BitLocker Drive Encryption Overview – technet.microsoft.com

BitLocker Drive Encryption is a data protection feature available Windows Server2008R2 and in some editions of Windows7. Having BitLocker integrated with the operating system addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers.

Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software-attack tool against it or by transferring the computer's hard disk to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. BitLocker also helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled.

BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version1.2. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline.

On computers that do not have a TPM version1.2, you can still use BitLocker to encrypt the Windows operating system drive. However, this implementation will require the user to insert a USB startup key to start the computer or resume from hibernation, and it does not provide the pre-startup system integrity verification offered by BitLocker with a TPM.

In addition to the TPM, BitLocker offers the option to lock the normal startup process until the user supplies a personal identification number (PIN) or inserts a removable device, such as a USB flash drive, that contains a startup key. These additional security measures provide multifactor authentication and assurance that the computer will not start or resume from hibernation until the correct PIN or startup key is presented.

BitLocker can use a TPM to verify the integrity of early boot components and boot configuration data. This helps ensure that BitLocker makes the encrypted drive accessible only if those components have not been tampered with and the encrypted drive is located in the original computer.

BitLocker helps ensure the integrity of the startup process by taking the following actions:

To use BitLocker, a computer must satisfy certain requirements:

BitLocker is installed automatically as part of the operating system installation. However, BitLocker is not enabled until it is turned on by using the BitLocker setup wizard, which can be accessed from either the Control Panel or by right-clicking the drive in Windows Explorer.

At any time after installation and initial operating system setup, the system administrator can use the BitLocker setup wizard to initialize BitLocker. There are two steps in the initialization process:

When a local administrator initializes BitLocker, the administrator should also create a recovery password or a recovery key. Without a recovery key or recovery password, all data on the encrypted drive may be inaccessible and unrecoverable if there is a problem with the BitLocker-protected drive.

For detailed information about configuring and deploying BitLocker, see the Windows BitLocker Drive Encryption Step-by-Step Guide (http://go.microsoft.com/fwlink/?LinkID=140225).

BitLocker can use an enterprise's existing Active Directory Domain Services (ADDS) infrastructure to remotely store recovery keys. BitLocker provides a wizard for setup and management, as well as extensibility and manageability through a Windows Management Instrumentation (WMI) interface with scripting support. BitLocker also has a recovery console integrated into the early boot process to enable the user or helpdesk personnel to regain access to a locked computer.

For more information about writing scripts for BitLocker, see Win32_EncryptableVolume (http://go.microsoft.com/fwlink/?LinkId=85983).

Many personal computers today are reused by people other than the computer's initial owner or user. In enterprise scenarios, computers may be redeployed to other departments, or they might be recycled as part of a standard computer hardware refresh cycle.

On unencrypted drives, data may remain readable even after the drive has been formatted. Enterprises often make use of multiple overwrites or physical destruction to reduce the risk of exposing data on decommissioned drives.

BitLocker can help create a simple, cost-effective decommissioning process. By leaving data encrypted by BitLocker and then removing the keys, an enterprise can permanently reduce the risk of exposing this data. It becomes nearly impossible to access BitLocker-encrypted data after removing all BitLocker keys because this would require cracking 128-bit or 256-bit AES encryption.

BitLocker cannot protect a computer against all possible attacks. For example, if malicious users, or programs such as viruses or rootkits, have access to the computer before it is lost or stolen, they might be able to introduce weaknesses through which they can later access encrypted data. And BitLocker protection can be compromised if the USB startup key is left in the computer, or if the PIN or Windows logon password are not kept secret.

The TPM-only authentication mode is easiest to deploy, manage, and use. It might also be more appropriate for computers that are unattended or must restart while unattended. However, the TPM-only mode offers the least amount of data protection. If parts of your organization have data that is considered highly sensitive on mobile computers, consider deploying BitLocker with multifactor authentication on those computers.

For more information about BitLocker security considerations, see Data Encryption Toolkit for Mobile PCs (http://go.microsoft.com/fwlink/?LinkId=85982).

For servers in a shared or potentially non-secure environment, such as a branch office location, BitLocker can be used to encrypt the operating system drive and additional data drives on the same server.

