cybercrime

Debunking Errors in a Proposed Philippine Cybersecurity Framework

Myopia.

This is the inescapable conclusion one will have upon reading Francis Domingo’s opinion piece in the November 18, 2013 issue of Philippine Daily Inquirer, “Points to consider in securing Philippine cyberspace”. While Domingo raises a valid concern on the continual growth of the cybersecurity threat, his recommendations fail to address it. Worse, if followed, his recommendations may prove disastrous.

 

The Cybersecurity Threat Continuum 

“More people may decide to engage in cyber-attacks because of the low barriers to entry, anonymity and presence of others involved in similar activities.

“Performing various operations in cyberspace is not difficult because the resources and knowledge required to exploit and disrupt infrastructure are modest compared to the requirements of exploiting other domains of conflict such as land, sea, air and even space.

“Any individual with sufficient technical knowledge and has access to information communication technologies can execute cyber-attacks.”

F. Domingo, Philippine Daily Inquirer, November 18, 2013

Domingo points out correctly that cyberattacks will continue to grow in number, scope, and impact; he correctly points out that performing such attacks are less difficult than physical violence, and puts forward a valid observation that anonymity may be a factor in choosing to perpetrate crime or fraud, destruction and disruption, or enter into conflict via cyberattacks over conventional means.

The possibilities available, however, do not constitute a simple menu of choices. Cybersecurity threats are more accurately depicted in a continuum:

cyber-threat

From left to right, the diagram describes two parallel concepts: first, that of actors — from an individual, through loosely-affiliated groups, to large, structured organizations — and, second, that of level of skill — how the increasing availability of skills and/or skilled manpower can be used as resources to plan, execute, and follow-through on a cyberattack.

From bottom to top, the diagram describes the potential damage that can result, especially from a deliberate cyberattack. For instance, the potential damage that can be caused by a prankster will be less than that of a dupe, as the former may be restrained by conscience while the latter is subject to the will of another person or group, who may feel no such restraint. Likewise, it is understandable that organized groups with larger pools of manpower and skillsets, as well as the drive to gain such skills and employ them, will have higher scales of potential damage than amorphous groups or individuals. It is equally interesting that the individuals and groups moving up the potential damage scale can be classed together into fairly distinct sets of motivations for cybercrime and cyberattack, as shown by the right-hand scale.

The cybersecurity continuum is by no means theoretical. Domingo appears to be familiar with the modes of cyberattack that have been used both locally and abroad, as well as the suspected perpetrators. As such, it is strange that Domingo clings to the notion that cyberattacks have limited impact; perhaps we must first define what a cyberattack is.

 

What is a Cyberattack?

In his opinion, Domingo provided no clear definition of a cyberattack. This vagueness may be the culprit of the erroneous premises upon which his arguments are based.

A US National Research Council’s report defines cyberattacks as “deliberate actions to alter, disrupt, deceive, degrade, or destroy computer systems or networks or the information and/or programs resident in or transiting these systems or networks.”[2] Taking off from this definition, an article “The Law of Cyber-Attack” in the California Law Review proposes that a cyberattack “consists of any action taken to undermine the functions of a computer network for a political or national security purpose.”[3]

These definitions are so broad that they seem to conflate cyberattacks and cybercrime. In crafting the Magna Carta for Philippine Internet Freedom (#MCPIF) bill, the group Democracy.Net.PH and other contributors agreed to separate the definitions of cybercrime and cyberattack. The bill defines cyberattack as:

“[A]n attack by a hostile foreign nation-state or violent non-state actor on Philippine critical infrastructure or networks through or using the Internet or information and communications technology.”[4]

The bill includes in the definition of cyberattack as also possibly this:

“[A]n assault on system security that derives from an intelligent threat, i.e., an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system.”[5]

The definition proposed in the #MCPIF acknowledges the cybersecurity threat continuum. This definition will serve as our basis in clarifying the flaws in Domingo’s op-ed piece.

 

A Cyberattack’s Impact Can be Lethal

“[C]yber-attacks have a limited impact on nation-states because the attacks rely on an electromagnetic spectrum, require man-made technology to function, and do not involve lethal action and physical violence.”

F. Domingo, Philippine Daily Inquirer, November 18, 2013

Domingo cites the distributed denial-of-service (DDoS) attack against Estonia in 2007 and the Stuxnet worm — used supposedly targeting Iran’s Natanz uranium enrichment facility and whose escape into the wild in 2010 led to its detection — as examples of cyberattacks. The modes exemplified by the Estonia attack[6] and Stuxnet[7] are similar to the Shamoon malware cyberattack on the state-owned oil firm Saudi Aramco[8], the DDoS attacks on US banks in 2012[9], the cyberattack on South Korean media and banking firms just this year[10], and so on.

It appears that Domingo’s position is that there has been no significant injury, loss of life, nor widespread physical damage to infrastructure. Ergo, damage is “limited.”

This is another shortsighted view.

While it is true that few, if at all, have so far been physically hurt by cyberattacks, the impact is nonetheless significant. The “ILOVEYOU” virus outbreak in 2000, a brainchild of one Onel de Guzman[11], a student of AMA Computer College, affected at the time about 45 million computers worldwide[12] and caused an estimated $10 billion dollars in damage[13]. The scale of damage caused by the ILOVEYOU worm, adjusted for inflation, is on a par with the scale of damage caused by Typhoon Yolanda.[14]

The perceived absence of injury to human beings does not render the damage from cyberattack limited; rather, such makes cyberattacks even more sinister. The disruption of networks that will result in the breakdown of services of government, power, communications, transport, finance, and other critical infrastructure can result in chaos in society. Instead of directly harming the populace, the attacker can create an environment where the populace will be motivated to destroy each other and themselves. Such damage mirrors that caused by enhanced radiation weapons, such as cobalt and neutron bombs, which are designed to kill but leave infrastructure and equipment relatively undamaged.[15]

Still eerily similar to atomic weapons of mass destruction, but to an even more sinister degree, is the ability of an attacker to design and control the degree of damage that is caused by the cyberattack. “Dial-a-yield” is the catchphrase often used to describe the capability to adjust a weapon to a desired scale of damage.

Domingo appears to make the error of failing to recognize that, with a cyberattack, the attacker not only can design the implementation but can practically specify the extent of damage from the narrowest of scopes up to unrestricted levels. Stuxnet was designed to go after a specific piece of equipment. Thus, the damage was limited only to the systems where the equipment was installed. If the global positioning system (GPS) navigation can be subject to an unrestricted cyberattack, which is now considered to be a distinct possibility[16], airplane crashes, ship groundings, and fatal mistaken identity incidents could occur at scales more horrific than simultaneous occurrences of incidents analogous to 9/11, Exxon Valdez, Aeroflot Flight 8381/ СССР-26492, MV Doña Paz/ MT Vector, and Korean Airlines Flight 007 combined.

There is no logical reason to wait until such catastrophic incidents occur, until lives are lost due to the lethality programmed into a cyberweapon, before establishing a robust cybersecurity framework.

 

Cyberattacks Do NOT Require High Technology; Cybersecurity Must Not Be Merely Technology-Centric

“[C]yber-attacks will not be successful if the spectrum is controlled or access to critical networks is blocked by accountable government units.”

F. Domingo, Philippine Daily Inquirer, November 18, 2013

Domingo mentions Stuxnet as a cyberattack; however, he may not be aware that the attack vector of Stuxnet was through the physical connection of an infected USB flash drive to a computer connected to the target network.

This, in hacker parlance, was a “sneakernet” attack. This attack was made via the crudest method of compromising a system — accessing the physical layer. The legal control of the allocation of the usable frequencies within the electromagnetic spectrum (for there is no means at present that can control the electromagnetic spectrum, short of repealing the laws of physics) by no means can prevent a sneakernet attack, or many other modes of attack for that matter. Restricting access to critical networks willy-nilly cannot likewise prevent such an attack since, by using the physical layer as the means of compromising the system, the data link, network, transport, session, presentation, and application layers are effectively bypassed.

Clearly, it is erroneous for Domingo to have posited that cyberattacks are solely technology-dependent, and thus for cybersecurity to be technology-centric.

In ensuring cybersecurity, there are two other aspects that must be considered and implemented. A cybersecurity plan must be based on a holistic combination of physical security, behavioral security, and electronic security means, policies, and procedures; to focus on a single defense aspect or potential threat axis would be analogous to building an iron door for a bank vault whose walls are made of paper.

Domingo has fallen into the trap of seeing a few trees and missing the forest.

 

Cybersecurity is Not Merely a Convenient Buzzword

“Security strategies are not definitive.”

F. Domingo, Philippine Daily Inquirer, November 18, 2013

Given that cybersecurity threats belong in a continuum, and that the actors, their motivations, the degrees of damage intended and programmed, and the level and breadth of skillsets are not one-dimensional – as he erroneously paints them to be – Domingo’s position of a one-size-fits-all approach to securing Philippine cyberspace is untenable.

Cybersecurity cannot be as casually relegated as Domingo proposes. The range of potential threats to the physical security of the Filipino citizen run the gamut of petty crime, organized crime, terrorism (domestic and otherwise), to unfriendly acts of foreign governments; it is well understood that the mandates to protect the life, liberty, and property of each Filipino that are given to the Philippine National Police, the National Bureau of Investigation, and the Armed Forces of the Philippines differ in level of threat and scope of action.

So, too, should be the cybersecurity mandate.

This is the approach taken by the drafters of the Magna Carta for Philippine Internet Freedom. The #MCPIF proposes that the Department of Justice (DOJ), the National Bureau of Investigation (NBI), and the Philippine National Police (PNP) shall be the competent law enforcement agencies to protect Filipino citizens from cybercrime, corollary to their mandates to protect Filipino citizens from non-ICT enabled or perpetrated crimes. Likewise, these law enforcement agencies, supported by other government offices—including the Department of Defense (DND) and the Armed Forces of the Philippines (AFP)—will be tasked with protecting the country from cyberterrorism and cyberespionage. This is no different from the current mandates given to the respective agencies of government to protect the country from terrorism and espionage.

As they are tasked with national defense and the protection of national critical infrastructure, it is therefore likewise logical that that the DND and the AFP will be tasked with national cyberdefense and the protection of national critical ICT infrastructure.

It should be pointed out that while he is correct that the Information Systems Security Society of the Philippines (ISSSP), the Information Systems Audit and Control Association (ISACA), and the Philippine Computer Emergency Response Team (PH-CERT), as well as scholars and government experts, can be resources and have actually been providing technical expertise on cybersecurity as private companies like Symantec, McAfee, and IBM, Domingo is wrong in saying that they can be agents to implement Philippine cybersecurity action and policy. There is no logic in this thinking, as it is analogous to using security guards as frontline troops in internal security operations against the New People’s Army. Security planning, while it may be enriched by inputs from those with the appropriate competencies and skills, is best put together by those who can see the forest and not just the trees.

 

RA 10175 is NOT a Good Basis for a Philippine Cybersecurity Framework

 

“[P]eople must be made aware of the rationale and scope of Republic Act No. 10175 and other laws that protect Philippine cyberspace.”

F. Domingo, Philippine Daily Inquirer, November 18, 2013

There is some merit, however limited, in Domingo’s vague proposals on how to implement cybersecurity for the Philippines, in so far as developing a culture of cybersecurity through education and information campaigns, ensuring resilience of institutions, and the development of multidisciplinary, multistakeholder teams for plans, policies, and programs to promote national cybersecurity. Clear proposals have been presented by the drafters of the Magna Carta for Philippine Internet Freedom and constitute an integral part of the bill.

Unfortunately, Domingo goes astray in promoting Republic Act No. 10175, or the Cybercrime Prevention Act of 2012, as a basis for promoting cybersecurity.

The oft-quoted maxim of Benjamin Franklin, “Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety,” points out the fatal flaw in Domingo’s promotion of the Cybercrime Prevention Act. As the law – fortunately suspended in its application – promotes such assaults into civil liberties such as the right to privacy, the right to due process of law, and the freedom of expression, it cannot be the basis for establishing cybersecurity for the Filipino people.

To be succinct: our rights online are our rights offline. Our cybersecurity thinking must be no different, therefore, from how we think of ensuring our physical security – holistic, properly-calibrated, competent, and rights-based.

To reduce it to vague buzzwords would be to endanger ourselves.

 

Endnotes: 

[1] Engr. Pierre Tito Galla, PECE, is one of the convenors of Democracy.Net.PH, an ICT and civil rights advocacy group that spearheaded the drafting of the Magna Carta for Philippine Internet Freedom. He is a practicing Professional Electronics Engineer with nearly a decade and a half in the information and communications technology sector, and is currently an executive in a Fortune 500 multinational whose networks span the globe.

[2]  Hathaway, et al. “The Law of Cyber-Attack.” <http://www.law.yale.edu/documents/pdf/cglc/LawOfCyberAttack.pdf>.

[3]  Ibid.

[4] Democracy.Net.PH. “Full text of the Magna Carta for Philippine Internet Freedom.” <http://democracy.net.ph/mcpif/full-text/>.

[5] Ibid.

[6] The Associated Press. “A look at Estonia’s cyber attack in 2007.” NBCNews.com. 8 July 2009. <http://www.nbcnews.com/id/31801246/#.Up3wE8RDtXg>.

[7] Kushner, D. “The Real Story of Stuxnet.” IEEE Spectrum. 26 February 2013. <http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet>.

[8] Perlroth, N. “In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back.” The New York Times. 23 October 2012. <http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html?_r=0>.

[9] Ibid.

[10] Waterman, S. “Cyberattack hits South Korea’s banks, media.” The Washington Times. 20 March 2013. <http://www.washingtontimes.com/news/2013/mar/20/cyberattack-hits-s-koreas-banks-media-highlights-r/?page=all>.

[11] Cluley, G. “Memories of the Love Bug worm.” Naked Security. 4 May 2009. <http://nakedsecurity.sophos.com/2009/05/04/memories-love-bug-worm/>.

[12] Ward, M. “A decade on from the ILOVEYOU bug.” BBC News. 4 May 2010. <http://www.bbc.co.uk/news/10095957>.

[13] Landler, M. “A Filipino Linked to ‘Love Bug’ Talks About His License to Hack.” The New York Times. 21 October 2000. <http://www.nytimes.com/2000/10/21/business/a-filipino-linked-to-love-bug-talks-about-his-license-to-hack.html>.

[14] RSJ/ GMA News. “NDRRMC: Yolanda death toll continues to rise, now at 5,759; damage surpasses P35B.” GMA News Online. 5 December 2013. <http://www.gmanetwork.com/news/story/338384/news/nation/ndrrmc-yolanda-death-toll-continues-to-rise-now-at-5-759-damage-surpasses-p35b>.

[15] Snow, D. “Strategic Implications of Enhanced Radiation Weapons.” Air University Review. July-August 1979. <http://www.airpower.maxwell.af.mil/airchronicles/aureview/1979/jul-aug/snow.html>.

[16] Neal, R. “GPS Terrorism: Hackers Could Exploit Location Technology to Hijack Ships, Airplanes.” International Business Times. 29 July 2013. <http://www.ibtimes.com/gps-terrorism-hackers-could-exploit-location-technology-hijack-ships-airplanes-1362937>.

Explanation required, Mr. President

My position regarding what has become Republic Act No. 10175, the Cybercrime Prevention Act of 2012, has not changed since I first went over the Senate version (Senate Bill No. 2796) several months ago: I maintain that it is a deeply flawed law that will not be able to properly address the problems it was ostensibly designed for, including, but not limited to, libel, cyber-bullying, and cyber-prostitution. Of course, back in February, I was content merely to air my anxiety, because I was fairly optimistic that the ill-conceived bill would not prosper, such optimism—or maybe I should say, with the benefit of hindsight, naïveté—being largely rooted in my reluctance to entertain the notion that the denizens of officialdom would act, to use a time-honored phrase, like a bunch of drooling incompetents.

It seems opportune to raise yet again the important question of whether our leaders understand what goes on in cyberspace, even as they attempt to engage the wired middle and upper classes—certainly not the general public, in view of extant data on the level of Internet penetration, not to mention access to electricity, in the country—by establishing and using all sorts of online properties, such as web sites, blogs, and social media accounts.

The massive outcry against the anti-cybercrime law, which, as of this writing, includes four separate petitions filed with the Supreme Court by various groups, has found the apparatchiks of this administration scrambling to defend the decision of President Benigno S. Aquino III to sign it into law. For instance, at a press briefing yesterday, September 27, Presidential Spokesman Edwin Lacierda, urging critics to wait for the pertinent Implementing Rules and Regulations (IRR), said that “freedom of expression is not absolute”, and that the law “[attaches] responsibilities in cyberspace”—pronouncements that are not without merit and would be difficult to disagree with, but tend to come across as incongruous at the very least, considering that Lacierda, along with other Palace functionaries, has been known to happily heckle political opponents—transport strike organizers and participants, say, or former Chief Justice Renato Corona—using his Twitter account, and could more convincingly serve as an exemplar of irresponsible online behavior than the opposite, especially because, by virtue of his position, he is supposed to speak with the voice of the Chief Executive.

Similarly irresponsible, as well as disingenuous, are the arguments advanced by Presidential Communications Development and Strategic Planning Office (PCDSPO) Undersecretary Manuel L. Quezon III, who, in response to blogger Jon Limjap’s tweet that the law, presumably on account of its provisions on libel, could be used “to silence political critics online“, replied that Limjap’s “sweeping” statement “ignores the [C]onstitution and its guarantees“, adding that the Act contained nothing that “any columnist hasn’t had to live with since time immemorial“. I would have thought that the following patently obvious things need not be said: first, the Constitution will not prevent—and in fact allows—the litigious from threatening to file or actually filing lawsuits, as Quezon himself knows from experience, whatever the courts eventually decide; second, the majority of people online are not columnists and have had no journalistic training, though pretenders do proliferate; and third, just because a particular state of affairs has persisted “since time immemorial” is not a reason to maintain said state.

None of the foregoing is to advocate that a kind of exceptionalism be observed with reference to cyberspace and the various activities that go on it it, as The Philippine Star columnist Federico J. Pascual seems to believe, rather strangely, of those against the anti-cybercrime law. I do think that there is much that deserves to be regulated online, although that requires a separate discussion. The process of law-making, however, ought to be undertaken with intelligence, sensitivity, and no small amount of caution. Given the disturbing implications of the Act in its current form, a severe shortage of precisely the aforementioned qualities may well be afflicting Congress and Malacañang, and now time, energy, and taxpayer money must be spent, if not squandered, in the fight against a law that, as Cocoy Dayao has pointed out, could have been crafted “far, far better“, and would therefore have been a more efficient use of national resources.

It is interesting to note that, according to a recent report, Aquino did not exercise his veto power over the Act because the office of Executive Secretary Paquito Ochoa, Jr. prepared a legal memorandum recommending the law for signing. Perhaps Ochoa or Aquino might be prevailed upon to release the contents of this memorandum to the public,  in order that the rationale behind the approval of the Act by a President who has repeatedly asserted his commitment to freedom and transparency might be understood by the people it will affect—the so-called bosses in whose interests he claims to work, and to whom he now owes a clear explanation.

Some notes on digitizing social change

What follows is a modified version of a talk that I, on behalf of The Pro Pinoy Project, delivered last 20 February 2012 at Saint Louis University, Baguio City, as one of the resource speakers for the Digital Technology for Social Change: Creating Impact in a Networked Society seminar series, a project of the British Council Philippines.

My fellow speakers were Niña Terol-Zialcita, Micheline Rama, and JP Alipio. Members of the British Council Global Changemakers network, namely Jecel CensoroJoseph MansillaAnna Oposa, Dwight Ronan, and Ponce Samaniego, also talked about their respective advocacy projects.

