Congressional Overlook: The Snubbed Victims of Labor Trafficking


By: Daniel Schneider

In a seemingly rare showing of bi-partisan cooperation the 114th Congress has shown its ability to work together through support for a number of bills affecting United States domestic human trafficking legislation. It’s important to understand what exactly human trafficking is before focusing on what is being done to end it. US law defines “severe forms of trafficking in persons” in two parts, sex trafficking and labor trafficking. Sex trafficking, which exists when “a commercial sex act is induced by force, fraud, or coercion, or in which the person induced to perform such an act has not attained 18 years of age.” Labor trafficking which is “the recruitment, harboring, transportation, provision, or obtaining of a person for labor or services, through the use of force, fraud, or coercion for the purpose of subjection to involuntary servitude, peonage, debt bondage, or slavery.”

While definitions of trafficking may vary, and other terms, such as modern slavery, are often used to describe the exploitation of persons, under domestic law, the definition above is currently used to describe this exploitation. It is also important to note that US trafficking law does not require a victim to be physically transported from one location to another to be considered a victim of trafficking.

Human trafficking is a global problem that affects an estimated more than 20 million people worldwide. In the United States this number is nearly 18,000 people trafficked into the United States each year with the number of children, youth, and other vulnerable groups at risk of exploitation estimated to be 244,000. While those numbers are important to understand the scope of the problem, it must be noted that identifying the total number of people currently suffering as victims of human trafficking is incredibly difficult especially because of the covert nature of trafficking.

In light of this problem, Congress in the last decade has passed legislation to increase protection for victims of trafficking in the United States. Bills such as the Trafficking Victims Protection Act, subsequent reauthorizations, and a handful of other laws which make up the bulk of US domestic legislation on human trafficking provide these protections. This legislation focuses US efforts to fight trafficking in a number of areas, such as, protection for victims, investigation and prosecution of trafficking offenses, and education of the public.

In the last session of Congress a number of bills were proposed and passed in an effort to increase protection and services for victims of trafficking as well as to further protect vulnerable groups from exploitation. These bills eventually died in the Senate, however, in the 114th Congress the attempt to strengthen US trafficking law found new life. Many of the bills going through Congress this year, focus specifically on child sex trafficking. A number of these focus on improving child welfare systems to better identify victims of sex trafficking, as well as strengthening services for runaway and homeless youth to improve prevention methods by protecting vulnerable youth from becoming victims.

While these improvements are certainly welcome, as any effort to end human trafficking would be, some claim more needs to be done, specifically for other types of trafficking victims. Victims of international and domestic labor trafficking do not receive nearly the same coverage in these bills as child sex trafficking does. While sex trafficking receives more attention, not only from the media, but also in legislation, labor trafficking, in fact, comprises the majority of human trafficking. Victims of labor trafficking in the US are often threatened with violence, deportation, often suffer from unpayable levels of debt, and other forms of coercion. Victims of labor trafficking are often susceptible to being exploited because of vulnerabilities such as immigration status, poverty, and a lack of strong labor protections.

While the new Congress’ focus on ending trafficking is laudable, as is their willingness to work together in a bi-partisan manner to end trafficking, since most of this effort has been spent on sex trafficking rather than labor trafficking. This is concerning because, as mentioned above, most victims of trafficking are victims of labor trafficking, not sex trafficking. Congress should continue to strengthen domestic trafficking legislation. Strong US domestic trafficking laws would set an example for other nations around the world, especially countries which the US State Department considers not in compliance with standards the US has set for combatting trafficking, as reported in the Trafficking in Persons Report published each year. However, more than only addressing sex trafficking, Congress also needs to focus more on labor trafficking and provide a level of services and protections commensurate with the scope of labor trafficking in the US and worldwide . Congress cannot afford to overlook such a significant portion of human trafficking victims and should seek to support all victims by offering protection and services equal to the needs of the victims.

Could SCOTUS’s Rehearing of Lethal Injections after Botched Executions Reverse Years of Death Penalty Jurisprudence?

