Quotes by: Barton Gellman
NoScript is probably the most important privacy tool, but it costs you in convenience.
Given the volume of PC sales and the way McAfee runs its operation, I imagine there must be thousands of phantom subscribers - folks who signed up once upon a time and left the software behind two or three computers ago.
The NSA has different reporting requirements for each branch of government and each of its legal authorities.
In Africa through the 1990s, with notable exceptions in Senegal and Uganda, nearly all the ruling powers denied they had a problem with AIDS.
You don't need to be a spook to care about encryption. If you travel with your computer or keep it in a place where other people can put their hands on it, you're vulnerable.
Snowden has been very sparing about discussing his early life or his personal life.
Companies that receive government information demands have to obey the law, but they often have room for maneuver. They scarcely ever use it.
Scott Ritter is a very well-known archetype of a certain U.S. military officer. Very hard talking, very ambitious, zealous, and completely consumed with carrying out his mission. He's a guy who, throughout his career, I would say, did not break rules, but he worked around road blocks.
True net-heads sometimes resort to punctuation cartoons to get around the absence of inflection.
In the field of biological weapons, there is almost no prospect of detecting a pathogen until it has been used in an attack.
Suppose a bad guy guesses the password for your throwaway Yahoo address. Now he goes to major banking and commerce sites and looks for an account registered to that email address. When he finds one, he clicks the 'forgot my password' button and a new one is sent - to your compromised email account. Now he's in a position to do you serious harm.
The causes and severity of NSA infractions vary widely. One in 10 incidents is attributed to a typographical error in which an analyst enters an incorrect query and retrieves data about U.S phone calls or emails.
NSA surveillance is a complex subject - legally, technically and operationally.
The defection of Hussein Kamel was a turning point in the U.N.-imposed disarmament of Iraq in the 1990s.
I do read licenses, and they aggravate me, but a computer isn't much good without software. When I need a product, I hold my nose and click 'agree.'
Iraq has the most extensive petrochemical industry in the Middle East and a wealth of vaccine factories, single-cell protein research labs, medical and veterinary manufacturing centers and water treatment plants.
Ecuador has never stated flatly that it would give asylum to Edward Snowden.
White House officials acknowledge in broad terms that a president's time and public rhetoric are among his most valuable policy tools.
Friend of mine, a smart journalist, had his iPad stolen. He couldn't help that - the thief broke into his house. But his private, personal data wasn't stolen, exactly. Donated, more like. He had no passcode set on the iPad.
Snowden has yet to tell me anything that was a fact that I have been able to rebut or that anybody in the U.S. government I have talked to has been able to rebut.
If you do write down your passwords, don't make it obvious which password corresponds to which account. Even better, write the passwords incorrectly and make up an easy rule for fixing them. You could decide to add 1 to each number in your password, so that 2x6Y is written as 3x7Y.
A national security letter cannot be used to authorize eavesdropping or to read the contents of e-mail. But it does permit investigators to trace revealing paths through the private affairs of a modern digital citizen.
Unsettling signs of al Qaeda's aims and skills in cyberspace have led some government experts to conclude that terrorists are at the threshold of using the Internet as a direct instrument of bloodshed.