Some Notes on Digitizing Social Change

Good morning. Thank you to the British Council Philippines and Saint Louis University for having me here, and to all the participants for the gift of your presence—or your tele-presence, for those of you watching the live stream of this session.

That the Internet has brought about, and will continue to bring about, wide and sweeping changes all over the planet would appear to be a matter already beyond question. In 2006, the print edition of TIME’s annual Person of the Year issue bore a shiny, reflective panel on its cover—the reason being that the Person of the Year was “You”. Lev Grossman, explaining the choice, wrote that one of the stories of 2006 was a “story about community and collaboration on a scale never seen before. It’s about the cosmic compendium of knowledge Wikipedia and the million-channel people’s network YouTube and the online metropolis MySpace. It’s about the many wresting power from the few and helping one another for nothing and how that will not only change the world, but also change the way the world changes”.

Grossman was referring to the dramatic impact brought about by Web 2.0, an umbrella term, that, following Prashant Sharma, covers online services that were built to facilitate interactive information sharing, interoperability, user-centered design, crowd-sourcing, and collaboration. And while Grossman did warn against romanticizing Web 2.0—despairing at, among other things, the hatred and the lack of spelling skills that many of its users seemed to have in abundance—he nevertheless asserted that it gave rise to the “opportunity to build a new kind of international understanding, not politician to politician, great man to great man, but citizen to citizen, person to person”.

Regardless of whether “You” was the right pick, it is worth pointing out that succeeding Person of the Year issues saw TIME recognizing people who, without the Internet, might not have otherwise been thus acknowledged. In 2008, the magazine selected Barack Obama, whose successful campaign to be the President of the United States of America was driven in no insignificant way by online support. In 2010, the recognition went to Mark Zuckerberg, the founder of an immensely popular social networking company—you may have heard of it: it’s called Facebook, and it recently filed for an initial public offering (IPO) worth USD5 billion. Last year, TIME chose “The Protester” in view of the massive demonstrations that—with the help of Twitter, Facebook, and YouTube, among other tools—were organized and still roil across the globe: in Europe and North America, in the Middle East and North Africa.

Given the theme of this seminar series—“Digital Media for Social Change: Creating Impact in a Networked Society”—it might be the aforementioned protests that spring to mind when we, with an eye to our own history of revolutions, try to imagine what can be done in the Philippines today. Using digital media, can we bring about positive social change? Or—to paraphrase from the preamble of our Constitution, a document which is supposed to be an expression of our collective will as the sovereign Filipino people—using digital media, can we promote the common good? Conserve and develop our patrimony? Share and enjoy the blessings of independence and democracy? Establish a regime of truth, justice, freedom, love, equality, and peace?

Yes. Yes, of course. If I didn’t believe that, I would never have come before you to speak at this forum. (Incidentally, the girl in the picture has “optimistic” written across her hand in Arabic.) And yet the previous questions were more than merely rhetorical ones. Social change must always be understood as taking place within specific constraints, and especially so when we seek change by digital means in these islands. Such constraints cannot simply be conquered or transcended by sheer force of will—they form part of the unavoidable “social thickness” that must be lived through and negotiated with.

It hardly needs saying that I am not a Luddite: I own a mobile phone, a laptop computer, and an e-reading device; I have been a user of the Internet since the late 1990s, a time when a connection speed of 56 kilobytes per second—torturously slow by contemporary standards—was considered acceptable; I have been blogging intermittently since 2001, starting with Blogger.com, when it hadn’t yet been acquired by Google; and I spend several hours a day online chatting with friends, looking at pictures, watching videos, reading articles, and broadcasting banalities via social media platforms.

My stance as regards the Internet, however, is principally a cautious one. I am wary, even skeptical, of the various claims that are being made for it, verging as some of these claims do on what I would call “digital evangelism”: a zealous, fanatical conviction in the transformative power of digital technology in general, and the Internet in particular.  We must remember that the Internet is a relatively new development in the human story, and while many a commentator has declared that it will rival and eventually dwarf the printing press in terms of cultural impact, much of its potential, particularly in the Philippines, remains exactly that: potential. Digital change-makers who lose sight of this risk being engulfed by narcissistic self-regard.

All the same, you would not be ill-advised to take my words—as the fantasy writer George R. R. Martin might put it—well-salted. It may interest you to know that one of the first skeptics about technology was Socrates.  In Phaedrus, the Greek philosopher tells his titular interlocutor a story about the Egyptian god Theuth, who is credited with the invention of arithmetic, calculation, geometry, astronomy, draughts, dice, and, most importantly, the use of letters, or a system of writing. Theuth, desiring to make these inventions available for other Egyptians to use and benefit from, pays a visit to another god, Thamus, who is king over all Egypt, to show and explain each of the things that he has made. When they come to the letters, Theuth says that writing “will make the Egyptians wiser and give them better memories; it is a specific both for the memory and for the wit”.

Thamus replies with a gentle rebuke: “O most ingenious Theuth, the parent or inventor of an art is not always the best judge of the utility or inutility of his own inventions to the users of them. And in this instance, you who are the father of letters, from a paternal love of your own children have been led to attribute to them a quality which they cannot have; for this discovery of yours will create forgetfulness in the learners’ souls, because they will not use their memories; they will trust to the external written characters and not remember of themselves. The specific which you have discovered is an aid not to memory, but to reminiscence, and you give your disciples not truth, but only the semblance of truth; they will be hearers of many things and will have learned nothing; they will appear to be omniscient and will generally know nothing; they will be tiresome company, having the show of wisdom without the reality.”

Socrates was not completely wrong about writing—certainly it had some of the effects on knowledge and memory that he had feared—but he could not have foreseen this: the world that the written word had made possible, as well as its attendant wonders, not least of which is our ability to revisit his thoughts, precisely because they had been written down by Plato.

The first part of my presentation is derived from an ongoing, if not entirely systematic, process of research into and reflection upon digital media and the ways by which it is reshaping our lives and labors, and my primary objective here is to raise to the surface questions and concerns that I hope will help all of us to gain a greater awareness of the context that we inhabit, and a better appreciation of the possibilities for action. The second part of my presentation deals with The Pro Pinoy Project, the organization that I represent, and some of the challenges and opportunities that lie ahead for what may be called “participatory journalism”.

I will begin by drawing up a map of the local digital mediascape. The nature of a map is such that it is necessarily incomplete, and mine is a very partial one that focuses on the Internet, but I hope it will be sufficiently illustrative of some of the issues and limits that we must contend with.

Let’s talk about infrastructure.

