Wednesday, October 31, 2012

Deadly, Damaging, and Disruptive Disaster under a Digital Democracy




SANDY, the Super storm was coming. As an “Act of God,” it was supposed to be a fortuitous event: unforeseen, unexpected, and unavoidable. All we could do was mitigate or minimize its devastating effects.

When I predicted an October Surprise in this presidential election, I thought that it would come from either the Romney or the Obama camp. I did not realize that GOD the Almighty would provide it.

Fortunately, the Scientific Geniuses in the Weather Bureau, with the help of digital and information technologies, somehow were able to forecast the route, direction, and arrival of SANDY in certain States, including Virginia, where I live. To a certain extent, SANDY suddenly became foreseeable, expected, and avoidable.

In my initial Facebook status update, I wrote that I was all prepared and ready for my date with SANDY. “I just got back from the supermarket. We are getting ready for SANDY here in Virginia. All charged-up: extra batteries, MacBook, iPad, IPhone, Android, iPod, etc., all with flashlight apps, candles, matches, flashlights, cold food, bottled and filtered water, boiled water inside the big thermos, snacks, radio, audio, and video players on battery, etc. I am and will be at home without my spouse, who is abroad. Embraced by SANDY is not desirable and unwelcome! :):)”
 
As expected, for two days, SANDY not only aggressively threw cold and wet embraces and stormy kisses, she rendered us POWERLESS.
 
On the first night without power, while lying down on my bed seemingly naked, helpless, and alone, I could not help retracing how early inhabitants on earth responded to this brazen nakedness with the G-Strings.
 
Yes, POWERLESS as we were, I thought that we have been EMPOWERED likewise by a String of Gs: GOD, Government, Global Network, General Electric, Gas-operated equipment, Generator, Gadgets (Smart Phones, Tablets, etc.), Genius Bar (Apple), Gates (Microsoft), Google, Giant (Groceries), Greens, Guava and Grapes, Good Shepherd, Good Guys, Gals and Gays, Gifted Scientists, Games, Gossips or Grape Vine, Gimmicks, Gallup Polls, and Grassroots Ground Games. In the Philippines, for some politicians their brand of power consisted of Gold, Guns, Goons, and Girls.

GOD helps those who help themselves. The disaster proved to be deadly, with more than two dozen deaths so far; damages amounting to more than $50 billion; disruptions to business activities, Wall Street, sports and entertainment, political campaigns, and normal daily routine.

The roles of man-made institutions like the Federal and local governments, NGOs like the Red Cross as well as those of the human inventions that deal with the likes of SANDY such as the Gs mentioned above, became more significant and demonstrative of how human beings help themselves.

SANDY must have disrupted his Presidential campaign, but as the Washington Post reported, the former has been given his Commander-in-Chief moment.

“In a campaign notable mostly for its negativity, the historic storm provided Obama with a commander-in-chief moment a week before Election Day. The president gained a rare moment of bipartisan praise, with Democratic and Republican governors alike commending the performance of the federal government.”

Previously, bombing the enemy was the October Surprise. GOD instead surprised everyone by giving SANDY as a tribulation and a trial for both Obama and Romney to face.

The Federal Emergency Management Agency (FEMA) has been very helpful, competent, efficient, and effective in working with the States and Cities in these trying times. Unfortunately for Romney, the media is reminding the electorate that he had proposed earlier the abolition of the agency.

Making it worse for Romney, the following report was all over the mainstream media:

“Gov. Chris Christie (R), generally a harsh critic of President Obama, has nothing but praise for the White House response to Hurricane Sandy. 

“The federal government’s response has been great. I was on the phone at midnight again last night with the President, personally, he has expedited the designation of New Jersey as a major disaster area,” Christie, a top surrogate for Republican presidential candidate Mitt Romney, said on NBC’s “Today.”

He added, “The President has been outstanding in this and so have the folks at FEMA.” 

On MSNBC’s “Morning Joe,” Christie was equally laudatory, saying, “the President has been all over this and he deserves great credit.” Obama, he said, “told me to call him if I needed anything and he absolutely means it, and it’s been very good working with the President and his administration.”

And on Fox News’ “Fox and Friends,” when asked if Romney would visit New Jersey, Christie replied, “I have a job to do. If you think right now I give a damn about presidential politics, then you don’t know me.”

Meanwhile, my State of Virginia continues to be a Swing State, as I see the strong winds blowing and the tree branches SWINGING sometimes to the Left, sometimes to the Center, and sometimes to the Right.

Thursday, October 25, 2012

COMBATING CYBER CRIMINALS


Over 10 years ago, a virus named “I love you” penetrated the web networks. It allegedly affected thousands if not millions of computers worldwide. After a few days, it was determined that a Filipino computer specialist operating out of the Philippines caused it.

Many people including my barber were amazed even expressing pride that one Filipino could supposedly wreck havoc to the Worldwide Web.

I remember responding to my barber and to some of those expressing amazement that the concern should not be on the Filipino who spread the “I love you” virus but more on the fact that among all the millions of computers in the world, the U.S. Federal Bureau of Investigation (FBI) and other international experts were able to identify the very exact computer that the Filipino used to spread the virus.

I just finished attending the Cyber Security Conference held in Washington, D.C. The attendees include IT specialists and Cyber Security experts from the U.S. Government, guest governments, and private IT companies. I was one of the few credentialed members of the media permitted to cover the conference. The latter is also being held simultaneously with the Mobile Government Conference and the Cloud and Virtualization Conference.

In the conference, I had the chance to meet an expert connected with a firm that protects many of the networks of the Stock Exchanges and financial institutions in North America, Europe, and Asia from hackers and cyber criminals. In our conversation, he mentioned to me that one of their capabilities is in determining the source and identifying in “an instant” or almost real time the one overtly “hacking” or committing a cybercrime. Amazing indeed!

We exchanged business cards. I hope to know more about it later.

Lawrence C. Miller of PaloAlto Networks, network Security Company described the State of Today’s Intrusions. He says, “Today’s threats are more sophisticated and equal opportunity than ever before. All types of enterprises and information are being targeted” Many of the attacks are producing a steady stream of high profile sophisticated breaches and intrusions. He gave examples:

1.     Comodo (business partners). In March 2011, an intruder compromised a reseller’s network and stole nine digital security certificates that could then be fraudulently issued to impersonate various websites operated by Google, Microsoft, Skype and Yahoo;

2.     Sony PlayStation (credit card data). In April 2011, hackers breached the Sony PlayStation network, potentially stealing credit card and personal information (including names, birthdates, physical and e-mail addresses, pass-words, logins, handles, online IDs, purchase histories, and profile data) of more than 100 million subscribers;

3.     U.S. Senate (political hacktivism). In June 2011, LulzSec (a loosely organized hacker group) broke into the U.S. Senate website and posted a list of compromised – but not sensitive or classified – files online. Other examples of political hactivism by various hacker groups include attacks against the U.S. Public Broadcasting Service (PBS), Fox Broadcasting Company, and MasterCard, Visa, and PayPal websites in retaliation for negative coverage or adverse actions against WikiLeaks; and

4.     DigiNotar (Intellectual property). In September 2011, the same attacker that claimed responsibility for the Comodo breach took credit for a much larger compromise against Digitar that occurred during the summer of 2011. Again, a Certificate of Authority (CA) was the target and the attacker was able to generate hundreds of seemingly valid certificates for dozens of popular domains.

The above are just a few examples. According to Miller, Hackers have evolved from the prototypical “whiz kid” – sequestered in a basement, motivated by notoriety, and fueled by too much carbonated caffeine - into a bon fide cybercriminal, often motivated by significant financial gain, and sponsored by nation-states, criminal organizations, or radical groups.

Miller described that today’s hacker fits the following profile:

1.             Has far more resources available to facilitate an attack;
2.             Has greater technical depth and focus;
3.             Is well funded; and
4.             Is better organized.