By: Rachel Bond

Courtesy of takomabibelot CC BY 2.0

Courtesy of takomabibelot CC BY 2.0

The death penalty has been a topic of fierce debate ever since it was reinstated in the United States in 1977. The Supreme Court of the United States is about to hear yet another case regarding the death penalty, but this time the methods of lethal injection have changed. It is now a question of whether lethal injections as they are performed now are humane anymore. After botched executions in Oklahoma, Arizona, and Ohio, the court of public opinion has begun using strict scrutiny when it comes to lethal injection and the death penalty in general. It is uncertain whether the Court will take this approach in the upcoming Glossip v. Gross case.

Longstanding arguments exist both for and against the death penalty. Some of the most typical in favor of the death penalty are deterrence, retribution, and costs. There is no definitive study proving that the death penalty deters murder, nor that it encourages it. Retribution is a traditional argument, and a difficult one to rebut because you cannot quantitatively demonstrate satisfaction through avengement when someone is put to death in the same way you can measure the costs of the death penalty. However, many studies on costs have shown that cases involving the death penalty are much more costly than those where the death penalty is not on the table. Additionally, one thing seems prevalent upon a basic search in favor of the death penalty: there are very few credible websites advocating it. While there are many studies that address the validity of the death penalty, a lack of direct advocacy on the Internet might be a reflection on society’s view as a whole. When searching for information on the death penalty, putting no bias on the search terms, most of what comes up is opposition. Some of the most typical arguments opposing the death penalty are that there is no proven deterrence effect, it risks executing innocent people, and it is a waste of taxpayer money. These arguments address the lack of evidence regarding deterrence, and the costs involved. The risk of executing innocent people is mostly abstract because often there is no way to prove someone’s innocence after they are dead.

However, according to studies conducted by the American Civil Liberties Union, there have been 140 people exonerated from death row since 1973 after being proven innocent. The ACLU and other death penalty opponents feel this number speaks to the number of people who may have been executed before they could be exonerated, and that the risk of executing innocent people is just too great.

Recently, the United States has changed the lethal injection procedures from drugs that had been used since the 1970s to a new drug – midazolam. It is still part of a three-drug cocktail, but unlike the old drug, midazolam has no anesthetic properties. It is listed as an anesthetic agent, but never as an anesthetic itself. However states are now using it in place of an anesthetic before administering extremely painful drugs in lethal injections. States have had to switch their procedures due to hostility toward capital punishment in Europe, where a ban has been imposed on exporting drugs used for lethal injection. Before their use, doctors were already listing the possibly painful deaths the inmates would be experiencing. Their warnings beg the question whether our “humane death penalty” is actually carried out inhumanely.

The doctors’ warnings turned out to be at least partially correct. Around one third of lethal injections using midazolam have had “extremely troubling problems.” Although the drug has been successfully used in states such as Florida, executions in Oklahoma, Arizona, and Ohio have shown just how painful using midazolam can be. In Oklahoma, Clayton Lockett’s death took 43 minutes after midazolam was administered – a long painful death during which he was moving and making sounds. In Arizona, it took Joseph Wood two hours to die after being injected with midazolam – fifteen separate times – all the while gasping and snorting. In Ohio, Dennis McGuire gasped and struggled for ten minutes before finally dying 25 minutes after the drugs were injected.

Oklahoma wants to use midazolam again to execute three inmates. A fourth was executed in January after the Supreme Court denied a stay before finally granting cert to the case in which he was a party. In order to grant a stay, five votes of the Supreme Court are needed. However, in order to grant cert, only four votes are needed. Thus, in a case such as the Glossip v. Gross case, one of the petitioners may be denied a stay and be executed before his case is eventually granted cert. However, the other three inmates are going forward with the case. In light of the botched executions, the Court has decided to take another look at lethal injection after previously upholding it in 2008. Due to the botched executions, the three inmates’ cases are being heard together to decide whether the use of midazolam is a violation of the Eighth Amendment to the U.S. Constitution. All three inmates were convicted of first-degree murder due to admittedly heinous crimes, and were all denied a motion to stay their executions pending an appeal of the District Court, which also denied the motion. The inmates wanted the stay so their case could be decided on the merits.

