Unfortunately, information about the author is unknown to us. But you can add it. Read full biography of Barton Gellman →
Enclosed by a sand berm four miles around and 160 feet high, the Baghdad Nuclear Research Facility entombs what remains of reactors bombed by Israel... →
First developed as a weapon by the U.S. Army, VX is an oily, odorless and tasteless liquid that kills on contact with the skin or when inhaled in... →
Friend of mine, a smart journalist, had his iPad stolen. He couldn't help that - the thief broke into his house. But his private, personal data... →
I don't think Cheney started off in 2000 with a burning desire to become vice-president. I think the prospect gradually became more appealing... →
In effect, you cannot stop Iraq from growing nasty bugs in the basement. You can stop them from putting operational warheads on working missiles and... →
In late 2003, the Bush administration reversed a long-standing policy requiring agents to destroy their files on innocent American citizens... →
On average, since 9/11, the FBI reckons that just over 100,000 terrorism leads each year have come over the transom. Analysts and agents designate... →
On March 12, 2004, acting attorney general James B. Comey and the Justice Department's top leadership reached the brink of resignation over... →
One common puzzle for the security-minded is how to work with confidential data on the road. Sometimes you can't bring your laptop, or don't... →
Smallpox, which spreads by respiration and kills roughly one in three of those infected, took hundreds of millions of lives during a recorded history... →
Snowden grants that NSA employees by and large believe in their mission and trust the agency to handle the secrets it takes from ordinary people -... →
Stuxnet, a computer worm reportedly developed by the United States and Israel that destroyed Iranian nuclear centrifuges in attacks in 2009 and 2010... →
The best way to preserve your privacy is to use a search engine that does not keep your logs in the first place. That's the approach used by... →