RSN Fundraising Banner
FB Share
Email This Page
add comment
Politics
The Snowden Saga Begins Print
Wednesday, 14 May 2014 09:33

Greenwald writes: "Not since Daniel Ellsberg leaked the Pentagon Papers during the Vietnam War has a trove of documents revealing the inner workings and thinking of the U.S. government so changed the conversation."

Journalist Glenn Greenwald’s new book, “No Place to Hide: Edward Snowden, the NSA and the U.S. Surveillance State,” was released yesterday. (photo: CBC)
Journalist Glenn Greenwald’s new book, “No Place to Hide: Edward Snowden, the NSA and the U.S. Surveillance State,” was released yesterday. (photo: CBC)


The Snowden Saga Begins

By Glenn Greenwald, TomDispatch

14 May 14

 

n December 1, 2012, I received my first communication from Edward Snowden, although I had no idea at the time that it was from him.

The contact came in the form of an email from someone calling himself Cincinnatus, a reference to Lucius Quinctius Cincinnatus, the Roman farmer who, in the fifth century BC, was appointed dictator of Rome to defend the city against attack. He is most remembered for what he did after vanquishing Rome’s enemies: he immediately and voluntarily gave up political power and returned to farming life. Hailed as a “model of civic virtue,” Cincinnatus has become a symbol of the use of political power in the public interest and the worth of limiting or even relinquishing individual power for the greater good.

The email began: “The security of people’s communications is very important to me,” and its stated purpose was to urge me to begin using PGP encryption so that “Cincinnatus” could communicate things in which, he said, he was certain I would be interested. Invented in 1991, PGP stands for “pretty good privacy.” It has been developed into a sophisticated tool to shield email and other forms of online communications from surveillance and hacking.

In this email, “Cincinnatus” said he had searched everywhere for my PGP “public key,” a unique code set that allows people to receive encrypted email, but could not find it. From this, he concluded that I was not using the program and told me, “That puts anyone who communicates with you at risk. I’m not arguing that every communication you are involved in be encrypted, but you should at least provide communicants with that option.”

“Cincinnatus” then referenced the sex scandal of General David Petraeus, whose career-ending extramarital affair with journalist Paula Broadwell was discovered when investigators found Google emails between the two. Had Petraeus encrypted his messages before handing them over to Gmail or storing them in his drafts folder, he wrote, investigators would not have been able to read them. “Encryption matters, and it is not just for spies and philanderers.”

“There are people out there you would like to hear from,” he added, “but they will never be able to contact you without knowing their messages cannot be read in transit.” Then he offered to help me install the program. He signed off: “Thank you. C.”

Using encryption software was something I had long intended to do. I had been writing for years about WikiLeaks, whistleblowers, the hacktivist collective known as Anonymous, and had also communicated with people inside the U.S. national security establishment. Most of them are concerned about the security of their communications and preventing unwanted monitoring. But the program is complicated, especially for someone who had very little skill in programming and computers, like me. So it was one of those things I had never gotten around to doing.

C.’s email did not move me to action. Because I had become known for covering stories the rest of the media often ignores, I frequently hear from all sorts of people offering me a “huge story,” and it usually turns out to be nothing. And at any given moment I am usually working on more stories than I can handle. So I need something concrete to make me drop what I’m doing in order to pursue a new lead.

Three days later, I heard from C. again, asking me to confirm receipt of the first email. This time I replied quickly. “I got this and am going to work on it. I don’t have a PGP code, and don’t know how to do that, but I will try to find someone who can help me.”

C. replied later that day with a clear, step-by-step guide to PGP: Encryption for Dummies, in essence. At the end of the instructions, he said these were just “the barest basics.” If I couldn’t find anyone to walk me through the system, he added, “let me know. I can facilitate contact with people who understand crypto almost anywhere in the world.”

This email ended with more a pointed sign-off: “Cryptographically yours, Cincinnatus.”

Despite my intentions, I did nothing, consumed as I was at the time with other stories, and still unconvinced that C. had anything worthwhile to say.