The Supreme Court has granted cert to look at three issues:

(1) Whether it is constitutional for a state to use a drug that has no pain-relieving properties and cannot reliably produce unconsciousness, and whether there is an unacceptable risk of pain and suffering during lethal injection if the person is conscious;

(2) Whether the standard applies in the previous lethal injection case applies here, when the state is not using protocol similar to that case; and

(3) Whether a prisoner must establish alternative formulas for lethal injection when challenging protocol.

It is important to note the history of Supreme Court death penalty cases, which show that the Court has consistently upheld the requirement that a method not inflict “unnecessary or wanton pain” upon the inmate under the objectively intolerable test.

While the Court has previously ruled lethal injection as permissible, it was with regards to a different drug. Under the reign of this new drug regime supplant the prior, the Court must reevaluate its stance on lethal injection. It must ask important questions about the risk of pain and the humaneness of the treatment. It must look at how the law is treating death row inmates. Its ruling could be the first step toward a criminal justice system without capital punishment.

Hack Attack: President Obama’s Latest Executive Order to Preserve America’s Networks

By: Jeb Harmon


“Hacker Rene” Courtesy of Ivan David Gomez Arce CC BY 2.0


In December of 2014, Sony Pictures Entertainment turned to the Federal Bureau of Investigation (FBI) for protection and answers after North Korea allegedly targeted the company following the release of the movie “The Interview,” a comedy depicting two American journalists tasked with killing North Korea leader Kim Jong-un. The hackers leaked compromising emails between high level Sony executives, which eventually prompted Sony Chair Amy Pascal to resign this February. The hackers threatened the public at large by sending the following message:  “The world will be full of fear. Remember the 11th of September 2001,” which led many theaters to cancel the showing of the film.  The FBI traced the source of the attack to a group called the Guardians of Peace, which the FBI believes is linked to North Korea.  While the North Korean cyber-attack on Sony was a unique attempt to cripple a Hollywood powerhouse, there were more than 1,500 data breaches on private businesses and governments worldwide in 2014, a 50% increase from the previous year. The growth in cyber attacks is extremely troubling, given the amount of sensitive information that individuals store on the Internet. The White House warns that “because of the interconnected nature of the Internet, no one is isolated from these [cyber] threats.”

On Friday February 13, 2015, President Obama responded to a greater need for collective action against cyber-threats by signing  Executive Order 13587—Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information. This Executive Order will enable companies to work alongside the federal government in order to identify and to protect themselves as well as the private sector from cyber threats, by creating a framework that encourages voluntary and expansive information-sharing.  The Order calls for a voluntary information-sharing framework in three areas: (i) collaboration in the private sector, (ii) collaboration between private businesses and the federal government, and (iii) privacy and civil liberty protections. The Executive Order prompts the Department of Homeland Security (DHS) to share cyber-threat information with the private sector, and also for private sector companies to voluntarily share such information among themselves.

The President’s Executive Order will promote the sharing of classified, relevant data between federal agencies and private companies. Currently, most private-public sharing is based on a Clinton-era framework, which prioritized information-sharing around various economic sectors—banks, energy and power, telecommunications—that the Clinton Administration believed were crucial to national interest.

In order to create a more flexible approach toward sharing classified cyber security information, the Executive Order calls for the creation and improvement of Information Sharing and Analysis Organizations (ISAOs). These organizations are defined by the Critical Infrastructure Information Act of 2002 Section 212(5), Codified 6 U.S. Code § 131, as “any formal or informal entity or collaboration created or employed by public or private sector organizations,” for purposes of (1) gathering and analyzing critical infrastructure information for understanding security issues, (2) communicating or disclosing critical infrastructure information to prevent or mitigate from the effects of an interference, and (3) voluntarily disseminating such information to government or other entities.  Under the Executive Order, an ISAO can be a not-for-profit community, a membership organization, or a single company, which aims to foster a partnership between the federal government and private businesses based on industry-specific, threat-specific, or even regionally-based information needs.

The U.S. Department of Homeland Security will also work alongside companies to create baseline standards and practices in order to guide the information-sharing between federal agencies and the companies involved. DHS will create a nonprofit to administer these best practice guidelines to ISAOs. A CEO of one such involved company, American Express Chairman and CEO Kenneth Chenault, believes that the Executive Order will improve industry-sharing in general. For example, he explained that American Express tracks over “100,000 attack indicators yearly from various sources, but only 5% come from industry-sharing through [their] ISAC (Information Sharing and Analysis Center) and less than 1% come from the government.”  Currently, the private sector plays a critical role in defending private networks across the United States, and the President believes that this Executive Order will create a framework that allows the federal government and private businesses to work together to thwart cyber-attacks, such as the one the Guardians of Peace launched on Sony.

