FUD Watch: CSO Senior Editor Bill Brenner notes that the dumbest security FUD can be found in the government. Exhibit A: Reports that President-Elect Barack Obama will be forced to give up his Blackberry for security reasons In the past week I’ve read a lot of stories about President-Elect Barack Obama possibly having to relinquish his BlackBerry come Jan. 20 for a variety of reasons that are just plain dumb.One concern is that all Obama’s writings will need to be stored under lock and key to satisfy the Presidential Records Act, which requires that all presidential correspondence be seared onto the official record. The other, more nonsensical argument is that his Blackberry could pose a security risk.The argument is that hackers could break into his inbox and harvest data that’s potentially damaging to national security. Here there are reminders of when Paris Hilton‘s cell phone was hacked, and when it was reported that a foreign entity had penetrated sensitive data on laptops in the campaigns of both Obama and Sen. John McCain.The latter incident is worthy of concern, but that doesn’t mean Obama’s Blackberry is a threat to national security. That, I believe, is FUD generated from within Washington’s security establishment. On the drive home today I heard an interesting NPR interview with Newsweek columnist Jonathan Alter where he argued for Obama to stay plugged in [he also wrote a column on the subject]. Alter noted that taking away Obama’s Blackberry would contribute to the isolation that has become part of the modern presidency. He notes that President Bush would have benefitted from fuller access to e-mail because a wider range of friends and associates could have weighed in on some of the major debates of the Bush White House. Some of Bush’s friends, by e-mail, could have persuaded Bush to switch direction and avoid some of the trouble he got into, Alter says. That may be overstating things, but Alter’s wider point — that presidents are more successful when they are “plugged in” — is dead on.In Lincoln’s time, plugged in meant throwing open the White House doors so he could hear what was on people’s minds. In Franklin Roosevelt’s day, plugged in meant driving around rural Georgia in his hand-controlled car, meeting people and listening to their concerns. Alter argues, rightly so, that in an age where the president can no longer have Lincoln-style open houses or drive around the open countryside, e-mail can be an important way for Obama to stay connected to a wider group of people. That could go a long way in keeping him in touch with the concerns of ordinary Americans. I agree with that, but since this is a security column let’s address that end of the discussion. Is it possible that hackers could target Obama’s BlackBerry? No doubt. Would it be impossible for them to successfully extract sensitive data? Such things are never impossible.But it’s highly unlikely.First, Obama’s e-mail correspondence could easily be preserved for the historic record. Second, his Blackberry communications could easily be encrypted. Third, whether you voted for him or not, it’s not unreasonable to expect that Obama has and will use extreme caution in the messages he chooses to send. It’s hard to believe any president would be stupid enough to send classified national security data out from his smart phone. Never say never, but Obama seems smart enough to know better.If the national security apparatus harbors any worry about not being able to properly secure such devices, the answer is for it to find ways to improve that security, not deprive the president of a useful communication tool.That’s my view. I’d like to know what you think.About FUD Watch: Senior Editor Bill Brenner scours the Internet in search of FUD – overhyped security threats that ultimately have little impact on a CSO’s daily routine. The goal: help security decision makers separate the hot air from genuine action items. To point us toward the industry’s most egregious FUD, send an e-mail to bbrenner@cxo.com. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe