Gingerly, Deals Start Taking Shape Between Rivals China and Vietnam

Historic rivals China and Vietnam are working on substantive agreements that could cover trade, investment and maritime resource sharing despite a bitter sovereignty dispute that had snarled relations less than a year ago.

The Communist neighbors are inching toward new trade and investment ties that analysts say would help shore up overall relations. Some believe the two might later approach stickier topics such as joint use of disputed waters or humane treatment of each other’s fishermen. The two countries still contest sovereignty over tracts of the vast, resource-rich South China Sea east of Vietnam and southwest of Hong Kong.

Prospects of some kind of agreement came into focus during Vietnamese President Tran Dai Quang’s visit to China, which ends Monday. He suggested the two sides work on complementing each other’s trade and investment advantages with a view toward improving overall relations, state media from Hanoi said.

“President Quang is in China, and China promised a lot,” said Yun Sun, senior associate with the East Asia Program under Washington-based think tank the Stimson Center. “From an economic point of view, it is certainly practical and beneficial for Vietnam to have some sort of deal, but then again I think this still relatively early to tell.”

In a meeting with Quang Thursday, Chinese President Xi Jinping called for more cross-border economic cooperation zones and joint infrastructure building, according to  China’s official Xinhua News Agency reported. China pledged to “mitigate” its trade deficit with Vietnam and increase direct investment, Sun said.

“Talking probably does help lower tensions and improve the odds of things happening,” said Alaistair Chan, an economist covering China for Moody’s Analytics.

The Vietnamese president suggested China finalize rules on opening the Chinese market for farm products, dairy and seafood, media outlet vietnamnet.vn said. He also called on China to make more “preferential loans” and urged a working group to develop renewable energy investment projects that play on China’s strengths and demand in Vietnam, the Vietnamese news report said.

On Friday companies from both countries signed agreements on milk distribution, tourism and rice processing.

China is the largest trade partner of Vietnam, with imports and exports worth about $72 billion last year. Vietnam also calls China one of the top 10 investors in the country.

But both countries are likely to hedge on letting outsiders invest in infrastructure, a possible source of direct investment, Chan said. “If they can get there purely on trade and stay away from investment, a touchy subject in both countries, I think that’s probably where they can get their quickest gain,” he said.

China and Vietnam stepped up dialogue after July 2016, when a world arbitration court ruled that Beijing lacked a legal basis to claim more than 90 percent of the sea, a boon to rival claimants in Southeast Asia: Vietnam, Brunei, Malaysia and the Philippines. China responded to the ruling by seeking one-on-one dialogue with each country. Vietnam was one of the most hostile toward China before the court ruling.

Beijing and Hanoi dispute sovereignty over much of the 3.5 million-square-kilometer sea, including two chains of tiny islets. Beijing’s go-ahead for a Chinese oil rig in contested waters set off a clash in 2014. The two countries also still face distrust fanned by centuries of political rivalry as well as a border war in 1979.

Both countries stake their fast-growing economies on export manufacturing. Vietnamese companies resent China for using their larger production scales to sell goods in bulk at relatively low prices.

Relations got a lift in September when the Chinese premier and Vietnamese prime minister agreed to manage maritime differences. Vietnamese Communist Party General Secretary Nguyen Phu Trong visited China in January to help smooth relations.

Another boost came as China emerged last year as the top single-country source of tourism for Vietnam. About 2.2 million Chinese visited Vietnam from January to October. Chinese tourists have reshaped the economies of Hong Kong and Taiwan over the past decade.

Agreements on managing disputed tracts of the South China Sea may come later if the two sides keep getting along, experts say.

Vietnam and China have agreed to an “informal” median line in the tract of sea where their claims overlap, said Carl Thayer, Southeast Asia-specialized emeritus professor of politics at The University of New South Wales in Australia. They might eventually work on expanding joint exploration for oil under the seabed and a way to ensure “humane” treatment of fishermen, he said.

“It’s to stop the ramming, boarding, seizing fish catches and radio equipment and in the old days taking them hostages for money,” Thayer said. Under a human treatment agreement, he said, “If you find them, you report them to the other side and return them rather than bash them up and take everything.”

Tiny Phytoplankton Threaten America’s Most Diverse Waterway

Florida’s Indian River lagoon is considered the most biologically diverse estuary in the Northern Hemisphere. But it is facing a serious threat to the plants and animals in its waters. The water’s surface is increasingly dotted with thousands of dead fish, manatees, birds and other creatures. Faiza Elmasry has more about the problem, the cause and the solution. VOA’s Faith Lapidus narrates.

WHO Confirms Second Ebola Case in Congo Outbreak

The World Health Organization (WHO) confirmed on Sunday a second case of Ebola in Democratic Republic of Congo after an outbreak this week of 17 other suspected cases.

Health officials are trying to trace 125 people thought to be linked to the cases identified in the remote northeastern province of Bas-Uele province in northeastern Congo near the border with Central African Republic, WHO’s Congo spokesman Eugene Kabambi said.

Three people have so far died among the 19 suspected and confirmed cases, he added.

It was not immediately clear how the first victim, a deceased male, caught the virus, although past outbreaks have been linked to contact with infected bush meat such as apes.

The outbreak comes just a year after the end of an epidemic in West Africa killed more than 11,300 people mostly in Guinea, Sierra Leone and Liberia.

However, Congo, whose dense forests contain the River Ebola near where the disease was first detected in 1976, has experienced many outbreaks and has mostly succeeded in containing them without large-scale loss of life.

The GAVI global vaccine alliance said on Friday some 300,000 emergency doses of an Ebola vaccine developed by Merck could be available in case of a large-scale outbreak and that it stood ready to support the Congo government on the matter.

5 Ways to Become a Smaller Target for Ransomware Hackers

This weekend’s global online extortion attack reinforces the need for businesses and other large organizations to update their computer operating systems and security software, cybersecurity experts said.

The attack largely infected networks that used out-of-date software, such as Windows XP, which Microsoft no longer offers technical support for.

“There’s some truth to the idea that people are always going to hack themselves,” said Dan Wire, a spokesman for security firm FireEye. “You’ve got to keep your systems updated.”

The attack that authorities say swept 150 countries this weekend is part of a growing problem of “ransomware” scams, in which people find themselves locked out of their files and presented with a demand to pay hackers to restore their access.

Hackers bait users to click on infected email links, open infected attachments or take advantage of outdated and vulnerable systems. This weekend’s virus was particularly virulent, because it could spread to all other computers on a network even if just one user clicked a bad link or attachment.

