Day: May 13, 2017

Ransomware Attack Could Herald Future Problems

Tech staffs around the world worked around the clock this weekend to protect computers and patch networks to block the computer hack whose name sounds like a pop song — “WannaCry” — as analysts warned the global ransomware attack could be just the first of a new wave of strikes by computer criminals.

The United States suffered relatively few effects from the ransomware that appeared on tens of thousands of computer systems across Europe and into Asia, beginning Friday. Security experts remained cautious, however, and stressed there was a continuing threat.

In contrast to reports from several European security firms, a researcher at the Tripwire company on the U.S. West Coast said late Saturday that the attack could be diminishing.

“It looks like it’s tailing off,” said Travis Smith of Tripwire.

“I hope that’s the case,” Smith added. The Oregon firm protects large enterprises and governments from computer security threats.

Ransomware attack

The code for the ransomware unleashed Friday remains freely available on the internet, experts said, so those behind the WannaCry attack — also known as WanaCryptor 2.0 and a variety of other names — could launch new strikes in coming days or weeks. Copycat attacks by other high-tech criminals also are possible.

“We are not out of the woods yet,” said Gary Davis, chief consumer security evangelist at McAfee, the global computer security software company in Santa Clara, California. “We think it’s going to be the footprint for other kinds of attacks in the future.”

The attack hit scores of countries — more than 100, by some experts’ count — and infected tens of thousands of computer networks.

Industry reports indicate Russia, Taiwan, Ukraine and Britain were among the countries hit hardest, and more hacking reports can be expected when offices reopen for the new workweek Monday or, in some parts of the world, Sunday.

One of the weapons used in the current attack is a software tool reportedly stolen from the U.S. National Security Agency and published on the internet by hackers last month.

The tool affords hackers undetected entry into many Microsoft computer operating systems, which is what they need to plant their ransomware. However, Microsoft issued patches to fix that vulnerability in its software weeks ago that could greatly reduce the chances of intrusion.

Outdated operating systems

The crippling effects of WannaCry highlight a problem that experts have long known about, and one that appears to have hit developing countries harder.

Some organizations are more vulnerable to intrusion because they use older or outdated operating systems, usually due to the cost of upgrading software or buying modern hardware needed to install better-protected operating systems. Companies like Microsoft eventually stop updating or supporting older versions of their software, so customers using those programs do not receive software patches or security upgrades.

Much of the ransomware’s spread around the world occurred without any human involvement. The WannaCry malware self-propagates, copying itself to all computers on a network automatically.

When a demand for ransom payments appears on a user’s screen — $300 at first, doubling to $600 in a few days — it’s usually too late: All files on that computer have been encrypted and are unreadable by their owners.

The hackers said they would reverse the effect of their software once they received the payments they demanded.

Microsoft patched the “hole” in the newest versions of its operating software — Windows 10 for most home users — in March, three weeks before the stolen NSA exploit software was published on the internet. Since Friday, the company dropped its refusal to update old versions of its programs and issued patches specifically written for use in Windows XP and several other systems.

Microsoft declined a request for an interview, but a statement on the company’s blog said: “Seeing businesses and individuals affected by cyberattacks, such as the ones reported today, was painful. We are taking the highly unusual step of providing a security update for all customers to protect Windows platforms that are in custom support only, including Windows XP, Windows 8, and Windows Server 2003.”

“A lot of people in the security community were impressed with Microsoft’s speed, but it highlights an ongoing challenge we have,” said Stephen Cobb, a senior security researcher with ESET, a global security software company. “If a malicious code outbreak breaks out tomorrow, and targets unsupported operating systems, Microsoft may have to go there again.”

more

‘Perfect Storm’ of Conditions Helped Cyberattack Succeed

The cyberextortion attack hitting dozens of countries spread quickly and widely thanks to an unusual confluence of factors: a known and highly dangerous security hole in Microsoft Windows, tardy users who didn’t apply Microsoft’s March software fix, and a software design that allowed the malware to spread quickly once inside university, business and government networks.

Not to mention the fact that those responsible were able to borrow weaponized software code apparently created by the U.S. National Security Agency to launch the attack in the first place.

Other criminals may be tempted to mimic the success of Friday’s “ransomware” attack, which locks up computers and hold people’s files for ransom. Experts say it will be difficult for them to replicate the conditions that allowed the so-called WannaCry ransomware to proliferate across the globe.

