This is Stewart Baker's Typepad Profile.
Join Typepad and start following Stewart Baker's activity
Join Now!
Already a member? Sign In
Stewart Baker
Former government official now practicing law
Recent Activity
Our guests for Episode 68 include Julian Sanchez, senior fellow at the CATO Institute where he studies issues at the busy intersection of technology, privacy, and civil liberties, with a particular focus on national security and intelligence surveillance. They also include the entire May meeting of ISSA- NOVA, which kindly invited the Cyberlaw Podcast to go walkabout once again. The audience provides useful feedback on several of the topics covered in this episode. We begin with This Week in NSA. And even though we had no idea how the Senate process would end up,neither it turns out did Majority Leader McConnell or anyone else. Our remarks on the Congressional dynamic remain as relevant now as when we made them, despite our intimations of obsolescence. We also cover an early judicial decision on insurance coverage for data breaches (subscription required), the US indictment of (another!) six Chinese economic espionage agents, and the personal data orphaned by Radio Shack’s bankruptcy. More importantly, we seize on a flimsy pretext to revisit Max Mosley’s five-hour, five hooker sadomasochistic orgy (subscription required) and his self-defeating efforts to wipe it from the internet by threats of lawsuit. It turns out he’s now reached a settlement with... Continue reading
Posted 3 days ago at Skating on Stilts
Our guest for Episode 67 is Dan Geer, a legendary computer security commentator and current CISO for In-Q-Tel. We review Dan’s recommendations for improving computer security, including mandatory reporting of intrusions, liability for proprietary software, striking back at hackers, at least in some ways, and getting the government to purchase and fix vulnerabilities. We agree on the inherent foolishness of the Internet voting movement, but I disagree with Dan on the right to be forgotten, and I predict that net neutrality will lead to the opposite of what he wants – both more regulation of operators and more limits on what the operators are allowed to carry. As with Bruce Schneier, I accuse Dan of a kind of digital Romanticism for advocating improbable personal defenses like using Tor for no reason, having multiple online identities, swapping affinity cards, and paying your therapist under an assumed name. But Dan makes me eat my words. More from Dan can be found here, here, and here. In the news roundup, we introduce Alan Cohn, yet another recent alumnus of the DHS Policy office now at Steptoe. We also revive This Week in NSA , pooling our collective inability to predict what the week... Continue reading
Posted May 21, 2015 at Skating on Stilts
Episode 65 would be ugly if it weren’t so much fun. Our guest is Bruce Schneier, cryptographer, computer science and privacy guru, and author of the best-selling Data and Goliath – a book I annotated every few pages of with the words, “Bruce, you can’t possibly really believe this.” And that’s pretty much how the interview goes, as Bruce and I mix it up over hackbacks, whether everyone but government should be allowed to use Big Data tools, Edward Snowden, whether “mass surveillance” has value in fighting terrorism, and whether damaging cyberattacks are really infrequent and hard to attribute. We disagree mightily – and with civility. The news roundup covers Congress’s debate over NSA and section 215. The House is showing a dismaying efficiency in moving bad bills while the Senate is mired in what may turn out to be more productive confusion (see, e.g., S. 1035 and S. 1123). We unpack the Supreme Court’s grant of certiorari in Spokeo, which looks like a no-lose opportunity for privacy class action defendants. A new and troubling development in cyber insecurity in the form of the malware Cryptowall, which infected readers of the Huffington Post via ads for Hugo Boss, then encrypted... Continue reading
Posted May 5, 2015 at Skating on Stilts
Our guest for episode 64 of the Cyberlaw Podcast is Mary DeRosa, the chief lawyer for the National Security Council during the early years of the Obama Administration, and now a Distinguished Visitor at Georgetown University Law Center. We ask Mary to walk us through a hypothetical set of NSC meetings on the Sony breach and the US response, flagging the legal issues and offices that come to the table. She helps me unpack the differences between the use of force, countermeasures, and an armed attack – and confirms that I have no future at the State Department – an overdetermined outcome if ever there was one. It’s a great primer on the practical ways in which cyberconflict is lawyered (or, in my view, overlawyered). In the news roundup, I have to choose between defending the New York Times and defending Hillary Clinton. I choose Hillary, arguing that despite NYT innuendo the Russians aren’t dumb enough to pay tens of millions for a State Department “yes’ vote in CFIUS. Because as far as anyone knows, the State Department has never voted anything but “yes” in CFIUS. The House has passed two cyber information sharing bills ‒ H.R. 1560 and H.R.... Continue reading