Lawrence Abrams, a New York-based blogger who runs BleepingComputer.com, says many organizations don’t install security upgrades because they’re worried about triggering bugs, or they can’t afford the downtime.

Here are five tips to make yourself a less-likely victim:

Make safe and secure backups

Once your files are encrypted, your options are limited. Recovery from backups is one of them. “Unfortunately, most people don’t have them,” Abrams says. Backups often are also out of date and missing critical information. With this attack, Abrams recommends trying to recover the “shadow volume” copies some versions of Windows have.

Some ransomware does also sometimes targets backup files, though.

You should make multiple backups — to cloud services and using physical disk drives, at regular and frequent intervals. It’s a good idea to back up files to a drive that remains entirely disconnected from your network.

Update and patch your systems

The latest ransomware was successful because of a confluence of factors. Those include a known and highly dangerous security hole in Microsoft Windows, tardy users who didn’t apply Microsoft’s March software fix, and malware designed to spread quickly once inside university, business and government networks. Updating software will take care of some vulnerability.

“Hopefully people are learning how important it is to apply these patches,” said Darien Huss, a senior security research engineer for cybersecurity firm Proofpoint, who helped stem the reach of the weekend attack. “I hope that if another attack occurs, the damage will be a lot less.”

The virus targeted computers using Windows XP, as well as Windows 7 and 8, all of which Microsoft stopped servicing years ago. Yet in an unusual step, they released a patch for those older systems because of the magnitude of the outbreak.

“There’s a lot of older Windows products out there that are `end of life’ and nobody’s bothered to take them out of service,” said Cynthia Larose, a cybersecurity expert at the law firm of Mintz Levin.

Use antivirus software

Using antivirus software will at least protect you from the most basic, well-known viruses by scanning your system against the known fingerprints of these pests. Low-end criminals take advantage of less-savvy users with such known viruses, even though malware is constantly changing and antivirus is frequently days behind detecting it.

Educate your workforce

Basic protocol such as stressing that workers shouldn’t click on questionable links or open suspicious attachments can save headaches. System administrators should ensure that employees don’t have unnecessary access to parts of the network that aren’t critical to their work. This helps limit the spread of ransomware if hackers do get into your system.

If hit, don’t wait and see

Some organizations disconnect computers as a precautionary measure. Shutting down a network can prevent the continued encryption — and possible loss — of more files. Hackers will sometimes encourage you to keep your computer on and linked to the network, but don’t be fooled.

If you’re facing a ransom demand and locked out of your files, law enforcement and cybersecurity experts discourage paying ransoms because it gives incentives to hackers and pays for their future attacks. There’s also no guarantee all files will be restored. Many organizations without updated backups may decide that regaining access to critical files, such as customer data, and avoiding public embarrassment is worth the cost.

Ryan O’Leary, vice president of WhiteHat Security’s threat research center, points out that this weekend’s hackers weren’t asking for much, usually about $300.

“If there is a silver lining to it, you’re not out a million dollars,” he said.

Still, “My answer is, never pay the ransom,” Abrams said. “But at the same time, I also know that if you’re someone who’s been affected and you’ve lost all your children’s photographs or you’ve lost all your data or you lost your thesis, sometimes $300 is worth it, you know?”

Europol says Global Cyberattack Affects 150 Countries

Europe’s police agency Europol says a global cyberattack has affected at least 100,000 organizations in 150 countries, with data networks infected by malware that locks computer files unless a ransom is paid.

Speaking to Britian’s ITV, Europol director Rob Wainwright said the healthcare sector in many countries is particularly vulnerable.  

So far there has been no progress reported in efforts to determine who launched the plot.

Computer security experts have assured individual computer users who have kept their PC operating systems updated that they are relatively safe.

They advised those whose networks have been effectively shut down by the ransomware attack not to make the payment demanded — the equivalent of $300, paid in the digital currency bitcoin, delivered to a likely untraceable destination that consists merely of a lengthy string of letters and numbers.  

However, the authors of the “WannaCry” ransomware attack told their victims the amount they must pay would double if they did not comply within three days of the original infection — by Monday, in most cases. And the hackers warned that they would delete all files on infected systems if no payment was received within seven days.

Avast, an international security software firm that claims it has 400 million users worldwide, said the ransomware attacks rose rapidly Saturday to a peak of 57,000 detected intrusions. Avast, which was founded in 1988 by two Czech researchers, said the largest number of attacks appeared to be aimed at Russia, Ukraine and Taiwan, but that major institutions in many other countries were affected.

‘Kill switch’ found

Computer security experts said the current attack could have been much worse but for the quick action of a young researcher in Britain who discovered a vulnerability in the ransomware itself, known as WanaCryptor 2.0.

The researcher, identified only as “MalwareTech,” found a “kill switch” within the ransomware as he studied its structure.

The “kill” function halted WanaCryptor’s ability to copy itself rapidly to all terminals in an infected system — hastening its crippling effect on a large network — once it was in contact with a secret internet address, or URL, consisting of a lengthy alphanumeric string.

The “kill” function had not been activated by whoever unleashed the ransomware, and the researcher found that the secret URL had not been registered to anyone by international internet administrators. He immediately claimed the URL for himself, spending about $11 to secure his access, and that greatly slowed the pace of infections in Britain.

Expects cautioned, however, that the criminals who pushed the ransomware to the world might be able to disable the “kill” switch in future versions of their malware.

Hackers’ key tool

WanaCryptor 2.0 is only part of the problem. It spread to so many computers so rapidly by using an exploit — software capable of burrowing unseen into Windows computer operating systems.

The exploit, known as “EternalBlue” or “MS17-010,” took advantage of a vulnerability in the Microsoft software that reportedly had been discovered and developed by the U.S. National Security Agency, which used it for surveillance activities.

NSA does not discuss its capabilities, and some computer experts say the MS17-010 exploit was developed by unknown parties using the name Equation Group (which may also be linked to NSA). Whatever its source, it was published on the internet last month by a hacker group called ShadowBrokers.

Microsoft distributed a “fix” for the software vulnerability two months ago, but not all computer users and networks worldwide had yet made that update and thus were highly vulnerable. And many computer networks, particularly those in less developed parts of the world, still use an older version of Microsoft software, Windows XP, that the company no longer updates.

The Finnish computer security firm F-Secure called the problem spreading around the world “the biggest ransomware outbreak in history.” The firm said it had warned about the exponential growth of ransomware, or crimeware, as well as the dangers of sophisticated surveillance tools used by governments.

