Barton Gellman
Barton Gellman
Barton David Gellmanis an American journalist and bestselling author known for his Pulitzer Prize-winning reports on the September 11 attacks, on Dick Cheney's powerful vice presidency and on the global surveillance disclosure...
NationalityAmerican
ProfessionJournalist
Date of Birth3 November 1960
CountryUnited States of America
aids attacks balancing companies countries deflect exclusive fear global granted lowering makers medicines poor position prices profits reach rejected required rights
For a decade, makers of AIDS medicines had rejected the idea of lowering prices in poor countries for fear of eroding profits in rich ones. The position required a balancing act, because the companies had to deflect attacks on the global reach of their patents, which granted exclusive marketing rights for antiretroviral drugs.
attacks cited destroyed developed dramatic iranian israel states united worm
Stuxnet, a computer worm reportedly developed by the United States and Israel that destroyed Iranian nuclear centrifuges in attacks in 2009 and 2010, is often cited as the most dramatic use of a cyber weapon.
aftermath attacks network nsa people techniques urgent
In the urgent aftermath of Sept. 11, 2001, with more attacks thought to be imminent, analysts wanted to use 'contact chaining' techniques to build what the NSA describes as network graphs of people who represented potential threats.
attacks elaborate prepares qaeda
Counterterrorism analysts have known for years that al Qaeda prepares for attacks with elaborate 'targeting packages' of photographs and notes.
accepted countries export nuclear pakistan security sharing suspicions technology
Pakistan has accepted some security training from the CIA, but U.S. export restrictions and Pakistani suspicions have prevented the two countries from sharing the most sophisticated technology for safeguarding nuclear components.
arsenal billion documents equally including intelligence korea mainly north reveal
The $52.6 billion U.S. intelligence arsenal is aimed mainly at unambiguous adversaries, including al-Qaida, North Korea and Iran. But top-secret budget documents reveal an equally intense focus on one purported ally: Pakistan.
companies customer experts legal liability public report security worry
Experts said public companies worry about the loss of customer confidence and the legal liability to shareholders or security vendors when they report flaws.
central cult five hour japanese morning packages placed pulled rush spread stations subway trains
During the morning rush hour on March 20, 1995, the Japanese cult Aum Shinrikyo placed packages on five subway trains converging on Tokyo's central station. When punctured, the packages spread vaporized Sarin through the subway cars and then into the stations as the trains pulled in.
afford companies requisite virtually
Drug manufacturers could afford to sell AIDS drugs in Africa at virtually any discount. The companies said they did not do so because Africa lacked the requisite infrastructure.
government talked
Snowden has yet to tell me anything that was a fact that I have been able to rebut or that anybody in the U.S. government I have talked to has been able to rebut.
according agencies formed obama revived scores
Scores of armed antigovernment groups, some of them far more radical, have formed or been revived during the Obama years, according to law-enforcement agencies and outside watchdogs.
behave far initial less levels prepare public telling
For political and bureaucratic reasons, governments at all levels are telling far less to the public than to insiders about how to prepare for and behave in the initial chaos of a mass-casualty event.
conceptual controls doctrines framework govern provide
Doctrines don't govern policy. They provide a conceptual framework by which policymakers approach their decisions. But there is no such thing as a doctrine that controls policy in every way.
analyze deeply flew hardware itself name peer pull traffic
CloudShield did not see itself as a cloak-and-dagger company. It made its name for high-end hardware that could peer deeply into Internet traffic and pull out and analyze 'packets' of data as they flew by.