Barton Gellman

Image of Barton Gellman
I don't think Cheney started off in 2000 with a burning desire to become vice-president. I think the prospect gradually became more appealing, and he goosed the process.
- Barton Gellman
Image of Barton Gellman
The funny thing is that Dick Cheney has done more than anybody in the White House for quite a long time to throw up roadblocks against future historians.
- Barton Gellman
Image of Barton Gellman
No one ought to be under any illusion that Cheney privately thinks himself a failure.
- Barton Gellman
Image of Barton Gellman
Ecuador has never stated flatly that it would give asylum to Edward Snowden.
- Barton Gellman
Image of Barton Gellman
There's a long history of private-company cooperation with the NSA that dates back to at least the 1970s.
- Barton Gellman
Image of Barton Gellman
The first reports of AIDS closely followed the inauguration of President Ronald Reagan, whose 'family values' agenda and alliance with Christian conservatives associated AIDS with deviance and sin.
- Barton Gellman
Image of Barton Gellman
Early in 1986, the World Health Organization in Geneva still regarded AIDS as an ailment of the promiscuous few.
- Barton Gellman
Image of Barton Gellman
Throughout the early and mid-1990s, the Clinton administration debated the merits of paying for AIDS testing and counseling of vulnerable populations overseas.
- Barton Gellman
Image of Barton Gellman
In the wealthy industrialized nations, effective drug therapies against AIDS became available - AZT as early as 1987, then combinations of antiretroviral agents in 1996. The new drugs offered hope that fatal complications might be staved off and AIDS rendered a chronic condition.
- Barton Gellman
Image of Barton Gellman
The first and pivotal negotiations over global access to AIDS drugs began in Geneva in 1991. They lasted two years, but confidential minutes suggest they were doomed the first day.
- Barton Gellman
Image of Barton Gellman
Drug manufacturers could afford to sell AIDS drugs in Africa at virtually any discount. The companies said they did not do so because Africa lacked the requisite infrastructure.
- Barton Gellman
Image of Barton Gellman
In Africa through the 1990s, with notable exceptions in Senegal and Uganda, nearly all the ruling powers denied they had a problem with AIDS.
- Barton Gellman
Image of Barton Gellman
In 1995, Glaxo bought Burroughs Wellcome and became the presumptive leader in AIDS therapy.
- Barton Gellman
Image of Barton Gellman
For a decade, makers of AIDS medicines had rejected the idea of lowering prices in poor countries for fear of eroding profits in rich ones. The position required a balancing act, because the companies had to deflect attacks on the global reach of their patents, which granted exclusive marketing rights for antiretroviral drugs.
- Barton Gellman
Image of Barton Gellman
The modern era of continuity planning began under President Ronald Reagan.
- Barton Gellman
Image of Barton Gellman
Of all Iraq's rocket scientists, none drew warier scrutiny abroad than Modher Sadeq-Saba Tamimi.
- Barton Gellman
Image of Barton Gellman
The defection of Hussein Kamel was a turning point in the U.N.-imposed disarmament of Iraq in the 1990s.
- Barton Gellman
Image of Barton Gellman
If Iraq had succeeded in spray-drying anthrax spores to extend their life and lethality, that would have been among the most important secrets of its wide-ranging weapons program.
- Barton Gellman
Image of Barton Gellman
In late 2003, the Bush administration reversed a long-standing policy requiring agents to destroy their files on innocent American citizens, companies and residents when investigations closed.
- Barton Gellman
Image of Barton Gellman
A national security letter cannot be used to authorize eavesdropping or to read the contents of e-mail. But it does permit investigators to trace revealing paths through the private affairs of a modern digital citizen.
- Barton Gellman
Image of Barton Gellman
On average, since 9/11, the FBI reckons that just over 100,000 terrorism leads each year have come over the transom. Analysts and agents designate them as immediate, priority or routine, but the bureau says every one is covered.
- Barton Gellman
Image of Barton Gellman
Most people inside the bureau believe that the blown opportunities to head off 9/11 would not recur today. Even among the FBI's doubters, few disagree that the bureau has come a long way.
- Barton Gellman
Image of Barton Gellman
Snowden is an orderly thinker, with an engineer's approach to problem-solving.
- Barton Gellman
Image of Barton Gellman
The NSA's business is 'information dominance,' the use of other people's secrets to shape events.
- Barton Gellman
Image of Barton Gellman
Snowden grants that NSA employees by and large believe in their mission and trust the agency to handle the secrets it takes from ordinary people - deliberately, in the case of bulk records collection, and 'incidentally,' when the content of American phone calls and e-mails are swept into NSA systems along with foreign targets.
