Trump’s staffers forced to destroy phones before leaving China- here’s what you need to know as an ordinary Malaysian
A tweet from a New York Post reporter after the highly coveted U.S. Presidents’ visit to China showed how seriously national security is taken. “Nothing from China allowed on the plane.”
American staff took everything Chinese officials handed out – credentials, burner phones from WH staff, pins for delegation – collected them before we got on AF1 and threw them in a bin at bottom at stairs.
— Emily Goodin (@Emilylgoodin) May 15, 2026
Nothing from China allowed on the plane. We’re taking off shortly for…
Now that got me thinking – can hacks or malicious software be installed wirelessly or is there something more to just hacking and tracking of devices, not just of key political figures, but what we as normal Malaysians need to be aware of.
- Why Did Trump's Staff Destroy Their Phones?
- Can Phones Really Be Hacked Wirelessly?
- What Information Can Actually Be Tracked?
- Why Roaming and Public Wi-Fi Can Increase Risk
- The Kinds of Hacks that Malaysians Could Be Exposed To
- What Malaysians Can Do to Protect Their Phones and Information
- Your Smartphone Is Your Digital Identity – Keep it Safe
Why Did Trump’s Staff Destroy Their Phones?
Reports of government officials using “burner phones” on sensitive overseas trips — and disposing of them afterwards — may sound dramatic, but the reasoning is straightforward. Phones exposed to foreign networks, hotel Wi-Fi, or unfamiliar Bluetooth environments can be silently compromised. Returning with a potentially infected device and reconnecting it to secure government systems is simply too great a risk. Destroying the phone closes that door entirely.

Can Phones Really Be Hacked Wirelessly?
Yes — and it happens more often than most people realise. Your phone is constantly communicating through mobile networks, Wi-Fi, Bluetooth, NFC, and roaming systems. Each channel is a potential entry point for a skilled attacker.
Think of your smartphone as a GPS tracker, microphone, camera, digital wallet, and identity card — all rolled into one pocket-sized device. Most real-world attacks aren’t the dramatic, split-second break-ins you see in movies. Good hackers are quiet, patient, and focused on collecting data over time.

What Information Can Actually Be Tracked?
Without reading a single message, an attacker who captures your phone’s metadata can piece together a detailed picture of your life. Information collected could include – location history, contact patterns, browsing behaviour, banking SMS OTPs, device IDs, and SIM information.

Here is the uncomfortable truth: many data points using metadata alone can reveal where you live, who you meet regularly, your daily travel routine, and your personal habits. For scammers and fraudsters, that is more than enough to work with to start a social engineering attack.
Why Roaming and Public Wi-Fi Can Increase Risk
When you travel and your phone connects to foreign telecom infrastructure, you lose the protection of familiar network safeguards. Public Wi-Fi networks — especially at airports, cafes or hotels — can be fake hotspots deliberately set up to intercept your traffic.
Practical steps to reduce your exposure: avoid logging into banking apps on public Wi-Fi, turn off the auto-join Wi-Fi setting on your phone, and use your mobile data or a trusted VPN whenever possible.

The Kinds of Hacks that Malaysians Could Be Exposed To
Malaysians face a particularly active scam landscape. Common threats include fake bank SMS messages and phishing links, WhatsApp impersonation scams, APK malware distributed through unofficial Android app downloads, public Wi-Fi attacks at airports and cafés, and SIM swap scams targeting banking OTPs.
Locally, these show up as “parcel delivery” scam links, fake Touch ‘n Go or e-wallet reload messages, Macau scam impersonation calls, fake Shopee or Lazada refund notifications, and Telegram investment group scams. These social engineering hacks are meant to look harmless so that victims let their guards down and click on links.

What Malaysians Can Do to Protect Their Phones and Information
Strong phone hygiene does not require expensive tools. Keep your operating system and apps updated, avoid sideloading APK files from unofficial sources, enable two-factor authentication and app locks, and turn off Bluetooth when you are not actively using it. Do not tap on unknown links received via WhatsApp or SMS. Rebooting your device regularly can also disrupt certain types of persistent malware.
Most importantly: if a message feels urgent, emotionally charged, or designed to create fear — slow down, verify through an independent channel such as the National Scam Response Center, and only then act. Most scams succeed not through sophisticated hacking, but through panic and social engineering.
Your Smartphone Is Your Digital Identity – Keep it Safe
Your phone now holds your banking access, saved passwords, personal photos, work documents, and years of location history. Protecting it is no longer just an “IT department” problem — it is a personal responsibility.
You may not be a government official from the White House – but to a scammer, your phone contains information that is very much worth targeting.
Read more of our online safety articles below!

