Fact Check Analysis: FBI to probe effort to impersonate top Trump advisor




Lead Image

Introduction

This article gained traction after reports emerged that Susie Wiles—a senior Trump advisor currently serving as White House Chief of Staff—was reportedly the target of an impersonation attempt. The claims include a possible hack of Wiles’ personal device, outreach to top officials using her contact list, and a federal response through an FBI investigation. A DBUNK user asked how federal agencies are coordinating their response, and whether this incident presents a broader national security risk. We set out to verify what’s factually accurate and what lacks needed context.

Historical Context

Concerns over political impersonation and cybersecurity breaches tied to high-level U.S. figures are not new. During the 2016 and 2020 presidential elections, coordinated cyber operations—often alleged to be state-sponsored—targeted both parties. Susie Wiles, a key strategist for Donald Trump’s campaigns, has previously been linked to attempts by Iranian hackers trying to penetrate the Trump campaign’s digital ecosystem. Against this backdrop, any breach—especially involving a figure in such a prominent position—raises questions about how government institutions respond and whether existing security measures are adequate.

Simplify truth-seeking with DBUNK

Claim #1: “The FBI is investigating an effort by unknown people to access the personal phone of Susie Wiles.”

This claim is accurate. The FBI confirmed to multiple national news outlets including CBS News and The Wall Street Journal that a probe has been launched into an effort to impersonate Susie Wiles. According to the Journal’s original May 29, 2025, report, the breach appears to target her personal— not government-issued—device, raising concerns about possible unauthorized access and manipulation of her contact list. Publicly, the FBI typically does not comment on ongoing investigations. However, unnamed federal officials confirmed that a preliminary inquiry is underway into how Wiles’ contacts were used to message political figures and business executives.

Stay informed against fake news

Claim #2: “The impersonators contacted U.S. senators, governors, and top business executives, asking to move conversations to Telegram.”

This is mostly accurate but lacks context. According to both the BBC article and original reporting by The Wall Street Journal, individuals receiving messages from contacts associated with Susie Wiles were asked to shift conversations to encrypted platforms such as Telegram. This raised red flags among recipients, which led to internal flagging and eventual awareness by law enforcement. However, neither the FBI nor official sources have confirmed the exact identities of those contacted or specified how many individuals were affected. Thus, while high-profile recipients were hinted at, specific evidence confirming the full scope is still lacking.

Musk warns on misinformation

Claim #3: “Iranian hackers previously targeted Susie Wiles during Trump’s campaign.”

This claim is true and verifiable. In 2023, the U.S. Department of Justice unsealed indictments related to cyberattacks against the Trump campaign team. Among the named defendants were operatives of Iran’s Islamic Revolutionary Guard Corps (IRGC) who were implicated in phishing and cyber activities targeting political consultants, including those working with or for Susie Wiles. The Justice Department press release on the case revealed that the hackers attempted to steal internal planning documents and access official correspondence. This makes Wiles a repeat target of cyber espionage, validating the BBC’s reference.

Zuckerberg on fake news challenges

Claim #4: “The impersonation targeted her personal phone, not her government-issued device.”

This is accurate and an important distinction. As reported by The Wall Street Journal and reiterated in the BBC story, the impersonation incident affected Susie Wiles’ personal smartphone and not her official government device. Why this matters: Government-issued devices are typically equipped with hardened security features such as remote wipe capability, end-to-end encryption, and constant monitoring by White House cybersecurity teams. A personal phone, by contrast, is far more vulnerable to phishing, social engineering, and other methods often exploited in impersonation scams. The FBI has not publicly described what kind of phone or software she was using at the time.

Conclusion

The article correctly conveys the core facts: Susie Wiles was reportedly impersonated via a breach of her personal phone, prompting an FBI investigation. The context about Telegram, multiple high-profile message recipients, and past cybersecurity incidents involving Wiles are supported by public records and reputable news outlets. However, some elements, such as the exact channels used for federal coordination and potential implications for national security, are touched upon but not explored in depth by the original reporting. Nonetheless, there is no indication of partisan bias or factual errors in the article. Taken together, the article is a reliable report with minimal missing context and no evidence of misinformation.

Access unbiased news with DBUNK

Encourage Readers to Take Action

Want to uncover the truth in news stories quickly? Download the DBUNK app today or follow us on social media for the latest fact-checked information. Submit your own fact-check requests for free and become part of our mission to fight misinformation.

Link to Original Article

Read the original article on BBC News


Stay Updated with DBUNK Newsletter

Subscribe to our news letter for the latest updates.

By subscribing, you agree to our Privacy Policy and consent to receive updates.