The Executive Order will streamline signing of agreements with the federal government and will grant DHS new powers with regards to private-public information sharing.  Under the Executive Order, DHS will use the Agency’s National Cybersecurity and Communications Integration Center, which analyzes cyber threats, to serve as the hub from which private businesses can enter into information-sharing agreements with the federal government. In 2014, the DHS center detected some 64,000 vulnerabilities on federal and non-federal systems. (At the time of writing this blog, Congress will continue to fund DHS through the end of the budget year, and as such Congress’s decision quells for now DHS Assistant Secretary for Cybersecurity and Communications Andy Ozment’s fear that a shutdown would weaken the center’s ability to respond to cybersecurity threats).  Lastly, this voluntary creation of common standards includes protections for consumer privacy and civil liberties by requiring that Federal agencies collaborating with ISAOs confirm and receive approval from their senior agency officials for any information-sharing activities.

There has been both support and criticism of the President’s executive action from lawmakers as well as the general public.  From a private sector standpoint, Greg Nojeim, Senior Counsel at the Center for Democracy and Technology, said that the Executive Order’s establishment of ISAOs and accompanying guidelines will allow companies to “know what will be done with the information they share.”  He believes the Executive Order will create trust between the Federal government and the private sector.  Nojem also told Federal Computer Weekly that it was better to have the DHS establish such information-sharing agreements itself, as opposed to the National Security Agency, given the controversy surrounding government surveillance that erupted last year. Some titans of the private sector have already expressed their willingness to share information with the federal government, as Apple, Intel, Bank of America, Kaiser Permanente and Pacific Gas & Electric, among many others, have already committed to signing such information-sharing agreements with the DHS.

However, Mike Brown, a vice president with a security division of EMC Corp., a cloud computing company, believes that  many companies will be hesitant to sign such agreements because the Executive Order does not provide protection from liability. For this reason, Senator Tom Carper (D-Del.) introduced the following legislation, The Cyber Threat Sharing Act of 2015, which would “grant liability protections to companies for sharing cyber threat data.” If passed, the Act could remove some of the concerns companies have regarding liability. Yet there is a weakness with the proposed legislation in that it authorizes any self-certified group of security analysts to act as ISAOs in gathering data, yet the bill provides little oversight over these groups to control for how they would use the data.

In Congress, several lawmakers have also supported the Executive Order as another weapon against cyber attacks. California Representative Adam Schiff, the ranking Democrat on the House Intelligence Committee, praised the President’s efforts to secure America’s public and private networks from cyber attacks and espionage. Meanwhile, Speaker of the House John Boehner, through a spokesman, said that “Unilateral, top-down solutions will not solve America’s cyber problems,” and he urged the President to work with Republicans in Congress to create an information-sharing bill instead of imposing an Executive Order.

Although some members of Congress disagree with the Executive Order, Congress has passed key pieces of cybersecurity legislation in the past, such as three cybersecurity bills which were signed by the President last December, in order to further protect government agencies and private businesses from cyber-attacks attacks: The Federal Information Security Modernization Act of 2014, the National Cybersecurity Protection Act, and the DHS Cybersecurity Workforce Recruitment and Retention Act.  Congress’ past bipartisanship with regards to cybersecurity shows that this is perhaps a field where Congressional gridlock is not as contentious as it is for other major policy areas.

In the wake of the Edward Snowden leak on the National Security Administration (NSA), the Obama Administration’s tapping of journalists’ cell phones, and the NSA bugging of world leaders’ phones, the Obama Administration has many steps to take in earning the public’s trust in order to undergo massive data collection in the name of national security. As the Executive Order calls for voluntary sharing of information between the private and public sector, perhaps many companies will be less willing to share such information until the Administration can assure them that such data sharing is not merely window dressing for government surveillance of U.S. companies.  Yet, after the alleged North Korean attack on Sony Pictures, it remains clear that a fine line must be drawn somewhere between allowing the government to defend against cyber attacks and preventing the government from data collecting from (spying on)  private organizations.

