 Here it is. So ransomware is when a company hijacks a company, hackers, hijack the server of a company and then say, OK, and basically, let's say, freeze it and make it impossible for the company to function because the hackers are controlling the computers. And then they basically say to the company, we'll unfreeze the computer. We'll let you access the computer if you pay us money. And there are being some big, big cases of ransomware, infrastructure companies in the United States, a number of other companies. A lot of the ransomware that you hear was not a lot of the ransomware you don't hear about, right? Companies negotiate the ransomware. They pay them off. And they try not to make a big deal out of it. They don't want to let the public know they're vulnerable. They don't want to let them know they're vulnerable. So a lot of it is undisclosed. It happens often. Anyway, there was this big operation called Black Cat, AlfV, where they were responsible for some of the biggest ransomware cases in the United States. And the US Department of Justice went after them. And about just before Christmas, they announced that they had one, that they had been able to disable the Black Cat ransomware network. They basically foiled their attempts against hundreds of victims. They seized the dark web sites that Black Cat had been using for the extortion. And they basically completely disrupted the Black Cat ransomware group and the Justice Department were patting themselves on the shoulder. They done it. They've worked. Well, two months and a week after this happened, guess what? Black Cat is back. New servers, new hacking techniques, new ways of getting around it. And for the last seven days, the Black Cat has held hostage at the medical group a change health care. It's crippled its software in hospitals and pharmacies across the United States, leading to significant delays and drug prescriptions for an untold number of patients. The outage disclosed as a Black Cat attack by Reuters represents a particular horrific episode because of the impact on health care and because of the impact on people's health and because of how long it's already lasted. But more important than that, I think what it indicates is that law enforcement is, I think, not approaching this in the right way. Certainly, you can't just disable these people. You can't just take their servers away and do stuff like that and think that you are going to shut them down and eliminate them and they will go away. Behind Black Cat are human beings. These human beings are making the law, they're criminals. And unless you put them in jail, they will keep doing what they're doing. It's like you've got a bunch of, I don't know, armed robberies. And what you do is you take all the arms away from them and you say, yeah, I stopped them. I've taken their weapons away. Guess what? They go buy new weapons and they're back doing armed robbery. You can't just deal with the tools. You have to deal with the people. Now, I don't know what's involved in identifying who these people are, who these hackers are, where they reside. I don't know what's involved in trying to get foreign governments to help. Maybe they're in Russia. Maybe they're in China. But you'd think there is a way to shut these people down. This is what the government should be doing. I don't know, special ops, whatever. Shut them down. Make the consequences to them so horrific that they will never try it again. They're violating the individual rights of Americans. They are criminally active in the United States. There has to be a penalty for that. And a penalty to the individuals responsible, not just to the tools that they happen to use. Once somebody attacks the United States, it's not just enough to defend. You have to go and get them. And prosecute them. Or get them, right? How exactly do you do that? I'm sure it's difficult. I'm sure it's complex, and particularly in a world in which where there's so many bad actors. So it is, but this just proves. There's just no way around dealing with the source of the problem, which is the people involved, rather than just its superficial manifestation or the particular tools that they happen to be using, which can always be changed, updated, and redone.