Lesson: Update programs

With WanaCryptor and MS17-010 both “unleashed into the wild,” F-Secure said the current problem seems to have combined and magnified the worst of the dangers those programs represent.

The security firm Kaspersky Lab, based in Russia, noted that Microsoft had repaired the software problem that allows backdoor entry into its operating systems weeks before hackers published the exploit linked to the NSA, but also said: “Unfortunately it appears that many users have not yet installed the patch.”

Britain’s National Health Services first sounded the ransomware alarm Friday.

The government held an emergency meeting Saturday of its crisis response committee, known as COBRA, to assess the damage. Late in the day, Home Secretary Amber Rudd said the NHS was again “working as normal,” with 97 percent of the system’s components now fully restored.

Spanish firm Telefonica, French automaker Renault, the U.S.-based delivery service FedEx and the German railway Deutsche Bahn were among those affected.

None of the firms targeted indicated whether they had paid or would pay the hackers ransom.

 

WHO to Vote for New Director-General; David Nabarro Wants the Job

Dr. David Nabarro says he wants to rid the world of two diseases that are close to being eradicated: polio and guinea worm. Polio exists mainly on the Pakistani-Afghan border and in northern Nigeria. Both are conflict zones, where vaccine workers risk their lives to immunize children.

“The last part of eradicating any disease is always the hardest part,” Nabarro said during a visit to VOA. “If you don’t do it, you lose everything. To do it, you’ve got to really bring all the energy and commitment you can to bear.”

The World Health Organization has worked to eliminate polio for more than 30 years. Nigeria was to be declared polio-free this year, meaning the country had no cases for three continuous years, but then the disease returned.

“We must remain vigilant and focused until we are certain that the last case has been found and that we have got everybody protected,” Nabarro said.

Watch: WHO to Vote on New Director-General; David Nabarro Wants the Job

Guinea worm

Nabarro also wants to rid the world of Guinea worm, a disease that starts when people drink water containing fleas infected with guinea worm larvae. The larvae grow in human intestines. And while it is not life-threatening, it is painful when the worm emerges.

In 1986, about 3.5 million people had Guinea worm disease. Last year, 25 people had it. This was the result of efforts by United Nations agencies, the Carter Center, which was founded by former U.S. President Jimmy Carter, and the U.S. Centers for Disease Control and Prevention.

Nabarro wants to make more inroads in ending malaria, a disease that threatens nearly half the world’s population. Even through malaria can be prevented and cured, the WHO says it caused nearly half a million deaths in 2015.

Ebola epidemic

During the Ebola epidemic, Nabarro visited the West African countries ravaged by the disease as the U.N. special envoy on Ebola. It took the world a long time to put together an effective response to the epidemic, and before it was over more than 11,000 people died.

The WHO was heavily criticized for the way it handled the pandemic. Nabarro wants to make sure a tragedy of this magnitude does not happen again because of a lack of preparedness.

“I want to be sure the world as a whole helps nations to respond quickly when there’s a threat of infection. Usually, that means that the problem doesn’t get out of control,” he told VOA.

Life of public health service

Nabarro has spent his life working in public health. He worked in Iraq with Save the Children in 1974. He continued to work in public health positions until he joined the World Health Organization in 1999 and has worked at the WHO and for the U.N. since then. Nabarro has worked on malaria programs.

Now, he hopes to be elected director-general of the World Health Organization when the World Health Assembly meets in Geneva May 23.

This is the first time candidates will be elected to become director-general of WHO by member nations.

WHO to Vote on New Director-General; David Nabarro Wants the Job

Dr. David Nabarro says he wants to rid the world of two diseases that are close to being eradicated: polio and guinea worm. During a visit to VOA, he also said he wants to work to end malaria if he becomes the next head of the World Health Organization. This is the first time candidates will be elected to become director-general of WHO. VOA’s Carol Pearson has more.

Factbox: Ebola Virus Outbreaks in Africa

Democratic Republic of Congo Ebola Outbreak

On May 13, the World Health Organization declared an Ebola outbreak in Bas-Uele province, in the Democratic Republic of the Congo, after a person tested positive for the Ebola virus.

The last Ebola outbreak in Congo happened in 2014 and killed more than 40 people.

In 2013, an Ebola crisis began in Guinea, Sierra Leone and Liberia.

Congo’s outbreaks have all been in areas not linked to the West African cases.

2013-16 Western Africa Ebola Outbreak

Where: Guinea, Liberia, Sierra Leone

Began: December 2013

Ended*: March 2016

* WHO declared the outbreak in West Africa a public health emergency in August 2014. It declared the end of the transmission of Ebola in Guinea in December 2015, Liberia in January 2016 and in Sierra Leone in March 2016.

Even after the last transmission, WHO warned the countries were still at risk of sporadic transmission of Ebola because of the presence of the virus in some survivors.

WHO noted flare-ups of Ebola cases in Guinea in March 2016 and Liberia in June 2016.

2013-16 West Africa Ebola Outbreak, Death Tolls*

Guinea                 3,814 cases         2,544 deaths

Liberia                10,678 cases        4,810 deaths

Sierra Leone      14,124 cases        3,956 deaths

Total                      28,616 cases       11,310 deaths

Source: U.S. Centers for Disease Control and Prevention

* The 2013-16 West Africa Ebola outbreak was the largest in history.

Ebola Symptoms

Symptoms of the virus may include:

Fever

Severe headache

Muscle pain

Weakness

Fatigue

Diarrhea

Vomiting

Abdominal (stomach) pain

Unexplained hemorrhage (bleeding or bruising)

* Symptoms may appear anywhere from two to 21 days after exposure to Ebola, but the average is eight to 10 days.

Prevention

Avoid areas of known outbreaks

Wash hands frequently

Avoid bushmeat

Take precautions and avoid direct contact with infected people

* There is no known treatment for Ebola. Symptoms of Ebola and complications are treated as they appear.

Global Cyberattack in Brief: Ransomware, a Vision of Future?, Seeking Culprits

In what is believed to be the largest attack of its kind ever recorded, a cyberextortion attack continued causing problems Saturday, locking up computers and holding users’ files for ransom at dozens of hospitals, companies and government agencies. Businesses and computer security organizations await problems in the new workweek.

