Top 141 Quotes & Sayings by Barton Gellman - Page 2
Explore popular quotes and sayings by an American journalist Barton Gellman.
Last updated on April 15, 2025.
Most computers today have built in backup software.
The Obama administration has provided almost no public information about the NSA's compliance record.
For months, Obama administration officials attacked Snowden's motives and said the work of the NSA was distorted by selective leaks and misinterpretations.
Suppose a bad guy guesses the password for your throwaway Yahoo address. Now he goes to major banking and commerce sites and looks for an account registered to that email address. When he finds one, he clicks the 'forgot my password' button and a new one is sent - to your compromised email account. Now he's in a position to do you serious harm.
U.S. surveillance of Pakistan extends far beyond its nuclear program. There are several references in the black budget to expanding U.S. scrutiny of chemical and biological laboratories.
For a decade, makers of AIDS medicines had rejected the idea of lowering prices in poor countries for fear of eroding profits in rich ones. The position required a balancing act, because the companies had to deflect attacks on the global reach of their patents, which granted exclusive marketing rights for antiretroviral drugs.
The best way to preserve your privacy is to use a search engine that does not keep your logs in the first place. That's the approach used by Startpage and its European parent company, Ixquick.
The NSA's business is 'information dominance,' the use of other people's secrets to shape events.
The Obama administration, like those before it, promotes a disturbingly narrow interpretation of the Fourth Amendment, misapplying the facts of old analog cases to a radically different digital world.
Federal prosecutors want to indict Julian Assange for making public a great many classified documents.
I've always shied away from online data storage. I don't even use my employers' network drives for anything sensitive. I want to control access myself.
Most people inside the bureau believe that the blown opportunities to head off 9/11 would not recur today. Even among the FBI's doubters, few disagree that the bureau has come a long way.
I learned the technology and tradecraft of electronic security in self defense, with a lot of expert help.
I don't say I never use Facebook, but I often think about closing my account.
We know what's in our Cheerios and in our retirement accounts because the law requires disclosure.
The $52.6 billion U.S. intelligence arsenal is aimed mainly at unambiguous adversaries, including al-Qaida, North Korea and Iran. But top-secret budget documents reveal an equally intense focus on one purported ally: Pakistan.
As Trotsky didn't exactly say, you may not be interested in electronic snoops, but snoops are interested in you, whether or not you keep Coke's secret recipe on your iPhone.
It no longer counts as remarkable that Egyptians organized their uprising on social media.
When the 'New York Times' revealed the warrantless surveillance of voice calls, in December 2005, the telephone companies got nervous.
In computer circles, any unencrypted data is known as 'cleartext.'
Everyone and his Big Brother wants to log your browsing habits, the better to build a profile of who you are and how you live your life - online and off. Search engine companies offer a benefit in return: more relevant search results. The more they know about you, the better they can tailor information to your needs.
Leaders at the top of al Qaeda's hierarchy, the evidence shows, completed plans and obtained the materials required to manufacture two biological toxins - botulinum and salmonella - and the chemical poison cyanide.
On average, since 9/11, the FBI reckons that just over 100,000 terrorism leads each year have come over the transom. Analysts and agents designate them as immediate, priority or routine, but the bureau says every one is covered.
If Iraq had succeeded in spray-drying anthrax spores to extend their life and lethality, that would have been among the most important secrets of its wide-ranging weapons program.
A national security letter cannot be used to authorize eavesdropping or to read the contents of e-mail. But it does permit investigators to trace revealing paths through the private affairs of a modern digital citizen.
In 1995, Glaxo bought Burroughs Wellcome and became the presumptive leader in AIDS therapy.
You don't need to be a spook to care about encryption. If you travel with your computer or keep it in a place where other people can put their hands on it, you're vulnerable.
As digital communications have multiplied, and NSA capabilities with them, the agency has shifted resources from surveillance of individual targets to the acquisition of communications on a planetary scale.
True net-heads sometimes resort to punctuation cartoons to get around the absence of inflection.
The first time I set out to find George F. Kennan, in 1982, I had just turned 21, begun my final semester at Princeton University and noticed with astonishment that the senior thesis deadline had crept to within four months.