- Barton Gellman
Image of Barton Gellman
In computer circles, any unencrypted data is known as 'cleartext.'
- Barton Gellman
Image of Barton Gellman
CloudShield did not see itself as a cloak-and-dagger company. It made its name for high-end hardware that could peer deeply into Internet traffic and pull out and analyze 'packets' of data as they flew by.
- Barton Gellman
Image of Barton Gellman
No one can keep track of how many people use Internet, how many machines it can reach, or even how many sub- and sub-sub-networks form a part of it.
- Barton Gellman
Image of Barton Gellman
True net-heads sometimes resort to punctuation cartoons to get around the absence of inflection.
- Barton Gellman
Image of Barton Gellman
As digital communications have multiplied, and NSA capabilities with them, the agency has shifted resources from surveillance of individual targets to the acquisition of communications on a planetary scale.
- Barton Gellman
Image of Barton Gellman
The $52.6 billion U.S. intelligence arsenal is aimed mainly at unambiguous adversaries, including al-Qaida, North Korea and Iran. But top-secret budget documents reveal an equally intense focus on one purported ally: Pakistan.
- Barton Gellman
Image of Barton Gellman
Pakistan has dozens of laboratories and production and storage sites scattered across the country. After developing warheads with highly enriched uranium, it has more recently tried to do the same with more-powerful and compact plutonium.
- Barton Gellman
Image of Barton Gellman
Pakistan has accepted some security training from the CIA, but U.S. export restrictions and Pakistani suspicions have prevented the two countries from sharing the most sophisticated technology for safeguarding nuclear components.
- Barton Gellman
Image of Barton Gellman
U.S. surveillance of Pakistan extends far beyond its nuclear program. There are several references in the black budget to expanding U.S. scrutiny of chemical and biological laboratories.
- Barton Gellman
Image of Barton Gellman
China and Russia are regarded as the most formidable cyber threats.
- Barton Gellman
Image of Barton Gellman
The Obama administration has provided almost no public information about the NSA's compliance record.
- Barton Gellman
Image of Barton Gellman
There is no reliable way to calculate from the number of recorded compliance issues how many Americans have had their communications improperly collected, stored or distributed by the NSA.
- Barton Gellman
Image of Barton Gellman
The causes and severity of NSA infractions vary widely. One in 10 incidents is attributed to a typographical error in which an analyst enters an incorrect query and retrieves data about U.S phone calls or emails.
- Barton Gellman
Image of Barton Gellman
By now, you've heard endless warnings about the risk of short, trivial passwords. There's a good chance you ignore them.
- Barton Gellman
Image of Barton Gellman
Even complex passwords are getting easy to break if they're too short. That's because today's inexpensive computer chips have the power of supercomputers from the year 2000.
- Barton Gellman
Image of Barton Gellman
If you do write down your passwords, don't make it obvious which password corresponds to which account. Even better, write the passwords incorrectly and make up an easy rule for fixing them. You could decide to add 1 to each number in your password, so that 2x6Y is written as 3x7Y.
- Barton Gellman
Image of Barton Gellman
Suppose a bad guy guesses the password for your throwaway Yahoo address. Now he goes to major banking and commerce sites and looks for an account registered to that email address. When he finds one, he clicks the 'forgot my password' button and a new one is sent - to your compromised email account. Now he's in a position to do you serious harm.
- Barton Gellman
Image of Barton Gellman
Google appears to be the worst of the major search engines from a privacy point of view; Ask.com, with AskEraser turned on, is among the best.
- Barton Gellman
Image of Barton Gellman
The best way to preserve your privacy is to use a search engine that does not keep your logs in the first place. That's the approach used by Startpage and its European parent company, Ixquick.
- Barton Gellman
Image of Barton Gellman
You don't need to be a spook to care about encryption. If you travel with your computer or keep it in a place where other people can put their hands on it, you're vulnerable.
- Barton Gellman
Image of Barton Gellman
For personal use, I recommend the free and open-source Truecrypt, which comes in flavors for Windows, Mac and Linux.
- Barton Gellman
Image of Barton Gellman
Nothing is absolute in security.
- Barton Gellman
Image of Barton Gellman
I've always shied away from online data storage. I don't even use my employers' network drives for anything sensitive. I want to control access myself.
- Barton Gellman
Image of Barton Gellman
Well-secured files don't do you much good if you lose them in a fire or hard drive crash.
- Barton Gellman