Ransomware Attack Could Herald Future Problems — Tech staffs around the world worked around the clock this weekend to protect computers and patch networks to block the computer hack whose name sounds like a pop song — “WannaCry” — as analysts warned the global ransomware attack could be just the first of a new wave of strikes by computer criminals.

Worldwide Cyberattack Spreads Further in Second Day — A cyberattack against tens of thousands of data networks in scores of countries, all infected by malware that locks computer files unless a ransom is paid, spread further in its second day Saturday, with no progress reported in efforts to determine who launched the plot.

Authorities Seek Clues On Culprits Behind Global Cyberattack — The British government said on Saturday it does not yet know who was behind a massive global cyberattack that disrupted Britain’s health care services, but Interior Minister Amber Rudd said the country’s National Crime Agency is investigating where the attacks came from.

Europol Working on Probe Into Massive Cyberattack — The European Union’s police agency, Europol, says it is working with countries hit by the global ransomware cyberattack to rein in the threat and help victims.

‘Perfect Storm’ of Conditions Helped Cyberattack Succeed — The cyberextortion attack that hit dozens of countries spread quickly and widely thanks to an unusual confluence of factors: a known and highly dangerous security hole in Microsoft Windows, tardy users who didn’t apply Microsoft’s March software fix, and a software design that allowed the malware to spread quickly once inside university, business and government networks.

Where Global Cyberattack Has Hit Hardest — A look at some of the countries and organizations hardest hit during the global cyberattack.

What Is the Digital Currency Bitcoin? — In the news now after a cyberextortion attack this weekend, bitcoin has a fuzzy history, but it’s a type of currency that allows people to buy goods and services and exchange money without involving banks, credit card issuers or other third parties.

 

Congo Faces New Ebola Outbreak

The World Health Organization says the Democratic Republic of the Congo is again facing an outbreak of the contagious and deadly Ebola virus.

Congolese Health Minister Oly Ilunga announced Saturday that three people had died of the virus in the northeast of the country.

Ilunga urged people not to panic and said officials had taken all necessary measures to respond to the outbreak.

The World Health Organization said it was working with Congolese authorities to deploy health workers in the remote area where the three deaths occurred, all on April 22. Eleven other cases are suspected in the area.

WHO’s regional director for Africa, Matshidiso Moeti, went to the Congolese capital, Kinshasa, on Friday to discuss disease response.

The remoteness of the affected area, 1,300 kilometers from Kinshasa, means word of the outbreak was slow to emerge. WHO said specialist teams were expected to arrive in the area, known as the Likati health zone, within the next day or two.

This was the first outbreak of the virus in DRC since 2014, when 49 people died of Ebola.

Larger outbreak

Experts say the 2014 DRC outbreak was not linked to a much larger outbreak that killed 11,000 people in Guinea, Sierra Leone and Liberia, beginning in 2013. They say active virus transmission for that outbreak was halted last year.

In December 2016, The Lancet, a medical journal, published results of a WHO-led trial  showing that the world’s first Ebola vaccine provides substantial protection against the virus. Among more than 11,000 people who were vaccinated in the trial, no cases of Ebola virus disease occurred.

Reports say the vaccine is now awaiting formal licensing clearance.

Ebola, named for the Congolese river near where it was first identified in 1976, begins with a sudden fever, aching muscles, diarrhea and vomiting. It is a hemorrhagic fever, marked by spontaneous bleeding from internal organs and, in most cases, death. It can be transmitted by close contact with infected animals or people, usually through blood or other bodily fluids.

People can contract the virus through direct contact with victims’ bodies at funerals. Caretakers, nurses and doctors treating Ebola patients also are at high risk.

Where Global Cyberattack Has Hit Hardest

Here is a look at some of the places hit by the global cyberattack.

European Union — Europol’s European Cybercrime Center, known as EC3, said the attack “is at an unprecedented level and will require a complex international investigation to identify the culprits.”

Britain — Britain’s home secretary said the “ransomware” attack hit one in five of 248 National Health Service groups, forcing hospitals to cancel or delay treatments for thousands of patients — even some with serious aliments like cancer.

Germany — The national railway said Saturday departure and arrival display screens at its train stations were affected, but there was no impact on actual train services. Deutsche Bahn said it deployed extra staff to help customers.

Russia — Two security firms — Kaspersky Lab and Avast — said Russia was hit hardest by the attack. The Russian Interior Ministry, which runs the country’s police, confirmed it was among those that fell victim to the “ransomware,” which typically flashes a message demanding payment to release the user’s data. Spokeswoman Irina Volk was quoted by the Interfax news agency Saturday as saying the problem had been “localized” and that no information was compromised. Russia’s health ministry said its attacks were “effectively repelled.”

United States — In the U.S., FedEx Corp. reported that its Windows computers were `”experiencing interference” from malware, but wouldn’t say if it had been hit by ransomware. Other impacts in the U.S. were not readily apparent.

Turkey — The head of Turkey’s Information and Communication Technologies Authority or BTK says the nation was among those affected by the ransomware attack. Omer Fatih Sayan said the country’s cyber security center is continuing operations against the malicious software.

France — French carmaker Renault’s assembly plant in Slovenia halted production after it was targeted. Radio Slovenia said Saturday the Revoz factory in the southeastern town of Novo Mesto stopped working Friday evening to stop the malware from spreading.

Brazil — The South American nation’s social security system had to disconnect its computers and cancel public access. The state-owned oil company Petrobras and Brazil’s Foreign Ministry also disconnected computers as a precautionary measure, and court systems went down, too.

Spain — The attack hit Spain’s Telefonica, a global broadband and telecommunications company.

Ransomware Attack Could Herald Future Problems

Tech staffs around the world worked around the clock this weekend to protect computers and patch networks to block the computer hack whose name sounds like a pop song — “WannaCry” — as analysts warned the global ransomware attack could be just the first of a new wave of strikes by computer criminals.

The United States suffered relatively few effects from the ransomware that appeared on tens of thousands of computer systems across Europe and into Asia, beginning Friday. Security experts remained cautious, however, and stressed there was a continuing threat.

In contrast to reports from several European security firms, a researcher at the Tripwire company on the U.S. West Coast said late Saturday that the attack could be diminishing.

“It looks like it’s tailing off,” said Travis Smith of Tripwire.

“I hope that’s the case,” Smith added. The Oregon firm protects large enterprises and governments from computer security threats.

Ransomware attack

The code for the ransomware unleashed Friday remains freely available on the internet, experts said, so those behind the WannaCry attack — also known as WanaCryptor 2.0 and a variety of other names — could launch new strikes in coming days or weeks. Copycat attacks by other high-tech criminals also are possible.

