Skip to main content

The context you need, when you need it

When news breaks, you need to understand what actually matters — and what to do about it. At Vox, our mission to help you make sense of the world has never been more vital. But we can’t do it on our own.

We rely on readers like you to fund our journalism. Will you support our work and become a Vox Member today?

Join now

Trump’s cybersecurity hypocrisy, in 10 tweets

Why your Twitter might be more secure than the president’s.

For all of Donald Trump’s extended hand-wringing over Hillary Clinton’s emails, his concerns about her conduct appear to have merely been campaign rhetoric. Though Trump came down harshly and repeatedly on Clinton’s use of a private email server while secretary of state, he’s since remained silent about the lapses he and some of staff have had in cybersecurity.

Thursday morning, White House press secretary Sean Spicer tweeted a bizarre string of eight numbers and letters before deleting them shortly thereafter. Some on Twitter guessed that he may have accidentally broadcast his Twitter password.

This wasn’t Spicer’s first cryptic tweet since assuming the role of press secretary. The day before, he published a different unintelligible mix of letters, which he promptly deleted.

In the midst of Spicer’s tweeting, a New York Times article was published Thursday that detailed possible security risks President Trump himself could pose because of his continued use of an old, unsecured Android phone. (Trump uses it for, among other things, tweeting.) As the New York Times’s Cecilia Kang explains,

Twitter requires a connection to the internet, which exposes the device to security vulnerabilities if proper measures like two-factor authentication — a password and a code texted to a phone, for example — are not in place. If he uses the smartphone on an unsecure Wi-Fi network, he could be exposing his location and other personal information on the device.

Then, seemingly confirming the security vulnerabilities related to Trump’s Twitter habit, it was revealed that Trump’s account is tied to the private Gmail address of Dan Scavino, Trump’s head of social media. The recovery screen below, if authentic, indicates that Trump had not set up two-factor verification for his account, a simple procedure that helps users limit who is able to log in to their accounts and also whether personal information is shown if a password needs to be recovered.

Trump’s own fixation on hacking predates his presidential campaign and, like much of his discourse, is evidenced on Twitter. While many remember when Trump urged Russia to hack Clinton’s emails in July 2016 during a news conference, it’s worth noting that he also called for a hack of President Obama’s college records back in September 2014.

In 2015, he criticized the federal government after Chinese hackers stole Social Security numbers of federal employees.

And in 2016, he actually doubled down on his controversial invitation for Russia to hack Clinton, tweeting:

After his election, Trump criticized the Democratic National Committee for allowing itself to be hacked, arguing that the Republican National Committee was not hacked because it had better security. In fact, FBI Director James Comey told lawmakers that Russian hackers did execute a “limited penetration” of older RNC systems “no longer in use.”

Then earlier this month, ignoring evidence from US intelligence agencies that Russia was definitively behind the hacks, Trump tweeted:

At a news conference days later, Trump finally acknowledged that Russia was involved in election hacking, saying, “As far as hacking, I think it was Russia. Hacking’s bad, and it shouldn’t be done.” Still, he praised the results of Russia’s efforts. “But look at the things that were hacked, look at what was learned from that hacking,” he said, likely referring to Clinton campaign chair John Podesta’s emails.

Most recently, Trump called the dossier of unverified claims about Russia’s supposed information about him “FAKE NEWS,” and promised to release a “full report” on Russian hacking of the election within 90 days.

One would hope Trump is less keen on inviting foreign governments to hack federal agencies now that he holds the keys to the White House. Regardless, his entire administration should look into two-step verification for all of their accounts ASAP, at the very least.

See More:

More in Politics

The Logoff
Trump’s DOJ wants to undo January 6 convictionsTrump’s DOJ wants to undo January 6 convictions
The Logoff

How the Trump administration is still trying to rewrite January 6 history.

By Cameron Peters
Politics
Donald Trump messed with the wrong popeDonald Trump messed with the wrong pope
Politics

Trump fought with Pope Francis before. He’s finding Pope Leo XIV to be a tougher foil.

By Christian Paz
Podcasts
A cautionary tale about tax cutsA cautionary tale about tax cuts
Podcast
Podcasts

California cut property taxes in the 1970s. It didn’t go so well.

By Miles Bryan and Noel King
Podcasts
Obama’s top Iran negotiator on Trump’s screwupsObama’s top Iran negotiator on Trump’s screwups
Podcast
Podcasts

Wendy Sherman helped Obama reach a deal with Iran. Here’s what she thinks Trump is doing wrong.

By Kelli Wessinger and Noel King
Politics
The Supreme Court could legalize moonshine, and ruin everything elseThe Supreme Court could legalize moonshine, and ruin everything else
Politics

McNutt v. DOJ could allow the justices to seize tremendous power over the US economy.

By Ian Millhiser
The Logoff
The new Hormuz blockade, briefly explainedThe new Hormuz blockade, briefly explained
The Logoff

Trump tries Iran’s playbook.

By Cameron Peters