Cybersecurity alarms sound as Trump team rejects secure communications
Federal officials are alarmed by the Trump transition team’s use of private email accounts and devices, bypassing government cybersecurity measures.
This approach has sparked fears of exposing sensitive government data to hacking attempts.
According to two federal officials granted anonymity to discuss a sensitive situation with Politico, instead of official .gov addresses, the team uses private domains such as @transition47.com, along with personal servers, laptops, and cell phones, Caliber.Az reports.
This unconventional practice stems from the team’s decision to forgo federal funding and its associated ethics and transparency requirements.
The reliance on private systems has disrupted the transition process, with federal employees hesitating to share sensitive information electronically. Agencies are opting for in-person briefings and requiring transition officials to verify that their private technology meets security standards.
The White House has sent guidance to federal agencies to be cautious when communicating with the Trump transition, a spokesperson said, reminding them that they can elect to “only offer in-person briefings and reading rooms in agency spaces” if they’re uncomfortable sending something electronically.
They also advised federal employees that they can require transition officials to “attest” that their private technology complies with government security standards.
“Because they don’t have official emails, people are really wary to share things,” said a State Department employee granted anonymity to discuss private conversations. “I’m not going to send sensitive personnel information to some server that lives at Mar-a-Lago while there are so many fears of doxxing and hacking. So they have to physically come and look at the documents on campus, especially for anything with national security implications.”
Michael Daniel, a former White House cybersecurity coordinator, emphasized the risks of foreign intelligence targeting the transition, given the strategic interest in the incoming administration’s policies. This situation is exacerbated by the team’s late deployment of landing groups to federal agencies, further delaying collaboration.
Transition spokesperson Brian Hughes defended the private system, claiming secure communication measures are in place, though specifics remain undisclosed. Experts warn that such an approach could expose the team to future phishing attacks and other cyber threats, jeopardizing national security during this critical handover period.
History shows the dangers of compromised transitions, with past crises like the Bay of Pigs and Waco standoff serving as stark reminders. Modern technology amplifies these risks, making secure transitions more vital than ever. Heath Brown, a professor and transition expert, noted that rejecting government cybersecurity support raises significant concerns about the team’s preparedness.
By Tamilla Hasanova