By default, BitLocker is not installed with Windows Server2008R2. Add BitLocker from the Windows Server2008R2 Server Manager page. You must restart after installing BitLocker on a server. Using WMI, you can enable BitLocker remotely.

BitLocker is supported on Extensible Firmware Interface (EFI) servers that use a 64-bit processor architecture.

After the drive has been encrypted and protected with BitLocker, local and domain administrators can use the Manage BitLocker page in the BitLocker Drive Encryption item in Control Panel to change the password to unlock the drive, remove the password from the drive, add a smart card to unlock the drive, save or print the recovery key again, automatically unlock the drive, duplicate keys, and reset the PIN.

An administrator may want to temporarily disable BitLocker in certain scenarios, such as:

These scenarios are collectively referred to as the computer upgrade scenario. BitLocker can be enabled or disabled through the BitLocker Drive Encryption item in Control Panel.

The following steps are necessary to upgrade a BitLocker-protected computer:

Forcing BitLocker into disabled mode will keep the drive encrypted, but the drive master key will be encrypted with a symmetric key stored unencrypted on the hard disk. The availability of this unencrypted key disables the data protection offered by BitLocker but ensures that subsequent computer startups succeed without further user input. When BitLocker is enabled again, the unencrypted key is removed from the disk and BitLocker protection is turned back on. Additionally, the drive master key is keyed and encrypted again.

Moving the encrypted drive (that is, the physical disk) to another BitLocker-protected computer does not require any additional steps because the key protecting the drive master key is stored unencrypted on the disk.

For detailed information about disabling BitLocker, see Windows BitLocker Drive Encryption Step-by-Step Guide (http://go.microsoft.com/fwlink/?LinkID=140225).

A number of scenarios can trigger a recovery process, for example:

An administrator can also trigger recovery as an access control mechanism (for example, during computer redeployment). An administrator may decide to lock an encrypted drive and require that users obtain BitLocker recovery information to unlock the drive.

Using Group Policy, an IT administrator can choose which recovery methods to require, deny, or make optional for users who enable BitLocker. The recovery password can be stored in ADDS, and the administrator can make this option mandatory, prohibited, or optional for each user of the computer. Additionally, the recovery data can be stored on a USB flash drive.

The recovery password is a 48-digit, randomly generated number that can be created during BitLocker setup. If the computer enters recovery mode, the user will be prompted to type this password by using the function keys (F0 through F9). The recovery password can be managed and copied after BitLocker is enabled. Using the Manage BitLocker page in the BitLocker Drive Encryption item in Control Panel, the recovery password can be printed or saved to a file for future use.

A domain administrator can configure Group Policy to generate recovery passwords automatically and back them up to ADDS as soon as BitLocker is enabled. The domain administrator can also choose to prevent BitLocker from encrypting a drive unless the computer is connected to the network and ADDS backup of the recovery password is successful.

The recovery key can be created and saved to a USB flash drive during BitLocker setup; it can also be managed and copied after BitLocker is enabled. If the computer enters recovery mode, the user will be prompted to insert the recovery key into the computer.

The rest is here:
BitLocker Drive Encryption Overview - technet.microsoft.com

Chelsea Manning on Veterans Day: Stop Letting Troops Be …

'Cat Has Their Tongue': Laura Ingraham on Comics' Response to Louis C.K. Sexual Misconduct Allegations

Chris Wallace: Trump 'May Have a Point' About Media Bias

Chelsea Manning tweeted a not-so-veiled jab at President Trump as part of her Veterans Day message.

"Want to support veterans !? Stop sending us overseas to kill or be killed for your nationalist fairy tales. We can do better," the transgender Army veteran tweeted on Saturday.

want to support veterans !? stop sending us overseas to kill or be killed for your nationalist fairy tales we can do better#WeGotThis #VeteransDay pic.twitter.com/seT7Z8jnL6

Chelsea E. Manning (@xychelsea) November 11, 2017

Manning, 29, was releasedin January 28 years early from a 35-year prison sentence for publishing illegally more than 700,000 classified government documents on WikiLeaks.

Shortly before he left office President Obama commuted her sentence for 22 charges, including "aiding the enemy."

She was named "Newsmaker of the Year" by Out 100 this week.