But we’re still likely to be living with less virulent variants of WannaCry for some time. And that’s for a simple reason: Individuals and organizations alike are fundamentally terrible about keeping their computers up-to-date with security fixes.

The worm

One of the first “attacks” on the internet came in 1988, when a graduate student named Robert Morris Jr. released a self-replicating and self-propagating program known as a “worm” onto the then-nascent internet. That program spread much more quickly than expected, soon choking and crashing machines across the internet.

The Morris worm wasn’t malicious, but other nastier variants followed — at first for annoyance, later for criminal purposes, such as stealing passwords. But these worm attacks became harder to pull off as computer owners and software makers shored up their defenses.

So criminals turned to targeted attacks instead to stay below the radar. With ransomware, criminals typically trick individuals into opening an email attachment containing malicious software. Once installed, the malware just locks up that computer without spreading to other machines.

The hackers behind WannaCry took things a step further by creating a ransomware worm, allowing them to demand ransom payments not just from individual but from entire organizations — maybe even thousands of organizations.

Perfect storm

Once inside an organization, WannaCry uses a Windows vulnerability purportedly identified by the NSA and later leaked to the internet. Although Microsoft released fixes in March, the attackers counted on many organizations not getting around to applying those fixes. Sure enough, WannaCry found plenty of targets.

Since security professionals typically focus on building walls to block hackers from entering, security tends to be less rigorous inside the network. WannaCry exploited common techniques employees use to share files via a central server.

“Malware that penetrates the perimeter and then spreads inside the network tends to be quite successful,” said Johannes Ullrich, director of the Internet Storm Center at the SANS Institute.

Persistent infections

“When any technique is shown to be effective, there are almost always copycats,” said Steve Grobman, chief technology officer of McAfee, a security company in Santa Clara, California. But that’s complicated, because hackers need to find security flaws that are unknown, widespread and relatively easy to exploit.

In this case, he said, the NSA apparently handed the WannaCry makers a blueprint — pre-written code for exploiting the flaw, allowing the attackers to essentially cut and paste that code into their own malware.

Mikko Hypponen, chief research officer at the Helsinki-based cybersecurity company F-Secure, said ransomware attacks like WannaCry are “not going to be the norm.” But they could still linger as low-grade infections that flare up from time to time.

For instance, the Conficker virus, which first appeared in 2008 and can disable system security features, also spreads through vulnerabilities in internal file sharing. As makers of anti-virus software release updates to block it, hackers deploy new variants to evade detection.

Conficker was more of a pest and didn’t do major damage. WannaCry, on the other hand, threatens to permanently lock away user files if the computer owner doesn’t pay a ransom, which starts at $300 but goes up after two hours.

The damage might have been temporarily contained. An unidentified young cybersecurity researcher claimed to help halt WannaCry’s spread by activating a so-called “kill switch.” Other experts found his claim credible. But attackers can, and probably will, simply develop a variant to bypass this countermeasure.

Fighting back

The attack is likely to prompt more organizations to apply the security fixes that would prevent the malware from spreading automatically. “Talk about a wake-up call,” Hypponen said.

Companies are often slow to apply these fixes, called patches, because of worries that any software change could break some other program, possibly shutting down critical operations.

“Whenever there is a new patch, there is a risk in applying the patch and a risk in not applying the patch,” Grobman said. “Part of what an organization needs to understand and assess is what those two risks are.”

Friday’s attack might prompt companies to reassess the balance. And while other attackers might use the same flaw, such attacks will be steadily less successful as organizations patch it.

Microsoft took the unusual step late Friday of making free patches available for older Windows systems, such as Windows XP from 2001. Before, Microsoft had made such fixes available only to mostly larger organizations that pay extra for extended support, yet millions of individuals and smaller businesses still had such systems.

But there will be other vulnerabilities to come, and not all of them will have fixes for older systems. And those fixes will do nothing for newer systems if they aren’t installed.

more

Insecurity Creates Challenges for HIV Treatment in Southeast C.A.R.

Violence in the southeastern part of the Central African Republic, where five U.N. peacekeepers were killed this month, has made it tougher for HIV-positive residents in the remote, lawless region to get treatment.

The prevalence rate of HIV in southeastern C.A.R. is 13 percent, nearly three times the national average.

The migration of people between the bordering areas of South Sudan and the Democratic Republic of the Congo contributes to the spread of the disease in all three countries.