“We are not out of the woods yet,” said Gary Davis, chief consumer security evangelist at McAfee, the global computer security software company in Santa Clara, California. “We think it’s going to be the footprint for other kinds of attacks in the future.”

The attack hit scores of countries — more than 100, by some experts’ count — and infected tens of thousands of computer networks.

Industry reports indicate Russia, Taiwan, Ukraine and Britain were among the countries hit hardest, and more hacking reports can be expected when offices reopen for the new workweek Monday or, in some parts of the world, Sunday.

One of the weapons used in the current attack is a software tool reportedly stolen from the U.S. National Security Agency and published on the internet by hackers last month.

The tool affords hackers undetected entry into many Microsoft computer operating systems, which is what they need to plant their ransomware. However, Microsoft issued patches to fix that vulnerability in its software weeks ago that could greatly reduce the chances of intrusion.

Outdated operating systems

The crippling effects of WannaCry highlight a problem that experts have long known about, and one that appears to have hit developing countries harder.

Some organizations are more vulnerable to intrusion because they use older or outdated operating systems, usually due to the cost of upgrading software or buying modern hardware needed to install better-protected operating systems. Companies like Microsoft eventually stop updating or supporting older versions of their software, so customers using those programs do not receive software patches or security upgrades.

Much of the ransomware’s spread around the world occurred without any human involvement. The WannaCry malware self-propagates, copying itself to all computers on a network automatically.

When a demand for ransom payments appears on a user’s screen — $300 at first, doubling to $600 in a few days — it’s usually too late: All files on that computer have been encrypted and are unreadable by their owners.

The hackers said they would reverse the effect of their software once they received the payments they demanded.

Microsoft patched the “hole” in the newest versions of its operating software — Windows 10 for most home users — in March, three weeks before the stolen NSA exploit software was published on the internet. Since Friday, the company dropped its refusal to update old versions of its programs and issued patches specifically written for use in Windows XP and several other systems.

Microsoft declined a request for an interview, but a statement on the company’s blog said: “Seeing businesses and individuals affected by cyberattacks, such as the ones reported today, was painful. We are taking the highly unusual step of providing a security update for all customers to protect Windows platforms that are in custom support only, including Windows XP, Windows 8, and Windows Server 2003.”

“A lot of people in the security community were impressed with Microsoft’s speed, but it highlights an ongoing challenge we have,” said Stephen Cobb, a senior security researcher with ESET, a global security software company. “If a malicious code outbreak breaks out tomorrow, and targets unsupported operating systems, Microsoft may have to go there again.”

Insecurity Creates Challenges for HIV Treatment in Southeast C.A.R.

Violence in the southeastern part of the Central African Republic, where five U.N. peacekeepers were killed this month, has made it tougher for HIV-positive residents in the remote, lawless region to get treatment.

The prevalence rate of HIV in southeastern C.A.R. is 13 percent, nearly three times the national average.

The migration of people between the bordering areas of South Sudan and the Democratic Republic of the Congo contributes to the spread of the disease in all three countries.

“Here, it’s a crossing where everything converges. It’s why the level of HIV is high,” said Bienvenu Sapioko, a government nurse who works at the only hospital in Zemio. He said the rebels and refugees in the area also increase the high prevalence.   

An internal U.N. report obtained by VOA found HIV rates increased following the arrival of the Ugandan security forces in the C.A.R. in 2009. The Ugandan and American forces tasked with tracking down Joseph Kony and his Lord’s Resistance Army ended their mission in April and are heading home.

With prostitution, polygamy and effectively no state authority in the area, weak education contributes to the problem.  

Stigma, superstition

“People believe in the power of nature and traditional doctors. So bush doctors, shamans are also very common in the community,” said Olivier Pennec, the Doctors Without Borders project coordinator in Zemio.

Stigma compounds the problem.

“Before, the people didn’t treat themselves. The people would hide the microbes, this disease,” said Marcel Elonga, a community leader. They would hide and “speak about this parasite, parasite, parasite.”

HIV-positive people in local communities can also find themselves shunned by their peers.

“They don’t want him in the community,” community leader Pierre Yakanza said, describing how some people here see an HIV-positive person. “They don’t want to be close to him. ‘Leave him over there. We don’t want to associate with him or have him in the community meetings or give him a job.’ He’s rejected.”

Local health workers spread information about safe sex, but even access to condoms remains a challenge.

Treatment available

More than 1,500 people now come to Zemio’s hospital from nearby and as far away as Uganda, South Sudan and the Democratic Republic of the Congo for the free HIV treatment offered by Doctors without Borders.

Hospital officials said previously one person would die every month or so from the disease, but they haven’t registered a death since 2014.  

In 2012, Agnes Davouragouni said she used to be sick all the time.  

“When I did the test and found out I was positive, my husband said he doesn’t have HIV, so he left me the same day,” said the 35-year-old woman, who now lives alone with her three children, selling wood and charcoal to get by.

Once a year, Davouragouni walks 45 kilometers to Zemio over the course of two days in order to get a checkup as part of her treatment.  She walks mostly at night and sleeps under a tree along the way.   

“The roads are very insecure. I don’t have a motorcycle or the money to pay to get here,” she said. “There’s a lot of fear to travel on these roads.”

Bandits and rebel groups, including the remnants of the Lord’s Resistance Army, all move around the area. The security void will worsen with the departure of Ugandan and American forces in the next few months.

Group efforts

Recognizing the challenges of getting medication, Doctors Without Borders developed a new community approach in which HIV-positive patients work in groups to bring back antiretroviral drugs in bulk every six months, reducing travel time, costs and exposure to risk.

Farmer Moïse Ouele picks up the antiretroviral drugs for his group of about 30 people and drives them  two hours down the road to his village Kitesa, about 50 kilometers away.

“It was really tiring for me to come each month to the hospital,” Ouele said. “But now, this program helps a lot with this problem, despite the insecurity of the LRA that is growing.”

Doctors Without Borders is transitioning out of the area at the end of the year and is handing over the administration of the program to the Ministry of Health.

Authorities Seek Clues On Culprits Behind Global Cyberattack

The British government said on Saturday it does not yet know who was behind a massive global cyberattack that disrupted Britain’s health care services and targeted vital computer systems in as many as 100 other countries.

British Interior Minister Amber Rudd said Britain’s National Cyber Security Center was working with the country’s health service to ensure the attack that began Friday was contained and limited.