WATCH: Vice President Pence Lays Veterans Day Wreath at Tomb of Unknown Soldier

Martin Luther King's Niece on Scrapping 'Racist' National Anthem: It's Not The Song, Flag, or Confederate Statues, It's Our Hearts

Read more:
Chelsea Manning on Veterans Day: Stop Letting Troops Be ...

Cryptocurrency – IC Markets

Unlike other asset classes (FX, Equities, Commodities, etc.), the Cryptocurrency market is dominated by retail speculators. With Cryptocurrencies, youll trade in a market where there is no central bank intervention, interbank dealers controlling order flow or giant pension funds moving prices.

Price movements on Cryptocurrencies like Bitcoin or Ethereum are driven primarily by news and prevailing sentiment, i.e. the fear and greed of retail speculators. These sometimes dramatic shifts can lead to massive intraday price swings, making Cryptocurrency an exciting product for aggressive and experienced day traders.

The IC Markets Cryptocurrency CFD product allows traders to go long or short without actually holding the Cryptocurrency. This means traders can get exposure to the price of the Cryptocurrency without worrying about the security risks associated with storing it and the counterparty risk from the exchange. This is similar to trading Energy Futures such as oil rather than owning physical oil to speculate on its price.

The following Cryptocurrencies are available totrade with IC Markets

The first and largest cryptocurrency, Bitcoin paved the ways for hundreds of similar currencies and boasts a market cap of over $100 billion.

The world's second-largest cryptocurrency, it is labelled by many as "the next Bitcoin". Ethereum has received international recognition and support from giant organisations such as Microsoft, JP Morgan, and Intel.

Designed by a former Google engineer to improve upon Bitcoin's technology, Litecoin offers quicker processing times and a larger number of tokens. It is also the first cryptocurrency to implement SegWit, a method of speeding up transaction times without compromising the underlying blockchain technology.

Dash's focus is on instant transactions and owner privacy. Dash has an infrastructure that enables much faster transactions than other Cryptocurrencies and therefore displays higher liquidity than many of its counterparts.

Bitcoin Cash resulted from a hard fork of the Bitcoin blockchain. It increased block size from 1 megabyte to 8 megabytes without incorporating SegWit.

IC Markets Trading Hours Pageprovides further information regarding the Trade timings of our Crypto currencies.

Originally posted here:
Cryptocurrency - IC Markets

Bitcoin: $64m in cryptocurrency stolen in ‘sophisticated …

Nearly $64m in bitcoin has been stolen by hackers who broke into Slovenian-based bitcoin mining marketplace NiceHash.

The marketplace suspended operations on Thursday while it investigated the breach, saying it was working with law enforcement as a matter of urgency while urging users to change their passwords.

The hack was a highly professional attack with sophisticated social engineering that resulted in approximately 4,700 bitcoin being stolen, worth about $63.92m at current prices, said NiceHash head of marketing Andrej P kraba.

Bitcoin is the first, and the biggest, "cryptocurrency" a decentralised tradable digital asset. Whether it's a bad investment is the big question . Bitcoin can only be used as a medium of exchange and in practice has been far more important for the dark economy than it has for most legitimate uses. The lack of any central authority makes bitcoin remarkably resilient to censorship, corruption or regulation. That means it has attracted a range of backers, from libertarian monetarists who enjoy the idea of a currency with no inflation and no central bank, to drug dealers who like the fact that it's hard (but not impossible) to trace a bitcoin transaction back to a physical person.

NiceHash is a digital currency marketplace that matches people looking to sell processing time on their computers for so called miners to verify bitcoin users transactions in exchange for the bitcoin.

Troubles with the website over the past day or so drew alarm and complaints, with many bitcoin owners posting panicked comments on NiceHashs social media accounts.

NiceHash said in a statement: We understand that you will have a lot of questions, and we ask for patience and understanding while we investigate the causes and find the appropriate solutions for the future of the service.

The price of bitcoin has surged to more than $14,668, gaining around $2,000 (1,494) of value in a day according to bitcoin monitor CoinDesk. That compares with a value below $1,000 at the beginning of the year.

Online security is a vital concern for cryptocurrency marketplaces and exchanges, with bitcoins contained within digital wallets that have increasingly become a target for hackers as the number of bitcoins stored and their value has skyrocketed over the last year.

