Download raw source

Delivered-To: john.podesta@gmail.com Received: by 10.25.43.10 with SMTP id r10csp776190lfr; Sun, 19 Jul 2015 14:38:49 -0700 (PDT) X-Received: by 10.140.235.147 with SMTP id g141mr35148251qhc.35.1437341928602; Sun, 19 Jul 2015 14:38:48 -0700 (PDT) Return-Path: <eryn.sepp@gmail.com> Received: from mail-qk0-x22d.google.com (mail-qk0-x22d.google.com. [2607:f8b0:400d:c09::22d]) by mx.google.com with ESMTPS id b193si21929424qka.39.2015.07.19.14.38.47 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 19 Jul 2015 14:38:48 -0700 (PDT) Received-SPF: pass (google.com: domain of eryn.sepp@gmail.com designates 2607:f8b0:400d:c09::22d as permitted sender) client-ip=2607:f8b0:400d:c09::22d; Authentication-Results: mx.google.com; spf=pass (google.com: domain of eryn.sepp@gmail.com designates 2607:f8b0:400d:c09::22d as permitted sender) smtp.mail=eryn.sepp@gmail.com; dkim=pass header.i=@gmail.com; dmarc=pass (p=NONE dis=NONE) header.from=gmail.com Received: by mail-qk0-x22d.google.com with SMTP id v3so102158333qkd.3; Sun, 19 Jul 2015 14:38:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:content-type:content-transfer-encoding:mime-version:subject :message-id:date:cc:to; bh=KJPSDxN6GeUFY9tnLQJTls95j+2GZJ3dr5LyS1otXas=; b=Q3ba2LrceyQAJgll9dPq4254+0CRmXIurpePgsKWM/i2EG5GIq1CmuMrCvBBQUmJoM vj6V6YNckF5KBJ6aTTRK/Tf1G31BVwvRLujBpaTR67mQ2MgY7tD3St1/i6XzhYWb7JsE SSxYokblQeF7aBvjAEBJw6BSv2487M0Ta1+xdqoRdIdnXFE2mSk8JwF6xYfKtELUy/6x 1gBAmd7za/KEFF+kdwgXjW4mJYOK3sVt+YlOZIFra9JMMEhm4tO73QFVVYPY1vYXw7aj X+gvHZzJJwHwNs8F7tQmHJDmkGXkXz9/sDl/EXV977p+3tcjECG91Qms+2M080Jo9LcA Y7vg== X-Received: by 10.140.105.203 with SMTP id c69mr41256233qgf.61.1437341927868; Sun, 19 Jul 2015 14:38:47 -0700 (PDT) Return-Path: <eryn.sepp@gmail.com> Received: from [192.168.2.3] (216-15-37-100.c3-0.gth-ubr1.lnh-gth.md.cable.rcn.com. [216.15.37.100]) by smtp.gmail.com with ESMTPSA id g33sm9816458qgg.4.2015.07.19.14.38.46 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Sun, 19 Jul 2015 14:38:47 -0700 (PDT) From: Eryn Sepp <eryn.sepp@gmail.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Mime-Version: 1.0 (1.0) Subject: Sekret Machines Qs Message-Id: <EAA48505-61BF-4544-AC78-F80A8308FF23@gmail.com> Date: Sun, 19 Jul 2015 17:38:46 -0400 CC: Milia Fisher <milia.fisher@gmail.com> To: John Podesta <john.podesta@gmail.com> X-Mailer: iPhone Mail (12B436) Just got them from Joe, one of the producers and interviewers who will be th= ere Tuesday. Let us know if you need any background on the Church Committee,= PLCOB activities, the Senate bill they mention, or anything else: Q: In the long run, do you think that the Church Committee - with what it ex= posed and the regulations that followed - helped curtail the rise of secrecy= and the trend towards becoming a national security state? Or did it merely= cause the executive branch and the intelligence organizations under it=E2=80= =99s control to become more aggressive in their pursuit of creating and main= taining protection from any oversight? Q: Kenneth Mayer said, =E2=80=9CWhat is especially striking about debates ov= er classification and secrecy is that presidents have asserted almost comple= te command over the institutions and processes that both produce and protect= secret information=E2=80=A6 In practice, classification remains an outpost o= f almost absolute executive prerogative.=E2=80=9D Do you agree with this sta= tement? If so, what can be done to lessen the President=E2=80=99s dependency= on secrets and classification within executive programs? If not, who is re= sponsible for the proliferation of secrets within the US government? Q: The Privacy and Civil Liberties Oversight Board has been created to provi= de oversight of covert actions on behalf of Congress and the American people= . However, in the Intelligence Authorization Act for Fiscal Year 2016 that w= as passed by the House - Section 306 states that =E2=80=9C[n]othing in this s= ection shall be construed to authorize the Board, or any agent thereof, to g= ain access to information that an executive branch agency deems related to c= overt action, as such term is defined in section 503(e) of the National Secu= rity Act of 1947 (50 U.S.C. 3039(e)).=E2=80=9D While the companion Senate bi= ll, S. 1705, does not include a similar provision, why do you believe there i= s a desire by members of Congress to limit the ability of a committee like t= he PCLOB to provide oversight of covert executive branch programs? Q: State secrets have proliferated far beyond the government's current abili= ty to review and clear them for release. What can be done to reduce the crea= tion of - and dependency on - classified documents in future administrations= ? What can be done to increase our ability to process the massive amounts o= f =E2=80=9Csensitive=E2=80=9D date - much of which was born secret and was n= ever reviewed prior to classification?=20 Q: In your opinion, why are the files having to do with UFO investigations b= eing kept classified and who gains by continuing to keep these files classif= ied? Q: If you were to create a set of guidelines or a group to handle the declas= sification of UFO-related information and material - how would you go about i= t?=