Two articles on this sensitive subject. The Ketcham article aggregates numerous stories from over the years, under the tent of CI vulnerabilities in our domestic telecom system. The Elmer article captures exactly why this issue needs to be handled calmly and methodically.