Sometime last year, the International Telecommunication Union (ITU) released a publication via its web site called Measuring the Information Society 2011, which features two tools that are used to monitor developments in information and communication technology (ICT) worldwide: first, the ICT Development Index, which tracks indictors pertaining to ICT access, use, and skills in a given economy, and then rates that economy on a scale of one to ten; and second, the ICT Price Basket, which considers the costs of fixed-telephone, mobile-cellular, and fixed-broadband Internet services vis-à-vis the Gross National Income (GNI) per capita of a given economy.

 According to the latest findings by the ITU, how did the Philippines fare? With regard to the ICT Development Index, our country got 3.22 out of 10, ranking 16th out of the 27 economies classified as belonging to the Asia and the Pacific region, and 92nd out of all the 152 economies that had been included in the study. As for the ICT Price Basket, the ITU computed that the composite cost of ICT services in the Philippines was about 9.2% of the per capita GNI, based on a GNI of USD2,050. As a point of comparison, consider that the top 28 countries included in the study have composite costs of less than 1% of the per capita GNI.

The situation is not much better for the global majority.  As the ITU remarked, “Despite […] encouraging trends, as at end 2010, some 70% of the world’s population (and almost 80% of the developing countries’ population) were not yet using the Internet, and even fewer via a broadband connection.”

 Another study of interest that came out online the year before is the Global Information Technology Report 2010-2011, which is a collaborative effort between the World Economic Forum and INSEAD. The report measures the degree to which countries are leveraging ICT for enhanced competitiveness using the Networked Readiness Index (NRI), which uses a scale of one to seven. The NRI is composed of three sub-indices, and each of these sub-indices is calculated using a particular set of indicators.

The overall networked readiness of our country is 3.6 out of 7, with a rank of 68th out of 138 economies. For the Environment Sub-index, which gauges the market environment, the political and regulatory environment, and the infrastructure environment of a given economy with reference to innovation and ICT development, we got 3.5 out of 7, ranking 94th. For the Readiness Sub-index, which contemplates the readiness of individuals, businesses, and governments to use technology, especially ICT, in their day-to-day activities and operations, we got 3.9 out of 7, ranking 99th. For the Usage Sub-index, which measures the actual ICT usage by the main social sectors of an economy, we got 3.3 out of 7, ranking 71st.

At the risk of oversimplifying, what these two reports tell us is something that we may already suspect, if not know: the Internet in the Philippines is poorly developed and very expensive.

The Global Information Technology Report also includes a number of papers from contributors, including a team from management consulting firm Booz & Company.  Entitled, “Building Communities around Digital Highways”, the authors, led by Karim Sabbagh, make a case for the need for digital highways, which they define as “nationwide high-speed broadband enabled by a combination of fixed as well as wireless networks”, and evaluate their current state. They argue that, “[a]ccelerating the deployment of digital highways and deriving their full benefits […] requires fundamental changes in vision and action throughout the entire broadband ecosystem”, which means that policymakers, operators, device manufacturers, application developers, and other stakeholders should be actively involved in what they call the “broadband ecosystem” . Furthermore, those in the broadband ecosystem must also reach out and collaborate actively with adjacent ecosystems, such as health care, education, and energy, in order to help them maximize digital highways and the advantages these highways can offer each sector.

Obviously, one entity with an important role to play in establishing the broadband ecosystem is our government , so it bears asking what sort of “vision and action” we can expect from it. I will go over three pertinent aspects of the government framework for the Internet.

Last June 29, 2011, the Commission on Information and Communications Technology (CICT), headed by chairman Ivan John Uy, launched the Philippine Digital Strategy (PDS) 2011-2016, a five-year plan that professes to be animated by a vision of “a digitally empowered, innovative, globally competitive and prosperous society where everyone has reliable, affordable and secure information access in the Philippines”; “a government that practices accountability and excellence to provide responsive online citizen-centered services”; and “a thriving knowledge economy through public-private partnership”.

Can the PDS, in fact, be able to facilitate the realization of these grand goals? Pro Pinoy editor-in-chief Cocoy Dayao doesn’t believe so, and has suggested in a post that the PDS be scrapped—a point that I agree with, as careful scrutiny of the PDS would reveal that is concerned chiefly with establishing a broadband network for the government, and does not establish clear directions for how to deal with issues that directly affect the growth and proliferation of digital technology, such as the cost of electricity in the country, which, according to an October 2010 study by think tank International Energy Consultants, is the highest in Asia. Of course, any discussion of the merits and demerits of the PDS would seem to be useless at this point, because six days before the plan was launched, President Aquino, by way of Executive Order No. 47, virtually dissolved the CICT: the issuance renamed the commission as the Information and Communications Technology Office (ICTO) and placed it under the Department of Science and Technology, a move that several BPO companies protested. To what extent the ICTO is implementing the PDS, if at all, is not very clear. The administration has said that it does want to set up a national broadband network (NBN), but it will not happen this year, as Department of Budget and Management (DBM) Secretary has said there is no allocation for it yet. And of course, the very concept of an NBN is still politically sensitive—some of you may recall the NBN-ZTE scandal that erupted during the time of former President Gloria Macapagal-Arroyo.

Another matter that I would like to bring up is National Telecommunications Commission (NTC) Memorandum Order (MO) 07-07-2011 .

Let me talk about the context of this order briefly. An issue that had several quarters of the Internet community last year up in arms early last year was a proposed order from the NTC that, while requiring telcos to set a minimum guaranteed speed for connections, would have allowed them to impose bandwidth caps on its subscribers, too—ostensibly on “network abuse” and “anti-piracy” grounds, neither of which holds up under inspection. With reference to “network abuse”, it is simply too vague a term that readily lent itself to abuse by self-interested service providers, thus punishing consumers who simply wish to maximize what they are paying for—which for not a few might mean playing games on Facebook, watching videos on YouTube, and publicizing every stray thought on Twitter 24 hours a day, but there is nothing wrong with any of that. As regards “anti-piracy” concerns, let’s face it: no amount of data restriction could truly be used as a tool to further the cause of “anti-piracy”, because capping would only make piracy slower, not impossible. Several of our writers covered this issue quite thoroughly, and one of them, Pierre Tito Galla, drafted a position paper that was circulated among concerned Internet users before being submitted to the NTC for consideration, as well as published in Pro Pinoy.