In Japan, following the failure of bitcoin exchange Mt Gox, new laws were enacted to regulate bitcoins and other cryptocurrencies. Mt. Gox shut down in February 2014 having lost approximately 850,000 bitcoins, potentially to hackers. Mark Karpels, head of Mt Gox, went on trial in Japan in July, facing up to five years in jail under charges of embezzlement and the lost of $28m of user funds.

Continued here:
Bitcoin: $64m in cryptocurrency stolen in 'sophisticated ...

Assange confirms WikiLeaks was approached by Trump-linked …

The editor of Wikileaks confirmed the group was approached by a data firm working for Donald Trump's presidential campaign during the 2016 election.

Julian Assange says on Twitter that Cambridge Analytica reached out to his group prior to last November, but WikiLeaks rejected the company's "approach." Assange didn't specify the content of that approach.

He issued the tweet after news website The Daily Beast reported that Cambridge Analytica CEO Alexander Nix reached out to Assange during the presidential campaign about the possible release of 33,000 of Hillary Clinton's missing emails. Those emails have never been publicly released.

Cambridge Analytica, which uses data mining to microtarget ads based on personality, claimed after the election that it had played a key role in Mr. Trump's victory. The company was hired by Mr. Trump's digital director Brad Parscale, although he told "60 Minutes" last month that he doesn't believe their methods were so essential. According to Open Secrets, the Trump campaign paid Cambridge Analytica $5.9 million during the campaign.

Michael S. Glassner, executive director of the Trump campaign, issued a statement Wednesday that did not directly reference Assange or The Daily Beast report but said that the campaign had partnered with the Republican National Committee for voter data.

"Any claims that voter data from any other source played a key role in the victory are false," the statement said.

The House Intelligence Committee interviewed Parscale on Tuesday.

The Trump campaign has long denied any connection with WikiLeaks, although Mr. Trump praised the entity during the campaign and even said he "loved" WikiLeaks.

Robert Mercer, a billionaire Trump supporter, is a backer of Cambridge Analytica. Former White House strategist Steve Bannon served as a vice president at the company before joining the administration.

2017 CBS Interactive Inc. All Rights Reserved. This material may not be published, broadcast, rewritten, or redistributed. The Associated Press contributed to this report.

Continue reading here:
Assange confirms WikiLeaks was approached by Trump-linked ...

WikiLeaks faces U.S. probes into its 2016 election role and …

WASHINGTON (Reuters) - WikiLeaks and its founder, Julian Assange, are facing multiple investigations by U.S. authorities, including three congressional probes and a federal criminal inquiry, sources familiar with the investigations said.

The Senate and House of Representatives intelligence committees and leaders of the Senate Judiciary Committee are probing the websites role in the 2016 U.S. presidential election campaign, according to the sources, who all requested anonymity, and public documents.

WikiLeaks published emails hacked from the Democratic Party and the personal email account of John Podesta, Hillary Clintons 2016 presidential campaign chairman.

In a report issued in January, the CIA, the National Security Agency, and the Federal Bureau of Investigation said Russian intelligence did the hacking, and the GRU, Russias military intelligence agency, sent hacked data to WikiLeaks via intermediaries.

The Senate Intelligence Committee is investigating who gave WikiLeaks the hacked Democratic National Committee data that WikiLeaks published in July 2016, which included more than 44,000 emails and 17,000 attachments, the sources said. So far, its inquiries are still at an early stage, the sources said.

Senate Judiciary Committee leaders have asked Jared Kushner, Trumps son-in-law, for emails related to WikiLeaks.

The House Intelligence Committee has questioned Roger Stone, a longtime friend of President Donald Trump and a veteran political operative who promoted WikiLeaks disclosures of the emails on Twitter.

After initially refusing to identify an intermediary he dealt with who was in contact with Assange, Stone later told the committee it was Randy Credico, a left-wing comedian.

The committee sent Credico a letter asking him to appear voluntarily. When he declined to do so, the panel sent him a subpoena requiring him to give a deposition.

Credicos lawyer, Martin Stoller, said on Wednesday that Credico was considering whether to invoke his First and Fifth Amendment rights under the U.S. Constitution to avoid answering questions.

It is unclear whether Credico could help investigators uncover where WikiLeaks got the hacked Democratic emails.

In emails to Reuters, Stone has dismissed the intelligence agencies conclusion about Russian hacking.