The President’s Executive Order and Congress’s proposed bills may be trying to draw such a line for the first time. However, it is up to the American People and, ultimately, Congress to ensure that civil liberties will be protected when the final line is drawn.


Could The Visa Waiver Program Be An All Access Ticket For Terrorists? A Look Into The Program’s Problems & Potential Solutions

Josh Stewart, CC BY 2.0

Josh Stewart, CC BY 2.0

By: Mahira N. Khan

The January Paris attack against French magazine, Charlie Hebdo, the ISIS revolution, and the increased threat of foreign terrorist fighters (FTFs) question whether the Visa Waiver Program (VWP) threatens U.S. national security.  Many U.S. lawmakers demand changes to the current rules to control the entry of foreigners into the U.S. without visas, relying on the fear that terrorists may take advantage of the program to carry out future attacks within U.S. borders.

The VWP is a program of the U.S. Government administered by the Department of Homeland Security (DHS) in the mid-1980s that enables U.S. citizens or nationals of designated countries to travel to the U.S. for tourism or business up to ninety days without obtaining a visa.  Thirty-eight countries currently participate in the VWP, including the United Kingdom, Holland, Germany, and Canada.  The program allows up to nineteen million visitors to pass through U.S and the only thing a VWP traveler needs to do before traveling to the U.S. by air or sea is fill out an Electronic System for Travel Authorization form (ESTA) online. The form only costs fourteen dollars and automatically presumes that the applicant’s statements about prior visa denials and legal infractions are true.   When traveling via the VWP, travelers pass through ports of entry with screening.  The only barrier to U.S. entrance is a Customs and Border Protection (CBP) officer at the port of entry, who stamps the passport with or without minimal questioning and with no means of verification.

The program was conceived in a time when citizens of “traditional European allies were not viewed as threats.” However the program took a turn after the September 11th attacks when convicted September 11th plotter and French national, Zacarias Moussaoui, boarded a flight to the U.S. via the VWP.  Similarly, British national Richard Reid (the “shoe bomber”) evaded security checks that would otherwise have been performed for non-VWP travelers.  Perpetrators of the 1993 World Trade Center attacks Ahmed Ajaj and Ramzi Yousef also entered the U.S. through the VWP using photo-substituted Swedish and British passports.

The Charlie Hedbo shootings that killed seventeen people in France and the surge of foreign fighters from Europe traveling to Syria to join the surging Islamic State group have prompted bipartisan legislative efforts by U.S. politicians who call for changes to the VWP. Senator Feinstein, a leading Senate voice on national security, plans to introduce legislation that would help strengthen the VWP’s security.  While her office did not provide any details of the proposed plan, she commented on the threat of sleeper cells posed by the current state of the VWP, stating, “[terrorists] can come back from training, they go through a visa waiver country and they come into this country … we have a big problem here.”  Representative Michael McCaul, Chairman of the House Homeland Security Committee, voiced similar concerns and recently co-sponsored legislation that would require DHS to consider additional steps to screen travelers more thoroughly.  The Homeland Security Committee is also investigating the VWP as a part of a “broad probe” into whether the Obama Administration has done enough to stem the flow of foreign fighters returning back to their European homes from Syria, and then potentially travel to the U.S. without a visa and carry out attacks here.  Some are even in favor of abolishing or suspending the program entirely.  In September, Hawaii and Pennsylvania, introduced bills that would suspend the VWP for countries who nationals have joined or been trained by the Islamic State.

The main concern the U.S. faces, as addressed by Law Professor Nathan A. Sales, is the “profound and growing threat from radicalized Europeans.”  There is an ever-increasing fear that extremists who have received training in Iraq and/or Syria and since returned back to Europe may eventually try slipping into the U.S. undetected through the VWP.  Reports estimate that at least 3,000 of the Islamic State’s fighters come from Europe, with an estimated 1,000 from France.  However, suspending or abolishing the program is not an option even with these statistics.  U.S. authorities and the aviation industry worry that discarding the VWP would be problematic as it plays an important role in economic growth and “represents an important element of lawful commerce” between the U.S. and its international partners.  According to studies, in 2013 there were over seventy million tourists in the U.S. who added about $181 billion to the U.S. economy, spending around $4,500 per day while traveling in the U.S.