Fortunately, as a result of the public outcry, the NTC decided against implementing the aforementioned order. What it issued instead, some months later, was MO 07-07-2011. In some ways, though MO 07-07-2011 looks better than the prior proposal, it is still “ampaw”, as Galla put it in a post. He remarks that while MO 07-07-2011 does require transparency in billing, provide for a minimum monthly service reliability level of 80%, and give Internet service providers (ISPs) flexibility in terms of packaging and pricing their products, it is deficient in terms of the following: it does not provide effectively for pre-paid Internet connectivity, given that reliability is measured on a monthly basis; it does not require service reliability to be measured at the subscriber end; it is silent on data volume capping, despite the NTC asserting that it could regulate broadband services, meaning that telcos, which consider broadband a value-added service, can still impose unreasonable limits; and it does not compel ISPs to establish customer-friendly mechanisms for getting rebates in case the minimum service reliability level is not met. (If you’ve ever had to complain to your ISP about poor service, like I have, you know how absolutely hellish the experience can be—so much so that sometimes the problem almost seems to be your fault all along, starting with the decision to subscribe.)

Allow me now to discuss a recent legislative development . The Senate recently passed Senate Bill No. 2796, which is entitled the Cybercrime Prevention Act of 2012, and has Sen. Edgardo Angara as its principal sponsor. While the bill may be well-intentioned, it suffers from a number of significant flaws, some of which I will identify.

First, the bill, as Sen. TG Guingona pointed out when he voted against it—the only senator to do so—“legislates morality” when it defines cybersex as a crime in this manner: the “willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration”. Evidently this provision is designed such that law enforcers can go after operators of cybersex dens, which unfortunately are burgeoning in the Philippines. Note, however, the qualifying phrase: “for favor or consideration”. If we were to compare it to, say, the definition of prostitution under Republic Act No. 9208, or the Anti-Trafficking in Persons Act of 2003, which is “any act, transaction, scheme or design involving the use of a person by another, for sexual intercourse or lascivious conduct in exchange for money, profit or any other consideration”, then doesn’t the provision in the bill appear stricter, because broader? “For favor or consideration” and “for money, profit, or any other consideration” do not mean the same thing.

Second, the bill affirms that acts of libel, as set forth in the Revised Penal Code, can be committed in cyberspace. This wouldn’t be a problem, except that our libel law is rather medieval. A case in point: the United Nations Committee on Human Rights ruled in October 2011 that the penalization of journalist Alex Adonis for libel constituted a violation of the International Covenant on Civil and Political Rights. Adonis was imprisoned after he lost a defamation suit against former House Speaker Prospero Nograles.

Third, the bill has no provisions that pertain to stalking, bullying, or harassing people in cyberspace, which means that these acts, regardless of duration or degree, would be perfectly legal in the event that the Cybercrime Prevention Act of 2012 is passed into law.

Do our leaders really understand what goes on in cyberspace? I myself am not sure, and it’s a question worth thinking about, because the decisions that our officials make will have an impact—positive or otherwise—on all of us who use the Internet.

 Who are we that will be affected? Who are the Filipino netizens?

The figures I will be citing during the next several slides come from Digital Philippines 2011: Yahoo!-Nielsen Net Index Highlights, a study that was conducted in 22 major cities, including Metro Manila, among 1,500 male and female users, aged 10 and above, across socio-economic classes.

Let’s start with geographic distribution . In the period covered by the report, only 30% of people in national urban Philippines used the Internet in the past month, with 26% in Luzon, 30% in Visayas, and 17% in Mindanao. In Metro Manila, the figure is 43%, while in Cebu and Davao, the figures are 34% and 37%, respectively.

 In terms of age, Internet usage was highest among those aged between 10 and 19 (53%) and between 20 and 29 (43%). Among 30- to 39-year-olds, it was 21%. Among 40- to 49-year-olds, it was 11%. And among those aged 50 and above, it was 3%.

 Where are people accessing the Internet? There are several options, of course, but the dominant option is the Internet café at 66%, nearly double that of the next option, the home, at 35%. Other places of access, such as school or work, have an aggregate of 13%.

 With regard to socio-economic class, usage was highest, unsurprisingly, among classes A, B, and C, at 66%. Among users in class C2, it was 53%, and among users in classes D and E, it was 24%.

These findings tie in with what the social scientist Raul Pertierra pointed out in “The new media and politics? Or the politics of new media?”, a paper that was published in the 2010 anthology The Politics of Change in the Philippines . There, Pertierra said, “With the exception of class, cellphone and Internet use in the Philippines is comparatively neutral. […] Class is the main impediment to a more equitable access to the new media […]”

To put it more starkly: at least 70% of Filipinos have no Internet access.  I say “at least”, because the Yahoo!-Nielsen study focused on urban areas. When we try to think about using the Internet as a means for bringing about social change, we have to remember that we are not reaching a significant majority of our fellow Filipinos: at present, 63 million of them—assuming a conservative population figure of 90 million—are not online.

 What about those who are online? What can we know about their patterns of behavior?

 In terms of content, the five most preferred types are: international music at 68%; local music at 65%; interesting photos and videos at 59%; games at 56%; and technology and gadgets at 55%.

 The top five online activities are: social networking at 82%; search at 80%; instant messaging at 69%; visiting Internet portals at 67%; and visiting public chat rooms at 65%.

The fact that Yahoo!-Nielsen identifies social networking as the top online activity is interesting to juxtapose with data from Wave 3 and Wave 4, which are studies on social media that were undertaken by Universal McCann in 2008 and 2009, respectively. If we put together the numbers from these two latter pieces of research , we find that the social media activities done most frequently by Filipinos are: watching videos at 98.1%; reading blogs at 90.0%; uploading photos at 86.4%; creating a profile on a new social network at 83.1%; and uploading videos at 67.5%.

What should we make of these numbers? When we go online, most of us aren’t there to promote a cause or to advance an agenda, to research for class or to do work—we’re there primarily to amuse ourselves: we listen to music, watch videos, and interact with friends. This preoccupation with entertainment isn’t necessarily bad, of course, but it is something that we do have to bear in mind.

British Council Philippines Digital Technology for Social Change

 One point that I hope should be abundantly clear by now, after all those statistics, is the existence of what is referred to as the digital divide, which is not so much a single chasm as a series of gaps between the Filipinos who are privileged enough to have access to the Internet—which includes us who are gathered here now—and the Filipinos who are not similarly privileged: gaps in knowledge, in literacy, in resources, and in power.  We should ask ourselves, then, whenever we access the great fund of information that is the Internet, how we are using our privilege, and why.

In 1980, the year that Polish poet Czesław Milosz  was hailed as the Nobel Laureate in Literature, he intoned what seems to be both observation and warning during his Nobel lecture—one that is even more germane today: “Our planet that gets smaller every year, with its fantastic proliferation of mass media, is witnessing a process that escapes definition, characterized by a refusal to remember.”

Whether that is true could well be debatable.  It is more difficult, however, to dispute what technology writer Nicholas Carr has said: “As we use what the sociologist Daniel Bell has called our ‘intellectual technologies’ […] we inevitably begin to take on the qualities of those technologies.” Or, as the Jesuit John Culkin put it more succinctly, “We shape our tools, and thereafter they shape us.”