In the face of my inaction, C. stepped up his efforts. He produced a 10-minute video entitled PGP for Journalists.

It was at that point that C., as he later told me, became frustrated. “Here am I,” he thought, “ready to risk my liberty, perhaps even my life, to hand this guy thousands of Top Secret documents from the nation’s most secretive agency -- a leak that will produce dozens if not hundreds of huge journalistic scoops. And he can’t even be bothered to install an encryption program.”

That’s how close I came to blowing off one of the largest and most consequential national security leaks in U.S. history.

“He’s Real”

The next I heard of any of this was 10 weeks later. On April 18th, I flew from my home in Rio de Janeiro to New York, and saw on landing at JFK Airport, that I had an email from Laura Poitras, the documentary filmmaker. “Any chance you’ll be in the U.S. this coming week?” she wrote. “I’d love to touch base about something, though best to do in person.”

I take seriously any message from Laura Poitras. I replied immediately: “Actually, just got to the U.S. this morning... Where are you?” We arranged a meeting for the next day in the lobby at my hotel and found seats in the restaurant. At Laura’s insistence, we moved tables twice before beginning our conversation to be sure that nobody could hear us. Laura then got down to business. She had an “extremely important and sensitive matter” to discuss, she said, and security was critical.

First, though, Laura asked that I either remove the battery from my cell phone or leave it in my hotel room. “It sounds paranoid,” she said, but the government has the capability to activate cell phones and laptops remotely as eavesdropping devices. I’d heard this before from transparency activists and hackers but tended to write it off as excess caution. After discovering that the battery on my cell phone could not be removed, I took it back to my room, then returned to the restaurant.

Now Laura began to talk. She had received a series of anonymous emails from someone who seemed both honest and serious. He claimed to have access to some extremely secret and incriminating documents about the U.S. government spying on its own citizens and on the rest of the world. He was determined to leak these documents to her and had specifically requested that she work with me on releasing and reporting on them.

Laura then pulled several pages out of her purse from two of the emails sent by the anonymous leaker, and I read them at the table from start to finish. In the second of the emails, the leaker got to the crux of what he viewed as his mission:

The shock of this initial period [after the first revelations] will provide the support needed to build a more equal internet, but this will not work to the advantage of the average person unless science outpaces law. By understanding the mechanisms through which our privacy is violated, we can win here. We can guarantee for all people equal protection against unreasonable search through universal laws, but only if the technical community is willing to face the threat and commit to implementing over-engineered solutions. In the end, we must enforce a principle whereby the only way the powerful may enjoy privacy is when it is the same kind shared by the ordinary: one enforced by the laws of nature, rather than the policies of man.

“He’s real,” I said when I finished reading. “I can’t explain exactly why, but I just feel intuitively that this is serious, that he’s exactly who he says he is.”

“So do I,” Laura replied. “I have very little doubt.”

I instinctively recognized the author’s political passion. I felt a kinship with our correspondent, with his worldview, and with the sense of urgency that was clearly consuming him.

In one of the last passages, Laura’s correspondent wrote that he was completing the final steps necessary to provide us with the documents. He needed another four to six weeks, and we should wait to hear from him.

Three days later, Laura and I met again, and with another email from the anonymous leaker, in which he explained why he was willing to risk his liberty, to subject himself to the high likelihood of a very lengthy prison term, in order to disclose these documents. Now I was even more convinced: our source was for real, but as I told my partner, David Miranda, on the flight home to Brazil, I was determined to put the whole thing out of my mind. “It may not happen. He could change his mind. He could get caught.” David is a person of powerful intuition, and he was weirdly certain. “It’s real. He’s real. It’s going to happen,” he declared. “And it’s going to be huge.”

“I Have Only One Fear”

A message from Laura told me we needed to speak urgently, but only through OTR (off-the-record) chat, an encrypted instrument for talking online securely.

Her news was startling: we might have to travel to Hong Kong immediately to meet our source. I had assumed that our anonymous source was in Maryland or northern Virginia. What was someone with access to top-secret U.S. government documents doing in Hong Kong? What did Hong Kong have to do with any of this?