It is not known whether Robert Mueller, the Justice Department special counsel investigating possible Russian interference in the 2016 presidential election, is investigating WikiLeaks.

A U.S. lawyer for Assange, Barry Pollack, said Muellers team had not contacted him.

Meanwhile, federal prosecutors in Alexandria, Virginia, are conducting a criminal investigation into how WikiLeaks obtained thousands of classified U.S. government documents, including CIA materials and most recently ultra-secret technical materials describing American spy agency hacking tools. Law enforcement sources and Pollack said the probe began several years ago.

Assange has lived in the Ecuadorean Embassy in London for several years after taking refuge there when Swedish authorities sought his extradition in a sexual molestation case.

(This story has been refiled to fix spelling of WikiLeaks in headline)

Reporting By Mark Hosenball; Editing by John Walcott and Jonathan Oatis

Read the original here:
WikiLeaks faces U.S. probes into its 2016 election role and ...

Syria Files – Wikipedia

The release of the files started on 5 July 2012.[5] The database comprises 2,434,899 emails from 680 domains.[5][6] At least 400,000 files are in Arabic and 68,000 files in Russian.[7] Media organisations working with WikiLeaks on the release include the Lebanese daily Al Akhbar, the Egyptian daily Al-Masry Al-Youm, the Italian weekly L'espresso, the German public radio and television broadcaster Norddeutscher Rundfunk (NDR) of the ARD consortium, the French information website OWNI and the Spanish website Pblico.[8] The New York City based multinational news agency Associated Press (AP) was initially announced by WikiLeaks to be helping with the release. The claim was withdrawn by WikiLeaks and an AP spokesperson stated that AP was "reviewing the emails for possible coverage [and] did not have any advance agreement on how [it] might handle the material."[9] According to Al Akhbar's analysis, the Syria Files "illuminateoften in small waysthe nature of power within and the inner workings of certain political and economic elements in Syria".[10]Al Akhbar states its confidence that "the emails are authentic, that the senders and receivers are mainly who they say they are".[10]

A hacktivist group of the Anonymous collective claimed credit for obtaining the emails and providing them to WikiLeaks. Anonymous stated that it had "worked day and night" in order to access computer servers in Syria and that "the data available had been so massive that downloading it had taken several weeks." Anonymous gave the data to WikiLeaks because it judged WikiLeaks to be "supremely well equipped to handle a disclosure of this magnitude". Anonymous stated that as long as Bashar al-Assad remains in power, it will continue "to assist the courageous freedom fighters and activists in Syria".[11]

According to emails published by WikiLeaks on 5 July 2012,[12] the Italian conglomerate Finmeccanica increased its sale of mobile communications equipment to Syrian authorities during 2011, delivering 500 of these to the Damascus suburb Muadamia in May 2011,[1][13] after the Syrian Civil War had started, and sending engineers to Damascus in February 2012 to provide training in using the communications equipment in helicopter terminals,[14] while the conflict continued.[2]

In May 2011, the public relations firm Brown Lloyd James sent an email to Syrian authorities "on how to create the appearance it is pursuing reform while repressing the uprising", in Ynetnews' description of an email[15] published by WikiLeaks on 6 July.[3] Brown Lloyd James advised that "Refocusing the perception of outsiders and Syrians on reform will provide political cover to the generally sympathetic US Government, and will delegitimize critics at home and abroad. In our view, the President needs to communicate more often and with more finely-tuned messaging and the First Lady needs to get in the game. The absence of a public figure as popular, capable, and attuned to the hopes of the people as Her Excellency at such a critical moment is conspicuous. The key is to show strength and sympathy at once."[4][16] The company recommended a public relations campaign to "create a reform 'echo-chamber' by developing media coverage outside of Syria that points to the President's difficult task of wanting reform" so that the "coverage [would] rebound into Syria".[4][16] Brown Lloyd James also recommended "countering ... the daily torrent of criticism and lies" by "[a] 24-hour media monitoring and response system [that] should be in place with assets in UK and US markets; [monitoring] social media sites and [challenging and removing] false sites; and a steady, constantly updated messaging document that contains talking points geared to latest developments."[4][16]

Brown Lloyd James stated that the document was not paid for, was a "'last-ditch' effort 'to encourage a peaceful outcome rather than violence',[4] and that it was sent to Asma al-Assad, the wife of President Bashar al-Assad.[3]