Posted Apr 28, 2015 at Skating on Stilts
Our guest for episode 63 of the Cyberlaw Podcast is Alan Cohn, former Assistant Secretary for Strategy, Planning, Analysis & Risk in the DHS Office of Policy and a recent addition at Steptoe. Alan brings to bear nearly a decade of experience at DHS to measure the Department’s growth. He explains how it has undertaken and largely delivered a new civilian cybersecurity infrastructure. And, while Congress dithers, it has begun to build an information sharing network quite independent of the legislative incentives now on offer. Alan also offers his insights into emerging technologies and the risks they may pose, including drones, sensors, and cryptocurrencies. In the news roundup, the consensus story of the week is the return of Jason Weinstein from a five-week absence, only some of it justified by family vacation and other worthwhile endeavors. In second place is the concerted European attack on Google and the rest of the US tech sector. Michael Vatis and I mull over a high-ranking European official’s astonishing "Washington gaffe" -- usually defined as admitting a politically incorrect truth, in this case that Brussels intends to regulate US technology until European industry can compete. Good luck with that. In the House, Doug Kantor... Continue reading
Posted Apr 21, 2015 at Skating on Stilts
Our guest for Episode 62 is is Dmitri Alperovitch, co-founder and CTO of CrowdStrike Inc. and former Vice President of Threat Research at McAfee. Dmitri unveils a new Crowdstrike case study in which his company was able to impose high costs on an elite Chinese hacking team. The hackers steadily escalated the sophistication of their attacks on one of Crowdstrike’s customers without success, until they finally unlimbered a zero-day. When even that failed, and the producer was alerted to the vulnerability, the attackers found themselves still locked out -- and down one zero-day. We mull the possibility that there’s a glimmer of hope for defenders. Dmitri and I also unpack the Great Cannon – China’s answer to 4Chan’s Low-Orbit Ion Cannon. Citizen Lab’s report strongly suggests that the Chinese government used its censorship system to deliberately infect about 2% of the Baidu queries coming from outside China. The government injected a script into the outsiders’ machines. The script then DDOSed Github, a US entity that had been making the New York Times available to Chinese readers along with numerous open source projects. The attack is novel, showing a creative and dangerous use of China’s Great Firewall, and it provoked not... Continue reading
Posted Apr 14, 2015 at Skating on Stilts
Our guest for episode 61 of the Cyberlaw podcast is Joseph Nye, former dean of the Kennedy School at Harvard and three-time national security official for State, Defense, and the National Intelligence Council. We get a magisterial overview of the challenge posed by cyberweapons, how they resemble and differ from nuclear weapons, and (in passing) some tips on how to do cross-country skiing in the White Mountains. In the news roundup, Meredith Rathbone explains details of the new sanctions program for those who carry out cyber attacks on US companies. I mock the tech press reporters who think this must be about Snowden because, well, everything is about Snowden. Michael Vatis endorses John Oliver’s very funny interview of Edward Snowden. Not just funny, it’s an embarrassment to all the so-called journalists who’ve interviewed Snowden for the last year without once asking him a question that made him squirm. In contrast, Oliver almost effortlessly exposes Snowden’s dissembling and irresponsibility. He hits NSA below the belt as well. Ben Cooper explains the Ninth Circuit decision refusing to apply disability accommodation requirements to web-only businesses (he filed an amicus brief in the case), and we speculate on the likelihood of a cert grant.... Continue reading
Posted Apr 7, 2015 at Skating on Stilts
The executive order allowing the President to impose OFAC sanctions on hackers is good news. I've been calling on the government for several years to go beyond attribution to retribution. See, for example this post from 2012 (caution: cleavage is involved), this Foreign Policy article (sadly, no cleavage), and this recent podcast with Juan Zarate (again no cleavage, you'll be relieved to hear). Similar sentiments were expressed in a 2013 report by the American Bar Association. The good news from the Sony case is how much better and faster we've gotten at attributing network espionage and network attacks. But that won't do much good until we can also punish those we identify. This order offers a real possibility that we can. Even the hackers don't want to work for government forever; they hope to run startups just like everybody else, but that will be hard with an OFAC sanction hanging over their heads. And the companies that benefit from stolen trade secrets could also find themselves sanctioned, since the order extends to them as well. Sanctions can be applied to any company that is: responsible for or complicit in, or to have engaged in, the receipt or use for commercial... Continue reading