Answers would only come from the source himself. He was upset by the pace of things thus far, and it was critical that I speak to him directly, to assure him and placate his growing concerns. Within an hour, I received an email from Verax@******. Verax means “truth teller” in Latin. The subject line read, “Need to talk.”

“I’ve been working on a major project with a mutual friend of ours,” the email began. “You recently had to decline short-term travel to meet with me. You need to be involved in this story,” he wrote. “Is there any way we can talk on short notice? I understand you don’t have much in the way of secure infrastructure, but I’ll work around what you have.” He suggested that we speak via OTR and provided his user name.

My computer sounded a bell-like chime, signaling that the source had signed on. Slightly nervous, I clicked on his name and typed “hello.” He answered, and I found myself speaking directly to someone who I assumed had, at that point, revealed a number of secret documents about U.S. surveillance programs and who wanted to reveal more.

“I’m willing to do what I have to do to report this,” I said. The source -- whose name, place of employment, age, and all other attributes were still unknown to me -- asked if I would come to Hong Kong to meet him. I did not ask why he was there; I wanted to avoid appearing to be fishing for information and I assumed his situation was delicate. Whatever else was true, I knew that this person had resolved to carry out what the U.S. government would consider a very serious crime.

“Of course I’ll come to Hong Kong,” I said.

We spoke online that day for two hours, talking at length about his goal. I knew from the emails Laura had shown me that he felt compelled to tell the world about the massive spying apparatus the U.S. government was secretly building. But what did he hope to achieve?

“I want to spark a worldwide debate about privacy, Internet freedom, and the dangers of state surveillance,” he said. “I’m not afraid of what will happen to me. I’ve accepted that my life will likely be over from my doing this. I’m at peace with that. I know it’s the right thing to do.” He then said something startling: “I want to identify myself as the person behind these disclosures. I believe I have an obligation to explain why I’m doing this and what I hope to achieve.” He told me he had written a document that he wanted to post on the Internet when he outed himself as the source, a pro-privacy, anti-surveillance manifesto for people around the world to sign, showing that there was global support for protecting privacy.

“I only have one fear in doing all of this,” he said, which is “that people will see these documents and shrug, that they’ll say, ‘We assumed this was happening and don’t care.’ The only thing I’m worried about is that I’ll do all this to my life for nothing.”

“I seriously doubt that will happen,” I assured him, but I wasn’t convinced I really believed that. I knew from my years of writing about NSA abuses that it can be hard to generate serious concern about secret state surveillance.

This felt different, but before I took off for Hong Kong, I wanted to see some documents so that I understood the types of disclosures the source was prepared to make.

I then spent a couple of days online as the source walked me through, step by step, how to install and use the programs I would need to see the documents.

I kept apologizing for my lack of proficiency, for having to take hours of his time to teach me the most basic aspects of secure communication. “No worries,” he said, “most of this makes little sense. And I have a lot of free time right now.”

Once the programs were all in place, I received a file containing roughly twenty-five documents: “Just a very small taste: the tip of the tip of the iceberg,” he tantalizingly explained.

I unzipped the file, saw the list of documents, and randomly clicked on one of them. At the top of the page in red letters, a code appeared: “TOP SECRET//COMINT/NO FORN/.”

This meant the document had been legally designated top secret, pertained to communications intelligence (COMINT), and was not for distribution to foreign nationals, including international organizations or coalition partners (NO FORN). There it was with incontrovertible clarity: a highly confidential communication from the NSA, one of the most secretive agencies in the world’s most powerful government. Nothing of this significance had ever been leaked from the NSA, not in all the six-decade history of the agency. I now had a couple dozen such items in my possession. And the person I had spent hours chatting with over the last two days had many, many more to give me.

As Laura and I arrived at JFK Airport to board a Cathay Pacific flight to Hong Kong, Laura pulled a thumb drive out of her backpack. “Guess what this is?” she asked with a look of intense seriousness.