Suspending or abolishing the VWP would also discourage tourism almost entirely.  Obtaining a visa is often very difficult and expensive.  To obtain a visa, a traveler would have to visit a U.S. consular office, fill out lengthy documents and have a personal interview, and then pay several fees on top of a $160 fee for each visitor visa.  Moreover, the fees are non-refundable in the event the visa is denied.  In other words, cancelling the VWP would do more damage to the U.S. than it would provide protection, some experts say.

Homeland Security Secretary Jeh Johnson agrees and says, “the program is too valuable to discard” and offers a different solution, which provides: “To deal with the foreign fighter problem potential, the foreign fighter threat presented now globally, we need to develop more robust information sharing with our key counterterrorism allies overseas to share information about individuals of suspicion.

In 2007, Congress enacted legislation that called on VWP-member nations to enter into various security agreements; however, a vast majority of the thirty-eight member nations never signed on to the agreements.  The bill, known as the Implementing Recommendations of the 9/11 Commission Act of 2001, required member nations to enter into the following agreements:

  1. Homeland Security Presidential Directive (HSPD)-6: Requires member nations to share watch list information on “individuals known or appropriately suspected to be or have been engaged in the conduct constituting, in preparation for, in aid of, or related to terrorism” and then use that information in screening and protective processes
  2. Preventing and Combatting Serious Crime (PCSC) Agreement: Requires member nations to mutually share criminal history information and biometric data (i.e., fingerprints, and DNA) for law enforcement purposes
  3. Lost and Stolen Passports (LASP) Agreement: Requires nations to report, or make available through INTERPOL or other means as designated by the Secretary of Homeland Security, any information about the theft or loss of passports within a “strict time limit”

These existing intelligence and information sharing agreements should be fully implemented as originally intended.  Additionally, there should be additional protocols that allow authorities to identify “unknown threats,” or travelers who have managed to escape watch lists.  This would involve sharing airline reservation data or travelers who have traveled between VWP countries and “hot spots” such as Iraq and Syria.  Law Professor Nathan Sales believed that the Charlie Hebdo gunman Said Kouachi could have been tracked down through this measure because Kouachi was known to have traveled from France to Yemen through Oman in 2011.

The increased FTF threat also prompted action by the United Nations.  In September 2014, the U.N. Security Council unanimously passed Resolution 2178, which requires member nations to, among other things, implement effective border controls and controls on issuance of identity papers and travel documents, implement thorough measures to prevent counterfeiting and forged identity and travel documents, require airlines to provide advance passenger information to appropriate national security authorities to detect FTF movements, and improve international cooperation and information sharing for purposes of identifying FTFs and their travel patterns.

Stricter enforcement of the 2007 legislation along with the U.N. Resolution could make it possible to track the movements of known and potential threats.  Increased information collection and sharing will allow member nations to recognize travel patterns consistent with those of FTFs.  By tracking down these travelers and affording a little bit more scrutiny at the airports, there would be no need to abolish the VWP.  The U.S. will avoid exposing itself to great economic harm and keep FTF threats out of its borders.


Wrong Move: How the President’s Actions have Helped Create a More Dangerous Russia.

ONotkiLBy Victor Paduchak

It has been said that one of the most prolific and memorable images of 2014 is the Before and After take of Ukraine’s Independence Square. On the global scale, 2014 was arguably one of the most dangerous and violent years in recent memory. The world witnessed everything from the spread of Ebola, the rise of ISIL in the Middle East as well as the United States’ response, to Taliban bombings of Pakistani schoolchildren, the ongoing Syrian civil war, the kidnapping of 185 women and children by Boko Haram, and the crisis in Ukraine.

The armed conflict in Ukraine has ravaged the country for almost a year now. Beginning with the Russian invasion and hostile annexation of Crimea in February of last year, the conflict quickly escalated when separatist factions of eastern Ukraine wanted to break off and forge stronger ties with Russia. The war in eastern Ukraine has claimed the lives of more than 5600 people, and displaced 1.5 million more. A shaky ceasefire between the Ukrainian government and separatist forces established in September has been completely shattered in recent months, with recent peace talks between the sides coming to a full halt.

