spokesman told Politico Kelly hadn't used his personal device very much since joining the Trump administration in January this year. However, he is no longer in the possession of the device, the spokesman said.

Advertisement
Advertisement - Article continues below

Kelly's travel schedule during 2016 is now under review, presumably in an effort to determine where and when the device was compromised, something that's currently a mystery.

According to government officials cited by Politico, it's also unclear "what data might have been accessed [on the device], if any".

This is the second alleged data leak affecting the US government revealed in the past 24 hours. Last night, reports also emerged of a potential major security breach at the NSA, in which hacking tools may have been stolen by cyber criminals or a foreign state.

The White House is also currently embroiled in another potential data security scandal involving several high-ranking members of staff, who have allegedly been using their personal emails to conduct official government business.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019
Visit/policy-legislation/34603/california-bans-police-use-of-facial-recognition-for-three-years
Policy & legislation

California bans police use of facial recognition until 2030

10 Oct 2019
Visit/policy-legislation/34586/us-blacklists-chinese-surveillance-firms-over-uyghur-muslim-abuse
Policy & legislation

US blacklists Chinese surveillance firms over Uyghur abuse

8 Oct 2019
Visit/security/34572/uk-and-us-plead-with-mark-zuckerberg-to-bin-encryption-plans
Security

UK and US plead with Mark Zuckerberg to bin encryption plans

4 Oct 2019

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/network-internet/wifi-hotspots/354283/industrial-wi-fi-6-trial-reveals-blistering-speeds
wifi & hotspots

Industrial Wi-Fi 6 trial reveals blistering speeds

5 Dec 2019
Visit/business/policy-legislation/354282/boris-johnson-suggests-uk-will-side-with-us-over-huawei
Policy & legislation

Boris Johnson suggests UK will side with US over Huawei exclusion

5 Dec 2019