Trump chief of staff's personal phone 'compromised'

John Kelly's smartphone may have been accessed by a foreign power - reports

A top US official may have had his personal smartphone compromised by hackers or a foreign government, it has been claimed.

John Kelly, the US chief of staff, took his phone to White House tech support staff in the summer, complaining that it hadn't working properly for several months, Politico reports.

The IT team then discovered a potential breach in the device, which may date back to as late as December 2016, leading to concerns sensitive information may have been disclosed to a third party, such as criminal hackers or a foreign state.

A White House spokesman told Politico Kelly hadn't used his personal device very much since joining the Trump administration in January this year. However, he is no longer in the possession of the device, the spokesman said.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Kelly's travel schedule during 2016 is now under review, presumably in an effort to determine where and when the device was compromised, something that's currently a mystery.

According to government officials cited by Politico, it's also unclear "what data might have been accessed [on the device], if any".

This is the second alleged data leak affecting the US government revealed in the past 24 hours. Last night, reports also emerged of a potential major security breach at the NSA, in which hacking tools may have been stolen by cyber criminals or a foreign state.

The White House is also currently embroiled in another potential data security scandal involving several high-ranking members of staff, who have allegedly been using their personal emails to conduct official government business.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/business-strategy/careers-training/354596/the-tech-skills-you-need-to-succeed-in-the-us
Careers & training

The tech skills you need to succeed in the US

21 Jan 2020
Visit/policy-legislation/data-protection/354454/box-ceo-most-internet-users-will-ditch-privacy-for-online
data protection

Box CEO: Most internet users will ditch privacy for online services

3 Jan 2020
Visit/business/business-strategy/354445/what-tech-does-it-take-to-make-a-business-succeed-in-the-us
Business strategy

What tech does it take to make a business succeed in the US?

3 Jan 2020
Visit/infrastructure/network-internet/354446/what-is-google-fiber
Network & Internet

What is Google Fiber?

2 Jan 2020

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/policy-legislation/general-data-protection-regulation-gdpr/354577/data-protection-fines-hit-ps100m
General Data Protection Regulation (GDPR)

Data protection fines hit £100m during first 18 months of GDPR

20 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020