Top 21 Barton Gellman Quotes



No one ought to be under any illusion that Cheney privately thinks himself a failure.

 

Most computers today have built in backup software.

 

I favor pocket-sized hard drives that travel between home and office, syncing with computers on both ends.

 

Dell fills its computers with crapware, collecting fees from McAfee and other vendors to pre-install ‘trial’ versions.

 

Given the volume of PC sales and the way McAfee runs its operation, I imagine there must be thousands of phantom subscribers – folks who signed up once upon a time and left the software behind two or three computers ago.

 

U.S. intelligence services routinely use collection methods against foreigners that foreseeably – with certainty – ingest high volumes of U.S. communications as well.

 

The $52.6 billion U.S. intelligence arsenal is aimed mainly at unambiguous adversaries, including al-Qaida, North Korea and Iran. But top-secret budget documents reveal an equally intense focus on one purported ally: Pakistan.

 

By now, you’ve heard endless warnings about the risk of short, trivial passwords. There’s a good chance you ignore them.

 

On March 12, 2004, acting attorney general James B. Comey and the Justice Department’s top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal.

 

Iraq has the most extensive petrochemical industry in the Middle East and a wealth of vaccine factories, single-cell protein research labs, medical and veterinary manufacturing centers and water treatment plants.

 

Daniel Ellsberg showed tremendous courage back in the ’70s.

 

Early in 1986, the World Health Organization in Geneva still regarded AIDS as an ailment of the promiscuous few.

 

You don’t need to be a spook to care about encryption. If you travel with your computer or keep it in a place where other people can put their hands on it, you’re vulnerable.

 

The Patriot Act unleashed the FBI to search your email, travel and credit records without even a suspicion of wrongdoing.

 

‘Social engineering,’ the fancy term for tricking you into giving away your digital secrets, is at least as great a threat as spooky technology.

 

Privacy is relational. It depends on the audience. You don’t want your employer to know you’re job hunting. You don’t spill all about your love life to your mom or your kids. You don’t tell trade secrets to your rivals.

 

I have no evidence of any relationship between IRS and NSA.

 

Experts said public companies worry about the loss of customer confidence and the legal liability to shareholders or security vendors when they report flaws.

 

The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents.

 

The NSA has different reporting requirements for each branch of government and each of its legal authorities.

 

At Cheney’s initiative, the United States stripped terror suspects of long-established rights under domestic and international law, building a new legal edifice under exclusive White House ownership.

 

 

Quotes by Authors

Leave a Reply

Your email address will not be published. Required fields are marked *