Posted Apr 1, 2015 at Skating on Stilts
Derek, Thanks for the thoughtful response. One question: What is TLP sanitization? I'm not sure we disagree much on the limitations of automated collection of threat information. I agree that such collection is sometimes very accurate and that even accurate information ages rapidly. But I can't help believing that some of the automated systems are collecting information about behavior that is almost always evidence of bad intent. But not always; mistakes and randomness happen. In fact, one of the Critical Stack sources says pretty much exactly that: "The following IP addresses have been detected performing TCP SYN to to a non-listening service or daemon. No assertion is made, nor implied, that any of the below listed IP addresses are accurate, malicious, hostile, or engaged in nefarious acts." Maybe the conduct in question is almost certainly malicious, at the 95% confidence level. We would surely be willing to block addresses if there's a 95% chance that they're bad, but a company sharing information of that kind is taking a legal risk; it doesn't have a "reasonable belief" that all the personally identifying address data it's sharing is directly related to a threat. In fact, it has a pretty good idea that 5% is not; it just doesn't know which 5%. That's going to give the company lawyer pause when the time comes to share. And this bill will introduce that pause into information-sharing forums that are working smoothly now. That's not progress. Stewart
Episode 60 of the Cyberlaw Podcast features Paul Rosenzweig, founder of Red Branch Consulting PLLC and Senior Advisor to The Chertoff Group. Most importantly he was a superb Deputy Assistant Secretary for Policy in the Department of Homeland Security when I was Assistant Secretary. Paul discourses on the latest developments in ICANN, almost persuading me that I should find them interesting. He expresses skepticism about the US government’s effort to win WTO scrutiny of China’s indigenous bank technology rules; he also sees the DDOS attack on GitHub as a cheap exercise in Chinese extraterritorial censorship. Michael Vatis, meanwhile, fills us in on two new cyberlaw cases whose importance is only outweighed by their weirdness. And I dissect the House cybersecurity information sharing bill, concluding that it has gone so far to appease the unappeasable privacy lobby that it may actually discourage information sharing. As always, send your questions and suggestions for interview candidates toCyberlawPodcast@steptoe.comor leave a message at +1 202 862 5785. Download the sixtieth episode (mp3). Subscribe to the Cyberlaw Podcast here. We are also now on iTunes and Pocket Casts!:: Continue reading
Posted Mar 31, 2015 at Skating on Stilts
The House Intelligence Committee has now adopted a manager's amendment to what it's now calling the "Protecting Cyber Networks Act." Predictably, privacy groups are already inveighing against it. I fear that the House bill is indeed seriously flawed, but not because it invades privacy. Instead, it appears to pile unworkable new privacy regulations on the private sector information-sharing that's already going on. The key point to remember is that plenty of private sector sharing about cybersecurity is already going on. There aren't a lot of legal limits on such sharing, unless the government is getting access to the information. If it is, providers of internet and telecom services can't join the sharing because an old privacy law bars them from providing subscriber information to the government in the absence of a subpoena. The House bill solves that problem by allowing sharing to occur, "notwithstanding any other law." But overriding even a dysfunctional and aging privacy law quickens the antibodies of the privacy lobby. So they've been pressing for kind of "privacy tax" on information sharing -- specifically, they want assurances that personal data will be removed from any threat information that companies share. Everyone recognizes, at least in theory, that... Continue reading
Posted Mar 30, 2015 at Skating on Stilts
Richard Bejtlich and Stewart Baker Richard Bejtlich is our guest for episode 59 of the Cyberlaw Podcast. Richard is the Chief Security Strategist at FireEye, an adviser to Threat Stack, Sqrrl, and Critical Stack, and a fellow at Brookings. We explore the significance of China’s recently publicized acknowledgment that it has a cyberwar strategy, FireEye’s disclosure of a gang using hacking to support insider trading, and NSA director Rogers’s recent statement that the US may need to use its offensive cyber capabilities in ways that will deter cyberattacks. In the news roundup, class action defense litigator Jennifer Quinn-Barabanov explains why major automakers are facing cybersecurity lawsuits now, before car-hacking has caused any identifiable damage. I explain how to keep your aging car and swap out its twelve-year-old car radio for a cool new Bluetooth enabled sound system. Michael Vatis disassembles the “$10 million” Target settlement and casts doubt on how much victims will recover. Richard Bejtlich, Stewart Baker, and Jennifer Quinn-Barabanov Michael also covers the approval by a Judicial Conference advisory committee of a rule allowing warrants to extend past judicial district lines, explaining why it may not be such a big deal. Maury Shenk, former head of Steptoe’s London... Continue reading