“Here, it’s a crossing where everything converges. It’s why the level of HIV is high,” said Bienvenu Sapioko, a government nurse who works at the only hospital in Zemio. He said the rebels and refugees in the area also increase the high prevalence.   

An internal U.N. report obtained by VOA found HIV rates increased following the arrival of the Ugandan security forces in the C.A.R. in 2009. The Ugandan and American forces tasked with tracking down Joseph Kony and his Lord’s Resistance Army ended their mission in April and are heading home.

With prostitution, polygamy and effectively no state authority in the area, weak education contributes to the problem.  

Stigma, superstition

“People believe in the power of nature and traditional doctors. So bush doctors, shamans are also very common in the community,” said Olivier Pennec, the Doctors Without Borders project coordinator in Zemio.

Stigma compounds the problem.

“Before, the people didn’t treat themselves. The people would hide the microbes, this disease,” said Marcel Elonga, a community leader. They would hide and “speak about this parasite, parasite, parasite.”

HIV-positive people in local communities can also find themselves shunned by their peers.

“They don’t want him in the community,” community leader Pierre Yakanza said, describing how some people here see an HIV-positive person. “They don’t want to be close to him. ‘Leave him over there. We don’t want to associate with him or have him in the community meetings or give him a job.’ He’s rejected.”

Local health workers spread information about safe sex, but even access to condoms remains a challenge.

Treatment available

More than 1,500 people now come to Zemio’s hospital from nearby and as far away as Uganda, South Sudan and the Democratic Republic of the Congo for the free HIV treatment offered by Doctors without Borders.

Hospital officials said previously one person would die every month or so from the disease, but they haven’t registered a death since 2014.  

In 2012, Agnes Davouragouni said she used to be sick all the time.  

“When I did the test and found out I was positive, my husband said he doesn’t have HIV, so he left me the same day,” said the 35-year-old woman, who now lives alone with her three children, selling wood and charcoal to get by.

Once a year, Davouragouni walks 45 kilometers to Zemio over the course of two days in order to get a checkup as part of her treatment.  She walks mostly at night and sleeps under a tree along the way.   

“The roads are very insecure. I don’t have a motorcycle or the money to pay to get here,” she said. “There’s a lot of fear to travel on these roads.”

Bandits and rebel groups, including the remnants of the Lord’s Resistance Army, all move around the area. The security void will worsen with the departure of Ugandan and American forces in the next few months.

Group efforts

Recognizing the challenges of getting medication, Doctors Without Borders developed a new community approach in which HIV-positive patients work in groups to bring back antiretroviral drugs in bulk every six months, reducing travel time, costs and exposure to risk.

Farmer Moïse Ouele picks up the antiretroviral drugs for his group of about 30 people and drives them  two hours down the road to his village Kitesa, about 50 kilometers away.

“It was really tiring for me to come each month to the hospital,” Ouele said. “But now, this program helps a lot with this problem, despite the insecurity of the LRA that is growing.”

Doctors Without Borders is transitioning out of the area at the end of the year and is handing over the administration of the program to the Ministry of Health.

more

Italy, Portugal Eyed as Favorites as Ukraine Hosts Eurovision Final

The Ukrainian capital, Kyiv, is bracing to host the finale of the 2017 Eurovision Song Contest, the annual europop song fest that is expected to garner a television audience of some 200 million.

more

Mnuchin Says G-7 Nations More Comfortable With New US Economic Approach

U.S. Treasury Secretary Steven Mnuchin said Saturday after meeting with officials from the world’s other industrialized democracies that he thought they were more at ease with Donald Trump’s economic policies.

“People are more comfortable today, now that they’ve had the opportunity to spend time with me and listen to the president and hear our economic message,” Mnuchin said after a two-day meeting in Bari, Italy, with members of the Group of Seven, industrialized nations commonly known as the G-7.

Officials from the G-7 countries hoped to learn more about the U.S. president’s plans, which they feared would revive protectionist policies and result in a global regression on issues such as banking reform and climate change.

After the meeting, officials from Japan and member European countries remained concerned about the economic shift in Washington, particularly after Mnuchin said the U.S. reserved the right to be protectionist if it thought trade was not free or fair.

“All the six others … said explicitly, and some very directly, to the representatives of the U.S. administration that it is absolutely necessary to continue with the same spirit of international cooperation,” said French Finance Minister Michel Sapin.