Perhaps, before asking how we can use digital technology to change the world, we should ask how that same technology is changing us. While some of these changes may be for the better, I’m sure all of us are aware of disturbing behaviors that appear to be specific to cyberspace, and my contention is that these are not isolated incidents, but symptomatic of larger problems to which the Internet tends to contribute or exacerbate as medium, and against which we must guard. I will cite two examples.

 Take, for instance, mobbing.  I’m sure all of you know who this guy is: he’s Christopher Lao, who was caught on video by a media outfit trying to drive his car through a flooded street. He failed in the attempt, and his car wound up floating in the water for a while. He immediately became an online sensation when, in reply to an unaired question from the reporter, he cried, “I was not informed”, as he looked like a spoiled brat whining about a thus far inevitable Philippine reality. Vicious comments and hate pages proliferated at dizzying speed online.

His critics neglected to ask some questions, however.

Why did Lao take such a foolish risk? It turned out that he had been rushing home to be with his young daughter, because his wife was stranded in her office.

More crucially: how was that footage taken to begin with? The existence of the video proves that members of the media outfit were present at the scene. Did they think to warn Lao from proceeding down the street? Did they try?

 In any case, as the Center for Media Freedom and Responsibility (CMFR) said, “[Apart] from sharing the news, people had started to call Lao names—used rude and/or insulting words to describe him and the incident—in other words, a clear abuse of social media.”

Another example:  failing to exercise critical thinking. The Mosquito Press, a satirical news site, released a story saying that a Harvard study had named Filipinos the most gullible people in the world—a story that was promptly picked up and treated as genuine by no less than a professional writer, The Philippine Star columnist Carmen Pedrosa. This set off a round of much-deserved scorn from several quarters for Pedrosa, but she was unapologetic: in her next column, she declared that it was still true that Filipinos are generally gullible, and her citing the spurious study was precisely to make that point . Manuel Buencamino, another of Pro Pinoy’s writers, had this to say in response: “I’m still in pain from the steaming hot coffee I blew through my nose after I read her column and the ‘correction’ she made the following day.”

 While we’re on the subject of thinking, we might as well ask: How is Internet changing our brains—not only metaphorically, in the sense of the “mind”, but also physiologically? There is quite a lot of literature on the subject, but one paper that I think is worth mentioning was written by child development scholars Maryanne Wolf and Mirit Barzillai.  In “The Importance of Deep Reading”, Wolf and Barzillai redeploy Aristotle’s concept of three lives to talk about how the transition from a print culture to a digital one affects learning. In their view, society at present is able to pursue the life of activity and the life of enjoyment, and the digital learner is well-suited to both these lives. The life of contemplation, however, in spite of its increasingly diminished place in contemporary life, is also important, and is vital to what they call deep reading—“the array of sophisticated processes that propel comprehension and that include inferential and deductive reasoning, analogical skills, critical analysis, reflection, and insight”—which encourages deep thought, and in turn leads to the formation and development of structures in the brain that would otherwise not be so formed or developed. A world that makes no room for the life of contemplation, then, might be one filled with individuals who are less analytical and less purposeful about the information that they encounter: perpetually distracted and easily deluded.  As Wolf says in her book, Proust and the Squid, “We are not only what we read. We are how we read.”

Of course the dangers of distraction and delusion are already very much with us: ours is the age of information overload. And while information can be empowering , it is not always so—mere possession of information does not guarantee action or transformation: an issue that was recognized long before our time. Cultural critic Neil Postman, in Amusing Ourselves to Death, his famous book on—or rather, against—television, locates a watershed in history with the invention of telegraphy, saying that the from this point forward, the information-action ratio of people began to become problematic : “For the first time in human history, people were faced with the problem of information glut, which means that simultaneously they were faced with the problem of a diminished social and political potency.”  For instance, we are bombarded daily, offline and online, by tidbits of data such as what X celebrity was wearing an outfit by Y designer at Z event, but are these things we have to know? Should we care?  Can this information be acted upon in a meaningful way? The Internet has served to increase by leaps and bounds the amount of information we are exposed to, but so much of it is simply distracting—however one understands the Internet to be, it is also, by design, a gigantic distraction machine that, in forcing us to respond—and quickly—to multiple stimuli every time we use it, makes us feel busy and productive even if we’re not actually accomplishing anything.

Henry David Thoreau made a relevant point in Walden when he said, “We are eager to tunnel under the Atlantic and bring the Old World some weeks nearer to the New; but perchance the first news that will leak through into the broad, flapping American ear will be that the Princess Adelaide has the whooping cough.”

As I said earlier, this part of presentation is derived from an ongoing process of research into and reflection upon digital media. This process was, in many respects, prompted by my experience with The Pro Pinoy Project, which I will now turn to and talk about.

Pro Pinoy began in late 2009 as a volunteer-run web site that was intended to achieve the goal of increasing public awareness of the national and local elections that took place in May 2010, with a particular focus on the hotly contested race for the presidency. It was propelled by the idea that the ballot is the most powerful tool with which the future of the country could be secured.

The site served as an online database of news articles and blog posts on issues of national significance, as well on the track records and promises of the presidential candidates. Over the course of compiling content for publication, we sought to curate the data that they had gathered, occasionally selecting reports that were important but had not received much attention in either the mainstream or new media arenas. Of course, the veritable flood of election-related information was too much for us to keep up with, and therefore updates were made irregularly.

Following the relatively successful conduct of the elections, we decided that the site could serve as more than just a vehicle for voter education. As crucial as this task was, elections occur only once every three years, and, in any case, voting is only one aspect of citizenship. Good citizens must also be sufficiently informed and involved in everyday politics so that they are ready to hold all public servants to their duties, responsibilities, and promises, participate in the contentious process of nation-building themselves, and inspire others to do the same.

We re-launched the site in July 2010, this time offering original, syndicated, or partner-provided content, still mostly on news and current affairs. In February 2011, we decided to go the official route, establishing Pro Pinoy as a non-stock, non-profit corporation.

Pro Pinoy is a very young organization—we turned a year old just a few days ago—but I’m happy to say we’ve managed to rack up a few accomplishments in the short time that we’ve been operating. We have a great team—I’m not saying that just because I’m part of it—producing excellent posts and have been able to form strategic partnerships with other groups. Some of the content that we’ve published, such as the position paper on the broadband capping issue I mentioned earlier, has been cited by mainstream media outfits, and we were recognized in 2010 by the Philippine Blog Awards as the winner in the Society, History, and Politics category. We’ve also managed to maintain a good level of site traffic, even on slow days, and have a fairly active, if not always pleasant, comments section.

