I'm not sure if everyone is aware on these, but John Podesta has been heavily involved with the NSA for quite some time. Isn't it strange that he would be coordinating with all these media companies and running a candidate's campaign? Even so far as to make excuse speeches for her?
"Under the direction of Jerry Berman, EFF's Washington office director, and John Podesta, a capable lobbyist and privacy specialist who helped draft the ECPA, this group intends to stop the provisions in digital telephony proposal from entering the statute books. " Decrypting the Puzzle Palace, 1992
https://cryptome.org/puzzle.htm
MR. PODESTA: Guess what? I'm here to talk about encryption.
Clinton Encryption Documents 1993-99
https://cryptome.org/jya/wjc-crypto.htm
"We're here today to announce a series of actions that will bring new
balance to the four pillars on which our encryption policy rests:
national security, public safety, privacy and commerce. For two years,
John Podesta and I have chaired a high-level interagency process to
fashion policies to achieve these goals."
Transcript: White House Briefing on Encryption Export, 17 September 1999
https://cryptome.org/wh091699.htm
"White House Chief of Staff John Podesta, in a speech today at the National Press Club, proposed important new measures to assure the security and trust of Americans in cyberspace... Mr. Podesta also announced new rules that will update encryption export controls. " ASSURING SECURITY AND TRUST IN CYBERSPACE, July 17, 2000
https://cryptome.org/us-crypto-up.htm
"I have also asked my Counselor, John Podesta, to lead a comprehensive review of big data and privacy." -- Obama, 1/17/2014
https://cryptome.org/2014/01/obama-nsa-13-0117.htm
Monday, White House counselor John Podesta told a conference at the Massachusetts Institute of Technology that “national security is not the only space” where technological change is “challenging traditional conceptions of privacy.” He cited “a revolution in the way that information about our purchases, our conversations, our social networks, our movements, and even our physical identities are collected, stored, analyzed and used.” Ex-NSA Official Warns Tech Firms: Stop Spying, March 5, 2014
https://cryptome.org/2014/03/tech-stop-spying.htm
Q Mr. Podesta, or Secretary Daley, is the catalyst for this the
situation that happened with the White House computer last year, and
several infiltration situations with some of the federal government
computers last year, as well?
MR. PODESTA: Well, I wouldn't describe that as the catalyst for this.
I think we've been working on this for some time, and have -- as I think
Dick noted, this has been going on in a kind of serious formulation as a
policy for several years, and precedes the situation, which was resolved --
with the hacker at the White House -- with an arrest, that occurred last
year. WHITE HOUSE PRESS BRIEFING, January 7, 2000
https://cryptome.org/cybersec-wh.htm