Don’t ‘backpedal’ on free trade

Bank of France Governor Francois Villeroy de Galhau said continued uncertainty about U.S. policy could dampen optimism within the G-7 about the global economy’s gradual recovery from the financial crisis that began nearly a decade ago.

De Galhau echoed the sentiments of Japanese Finance Minister Taro Aso, who said, “We must not backpedal on free trade, as it has contributed to economic prosperity.”

European officials complained that the U.S. meaning of “fair trade” remained unclear and that the only way to establish fairness was to abide by the multilateral framework developed by the World Trade Organization.

A senior Japanese Finance Ministry official said the most significant question pertained to Trump’s U.S. tax cut proposal that could fuel America’s economic recovery.

Trump has proposed slashing the U.S. corporate income tax rate and offer multinational businesses a steep tax break on overseas profits brought back to the U.S.

The G-7 is composed of Britain, Canada, France, Germany, Italy, Japan and the U.S.

more

Fact Check: This News Is Not Real

A roundup of some of the most popular, but completely untrue, headlines of the week. None of these stories are legit, even though they were shared widely on social media. AP checked these out; here are the real facts:

 

NOT REAL: U.S. Department of State suspends New York Times license 

THE FACTS: The account claiming the State Department suspended the newspaper’s operational permit after it criticized Philippine President Rodrigo Duterte is “completely false,” Times spokeswoman Danielle Rhoades Ha says. There is no permit required for U.S. news organizations and there is no issue with the newspaper’s foreign press credentials, she said. A website made up to look like a CNN outlet says in a story published last month that the State Department accused The Times of “breaking communication code of ethics” in a matter that could cause diplomatic challenges between the two countries.

 

NOT REAL: Sarah Palin out of her coma, able to identify her attackers

 

THE FACTS: More than half a dozen sites have run the same verbatim account of a hit-and-run accident on California’s Pacific Coast Highway involving the former Alaska governor, followed up by stories alleging Palin emerged from her coma to identify her assailants. A spokesman for Palin tells the AP the reports are “as fake as fake can be.” The sites report that the accident happened April 28, when Palin’s Twitter and Facebook accounts were active. The 2008 Republican vice presidential candidate has been a target of hoax articles in the past.

 

NOT REAL: Hobby Lobby just announced plan to close ALL stores

 

THE FACTS: The arts and crafts retail chain has 700-plus stores and says it’s adding 60 more in 2017. A story published by Daily Info News, The Washington Feed and other outlets said the chain’s CEO said it could go out of business if it pays fines for violating a mandate under the Affordable Care Act to provide employees access to emergency contraception. Hobby Lobby won an exemption from the law based on religious preferences in a 2014 Supreme Court decision.

 

NOT REAL: 2 moms, 5 kids killed in car crash in (insert place here)

 

THE FACTS: Multiple websites have appropriated many details from a true account of a June 2016 minivan accident in Southern California that killed two mothers and four children while two fathers survived. The stories circulating with dozens of different headlines change the U.S. county where it occurred, and in some cases add the fathers’ names and varying ages of the children.

 

NOT REAL: Robertson: David Bowie is not dead, he was kidnapped by demons summoned by rock music

 

THE FACTS: This account first published by politicops.com last year and recently recycled by admitted hoax site uspoln.com began with an accurate answer by “700 Club” host Pat Robertson to a teenager’s written question on whether it was OK to listen to rock music. Robertson replied that some rock wasn’t “all that bad,” but some “is just evil.” A spokesman for Robertson’s Christian Broadcasting Network tells the AP that the evangelist made no mention of Bowie, who died Jan. 10, 2016. 

more

Global Cyberattack in Brief: Ransomware Attack, How Does It Work, How to Prevent It

In what is believed to be the largest attack of its kind ever recorded, a cyberextortion attack struck in dozens of countries Friday, locking up computers and holding users’ files for ransom at dozens of hospitals, companies and government agencies.

Massive Cyberattack Hits Organizations Around Globe — An aggressive wave of cyberattacks has hit companies and public institutions around the globe, causing international havoc and bringing many services to a standstill. The cyberextortion attempt appeared to use stolen software developed by a U.S. spy agency.

What You Need to Know About Ransomware — What is ransomware? How does it infect your computer? How is the U.S. government’s National Security Agency involved? How to keep your computer safe.

