Following a series of cyberattacks and two assassination attempts on President Donald Trump, his presidential campaign has taken significant steps to strengthen security. The Trump campaign is now deploying special encrypted cell phones and secure laptops to protect its staff.
The devices were obtained from Green Hills Software, a Santa Barbara, California-based company, Reuters reported. Green Hills Software is known for its security-focused operating systems, which are already used by several U.S. government agencies. Dan O’Dowd, president and CEO of Green Hills Software, said his company provided the Trump campaign with customized Android phones that run on its own operating system.
These phones have been stripped of most functionality, leaving only basic features like calling and text messaging, with added security protocols to protect users from cyber threats.
Green Hills Software had issued a press release regarding the deal on October 1st, but the news received little attention. O’Dowd said that through mutual connections, he reached out to the Trump campaign and offered the company’s technology.
A Trump campaign spokesperson declined to comment on the matter to Reuters. However, a source familiar with the campaign’s internal operations confirmed that top-level staff had recently upgraded the devices with stronger security measures, although it was unclear which vendor was chosen.
The decision to beef up security for the Trump campaign comes after months of targeted cyberattacks by Iranian hackers. These attacks, led by a group known as APT42, resulted in the theft of internal communications and documents. Concerns about physical threats were also heightened by concerns that hackers could use stolen information to track and compromise campaign staff. O’Dowd revealed that key personnel are already using newly acquired devices designed to withstand remote cyberattacks.
O’Dowd said the phones operate on a closed network, allowing communication only between devices on the same plan. These devices include features such as end-to-end encryption and two-factor authentication, which are standard recommendations by cybersecurity experts. APT42, the hacker group responsible for infiltrating the Trump campaign earlier in the summer, is known for using sophisticated mobile malware. You can record conversations and remotely activate your phone camera.
O’Dowd declined to say how many devices were purchased in the campaign or how much they cost, but said prices will vary depending on customer needs. In addition to the phones, the campaign also acquired specially designed laptops with limited access to the Internet, aimed at preventing cyber intrusions from outside.
These laptops are configured similarly to mobile phones and provide a secure way for team members to collaborate remotely while maintaining strict isolation from potential attackers.
O’Dowd emphasized that the technology is being adopted by legal teams handling sensitive cases where it is important to keep files safe. Green Hills Software, a U.S. government contractor, supplies operating systems to multiple branches of the military, including integration into weapons systems. O’Dowd also noted that the company’s laptop products are used in FBI field offices.
Do you think that’s enough protection?