I’ve Written It Before

House Oversight and Accountability Committee Chairman James Comer (R, KY) says there’ll be no special treatment of Hunter Biden; if he ignores the Committee’s subpoena, Comer will take him to court to force his appearance.

“We’re going to treat this investigation like every congressional investigation in recent memory has been treated: you come in for a deposition, then you do the public hearing. All of our depositions are transparent. We released the transcripts. … He is the key witness to all of the Biden crimes. So the subpoena called for him to show up in this office on December 13 for a deposition. I expect to see Hunter Biden in this office for a deposition.”
Asked if he was prepared to go to court if the first son does not show up, Comer answered. “Absolutely.”

And I’ll write it again. Comer shouldn’t waste time on going to court to enforce the Committee subpoena of Son Biden. The Father Biden/Garland DoJ won’t push the matter at all. Instead, per Jurney v MacCracken, Comer should put the matter before the House for a contempt vote first thing in the morning of the 14th, and then the House Sergeant at Arms, by noon on the 14th, should be sent to arrest Biden and haul him before the Committee for a closed-door deposition on the 15th.

There’s no need for any more stalling by either Biden.

Healthcare Systems On Edge

They’re on edge from a plethora of cyber attacks against them.

According to the Institute for Security and Technology, about 300 hospitals have suffered ransomware attacks this year alone. Cyber experts say hackers typically see health care organizations as a prime target because hospitals are likely to pay ransom to keep critical health services up and running.

Two problems are buried in that simple characterization. One is the continued vulnerability of the hospital systems’ IT systems. Why does this vulnerability continue to exist? Charlie Regan, Nerds On Site CEO:

Cyber criminals trying to get into any network or system are incredibly well-funded and incredibly well-orchestrated, and they have a never-ending source of more creative and effective tools to breach systems[.]

Yes, countering, much less preempting, such attacks is hard. But “hard” means “possible,” and the hospital system IT managers don’t appear to be making much effort to get on top of their companies’ vulnerability—those 300 attacks in just the last several months seem to demonstrate this.

But the larger problem in that characterization is that hospitals are likely to pay ransom. Paying the ransom is nothing other than paying the hackers wages for their labor, aiding and abetting the hackers’ crimes, and increasing the vulnerability of others to hackers’ crimes by guaranteeing that their crimes don’t just pay; they’re lucrative.

Given that, I’m having a hard time summoning any sympathy for the hospital systems. They need to start taking their cyber vulnerabilities seriously.