Global Cyberattack Fuels Concern About US Vulnerability Disclosures — A global cyberattack on Friday renewed concerns about whether the U.S. National Security Agency and other countries’ intelligence services too often horde software vulnerabilities for offensive purposes, rather than quickly alerting technology companies to such flaws.

Companies Affected by Global Cyber Attack — A global cyber attack on Friday affected British hospitals, government agencies and companies, such as FedEx Corp., Telefonica SA, Portugal Telecom and Telefonica Argentina, in 99 countries, with Russia, Ukraine and Taiwan the top targets.

Don’t Click: What Is the ‘Ransomware’ WannaCry Worm? — What is so special about WannaCry?

more

Don’t Click: What Is the ‘Ransomware’ WannaCry Worm?

Malicious software called “ransomware” has forced British hospitals to turn away patients and affected Spanish companies such as Telefonica as part of a global outbreak that has affected tens of thousands of computers.

How does it work?

WannaCry — also known as WanaCrypt0r 2.0, WannaCry and WCry — is a form of “ransomware” that locks up the files on your computer and encrypts them in a way that you cannot access them anymore.

How does it spread?

Ransomware is a program that gets into your computer, either by clicking on the wrong thing or downloading the wrong thing, and then it holds something you need to ransom.

In the case of WannaCry, the program encrypts your files and demands payment in bitcoin in order to regain access.

Security experts warn there is no guarantee that access will be granted after payment. Some ransomware that encrypts files ups the stakes after a few days, demanding more money and threatening to delete files altogether.

There are different variants of what happens: Other forms of ransomware execute programs that can lock your computer entirely, only showing a message to make payment in order to log in again. There are some that create pop-ups that are difficult or impossible to close, rendering the machine difficult or impossible to use.

Where has it spread?

British-based cyber researcher Chris Doman of AlienVault said the ransomware “looks to be targeting a wide range of countries,” with initial evidence of infections in at least two dozen nations, according to experts from three security firms.

The broad-based ransomware attack has appeared in at least eight Asian nations, a dozen countries in Europe, Turkey and the United Arab Emirates and Argentina, and appears to be sweeping around the globe, researchers said.

What is so special about WannaCry?

WannaCry is not just a ransomware program, it is also a worm.

This means that it gets into your computer and looks for other computers to try and spread itself as far and wide as possible.

Ransomware has a habit of mutating, so it changes over time in order to find different ways to access computers or to get around patches (operating system updates that often include security updates). Many security firms are already aware of WannaCry in past forms and most are looking at this one right now to see how it might be stopped.

Several cybersecurity firms said WannaCry exploits a vulnerability in Microsoft and that Microsoft patched this in March. People don’t always install updates and patches on their computers, and so this means vulnerabilities can remain open a lot longer and make things easier for hackers to get in.

It exploited a vulnerability in the Windows operating system believed to have been developed by the National Security Agency, which became public last month. It was among a large number of hacking tools and other files that a group known as the Shadow Brokers released on the internet. Shadow Brokers said that they obtained it from a secret NSA server.

The identity of Shadow Brokers is unknown, though many security experts believe the group that surfaced in 2016 is linked to the Russian government.

The NSA and Microsoft did not immediately respond to requests for comment.

more

Store Allows Customers to Play Guitars Even if They Don’t Buy Them

Across the U.S., there are stores where people can play a musical instrument even if they have no intention of buying it. VOA’s Yahya Albarzinji spoke with music enthusiasts at one such store in the Washington suburb of Fairfax, Virginia.

more

Cheap Drug Could Cut Maternal Deaths in Childbirth by a Third

Postpartum hemorrhaging is the leading cause of maternal deaths. An estimated 127,000 women bleed to death after giving birth. But there are hopeful signs that a widely available drug could save a third of those who hemorrhage after birth. VOA’s Kevin Enochs reports.

more

Is Human Behavior Impeding Self-Driving Cars?

Most technology experts agree that self-driving cars will soon finish the testing phase and enter the commercial market, probably as taxis and delivery vehicles. But some of them wonder if the cars’ artificial brains will be able to cope with the human propensity to bend the traffic rules. VOA’s George Putic reports.

more

What You Need to Know About Ransomware

An aggressive wave of cyberattacks hit companies and public institutions around the globe Friday, causing international havoc and bringing many services to a standstill. Computers were locked up and users’ files held for ransom when dozens of countries were hit in a cyberextortion attack that targeted hospitals, companies and government agencies.

