A man uses his smartphone in front of portraits of the late North Korean leaders Kim Il Sung, left, and Kim Jong Il, right, in Pyongyang, May 5, 2015 (AP photo by Wong Maye-E).

Before his arrest, Virgil Griffith had a reputation as a “cult hacker,” a “tech-world enfant terrible.” A 2008 profile in The New York Times Magazine, published when he was 25, called him the “Internet Man of Mystery,” and cast him as “a troublemaker … A twerp. And a magnet for tech-world groupies,” drinking White Russians and “revel[ing] in the attention of his female fans.” Griffith had become notorious the year before, when he launched WikiScanner, a website that used IP address databases to expose the anonymous editors of Wikipedia entries. The site’s release brought on a wave of news coverage, […]

The National Security Administration campus, where the U.S. Cyber Command is located, in Fort Meade, Md., June 6, 2013 (AP photo by Patrick Semansky).

The United States gets a lot right about its strategic approach to cyberspace, but the steady stream of reporting on the relentless wave of adversarial cyber campaigns waged by Russia, China and Iran against the U.S. show that it also still gets plenty of things wrong. Some in Washington may be comforted by the idea that the Pentagon will act as a “backstop” against foreign cyber campaigns aimed at influencing the upcoming elections. The fact that a militarized response seems to be the only arrow in America’s quiver, though, is seriously troubling. More than half a century after the Pentagon’s […]