“What?”

“The documents,” she said. “All of them.”

“README_FIRST”

For the next 16 hours, despite my exhaustion, I did nothing but read, feverishly taking notes on document after document. One of the first I read was an order from the secret Foreign Intelligence Surveillance Act (FISA) court, which had been created by Congress in 1978, after the Church Committee discovered decades of abusive government eavesdropping. The idea behind its formation was that the government could continue to engage in electronic surveillance, but to prevent similar abuse, it had to obtain permission from the FISA court before doing so. I had never seen a FISA court order before. Almost nobody had. The court is one of the most secretive institutions in the government. All of its rulings are automatically designated top secret, and only a small handful of people are authorized to access its decisions.

The ruling I read on the plane to Hong Kong was amazing for several reasons. It ordered Verizon Business to turn over to the NSA “all call detail records” for “communications (i) between the United States and abroad; and (ii) wholly within the United States, including local telephone calls.” That meant the NSA was secretly and indiscriminately collecting the telephone records of tens of millions of Americans, at least. Virtually nobody had any idea that the Obama administration was doing any such thing. Now, with this ruling, I not only knew about it but had the secret court order as proof.

Only now did I feel that I was beginning to process the true magnitude of the leak. I had been writing for years about the threat posed by unconstrained domestic surveillance; my first book, published in 2006, warned of the lawlessness and radicalism of the NSA. But I had struggled against the great wall of secrecy shielding government spying: How do you document the actions of an agency so completely shrouded in multiple layers of official secrecy? At this moment, the wall had been breached. I had in my possession documents that the government had desperately tried to hide. I had evidence that would indisputably prove all that the government had done to destroy the privacy of Americans and people around the world.

In 16 hours of barely interrupted reading, I managed to get through only a small fraction of the archive. But as the plane landed in Hong Kong, I knew two things for certain. First, the source was highly sophisticated and politically astute, evident in his recognition of the significance of most of the documents. He was also highly rational. The way he chose, analyzed, and described the thousands of documents I now had in my possession proved that. Second, it would be very difficult to deny his status as a classic whistleblower. If disclosing proof that top-level national security officials lied outright to Congress about domestic spying programs doesn’t make one indisputably a whistleblower, then what does?

Shortly before landing, I read one final file. Although it was entitled “README_FIRST,” I saw it for the first time only at the very end of the flight. This message was an explanation from the source for why he had chosen to do what he did and what he expected to happen as a result -- and it included one fact that the others did not: the source’s name.

"I understand that I will be made to suffer for my actions, and that the return of this information to the public marks my end. I will be satisfied if the federation of secret law, unequal pardon, and irresistible executive powers that rule the world that I love are revealed for even an instant. If you seek to help, join the open source community and fight to keep the spirit of the press alive and the internet free. I have been to the darkest corners of government, and what they fear is light.

Edward Joseph Snowden, SSN: ***** CIA Alias “***** ” Agency Identification Number: ***** Former Senior Advisor | United States National Security Agency, under corporate cover Former Field Officer | United States Central Intelligence Agency, under diplomatic cover Former Lecturer | United States Defense Intelligence Agency, under corporate cover"
e-max.it: your social media marketing partner
 
New Hope for Middle East Peace Print
Written by <a href="index.php?option=com_comprofiler&task=userProfile&user=30568"><span class="small">Jimmy Carter, The Washington Post</span></a>   
Wednesday, 14 May 2014 09:20

Carter reports: "It is obvious that both Israel and the Palestinians have a vital interest in a two-state solution, based on international law and U.N. resolutions approved by participating nations."