On 8 July 2012, Al Akhbar presented an analysis of emails by President Bashar al-Assad and his wife Asma al-Assad. Al Akhbar listed the main topics of the al-Assad's Syria Files emails, and stated, "Viewed through the prism of the 'Syria Files', Syrias first couple appear to be occupied with their representative capacities, with ample time devoted to the state of the palatial gardens, renovations, the stationary needs of low-level employees, but also issues related to bolstering the couples image, be it via charitable efforts or through political favors. During the first year of the uprising covered by the emails in the cache, the official and unofficial correspondence of the First Couple and ministry of presidential affairs present only few references to the ongoing tumult.... But there is no real sense of tangible power on behalf of the First Couple present within the 'Syria Files.' What is revealed is only a faade, or perhaps fittingly, a brand calculated to cloak another system: the military-security machine, which remains as of yet tightly in control and far from prying eyes."[10]

Syria Files examined by Al Akhbar show that after businessman Rami Makhlouf publicly claimed to respond to protestors' demands by "repenting" from business, selling shares and investing his money and time in charity and development projects, he continued to invest in several banks during 2011 and 2012. In late January 2012, he bought about 15 times as much shares (by value) as he sold, buying S127,000,000 and selling S8,670,000 of shares, mostly in Qatar National BankSyria and Syria International Islamic Bank.[17][18]

View original post here:
Syria Files - Wikipedia

Government Surveillance: Last Week Tonight with John Oliver …

There are very few government checks on what Americas sweeping surveillance programs are capable of doing. John Oliver sits down with Edward Snowden to discuss the NSA, the balance between privacy and security, and dick-pics.

Connect with Last Week Tonight online...Subscribe to the Last Week Tonight YouTube channel for more almost news as it almost happens: http://www.youtube.com/user/LastWeekTonight

Find Last Week Tonight on Facebook like your mom would:http://Facebook.com/LastWeekTonight

Follow us on Twitter for news about jokes and jokes about news:http://Twitter.com/LastWeekTonight

Visit our official site for all that other stuff at once:http://www.hbo.com/lastweektonightConnect with Last Week Tonight online...Subscribe to the Last Week Tonight YouTube channel for more almost news as it almost happens: http://www.youtube.com/user/LastWeekTonight

Find Last Week Tonight on Facebook like your mom would:http://Facebook.com/LastWeekTonight

Follow us on Twitter for news about jokes and jokes about news:http://Twitter.com/LastWeekTonight

Visit our official site for all that other stuff at once:http://www.hbo.com/lastweektonight

More:
Government Surveillance: Last Week Tonight with John Oliver ...

Email pointed Trump campaign to WikiLeaks documents that were …

A 2016 email sent to candidate Donald Trump and top aides pointed the campaign to hacked documents from the Democratic National Committee that had already been made public by the group WikiLeaks a day earlier.

The email sent the afternoon of Sept. 14, 2016 noted that Wikileaks has uploaded another (huge 678 mb) archive of files from the DNC and included a link and a decryption key, according to a copy obtained by The Washington Post.

The writer, who said his name was Michael J. Erickson and described himself as the president of an aviation management company, sent the message to the then-Republican nominee as well as his eldest son, Donald Trump Jr., and other top advisers.

The day before, WikiLeaks had tweeted links to what the group said was 678.4 megabytes of DNC documents.

The full email which was first described to CNN as being sent on Sept. 4, 10 days earlier indicates that the writer may have simply been flagging information that was already widely available. CNN later corrected its story to note the email had been sent Sept. 14.

The message also noted that information from former secretary of state Colin Powells inbox was available on DCLeaks.com. That development, too, had been publicly reported earlier that day.

Alan S. Futerfas, a lawyer for Trump Jr., described it as one of a ton of unsolicited emails like this on a variety of topics.

Futerfas said Erickson was unknown to Trump Jr. or the campaign. The message was one of thousands turned over to the House Intelligence Committee and others investigating Russian interference in the 2016 election, emails that included spam and junk emails. Trump Jr. was asked about the email Wednesday, when he spent about seven hours behind closed doors answering questions from members of the committee.