Posted Mar 24, 2015 at Skating on Stilts
Cyberspies can’t count on anonymity any more. The United States (and the private security firm Mandiant) stripped a PLA espionage unit of its cover two years ago with a detailed description of the unit’s individual hackers; that report was followed by federal indictments of members of the unit that described them and their activities is great detail. More recently, the President outed North Korea for the attack on Sony. And as if to underscore the growing confidence of the intelligence community in its attribution capabilities, the Director of National Intelligence almost casually tagged Iran for a destructive cyberattack on Sheldon Adelson’s Las Vegas Sands gambling empire. That’s good news, but it’s only a first step.To make a real difference, attribution has to yield more than talk. Unfortunately, neither the companies victimized by network intrusions nor their governments have yet found ways to turn attribution into deterrence. No one expects to see members of the PLA in federal court any time soon. The administration’s public sanctions on North Korea were barely pinpricks. And Iran could be forgiven for concluding that its cyberattacks were rewarded by concessions in the nuclear enrichment negotiations. But that’s not the last word. I attended a recent... Continue reading
Posted Mar 19, 2015 at Skating on Stilts
In episode 58 of the Cyberlaw Podcast, our guest is Andy Ozment, who heads the DHS cybersecurity unit charged with helping improve cybersecurity in the private sector and the civilian agencies of the federal government. We ask how his agency's responsibilities differ from NSA's and FBI's, quote a scriptural invocation of desert jackals to question his pronunciation of ISAO, dig into the question whether sharing countermeasures is a prelude to cybervigilantism, and address the crucial question of how lawyers should organize cybersecurity information sharing organizations (hint: the fewer lawyers and the more clients the better). In the news roundup, we revisit the cybersecurity implications of net neutrality, and Stephanie Roy finds evidence that leads me to conclude that the FCC has stolen the FTC's playbook (and, for all we know, deflated the FTC's football). This ought to at least help AT&T in its fight with the FTC over throttling, but that's no sure bet. I explain why Hillary Clinton's email server was a security disaster for the first two months of her tenure – and engage in utterly unsupported speculation that she closed the biggest security gap in March 2009 because someone in the intelligence community caught foreign governments reading... Continue reading
Posted Mar 18, 2015 at Skating on Stilts
This episode of the podcast features Rep. Mike Rogers, former chairman of the House intelligence committee, Doug Kantor, our expert on all things cyber in Congress, and Maury Shenk, calling in from London. Mike Rogers is now a nationally-syndicated radio host on Westwood One, a CNN national security commentator, and an adviser to Trident Capital’s new cybersecurity fund. The former chairman addresses a host of issues -- gaps in CFIUS, the future of the President’s new cyber threat integration center, the risk of rogue state cyberattacks on US infrastructure – as well as the issues we cover in the news roundup. These include Maury’s take on China’s toughening policy toward US technology, the prospects for a workable bill renewing section 215 (the ex-chairman is not as sanguine as Doug Kantor and I) and the administration’s new privacy bill. (Our take: the bill is ideal for the Twitter age, since you still have 137 characters left after typing “DOA”.) Maury updates us on the latest reason for delay in adoption of a new European data protection regulation. Doug Kantor and Mike Rogers consider the prospects for an information sharing bill and comment on privacy groups’ goalpost-moving style of congressional negotiation. And,... Continue reading
Posted Mar 11, 2015 at Skating on Stilts
Our guest for Episode 56 of the Cyberlaw Podcast is Siobhan Gorman, who broke many of the top cybersecurity stories for the Wall Street Journal until she left late last year to join the Brunswick Group, which does crisis communications for private companies. Siobhan comments on the flood of attribution stories in recent days, including the US government’s almost casual attribution of the Sands Las Vegas cyberattack to Iran and the leaked attribution of the Saudi Aramco and US bank attacks to the same nation. She also compares private sector cybercrisis planning to the US government’s coordination (or lack thereof) in responding to the Sony attack. Stephanie Roy, Siobhan Gorman, Stewart Baker In other news, Stephanie Roy and I take a deep and slightly off-center dive into the FCC’s net neutrality ruling. I predict that within five years the FCC will have used its new Title II authority to impose cybersecurity requirements on US ISPs. (And in ten years, I suspect, there will be a debate in the FCC over whether to throttle or disfavor communications services that don’t cooperate with the FBI’s effort to deny perfectly encrypted security to criminals.) Stephanie demurs. Michael Vatis and I chew over China’s... Continue reading
