It Is Time for the Media to Stand Up

Donald Trump’s press conference yesterday (the first since he asked the Russian government to hack into Hillary Clinton’s email last July) was the harbinger of something ominous. The usual tropes applied to it — Trump’s gaslighting of the country, of denying things that are plain to see while pretending they are not, demanding respect after building…

Continue reading →

For New Year’s, Write

As the year draws to a close and the month-long countdown toward a Trump Presidency begins, well… crap. This year certainly did not end on an especially high note, and 2017, when the man actually assumes office, looks to be even worse. Donald Trump, as a President, presages a descent into madness in America: an…

Continue reading →

Mitch McConnell Is Swindling You

Today, CNN reported that Republican Senate Majority Leader Mitch McConnell thinks it “defies belief” that there are Republicans who don’t want to investigate the role of Russian hackers in attacking the integrity of the presidential election. Many people have cheered his statement as part of a bipartisan effort to uncover just how badly Russia influenced…

Continue reading →

How to Unpack A Fake News Story

There is a panic-story going through the anti-American swamps of the Left about a provision within the 2017 Intelligence Authorization Act, H.R. 6393, that is intended to counter Russian influence operations inside the U.S. I found it posted in a couple of places on social media today. Like most fake news, there is a kernel…

Continue reading →

This Is Not Normal

About the nicest thing you can say about President Trump’s incoming administration is that it is without precedent. But there is another way of looking at it: it is not normal. Normal, you might argue, is a bad thing when people are hurting. In fact, there is enough polling about why people voted for Trump…

Continue reading →

How (Not) to Regulate the Internet

In 2012, famous computer security expert Bruce Schneier worried about the rise of what he called “security feudalism.” This is the process by which users place their trust in a given vendor to safeguard their data and their devices — whether through automatic updates, automatic backups, required two-factor authentication, and so on. Echoing the old…

Continue reading →