Some of our future plans include: redesigning the site, which is ongoing; increasing our lifestyle content; exploring multimedia content options; participating in and facilitating seminars and workshops; and focusing on community news, and it is in that last area that I think all of us here will be able to collaborate: we would be more than happy to help you tell your stories about what is taking place in your neighborhood and your organization.

What exactly does Pro Pinoy do? We’re engaged in what has been called “participatory journalism”. In point of fact, there are several terms for this practice, such as “citizen journalism”, “guerrilla journalism”, “networked journalism”, “open source journalism”, and “street journalism”, and one question that might immediately spring to mind is, “Is it even journalism?” My answer: “At its best, yes, it is journalism.”

Participatory journalism is defined by media consultants Shayne Bowman and Chris Willis in their paper We Media as follows: “[It is] the act of a citizen, or group of citizens, playing an active role in the process of collecting, reporting, analyzing and disseminating news and information.” This runs the gamut from taking part in a text poll to undertaking investigations of an issue, and marks a departure from the relatively linear news model, which involves a media organization, influenced to some degree by advertisers, filtering and packaging information first before delivering it via a platform, such as a newspaper or a television show, to a mass audience.

In theory, members of the audience have always been able to speak back. If I want to react to a story, I can write a letter to the editor or express my response with my remote control or my wallet. What makes participatory journalism interesting and exciting, however, are all the conversations that take place simultaneously throughout the discursive environment, allowing the community to make itself felt in shaping news agendas.

I want to make it clear that participatory journalism is not a second-rate, trying hard copycat of traditional journalism, but a very different model altogether—one that is more about complementing, rather than competing with, how the business of news is being carried out by mainstream outfits. (Most of you probably don’t recognize this because you’re too young—it’s a screen capture of the legendary scene in Bituing Walang Ningning, where Cherie Gil throws a glass of water into Sharon Cuneta’s face.)

What, then, is participatory journalism for? Why do it? It allows for a more collaborative and more transparent process of information-gathering, admits a wider range of views, and facilitates the creation of richer, more intimate stories and conversations—the information we receive takes on tones and textures that it might not otherwise have, and therefore the quality and relevance of such is potentially higher. It also fosters in us a stronger sense of responsibility and control over our world, which is critical to a vibrant democracy.

2010 was actually an important turning point for participatory journalism, because for the first time in Philippine history, the Commission on Elections issued accreditation IDs to bloggers and online media organizations covering the elections—a development paralleled by the candidates’ incorporation of a wide array of digital tools, including social media, into their respective campaigns.

The Internet, as I’ve already shown, is a highly limited platform, and thus little that was done there could be said to have had dramatic impact on the outcome of the polls, but as Philippine Daily Inquirer columnist John Nery observed, “[…] what online does very well, even in the Philippine setting, is to create buzz. It […] can certainly be used to create word of mouth, to pique public curiosity and interest, to drive old media coverage.”

The CMFR also weighed in, saying, “[The coverage of online sites] provided a deeper look into issues overlooked by the mainstream media [and] provided a holistic approach to understanding the 2010 elections by balancing the sensational reports with critical stories.”

The Internet, of course, has a long way to go before becoming a true game-changer: while a 2010 Pulse Asia survey conducted from February 21 to 25 showed that media was the most influential source of information in choosing a president (64%), the most influential medium was TV (56%).

It might be helpful at this juncture to go over some of the findings in a study conducted by communication consultancy firm EON, Inc. from May to June 2011. Called the “Philippine Trust Index”, it sought to measure the level of public trust in key institutions: the church, the government, private industries, non-government organizations, and the media.

Among the 500 respondents, 64% said that they trusted the media “Very Much” and “Somewhat Much”. Asked to express their trust in an array of media channels, the results (“Very Much” and “Somewhat Much”) were as follows: 74% for television; 68% for online news sites; 66% each for newspapers and radio; 47% for social networking sites; and 37% for blogs. The latter two figures present an obvious challenge for participatory journalism, which, after all, relies on and is generated by social networking sites and blogs.

What, according to the same study, are the key drivers of trust in media? Fifty-eight percent said truthfulness; 35% said adherence to fairness; 3% said balanced reporting of good and bad news; and 2% each said delivery of news with social relevance and other reasons. It does not seem unreasonable to infer, then, that barriers to trust for participatory journalism include lack of editorial oversight, unethical practices, and the refusal to take responsibility—barriers that are not unrelated to the problematic behaviors of mobbing and uncritical thinking that I discussed previously.

If you’ve been following the impeachment proceedings of Chief Justice Renato Corona online, you may be familiar with what befell Raissa Robles, a professional journalist and a blogger. The Manila correspondent for the South China Morning Post, Robles has been assiduously working to bring out into the open, via her blog, issues and materials that are related to the charges that have been filed against Corona, and her laudable efforts have earned her no small amount of controversy. Recently, accusations surfaced that Robles was the “small lady” who had given Rep. Reynaldo Umali, a member of the prosecution panel, photocopies of documents pertaining to Corona’s deposit accounts in Philippine Savings Bank (PSBank). The information spread very quickly in the Internet community, in the manner of many a sensational story, but what facilitated the rapid dissemination of this particular rumor was a popular citizen media site that reported it without bothering to verify with Robles herself, who had issued categorical denials through Twitter and, later, in her blog. Mulling over the incident, Robles criticized the site and said, “This first-hand experience has given me a ringside view of how gossip turns viral and mutates in the process. And how people feel they can say anything on the Internet without any consequences or care.”

What happened was appalling for us at Pro Pinoy, of course, not only because it was downright irresponsible, but also because it would have a detrimental effect on how the public perceives participatory journalism. That said, we are more than willing to face the challenges that lie ahead of us, and look forward to overcoming them as a team.

By now, I’m sure I’ve brought up more issues and questions than we have ready, final answers for. My purpose, however, is not to befuddle unto paralysis—as I said at the beginning of my talk, I think it important to be keenly conscious of our context. As would-be change-makers, it behooves us to be aware that the task of social transformation, particularly using digital means, is freighted not only with promise—which the succeeding speakers will doubtless be able to show in their respective presentations—but also with peril, and we cannot realize the one without dealing thoughtfully and carefully with the other.

Thank you very much.

RFC: Some ideas on how to guarantee Internet Freedom, fight cybercrime better in the Philippines

If you think this is worthwhile, I urge you to reach out to the Palace, and to Congress, and urge them to consider rewriting the laws that are on the pipeline for something more holistic, and more positive. I believe this is a more positive way of solving cyber crime, and cyber warfare, as well as granting real freedom and real rights for us all. Real Internet Freedom, and a real shot that our nation recognizes the Internet as an economic engine. Read more

Clef two-factor authentication