Behind this conflict lies a former superpower: Russia. In recent months, through routine denials of all accusations of its continued support of the war, Russia sent thousands of their own troops into Ukrainian territory, as well as allowing countless numbers of volunteers through their borders to fight a “holy war” on behalf of the “Russian Empire.” Evidence has surfaced showing that Russia had planned an invasion of Ukraine even before the previous government collapsed last February. Despite the agreement of a recent ceasefire agreement, both sides have been slow to fulfill their promises, with fighting continuing and a key strategic town, Debaltseve, recently falling under rebel control. While there has been minor progress in fulfilling the terms of the recent Minsk ceasefire deal, the conflict, continually escalating, has no foreseeable end in sight.

Since the beginning of the conflict, the United States has issued a number of executive orders and legislation to both aid Ukraine financially, promising $1 billion in loans, and sanctioning sections of the Russian economy and specific personnel close to Vladimir Putin. As a result, combined with the recent dip in oil prices, the economy in Russia has grounded to a near halt. Yet, the United States has failed to dissuade Russia from its continued involvement in the proxy war. Despite recent news such as the extension of European Union sanctions against Russia, the fighting continues on in Ukraine, with Russian troops and volunteer supporters continuing to flood over the border.

President Obama continually emphasizes that “it’s not a new Cold War,” and that sanctions are the key to forcing Russia to back down. In his recent State of the Union speech, the President mentioned Russia basically in passing, and only emphasized that we must “stay the course” in our current answers to Russian aggression. By this logic, it would seem that by now, with the Ruble almost completely devalued, Russia would be considering pulling out of Ukraine and ending their proxy war in the face of total economic collapse. And yet, the war rages on.

One major mistake that President Obama made in his calculations is exactly how far Putin, and the Russian people, are willing to go to see this conflict through to the end, the impact his sanctions are having. 76 percent of the Russian people consider state media to be the trustworthy news source, with only 5 percent saying that Western media is trustworthy, Gallup polls have shown. Russian approval of Putin skyrocketed by nearly thirty percent in the last year to an all-time high, while favorable opinions of the West simultaneously fell into single digits. Most Russians believe the war in Ukraine was caused by the CIA and Western intervention, in an attempt to cause a collapse of Russia. The economic sanctions imposed on their country only embolden the Russian people, causing them to coalesce around their leader. It paved the way for Putin to win popular support, and to centralize his power and fashion it into a new dictatorship. Recently, an anti-West, pro-Putin demonstration in Moscow drew 40,000 people, as a testament to the dangerous current of thought in Russia today.

With recent sharp comments claiming that Russia is “undermining the global order,” the United States appears to be reconsidering its previous approach, albeit slowly. With the recent Minsk ceasefire agreement shaken, new sanctions against Russia are being considered. President Obama and Secretary of State John Kerry are looking closely at the possibility of supplying arms to the Ukrainian government for defensive purposes. As Ukraine’s air force is mostly eradicated, and with troop casualties mounting daily, this sort of aid is desperately needed. But is it enough? Or is it too little, too late?

There is no question that the situation in Ukraine is a grave one. This is however only a symptom of a larger issue, that of an aggressive and reinvigorated Russia. The events taking place in Ukraine today mirror that of Russia’s invasion of Georgia in 2008, except on a wider, bolder, and deadlier scale. The United States, through its inaction, effectively granted Russia permission to invade a neighboring country, forcibly annex parts of it, all at the cost of a few months, possibly a year of economic and travel sanctions. It is no wonder Hillary Clinton compared Putin to Hitler last year. The continued sanctions that President Obama presses upon Russia does naught but invigorate the Russians against the West, making them more willing to support warmongering, authoritarian dictators and the wars that they are bound to start. The climate in Russia is a strongly patriotic, nationalistic one, with general ire directed toward the West. The President’s continued underestimation of this fact may lead the world down a very dark path in the coming years.

Perhaps President Obama is right in saying that we are not headed toward a second Cold War. However, the President cannot deny there is a growing gap, a rivalry between the East and the West that seems to draw ominous parallels with the Cold War. Russia may not be as powerful as the Soviet Union once was, but it certainly likes to think so, and that can be just as dangerous, particularly when some countries think they could not withstand an attack from it.