I will be writing more about the Cyber Security Conference in subsequent columns. Let me spend more time digesting my notes and the materials that I have obtained at the conference.

I suspect that hackers and cyber criminals target many capitalist countries including the Philippines. A Cybercrime Prevention law was passed just recently. The problem is that Congress inserted anti-Freedom of Expression provisions like the labeling of Libel as an online crime with higher penalty as well as not providing sufficient conditions and safeguards. Meanwhile, the Supreme Court issued a TRO against its implementation for 120 days.

I wrote earlier that the Philippines participated in the development and formulation of the Convention on Cybercrime. In fact, I claimed that Congress virtually copied the provisions in the Convention on Cybercrime except the unacceptable insertions to come up with the Cybercrime Prevention Act.

My recommendation is for the PNoy Administration to sign (if not yet done) the Convention on Cybercrime and ask the Senate to ratify it immediately.

The Convention does not include Libel as a cybercrime. It provides sufficient safeguards including recognition and respect for International Human, Civil, and Political Rights laws.

Under our legal system, generally accepted principles of international agreements and customary law are part of the law of the land. (Art. II, Section 2, Constitution)

Following the doctrine enunciated In the Kuroda case, duly adopted international treaties can be invoked before and directly enforced by the courts and other tribunals and by the administrative authorities if they implicitly or explicitly establish rights and duties for private persons. “International law and treaties have the same domestic status as national legislation, and both international law and national legislation are subordinate to the Constitution.”

Furthermore, the Supreme Court has recognized the validity of "executive agreements" concluded and applied even without Senate approval. 


Wednesday, October 17, 2012

FILIPINOS CAN MAKE OR UNMAKE A U.S. PRESIDENT




My barber asked again what my take is re the Obama-Romney Presidential Battle.

With the help of online sources and cyber technology, this is my humble analysis. Because of the Electoral College System, we have to analyze the polls per State and correspondingly project what would be the results. Looking at the Electoral College Map projected by the conservative Rasmussen Report and the Real Clear Politics, which averages all the polls; I would say that the Electoral College Map would show the following results:

Obama: 257 Electoral Votes   Romney: 215 Electoral Votes    Swing: 66 Electoral Votes

The Swing States are:

1.         Florida:          29
2.         Ohio:              18
3.         Virginia:         13
4.         Nevada:           6

Total:                          66

To win the elections, one must have at least 270 Electoral Votes

ARITHMETIC:

ROMNEY

To win, Romney needs to obtain additional 55 Electoral Votes. To become President, he must win in Florida, Ohio, and Virginia, which would give him a total of 60 additional votes – more than enough to cover the 55 needed. He cannot afford to lose in any of these 3 States. Winning in 2 and Nevada would not be sufficient.

OBAMA

To win, Obama needs to obtain additional 13 Electoral Votes. His is an easier path than Romney’s. All he needs is to win in Virginia, Ohio, or Florida. Winning Virginia would give him a total of 270, the magic number; Ohio a total of 275; and Florida, a total of 286.

Unless one unexpectedly falters in another State and Nevada is needed to cover it, at this point based on the above scenario, the latter is not as important to Obama or Romney as the other 3 States. This explains why Obama and Romney are spending much time, money, and efforts in these States.

Filipino Americans Can Make a Difference

The Filipinos are largely concentrated in the following States: 1. California; 2. Hawaii; 3. Illinois; 4. Washington; 5. New Jersey; 6. New York;  7. Texas; 8. Nevada; 9. Florida; 10. Virginia.

While the Filipinos are not as large in Ohio, in a close race, they can still make a difference especially if they unite with the other Asians as they have done in the past.

In the first 6 States mentioned above, Filipino Republicans or Pro-Romney Filipinos cannot make a difference. These States are so overwhelmingly Pro-Obama that Filipino Republicans cannot make a dent.

In the State of Texas, it is the opposite. Filipino Democrats or Pro-Obama Filipinos cannot make a difference. Texas is overwhelmingly Pro-Romney that Filipino Democratic votes would be useless.

