In the sanity of the Obama administration, cell phones were handed over every thirty days for security purposes. In the Trump mal-administration, Trump has gone as long as five months without having his phone examined, finding it “too inconvenient” to deal with. Politico:
Trump’s reluctance to submit to White House security protocols that would limit his ability to tweet or contact friends freely is a case of the president’s personal peculiarities colliding with the demands of his office — a tension created in part because of society’s growing attachment to mobile technology over the past decade.
Naturally, in his characteristic myopic selfishness, Trump puts his own comfort even in trivial things above the larger issues of his duty to his office.
“Foreign adversaries seeking intelligence about the U.S. are relentless in their pursuit of vulnerabilities in our government’s communications networks, and there is no more sought-after intelligence target than the president of the United States,” said Nate Jones, former director of counterterrorism on the National Security Council in the Obama administration and the founder of Culper Partners, a consulting firm.
While the president has the authority to override or ignore the advice provided by aides and advisers for reasons of comfort or convenience, Jones said, “doing so could pose significant risks to the country.”
Trump campaigned in part on his denunciations of Hillary Clinton’s use of a private email server as secretary of state — a system that made classified information vulnerable to hacking by hostile actors.
“Her server was easily hacked by foreign governments, perhaps even by her financial backers in communist China — sure they have it — putting all of America and our citizens in danger, great danger,” Trump said in a June 2016 speech in which he called Clinton “the most corrupt person ever to run for president.” He repeatedly vowed on the trail to “lock her up.”
The most corrupt person ever to run for office did indeed run in 2016 and it was not Hillary Clinton.
This is a Creative Commons article. The original version of this article appeared here.