Former president Jimmy Carter listens during the 12th World Summit of Nobel Peace Laureates in Chicago, Illinois, April 23, 2012. (photo: Jeff Haynes/Reuters)
Former president Jimmy Carter listens during the 12th World Summit of Nobel Peace Laureates in Chicago, Illinois, April 23, 2012. (photo: Jeff Haynes/Reuters)


New Hope for Middle East Peace

By Jimmy Carter, The Washington Post

14 May 14

 

Jimmy Carter, 39th president of the United States, is founder of the nonprofit Carter Center.

lthough intensive Middle East peace efforts by Secretary of State John F. Kerry have not produced an agreement, they have clarified the issues and still can produce significant dividends. His team of negotiators now is much more familiar with the complex disputes and obstacles to be overcome, as are the Israelis and Palestinians who have participated in the discussions.

It is obvious that both Israel and the Palestinians have a vital interest in a two-state solution, based on international law and U.N. resolutions approved by participating nations. President Obama has discussed some of these key factors, calling for no more settlements in the occupied territories and an adherence to the pre-1967 borders (with some mutually agreed changes). Previous U.S. presidents have made other substantive proposals on sensitive questions involving mutual security, East Jerusalem and the right of return of Palestinians.

Adhering to these commonly understood international assumptions, Kerry could issue a summary of his conclusions, as a “framework for peace.” It would be helpful to the general public, within the Holy Land and in other nations, and to anyone who makes future efforts for a comprehensive peace.

With the suspension of U.S.-sponsored peace talks on April 29, dangerous unilateral steps are likely to continue. During the previous nine months of negotiation, 14,000 new Israeli settlement units were approved, more than 3,000 Palestinians were arrested and 50 were killed, provoking troubling examples of Palestinian retaliation, including the deaths of three Israelis.

The Palestinians’ plans for the coming months are relatively clear: to form a new unity government and expand involvement in the United Nations. Although condemned by some, the decision by the leaders of the Palestine Liberation Organization and Hamas to reconcile their differences and move toward elections can be a positive development. In the past, similar efforts have been abandoned because of strong opposition from Israel and the United States, but the resolve to succeed is now much stronger among leaders in the West Bank and Gaza. This reconciliation of Palestinian factions and formation of a national unity government is necessary because it would be impossible to implement any peace agreement between Israel and just one portion of the Palestinians.

In order for a united Palestinian Authority to remain viable with recognition of the international community, it will be necessary for all participants to accept the principle of peaceful resolution of differences and to recognize the right of Israel to exist within its pre-1967 borders as modified by mutual agreement.

The decision by Palestinian Authority President Mahmoud Abbas to have Palestine become more deeply involved in the United Nations can also be beneficial. The first 15 treaties the Palestinians decided to accept on April 1 were carefully chosen, being commitments to comply with the four Geneva Conventions of 1949, later protocols of 1977 regarding the laws of war and others related to discrimination against women and the rights of children. These are all idealistic and peaceful in nature and should cause no concern in Israel or Washington. All Palestinian factions within a unity government will have to accept these restraints.

Palestinians are poised to join other U.N. organizations that involve labor, health, tourism, agriculture, international property rights and justice. The organizations of most interest and importance are the International Court of Justice and the International Criminal Court, within which the divisive legal issues regarding activities in the West Bank, Jerusalem and Gaza might be more forcefully addressed than in the past. Joining these two courts may be the last actions to be taken by the PLO, since the United States and Israel would have strong negative reactions and Palestinians might be held to account for their violations of human rights or international law.

Kerry has mentioned the need for better realities on the ground or new leadership as requisites for progress. A united Palestinian government with wider international recognition, newly elected leaders and assured financial support from the Arab world may provide an opportunity for a new round of peace talks, permitting Israel finally to live in peace with its neighbors. The international community should take advantage of these opportunities.

e-max.it: your social media marketing partner
 
Bank on Students Print
Written by <a href="index.php?option=com_comprofiler&task=userProfile&user=7122"><span class="small">Elizabeth Warren, Reader Supported News</span></a>   
Tuesday, 13 May 2014 15:13

Warren writes: "Last year, we fought to lower the interest rates on student loans - and nearly all the Republicans in Washington agreed with us that rates were far too high. So Congress lowered the rates for new borrowers this year - not as much as we would have liked, but some. But Congress did nothing for the millions of people stuck with older high interest rate loans."

