e-mail released in a court case last week as part of the case against the justice department, releasing materials from the mueller investigation an e-mail in which steve bannon wrote to jared kushner and said we need to make sure that it s not perceived that we have been getting help from russia and wikileaks. and in that sense we need to kind of distance ourselves from, you know, the fired campaign chairman paul manafort, who at that time was still advising the trump campaign well into the november 2016. clearly there was an awareness on steve bannon s part at least the perception that the russians who had hacked the dnc, had hacked john podesta s e-mail box and thacampaign was now benefitting from those releases. it seems like steve bannon was very much aware of that perception. natasha thank you, dan freedman as well. coming up ohio congressman jim jordan has a key role in the impeachment hearings starting next week, but it comes as
teaching some days of this in the digital that just about how do. the staff. that see this things out. there stuff yourself wow yeah right. i thought that you could but i had more. time. off and shot. the guy he could supply hey i m also by any means yes he will dump the supplier in the email box and i wonder how much a part of the country tina brown i. had done the kind of weed up so to me running. on top of i didn t have to buckle under
the vulnerability on your device which allows them to take total control of that device. anything you can do on that device, the attacker, in this case, the government, can do. they can read your email, they can collect every document, they can look at your contact book, they can turn the location services on. they can see anything that is on that phone instantly and send it back home to the mother ship. they can do the same with laptops. the other prong that we forget so frequently is that in many cases they don t need to hack our devices. they can simply ask google for a copy of our email box because google saves a copy of that. what about enabling your microphone camera? if you can do it, they can do it. it is trivial to remotely turn on your microphone or to activate your camera so long as you have systems-level access. if you had hacked someone s device remotely, anything they can do, you can do.
device. once they do this, by detecting a vulnerability in the software that your device runs such as apple s ios or microsoft windows, it can craft a special kind of attack code called an exploit. they then launch this exploit at the vulnerability on your device which allows them to take total control of that device. anything you can do on that device, the attacker, in this case, the government, can do. they can read your email, they can collect every document b they can look at your contact book, they can turn the location services on. they can see anything that is on that phone instantly and send it back home to the mother ship. they can do the same with laptops. the other prong that we forget so frequently is that in many cases they don t need to hack our devices. they can simply ask google for a copy of our email box because google saves a copy of that. what about enabling your microphone camera? if you can do it, they can do
anything you can do on the device, the attacker, in this case, the government can do. they can read your e-mail, collect every document, look at your contact book, turn the location services on. they can see anything that is on that phone instantly and send it back home to the mothership. they can do the same with laptops. other prong that we forget so frequently is that in many cases they don t need to hack our devices. they can simply ask google for a copy of our e-mail box. because google saves a copy of that. what about enabling your microphone camera? if you can do it, they can do it. it is trivial to remotely turn on your microphone or to activate your camera so long as you have systems level access. if you had hacked someone s device remotely, anything they can do, you can do. they can look up your nose, they can record what s in the room.