The email was never read or responded to and the House Intelligence Committee knows this, Futerfas said. It is profoundly disappointing that members of the House Intelligence Committee would deliberately leak a document, with the misleading suggestion that the information was not public, when they know that there is not a scintilla of evidence that Mr. Trump Jr. read or responded to the email.

Futerfas said that he and Trump Jr. had been required to surrender their electronic devices during the interview for security reasons. He expressed anger that details of the session leaked out before it had even concluded. We are concerned that these actions, combined with the deliberate and misleading leak of a meaningless email, undermines the credibility of the serious work the House Intelligence Committee is supposedly undertaking, he said.

House Intelligence Committee officials did not respond to requests for comment.

The email came from a Yahoo email address. It is unclear whether the senders name is actually Michael Erickson. The author could not immediately be reached for comment.

Rep. Adam B. Schiff (D-Calif.), the ranking Democrat on the House Intelligence Committee, said Donald Trump Jr. did not answer some questions during a closed hearing on Dec. 6. (The Washington Post)

In addition to Trump Jr., it was sent to a rarely used address for Donald Trump, as well as Trump Organization attorney Michael Cohen and a Gmail account that had sometimes been used by Hope Hicks, who is now the White House communications director. It also went to several other Trump Organization employees, with the subject line Trump: Another Wikileaks DNC Upload.

Karoun Demirjian, Ellen Nakashima and Alice Crites contributed to this report.

See the rest here:
Email pointed Trump campaign to WikiLeaks documents that were ...

CNN corrects story on email to Trumps about Wikileaks – Dec …

When first published Friday morning, the story, written by senior congressional correspondent Manu Raju and politics reporter Jeremy Herb, said the email was sent to the Trumps on September 4, 2016. It was corrected to say that the email was actually sent on September 14, one day after WikiLeaks made the documents public.

"CNN's initial reporting of the date on an email sent to members of the Trump campaign about Wikileaks documents, which was confirmed by two sources to CNN, was incorrect," CNN said in a statement. "We have updated our story to include the correct date, and present the proper context for the timing of email."

In its updated story, CNN acknowledged, "The new information indicates that the communication is less significant than CNN initially reported."

A CNN spokesperson said there will not be disciplinary action in this case because the reporters followed CNN's editorial standards process, which requires review and approval of the use of anonymous sources. CNN says it does not believe that the sources intended to deceive the reporters.

Before the correction, the story -- which relied on multiple sources who described the email to CNN -- had been heavily promoted by the network. CNN devoted multiple segments to discussing it on air. It was also the lead story on its homepage for much of Friday morning and into the afternoon. During that time, CBS News also reported that it had matched CNN's initial reporting.

But at 1 p.m. ET, the story unraveled. The Washington Post obtained a copy of the email in question, which CNN did not have, and reported it was sent on the afternoon of September 14 -- 10 days after CNN had reported it was sent. The Wall Street Journal quickly matched The Post's reporting and The Daily Caller posted a copy of the email.

CNN corrected its story at 3:45 p.m. ET. A network spokesperson said that as soon as the network had reviewed its reporting and independently confirmed that the story was wrong, it moved to correct it. CBS News also corrected its story.

Both Raju and Herb declined to comment through a spokesperson.

The error prompted Donald Trump Jr. to attack CNN. In a series of tweets, he characterized the story as fake news and went after the credibility of the network. Julian Assange, the founder of WikiLeaks, also attacked CNN and CBS News.

President Trump responded to the error at a rally Friday night by thanking CNN for apologizing for it, though the network hasn't done so.

Friday's correction is not the first high-profile error in recent memory for CNN. Earlier this year, the network retracted a story about former White House communications director Anthony Scaramucci. Three journalists, including the executive editor in charge of the network's new investigative unit, resigned their positions after the publication of that story.

CNN's error also comes on the heels of a major correction from ABC News. Last Friday, ABC News' Brian Ross reported based on one source that Michael Flynn was prepared to testify that as a candidate Trump instructed him to make contact with Russians. That report, which ABC News has said was not fully vetted through its editorial standards process, was later corrected to say that Flynn was prepared to testify the instruction came while Trump was president-elect. ABC News has since suspended Ross for four weeks without pay.

CNNMoney (New York) First published December 8, 2017: 6:30 PM ET

Link:
CNN corrects story on email to Trumps about Wikileaks - Dec ...