Virginia, Florida, Nevada and Ohio are Swing States that Filipinos can really make a difference.

Every vote counts! Let me repeat. To be President, Romney must win in Virginia, Florida AND Ohio. To be President, Obama must win in Virginia, Florida, OR Ohio.

If Filipinos register and vote in these 3 States, indeed, they can either MAKE or UNMAKE a U.S. President!



Thursday, October 4, 2012

PHILIPPINES: A FREE AND RESPONSIBLE CYBER PLAYER


Filipino Internet users have been adjudged the freest in Asia and the 6th freest in the world, according to Freedom House, a think tank based here in Washington, D.C.  South Korea is ranked the second freest in Asia.

This was before the Cybercrime Prevention Act was enacted and became effective. It included the crime of Internet Libel and prescribed a penalty higher than what the Revised Penal Code imposes for defamatory statements.

The Philippine version of the Cyber Law was patterned after the Convention On Cybercrime adapted by the Council of Europe and other non-members that included the United States and the Philippines.

The United States has signed and ratified it while the Philippines who has signed it still needs to ratify it.

The freest in the world is Estonia and the second freest is the United States. What is common to both is the fact that Libel is not considered cybercrime in their laws. Although their laws impose civil liability for libelous statements, there has never been anybody imprisoned for Libel.

The Constitutional safeguards protecting Freedom of Expression and their respective jurisprudence, especially in the United States, overwhelmingly support the supremacy of Free Speech over Libel.

Estonia is also a signatory of the Convention On Cybercrime. It has also ratified it. In fact, it also patterned its Cybercrime Prevention Law after the Convention On Cybercrime.

Defining Internet Libel as a cybercrime would surely lower our ranking among the freest in the world. But the ranking is really less important than its effect of discouraging the free flow of ideas between and among Filipino netizens and with other Internet users of the world.

Being the freest also has some drawbacks. Estonia and United States have been victims as well as targets of cyber attacks.

In Estonia, they experienced Cyber attacks such as “hacking, defacement, spam, DDoS including botnets, incitement to hatred and violence at internet websites and chat rooms”, providing guidelines on how to attack, including lists of Estonian servers. The target websites and servers were the Office of the President, Government, Ministries, Police, Banks, Online media, Prime Minister’s Party.

Since then, Estonia developed a CyberSecurity Strategy and passed some new provisions in the Penal Code, an Electronic Communications Act, Information Society Services Act, Data Protection Act, and Public Information Act but all with safeguards recognizing International Civil and Political Rights.

According to FBI (Federal Bureau of Investigation) data cited in a U.S. Senate testimony, “annual cybercrime profits and damages have hit a trillion dollars.”

The tools that are increasingly used by hackers for these cyber crimes are called “botnets”. Symantec estimates that there are about 3.5 million to 5.4 million botnets worldwide.

Bloomberg BusinessWeek reported that companies such as Sony, Google, Lockheed Martin and two of South Korea’s largest banks have been hacked. Even the International Monetary Fund (IMF) and Citigroup announced that their computers were breached  several months ago.

In effect, the battleground against terror and crime is no longer limited to Air, Land and Sea. Cyberspace has become a place for warfare. For this reason, the U.S. Military has declared it a military domain.

China, for example, has been accused of hacking Google’s infrastructures. On the other hand, the former accused the United States of being an “information imperialist,” and of using the Internet to overthrow governments.

The Pentagon, despite budgetary problems, “requested US$3.2 billion worth of funding to be allocated to “cyber security”.  A U.S. Cyber Command has been established and in fact, has had operational capacity.  Cyber Commands are likewise being established in other countries. It was reported that India is looking to establish a “Cyber Control and Command Authority” while China has established a “Blue Army” to defend the People’s Liberation Army from attacks on its networks.

The Philippines could be a major player in the Cyber World. With the right approach and attitude, we could be another source of cyber engineers, cyber warriors, cyber technicians, and cyber security experts.

It could accelerate the country’s economic development exponentially. It could be the destination for more foreign ICT investments.