What is ransomware?

Ransomware is a type of malware that attempts to extort a computer user for money. In some cases, the ransomware encrypts certain files and holds them hostage. In other cases, as happened Friday, it locks a user out of their entire computer system until a ransom is paid. Some ransomware that encrypts files increases the stakes after a few days, demanding more money and threatening to delete files altogether.

Steps of ransomware infection

A ransomware infection usually takes these five steps.

1. The user downloads malware from an infected website or email.

2. The initial malware hijacks the user’s browser and redirects it to a malicious site.

3. Part of the malware, called an exploit kit, looks for vulnerabilities in the user’s system.

4. Once a vulnerability is found, a malicious payload is downloaded onto the victim’s computer.

5. Then the malware calls home with sensitive data from the user’s computer. In the case of ransomware, the malware attempts to extort the user for money.

The ransomware program that spread Friday is not just malware, it is also a worm. This means that the malware gets into a computer and looks for other computers to try and spread itself as far as possible.

Do ransomware attacks generate money for the hackers?

Yes, they can. A hospital system in Los Angeles paid about $17,000 earlier this year following an attack that blocked hospital employees from using email and other forms of electronic communication by using encryption to lock them out of the system. The hackers even set up a help line to answer questions about paying the ransom.

Security industry experts say such attacks are becoming more prevalent, but are rarely made public.

How is the NSA involved?

The hackers appear to have used a technique that was discovered by the National Security Agency and was leaked online in April by a group calling itself the Shadow Brokers.

The malware is exploiting a flaw in Microsoft software. Microsoft created a patch to fix the flaw earlier this year, but not all businesses have updated their operating systems.

Who carried out the attack?

Investigators are pursuing information, but have not said if they have any strong leads. Officials say they believe the attack is the work of criminals and not a foreign government. The original hacking tool was apparently stolen from the NSA and leaked online by the Shadow Brokers, but officials do not know who that group is or whether they carried out this attack.

How to keep your computer safe

Microsoft released a patch in March that fixes the specific vulnerability exploited in this attack. The U.S. Department of Homeland Security is urging people to take three steps.

1. Update your systems to include the latest patches.

2. Do not click on or download unfamiliar links or files in emails.

3. Back up your data to prevent possible loss.

more

Companies Affected by Global Cyber Attack

A global cyber attack on Friday affected British hospitals, government agencies and companies in 99 countries, with Russia, Ukraine and Taiwan the top targets, security software maker Avast said.

Hacking tools widely believed by researchers to have been developed by the U.S. National Security Agency that were leaked online last month appear to have been leveraged to launch the attacks.

Around 1,000 computers at the Russian Interior Ministry were affected by the cyber attack, a spokeswoman for the ministry told Interfax.

Some of the companies affected:

FedEx Corp

Telefonica SA

Portugal Telecom

Telefonica Argentina

more

Ideological Divide Over Abortion Again Affects US Foreign Aid

Among the first executive actions at the White House this year, President Donald Trump reinstated a law that bans any U.S. aid to international organizations that support the practice of abortion.

Trump’s memorandum on the “Mexico City policy” reversed one aspect of U.S. foreign aid policy that had been in effect under former President Barack Obama. It changed the way U.S. financial assistance is distributed internationally, and most likely will affect the lives of many women in developing countries.

The “Mexico City policy” dates to 1984, when then-President Ronald Reagan declared it at a population conference in the Mexican capital. Opponents call the U.S. prohibition on aid to groups that perform or actively promote abortion as a method of family planning a “global gag rule.”

U.S. foreign aid practices have switched back and forth several times since 1984; aid was barred to pro-abortion-rights groups whenever a Republican president was in power, then was reinstated when a Democrat controlled the White House.

WATCH: Reaction to Trump’s ‘Global Gag Rule’

Abortion stance affects aid

The political divide between the two major U.S. political parties is based on a fundamental issue: Republicans consider abortion an assault on human life, and most pledge to resist it in every way possible; Democrats say a woman should have the right to choose whether to terminate a pregnancy, for financial or personal reasons, and that the decision should not be directed by government.

The deep ideological divide over abortion affects many aspects of American politics, and certainly permeates considerations about U.S. foreign aid.

“The guiding principle for our policy,” said Melissa Israel of the conservative Heritage Foundation, “really needs to be rooted in the respect for the most important fundamental human right of all, and that’s the right to life.”