Sen. Elizabeth Warren (D-Mass). (photo: AP)
Sen. Elizabeth Warren (D-Mass). (photo: AP)


Bank on Students

By Elizabeth Warren, Reader Supported News

13 May 14

 

ast year, we fought to lower the interest rates on student loans – and nearly all the Republicans in Washington agreed with us that rates were far too high.

So Congress lowered the rates for new borrowers this year – not as much as we would have liked, but some. But Congress did nothing for the millions of people stuck with older high interest rate loans.

Today, I'm introducing the Bank on Students Emergency Loan Refinancing Act, and the idea is so popular that it already has 23 co-sponsors. The bill lets qualified borrowers refinance their existing student loan debt to the same lower prices that Congress agreed upon for new students this year.

Sign up now to show your support for the Bank on Students Emergency Loan Refinancing Act.

Student loan debt is exploding. Outstanding student loans now total more than $1.2 trillion – and each year, students are taking on more and more and more. In 2012, an astonishing 71% of college seniors owed student loans, and, from 2004 to 2012, the average student loan balance increased by 70%.

Now, millions of young people are struggling to keep up with their student loan payments. Everywhere I go, I meet young people who worked hard, played by the rules, and got an education – only to be crushed with student loan debt.

The economic impact is real. Federal watchdog agencies like the Federal Reserve, the Treasury Department, and the Consumer Financial Protection Bureau are already sounding the alarm. Every day, this exploding debt stops more and more young people from moving out of their parents' homes, from saving for a down payment, buying homes, buying cars, starting small businesses, saving for retirement, or making purchases that grow our economy.

Forty million Americans have outstanding student loans. The Bank on Students Emergency Loan Refinancing Act will save millions of these young people hundreds or even thousands of dollars a year, putting real money back into their pockets. The sooner we pass refinancing legislation, the sooner they'll get a little bit of relief.

e-max.it: your social media marketing partner
 
The Federalist Impeachment Party Print
Tuesday, 13 May 2014 15:04

Toobin writes: "Want to know what's on the mind of conservative lawyers in Washington? It's the impeachment of Barack Obama. That was the message of the Federalist Society's second annual Executive Branch Review Conference, last week."

The Federalist Society is out to impeach the President. (photo: AP)
The Federalist Society is out to impeach the President. (photo: AP)


The Federalist Impeachment Party

By Jeffrey Toobin, The New Yorker

13 May 14

 

ant to know what’s on the mind of conservative lawyers in Washington? It’s the impeachment of Barack Obama.

That was the message of the Federalist Society’s second annual Executive Branch Review Conference, last week. The purpose of the conclave was to examine whether regulatory actions by the Obama Administration “constitute a form of legal and regulatory overreach.” The answer: You bet. (Apparently, given the timing of these conferences, there was never a need to study whether the Bush Administration engaged in any “overreach.”)

To many liberals, the Federalist Society is like a shadowy cabal out of “The Da Vinci Code.” In truth, the Federalist Society for Law and Public Policy, which was founded in the early nineteen-eighties, is basically a platform for the discussion of conservative ideas. True, it’s been a productive network for filling jobs in Republican Administrations, but there’s nothing sinister about that. The group’s meetings are open, video recordings of them are posted on the Web, and, most important, the Federalists invariably invite progressives to participate in their panels. As a result, Federalist conferences feature high-level intellectual combat of a kind rarely seen in the sound-bite-driven capital.

Federalist meetings are a good way to take the temperature of the intellectual side of the conservative movement—last week, it was fevered. In his opening remarks, Tom Cotton, an Arkansas congressman who is running for the Senate, inveighed against the “anti-constitutional excesses” of Barack Obama, whom he characterized as “opposed to and hostile to the Constitution.”

Cotton laid out a bill of particulars against Obama that was elaborated upon in the discussions that followed. The highlights included:

  • Obama’s abuse of recess appointments. (All recent Presidents have made recess appointments, and the limit of Obama’s recess power is before the Supreme Court, in the Noel Canning case.)