She said Britain’s National Crime Agency was still working with her ministry to find out where the attacks came from and that the British government did not know if the attacks had been directed by a foreign government.

What appeared to be the biggest cyberextortion attack in history exploited a vulnerability in Microsoft Windows that was identified in leaked documents by the U.S. National Security Agency earlier this year.

With more than 75,000 attacks launched on Friday, cybercrime experts around the world were investigating a concentration of attacks in Russia, Ukraine, and India — countries where the use of older, unpatched versions of Microsoft Windows is widespread.

The hackers attempt to trick victims into opening malicious attachments to spam e-mails by saying they contained invoices, job offers, security warnings, and other seemingly legitimate files.

The extortionists demand payments of $300 to $600 to restore access once computers are crippled by the scam. Cybersecurity firms said criminal organizations were probably behind the attack.

Russia’s Interior Ministry, Emergencies Ministry, and biggest bank, Sberbank, were all targeted, officials said.

The Interior Ministry said on its website that around 1,000 computers had been infected, but it had localized the virus. Russia’s Investigative Committee denied reports that it was attacked.

Russia’s Health Ministry and Emergencies Ministry told Russian news agencies that they had repelled the cyberattacks, while Sberbank said its cybersecurity arrangements had prevented viruses from entering its systems.

Russia’s Central Bank said Saturday that it detected massive cyberattacks on domestic banks, but the resources of the Central Bank itself were “not compromised.”

Megafon, a top Russian mobile operator, said it had come under attacks that appeared similar to those that crippled U.K. hospitals. A spokesman said mobile communications weren’t affected but the attacks interrupted the work of its call centers.

Hospitals ‘Crippled’

Spain and the United Kingdom were hit particularly hard. Hospitals across Britain found themselves without access to their computers or phone systems. Many canceled routine procedures and asked patients not to come to the hospital unless it was an emergency. 

British Prime Minister Theresa May said that, while some hospitals were crippled, there was no evidence patient data had been compromised.

Spain’s giant Telefonica telecommunications company was hit, prompting Spanish authorities to take measures to protect critical infrastructure in transportation, energy, telecommunications, and financial services.

Only a small number of U.S. organizations were hit because the hackers appear to have begun their campaign in Europe, cybersecurity firms said.

By the time the hackers turned their attention to the United States, spam filters had identified the new threat and flagged the ransomware-laden emails as malicious.

The security holes exploited by the hackers were disclosed several weeks ago by TheShadowBrokers, a mysterious group that has published what it says are hacking tools used by the White House security agency as part of U.S. intelligence-gathering.

Microsoft said it was pushing out automatic Windows updates to defend clients from the virus.

Some material for this article came from AP, BBC, AFP, Reuters, Tass and Interfax.

Mnuchin Says G-7 Nations More Comfortable With New US Economic Approach

U.S. Treasury Secretary Steven Mnuchin said Saturday after meeting with officials from the world’s other industrialized democracies that he thought they were more at ease with Donald Trump’s economic policies.

“People are more comfortable today, now that they’ve had the opportunity to spend time with me and listen to the president and hear our economic message,” Mnuchin said after a two-day meeting in Bari, Italy, with members of the Group of Seven, industrialized nations commonly known as the G-7.

Officials from the G-7 countries hoped to learn more about the U.S. president’s plans, which they feared would revive protectionist policies and result in a global regression on issues such as banking reform and climate change.

After the meeting, officials from Japan and member European countries remained concerned about the economic shift in Washington, particularly after Mnuchin said the U.S. reserved the right to be protectionist if it thought trade was not free or fair.

“All the six others … said explicitly, and some very directly, to the representatives of the U.S. administration that it is absolutely necessary to continue with the same spirit of international cooperation,” said French Finance Minister Michel Sapin.

Don’t ‘backpedal’ on free trade

Bank of France Governor Francois Villeroy de Galhau said continued uncertainty about U.S. policy could dampen optimism within the G-7 about the global economy’s gradual recovery from the financial crisis that began nearly a decade ago.

De Galhau echoed the sentiments of Japanese Finance Minister Taro Aso, who said, “We must not backpedal on free trade, as it has contributed to economic prosperity.”

European officials complained that the U.S. meaning of “fair trade” remained unclear and that the only way to establish fairness was to abide by the multilateral framework developed by the World Trade Organization.

A senior Japanese Finance Ministry official said the most significant question pertained to Trump’s U.S. tax cut proposal that could fuel America’s economic recovery.

Trump has proposed slashing the U.S. corporate income tax rate and offer multinational businesses a steep tax break on overseas profits brought back to the U.S.

The G-7 is composed of Britain, Canada, France, Germany, Italy, Japan and the U.S.

Global Cyberattack in Brief: Ransomware Attack, How Does It Work, How to Prevent It

In what is believed to be the largest attack of its kind ever recorded, a cyberextortion attack struck in dozens of countries Friday, locking up computers and holding users’ files for ransom at dozens of hospitals, companies and government agencies.

Massive Cyberattack Hits Organizations Around Globe — An aggressive wave of cyberattacks has hit companies and public institutions around the globe, causing international havoc and bringing many services to a standstill. The cyberextortion attempt appeared to use stolen software developed by a U.S. spy agency.

What You Need to Know About Ransomware — What is ransomware? How does it infect your computer? How is the U.S. government’s National Security Agency involved? How to keep your computer safe.

Global Cyberattack Fuels Concern About US Vulnerability Disclosures — A global cyberattack on Friday renewed concerns about whether the U.S. National Security Agency and other countries’ intelligence services too often horde software vulnerabilities for offensive purposes, rather than quickly alerting technology companies to such flaws.

Companies Affected by Global Cyber Attack — A global cyber attack on Friday affected British hospitals, government agencies and companies, such as FedEx Corp., Telefonica SA, Portugal Telecom and Telefonica Argentina, in 99 countries, with Russia, Ukraine and Taiwan the top targets.

Don’t Click: What Is the ‘Ransomware’ WannaCry Worm? — What is so special about WannaCry?

Don’t Click: What Is the ‘Ransomware’ WannaCry Worm?

Malicious software called “ransomware” has forced British hospitals to turn away patients and affected Spanish companies such as Telefonica as part of a global outbreak that has affected tens of thousands of computers.

How does it work?

WannaCry — also known as WanaCrypt0r 2.0, WannaCry and WCry — is a form of “ransomware” that locks up the files on your computer and encrypts them in a way that you cannot access them anymore.