Posted Mar 3, 2015 at Skating on Stilts
In Episode 55 of the Cyberlaw Podcast, we revive This Week in NSA to explore the claim that GCHQ stole mass quantities of cell phone encryption keys. Meanwhile, Jason explains the complex political battles over Rule 41, Michael explains why so many companies have rallied to Twitter’s first amendment claim against the Justice Department, and both of them explain how Yahoo! managed to beat the government’s indefinite gag order – and why Yahoo! might even be right. After which we melt down into the bottomless hot mess of liability and litigation that surrounds the Lenovo/Superfish/Komodia/Lavasoft flap. Nuala O’Connor, Stewart Baker, and Jason Weinstein Our interview is with the charming and feisty CEO of the Center for Democracy and Technology, Nuala O’Connor. Nuala and I square off over end-to-end encryption, privacy, and section 215, while managing to find common ground on TLS and even child-rearing. As always, send your questions and suggestions for interview candidates or leave a message at +1 202 862 5785. Download the fifty-fifth episode (mp3). Subscribe to the Cyberlaw Podcast here. We are also now on iTunes and Pocket Casts! Continue reading
Posted Feb 25, 2015 at Skating on Stilts
Episode 54 of the Cyberlaw Podcast features a guest appearance by Lawfare’s own Ben Wittes, discussing cybersecurity in the context of his forthcoming book, The Future of Violence, authored by Ben and Gabriella Blum. (The future of violence, you won’t be surprised to hear, looks bright.) Ben also floats the idea of taping an episode of all the Lawfare-affiliated podcasts in a bar with some of our listeners. More on that idea to come. In the news roundup, I cover the President’s surprisingly news-light cybersecurity summit in Silicon Valley. Jason comments on state attorneys generals’ predictable sniping at Anthem for delays in identifying all the potential victims of its hack. I note with satisfaction a serious loss by EFF in the Jewel lawsuit over the US government’s access to AT&T traffic. And Jason lays out a report by the New York State Department of Financial Services on insurance company cybersecurity. We both express concern about two Kaspersky security reports that identify new hacking tactics and new dangers for computer networks. The patientinfiltration of large bank networks and the extraction of hundreds of millions of dollars casts doubt on the safety of banking systems around the world. Equally troubling is the... Continue reading
Posted Feb 20, 2015 at Skating on Stilts
In this week’s episode, our guest is Rebecca Richards, NSA’s director of privacy and civil liberties. We ask the tough questions: Is her title an elaborate hoax or is she the busiest woman on the planet? How long will it be before privacy groups blame the Seattle Seahawks’ loss on NSA’s policy of intercepting everything? How do you tell an extroverted NSA engineer from an introvert? And, more seriously, now that acting within the law isn’t apparently enough, how can an intelligence agency assure Americans that it shares their values without exposing all its capabilities? In the week’s news, Jason Weinstein, Michael Vatis and I explore the DEA’s license plate collection program and what it means, among other things, for future Supreme Court jurisprudence on location and the fourth amendment. We take on the WikiLeaks-Google flap and conclude that there’s less there than meets the eye. Jason celebrates a festival of FTC news. The staff report on the Internet of Things provokes a commissioner to dissent from feel-good privacy bromides. The FTC data security scalp count grows to 53, with more on the way. We discover that the FTC has aspirations to become the Federal Telecommunications Commission, regulating telecommunications throttling... Continue reading
Posted Feb 3, 2015 at Skating on Stilts
My latest venture in podcasting features a debate on attributing cyberattacks. Two guests, Thomas Rid and Jeffrey Carr, disagree sharply about how and how well recent cyberattacks can be attributed. Thomas Rid is a Professor of Security Studies at King’s College London and the author of Cyber War Will Not Take Place as well as a recent paper on how attribution should be done. Jeffrey Carr, the founder and CEO of Taia Global, remains profoundly skeptical about the accuracy of most attribution efforts in recent years. I question both of them, relying heavily on questions supplied by attribution aficionados via Twitter. Among the questions we dig into: Why is cyber attribution is so controversial? Is it a hangover from the Iraq war? Snowdenista hostility to the US government? Or the publicity to be gained from challenging official attributions? Is the use of secret attribution evidence inherently questionable or an essential tool for ensuring successful attribution? I also call out the security experts who heaped scorn on the FBI for its initial fingering of North Korea as the source of the Sony attack. Which of them recanted as the evidence mounted, and which ones doubled down? Details in the podcast. In... Continue reading
