{"id":119450,"date":"2024-12-18T23:15:38","date_gmt":"2024-12-18T23:15:38","guid":{"rendered":"http:\/\/cryptospotters.net\/?p=119450"},"modified":"2024-12-18T23:15:38","modified_gmt":"2024-12-18T23:15:38","slug":"trumps-transition-is-happening-over-private-emails-federal-officials-are-nervous","status":"publish","type":"post","link":"http:\/\/cryptospotters.net\/?p=119450","title":{"rendered":"Trump&#8217;s transition is happening over private emails. Federal officials are nervous."},"content":{"rendered":"<p>Source: Politics<\/p>\n<p>Federal officials say they\u2019re worried about sharing documents via e-mail with Donald Trump&#8217;s transition team because the incoming officials are eschewing government devices, email addresses and cybersecurity support, raising fears that they could potentially expose sensitive government data.<\/p>\n<p>The private emails have agency employees considering insisting on in-person meetings and document exchanges that they otherwise would have conducted electronically, according to two federal officials granted anonymity to discuss a sensitive situation. Their anxiety is particularly high in light of <a href=\"https:\/\/www.politico.com\/news\/2024\/10\/25\/trump-hack-china-phones-00185608\" target=\"_blank\" rel=\"noopener\">recent hacking attempts<\/a> from China <a href=\"https:\/\/www.politico.com\/news\/2024\/09\/27\/iranians-charged-trump-campaign-hack-00181454\" target=\"_blank\" rel=\"noopener\">and Iran<\/a> that targeted Trump, Vice President-elect JD Vance and other top officials.<\/p>\n<p>\u201cI can assure you that the transition teams are targets for foreign intelligence collection,\u201d said Michael Daniel, a former White House cyber coordinator who now leads the nonprofit online security organization Cyber Threat Alliance. \u201cThere are a lot of countries out there that want to know: what are the policy plans for the incoming administration?\u201d<\/p>\n<p>Trump \u2014 who <a href=\"https:\/\/www.politico.com\/story\/2016\/08\/clinton-emails-benghazi-trump-fbi-227553\" target=\"_blank\" rel=\"noopener\">attacked his then-opponent<\/a> Hillary Clinton over her use of a private email server for official business during his first presidential run \u2014 is overseeing a fully privatized transition that communicates from an array of @transition47.com, @trumpvancetransition.com and @djtfp24.com accounts rather than anything ending in .gov, and uses private servers, laptops and cell phones instead of government-issued devices.<\/p>\n<p>This break with tradition stems from the Trump team <a href=\"https:\/\/www.politico.com\/news\/2024\/11\/23\/trump-team-barred-from-agencies-amid-legal-standoff-00191399\" target=\"_blank\" rel=\"noopener\">forgoing federal funding<\/a> and the ethics and transparency requirements that come with it.<\/p>\n<p>While it\u2019s unclear how the decision is impacting a transition that is already behind, with fewer than five weeks remaining until Inauguration Day, one person familiar with the collaboration between the Biden administration and the Trump transition team, granted anonymity to discuss sensitive discussions, said it is further hampering the process.\u00a0<\/p>\n<p>The dynamic is slowing efforts to share government materials with members of Trump\u2019s landing teams, the person said, referring to the groups of transition officials assigned to meet with federal agencies ahead of the inauguration.<\/p>\n<p>The White House has sent guidance to federal agencies to be cautious when communicating with the Trump transition, a spokesperson said, reminding them that they can elect to \u201conly offer in person briefings and reading rooms in agency spaces\u201d if they\u2019re uncomfortable sending something electronically.<\/p>\n<p>They also advised federal employees that they can require transition officials to \u201cattest\u201d that their private technology complies with government security standards.<\/p>\n<p>\u201cBecause they don\u2019t have official emails, people are really wary to share things,\u201d said a State Department employee granted anonymity to discuss private conversations. \u201cI\u2019m not going to send sensitive personnel information to some server that lives at Mar-a-Lago while there are so many fears of doxxing and hacking. So they have to physically come and look at the documents on campus, especially for anything with national security implications.\u201d<\/p>\n<p>The Trump transition confirmed their reliance on private emails, with spokesperson Brian Hughes saying in a statement that \u201call transition business is conducted on a transition-managed email server.\u201d<\/p>\n<p>\u201cWe have implemented plans to communicate information securely as necessary,\u201d he added, but declined to say what those plans entail. In a statement in late November, transition co-chair Susie Wiles similarly cited unspecified \u201csecurity and information protections\u201d the team has in place, arguing that they replace the need for \u201cadditional government and bureaucratic oversight.\u201d<\/p>\n<p>The transition\u2019s landing teams <a href=\"https:\/\/www.politico.com\/live-updates\/2024\/12\/16\/congress\/dhs-landing-team-starts-work-00194494\" target=\"_blank\" rel=\"noopener\">began arriving<\/a> this week at some government agencies \u2014 <a href=\"https:\/\/www.politico.com\/news\/2024\/12\/07\/trump-transition-team-delays-00193119\" target=\"_blank\" rel=\"noopener\">more than a month later<\/a> than past administrations have deployed them \u2014 to get up to speed on all of the resources and problems they will soon inherit. It\u2019s a <a href=\"https:\/\/presidentialtransition.org\/reports-publications\/presidential-transitions-are-a-perilous-moment-for-national-security\/\" target=\"_blank\" rel=\"noopener\">particularly vulnerable time for national security<\/a>, stressed Daniel, adding that by rejecting government transition support, the Trump team is also opening themselves up to hacking once they\u2019re in power.<\/p>\n<p>\u201cOnce someone gets access to some of their information, they can think of ways to send better phishing emails down the road, because they learn more about you,\u201d he explained. \u201cAnd if you bring that device into a government space, hook it up to a government network, and access it through that account, they&#8217;re able to steal your credentials and use that to log on and look like you \u2014 look like a legitimate user \u2014 and it becomes much harder to detect from a security standpoint.\u201d<\/p>\n<p>History is rife with examples of crises that came early in a new administration and were made worse by challenges passing information from an outgoing to an incoming president and his team, from the botched Bay of Pigs invasion of Cuba in the 1960s to the Waco standoff in the 1990s.<\/p>\n<p>CUNY John Jay College associate professor Heath Brown, who wrote a book about Joe Biden&#8217;s transition, said modern technology only makes that dynamic more risky and complicated.<\/p>\n<p>\u201cIn 2020, it was maybe the single most important worry of the transition team, that they would be hacked, and all of this information, including intelligence information, personnel information about job applicants, the whole procedure would be threatened if there was a hack of the transition team,\u201d Brown said. \u201cThe [General Services Administration] is in a position to help with that, but saying no to that help raises questions about whether they have put in place a secure system, as is needed in these situations.\u201d<\/p>\n<p>Like this content? Consider signing up for POLITICO\u2019s West Wing Playbook newsletter.<\/p>\n<p><a href=\"https:\/\/www.politico.com\/news\/2024\/12\/18\/federal-officials-nervous-about-sending-data-to-trump-transition-private-emails-00195217\" target=\"_blank\" class=\"feedzy-rss-link-icon\" rel=\"noopener\">Read More<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Source: Politics Federal officials say they\u2019re worried about sharing documents via e-mail with Donald Trump&#8217;s transition team because the incoming officials are eschewing government devices, email addresses and cybersecurity support,&hellip; <\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"_links":{"self":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/119450"}],"collection":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=119450"}],"version-history":[{"count":0,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/119450\/revisions"}],"wp:attachment":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=119450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=119450"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=119450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}