How does it spread?

Ransomware is a program that gets into your computer, either by clicking on the wrong thing or downloading the wrong thing, and then it holds something you need to ransom.

In the case of WannaCry, the program encrypts your files and demands payment in bitcoin in order to regain access.

Security experts warn there is no guarantee that access will be granted after payment. Some ransomware that encrypts files ups the stakes after a few days, demanding more money and threatening to delete files altogether.

There are different variants of what happens: Other forms of ransomware execute programs that can lock your computer entirely, only showing a message to make payment in order to log in again. There are some that create pop-ups that are difficult or impossible to close, rendering the machine difficult or impossible to use.

Where has it spread?

British-based cyber researcher Chris Doman of AlienVault said the ransomware “looks to be targeting a wide range of countries,” with initial evidence of infections in at least two dozen nations, according to experts from three security firms.

The broad-based ransomware attack has appeared in at least eight Asian nations, a dozen countries in Europe, Turkey and the United Arab Emirates and Argentina, and appears to be sweeping around the globe, researchers said.

What is so special about WannaCry?

WannaCry is not just a ransomware program, it is also a worm.

This means that it gets into your computer and looks for other computers to try and spread itself as far and wide as possible.

Ransomware has a habit of mutating, so it changes over time in order to find different ways to access computers or to get around patches (operating system updates that often include security updates). Many security firms are already aware of WannaCry in past forms and most are looking at this one right now to see how it might be stopped.

Several cybersecurity firms said WannaCry exploits a vulnerability in Microsoft and that Microsoft patched this in March. People don’t always install updates and patches on their computers, and so this means vulnerabilities can remain open a lot longer and make things easier for hackers to get in.

It exploited a vulnerability in the Windows operating system believed to have been developed by the National Security Agency, which became public last month. It was among a large number of hacking tools and other files that a group known as the Shadow Brokers released on the internet. Shadow Brokers said that they obtained it from a secret NSA server.

The identity of Shadow Brokers is unknown, though many security experts believe the group that surfaced in 2016 is linked to the Russian government.

The NSA and Microsoft did not immediately respond to requests for comment.

What You Need to Know About Ransomware

An aggressive wave of cyberattacks hit companies and public institutions around the globe Friday, causing international havoc and bringing many services to a standstill. Computers were locked up and users’ files held for ransom when dozens of countries were hit in a cyberextortion attack that targeted hospitals, companies and government agencies.

What is ransomware?

Ransomware is a type of malware that attempts to extort a computer user for money. In some cases, the ransomware encrypts certain files and holds them hostage. In other cases, as happened Friday, it locks a user out of their entire computer system until a ransom is paid. Some ransomware that encrypts files increases the stakes after a few days, demanding more money and threatening to delete files altogether.

Steps of ransomware infection

A ransomware infection usually takes these five steps.

1. The user downloads malware from an infected website or email.

2. The initial malware hijacks the user’s browser and redirects it to a malicious site.

3. Part of the malware, called an exploit kit, looks for vulnerabilities in the user’s system.

4. Once a vulnerability is found, a malicious payload is downloaded onto the victim’s computer.

5. Then the malware calls home with sensitive data from the user’s computer. In the case of ransomware, the malware attempts to extort the user for money.

The ransomware program that spread Friday is not just malware, it is also a worm. This means that the malware gets into a computer and looks for other computers to try and spread itself as far as possible.

Do ransomware attacks generate money for the hackers?

Yes, they can. A hospital system in Los Angeles paid about $17,000 earlier this year following an attack that blocked hospital employees from using email and other forms of electronic communication by using encryption to lock them out of the system. The hackers even set up a help line to answer questions about paying the ransom.

Security industry experts say such attacks are becoming more prevalent, but are rarely made public.

How is the NSA involved?

The hackers appear to have used a technique that was discovered by the National Security Agency and was leaked online in April by a group calling itself the Shadow Brokers.

The malware is exploiting a flaw in Microsoft software. Microsoft created a patch to fix the flaw earlier this year, but not all businesses have updated their operating systems.

Who carried out the attack?

Investigators are pursuing information, but have not said if they have any strong leads. Officials say they believe the attack is the work of criminals and not a foreign government. The original hacking tool was apparently stolen from the NSA and leaked online by the Shadow Brokers, but officials do not know who that group is or whether they carried out this attack.

How to keep your computer safe

Microsoft released a patch in March that fixes the specific vulnerability exploited in this attack. The U.S. Department of Homeland Security is urging people to take three steps.

1. Update your systems to include the latest patches.

2. Do not click on or download unfamiliar links or files in emails.

3. Back up your data to prevent possible loss.

Companies Affected by Global Cyber Attack

A global cyber attack on Friday affected British hospitals, government agencies and companies in 99 countries, with Russia, Ukraine and Taiwan the top targets, security software maker Avast said.

Hacking tools widely believed by researchers to have been developed by the U.S. National Security Agency that were leaked online last month appear to have been leveraged to launch the attacks.

Around 1,000 computers at the Russian Interior Ministry were affected by the cyber attack, a spokeswoman for the ministry told Interfax.

Some of the companies affected:

FedEx Corp

Telefonica SA

Portugal Telecom

Telefonica Argentina

Massive Cyberattack Hits Organizations Around Globe

An aggressive wave of cyberattacks has hit companies and public institutions around the globe, causing international havoc and bringing many services to a standstill. The cyberextortion attempt appeared to use stolen software developed by a U.S. spy agency.

One of the first and worst attacks was aimed at Britain’s National Health Service. A wave of crippling ransomware hit dozens of hospitals across the country Friday, prompting the NHS to declare a “major incident.” Some hospitals diverted ambulances and canceled surgeries as a result of the attack, which blocked doctors’ access to patients’ files.

Ransomware is a type of computer malware, software that has a malevolent intent, that infects a target system, locks and encrypts all files, and then demands a cash payment from the victim in return for reversing the encryption.

A researcher at the Finnish cybersecurity company F-Secure said Friday’s apparently coordinated attacks were “the biggest ransomware outbreak in history,” The Associated Press reported. An analyst at another cybersecurity firm, Veracode, said the rapid spread of attacks pointed to the involvement of criminal organizations.

45,000 attacks in 74 countries

The international cybersecurity firm Kaspersky Labs, based in Russia, said it recorded 45,000 attacks in 74 countries. The worst hit by far was Russia, with serious problems also reported by computer networks in Taiwan, India and Ukraine.