Posted Jan 27, 2015 at Skating on Stilts
I occasionally report here on interviews that I’ve been doing for the Steptoe Cyberlaw Podcast. This week’s guest is David Sanger, the New York Times reporter who broke the detailed story of Stuxnet in his book, Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power. His appearance on the podcast is particularly timely because it allowed David to talk about his latest story for the Times. The story recounts how North Korea developed its cyberattack network, and how the National Security Agency managed to compromise that network and attribute the Sony attack. He explains that understanding the Obama White House helped him break a story that seemed to be about NSA and the FBI. I explain why I think North Korean hackers resemble East German Olympic swimmers, and we meditate on the future of cyberwar. For those who like such things, Michael Vatis and I also cover a news-rich week, beginning with capsule summaries of the President’s State of the Union proposals for legislation on cybersecurity information sharing, breach notification, and Computer Fraud and Abuse Act amendments. We touch on Europe’s new commitment to antiterrorism surveillance, which officially puts a still-Snowden-ridden United States out of step with... Continue reading
Posted Jan 21, 2015 at Skating on Stilts
I've got a short op-ed about returning American jihadis in the Room for Debate section of today's New York Times site. Here's what it says: Americans returning home from a foreign jihad pose a very real danger to this country, now and for years to come, as the Charlie Hebdo attacks reveal. One of the attackers, Cherif Kouachi, had been caught and convicted of trying to join the war in Iraq, and his brother may have trained with Al Qaeda in Yemen. Despite these warning signs, French authorities lacked the resources to keep watching the brothers. Our law is even less suited to the threat than France's. We have not made it a federal crime for Americans to join the fight against a U.S. ally. And, like the French, we cannot afford to put 24-hour tails on every returnee. We could afford to conduct electronic surveillance of the returnees, but that would require specific evidence of a new plot here at home. And new plots, the Kouachis showed, are often easy to hide from the authorities. Until we can distinguish the reformed from the continuing threats, the penalty for this new crime should at a minimum include years of probation... Continue reading
Posted Jan 13, 2015 at Skating on Stilts
Government policymakers have been hoping for twenty years that companies will be driven to good cybersecurity by the threat of tort liability. That hope is understandable. Tort liability would allow government to get the benefit of regulating cybersecurity without taking heat for imposing restrictions directly on the digital economy. Those who see tort law as a cybersecurity savior are now getting their day in court. Literally. Mandatory data breach notices have led, inevitably, to data breach class actions. And the class actions have led to settlements. And those freely negotiated deals set what might be called a market price for data breach liability, a price that can be used to decide how much money a company ought to spend on security. So, how much incentive for better security comes from the threat of data breach liability? Some, but not much. As I've been saying for a while, the actual damages from data breaches are pretty modest in dollar terms, and the pattern of losses makes it very hard to sustain a single class, something that forces up the cost of litigation for the plaintiffs. You can see this pattern in recent data breach settlements. I put this chart together for... Continue reading
Posted Jan 11, 2015 at Skating on Stilts
Maybe so. Compare this study: A recent study conducted at the Norwegian University of Science and Technology has revealed that being born during a period of heightened solar activity can shorten our lifespan by over five years. With this one: The plot below ... shows the size of the biggest individual spots in each year between 1900 and 2000. Notable spots include the Great Sunspot of 1947, which was three times larger than [a 1991 sunstorm]. Continue reading
Posted Jan 11, 2015 at Skating on Stilts
From an op-ed for the New York Daily News: there are widespread reports that North Korea launches its cyberattacks from the luxurious Chilbosan Hotel in Shenyang, China. Perhaps a previously unknown cyberarmy should simply take down the hotel's power and telephone service and threaten worse. There's a risk that such tactics would lead to conflict between the U.S. and China, but China can avoid that by closing the haven it has provided for attacks on America. These are not easy options to contemplate. But flinching from such conflicts will lead to escalation of another kind, as every tin-pot dictator in the world discovers that Americans can be intimidated on the cheap. Like it or not, history is calling. Continue reading
Posted Dec 20, 2014 at Skating on Stilts