Time For The Election Assistance Commission To Staff Up

Courtesy of the University of Iowa

Courtesy of the University of Iowa

By: Tara Schonhoff

Following the chaos of the 2000 elections (uncounted ballots; dangling, dimpled, and pregnant chads; and the Supreme Court choosing the President in Bush v. Gore), Congress passed the Help America Vote Act (HAVA) of 2002 to create some standards and support for state election administrators. HAVA provided funds to states to replace outdated voting machines, it created minimum standards for states to follow, and it created a new federal agency to serve as a clearinghouse for election administration – the Election Assistance Commission (EAC).

The EAC is designed to have two Republican commissioners and two Democrats. Its small size, Silver Spring office, and employees with hands-on experience in election administration evidence the agency was designed to be a pragmatic, less flamboyant tool for furthering election quality.

HAVA’s creation of the EAC fashioned a bipartisan resource of election practices for the states that was unique: aiding each state’s unique election needs through best practices. Congress overwhelmingly passed HAVA with a vote of 362 to 63 in the House, and 92 to 2 in the Senate (only Senators Clinton and Schumer, the current chair of Senate Rules and Administration, voted against it). Unfortunately, only a few years after its creation, the agency quickly lost its commissioners and, thus, its power. By 2011, the EAC’s four commissioner spots were all vacant, and the agency has not been fully staffed since. Left powerless, the EAC has not held a public meeting since 2011 and has stalled Kobach v. EAC in the 10th Circuit Court of Appeals, debating states’ permission to alter voter registration forms. At that time, the House attempted to abolish the EAC altogether. Although that proposal failed, opposition to the agency continues with this year’s House budget proposal attempting to defund the EAC.

President Obama nominated two Democrat commissioners last summer and two Republican commissioners this summer. After returning from this August’s recess, the Senate Rules and Administration Committee finally started to focus on restocking the agency’s commissioners. Disappointingly, this month they failed to reach a quorum following September’s hearing on the Republican nominees, postponing a vote on commissioners yet again. Additionally, after waiting more than three years for a vote on her nomination, Myrna Perez withdrew her name.

Election lawyers predict that especially less experienced partisan nominees may continue to stall EAC progress. The Democrat’s choice of Matthew Butler is particularly unlikely to be confirmed if a vote is held after the Republicans take control of the Senate in January. This choice has already discouraged election lawyers and Democrats who see such partisan picks as another move towards the EAC slipping into gridlock.

The war against the EAC is a microcosm of a national voting war: those fearful of voters losing access or votes going uncounted versus those who fear election fraud and voter impersonation. If commissioners were finally appointed and the EAC remain fully funded, it could be a useful tool for those on both sides of this war.

Concern over voter impersonation has drastically increased the number of states with voter ID laws. In contrast, these laws have received backlash as suppressing votes, even at the Supreme Court level, calling these qualifications “modern poll taxes.” With the EAC’s authority to set minimal state standards for election administrators and serve as a clearinghouse for states to share successful practices, it could preclude the need for voter IDs or at least help maintain voter access to the polls when these laws are implemented.

Paper ballots lost credibility with the 2000 elections, leading many to switch to electronic equipment. But with voting technology changing drastically between election cycles, states need the EAC’s guidance. The EAC is a solution to this problem with its ability to certify voting machines in a market that is often questioned, and its dispersion of state funding for updated voting systems.

EAC nominee Thomas Hicks’ expertise as Senior Elections Counsel on the House Committee on Administration and would-be commissioner Christy McCormick’s time coordinating elections in Iraq and litigating at the DOJ Voting Section are two additional reasons why the Senate should act quickly to finish the nomination process and get the EAC up and running.

Florida’s 2000 ballot fiasco may be forgotten, but a repeat of this disaster is all too possible. The time is ripe for the EAC to staff up and set state standards before the 2016 Presidential election.

Voids left by the Federal Election Commission (FEC)’s partisan gridlock and the Voting Section of the DOJ’s inability to enforce portions of the Voting Rights Act (VRA) following Shelby County v. Holder make the EAC even more important as a voice of consistency in national elections.