The Russian Interior Ministry, which oversees police throughout the world’s largest country, at first denied it had been hacked, but later admitted about a thousand of its computers had been penetrated.

There was no immediate word on who carried out the cyberattacks, and it was not known whether any of the victims paid any ransom Friday.

The demands reportedly were for relatively trivial sums — the equivalent of $300, paid in bitcoin, a digital currency. But in past attacks, the payment demands multiplied to much larger sums in short order. Bitcoin payments can be difficult if not impossible to trace.

The ransomware used Friday was labeled with various names — WannaCryptOr, WannaCry or WCry — but all appeared to operate in a similar way. They gained entry to targeted computer systems by exploiting a vulnerability in Microsoft computer operating systems that was discovered and developed by the U.S. National Security Agency.

The security hole, known as “EternalBlue,” was stolen from U.S. government computers and disclosed on the internet earlier this year by a group known as TheShadowBrokers.

Microsoft fixed problem in March

Microsoft issued software patches to close the vulnerability in its operating systems two months ago, but many computer systems around the world have not yet been updated, or instead rely on older equipment that remains vulnerable to attack.

Security experts said the ransomware encountered Friday is a self-replicating piece of software that spreads from computer to computer as it finds systems that have not been shielded from intrusion. The malware enters large organizations’ computer networks, such as those at British hospitals, when an employee clicks on an innocent-appearing attachment to open the file, and thus releases the ransomware.

British Prime Minister Theresa May said it was clear that her nation’s problems were part of a wider international attack that had many victims.

China also was targeted by the unknown computer hackers, and the U.S. parcel delivery firm FedEx said its operations were hit. In Spain, telecommunications giant Telefónica was one of the early victims, and employees of MegaFon, one of the largest cellphone companies in Russia, said they also were hit.

NSA technique used

Computer experts said the ransomware did not to appear to be very sophisticated, but the way in which it spread, using the intrusion technique developed by NSA, clearly was. They noted the ransom demands that flashed onto users’ screens were in dozens of languages, indicating the attack had been well planned and coordinated.

Ransomware attacks and other computer intrusions, such as the hacking incident that unfolded in France last week on the eve of that country’s presidential election, are on the rise throughout the world.

Last year, a hospital in Los Angeles, California, said it paid a $17,000 ransom to regain control of its computers from hackers.

Ideological Divide Over Abortion Again Affects US Foreign Aid

Among the first executive actions at the White House this year, President Donald Trump reinstated a law that bans any U.S. aid to international organizations that support the practice of abortion.

Trump’s memorandum on the “Mexico City policy” reversed one aspect of U.S. foreign aid policy that had been in effect under former President Barack Obama. It changed the way U.S. financial assistance is distributed internationally, and most likely will affect the lives of many women in developing countries.

The “Mexico City policy” dates to 1984, when then-President Ronald Reagan declared it at a population conference in the Mexican capital. Opponents call the U.S. prohibition on aid to groups that perform or actively promote abortion as a method of family planning a “global gag rule.”

U.S. foreign aid practices have switched back and forth several times since 1984; aid was barred to pro-abortion-rights groups whenever a Republican president was in power, then was reinstated when a Democrat controlled the White House.

WATCH: Reaction to Trump’s ‘Global Gag Rule’

Abortion stance affects aid

The political divide between the two major U.S. political parties is based on a fundamental issue: Republicans consider abortion an assault on human life, and most pledge to resist it in every way possible; Democrats say a woman should have the right to choose whether to terminate a pregnancy, for financial or personal reasons, and that the decision should not be directed by government.

The deep ideological divide over abortion affects many aspects of American politics, and certainly permeates considerations about U.S. foreign aid.

“The guiding principle for our policy,” said Melissa Israel of the conservative Heritage Foundation, “really needs to be rooted in the respect for the most important fundamental human right of all, and that’s the right to life.”

Restoring the “Mexico City policy” was expected when a Republican administration took over this year, following eight years of Democratic control of the White House. What was not expected was how vigorously Trump would expand the scope of the anti-abortion rule.

Trump policy affects $9.5 billion

He broadened the policy to affect about $9.5 billion in U.S. global health aid, said Amanda Klasing of Human Rights Watch — funds that would have been destined for programs to combat HIV/AIDS, to promote maternal and child health and to prevent childhood diseases.

Organizations working on AIDS, malaria, or maternal and child health will have to make sure that none of their programs involves so much as an abortion referral.

The Heritage Foundation’s Israel disagrees with the notion that Trump’s action has greatly expanded the effect of Republicans’ anti-abortion principles.

“We are not cutting funding for family planning services or for women’s health,” she said. “We are saying that if you want to partner with the United States, then there are some fundamental things you have to agree to as a condition to receiving these funds.”

Ban on abortion information, too  

Not-for-profit groups hoping to get U.S. funds to support their work around the world must not perform abortions or provide any information about them, even if they use their own funds, from nongovernment sources, for abortion services.

Opponents say this will have a chilling effect on women’s health.

“It means,” said Klasing of Human Rights Watch, “that when a doctor sits down with a woman, if she has a health complication and she’s entitled under her local law to access a safe abortion, that doctor cannot give her a referral, or provide her information she needs to take care of herself.”

In rural areas of developing countries, a physician often takes care of a variety of medical needs, including providing information about reproductive health. Such medical practices would be proscribed from receiving any U.S. assistance. Advocates cite research that has shown family planning services result in fewer unplanned pregnancies, fewer maternal deaths and fewer abortions.

56 million abortions worldwide each year

The World Health Organization estimates that approximately 56 million abortions take place every year worldwide. More than half of those are in developing countries.

“Trump’s global gag rule will have a direct and devastating effect in Kenya and sub-Saharan Africa in several ways,” said Liza Muringo Kimbo, the director in Kenya for Ipas Africa Alliance, a nonprofit group whose principal goal is advocating for safe abortion and reforming laws that harm women.

The current U.S. policy “will lead to more unwanted pregnancies,” Muringo Kimbo said. “It will lead to more unsafe abortions, increased deaths of women and young women, and even increased numbers of newborn deaths.”

Muringo Kimbo noted that her predictions have been borne out in the past, whenever a Republican administration in Washington reinstated the “Mexico City policy.”

Other countries have begun their own initiatives to counter the impact of U.S. anti-abortion policies. The Dutch have created the “She Decides Initiative,” and in Britain, an upcoming conference, “Family Planning 2020,” will try to bring together donor and recipient countries.