  • Obama’s failure to defend the constitutionality of the Defense of Marriage Act in court. (Last year, in the case of United States v. Windsor, the Supreme Court declared the law unconstitutional.)

  • Obama’s failure to deport immigrants “who claim to have been minors” when they were brought into the United States. (Obama took this action in response to Congress’s failure to pass the DREAM Act.)

Many other complaints about Obama related to his signature accomplishment, Obamacare. Cotton and other speakers repeatedly expressed regret that the Supreme Court had upheld the heart of the Affordable Care Act, insisted that the law was a disaster, and complained (accurately) that the Administration had repeatedly delayed implementation and deferred deadlines on the law. (The complaints about the delays recalled the old joke about a bad restaurant: “The food is terrible and the portions are so small!”) The supposed targeting of conservative groups by the Internal Revenue Service, as well as the alleged regulatory excesses of the Consumer Financial Protection Board, were also frequently invoked.

These are legitimate issues of contention between Obama and his adversaries, but what was so striking about the Federalist event was its legally accusatory nature. These were not policy differences but violations of law—or, as several speakers put it, high crimes and misdemeanors.

The most prominent speaker to make this case was Charles Cooper, a longtime stalwart of the Federalist Society who is best known today for defending Proposition 8, California’s anti-same-sex-marriage legislation. Recently, after his stepdaughter announced plans to marry her girlfriend, Cooper said that his own views on same-sex marriage were “evolving.” Clearly, though, Cooper’s views are not evolving on Obama. “Our system of checks and balances has been no match for President Obama,” Cooper said. “He has violated his oath of office comprehensively. He has done what the Constitution forbids him to do, and he has not done that which the Constitution requires him to do.” According to Cooper, the real issue to address was impeachment: “The threshold question is whether President Obama’s serial violations of separations of powers satisfies the constitutional standard for impeachment. Has he committed … ‘high crimes and misdemeanors’? I believe there is little doubt that he has.”

None of this means that there’s any reasonable chance of President Obama’s being impeached, or even that a serious effort to that end will be undertaken in Congress. (Cooper himself told me that he does not support an impeachment drive—yet.) Still, the impeachment talk presents yet another illustration of the conservative movement’s radicalization. Once, it was only Tea Party zealots (and birther lunatics) who talked about Obama’s illegitimacy. Now it’s the grownups in the Federalist Society.

The last Republican impeachment of a Democratic President, that of Bill Clinton, in 1998—currently getting a new wave of attention thanks to Hillary Clinton’s possible candidacy and Monica Lewinsky’s reëmergence—was a politically driven improbability, too. It was also a political disaster for the G.O.P. But that dismal precedent alone will not prevent Obama’s opponents from proceeding. Where the Federalists lead, Republicans follow.

e-max.it: your social media marketing partner
 
FOCUS | How the Right Wing Is Killing Women Print
Tuesday, 13 May 2014 11:39

Reich writes: "For every 100,000 births in America last year, 18.5 women died. That's compared to 8.2 women who died during pregnancy and birth in Canada, 6.1 in Britain, and only 2.4 in Iceland. A woman giving birth in America is more than twice as likely to die as a woman in Saudi Arabia or China."

Former U.S. Secretary of Labor Robert Reich. (photo: RADiUS-TWC)
Former U.S. Secretary of Labor Robert Reich. (photo: RADiUS-TWC)


How the Right Wing Is Killing Women

By Robert Reich, Robert Reich's Blog

13 May 14

 

ccording to a report released last week in the widely-respected health research journal, The Lancet, the United States now ranks 60th out of 180 countries on maternal deaths occurring during pregnancy and childbirth.

To put it bluntly, for every 100,000 births in America last year, 18.5 women died. That’s compared to 8.2 women who died during pregnancy and birth in Canada, 6.1 in Britain, and only 2.4 in Iceland.

A woman giving birth in America is more than twice as likely to die as a woman in Saudi Arabia or China.

You might say international comparisons should be taken with a grain of salt because of difficulties of getting accurate measurements across nations. Maybe China hides the true extent of its maternal deaths. But Canada and Britain?