Restoring the “Mexico City policy” was expected when a Republican administration took over this year, following eight years of Democratic control of the White House. What was not expected was how vigorously Trump would expand the scope of the anti-abortion rule.

Trump policy affects $9.5 billion

He broadened the policy to affect about $9.5 billion in U.S. global health aid, said Amanda Klasing of Human Rights Watch — funds that would have been destined for programs to combat HIV/AIDS, to promote maternal and child health and to prevent childhood diseases.

Organizations working on AIDS, malaria, or maternal and child health will have to make sure that none of their programs involves so much as an abortion referral.

The Heritage Foundation’s Israel disagrees with the notion that Trump’s action has greatly expanded the effect of Republicans’ anti-abortion principles.

“We are not cutting funding for family planning services or for women’s health,” she said. “We are saying that if you want to partner with the United States, then there are some fundamental things you have to agree to as a condition to receiving these funds.”

Ban on abortion information, too  

Not-for-profit groups hoping to get U.S. funds to support their work around the world must not perform abortions or provide any information about them, even if they use their own funds, from nongovernment sources, for abortion services.

Opponents say this will have a chilling effect on women’s health.

“It means,” said Klasing of Human Rights Watch, “that when a doctor sits down with a woman, if she has a health complication and she’s entitled under her local law to access a safe abortion, that doctor cannot give her a referral, or provide her information she needs to take care of herself.”

In rural areas of developing countries, a physician often takes care of a variety of medical needs, including providing information about reproductive health. Such medical practices would be proscribed from receiving any U.S. assistance. Advocates cite research that has shown family planning services result in fewer unplanned pregnancies, fewer maternal deaths and fewer abortions.

56 million abortions worldwide each year

The World Health Organization estimates that approximately 56 million abortions take place every year worldwide. More than half of those are in developing countries.

“Trump’s global gag rule will have a direct and devastating effect in Kenya and sub-Saharan Africa in several ways,” said Liza Muringo Kimbo, the director in Kenya for Ipas Africa Alliance, a nonprofit group whose principal goal is advocating for safe abortion and reforming laws that harm women.

The current U.S. policy “will lead to more unwanted pregnancies,” Muringo Kimbo said. “It will lead to more unsafe abortions, increased deaths of women and young women, and even increased numbers of newborn deaths.”

Muringo Kimbo noted that her predictions have been borne out in the past, whenever a Republican administration in Washington reinstated the “Mexico City policy.”

Other countries have begun their own initiatives to counter the impact of U.S. anti-abortion policies. The Dutch have created the “She Decides Initiative,” and in Britain, an upcoming conference, “Family Planning 2020,” will try to bring together donor and recipient countries.

more

Michelle Obama Criticizes Trump School Lunch Directives

Former U.S. first lady Michelle Obama has criticized the new Trump administration’s directives on school lunches during her first high-profile public appearance since leaving the White House.

Obama, who led a nationwide effort to reduce childhood obesity while first lady, told an annual health conference Friday in Washington that more nutritious school lunches are important because millions of children receive federally subsidized meals at school.

The Trump administration recently said it would delay federal rules promoted by Obama aimed at trying to make school lunches healthier.

Without mentioning the Trump administration by name, Obama urged parents to think about the new government directives and the motives behind them.

“I don’t care what state you live in, take me out of the equation — like me, don’t like me — but think about why someone is OK with your kids eating crap. Why would you celebrate that?” she said during the keynote speech.

She said healthier school lunches should not be a political issue.

“You have to stop and think, ‘Why don’t you want our kids to have good food at school?’ What is wrong with you? And why is that a partisan issue? Why would that be political? What is going on?’ ” she asked.

In one of his first major actions, Sonny Perdue, Trump’s new agriculture secretary, said the department will delay some school lunch rules, including reducing sodium in the meals and increasing whole wheat.

“If kids aren’t eating the food and it’s ending up in the trash, they aren’t getting any nutrition … undermining the intent of the program,” Perdue said earlier this month. The secretary said he appreciates what Obama wanted to do, but he said his department wants to adjust the program to make the healthier food more appetizing.

Under the 2012 Healthy Hunger-Free Kids Act, schools that wanted federal meal subsidies would have to put limits on salt and fat in lunches, and add more fruit, vegetables and whole grains to the menus.

Health experts say U.S. children do not exercise enough and that one child in six is overweight.

more