Pakistan has accepted some security training from the CIA, but U.S. export restrictions and Pakistani suspicions have prevented the two countries from sharing the most sophisticated technology for safeguarding nuclear components.
There is no reliable way to calculate from the number of recorded compliance issues how many Americans have had their communications improperly collected, stored or distributed by the NSA.
Privacy is relational. It depends on the audience. You don't want your employer to know you're job hunting. You don't spill all about your love life to your mom or your kids. You don't tell trade secrets to your rivals.
Even complex passwords are getting easy to break if they're too short. That's because today's inexpensive computer chips have the power of supercomputers from the year 2000.
The causes and severity of NSA infractions vary widely. One in 10 incidents is attributed to a typographical error in which an analyst enters an incorrect query and retrieves data about U.S phone calls or emails.
On March 12, 2004, acting attorney general James B. Comey and the Justice Department's top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal.
Nothing is absolute in security.
Cloud services cut both ways in terms of security: you get off-site backup and disaster recovery, but you entrust your secrets to somebody else's hands. Doing the latter increases your exposure to government surveillance and the potential for deliberate or inadvertent breaches of your confidential files.
Given the volume of PC sales and the way McAfee runs its operation, I imagine there must be thousands of phantom subscribers - folks who signed up once upon a time and left the software behind two or three computers ago.
Well-secured files don't do you much good if you lose them in a fire or hard drive crash.
Ghostery lets you spy on the spies in your computer. For each web page you visit, this extension uncloaks some - but not all - of the invisible tracking software that is working behind the scenes.
At the height of Iraq's clandestine nuclear weapons program, which nearly succeeded in building a bomb in 1991, Tuwaitha incorporated research reactors, uranium mining and enrichment facilities, chemical engineering plants and an explosives fabrication center to build the device that detonates a nuclear core.
NoScript is probably the most important privacy tool, but it costs you in convenience.
Of all Iraq's rocket scientists, none drew warier scrutiny abroad than Modher Sadeq-Saba Tamimi.
The defection of Hussein Kamel was a turning point in the U.N.-imposed disarmament of Iraq in the 1990s.
In late 2003, the Bush administration reversed a long-standing policy requiring agents to destroy their files on innocent American citizens, companies and residents when investigations closed.
If you do write down your passwords, don't make it obvious which password corresponds to which account. Even better, write the passwords incorrectly and make up an easy rule for fixing them. You could decide to add 1 to each number in your password, so that 2x6Y is written as 3x7Y.
Friend of mine, a smart journalist, had his iPad stolen. He couldn't help that - the thief broke into his house. But his private, personal data wasn't stolen, exactly. Donated, more like. He had no passcode set on the iPad.
I do read licenses, and they aggravate me, but a computer isn't much good without software. When I need a product, I hold my nose and click 'agree.'
No one can keep track of how many people use Internet, how many machines it can reach, or even how many sub- and sub-sub-networks form a part of it.
It turns out that American Express honors recurring payments even if the vendor is unable to supply an accurate card number and expiration date. An Amex phone representative said this is a feature, not a bug, which makes sure my bills are paid.
I favor pocket-sized hard drives that travel between home and office, syncing with computers on both ends.
Google appears to be the worst of the major search engines from a privacy point of view; Ask.com, with AskEraser turned on, is among the best.
By now, you've heard endless warnings about the risk of short, trivial passwords. There's a good chance you ignore them.
One common puzzle for the security-minded is how to work with confidential data on the road. Sometimes you can't bring your laptop, or don't want to. But working on somebody else's machine exposes you to malware and leaves behind all kinds of electronic trails.
In Africa through the 1990s, with notable exceptions in Senegal and Uganda, nearly all the ruling powers denied they had a problem with AIDS.
Snowden grants that NSA employees by and large believe in their mission and trust the agency to handle the secrets it takes from ordinary people - deliberately, in the case of bulk records collection, and 'incidentally,' when the content of American phone calls and e-mails are swept into NSA systems along with foreign targets.
The IronClad is faster than most thumb drives but far slower than a standard hard drive. Boot up, application launch and other Windows operations feel sluggish, though still usable.
China and Russia are regarded as the most formidable cyber threats.
Dell fills its computers with crapware, collecting fees from McAfee and other vendors to pre-install 'trial' versions.