Barton Gellman

Barton Gellman
Barton David Gellmanis an American journalist and bestselling author known for his Pulitzer Prize-winning reports on the September 11 attacks, on Dick Cheney's powerful vice presidency and on the global surveillance disclosure...
NationalityAmerican
ProfessionJournalist
Date of Birth3 November 1960
CountryUnited States of America
bugs cannot iraq launching missiles putting
In effect, you cannot stop Iraq from growing nasty bugs in the basement. You can stop them from putting operational warheads on working missiles and launching them at their neighbors.
affairs cannot contents letter modern national paths permit private revealing trace
A national security letter cannot be used to authorize eavesdropping or to read the contents of e-mail. But it does permit investigators to trace revealing paths through the private affairs of a modern digital citizen.
arsenal billion documents equally including intelligence korea mainly north reveal
The $52.6 billion U.S. intelligence arsenal is aimed mainly at unambiguous adversaries, including al-Qaida, North Korea and Iran. But top-secret budget documents reveal an equally intense focus on one purported ally: Pakistan.
broke friend ipad personal thief
Friend of mine, a smart journalist, had his iPad stolen. He couldn't help that - the thief broke into his house. But his private, personal data wasn't stolen, exactly. Donated, more like. He had no passcode set on the iPad.
break carrying certain consumed guy hard throughout worked
Scott Ritter is a very well-known archetype of a certain U.S. military officer. Very hard talking, very ambitious, zealous, and completely consumed with carrying out his mission. He's a guy who, throughout his career, I would say, did not break rules, but he worked around road blocks.
behind computers folks given imagine left pc phantom runs sales signed software thousands three time volume
Given the volume of PC sales and the way McAfee runs its operation, I imagine there must be thousands of phantom subscribers - folks who signed up once upon a time and left the software behind two or three computers ago.
companies customer experts legal liability public report security worry
Experts said public companies worry about the loss of customer confidence and the legal liability to shareholders or security vendors when they report flaws.
central cult five hour japanese morning packages placed pulled rush spread stations subway trains
During the morning rush hour on March 20, 1995, the Japanese cult Aum Shinrikyo placed packages on five subway trains converging on Tokyo's central station. When punctured, the packages spread vaporized Sarin through the subway cars and then into the stations as the trains pulled in.
afford companies requisite virtually
Drug manufacturers could afford to sell AIDS drugs in Africa at virtually any discount. The companies said they did not do so because Africa lacked the requisite infrastructure.
government talked
Snowden has yet to tell me anything that was a fact that I have been able to rebut or that anybody in the U.S. government I have talked to has been able to rebut.
according agencies formed obama revived scores
Scores of armed antigovernment groups, some of them far more radical, have formed or been revived during the Obama years, according to law-enforcement agencies and outside watchdogs.
behave far initial less levels prepare public telling
For political and bureaucratic reasons, governments at all levels are telling far less to the public than to insiders about how to prepare for and behave in the initial chaos of a mass-casualty event.
conceptual controls doctrines framework govern provide
Doctrines don't govern policy. They provide a conceptual framework by which policymakers approach their decisions. But there is no such thing as a doctrine that controls policy in every way.
analyze deeply flew hardware itself name peer pull traffic
CloudShield did not see itself as a cloak-and-dagger company. It made its name for high-end hardware that could peer deeply into Internet traffic and pull out and analyze 'packets' of data as they flew by.