Even if you’re still skeptical, consider that our rate of maternal death is heading in the wrong direction. It’s risen over the past decade and is now nearly the highest in a quarter century.

In 1990, the maternal mortality rate in America was 12.4 women per 100,000 births. In 2003, it was 17.6. Now it’s 18.5.

That’s not a measurement error because we’ve been measuring the rate of maternal death in the United States the same way for decades.

By contrast, the rate has been dropping in most other nations. In fact, we’re one of just eight nations in which it’s been rising.  The others that are heading in the wrong direction with us are not exactly a league we should be proud to be a member of. They include Afghanistan, El Salvador, Belize, and South Sudan.

China was ranked 116 in 1990. Now it’s moved up to 57. Even if China’s way of measuring maternal mortality isn’t to be trusted, China is going in the right direction. We ranked 22 in 1990. Now, as I’ve said, we’re down to 60th place.

Something’s clearly wrong.

Some say more American women are dying in pregnancy and childbirth because American girls are becoming pregnant at younger and younger ages, where pregnancy and birth can pose greater dangers.

This theory might be convincing if it had data to support it. But contrary to the stereotype of the pregnant young teenager, the biggest rise in pregnancy-related deaths in America has occurred in women 20-24 years old.

Consider that in 1990, 7.2 women in this age group died for every 100,000 live births. By 2013, the rate was 14 deaths in this same age group – almost double the earlier rate.

Researchers aren’t sure what’s happening but they’re almost unanimous in pointing to a lack of access to health care, coupled with rising levels of poverty.

Some American women are dying during pregnancy and childbirth from health problems they had before they became pregnant but worsened because of the pregnancies — such as diabetes, kidney disease, and heart disease.

The real problem, in other words, was they didn’t get adequate health care before they became pregnant.

Other women are dying because they didn’t have the means to prevent a pregnancy they shouldn’t have had, or they didn’t get the prenatal care they needed during their pregnancies. In other words, a different sort of inadequate health care.

One clue: African-American mothers are more than three times as likely to die as a result of pregnancy and childbirth than their white counterparts.

The data tell the story: A study by the Roosevelt Institute shows that U.S. states with high poverty rates have maternal death rates 77 percent higher than states with lower levels of poverty. Women with no health insurance are four times more likely to die during pregnancy or in childbirth than women who are insured.

What do we do about this? Yes, of course, poor women (and the men who made them pregnant) have to take more personal responsibility for their behavior.

But this tragic trend is also a clear matter of public choice.

Many of these high-poverty states are among the twenty-one that have so far refused to expand Medicaid, even though the federal government will cover 100 percent of the cost for the first three years and at least 90 percent thereafter.

So as the sputtering economy casts more and more women into near poverty, they can’t get the health care they need.

Several of these same states have also cut family planning, restricted abortions, and shuttered women’s health clinics.

Right-wing ideology is trumping the health needs of millions of Americans.

Let’s be perfectly clear: These policies are literally killing women.



Chancellor's Professor of Public Policy at the University of California at Berkeley and Senior Fellow at the Blum Center for Developing Economies, was Secretary of Labor in the Clinton administration. Time Magazine named him one of the ten most effective cabinet secretaries of the twentieth century. He has written thirteen books, including the best sellers "Aftershock" and "The Work of Nations." His latest, "Beyond Outrage," is now out in paperback. He is also a founding editor of the American Prospect magazine and chairman of Common Cause. His new film, "Inequality for All," is available on Netflix, iTunes, DVD, and On Demand.

e-max.it: your social media marketing partner
 
<< Start < Prev 2861 2862 2863 2864 2865 2866 2867 2868 2869 2870 Next > End >>

Page 2865 of 3432

THE NEW STREAMLINED RSN LOGIN PROCESS: Register once, then login and you are ready to comment. All you need is a Username and a Password of your choosing and you are free to comment whenever you like! Welcome to the Reader Supported News community.

RSNRSN