Much has been written about the security concerns of the President of the United States using a Blackberry. President Obama’s use of the device came under fire primarily because he is more willing to embrace technology than previous Presidents and admits to being addicted to the device.
I am no expert on how hackers do their thing, but I find it disturbing when the media/journalists either print or talk of the ways in which national security can be breached. Why would we want to give the crazies of the world any tips on how to breach our national security? Exposing techniques for hacking or eavesdropping on the President of the United States is quite irresponsible – whether you know what you are talking about or not. Even if the concerns are justified, don’t publicize it! Just like I would ask you not to give written instructions on how to make a bomb.
Two such articles attempt to expose the vulnerabilities of the President’s use of a Blackberry (links provided at the end of this story). My head was spinning after reading about the various technologies, the proposed vulnerabilities written by non-security experts, and the comments written by readers explaining why/how it would be virtually impossible to hack into the President’s Blackberry.
Both stories seem more focused on concerns that carrying around a Blackberry places the President at risk because his location could be determined either via GPS tracking of his device or by hackers being able to hone in on which device belongs to the President by discovering the serial number (IMEI) of his device. (more…)